id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
17613032
|
https://en.wikipedia.org/wiki/Microsoft%20Deployment%20Toolkit
|
Microsoft Deployment Toolkit
|
Microsoft Deployment Toolkit (MDT; originally released as Business Desktop Deployment in August 2003) is a free software package from Microsoft for automating the deployment of Windows 10, Server 2019 and older Windows Server and desktop operating systems.
Overview
MDT can help build an automated installation source for deploying Windows operating systems from Windows 7, Windows 10 and Windows Server 2008 onwards, from either a single machine or a central server distribution tool, such as Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM). Device drivers, Windows updates and software can be included with the build.
All the software intended for installation (Operating System, drivers, updates and applications) are added to a pool of available software and packaged into deployment packages. The Operating System and drivers to be included with this package are selected, and the administrator password, owner information, and product key are specified. Microsoft Deployment Toolkit generates a custom Windows PE (Preinstallation Environment) image that allows client machines to install the assembled deployment packages over the network from the MDT server. This Windows PE disk image can be burned to and booted from a CD, or booted with Windows Deployment Services. When selecting the package to deploy, software that has been included in the pool may also be selected for installation.
Operation
The Microsoft Deployment Toolkit (MDT) supports three types of deployments: Zero Touch Installation (ZTI), Lite Touch Installation (LTI), and User Driven Installation (UDI). ZTI is a fully automated deployment scheme in which installation requires no user interaction whatsoever. UDI deployments require full manual intervention to respond to every installation prompt, such as machine name, password or language setting. ZTI and UDI deployments both require a Microsoft System Center infrastructure. ZTI deployments require a persistent network connection to the distribution point. LTI deployments require limited user interaction. An LTI deployment needs very little infrastructure, so it can be installed from a network share, or media using either a USB flash drive or an optical disc.
Versions
Version 6.3.8456.1000 Supports Windows 10
Version: 8456 Latest version as of 2/28/2022
See also
Remote Installation Services
Microsoft System Center Configuration Manager (formerly known as SCCM or SMS)
User State Migration Tool
Windows Assessment and Deployment Kit (ADK) (previously known as Windows Automated Installation Kit)
Windows Deployment Services
Windows Preinstallation Environment (Windows PE)
https://www.microsoft.com/en-us/download/details.aspx?id=54259
References
External links
How to Deploy Windows 10 Using MDT?
MDT Release notes
MDT Known issues
Microsoft Official getting started guide
Microsoft deployment resources
Microsoft Deployment TechCenter
Microsoft Deployment Toolkit Team Blog
The Deployment Guys
Priscila Silva blog (Brazilian Portuguese)
Michael Niehaus' Windows and Office deployment ramblings
Windows administration
|
247968
|
https://en.wikipedia.org/wiki/Timeline%20of%20operating%20systems
|
Timeline of operating systems
|
This article presents a timeline of events in the history of computer operating systems from 1951 to the current day. For a narrative explaining the overall developments, see the History of operating systems.
1950s
1951
LEO I 'Lyons Electronic Office' was the commercial development of EDSAC computing platform, supported by British firm J. Lyons and Co.
1955
MIT's Tape Director operating system made for UNIVAC 1103
1955
General Motors Operating System made for IBM 701
1956
GM-NAA I/O for IBM 704, based on General Motors Operating System
1957
Atlas Supervisor (Manchester University) (Atlas computer project start)
BESYS (Bell Labs), for IBM 704, later IBM 7090 and IBM 7094
1958
University of Michigan Executive System (UMES), for IBM 704, 709, and 7090
1959
SHARE Operating System (SOS), based on GM-NAA I/O
1960s
1960
IBSYS (IBM for its 7090 and 7094)
1961
CTSS demonstration (MIT's Compatible Time-Sharing System for the IBM 7094)
MCP (Burroughs Master Control Program)
1962
Atlas Supervisor (Manchester University) (Atlas computer commissioned)
BBN Time-Sharing System
GCOS (GE's General Comprehensive Operating System, originally GECOS, General Electric Comprehensive Operating Supervisor)
1963
AN/FSQ-32, another early time-sharing system begun
CTSS becomes operational (MIT's Compatible Time-Sharing System for the IBM 7094)
JOSS, an interactive time-shared system that did not distinguish between operating system and language
Titan Supervisor, early time-sharing system begun
1964
KDF9 Timesharing Director (English Electric) – an early, fully hardware secured, fully pre-emptive process switching, multi-programming operating system for KDF9 (originally announced in 1960)
Berkeley Timesharing System (for Scientific Data Systems' SDS 940)
Dartmouth Time Sharing System (Dartmouth College's DTSS for GE computers)
OS/360 (IBM's primary OS for its S/360 series) (announced)
SCOPE (CDC 3000 series)
PDP-6 Monitor (DEC) descendant renamed TOPS-10 in 1970
EXEC 8 (UNIVAC)
1965
THE multiprogramming system (Technische Hogeschool Eindhoven) development
Multics (MIT, GE, Bell Labs for the GE-645) (announced)
BOS/360 (IBM's Basic Operating System)
TOS/360 (IBM's Tape Operating System)
TSOS (later VMOS) (RCA)
Pick operating system
1966
OS/360 (IBM's primary OS for its S/360 series) PCP and MFT (shipped)
DOS/360 (IBM's Disk Operating System)
MS/8 (Richard F. Lary's DEC PDP-8 system)
GEORGE 1 & 2 for ICT 1900 series
SODA for Elwro's Odra 1204
1967
CP-40, predecessor to CP-67 on modified IBM System/360 Model 40
CP-67 (IBM, also known as CP/CMS)
Michigan Terminal System (MTS) (time-sharing system for the IBM S/360-67 and successors)
ITS (MIT's Incompatible Timesharing System for the DEC PDP-6 and PDP-10)
ORVYL (Stanford University's time-sharing system for the IBM S/360)
TSS/360 (IBM's Time-sharing System for the S/360-67, never officially released, canceled in 1969 and again in 1971)
OS/360 MVT
WAITS (SAIL, Stanford Artificial Intelligence Laboratory, time-sharing system for DEC PDP-6 and PDP-10, later TOPS-10)
1968
Airline Control Program (ACP) (IBM)
THE multiprogramming system (Eindhoven University of Technology) publication
TSS/8 (DEC for the PDP-8)
1969
TENEX (Bolt, Beranek and Newman for DEC systems, later TOPS-20)
Unics (later Unix) (AT&T, initially on DEC computers)
RC 4000 Multiprogramming System (RC)
Multics (MIT, GE, Bell Labs for the GE-645 and later the Honeywell 6180) (opened for paying customers in October)
GEORGE 3 For ICL 1900 series
1970s
1970
DOS-11 (PDP-11)
1971
RSTS-11 2A-19 (First released version; PDP-11)
OS/8
1972
Data General RDOS
Edos
Operating System/Virtual Storage 1 (OS/VS1)
Operating System/Virtual Storage 2 R1 (OS/VS2 SVS)
Virtual Machine Facility/370 (VM/370), sometimes known as VM/CMS
Virtual Machine/Basic System Extensions Program Product (BSEPP or VM/SE)
Virtual Machine/System Extensions Program Product (SEPP or VM/BSE)
MUSIC/SP
PRIMOS (written in FORTRAN IV, that didn't have pointers, while later versions, around version 18, written in a version of PL/I, called PL/P)
1973
Эльбрус-1 (Elbrus-1) – Soviet computer – created using high-level language uЭль-76 (AL-76/ALGOL 68)
VME – implementation language S3 (ALGOL 68)
RSX-11D
RT-11
Alto OS
1974
CP/M
DOS-11 V09-20C (Last stable release, June 1974)
Sintran III
MONECS
Multi-Programming Executive (MPE) – Hewlett-Packard
Hydra – capability-based, multiprocessing OS kernel
Operating System/Virtual Storage 2 R2 (MVS)
1975
BS2000 V2.0 (First released version)
Version 6 Unix
1976
Cambridge CAP computer – all operating system procedures written in ALGOL 68C, with some closely associated protected procedures in BCPL
Cray Operating System
FLEX
TOPS-20
Tandem Nonstop OS v1
1977
1BSD
KERNAL
OASIS operating system
TRSDOS
Virtual Memory System (VMS) V1.0 (Initial commercial release, October 25)
1978
2BSD
Apple DOS
HDOS
PTDOS
TRIPOS
UCSD p-System (First released version)
Lisp machine (CADR)
KVM/370 – security retro-fit of IBM VM/370
KSOS – secure OS design from Ford Aerospace
MVS/System Extensions (MVS/SE)
1979
3BSD
Atari DOS
POS
NLTSS
UNIX/32V
Version 7 Unix
UCLA Secure UNIX – an early secure UNIX OS based on security kernel
MVS/System Extensions R2 (MVS/SE2)
MP/M
1980s
1980
86-DOS
CTOS
NewDos/80
OS-9
SOS
MVS/System Product (MVS/SP) V1
Virtual Machine/System Product (VM/SP)
Xenix
AOS/VS (Data General)
1981
Acorn MOS
Xinu first release
Business Operating System
Aegis SR1 (First Apollo/DOMAIN systems shipped on March 27)
PC DOS
Pilot (Xerox Star operating system)
MS-DOS
UTS
iMAX – OS for Intel's iAPX 432 capability machine
CP/M-86
1982
Commodore DOS
LDOS (By Logical Systems, Inc. – for the Radio Shack TRS-80 Models I, II & III)
QNX
Sun UNIX (later SunOS) 0.7
Ultrix
Stratus VOS
Unix System III
pSOS
1983
Lisa Office System 7/7
Coherent
GNU (project start)
Novell NetWare (S-Net)
ProDOS
SunOS 1.0
STOP – TCSEC A1-class, secure OS for SCOMP hardware
LOCUS – UNIX compatible, high reliability, distributed OS
DNIX
MVS/System Product V2 (MVS/Extended Architecture, MVS/XA)
1984
AMSDOS
Mac OS (System 1.0)
MSX-DOS
PC/IX
Sinclair QDOS
QNX
UNICOS
Venix 2.0
Virtual Machine/Extended Architecture Migration Assistance (VM/XA MA)
1985
Windows 1.0
AmigaOS
Atari TOS
DG/UX
DOS Plus
MIPS RISC/os
Oberon – written in Oberon
SunOS 2.0
Version 8 Unix
Windows 1.01
Xenix 2.0
Virtual Machine/Extended Architecture System Facility (VM/XA SF)
Graphics Environment Manager
1986
AIX 1.0
GS-OS
Genera 7.0
HP-UX
SunOS 3.0
GEOS
Version 9 Unix
GEMSOS – TCSEC A1-class, secure kernel for BLACKER VPN & GTNP
Cronus distributed OS
1987
Topaz – semi-distributed OS for DEC Firefly workstation written in Modula-2+ and garbage collected
Arthur (much improved version came in 1989 under the name RISC OS)
IRIX (3.0 is first SGI version)
MINIX 1.0
BS2000 V9.0
OS/2 (1.0)
PC-MOS/386
Windows 2.0
1988
A/UX (Apple Computer)
AOS/VS II (Data General)
RISC iX
KeyKOS – capability-based microkernel for IBM mainframes with automated persistence of app data
LynxOS
CP/M rebranded as DR-DOS
Mac OS (System 6)
MVS/System Product V3 (MVS/Enterprise Systems Architecture, MVS/ESA)
OS/2 (1.1)
OS/400
SpartaDOS X
SunOS 4.0
TOPS-10 7.04 (Last stable release, July 1988)
HeliOS 1.0
VAX VMM – TCSEC A1-class, VMM for VAX computers (limited use before cancellation)
Flex machine – tagged, capability machine with OS and other software written in ALGOL 68RS
Virtual Machine/Extended Architecture System Product (VM/XA SP)
1989
EPOC
NeXTSTEP (1.0)
OS/2 (1.2)
RISC OS (First release was to be called Arthur 2, but was renamed to RISC OS 2, and was first sold as RISC OS 2.00 in April 1989)
SCO UNIX (Release 3)
TSX-32
Version 10 Unix
Xenix 2.3.4 (Last stable release)
Army Secure Operating System (ASOS) – TCSEC A1-class secure, real-time OS for Ada applications
1990s
1990
AmigaOS 2.0
BeOS (v1)
DOS/V
Genera 8.0
OS/2 1.3
OSF/1
AIX 3.0
MVS/ESA SP Version 4
Novell NetWare 3
Windows 3.0
LOCK – TCSEC A1-class secure system with kernel & hardware support for type enforcement
Virtual Machine/Enterprise Systems Architecture (VM/XA ESA)
PC/GEOS
1991
Linux 0.01-0.1
Mac OS (System 7)
MINIX 1.5
PenPoint OS
RISC OS 3
Trusted Xenix – rewritten & security enhanced Xenix evaluated at TCSEC B2-class
Amoeba – microkernel-based, POSIX-compliant, distributed OS
1992
386BSD 0.1
BSD/386, by BSDi and later known as BSD/OS.
AmigaOS 3.0
Amiga Unix 2.01 (Latest stable release)
RSTS/E 10.1 (Last stable release, September 1992)
SLS
Solaris 2.0 (Successor to SunOS 4.x; based on SVR4 instead of BSD)
OpenVMS V1.0 (First OpenVMS AXP (Alpha) specific version, November 1992)
OS/2 2.0 (First i386 32-bit based version)
Plan 9 First Edition (First public release was made available to universities)
Windows 3.1
LGX
1993
FreeBSD
NetBSD
Newton OS
Windows NT 3.1 (First Windows NT kernel public release)
Open Genera 1.0
IBM 4690 Operating System
Novell NetWare 4
OS/2 2.1
Slackware 1.0
Spring
1994
AIX 4.0, 4.1
IBM MVS/ESA SP Version 5
OS/2 3.0
RISC OS 3.5
NetBSD 1.0 (First multi-platform release, October 1994)
SPIN – extensible OS written in Modula-3
Red Hat
1995
Digital UNIX (aka Tru64 UNIX)
OpenBSD
OS/390
Plan 9 Second Edition (Commercial second release version was made available to the general public.)
Ultrix 4.5 (Last major release)
Windows 95
1996
Mac OS 7.6 (First officially-named Mac OS)
Windows NT 4.0
Windows CE 1.0
RISC OS 3.6
AIX 4.2
OS/2 4.0
Palm OS
Debian 1.1
JN – microkernel OS for embedded, Java apps
1997
Inferno
Mac OS 8
Windows CE 2.0
SkyOS
MINIX 2.0
RISC OS 3.7
AIX 4.3
DR-WebSpyder 1.0
Nemesis
1998
Solaris 7 (first 64-bit Solaris release – names from this point drop "2.", otherwise would've been Solaris 2.7)
Windows 98
RT-11 5.7 (Last stable release, October 1998)
Novell NetWare 5
Junos
DR-WebSpyder 2.0
1999
AROS (Boot for the first time in Stand Alone version)
RISC OS 4
Mac OS 9
OS/2 4.5
Windows 98 (2nd edition)
Inferno Second Edition (Last distribution (Release 2.3, ) from Lucent's Inferno Business Unit)
2000s
2010s
2020s
See also
Comparison of operating systems
List of operating systems
Comparison of real-time operating systems
Timeline of DOS operating systems
Timeline of Linux distributions (Diagram 1992–2010)
References
External links
UNIX History – a timeline of UNIX 1969 and its descendants at present
Concise Microsoft O.S. Timeline – a color-coded concise timeline for various Microsoft operating systems (1981–present)
Full Form of Computer - Full Form and Working of Computers.
Bitsavers – an effort to capture, salvage, and archive historical computer software and manuals from minicomputers and mainframes of the 1950s, 1960s, 1970s, and 1980s
A brief history of operating systems
Microsoft operating system time-line
Timeline of operating systems
Operating systems
Operating systems
Real-time operating systems
Embedded operating systems
|
66678233
|
https://en.wikipedia.org/wiki/Cleomestra
|
Cleomestra
|
In Greek mythology, Cleomestra was a Trojan princess as daughter of King Tros and probably, Callirrhoe, daughter of the river god Scamander, or Acallaris, daughter of Eumedes. She was the sister of Ilus, Assaracus, Ganymede and possibly, Cleopatra. Cleomestra became the mother of Assaracus, Antenor and maybe of Alcathous by Aesyetes. Cleomestra and Cleopatra, as daughters of Tros are probably the same person.
Notes
References
Dictys Cretensis, from The Trojan War. The Chronicles of Dictys of Crete and Dares the Phrygian translated by Richard McIlwaine Frazer, Jr. (1931-). Indiana University Press. 1966. Online version at the Topos Text Project.
Dionysus of Halicarnassus, Roman Antiquities. English translation by Earnest Cary in the Loeb Classical Library, 7 volumes. Harvard University Press, 1937-1950. Online version at Bill Thayer's Web Site
Dionysius of Halicarnassus, Antiquitatum Romanarum quae supersunt, Vol I-IV. . Karl Jacoby. In Aedibus B.G. Teubneri. Leipzig. 1885. Greek text available at the Perseus Digital Library.
Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. . Online version at the Perseus Digital Library.
Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. . Greek text available at the Perseus Digital Library.
Pseudo-Apollodorus, The Library with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes, Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1921. . Online version at the Perseus Digital Library. Greek text available from the same website.
Trojans
Princesses in Greek mythology
|
34826296
|
https://en.wikipedia.org/wiki/Doxing
|
Doxing
|
Doxing or doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually via the internet. Methods employed to acquire such information include searching publicly available databases and social media websites (like Facebook), hacking, social engineering and, through websites such as Grabify, a site specialized in revealing IP addresses through a fake link. Doxing may be carried out for reasons such as online shaming, extortion, and vigilante aid to law enforcement. It also may be associated with hacktivism.
Etymology
"Doxing" is a neologism. It originates from a spelling alteration of the abbreviation "docs" (for "documents") and refers to "compiling and releasing a dossier of personal information on someone". Essentially, doxing is revealing and publicizing the records of an individual, which were previously private or difficult to obtain.
The term dox derives from the slang "dropping dox," which, according to a contributor to Wired, Mat Honan, was "an old-school revenge tactic that emerged from hacker culture in 1990s". Hackers operating outside the law in that era used the breach of an opponent's anonymity as a means to expose opponents to harassment or legal repercussions.
Consequently, doxing often comes with a negative connotation because it can be a means of revenge via the violation of privacy.
History
Initial efforts around doxing were largely related to internet discussion forums on Usenet. One of the first documented doxing events was the publication of a "Blacklist of Net.Nazis and Sandlot Bullies" which listed names, email addresses, phone numbers, and mailing addresses of individuals the author objected to.
Doxware is a cryptovirology attack invented by Adam Young and further developed with Moti Yung that carries out doxing extortion via malware. It was first presented at West Point in 2003. The attack is rooted in game theory and was originally dubbed "non-zero-sum games and survivable malware".
The attack is summarized in the book Malicious Cryptography as follows:
The attack differs from the extortion attack in the following way. In the extortion attack, the victim is denied access to its own valuable information and has to pay to get it back, where in the attack that is presented here the victim retains access to the information but its disclosure is at the discretion of the computer virus.
Doxware is the converse of ransomware. In a ransomware attack (originally called cryptoviral extortion), the malware encrypts the victim's data and demands payment to provide the needed decryption key. In the doxware cryptovirology attack, the attacker or malware steals the victim's data and threatens to publish it unless a fee is paid.
Common techniques
Once people have been exposed through doxing, they may be targeted for harassment through methods such as harassment in-person, fake signups for mail and pizza deliveries, or through swatting (dispatching armed police to their house through spoofed tips).
A hacker may obtain an individual's dox without making the information public. A hacker may look for this information to extort or coerce a known or unknown target. A hacker may also harvest a victim's information to break into their Internet accounts or take over their social media accounts.
Victims may also be shown their details as proof that they have been doxed as a form of intimidation. The perpetrator may use this fear to gain power over victims in order to extort or coerce. Doxing is therefore a standard tactic of online harassment and has been used by people associated with 4chan and in the Gamergate and vaccine controversies.
Examples
Doxing of abortion providers
In the United States, in the 1990s, anti-abortion activists secured abortion providers' personal information, such as home addresses, phone numbers, and photographs, and posted them as a hit list. The courts later ruled this to be an immediate incitement to violence. The site's legend explained: "Black font (working); Greyed-out Name (wounded); Strikethrough (fatality)." The website included blood-dripping graphics, celebrated providers' deaths and incited others to kill or injure the remaining providers on the list. Between 1993 and 2016, eight abortion providers were killed by anti-abortion activists, along with at least four police officers.
Human flesh search engine
Starting in March 2006, the Chinese Internet phenomenon of the "Human flesh search engine"(人肉搜索)shares much in common with doxing. Specifically, it refers to distributed, sometimes deliberately crowdsourced searches for similar kinds of information through use of digital media.
Anonymous
The term "dox" entered mainstream public awareness through media attention attracted by Anonymous, the Internet-based group of hacktivists and pranksters who make frequent use of doxing, as well as related groups like AntiSec and LulzSec. The Washington Post has described the consequences for innocent people incorrectly accused of wrongdoing and doxed as "nightmarish".
In December 2011, Anonymous exposed detailed information of 7,000 law enforcement members in response to investigations into hacking activities.
In November 2014, Anonymous began releasing the identities of members of the Ku Klux Klan. This was concerning local Klan members in Ferguson, Missouri, making threats to shoot those protesting the shooting of Michael Brown. Anonymous also hijacked the group's Twitter page, causing Klan members to make veiled threats of violence against members of Anonymous. In November 2015, a major release of information about the KKK was planned. Discredited information was released prematurely, and Anonymous denied involvement. On 5 November 2015 (Guy Fawkes Night), Anonymous released an official list of supposed, but currently unverified, KKK members and sympathizers.
Boston Marathon
Following the 15 April 2013 Boston Marathon bombing, vigilantes on Reddit wrongly identified a number of people as suspects. Notable among misidentified bombing suspects was Sunil Tripathi, a student reported missing before the bombings took place. A body reported to be Tripathi's was found in Rhode Island's Providence River on 25 April 2013, as reported by the Rhode Island Health Department. The cause of death was not immediately known, but authorities said they did not suspect foul play. The family later confirmed Tripathi's death was a result of suicide. Reddit general manager Erik Martin later issued an apology for this behavior, criticizing the "online witch hunts and dangerous speculation" that took place on the website.
Journalists
Journalists with The Journal News of Westchester County, New York were accused of doxing gun owners in the region in a story the paper published in December 2012.
Newsweek was criticized when writer Leah McGrath Goodman claimed to have revealed the identity of the anonymous creator of Bitcoin, Satoshi Nakamoto. Although she primarily drew on the public record, users on Reddit responded negatively.
The Satoshi Nakamoto case brought doxing to greater attention on platforms such as Twitter, where users questioned the ethics of doxing in journalism. Many Twitter users argued that the practice was seemingly acceptable for professional journalists but wrong for anyone else. Other users discussed the effect the popularization that the concept of doxing could have on journalism in the public interest, raising questions over journalism concerning public and private figures in which journalists practicing doxing may blur the line between reporting information in the public's interest and releasing information about the private life of an individual without their consent.
In September 2019, The Des Moines Register published racist tweets made by a 24-year-old Iowa man whose beer sign on ESPN College GameDay resulted in over $1 million in contributions to a children's hospital. Readers retaliated by sharing social media comments previously made by the reporter, Aaron Calvin, which contained racial slurs and condemnation of law enforcement. The newspaper later announced they no longer employed Calvin.
Curt Schilling
In March 2015, former Major League Baseball (MLB) pitcher Curt Schilling used doxing to identify several people responsible for "Twitter troll" posts with obscene, sexually explicit comments about his teenage daughter. One person was suspended from his community college, and another lost a part-time job with the New York Yankees.
Alondra Cano
In December 2015, Minneapolis city council member Alondra Cano used her Twitter account to publish private cellphone numbers and e-mail addresses of critics who wrote about her involvement in a Black Lives Matter rally.
HIPAA Federal Register 6039G
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a US federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. Embedded in that act, that is designed to protect the privacy of the patient, is ironically a provision that requires the Internal Revenue Service (IRS) to publish the names of Americans who renounce or relinquish their US citizenship. The IRS will publish a Quarterly Publication of Individuals Who Have Chosen to Expatriate, as Required by Section 6039G, 81 Fed. Reg. 50058. The expatriation provisions were included as “revenue offsets... to avoid increasing the budget deficit.” The expressed intent originated in The Expatriation Tax Act of 1995 by Bill Archer to publicly shame the expatriating individuals.
Lou Dobbs
In 2016, Fox Business news anchor Lou Dobbs revealed the address and phone number of Jessica Leeds, one of the women who accused American presidential candidate Donald Trump of inappropriate sexual advances; Dobbs later apologized.
Erdoğan emails
In July 2016, WikiLeaks released 300,000 e-mails called the Erdoğan emails, initially thought to be damaging to Turkish President Recep Tayyip Erdoğan. Included in the leak was Michael Best, who uploaded Turkish citizens' information databases that WikiLeaks promoted, who came forward to say that doing so was a mistake after the site where he uploaded the information took it down. The files were removed due to privacy concerns. They included spreadsheets of private, sensitive information of what appears to be every female voter in 79 out of 81 provinces in Turkey, including their home addresses and other private information, sometimes including their cellphone numbers.
Michael Hirsh
In November 2016, Politico editor Michael Hirsh resigned after publishing the home address of white nationalist Richard B. Spencer on Facebook.
U.S. Presidential Advisory Commission on Election Integrity
In July 2017, the United States' Presidential Advisory Commission on Election Integrity, which was established in May 2017 by U.S. President Donald Trump to investigate his controversial allegation of voter fraud, published a 112-page document of unredacted emails of public comment on its work, which included both critics and some supporters of the Commission. The Commission included the personal details of those critics, such as names, emails, phone numbers and home addresses. Most of the commenters who wrote to the White House expressed concern about publication of their personal information, with one person writing, "DO NOT RELEASE ANY OF MY VOTER DATA PERIOD." Despite this, that person's name and email address were published by the commission.
This act drew criticism from Theresa Lee, a staff attorney for the American Civil Liberties Union's Voting Rights Project, who stated, "This cavalier attitude toward the public's personal information is especially concerning given the commission's request for sensitive data on every registered voter in the country." The White House defended the personal information publication, noting that everyone was warned that might happen. However, former Deputy Secretary of Labor Chris Lu stated that regardless of the legality, the White House has a moral obligation to protect sensitive data, saying, "Whether or not it's legal to disclose this personal information, it's clearly improper, and no responsible White House would do this."
Federal agencies often solicit and release public comments on proposed legislation. Regulations.gov, which is designated for public comments, includes a detailed set of guidelines explaining how to submit comments, what type of personal information is collected, and how that information may be used, stating, "Some agencies may require that you include personal information, such as your name and email address, on the comment form. The Securities and Exchange Commission, for instance, warns commenters to 'submit only information that you wish to make available publicly.'" Another agency, the Federal Trade Commission, tells commenters that "published comments include the commenter's last name and state/country as well as the entire text of the comment. Please do not include any sensitive or confidential information." However, The White House does not appear to have issued any such public guidelines or warnings before many of the emails were sent. Marc Lotter, Press Secretary to Mike Pence, stated, "These are public comments, similar to individuals appearing before commission to make comments and providing name before making comments. The Commission’s Federal Register notice asking for public comments and its website make clear that information 'including names and contact information' sent to this email address may be released."
Democratic U.S. House of Representatives intern
On 3 October 2018, Jackson Cosko, a House fellow for the Democratic Party, was arrested by the U.S. Capitol Police (USCP). He allegedly posted private, identifying information of several Senators to Wikipedia. According to the USCP, the personal information of Republican Senators Lindsey Graham, Mike Lee and Orrin Hatch was anonymously posted to Wikipedia the week before on Thursday 27 September 2018. The information included home addresses and phone numbers. All three lawmakers are with the Senate Judiciary Committee. The alleged doxing occurred during the hearing of Supreme Court nominee Judge Brett Kavanaugh. Cosko was initially charged with witness tampering, threats in interstate communications, unauthorized access of a government computer, identity theft, second degree burglary and unlawful entry. Cosko was fired after his arrest. He worked with Democratic Rep. Sheila Jackson Lee (D-TX), Sen. Dianne Feinstein (D-Calif), Sen. Maggie Hassan (D-N.H.), and former Sen. Barbara Boxer (D-Calif). Conviction of all six charges might have resulted in Cosko facing up to 20 years in prison. However, in June 2019, he was sentenced by Judge Thomas F. Hogan to four years in prison. An accomplice, Samantha DeForest Davis, was sentenced to two years of supervised probation and community service.
Legal remedies
There are currently few legal remedies for the victims of doxing. In the United States, there are currently two federal laws that could potentially address the problem of doxing: the Interstate Communications Statute and the Interstate Stalking Statute. However, as one scholar has argued, "[t]hese statutes...are woefully inadequate to prevent doxing because their terms are underinclusive and they are rarely enforced". The Interstate Communications Statute, for example, "only criminalizes explicit threats to kidnap or injure a person". But in many instances of doxing, a doxer may never convey an explicit threat to kidnap or injure, but the victim could still have good reason to be terrified. And the Interstate Stalking Statute "is rarely enforced and it serves only as a hollow protection from online harassment". To illustrate, over three million people are stalked over the internet each year, yet only three people are charged under the Interstate Stalking Statute. Accordingly, "[t]his lack of federal enforcement means that the States must step in if doxing is to be reduced".
Criminal law
Mainland China
From March 1, 2020, the People’s Republic of China’s "Regulations on the Ecological Governance of Online Information Content" has been implemented, clarifying that users and producers of online information content services and platforms must not engage in online violence, doxing, deep forgery, data fraud, account manipulation and other Illegal activities.
Hong Kong
As of 2021, it is a criminal offense in Hong Kong to dox, where doxing is defined as releasing private or non-public information on a person for the purposes of "threatening, intimidation, harassment or to cause psychological harm". Persons convicted under this statute are liable to imprisonment for up to 5 years, and a fine of HK$1,000,000 (US$128,324.40).
South Korea
South Korea stands as one of few countries with a criminal statute that specifically addresses doxing. Article 49 of "Act on promotion of information and communications network utilization, and information protection" prohibits unlawful collection and dissemination of private information such as full name, birth date, address, likeliness, and any other information that is deemed sufficient to identify specific person(s) when viewed in summation, regardless of intent. In practice, however, due to the ambiguous nature of “unlawful collection” of private information in said statute, legal actions are often based upon article 44 from the same act, which prohibits insulting an individual with language derogatory or profane, and defamation of an individual through the dissemination of either misinformation or privileged factual information that may potentially damage an individual's reputation or honor (which often occurs in a doxing incident). It is important to note that this particular clause enforces harsher maximum sentences than a “traditional” defamation statute existing in the Korean criminal code and was originally enacted partially in response to the rise in celebrity suicides due to cyberbullying.
See also
Escrache
Kiwi Farms
Identity theft
Skiptracing
Opposition research
Outing
Doxbin
Data re-identification
Child pornography laws in Canada
Quarterly Publication of Individuals Who Have Chosen to Expatriate
References
Sources
External links
Cyberbullying
Cybercrime
Data security
Hacking (computer security)
Internet privacy
Internet terminology
Internet vigilantism
Identity documents
Privacy controversies and disputes
|
10790243
|
https://en.wikipedia.org/wiki/Adobe%20Digital%20Editions
|
Adobe Digital Editions
|
Adobe Digital Editions (abbreviated ADE) is an e-book reader software program from Adobe Systems, built initially (1.x version) using Adobe Flash. It is used for acquiring, managing, and reading e-books, digital newspapers, and other digital publications. The software supports EPUB and PDF (nonproprietary file format for reflowable text, or fixed layout e-books; respectively). It implements a proprietary scheme of digital rights management (DRM) which, since the version 1.5 release in May 2008, allows document sharing among multiple devices and user authentication via an Adobe ID. Digital Editions is a successor to the Acrobat eBook Reader application.
Windows and Mac OS X versions of Adobe Digital Editions were released on 19 June 2007. Previous versions of the software required version 9.0 of Adobe Flash Player. Starting with version 2.0, however, which relies on .NET Framework 3.5 on Windows, Flash Player is no longer supported. Adobe initiated development of a Linux version of ADE in 2007; however, this has not had any beta release or any formal updates.
Digital rights management
Adobe Digital Editions uses the proprietary ADEPT (Adobe Digital Experience Protection Technology) digital rights management scheme, which is also implemented on some e-book readers, including iPads and many Android devices, but not Kindles. The software locks content to up to six machines and allows the user to view the content on each of them. Barnes & Noble (B&N) e-books are protected with a variant of ADEPT.
In March 2009, the author of the reverse engineering blog i♥cabbages announced that they had broken the scheme.
When viewing an e-book, Adobe Digital Editions by default stores the e-book locally as PDF files on Windows machines.
These files can be copied and handled like other files, but they cannot be opened except with Adobe Digital Editions. Adobe's website has virtually no information on ADEPT except on its trademark page and a statement that OverDrive is compatible.
Data collection concern
On 6 October 2014, Nate Hoffelder reported in The Digital Reader that Adobe Digital Editions version 4 ("ADE4") was sending extensive information about e-books back to Adobe, including e-books read by a user as well as e-books stored on the same machine but not opened in ADE4. This was confirmed by Sean Gallagher, writing in Ars Technica and by others. However, no one else has confirmed the report that books never opened in ADE nor in the ADE library are logged. Hoffelder reported that the information collected included "[which] ebooks that have been opened, which pages were read, and in what order... including the title, publisher, and other metadata for the book". He also reported that all this data was sent in clear text—that is, not protected by any form of encryption. This would make it easy for a third party to read this information. This data was collected for borrowed library books and for books NOT protected by any form of DRM. Hoffelder suggested that such a practice might violate various privacy laws. The Electronic Frontier Foundation (EFF) made a similar suggestion.
Adobe responded that their practice was justified by their license agreement and denied collecting data on any book not currently opened for reading. Specifically, they stated:
"All information collected from the user is collected solely for purposes such as license validation and to facilitate the implementation of different licensing models by publishers. Additionally, this information is solely collected for the eBook currently being read by the user and not for any other eBook in the user’s library or read/available in any other reader. User privacy is very important to Adobe, and all data collection in Adobe Digital Editions is in line with the end user license agreement and the Adobe Privacy Policy."
Gary Price, writing in INFOdocket (an online publication sponsored by Library Journal), views the matter as of serious concern, but sees it as another instance of concerns that have been present but largely unaddressed for years. The article also posts Adobe's response to the issue.
In October 2014, Adobe released version 4.0.1 of the software, which sends data to Adobe in a secure transmission (using HTTPS).
See also
Adobe Content Server
calibre (software)
Digital Library
International Digital Publishing Forum
OverDrive Media Console
Public Library
Sigil (application)
References
External links
PDF readers
Digital Editions
EPUB readers
Digital rights management systems
|
13196534
|
https://en.wikipedia.org/wiki/Washington%20High%20School%20of%20Information%20Technology%20%28Milwaukee%2C%20Wisconsin%29
|
Washington High School of Information Technology (Milwaukee, Wisconsin)
|
Washington High School of Information Technology is a magnet high school located in the Sherman Park neighborhood on the north side of Milwaukee, Wisconsin, United States. It is one of the oldest schools in the Milwaukee Public Schools system, and was founded in 1911.
In September 2005 Washington was divided into three "schools within a school," which are divided among the school's four floors. These are the School of Law, Education, and Public Service; Washington High School of Expeditionary Learning; and Washington High School of Information Technology. In June 2010, LEAPS closed and was combined with EL and renamed Washington High School. The Washington High School of Information Technology, which continues the legacy of the Career Specialty Program begun in 1976, has continued to operate.
In June 2011 the combined LEAPS and EL school was closed and merged into Washington High School of Information Technology, thus creating a single school again.
Athletics
Washington's athletic teams are known as the Purgolders, named for the school's colors of purple and gold. It competes in the Milwaukee City Conference.
Washington has garnered four boys basketball Division 1 state titles since 1985. It is part of an intense three-way rivalry with Rufus King High School and Vincent High School. These schools have accounted for 14 of the last 23 state titles in Division 1 boys basketball.
The girls' basketball team is one of three Milwaukee City Conference girls teams to have won a WIAA state title (Harold S. Vincent High School and Riverside University High School are the others), having done it five times, a Division 1 record. They also won three consecutive state titles (1994, 1995 and 1996).
Washington won the state championship in boys' cross country in 1930 and 1935 and tied for the championship with Bay View High School in 1932 in single-division contests, won the 1952 championship in the larger of two divisions, and won the 1964 championship in the largest of three divisions.
Demographics
77% Black, 774 students
15% Asian/Pacific Islander, 150 students
8% Hispanic, 80 students
0% American Indian/Alaska Native, 2 students
Notable alumni
Brian Burke, Wisconsin politician and legislator
Wally Cruice, NFL scout
Lee S. Dreyfus, Governor of Wisconsin
Michael Feldman, host of radio show Whad'Ya Know?
Earle W. Fricker, Wisconsin politician
Pat Harder, UW-Madison and NFL player
Otto Junkermann, former Wisconsin State Representative, former Brown County Supervisor
Norman R. Klug, Wisconsin politician
Herb Kohl, U.S. Senator
Tom Laughlin, actor
John Allen Paulos, writer, speaker, mathematics professor
Stan Pelecky, Wisconsin politician
Lois Plous, Wisconsin politician
Jack (Jackie) Porter, WHS, Class of 1962---sociologist, writer, and political activist
Mark Ryan, Wisconsin politician
Bud Selig, Commissioner of Baseball
Milton Shadur, United States judge
Paul Sicula, Wisconsin politician
Latrell Sprewell, former NBA basketball player
Erwin G. Tamms, Wisconsin politician
Fred W. Vetter, Jr., U.S. Air Force general
Gene Wilder, actor
Wayne F. Whittow, Wisconsin politician
References
High schools in Milwaukee
Educational institutions established in 1912
Public high schools in Wisconsin
Magnet schools in Wisconsin
1912 establishments in Wisconsin
|
60682970
|
https://en.wikipedia.org/wiki/List%20of%20SMTP%20server%20return%20codes
|
List of SMTP server return codes
|
This is a list of Simple Mail Transfer Protocol (SMTP) response status codes. Status codes are issued by a server in response to a client's request made to the server.
Unless otherwise stated, all status codes described here is part of the current SMTP standard, . The message phrases shown are typical, but any human-readable alternative may be provided.
Basic status code
A "Basic Status Code" SMTP reply consists of a three digit number (transmitted as three numeric characters) followed by some text. The number is for use by automata (e.g., email clients) to determine what state to enter next; the text ("Text Part") is for the human user.
The first digit denotes whether the response is good, bad, or incomplete.:
2yz (Positive Completion Reply): The requested action has been successfully completed.
3yz (Positive Intermediate Reply): The command has been accepted, but the requested action is being held in abeyance, pending receipt of further information.
4yz (Transient Negative Completion Reply): The command was not accepted, and the requested action did not occur. However, the error condition is temporary, and the action may be requested again.
5yz (Permanent Negative Completion Reply): The command was not accepted and the requested action did not occur. The SMTP client SHOULD NOT repeat the exact request (in the same sequence).
The second digit encodes responses in specific categories:
x0z (Syntax): These replies refer to syntax errors, syntactically correct commands that do not fit any functional category, and unimplemented or superfluous commands.
x1z (Information): These are replies to requests for information.
x2z (Connections): These are replies referring to the transmission channel.
x3z : Unspecified.
x4z : Unspecified.
x5z (Mail system): These replies indicate the status of the receiver mail system.
Enhanced status code
The Basic Status Codes have been in SMTP from the beginning, with in 1982, but were extended rather extensively, and haphazardly so that by 2003 rather grumpily noted that: "SMTP suffers some scars from history, most notably the unfortunate damage to the reply code extension mechanism by uncontrolled use."
defines a separate series of enhanced mail system status codes which is intended to be better structured, consisting of three numerical fields separated by ".", as follows:
class "." subject "." detail
class = "2" / "4" / "5"
subject = 1 to 3 digits
detail = 1 to 3 digits
The classes are defined as follows:
2.XXX.XXX Success: Report of a positive delivery action.
4.XXX.XXX Persistent Transient Failure: Message as sent is valid, but persistence of some temporary conditions has caused abandonment or delay.
5.XXX.XXX Permanent Failure: Not likely to be resolved by resending the message in current form.
In general the class identifier MUST match the first digit of the Basic Status Code to which it applies.
The subjects are defined as follows:
X.0.XXX Other or Undefined Status
X.1.XXX Addressing Status
X.2.XXX Mailbox Status
X.3.XXX Mail System Status
X.4.XXX Network and Routing Status
X.5.XXX Mail Delivery Protocol Status
X.6.XXX Message Content or Media Status
X.7.XXX Security or Policy Status
The meaning of the "detail" field depends on the class and the subject, and are listed in RFC 3463 and .
A server capable of replying with an Enhanced Status Code MUST preface (prepend) the Text Part of SMTP Server responses with the Enhanced Status Code followed by one or more spaces. For example, the "221 Bye" reply (after QUIT command) MUST be sent as "221 2.0.0 Bye" instead.
The Internet Assigned Numbers Authority (IANA) maintains the official registry of these enhanced status codes.
Common status codes
This section list some of the more commonly encountered SMTP Status Codes. This list is not exhaustive, and the actual text message (outside of the 3-field Enhanced Status Code) might be different.
— 2yz Positive completion
211 System status, or system help reply
214 Help message (A response to the HELP command)
220 <domain> Service ready
221 <domain> Service closing transmission channel
221 2.0.0 Goodbye
235 2.7.0 Authentication succeeded
240 QUIT
250 Requested mail action okay, completed
251 User not local; will forward
252 Cannot verify the user, but it will try to deliver the message anyway
— 3yz Positive intermediate
334 (Server challenge - the text part contains the Base64-encoded challenge)
354 Start mail input
— 4yz Transient negative completion
"Transient Negative" means the error condition is temporary, and the action may be requested again. The sender should return to the beginning of the command sequence (if any).
The accurate meaning of "transient" needs to be agreed upon between the two different sites (receiver- and sender-SMTP agents) must agree on the interpretation. Each reply in this category might have a different time value, but the SMTP client SHOULD try again.
421 Service not available, closing transmission channel (This may be a reply to any command if the service knows it must shut down)
432 4.7.12 A password transition is needed
450 Requested mail action not taken: mailbox unavailable (e.g., mailbox busy or temporarily blocked for policy reasons)
451 Requested action aborted: local error in processing
451 4.4.1 IMAP server unavailable
452 Requested action not taken: insufficient system storage
454 4.7.0 Temporary authentication failure
455 Server unable to accommodate parameters
— 5yz Permanent negative completion
The SMTP client SHOULD NOT repeat the exact request (in the same sequence). Even some "permanent" error conditions can be corrected, so the human user may want to direct the SMTP client to reinitiate the command sequence by direct action at some point in the future.
500 Syntax error, command unrecognized (This may include errors such as command line too long)
500 5.5.6 Authentication Exchange line is too long
501 Syntax error in parameters or arguments
501 5.5.2 Cannot Base64-decode Client responses
501 5.7.0 Client initiated Authentication Exchange (only when the SASL mechanism specified that client does not begin the authentication exchange)
502 Command not implemented
503 Bad sequence of commands
504 Command parameter is not implemented
504 5.5.4 Unrecognized authentication type
521 Server does not accept mail
523 Encryption Needed
530 5.7.0 Authentication required
534 5.7.9 Authentication mechanism is too weak
535 5.7.8 Authentication credentials invalid
538 5.7.11 Encryption required for requested authentication mechanism
550 Requested action not taken: mailbox unavailable (e.g., mailbox not found, no access, or command rejected for policy reasons)
551 User not local; please try <forward-path>
552 Requested mail action aborted: exceeded storage allocation
553 Requested action not taken: mailbox name not allowed
554 Transaction has failed (Or, in the case of a connection-opening response, "No SMTP service here")
554 5.3.4 Message too big for system
556 Domain does not accept mail
Example
Below is an example SMTP connection, where a client "C" is sending to server "S":
S: 220 smtp.example.com ESMTP Postfix
C: HELO relay.example.com
S: 250 smtp.example.com, I am glad to meet you
C: MAIL FROM:<[email protected]>
S: 250 Ok
C: RCPT TO:<[email protected]>
S: 250 Ok
C: RCPT TO:<[email protected]>
S: 250 Ok
C: DATA
S: 354 End data with <CR><LF>.<CR><LF>
C: From: "Bob Example" <[email protected]>
C: To: Alice Example <[email protected]>
C: Cc: [email protected]
C: Date: Tue, 15 Jan 2008 16:02:43 -0500
C: Subject: Test message
C:
C: Hello Alice.
C: This is a test message with 5 header fields and 4 lines in the message body.
C: Your friend,
C: Bob
C: .
S: 250 Ok: queued as 12345
C: QUIT
S: 221 Bye
{The server closes the connection}
And below is an example of an SMTP connection in which the SMTP Server supports the Enhanced Status Code, taken from :
S: 220 dbc.mtview.ca.us SMTP service ready
C: EHLO ymir.claremont.edu
S: 250-dbc.mtview.ca.us says hello
S: 250 ENHANCEDSTATUSCODES
C: MAIL FROM:<[email protected]>
S: 250 2.1.0 Originator <[email protected]> ok
C: RCPT TO:<[email protected]>
S: 250 2.1.5 Recipient <[email protected]> ok
C: RCPT TO:<[email protected]>
S: 550 5.1.1 Mailbox "nosuchuser" does not exist
C: RCPT TO:<[email protected]>
S: 551-5.7.1 Forwarding to remote hosts disabled
S: 551 5.7.1 Select another host to act as your forwarder
C: DATA
S: 354 Send message, ending in CRLF.CRLF.
...
C: .
S: 250 2.6.0 Message accepted
C: QUIT
S: 221 2.0.0 Goodbye
{The server closes the connection}
Notes
References
Internet-related lists
|
12212927
|
https://en.wikipedia.org/wiki/Application%20portfolio%20management
|
Application portfolio management
|
IT Application Portfolio Management (APM) is a practice that has emerged in mid to large-size information technology (IT) organizations since the mid-1990s. Application Portfolio Management attempts to use the lessons of financial portfolio management to justify and measure the financial benefits of each application in comparison to the costs of the application's maintenance and operations.
Evolution of the practice
Likely the earliest mention of the Applications Portfolio was in Cyrus Gibson and Richard Nolan's HBR article "Managing the Four Stages of EDP Growth" in 1974.
Gibson and Nolan posited that businesses' understanding and successful use of IT "grows" in predictable stages and a given business' progress through the stages can be measured by observing the Applications Portfolio, User Awareness, IT Management Practices, and IT Resources within the context of an analysis of overall IT spending.
Nolan, Norton & Co. pioneered the use of these concepts in practice with studies at DuPont, Deere, Union Carbide, IBM and Merrill Lynch among others. In these "Stage Assessments" they measured the degree to which each application supported or "covered" each business function or process, spending on the application, functional qualities, and technical qualities. These measures provided a comprehensive view of the application of IT to the business, the strengths and weaknesses, and a road map to improvement.
APM was widely adopted in the late 1980s and through the 1990s as organizations began to address the threat of application failure when the date changed to the year 2000 (a threat that became known as Year 2000 or Y2K). During this time, tens of thousands of IT organizations around the world developed a comprehensive list of their applications, with information about each application.
In many organizations, the value of developing this list was challenged by business leaders concerned about the cost of addressing the Y2K risk. In some organizations, the notion of managing the portfolio was presented to the business people in charge of the Information Technology budget as a benefit of performing the work, above and beyond managing the risk of application failure.
There are two main categories of application portfolio management solutions, generally referred to as 'Top Down' and 'Bottom Up' approaches. The first need in any organization is to understand what applications exist and their main characteristics (such as flexibility, maintainability, owner, etc.), typically referred to as the 'Inventory'. Another approach to APM is to gain a detailed understanding of the applications in the portfolio by parsing the application source code and its related components into a repository database (i.e. 'Bottom Up'). Application mining tools, now marketed as APM tools, support this approach.
Hundreds of tools are available to support the 'Top Down' approach. This is not surprising, because the majority of the task is to collect the right information; the actual maintenance and storage of the information can be implemented relatively easily. For that reason, many organizations bypass using commercial tools and use Microsoft Excel to store inventory data. However, if the inventory becomes complex, Excel can become cumbersome to maintain. Automatically updating the data is not well supported by an Excel-based solution. Finally, such an Inventory solution is completely separate from the 'Bottom Up' understanding needs.
Business case for APM
According to Forrester Research, "For IT operating budgets, enterprises spend two-thirds or more on ongoing operations and maintenance.".
It is common to find organizations that have multiple systems that perform the same function. Many reasons may exist for this duplication, including the former prominence of departmental computing, the application silos of the 1970s and 1980s, the proliferation of corporate mergers and acquisitions, and abortive attempts to adopt new tools. Regardless of the duplication, each application is separately maintained and periodically upgraded, and the redundancy increases complexity and cost.
With a large majority of expenses going to manage the existing IT applications, the transparency of the current inventory of applications and resource consumption is a primary goal of Application Portfolio Management. This enables firms to: 1) identify and eliminate partially and wholly redundant applications, 2) quantify the condition of applications in terms of stability, quality, and maintainability, 3) quantify the business value/impact of applications and the relative importance of each application to the business, 4) allocate resources according to the applications' condition and importance in the context of business priorities.
Transparency also aids strategic planning efforts and diffuses business / IT conflict, because when business leaders understand how applications support their key business functions, and the impact of outages and poor quality, conversations turn away from blaming IT for excessive costs and toward how to best spend precious resources to support corporate priorities.
Portfolio
Taking ideas from investment portfolio management, APM practitioners gather information about each application in use in a business or organization, including the cost to build and maintain the application, the business value produced, the quality of the application, and the expected lifespan. Using this information, the portfolio manager is able to provide detailed reports on the performance of the IT infrastructure in relation to the cost to own and the business value delivered.
Definition of an application
In application portfolio management, the definition of an application is a critical component. Many service providers help organizations create their own definition, due to the often contentious results that come from these definitions.
Application software — An executable software component or tightly coupled set of executable software components (one or more), deployed together, that deliver some or all of a series of steps needed to create, update, manage, calculate or display information for a specific business purpose. In order to be counted, each component must not be a member of another application.
Software component — An executable set of computer instructions contained in a single deployment container in such a way that it cannot be broken apart further. Examples include a Dynamic Link Library, an ASP web page, and a command line "EXE" application. A zip file may contain zero or more software components because it is easy to break them down further (by unpacking the ZIP archive).
Software application and software component are technical terms used to describe a specific instance of the class of application software for the purposes of IT portfolio management. See application software for a definition for non-practitioners of IT Management or Enterprise Architecture.
The art and practice of software application portfolio management requires a fairly detailed and specific definition of an application in order to create a catalog of applications installed in an organization.
The requirements of a definition for an application
The definition of an application has the following needs in the context of application portfolio management:
It must be simple for business team members to explain, understand, and apply.
It must make sense to development, operations, and project management in the IT groups.
It must be useful as an input to a complex function whose output is the overall cost of the portfolio. In other words, there are many factors that lead to the overall cost of an IT portfolio. The sheer number of applications is one of those factors. Therefore, the definition of an application must be useful in that calculation.
It must be useful for the members of the Enterprise Architecture team who are attempting to judge a project with respect to their objectives for portfolio optimization and simplification.
It must clearly define the boundaries of an application so that a person working on a measurable 'portfolio simplification' activity cannot simply redefine the boundaries of two existing applications in such a way as to call them a single application.
Many organizations will readdress the definition of an application within the context of their IT portfolio management and governance practices. For that reason, this definition should be considered as a working start.
Examples
The definition of an application can be difficult to convey clearly. In an IT organization, there might be subtle differences in the definition among teams and even within one IT team. It helps to illustrate the definition by providing examples. The section below offers some examples of things that are applications, things that are not applications, and things that comprise two or more applications.
Inclusions
By this definition, the following are applications:
A web service endpoint that presents three web services: InvoiceCreate, InvoiceSearch, and InvoiceDetailGet
A service-oriented business application (SOBA) that presents a user interface for creating invoices, and that turns around and calls the InvoiceCreate service. (note that the service itself is a different application).
A mobile application that is published to an enterprise application store and thus deployed to employee-owned or operated portable devices enabling authenticated access to data and services.
A legacy system composed of a rich client, a server-based middle tier, and a database, all of which are tightly coupled. (e.g. changes in one are very likely to trigger changes in another).
A website publishing system that pulls data from a database and publishes it to an HTML format as a sub-site on a public URL.
A database that presents data to a Microsoft Excel workbook that queries the information for layout and calculations. This is interesting in that the database itself is an application unless the database is already included in another application (like a legacy system).
An Excel spreadsheet that contains a coherent set of reusable macros that deliver business value. The spreadsheet itself constitutes a deployment container for the application (like a TAR or CAB file).
A set of ASP or PHP web pages that work in conjunction with one another to deliver the experience and logic of a web application. It is entirely possible that a sub-site would qualify as a separate application under this definition if the coupling is loose.
A web service end point established for machine-to-machine communication (not for human interaction), but which can be rationally understood to represent one or more useful steps in a business process.
Exclusions
The following are not applications:
An HTML website.
A database that contains data but is not part of any series of steps to deliver business value using that data.
A web service that is structurally incapable of being part of a set of steps that provides value. For example, a web service that requires incoming data that breaks shared schema.
A standalone batch script that compares the contents of two databases by making calls to each and then sends e-mail to a monitoring alias if data anomalies are noticed. In this case, the batch script is very likely to be tightly coupled with at least one of the two databases, and therefore should be included in the application boundary that contains the database that it is most tightly coupled with.
Composites
The following are many applications:
A composite SOA application composed of a set of reusable services and a user interface that leverages those services. There are at least two applications here (the user interface and one or more service components). Each service is not counted as an application.
A legacy client-server app that writes to a database to store data and an Excel spreadsheet that uses macros to read data from the database to present a report. There are TWO apps in this example. The database clearly belongs to the legacy app because it was developed with it, delivered with it, and is tightly coupled to it. This is true even if the legacy system uses the same stored procedures as the Excel spreadsheet.
Methods and measures for evaluating applications
There are many popular financial measures, and even more metrics of different (non-financial or complex) types that are used for evaluating applications or information systems.
Return on investment (ROI)
Return on Investment is one of the most popular performance measurement and evaluation metrics used in business analysis. ROI analysis (when applied correctly) is a powerful tool for evaluating existing information systems and making informed decisions on software acquisitions and other projects. However, ROI is a metric designed for a certain purpose – to evaluate profitability or financial efficiency. It cannot reliably substitute for many other financial metrics in providing an overall economic picture of the information solution. The attempts at using ROI as the sole or principal metric for decision making regarding in-formation systems cannot be productive. It may be appropriate in a very limited number of cases/projects. ROI is a financial measure and does not provide information about efficiency or effectiveness of the information systems.
Economic value added (EVA)
A measure of a company's financial performance based on the residual wealth calculated by deducting cost of capital from its operating profit (adjusted for taxes on a cash basis). (Also referred to as "economic profit".)
Formula = Net Operating Profit After Taxes (NOPAT) - (Capital * Cost of Capital)
Total cost of ownership (TCO)
Total Cost of Ownership is a way to calculate what the application will cost over a defined period of time. In a TCO model, costs for hardware, software, and labor are captured and organized into the various application life cycle stages. An in depth TCO model helps management understand the true cost of the application as it attempts to measure build, run/support, and indirect costs. Many large consulting firms have defined strategies for building a complete TCO model.
Total economic impact (TEI)
TEI was developed by Forrester Research Inc. Forrester claims TEI systematically looks at the potential effects of technology investments across four dimensions: cost — impact on IT; benefits — impact on business; flexibility — future options created by the investment; risk — uncertainty.
Business value of IT (ITBV)
ITBV program was developed by Intel Corporation in 2002.
The program uses a set of financial measurements of business value that are called Business Value Dials (Indicators). It is a multidimensional program, including a business component, and is relatively easy to implement.
Applied information economics (AIE)
AIE is a decision analysis method developed by Hubbard Decision Research. AIE claims to be "the first truly scientific and theoretically sound method" that builds on several methods from decision theory and risk analysis including the use of Monte Carlo methods. AIE is not used often because of its complexity.
References
Information technology management
|
28359573
|
https://en.wikipedia.org/wiki/2008%20LC18
|
2008 LC18
|
is a Neptune trojan first observed on 7 June 2008 by American astronomers Scott Sheppard and Chad Trujillo using the Subaru telescope at Mauna Kea Observatories on Hawaii, United States. It was the first object found in Neptune's trailing Lagrangian point and measures approximately 100 kilometers in diameter.
Orbit and classification
Neptune trojans are resonant trans-Neptunian objects in a 1:1 mean-motion orbital resonance with Neptune. These trojans have a semi-major axis and an orbital period very similar to Neptune's (30.10 AU; 164.8 years).
belongs to the trailing group, which follow 60° behind Neptune's orbit. It orbits the Sun with a semi-major axis of 30.056 AU at a distance of 27.7–32.4 AU once every 164 years and 9 months (60,186 days). Its orbit has an eccentricity of 0.08 and an inclination of 27.4° with respect to the ecliptic. This object has the second highest inclination of any known Neptune trojan after , which has 29.3°.
Search for Neptune trojans
The search for trojans of Neptune has been impeded by the fact that this region of space is currently along the line of sight to the center of the Milky Way, an area of the sky crowded with stars. was found in a location where background stars are obscured by a dust cloud. The discovery of one Neptune trojan in a searched area of 19 square degrees suggests that there may be 150 Neptune trojans with a diameter greater than ~80 km (24th magnitude), similar to the estimate of such objects in Neptune's swarm.
New Horizons probe
was not close enough for investigation by the New Horizons spacecraft when it crossed Neptune's region en route to Pluto in 2013–2014, but its discovery showed that other, more accessible Neptune trojans could potentially have been found before that time. was 2 AU from Pluto in 1997. crossed the ecliptic plane in 2011. , it is 33 AU from Neptune.
Physical characteristics
The discoverers estimate that the body has a mean-diameter of 100 kilometers based on a magnitude of 23.2. Based on a generic magnitude-to-diameter conversion, it measures approximately 98 kilometers in diameter using an absolute magnitude of 8.2 with an assumed albedo of 0.10.
Numbering and naming
Due to its orbital uncertainty, this minor planet has not been numbered and its official discoverers have not been determined. If named, it will follow the naming scheme already established with 385571 Otrera, which is to name these objects after figures related to the Amazons, an all-female warrior tribe that fought in the Trojan War on the side of the Trojans against the Greek.
References
External links
AstDys-2 about
Neptune trojans
Minor planet object articles (unnumbered)
20080607
|
2167345
|
https://en.wikipedia.org/wiki/Fred%20Cohen
|
Fred Cohen
|
Frederick B. Cohen (born 1956) is an American computer scientist and best known as the inventor of computer virus defense techniques. He gave the definition of "computer virus". Cohen is best known for his pioneering work on computer viruses, the invention of high integrity operating system mechanisms now in widespread use, and automation of protection management functions.
In 1983, while a student at the University of Southern California's School of Engineering (currently the Viterbi School of Engineering), he wrote a program for a parasitic application that seized control of computer operations, one of the first computer viruses, in Leonard Adleman’s class. He wrote a short program, as an experiment, that could "infect" computers, make copies of itself, and spread from one machine to another. It was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk.
One of the few solid theoretical results in the study of computer viruses is Cohen's 1987 demonstration that there is no algorithm that can perfectly detect all possible viruses.
Cohen also believed there are positive viruses and he had created one called the compression virus which spreading would infect all executable files on a computer, not to destroy, but to make them smaller.
During the past 10 years of his research work, Fred Cohen wrote over 60 professional publications and 11 books.
For the past 35 years, Fred Cohen has been building companies and supporting risk management and strategic decision making for enterprises of all sizes and sorts. He is globally recognized as an innovative expert in management, particularly related to information technology and risk. He supports strategic enterprise-wide decision-making ranging from restructuring to litigation support. His team approach involves an in-depth study of key issues and the development of unique strategies and solutions. Results are often leveraged behind the scenes to support research and advisory firms like Gartner and Burton, government initiatives like standards development and capacity building, University education and training programs on five continents, and global cooperative research and development programs. He also leads and participates in government and privately sponsored academic research, teaches, and supports graduate courses and advanced professional seminars, and is a Federal-court qualified expert witness, and digital forensic evidence examiner.
He also is deeply involved with the advancement of start-ups via his participation in Angel to Exit, an organization that provides free and for-equity services to early-stage startups wishing to move toward angel funding.
Papers
1991, Trends In Computer Virus Research
1991, A Case for Benevolent Viruses
1991, The Computer Security Encyclopedia - Computer Viruses
1992, A Formal Definition of Computer Worms and Some Related Results
1989, Models of Practical Defenses Against Computer Viruses
1988, On the Implications of Computer Viruses and Methods of Defense
1984, Computer Viruses - Theory and Experiments
1989, Models of Practical Defenses Against Computer Viruses
References
Cohen, F., 1987. "Computer Viruses Theory and Experiments," Computers and Security, vol. 6, pp. 22--35.
American computer scientists
USC Viterbi School of Engineering alumni
Living people
1956 births
Computer security academics
|
4135205
|
https://en.wikipedia.org/wiki/Software%20system%20safety
|
Software system safety
|
In software engineering, software system safety optimizes system safety in the design, development, use, and maintenance of software systems and their integration with safety-critical hardware systems in an operational environment.
Overview
Software system safety is a subset of system safety and system engineering and is synonymous with the software engineering aspects of Functional Safety. As part of the total safety and software development program, software cannot be allowed to function independently of the total effort. Both simple and highly integrated multiple systems are experiencing an extraordinary growth in the use of computers and software to monitor and/or control safety-critical subsystems or functions. A software specification error, design flaw, or the lack of generic safety-critical requirements can contribute to or cause a system failure or erroneous human decision. To achieve an acceptable level of safety for software used in critical applications, software system safety engineering must be given primary emphasis early in the requirements definition and system conceptual design process. Safety-critical software must then receive continuous management emphasis and engineering analysis throughout the development and operational lifecycles of the system. Software with safety-critical functionality must be thoroughly verified with
objective analysis.
Functional Hazard Analyses (FHA) are often conducted early on - in parallel with or as part of system engineering Functional Analyses - to determine the safety-critical functions (SCF) of the systems for further analyses and verification. Software system safety is directly related to the more critical design aspects and safety attributes in software and system functionality, whereas software quality attributes are inherently different and require standard scrutiny and development rigor. Development Assurance levels (DAL) and associated Level of Rigor (LOR) is a graded approach to software quality and software design assurance as a pre-requisite that a suitable software process is followed for confidence. LOR concepts and standards such as DO-178C are NOT a substitute for software safety. Software safety per IEEE STD-1228 and MIL-STD-882E focuses on ensuring explicit safety requirements are met and verified using functional approaches from a safety requirements analysis and test perspective. Software safety hazard analysis required for more complex systems where software is controlling critical functions generally are in the following sequential categories and are conducted in phases as part of the system safety or safety engineering process: software safety requirements analysis; software safety design analyses (top level, detailed design and code level); software safety test analysis, and software safety change analysis. Once these "functional" software safety analyses are completed the software engineering team will know where to place safety emphasis and what functional threads, functional paths, domains and boundaries to focus on when designing in software safety attributes to ensure correct functionality and to detect malfunctions, failures, faults and to implement a host of mitigation strategies to control hazards. Software security and various software protection technologies are similar to software safety attributes in the design to mitigate various types of threats vulnerability and risks. Deterministic software is sought in the design by verifying correct and predictable behavior at the system level.
Goals
Functional safety is achieved through engineering development to ensure correct execution and behavior of software functions as intended
Safety consistent with mission requirements, is designed into the software in a timely, cost effective manner.
On complex systems involving many interactions safety-critical functionality should be identified and thoroughly analyzed before deriving hazards and design safeguards for mitigations.
Safety-critical functions lists and preliminary hazards lists should be determined proactively and influence the requirements that will be implemented in software.
Contributing factors and root causes of faults and resultant hazards associated with the system and its software are identified, evaluated and eliminated or the risk reduced to an acceptable level, throughout the lifecycle.
Reliance on administrative procedures for hazard control is minimized.
The number and complexity of safety critical interfaces is minimized.
The number and complexity of safety critical computer software components is minimized.
Sound human engineering principles are applied to the design of the software-user interface to minimize the probability of human error.
Failure modes, including hardware, software, human and system are addressed in the design of the software.
Sound software engineering practices and documentation are used in the development of the software.
Safety issues and safety attributes are addressed as part of the software testing effort at all levels.
Software is designed for human machine interface, ease of maintenance and modification or enhancement
Software with safety-critical functionality must be thoroughly verified with objective analysis and preferably test evidence that all safety requirements have been met per established criteria.
See also
Software assurance
IEC 61508 - Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems
ISO 26262 - Road vehicles – Functional safety
Functional Safety
Software quality
System accident
References
Software quality
|
2442438
|
https://en.wikipedia.org/wiki/Bob%20Sproull
|
Bob Sproull
|
Robert Fletcher "Bob" Sproull (born c. 1945) is an American computer scientist, who worked for Oracle Corporation where he was director of Oracle Labs in Burlington, Massachusetts. He is currently an adjunct professor at the College of Information and Computer Sciences, at the University of Massachusetts Amherst.
Biography
While working towards his B.A. in physics at Harvard College in 1967, Sproull met Ivan Sutherland. Together, they worked on head-mounted displays, which led the way for 3-dimensional virtual reality.
Sproull received his master's degree in Computer Science from Stanford University in 1970, and Doctorate in Computer Science from Stanford in 1977.
Sproull worked as a researcher for Xerox Palo Alto Research Center from December 1973 to August 1977.
While at Xerox PARC, he worked on the design of the Alto personal computer,
the first laser printers, page description languages and the initial PC-type operating systems.
In 1973, Sproull and William M. Newman wrote Principles of Interactive Computer Graphics; a second edition was published in 1979. This was the first comprehensive textbook on computer graphics, and was regarded as the graphics "bible," until it was succeeded by Foley and van Dam's Computer Graphics: Principles and Practice.
Sproull was an Associate Professor of Computer Science at Carnegie Mellon University.
In 1980, Bob Sproull and Ivan Sutherland founded a consulting firm, Sutherland, Sproull and Associates.
In 1990, Sun Microsystems bought out Sutherland, Sproull and Associates for its patents and key people. This led to the creation of Sun Microsystems Laboratories, where Sproull worked on asynchronous processor design. In 2006 he became director of the laboratories. In 2010 after Sun was purchased by Oracle Corporation, it became Oracle Labs.
Sproull is also a member of the National Academy of Engineering, a Fellow of the American Academy of Arts and Sciences, and has served on the US Air Force Scientific Advisory Board. He currently chairs the United States National Research Council's Computer Science and Telecommunications Board (CSTB). He has co-authored several books in addition to Principles of Interactive Computer Graphics, such as Logical Effort, and holds 7 patents.
Publications
Newman, W., Sproull, R. (1979), Principles of Interactive Computer Graphics, Mcgraw-Hill College, .
Molnar, C., Sproull, R., Sutherland, I. (1994), Counterflow Pipeline Processor Architecture, Sun Microsystems, Technical Report TR-94-25.
References
External links
Origins of Spline-Based and Anti-Aliased Fonts
1940s births
Living people
Harvard College alumni
Stanford University alumni
Carnegie Mellon University faculty
Sun Microsystems people
Scientists at PARC (company)
Computer graphics professionals
Computer graphics researchers
Virtual reality pioneers
Members of the United States National Academy of Engineering
Computer science writers
Fellows of the American Academy of Arts and Sciences
|
5087506
|
https://en.wikipedia.org/wiki/Sybase%20Open%20Watcom%20Public%20License
|
Sybase Open Watcom Public License
|
The Sybase Open Watcom Public Licence is a software license that has been approved by the Open Source Initiative. It is the licence under which the Open Watcom C/C++ compiler is released.
The license has not been accepted as "free" under the Debian Free Software Guidelines, due to the license's termination clauses.
The Free Software Foundation has stated that the license is not "free" as it requires the source to be published when you "deploy" the software for private use only. In contrast, FSF's GPL does not require that modified source code has to be made public when the software modification was only used privately without a public release of the software. This makes the Watcom license also GPL incompatible and a stronger copyleft license than the GPL and even the AGPL.
The Fedora project also considers the license as non-free, citing the FSF argumentation.
History
Version 1.0 appears to have been written in 2002. It's publicly released no later than January 8, 2003, the date of the initial release of Open Watcom C/C++.
The draft of version 2.0 of the Licence was published on 20 January 2004. This version incorporated changes from Apple and made the licence less specific to OpenWatcom.
References
Further reading
Free and open-source software licenses
Copyleft software licenses
2004 in law
|
376786
|
https://en.wikipedia.org/wiki/Architecture%20Neutral%20Distribution%20Format
|
Architecture Neutral Distribution Format
|
The Architecture Neutral Distribution Format (ANDF) in computing is a technology allowing common "shrink wrapped" binary application programs to be distributed for use on conformant Unix systems, translated to run on different underlying hardware platforms. ANDF was defined by the Open Software Foundation and was expected to be a "truly revolutionary technology that will significantly advance the cause of portability and open systems", but it was never widely adopted.
As with other OSF offerings, ANDF was specified through an open selection process. OSF issued a Request for Technology for architecture-neutral software distribution technologies in April, 1989. Fifteen proposals were received, based on a variety of technical approaches, including obscured source code, compiler intermediate languages, and annotated executable code.
The technology of ANDF, chosen after an evaluation of competing approaches and implementations, was Ten15 Distribution Format, later renamed TenDRA Distribution Format, developed by the UK Defence Research Agency.
Adoption
ANDF was intended to benefit both software developers and users. Software developers could release a single binary for all platforms, and software users would have freedom to procure multiple vendors' hardware competitively. Programming language designers and implementors were also interested because standard installers would mean that only a single language front end would need to be developed.
OSF released several development 'snapshots' of ANDF, but it was never released commercially by OSF or any of its members. Various reasons have been proposed for this: for example, that having multiple installation systems would complicate software support.
After OSF stopped working on ANDF, development continued at other organizations.
See also
UNCOL
Java bytecode
Common Language Runtime
LLVM
Compilation
Software portability
WebAssembly
References
Bibliography
Stavros Macrakis, "The Structure of ANDF: Principles and Examples", Open Software Foundation, RI-ANDF-RP1-1, January, 1992.
Stavros Macrakis, "Protecting Source Code with ANDF", Open Software Foundation, November, 1992.
Open Systems Foundation. "OSF Architecture-Neutral Distribution Format Rationale", June 1991.
Open Systems Foundation. "A Brief Introduction to ANDF", January 1993. Available at Google Groups
Abstract machines
Cross-compilers
Executable file formats
Computer-related introductions in 1991
|
8506375
|
https://en.wikipedia.org/wiki/Non-standard%20RAID%20levels
|
Non-standard RAID levels
|
Although all RAID implementations differ from the specification to some extent, some companies and open-source projects have developed non-standard RAID implementations that differ substantially from the standard. Additionally, there are non-RAID drive architectures, providing configurations of multiple hard drives not referred to by RAID acronyms.
Double parity
Now part of RAID 6, double parity (sometimes known as row diagonal parity) features two sets of parity checks, like traditional RAID 6. Differently, the second set is not another set of points in the over-defined polynomial which characterizes the data. Rather, double parity calculates the extra parity against a different group of blocks. For example, in our graph both RAID 5 and 6 consider all A-labeled blocks to produce one or more parity blocks. However, it is fairly easy to calculate parity against multiple groups of blocks, one can calculate all A blocks and a permuted group of blocks.
RAID-DP
RAID-DP is proprietary NetApp RAID implementation available only in ONTAP systems. RAID DP implements RAID 4, except with an additional disk that is used for a second parity, so it has the same failure characteristics of a RAID 6. The performance penalty of RAID-DP is typically under 2% when compared to a similar RAID 4 configuration.
RAID 5E, RAID 5EE, and RAID 6E
RAID 5E, RAID 5EE, and RAID 6E (with the added E standing for Enhanced) generally refer to variants of RAID 5 or 6 with an integrated hot-spare drive, where the spare drive is an active part of the block rotation scheme. This spreads I/O across all drives, including the spare, thus reducing the load on each drive, increasing performance. It does, however, prevent sharing the spare drive among multiple arrays, which is occasionally desirable.
Intel Matrix RAID
Intel Matrix RAID (a feature of Intel Rapid Storage Technology) is a feature (not a RAID level) present in the ICH6R and subsequent Southbridge chipsets from Intel, accessible and configurable via the RAID BIOS setup utility. Matrix RAID supports as few as two physical disks or as many as the controller supports. The distinguishing feature of Matrix RAID is that it allows any assortment of RAID 0, 1, 5, or 10 volumes in the array, to which a controllable (and identical) portion of each disk is allocated.
As such, a Matrix RAID array can improve both performance and data integrity. A practical instance of this would use a small RAID 0 (stripe) volume for the operating system, program, and paging files; second larger RAID 1 (mirror) volume would store critical data. Linux MD RAID is also capable of this.
Linux MD RAID 10
The software RAID subsystem provided by the Linux kernel, called , supports the creation of both classic (nested) RAID 1+0 arrays, and non-standard RAID arrays that use a single-level RAID layout with some additional features.
The standard "near" layout, in which each chunk is repeated times in a -way stripe array, is equivalent to the standard RAID 10 arrangement, but it does not require that evenly divides . For example, an 2 layout on two, three, and four drives would look like:
2 drives 3 drives 4 drives
-------- ---------- --------------
A1 A1 A1 A1 A2 A1 A1 A2 A2
A2 A2 A2 A3 A3 A3 A3 A4 A4
A3 A3 A4 A4 A5 A5 A5 A6 A6
A4 A4 A5 A6 A6 A7 A7 A8 A8
.. .. .. .. .. .. .. .. ..
The four-drive example is identical to a standard RAID 1+0 array, while the three-drive example is a software implementation of RAID 1E. The two-drive example is equivalent to RAID 1.
The driver also supports a "far" layout, in which all the drives are divided into sections. All the chunks are repeated in each section but are switched in groups (for example, in pairs). For example, 2 layouts on two-, three-, and four-drive arrays would look like this:
2 drives 3 drives 4 drives
-------- ------------ ------------------
A1 A2 A1 A2 A3 A1 A2 A3 A4
A3 A4 A4 A5 A6 A5 A6 A7 A8
A5 A6 A7 A8 A9 A9 A10 A11 A12
.. .. .. .. .. .. .. .. ..
A2 A1 A3 A1 A2 A2 A1 A4 A3
A4 A3 A6 A4 A5 A6 A5 A8 A7
A6 A5 A9 A7 A8 A10 A9 A12 A11
.. .. .. .. .. .. .. .. ..
"Far" layout is designed for offering striping performance on a mirrored array; sequential reads can be striped, as in RAID 0 configurations. Random reads are somewhat faster, while sequential and random writes offer about equal speed to other mirrored RAID configurations. "Far" layout performs well for systems in which reads are more frequent than writes, which is a common case. For a comparison, regular RAID 1 as provided by Linux software RAID, does not stripe reads, but can perform reads in parallel.
The md driver also supports an "offset" layout, in which each stripe is repeated times and offset by (far) devices. For example, 2 layouts on two-, three-, and four-drive arrays are laid out as:
2 drives 3 drives 4 drives
-------- ---------- ---------------
A1 A2 A1 A2 A3 A1 A2 A3 A4
A2 A1 A3 A1 A2 A4 A1 A2 A3
A3 A4 A4 A5 A6 A5 A6 A7 A8
A4 A3 A6 A4 A5 A8 A5 A6 A7
A5 A6 A7 A8 A9 A9 A10 A11 A12
A6 A5 A9 A7 A8 A12 A9 A10 A11
.. .. .. .. .. .. .. .. ..
It is also possible to combine "near" and "offset" layouts (but not "far" and "offset").
In the examples above, is the number of drives, while , , and are given as parameters to 's option. Linux software RAID (Linux kernel's driver) also supports creation of standard RAID 0, 1, 4, 5, and 6 configurations.
RAID 1E
Some RAID 1 implementations treat arrays with more than two disks differently, creating a non-standard RAID level known as RAID 1E. In this layout, data striping is combined with mirroring, by mirroring each written stripe to one of the remaining disks in the array. Usable capacity of a RAID 1E array is 50% of the total capacity of all drives forming the array; if drives of different sizes are used, only the portions equal to the size of smallest member are utilized on each drive.
One of the benefits of RAID 1E over usual RAID 1 mirrored pairs is that the performance of random read operations remains above the performance of a single drive even in a degraded array.
RAID-Z
The ZFS filesystem provides RAID-Z, a data/parity distribution scheme similar to RAID 5, but using dynamic stripe width: every block is its own RAID stripe, regardless of blocksize, resulting in every RAID-Z write being a full-stripe write. This, when combined with the copy-on-write transactional semantics of ZFS, eliminates the write hole error. RAID-Z is also faster than traditional RAID 5 because it does not need to perform the usual read-modify-write sequence. RAID-Z does not require any special hardware, such as NVRAM for reliability, or write buffering for performance.
Given the dynamic nature of RAID-Z's stripe width, RAID-Z reconstruction must traverse the filesystem metadata to determine the actual RAID-Z geometry. This would be impossible if the filesystem and the RAID array were separate products, whereas it becomes feasible when there is an integrated view of the logical and physical structure of the data. Going through the metadata means that ZFS can validate every block against its 256-bit checksum as it goes, whereas traditional RAID products usually cannot do this.
In addition to handling whole-disk failures, RAID-Z can also detect and correct silent data corruption, offering "self-healing data": when reading a RAID-Z block, ZFS compares it against its checksum, and if the data disks did not return the right answer, ZFS reads the parity and then figures out which disk returned bad data. Then, it repairs the damaged data and returns good data to the requestor.
There are five different RAID-Z modes: RAID-Z0 (similar to RAID 0, offers no redundancy), RAID-Z1 (similar to RAID 5, allows one disk to fail), RAID-Z2 (similar to RAID 6, allows two disks to fail), RAID-Z3 (a RAID 7 configuration, allows three disks to fail), and mirror (similar to RAID 1, allows all but one of the disks to fail).
Drive Extender
Windows Home Server Drive Extender is a specialized case of JBOD RAID 1 implemented at the file system level.
Microsoft announced in 2011 that Drive Extender would no longer be included as part of Windows Home Server Version 2, Windows Home Server 2011 (codename VAIL). As a result, there has been a third-party vendor move to fill the void left by DE. Included competitors are Division M, the developers of Drive Bender, and StableBit's DrivePool.
BeyondRAID
BeyondRAID is not a true RAID extension, but consolidates up to 12 SATA hard drives into one pool of storage. It has the advantage of supporting multiple disk sizes at once, much like JBOD, while providing redundancy for all disks and allowing a hot-swap upgrade at any time. Internally it uses a mix of techniques similar to RAID 1 and 5. Depending on the fraction of data in relation to capacity, it can survive up to three drive failures, if the "array" can be restored onto the remaining good disks before another drive fails. The amount of usable storage can be approximated by summing the capacities of the disks and subtracting the capacity of the largest disk. For example, if a 500, 400, 200, and 100 GB drive were installed, the approximate usable capacity would be 500 + 400 + 200 + 100 − 500 = 700 GB of usable space. Internally the data would be distributed in two RAID 5–like arrays and two RAID 1-like sets:
Drives
| 100 GB | | 200 GB | | 400 GB | | 500 GB |
----------
| x | unusable space (100 GB)
----------
---------- ----------
| A1 | | A1 | RAID 1 set (2× 100 GB)
---------- ----------
---------- ----------
| B1 | | B1 | RAID 1 set (2× 100 GB)
---------- ----------
---------- ---------- ----------
| C1 | | C2 | | Cp | RAID 5 array (3× 100 GB)
---------- ---------- ----------
---------- ---------- ---------- ----------
| D1 | | D2 | | D3 | | Dp | RAID 5 array (4× 100 GB)
---------- ---------- ---------- ----------
BeyondRaid offers a RAID 6–like feature and can perform hash-based compression using 160-bit SHA-1 hashes to maximize storage efficiency.
Unraid
Unraid is a proprietary Linux-based operating system optimized for media file storage.
Disadvantages include closed-source code, high price, slower write performance than a single disk and bottlenecks when multiple drives are written concurrently. However, Unraid allows support of a cache pool which can dramatically speed up the write performance. Cache pool data can be temporarily protected using Btrfs RAID 1 until Unraid moves it to the array based on a schedule set within the software.
Advantages include lower power consumption than standard RAID levels, the ability to use multiple hard drives with differing sizes to their full capacity and in the event of multiple concurrent hard drive failures (exceeding the redundancy), only losing the data stored on the failed hard drives compared to standard RAID levels which offer striping in which case all of the data on the array is lost when more hard drives fail than the redundancy can handle.
CRYPTO softraid
In OpenBSD, CRYPTO is an encrypting discipline for the softraid subsystem. It encrypts data on a single chunk to
provide for data confidentiality. CRYPTO does not provide redundancy.
DUP profile
Some filesystems, such as Btrfs, and ZFS/OpenZFS (with per-dataset copies=1|2|3 property), support creating multiple copies of the same data on a single drive or disks pool, protecting from individual bad sectors, but not from large numbers of bad sectors or complete drive failure. This allows some of the benefits of RAID on computers that can only accept a single drive, such as laptops.
Declustered RAID
Declustered RAID allows for arbitrarily sized disk arrays while reducing the overhead to clients when recovering from disk failures. It uniformly spreads or declusters user data, redundancy information, and spare space across all the disks of a declustered array. Under traditional RAID, an entire disk storage system of, say, 100 disks would be split into multiple arrays each of, say, 10 disks. By contrast, under declustered RAID, the entire storage system is used to make one array. Every data item is written twice, as in mirroring, but logically adjacent data and copies are spread arbitrarily. When a disk fails, erased data is rebuilt using all the operational disks in the array, the bandwidth of which is greater than that of the fewer disks of a conventional RAID group. Furthermore, if an additional disk fault occurs during a rebuild, the number of impacted tracks requiring repair is markedly less than the previous failure and less than the constant rebuild overhead of a conventional array. The decrease in declustered rebuild impact and client overhead can be a factor of three to four times less than a conventional RAID. File system performance becomes less dependent upon the speed of any single rebuilding storage array.
See also
Nested RAID levels
Standard RAID levels
Explanatory notes
References
How To Build A Server Using Enterprise Parts
RAID
|
17633498
|
https://en.wikipedia.org/wiki/Software%20quality%20assurance%20analyst
|
Software quality assurance analyst
|
A software quality assurance (QA) analyst, also referred to as a software quality analyst or simply a quality assurance (QA) analyst, is an individual who is responsible for applying the principles and practices of software quality assurance throughout the software development life cycle.
Software testing is one of many parts of the larger process of QA. Testing is used to detect errors in a product, while QA also fixes the processes that resulted in those errors.
Software QA analysts may have professional certification from a software testing certification board, like the International Software Testing Qualifications Board (ISTQB).
References
Software quality
Computer occupations
Systems analysis
|
12323242
|
https://en.wikipedia.org/wiki/CS4FN
|
CS4FN
|
CS4FN (Computer Science for Fun) is a UK-based magazine on computer science aimed at school students, posted free to subscribing schools in the UK. It is produced by Paul Curzon, Peter McOwan and staff from the School of Electronic Engineering and Computer Science (EECS), Queen Mary University of London, England, with initial support from the EPSRC. The magazine is also supported by the British Computer Society, Microsoft, ARM and Intel as well as EECS. It is printed twice a year and has an associated website with additional articles.
ISSN information
(print edition)
(electronic edition)
External links
CS4FN website
Computer science education in the United Kingdom
Engineering and Physical Sciences Research Council
Magazines established in 2005
Computer magazines published in the United Kingdom
Queen Mary University of London
Bi-monthly magazines published in the United Kingdom
Magazines published in London
|
43516734
|
https://en.wikipedia.org/wiki/Radhika%20Nagpal
|
Radhika Nagpal
|
Radhika Nagpal is an American computer scientist and researcher in the fields of self-organising computer systems, biologically-inspired robotics, and biological multi-agent systems. She is the Fred Kavli Professor of Computer Science at Harvard University and the Harvard School of Engineering and Applied Sciences. She is also a Core Faculty Member of the Harvard Wyss Institute for Biologically Inspired Engineering. In 2017, Nagpal co-founded a robotics company under the name of Root Robotics. This educational company works to create many different opportunities for those unable to code to learn how.
Education and academic career
Nagpal received an S.B. and S.M. in Electrical Engineering and Computer Science from the Massachusetts Institute of Technology in 1994, and a Ph.D. in Electrical Engineering and Computer Science from MIT in 2001. Her dissertation, "Programmable Self-Assembly using Biologically-Inspired Local Interactions and Origami Mathematics", was supervised by Gerald Sussman and Harold Abelson. In it, she presented a language for instructing a sheet of identically-programmed agents to self-assemble into a desired shape making use only of local interactions, and in a manner robust to irregularities, communication failure, and agent malfunction.
From 2001 to 2003, she served as a Postdoctoral Lecturer at the MIT Computer Science and Artificial Intelligence Laboratory, as a member of the Amorphous Computing Group. From 2004 to 2009, she served as an Assistant Professor of Computer Science at the Harvard School of Engineering and Applied Sciences; from 2009 to 2012, she served as the Thomas D. Cabot Associate Professor of Computer Science at Harvard SEAS. Since 2012, she has served as the Fred Kavli Professor of Computer Science at Harvard SEAS, where she heads the Self-Organizing Systems Research Group.
Academic research
Her research group focuses on biologically-inspired multi-agent systems: collective algorithms, programming paradigms, modular and swarm robotics, and on biological multi-agent systems: models of multicellular morphogenesis, collective insect behavior. This work lies at the intersection of computer science (AI/robotics) and biology. It studies bio-inspired algorithms, programming paradigms, and hardware designs for swarm/modular robotic systems and smart materials, drawing inspiration mainly from social insects and multicellular biology. It also investigates models of self-organization in biology, specifically how cells cooperate during the development of multicellular organisms.
Programming paradigms for robust collective behavior
Her primary research interest is developing programming paradigms for robust collective behavior, inspired by biology. Ultimately, the goal is to create a framework for the design and analysis of self-organising multi-agent systems. Her group's approach is to formalize these strategies as algorithms, analysis, theoretical models, and programming languages. They are especially interested in global-to-local compilation, the ability to specify user goals at the high level and automatically derive provable strategies at the agent level.
Understanding robust collective behavior in biological systems
Another of her research interests is in understanding robust collective behavior in biological systems. Building artificial systems can give us insights into how complex global properties can arise from identically-programmed parts --- for example, how cells can form scale-independent patterns, how large morphological variations can arise from small genetic changes, and how complex cascades of decisions can tolerate variations in timing. She is interested in mathematical and computational models of multi-cellular behavior, that capture hypotheses of cell behavior and cell-cell interactions as multi-agent systems, and can be used to provide insights into systems level behavior that should emerge. Her group works in close collaboration with biologists, and currently studies growth and pattern formation in the fruit fly wing.
Academic positions
Nagpal has held the following positions as a researcher and an academic:
Bell Laboratories, Murray Hill, NJ from 1994-1995 as a technical staff member
MIT Computer Science and Artificial Intelligence Laboratory, Amorphous Computing Group from 2001-2003 as a postdoctoral lecturer
Harvard Medical School from 2003-2004 as a research fellow
Harvard School of Engineering and Applied Sciences from 2004-2009 as an assistant professor of Computer Science
Harvard Medical School, Department of Systems Biology since 2004 as an affiliated faculty member
Harvard Wyss Institute for Biological-inspired Engineering since 2008 as a Core Faculty Member
Harvard School of Engineering and Applied Sciences from 2009 to 2012 as an associate professor of computer science
Harvard School of Engineering and Applied Sciences since 2012 as the Fred Kavli Professor of Computer Science
Awards and honors
National Talent Search Scholarship Award, India (1987)
AT&T Bell Labs GRPW Fellowship (1995-2001)
Microsoft New Faculty Fellowship (2005)
NSF Career Award (2007)
Anita Borg Early Career Award (2010)
Radcliffe Fellowship (2012)
named one of "Nature's 10" people who mattered" of 2014.
McDonald Mentoring Award (2015)
During her time as Radcliffe Fellow, she worked with experimental biologists to develop a better understanding of collective intelligence in social insects through the application of computer science.
References
Living people
Year of birth missing (living people)
American women computer scientists
American computer scientists
Harvard University faculty
Place of birth missing (living people)
Women systems scientists
MIT School of Engineering alumni
American roboticists
Women roboticists
Artificial intelligence researchers
Fellows of the Association for the Advancement of Artificial Intelligence
American women academics
21st-century American women
|
4034981
|
https://en.wikipedia.org/wiki/Wonderware
|
Wonderware
|
Wonderware was a brand of industrial software now owned by Aveva and rebranded under the AVEVA name. Wonderware was part of Invensys plc, and Invensys plc was acquired in January 2014 by Schneider Electric. Invensys plc. was formed in 1999 by the merger of BTR plc and Siebe plc, and Wonderware was acquired by Siebe plc in 1998.
The Wonderware software now under the AVEVA name is used in various industries, including: Automotive Assembly, Facilities Management, Food and Beverage, CPG, Mining and Metals, Power, Oil and Gas, Chemicals, Energy, Water and Wastewater.
Distribution
Over the decades Wonderware built up a network of distributing partners including a group of individually owned partners doing business under the Wonderware name. This network, including those Wonderware named partners, now sell and support AVEVA products. The Wonderware brand and name now only exists as a distribution name for AVEVA.
History
Wonderware was co-founded by Dennis Morin and Phil Huber. Both were former employees of another local startup located in Irvine, California.
Wonderware was sold to British-based SIEBE in 1998 for nearly 400 million dollars. By that time, all the founding members had left the company. Co-Founder Phil Huber remains active in startups. Morin died on the last day of 2012. Wonderware became part of Paris-based Schneider-Electric in 2014.
Wonderware was formed as a partnership in 1987 and incorporated in California in 1988 as Wonderware Software Development Corporation. The company reincorporated in Delaware in 1993. At the time, there were other software companies making programs to automate production processes, but Wonderware was the first to introduce a program designed to be used with the Microsoft Windows operating system.
Mergers and acquisitions
The original Wonderware Corporation was acquired by Siebe plc in 1998. In 1999, Siebe plc merged with BTR plc to form Invensys plc; in January 2014, Schneider Electric acquired Invensys plc; then in March 2018, AVEVA merged with Schneider Electric Software.
References
MES software
|
4810074
|
https://en.wikipedia.org/wiki/Late%20Bronze%20Age%20Troy
|
Late Bronze Age Troy
|
Troy in the Late Bronze Age was a thriving coastal city consisting of a steep fortified citadel and a sprawling lower town below it. It had a considerable population and extensive foreign contacts, including with Mycenaean Greece. Geographic and linguistic evidence suggests that it corresponds to the city of Wilusa known from Hittite texts. Its archaeological sublayers Troy VIh and Troy VIIa are among the candidates for a potential historical setting for the myths of the Trojan War, since aspects of their architecture are consistent with the Iliad description of mythic Troy and they show potential signs of violent destruction.
Periodization
Late Bronze Age Troy includes parts of the archaeological layers known as Troy VI and Troy VII. Troy VI was built around 1750 BC. Its final sublayer, Troy VIh, was destroyed around 1300 BC. The early sublayers of Troy VII were contemporary with the late period of Mycenaean culture and the Hittite Empire. The later layers were contemporary with the Greek Dark Ages and the Neo-Hittite states.
Troy VI: 1750 BC – 1300 BC
Troy VIIa: ca. 13th century BC
Troy VIIb1: 12th century BC
Troy VIIb2: 11th century BC
Troy VIIb3: until c. 950 BC
Troy VI and VII were given separate labels by early excavators, but scholarly consensus holds that the first several sublayers of Troy VII were in fact continuations of the earlier city. As a result, some researchers have suggested relabeling Troy VIIa as Troy VIi and Troy VIIb1 as Troy VIj, with Troy VII beginning at the sublayer standardly known as VIIb2. Although the substance of this proposal is widely accepted, the original nomenclature is still generally used to avoid confusion.
Troy VI
Troy VI existed from around 1750 BC to 1300 BC. Its citadel was divided into a series of rising terraces, of which only the outermost is reasonably well-preserved. On this terrace, archaeologists have found the remains of freestanding multistory houses where Trojan elites would have lived. These houses lacked ground-floor windows, and their stone exterior walls mirrored the architecture of the citadel fortifications. However, they otherwise display an eclectic mix of architectural styles, some following the classic megaron design, others even having irregular floorplans. Some of these houses show potential Aegean influence, one in particular resembling the megaron at Midea in the Argolid. Archaeologists believe there may have been a royal palace on the highest terrace, but most Bronze Age remains from the top of the hill were cleared away by classical era building projects.
The citadel was enclosed by massive walls. Present-day visitors can see the limestone base of these walls, which are thick and tall. However, during the Bronze Age they would have been overlaid with wood and mudbrick superstructures, reaching a height over . The walls were built in a "sawtooth" style commonly found at Mycenaean citadels, divided into - segments which joined with one another at an angle. The walls also have a notable slope, similar to those at other sites including Hattusa. These walls were watched over by several rectangular watchtowers, which would also have provided a clear view of Trojan plain and the sea beyond it. The citadel was accessed by five gates, which led into paved and drained cobblestone streets. Some of these gates featured enormous pillars which serve no structural purpose and have been interpreted as religious symbols.
The lower town was built to the south of the citadel, covering an area of roughly 30 hectares. Remains of a dense neighborhood have been found just outside the citadel walls, and traces of other buildings and Late Bronze Age pottery have been found further away. Little of it has been excavated, and few remains are likely to exist; buildings in the lower city are likely to have been made of wood and other perishable materials, and much of the area was built over in the classical and Roman era. The extent of the lower town is evidenced by a defensive ditch cut down to the bedrock and postholes which attest to wooden ramparts or walls which would have once been the outer defense of the city.
The lower city was only discovered in the late 1980s, earlier excavators having assumed that Troy VI occupied only the hill of Hisarlik.
Its discovery led to a dramatic reassessment of Troy VI, showing that it was over 16 times larger than had been assumed and thus a major city with a large population rather than a mere aristocratic residence.
The material culture of Troy VI appears to belong to a distinct Northwest Anatolian cultural group, with influences from Anatolia, the Aegean, and the Balkans. The primary local pottery styles were wheel-made West Anatolian Gray Ware and Tan ware, local offshoots of an earlier Middle Helladic tradition. Foreign pottery found at the site includes Minoan, Mycenaean, Cypriot, and Levantine items. Local potters also made their own imitations of foreign styles, including Gray Ware and Tan Ware pots made in Mycenaean-style shapes. Although the city appears to have been within the Hittite sphere of influence, no Hittite artifacts have been found in Troy VI. Also notably absent are sculptures and wall paintings, otherwise common features of Bronze Age cities. Troy VI is also notable for its architectural innovations as well as its cultural developments, which included the first evidence of horses at the site. The language spoken in Troy VI is unknown. The main candidate is Luwian, an Anatolian language which was spoken in many nearby states and which appears in the only piece of writing found at Troy. However, available evidence is not sufficient to establish that Luwian was the primary language of the city's population, and a number of alternatives have been proposed.
Troy VI was destroyed around 1250 BC, corresponding with the sublayer known as Troy VIh. Evidence of Troy VIh's destruction includes collapsed masonry, and subsidence in the southeast of the citadel, which led its initial excavators to conclude that it was destroyed by an earthquake. However, alternative hypotheses include an internal uprising as well as a foreign attack.
Troy VIIa
Troy VIIa was the final layer of the Late Bronze Age city, built soon after the destruction of Troy VIh. The builders reused many of the earlier city's surviving structures, notably its citadel wall, which they renovated with additional stone towers and mudbrick breastworks. Numerous small houses were added inside the citadel, filling in formerly open areas. New houses were also built in the lower city, whose area appears to have been greater in Troy VIIa than in Troy VI.
The city appears to have been built by its previous inhabitants, as evidenced by continuity in material culture. However, the character of the city appears to have changed, the citadel growing crowded and foreign imports declining. Residents of the citadel buried pithoi in the floors of their homes, seemingly worried about impending shortages. Trevor Bryce suggests that Troy VII was "a city which, though still occupied by its previous inhabitants, had suffered a severe setback of one kind or another from which it never recovered".
The city was destroyed around 1180 BC, roughly contemporary with the Late Bronze Age collapse but subsequent to the destructions of the Mycenaean palaces. The destruction layer shows evidence of enemy attack, including scorch marks.
Troy VIIb
After the destruction of Troy VIIa around 1180 BC, the city was rebuilt as Troy VIIb. Older structures were again reused, including Troy VI's citadel walls. Its first phase, Troy VIIb1, is largely a continuation of Troy VIIa. Residents continued using wheel-made Grey Ware pottery alongside a new handmade style sometimes known as "barbarian ware". Imported Mycenaean-style pottery attests to some continuing foreign trade.
One of the most striking finds from Troy VIIb1 is a hieroglyphic Luwian seal giving the names of a woman and a man who worked as a scribe. The seal is important since it is the only example of preclassical writing found at the site, and provides potential evidence that Troy VIIb1 had a Luwian-speaking population. However, the find is puzzling since palace bureaucracies had largely disappeared by this era. Proposed explanations include the possibility that it belonged to an itinerant freelance scribe and alternatively that it dates from an earlier era than its find context would suggest.
Troy VIIb2 is marked by cultural changes including walls made of upright stones and a handmade knobbed pottery style known as Buckelkeramik. These practices, which existed alongside older local traditions, have been argued to reflect immigrant populations arriving from southwest Europe. Pottery finds from this layer also include imported Protogeometric pottery, showing that Troy was occupied continuously well into the Iron Age, contra later myths.
Troy VIIb was destroyed by fire around 950 BC. However, some houses in the citadel were left intact and the site continued to be occupied, if only sparsely.
See also
Ahhiyawa
Alaksandu
Historicity of the Iliad
Luwians
Mycenaean Greece
Wilusa
References
14th-century BC establishments
Populated places established in the 2nd millennium BC
Populated places disestablished in the 10th century BC
1822 archaeological discoveries
Troy
Greek Dark Ages
Bronze Age sites in Asia
|
28923968
|
https://en.wikipedia.org/wiki/Health%20Dynamics%20Inventory
|
Health Dynamics Inventory
|
The Health Dynamics Inventory (HDI) is a 50 item self-report questionnaire developed to evaluate mental health functioning and change over time and treatment. The HDI was written to evaluate the three aspects of mental disorders as described in the Diagnostic and Statistical Manual of Mental Disorders (DSM): "clinically significant behavioral or psychological syndrome or pattern...associated with present distress...or disability". This also corresponds to the phase model described by Howard and colleagues Accordingly, the HDI assesses (1) the experience of emotional or behavioral symptoms that define mental illness, such as dysphoria, worry, angry outbursts, low self-esteem, or excessive drinking, (2) the level of emotional distress related to these symptoms, and (3) the impairment or problems fulfilling the major roles of one's life.
The HDI was developed for use with mental and behavioral health outpatient, day treatment, hospital, and chemical health programs for both children and adults. It has multiple applications for improving the mental health treatment of children and adults, including in primary care medicine and integrated care. It was designed to be responsive to treatment effects and has descriptive anchors on a 5 point scale to allow for discrimination of frequency and severity of symptom expression.
The HDI was developed for ease of use for patients, researchers, clinicians, and clinics. It was designed to be easy to administer and to score, easy to complete, and to provide results that are easily understood and transformed into meaningful decisions, diagnoses and treatment plans. Most importantly, the HDI was designed to allow clear comparison between multiple administrations, demonstrating the degree of effectiveness of the services provided to individuals throughout their treatment, and to other changes of condition. This allows clinicians and patients to recognize their successes and failures, alert clinicians to high risk situations, target and modify treatment as necessary, and for clinics and clinic managers to track and monitor the process and progress of persons under their care.
Comparison to Other Instruments
The authors have used the criteria specified by Erbes,et al., to evaluate the HDI. Erbes, et al. considered the following criteria to evaluate outcomes measurement instruments: reliability; validity; factor structure; sensitivity to change; scope of measurement; utility across patient populations; the potential to enhance critical decisions about clinical care; briefness; whether the instrument was self-report; ease of administration; ease of interpretation; reasonable price; applicability across multiple settings; computerization capability; computer scoring and comparison to standardization samples; and face validity (whether it makes sense to patients and clinicians). See: http://www.minneapolis.va.gov/services/ptsrt/serv_pts_our.asp
Reliability
Erbes et al. noted that an acceptable range for test-retest reliability was greater than .70, whereas internal consistency needed to be greater than .80. The HDI meets these criteria.
The HDI major scales (Distress, Global Symptoms and Global Impairment) and its subscales have been evaluated. Co-efficient Alpha and Gutman split half reliabilities are excellent.
• HDI split half reliabilities values ranged from .70 for the Substance Abuse Subscale to .91 for the Depression Subscale
•Alpha .reliabilities of 72 to .95 on all three major scales and all of the subscales.
Validity
Erbes et al. required construct and criterion-related validity, that is, that the instrument be correlated to other established instruments. The HDI meets these criteria. The major scales (Distress, Global Symptoms and Global Impairment) distinguish patient and non-patient samples easily. Patients score significantly higher on all of the scales, as would be expected.
In the development of the HDI, the validity of the subscales (e.g., Depression, Anxiety, Substance Abuse and Psychotic Thinking) was evaluated by comparing patients with these diagnoses to other patients and to non-patients. The results supported the validity of the subscales. For example, patients with diagnoses of depression scored significantly higher on the Depression subscale than both patients without such a diagnosis and non-patients. The same was true for the other subscales.
In another demonstration of validity, analyses indicated that psychiatrist and therapist ratings of distress and impairment (as well as of diagnoses) were significantly correlated with patient reports of distress, symptoms and impairment.
Factor Structure
Erbes et al. considered the independence of factor structures as a third consideration for evaluating outcome measures. The HDI has been extensively tested for correlations between the three major subscales, and results suggest that they are associated but also independent. This supports the factor structure of the HDI as a reflection of the three major aspects of mental illness.
HDI Applications
The HDI has both Self Report version for persons 14 through adulthood, and a Parent Report Version allowing children 4-19 to be described by their parents. Both versions have a measured 6th grade reading level. It has multiple applications for improving the mental health treatment of children and adults, including in pediatrics, psychiatry, and primary care medicine. It allows screening for the presence of mental health, behavioral, and addictive disorders, and tracking the outcomes of all types of treatment.
Key Areas Measured
Morale/Distress
Global Symptoms
Depressive Symptoms
Anxiety Symptoms
Attention Problems
Psychotic Thinking
Eating Disorders
Substance Abuse
Behavioral Problems
Global Impairment
Occupational/Task Impairment
Relationship and Social Impairment
Self-Care Impairment
Background Information
The HDI includes a Background Information section allowing patients to describe their treatment history and health problems, and their family psychiatric and addictive history. This information is only needed at the time of first contact.
Time to complete the Background Questionnaire is approximately 5 minutes. Time to complete the core clinical questionnaire is approximately 8–10 minutes.
Clinician Validation
The HDI has a clinician rating form that allows validation of self-report information. This improves the database for research purposes.
Initial and Subsequent Versions
The HDI was first published in hand-scored versions in 2003. In 2005, the HDI Version 5 software was released.
This software allows the HDI to be taken on a computer and to be scored automatically, or to have paper versions entered for scoring and compiling of data. Both graphic and narrative reports are provided to the user by this software. In 2007, a shorter version of the Interpretive Report, the Health Summary Report, was included in the software.
The HDI has been translated into American Spanish. In 2007, the Spanish translation was made available in the software version.
The HDI manual describes the development of the instrument, and its use. Software for administration and scoring runs on Windows-based computers. The software may be run on servers and made available to work stations. Data is compiled and available for exporting for research and program evaluation.
Reports are available for immediate review by clinicians, and use in therapeutic discussions. HDI results form a foundation for other evidence-based practices.
Availability
The HDI is used in outpatient mental health and primary care settings across the US and Canada, and sold in Great Britain and Australia.
Future Plans
The HDI will be standardized with Spanish speakers. A Parent-Child comparison Report is ready to be integrated into the software. A Treatment Planning module is in preparation. Software graphics updates will be implemented in the next revision. Web-based administration and scoring is available.
Contact information
James V. Wojcik, Ph.D.
Chief Psychologist
Director of Training
Human Services Inc.
7066 Stillwater Blvd. N.
Oakdale, MN 55128
651 251 5078
Stephen Saunders, Ph.D.
Professor of Psychology
Director of Training
Marquette University
Department of Psychology
Cramer Hall 318E
PO box 1881
Milwaukee WI 53201-1881
(414) 288-7459
The following articles concerning the HDI are in preparation by the authors
Alamilla, S.A. Saunders, S., Wojcik, J.V., & Wojcik, H.J. Factor structure of the HDI. Manuscript in preparation
Pinna, K., Wojcik, J.V., Saunders, S., & Wojcik, H.J. MMPI-2 demoralization and HDI morale scales: Conceptual and concurrent validation. Manuscript in preparation
Wojcik, J.V., Pinna, K., Samlaska, K.N., & Sudbeck, N. Phase model prediction of sequential improvement in a day treatment population. Manuscript in preparation
References
Mental disorders diagnostic procedures
|
67476964
|
https://en.wikipedia.org/wiki/MacBook%20Air%20%28Intel-based%29
|
MacBook Air (Intel-based)
|
The Intel-based MacBook Air is a discontinued line of notebook computers developed and manufactured by Apple Inc. from 2008 to 2020. The Air was originally positioned above the previous MacBook line as a premium ultraportable. Since then, the original MacBook's discontinuation in 2011, and lowered prices on subsequent iterations, made the Air Apple's entry-level notebook.
The MacBook Air was introduced in January 2008 with a 13.3-inch screen, and was promoted as the world's thinnest notebook, opening a laptop category known as the ultrabook family. Apple released a second generation MacBook Air in October 2010, with a redesigned tapered chassis, standard solid-state storage, and added a smaller 11.6-inch version. Later revisions added Intel Core i5 or i7 processors and Thunderbolt. The third generation was released in October 2018, with reduced dimensions, a Retina display, and combination USB-C/Thunderbolt 3 ports for data and power.
The Intel-based MacBook Air was discontinued in November 2020 following the release of the first MacBook Air with Apple silicon based on the Apple M1 processor.
1st generation (Unibody)
Steve Jobs introduced the MacBook Air during Apple's keynote address at the 2008 Macworld conference on January 15, 2008. The first generation MacBook Air was a 13.3" model, initially promoted as the world's thinnest notebook at 1.9 cm (a previous record holder, 2005's Toshiba Portege R200, was 1.98 cm high). It featured a custom Intel Merom CPU and Intel GMA GPU which were 40% as big as the standard chip package. It also featured an anti-glare LED backlit display, a full-size keyboard, and a large trackpad that responded to multi-touch gestures such as pinching, swiping, and rotating. Since the release of Snow Leopard, the trackpad has also supported handwriting recognition of Chinese characters.
The MacBook Air was the first subcompact notebook offered by Apple after the 12" PowerBook G4 discontinued in 2006. It was also Apple's first computer with an optional solid-state drive. It was Apple's first notebook since the PowerBook 2400c without a built-in removable media drive. To read optical disks, users could either purchase an external USB drive such as Apple's SuperDrive or use the bundled Remote Disc software to access the drive of another computer wirelessly that has the program installed. Either option can also be used to reinstall the system software from the included installation DVD. Remote Disc supports booting over a network, so the Air can boot from its installation DVD in another computer's drive if Remote Install Mac OS X is running on that computer. The software does not allow playing video DVDs or audio CDs, or installing Windows: for these capabilities, an external USB drive is required. More recent versions of OS X replaced the installation DVD with a USB flash drive containing the software, eliminating the need for remote installation. The MacBook Air also does without a FireWire port, Ethernet port, line-in, and a Kensington Security Slot.
On October 14, 2008, a new model was announced with a low-voltage Penryn processor and Nvidia GeForce graphics. Storage capacity was increased to a 128 GB SSD or a 120 GB HDD, and the micro-DVI video port was replaced by the Mini DisplayPort. A mid-2009 version featured slightly higher battery capacity and a faster Penryn CPU.
Design
Apple incorporated several features in the design of the MacBook Air, such as the reduction of lead to make it more environmentally friendly. The MacBook Air contains no BFRs and PVC wiring, meets Energy Star 5.0 requirements, has a recyclable enclosure, and is rated EPEAT Gold. Its display is made with arsenic-free glass and contains no mercury.
Reception
On its introduction, the MacBook Air received mixed reviews which praised its portability, but criticized the compromises made in terms of features. The full-sized keyboard, lightness, thinness, and Multi-Touch trackpad were appreciated in reviews, while the limited configuration options and ports, slow speed, non-user-replaceable battery, small hard drive, and price were criticized. The flip-down hatch on the side of the original MacBook Air was a tight fit for some headphone plugs and USB devices, requiring users to purchase an extension cable. Apple removed the flip-down hatch on the late 2010 model in favor of open ports like those of most other laptops.
Some users have complained of CPU lockup caused by overheating. Apple released a software update in early March 2008 to fix the problem with mixed results: the deactivation of one CPU core was corrected; however, some users reported that the runaway kernel problem continued. The problem is aggravated by system-intensive tasks such as video playback or video chatting.
ArsTechnica found "moderate" performance improvements of the 64-GB solid-state drive of the first-generation Air over the standard 80 GB hard drive in tests.
"Thinnest notebook"
At the launch of the MacBook Air in January 2008, Apple claimed it was the thinnest notebook in the world. This was literally true, but more important was the fact that the MacBook Air was much thinner than mainstream laptops at the time. Its total component integration and use of an entirely new class of Intel processors with a lower TDP and higher integration than previously available made it the first of a new wave of thin performance laptops. Over the years, Apple has removed the claim of being "the world's thinnest notebook" from their marketing materials as other, similarly thin laptops have come to market.
Technical specifications
2nd generation (Tapered Unibody)
On October 20, 2010, Apple released a redesigned 13.3-inch model with a tapered enclosure, higher screen resolution, improved battery, a second USB port, stereo speakers, and standard solid state storage. An 11.6-inch model was introduced, offering reduced cost, weight, battery life, and performance relative to the 13.3-inch model, but better performance than typical netbooks of the time. Both 11-inch and 13-inch models had an analog audio output/headphone minijack supporting Apple earbuds with a microphone. The 13-inch model received a SDXC-capable SD Card slot.
On July 20, 2011, Apple released updated models, which also became Apple's entry-level notebooks due to lowered prices and the discontinuation of the white MacBook around the same time. The Mid 2011 models were upgraded with Sandy Bridge dual-core Intel Core i5 and i7 processors, Intel HD Graphics 3000, backlit keyboards, Thunderbolt, and Bluetooth was upgraded to v4.0. Maximum storage options were increased up to 256 GB. These models use a less expensive "Eagle Ridge" Thunderbolt controller that provides two Thunderbolt channels (2 × 10 Gbit/s bidirectional), compared to the MacBook Pro which uses a "Light Ridge" controller that provides four Thunderbolt channels (4 × 10 Gbit/s bidirectional). This revision also replaced the Expose (F3) key with a Mission Control key, and the Dashboard (F4) key with a Launchpad key.
On June 11, 2012, Apple updated the line with Intel Ivy Bridge dual-core Core i5 and i7 processors, HD Graphics 4000, faster memory and flash storage speeds, USB 3.0, an upgraded 720p FaceTime camera, and a thinner MagSafe 2 charging port.
On June 10, 2013, Apple updated the line with Haswell processors, Intel HD Graphics 5000, and 802.11ac Wi-Fi. The standard memory was upgraded to 4 GB, with a maximum configuration of 8 GB. Storage started at 128 GB SSD, with options for 256 GB and 512 GB. The Haswell considerably improved battery life from the previous generation, and the models are capable of 9 hours on the 11-inch model and 12 hours on the 13-inch model; a team of reviewers exceeded expected battery life ratings during their test.
In March 2015, the models were refreshed with Broadwell processors, Intel HD Graphics 6000, Thunderbolt 2, and faster storage and memory. In 2017, the 13-inch model received a processor speed increase from 1.6 GHz to 1.8 GHz and the 11-inch model was discontinued. The 2017 model remained available for sale after Apple launched the next generation in 2018. It was discontinued in July 2019. Before its discontinuation it was Apple's last notebook with USB Type-A ports, MagSafe (until it was reintroduced in 2021), a non-Retina display, a backlit rear Apple logo, and the startup chime (until the introduction of M1-powered MacBooks in 2020).
Design and upgradability
Although MacBook Air components are officially non-user-replaceable, third parties do sell upgrade kits for the SSDs. The flash memory and battery are enclosed in the casing, and the RAM is soldered onto the motherboard. The flash memory is difficult to access and has a 128 MB cache and a mSATA connection (updated to a proprietary PCIe interface) to the motherboard.
Issues
Due to a more mature manufacturing process, the CPUs in the second-generation MacBook Air performs better under load, as the first generation chips ran hotter—the processor needed to be throttled to avoid overheating and this further degraded performance.
On October 17, 2013, Apple announced a replacement program for the 64 GB and 128 GB MacBook Air flash storage drives installed in Air systems purchased between June 2012 and June 2013.
Reception
Comparison with iPad and netbooks
Although the 11-inch Air is only 0.6 pounds lighter than the 13-inch Air, the biggest difference is the footprint which gives each model a distinct category; the 13-inch Air is much closer in size to most other conventional laptops, while the 11-inch Air is almost small enough to fit in a space that can hold an iPad.
The 11-inch MacBook Air carried the desirable essential attributes of a netbook, but without the drawbacks of a slower processor and less capable operating system, albeit at a higher price. At the low end, Apple introduced the iPad—a different form factor than the netbook, but with improved computing capabilities and lower production cost. Both of these led to a decline in netbook sales, and most PC manufacturers have consequently discontinued their netbook lines in response. Capitalizing on the success of the MacBook Air, Intel promoted ultrabooks as a new high-mobility standard, which has been hailed by some analysts as succeeding where netbooks failed.
Intel's ultrabook competition
Intel developed a set of specifications for the ultrabook, a higher-end type of subnotebook produced by various PC manufacturers and usually running Windows. Competing directly with the Air, ultrabooks are intended to reduce size and weight, and extend battery life without compromising performance.
Through July 1, 2013, the MacBook Air took in 56 percent of all ultrabook sales in the United States, despite being one of the higher-priced competitors. Apple had previously dominated the premium PC market, in 2009 having a 91 percent market share for PCs priced at more than $1,000, according to NPD, and ultrabooks were an attempt by other PC manufacturers to move in on Apple's turf. While Apple's MacBook lines were not immune to this consumer trend towards mobile devices, they still managed to ship 2.8 million MacBooks in Q2 2012 (the majority of which were the MacBook Air) compared to 500,000 total ultrabooks, despite there being dozens of ultrabooks from various manufacturers on the market while Apple only offered 11-inch and 13-inch models of the Macbook Air. Forrester Research analyst Frank Gillett attributes Apple's increased success in the enterprise market to the 2010 MacBook Air and the iPad.
While several ultrabooks were able to claim individual distinctions such as being the lightest or thinnest, the MacBook Air was regarded by reviewers as the best all-around ultrabook in regard to "OS X experience, full keyboard, superior trackpad, Thunderbolt connector and the higher-quality, all-aluminum unibody construction".
Microsoft's Surface Pro 2 has a similar size and price to the 11-inch MacBook Air; Apple CEO Tim Cook has criticized the Surface Pro and other ultrabook hybrids running the touch-based Windows 8, that attempt to combine PC and tablet functionality in one device, saying that such devices were confusing like trying to "combine a fridge and a toaster".
When released in October 2010, the 13-inch model's screen resolution was higher than the average 1366x768 screens of similar sized laptops. However, by 2013, with many premium ultrabooks having high resolution screens (1080p or greater) as standard or upgrades, the MacBook Air was increasingly criticized for sticking with a low-resolution screen. Many in the tech community had expected Apple to release a MacBook Air with Retina Display by the summer of 2013, similar to the MacBook Pro Retina which came out in 2012. The October 2013 refresh of the 13-inch MacBook Pro Retina, with a slimmer chassis and a lower price point, was mentioned as a potential MacBook Air alternative as the battery life is not much shorter while not being considerably bulkier. Apple released an entry-level version of the 13-inch MacBook Pro on October 27, 2016, which was specifically targeted towards MacBook Air users. A Retina MacBook Air was released in late 2018.
The 11.6-inch MacBook Air, introduced in October 2010, is only slightly larger and heavier (when closed) than the iPad 2. The 11.6-inch Air has been regarded as thin and light compared to other ultraportables, such as the Sony VAIO Z and the 11-inch Samsung Series 9.
As of 2013, several ultrabooks such as the Sony VAIO Pro have managed smaller dimensions than the MacBook Air by using carbon fiber construction.
Technical specifications
3rd generation (Retina)
On October 30, 2018, Apple released the third generation MacBook Air, with Amber Lake processors, a 13.3-inch Retina display with a resolution of 2560×1600 pixels, Touch ID, a Force Touch trackpad, and two combination USB-C 3.1 gen 2/Thunderbolt 3 ports plus one audio jack. The screen displays 48% more color and the bezels are 50% narrower than the previous generation, and occupies 17% less volume. Thickness is reduced to 15.6mm and weight to 1.25 kg (2.75 pounds). It is available in three finishes, silver, space gray, and gold. Unlike the previous generation, this model cannot be configured with an Intel Core i7 processor, possibly because Intel never released the i7-8510Y CPU that would have been used.
The base 2018 model comes with 8GB of 2133 MHz LPDDR3 RAM, 128GB SSD, Intel Core i5 processor (1.6 GHz base clock, with Turbo up to 3.6 GHz) and Intel UHD Graphics 617.
Apple released updated models in July 2019 with True Tone display technology using the same components as the Mid 2019 MacBook Pro. A test found that the 256GB SSD in the 2019 model has a 35% lower read speed than the 256GB SSD in the 2018 model, though the write speed is slightly faster.
Updated models were released in March 2020 with Ice Lake processors, updated graphics, support for 6K output to run the Pro Display XDR, and replaced the butterfly keyboard with a Magic Keyboard design similar to that found in the 2019 16-inch MacBook Pro.
Design
The third generation MacBook Air follows the design of the previous generation with a tapered aluminum enclosure, but takes some design elements from the Retina MacBook and MacBook Pro, such as a flush display with black bezels and a glossy opaque Apple logo on the rear, and an edge-to-edge trackpad.
Apple repair expert Louis Rossmann has criticised the third generation MacBook Air's hardware layout, noting that the fan's position makes it sub-optimal for cooling and can lead to overheating-related issues.
Technical specifications
Supported OSes
Supported macOS releases
The patch for the current release of macOS, Big Sur, will work with Wi-Fi on unsupported MacBook Airs from late 2008 and later. Likewise, the patch for macOS Monterey, the next major release, will also support the Late 2008 MacBook Air and later. Graphics acceleration only works on MacBook Airs released in 2012 and later, which have metal-capable GPUs.
Boot Camp-supported Windows versions
See also
Comparison of Macintosh models
MacBook family
MacBook (12-inch)
MacBook Pro
Notes
References
External links
– official site
MacBook
Computer-related introductions in 2008
Products introduced in 2008
Products and services discontinued in 2020
X86 Macintosh computers
|
27697728
|
https://en.wikipedia.org/wiki/Carlo%20Ghezzi
|
Carlo Ghezzi
|
Carlo Ghezzi is a professor and chair of software engineering at the Politecnico di Milano, Italy and an adjunct professor at the Università della Svizzera italiana (USI), Switzerland. At the Politecnico, he is the Rector's Delegate for research; he has been department chair, head of the PhD program, member of the academic senate and of the board of governors of Politecnico.
Education and academic career
He received his Dr.Eng. degree in electrical engineering from the Politecnico di Milano, where he spent most of his professional life, as assistant, associate, and full professor. He also taught and did research in other institutions: University of California, Los Angeles, US (1976), University of North Carolina at Chapel Hill, USA (1979–80), Università degli Studi di Padova, Italy (1980–81), Escuela Superior Latinoamericana de Informática, Argentina (1990), University of California, Santa Barbara, US (1991), Technical University of Vienna, Austria (1996), and University of Klagenfurt, Austria (1996).
Ghezzi is a 1999 ACM fellow (citation: "Numerous research contributions from compiler theory to real-time systems to software processes. A strong contributor to the software engineering community in Europe and worldwide.") and 2006 IEEE Fellow (citation: "for contributions to programming languages and software engineering"). In 2006, he was awarded the ACM SIGSOFT Distinguished Service Award. He is a Member of Istituto Lombardo Accademia di Scienze e Lettere.
Professional service
He is a regular member of the program committee of important conferences of the software engineering field, such as the International Conference on Software Engineering (ICSE) and the Foundations of Software Engineering (FSE) conference, jointly held in conjunction with the European Software Engineering Conference (ESEC).
He has been chairing such conferences as program co-chair (ICSE 1991), program chair (ESEC/FSE '99), general chair (ICSE 2000), and general co-chair (International Conference on Service Oriented Computing, ICSOC 2006).
He has been a keynote speaker at several conferences, including ESEC 1993, the IEEE International Conference on Software Maintenance (ICSM 1997), the European Joint Conference on Theory and Practice of Software (ETAPS 2006), ICSE 2009, the IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2010), the IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010), the International Symposium on Empirical Software Engineering and Measurement (ESEM 2010), ServiceWave (ServiceWave 2010), and Fundamentals of Software Engineering (FSEN 2011).
He has been editor in chief of ACM Transactions on Software Engineering and Methodology (2001–2006) and associate editor of IEEE Transactions on Software Engineering. He is currently an associate editor of Science of Computer Programming (Elsevier), Service Oriented Computing and Applications (Springer Science+Business Media), and Software Process Improvement and Practice (John Wiley & Sons).
Research
His research has been constantly focused on different facets of software engineering and programming languages. Currently, he is active in the area of software architectures, especially evolvable and distributed software architectures for ubiquitous and pervasive computer applications. His long-term goal has been to contribute to making software more and more dependable, basing it on solid and rigorous methodological and theoretical foundations.
Ghezzi has co-authored over 180 papers, almost all of which are published internationally. His papers appeared on prestigious journals like the Journal of the ACM, Information and Control (now Information and Computation), ACM Transactions on Software Engineering and Methodology, ACM Transactions on Programming Languages and Systems, IEEE Transactions on Software Engineering.
He is the co-author of 8 books, including:
Programming Language Concepts. With M. Jazayeri. (First edition: John Wiley & Sons, 1982; . Second edition: John Wiley & Sons, 1987; . Third edition: John Wiley & Sons, 1998; )
Theoretical Foundations of Computer Science. With D. Mandrioli. (John Wiley & Sons, 1987; )
Fundamentals of Software Engineering. With M. Jazayeri and D. Mandrioli. (First edition: Prentice Hall, 1991; . Second edition: Prentice Hall, 2003; )
In 2008, he has been awarded an Advanced Investigators Grant from the European Research Council, funding the SMSCOM project.
References
External links
Personal web site
Publications list on DBLP
ICSE 2009 keynote slides and discussion
Living people
Polytechnic University of Milan faculty
Software engineering researchers
Programming language researchers
Fellows of the Association for Computing Machinery
Fellow Members of the IEEE
University of Lugano faculty
Year of birth missing (living people)
|
11601463
|
https://en.wikipedia.org/wiki/Plesk
|
Plesk
|
Plesk is a commercial web hosting and server data center automation software with a control panel developed for Linux and Windows-based retail hosting service providers. Plesk's user management model is suitable for dedicated and shared hosting, allowing server administrators to set up new websites, reseller accounts, email accounts, and edit and create DNS entries through a web-based interface. Key features and solutions include the automation and management of domain names, email accounts, web applications, programming languages, databases, and infrastructure tasks to provide a ready-to-code environment and strong security across all layers and operating systems.
It is developed by Plesk International GmbH, with headquarters in Toronto, Canada and Schaffhausen, Switzerland, and offices in Barcelona, Spain, Cologne, Germany, Tokyo, Japan, and in the Siberian city of Novosibirsk, Russia, where it was originally developed in 2000.
The hosting automation software was initially released by Plesk Inc. and first went live in 2001. In 2003, Plesk was sold to SWSoft, which became Parallels in 2008. In March 2015, Parallels renamed the service provider division to Odin. In December of the same year, Plesk became a separate business entity. In 2017, Plesk was acquired by British Oakley Capital Limited and has since been a part of WebPros, a global SaaS platform for server management. Currently, WebPros comprises Plesk, cPanel, WHMCS, XOVI, and SolusVM.
Overview
Plesk was founded in 2000 by Dimitri Simonenko when Rackspace became Plesk's first customer. Two decades after its first release, Plesk software operates on more than 370,000+ servers globally, supporting the operations of more than 12 million websites and 15 million email boxes for customers in 230 countries. One of Plesk’s leading extensions, the popular WordPress Toolkit, is live on over 4.6 million instances, and a further 161 extensions are available on the Plesk catalog.
In October 2018, Plesk integrated support for various Content Management Systems including WordPress and Joomla, and other web software such as git and Docker, as well as framework ready environment for Node.js, PHP, Python, Ruby on Rails, and more. The current version of Plesk (Obsidian 18.x) for Linux supports multiple POSIX platforms, including Debian 9 and 10, Ubuntu 20.04 Server LTS, CentOS 7 and 8, RedHat Enterprise Linux 7 and 8, and CloudLinux 7. And for Windows, Windows Server 2016 and Windows Server 2019 operating systems.
Plesk supports the most popular database engines and is shipped with corresponding database management tools. Plesk for Linux supports MySQL, PostgreSQL, and MariaDB database servers. Plesk for Windows supports Microsoft SQL and MySQL.
The Plesk Platform includes extensions for Backup, DNS, Cloud, Security, and Server Tools. And its control panel allows its users to set up new websites, reseller accounts, email accounts, edit and create DNS entries, and many more, through a web-based interface.
Today, Plesk is used and offered by thousands of Hosting companies and Cloud Service Providers worldwide – including top players like GoDaddy, Ionos, Media Temple, AWS, Google, Microsoft Azure, DigitalOcean, Panamaserver.com, Vultr, and many more.
Plesk’s web-server management tools secure and automate server and website administration as well as operations to free up time and allow developers, designers, and agencies to focus on their core businesses.
Licenses
Plesk, with latest version Obsidian 18.x, is available in the following license configurations:
Plesk Web Admin Edition: Up to 10 domains. For basic management of simple websites, without the extended tools and features.
Plesk Web Pro Edition: To manage up to 30 domains. It also includes Plesk WordPress Toolkit full-featured.
Plesk Web Host Edition: Unlimited domains. The administrator can also create additional reseller accounts.
The license price also distinguishes whether a license can be used for a dedicated server or a virtualized server. Licenses for dedicated servers are usually slightly more expensive.
Pricing
Plesk sells all three licenses for a monthly or annual price directly. All three editions can also be obtained from official license resellers.
In March 2018, Plesk announced end-of-life versions price increase, becoming its first price adjustment in 18 years of business. The company raised the prices of all Plesk licenses that had versions earlier than 12, alleging it was to cover the increasing cost of support and management over the past two decades. Following the announcement, Plesk created a FAQ page to clarify any questions about the new pricing adjustment.
Support
Live and email support for Plesk is available in English, Russian, Spanish, German, Portuguese, and Japanese. Plesk licenses purchased directly from Plesk include full free support.
If a Plesk license is purchased from one of the Plesk partners, technical support is the corresponding partner's responsibility. Plesk partners are fully trained and deliver best-in-the-industry support for Plesk products running on their infrastructure. For those who wish to access Plesk support despite having bought the license from another source than the Plesk online store, Plesk support subscriptions are also available for purchase.
Version history
Timeline
Plesk University
In January 2016, Plesk launched Plesk University online. Through its University, Plesk provides a full range of courses to help users learn how to use their products and services. All courses and exams in their catalog are certified, and access to all of them is free.
See also
Web hosting control panel
Comparison of web hosting control panels
References
Java enterprise platform
Web applications
Website management
User interfaces
Web hosting
Web server management software
Drupal
WordPress
|
65622497
|
https://en.wikipedia.org/wiki/Football%20Manager%202021
|
Football Manager 2021
|
Football Manager 2021 (officially abbreviated as FM21) is a football-management simulation video game developed by Sports Interactive and published by Sega. It was released worldwide for iOS, Android, macOS and Windows on 24 November 2020. The streamlined version of the game titled Football Manager 2021 Touch was released on 1 December 2020 for the same platforms, and for Nintendo Switch on 15 December 2020. The similar version titled Xbox Edition was released on 1 December 2020 for Xbox One, Xbox Series X/S and Windows 10 via the Microsoft Store. It was the first game in the series to appear on an Xbox platform since Football Manager 2008.
Features
FM21s headline features cover a number of key areas of the game including the interaction system, matchday experience and the recruitment module. There are new communication methods, including gestures, and new interaction options between the manager, their players and the media. There are new presentation elements before, during and after a match and an overhaul to the match engine AI. Expected goals (or xG) makes its debut in the series as part of a wider suite of data analysis changes through an xG model, built by Sports Interactive in partnership with SciSports. Trophy presentations have been revamped too.
Managers can also take more control of their club's recruitment strategy with a new recruitment meeting.
Playable leagues
FM21 features 117 leagues from 52 nations across five continents: Africa, Asia (including Australia), Europe, North America and South America. Coverage is heavily slanted towards European teams, with 34 of its 51 constituent countries having playable leagues, while South Africa is the only country of Africa's total 54 that is covered.
Licensing
29 leagues (across 14 countries) were fully licensed for the game, as was KNVB ("Team Holland"). Italy's Serie A has licences for all its clubs except Juventus, who appear as Zebre once again. The German national team was not licensed, however, having been reintroduced in FM20.
Xbox edition
Football Manager 2021 saw the series return to Xbox consoles for the first time since 2007. Modelled on Football Manager Touch, the game's user interface has been designed to work with the Xbox controller and the game will take advantage of Microsoft's Smart Delivery and Play Anywhere technology to enable cross-play across Xbox One, Xbox One X|S, Xbox Series X|S and FM21 Xbox on Windows 10.
FM21 Xbox will be enhanced on Xbox Series X|S with matches displaying in native 4K and up to 10 nations can be loaded up at any one time.
The game released on 1 December 2020.
Mobile
Football Manager 2021 Mobile introduced three new nations to the game: Argentina, Canada and Mexico, which took the total number of playable nations to 24.
Tactical templates have been introduced for the first time that replicate the most popular styles of play in world football and managers can now develop their own set-piece routines. The Dynamics module has new displays of social groups, player relationships and squad hierarchy while the way that human managers can communicate with their players has been redefined.
Other features include the ability to set up links with feeder clubs and arrange pre-season friendlies.
FM21 Mobile was released on iOS and Android on 24 November 2020.
Football Manager 2021 Touch
Football Manager 2021 Touch encompasses many of the new additions from the Windows and macOS versions. The interaction system, matchday experience and new data analysis elements are included in the game.
FM21 Touch for Windows, macOS, iOS and Android was released on 1 December 2020 and the Nintendo Switch edition was released on 15 December 2020.
Reception
Football Manager 2021 received "generally favorable" reviews while Football Manager 2021 Touch for Switch received "mixed or average" reviews according to review aggregator Metacritic.
PC Gamer praised the games' engaging depth, stating, "With a newfound litheness on the pitch and deep data analysis, FM21 gives you an easy excuse to relapse." Tapsell of Eurogamer praised the improvements made in comparison to entries prior, writing, "New tricks will make the headlines, but Sports Interactive's best move is to breathe new life into the brilliance that's already there." PCGamesN praised the game's uniqueness and said, "It’s because there are precious few games out there that can impart this particular kind of pride of accomplishment, the kind you get from inspiring someone else to do a better job, or a team to work better together." GamesRadar+ gave the game five stars out of five, praising the game's accessibility and the improvements made to the UI while criticizing its interviews and press conferences for being repetitive.
References
External links
2021
Android (operating system) games
IOS games
MacOS games
Nintendo Switch games
Windows games
Xbox One games
Video games developed in the United Kingdom
2020 video games
|
48981422
|
https://en.wikipedia.org/wiki/Ieva%20Ilves
|
Ieva Ilves
|
Ieva Ilves (née Kupce; born September 13, 1977) is a former First Lady of Estonia, diplomat and cyber security policy expert. Ilves ran as a Latvian candidate for the 2019 European Parliament election. She was the third place candidate for Development/For!, second on the list was Baiba Rubesa, the former CEO of Rail Baltica.
She has worked as the head of unit for National Cyber Security Policy and Political Advisor to the State Secretary at the Ministry of Defence of Latvia. She is founding member of different non-governmental organizations institutions focusing on the issues of security, democracy, and human rights. In 2016 she served as First Lady of Estonia, until her husband Toomas Hendrik Ilves was succeeded by Kersti Kaljulaid in October 2016.
Education
She studied at the University of Latvia and received a master's degree in Political Science. In 2012 Ilves attended Johns Hopkins University in Washington DC.
Civil service career
In the late 1990s Ilves was part of the Ministry of Foreign Affairs of the Republic of Latvia team that worked on Latvia's goal to join NATO. After successful accession she continued her work in the field of security policy and democracy sharing Latvia's experience and lessons learned with its Eastern neighbors - Ukraine, Belarus, and Georgia. In 2005-2006 Ilves joined the Riga NATO Summit Task Force and led the local and NATO Public Diplomacy efforts for the NATO Summit 2006 in Riga. Ilves has received a State Award for her contribution to the NATO Summit in Riga, a Recognition of Foreign minister for developing the cooperation with NGOs and the promotion of democracy issues and Memorial Medal of the Minister of Defense for Advancing Latvia's Membership to NATO.
From 2007 to 2010 Ilves was posted to the Latvian Delegation to NATO and from 2010 to 2011 she was seconded to the European Union as a Political Advisor to the EU Special Representative in the South Caucasus in Baku, Azerbaijan focusing on human rights among other topics. Ilves has also worked as Advisor to the State Secretary of the Ministry of Defense having responsibility to establish the NATO STRATCOM COE in Riga and coordinate national cyber security policy, including during the Latvia's Presidency in EU.
In 2012 Ilves and the former US ambassador to NATO Kurt Volker, co-edited the book: “Nordic-Baltic-American Cooperation: Shaping the U.S.-European Agenda”.
NGO work
In 2000 she was a founding member of the Latvian Transatlantic Organization. She is also a Founding Member and Chairperson of the “Open Belarus” Board of non-governmental organization in Latvia, founded 2004. Open Belarus extended Latvia's policy and activities towards the support of democratic developments in Belarus. In 2008 she was a founding member of the regional non-governmental organization "Baltic to Black Sea Alliance".
First Lady of Estonia (2016)
In 2016 she married the then president of Estonia Toomas Hendrik Ilves and undertook the responsibilities of the First Lady of Estonia. As the First Lady of Estonia she accompanied her spouse in numerous foreign visits including the 71st Session of the UN General Assembly where she met with the former president of U.S Barack Obama and First Lady Michelle Obama.
Personal life
She has three children: Ralfs (b. 2002) and Isabella (b. 2014) and Hans Hendrik Ilves (b. 2016).
References
External links
|-
1977 births
Living people
20th-century Latvian people
Johns Hopkins University alumni
Spouses of presidents of Estonia
|
6638505
|
https://en.wikipedia.org/wiki/GlobalHell
|
GlobalHell
|
globalHell was a group of hackers, composed of about 60 individuals. The group disbanded in 1999, when 12 members were prosecuted for computer intrusion and 30 for lesser offences.
The members of the group were responsible for over a hundred website defacements, trafficking stolen personal and financial information and illegally accessing numerous teleconferences over which they co-ordinated their efforts. A few of the systems they broke into include those of United States Army, the White House, United States Cellular, Ameritech and the US Postal Service.
Members
MostHateD – sentenced to 26 months' imprisonment and three years' supervised release.
Mindphasr – ordered to pay restitution to the U.S. Army and serve six months in prison, followed by three years of supervised release and to gain approval from future employers to use the Internet.
ne0h – ne0h is a Canadian hacker, featured in Kevin Mitnick's book, "The Art of Intrusion", but ne0h's real identity is unknown.
References
External links
Wired.com news article on globalHell.
ZDNet news article related to the disbandment of gH.
Hacker groups
|
6003795
|
https://en.wikipedia.org/wiki/The%20Sleuth%20Kit
|
The Sleuth Kit
|
The Sleuth Kit (TSK) is a library and collection of Unix- and Windows-based utilities for extracting data from disk drives and other storage so as to facilitate the forensic analysis of computer systems. It forms the foundation for Autopsy, a better known tool that is essentially a graphical user interface to the command line utilities bundled with The Sleuth Kit.
The collection is open source and protected by the GPL, the CPL and the IPL. The software is under active development and it is supported by a team of developers. The initial development was done by Brian Carrier who based it on The Coroner's Toolkit. It is the official successor platform.
The Sleuth Kit is capable of parsing NTFS, FAT/ExFAT, UFS 1/2, Ext2, Ext3, Ext4, HFS, ISO 9660 and YAFFS2 file systems either separately or within disk images stored in raw (dd), Expert Witness or AFF formats. The Sleuth Kit can be used to examine most Microsoft Windows, most Apple Macintosh OSX, many Linux and some other UNIX computers.
The Sleuth Kit can be used via the included command line tools, or as a library embedded within a separate digital forensic tool such as Autopsy or log2timeline/plaso.
Tools
Some of the tools included in The Sleuth Kit include:
ils lists all metadata entries, such as an Inode.
blkls displays data blocks within a file system (formerly called dls).
fls lists allocated and unallocated file names within a file system.
fsstat displays file system statistical information about an image or storage medium.
ffind searches for file names that point to a specified metadata entry.
mactime creates a timeline of all files based upon their MAC times.
disk_stat (currently Linux-only) discovers the existence of a Host Protected Area.
Applications
The Sleuth Kit can be used
for understanding what data is stored on a disk drive, even if the operating system has removed all meta data.
for recovering deleted image files
summarizing all deleted files
search for files by name or included keyword
See also
Autopsy (software) — A graphical user interface to The Sleuth Kit.
CAINE Linux − Includes The Sleuth Kit
References
External links
Computer forensics
Free security software
Unix security-related software
Hard disk software
Digital forensics software
|
159994
|
https://en.wikipedia.org/wiki/Microsoft%20Flight%20Simulator
|
Microsoft Flight Simulator
|
Microsoft Flight Simulator (often abbreviated as MSFS, MFS or FS) is a series of amateur flight simulator programs for Microsoft Windows operating systems, and earlier for MS-DOS and Classic Mac OS. It is one of the longest-running, best-known, and most comprehensive home flight simulator programs on the market. It was an early product in the Microsoft application portfolio and differed significantly from Microsoft's other software, which was largely business-oriented. At years old, it is the longest-running software product line for Microsoft, predating Windows by three years. Microsoft Flight Simulator is one of the longest-running PC video game series of all time.
Bruce Artwick began the development of Flight Simulator in 1977. His company, Sublogic, initially distributed it for various personal computers. In 1981, Artwick was approached by Microsoft's Alan M. Boyd who was interested in creating a "definitive game" that would graphically demonstrate the difference between older 8-bit computers, such as the Apple II, and the new 16-bit computers, such as the IBM PC, still in development. In 1982, Artwick's company licensed a version of Flight Simulator for the IBM PC to Microsoft, which marketed it as Microsoft Flight Simulator 1.00.
In 2009, Microsoft closed down Aces Game Studio, which was the department responsible for creating and maintaining the Flight Simulator series. In 2014, Dovetail Games were granted the rights by Microsoft to port the Gold Edition of Microsoft's Flight Simulator X to Steam and publish Flight Simulator X: Steam Edition.
Microsoft announced a new installment at E3 in 2019, simply titled Microsoft Flight Simulator, to be released initially on PC and ported over to the Xbox Series X at a later date. On July 12, 2020, Microsoft opened up preorders and announced that Microsoft Flight Simulator for PC will be available on August 18, 2020. The company announced three different versions of the title – standard, deluxe, and premium deluxe, each providing an incremental set of gameplay features, including airports, and airplanes to choose from. The Xbox edition was released on July 27, 2021.
History
Microsoft Flight Simulator began as a set of articles written by Bruce Artwick in 1976 about a 3D computer graphics program. When the magazine editor said that subscribers wanted to buy the program, Artwick set to work to create it and incorporated a company called Sublogic Corporation in 1977. The company began selling flight simulators for several computer platforms, including the 8080, Altair 8800, and IMSAI 8080. In 1979 Sublogic released FS1 Flight Simulator for the Apple II. In 1980, Sublogic released a version for the TRS-80, and in 1982 they licensed an IBM PC version with CGA graphics to Microsoft, which was released as Microsoft Flight Simulator 1.00. It was unusual in that it was not an application program requiring an operating system, but contained its own operating system, which displaced the installed one as long as the program was running. In the early days of less-than-100% IBM PC compatible systems, Flight Simulator and Lotus 1-2-3 were used as unofficial compatibility test software for new PC clone models.
Sublogic continued to develop for other platforms and ported Flight Simulator II to the Apple II in 1983; the Commodore 64, MSX, and Atari 800 in 1984; and to the Amiga and Atari ST in 1986. Meanwhile, Bruce Artwick left Sublogic and founded The Bruce Artwick Organization to continue his work on subsequent Microsoft releases, beginning with Microsoft Flight Simulator 3.0 in 1988. Microsoft Flight Simulator reached commercial maturity with version 3.1, and went on to encompass the use of 3D graphics and graphic hardware acceleration.
Microsoft continued to produce newer versions of the flight simulation software, adding features, such as new aircraft types and augmented scenery. The 2000 and 2002 versions were available in "Standard" and "Professional" editions, where the latter included more aircraft, tools and scenery options. The 2004 release (version 9) marked the celebration of one hundred years of powered flight and had only one edition. Flight Simulator X, released in 2006, returned to dual versions with a "Standard" and a "Deluxe" edition.
The flying area encompasses planet Earth with varying degrees of detail and includes over 24,000 airports. There is an ever-growing list of scenery representing major landmarks and popular cities. Landscape details become sparse as gameplay moves away from population centers within the flight simulator, particularly outside the United States, although a variety of websites offer scenery add-ons to remedy this.
The three latest versions incorporate sophisticated weather simulation, along with the ability to download real-world weather data (first available with Flight Simulator 2000). Additional features in these newer versions include air traffic environments with interactive air traffic control functions, new aircraft models from the historical Douglas DC-3 to the modern Boeing 777, interactive lessons, challenges, and aircraft checklists. The two latest versions of Microsoft Flight Simulator have a "kiosk mode", which allows the application to be run in electronic kiosks located in public places like shopping malls. Microsoft Flight Simulator has a wide selection of upgrades and add-ons, both free and commercial, official and fan-made.
Microsoft Flight Simulator X
Microsoft Flight Simulator X is the third most recent major release of Microsoft Flight Simulator, and the last one developed by Aces Game Studio. It includes a graphics engine upgrade and compatibility with preview DirectX 10 and Windows Vista. It was released on October 17, 2006, in North America. There are two versions of the game, both on two DVDs. The "Deluxe" edition contains the new Garmin G1000 integrated flight instrument system in three cockpits, additional aircraft, and missions; Tower Control capability in multiplayer mode; higher detail scenery for cities and airports; and a Software Development Kit (SDK) for development. The main improvements are graphical.
Microsoft has also released a Flight Simulator X demo, which contains three aircraft, two airports, and two missions. It is compatible with Windows XP SP2 and Windows Vista.
Closure of the Aces Game Studio
On January 22, 2009, it was reported that the development team was heavily affected by Microsoft's program of job cuts, with indications that the entire Microsoft Flight Simulator team had been laid off. Microsoft confirmed the closure of the Aces Game Studio on January 26, 2009, in a post on the official FSInsider Web site. stating "This difficult decision was made to align Microsoft's resources with our strategic priorities. Microsoft Flight Simulator X will remain available at retail stores and Web retailers, the Flight Sim community will continue to learn from and encourage one another, and we remain committed to the Flight Simulator franchise for the long term."
According to former Aces employee Phil Taylor, the shutdown was not due to sales performance of FSX, but due to management problems and delays in project delivery, combined with increased demand for staff. Speculation in the mainstream and gaming media was that future versions could be released as an Internet-based version, or on Microsoft's Xbox platform.
In October 2009, two (out of over fifty) former members of the Aces Game Studio formed a new game studio called the Cascade Game Foundry for the development of simulation games.
Third-party developer agreements
Lockheed Martin Prepar3D
In late 2007, Aces Game Studio announced Microsoft ESP (Enterprise Simulation Platform), a development platform for companies that want to create products that use the technology in Flight Simulator. Following the closure of the Aces Game Studio in January 2009, Lockheed Martin announced in late 2009 that they had negotiated with Microsoft a licensing agreement to purchase the intellectual property (including source code) for the Microsoft ESP product. It is the commercial-use version of Flight Simulator X SP2. On May 17, 2010, Lockheed announced that the new product based upon the ESP source code would be called Prepar3D (P3D). Lockheed hired members of the original Aces Game Studio team to continue development of the product.
In November 2010, Lockheed Martin debuted Prepar3D version 1. Version 1.1 was released in April 2011, with a retail license cost of US$499. A developer license is also available for a monthly fee of US$9.95. In March 2012, along with the release of version 1.3, the pricing strategy was revised. The Professional edition is now available for US$199, with an Academic License available for US$59.95.
After releasing version 2 in 2013 and version 3 in 2015, the team released 64-bit version 4 in May 2017.
Version 5 was released on April 14, 2020.Due to the changes in elevation between version 4 and version 5, many developers charged for upgrades to make their airport sceneries compatible with the new elevation. This elevation issue, in turn, created new developers to pop up to create "compatibility files" for older version 4 airports to work on version 5. Companies such as iniBuilds and Scandinavian Mountains lead the development of compatibility files.
Dovetail Games and Microsoft Flight Simulator X: Steam Edition
On July 9, 2014, Dovetail Games announced that Microsoft had granted them rights to develop the next Flight Simulator in the series. Dovetail Games also announced the release of Flight Simulator X: Gold Edition on Steam for late 2014, titled Microsoft Flight Simulator X: Steam Edition. It was released on December 18, 2014. It is a re-release and includes content that was provided with the original FSX: Gold Edition which includes FSX: Deluxe Edition, the Acceleration expansion pack, and both official Service Packs and repackages them in one bundle and a single installation. The Steam Edition includes "all standard Steam functionality", including an overhaul of the multiplayer support to go through Steam rather than the now-defunct GameSpy, improved stability on Windows 7 and 8, and features minor performance tweaks including a complete recompile using VS2013.
Additionally, Dovetail Games has worked with existing developers and publishers to distribute their content on Steam as DLC. Currently, there are over 100 add-ons for FSX: Steam Edition from over 35 developers available on the Steam store including Aerosoft, Captain Sim, Orbx Simulation Systems, Real Environment Xtreme (REX), Carenado, Virtavia, and others.
Flight Sim World
In May 2017, Dovetail Games announced Flight Sim World, based on the codebase of Flight Simulator X, and released later that month. Only a year later, on April 23, 2018, Dovetail announced end of development of Flight Sim World and the end of sales effective May 15, 2018.
Microsoft Flight
In February 2012, Microsoft released a new flight simulator titled Microsoft Flight. Developed by The Coalition (as Microsoft Game Studios Vancouver), it was not part of the Microsoft Flight Simulator series, but instead was designed to replace it and aimed at drawing new users into flight gaming. While claiming to be simpler to use for inexperienced users, it is incompatible with Flight Simulator and does not allow the use of existing Flight Simulator add-ons (including aircraft, objects, and photographic scenery).
On July 26, 2012, Microsoft cancelled further development of Flight.
Microsoft Flight Simulator (2020)
On June 9, 2019 as part of their E3 conference announcements Microsoft revealed that they would be bringing back the Flight Simulator series with an updated release, simply titled Microsoft Flight Simulator. On the same day, Microsoft launched a new website for the title and posted a teaser video on their Xbox YouTube channel. The new version features tight integration of ground satellite data and Microsoft's own Azure AI into the simulator's engine to generate near-photorealistic graphics. Asobo Studio is the lead developer.
The game is Microsoft's first simulator since Microsoft Flight in 2012. In addition to the PC release it was also released for the Xbox Series X and Series S, making it the first entry in the Microsoft Flight Simulator series to be released for a gaming console. The Windows PC version of the simulator was released on August 18, 2020. Microsoft Flight Simulator launched for Xbox Series X and Series S on July 27, 2021.
Add-ons, customisation, and community involvement
The long history and consistent sales of Flight Simulator has encouraged a very large body of add-on packages to be developed as both commercial and volunteer ventures. A formal software development kit and other tools for the simulator exist to further facilitate third-party efforts, and some third parties have also learned to 'tweak' the simulator in various ways by trial and error. As for number of add-ons, tweaks, and modifications Flight Simulator can accommodate solely depends on the user's hardware setup. The number is not limited by the simulator, and when multiple computers are linked together with multiple monitors and third party software and controls, Flight Simulator enthusiasts can build their own realistic home cockpits.
Aircraft
Individual attributes of Flight Simulator aircraft that can be customized include; cockpit layout, cockpit image, aircraft model, aircraft model textures, aircraft flight characteristics, scenery models, scenery layouts, and scenery textures, often with simple-to-use programs, or only a text editor such as 'Notepad'. Dedicated 'flight simmers have taken advantage of Flight Simulator's vast add-on capabilities, having successfully linked Flight Simulator to homebuilt hardware, some of which approaches the complexity of commercial full-motion flight simulators.
The simulator's aircraft are made up of five parts:
The model, which is a 3D CAD-style model of the aircraft's exterior and virtual cockpit, if applicable. Models consist of two distinct sections - the main chassis or "core", and accessories or dynamic parts, such as the landing gear or ailerons.
The textures, bitmap images which the game layers onto the model. These can be easily edited (known as repainting), so that a model can adopt any paint scheme imaginable, real or fictional.
The sounds, literally what the aircraft sounds like. This is determined by defining which WAV files the aircraft uses as its sound-set.
The panel, a representation of the aircraft's cockpit. This includes one or more bitmap images of the panel, instrument gauge files, and sometimes its own sounds.
The FDE, or Flight Dynamics Engine. This consists of the air-file (a *.air file), which contains hundreds of parameters that define the aircraft's flight characteristics, and the aircraft.cfg file, which contains more and easier-to-edit parameters.
Most versions of Microsoft Flight Simulator include some of the world's most popular aircraft from different categories, such as the Mooney Bravo and Beechcraft Baron 58, which fall into the general aviation category; the Airbus A321 and Boeing 737, which fall into the civil jets category; the Robinson R22, which falls into the helicopter category; the Air Scheffel 738, which falls into the general aviation category again; and many other planes commonly used around the world.
Not being limited to using the default aircraft, add-on planes can be downloaded from many sources for free or purchased, which can then be installed into Microsoft Flight Simulator. The Beechcraft 1900D pictured above, is an add-on aircraft. Similarly, add-on repaints can be added to default aircraft; these repaints are usually downloaded for free.
AI Traffic
A growing add-on category for the series is AI (artificial intelligence) traffic. AI traffic is the simulation of other vehicles in the FS landscape. This traffic plays an important role in the simulator, as it is possible to crash into traffic (this can be disabled), thus ending your session, and to interact with the traffic via the radio and ATC. This feature is active even with third-party traffic. Microsoft introduced AI traffic in MSFS 2002 with several airliners and private aircraft. This has since been supplemented with many files created by third-party developers. Typically, third-party aircraft models have multiple levels of detail, which allow the AI traffic to be better on frame rates, while still being detailed during close looks. There are several prominent freeware developers. Some third-party AI traffic can even be configured for "real-time" departures.
Scenery
Scenery add-ons usually involve replacements for existing airports, with enhanced and more accurate detail, or large expanses of highly detailed ground scenery for specific regions of the world. Some types of scenery add-on replace or add structures to the simulator. Both freeware and payware scenery add-ons are very widely available. Airport enhancements, for example, range from simple add-ons that update runways or taxiways to very elaborate packages that reproduce every lamp, pavement marking, and structure at an airport with near-total accuracy, including animated effects such as baggage cars or marshalling agents. Wide-area scenery enhancements may use detailed satellite photos and 3-D structures to closely reproduce real-world regions, particularly those including large cities, landmarks, or spectacular natural wonders.
Flight networks
Virtual flight networks such as IVAO, VATSIM, and Pilot Edge as well as Virtual Skies, and Mindstar Aviation's AirspaceVR use special, small add-on modules for Flight Simulator to enable connection to their proprietary networks in multiplayer mode, and to allow for voice and text communication with other virtual pilots and controllers over the network. These networks allow players to enjoy and enhance realism in their game. These networks are for ATC (air traffic control).
Miscellaneous
Some utilities, such as FSUIPC, merely provide useful tweaks for the simulator to overcome design limitations or bugs, or to allow more extensive interfacing with other third-party add-ons. Sometimes certain add-ons require other utility add-ons in order to work correctly with the simulator.
Other add-ons provide navigation tools, simulation of passengers, and cameras that can view aircraft or scenery from any angle, more realistic instrument panels and gauges, and so on.
Some software add-ons provide operability with specific hardware, such as game controllers and optical motion sensors.
FSDeveloper.com is one website that host a forum style knowledge base aimed at the development of add-on items, tools, and software.
Excel Unusual hosts two versions of flight simulator downloads and tutorials, built from scratch with only VBA and cell formulas, in both 2D and 3D.
Availability
A number of websites are dedicated to providing users with add-on files (such as airplanes from actual airlines, airport utility cars, actual buildings located in specific cities, textures, and city files). The wide availability over the internet of freeware add-on files for the simulation package has encouraged the development of a large and diverse virtual community, linked up by design group and enthusiast message boards, online multiplayer flying, and 'virtual airlines'. The internet has also facilitated the distribution of 'payware' add-ons for the simulator, with the option of downloading the files, which reduces distribution costs.
Reception
PC Magazine in January 1983 called Flight Simulator "extraordinarily realistic ... a classic program, unique in the market". It praised the graphics and detailed scenery, and concluded "I think it's going to sell its share of IBM PCs, and will certainly sell some color/graphics adapters". BYTE in December 1983 wrote that "this amazing package does an incredible job of making you think you're actually flying a small plane". While it noted the inability to use a RGB monitor or a joystick, the magazine concluded that "for $49.95 you can't have everything". A pilot wrote in the magazine in March 1984 that he found the simulated Cessna 182 to be "surprisingly realistic". While criticizing the requirement of using the keyboard to fly, he concluded "Microsoft Flight Simulator is a tour de force of the programmer's art ... It can be an excellent introduction to how an aircraft actually operates for a budding or student pilot and can even help instrument pilots or those going for an instrument rating sharpen their skills".
Another pilot similarly praised Flight Simulator 2.0 in PC Magazine that year, giving it 18 out of 18 points. He reported that its realism compared well to two $3 million hardware flight simulators he had recently flown, and that he could use real approach plates to land at and navigate airports Flight Simulators manual did not document. Compute! warned "if you don't know much about flying, this program may overwhelm you. It's not a simple simulation. It's a challenging program even for experienced pilots". The magazine concluded that Flight Simulator "is interesting, challenging, graphically superb, diverse, rewarding, and just plain fun ... sheer delight". Flight Simulator 2.0 was reviewed in 1989 in Dragon #142 by Hartley, Patricia, and Kirk Lesser in "The Role of Computers" column. The reviewers gave the game 5 out of 5 stars.
Computer Gaming World stated in 1994 that Flight Simulator 5 "is closer to simulating real flight than ever before".
Microsoft Flight Simulator X was reviewed in 2006 by GameSpot. The reviewer gave the game an 8.4 out of 10 and commented on how it was realistic enough to be used for real-life flight training.
Awards
By June 1999, the series had sold units worldwide, for which it was awarded the Guinness World Record for best-selling flight simulator series.
The success of the Microsoft Flight Simulator series has led to Guinness World Records awarding the series seven world records in the Guinness World Records: Gamer's Edition 2008. These records include "Longest Running Flight Sim Series", "Most Successful Flight Simulator Series", and "Most Expensive Home Flight Simulator Cockpit", which was built by Australian trucking tycoon Matthew Sheil, and cost around $200,000 to build.
See also
Airfight
FlightGear
FlightSim.com,Wizzsim.com and Avsim.com – Flight simulator resource and review communities
International Virtual Aviation Organisation
Microsoft Train Simulator, Microsoft Space Simulator, and Microsoft Combat Flight Simulator
Training simulation
Virtual Air Traffic Simulation Network
X-Plane (simulator)
References
External links
Microsoft Flight Simulator Insider – An official Microsoft site.
https://www.xbox.com/en-US/games/microsoft-flight-simulator
Microsoft franchises
Flight Simulator
General flight simulators
Video game franchises
Video game franchises introduced in 1982
Windows games
Interactive Achievement Award winners
|
259022
|
https://en.wikipedia.org/wiki/IRCAM
|
IRCAM
|
IRCAM (French: Ircam, , English: Institute for Research and Coordination in Acoustics/Music) is a French institute dedicated to the research of music and sound, especially in the fields of avant garde and electro-acoustical art music. It is situated next to, and is organisationally linked with, the Centre Pompidou in Paris. The extension of the building was designed by Renzo Piano and Richard Rogers. Much of the institute is located underground, beneath the fountain to the east of the buildings.
A centre for musical research
Several concepts for electronic music and audio processing have emerged at IRCAM. John Chowning pioneered work on FM synthesis at IRCAM, and Miller Puckette originally wrote Max at IRCAM in the mid-1980s, which would become the real-time audio processing graphical programming environment Max/MSP. Max/MSP has subsequently become a widely used tool in electroacoustic music. Many of the techniques associated with spectralism, such as analyses based on fast Fourier transforms, were made practical by technological contributions at IRCAM. For instance, researchers at IRCAM have developed a special microphone capable of isolating each of the cello's four strings for separate amplification or electronic treatment. Along with tools for sound synthesis and analysis, IRCAM has played an instrumental role in developing programs for visualization of musical form with the creation of OpenMusic, a Lisp-based visual programming language.
IRCAM provides classes to train composers in music technology. Composers who do not have programming experience to create the technology end of a piece for ensemble and electronics are provided with an assistant who helps them to realise technically intensive parts of the piece. The assistant will follow the conceptual advice of a composer with no technology experience to realize a computer part, or will help a composer who can program in Max/MSP to make their "patch" more efficient and elegant. Tristan Murail's Désintégrations is an example of a piece realized in this program by a composer with significant technological skill, whereas Harrison Birtwistle's The Mask of Orpheus required an active and creative role for the technology assistants, such as Barry Anderson and Ian Dearden.
A cultural centre for musical modernism
Apart from electroacoustic programmes, IRCAM has programmes in contemporary classical music. It has disseminated music of post World War II modernist musicians such as that of Luciano Berio or Pierre Boulez, as well as younger performers and composers. Musical spectralism such as that of Tristan Murail, has also received support from IRCAM. Murail taught at IRCAM for a time. Kaija Saariaho, whose work has been influenced by spectralism, has also been supported by IRCAM.
IRCAM has also helped to develop various performance models. A resident ensemble of IRCAM, Ensemble InterContemporain, specialised in contemporary classical music, where each performer could be called upon to perform solo literature or ensemble literature. The Ensemble InterContemporain has been a model for many large ensembles in Europe, for example the Ensemble Modern and Klangforum Wien. Many classical contemporary pieces have been written for the chamber orchestra section of Ensemble InterContemporain.
There are regular concerts at IRCAM.
History
In 1970 President Georges Pompidou asked Pierre Boulez to found an institution for research in music. In 1973 the section of the building underneath was finished, and IRCAM opened in 1977. From the outset, Boulez was in charge of the institute. The initial administrators included Luciano Berio, Vinko Globokar, Jean-Claude Risset, and Max Mathews. 1990 Ircam established the Cursus Program for young Composers, a training in Computer Music and Composition. In 1992 Boulez, who then became honorary director, was succeeded by . In 2002 the philosopher Bernard Stiegler became the new head of the institute. On January 1, 2006, Stiegler became Director of Cultural Development at the Centre Pompidou and was replaced by .
The creation of IRCAM coincided with the rise of the debates about modernism and postmodernism in culture and the arts.
Its multimedia library was established in 1996. It is one of the first music hybrid libraries to have been created with close to 1000 hours of recorded music and over 2,000 scientific articles available online, in addition to its physical collections of sheet music and books on music and related domains.
Several international conferences have been held at IRCAM:
ICMC, the yearly International Computer Music Conference, in 1984
ISMIR 2002, the 3rd international conference on music information retrieval, in October 2002
NIME-06, the 6th International Conference on New Interfaces for Musical Expression, in June 2006
Acanthes, a yearly summer festival and series of composition workshops started in 2012
Research and development teams
Instrumental acoustics
Room acoustics
Music therapy
Musical perception and cognition
Analysis/synthesis
Music representations
Free software and software engineering
Sound design
Online services
Software developed at IRCAM
Some software is being developed at IRCAM, such as OpenMusic, AudioSculpt, OMax, Spat, Modalys, Antescofo and Orchidée.
Orchidée is developed as a tool to aid in orchestral composition in which musical scores using traditional instruments are generated by imitating a target input sound. It is used in Jonathan Harvey's 2008 piece, "Speakings", a composition based on emulating speech patterns and inflections. Orchidée is capable of computing the complex combinatorial possibilities of an orchestra based on musical attributes such as dynamics and instruments, perceptual attributes such as brightness, and timbre models.
IRCAM software is distributed via a subscription-based Forum. As of 2011, IRCAM Forum has 534 members including individual artists and art institutions around the world. IRCAM Forum members gather yearly at IRCAM for workshops regarding new technologies developed at IRCAM and elsewhere.
There are also partnerships with companies such as Cycling 74 (Max/MSP) and Flux:: (IRCAM Tools) for the development of proprietary software.
Notable works composed at IRCAM
Hanspeter Kyburz: ΟΥΤΙΣ, music theatre for ensemble and electronics (2000–12)
Georges Aperghis: Machinations, musical spectacle for four women and computer (2000)
Clarence Barlow: Çogluotobüsisletmesi, versions for piano (1978), magnetic tape (1980), and piano with tape (1980)
George Benjamin: Antara for ensemble and electronics (1986–87)
Luciano Berio: Chemins ex V, for clarinet and 4C computer (1980)
Luciano Berio: Orpheo II, opera for voice, orchestras, and tapes (1984)
Luciano Berio: La Voix des voies, spectacle-exposition for tape and diaporama (1977)
Harrison Birtwistle: The Mask of Orpheus (1986)
Pierre Boulez: Anthèmes II, for violin and electronics (1997)
Pierre Boulez: Dialogue de l'ombre double, for clarinet and tape (1985); version for bassoon and electronics (1995)
Pierre Boulez: ...explosante-fixe..., version for two flutes, MIDI-flute, electronics, and orchestra (1993)
Pierre Boulez: Répons, for six soloists, chamber ensemble, electronic sounds, and live electronics (1981–84)
John Cage: Roaratorio, an Irish Circus on Finnegans Wake (1980)
Unsuk Chin: Double Bind? for violin and electronics (2006)
John Chowning: Stria, for magnetic tape (1977)
Chaya Czernowin: "Hidden", for string quartet and electronics (2014)
Edison Denisov: Sur la Nappe d'un étang glacé, for nine instruments and tape (1991)
Luis de Pablo: Tornasol (1980–81)
Michel Decoust: Interphone, for soprano and tape (1977)
Jacob Druckman: Animus IV (1977)
Pascal Dusapin: To Be Sung, chamber opera in 43 numbers (1992–93)
Karlheinz Essl: Entsagung (1993) for ensemble and electronics
Lorenzo Ferrero: Ombres (1984) for ensemble and live electronics
Luca Francesconi: Etymo (1994)
Rolf Gehlhaar: Pas à pas, for tape and spatialization equipment (1981)
Gérard Grisey: Les Chants de l'Amour, for twelve mixed voices and magnétic tape (1982–84)
Georg Friedrich Haas: Les temps tiraillés, for 2 violins, bassoon, and electronics (2008)
Jonathan Harvey: Advaya, for cello and electronics (1994)
Jonathan Harvey: Bhakti (1982)
Jonathan Harvey: Mortuos Plango, Vivos Voco, for concrete sounds treated by computer (1980)
Jonathan Harvey: Ritual Melodies, for magnetic tape (1990)
Jonathan Harvey: String Quartet No. 4 with live electronics (2003)
Jonathan Harvey: Speakings, for orchestra and live electronics (2008)
York Höller: Antiphon, for string quartet and tape (1977)
York Höller: Arcus (1978)
York Höller: The Master and Margarita, opera in two acts after the novel by Mikhail Bulgakov (1989)
York Höller: Résonance (1982)
Jean-Michel Jarre: Oxygène (1976)
Panayiotis Kokoras: Morphallaxis (2008) for ensemble and electronics
Barbara Kolb: Millefoglie (1985)
Philippe Leroux: M for ensemble and electronics
Michaël Lévinas: Rebonds (1993)
Magnus Lindberg: Joy for orchestra and electronics
Magnus Lindberg: Related Rocks for two pianos, two percussionists, and electronics (1997)
Magnus Lindberg: Ur (1986)
Luca Lombardi: Hasta que caigan las puertas del odio, for choir (1977)
Tod Machover: Soft Morning, City!, for soprano, contrabass and tape (1980)
Tod Machover: VALIS, opera for six voices, 4X computer, and images (1986–87/1988)
Mesías Maiguashca: Fmélodies, for ensemble and tape (1982)
Philippe Manoury: Jupiter for flute and live electronics
Philippe Manoury: Pluton for piano and live electronics
Philippe Manoury: En Echo for soprano voice and live electronics
Yan Maresz: Sul Segno, for harp, guitar, cymbalon, contrabass and electronic equipment (2004)
Tristan Murail: L'Esprit des dunes, for chamber ensemble (1993–1994)
Emmanuel Nunes: Lichtung I (1988/1991)
Emmanuel Nunes: Lichtung II, for chamber ensemble and electronics (1996)
Michael Obst: Kristallwelt, for Ensemble and Electronics (1983)
Robert H.P. Platz: Pièce noire, for thirteen musicians and tape (1990)
Henri Pousseur: Liège à Paris (1977)
Horațiu Rădulescu: Incandescent Serene, for contrabass and tape (1982)
Roger Reynolds: The Angel of Death, for solo piano, chamber orchestra, and six-channel computer-processed sound (2001)
Roger Reynolds: Archipelago, for orchestra and magnetic tape (1983)
Terry Riley: Salome Dances for Peace, for string quartet (1986)
Jean-Claude Risset: Inharmonique, for soprano and tape (1977)
Jean-Claude Risset: Mirages, for six musicians and tape (1978)
Jean-Claude Risset: Songes (1979)
Manuel Rocha Iturbide: Transiciones de Fase, for brass quartet and electronics (1994)
Frederic Rzewski: Instrumental Studies (1977)
Kaija Saariaho: Lonh, for soprano and electronics (1995–96)
Kaija Saariaho: NoaNoa, for flute and electronics (1992)
Karlheinz Stockhausen: Kathinkas Gesang als Luzifers Requiem, version for flute and 6-channel tape (1985)
Marco Stroppa: In cielo, in terra, in mare, radiophonic opera on texts by Adolfo Moriconi (1992)
Jukka Tiensuu: Nemo for ensemble (1992)
Alejandro Viñao: Epitafios, for mixed choir and electronics (1999)
David Wessel: Antony (1977)
David Wessel: Contacts Turbulents, for saxophone and electronics (1986)
Trevor Wishart: VOX-5, an electroacoustic piece based around extended vocal techniques (1986)
James Wood: Mountain Language, for alphorn, cow bells, MIDI keyboard and electronics (1998)
Iannis Xenakis: Psappha, electronic version (1976/1996)
Frank Zappa: Perfect Stranger (1984)
Hans Zender: Lo Shu III, for flute and twenty-four instrumentalists (1979)
Affiliations
IRCAM is part of a consortium with Stanford's Center for Computer Research and Acoustics (CCRMA) and the Center for New Music and Audio Technologies (CNMAT) in Berkeley, California.
See also
, Stockholm
GRIM (), Marseille
SDIF (Sound Description Interchange Format), developed at IRCAM and CNMAT
STEIM (Studio for Electro Instrumental Music), Amsterdam
WORM, Rotterdam studio and venue
List of music software
References
Sources
Further reading
Anderson, Julian. 1989. "Désintégrations." Within liner notes to Tristan Murail. Montaigne MO 782175.
Dearden, Ian. "The Electronic Music of The Mask of Orpheus." Within liner notes to The Mask of Orpheus by Harrison Birtwistle. NMC D050, 1997.
Machover, Todd (ed.). 1984. "Musical Thought at IRCAM". Contemporary Music Review 1, part 1. London: Harwood Academic Publishers. ISSN 0749-4467
Peyser, Joan. 1976. Boulez: Composer, Conductor, Enigma. New York: Schirmer Books.
External links
Official site of IRCAM.fr
Brahms.IRCAM.fr – database of contemporary music
Research institutes in France
Experimental music
Electronic music organizations
Contemporary music organizations
Organizations established in 1970
Renzo Piano buildings
Pierre Boulez
Music organizations based in France
|
32383545
|
https://en.wikipedia.org/wiki/Retargetable%20graphics
|
Retargetable graphics
|
Retargetable graphics (abbreviated as RTG) is a device driver API mainly used by third-party graphics hardware to interface with AmigaOS via a set of libraries. The software libraries may include software tools to adjust resolution, screen colors, pointers, and screenmodes. It will use available hardware and will not extend the capabilities in any way.
The Amiga OS 3.x intuition.library is limited to 8-bit display depths, but RTG libraries make it possible to handle higher depths such as 24 bits; on Amiga there are two common APIs: Picasso 96 and CyberGraphX, which are almost compatible with each other. Both Picasso 96 and CyberGraphX require at least 4 MB RAM and a 68020 CPU to operate.
EGS and other early graphics card drivers
Although Commodore planned to introduce retargetable graphics in future version of AmigaOS (4.0), the company was not able to deliver such solution before its demise. Third-party graphics card manufacturers were thus forced to create their own software layers on top of AmigaOS, incompatible with each other.
Most of these early Amiga graphics card drivers shared common limitations: compatibility with current applications was maintained by opening Workbench (or also other application screens, also known as "Workbench emulation") on the graphics card—usually in 16 (under AmigaOS 2.x) or 256 colours (under AmigaOS 3.x); full graphics card features like high-colour (15- or 16-bit) and true-colour (24- or 32-bit) display could be used only by applications directly programmed for such driver software. Earliest of these solutions like Grafexa and SAGE libraries were able to display only their own applications on the graphics card without any support for "Workbench emulation". Examples of other drivers are EGS, Merlin/Domino, Omnibus, Retina (which should be able even to display Workbench in 24 bit colour), Graffity, Picasso, and ProBench. Of these, Picasso offered good compatibility with older applications, because most OS-compliant programs could be promoted to graphics card display, and relatively strong software support. ProBench (by ProDev) was released as a new "Workbench emulator" for the old Merlin graphics card in 1994, and version 3 (1996) introduced 16 bit colour depth and compatibility with CyberGraphX.
Enhanced Graphics System (EGS) was developed by Viona Development using the Cluster language (a Modula-2 derivative) for Piccolo and Spectrum graphics boards, supporting screen depths up to 24 bits. It requires a minimum of RAM and of hard disk space. EGS was first presented with the EGS 110/24 card (GVP) at the World of Commodore/Amiga show in New York in April 1992. It supported a broader range of graphics cards than other drivers and was seen by some Amiga magazines as the next RTG standard for Amiga, but its compatibility with most Amiga applications was limited.
CyberGraphX
CyberGraphX (pronounced "cybergraphics" and often abbreviated as "CGX"), is a retargetable graphics API for the Amiga and compatible computer systems developed by Thomas Sontowski and Frank Mariak and later adopted by Phase5 for use with their graphics cards. Many other graphics card manufacturers that offered hardware for Amiga and compatible systems also used it.
Introduced in 1995 with the CyberVision64 graphics card (Phase5), CyberGraphX was the first RTG software to allow full true-colour screens for Workbench and applications—older solutions supported only 256 colours (e.g. Picasso) or a four-colour Workbench with some 24-bit windows (Retina). CyberGraphX quickly eclipsed all older graphics card drivers and by 1995 was acclaimed as the best solution for displaying Workbench and other applications. Being available free of charge for users of supported cards, it became the de facto RTG standard for Amiga. CyberGraphX V4 was the last release for AmigaOS; MorphOS uses CyberGraphX V5.
Supported graphic cards
These graphic cards are supported by CyberGraphX:
Picasso96
Picasso96 is the RTG device driver library set used by the Picasso IV and other graphics boards. Its development was started in 1996 by Village Tronic, and it is compatible with CyberGraphX. Although the first releases were ridden with bugs and stability problems, by version 1.17 most issues with Picasso96 were corrected. Compatibility with CyberGraphX was also improved.
Picasso96 was selected as the RTG standard for AmigaOS 4, at first released as a 68k binary in AmigaOS 4.0 pre-release, with a full PowerPC port following later in 2004 in the next OS update. AmigaOS 4.1 Final Edition (2014) integrated RTG functions directly into graphics.library.
Supported graphic cards
These graphic cards are supported by the Picasso96 system.
Picasso96 as used by AmigaOS 4 supports also Voodoo 3, Voodoo 4/5, and Radeon R100, R200, R300, R520 (X1000 Series), R700 (HD 4000 Series), HD 5000 (Evergreen) series, HD 6000 (Northern Islands) series, and HD 7000 (Southern Islands) series. The RadeonHD AmigaOS 4 driver is created and maintained by Hans de Ruiter. Ongoing development of the driver for the AmigaOS platform being exclusively funded and owned by A-EON Technology Ltd.
In 2017, rights on the Picasso96 system for classic 68K Amiga Systems were bought by Individual Computers (iComp). iComp added features such as multi-monitor support in version 3.1.0 (Amiga OCS/ECS/AGA screen and RTG screen active at the same time).
RTG Master
The higher level API was created by Steffen Haeuser for developing 2D and 3D games requiring chunky graphics. RTG Master supports both graphics cards (with CyberGraphX, Picasso II, Picasso96 or EGS compatible drivers) and the Amiga chipset (ECS or AGA). An example of game using RTG Master is Genetic Species.
See also
AmigaOS graphics
References
Amiga APIs
|
7741081
|
https://en.wikipedia.org/wiki/Goodbye%20Girl%20%28Miyuki%20Nakajima%20album%29
|
Goodbye Girl (Miyuki Nakajima album)
|
is the 16th studio album by Japanese singer-songwriter Miyuki Nakajima, released in November 1988.
The album includes "Namida", her own rendition of a song Nakajima originally wrote for Kiyoshi Maekawa. The song released as a single before the album came out was the first material which was co-produced by Ichizo Seo, who has been her long-term collaborator since then.
The album debuted at number one on the Oricon Chart.
Track listing
All songs written by Miyuki Nakajima.
"" – 4:22
"" – 4:40
"Megami" – 4:53
"" – 4:59
"" – 3:59
"" – 4:10
"" – 6:10
" -Made in Tears" – 5:08
"" – 6:33
Personnel
Miyuki Nakajima – Lead and backing vocals
Ichizo Seo – keyboards, backing vocals, computer programming
Tsuyoshi Kon – electric guitar
Hideo Saitō – electric guitar
Chuei Yoshikawa – acoustic guitar
Chiharu Mikuzuki – bass guitar
Kenji Takamizu – bass guitar
Yasuo Tomikura – bass guitar
Nobuo Kurata – keyboards
Yasuharu Nakanishi – keyboards
Ken Shima – keyboards
Elton Nagata – keyboards
Tatsuhiko Mori – computer programming
Keishi Urata – computer programming
Nobuhiko Nakayama- computer programming
Toshihiko Furumura – tenor sax
Kazuyo Sugimoto – backing vocals
Jun Aoyama – drums
Hideo Yamaki – drums
Toru Hasebe – drums
Fairlight CMI, TR-707 – programming drums
Tomota Group – strings
Masatsugu Shinozaki – electric violin
Chart positions
References
Miyuki Nakajima albums
1988 albums
Pony Canyon albums
|
56756676
|
https://en.wikipedia.org/wiki/Ghost%20Squad%20Hackers
|
Ghost Squad Hackers
|
Ghost Squad Hackers or by the abbreviation "GSH" is a politically motivated hacktivist team responsible for conducting cyber attacks on central banks, Fox News and CNN, leaking sensitive data of the United States Armed Forces, leaking sensitive data of the Israeli government, hijacking Afghanistan's Chief Executive's Twitter account, and much more. Led by the administrative de facto leader known as s1ege (Leet for "siege"). The group's prime intent and focus is embedded on anti-governmental and organization cyber protests within current involvements of media speculation and real life happenings in 2016 to present.They are also a team in and part of the hacktivist group Anonymous.
List of attacks on governments and organizations
Defacements of the Ethiopian government
In January 2016, GSH started its very first attacks by the defacing of Ethiopian government websites in response to the killing of nearly 500 students and activists by Ethiopian Security Forces during protests that became extremely violent was involved in the latter part of 2015 and then sparked again between August and October in 2016 Ethiopian protests.
Attacks on Donald Trump
On May 21, 2016 GSH targeted Donald Trump's official website by launching Distributed Denial of Service (DDoS) attacks for what they saw as racist comments made towards refugees and Mexicans. Shortly after targeting Trump's official website GSH shut down Trump's hotel collection websites.
Attacks on the Israeli Defense Force
The group gained more notoriety after having successfully leaked data of the Israeli Defense Force on April 7, 2016. This was the day #OpIsrael was launched along with Anonymous, leaking the Database of Israel Defense Force posting thousands of IDF soldiers, border patrol, and Israeli Air Force personnel information online.
Attacks on the Ku Klux Klan
On April 23, 2016 GSH targeted the Loyal White Knights of the Ku Klux Klan by taking their websites down in the protest of racism while Anonymous vs. KKK protests were happening in the state of Georgia, U.S.A.
Attacks on Black Lives Matter
In 2016, GSH took down the official website of Black Lives Matter, claiming the organization fueled further racism.
Attacks on Banks
GSH and Anonymous worked in correlation together when "Operation Icarus" was first launched in February 2016. The op was aimed at attacking the central banking system which the attackers accused the banks with corruption and wanted to raise public awareness. This attack sparked the invitation of more hacking teams and affiliations of Anonymous to focus their attention towards that of the Central Banks in direct regards of further scrutiny and cyber attacks.
Ghost Squad Hacker's leader s1ege claimed responsibility for the attacks which were carried out on the Bank of England email server and dozens of other banking websites including the New York Stock Exchange, Bank of France, Bank of Greece, Bank of Jordan and the Bank of South Korea, among others. s1ege went on to state that they want to "start an online revolution" to retaliate against the "elite banking cartels putting the world in a perpetual state of chaos." Hundreds of banks were targeted in this operation and to this day the exact number of banks affected is unknown.
Attacks on CNN, Fox News
Notoriety of the group continued to escalate as the heat was turned up during the month of June, 2016. After censoring of media coverage in regards to OpIsrael, OpSilence was initiated targeting mainstream media outlets such as CNN and Fox News.
Data leakage of the U.S Armed Forces/Military
A data dump was later leaked after hacking the United States Military personnel files and releasing information on close to 2,437 army personnel. The information contained in the link was uploaded to an onion link on the dark web along with a paste-bin link which contained credit card numbers and personal information on U.S. Army personnel.
Defacement of Baton Rouge City government website
July 19, 2016 the sub domain of Baton Rouge City government website was hacked twice in one day by GSH after previously making news after attack towards both the KKK and BLM. These attacks however were targeting the City of Baton Rouge, Louisiana in protest against police brutality in which a city native Alton Sterling was shot and killed by Baton Rouge police officers on the 5th earlier that month. The Baton Rouge website was defaced along with a picture of Alton Sterling with a message that read, "Being black is not a crime! This is for the shooting of Alton Sterling, just because he's black does not mean he is a bad guy. You will pay. We are the justice. We are Ghost Squad Hackers. /R.I.P. Alton Sterling".
Attacks on the Afghanistan government and its officials
Later in the same month GSH took over the official Twitter account of Afghanistan's Chief Executive Dr. Abdullah Abdullah in an effort to raise awareness against corruption and alleged drug deals between Afghanistan and the U.S. They also targeted the Afghan Public Credit Registry website by defacing it which also further allowed them access to several social media accounts including Dr. Abdullah's in which they tweeted,
"Afghanistan Gov Hacked by GhostSquadHackers #CheifExecutiveOfficer Can you hear me now? twitter.com/afgexecutive. We found an exploit in the government server and pulled every login we could. We have more also but Dr. Abdullah was not using phone restriction and 2FA was not enabled".
The attacks on the Afghan government continued relentlessly on the first of September after prior targeting of Afghanistan's Chief Executive Twitter account, GSH further assaulted the government by defacing twelve websites in one day all of which were affiliated with the Afghan government. This included the Afghanistan's Ministry of Justice, the Ministry of Defense, the Ministry of Foreign Affairs, the Ministry of Refugees and Repatriations, and the Afghan Attorney General's Office. Further assaults continued in hopes of raising awareness for Palestine as part of OpSilence and OpIsrael after shutting down the Israeli Prime Minister and the Bank of Israel.
Operation Decrypt ISIS
The group's focus in 2017 shifted slightly towards targeting ISIS and removing them off the internet and social media completely. A multitude of accounts from Facebook, Twitter, and Telegram alike were hacked and added to an extensive list of ISIS removed. Further efforts by GSH later revealed bomb instructions and plans to be carried out by ISIS.
s1ege stated "We really do not care about attacking the U.S. elections. They've already been hacked. We mostly hack ISIS" in an interview with CBS news in the year 2018.
On February 12, 2019 s1ege released a massive leak on Islamic State Telegram and WhatsApp group's/channel's administrators. The leak included hacked phones/mobile devices, hacked Telegram accounts, hacked Facebook's, hacked Twitter accounts, credit cards, geolocation data, government issued ID cards, and IP logs belonging to the administrators. The group successfully infiltrated the Islamic state community on encrypted communication applications and exposed the administrators by using malware and exploits. The leak was published on mega.nz and Ghost Squad Hackers Official Twitter account. One of the Telegram and WhatsApp Admins (Riffat Mahmood Khan) was a former taxi driver living in Auburn was linked to ISIS and accused of administering the group's encrypted messages. He traveled to Syria in support of the Islamic State in 2015. He returned from the conflict zone via Turkey six months later, and was promptly picked up by Australian Federal Police officers at the airport as he flew in, in September 2015. Video footage from the raids obtained by The Herald showed his wife and the children being led away from the home by uniformed police, while officers swarm on the Auburn home. He is believed to not have actually participated in the fighting in Syria, but spent time there with the radical group before returning and allegedly continuing his work for the Caliphate. The man remained involved with the Islamic State's encrypted online messaging and continued to take care of the WhatsApp and Telegram groups that the radical Islamic group uses to communicate internally and for recruiting. Documents leaked by GSH showed that several of the accused ISIS supporter's children were enrolled in local Islamic school Al Bayan. He attended South Granville mosque Al Noor, where some sources suggest he became radicalized. Images from his hacked phone exposed by GSH depicted the ISIS flag flying above Venice, explosions, blood-stained knives, children brandishing ISIS flags, a meme saying 'One bullet away from Paradise' and critically wounded soldiers. Leaked data from GSH showed one Belgian (Siraj El Moussaoui), known to be an ISIS supporter, had a video on his phone about how to most effectively behead someone. Siraj El Moussaoui tried in vain to join the Islamic State in 2016 and was arrested shortly after on suspicion of plotting an attack in Belgium.
Defacements of the Indian Government
There's been a large number of defacements to government sites as well as root ownership of an Indian Government server and also leaked data from the Australian government. Cited attacks in April 2020 included places such as Australia, India and various other governments. The Twitter feed of GSH has shared a multitude of alleged attacks on various government websites during the pandemic using hashtags associated with previous campaigns of #FreeJulianAssange.
In June the group claimed responsibility for the hacking of other Indian government websites in protest against the internet ban in Jammu and Kashmir.
GSH gave warning in a LiveWire interview saying “To the people of Jammu and Kashmir, we will support your efforts and continue to back you through this pandemic and tyrannical government's grip. If India's government is persistent, we will be more persistent and consistent. No region/state/ethnic group should not have access to the internet, not even limited access. These are basic civil rights and liberties.”
Defacements of the European Space Agency (ESA)
The group defaced the European Space Agency (ESA) website https://business.esa.int in July of this year. GSH claimed the attack was just for fun. They explained that they exploited a server-side request forgery (SSRF) remote code execution vulnerability in the server, then they gained access to the business.esa.int server and defaced it. Having no interest in leaking any data their intent was solely to show the server was vulnerable. Within a week of hacking the business domain of the ESA they defaced the https://space4rail.esa.int website as well.
Defacements of Idaho State websites
Later in the month of July on the 27th GSH successfully targeted Idaho state websites servers locking agencies out of their own servers. Idaho Government websites targeted included the Idaho supreme court, Idaho court, Idaho Parks and Recreation, Idaho STEM Action Center, and were victims to the group. The sites were used to broadcast messages referencing Julian Assange, founder of WikiLeaks, who was charged with violating the Espionage Act. The messages read “Free Julian Assange! Journalism is not a crime.”
Data leakage on various Sheriff/Police departments
September 3, 2020 - GSH claimed responsibility for the breach of the Vermont Sheriff's Association, which resulted in a data leak of names, addresses, financial data and communications between/to various Vermont sheriffs. The leaked data was published in retaliation to the shootings of various individuals who fell victim to police brutality; including George Floyd, Jacob Blake, and Breonna Taylor.
References
Hacker groups
Hacking in the 2000s
Anonymous (hacker group)
Cybercrime
|
60894830
|
https://en.wikipedia.org/wiki/Oppo%20R7s
|
Oppo R7s
|
OPPO R7s is a line of Android-based smartphone manufactured by Oppo that were released in October, 2015. OPPO R7 series has all-metal flashing, the fit and finish and the arcs towards its display edges. OPPO Company developed after OPPO R5s. However, the phone was discontinued with the release of more developed version like OPPO R15 and OPPO R17. The phone offers an improved screen, battery and design comparing to the pervious phones. Reviewer had a mix review. Its design and battery quality were universally praised, also, its display received the positive feedback after tests. Reviews had both positive and negative comments, with no finger print sensor or face ID like Apple system. This would result insecurity of personal privacy.
Evolution of OPPO R series
Design
The OPPO R7s provide three visions of silver, gold, and rose gold.
The OPPO R7s feature a 5.5-inch 1080p AMOLED screen, a lightweight design, an ultra-narrow 2.2mm frame, a fuselage thickness of 6.9 mm, a reoptimized side arc and a more delicate back touch, giving it an excellent grip. The appearance of the OPPOR7s has changed slightly, with OPPO's Logo, touch button added to the front and bottom of the phone to become a virtual key, while there are no physical keys on the front of the phone, front camera, receiver, and light sensor are all at the top. At the same time, the mobile phone adopts a three-stage all-metal fuselage design, with a rear camera in the upper left corner of the back and a flash below it.
Mobile has a 5.5 display and a screw resolution of Full HD (1080 x 1920 pixels) as it runs in Android v5.1.1 (Lollipop) operating system. The device is powered by Octa Core, 1.5 GHz, and 4GB of Ram is paired with Cortex A 53 processor. OPPO R7s does not have a finger print system. The phone had an Adreno 405 GPU for graphical performance which makes the games run smoothly. The phones has a storage of 32 GB with the option to expand up to 128GB.
Hardware
Battery life
The OPPO R7s comes with a 3070mAh lithium battery that supports VOOC flash charging for 5 minutes and 2 hours of calls, while Samsung Galaxy A7 only has 2600mAh battery in 2015. In addition, compared to iPhones, iPhone 7s comes with 2900mAh, iPhone 8s comes with 2675 mAh and iPhone X comes with 2716mAh. Unlike other companies, Apple never publish their battery capacity figures. Normally, they will release them later when tech enthusiasts get their hands on the devices.
Since OPPO launched Find7 in 2014, almost all of its main models have fully supported VOOC flash technology. OPPO R7s, as a major product of OPPO in the second half of 2015, can't miss the VOOC flash, because if let them recharge for 30 minutes. OPPO R7s can reach 75% electric quality with 20W while iPhone XR only has 50% with 18W adapter.
Camera
The OPPO R7s camera is combined with a front 8 million pixels and a rear 13 million pixels, which supports phase focusing and global flash system. In contrast to iPhone, all of them have a 7 million pixels because of the same basic specs for the front camera and 12 million pixels for the rear camera. The OPPO R7s uses a ‘Flash Shot’ technology, as the camera only needs 0.1 seconds to focus, which allows the phone to take a shot very quickly, comparing to the iPhone 6s, which is also similar. The OPPO R7s have a good all rounder shot, however there are still some areas that the phone's camera can improve. Tests have shown that the camera's dynamic range is ‘noisy’ and the focus is not always fast, which iPhone 6s performs better as well as Lumia 950XL and Samsung Galaxy S6 series. One of the flaws on OPPO R7s camera is that under low light conditions the speed of the shutter reduced significantly as very steady hands are needed to avoid blur image. Moving on to the front camera, its 8MP with f/2.4 aperture, as the camera is able to offer a reasonably wide angle for small groups. Comparing to iPhone, the front camera is 5MP to help and improve image quality, however, both rear and front cameras has HDR mode, filters, timer and flash. The video system on OPPO R7s can be set to 720p, with realistic and cool colors, comparing to iPhone which can capture 4k video at 30 frames per second.
Software
OPPO R7s runs Color OS 2.1, which is the latest version of OPPO software, based on Android 5.1 lollipop. Anyone familiar with Color OS will know that the experience on OPPO R7s is very different from the usual Android experience. Of course, everything would operate with the same way. However, every re-designed elements are contributed a purpose. For example: when sliding between tabs in the setting menu, the text will slide out of the screen. This would depend on where the finger is on the screen. Also, Color OS provides other function, such as: setting for eye protection display. This can make the screen become the pink color, which is great for the users with sensitive eyes. There are also a lot of gestures, including adjust the volume by using two fingers and lock the screen by double-clicking the home button.
In addition, because OPPO R7s comes with a Samsung AMOLED display, it has a vibrant color display. In the black scene, OPPO R7s can be achieved without luminous characteristics, compared to the IPS screen will have a better performance. In terms of the system, the screen hardware is further combined, such as: theme, setting interface, system popover and other aspects of black tone processing, to ensure that the power consumption of the screen can be further reduced. Despite the official use of black style, the choice is really up to the consumers. Moreover, there are many details, among which it is worth explaining is the strengthening of localization features, including the addition of yellow function, which can quickly check the relevant number, including express, life, catering and so on. At the same time, the system also identifies harassing calls and malicious phone charges.
Reviews
Advantages
One of the most features is OPPO R7s magnesium-aluminum alloy unibody construction. Similar to the other two phones named OPPO R7 and OPPO R7 plus, the OPPO R7s have a unibody design with full metal which feels solid in hand. Similar to R7 Plus, it lacks capacities navigation keys which allows for a more comfortable managing experience. Another best key features is for its design, especially dual-SIM dual-standby capability of OPPO R7s, which comes with a double edge: using the R7s either with a microSIM and a microSD or a microSIM and a nanoSIM. If you are switching from a device reliant on the nanoSIM — like say an iPhone 5 or 6, or a Samsung Galaxy S6 — you have this format, and when you throw this in the tray, you are actually slotting it into the section that handles both the microSD and the nanoSIM. Compared to iPhone 6s, the height and width of it is 138.3 mm and 67.1 mm respectively, while OPPO R7s is bigger than iPhone 6s at 151.8 mm and 75.4 mm. Also, display is also a feature for OPPO R7s. The resolution of it is 750x1334 pixels, while the resolution of OPPO R7s is 1080x1920 pixels which provides full HD. And the pixel density of OPPO R7s is over 400 ppi, which is higher than iPhone 6s's at 326 ppi. Furthermore, OPPO R7s has memory card of microSD and its memory ram is 4 GB, which is twice than that of iPhone 6s's. Finally, OPPO R7s has great battery life compared with other phones, for example iPhone 6s, which has 1715 mAh. OPPO R7s includes a feature called VOOC (Voltage Open Loop Multi-step Constant-Current Charging) this allows the phone to charge from 1% to 100% in just 35 minutes.
Disadvantages
Oppo has made a fair amount of mid-range models designed to take the fight to its premium competitors, but the Oppo R7s feels like a mid-ranger sitting in the middle of a bunch of other mid-rangers. There's the Oppo R7 with similar hardware and a smaller screen, the Oppo R7 Plus with similar hardware and a bigger screen, and then there's this phone — the R7s — which kind of sits in between both. However, OPPO R7s still has some things should be improved. The phones does not have a finger print system, which weakens the security system. Also contrast with iPhone 6s, OPPO R7s is lack of NFC (Near Field Communication) when iPhone 6s has Apply Pay and FM radio were a major disappointment of the smart phone. Although the Oppo R7s can record high-resolution 1920 x 1080 movies, it is hard to find any evidence of the R7s featuring an HDMI port, which is convenient to watch HD videos on your shiny HDTV. Furthermore, sealed battery, microSD slot shared with second SIM has a negative side. The slot of the mobile phone card is a multi-function slot shared by SD card and SIM, the correct installation position of the Nano SIM card should be perpendicular to the position of Micro SIM, but the icon on the back of the phone is not obvious, and it is easy for the new users to install by mistakes. Lastly, the variants for OPPO R7s only has one type for customers which is 32 GB, however, compared to iPhone 6s, it has kinds of storages. This gives customers more choices.
Limitations and comparison to other models
The OPPO R7s has 4GB of RAM, its Geekbench 3 single core is only 696, comparing to Google Nexus 5X's 1188 and Apple iPhone 6S's 2540, which all have better performance. Firstly, for security reasons there is an increasing need for a finger print system to protect individual's privacy. Secondly, the operating system still needs to improve. The confusion being that shortcuts and home screen focus is lost in OPPO's Colour OS system, which meant that your programs are not shortcuts as you remove one, you will move the entire thing. Thirdly, there is also a bug called ‘misoperation prevention’ error, when an individual hold their phone from the top. Fourthly, although the phone has a dual SIM slot, however if one has a Nano SIM, this means that one would not get micro SD access. Most importantly, the camera system needs to improve on the phone, as the phone's camera starts to blur in low light and the quality of the images starts to fade. Also, OPPO's VOOC charger could be for charging up OPPO R7s, however the charger rejects to charge other phones such as Samsung, Sony and LG phones as it would be inconvenient to charge multiple device at once. Lastly, the phone's speaker is place at the bottom of the phone; this means that if one wants to hold the phone in landscape orientation to play a game or watch a video, the finger of the user might cover the sound which is inconvenient.
References
External links
What's OPPO?
Official website
Android (operating system) devices
R7s
CyanogenMod
Mobile phones introduced in 2015
Discontinued smartphones
|
784730
|
https://en.wikipedia.org/wiki/Active%20object%20%28Symbian%20OS%29
|
Active object (Symbian OS)
|
An active object framework is a callback-based form of multitasking for computer systems. Specifically, it is a form of cooperative multitasking and is an important feature of the Symbian operating system.
Within the framework, active objects may make requests of asynchronous services (e.g. sending an SMS message). When an asynchronous request is made, control is returned to the calling object immediately (i.e. without waiting for the call to complete). The caller may choose to do other things before it returns control back to the operating system, which typically schedules other tasks or puts the machine to sleep. When it makes the request, the calling object includes a reference to itself.
When the asynchronous task completes, the operating system identifies the thread containing the requesting active object, and wakes it up. An "active scheduler" in the thread identifies the object that made the request, and passes control back to that object.
The implementation of active objects in Symbian is based around each thread having a "request semaphore". This is incremented when a thread makes an asynchronous request, and decremented when the request is completed. When there are no outstanding requests, the thread is put to sleep.
In practice there may be many active objects in a thread, each doing its own task. They can interact by requesting things of each other, and of active objects in other threads. They may even request things of themselves.
This is an implementation of a very old idea that was developed to handle software interruptions in the 70s. The operating system was acting as the first object and the peripheral as the second one.
External links
developer.symbian.org
Symbian OS
|
30226344
|
https://en.wikipedia.org/wiki/Discontinued%20Archos%20products
|
Discontinued Archos products
|
The French consumer electronics company Archos manufactured a number of products which have since been discontinued.
Handheld and portable Computers with x86 compatible processors
ARCHOS 10 netbook
In January 2009, Archos released their first netbook, the Archos 10, following the naming scheme of the IMT players. It is a standard netbook featuring the intel Atom N260 CPU, a 10.2" WSVGA screen, 1GB of RAM, a 160GB Harddrive, and Windows XP. It is a rebranded Hasee MJ125, but includes additional anti-virus, multimedia, and productivity software. It is no longer available on their website.
A variant netbook, the ARCHOS 10s, featured a silver case in place of the ARCHOS 10's black shell.
Handheld computers with ARM-compatible processors
Generation 4
The Generation 4 series is an upgrade to the previous AV Series. The eight models include the 404, the 504, the 604, the 604 WiFi, and the 704 WiFi. All players in this series are Microsoft PlaysForSure compatible.
The Generation 4 players were modular, with the unit base priced cheaply and additional features available at extra cost. The add-on DVR Station and DVR Travel Adapter, sold separately, allowed video recording from sources including satellite, cable, and terrestrial television, as well as DVD players. The players included some working video codecs, but licensing costs meant support for MPEG-2/VOB videos with Dolby 5.1 Sound (AC3) sound and H.264 with AAC sound were not included as standard.
Documentation of the series' processor core and operating system is scant. The 404, 504 and 604 are known to use a TI DaVinci processor of type DM644x, combining an ARM9 and a DSP processor. For the 700 models a TI DM420 (no further details found in public) might serve as the CPU. For the rest of the models no documentation is available, though parts of the firmware loader were licensed under GPL and thus published. A single source claims the OS to be Windows Mobile on all models.
Generation 5
On June 14, 2007, Archos released details of the new flagship 605 WiFi, and of new 105, 405, and 705 players.
The 605 Wifi and 405 officially went on sale on September 1, 2007. The 605Wifi comes in 30GB, 80GB, and 160GB models as well as a 4GB model with an added SDHC slot. There is also a DSGi (Electrical Retailer) model specific to the United Kingdom which has a 40GB Hard Drive. The 405 comes in 2GB with SDHC slot. A 30GB version was added later.
The 105 included some video capabilities but was still pitched mainly as a small and affordable MP3 player. The 705 uses a similar design to the 704 with a slimmer profile and new 5th Gen features.
The main upgrade in this series was the addition of the Archos content portals (ACP). The Opera web browser was made optional, and support for Adobe Flash, facilitating online video streaming, was implemented. Firmware 2.1.04 was released on May 27, 2008 which allowed YouTube and Google Video streaming.
Archos TV+
The Archos TV+ was a standalone Digital Video Recorder station from Archos. It performed similarly to an Archos player with a DVR dock, and included a Qwerty remote for navigation and internet use.
The device was announced alongside the Generation 5 players. The Archos TV+ was released in January and received initial reviews at the 2008 Consumer Electronics Show.
Generation 6
On August 19, 2008, Archos announced their 6th generation portable media players with WiFi and cellular 3G internet capabilities.
Labeled as "Internet Media Tablets" or "IMTs" for short, they shipped with a full-function Presto-based web browser, vTuner-based web TV and radio applications requiring registration. These devices used a built-in hard disk for storage, with capacities of 60, 120, 160, and 250 GB; while the Archos 7 is available in 160 and 320 GB capacities and the Archos 5G is in 30 GB. Though similar to the Archos 5, the Archos 5G features 3.5G HSDPA wireless connectivity.
Archos 5 Internet Media Tablet
Being an Internet Media Tablet this device utilizes a unique Linux OS.
Specifications
Processor based on ARM Cortex-A8, 32 bit, dual-issue, superscalar core @ 600 MHz
128 MB of RAM
4.8" display, 800x480 resolution
Video Playback
Music Playback
Storage: 30gb - sfr 3g 1.8" hdd, 60GB - 250GB with 2.5" hard drive (ext3 file-system for system partition, FAT32 for storage)
ARCHOS 7 internet media tablet
The Archos 7 was A 7" version of the Archos 5 internet media tablet, running on the same system.
Specifications
7" display, 800x480 resolution
Video Playback
Music Playback
Storage: 160 or 320GB with 2.5" hard drive
Digital Cam Corders, Audio/Video Players and PDAs with limited or no Internet Connectivity
AV series
The AV300 was released Monday March 22, 2004, and weighs 12.3 ounces (350 g).
The optional AVCam 300 turns the device into a digital camera and camcorder, with other selective addons available such as an FM radio remote control (which also enables radio recording) and a memory card reader. The battery life of the device is stated at 3 and a half hours when watching video or 10 hours when listening to music.
The AV400 runs the same software as AV300, the camera has been removed and a CompactFlash card slot has been built directly into the product. Image preview slides and DRM WMA support, as well as WMV access are also included.
The AV500 came just before the PMA400 was released; there was a name conflict within the models. The PMA400 was scheduled to be released as the AV500. Ultimately, the name went to a new model of Digital Video Recorder (DVR). The Archos AV500 is similar to the GMini 500, but it has extra facilities (video recording and the new AV Pod).
With the release of the AV700, Archos changed the company slogan from "Think Smaller" to "On The Go". In 2006, Archos developed the TV-Edition from the AV700, the AV700TV.
PMA400
The PMA400 is a PDA (Personal Digital Assistant) with a hard disk drive, audio and video playback, and recording capabilities.
It was released on Thursday May 26, 2005, and weighs 280 g.
The PMA400 was the most expensive within the line of products that they supplied. The product runs the Linux based Qtopia Embedded operating system.
Archos 2
The Archos 2 was replaced by the "24 vision" from the "vision line".
Specifications
Internal Storage Available in 8 GB and 16GB*
Expandability MicroSD / MicroSDHC card slot
Compatibility Windows or Mac and Linux (with mass storage support)
Computer Interface USB 2.0 High Speed
Screen Color 1.8'' - 128x160 pixels
Battery 10 hours music, 4 hours video
Video Playback AVI (conversion needed)
Music Playback MP3, WMA
Photo Playback JPEG
Recorder Records voice through the built-in microphone
Other Selectable sound equalizer presets, Multilanguage Interface
Extras Reads text files (.TXT) & lyrics files (.LRC)
Physical Dimensions: 84mm x 41mm x 9mm, Weight: 50 grams
Gmini series
This products series was introduced in October 2004. Its members are the Gmini 400, the 402, the AV500, the 120 and the XS100.
Gmini 400 has a color LCD screen as well as photo, audio and video playback capacities.
The Gmini 402 replaced the Gmini 400 featuring PlaysForSure compatibility. The Gmini 402 Camcorder was later introduced which includes a 1.2MP (Megapixel) digital camera, and has video recording capabilities, with up to a 2x digital zoom. The player also holds 3 resolution modes, which enables users to choose size over quality, as well as recording directly into MPEG4 in VGA resolution.
Just after the release of the AV500, the Archos Gmini 500 was released. It also has full support for Windows Media's PlaysForSure system which allows users to play DRM restricted music.
The Gmini 120 cannot play DRM-protected WMA files, and was also released as Archos Gmini SP. There is also an optional FM radio attachment available for this player so users can play and record directly from FM radio.
The Gmini XS 100 group of players features a 1.5" screen, and full PlaysForSure capabilities. The Gmini XS 200 has a monochrome screen that supports gapless playback. It was replaced by the Gmini XS 204, which adds a color screen and image viewing capabilities.
Jukebox series
The Archos Jukebox 6000 was one of Archos' first portable media players, containing a 6 GB hard drive. This player is only MP3 compatible, and was bundled with Musicmatch Jukebox to allow users to rip their music collection onto the jukebox. The Jukebox Studio succeeded the Jukebox 6000.
The Archos Jukebox Recorder was similar to the Player/Studio models, but featured recording capabilities.
The Archos Jukebox Multimedia is the first official portable media player, which enabled users to upload digital camera content via accessory card readers that connected directly to the device's expansion port. It also featured an audio and video player, an image viewer, and appropriate AV cables included. The player also has the ability to record audio from a line-in source straight into MP3 format. The player features a 10 or 20 GB hard drive and uses DivX MPEG4 format for video recording and playback.
Audio/Radio Devices
FM Recorder
Similar to the Recorder model, but featured a Li-Ion battery, an FM tuner and a slightly different case. 60 grams less weight.
Recorder v2
Similar to the FM Recorder model, but featured no FM tuner (some of the earliest V2 models did in fact feature an FM tuner although it was not advertised nor used by the original firmware).
Ondio SP
A flash-based MP3-player with bit-mapped 112x64 LCD. It is powered by three AAA-cells and features an MMC expansion slot and 128MB of internal memory. It is the smallest MP3 player in the Archos lineup.
Rockbox is supported on the Ondio devices.
Ondio FM
Similar to the Ondio SP model but also features an FM tuner and recording capabilities.
Portable Storage Devices
Though PVPs are their primary market, Archos has also released a number of different portable storage devices over the years. Their last devices were the ArcDisk series from 2005.
Commodore Amiga Peripherals
In the mid 1990s, Archos produced a range of peripherals for the Commodore Amiga range of computers.
ColorMaster
The Archos ColorMaster was a graphics card for the Amiga 500, that increased the number of colours that could be displayed on the screen.
Dual Video Port
The Archos Dual Video Port was a board that added a second RGB video port to the Amiga 4000.
Avideo24
The Avideo24 was a graphics card for the Amiga 3000.
Overdrive
The Overdrive was an external hard disk for the Amiga 600 and Amiga 1200.
Overdrive CD
The Overdrive CD was an external CD-ROM drive for the Amiga 600 and Amiga 1200.
Amen32
The Amen32 was a RAM expansion card for the Amiga 1200. It also provided a socket for an FPU.
Add500 and Add2000
The Add500 and Add2000 were a SCSI controllers with FAST RAM expansion for the Amiga 500 and Amiga 2000 respectively.
Notes
Computer hardware by company
|
69570895
|
https://en.wikipedia.org/wiki/Infinix%20Hot%209%20Pro
|
Infinix Hot 9 Pro
|
The Infinix Hot 9 Pro is an Android based smartphone released in June 2020 by Infinix. It is a budget smartphone with Android 10. It comes with 4 GB RAM and 64 GB internal storage.
Specifications
Main Camera
The Infinix Hot 9 Pro has a 48 MP camera, a 2 MP depth camera, a 2 MP macro camera and a QVGA (low light sensor) camera. It can record video in 1080p @ 30fps. It also has Quad-LED flash, HDR and panaroma.
Selfie camera
The Infinix Hot 9 Pro has a 8 MP single selfie camera that can also record video in 1080p @ 30fps. It also has a LED flash.
Operating system
The Infinix Hot 9 Pro comes with Android 10 operating system based on XOS 6.0.
Hardware
The Infinix Hot 9 Pro has a Mediatek Helio P22 (12 nm) chipset, Octa-core 2.0 GHz Cortex-A53 CPU and PowerVR GE8320 GPU.
Memory
The Infinix Hot 9 Pro has 64GB internal storage and 4GB RAM. It also supports microSDXC card.
Battery
The Infinix Hot 9 Pro has a 5000 mAh lithium polymer non-removable battery.
Display
The Infinix Hot 9 Pro has a 6.6 inch IPS LCD display with ~266 ppi density. Its resolution is 720 × 1600 pixels, and ratio is 20:9.
Body
The Infinix Hot 9 Pro's dimensions are 165 x 76.8 x 8.7 mm. Its weight is 185 g (6.53 oz) and it has plastic frame and plastic back.
Connectivity
The Infinix Hot 9 Pro supports Wi-Fi, Bluetooth, GPS, and FM Radio. It also supports 2G, 3G and 4G LTE LTE networks.
See also
Infinix Mobile
XOS (operating system)
References
Infinix mobile phones
Android (operating system) devices
Mobile phones introduced in 2020
Mobile phones with multiple rear cameras
Smartphones
|
209452
|
https://en.wikipedia.org/wiki/Open%20Firmware
|
Open Firmware
|
Open Firmware is a standard defining the interfaces of a computer firmware system, formerly endorsed by the Institute of Electrical and Electronics Engineers (IEEE). It originated at Sun Microsystems, where it was known as OpenBoot, and has been used by vendors including Sun, Apple, IBM and ARM. Open Firmware allows the system to load platform-independent drivers directly from a PCI device, improving compatibility.
Open Firmware may be accessed through its command line interface, which uses the Forth programming language.
Open Firmware is described by IEEE standard IEEE 1275-1994, which was not reaffirmed by the Open Firmware Working Group (OFWG) since 1998 and has therefore been officially withdrawn by IEEE.
Several commercial implementations of Open Firmware have been released to the Open Source community in 2006, including Sun OpenBoot, Firmworks OpenFirmware and Codegen SmartFirmware. The source code is available from the OpenBIOS project. Sun's implementation is available under a BSD license.
Features
Open Firmware defines a standard way to describe the hardware configuration of a system, called the device tree. This helps the operating system to better understand the configuration of the host computer, relying less on user configuration and hardware polling. For example, Open Firmware is essential for reliably identifying slave I2C devices like temperature sensors for hardware monitoring, whereas the alternative solution of performing a blind probe of the I2C bus, as has to be done by software like lm_sensors on generic hardware, is known to result in serious hardware issues under certain circumstances.
Open Firmware Forth Code may be compiled into FCode, a bytecode which is independent of instruction set architecture. A PCI card may include a program, compiled to FCode, which runs on any Open Firmware system. In this way, it can provide boot-time diagnostics, configuration code, and device drivers. FCode is also very compact, so that a disk driver may require only one or two kilobytes. Therefore, many of the same I/O cards can be used on Sun systems and Macintoshes that used Open Firmware. FCode implements ANS Forth and a subset of the Open Firmware library.
Being based upon an interactive programming language, Open Firmware can be used to efficiently test and bring up new hardware. It allows drivers to be written and tested interactively. Operational video and mouse drivers are the only prerequisite for a graphical interface suitable for end-user diagnostics. Apple shipped such a diagnostic "operating system" in many Power Macintoshes. Sun also shipped an FCode-based diagnostic tool suite called OpenBoot Diagnostics (OBDiag) used by customer service support and hardware manufacturing teams
Access
On Sun SPARC systems, the Open Firmware interface is displayed on the console terminal before the bootstrapping of the system software. If a keyboard is connected, the main video display will be used as the console terminal and Open Firmware can be re-entered at any time by pressing () on the keyboard. If no keyboard is connected, then the first serial line on the system is usually used as the console and Open Firmware is re-entered by sending a "Break" on the serial line. While the system software is running, various Open Firmware settings can be read or written using the eeprom command.
On a PowerPC-based Macintosh, the Open Firmware interface can be accessed by pressing the keys at startup ( if using standard PC USB keyboard). Intel-based Macintoshes do not use Open Firmware; they use Extensible Firmware Interface. Also, early versions (before the PowerBook 3400) connect Open Firmware's input and output to the Modem port by default. This functionality is generally only used by developers or troubleshooting I.T. personnel; for common users, the Mac OS X operating system provides a high level graphical user interface to change commonly used Open Firmware settings. For instance, it is possible to specify the boot disk or partition without directly using the Open Firmware interface, but with some limitations (e.g. it is not possible to select boot from USB mass-storage devices, but Open Firmware allows iMac to boot using boot ud:,\\:tbxi command). Other Open Firmware settings can be changed using the nvram command while the system software is running.
On Pegasos, the interface is accessed by pressing at startup.
On IBM Power Systems, Open Firmware ("ok" prompt) can be accessed through the SMS Boot Menu. SMS Boot Menu can be accessed by pressing or during the boot sequence, after hardware checking, and just before the OS boot.
On the OLPC XO-1 laptop, Open Firmware access requires a developer key, that can be obtained after registration with OLPC. After installing the key, upon each power-on, the boot countdown can be interrupted with (the upper left key) to get to the Forth prompt.
See also
BIOS
Libreboot
Coreboot
Das U-Boot
Input/output base address
OpenBIOS
Power-on self-test
UEFI
References
External links
OPEN FIRMWARE HOME PAGE (via Internet Archive)
Sun's SPARC OBP documentation
The last IEEE 1275 text
Firmworks OpenFirmware source code
Codegen SmartFirmware source code
Boot Process on IBM POWER (via Internet Archive)
OFW FAQ on OLPC Wiki
Aurora SPARC Linux OBP reference guide (via Internet Archive)
Quick Reference
TinyBoot aka Tiny Open Firmware: an embeddable OpenFirmware-like system for small CPUs (via Internet Archive)
Firmware
Sun Microsystems software
IEEE standards
Macintosh firmware
BIOS
Open-source hardware
MacOS
Forth programming language family
|
342528
|
https://en.wikipedia.org/wiki/Laurie%20Spiegel
|
Laurie Spiegel
|
Laurie Spiegel (born September 20, 1945) is an American composer. She has worked at Bell Laboratories, in computer graphics, and is known primarily for her electronic-music compositions and her algorithmic composition software Music Mouse. She also plays the guitar and lute.
Spiegel was seen by some as a pioneer of the New York new-music scene. She withdrew from this scene in the early 1980s, believing that its focus had shifted from artistic process to product. While she continues to support herself through software development, Spiegel aims to use technology in music as a means of furthering her art rather than as an end in itself. In her words, "I automate whatever can be automated to be freer to focus on those aspects of music that can't be automated. The challenge is to figure out which is which."
Spiegel's realization of Johannes Kepler's "Harmonices Mundi" was chosen for the opening track on the "Sounds of Earth" section of the golden record placed on board the Voyager spacecraft in 1977. Another work, titled "Sediment", was included in the 2012 film The Hunger Games.
She has been inducted into the National Women's Hall of Fame.
Education
Spiegel's early musical experiences were largely self-directed, beginning with the mandolin, guitar, and banjo she had as a child, which she learned to play by ear. She taught herself Western music notation at the age of 20, after which she began writing down her compositions.
Spiegel attended Shimer College through the school's early entrance program, which allows students to enter college without having completed high school. She subsequently attended Oxford University, initially through Shimer's Oxford study abroad program, under which students spend a year continuing the Great Books core curriculum in Oxford while taking tutorials from Oxford.
After receiving her BA degree in the Social Sciences from Shimer in 1967, Spiegel stayed in Oxford an additional year, commuting to London to study guitar, theory and composition with John W. Duarte. After moving to New York, where she briefly worked in social sciences research and documentary film, she went on to study composition with Jacob Druckman, Vincent Persichetti and Hall Overton at the Juilliard School from 1969 to 1972, privately with Emmanuel Ghent, then she relocated along with Druckman, to whom she was composer's assistant, to Brooklyn College, completing her MA in Music Composition there in 1975 as well as pursuing research in early American music under the direction of H. Wiley Hitchcock.
Career
Best known for her use of interactive and algorithmic logic as part of the compositional process, Spiegel worked with Buchla and Electronic Music Laboratories synthesizers and subsequently many early, often experimental and prototype-level music and image generation systems, including GROOVE system (1973–1978), Alles Machine (1977) and Max Mathews's RTSked and John R. Pierce tunings (1984, later known as the Bohlen–Pierce scale) at Bell Labs, the alphaSyntauri for the Apple II (1978–1981) and the McLeyvier (1981–1985).
Spiegel's best known and most widely used software was Music Mouse—an Intelligent Instrument (1986) for Macintosh, Amiga, and Atari computers. The "intelligent-instrument" designation refers to the program's built-in knowledge of chord and scale convention and stylistic constraints. Automating these processes allows the user to focus on other aspects of the music in real time. In addition to improvisations using this software, Spiegel composed several works using Music Mouse including "Cavis muris" in 1986, "Three Sonic Spaces" in 1989, and "Sound Zones" in 1990. She continued to update the program through Macintosh OS 9, and as of 2012, it remained available for purchase or demo download from her Web site.
In addition to electronics and computer-based music, Spiegel's opus includes works for piano, guitar and other solo instruments and small orchestra, as well as drawings, photography, video art, numerous writings and computer software. In the visual domain, Spiegel wrote one of the first drawing or painting programs at Bell Labs, which she expanded to include interactive video and synchronous audio output in the mid-1970s.
Pursuing her concept of visual music, she was a video artist in residence at the Experimental Television Lab at WNET Thirteen in New York (1976). She composed series music for the TV Lab's weekly "VTR—Video and Television Review" and audio special effects for its 2-hour science fiction film The Lathe of Heaven, both under direction of David Loxton.
In addition to computer software development, starting in the early 1970s, Spiegel supported herself by both teaching and by soundtrack composition, having had steady work throughout the 1970s at Spectra Films, Valkhn Films, the Experimental TV Lab at WNET (PBS), and subsequently for various individual video artists, animators, and filmmakers. Spiegel did much less accompanitive music in the 1980s, during which she focused on creating music software and consulting in the music technology field, as well as additional teaching at Cooper Union and NYU where she established NYUs' first computer music studio. For her work she received a Foundation for Contemporary Arts Grants to Artists award (2018).
In 2018 Spiegel's early Music for New Electronic Media was part of the Chicago New Media 1973-1992 Exhibition, curated by jonCates.
Discography
The Expanding Universe (1973-8). 2012. Greatly expanded 2-cd rerelease of Spiegel's 1980 LP containing over 2½ hours of music created at Bell Telephone Labs during the 1970s.
60x60 (2006-2007) released 2008. A two-CD compilation of 60-second works from the 60x60 project.
Ooppera, 2004. An album of 10-minute operas created from processed animal sounds.
Harmonices Mundi (1977, released 2004). A realization of Kepler's vision of planetary motion.
The P-ART Project - 12 Portraits, 2001. 12-composer compilation including Spiegel's "Conversational Paws".
Obsolete Systems, 1991. A retrospective of Spiegel's work through the 70s and 80s, performed on currently obsolete electronic instruments.
OHM: The Early Gurus of Electronic Music, 2000. 3-CD compilation featuring Spiegel's 1974 Appalachian Grove.
Miniatures 2 - a sequence of sixty tiny masterpieces, 2000. A 60-artist compilation soundtrack of Dan Sandin's video A Volume of Julia Sets.
Female of the Species, a 2-CD compilation of female experimental composers
Enhanced Gravity, 1999. Compositions as well as text and multimedia art by Spiegel, also featuring multimedia art by 9 others.
Cocks Crow, Dogs Bark: New Compositional Intentions, 1998. Companion CD of Leonardo Music Journal #7, featuring The Unquestioned Answer, described in that journal.
Women in Electronic Music - 1977, 1977, re-released 1998. Compilation CD of women in electronic music.
Computer Music Journal Sound Anthology, 1996. Companion CD to the 20th Anniversary Issue of Computer Music Journal
Unseen Worlds, 1991, re-released 1994. Works by Laurie Spiegel.
The Virtuoso in the Computer Age - III, 1993. Compilation CD of four electronic artists, featuring Spiegel's Cavis Muris (1986).
Murmurs of Earth: The Voyager Interstellar Record, 1992. Music from Sounds of Earth produced to be sent up on the Voyager spacecraft, containing on excerpt of Harmonices Mundi.
New American Music Vol. 2. Out of print LP.
The Expanding Universe, 1980. Contains 4 pieces created using the GROOVE system at Bell Labs. Re-released with additional material in 2012.
Music for New Electronic Media, 1977. Early works by several electronic composers.
Notes
References
External links
"Writings About Laurie Spiegel" page on Laurie Spiegel website
Resident Visitor: Laurie Spiegel's Machine Music by Simon Reynolds
Writings on technology and the arts by Laurie Spiegel
Biography on Vox Novus
Joanna Bosse, "Laurie Spiegel". Grove Music Online (subscription access).
EMF Media: Laurie Spiegel, by Kyle Gann
Interview from 1979, including complete versions of Patchwork, Waves, The Orient Express and Expanding Universe
IMDB Listing of Laurie Spiegel film soundtracks
Laurie Spiegel Interview NAMM Oral History Library (2017)
Interview with Laurie Spiegel on sexmagazine
Interview with Laurie Spiegel on Tokafi
The Different Computer of Laurie Spiegel on radiom
Rare ’70s Electronic Music Is Hidden in The Hunger Games on Wired
1945 births
20th-century classical composers
21st-century American composers
21st-century classical composers
American electronic musicians
American women classical composers
American classical composers
Living people
Pupils of Jacob Druckman
Shimer College alumni
American women in electronic music
Scientists at Bell Labs
20th-century American women musicians
20th-century American composers
21st-century American women musicians
Brooklyn College alumni
20th-century women composers
21st-century women composers
Musicians from Chicago
|
23437187
|
https://en.wikipedia.org/wiki/Softwarepark%20Hagenberg
|
Softwarepark Hagenberg
|
The Softwarepark Hagenberg is the Austrian technology park for software, located in Hagenberg im Mühlkreis, Austria, founded in 1989 by Professor Bruno Buchberger. The Softwarepark Hagenberg is a unique collaboration where research, business and education are intensively cooperating. Because of its success, the park has been called the "Wunder von Hagenberg" (miracle from Hagenberg).
History
Buchberger devised the concept for the park in 1989. It was created to balance both economic needs and desire for research and as such, the concept focused one third on economic production, one third on research and one third on academic education in the field of IT and related sciences. These three components drive a synergetic "spirale of innovation". Softwarepark has four main partners: The Province of Upper Austria, the Johannes Kepler University Linz, the Community of Hagenberg, and Raiffeisen Landesbank Oberösterreich, a major local bank. The first institute to be established in the park was Buchberger's Research Institute for Symbolic Computation (RISC) with then 25 students and employees.
Today Softwarepark is increasing its international activities, e.g. with ISI - International Studies in Informatics Hagenberg or the recently launched International Incubator Hagenberg.
Within the twenty years of its existence, 100 million € were invested into developing the park.
Composition
The park currently houses 50 companies with more than 1000 employees as well as more than 1400 students of a number of universities and colleges, amongst them the Research Institute for Symbolic Computation, and the Software Competence Center Hagenberg SCCH funded by the Austrian COMET program.
Additionally, the park houses a social project for people with disabilities to provide computer support in cooperation with the Diakonisches Werk Gallneukirchen and the Fachhochschule Hagenberg.
Expansion
The current expansion schedule plans to expand the park with 20 million € in funds until 2012, with the expansion of the Research Institute for Symbolic Computation as well as a hotel, sport arenas and an international student union building. An additional 50 million € are planned to be invested until 2014 for the expansion of the companies and research institutes in the park.
Books
References
External links
Softwarepark Hagenberg website
1989 establishments in Austria
Science parks in Austria
Information technology places
Buildings and structures in Upper Austria
Economy of Upper Austria
|
1073302
|
https://en.wikipedia.org/wiki/OsCommerce
|
OsCommerce
|
OsCommerce (styled "osCommerce" - "open source Commerce") is an e-commerce and online store-management software program. It can be used on any web server that has PHP and MySQL installed. It is available as free software under the GNU General Public License.
History
OsCommerce was started in March 2000 in Germany by Harald Ponce de Leon. The open source project was known as The Exchange Project. In its infancy, osCommerce was referred to by Ponce de Leon as "a side thing" and "an example research study". By late 2001, a team formed for its development and in the words of Harald Ponce de Leon, this was the point the team started taking the project seriously.
By 2005, over 2000 websites used osCommerce, and in 2009 this amount grew to 13,000. In 2021, BuiltWith reports over 230,000 websites powered by osCommerce.
In 2021, the Holbi Group took over management of osCommerce from Ponce De Leon and have announced their intention to release 4.x,scheduled to be released in summer 2021
On the 16th of November, 2021, osCommerce v4 Beta 1 was released to the limited number of Beta testers
osCommerce v4 Beta 2 was released on the 26th of January, 2022 to multiple Beta testers
Official Version
The current version is 2.3.4.1.
Branches
Distributed under the GNU General Public License, osCommerce is one of the earliest PHP based Open Source shopping cart software distributions. It inspired the creation of many other online store platforms, such as Magento. It has also spawned a number of forks, such as Zen Cart, xt:Commerce, oscMAX and Phoenix.
Publicised vulnerabilities
In August 2011 three vulnerabilities in version 2.2 of the osCommerce system were exploited, allowing the addition of an iframe and JavaScript code to infect visitors to websites. Armorize reports this allowed infected web pages to hit 90,000 in a very short time until it was noticed and increasing further to 4.5 million pages within the space of a week.
OsCommerce 2.3 was made available in November 2011 and patched the exploited security holes.
See also
Comparison of shopping cart software
List of online payment service providers
References
Further reading
Watson, Kerry. The osCommerce Technical Manual. Victoria, BC Canada: On Demand Manuals. pp. 11–14 .
Gurevych, Vadym . osCommerce Webmaster's Guide to Selling Online. Birmingham, UK: Packt Publishing. p. 2 .
External links
OsCommerce
Free e-commerce software
Free software programmed in PHP
Content management systems
2000 establishments in Germany
2000 software
|
10937089
|
https://en.wikipedia.org/wiki/FAME%20%28database%29
|
FAME (database)
|
FAME (Forecasting Analysis and Modeling Environment) is a time series database from SunGard which comes along with a suite of APIs and domain-specific programming language.
History
The FAME software environment had several development phases during its long history.
Lawrence C. Rafsky founded GemNet Software Corp to create FAME in 1981. It was an independent software company located in Ann Arbor, Michigan. The first version of the software was delivered to Harris Bank in 1983. The company was purchased by CitiCorp in 1984. During this time, development focused on the time series oriented database engine and the 4GL scripting language.
Citigroup sold FAME to private investors headed by Warburg Pincus in 1994. Management focused on fixing bugs, developing remote database server access to FAME, and invested in expanding the FAME database engine. Emphasis was also placed on extending FAME by creating an object-oriented Java interface called TimeIQ that replicated many features of FAME 4GL in Java. This period also saw the release of accessPoint, which provides URL access to FAME objects in multiple output formats.
The acquisition of FAME by SunGard in 2004 resulted in a new set of priorities that focused on the core FAME engine and on extending the 4GL scripting language, including:
Modernizing the connections into the FAME database environment for better integration with other software
Support for service-oriented architectures (SOA) via the FAME Web Access middleware server
Creating workflow-oriented dashboards and wizards for extracting, transforming and loading data into FAME databases
Improving querying tools, including connectors to third-party applications
Extending managed content, including tools for building metadata on top of FAME databases
Another key goal has been to modernize the tools that support working in the FAME software environment. For example, developers have worked to leverage FAME Web Access and transform FAME into software that can be run as a service. This allows developers and architects to plug the online analytical processing capabilities of the FAME software into existing enterprise software and empower these internal systems to better handle the complex queries made by financial professionals.
Many FAME customers run the environment within an overall technology stack, providing improved access and wider distribution of data and analytics. Rather than access standalone FAME installations, these enterprise-oriented technology teams load FAME databases and procedures within a Multiple Client Analytical Database Server (MCADBS), providing access to FAME data via browser applications, Microsoft Excel, statistical applications and advanced reporting systems such as Crystal Reports.
In 2010, Sungard merged FAME and MarketMap Data into the MarketMap brand.
FIS Global acquired Sungard in 2015.
Fully managed content service
Early in FAME’s evolution, customers who obtained loaders from the company were required to build and maintain their own processes for loading vendor feeds. SunGard provides a service that delivers content throughout the day to FAME SiteServer, FAME Channel, and FInDS.
Toolkits and connectors
FAME Desktop Add-in for Excel:
FAME Desktop is an Excel add-in that supports the =FMD(expression,sd,ed,0,freq,orientation) and =FMS(expression,freq + date) formula, just as the 4GL command prompt does. These formulas can be placed in Excel spreadsheets and are linked to FAME objects and analytics stored on a FAME server. Sample excel templates for research and analytics, which act as accelerators for clients, are available in the template library.
The FAME Desktop Add-in was first renamed as FAME Populator, then MarketMap Analytics.
FAME Connector for MATLAB:
Matlab is an environment for technical computing applications that is also used in the financial sector by fixed income analysts, equity research groups and investment firms. Customers can store content in FAME and use Matlab to access and model their data. The Matlab-FAME Connector uses the FAME Java Toolkit to link Matlab scripts to FAME objects.
BITA Curve Connector:
The BITA Curve workstation provides a platform that can link to “in database” analytics and content warehoused in FAME. Through the BITA Curve Connector, FAME users can better visualize and work with the content that they warehouse into FAME.
R Interface:
FAME customers have developed and released as free software an interface that links FAME objects to the open source R statistical package. Originally developed at the Federal Reserve Board, features include:
Time series adaptation of FAME to R
Frequency conformance
A set of fundamental statistical functions
SASEFAME:
SAS provides an interface to FAME databases called SASEFAME. This provides dynamic read and write access between a SAS application and FAME databases or a FAME server process
TROLL Interface:
TROLL’s interface to FAME provides read and write access from a TROLL application to a FAME Server or directly to a local FAME database
Development timeline
1982–1994:
GemNet introduced the first release of FAME in 1983. CitiCorp purchased the company in 1984.
Development milestones during this period:
1990: First FAME Remote Database Server (FRDB) – master/dbback – released
1991: Data distribution services launched
1993: Multiple Client Analytical Database Server (MCADBS) released with FAME 7.5
Before MCADBS, users could not use a thin C HLI client to leverage the power of 4GL on a remote host via client/server TCP. The 7.5 release also introduced some important 4GL features, including PostScript Reports, and database features such as global names and formulas.
1994: FAME 7.6 made graphical and reporting enhancements as well as performance improvements.
Mid-1990s: Standard & Poor’s, Thomson Financial, DRI and FT Interactive Data product loaders created
1994–2004:
During this period, the focus was on improving managed content delivery to onsite FAME warehouses and hosted ASP FAME servers. Milestones included:
1997: MSCI and Russell product loaders added
1998: FAME 8.0 with FRDB write server released
FAME Populator 4.0 released
TimeIQ (now known as FAME Java Toolkit) beta 1 released. FAME created an object-oriented Java programming interface.
2001: FAME 9.0 increased the FAME database size limit from 2GB to 64GB.
2002: FAME 9.0 for Windows released
2003: FAME 9.0 ported to Linux
2004: accessPoint (now known as FAME Web Access) with connection pooling released
2004–present:
After being acquired by SunGard, FAME’s development focus shifted to the 4GL scripting language and core FAME features. Milestones included:
2004: accessPoint 1.5 released
August 2005: Enterprise FAME Java Toolkit 2.2 released
December 2005: referencePoint launched
March 2006: Support for 64 bit Linux and UNIX introduced in FAME 9.2
FAME 9.2 also added new 4GL debugging features, analytical functions, graphics and reporting improvements. Other core 4GL features included the MOVE function and new forms of the SHIFT and FILESPEC functions. The FAME SEARCH command was enhanced with the PATH option. Support for memory mapped FAME databases and TUNE CACHE MEGABYTES option helped users to better manage large volume warehouses.
2007: Pathfinder Global Formula run-time beta tested
June–September 2007: FAME 9.3 added new debugging features, including the DEBUG option and BREAK, STEP and CONTINUE commands.
FAME 9.3 also introduced new graphical features, including BUBBLE charts.
February 2008: accessPoint 1.7 with Web Services released
May 2008: SiteServer on Linux released
October 2008: FAME .NET Toolkit released
February 2009: FAME 10.0 released.
FAME 10 opens up the environment to real-time analysis with larger database storage,
as well as support for new frequencies, such as millisecond and weekly patterns.
New database formats increase maximum size to 256 GB.
During this period FAME has also focused on expanding the managed content delivered to the database, as well as out-of-the-box object models that warehouse builders can leverage when loading proprietary content.
Expanded managed content provides out-of-the-box data and object models for:
Equity pricing
Corporate bond pricing
Futures, commodities and options
Company and index fundamentals
Company and index estimates
Macro-economic indicators and benchmark construction
FAME 10 provides a number of enhanced features for creating object models, including
Support for longer object names (up to 242 characters) and for assigning unlimited number of user-defined attributes to an object
Support for object names with up to 35 dimensions
December 2010: FAME 10.1 released.
December 2011: FAME 10.2 released.
March 2012: FAME 11.0 released.
June 2012: FAME 11.1 released.
December 2012: FAME 11.2 released.
March 2013: FAME 11.3 released.
June 2014: FAME 11.4 released.
November 2015 : FAME 11.5 released.
See also
Time series database
References
External links
Sungard FAME site
Sybase Fame Relational Gateway Technical Overview
Database engines
Time series software
|
2143377
|
https://en.wikipedia.org/wiki/DigiKam
|
DigiKam
|
digiKam is a free and open-source image organizer and tag editor written in C++ using the KDE Applications.
Features
digiKam runs on most known desktop environments and window managers, as long as the required libraries are installed. It supports all major image file formats, such as JPEG and PNG as well as over 200 raw image formats and can organize collections of photographs in directory-based albums, or dynamic albums by date, timeline, or by tags. Users can also add captions and ratings to their images, search through them and save searches for later use. Using plug-ins, users can export albums to various online services including (among others) 23hq, Facebook, Flickr, Gallery2, Google Earth's KML files, Yandex.Fotki, MediaWiki, Rajce, SmugMug, Piwigo, Simpleviewer, Picasa Web Albums. Plug-ins are also available to enable burning photos to a CD and the creation of web galleries.
digiKam provides functions for organizing, previewing, downloading and/or deleting images from digital cameras. Basic auto-transformations can also be deployed on the fly during picture downloading. In addition, digiKam offers image enhancement tools through its KIPI (KDE Image Plugins Interface) framework and its own plugins, like red-eye removal, color management, image filters, or special effects. digiKam was the only free photo management application on Linux that could handle 16 bit/channel images, until RawTherapee version 4.0 was released in 2011, using a new 32 bits/channel engine for all internal image processing. Digital Asset Management is the mainstay of digiKam.
digiKam features XMP metadata; DNG format reading and writing; a database file that is independent of photo libraries, enabling remote paths, multiple roots and offline archives; Marble integration for geolocation; a non-modal image editor; and live search boxes in both sidebars and the main window.
History
digiKam has been in development since before 2006.
As of version 0.9 features include a GPS locator and synchronization, iPod Photo upload support, an advanced metadata editor, better support for raw image formats (using dcraw included in digiKam), full color management, a light-table, pan-tool in Image Editor and Preview mode, improvements in usability, and many new plugins.
digiKam 2.0 was released in July 2011, sporting a number of new features, including:
Face detection and recognition support
XMP sidecar support
Reverse geocoding
Image versioning
Pick Labels & Color Labels support to improve photographic workflow
Many new RAW decoding features
In August 2018 a beta version of DigiKam 6.0 was published. Improvements comprise support for video files used as photos, as well as new RAW and export options.
Face detection and recognition
Starting with version 2.0, digiKam has introduced face recognition allowing you to automatically identify photos of certain people and tag them. DigiKam's photo manager was the first free project to feature similar functionality, with face recognition previously implemented only in proprietary products such as Google Picasa, Apple iPhoto, and Windows Live Photo Gallery.
Face recognition was implemented in version 2.0 through the libface library, and from version 3.3 it is based on OpenTLD project work. Version 7.0.0-beta1 uses the Deep Neural Network module from the OpenCV library.
Other OS
Windows: digiKam is part of the KDE on Windows. The program can be installed with the digiKam-msvc library from KDE Installer.
There is an official port on Mac OS X that can be compiled from raw or using MacPorts.
Most Unix-like OSes are also supported.
Awards received
digiKam has been awarded the TUX 2005, 2008, and 2010 Readers' Choice Award in the category Favorite Digital Photo Management Tool.
See also
Comparison of image viewers
Shotwell – digital photo manager by GNOME
gThumb
Gwenview
KPhotoAlbum
List of free and open source software packages
References
External links
digiKam user wiki
Extragear
Free image organizers
Free photo software
Graphics software that uses Qt
KDE Applications
Linux image viewers
MacOS graphics software
Photo software for Linux
Windows graphics-related software
|
25045484
|
https://en.wikipedia.org/wiki/Multi-bearer%20network
|
Multi-bearer network
|
A multi-bearer network, or an MBN, is a network having the capability to carry a data packet via one of several alternative bearers. To be more precise, the term multi-bearer network should be interpreted as meaning ‘multi-bearer-type network’, or in other words, a network arrangement which provides multiple different bearer types for data packet delivery.
Background of multi-bearer network
An example of a suitable MBN is a concept known as Multimedia Environment for Mobiles (MEMO). Additionally, the MBN supports mobility of a subscriber terminal. An example of terminal mobility is IP mobility, which is the topic of standard by the IETF.
The problem underlying the invention is how to select the optimal bearer for each data packet in varying situations in a multi-bearer network. Data packets have different quality-of-service requirements. Situations may vary because the subscriber moves or the network load changes.
Brief summary of multi-bearer network
From the patent
Multi bearer network usage by companies
CyberVision
Huawei
PyCom
References
Mobility Support
Method for sending a data packet to a mobile node from a correspondent node via a multi-bearer network
Mobile Broadband Consumption and Multi-bearer Network Strategies
External links
Packet routing in a multi-bearer-type network
Telecommunications infrastructure
|
38799440
|
https://en.wikipedia.org/wiki/John%20Rosenberg%20%28academic%29
|
John Rosenberg (academic)
|
John Rosenberg (born 1953) is an Australian higher education consultant, professional Board Director, Australian academic, information technology (IT) professional and the former Senior Deputy Vice-Chancellor and Vice-President (Global Relations) at La Trobe University in Victoria, Australia.
Education
Rosenberg completed his Bachelor of Science with Honours at Monash University in 1975, and earned his Doctor of Philosophy in computer science in 1979, also at Monash. His PhD thesis was entitled The Concept of a Hardware Kernel and its Implementation on a Minicomputer.
Career and research
Upon receiving his PhD in 1979, Rosenberg worked as a lecturer in computer science and then as a senior consultant in the IT industry. He became a senior lecturer in the Department of Computer Science at Monash University before moving to the University of Newcastle, New South Wales, in 1986.
In 1989 he was awarded the position of S.E.R.C. Senior Visiting Research Fellow with the University of St Andrews in Scotland, after which he became an Associate Professor and Head of the Discipline of Computer Science at University of Newcastle in 1990. In 1991 he moved to the University of Sydney as Professor of Computer Science and became head of its Basser Department of Computer Science three years later in 1994. He returned to Melbourne in 1997 to take up the position of Dean of the Faculty of Information Technology, once again at Monash University.
He moved to Deakin University as Deputy Vice-Chancellor (Academic) in 2003, before coming to La Trobe University in 2009. He commenced as Deputy Vice-Chancellor and Vice-President (International and Development) at La Trobe in 2009 and in 2011 became Senior Deputy Vice-Chancellor, responsible for the university's internationalisation agenda. Rosenberg retired from his formal role at La Trobe University and was appointed an Emeritus Professor of La Trobe University in recognition of his contributions to the University and higher education. He now undertakes consulting in higher education and holds a number of roles as a non-executive director.
Rosenberg's research interests include integrated Java developments for teaching. Since 1995, his research in this area has involved developing and maintaining the integrated development environments BlueJ and Greenfoot. He also has a strong interest in the use of technology in education.
Honours
Rosenberg is a fellow of the Australian Academy of Technological Sciences and Engineering, the Australian Institute of Company Directors and the Australian Computer Society, and an Emeritus Professor of La Trobe University.
Publications
Kölling, M., Quig, B., Patterson, A. and Rosenberg, J. "The BlueJ System and its Pedagogy", Journal of Computer Science Education, Special issue on Learning and Teaching Object Technology, 13(4), December 2003, pp. 249–268.
Rosenberg, J., Dearle, A., Hulse, D., Lindström, A. and Norris, S. "Operating System Support for Persistent and Recoverable Computations", Communications of the ACM, 39, 9, September 1996, pp. 62–69.
Dearle, A., di Bona, R., Farrow, J. M., Henskens, F. A., Lindström, A., Rosenberg, J. ' and Vaughan, F. "Grasshopper: An Orthogonally Persistent Operating System", Computer Systems, 1994, pp 54–72.
Rosenberg, J., Keedy, J.L. and Abramson, D.A. "Addressing Mechanisms for Large Virtual Memories", The Computer Journal., 35, 4, August, 1992, pp 369–375.
Rosenberg, J., Ananda, A.L. and Srinivasan, B. "A Self-assessment Procedure for Operating Systems", Communications of the ACM, 33, 2,.February, 1990, pp. 190–201.
Kölling, M. and Rosenberg, J. "Guidelines for Teaching Object Orientation with Java", Proceedings of the 6th Conference on Innovation and Technology in Computer Science Education (ITiCSE 2001), ACM Press, Canterbury, 2001, pp. 33–36.
Rosenberg, J. and Kölling, M. "Testing Object-Oriented Programs: Making It Simple", in Proceedings of SIGCSE'97, ACM Press, San Jose, February, 1997, pp. 77–81.
Kölling, M. and Rosenberg, J. "An Object-Oriented Program Development Environment for the First Programming Course", Proceedings of SIGCSE'96, ACM Press, Philadelphia, 1996, pp. 83–87.
Kölling, M. and Rosenberg, J. "Blue - A Language for Teaching Object-Oriented Programming", Proceedings of SIGCSE'96, ACM Press, Philadelphia, 1996, pp. 190–194.
Personal life
Rosenberg founded Melbourne's first Masorti (Conservative) Jewish congregation, Kehilat Nitzan, in 1999. In 2011, the Australian Jewish News listed Professor Rosenberg in the top 50 most influential Australian Jews.
References
La Trobe University faculty
Australian Jews
Living people
Fellows of the Australian Institute of Company Directors
1953 births
|
2913296
|
https://en.wikipedia.org/wiki/Conway%20Berners-Lee
|
Conway Berners-Lee
|
Conway Maurice Berners-Lee (19 September 1921 – 1 February 2019) was an English mathematician and computer scientist who worked as a member of the team that developed the Ferranti Mark 1, the world's first commercial stored program electronic computer. He was born in Birmingham in 1921 and was the father of Sir Tim Berners-Lee, the inventor of the World Wide Web, and Professor Mike Berners-Lee, researcher into climate change.
Early and personal life
Berners-Lee was son of Major Cecil Burford Berners-Lee (1884–1931), of the Royal Field Artillery, and Helen Lane Campbell Gray (1895–1968). His mother was from Winnipeg, Manitoba, daughter of John Sidney Gray, M.D.
Berners-Lee died in February 2019 at the age of 97.
Career
Early in World War II whilst an undergraduate at Trinity College, Cambridge reading mathematics, Berners-Lee volunteered for the armed services, but was instructed to stay on to take parts I and II of the mathematical tripos as a compressed two-year course, because the government needed people trained in mathematics and electronics. In addition, he attended a series of lectures in electronics. After university, he had further training in electronic engineering and soon joined the army in the Corps of Royal Electrical and Mechanical Engineers (REME). He worked on Gun Laying and Searchlight Radar in England.
After the end of hostilities, Berners-Lee was posted to Egypt where he encountered Maurice Kendall's book The Advanced Theory of Statistics, which greatly impressed him. He then had a chance to join the statistics bureau in the GHQ in Cairo, known as the Number 1 Statistics Unit of the Royal Army Ordnance Corps. He was employed to close down a very large punched card installation involving about five million 65-column punched cards covering all types of vehicle and spares. This meant that they had to say goodbye to 30 women who had been punching the cards. The last job was sorting and listing the 250,000 personnel cards to get all the service people onto ships for home. There was a race with the clerks doing this job by hand—and the clerks won over the machines.
Berners-Lee was demobilised in 1947 with the rank of Major. He then worked on a punched card data processing system for the Plastics Division of Imperial Chemical Industries (ICI). He met his wife Mary Lee Woods at the Ferranti Christmas party in Manchester in 1952. She had been working as a programmer on the Ferranti Mark 1 and Mark 1 Star computers at the Department of Computer Science, University of Manchester since 1951. He joined Ferranti in 1953 working at Ferranti's London Computer Centre. They were married on 10 July 1954 at St Saviour's Church, Hampstead.
The following is an extract from Dominic Wilson's book Organizational Marketing.
In the 1950s it was not clear how computers could usefully be employed away from the field of mathematics. As well as statistics, Berners-Lee had acquired a knowledge of operations research (OR), and he showed himself to be good at devising worthwhile computer applications. He directed the development of routines for the basic data processing techniques of sorting and updating files. In 1956 he devised an application for planning the production of items from a variety of components, for example, animal feed products. In 1957 he published an article on machine loading. A report that he produced in 1964 listed 31 Ferranti projects that used OR techniques in a wide variety of businesses.
The business computing division of Ferranti was merged with International Computers and Tabulators (ICT) in 1963, and ICT was, in turn, merged with English Electric Leo Marconi (EELM) computers in 1968 to form International Computers Limited (ICL).
In 1960 Berners-Lee had evolved a technique for editing text—including hyphenation—for metal typesetting of printed material. As space in memory and backing store was a scarce and valuable resource in those days, he had also devised a procedure for compressing text, which in 1963 he sent to Bob Bemer at Univac.
In the late 1960s Berners-Lee led the Medical Development Team of ICT and then ICL. He was involved in some of the earliest developments in the applications of computers in medicine, and his text compression ideas were taken up by an early electronic patient record system.
Berners-Lee spent the 1970s developing and using a queuing network model for ICL's 'New Range' of computers (later the ICL 2900 Series) with Dr John Pinkerton who was responsible for optimising the price/performance of the new systems. It was known as FAST – standing for Football Analogy for System Throughput. The work done by each 'player' was derived from a system monitor file containing data for device and concurrency counts. He received much encouragement when Hughes and Moe at Norwegian University of Science and Technology, Trondheim, predicted the effect of increasing the memory on their Univac Installation. The model could also be used to predict throughput on a minute to minute basis – peaks being believed to be due to instability in the operating system. He retired in 1986.
References
External links
The National Archives: The Ferranti Collection including:
Linear Programming "Arrives". By Dr. D.G. Prinz & Mr C.M Berners-Lee of Ferranti Ltd. (Paper) 1996.10/6/12/28/10 1957
The Use of Electronic Computers in the Chemical Industry. By C.M. Berners-Lee 1996.10/6/12/28/28 1959
The Use of Computers for Optimal Planning. By C.M. Berners-Lee 1996.10/6/12/28/29 1959
Photograph with colleagues (under Ferranti and ICL)
An interview with Conway Berners-Lee from the British Library
1921 births
2019 deaths
20th-century English mathematicians
21st-century English mathematicians
Alumni of Trinity College, Cambridge
English computer scientists
Ferranti
International Computers Limited people
People from Birmingham, West Midlands
Royal Electrical and Mechanical Engineers soldiers
People associated with the Department of Computer Science, University of Manchester
British Army personnel of World War II
Royal Army Ordnance Corps soldiers
|
13559634
|
https://en.wikipedia.org/wiki/Journal%20of%20Information%20Technology%20%26%20Politics
|
Journal of Information Technology & Politics
|
The Journal of Information Technology & Politics is a quarterly peer-reviewed academic journal that was established in 2004 by Haworth Press as the Journal of E-Government. It obtained its current name in 2007 when the journal switched to Routledge. It is an official journal of the section on Information Technology & Politics of the American Political Science Association. The editor-in-chief is Stuart W. Shulman (University of Massachusetts Amherst). The journal covers research on the interaction of information technology with political and governmental processes. It is abstracted and indexed by Scopus.
External links
Computer science journals
Political science journals
Taylor & Francis academic journals
Quarterly journals
Publications established in 2004
English-language journals
|
640232
|
https://en.wikipedia.org/wiki/IBM%20ViaVoice
|
IBM ViaVoice
|
IBM ViaVoice was a range of language-specific continuous speech recognition software products offered by IBM. The current version is designed primarily for use in embedded devices. The latest stable version of IBM Via Voice was 9.0 and was able to transfer text directly into Word.
The most important process for the correct use of this software is the so-called ‘quick training, and ‘enrollment,: it consists of reading many specific words and sentences in order to make the software adapt itself to the specific users' sound and intonation features. It lasts for one hour or more and can be divided in many parts. Users are able to improve decoding accuracy, by reading prepared texts of a few hundred sentences. The recorded data was used to tune the acoustic model to that specific user. In addition, user specific text files could be parsed to tune the language model. Correction of mis-recognised words was also used to improve subsequent decode accuracy.
Editions
Individual language editions may have different features, specifications, technical support, and microphone support. Some of the products or editions available are:
Advanced Edition,
Standard Edition,
Personal Edition,
ViaVoice for Mac OS X Edition,
Pro USB Edition,
Simple Dictation for Mac.
The IBM Via Voice 98 TM has been available in the Home, Office and Executive Edition in the following languages:
Chinese, French, German, Italian, Japanese, Spanish, UK English, US English. The Executive Edition allows you to dictate into most Windows applications and control them using your voice.
Designed for Windows 95, 98 and NT 4.0, it has been working very well with Windows 7.
In the Executive package are included:
original software and user guide on CD-ROM;
quality headset with microphone by Andrea Electronics Corporation TM with a converter plug for Sound Blaster TM sound cards and ThinkPad TM;
printed voice command reference card;
telephone support for one month.
History
Prior to the development of ViaVoice, IBM launched a product in 1993 named the IBM Personal Dictation System (later renamed to VoiceType) which ran on Windows, AIX, and OS/2. In 1997, ViaVoice was first introduced to the general public. Two years later, in 1999, IBM released a free of charge version of ViaVoice.
In 2003, IBM awarded ScanSoft, which owned the competitive product Dragon NaturallySpeaking, exclusive global distribution rights to ViaVoice Desktop products for Windows and Mac OS X. Two years later, Nuance merged with ScanSoft.
See also
List of speech recognition software
References
External links
at IBM
ViaVoice
Speech recognition software
1997 software
Products and services discontinued in 2005
Discontinued software
|
48672026
|
https://en.wikipedia.org/wiki/The%20Story%20Begins
|
The Story Begins
|
The Story Begins is the debut extended play by South Korean girl group Twice. It was released by JYP Entertainment on October 20, 2015, through KT Music. It features six tracks, including the lead single, "Like Ooh-Ahh", which was composed by Black Eyed Pilseung and is a blend of several different genres.
Following the formation of Twice through the survival show Sixteen, which concluded in July 2015, the group made their official debut three months later. The group promoted their debut EP on several South Korean music show programs, with the EP meeting moderate commercial success, peaking at number three on the Gaon Album Chart and selling over 40,000 copies by the end of 2015.
Background and release
On February 11, 2015, JYP Entertainment founder Park Jin-young announced the company's collaboration with Mnet to air Sixteen, a competition survival show that would decide the lineup of an upcoming girl group, the first under JYPE in five years, following the debut of Miss A in 2010. The show, which featured a total of 16 candidates, began airing on May 5.
The show concluded on July 7, with Nayeon, Jeongyeon, Sana, Jihyo, Mina, Dahyun, and Chaeyoung being selected as the seven Twice members. Park then made the controversial decision of adding two eliminated contestants: Tzuyu, who was known as the "audience's pick" since she was the most popular contestant by the show's end, and Momo, who was added by Park himself since he felt the group needed someone with Momo's performance abilities. It was then announced that the new girl group under JYPE would be making their debut in the later half of 2015.
On October 7, JYPE confirmed that Twice would make their official debut on October 20, with the agency releasing a group teaser image. On October 9, Twice released a group teaser image and confirmed that the lead single for their upcoming album is titled "Like Ooh-Ahh". The following day, the group revealed more details about their EP titled The Story Begins, posting a picture of the album's track list revealing six songs in total. On October 12, the group released individual teaser videos featuring Nayeon, Momo, and Mina, which depicted certain notable characteristics or personalities of each member. In each of their respective videos, zombies made an unexpected but short appearance. Later on the same day, individual teaser photos of the three members were uploaded. On October 13, individual teaser photos of Sana, Chaeyoung, and Tzuyu were released. The following day, teaser photos for Jeongyeon, Jihyo, and Dahyun were uploaded.
On October 15, the group uploaded two teaser images featuring all the members. On October 16, they uploaded a music video teaser clip revealing a part of their choreography for "Like Ooh-Aah". The members were depicted to be dancing in the middle of a zombie horde. On October 17, Twice uploaded an album highlight medley featuring audio instrumental snippets for all tracks in the EP. A day before the release of their album, the group held a live countdown broadcast on V Live.
The Story Begins and its title track "Like Ooh-Ahh" was officially released on October 20.
Composition
The Story Begins is an EP consisting of six tracks. The title track "Like Ooh-Ahh" is produced by Black Eyed Pilseung, who had previously worked with other artists under JYP Entertainment including Miss A and Got7. The song was sonically described as a color pop track which incorporates various genres such as hip hop, R&B, and rock. The second track "Do It Again" was written by Park Jin-young, lyrically describing the excitement one feels after receiving a confession of love from another person, and was previously performed by Twice in Sixteen. "Going Crazy" is another song that was first performed by the group during Sixteen, and lyrically talks about uncontrollable feelings due to infatuation. The song "Truth" is classified as a song incorporating pop dance, punk, and ballad. "Candy Boy" is described to be a love song, with the song's lyrics depicting how a person can meet their loved one even in dreams. The album's closing track "Like a Fool" is an acoustic song that tells about a girl's heartache after being unable to confess to their romantic interest.
Promotion
On the same day as the release of The Story Begins, Twice held a live showcase at the AX-Korea in Gwangjin-gu, Seoul, wherein they performed "Like Ooh-Ahh" alongside the dance tracks "Going Crazy" and "Do It Again."
Twice promoted their album by appearing and performing on several South Korean music programs. The group made their first-ever music show appearance on M Countdown on October 22, performing "Like Ooh-Aah" and "Do It Again". This was followed by performances on KBS2's Music Bank on October 23, MBC's Show! Music Core on October 24, and on SBS' Inkigayo on October 25, among other performance dates. The group also made their appearance on the SBS Gayo Daejeon 2015 held on December 27, performing the album's title track.
On January 22, 2016, Twice performed "Like Ooh-Aah" alongside a cover of Miss A's "Bad Girl Good Girl" and Wonder Girls' "So Hot" on You Hee-Yeol's Sketchbook. On April 24, the group performed at the KCON Japan 2016 in a special broadcast done by M Countdown.
Commercial performance
The Story Begins debuted at number four on the Gaon Album Chart for the week ending October 24, 2015 and peaked at number three two weeks later. By the end of October, the EP sold a total of 17,100 physical copies. At the end of 2015, the album reached 49,904 copies sold. As of 2020, the album has sold 199,696 copies in South Korea and 47,448 copies in Japan. It is also the group's best selling album in the United States with 4,000 copies sold.
Future impacts and effects
On October 19, 2016, Twice revealed their official light stick dubbed "Candy Bong" (bong meaning stick in Korean), inspired by the song "Candy Boy".
Track listing
Credits adapted from Naver
Content production
Credits adapted from album liner notes.
Locations
Recorded, engineered and mixed at JYPE Studios, Seoul, South Korea
Mastered at The Mastering Palace, New York City, New York and Suono Mastering, Seoul, South Korea
Personnel
Jimmy Jeong – executive producer
Jo Hae-seong – executive producer
J. Y. Park "The Asiansoul" – producer
Black Eyed Pilseung – co-producer
Kim Yong-woon "goodear" – recording and mixing engineer
Jo Han-sol "fabiotheasian" – recording and assistant mixing engineer
Choi Hye-jin – recording engineer
Han Cheol-gyu – assistant recording engineer
Lee Tae-seob – mixing engineer
Dave Kutch – mastering engineer
Choi Hyo-young – mastering engineer
Go Ji-seon – assistant mastering engineer
Yoon Hee-so – choreographer
Kim Hye-rang – choreographer
Choi Hee-seon – stylist
Im Ji-young – stylist
Park Nae-joo – hair director
Won Jeong-yo – makeup director
Jo Dae-young – album design
Kim Ah-mi – album design
Kim Young-jo (Naive Creative Production) – music video director
Yoo Seung-woo (Naive Creative Production) – music video director
Jang Deok-hwa – photographer
Rado – all instruments and computer programming (on "Like Ooh-Ahh")
Jihyo – background vocals (on "Like Ooh-Ahh", "Going Crazy", "Truth", "Candy Boy" and "Like a Fool")
Fingazz – all instruments and computer programming (on "Do It Again")
Daniel Kim – vocal producer (on "Do It Again" and "Candy Boy"), mixing engineer (on "Going Crazy" and "Like a Fool"), background vocals (on "Candy Boy") and all instruments, computer programming and guitars (on "Like a Fool")
Twice – background vocals (on "Do It Again")
Kebee – rap director (on "Going Crazy")
220 – synthesizer and drums (on "Going Crazy")
Jake K – synthesizer (on "Going Crazy")
Choi Jin-seok – all instruments and computer programming (on "Truth")
Ryan Marrone – all instruments and computer programming (on "Candy Boy")
Julia Michaels – all instruments and computer programming (on "Candy Boy")
Chloe Leighton – all instruments and computer programming (on "Candy Boy")
Garrick Smith – all instruments and computer programming (on "Candy Boy")
Charts
Weekly charts
Year-end charts
Release history
Notes
References
2015 debut EPs
JYP Entertainment EPs
Genie Music EPs
Korean-language EPs
Dance-pop EPs
Twice (group) EPs
Republic Records EPs
|
1110951
|
https://en.wikipedia.org/wiki/International%20Institute%20of%20Information%20Technology%2C%20Hyderabad
|
International Institute of Information Technology, Hyderabad
|
The International Institute of Information Technology, Hyderabad (IIIT Hyderabad or IIIT-H) is a private deemed university located in Hyderabad, Telangana, established in 1998 under a Not-for-Profit Public Private Partnership, laying focus on Information Technology and other fields such as Computer Science, Electronics and Communication, Computer Aided Structural Engineering and their interdisciplinary applications across other domains.
The institute counts around 1800 students and over 85 faculty members. Known for its narrow and deep focus on computer science, IIIT Hyderabad is divided into various research centres and labs, as opposed to schools and departments. The institute is ranked amongst the top research universities in the country, computed based on publications in CS-related areas.
IIIT Hyderabad is widely popular for its coding culture, with students frequently making it to the ACM ICPC World Finals. The admission to the single-degree (B-Tech) programs is done through the Joint Entrance Examination – Main. Admission for the dual-degree programs is done through the institute's own research-oriented examination and olympiads such as the International Olympiad on Informatics (IOI).
History
IIIT Hyderabad was set up in 1998 under the public private partnership model by Ministry of Human Resource Development of the Government of Andhra Pradesh and NASSCOM, with the state government supplying a grant of land and buildings. As special officer for IIIT Hyderabad and Secretary IT for the state government, Ajay Prakash Sawhney was responsible for shaping the conceptual model and overseeing initial development of the institute. Prof. Rajeev Sangal, former director of Indian Institute of Technology (BHU) Varanasi designed the syllabus and served as the first director of the institute until 10 April 2013.
The institution was founded under the name of Indian Institute of Information Technology Hyderabad as a foundation for the 20 Indian Institutes of Information Technology under same model which was later renamed to International Institute of Information Technology Hyderabad in 2001 when it attained a status of Deemed University.
Campus
IIIT Hyderabad is located west of Hyderabad city. The area of the institute campus is 66 acres (approx. 267,000 m2). This land was allotted by Government of Andhra Pradesh in 1998. Four buildings house the corporate schools and research centers. In addition to this, the academic building has the lecture halls, tutorial rooms, computer and electronics labs and offices of the administration and faculty. The building complexes are named after the mountain ranges; Nilgiri, Vindhya and Himalaya. Campus also has incubation centers, research centers, library, auditorium and an amphitheatre which hosts multiple cultural events and college festivals. The campus also hosts many companies and startups.
Due to its proximity to Sports Authority of Telangana State (SATS) and G.M.C Balayogi Athletic Stadium, the campus has access to various sports facilities. Apart from this, the campus has swimming pool; football, hockey, and cricket grounds; and tennis, badminton, basketball, and volleyball courts. In addition to these facilities, the campus is also a host to an elementary school called Sanskaar Campus School.
Students undertaking research can access computational facilities. All notices and information are sent over the campus email. From couriers to mess registration, everything is notified via specific portals (internal sites). Some areas of the institute, like a few parts of Himalaya, Nilgiri, KCIS and library, are connected by Wi-Fi.
T-Hub
IIIT-H hosts T-Hub, a business incubator. It was established in collaboration with Telangana State Government, Indian School of Business and National Academy of Legal Studies and Research. It aims to provide a supportive environment, along with financial and mentorship support to new startups and companies in the technology sector. In 2019 it raised more than 180 million dollars of funding., In 2017, the CEO of T-Hub announced the successful development of India's fourth fastest supercomputer (after Indian Institute of Science, IIT Delhi and Tata Institute of Fundamental Research).
Art on campus
Hostels
IIIT-H has five hostels (three for boys and two for girls):
Palash Nivas (Old Boys Hostel): Generally allotted to undergraduate students from second-year onwards and first-year postgraduate students. It is attached to North and South Mess.
New Boys Hostel (NBH): Allotted to postgraduate seniors and research students pursuing M.S. or PhD. It is attached to Yuktahar mess and non-vegetarian Kadamba Mess.
Bakul Nivas: Allotted to undergraduate juniors and second-year postgraduate students.
Old Parijaat Nivas: Allotted to third and fourth-year girls.
New Parijaat Nivas (New Girls Hostel): Allotted to first and second-year girls. Both girls' hostels have separate gates. It is also attached to Yuktahar mess
All students are provided with hostel rooms and it is compulsory to live on-campus. First-year and second-year students who have enrolled in a bachelor's or dual-degree program are required to share rooms (double occupancy) whereas, from the third-year onward, the students have single occupancy. The institute has a guest house with four air-conditioned suites. Two hostels for men and one for women have a total of about 1200 rooms. An optical fiber network connects all campus buildings including the hostels.
Governing council
The institute is governed by a governing council, which is currently headed by Turing Award laureate Raj Reddy. Other notable members are Turing Award laureate Vint Cerf and Narendra Ahuja. Day-to-day operation is managed by a Director, currently P. J. Narayanan, assisted by a Dean of Research and a Dean of Academics.
Academics
IIIT Hyderabad offers courses of study under following departments:
Computer Applications and Information Technology
Engineering and Architecture
Sciences
Arts, Humanities and Social Sciences
The institute offers undergraduate, postgraduate and dual degree programs for Monsoon (July to November) and Spring (January to April) semesters. Undergraduate programs award either Bachelor of Technology (B.Tech.) or B.Tech. (Honors) in Computer Science and Engineering, Electronics and Communication Engineering, Civil Engineering (dis-continued) with courses in engineering, sciences, mathematics and humanities, while postgraduate programs award either Master of Technology (M.Tech.) in Computer Aided Structural Engineering, Computer Science and Information Security, Master of Science (MS) or Master of Philosophy (M.Phil.) in Computational Linguistics. Dual degree Programs award B.Tech. + MS by Research. The Dual Degrees offer MS in Computer Science and Engineering, Electronics and Communication Engineering, Computational Natural Science, Building sciences [MS in specialized courses of civil], Bioinformatics, Computational Linguistics and Exact Humanities (dis-continued) along with a BTech in Computer Science. Doctoral Programs award part-time and full-time Ph.D. degrees and post-graduate diplomas in Spatial Informatics, Cognitive Science and other fields mentioned above.
The undergraduate students have a flexible academic structure where they can select their courses and projects. These students are also allowed to participate in ongoing research and development.
IIIT Hyderabad also offers Master of Science in Information Technology (MSIT) program in collaboration with Carnegie Mellon University, US.
In 2003, IIIT Hyderabad launched Research Exchange Program for Ph.D. students in collaboration with Massachusetts Institute of Technology, University of Pennsylvania, University of California, Berkeley and various other institutions.
Recently, IIIT-H introduced a semester-long course on flexible electronics. It involves application of high-level electronics and material science. The course is considered unique because it provides an overview of building of a silicon processor.
Admissions
Admission to undergraduate programs is based on one of five acceptance modes: Joint Entrance Examination (Main) (JEE (Main)), the institute's own Undergraduate Engineering Entrance Examination (UGEE) and interview, representing India in the International Olympiads during class XI and XII (including International Olympiad in Informatics (IOI), International Physics Olympiad (IPhO), International Chemistry Olympiad (IChO), International Biology Olympiad (IBO), International Astronomy Olympiad (IAO), International Mathematical Olympiad (IMO) and International Linguistics Olympiad (IOL) / Paninian Linguistics Olympiad (PLO), Direct Admissions for Students Abroad (DASA) and lateral entry admissions to dual-degree programs through Lateral Entry Entrance Examination (LEEE) and interview.
Admissions for postgraduate studies are on the basis of the Postgraduate Entrance Exam (PGEE) conducted by IIIT Hyderabad. Admissions to the MSIT programme run at this institute are based on a test conducted every year from April to May.
Rankings
Internationally, IIIT Hyderabad is ranked among 451-500 for Computer Science and Information Systems subject in QS World University Rankings for 2021. It was ranked among top 10 universities in South Asia by Cybermetrics Lab, Spain's largest public research institution. It was ranked 147 in the world and 34 in Asia for Computer Science and research publications in the period 2005–2020.
It was ranked 78th among universities in India by the National Institutional Ranking Framework (NIRF) in 2020, 43rd among engineering colleges and in the 101–150 band overall.
Among engineering colleges, IIIT Hyderabad ranked 16th by Outlook India in 2019. It was ranked 4th among engineering colleges by Dataquest India in 2019. The same rankings ranked it 3rd in government engineering colleges in 2019.
Workshops
IASNLP (IIIT Hyderabad Advanced Summer School on NLP) is an annual two-week school on natural language processing with lectures and project guidance by internationally renowned researchers in the area.
Robocamp is a national level robotics workshop conducted by IIIT Hyderabad Robotics Club (IRC) every summer since 2006. In 2011 one of the workshops was organised by the second year students of IRC.
Tech Ease, a national workshop for students and professionals on innovation, design and user experience, was organised in 2009, 2010 and 2011.
R & D Showcase is the research and project exhibition showcasing the research work and projects carried out in the institute.
ExOR (Excitement of Research) encourages students to take up research in academics and in career.
Research and development centers
IIIT-H hosts 26 research and development centers and has collaborations with research universities like Massachusetts Institute of Technology, University of California, Berkeley, University of Washington, University of Pennsylvania and Carnegie Mellon University (for MSIT program).
IIIT Hyderabad will be setting up a Technology Innovation Hub (TIH) on data driven technologies with a funding of from Department of Science and Technology.
IIIT Hyderabad has 26 research and development centers. They are listed below on the basis of their research focus.
Combined
Kohli Center on Intelligent Systems (KCIS)
Smart City Research Center (SCRC)
Applied Artificial Intelligence (AI) Research Centre (INAI)
Technology
Signal Processing and Communications Research Center (SPCRC)
Data Sciences and Analytics Center (DSAC)
Language Technologies Research Center (LTRC)
Robotics Research Center (RRC)
Center for Security, Theory and Algorithms (CSTAR)
Software Engineering Research Center (SERC)
Center for Visual Information Technology (CVIT)
Center for VLSI and Embedded Systems Technology (CVEST)
Computer Systems Group (CSG)
Machine Learning Lab
Domain Specific Centers
IT for Agricultural and Rural Development (ITARD)
Center for IT in Building Science (CBS)
Cognitive Science (CogSci)
Center for Computational Natural Sciences and Bioinformatics (CCNSB)
Earthquake Engineering Research Center (EERC)
Center for IT in Education (CITE)
Human Sciences Research Group (HSRG)
Center for Education Technology and Learning Science (CETLS)
Lab for Spatial Informatics (LSI)
Research Center for e-Governance
Development Centers
Center for Innovation and Entrepreneurship (CIE)
Center for Open Software (COS)
Human Values Cell
Student life
With about 1,800 students, IIIT Hyderabad has cultural and athletic activities throughout the year. The students are divided into four houses upon their intake in the college: Agni, Akash, Prithvi and Vayu. All cultural and sports competitions are based around the house system where the houses battle it out for the top position. They have access to gymnasium with personal trainers and all other facilities on-campus.
IIIT-H has various student bodies and clubs. Undergraduate students get a chance to volunteer for National Service Scheme (NSS) which aims to inculcate social values in students. Volunteers work to provide a better lifestyle to everyone who is needy. They also provide help to the regions affected by natural disasters by raising funds, providing essential resources such as food, money, clothes. Students learn how to live good life when there is scarcity of resources.
Felicity
Felicity is IIIT's annual techno cultural fest. This three day spectacle is held at the beginning of the spring semester and is the highlight of the year. The fest is kickstarted with the 'Felicity Inaugurals' hosted by the students at IIIT, with comedy skits, dance performances and music performances spanning a variety of genres. The next two days are followed with numerous coding contests, inter-college debates, dance sessions, many quizzes, robot races, stunt shows and hackathons. The fest ends with a music concert on the last night, performed by some of the most popular artists of the country. Bands such as the Indian Ocean and The Local Train have headlined Felicity in the past.
Apex Body
Apex is an official student welcoming body whose objective is to help the administration in handling the logistics for the admission process, creating and implementing an induction schedule for freshers (special activities during the first few weeks), ensuring a smooth transition of freshers into the college, mentoring the freshers, etc.
There is an undergraduate as well as postgraduate Apex body. Undergraduate Apex consists of students from the third and fourth year and Postgraduate Apex consists of one student from each branch.
New apex members are selected each year by faculty and current apex members.
E-cell
Entrepreneurship Cell, IIIT Hyderabad is a non-profit organization run by students and has been established with the objective of creating, manifesting and guiding the entrepreneurial spirit in the student community and to encourage them to be successful entrepreneurs. The organization aims to build an ecosystem where networking and knowledge sharing can happen. Several events, seminars and workshops are conducted by E-cell both for students of IIIT and other institutes. Currently, the organization consists of a team of around 50 members divided into 12 sub teams.
Ping! - Student magazine of IIIT-H
Students run an independent media body called Ping! Content ranges from creative writing to journalistic pieces on campus issues. It was founded in 2009.
Controversy surrounding an article related to ragging pushed the editors, also student members of Anti Ragging Committee of that year, to take the Ping website outside the IIIT domain because they did not follow the confidential policy of being members of ARC (Anti Ragging Committee), and to explore independent funding sources.
Clubs, Groups and Societies
The institute hosts numerous clubs that are active throughout the year and conduct several events and meetings to cater to the specific interest groups. The list of currently active clubs and societies include:
Amateur Sports Enthusiasts Club (ASEC)
Art Society
Astronomy Club
Chess club
Campus Canine Management Cell (CCC)
Dance Crew
Debate Society (DebSoc)
Decore Club
Developer's Student Club (DSC)
Dramatics Club
Economics, Finance, and investment club (EFI)
Frivolous Humorous Club (FHC)
Gaming Club
Hacking Club
Literary club (Lit Club)
Music Club
Open-Source development group (OSDG)
Pentaprism: The Photography Club
Programming Club
Robotics Club
Theory Group
TV Room Quiz Club
Notable faculty
Narendra Ahuja, Founding director (1999–2002), Donald Biggar Willett Professor Emeritus in Engineering at the University of Illinois at Urbana–Champaign.
P. J. Narayanan, Professor and Director.
Vishal Garg, Founding head, Center for IT in Building Science.
See also
List of universities in India
T-Hub
Virtual Labs
Genome Valley
References
External links
Educational institutions established in 1998
International Institute of Information Technology, Hyderabad
Research institutes in Hyderabad, India
1998 establishments in Andhra Pradesh
|
16288476
|
https://en.wikipedia.org/wiki/T-FLEX%20CAD
|
T-FLEX CAD
|
T-FLEX CAD (T-FLEX) – parametric CAD software application for 3D solid modeling and 2D design and drafting, developed and sold by software company Top Systems.
T-FLEX CAD is written for Microsoft Windows and is distributed in various languages.
Functionality
T-FLEX CAD is primarily aimed at mechanical engineering. It provides drafting, modeling and assembly tools that enable engineers to develop various products, from single parts to assemblies.
T-FLEX CAD was among the first MCAD (mechanical CAD) systems to bring the power of parametric design into a native Windows environment.
T-FLEX CAD supports a unified mode of operations for all types of documents and entities: drawings, assembly drawings, solids, surfaces, parts, parts with multiple solid bodies, assembly models, sheet metal, bill of materials, etc.
T-FLEX CAD provides parametric, adaptive and associative technology aimed at family-of-parts manufacturers or other design situations that use similar geometry but require many different sizes or permutations. Entities and their parameters in T-FLEX CAD can be related to each other. Variables can be assigned for component names, visibility, material, any numeric or text attribute of any entity. They can then be processed with algebraic or logical expression to control the behavior of the design.
In addition to parametric 3D modeling T-FLEX CAD supports parametric 2D drawings creation from scratch. Parametric 2D assemblies can be created as well by inserting parametric 2D components. The result can be fully automatic, so that a master parametric drawing does not require editing as changes are required.
T-FLEX Open API is based on .NET technology offering possibilities for developing add-on applications.
T-FLEX CAD is interoperable with other 3D-modeling and 2D-drawing systems via the following file formats: Parasolid, IGES, STEP, Rhino, DWG, DXF, SolidWorks, Solid Edge, Autodesk Inventor, etc.
Add-on Products
T-FLEX Analysis - Specialized analysis tools to help engineers virtually test and analyze complicated parts and assemblies
T-FLEX Dynamics - General-purpose motion simulation for studying the physics-based motion behavior of a CAD design
T-FLEX Gears - Specialized tools for design, analysis and calculation of gears
T-FLEX Electrical - Specialized tools for development of electrical systems
T-FLEX Nesting - Automate nesting of sheet materials for various types of cutting
T-FLEX CAM - Manufacturing add-on for generating NC programs as well as toolpath verification and machine simulation
T-FLEX VR – Add-on to work with a 3D model in a virtual 3D space
T-FLEX DOCs - PLM system, helping manage complex products, streamline operations, and increase productivity.
See also
Comparison of CAD Software
References
Computer-aided design software
Windows software
2011 software
Russian brands
|
46688209
|
https://en.wikipedia.org/wiki/My%20kung%20fu%20is%20stronger%20than%20yours
|
My kung fu is stronger than yours
|
"My kung fu is stronger than yours" is a popular cultural trope and catchphrase, originally referring to the clichéd plots of martial arts films. The phrase is also rendered as "My kung fu is better than yours", "My kung fu is stronger than your kung fu", "My kung fu is the best", etc.
Early mentions
In 1976, magazine Black Belt published an article about martial artist Leo Fong, where he was quoted as saying: "The plot [of kung fu movies] is usually 'my school-is-better-than-your school' or 'your-master-killed-my-master-so-we'll-kill-yours'. Those are the basic two themes, even in some of the Bruce Lee movies. The first and second generation Chinese have still heard the legends of the kung fu masters and their exploits and exploitations".
In a 1995 interview to Black Belt martial arts instructor Ip Ching recalled a man skilled in the Eagle Claw style who around 1928 joined a martial arts school that was open to every style. The man claimed the title of chief instructor believing that "none of the instructors there had good kung fu" and told the others "your kung fu is rubbish". Ip Man was ultimately chosen to defend the others against the intruder.
Zeke Shif
On December 25, 1994, the computers of computer security expert Tsutomu Shimomura in San Diego experienced an IP spoofing hacker attack. The attack was launched by Kevin Mitnick from the domain toad.com in San Francisco via a computer owned by John Gilmore. On December 27, 1994, Shimomura received a message "Damn you, my technique is the best" on the voice mail. Three days later the caller left another message, starting with a kung fu scream and saying: "Your security technique will be defeated. Your technique is no good". Shimomura's search for the hacker ultimately led him to Kevin Mitnick, but the caller was identified as phone hacker and pranker Zeke Shif. Shif later explained: "I heard that this guy named Shimomura had been hacked... So I just thought, What the hell, I'd leave some voice mails. I used to watch kung fu movies a lot".
The phrase had been attributed to Mitnick until Shif's identity was revealed. Shif also made it very clear that he had nothing to do with any hacking, or anything Mitnick had done, and that he was just making fun of kung fu movies.
Modern culture
The phrase became what ZDNet called "a cultural touchstone in its own right", equating hacking with kung fu. In The X-Files episode "Unusual Suspects" the "Lone Gunmen" hackers are heard to mutter, "Your kung fu is the best". The phrase also appears in hacking context in the film The Core.
The reviews of some modern martial arts films, such as Ip Man 2, still evoke the "my kung fu is stronger than yours" trope. Two trophies in the 2011 video game Mortal Kombat are called "My Kung Fu Is Strong" and "My Kung Fu Is Stronger."
References
Catchphrases
Hacker culture
Martial arts films
1994 in California
1994 neologisms
|
37706040
|
https://en.wikipedia.org/wiki/2011%20SC191
|
2011 SC191
|
is a small asteroid and Mars trojan orbiting near the of Mars (60 degrees behind Mars on its orbit).
Discovery, orbit and physical properties
was first observed on 21 March 2003 by the Near-Earth Asteroid Tracking (NEAT) project at Palomar Observatory using the Samuel Oschin telescope and given the provisional designation . The object was subsequently lost and re-discovered on 31 October 2011 by the Mt. Lemmon Survey.
Its orbit is characterized by low eccentricity (0.044), moderate inclination (18.7°) and a semi-major axis of 1.52 AU. Upon discovery, it was classified as Mars-crosser by the Minor Planet Center. Its orbit is well determined as it is currently (March 2013) based on 45 observations with a data-arc span of 3,146 days. has an absolute magnitude of 19.3 which gives a characteristic diameter of 600 m.
Mars trojan and orbital evolution
Recent calculations indicate that it is a stable Mars trojan with a libration period of 1300 yr and an amplitude of 18°. These values as well as its short-term orbital evolution are similar to those of 5261 Eureka. Its eccentricity oscillates mainly due to secular resonances with the Earth and the oscillation in inclination is likely driven by secular resonances with Jupiter.
Origin
Long-term numerical integrations show that its orbit is very stable on Gyr time-scales (1 Gyr = 1 billion years). As in the case of Eureka, calculations in both directions of time (4.5 Gyr into the past and 4.5 Gyr into the future) indicate that may be a primordial object, perhaps a survivor of the planetesimal population that formed in the terrestrial planets region early in the history of the Solar System.
See also
5261 Eureka (1990 MB)
References
Further reading
2011 SC191 Pettarin, E., Vivona, M., McMillan, R. S., Pietschnig, M., Klein, M., Boattini, A., Gibbs, A. R., Ahern, J. D., Beshore, E. C., Garradd, G. J., Grauer, A. D., Hill, R. E., Kowalski, R. A., Larson, S. M., McNaught, R. H., Birtwhistle, P. 2011, Minor Planet Electronic Circular, 2011-T02.
Three new stable L5 Mars Trojans de la Fuente Marcos, C., de la Fuente Marcos, R. 2013, Monthly Notices of the Royal Astronomical Society: Letters, Vol. 432, Issue 1, pp. 31–35.
Orbital clustering of Martian Trojans: An asteroid family in the inner solar system? Christou, A. A. 2013, Icarus, Vol. 224, Issue 1, pp. 144–153.
External links
data at MPC.
Mars trojans
Minor planet object articles (unnumbered)
Astronomical objects discovered in 2003
20111031
|
2090445
|
https://en.wikipedia.org/wiki/Cypria
|
Cypria
|
The Cypria ( Kúpria; Latin: Cypria) is a lost epic poem of ancient Greek literature, which has been attributed to Stasinus and was quite well known in classical antiquity and fixed in a received text, but which subsequently was lost to view. It was part of the Epic Cycle, which told the entire history of the Trojan War in epic hexameter verse. The story of the Cypria comes chronologically at the beginning of the Epic Cycle, and is followed by that of the Iliad; the composition of the two was apparently in the reverse order. The poem comprised eleven books of verse in epic dactylic hexameters.
Date and authorship
The Cypria, in the written form in which it was known in classical Greece, was probably composed in the late seventh century BC, but there is much uncertainty. The Cyclic Poets, as the translator of Homerica, Hugh G. Evelyn-White noted "were careful not to trespass upon ground already occupied by Homer," one of the reasons for dating the final, literary form of Cypria as post-Homeric, in effect a "prequel". "The author of the Kypria already regarded the Iliad as a text. Any reading of the Kypria will show it preparing for events for (specifically) the Iliad in order to refer back to them, for instance the sale of Lycaon to Lemnos or the kitting out of Achilles with Briseis and Agamemnon with Chryseis". A comparison can be made with the Aethiopis, also lost, but which even in its quoted fragments is more independent of the Iliad as text.
The stories contained in the Cypria, on the other hand, were fixed much earlier than that, and the same problems of dating oral traditions associated with the Homeric epics also apply to the Cypria. Many or all of the stories in the Cypria were known to the composer(s) of the Iliad and Odyssey. The Cypria, in presupposing an acquaintance with the events of the Homeric poem, in the received view thus formed a kind of introduction to the Iliad though there is an overlap in events from the death of Palamedes, including the catalogue of Trojan allies. J. Marks observes that "Indeed, the junction would be seamless if the Kypria simply ended with the death of Palamedes."
The title Cypria, associating the epic with Cyprus, demanded some explanation: the epic was said in one ancient tradition to have been given by Homer as a dowry to his son-in-law, a Stasinus of Cyprus mentioned in no other context; there was apparently an allusion to this in a lost Nemean ode by Pindar. Some later writers repeated the story. It did at least serve to explain why the Cypria was attributed by some to Homer and by others to Stasinus. Others, however, ascribed the poem to Hegesias (or Hegesinus) of Salamis in Cyprus or to Cyprias of Halicarnassus (see Cyclic Poets).
It is possible that the "Trojan Battle Order" (the list of Trojans and their allies, of Iliad 2.816-876, which forms an appendix to the Catalogue of Ships) is abridged from that in the Cypria, which was known to contain in its final book a list of the Trojan allies.
Manuscript tradition
In current critical editions only about fifty lines survive of the Cypria'''s original text, quoted by others. For the content we are almost entirely dependent on a prose summary of the Cyclic epics contained in the Chrestomathy attributed to an unknown "Proclus" (possibly to be identified with the 2nd-century AD grammarian Eutychius Proclus, or else with an otherwise unknown 5th-century grammarian). Many other passing references give further minor indications of the poem's storyline.
Content
What follows embeds reports of known content of the Cypria in a retelling of the known events leading up to the anger of Achilles.
The poem narrates the origins of the Trojan War and its first events. It begins with the decision of Zeus to relieve the Earth of the burden of population through war, a decision with familiar Mesopotamian parallels. The war of the Seven against Thebes ensues.
The Cypria described the wedding of Peleus and Thetis; in the Judgement of Paris among the goddesses Athena, Hera, and Aphrodite: Paris awards the prize for beauty to Aphrodite, and as a prize is awarded Helen, wife of Menelaus.
Then Paris builds his ships at Aphrodite's suggestion, and Helenus foretells the future to him, and Aphrodite orders Aeneas to sail with him, while Cassandra prophesies the outcome. In Lacedaemon the Trojans are entertained by the sons of Tyndareus, Castor and Polydeuces, and by Menelaus, who then sets sail for Crete, ordering Helen to furnish the guests with all they require. Aphrodite brings Helen and Paris together, and he takes her and her dowry back to his home of Troy with an episode at Sidon, which Paris and his men successfully storm.
In the meantime Castor and Polydeuces, while stealing the cattle of Idas and Lynceus, are caught and killed: Zeus gives them immortality that they share every other day.
Iris informs Menelaus, who returns to plan an expedition against Ilium with his brother Agamemnon. They set out to assemble the former suitors of Helen, who had sworn an oath to defend the rights of whichever one won her hand. Nestor in a digression tells Menelaus how Epopeus was destroyed after seducing the daughter of Lycus, the story of Oedipus, the madness of Heracles, and the story of Theseus and Ariadne. In gathering the leaders, they detect Odysseus' feigned madness.
The assembled leaders offer ill-omened sacrifice at Aulis, where the prophet Calchas warns the Greeks that the war will last ten years. They reach the city of Teuthras in Mysia and sack it in error for Ilium: Telephus comes to the city's rescue and is wounded by Achilles. The fleet scattered by storm, Achilles puts in at Skyros and marries Deidameia, the daughter of Lycomedes, then heals Telephus, so that he might be their guide to Ilium.
When the Achaeans have been mustered a second time at Aulis, Agamemnon is persuaded by Calchas to sacrifice his daughter Iphigenia to appease the goddess Artemis and obtain safe passage for the ships, after he offends her by killing a stag. Iphigeneia is fetched as though for marriage with Achilles.
Artemis, however, snatches her away, substituting a deer on the altar, and transports her to the land of the Tauri, making her immortal.
Next they sail as far as Tenedos, where while they are feasting, Philoctetes is bitten by a snake and is left behind in Lemnos. Here, too, Achilles quarrels with Agamemnon. A first landing at the Troad is repulsed by the Trojans, and Protesilaus is killed by Hector. Achilles then kills Cycnus, the son of Poseidon, and drives the Trojans back. The Greeks take up their dead and send envoys to the Trojans demanding the surrender of Helen and the treasure. The Trojans refusing, they first attempt an assault upon the city, and then lay waste the country round about.
Achilles desires to see Helen, and Aphrodite and Thetis contrive a meeting between them. The Achaeans next desire to return home, but are restrained by
Achilles, who afterwards drives off the cattle of Aeneas, sacks neighbouring cities, and kills Troilus. Patroclus carries away Lycaon to Lemnos and sells him as a slave, and out of the spoils Achilles receives Briseis as a prize, and Agamemnon Chryseis.
Then follow the death of Palamedes, the plan of Zeus to relieve the Trojans by detaching Achilles from the Hellenic confederacy, and a catalogue of the Trojan allies.
Reception
The Cypria was considered to be a lesser work than Homer's two masterpieces: Aristotle criticised it for its lack of narrative cohesion and focus. It was rather a catalogue of events than a unified story.
Editions
Online editions (English translation):
Fragments of the Cypria translated by H.G. Evelyn-White, 1914 (public domain)
Fragments of complete Epic Cycle translated by H.G. Evelyn-White, 1914; Project Gutenberg edition
Proclus' summary of the Epic Cycle, omitting the Telegony translated by G. Nagy, 2000
Print editions (Greek):
A. Bernabé 1987, Poetarum epicorum Graecorum testimonia et fragmenta pt. 1 (Leipzig)
M. Davies 1988, Epicorum Graecorum fragmenta (Göttingen)
Print editions (Greek with English translation):
M.L. West 2003 (ed., trans.), Greek Epic Fragments from the seventh to the fifth centuries BC Loeb Classical Library (Harvard University Press, Cambridge, MA) pp. 64–107 Online
See also
Eris (mythology)
Apple of Discord
Notes
References
F.G. Welcker, Der epische Cyclus, oder Die homerischen Dichter Bonn : E. Weber, 1849-65.
D.B. Monro, Homer's Odyssey, books XIII-XXIV Appendix to his edition of Odyssey, xiii–xxiv. (1901)
Thomas W. Allen, "The Epic Cycle," in Classical Quarterly'' (January 1908, and following issues)
7th-century BC books
Cypriot literature
Epic Cycle
Lost poems
Prequels
|
19419888
|
https://en.wikipedia.org/wiki/List%20of%20Apple%20codenames
|
List of Apple codenames
|
The list of Apple codenames covers the codenames given to products by Apple Inc. during development. The codenames are often used internally only, normally to maintain the secrecy of the project. Occasionally a codename may become the released product's name. Most of Apple's codenames from the 1980s and 1990s are provided by the book Apple Confidential 2.0.
Accessories
AirTags, a Tile-like personal item tracking hardware & app – AirTags, Apple Tags, B389, Durian
AirPods (1st Generation) – B188
AirPods (2nd Generation) – B288
AirPods Pro – B298
AirPods Max – B515
AirPort Express 802.11n (5th Generation) – K31
Apple IIe Card for the Macintosh LC – Double Exposure
A rumored augmented reality and virtual reality device – T288
Apple II 3.5" Disk Controller Card – NuMustang
Apple Color OneScanner 600/27 – Rio
Apple Color OneScanner 1200/30 – New Orleans
Beats Flex – B372
HomePod – B238
HomePod mini – B520
Built-in iSight (2005) – M33
External iSight (2003) – Q8
Lightning Digital AV Adapter – Haywire
Magic Trackpad 2 – D67
Time Capsule – Wilma, M52
Apple TV
Apple TV – iTV
Apple TV (2nd generation) – K66
Apple TV (3rd generation) – J33
Apple TV (4th generation) – J42
Apple TV 4K – J105
Apple TV 4K (2nd generation) – J305
Apple Watch
Apple Watch – Gizmo, N27 and N28
Apple-designed processors
The internal codenames for the CPU cores of Apple silicon A series and M series chips are named after wind and weather patterns.
Apple A6 and A6X – Bali, with Swift cores
Apple A7 – Alcatraz, with Cyclone cores
Apple A8 – Fiji, with Typhoon cores
Apple A8X – Capri, with Typhoon cores
Apple A9 – Maui (Samsung), Malta (TSMC), with Twister cores
Apple A9X – Elba, with Twister cores
Apple A10 Fusion – Cayman, with 2 Hurricane cores and 2 Zephyr cores
Apple A10X Fusion – Myst, with 3 Hurricane cores and 3 Zephyr cores
Apple A11 Bionic – Skye, with 2 Monsoon cores and 4 Mistral cores
Apple A12 Bionic – Cyprus, with 2 Vortex cores and 4 Tempest cores
Apple A12X and A12Z Bionic – Aruba, with 4 Vortex cores and 4 Tempest cores
Apple A13 Bionic – Cebu, with Thunder and Lightning cores
Apple A14 Bionic – Sicily, with 2 Firestorm cores and 4 Icestorm cores
Apple A15 Bionic – Ellis, with 2 Avalanche cores and 4 Blizzard cores
Apple A16 Bionic – Crete
Apple-designed chips for Mac computers – Kalamata or Star (development stage)
Apple M1 – Tonga, with 4 Firestorm cores and 4 Icestorm cores, with Lifuka GPU cores
Apple M1 Pro – Jade C-Chop
Apple M1 Max – Jade C-Die
Apple M1 Mac Pro – Jade 2C-Die and Jade 4C-Die
Apple M2 – Staten
Apple M2 Pro – Rhodes Chop
Apple M2 Max – Rhodes 1C
Apple M2 Mac Pro – Rhodes 2C
Apple M3 – Ibiza
Computers
Apple
Cortland – Apple IIGS
Tenspeed – Apple II ROM 3
Macintosh
Aladdin – Macintosh SE simulation
Aladdin – Macintosh SE FDHD
Aladdin – Macintosh Quadra 605
Amazon – Macintosh Quadra 950
Apollo – Macintosh Classic II
Atlantic – Macintosh IIcx
Aurora – Macintosh IIcx
Aurora II – Macintosh IIci
Becks – Macintosh II
Blackbird – Macintosh IIfx
Brazil 16c – Macintosh IIvx
Brazil 32c – Macintosh IIvi
Cabernet – Macintosh II
Chablis – Macintosh SE
Chablis – Macintosh SE FDHD
Civic – Macintosh Classic
Cobra – Macintosh IIcx
Cobra II – Macintosh IIci
Crusader – Macintosh Quadra 630
Cyclone – Macintosh Quadra 840AV
Darwin – Macintosh Quadra 900
Dragonkok – Macintosh LC 580
Eclipse – Macintosh Quadra 900
Elsie – Macintosh LC
Elsie III – Macintosh LC III
Erickson – Macintosh IIsi
Espirit – Macintosh Portable
Evo 200 – Macintosh Quadra 700
Fafnir – Macintosh SE/30
Fat Mac – Macintosh 512k, 512ke
Foster Farms – Macintosh LC II
Four Square – Macintosh IIfx
Freeport – Macintosh SE
Freeport – Macintosh SE FDHD
Fridge – Macintosh Quadra 800
F-16 – Macintosh IIfx
F-19 – Macintosh IIfx
Green Jade – Macintosh SE/30
Hook – Macintosh LC 520
Hook 33 – Macintosh LC 550
IIce – Macintosh Quadra 700
IIex – Macintosh Quadra 900
IIxi – Macintosh IIfx
Ikki – Macintosh II
Laguna – Macintosh Portable
LD50 – Macintosh TV
Lisa – Macintosh XL
Little Big Mac – Macintosh II
Macintosh – Macintosh 128K
Malibu – Macintosh Portable
Maui – Macintosh SE
Maui – Macintosh SE FDHD
Milwaukee – Macintosh II
Montana – Macintosh Classic II
Mr. T – Macintosh Plus
Oceanic – Macintosh IIsi
Optimus – Macintosh LC 575
Pacific – Macintosh IIci
Paris – Macintosh II
Peter Pan – Macintosh TV
Pinball – Macintosh LC
PlusPlus – Macintosh SE
PlusPlus – Macintosh SE FDHD
Pomona – Twentieth Anniversary Macintosh
Premise 500 – Macintosh Quadra 900
Primus – Macintosh Quadra 605
Prism – Macintosh LC
Quadra 1000 – Macintosh Quadra 840AV
Raffica – Macintosh IIsi
Ray Ban – Macintosh IIsi
Reno – Macintosh II
Shadow – Macintosh Quadra 700
Show Biz – Macintosh Quadra 630
Show & Tell – Macintosh Quadra 630
Slice – Macintosh Color Classic
Smoke and Mirrors – Twentieth Anniversary Macintosh
Spartacus – Twentieth Anniversary Macintosh
Speedbump 610 – Macintosh Quadra 610
Speedbump 650 – Macintosh Quadra 650
Spike – Macintosh Quadra 700
Spock – Macintosh IIx
Stealth – Macintosh IIfx
Stingray – Macintosh IIci
Stratos – Macintosh IIx
Tempest – Macintosh Quadra 660AV
Typhoon – Macintosh Quadra 840AV
Uzi – Macintosh II
Vail – Macintosh LC III
Weed Whacker – Macintosh IIfx
Wombat 33 – Macintosh Quadra 800
XO – Macintosh Classic
Zone 5 – Macintosh IIfx
Zydeco – Macintosh Quadra 950
eMac
Northern Lights – eMac (ATI Graphics)
P69 – eMac
Q86J – eMac (2005)
iBook
Bismol – iBook
Lanai – iBook
Marble – iBook G3 (Dual USB)
P1 – iBook
P1.5 – iBook (FireWire)
P29 – iBook (Dual USB)
P54 – iBook (14.1 LCD)
P72B – iBook (Opaque 16 MB VRAM)
P72B – iBook (32 MB VRAM)
P73D – iBook (800/900 MHz 32 MB VRAM)
P92 – iBook (late 2001)
Q72 – iBook G4 (early 2004)
Q72B – iBook G4 (mid-2005)
Q73 – iBook G4 (early 2004)
Q73B – iBook G4 (mid-2005)
Son of Pismo – iBook (14.1 LCD)
iMac
MacMan and Columbus – iMac G3 (Bondi Blue)
C1 – iMac (Bondi Blue)
Elroy – iMac (Bondi Blue)
Fino – iMac G5 20"
Hero – iMac G5 (17-inch, 20-inch)
Horizon – iMac G4 (USB 2.0; 15-, 17-inch)
J30 – iMac (21.5-inch, Late 2012)
J31 – iMac (27-inch, Late 2012)
Kihei – iMac, iMac DV, iMac DV+, iMac DV SE
Kiva – iMac (summer 2001)
Life Savers – iMac (5 Flavors)
M23 – iMac G5 20"
P7 – iMac, iMac DV, iMac DV+, iMac DV SE
P79 – iMac G4 (17-inch Flat Panel)
P80 – iMac G4 (Flat Panel)
Q26B – iMac G4 (15-inch USB 2.0)
Q26C – iMac G4 (17-inch USB 2.0)
Q45C – iMac G5 (Ambient Light Sensor) 17-inch
Q45D – iMac G5 (Ambient Light Sensor) 20-inch
Q87 – iMac G5 iSight (17-, 20-inch)
Tailgate – iMac (Bondi Blue)
Tessera – iMac G4 (flat panel)
Mac mini
Kaleidoscope – Mac Mini (early 2006)
Q88 – Mac mini
Twiggy – Mac mini
Mac Pro
J90 – Mac Pro (Round)
K5B – Mac Pro (Mid-2012) & Mac Pro Server (Mid-2012)
MacBook
Stealth – MacBook (12-inch)
M42 – MacBook (Early-2006)
MacBook Air
J11 – MacBook Air (11-inch, Mid-2012)
J13 – MacBook Air (13-inch, Mid-2012)
J41 – MacBook Air (11-inch, Mid-2013)
MacBook Pro
MacBook Pro 13" – J52
Macbook Pro 13" – J130
MacBook Pro (13-inch, Early 2011) – K90I
MacBook Pro (15-inch, Early 2011) – K91
MacBook Pro (17-inch, Early 2011) – K92
MacBook Pro (13-inch, Late 2011) – K90IA
MacBook Pro (15-inch, Late 2011) – K91A
MacBook Pro (17-inch, Late 2011) – K92A
13-inch MacBook Pro with Retina Display- D1
15-inch MacBook Pro with Retina Display – D2
MacBook Pro (Retina, 13-inch, Early 2013) – J44
MacBook Pro (Retina, 15-inch, Early 2013) – J45
MacBook Pro (Retina, 15-inch, Mid 2015) – J53
PowerBook
101 – PowerBook G3 (Bronze Keyboard)
102 – PowerBook G3 (FireWire)
103 – PowerBook G4
AJ – PowerBook Duo 2300c/100
Ansel – PowerBook Duo 250
Asahi – PowerBook 100
Blackbird – PowerBook 540, 540c, 550c, 500 with PowerPC
Blackbird LC – PowerBook 520, 520c, 550c, 500 with PowerPC
BOB W (Best of Both Worlds) – PowerBook Duo 210, 230
Brooks – PowerBook 160
Cinnamon – PowerBook Duo 210, 230
Colt 45 – PowerBook 145
Colt 45 – PowerBook 145B
Comet – PowerBook 2400c
Converse – PowerBook 180
Dart LC – PowerBook 165
Dartanian – PowerBook 180
DBLite – PowerBook Duo 210, 230
Derringer – PowerBook 100
Epic – PowerBook 1400c, 1400cs
Escher – PowerBook Duo 270c
Gemini – PowerBook Duo Dock/Plus/II
Hammerhead – PowerBook G4 (17-inch)
Hokusai – PowerBook 180c
Hooper – PowerBook 3400c
Ivory – PowerBook G4 (DVI)
Jedi – PowerBook 150
Kanga – PowerBook G3
Lombard – PowerBook G3 (Bronze Keyboard)
Mercury – PowerBook G4
Mighty Cat – PowerBook 2400c
Monet – PowerBook 165c
Mustang – PowerBook 5300 Series
M2 – PowerBook 5300
Nautilus – PowerBook 2400c
Omega – PowerBook 190
Omega – PowerBook 190cs
Onyx – PowerBook G4 (Gigabit Ethernet)
P25 – PowerBook G4 (Gigabit Ethernet)
PDQ – PowerBook G3 (September 1998)
Pismo – PowerBook (FireWire)
PowerBook 3500 – PowerBook G3
P8 – PowerBook G3 (FireWire)
P88 – PowerBook G4 Titanium (1 GHz/867 MHz)
P99 – PowerBook G4 (12-inch)
Q16 – PowerBook G4 (15-inch FW800)
Q16A – PowerBook G4 (15-inch 1.5/1.33GHz)
Q41 – PowerBook G4 (17-inch 1.33GHz)
Q41A – PowerBook G4 (17-inch 1.5 GHz)
Q51 – PowerBook G5 (EVT1)
Q54 – PowerBook G4 (12-inch DVI)
Q54A – PowerBook G4 (12-inch 1.33 GHz)
Road Warrior – PowerBook 170
Rosebud – PowerBook 100
Spruce Goose – PowerBook 540/540c
SR-71 – PowerBook 540, 540c, 550c, 500 with PowerPC
Tim – PowerBook 170
Tim Lite – PowerBook 140
Wallstreet – PowerBook G3
Yeager – PowerBook Duo 280/280c
PowerMac
Artemis – Power Mac G3 All-in-One
Kansas – Power Macintosh 8600
Kansas – Power Macintosh 9600
Autobahn – Power Macintosh 9500
BHA (Butt-Head Astronomer) – Power Macintosh 7100
Bongo – Power Macintosh 5200 LC, 5300 LC
Carl Sagan – Power Macintosh 7100
Catalyst – Power Macintosh 7200
Chimera – Power Macintosh 5400
Clockwork – Power Mac G4 (Digital Audio)
Cold Fusion – Power Macintosh 8100
Crusader – Power Macintosh 6200
Cupid – Power Macintosh 4400, 200 Mhz
Cypher – Power Mac G5 (late 2005)
El Capitan – Power Macintosh G3 (Blue & White) enclosure
Elixir – Power Macintosh 6300
Excalibur – Power Macintosh 5400
Flagship – Power Macintosh 8100
Frosty – Power Macintosh 4400, 160 MHz
Gazelle – Power Macintosh 6500
Gossamer – Power Macintosh G3 Beige logic board
Hacksaw – Power Macintosh 6400
Halo – unreleased Hi-end Power Macintosh project (1996)
InstaTower – Power Macintosh 6400
LAW (Lawyers Are Wimps) – Power Macintosh 7100
Medusa2 – Power Mac G4 (Gigabit Ethernet)
Montana – Power Macintosh 7300
Montana 7600 – Power Macintosh 7600
Mystic – Power Mac G4 (Gigabit Ethernet)
Nichrome – Power Mac G4 (Quicksilver)
Nitro – Power Macintosh 8500
Omega – Power Mac G5
Phoenix – Power Macintosh 5500
Piltdown Man – Power Macintosh 6100
Project E – Power Mac G4 (AGP Graphics)
P5 – Power Mac G4 (AGP Graphics)
P57 – Power Mac G4 (Mirrored Drive Doors)
P58 – Power Mac G4 (FW 800)
P9 – Power Mac G4 Cube
PowerExpress – Power Mac 9700 Prototype
Q37 – Power Mac G5
Q77 – Power Mac G5 (June 2004)
Q78 – Power Mac G5 (June 2004)
Quicksilver – Power Mac G4
Rebound – Power Macintosh 5200/5300 LC
Rubicon – Power Mac G4 Cube
Sawtooth – Power Mac G4 (AGP Graphics)
Silk – Power Macintosh G3 (Blue & White)
SnakeBite – Power Mac G4 (Gigabit Ethernet)
Stumpy – unreleased Hi-end Power Macintosh enclosure, prototype of El Capitan
Tangent – Power Mac G4 (Digital Audio)
Tanzania – Power Macintosh 4400, 150 MHz
Titan – Power Mac G4 (Quicksilver)
TNT – Power Macintosh 7500
Trailblazer – Power Macintosh 5200/5300 LC
Transformer – Power Macintosh 5200/5300 LC
Trinity – Power Mac G4 Cube
Tsunami – Power Macintosh 9500
Yikes! – Power Mac G4 (PCI Graphics) logic board
Yosemite – Power Macintosh G3 (Blue & White) logic board; Yosemite 1.5 was the revision 2 board
iPad
J1 – iPad (3rd generation) (Wi-Fi)
J2 – iPad (3rd generation) (Wi-Fi + Cellular)
J72 – iPad Air
J82 – iPad Air 2
J85 – iPad Mini with Retina display
J96 – iPad Mini 4
J98 and J99 – iPad Pro
K48 – iPad (1st generation)
K93 – iPad 2 (Wi-Fi)
K94 – iPad 2 (Wi-Fi + GSM)
K95 – iPad 2 (Wi-Fi + CDMA)
P101 – iPad (fourth generation) (Wi-Fi)
P103 – iPad (fourth generation) (Wi-Fi + Cellular International)
P105 – iPad Mini (1st generation) (Wi-Fi)
P107 – iPad Mini (1st generation) (Wi-Fi + Cellular International)
iPhone
iPhone (first generation) – M68 and Purple or Purple 2
iPhone 3G – N82
iPhone 3GS – N88
iPhone 4 – N90
iPhone 4 (CDMA) – N92
iPhone 4S – N94
iPhone 5 – N41 and N42
iPhone 5C – N48
iPhone 5S – N51 and N53
iPhone 6 – N61
iPhone 6 Plus – N56
iPhone SE (1st generation) – N69
iPhone 6S – N71
iPhone 6S Plus – N66
iPhone 7 – D10
iPhone 7 Plus – D11
iPhone 8 – D20
iPhone 8 Plus – D21
iPhone X – D22 and Ferrari
iPhone XR – N84 and Star or Lisbon or Hangzhou
iPhone XS – D32
iPhone XS Max – D33
iPhone 11 – N104
iPhone 11 Pro – D42
iPhone 11 Pro Max – D43
iPhone SE (2nd generation) – D79
iPhone 12 mini – D52G
iPhone 12 – D53G
iPhone 12 Pro – D53P
iPhone 12 Pro Max – D54P
iPhone 13 mini – D16
iPhone 13 – D17
iPhone 13 Pro – D63
iPhone 13 Pro Max – D64
iPhone 14 Pro – D73
iPod
iPod – Dulcimer
iPod Classic (5th generation) – M25
iPod Touch (1st generation) – N45
iPod Touch (2nd generation) – N72
iPod Touch (3rd generation) – N18
iPod Touch (4th generation) – N81
iPod Touch (5th generation) – N78 and N78a
iPod Touch (6th generation) – N102
Other
Brick – Apple's aluminum unibody manufacturing process
Garta & T288 – An augmented reality device & prototype
Luck & Franc – Apple Glasses, an augmented reality device
Nexus – Retail Store Initiative
Magnolia – Apple facility including a regenerative thermal oxidizer to reduce pollution
Titan – Apple Car
Software
Applications
Apple Fitness+ – Seymour
AR app – Gobi
Mac App Store – Firenze
Apple Music – Fuse
iMessage – Madrid
iTunes – iMusic
Safari (web browser) – Alexander
QuickTime – Warhol
Spotlight – Matador
Swift Playgrounds – Serenity
Walkie-Talkie – Spartan
Reminders – Tantor
AirPods Firmware
For use with AirPods
Build 1A6XX - Theremin
Build 2XXXX - Harmonica
Build 3XXXX - Harpsichord
Build 4XXXX - Piccolo
audioOS
For use with HomePod
audioOS 11
audioOS 12
audioOS 13
audioOS 14
audioOS 15
Classic Mac OS
The classic Mac OS is often cited as having multiple codenames. The codename convention for Mac OS 8 and 9 mostly follow musical terminology.
System 6.0.4 (1989) – Antares
System 6.0.5 (1990) – Big Deal
System 6.0.6 – SixPack (never released due to AppleTalk bug)
System 6.0.8 (1991) – Terminator
System 7 – Blue, Big Bang, M80, Pleiades
System 7.0 (1991) – Furnishings 2000
System 7.0.1 (1991) – Road Warrior, Beta Cheese
System 7.1 (1992) – Cube-E, I Tripoli
System 7.1.1 (aka System 7 Pro) (1993) – Jirocho
Prototype of System 7.1 for x86 processors – Star Trek
System 7.5 (PPC) (1994) – Mozart, Capone
System 7.5.1 – Danook, Thag
System 7.5.2 – Marconi
System 7.5.3 – Unity
System 7.5.3 Revision 2 – Buster
System 7.5.3 Revision 2.1 – Son of Buster
System 7.6 – Harmony
System 7.6.1 – Ides of Buster
Mac OS 8 – Tempo
Mac OS 8.1 – Bride of Buster, Scimitar
Mac OS 8.5 – Allegro
Mac OS 8.5.1 – Rick Ford Release, The
Mac OS 8.6 – Veronica
Mac OS 9.0 – Sonata
Mac OS 9.0.4 – Minuet
Mac OS 9.1 –Fortissimo
Mac OS 9.2 –Moonlight
Mac OS 9.2.1 –Limelight
Mac OS 9.2.2 –LU1
iOS
The codename convention for iOS are ski resorts.
iPhone OS 1
iPhone OS 2
iPhone OS 3
iOS 4
iOS 5
iOS 6
iOS 7
iOS 8
iOS 9
iOS 10
iOS 11
iOS 12
iOS 13
iOS 14
iOS 15
Mac OS X/OS X/macOS
The internal codenames of Mac OS X 10.0 through 10.2 are big cats.
In Mac OS X 10.2, the internal codename "Jaguar" was used as a public name, and, for subsequent Mac OS X releases and for OS X 10.9, big cat names were used as public names and wine names were used as internal codenames.
For OS X releases beginning with 10.10, and for macOS releases, landmarks in California were used as public names.
For OS X releases beginning with 10.11, and for macOS releases, varieties of apples were used as internal code names.
Mac OS X Developer Preview 3 – Bunsen
Mac OS X Developer Preview 4 – Gonzo
Mac OS X 10.0 Cheetah Public Beta – Kodiak
Mac OS X Public Release 1 – Hera
Mac OS X Public Release 2 – Beaker
Mac OS X 10.0 – Cheetah, Cyan
Mac OS X 10.1 – Puma
Mac OS X 10.3 Panther – Pinot
Mac OS X 10.4 Tiger – Merlot
Mac OS X 10.4 Tiger (Support for Intel processors) – Chardonnay
Mac OS X 10.4.1 Tiger – Atlanta
Mac OS X 10.5 Leopard – Chablis
Mac OS X 10.6 Snow Leopard
Mac OS X 10.7 Lion – Barolo
OS X 10.8 Mountain Lion – Zinfandel
OS X 10.9 Mavericks – Cabernet
OS X 10.10 Yosemite – Syrah
OS X 10.11 El Capitan – Gala
macOS Sierra 10.12 – Fuji
macOS High Sierra 10.13 – Lobo
macOS Mojave 10.14 – Liberty
macOS Catalina 10.15 – Jazz
macOS Big Sur 11 – Golden Gate
macOS Monterey 12 – Sky Bravo
Mac OS X Server
Mac OS X Server 1.0 – Rhapsody
Mac OS X Server 10.2 Jaguar – Tigger
tvOS
Version:
9.0-9.0.1 - MonarchTide
9.1 - Tilden
9.1.1 - Noble
9.2 - Angora
9.2.1 - Fern
9.2.2 - Gilmore
10.0 - Union
10.0.1 - Bugle
10.1 - Clementine
10.1.1 - Diamond
10.2 - Emerald
10.2.1 - Florence
10.2.2 - Gold
11.0 - Topaz
11.1 - Bass
11.2-11.2.1 - Coyote
11.2.5-11.2.6 - Dixon
11.3 - Eaton
11.4 - Francis
11.4.1 - Grant
12.0–12.4.1 - Hope
13.0–13.4.5 - Yager
14.0–14.7 - Archer
15.0 - Satellite
watchOS
watchOS often follows the codename convention for beaches.
Betas – all betas carry the following codenames, succeeded by the word "Seed". For example, watchOS 3.2 beta is known as ElectricSeed.
Burrito – Apple Watch sleep tracking
watchOS 1
watchOS 2
watchOS 3
watchOS 4
watchOS 5
watchOS 6
watchOS 7
watchOS 8
Technologies
Switching to x86 architecture and the Intel chip platform – Marklar
A system shell for stereo AR-enabled apps – StarBoard
Apple Card – Broadway
Apple Pay – Stockholm
Apple Cash – Lexington
AppleShare – Killer Rabbit
CarPlay – Stark
CoreMediaIO – Tundra
Dictation Services – Ironwood
Face ID – Pearl
HFS – Turbo File System (TFS)
iCloud – Ubiquity
iOS app support in macOS – Marzipan
Toolbox ROM version $077D – SuperMario
MacInTalk 3.2 Text to Speech (from mis-pronouncing Galatea) – Gala Tea
PowerPC Modern Memory Manager PowerPC – Figment
32-Bit QuickDraw – Jackson Pollock
QuickDraw GX – Skia
Reality Operating System – rOS
ThunderBolt (interface) – T29
Touch ID – Mesa
Apple Watch Electrocardiogram – Cinnamon
Apple Watch Blood Oxygen – Scandium
References
Codenames
Code names
|
49518061
|
https://en.wikipedia.org/wiki/Central%20Information%20Technology%20Office
|
Central Information Technology Office
|
The Central Information Technology Office (or CITO ) is an office under the Ministry of Finance in the country of Belize, located in the capital city of Belmopan. The office manages the government’s primary accounting system (SmartStream), as well as the application for the Income Tax and Sales Tax departments (SIGTAS). The office is also responsible for the implementation of the eGovernment policy. Other CITO responsibilities include, server hosting, for a number of government offices, management of the government's gov.bz email servers, and also the phone and fax services for the government offices in Belmopan.
The office was established in the early 1980s, and was originally called the Belmopan Computer Centre, or BCC. Back then the office's main purpose was to produce electronic financial reports and trade statistics for the government. The source of the data were from paper copies of financial forms, and customs entry transactions that were already processed. These copies would then be sent to BCC for data entry. To enable the office to effectively perform its work, an IBM System/34 mini computer was installed; this computer allowed the data to be entered and verified, and final reports to be produced, which would then be utilized by the various governmental ministries.
History
In the mid to late 1990s, microcomputers were becoming increasingly more popular. Most, if not all, of the government service were using these devices to perform an array of government related work. There were also a few offices that had established networks which allowed the sharing of information and equipment. During this time period, BCC was still utilizing the IBM System/34; the system however, had already reached the end of its support life cycle, and it was becoming more difficult to keep the functioning. In 1999 the government decided that an upgrade to their electronic financial processes was required. As a result, through funding from the European Union (EU), a two (2) year project was approved that would evaluate the entire government’s financial system, and determine suitable systems that could replace it. The project was known as the Financial Management Development Project (FMDP).
As a result of the recommendations that came out of the project, it was decided that all government offices that had an accounting and tax office, would be connected (networked) to each other. The accounting and tax offices would then utilize the SmartStream System, for accounts, and the SIGTAS System, for Income Tax and Sales Tax. It was determined that BCC would be the main hub, and the necessary staff, equipment, supporting software and services, would be provided to allow financial services to be managed. The physical office where BCC was located, was renovated to accommodate the new staff and equipment. The IBM System/34 was removed from the premises and given to the museum office. In the year 2000, live testing of the system commenced, and by 2005, the system was being utilized in most financial offices of the government. Aside from the financial services, BCC also offered centralized file storage, resource equipment sharing, such as printers, as well as an internal email system. These services were restricted, however, to those offices that were connected to the system; usually the accounts and the tax offices.
After seeing the benefits of the country wide network, BCC began to get more requests for the use of its infrastructure for services not just related to accounting and taxes. Gradually these requests were honored, and BCC began to extend its services to more than just the management and administration of the financial applications. Based on the evolving roles, the name was changed from the Belmopan Computer Centre (BCC), to the Central Information Technology Office (CITO). CITO was now the primary office for computing services for the government. In 2015, the office received an ISO/IEC 27001:2013 certification, since it brought into accordance its procedures, policies and documentation.
Footnotes
Government of Belize
Information technology organizations based in the Caribbean
|
17402034
|
https://en.wikipedia.org/wiki/CiviCRM
|
CiviCRM
|
CiviCRM ( C-R-M) is a web-based suite of internationalized open-source software for constituency relationship management that falls under the broad rubric of customer relationship management. It is specifically designed for the needs of non-profit, non-governmental, and advocacy groups, and serves as an association-management system.
CiviCRM is designed to manage information about an organization's donors, members, event registrants, subscribers, grant-application seekers and funders, and case contacts. Volunteers, activists, and voters - as well as more general sorts of business contacts such as employees, clients, or vendors - can be managed using CiviCRM.
Description
CiviCRM's core system tracks contacts, relationships, activities, groups, tags and permissions, while additional components keep track of contributors (CiviContribute), events (CiviEvent), member lists (CiviMember), cases (CiviCase), grants (CiviGrant), campaigns (CiviCampaign), petitions (CiviPetition), bulk mailings (CiviMail), and reports (CiviReport). These components can be activated or deactivated to meet the needs of the specific organization.
CiviCRM is deployed in conjunction with either the Backdrop CMS, Drupal, Joomla! or WordPress content management systems (CMS) and is supported by many hosting and professional services companies. Both the Drupal and Joomla! professional associations use CiviCRM. CiviCRM's license is the GNU AGPL 3.
CiviCRM's latest version supports Backdrop CMS, Drupal 7/8/9, Joomla 3.x and WordPress. There are a wide and growing number of integration modules with these CMSes to leverage their strengths. A large number of tokens are available for inclusion in HTML or plaintext emails, or for producing PDF files for printing. Data-integration formats supported include RSS, JSON, XML, and CSV. Supported programming interfaces include REST, server PHP and client JavaScript APIs, a CMS-agnostic extensions framework, and Drupal style hooks.
A book is available on the software. Extensive administrative, developer, and user documentation is available on the project site. There are also active forums and an IRC channel.
CiviCRM downloads are available from both the official site, CiviCRM.org, and SourceForge, where it was 'project of the month' for January 2011.
CiviMobile is a mobile app based on CiviCRM which has been developed by the Ukrainian IT company Agiliway. It allows NGOs and non-profits to use the features of CiviCRM platform on smartphones. The app enables users to manage their contacts, calendar, cases, activities, events, contact payments and donations from their CiviCRM database. The app also incorporates QR code ticketing for events. Agiliway released its 4th version of the app in July 2019.
Users
CiviCRM is used by many large NGOs including Amnesty International, Creative Commons, the Free Software Foundation, CERN, the Wikimedia Foundation, and KDE for their fundraising. CiviCRM is also used by Kabissa to provide CRM capabilities to over 1,500 organizations, mostly in Africa.
Other users include the Green Party of England and Wales and the Institute of Fisheries Management.
See also
Customer relationship management
Epesi
SplendidCRM
SuiteCRM
Dolibarr
Comparison of CRM systems
List of free and open-source software packages
References
Further reading
Various authors: CiviCRM manual. Free book (GPL) by FLOSS Manuals (1st ed. May 2009, 2nd ed. May 2010, 3rd ed. March 2011). Covers CiviCRM's core functionality for contacts (individuals, households, and organizations), relationships, and activities, as well as its four main modules: CiviContribute, CiviEvent, CiviMail, and CiviMember.
Free online books at CiviCRM Books
Joseph Murray and Brian Shaughnessy: Using CiviCRM. Packt Publishing. Develop and implement a fully functional, systematic CRM plan for your organization Using CiviCRM.
External links
CiviCRM on StackExchange
Customer relationship management software
Free customer relationship management software
Free software programmed in PHP
Joomla extensions
Software using the GNU AGPL license
Free database management systems
|
43119948
|
https://en.wikipedia.org/wiki/List%20of%20Die%20Hard%20characters
|
List of Die Hard characters
|
The characters in the Die Hard film series, including John McClane (played by Bruce Willis), are based on the 1979 novel Nothing Lasts Forever by Roderick Thorp.
Protagonists
John McClane
The reluctant hero in the series. John McClane is a New York City cop who finds himself taking on terrorists and saving his loved ones. In Die Hard, he gets invited to his wife's Christmas Party at Nakatomi Plaza in Los Angeles when the building she is in is under attack by terrorists led by Hans Gruber. McClane must stop his evil scheme before it's too late. McClane defeats the terrorists and thwarts Gruber's plan, sending him falling off the building. John and Holly reconcile and get back together.
In Die Hard 2, McClane now has a new problem and must battle anti-special forces mercenaries led by Colonel Stuart, who take over Dulles airport and leave several planes (including his wife Holly's) circling in the air running low on fuel, while also dealing with a difficult airport police captain. Once again, the day is saved when McClane takes out Stuart and his mercenaries by blowing up his plane with his Zippo lighter.
He is portrayed by Bruce Willis.
Holly Gennero McClane
Holly McClane is John McClane's wife. Over the course of the series, their relationship becomes increasingly strained. They have two children together, John ("Jack") and Lucy. Holly is portrayed by actress Bonnie Bedelia in the first two films, Die Hard and Die Hard 2.
In Die Hard, Holly has recently moved to Los Angeles with Jack and Lucy to pursue a new career opportunity with Nakatomi Corporation. She is estranged from McClane, who decides to remain in New York City with the hope that Holly would return home.
In Die Hard 2, Holly and John appear to be on the path to reconciliation, although their relationship is far from perfect. Her role is significantly diminished from that of the first film.
Although Holly does not appear in Die Hard with a Vengeance, she is mentioned in conversation. McClane makes an attempt to telephone her, and her voice is heard briefly on the phone. She still resides in Los Angeles and is still married to McClane.
In Live Free or Die Hard, cyber-terrorist Thomas Gabriel notes that McClane and Holly are now divorced.
In A Good Day to Die Hard, she is mentioned by John when John and Jack are on their mission.
Al Powell
Sgt. Al Powell was a cop who helps out McClane in the first two Die Hard films. In Die Hard on Christmas Eve he is sent to check Nakatomi Plaza to see if anything dangerous is going on. A terrorist falls out of one of the windows causing Powell to crash his car calling for more backup. He is played by Reginald VelJohnson.
Lucy McClane
Lucy is the daughter of John McClane & Holly Gennero and the sister of John "Jack" McClane Jr. She was estranged from her father, but during her college years in Rutgers University, she was kidnapped by cyber-terrorist Thomas Gabriel. After her father saves her and Matt Farrell, they seemed to be on speaking terms and that she changed her last name from Gennero to McClane. Several years later, Lucy drove her father to the airport as he goes to Russia to investigate the arrest of her brother Jack. She was seen when John returns with Jack and she reunites with them after their adventure in Moscow and Chernobyl, Ukraine. She is portrayed by Mary Elizabeth Winstead.
In Live Free or Die Hard, Lucy tells her boyfriend that McClane is dead and calls herself "Lucy Gennero", her mother's maiden name. She is later kidnapped by cyber-terrorist Thomas Gabriel for leverage against her father. She proves to be resilient, tells her father the positions of Gabriel's men, and injures one when McClane is incapacitated. By the end of the film, she calls herself "Lucy McClane" and develops feelings for a hacker called Matt Farrell.
Winstead reprised her role for a cameo appearance in A Good Day to Die Hard. Since Live Free or Die Hard, she and John have mended their relationship. After Lucy drops her father off to the airport, she warns her father "not to screw up" when he travels to Russia. She later calls him while he's in the middle of a car chase and he has to hang up. She meets his plane when he returns with Jack and happily reunites with both.
Prior to Live Free or Die Hard, Lucy was featured in the video game Die Hard: Vendetta as a member of the Los Angeles Police Department.
John Jack McClane Jr.
John "Jack" Jr. is the son of John McClane & Holly Gennero and the brother of Lucy McClane. He plays a main role in A Good Day to Die Hard. When Jack is arrested for an assassination in a nightclub in Moscow, McClane who hasn't spoke to his son for several years heads over there to find out what happened to him. It is later revealed that Jack is a CIA operative set on a deep-cover mission in Russia that has lasted for three years without his father's knowledge. He is portrayed by Jai Courtney.
In Live Free or Die Hard, cyber-terrorist Thomas Gabriel calls him Jack, which is a common alternative nickname for "John" in the United States. In early drafts of the script of Live Free or Die Hard, John Jr. was set to be in the film.
In A Good Day to Die Hard, Jack is a CIA agent stationed in Russia to retrieve Yuri Komarov, a political prisoner who had evidence against Viktor Chagarin in a file at Chernobyl. To get close to Komarov, he kills a Russian millionaire and asks to testify against Komarov for a shorter sentence. John McClane goes to Russia after finding out about Jack's arrest, but not his CIA mission or ties. Similar to daughter Lucy in Live Free or Die Hard, son Jack was estranged from his father.
Jack and his father gain admiration and respect for each other. They take down Komarov and his daughter Irina and discover their true plot of retrieving weapon-grade uranium from Chernobyl. Jack throws Komarov to death into the rotor-blades of Irina's helicopter, after he claims John will die.
Antagonists
Hans Gruber
Hans Gruber is the main antagonist of Die Hard. He is a cold and unpredictable ex-Volksfrei radical from Zittau in East Germany, who leads a gang of thieves who take over Nakatomi Plaza, imprisoning hostages as part of a scheme to heist $640 million in bearer bonds from the building's vault. His plan comes to a halt when John McClane kills three of his men and steals his bag of C-4 explosives. Gruber then sends Karl Vreski, Fritz, and Franco, to retrieve them, all the while dealing with the police and the hostages. Gruber meets McClane himself disguised as "Bill Clay", but is quickly discovered. A shootout with McClane ensues, and despite losing Fritz and Franco, he manages to retrieve the detonators and escape. He later discovers one of the hostages, Holly Gennero, is McClane's wife, and keeps her as a hostage as he steals the bearer bonds. John McClane confronts Hans Gruber and his surviving henchman Eddie in the end and, although Gruber seems to have the upper hand, he is shot in the shoulder and falls out a window, still clinging to Holly. McClane saves his wife and Gruber falls to his death.
He was portrayed by Alan Rickman.
Karl Vreski
Karl Vreski is Hans Gruber's right-hand man, who leads the hunt for John McClane in Nakatomi Plaza. John seemingly kills Karl by hanging him from some chains. Karl survives and once more attempts to kill John, only to be shot dead by Al Powell.
He was portrayed by Alexander Godunov.
Theo
Theo is a computer hacker working for Hans Gruber who appears in Die Hard, and one of the groups only Americans. Theo is snarky and arrogant, often cracking jokes, even when others are killed. Theo attempts to escape after arming the C4, only to be knocked unconscious by Argyle.
He was portrayed by Clarence Gilyard.
Eddie
Eddie is one of the terrorists working for Hans Gruber. During Sergeant Al Powell's inspection of the Nakatomi Plaza, Eddie disguises himself as a guard and convinces Powell nothing is wrong. Eddie ends up being one of the only remaining terrorists when Gruber holds Holly hostage, but is shot in the head by John.
He was portrayed by Dennis Hayden.
Gruber’s team of terrorists
Gruber had 12 other terrorists assist him hold up Nakatomi Plaza on Christmas Eve.
Karl Vreski, Hans' second-in-command, who takes out the Nakatomi security guards, disables the building's phone lines and leads the hunt for John McClane to avenge his brother.
Theo, Hans' American computer expert, who locks down the Nakatomi entrances from the security room and code-breaks the vault's locks (except for the last one)
Tony is Karl's brother, who disables the phone lines. Tony is the first of the terrorists to be killed by McClane, who unintentionally breaks his neck in a fight.
Franco is in charge of watching the hostages. Franco is shot in the knees by McClane, and then smashes his head through a plate glass window as he stumbles—killing him instantly. Franco and fellow terrorist Kristoff are both French.
Uli is notably seen eating a candy bar during the shootout with the SWAT team. Uli is gunned down by McClane while Uli forces the hostages onto the roof. Uli is Asian.
Fritz is a terrorist. He is killed by McClane, who shoots him with a sub machine gun.
Kristoff is Theo's assistant. Kristoff is pistol whipped by McClane, and it is left unclear if he survived. Like Franco, Kristoff is also French.
James is one of the terrorists who fire the missile launcher. James is killed when McClane drops C4 down an elevator shaft leading to the floor James is on.
Alexander is one of the terrorists who fire the missile launcher. Alexander is killed by exploding C4.
Heinrich is the terrorist in charge of the C4 and detonators. He is shot dead by McClane in the boardroom immediately before McClane's shootout with Marco.
Marco is an unhinged Italian terrorist. Marco is shot dead by McClane, who tosses Marco's body out a window and onto Powell's car.
Eddie: Hans' American watchman, who disguises himself as the security guard managing the front desk in the building's lobby.
William Stuart
Colonel William Stuart is the main antagonist of Die Hard 2. He is an ex-Special Forces commander who leads a troop of soldiers who takeover Dulles Airport and use makeshift equipment from a church to control all flights from the main command Center, and to free dictator General Ramon Esperanza from Val Verde. He first meets McClane by chance when the two accidentally bump into each other. Stuart takes total control of the airport when his men destroy the main antenna array, and he discovers John McClane is foiling his mission. In retaliation for the soldiers he lost, Stuart causes a plane to crash and he warns the control tower and McClane to stay away from his business. He later receives contact from General Esperanza that he is landing the plane and to turn on the runway lights so he can safely land. Stuart and his men arrive to see him, only to be ambushed by McClane. Luckily, a soldier traps McClane in the cabin and Stuart commands his men to throw grenades in the cockpit. It explodes but McClane was barely able to escape the plane, and Stuart was forced to flee as cop cars were approaching. Back at the church, Stuart prepared a "shootout" with Major Grant and escaped via snowmobile. Now having Esperanza and Grant at his side, they leave the United States for an island on a jet, but are pursued by McClane. He gets the chance to fist fight McClane on the plane's wing and wins by knocking him off the wing. Unfortunately for Colonel Stuart, he did not see McClane pull the latch and cause fuel to leak, and Stuart is killed as the plane explodes.
He is portrayed by William Sadler.
Ramon Esperanza
General Ramon Esperanza was a cruel South American dictator and drug lord of the Republic of Val Verde.
He is portrayed by Franco Nero.
Major Grant
Major Grant is a corrupt Army special forces commander who appears in Die Hard 2.
He is portrayed by John Amos.
Simon Gruber
Simon Peter Gruber (alias Peter Krieg) is the main antagonist of Die Hard with a Vengeance. He is Hans Gruber's older brother, who at first seems to be avenging his brother's death from the first film. A puzzler, Simon makes John McClane play a twisted version of Simon Says. After a bomb destroyed a department store in Manhattan, Simon calls the NYPD Headquarters, taking responsibility for the bomb. He then orders the police to send John McClane to Harlem wearing a racist sign that reads "I Hate Niggers". Simon then orders John and his new partner shopkeeper Zeus Carver to reach a nearby telephone booth or else he will blow up another downtown building. He gives them a riddle to solve and answer in the form of a phone number. When they fail, he fools them that a trash can is now set to explode, only to reveal he did not say "Simon Says". Next, he orders both men to get to Wall Street Station within 30 minutes before a bomb is set to explode in the subway. Because both men failed to arrive at the subway station together, the bomb just about explodes near the station. It still does but nobody is killed. The second explosion was part of a scheme by Simon to create a pathway to break into the New York Federal Reserve Bank and steal gold bullion worth millions to billions of dollars. Simon then sends a threat warning to the police if they bother contacting themselves by radio, it will result in an explosion in one of many schools in downtown Manhattan. As the police are being lured to the schools, Simon on the other hand goes briefly undercover to enter his way through the main entrance of the bank. His henchmen break through the rear and steal millions in gold bullion that they load onto many dump trucks. The gold is subsequently exported to Quebec, Canada before Simon imprisons John McClane and Zeus Carver in his barge, where he reveals luring the police away was part of his plan to steal the gold and the real bomb was within the ship the whole time. When Simon flees to Quebec, his men celebrate with beer and Simon dedicates his success by having sex with his female accomplice Katya. But his plan is foiled when McClane and the Royal Canadian Mounted Police raid the warehouse and recover the stolen gold. When Simon attempts his escape in a helicopter, he is killed when McClane shoots an electric cable that catches fire on the helicopter's rotors and explodes.
He is portrayed by Jeremy Irons.
Katya
Katya is Simon Gruber's right-hand woman in Die Hard with a Vengeance.
Mathias Targo
Thomas Gabriel
Thomas Gabriel is a crazed former DOD (Department of Defense) agent turned traitor and cyber terrorist, and the main antagonist of Live Free or Die Hard. Gabriel is a hacker who attempted to show the DOD how the United States security features could be subject to a Fire Sale. No one believed him and he was relieved of his duties, which turned him against his country. He hired several criminal hackers all over the nation to assist him in his plot to shut down all computer-run systems in the United States. While at work with his task, his henchmen planted bombs in several homes with internet connectivity and killed every single one except for one young man named Matthew Farrell. John McClane, now an older man than when he last was involved in a deadly mission, saved him at the last minute; he was close to execution by Gabriel's bomb. Now with a victim on the loose, Gabriel orders his henchmen to track him and find him so he can continue his operation with his Fire Sale, a chain of events involving total control of the nations security systems and electrical power. With the help of Farrell, McClane works to stop Gabriel's Fire Sale, leading to Gabriel kidnapping McClane's daughter Lucy. During a final confrontation, Gabriel holds McClane at gunpoint and taunts him while digging his gun into a bullet wound in McClane's shoulder. In response, McClane grabs Gabriel's gun and fires it through himself and into Gabriel who is standing behind him, killing Gabriel.
He is portrayed by Timothy Olyphant.
Mai Linh
Mai Linh is a Thomas Gabriel's girlfriend and second-in-command, who assists Gabriel in his plans to shut down the US infrastructure in order to steal billions of dollars from the Woodlawn Facility. She appeared in Live Free or Die Hard.
She is portrayed by Maggie Q.
Yuri Komarov
Yuri Komarov is a former Russian billionaire and political prisoner, and the main antagonist of A Good Day to Die Hard, although his true nature is not revealed until late in the story. A clever strategist, he pretends to be weak and feeble in the presence of his adversaries. He is initially held without trial for refusing to hand over a secret file containing incriminating evidence against former associate and corrupt politician Viktor Chagarin. Jack McClane, under arrest for an assassination attempt, agrees to testify against Komarov in court, in exchange for a shorter sentence. On the day of the trial, the courthouse is bombed by Chagarain's henchmen, led by Alik; in the confusion, Jack escapes with Komarov. John McClane, having come to Moscow to help his son, goes after them, and they are both pursued by Alik and his men. They lose their pursuers and go to a safe house, where Jack's CIA associates demand the location of the file from Komarov in order to bring down Chagarin. Komarov agrees to help on the condition that he and his daughter are given protection and safe passage out of Russia. The safe house is raided by Chagarin's men, but Komarov escapes with the McClanes; he leads them to a hotel to collect a key to the vault containing the file. His daughter Irina is there to meet him, as arranged, but she is revealed to be working for Chagarin for money. She and Alik take her father prisoner, traveling to Chernobyl, where the file is hidden. They enter the vault supposedly containing the file, but Komarov suddenly shoots Alik, before calling Chagarin and revealing that he and Irina planned all along to betray him. Komarov then has one of his men strangle Chagarin. The McClanes enter the vault, and Komarov tells them there never was a file; the vault is instead filled with vast stocks of weapons-grade uranium, worth billions. Irina comes to her father's aid, and a gunfight ensues; John pursues Irina, who escapes in a helicopter, while Jack goes after Komarov. The two face off on the roof, and Komarov taunts Jack, saying his father will soon be dead; enraged, Jack throws Komarov from the rooftop into the path of the whirling helicopter blades.
He is portrayed by Sebastian Koch.
Allies
Al Powell
Al is a Los Angeles Police sergeant who shared a friendship with John McClane after helping with the takeover of Nakatomi Building in Los Angeles. During the first movie, Al is dispatched to check out McClane's emergency radio call and is nearly killed by the terrorists after McClane drops the body of Marco on his police car. Following this, Al communicates with McClane by radio, keeping his spirits up and keeping him apprised of the situation outside. At the end of the movie, McClane and Al meet face to face and Al kills the last terrorist, Karl, who had a personal grudge against McClane. In the second movie, McClane calls Al to run the fingerprints of a man he has killed. Al identifies the man as a Special Forces soldier who was supposedly killed two years prior in Honduras. Al's favorite snack is a Twinkie. He is portrayed by Reginald VelJohnson and appears in both Die Hard and Die Hard 2.
Argyle
Argyle is the limo driver assigned to pick up John McClane from LAX and transport him to the Nakatomi Plaza for the Nakatomi Corporation's 1988 Christmas party. Argyle offers to wait in the garage until John knows for certain if he was riding home with Holly or if he needed other transportation. He is unknowingly locked in the garage by the Nakatomi vault heist team. Near the end of the film, Argyle notices Theo trying to prepare an ambulance for the terrorists' escape. Argyle then rams the ambulance with his limo and knocks out Theo with a punch to the jaw. Argyle drives John and Holly home to celebrate Christmas Eve. Argyle is portrayed by De'voreaux White and appears in Die Hard.
Marvin
Marvin is an airport janitor who helps McClane in his mission to save the planes from low fuel. When he meets McClane, he first finds him suspicious and thought he was stealing his record. He is portrayed by Tom Bower and appears in Die Hard 2.
Leslie Barnes
Barnes is a chief engineer at Dulles airport and communications specialist. He is portrayed by Art Evans and appears in Die Hard 2.
Trudeau
Trudeau is the chief of operations at Dulles airport, who appeared in Die Hard 2. He is portrayed by Fred Dalton Thompson.
Corporal Telford
Corporal Telford is a new transfer to Major Grant's unit, replacing a sick soldier, who appears in Die Hard 2. After the battle with Colonel Stuart's men at the church, Telford is killed by Grant, who was working with Stuart. He is portrayed by Patrick O'Neal.
Zeus Carver
Carver is a black supremacist Harlem shop owner who saves McClane from a mob of gang members angered by the racist sign the latter was forced to wear by Simon. As punishment for interfering, Carver is forced by Simon to aid McClane through various dangerous tasks across New York City. Although he is prejudiced against white people, Carver eventually grows to respect McClane as the two effectively work together to complete each task. In the end after McClane kills Simon, Carver encourages McClane to patch things with his estranged wife, Holly. He is portrayed by Samuel L. Jackson and appears in Die Hard with a Vengeance.
Matt Farrell
Farrell is a computer hacker portrayed by Justin Long who inadvertently aids Thomas Gabriel in his Fire Sale. After being sent to bring Farrell in for questioning by the FBI, John McClane saves his life and teams up with Farrell to stop Gabriel. During the final confrontation, Farrell is forced to decode Gabriel's stolen data he'd previously encrypted to hinder him with the lives of McClane and his daughter Lucy on the line. After McClane kills Gabriel, Farrell is able to reach McClane's gun in time to shoot Gabriel's last henchman dead, saving McClane's life. He later expresses an interest in Lucy, something she returns to McClane's annoyance. He appears in Live Free or Die Hard.
Warlock
Warlock, real name Freddy Kaludis, is a hacker and an old friend of Matt Farrell's from space camp. When Thomas Gabriel shuts down the nation, Warlock is still online due to his generators and Farrell and John McClane enlist his help in finding Gabriel. Though reluctant, Warlock aids the two in tracking Gabriel who contacts them through Warlock's equipment and threatens the life of Lucy McClane. McClane later uses the CB radio in the terrorists hijacked truck to contact Warlock and ask him to connect McClane to Deputy Director Bowman of the FBI. While Warlock initially refuses to contact the head of the FBI's Cyber Division, he agrees after being informed that Lucy has been kidnapped by Gabriel and connects McClane and Bowman. He is portrayed by actor/comedian Kevin Smith and appears in Live Free or Die Hard.
Miguel Bowman
Bowman is a deputy director in the FBI and is in charge of the Cyber Division and thus the country's infrastructure. When Thomas Gabriel begins his Fire Sale, Bowman orders all known hackers brought in for questioning before a fake anthrax alarm forces Bowman and his men to evacuate. While dealing with the situation, Bowman is approached by John McClane and Matt Farrell, one of the hackers Bowman had ordered brought to him and who had been the target of an assassination attempt by Gabriel's men. While dismissing Farrell's theory of a Fire Sale, Bowman sends him to the Department of Homeland Security to tell them what he knows. McClane later notifies Bowman of the failure of their attempt to reach Homeland Security and the two men watch Gabriel start to terrorize the country before being cut-off. Bowman later identifies Gabriel for McClane after being sent a picture of him and explains Gabriel's history before losing contact. When Farrell sets off an alarm at the Woodlawn Building, Bowman personally leads an assault team to stop the terrorists before McClane contacts him once again with the help of the hacker Warlock. McClane warns Bowman that Gabriel has captured his daughter and Farrell and gives Bowman the license plate number of Gabriel's Hazmat van so Bowman can use its lo jack system to track the terrorists. At McClane's insistence, Bowman promises to take care of Lucy if anything happens to McClane. After the terrorists are dead, Bowman and his team finally arrive at their hideout. As his men threaten Matt Farrell, Bowman calls them off and later thanks McClane for his help. He is portrayed by actor Cliff Curtis and appears in Live Free or Die Hard.
Mike Collins
Mike Collins is a CIA Agent and Jack McClane's partner during the operation in arresting Victor Chagarin. Collins meets John, Komarov, and Jack. They are suddenly attacked by a sniper, who shoots Collins in the head.
He is portrayed by Cole Hauser and appears in A Good Day to Die Hard.
References
Characters
Die Hard
|
487132
|
https://en.wikipedia.org/wiki/Analytics
|
Analytics
|
Analytics is the systematic computational analysis of data or statistics. It is used for the discovery, interpretation, and communication of meaningful patterns in data. It also entails applying data patterns towards effective decision-making. It can be valuable in areas rich with recorded information; analytics relies on the simultaneous application of statistics, computer programming and operations research to quantify performance.
Organizations may apply analytics to business data to describe, predict, and improve business performance. Specifically, areas within analytics include descriptive analytics, diagnostic analytics, predictive analytics, prescriptive analytics, and cognitive analytics. Analytics may apply to a variety of fields such as marketing, management, finance, online systems, information security, and software services. Since analytics can require extensive computation (see big data), the algorithms and software used for analytics harness the most current methods in computer science, statistics, and mathematics.
Analytics vs analysis
Data analysis focuses on the process of examining past data through business understanding, data understanding, data preparation, modelling and evaluation, and deployment. It is a subset of data analytics, which takes multiple data analysis processes to focus on why an event happened and what may happen in the future based on the previous data. Data analytics is used to formulate larger organization decisions.
Data analytics is a multidisciplinary field. There is extensive use of computer skills, mathematics, statistics, the use of descriptive techniques and predictive models to gain valuable knowledge from data through analytics. There is an increasing use of the term advanced analytics, typically used to describe the technical aspects of analytics, especially in the emerging fields such as the use of machine learning techniques like neural networks, decision tree, logistic regression, linear to multiple regression analysis, classification to do predictive modeling. It also includes unsupervised machine learning techniques like cluster analysis, Principal Component Analysis, segmentation profile analysis and association analysis.
Applications
Marketing optimization
Marketing organizations use analytics to determine the outcomes of campaigns or efforts, and to guide decisions for investment and consumer targeting. Demographic studies, customer segmentation, conjoint analysis and other techniques allow marketers to use large amounts of consumer purchase, survey and panel data to understand and communicate marketing strategy.
Marketing analytics consists of both qualitative and quantitative, structured and unstructured data used to drive strategic decisions in relation to brand and revenue outcomes. The process involves predictive modelling, marketing experimentation, automation and real-time sales communications. The data enables companies to make predictions and alter strategic execution to maximize performance results.
Web analytics allows marketers to collect session-level information about interactions on a website using an operation called sessionization. Google Analytics is an example of a popular free analytics tool that marketers use for this purpose. Those interactions provide web analytics information systems with the information necessary to track the referrer, search keywords, identify IP address, and track activities of the visitor. With this information, a marketer can improve marketing campaigns, website creative content, and information architecture.
Analysis techniques frequently used in marketing include marketing mix modeling, pricing and promotion analyses, sales force optimization and customer analytics e.g.: segmentation. Web analytics and optimization of websites and online campaigns now frequently work hand in hand with the more traditional marketing analysis techniques. A focus on digital media has slightly changed the vocabulary so that marketing mix modeling is commonly referred to as attribution modeling in the digital or marketing mix modeling context.
These tools and techniques support both strategic marketing decisions (such as how much overall to spend on marketing, how to allocate budgets across a portfolio of brands and the marketing mix) and more tactical campaign support, in terms of targeting the best potential customer with the optimal message in the most cost-effective medium at the ideal time.
People analytics
People analytics uses behavioral data to understand how people work and change how companies are managed.
People analytics is also known as workforce analytics, HR analytics, talent analytics, people insights, talent insights, colleague insights, human capital analytics, and HRIS analytics. HR analytics is the application of analytics to help companies manage human resources. Additionally, HR analytics has become a strategic tool in analyzing and forecasting Human related trends in the changing labor markets, using Career Analytics tools. The aim is to discern which employees to hire, which to reward or promote, what responsibilities to assign, and similar human resource problems.
It has been suggested that People Analytics is a separate discipline to HR analytics, representing a greater focus on business issues rather than administrative processes, and that People Analytics may not really belong within Human Resources in organizations. However, experts disagree on this, with many arguing that Human Resources will need to develop People Analytics as a key part of a more capable and strategic business function in the changing world of work brought on by automation. Instead of moving People Analytics outside HR, some experts argue that it belongs in HR, albeit enabled by a new breed of HR professional who is more data-driven and business savvy.
Portfolio analytics
A common application of business analytics is portfolio analysis. In this, a bank or lending agency has a collection of accounts of varying value and risk. The accounts may differ by the social status (wealthy, middle-class, poor, etc.) of the holder, the geographical location, its net value, and many other factors. The lender must balance the return on the loan with the risk of default for each loan. The question is then how to evaluate the portfolio as a whole.
The least risk loan may be to the very wealthy, but there are a very limited number of wealthy people. On the other hand, there are many poor that can be lent to, but at greater risk. Some balance must be struck that maximizes return and minimizes risk. The analytics solution may combine time series analysis with many other issues in order to make decisions on when to lend money to these different borrower segments, or decisions on the interest rate charged to members of a portfolio segment to cover any losses among members in that segment.
Risk analytics
Predictive models in the banking industry are developed to bring certainty across the risk scores for individual customers. Credit scores are built to predict an individual's delinquency behavior and are widely used to evaluate the credit worthiness of each applicant. Furthermore, risk analyses are carried out in the scientific world and the insurance industry. It is also extensively used in financial institutions like online payment gateway companies to analyse if a transaction was genuine or fraud. For this purpose, they use the transaction history of the customer. This is more commonly used in Credit Card purchases, when there is a sudden spike in the customer transaction volume the customer gets a call of confirmation if the transaction was initiated by him/her. This helps in reducing loss due to such circumstances.
Digital analytics
Digital analytics is a set of business and technical activities that define, create, collect, verify or transform digital data into reporting, research, analyses, recommendations, optimizations, predictions, and automation. This also includes the SEO (search engine optimization) where the keyword search is tracked and that data is used for marketing purposes. Even banner ads and clicks come under digital analytics. A growing number of brands and marketing firms rely on digital analytics for their digital marketing assignments, where MROI (Marketing Return on Investment) is an important key performance indicator (KPI).
Security analytics
Security analytics refers to information technology (IT) to gather security events to understand and analyze events that pose the greatest risk. Products in this area include security information and event management and user behavior analytics.
Software analytics
Software analytics is the process of collecting information about the way a piece of software is used and produced.
Challenges
In the industry of commercial analytics software, an emphasis has emerged on solving the challenges of analyzing massive, complex data sets, often when such data is in a constant state of change. Such data sets are commonly referred to as big data. Whereas once the problems posed by big data were only found in the scientific community, today big data is a problem for many businesses that operate transactional systems online and, as a result, amass large volumes of data quickly.
The analysis of unstructured data types is another challenge getting attention in the industry. Unstructured data differs from structured data in that its format varies widely and cannot be stored in traditional relational databases without significant effort at data transformation. Sources of unstructured data, such as email, the contents of word processor documents, PDFs, geospatial data, etc., are rapidly becoming a relevant source of business intelligence for businesses, governments and universities. For example, in Britain the discovery that one company was illegally selling fraudulent doctor's notes in order to assist people in defrauding employers and insurance companies is an opportunity for insurance firms to increase the vigilance of their unstructured data analysis.
These challenges are the current inspiration for much of the innovation in modern analytics information systems, giving birth to relatively new machine analysis concepts such as complex event processing, full text search and analysis, and even new ideas in presentation. One such innovation is the introduction of grid-like architecture in machine analysis, allowing increases in the speed of massively parallel processing by distributing the workload to many computers all with equal access to the complete data set.
Analytics is increasingly used in education, particularly at the district and government office levels. However, the complexity of student performance measures presents challenges when educators try to understand and use analytics to discern patterns in student performance, predict graduation likelihood, improve chances of student success, etc. For example, in a study involving districts known for strong data use, 48% of teachers had difficulty posing questions prompted by data, 36% did not comprehend given data, and 52% incorrectly interpreted data. To combat this, some analytics tools for educators adhere to an over-the-counter data format (embedding labels, supplemental documentation, and a help system, and making key package/display and content decisions) to improve educators' understanding and use of the analytics being displayed.
Risks
The main risk for the people is discrimination like price discrimination or statistical discrimination.
There is also the risk that a developer could profit from the ideas or work done by users, like this example: Users could write new ideas in a note taking app, which could then be sent as a custom event, and the developers could profit from those ideas. This can happen because the ownership of content is usually unclear in the law.
See also
References
External links
Financial data analysis
Formal sciences
Business terms
Business intelligence
Big data
|
4888774
|
https://en.wikipedia.org/wiki/PhotoRec
|
PhotoRec
|
PhotoRec is a free and open-source utility software for data recovery with text-based user interface using data carving techniques, designed to recover lost files from various digital camera memory, hard disk and CD-ROM. It can recover the files with more than 480 file extensions (about 300 file families).
It is also possible to add custom file signature to detect less known files.
PhotoRec does not attempt to write to the damaged media the user is about to recover from. Recovered files are instead written to the directory from which PhotoRec is run, any other directory may be chosen. It can be used for data recovery or in a digital forensics context.
PhotoRec is shipped with TestDisk.
PhotoRec is compatible with:
DOS (either real or in a Windows 9x DOS box)
Microsoft Windows: NT4, 2000, XP, 2003, 2008, 2016, Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Linux
FreeBSD, NetBSD, OpenBSD
SunOS
macOS
ARM
Functionality
FAT, NTFS, ext2/ext3/ext4 file systems store files in data blocks (also called data clusters under Windows). The cluster or block size remains at a constant number of sectors after being initialized during the formatting of the filesystem. In general, most operating systems try to store the data in a contiguous way so as to minimize data fragmentation. The seek time of mechanical drives is significant for writing and reading data to/from a hard disk, so that is why it is important to keep the fragmentation to a minimum level.
When a file is deleted, the meta-information about this file (filename, date/time, size, location of the first data block/cluster, etc.) is lost; e.g., in an ext3/ext4 filesystem, the names of deleted files are still present, but the location of the first data block is removed. This means the data is still present on the filesystem, but only until some or all of it is overwritten by new file data.
To recover these "lost" files, PhotoRec first tries to find the data block (or cluster) size. If the filesystem is not corrupted, this value can be read from the superblock (ext2/ext3/ext4) or volume boot record (FAT, NTFS). Otherwise, PhotoRec reads the media, sector by sector, searching for the first ten files, from which it calculates the block/cluster size from their locations. Once this block size is known, PhotoRec reads the media block by block (or cluster by cluster). Each block is checked against a signature database; which comes with the program and has been growing in the type of files it can recover ever since PhotoRec's first version came out. It is a common data recovery method called file carving.
For example, PhotoRec identifies a JPEG file when a block begins with:
Start Of Image + APP0: 0xff, 0xd8, 0xff, 0xe0
Start Of Image + APP1: 0xff, 0xd8, 0xff, 0xe1
or Start Of Image + Comment: 0xff, 0xd8, 0xff, 0xfe
If PhotoRec has already started to recover a file, it stops its recovery, checks the consistency of the file when possible and starts to save the new file (which it determined from the signature it found).
If the data is not fragmented, the recovered file should be identical to (or possibly larger than) the original file in size. In some cases, PhotoRec can learn the original file size from the file header, so the recovered file is truncated to the correct size. If, however, the recovered file ends up being smaller than its header specifies, it is discarded. Some files, such as *.MP3 types, are data streams. In this case, PhotoRec parses the recovered data, then stops the recovery when the stream ends.
When a file is recovered successfully, PhotoRec checks the previous data blocks to see whether a file signature was found but the file was not able to be successfully recovered (i.e., the file was too small), and it tries again. This way, some fragmented files can be successfully recovered.
Distribution
PhotoRec and TestDisk are shipped together. They can be downloaded from CGSecurity website.
These utilities can be found on various Linux Live CDs:
GParted Live CD
Parted Magic
Slax-LFI, a Slax-derived distribution
SystemRescueCD
Ubuntu Rescue Remix, an Ubuntu derivation
They are also packaged for numerous *nix (mostly Linux based) distributions:
ALT Linux
Arch Linux Extra Repository
Debian contrib
Fedora Extras
Red Hat Epel
FreeBSD port
OpenBSD port
Gentoo and Gentoo Portage
Mandriva contrib
Source Mage Linux
Ubuntu
See also
Photo recovery
List of free and open-source software packages
File recovery
References
External links
1998 software
Free data recovery software
Portable software
Hard disk software
Free software programmed in C
Software that uses ncurses
Software using the GPL license
|
60627690
|
https://en.wikipedia.org/wiki/2019%20Birthday%20Honours
|
2019 Birthday Honours
|
The 2019 Queen's Birthday Honours are appointments by some of the 16 Commonwealth realms of Queen Elizabeth II to various orders and honours to reward and highlight good works by citizens of those countries. The Birthday Honours are awarded as part of the Queen's Official Birthday celebrations during the month of June. The Queen's Birthday Honours for the United Kingdom and the Commonwealth realms were announced on 8 June, except the honours for New Zealand that were announced on 3 June and for Australia on 10 June.
United Kingdom
Below are the individuals appointed by Elizabeth II in her right as Queen of the United Kingdom with honours within her own gift, and with the advice of the Government for other honours.
Knight Bachelor
Simon Russell Beale, , Actor. For services to Drama.
Charles Edward Beck Bowman, , Lately Lord Mayor of London. For services to Trust in Business, International Trade and the City of London.
Professor Ian Lamont Boyd, , Chief Scientific Adviser, Department for Environment, Food and Rural Affairs. For services to Science and Economics on Food and the Environment.
Nigel Martyn Carrington. For services to Higher Education and the Creative Industries.
Professor Mark Jonathan Caulfield, Chief Scientist, Genomics England and Professor of Clinical Pharmacology, Queen Mary University of London. For services to the 100,000 Genomes Project.
Dr. Stephen John Cleobury, , Director of Music, King's College, Cambridge. For services to Choral Music.
Robert Paul Cohan, , Founding Artistic Director, The Place. For services to Choreography and Dance.
Jonathan Andrew Coles, Chief Executive, United Learning. For services to Education.
Ian Edward Lamert Davis, Chairman, Rolls-Royce Holdings plc. For services to Business.
Professor Peter James Donnelly, , Chief Executive, Genomics plc and Professor of Statistical Science, University of Oxford. For services to the Understanding of Human Genetics in Disease.
Brian Harold Donohoe. For parliamentary and political service.
George Ernest Craythorne Hamilton, , Chief Constable, Police Service of Northern Ireland. For services to Policing and to the community in Northern Ireland.
The Right Honourable George Edward Howarth, . For parliamentary and political service.
The Right Honourable Norman Peter Lamb, . For public and political service.
David Willoughby Pountney, – Director. For services to Opera.
Ian Isaac Stoutzker, , Founder Chairman, Live Music Now. For services to Music and to Philanthropy.
Archibald Boyd Tunnock, . For services to Business and to charity.
James Garwood Michael Wates, , Chairman, Wates Group. For services to Business and to charity.
Professor Robert Hughes Williams. For services to Higher Education, Research and the Welsh Language.
Simon Woolley. For services to Race Equality.
Order of the Bath
Knight Grand Cross of the Order of the Bath (GCB)
Military
General Sir Nicholas Carter,
Knight/Dame Commander of the Order of the Bath (KCB/DCB)
Military
Lieutenant General Nick Pope,
Civil
Stephen Lovegrove, – Permanent Under-Secretary, Ministry of Defence. For public service.
Andrew Parker – Director General, Security Service. For public service.
Companion of the Order of the Bath (CB)
Military
Rear Admiral Jonathan Pentreath,
Major General Charles Stickland,
Major General Nicholas John Cavanagh
Lieutenant General Paul Jaques,
Air Vice-Marshal Chris Luck,
Air Vice-Marshal Gavin Parker,
Civil
Deborah Ruth Alder – Director General, Human Resources, Department for Work and Pensions. For public service.
Graham Archer – Director, Improvement and Learning, Children's Social Care, Department for Education. For services to Children and Families.
Kieran James Donnelly – Comptroller and Auditor General for Northern Ireland. For services to the Northern Ireland Audit Office.
Christine Helen Hewitt-Dyer – Lately Human Resources Director, People, Capability and Change, Ministry of Housing, Communities and Local Government. For public service.
Craig Richard Eblett – Senior Responsible Officer, Health Transformation Programme, Department for Work and Pensions. For services to Welfare Reform.
Sarah Elizabeth Healey – Lately Director General, Economic and Domestic Affairs Secretariat, Cabinet Office. For public service.
Nicholas Beverley Joicey – Director General for Strategy, International and Biosecurity, Department for Environment, Food and Rural Affairs. For services to the Environment.
Andrew John McCully – Director General, Early Years and Schools Group, Department for Education. For services to Education.
Anthony Jan Michael Meggs – Lately Chief Executive, Infrastructure and Projects Authority and Head, Government Project Delivery Profession. For public service.
Frances Clare Nash – Legal Director, Department for Work and Pensions. For public service.
Graham Parker – Fiscal Expert, Office for Budget Responsibility. For services to the Economy.
Glyn Williams – Director General, Borders, Immigration and Citizenship Systems Policy and International Group, Home Office. For public service.
Order of St Michael and St George
Knight Commander of the Order of St Michael and St George (KCMG)
Clive William Jones, – Lately Chair of Trustees for the Disasters Emergency Committee. For services to humanitarian crises.
Jonathan McLeod Grigor Taylor – Lately Vice-President of the European Investment Bank. For services to investment and the economy.
Alexander Younger, – Chief, Secret Intelligence Service. For services to national security.
Companion of the Order of St Michael and St George (CMG)
Christopher Derek Bain – For services to International Development and Humanitarian Work.
Professor Richard John Carwardine – For services to the Study of American History in the UK and the USA.
Professor Charlotte Watts – For services to Global Health and International Development.
Julian Nicholas Braithwaite – Permanent Representative, UK Mission to the World Trade Organization, United Nations and other International Organisations in Geneva, Switzerland. For services to British foreign policy.
Lawrence Arthur Covington, – Lately Law Enforcement Adviser for the Caribbean Overseas Territories and Bermuda. For services to the Caribbean Overseas Territories and Bermuda.
Peter Jeremy Oldham Hill – Legal Counsellor, Foreign and Commonwealth Office. For services to British foreign policy.
Professor Ian Richard Hodder – Professor of Anthropology, Stanford University, USA. For services to archaeology and UK/Turkey relations.
John Edward Hubbard – Director, Foreign and Commonwealth Office. For services to national security.
Professor Virgil Craig Jordan, – Professor of Breast Medical Oncology, MD Anderson Cancer Center, University of Texas, USA. For services to women's health.
David Barclay Keegan – Director, Foreign and Commonwealth Office. For services to national security.
Graeme Jonathan Knott – H.M. Ambassador, Warsaw, Poland. For services to British foreign policy.
Angus Charles William Lapsley – Director for Defence, International Security and South East Europe, Foreign and Commonwealth Office. For services to British foreign policy.
Julia Longbottom – Director, Consular Services, Foreign and Commonwealth Office. For services to British foreign policy and British Nationals overseas.
Moazzam Tufail Malik – H.M. Ambassador, Jakarta, Indonesia. For services to British foreign policy and international development.
Rebecca Hay Elliott Walton – Regional Director, British Council. For services to UK cultural relations.
Royal Victorian Order
Knight Commander of the Royal Victorian Order (KCVO)
Sir Henry Egerton Aubrey-Fletcher, Bt, Lord-Lieutenant of Buckinghamshire
Commander of the Royal Victorian Order (CVO)
Clive Alderton , Principal Private Secretary to The Prince of Wales and The Duchess of Cornwall.
Richard David Brown, Formerly Treasury Officer of Accounts, H M Treasury.
Susan Elaine, The Dowager Countess of Darnley, Lord-Lieutenant of Herefordshire.
Colonel Richard Edward Harrold, , Formerly Tower Group Director, Historic Royal Palaces.
James Ingleby, Lord-Lieutenant of Aberdeenshire.
Philip John Algernon Sidney, Viscount De L'Isle , Lord-Lieutenant of Kent.
William Tucker, Lord-Lieutenant of Derbyshire.
Dione Angela, The Countess of Verulam, Formerly Lord-Lieutenant of Hertfordshire.
Martin Ronald Watson , Partner, Forest House Veterinary Group.
Lieutenants of the Royal Victorian Order (LVO)
Margaret Ashby , Formerly Head of Learning and Development, Royal Household.
Karen Hilary Ashworth , Senior Paintings Conservator, Royal Collection.
Lieutenant Colonel Richard Callander, , Formerly Secretary, The Queen's Body Guard for Scotland, Royal Company of Archers.
Kevin Frank Clarke. For services to the Royal Household.
Megan Gent , Senior Archives Conservator, Royal Collection.
Sharon Lee Prendergast, Director, Australian Honours and Awards Secretariat, Government House, Canberra.
Jemima Rellie, Director of Content and Audiences, and Acting Visitor Experience Director, Royal Collection.
Hartley Thorbjorn Richardson , Formerly Chairman, Canadian Charter for Business.
Emma Stuart , Senior Curator, Books and Manuscripts, and Acting Librarian, Royal Library, Windsor Castle.
Andrew Merlay Wright, Formerly Treasurer to the Household of The Prince of Wales and The Duchess of Cornwall.
Members of the Royal Victorian Order (MVO)
Benjamin Julius Bolgar, Senior Director, The Prince's Foundation.
Alison Victoria Cameron, Inventory Assistant, Gifts and Inventory Section, Household of The Prince of Wales and The Duchess of Cornwall.
Jeremy Cheek. For services to the Royal Collection.
Sergeant John De-Bolla, Metropolitan Police. For services to Royalty and Specialist Protection.
Marnie Elizabeth Gaffney, Assistant Communications Secretary, Royal Household.
Geoffrey David Golding, Managing Director, G. D. Golding (Tailors) Ltd.
Assistant Chief Constable David Hardcastle. For services to the Royal Household.
Beverley Jones , Housekeeping Assistant, Royal Household.
Catherine Teresa Martin, Formerly Learning Officer (Operations), Royal Collection, Windsor Castle.
Edward Mark Bruton Priday, Manager, Coutts & Co.
Constable John Edward Pritty, Metropolitan Police. For services to Royalty and Specialist Protection.
Stephen John Read , Property Steward, Thatched House Lodge.
Andrew James Richardson, Senior Events Co-ordinator, Royal Household.
John Brian Sinnott , Clerk to the Leicestershire Lieutenancy.
Ian Craig Spencer, Premier Sous Chef, Royal Household.
Royal Victorian Medal (RVM)
Bar to the Royal Victorian Medal (Silver)
Russell Peter Sturgess, , Forestry Team Supervisor, Crown Estate, Windsor
Royal Victorian Medal (Silver)
Michael Dabbs, , Divisional Sergeant Major, The Queen's Body Guard of the Yeomen of the Guard
Jason William Farmilo, Palace Attendant, Windsor Castle.
Monica Ingrid Farrow, Personnel and Accounts Officer, Office of the Governor of Queensland.
Gary Norman Le Poidevin, Head Gardener, Government House, Guernsey.
Stewart Orr, Fire and Security Team Leader, Palace of Holyroodhouse.
Clive Richard Thomas, Engineering Craft Assistant, Royal Household.
Honorary Royal Victorian Medal (Silver)
Antonella Fresolone, Housekeeper to The Duke and Duchess of Cambridge, Kensington Palace.
Order of the British Empire
Knight Grand Cross of the Order of the British Empire (GBE)
Sir Michael John Burton QC – President, Investigatory Powers Tribunal. For services to the Rule of Law.
Knight/Dame Commander of the Order of the British Empire (KBE/DBE)
Civil
Elizabeth Pauline Lucy Corley CBE – Senior Advisor to Allianz Global Investors. For services to the Economy and Financial Services.
Carolyn Julie Fairbairn – Director General, Confederation of British Industry. For services to UK Business.
Jacqueline Foster MEP – Member of the European Parliament for the North West of England. For public and political service.
Julie Ann Kenny CBE – Chair, Wentworth Woodhouse Preservation Trust. For services to Heritage.
Laura Elizabeth Lee – Chief Executive, Maggie's. For services to Cancer Patients.
Professor Elan Closs Stephens CBE – For services to Welsh Government and Broadcasting.
Sara Thornton CBE QPM – Lately Chief Constable, Chair, National Police Chiefs' Council. For services to Policing.
Rachel Whiteread CBE – Sculptor. For services to Art.
Military
Air Marshal Stuart Atha, , Royal Air Force - Former Deputy Commander (Operations) RAF Air Command
Commander of the Order of the British Empire (CBE)
Military Division
Royal Navy
Commodore Paul Dominic Burke, , Royal Navy, C033412M.
Major General Matthew John Holmes, , Royal Marines, N028280S.
Commodore, (now Vice Admiral) Jeremy Paul Kyd, Royal Navy, C032542N. - Fleet Commander
Army
Brigadier Paul Robert Burns
Acting Brigadier John Lockhart Clark
Colonel Guy Hugh John Deacon,
Deputy Chaplain General The Reverend Michael Paul Dare Fava,
Brigadier Ian Jonathan Gibb
Acting Brigadier George Alexander John Macintosh,
Royal Air Force
Group Captain Hamish Roy Callender Cormack, Royal Air Force
Group Captain Teresa Anne Griffiths, , Princess Mary's Royal Air Force Nursing Service
Group Captain Shaun Harris, , Royal Air Force
Civil Division
Morris Timothy Angel, OBE, Chairman, Angels Costumes. For services to Theatre, Film, Television and the Arts.
Bryan Appleyard, Journalist and Author. For services to Journalism and the Arts.
Professor Elizabeth Florence Barnes. For services to Higher Education.
Michael Barton, QPM, Chief Constable, Durham Constabulary. For services to Policing.
Professor Paul David Bates, Professor of Hydrology, Bristol University. For services to Flood Risk Management.
Graeme Henderson Biggar, Lately Director, Office for Security and Counter Terrorism, Home Office. For services to National Security.
Dr. Stephen Robert Billingham, Chairman, Urenco. For services to Government Owned, Public and Regulated Companies.
Simon William Blanchflower, Lately Programme Director, Network Rail. For services to the Railway.
Catherine Annick Caroline Bradley, Non-Executive Board Member, Financial Conduct Authority. For public service.
Philip Graeme Howard Brook, Chairman, All England Lawn Tennis and Croquet Club. For services to Tennis.
Glenn Brown, Painter. For services to Art.
Professor Kenneth Alexander Brown, FRSE, Professor of Mathematics, University of Glasgow. For services to the Mathematical Sciences.
Professor Michele Jane Burman, FRSE, Head, School of Social and Political Sciences, University of Glasgow. For services to Criminology.
Valerie Joan Cain, Lately People and Change Director, Government Legal Department. For public service.
Ian Callum, Chief Designer, Jaguar Cars. For services to the British Car Industry.
Susan Jane Catchpole, Director, HM Treasury. For public service.
Rachel Maud Elizabeth Clacher. For services to Business and Disadvantaged Young People.
Paul Christopher Clarke, Chief Technology Officer, Ocado. For services to Digital Retailing and Technology.
Professor Graham Leon Collingridge, FRS. For services to Biomedical Sciences.
Olivia Colman (Sarah Caroline Sinclair), Actress. For services to Drama.
Michelle Cracknell, Chief Executive, The Pensions Advisory Service. For services to the Pensions Industry.
Dr. Adrian Mark Crellin, Consultant Clinical Oncologist, Leeds Teaching Hospitals NHS Trust and Trustee, Cancer Research UK. For services to Radiotherapy.
Professor Lorne Donald Crerar. For services to Economic and Community Development in Scotland.
Stuart Crooks, Managing Director, Hinkley Point C, EDF Energy. For services to Nuclear Energy.
Marcus Davey, OBE, Chief Executive and Artistic Director, The Roundhouse. For services to the Arts.
Paul Richard Dean, Head of Operational Support, Office for Security and Counter Terrorism, Home Office. For services to Security and Counter Terrorism.
Steven Douglas, Group Chief Executive Officer, Altair. For services to the Housing Industry.
Jonathan Dove, Composer. For services to Music.
Professor Harminder Singh Dua, Professor of Ophthalmology and Visual Sciences, University of Nottingham. For services to Eye Healthcare, Health Education and Ophthalmology.
Professor Stephen Eames, Chief Executive, North Cumbria University Hospitals NHS Trust and Cumbria Partnership NHS Foundation Trust. For services to the NHS.
Rebecca Egan, Head, Tackling Exploitation and Abuse Unit, Home Office. For services to Vulnerable People.
Benedict Blackstone Evans, Director, London Design Festival. For services to the Creative Industries.
Paul Anthony Evans. For services to Parliament.
Patrick Richard Evershed. For public and political service.
Ian Findlay, Chief Officer, Paths for All. For services to Healthy Lifestyles and Outdoor Activities.
John Richard Evelegh Footman, Secretary, Bank of England. For services to the Economy.
Deidre Ann Ford, Group Managing Director, Bauer Media, Radio. For services to Radio.
Professor Tamsin Jane Ford, Professor of Child and Adolescent Psychiatry, University of Exeter. For services to Psychiatry.
Michael Peter Galloway, OBE, Lately Executive Director, City Development, Dundee City Council. For services to Architecture and City Regeneration.
David Alan Gill. For services to Football.
Deborah Mary Gillatt, Director, Business Frameworks, Department for Business, Energy and Industrial Strategy. For services to the Economy.
Nigel Alexander Gooding, Deputy Director, Department for Environment, Food and Rural Affairs. For services to the Marine Environment.
James Dover Grant (Lee Child), Author. For services to Literature.
David Middleton Gray, Lately Chairman, Ofgem. For services to Regulation.
Stephen Greene, Co-founder and Chief Executive Officer, RockCorps and lately Chair, National Citizen Service Trust. For services to Young People.
Christina Susan Mary Hallett. For services to Civil Society, Mentoring and Coaching.
The Lady Hamlyn (Helen Roice), Philanthropist. For services to charity.
Andrew Heath, MBE. For services to the Music Industry.
The Honourable Timothy Mark Hely Hutchinson, Lately Chief Executive, Hachette UK. For services to Publishing and Literature.
Phinella Frances Henderson, Deputy Director, Treasury Legal Advisers, Government Legal Department. For public service.
The Rt. Hon. Professor Charles Hendry, former Prime Minister's Trade Envoy to Azerbaijan, Kazakhstan and Turkmenistan and former Commissioner for the UK Pavilion at Expo 2017, Kazakhstan. For services to UK trade and investment
Jonathan Lascelles Iremonger, Assistant Chief of Staff for Finance, Permanent Joint Headquarters, Ministry of Defence. For services in Support of Military Operations.
Lorraine Alison Jackson, Deputy Director, Data Policy, Department of Health and Social Care. For services to Health Policy.
Lucy Margaret Juckes, Chair, Barrington Stoke Publishing. For services to Education and Literacy.
Sandra Kerr, OBE, Race Equality Director, Business in the Community. For services to Equality and Diversity.
Joanna Sarah Key, Director, Legislation and Constitution, Department for Exiting the EU. For public service.
Anthony Hugh Gordon Laithwaite, Entrepreneur. For services to the UK and Global Wine Industry.
Professor John Latham, Vice-Chancellor, Coventry University. For services to Higher Education.
Professor Marie Corinne Lyne le Quéré, FRS, Professor, School of Environmental Sciences and Tyndall Centre for Climate Change Research, University of East Anglia. For services to Climate Change Science.
Dr Shane Legg, Co-founder and Chief Scientist, DeepMind Technologies Ltd. For services to the Science and Technology Sector and Investment.
Professor Jason Andrew Leitch, National Clinical Director, Health and Social Care Directorate, Scottish Government. For services to Healthcare and charity.
Barnaby John Lenon, Chair, Independent Schools Council and Chair of Governors, London Academy of Excellence. For services to Education.
Gary Nigel Lewitt, Head of Resources, Defence Intelligence. For services to Defence.
Caroline Margaret Low, Director, Department for Transport. For public service.
Professor Graham Alexander MacGregor, Professor of Cardiovascular Medicine, Wolfson Institute of Preventive Medicine. For services to Cardiovascular Disease.
Joanna Clare MacGregor, OBE, Pianist. For services to Music.
Professor Hector Lewis MacQueen, FBA, FRSE, Professor of Private Law, University of Edinburgh. For services to Legal Scholarship.
Dr. Thomas Michael Maguire. For services to Justice in Northern Ireland.
Stuart Marks. For voluntary political service.
Francis Paul Augustine Martin, President, British Chambers of Commerce and Partner, BDO Northern Ireland. For services to UK Business.
Dr. Alan Gregory McDevitt, Lately Chairman, Scottish General Practitioners Committee, British Medical Association. For services to the NHS and General Practitioners in Scotland.
Rebecca Meredith, Chief Executive Officer, Transform Trust, East Midlands and Humber. For services to Education.
Anna-Marie Morrison. For services to Apprenticeships.
Mitch Murray, Songwriter, Record Producer and Author. For services to Music.
Terence O'Neill. For services to Photography.
Grace Chidozie Ononiwu, OBE, Chief Crown Prosecutor, West Midlands, Crown Prosecution Service. For services to Law and Order.
Mark Padmore, Tenor. For services to Music.
Judith Ann Paget, Chief Executive Officer, Aneurin Bevan University Health Board. For services to Healthcare Management and Delivery in Wales.
Stuart Leslie Patrick, Chief Executive, Glasgow Chamber of Commerce. For services to Business and the Economy in Glasgow.
Susan Mary Elizabeth Percy, Chief Executive, Chartered Institution of Highways and Transportation. For services to Transport.
Ronald Leslie Randall. For services to the British Meat Trade and to charity.
Melanie Jane Richards, Deputy Chair, KPMG. For services to Business and Inclusion.
Professor Sylvia Therese Richardson, Director, Medical Research Council Biostatistics Unit, University of Cambridge. For services to Medical Statistics.
David Lawton Roberts, Chairman, Nationwide Building Society. For services to Financial Services and the NHS.
Colin Robertson, Chief Executive, Alexander Dennis. For services to Exports and the Bus and Coach Manufacturing Sector.
Dr. Bharat Kumar Hansraj Shah. For services to Business, Economic Growth, Exporting, Independent Pharmacy Sector and Philanthropy.
Dr. Samir Shah, OBE, Chief Executive and Creative Director, Juniper Television. For services to Television and to Heritage.
Professor Michael Roy Sharland, Chairman, Advisory Committee on Antimicrobial Resistance and Consultant Paediatrician, St George's University Hospitals NHS Foundation Trust.
Professor Mark Edmund Smith, FREng, Vice-Chancellor, Lancaster University. For services to Research and Higher Education.
Philip Patrick Smith, Chief Executive Officer, Cisco. For services to Technology, Business and Skills.
Dr. Shubulade Mary Eniola Smith, Consultant Psychiatrist, South London and Maudsley NHS Foundation Trust. For services to Forensic Psychiatric Intensive Care .
Professor David John Southwood, Lately Chair, UK Space Agency. For services to Space Science and Industry in the UK and Europe.
Michael Stewart, SCS1, Ministry of Defence. For services to Defence.
David James Reid Strang, QPM, Lately HM Chief Inspector of Prisons for Scotland. For services to Law and Order.
Matthew Taylor, Chair, Review of Modern Employment and Chief Executive, Royal Society for the Encouragement of Arts, Manufactures and Commerce. For services to Employee Rights.
William Russell Thomson, Lately Commissioner for Ethical Standards in Public Life in Scotland. For services to the Scottish Public Sector.
Lesley Jane Titcomb, Lately Chief Executive, The Pensions Regulator. For services to Pensions Regulation.
Joanna Trollope, OBE, Author. For services to Literature.
Rachel Turner, Director, Economic Development, Department for International Development. For services to International Development.
Derek Vaughan, MEP, Member of the European Parliament for Wales. For political and public service.
Professor Anna Frances Vignoles, FBA, Professor of Education, Faculty of Education, University of Cambridge. For services to Social Sciences.
Richard Wayne Vince, Executive Director, Long Term and High Security Estate, Ministry of Justice. For services to Her Majesty's Prison and Probation Service.
Timothy Lillington Philip Warren, Lately Leader, Bath and North East Somerset Council. For services to Local Government and the community in Somerset.
Professor Robert Richard Welbury, Professor of Paediatric Dentistry, UCLAN Dental School. For services to Paediatric Dentistry, Dental Education and Safeguarding of Children.
Terence William Whittles, National Chairman, The Royal British Legion. For voluntary service to the Armed Forces.
Eric Roy Wilson, Executive Director, Corporate Services, Competition and Markets Authority. For services to Competition.
Sophie Mary Wilson, FRS, FREng, Director of Integrated Circuit Design, Broadcom Europe Ltd. For services to Computing.
Dr. Kathryn Louise Wood, Director of Science, Research and Evidence, Department of Health and Social Care. For services to Health Research.
Officer of the Order of the British Empire (OBE)
Civil
Dr. Nneka Abulokwe – Chief Executive Officer, Micromax Consulting. For services to Business.
Professor Malcolm Russell Airs – Lately Director, Kellogg College, Oxford. For services to the Historic Environment, Conservation and Education.
Cherry Alexander MBE – Major Events Director, British Athletics. For services to Elite Sport.
Nimco Ali – For services to Tackling Female Genital Mutilation and Gender Inequality.
Anthony Allcock MBE – Chief Executive, Bowls England. For services to Lawn Bowls.
Jacqueline Gay Alway (Jacqueline Tarpey) – Chair, Music Publishers Association. For services to the Music Industry.
Professor Catherine Amanda Amos – Professor of Health Promotion, University of Edinburgh. For services to Public Health.
Colleen Althea Amos (Colleen Amos- Zwambila) – Chief Executive, The Amos Bursary. For services to Community Cohesion.
Dr. Mike Mehrdad Ashmead – Managing Director, Encocam. For services to Exports and Innovation in Engineering.
Professor Timothy Atkins – Senior Technical Fellow, Defence Science and Technology Laboratory. For public service.
Sarah Jane Bailey – Lately Head, Resourcing and Workforce Planning, Crown Prosecution Service. For services to Law and Order.
Professor Caroline Mary Barron – For services to Education.
Brendan John Bayley – Head, Policy Analysis Climate Energy and Agriculture Branch, HM Treasury. For public service.
Charles Francis Houghton Beckford – Director, Foreign and Commonwealth Office. For services to national security.
Dr. René Arthur Beguelin – General Practitioner, Gibraltar. For services to health in Gibraltar.
Carol Ann Bell – Lately Executive Director, Great Exhibition of the North. For services to the Arts.
George Bell – Chairman, Bell Group UK. For services to Apprenticeships and Charity Fundraising.
Maureen Bell – Lately Nurse Consultant for Vulnerable Children, NHS Ayrshire and Arran. For services to Child Protection.
Margaret Elizabeth Berry – Executive Director for Europe, WEConnect International and Founder, Women in Technology Network. For services to Women in Business and Technology.
Professor Michael Webster Bevan FRS – Deputy Director, John Innes Centre. For services to Plant Genomics.
Dr. James Little Beveridge – Master Blender, Johnnie Walker, Diageo. For services to the Scotch Whisky Industry.
Harjit Singh Bhania – Wheelchair Basketball Coach. For services to Wheelchair Basketball.
David George Thomas Bloomer – For services to Women's Health.
Dr. Jennifer Blunden – Chief Executive Officer, Truro and Penwith Academy Trust. For services to Education.
Alfred Giovanni Roncalli Boe – Musical Performer and Actor. For services to music and charity.
Maria Bota – Creative Producer, Great Exhibition of the North. For services to the Arts.
Katy Elizabeth Bourne – Police and Crime Commissioner for Sussex. For public and political service.
Christopher Brammer – Deputy Director, Business Change and Implementation, Satellite Tracking Services, Immigration Enforcement, Home Office. For public service.
Theresa Rose Breslin – Author. For services to Literature.
Richard Campbell Brickley MBE – For services to Disability Sport.
Professor Sarah Jean Broadie FBA, FRSE – Professor of Moral Philosophy, Wardlaw Professor, St Andrews University. For services to Classical Philosophy.
Dr. Jane Louise Brooke-Smith – UK Head of Development and Strategic Planning, Arcadis LLP. For services to the Built Environment and Diversity and Inclusion.
Sherry Melanie June Burrows – Team Leader, Foreign and Commonwealth Office. For services to national security and serious crime.
Janice Elizabeth Cahill – For services to the Education of Vulnerable Young Learners and Child and Adolescent Mental Health in Stockport.
David Campbell – For voluntary service to Athletics.
James Campbell – Treasurer, Scottish Benevolent Fund. For services to the Department for Work and Pensions Staff in Scotland.
David Carney-Haworth – Co-founder, Operation Encompass. For services to Children affected by Domestic Abuse.
Elisabeth Anne Carney-Haworth – Co-founder, Operation Encompass. For services to Children affected by Domestic Abuse.
Francis Clive Carreras – former Commissioner of Income Tax, Gibraltar. For services to Gibraltar.
Dr. June Elizabeth Chatfield – Naturalist. For services to Conservation and Natural History Education.
Amarjit Kaur Cheema – Chief Executive Officer, Perry Hall Multi-Academy Trust. For services to Education in the West Midlands.
Peter David Clarke – Lately Assistant Director, Border Force, Home Office. For services to Border Security.
Professor Hannah Louise Cloke (Hannah Pappenberger) – Professor of Hydrology, University of Reading. For services to Flood Forecasting and the Development of Hazard Early Warning Systems.
Captain David Charles Cole MVO RM (Rt'd) – Director of Music, The Royal British Legion. For services to Music and to Remembrance.
Dr. Paul Collier – Head of Beams Department, CERN, Switzerland. For services to science and technology.
Anne Galbraith Cook – Head, Social Housing Services Team, Better Homes Division, Scottish Government. For services to Social Housing.
Elvis Costello – Musician. For services to Music.
Alistair Robert Cunningham – Executive Director, Wiltshire Council. For services to the community in Wiltshire.
Joni Cunningham – For services to Adult Community Learning in London and Essex.
Father Brian D'Arcy – For services to Cross Community Relations.
Tonia Dawson – Macmillan Clinical Lead, East of England Cancer Alliance. For services to Nursing and People affected by Cancer.
Ptolemy Hugo Dean – For services to Heritage and Design.
Sandra Caroline Dinneen – Chief Executive, South Norfolk Council. For services to Local Government.
Brian Donald – lately Chief of Staff, Europol, The Hague, The Netherlands. For services to policing and justice
Edward Frederic Colin Donaldson – Treasurer, Royal National Lifeboat Institution. For voluntary service.
Dr. Christopher Dorman – Vice President, Coherent Scotland. For services to Laser and Photonic Technology and Exports.
Jill Downing – Solicitor. For services to Children and Families and to voluntary work in the community in Northern Ireland.
Derek James Doyle MBE – lately British Consul and Director of Trade and Investment, Bilbao, Spain. For services to UK/Spain relations.
Brian James Duffin – Non-Executive Director, Debt Management Office. For services to the UK Pensions Industry.
Gillian Dunion (Gillian Docherty) – Chief Executive, The Data Lab. For services to Information Technology and Business.
Edwina Dunn (Edwina Humby) – Chief Executive Officer, Starcount. For services to Data and Business in the UK.
Arnab Dutt – For services to Small and Medium-sized Businesses, Diversity and Equality.
Jane Edmondson – Director, East and Central Africa, Department for International Development. For services to International Development.
Professor Judith Mary Ellis MBE – Chair of Trustees, Tropical Health and Education Trust and lately Chief Executive, Royal College of Paediatrics and Child Health. For services to Healthcare.
Brenda Emmanus – Broadcaster and Journalist. For services to Broadcasting and Diversity.
Barbara Ann Farndell – Policy Expert, HM Revenue and Customs. For services to Taxpayers.
Malcolm William Rusk (Callum) Farquhar – Regional Commissioner, East Scotland Region, Scouts. For services to the Scouting Movement.
Andrew Paul Ferguson – For services to the Economy and Broadband Services in the UK.
Janet Natasha Finlayson – For services to Children and Families.
Katherine Iona Fisher – Deputy Director, HM Treasury. For public service.
Kelly Fisher – B2, Ministry of Defence. For services to Defence.
Eithne Patricia Fitzmaurice – Deputy Director, Criminal and Financial Investigation, Immigration Enforcement, Home Office. For public service.
Professor Kevin Jeremy Fong – Consultant Anaesthetist, University College London Hospitals NHS Foundation Trust. For services to Medicine and Healthcare.
Geoffrey David Forder – Lately Deputy Head, QEC Support, Defence Equipment and Support, Ministry of Defence. For services to Naval Logistic Support.
Alastair David William Fothergill – Director, Silverback Films. For services to Film.
Sarah Jane Friar – lately Chief Financial Officer, Square Inc, USA. For services to entrepreneurship and financial services
Dr. Ian James Macaulay Frood – For services to the British Cattle Industry.
Councillor John Charles Fuller – For public and political service.
Dr. Mark John Fulop – Programme Leader, Chemical Biological and Radiological Division, Defence Science and Technology Laboratory. For public service.
Professor Tamara Susan Galloway – Professor of Ecotoxicology, University of Exeter. For services to Environmental Science.
William Geddes – Inspector, Her Majesty's Inspectorate of Education. For services to Education.
James Robert Gerard – Deputy Director, Head of Parliamentary Team, Department for Exiting the EU. For public service.
Dr. Delna Ghandhi – Lately Health Adviser, Department for International Development. For services to Tackling Tropical Disease.
William Roy Gibaud – lately First Secretary Defence and Security, British High Commission, Canberra, Australia. For services to international trade
John Mark Gibson – Founding Trustee, Dumfries House and Founder and Trustee, Scottish Dark Sky Observatory. For services to Heritage.
Steven John Gilbert – Vice Chair, Independent Review of the Mental Health Act and Member, Board of Trustees, Mind. For services to Mental Health.
Simon Maxwell Gillespie – Chief Executive, British Heart Foundation. For services to Patients and Medical Research.
Ian Rory Ginsberg – Deputy Director, European Finances Team, HM Treasury. For public service.
Arvinda Gohil – Chief Executive Officer, Community Links. For services to the community and Housing for Vulnerable People.
Robert George Anderson Gourlay – For services to the Scottish Food and Drink Industry.
Irene Rudge Graham – Chief Executive, Scale-Up Institute. For services to Business and the Economy.
Joanna Marie Greenidge – Deputy Director, Government Legal Department. For services to Government Law.
Stuart Cameron Griffiths – Deputy Director, Department for Work and Pensions. For public service.
Barry Kole Grossman – Director Trade and Investment, British Embassy, Tel Aviv, Israel. For services to UK/Israel commercial relations
Edward Michael (Bear) Grylls – Chief Scout. For services to Young People, the Media and charity.
Sajid Gulzar – Chief Executive Officer, Prince Albert Community Trust. For services to Education.
Poppy Gustafsson – Co-Founder and Co-Chief Executive Officer, Darktrace. For services to the Cyber Security Industry.
Mark Kieron Hamilton – Assistant Chief Constable, Police Service of Northern Ireland. For services to Policing and the community in Northern Ireland.
Paul David Roger Hancock QFSM – Lately Chief Fire Officer, Cheshire Fire and Rescue Service. For services to Fire and Rescue.
Felicity Harding – Ambassador and Special Adviser to the Chief Executive, Samaritans. For charitable services.
Andrew Harries – For services to Film and Television.
Kathryn Gwynne Harries – Lately Director, National Opera Studio. For services to Opera.
Professor Susan Elaine Hartley (Susan Grimley) – Director, York Environmental Sustainability Institute. For services to Ecological Research and Public Engagement
Dominic Newton Haslam – Director, Sightsavers. For services to People with Disabilities.
Sacha Amin Hatteea – Deputy Director, Public and Parliamentary Delivery. Department for Transport. For services to Aviation.
Gillian Valerie Haworth – Lately Chief Executive, Intercountry Adoption Centre. For services to Vulnerable Children and Families.
Pablo Tudor Barraclough Hepworth Lloyd – Chief Executive Officer and Co-Founder, Visionnaires. For services to WorldSkills UK.
Professor Sarah Elizabeth Hewlett – Emerita Professor of Rheumatology Nursing, University of the West of England. For services to People with Arthritis and Nursing Research.
Nigel Ralph Gore Hinds – Executive Producer, 14 - 18 NOW. For services to the Arts.
Dr. Sharon Holmes – B2, Ministry of Defence. For services to Defence.
Graham John Hooper – Financial Crime Prevention Consultant, Lloyds. For services to Tackling Financial Crime.
Bettany Hughes – Historian, Author and Broadcaster. For services to History.
Catherine Mary Therese Hughes – Lately Principal, St Bede's Catholic College, Bristol. For services to Education.
Derek Joseph Hughes – Lately Deputy Director, Customer Services, HM Revenue and Customs. For services to Customer Service and Inclusion.
Kenneth Hughes – Lately Assistant Chief Executive, Scottish Parliament. For parliamentary service.
Clive Robert Humby – Chief Data Scientist, Starcount. For services to Data and Business in the UK.
Professor Beverley Jane Hunt – Professor of Thrombosis and Haemostasis, King's College London and Consultant in Clinical Haematology, Guy's and St Thomas' NHS Foundation Trust. For services to Medicine
Dr. Carl Stephen Patrick Hunter – Chief Executive Officer, Coltraco Ultrasonics. For services to Business and International Trade.
Leyla Hussein – For services to Tackling Female Genital Mutilation and Gender Inequality.
David Graham Hutchinson – HM Inspector, Health and Safety Executive. For services to Offshore Diving Safety.
Merlin Michael Hyman – Chief Executive, Regen. For services to the Sustainable Energy Sector.
Josephine Ann James – Chief Executive, Kent Invicta Chamber of Commerce. For services to the Economy in Kent.
Annwen Jones – Co-Founder, Target Ovarian Cancer. For services to charity.
David Jones – For services to Music and Culture.
Cush Jumbo – Actress. For services to Drama.
Maria Anne Kane – Chief Executive, North Middlesex University Hospital NHS Trust. For services to Leadership in Healthcare.
Dr. Anna Keay – Director, Landmark Trust. For services to Heritage.
Dr. Anne Catherine Kemp – Chair, UK BIM Alliance. For services to Digital Construction Innovation.
Sarah Louise Kenny – Chief Executive Officer, BMT Group Ltd. For services to the Maritime Sector and Diversity.
Qadeer Kiani – Chair, Arhag Housing Association. For services to Migrants and Refugees.
Anne Rochelle Kiem – Chief Executive, Chartered Association of Business Schools and Executive Director, Small Business Charter. For services to Small Businesses and Entrepreneurs.
Barnaby James Kistruck – Lately Grade 6, Ministry of Defence. For public service.
Narinder Kaur Kooner – Councillor, Birmingham City Council and Director, Sikh Women's Action Network. For services to Supporting Vulnerable People and to the community in the West Midlands.
Professor Sudhesh Kumar – Dean, Warwick Medical School. For services to Medicine and to Diabetes Care.
Arun Kumar Batra – Chief Executive Officer, National Equality Standard. For services to Faith and Integration in the Public Sector.
Professor Fred Frank Land – For services to the Information Systems Industry.
Daniel John Langford – For services to Business.
Robert Mark Last MBE – Deputy Head, Human Rights and Political Team, UK Mission to the United Nations, Geneva, Switzerland. For services to British foreign policy
Jane Carol Lees – Lately Chair, Sex Education Forum Advisory Group. For services to Education.
Rufus Alexander Legg – Head, Royal, Ceremonial and Honours Unit, Foreign and Commonwealth Office. For services to British foreign policy.
Annmarie Lewis – Founder and Director, Rainmakers Worldwide. For services to Young People.
Ursula Frances Rosamond Lidbetter MBE DL – Chief Executive, Lincolnshire Co-operative and Chair, Greater Lincolnshire Local Enterprise Partnership. For services to the Economy.
Joshua Llewellyn-Jones – For services to Cystic Fibrosis Awareness.
Richard Lloyd – Lately Executive Director, Which? For services to the Economy and Consumer Rights.
Siwan Lloyd Hayward – Director of Compliance Operations and Policing Services, Transport for London. For services to Transport and Policing.
Oliver Martin Lovell – Team Leader, Foreign and Commonwealth Office. For services to national security.
Richard Anthony Ludlow – Chief Executive Officer, Ebor Academy Trust, York. For services to Education.
Deborah Jane Lye – Chief Executive, Spirit of 2012. For services to Community Projects.
Joseph Mackie – Chairman, The Archie Foundation. For services to the community in Scotland.
Jeannette Mackinney – Chief Executive Officer, Hales Valley Trust. For services to Education.
Phillip Gerard Maguire – For services to Prison Radio and Radio Production.
Professor Lee Elliot Major – Lately Chief Executive Officer, Sutton Trust and Trustee, Education Endowment Foundation. For services to Social Mobility.
Roger Howard Malbert – Lately Head, Hayward Gallery Touring. For services to Art.
Dr. Stephen James Malcolm – Chief Environmental Science Adviser, Cefas. For services to the Marine Environment.
Ann Margaret Marcer – Volunteer. For services to UK Aid and Young Women.
Boyd Ernest McAdam – National Convener/Chief Executive, Children's Hearings Scotland. For services to Young People.
Ann McDonald – Principal, Kellett School, The British International School in Hong Kong. For services to education and the British community in Hong Kong.
Sheriff Iona Sara McDonald – Senior Sheriff, Kilmarnock Sheriff Court. For services to Law and Order.
Anne Graham Brodie McEwan – former President, National Association of British Schools in Spain. For services to Education.
Timothy James McDonnell – Head, International and Industrial Strategy, Ministry of Defence. For services to Defence.
Dr. Jacqueline Ann McKenna MBE – Lately Director of Nursing, Professional Leadership, NHS Improvement. For services to Nursing.
Amanda Jane McLoughlin – Head, Department for International Development, Lebanon. For services to Humanitarian Relief.
Catherine Frances Mead DL – For services to Cheese Making and the community in the South West of England.
Dr. Janet Christine Metcalfe – Head, Vitae. For services to Researcher Career Development.
Professor Dorothy Evelyn Miell FRSE – Vice-Principal and Head, College of Arts, Humanities and Social Sciences, University of Edinburgh. For services to Higher Education and Psychology.
Patricia Ann Cecilia Miller – Chief Executive, Dorset County Hospital NHS Foundation Trust. For services to the NHS.
Dr. Julie Mary Mills – Principal and Chief Executive, Milton Keynes College. For services to Promoting Business and Education Links.
Professor Shantashil Rajyeswar (Rana) Mitter – Professor, History and Politics of Modern China, University of Oxford. For services to Education.
Peter Graham Anthony Morris – Chairman, BAFTA Los Angeles, USA. For services to the British entertainment industry
Paul Clifford Morrison QPM – Commissioner of Police, Anguilla. For services to Anguilla.
Sheila Jean Morrow – For services to Hockey in Wales.
Nicholas Moss JP – Magistrate and Bench Chair, North and East Hertfordshire Bench. For services to the Administration of Justice.
Vickie Tyler Mottram (Roberts) – Head of Apprenticeships, HM Revenue and Customs. For services to Apprentices.
Sally Elizabeth Munday MBE – For services to Hockey.
Joseph Christopher Musgrave – Chief Executive Officer and Director, Wynyard Park Ltd. For services to Business and the community in the Tees Valley.
Lucy Ellen Musgrave – For services to Architecture and the Built Environment.
Dr. Dwain Anthony Neil – For services to the British African Caribbean community.
Elaine Susan Newell – Lately Chief Nurse, Sandwell and West Birmingham Hospitals NHS Trust. For services to Midwifery.
Professor Michael James Norton Freng – For services to Engineering and the Digital Economy.
Robert Ormsby – Special, National Crime Agency. For services to Law Enforcement.
Dr. Jane Katharine Osbourn – Vice President for Research and Development, MedImmune Biotechnology and Chair, UK Bioindustry Association. For services to Drug Research and Development.
Richard Ovenden – Librarian, Bodleian Library. For services to Libraries and Archives.
Catherine Ellen Page – Lately Private Secretary, Cabinet Office. For public service.
Manmeet Singh Panesar – Head of Technical Services, Office for Product Safety and Standards, Department for Business, Energy and Industrial Strategy. For services to Product Safety.
Miles Parkinson – For political service.
Professor Mahesh Parmar – Professor of Medical Statistics and Epidemiology and Director, MRC Clinical Trials Unit, University College London. For services to Medical Research and Clinical Trials.
David Warren Parr – Chief Executive, Halton Borough Council. For services to Local Government in Cheshire.
Janet Lynn Paterson MBE – Lately Director of Olympic Relations, British Olympic Association and Chief Executive, British Olympic Foundation. For services to Olympic Sport.
Robert Ralston Paterson – lately Counsellor, British Embassy, Kabul, Afghanistan. For services to national security.
Robert Charles Pepper MBE – For services to Music.
Nicola Sian Pittam – Senior Lawyer, Statutory Instrument Hub, HM Treasury. For public service.
Beverley Pollard (Beverley Andrus Humphrey) – Lately Chief Executive, Greater Manchester Mental Health NHS Foundation Trust. For services to Mental Health and Care.
Rubeela Naveed Qayyum – Treasury Accountant and Head of Exchequer Funds and Accounts, HM Treasury. For services to Taxpayers, Young People and Social Inclusion.
Reena Ranger (Reena Ahuja) – Founder and Chair, Women Empowered. For services to BAME Women.
Suzanne Rastrick – Chief Allied Health Professions Officer, NHS England. For services to Allied Health Professionals.
Dr. Sarah Marcel Redwood – Deputy Director, European Programmes, Department for Business, Energy and Industrial Strategy. For services to Science and Innovation Funding.
Julie Reene – Assistant Director, Specialist Operations, Border Force, Home Office. For services to Border Security.
Griffith Rhys Jones – For services to the National Civic Society Movement, charity and Entertainment.
Cynthia Ann Robinson – For voluntary service to Older People.
Mark Raymond Rogers – Area Manager, Defence Science and Technology Laboratory. For public service.
Linda Dawn Rose – Accountability Team Leader, Inspections and Accountability Quality Team, Department for Education. For services to Education.
Ralph Rugoff – Director, Hayward Gallery. For services to Art.
Petra Salva – Director of Services (Rough Sleeper, Ex-Offenders and Migrant Services), St Mungo's Community Housing Association. For services to Homeless People.
Elizabeth Ann Sclater – For services to Older Women.
John Maclean Scott – lately Global Deputy Chairman, KPMG International. For services to UK/Spain relations
Sean Feargal Sharkey – For services to Music.
Andrew Leo Sharp – For political service.
Nicola Shindler – Founder, Red Production Company. For services to Broadcasting.
Sarah Alexandra Smith – Deputy Director, Office for Product Safety and Standards, Department for Business, Energy and Industrial Strategy. For services to Business and Consumers.
Thomas Harvey Spiller – President, National Conservative Convention. For public and political service.
Catherine Dalling Taylor Stihler – For political service.
Jack Benjamin Stockdale – Chief Technology Officer, Darktrace. For services to the Cyber Security Industry.
Dr. Sarah Jane Stubbs – Analytical Chemist, Defence Science and Technology Laboratory. For public service.
Gavin Douglas Thomas – Lately Chief Superintendent, Gloucestershire Constabulary and President, Police Superintendents' Association. For services to Policing.
Professor Geraldine Anne Thomas – Professor of Molecular Pathology, Imperial College, London. For services to Science and Public Health.
Dr. Rhian-Mari Thomas – Chief Executive Officer, Green Finance Institute and lately Chair, Barclays Green Banking Council and Global Head Barclays Green Banking. For services to Green Banking.
Dr. Robert Campbell Kennedy Thomson – Principal and Chief Executive, Forth Valley College. For services to Education, Economic Development and the community across Forth Valley.
Robin Ticciati – Principal Conductor, Scottish Chamber Orchestra. For services to Music.
Sarah Louise Treseder – Chief Executive, Royal Yachting Association. For services to Sport.
Rosie Louise Tressler – Chief Executive Officer, Student Minds. For services to Mental Health in Higher Education.
Julie Anne Uzupris – Strategic Threats Team, UK Joint Delegation to NATO, Brussels, Belgium. For services to national security
Dr. Pamela Jane Waddell – Director, Innovation Alliance for the West Midlands. For services to Innovation in the West Midlands.
David Paul Wagstaff – Deputy Director, Euratom International Negotiations, Department for Business, Energy and Industrial Strategy. For services to Energy and Climate Change Policy.
Christine Wain – Headteacher, Pallister Park Primary School. For services to Education.
Dr. Christopher Geoffrey Wakeling – Chairman, Historic England's Places of Worship Forum. For services to Heritage.
Nigel Keith Walker – National Director, English Institute of Sport. For services to Elite Sport.
Sarah Ann Waters – Author. For services to Literature.
Professor Alison Watson (Alison Macmillan) – Professor of International Relations, University of St Andrews. For services to Education.
Sonia Maxine Watson (Sonia Bromfield) – For services to Diversity in Architecture.
Glenda Margaret Watt – Co-ordinator, Scottish Older People's Assembly. For services to Older People.
Robin Geoffrey Wilkinson – Chief of Corporate Services, Metropolitan Police Service. For services to Policing.
Richard Ian Williams – Chief Executive, Northern Ireland Screen. For services to the Screen Industries in Northern Ireland.
Simon Peter Williams – Country Director, British Council, Kiev, Ukraine. For services to UK cultural relations.
Professor Graham Wren FREng – Special Adviser to the Principal, Strathclyde University. For services to Education, Science and Engineering.
Henrietta Mackay Wright – Service Leader, Central Scotland District, Department for Work and Pensions. For services to Vulnerable Customers in Scotland.
Alan Roy Yates – Deputy Chief Executive, Accord Housing Association. For services to Housing.
Karl Andrew Young – Senior Lawyer, HM Revenue and Customs. For services to Taxpayers.
Military
Commodore Stephen Michael Allen, Royal Navy
Lieutenant Colonel Simon Leslie Blake, The Royal Logistic Corps, Army Reserve
Commander Richard Charles Bone, Royal Navy
Colonel Jo Butterfill,
Wing Commander Mark Christopher Butterworth, Royal Air Force
Group Captain Joanne Lorraine Campbell, Royal Air Force
Group Captain Ian Derek Cheswoth, Royal Air Force
Commander (Acting Captain) Christopher John Connolly, Royal Navy
Group Captain Jason Clarke Davies, Royal Air Force,
Lieutenant Colonel Thomas William Day, Royal Corps of Signals
Commander Steven Ronald Drysdale, Royal Navy
Lieutenant Colonel Rupert Spark Evetts, , The Blues and Royals (Royal Horse Guards and 1st Dragoons)
Commodore Rupert Patrick Hollins, Royal Navy - former Defence Attache (China)
Colonel Joseph Edward Fossey
Commander Martin John Freeman, Royal Navy
Lieutenant Colonel Philip Simon James Heppell, Royal Army Medical Corps
Lieutenant Colonel Brian Keith Howard, The Royal Logistic Corps
Wing Commander Edwin Sebastian Kendall, Royal Air Force
Lieutenant Colonel Simon Nicholas Meadowcroft, , Royal Corps of Signals
Wing Commander Jennifer Robinson, Royal Air Force
Colonel Edward Dixon Sandry
Wing Commander James Richard Simmonds, Royal Air Force
Colonel Anthony Tait
Lieutenant Colonel Neil Kirkby Gow Tomlin, The Royal Regiment of Scotland
Member of the Order of the British Empire (MBE)
Civil
Viviane Hooper Adamson – For voluntary service to the Credit Union Movement and the community in Newry and Banbridge.
Veronica Anne Judith Adlam – Health and Safety Manager, Hertfordshire Fire and Rescue Service. For services to Firefighter Safety.
Ama Agbeze – Captain, England Women's Netball Team. For services to Netball.
Olasubomi Iginla Aina – Chief Executive Officer/Executive Director, Lightup Foundation (Nigeria and United Kingdom). For services to Young People and the Underprivileged.
Marianne Ainsworth-Smith – Bill Manager, Department for Exiting the EU. For public service.
Dr. Giuseppe Vito Albano – Curator, Keats-Shelley House, Rome, Italy. For services to UK/Italy relations.
Paul Alger – Director, International Business Development, UK Fashion and Textile Association. For services to Exports in the UK Fashion Industry.
Clair Alleebux – Human Resources Business Partner, Department for Environment, Food and Rural Affairs. For charitable services.
Yasemin Allsop – For services to Education and Children and Families from Disadvantaged Backgrounds.
Bridgette Anderson – Conciliation Officer, ACAS. For services to Employee Rights and Disability Awareness.
John Ankers JP – For services to Young People and the Magistracy Service.
Joshua Kwabena Apeadu-Siaw – For services to the Law, UK Legal Services and to Young People.
Paul Michael Appleby – For services to the Creative Industries in Bristol and Bath.
George Peter Apter – For public and political service.
Bryan Mckend Armstrong – For services to Journalism and the community in Scotland.
Gillian Mary Arthur – Lately Member, Export Guarantees Advisory Council. For services to the British Export Economy.
Mathangi Arulpragasam – For services to Music.
Jeremy Peter Ash – For services to Women and Girls and International Development.
Sheila Atim – For services to Drama.
Jessica Lucy Baker – For services to Global Supply Chains.
Councillor Keith James Baker – For public and political service.
Karen Ball – Head, Midlands Engine Investment Hub, Department for International Trade. For services to Trade and Investment.
Dr. Pamela Margaret Ball – President, League of Hospital Friends, Kidderminster Hospital. For services to Charitable Fundraising in the NHS.
Susan Gail Ball – For services to Libraries.
Martin Ballard – Head Concierge, Claridge's. For services to the Hotel, Tourism and Hospitality Industry.
Anne Elizabeth Barclay – Operational Director, Wigtown Festival Company and Chair, Dumfries and Galloway Relay for Life Committee. For services to the Arts and charity.
Anna Rose Barker – Lately Chair, British Youth Council. For services to Young People.
David Michael Barlow – For services to Apprenticeships and Business.
Robert Barrow DL – For services to charity and the community in Macclesfield, Cheshire.
Amrik Singh Basi – Amateur Boxing Referee. For services to Boxing.
Daniel Oliver Bates – Manager, Research and Development, National Crime Agency. For services to Law Enforcement.
Professor Antony James Bayer – Professor of Geriatric Medicine and Director, Memory Assessment Service, Cardiff and Vale University Health Board. For services to Healthcare.
Bridget Bennett – Service Manager, Early Years and Family Support, East Riding of Yorkshire Council. For services to Children and Families.
Hon Michael D'arcy Benson – For services to York Minster.
Professor Richard Arthur Betts – Head of Climate Impacts Research, Met Office Hadley Centre and Chair in Climate Impacts, University of Exeter. For services to Understanding Climate Change.
Mary Cecilia Bevan – Soprano. For services to Music.
Sophie Anna Magdalena Bevan – Soprano. For services to Music.
Rashid Bhayat – Founder, Positive Youth Foundation. For services to Young People in the Midlands.
Dr. Ashok Kumar Bhuvanagiri – Founder, The Telugu Association of Scotland. For services to Cultural Cohesion and charity.
Eileen Biddlecombe – For services to Children and Families in Plymouth.
Roger Biddlecombe – For services to Children and Families in Plymouth.
James Valentine Bisset – For services to the community in North West England.
Arnold Julian Sheldon Black – Historian and Statistician, Scottish Athletics. For services to Athletics.
Professor Lynne Boddy – For services to Mycology and Public Engagement in Science.
Emma Pauline Bond – For services to Policing and the community in Northern Ireland.
Professor James Robert Bonham – Director, Pharmacy, Diagnostics and Genetics, Sheffield Children's NHS Foundation Trust. For services to Young People with Genetic Metabolic Diseases.
Lorna Elizabeth Booth – Foster Carer, Lincolnshire County Council. For services to Children in Lincolnshire.
Stephen Peter Booth – Foster Carer, Lincolnshire County Council. For services to Children in Lincolnshire.
Barbara Ama Ansah Panfu Bray – Nutritionist. For services to Food Nutrition.
Caroline Breen Cooksley – Development Director, Associated Community Training Ltd. For services to Education.
Charles Ernest Brown – National Chairman, Royal British Legion Scotland. For voluntary service to Veterans in Scotland.
Kenneth John Brown – For services to Sport and Broadcasting.
Rosemary Brown – Team Manager, Shared Lives Scheme. For services to Healthcare in South East Wales.
Andrew Bryant – C1, Ministry of Defence. For services to Defence.
Janis Margaret Burdin – Head Teacher, Moss Side Community Primary School, Leyland, Lancashire. For services to Education.
Sarah Penelope Burns – For services to Disadvantaged Women.
Eve Alexandra Burt – For public and political service.
Karen Buse – Managing Director, European Relations, BMI. For services to Music.
Sally Anne Buttifant – For services to the Railway and the community in Cheshire.
Elizabeth Jane Buttigieg – Executive Officer, UK Statistics Authority. For services to Pensioners, Veterans and the community in Newport, Wales.
Gary Roy Byfield – Inspector, Metropolitan Police Service. For services to Families of Police Officers Killed in the Line of Duty.
Professor Gerard John Byrne – Director of Education and Quality, Health Education England (North). For services to UK and Global Health Education.
Michael Adrien (Ben) Byrom – For services to Flood Resilience and the community in Braunton, Devon.
Gerrard Campbell – Trustee, The Sharan Project and Founder, Big Brother Movement. For services to Crime Prevention and the Elimination of Violence Against Women and Girls.
Lorraine Katrina Campbell – Registered Intermediary, Ministry of Justice. For services to Young Victims and Witnesses.
Julie Carlton – Seafarer Safety and Health Manager, Maritime and Coastguard Agency, Department for Transport. For services to Maritime Safety.
John Casson – For services to charity.
Christopher William Cavey – Open Learning Manager, British Council. For services to UK cultural relations.
Shibu Chacko – Specialist Nurse, NHS Blood and Transplant and Community Volunteer. For services to the NHS.
Sheila Chambers – Founder, Around Noon. For services to the Economy and to the community in Newry.
Shireen Chambers – For services to Forestry.
Dr. Navnit Singh Chana – Lately Chairman, National Association of Primary Care and General Practitioner, Cricket Green Medical Practice. For services to Clinical Education and Primary and Community Care
Dr. Gulbash Singh Chandok – Senior Partner, Guru Nanak Medical Centre. For services to General Practice.
Dr. Sengottiyan Chandrasekaran (Dr Chandra) – Medical Lead, General Adult Critical Care. For services to the community in Manchester.
John Chapman – For services to Children with Severe Learning Difficulties.
Jennifer Dorothy Charles – Magistrate, Supplemental List. For services to the Administration of Justice and the community in Hampshire.
Cara Ann Charles-Barks – Chief Executive, Salisbury NHS Foundation Trust. For services to the NHS.
Courtney Gary Stempel Chatburn – Head Coach, Under 17 Panamanian National Football Team. For services to youth and sport in Panama
Janet Lynda Cheek – former Member of the Falkland Islands Legislative Assembly. For services to the Falkland Islands
Ceinwen Jean Church – For services to Business.
Rita Ciccu Moore – Deputy Director of Nursing, NHS Forth Valley. For services to Nursing and the NHS Forth Valley Nurses Choir.
Darren Harkins Clark – For services to Tackling HIV/AIDS.
Gwyneira Rose Clark – Lately Councillor. For services to Local Government, Housing and the community in Garndiffaith, Torfaen.
Jacqueline Ida Clarke – Executive Assistant, Ministry of Defence. For services to Defence.
Dr. Keith Clarkson – For services to Wildlife Conservation.
Kyle James Coetzer – For services to Cricket.
Ben Coffman – For parliamentary and political service.
Raymond Colbourne – Team Leader, Planning Casework Unit, Ministry of Housing, Communities and Local Government. For public service.
Robert James Collister – For services to Mountaineering and Conservation.
Anthony Joseph Convery – Founder and Chairman, CDE Group. For services to the Northern Ireland Economy.
Andrew Smith Cooke – For services to Badminton.
Lesley Yvonne Wendy Coomer – Lately Chair, Together Trust. For services to Young People and the community in Cheshire.
Janette Cooper – Co-founder, volunteer, Board Member and lately Chair, Berkshire Women's Aid. For services to Women's Refuge and those affected by Domestic Violence.
Professor Jane Kennedy Core JP – Lately Director of Student and Library Services, Northumbria University. For services to Higher Education.
Richard Wykeham Cornwallis – former Secretary to the Council of Trustees, British International School, Jakarta, Indonesia and former Honorary Legal Adviser to the British Embassy, Jakarta, Indonesia. For services to UK/Indonesia relations Gabrielle Anne COSTIGAN, Chief Executive, BAE Systems Australia. For services to UK/Australia relations
Katharine Alison Costelloe – Assistant Head, Operations Directorate, Ministry of Defence. For services to Defence.
Dr Diane Crann (Diane Davies) – Founder, Engineering Masterclass Programme, Royal Institution. For services to Engineering Education.
Colin Michael Crowe – Lately Senior Officer, Border Force, Home Office. For services to Border Security.
Ian William Crowe DL – For services to the community and to the Northern Ireland Air Ambulance.
William John Dallimore – For services to Target Shooting.
Nicola Daniels – For services to the community in South Shropshire.
Jacqueline Caryl Dankworth – Recording Artist, Actress and Singer. For services to Music.
Anita Elizabeth Darlison – Consultant Nurse, University Hospitals of Leicester NHS Trust and Head of Services, Mesothelioma UK. For services to Cancer Research and Patients.
Donald Ewen Dugald Macinnes Darroch – Special Constable, Police Scotland. For services to Law and Order on the Isle of Jura, Inner Hebrides.
Jacqueline Davidson – Founder and Director, Jackie Davidson Management. For services to Music.
Gerallt Bowen Davies – National Operations Officer Wales, St John Ambulance. For services to First Aid provision in Wales.
Kathryn Davies – Assistant Director, HM Revenue and Customs. For services to the Investigation of Organised Crime.
Richard Craig Davies – HM Cutter Commander, Border Force. For services to Border Security.
William Gareth Davies – For services to the community in Merthyr Tydfil.
Mary Fleur De Rhé-Philipe – For services to Local Government and the community in Wiltshire.
Janette Dewsbury – Foster Carer, Redcar and Cleveland Borough Council. For services to Fostering.
Neil Dewsbury – Foster Carer, Redcar and Cleveland Borough Council. For services to Fostering.
Margaret Jessie Mcfarlane Dixon – For services to the Administration of Justice and for voluntary service in the UK and Abroad.
Sara Kim Donald – For public and political service.
Gillian Donaldson – former fencer and Olympic Gold Medallist. For services to UK sport
Colin Dorrance – Lately Sergeant, Police Scotland. For services to Law and Order, the Remembrance of Pan Am Flight 103 and charity.
Faith Douglas – For services to Charitable Fundraising.
Matthew Downie – Director of Policy and External Affairs, Crisis. For services to Tackling Homelessness.
Sonja Meryl Drew – Deputy Head of Senior Staff, Human Resources, Department for Business, Energy and Industrial Strategy. For public and charitable services.
Alexander Peter Duguid – For services to Deaf People and British Sign Language Education.
Martyn Dunsford – Director, Care and Relief for the Young. For services to Disadvantaged Children and Young People.
Julie Ann Dyer – For services to Young People with Special Educational Needs.
Laura Murray Dyer – Deputy Chief Executive, Arts Council England. For services to the Arts.
Marlene Dylys Dyke – For services to Culture in Barnsley.
Malcolm East – First Aid Trainer, Welsh Government. For services to First Aid and the community in Llandrindod Wells.
Naghmeh Ebanks-Beni – Commercial Director, Prima Cheese. For services to International Trade.
Jane Elizabeth Ebel – Manager, UK-Moldova Projects, Chisinau, Republic of Moldova. For services to disabled children and adults in the Republic of Moldova
Gillian Elaine Edge-Evans – For services to Education.
Georgina Elizabeth Edwards – Founder and Director, Norfolk Community Law Service. For services to the community in Norfolk.
Spyros Petros Elia – Chair of Governors, Brindishe Federation, London Borough of Lewisham. For services to Education.
Kathryn Denise Ellaway – Lately Designated Nurse Safeguarding, National Safeguarding Team. For services to Safeguarding in Wales.
Simon Bryan Ellis – Head of Crisis Management, British Council. For services to security and the British Council
Clive Robert Emson – For services to Vulnerable and Disadvantaged Young People in Kent.
Raymond Vincent Ennis – For services to Music.
Pamela Christine Evans – Founder and Director, Peace Mala. For services to the Promotion of Peace and Interfaith Understanding.
Thomas Alfred Evans – For services to Farming Heritage.
Clive Harold Everton – Broadcaster and Journalist. For services to Snooker.
Paul Martin John Farrell – Assistant Director, Border Force, Home Office. For services to Border Security.
Dr. Mohammad Farsi – Founder, CANopen Protocol. For services to the Automotive Industry, Education and Cultural Engagement.
Eileen Fenton – For voluntary service to Long Distance and Competitive Swimming Coaching in Yorkshire and Great Britain.
David Michael Fergusson – Scientist, Defence Science and Technology Laboratory. For services to Defence and to Aviation Safety.
Suzanne Fernando – For services to Cervical Cancer, Autism and Military Veterans in Ayrshire.
Teresa May Filkins – Lead Worker, Thames Reach Charity. For services to Homeless People.
Jim Findlay – For services to the community in Hollingbourne, Kent.
Joseph Guy Fisher – former Second Secretary, British Embassy, Rangoon, Myanmar. For services to British foreign policy
Joanna Louise Fitch – Senior Policy Adviser, Cabinet Office. For public service.
Michael Oliver Flavin – Review Team Manager. Bedfordshire, Cambridgeshire and Hertfordshire Joint Protective Services Major Crime Unit. For services to Policing.
Jewelle Yvonne Fleming – Clerk to the Executive Council, Anguilla. For services to public service in Anguilla.
Peter John Floyd – For services to the community in Bristol.
Margaret Jean Foster – For services to Fostering in Staffordshire.
William Ernest Henry Foster – For services to Fostering in Staffordshire.
Keith Harrison Fowler – For charitable services.
Michael John France – For services to Mountain Rescue.
Victoria Lynette Garcia – Accessibility and Communities Manager, Brighton and Hove Buses. For services to Disabled Transport Users.
Professor Jason Otto Gardosi – Director, Perinatal Institute. For services to Maternal and Infant Health.
Dr. Jacqueline Ann Gerrard – Lately Director, The Royal College of Midwives. For services to Women and Midwifery.
Rosie Chaar Ghazal – Personal Assistant to the Defence Attaché, British Embassy, Beirut, Lebanon. For services to Lebanese veterans who served in the British Armed Forces
Major (Retd) William John Gillett – Support Officer, Blesma, Military Charity for Limbless Veterans. For services to Veterans.
Thomas Louis Gilzean BEM – For services to Charitable Fundraising in Edinburgh.
Dr. Isabel Ann Glen – For services to Education, Railway Heritage and the community in Airdrie.
George Scott Glynn – Founder, Walk with Scott Foundation. For services to Health and charity in East Lothian.
Joan Goodwin – Member, Housing Liaison Board, Yardley Wood. For services to Tenants and Leaseholders in Birmingham.
Jennifer Ann Gow – Founder, A Bear Named Buttony. For services to charity in the North East of Scotland.
Paul Gordon Graeme – For services to the Magistracy and the community in Sandwich, Kent.
Dr. John Michael Grainger – Chair, Microbiology in Schools Advisory Committee. For services to Microbiology.
Rodney Grant (Raheem Luqmaan Mu Khepera) – Work Coach, Department for Work and Pensions. For services to Young People in Haringey, North London.
Raymond Gray – For services to Search and Rescue in the UK and Abroad.
Caroline Inez Green – Lately Non Executive Director, British Business Bank. For services to the Economy and to charity.
Professor Abigail Gregory – Deputy Pro-Vice Chancellor, Faculty of Arts and Humanities, Manchester Metropolitan University. For services to Exports.
Dr. Jane Elizabeth Haley (Jane Wyllie) – Neuroscience Scientific Co-ordinator, University of Edinburgh. For services to Scientific Engagement and Education.
Dr. Frederick John Hall – For voluntary service to Armed Forces Medical Training.
Georgia Kelly Hall – Golfer. For services to Golf.
Fiona Hamilton-Fairley – Chief Executive Officer, Kids' Cookery School. For services to Children with Special Educational Needs and Disabilities.
Dr. Richard Anthony Hancock – For services to charity and the community in Chichester, West Sussex.
Andrew Richard Hanson – Co-ordinator of Science Ambassadors, National Physical Laboratory. For services to STEM Education.
Judith Mary Harper – For services in Fostering in Gawcott, Buckinghamshire.
Gillian Ruth Harris – For services to Libraries in Education.
Ian James Harris – Chief of Staff, British Embassy Kabul, Afghanistan. For services to British foreign policy
Ian John Harris – Incident Officer, Network Rail. For services to the Railway in South Wales.
Marcus David Hayes – For services to Education and Law in Cheshire.
Clare Elizabeth Hayward DL – Board Member, Cheshire and Warrington Local Enterprise Partnership and Chair, Make It Macclesfield. For services to Economic Regeneration in Macclesfield.
David Christopher Hayward – Chief Executive Officer, Micropore Technologies. For services to International Trade and the North East Chemical Sector.
Caroline Anne Headon – Police Staff, South Wales Police. For services to Policing and Tackling Serious and Organised Crime in Wales.
Norman Richard Healy – For services to Wildlife Management in England.
Peter Michael Helps – For services to the Arts, Music and Education.
Joseph Edgar Henderson – Group Chief Executive and Founder, Henderson Insurance Broking Group. For services to Business and the community in Lincolnshire.
Michael Ridsdale Hepple – Senior Delivery Lead, Operational Excellence Digital Services - Automation, HM Revenue and Customs. For services to Taxpayers.
Susanne Margaret Hewitt – Consultant Emergency Physician, University Hospitals of Derby and Burton NHS Foundation Trust. For services to Emergency Medicine.
Dr. Helen Macpherson Hibbs – Clinical Accountable Officer, NHS Wolverhampton Clinical Commissioning Group. For services to NHS Leadership.
Jaspaul Kaur Hill – Headteacher, Mayfield Primary School. For services to Education.
Marcia Hipwell – For services to Fostering in Plymouth.
Martin Andrew Hipwell – For services to Fostering in Plymouth.
Sonia Hitch – Co-founder and volunteer, Peterborough Rape Crisis Care Group. For services to Survivors of Sexual Violence.
Simon Christopher Hodges – Security Team Officer, Foreign and Commonwealth Office. For services to national security
Ruth Elizabeth Holdaway – Chief Executive Officer, Women in Sport. For services to Gender Equality in Sport.
Andrew Nigel Horncastle – For services to charity and Business in the community in East Yorkshire.
Jane Henson Horne – Lately Councillor, Forest of Dean District Council. For voluntary and charitable services to the community in the Forest of Dean.
Mark Philip Horton – Chief Executive Officer, Ballinderry Rivers Trust and All-Ireland Director, The Rivers Trust. For services to Conservation.
Patricia Margaret Hudson – For services to Fostering in Birmingham.
Skinder Singh Hundal – Chief Executive Officer, The New Art Exchange. For services to Visual Arts.
Kelly Hunter – Artistic Director, Flute Theatre. For services to Theatre.
John Gordon Irwin – Consultant Chartered Surveyor. For services to Business and Economic Regeneration on Teesside.
Elizabeth Jane Bewick Jackson – Partner, Herbert Smith Freehills. For services to the Northern Ireland Economy and Innovation in Law.
Dawda Jatta – Founder and Chief Executive Officer, Black and Minority Ethnic Environment Network. For services to Recycling and Energy Saving in Hull.
Tayyebah Jiva – Adoption Team Manager, Penny Appeal. For services to Children and Families.
Julie Marie Johns – Founder, Safe Space Consultancy. For services to People suffering Domestic Abuse and to charity.
Dr. Adrian Brendan Johnston – For services to Peacebuilding and the community in Northern Ireland.
Adam Nicholas Jollans – Chair, Hampshire Scout Expeditions. For services to Scouting and Young People.
John William Charles Jolly – Co-Founder and Manager, Sudden Adult Death Trust UK. For services to Raising Awareness of Sudden Arrhythmic Death Syndrome.
Christopher Jones – C2, Ministry of Defence. For services to Defence.
Donald Jones – Founder, Cambridge College, Lima, Peru and Founding member of British Schools Peru and the Association of British Schools in Latin America. For services to education in Peru and Latin America
George Christopher Jones – Operational Delivery Leader, Manchester. HM Revenue and Customs. For services to Customs.
Stephen Henry Jones – For services to Sport.
Henry Ramsay Duncan John Joynson – Adviser, President's Governance and Delivery Unit, Liberia. For services to development in Liberia
Dr. Andrew Robert Kemp – Group Sales and Marketing Director, Bidfood. For services to the Hospitality Industry.
Annmarie Kennedy – For political service.
Michelle (Shelley) Kerr – Head Coach, Scottish Women's National Football Team. For services to Football.
Sophie Caroline Kershen Crosby-Browne – Manager, British Chamber of Commerce for Luxembourg. For services to UK/Luxembourg commercial and business relations
Marshall Kilgore – Principal, Drumachose Primary School. For services to Education and the community in Northern Ireland.
David James King – Volunteer. For services to the Environment.
Catherine Mary King (Catherine Bass) – Principal Expert by Experience, Independent Review of the Mental Health Act. For services to Mental Health Legislative Reform.
Dr. Michael Joseph Kirton – Technology Officer, Foreign and Commonwealth Office. For services to national security
Christine Emily Kitashima – For services to Fostering in Oxfordshire.
Dr. Celia Knight – Celia Knight Consulting. For services to Plant Science Education.
Hilary Knight – For services to the community in Plymouth, Devon.
Michael John Ladd – Head of Special Projects, FCO Services. For services to the Foreign and Commonwealth Office
John Charles Stuart Laidlaw – For services to the Arts.
Walter Lambe – Head, Rathmore Educational Guidance Centre. For services to Education.
Professor Duncan Austin Lawson – For services to Mathematics in Higher Education.
Professor Alison Leary – For services to Spectator Safety and Medical Care.
Darryl Mark Lee – For services to charity and the Jewish community in Manchester.
David Robin Lee – Founder, Wilds Lodge School, Empingham, Oakham. For services to Children with Special Educational Needs and Disabilities.
Gavin Tat Fai Lee JP – For services to the Chinese community in Scotland.
Jeremy John Leggett – Trustee and Vice-Chair, Action with Communities in Rural England. For services to Rural Communities and Young People.
Professor Melanie Jane Leng – Chief Scientist for Environmental Change, British Geological Survey, Professor, University of Nottingham. For services to Environmental Research.
Patricia Kathleen Lerew – For services to the community in Alton, Hampshire.
John Stephen Lewis – Managing Director, SOG Group. For services to Business in Liverpool.
Elaine Lilley – Lately Chief Executive, Lincolnshire and Rutland Education Business Partnership. For services to Improving Links between Education and Business.
Mahendra Kumar Limbu – Welfare Officer, Brigade of Gurkhas. For services to Gurkha Personnel and their Families.
Linda Barbara Lloyd Jones – Head of Exhibitions and Loans, Victoria and Albert Museum. For services to British Culture.
Lesley Logan – Regional Manager, NHS Blood and Transplant. For services to Healthcare and Organ Donation.
Linda Mary Longstaff – For services to the community in Sunderland.
Janice Lopatkin – UK Programme Director, World Jewish Relief. For services to Refugees.
Julia Anne Lorrain-Smith DL – For services to the Children's Hearings System in Scotland and the community in Midlothian.
Jayne Louise Ludlow – Manager, Wales Women's Football. For services to Women's Football in Wales.
Christine Marie Lunn – For services to Fostering in Rotherham.
Frances Lysyj – Lately Headteacher, St Thomas of Canterbury RC Bolton Primary. For services to Education.
Norman MacDonald – Chairman, Highland Hospice. For services to charity and Terminally Ill People in the Highlands and Islands.
Janet MacGregor – Team Leader, HM Revenue and Customs. For public and charitable services.
John Allan MacKechnie – Artist and Printmaker. For services to Art.
Elizabeth Herries (Judy) MacKenzie – For voluntary service to Wheelchair Curling.
John MacKin – Director, Credit Unions of Glasgow Ltd. For services to Credit Unions in the UK.
Karen Margaret MacKinnon – For services to the Arts.
Roger John Maggs – Chairman, Port Talbot Waterfront Enterprise Zone. For services to the Economy in Wales.
Kate Olivia Malone – For services to UK Ceramic Art.
Dr. Helen Sarah Margolis – Fellow, National Physical Laboratory. For services to Metrology.
Denise Sylvia Marshall – For services to Pregnant Women and New Mothers in Prison
Alice Adelaide Mascarenhas – lately Deputy and Features Editor, Gibraltar Chronicle. For services to media, culture and the arts in Gibraltar
Mark Martin – For services to Education, Technology and Diversity in UK Technology.
Lorna McAlpine – For services to Integrated Education in Northern Ireland.
Christine Mary McGowan (Christine Collings) – For services to Developing the Arts in Wolverhampton.
Catherine Frances McIlroy – Allied Health Professional Manager, Acute Services, Southern Health and Social Care Trust. For services to Physiotherapy.
Abbie Elizabeth McKenna – Workforce Development Manager, Ulster University. For services to Higher Education and to Deaf Children.
David McKown – For services to Hospitality and Catering Training.
Duncan James McLaren – Lead Technical Adviser, Valuation Office Agency. For services to the Surveying Profession.
Georgios Meliniotis – Physics Teacher, the Meridian School, Royston, Hertfordshire. For services to Education.
Anna Howard Meredith – Composer. For services to Music.
Julianne Mary Miles – For services to Business and Equality.
Jacqueline Naomi Milliner – Residence Manager, H.M. Ambassador's Residence, Tel Aviv, Israel. For services to UK/Israel relations
David Lockwood Mowbray – For community service in the UK and Abroad.
Dr. David Barclay Murray – For services to Healthcare and the community in Wester Ross.
Rashid Mustapha – For services to Radio Broadcasting.
Mark Debal Nandi – Regional Counter Terrorism Adviser, North Africa and the Sahel, Foreign and Commonwealth Office. For services to national security
Shereen Nanjiani – For services to Broadcasting in Scotland.
Dr. Syed Muhammed Habib Naqvi – Policy Lead, Workforce Race Equality Standard, NHS England. For services to Equality and Diversity in the NHS.
Syed Muhammad Iqbal Nasim – For services to Community Development and to Tackling Poverty.
Andrew Howard Martin Nebel – For services to Charitable Fundraising.
Edwin Neesom – Chairman and Managing Director, Hunprenco Ltd. For services to Exports and the Rural Economy in North Yorkshire.
Alison Neil – Chief Executive Officer, South Georgia Heritage Trust. For services to Conservation.
Philippa Jane Nightingale – Chief Nurse and Executive Director, Chelsea and Westminster Hospital NHS Foundation Trust and Trustee, Rennie Grove Hospice Care. For services to Midwifery.
Michael Clive Norman – Volunteer and Founder Member, Penllergare Valley Woods. For services to Welsh Heritage.
Frank William Norris – Director, Co-operative Academies Trust. For services to Education.
Catherine Lorraine O'Brien – Director, Welsh Blood Service. For services to the Welsh Blood Service and the Adoption of Cell and Gene Therapies in Wales.
Victoria Imogen Ogden – Financial Analyst, HM Treasury. For public service.
Craig Daniel O’Kane – lately Head of Office and Director of Investment Australia and New Zealand, British Consulate Brisbane, Australia. For services to UK/Australia relations and international trade
Martin O'Neill – Director, Bobath Scotland. For services to People with Cerebral Palsy and voluntary service in Glasgow.
Christine Audrey Outram (Christine Potts) – Chair, The Christie NHS Foundation Trust. For services to NHS Patients.
Priscilla Mary Padley – Founder, Nene Valley Trust. For services to Children and Families in Northamptonshire and Peterborough.
Joanne Elizabeth Pardavila – Customer Services Manager, Aviva Health Insurance. For services to the Economy and the community in Manchester.
Ruth Ilse Parker – Desk Officer, Foreign and Commonwealth Office. For services to British foreign policy and national security
Joanne Parry – Head, Year of Engineering Communications, Department for Transport. For services to Engineering.
Dr. Rajesh Patel – Deputy National Medical Director for Primary Care, NHS England. For services to Healthcare.
Hugh Geoffrey Pearman – For services to Architecture.
Angus Maitland Pelham Burn – For services to the community in Aberdeenshire.
Peter James William Pepys-Goodchild – For public and political service.
Charlie Kyriacos Michael Pericleous – For services to the Prevention of Extremism and Hate Crime in Portsmouth.
Michael James Perls – For services to the community in Manchester.
William Thomas (Liam) Perry – Principal, St Columbanus College, Bangor. For services to Education.
John Anthony Peter – Founding Judge, Ian Charleson Awards. For services to Theatre.
Susan Peters – Customer Adviser, Aviva. For services to the Economy and Customer Service.
Dr. Emma Margaret Philpott – Chief Executive Officer, IASME Consortium Ltd. For services to Cyber Security.
Christine Margaret Pickersgill – Teacher, Colyton Grammar School. For services to Education.
Mark (David) Pickles – Director of EU Regulatory Affairs, National Grid. For services to the Electricity Market.
Suzanne Louise Poley – Consultant Nurse for Substance Misuse, University Hospital of Wales, Cardiff. For services to Nursing.
David Alexander Poole – Member, Lower Wensleydale Business Network. For services to Business, Skills and the community in Wensleydale.
Brenda Mary Potter – For services to Children and Families in London.
Gordon John Potter – For services to Children and Families in London.
Katherine Jane Prince – For services to Dance.
Mary Louise Prince – Teacher, Reading Centre, Kingston upon Thames. For services to Young People with Dyslexia in Kingston upon Thames.
Howard John Ramm – For services to the Royal National Lifeboat Institution.
Christopher Ramsey – For services to Football and Diversity in Sport.
Peter Howard Ransom – For voluntary service to Mathematics Education.
Jacquelyn Anne Rason – For services to Road Safety.
Emma Gabrielle Ratzer (Emmeline Gallant) – Chief Executive, Access Community Trust. For services to the community in Suffolk.
Helen Marie Rawdon – For services to Fostering in the East Riding of Yorkshire.
Abigail Caroline Ann Reader – For services to Farming.
Peter Martin Reddin – For services to Gymnastics.
Dr. Peter Dennis Reed JP – Magistrate and Mediator. For services to the Administration of Justice and the community in Bristol.
Daniel Frederick Reid – For services to Charitable Organisations in Northamptonshire.
Adam Birrell Reid – Chief Executive Officer, Street Child United, Brazil. For services to sport, underprivileged children and the British community in Brazil
John Reid – Area Manager for Legacy Benefits, Department for Work and Pensions. For services to Vulnerable Customers in Scotland and the community in Inverclyde.
William Andrew Reid – Volunteer Ambassador, ABF The Soldiers' Charity. For voluntary service to Veterans and to People with Disabilities in St Helens, Merseyside.
Dr. Timothy John Reynish – Conductor. For services to Music.
Jane Anne Reynolds – Chair, Tees Valley Business Club and Business Development Manager, NorthStar Ventures. For services to SMEs and the Tees Valley Economy.
Kenneth David Reynolds – Lately Student Support Worker, The Blandford School. For services to At-Risk Young People in the community in Blandford Forum, Dorset.
Andrew Roachford – For services to Music.
Clarence Bennie Robinson BEM – For services to the community in Burton-upon-Trent, Staffordshire.
Patricia Roden – Senior Officer in Charge, Reasonable Adjustments Support Team. For services to Disability Support.
Sidney James Roffey – For services to World War Two Evacuees and their Families.
David Graham Rogers – Chief Executive Officer, Copper Horse Ltd. For services to Cyber Security.
Rachael Ross – Founder, Portsmouth Down Syndrome Association. For services to Education and Down Syndrome.
Simon Paul Rowe – For services to the community in Salisbury.
Mark Gordon Runacus – For services to Advertising.
Katherine Jane Ryan – Headteacher, Matthew Arnold School. For services to Education.
Sarabjit Kaur Sahota – For services to Education.
Khalid Saifullah – For services to the community in North West England.
Imran Sanaullah – Chief Executive Officer, Patchwork Foundation. For services to Young People.
Nicholas Mark Sanders – For services to Endurance Cycling and Motorcycling.
Anne Patricia Sarrag – For services to Improving Access to Reading in the UK.
Susan Savage – For services to the community in Rotherham, South Yorkshire.
Cary Rajinder Sawhney – For services to Film.
Margaret Lesley Scott – Lately Headteacher, Forest Lodge Primary School. For services to Education.
Sandra May Scotting – For services to the community in East London and Kent.
Ian Christopher Norman Seaton – Lately Chairman, Board of Governors, City of London School. For services to Education and Training in London.
Colin John Seccombe – Board Member, UK Community Foundations. For services to Business and the community in North East England.
Madonna Sarah Shaughnessy – Higher Officer, National Frontier Approvals Unit, Border Force, Home Office. For public service.
Dr. Abdullahi Shehu – For services to Community Cohesion in Coventry.
Robert James Shephard – For services to the Environment and community in Patterdale.
Jane Shepherd – Managing Director, Shepherd PR. For services to International Trade and the community in Staffordshire.
Kathryn Louise Shippey – For voluntary service to Inclusion in Football Spectating.
Peter David Shippey – For voluntary service to Inclusion in Football Spectating.
William Henry Sholdis – For services to the Scout Movement and to Young People in North and West Belfast.
Dr. Marie Short – Trustee, Scottish Huntington's Association and Coach, Grangemouth Synchronised Swimming Club. For services to charity.
Ian Thomas Simpson – Immigration Officer, Home Office. For public service.
Aghia Pal Singh – Infrastructure Engineer, West Midlands Fire and Rescue Service. For services to charity and the community in the West Midlands.
Christine Eleanor Sloan – Founder, Crathie Opportunity Holidays. For services to People with Disabilities and to Tourism.
Matthew Clifford Smith – Business Manager, Sheringham Woodfields School and Founder and Trustee, North Walsham Play. For services to Children with Special Education Needs and Disabilities.
Mark Andrew Smith – International Liaison Officer, British Embassy, Quito, Ecuador. For services to international security
Alfred Arnold Smithers – British Honorary Consul, Halifax, Canada. For services to British nationals overseas
David Murray Alexander Smythe – Chairman, Association of Scotland's Self-Caterers. For services to the Tourism Industry.
Daniel Snow – Journalist, Historian and Presenter. For services to History.
Narendra Kantilal Solanki – Chair, Multi Academy Trust, St Simon and St Judes Primary School, Bolton. For services to Education.
Shirley Joan Sorbie – For services to Children with Disabilities in Dorset.
Jacalyn Tarry Southcombe – Performance Improvement and Project Lead, HM Revenue and Customs. For services to Taxation, Mental Health Support and charity.
Christie Darren Spurling – Founder, N-Gage. For services to Young People in Greater Manchester.
Alexandra Jane Stanyer – Founder and Principal, The Puzzle Centre. For services to Young People with Autism.
Jennifer Mary Stephens – Chief Officer for Adult Care and Health, Devon County Council. For services to Social Care.
Jacqueline Elizabeth Stewart – Lately Principal, Downshire High School. For services to Education.
Gavin Eric Stones – Technical Manager, National Measurement Office Certification Body, Department for Business, Energy and Industrial Strategy. For services to Product Safety.
Samuel Francis John Stopford – For services to Ballroom and Latin American Dance.
Catherine Margaret Strachan – Learning and Development Manager, MBDA UK Ltd. For services to Career Development and to Young People.
Nicholas Graham Sturge – Director, Engine Shed. For services to the Digital Economy.
Emdad Hossain Talukder – Community Resource Officer, Tower Hamlets Social Services Family Placement Services and Foster Carer. For services to Fostering.
Gillian Claire Taylor – Macmillan Nurse Consultant, London North West Healthcare NHS Trust. For services to Colorectal Cancer Nursing.
Katherine Rachel Taylor – Owner and Director, Drewtons Ltd. For services to the Economy and community in Yorkshire.
Kevin Michael Taylor – lately President, British Telecom Asia, Middle East and Africa and lately Chairman, British Chamber of Commerce, Hong Kong. For services to UK/Hong Kong commercial relations
Katie Taylor – D, Ministry of Defence. For services to Defence.
William Douglas Tennant (William Bregulla) – For voluntary service in the UK and Ghana.
Bernadette Thomas – Intercountry Adoption Team Leader, Department for Education. For services to Young People.
Edwin Francis Thomas JP – Chairman, British Ex-Services Wheelchair Sports Association. For services to Disability Sport and the community in Cornwall.
Fay Margaret Doreen Thomas – Fundraiser, National Society for the Prevention of Cruelty to Children. For services to Children.
Dawn Thomas – Team Leader, Foreign and Commonwealth Office. For services to diversity
Nicholas Jeffrey Thomas – Founder and Chairman, Qdos Entertainment Limited. For services to the Entertainment Industry and to charity.
Ann Marion Thomson – Chair, Extend Exercise Training Ltd. For services to Physiotherapy Education and Disabled People through Swimming Exercise.
Charles Ian Howie Thomson – Vice Chairman, Scottish Target Shooting. For services to Target Shooting.
Sylvia Margaret Tiffney – For services to Children in North East Lincolnshire.
Brian James Tobin – Chief Executive Officer, Iceni Ipswich. For services to Drug Rehabilitation in Suffolk.
Robin Townsend – For services to the community in South Wiltshire.
Yuk Kiu Tse – Chair, Anglo Chinese Cultural Exchange, Ipswich. For voluntary service to the community in Suffolk.
Andrew John Turner – For services to the community in Chorley, Lancashire.
John Philip Turner – For services to Healthcare and the community in Portsmouth.
Lynn Denise Tyler – Executive Assistant to Director, Air Support, Defence Equipment and Support, Ministry of Defence. For services to Defence.
Jonathan David Vaughan – Executive Director, Lilongwe Wildlife Trust, Malawi. For services to combating the illegal wildlife trade in Malawi.
Dexter Edgar Vickery – Head of Network and Resources, Europe Directorate, Foreign and Commonwealth Office. For services to British foreign policy
Michael David Viggers – Lately Chair, Western Sussex Hospitals NHS Foundation Trust and Brighton and Sussex University Hospitals NHS Trust. For services to the NHS.
Ghulam Mohammed Vohra – Vice Chairman, Coventry Muslim Forum. For services to Community Cohesion.
Saira Wajid – Head of Engagement, Museum of London. For services to Culture and Diversity.
Susan Elizabeth Wakefield – Scheme Coordinator, Independent Visitor Scheme, Doncaster Children's Trust. For services to Children in Care in Doncaster.
Melanie Jane Walker – Chief Executive, Devon Partnership NHS Trust and Chair, Space. For services to Mental Health and Learning Disabilities in the NHS.
Ruth Jane Walker – Executive Nurse Director, Cardiff and Vale University Health Board. For services to Nursing in the NHS.
Ruth Wallace – For services to Young People and the Belfast Trust Fostering Service.
Colin James Walsh – Chief Executive Officer, Crescent Capital, Northern Ireland. For services to Economic Development in Northern Ireland.
Frances Rosemary Watson – For services to People with Learning Disabilities in Gloucestershire.
Mark Watson – For services to Community Policing.
Janice Way – Lately Intercountry Adoption Programme and Training Development Manager, The Centre for Adoption. For services to Vulnerable Children and Families.
Ian Christopher Weatherill – Managing Director, Hope Technology Ltd. For services to Business, Innovation and the community in Lancashire.
Liane Weller – C1, Ministry of Defence. For services to Defence.
Susan Westwood – Regional Lead, Adoption Counts Regional Adoption Agency, Stockport. For services to Vulnerable Children and Families.
Timothy Charles Wheeler – For services to charity and Education.
John Andrew Whelan – For services to Business and Equality.
Jean Sheila Whimster – Secretary, The Glasgow Society of Women Artists. For services to the Promotion of Women in Art.
Jacqueline White – For services to charity and Vulnerable People in Cornwall.
Keith Terence White – Senior Manager, UK Financial Intelligence Unit, National Crime Agency. For services to Law Enforcement.
Dr. Peter Norman Whitehead – For services to Equestrian Sport Science and Medicine.
Terence Keith Wilcox – For voluntary service to the Special Olympics.
Peter Neil Wilson – Test Pilot, BAE Systems. For services to UK defence
Councillor David Tyrie Williams JP – For political service in Local Government.
Elizabeth Alana Williams – Director, Digital Society, BT. For services to Digital Literacy and Social Inclusion.
Susan Williams – For services to the community in Lymm, Cheshire.
Derek John Wilson – For public and political service.
Dr. Jean Lesley Wilson – President, Church Monuments Society. For services to Heritage.
Jennifer May Wilson – For services to Scottish Country Dancing and charity.
Clive Leslie Wood – Managing Director, Tees Components Ltd. For services to Engineering, Skills and the community on Teesside.
Jacqueline Claire Woodcock – Founder and Patron, Dying to Work Campaign. For services to Employment Protection for Terminally Ill Workers.
Matthew Woodcock – For services to Forestry and the Development of Woodfuel.
Margaret Mary Woodhouse – For services to Education across Greater Manchester.
Janis Ann Wright – Specialist Nurse, Orthopaedics, Ipswich Hospital NHS Trust. For services to Nursing.
Grantley William Yearwood – For services to the community in West London.
Wendy Yianni – For services to Education and the community in the London Borough of Brent.
Jurgita Zilinskiene – Founder and Chief Executive Officer, Guildhawk (lately Today Translations). For services to International Trade.
Military
Warrant Officer John Alpert, Royal Air Force
Major Simon Peter Ash, , General List, Army Reserve
Acting Staff Sergeant Lorraine Bennett, , Adjutant General's Corps (Military Provost Staff Branch), Army Reserve
Corporal Alexander Edward Binks, Royal Corps of Signals
Warrant Officer Class 2 Daniel Charles Bird, Royal Corps of Signals
Captain Gregory Philip Blezard, Royal Corps of Signals
Warrant Officer Class 2 Matthew Stewart Bragg, The Royal Logistic Corps
Major Tracey Elizabeth Brooks, Adjutant General's Corps (Royal Military Police)
Lieutenant Colonel Richard Neil Byfield, Royal Corps of Signals
Squadron Leader Beverley Cartwright, Royal Air Force
Captain Gary Case, The Rifles, Army Reserve
Commander Adam Gregory Clarke, Royal Navy
Major Robert John Colquhoun, The Royal Regiment of Scotland
Flight Lieutenant Neil Cottle, Royal Air Force
Lieutenant Colonel Paul David Denton, Corps of Royal Electrical and Mechanical Engineers
Warrant Officer Class 2 Stephen Christian Dixon, Royal Corps of Signals
Major John Hutchison Dunn, Scots Guards
Lieutenant Colonel Gregory Colin Ehlen, Adjutant General's Corps (Staff and Personnel Support Branch)
Chief Petty Officer Air Engineering Technician (Avionics) Thomas Michael Eland, Royal Navy
Major Rosamund Veronica Elliott, Corps of Royal Engineers
Warrant Officer Class 2 David Robert Evans, , 1st The Queen's Dragoon Guards, Army Reserve
Major Roy Falshaw, , The Royal Yeomanry, Army Reserve.
Major Jonathan David Leonard Ferman, Royal Tank Regiment
Sergeant Andrew James Floyd, Royal Air Force
Air Engineering Technician (Mechanical) Matthew Kenneth Gallimore, Royal Navy
Major Storm William Green, Coldstream Guards
Major David Charles Groce, The Royal Logistic Corps
Major Nicholas Alexander Heppenstall, The Royal Logistic Corps
Warrant Officer Class 1 Martin James Howlin, Grenadier Guards
Squadron Leader Robert Lockhart McCartney, Royal Air Force
Captain Paul John McComb, The Parachute Regiment
Captain Ian McDougall, Royal Marines
Major Mark McGroarty, The Royal Irish Regiment
Squadron Leader Andrew Paul Millikin, Royal Air Force
Major Nigel Ian Mudd, Royal Regiment of Artillery
Major Gordon William Muir, The Royal Regiment of Scotland
Captain Geoffrey John Nicholls, The Mercian Regiment
Squadron Leader Roisin Mary O’Brien, Royal Air Force
Major Shaun Thomas Phillips, The Parachute Regiment
Warrant Officer 1 (Physical Trainer) Natasha Pulley, Royal Navy
Corporal Netrabahadur Rana, The Royal Gurkha Rifles
Lieutenant Commander James Reynolds, Royal Navy
Commander Kevin Francis Robertson, Royal Navy
Major Fiona Jill Rogers, Adjutant General's Corps (Educational and Training Services Branch), Army Reserve,
Major Taitusi Kagi Saukuru, , The Royal Logistic Corps
Wing Commander Tara Elizabeth Scott, Royal Air Force
Lieutenant Commander Martin Shakespeare, Royal Naval Reserve
Flight Sergeant Adrian Terry Shepherd, Royal Air Force
Warrant Officer Class 2 Philip John Smith, Royal Corps of Signals
Flight Lieutenant Michael Anthony Stokes, Royal Air Force
Captain Darren Lee Taylor, Royal Army Physical Training Corps
Acting Flight Sergeant Ann Thomas, Royal Air Force
Warrant Officer Class 1 Marc Thomson, Adjutant General's Corps (Royal Military Police)
Chief Petty Officer Engineering Technician (Communication Information Systems) Helena Gail Ward, Royal Navy
Warrant Officer 2 Andrew Philip Watson, Royal Marines
Acting Major John Dennis Wharton, Adjutant General's Corps (Military Provost Staff Branch)
Warrant Officer John Vaughan Williams, Royal Air Force
British Empire Medal (BEM)
Civil
Dr. Naeem Ahmed, Consultant Radiologist, Chelsea and Westminster NHS Foundation Trust and Founder, Selfless. For services to volunteering and Healthcare.
Naseem Akhtar. For services to Health, Fitness and Sports for Women in Birmingham.
Robert Michael Anderson. For voluntary service to Sport in Peterlee, County Durham.
Helena Anderson-Wright, Convenor, Robert Burns World Federation Schools Committee (North East Section). For services to the Arts in Aberdeenshire.
David John Arlott, Watch Manager, Oxfordshire Fire and Rescue Service. For services to Fire and Rescue in Oxfordshire.
Patricia Ascroft. For services to Fundraising and the community in Garstang, Lancashire.
Dr. Andrew Ashbee. For services to the community in Snodland, Kent.
Richard William Austin. For services to the community in Boston, Lincolnshire.
Rev Carol Rosemary Avery. For services to the community in Kent.
Graham Ayres, Firefighter, Northamptonshire Fire and Rescue Service. For services to the Fire Service and the community in Brackley, Northamptonshire.
Charles Bain, Fundraiser, Alzheimer's Research. For services to charity in Aberdeen.
Gillian Bainbridge, Secretary, Bells Lane and Aspley Tenants and Residents Association. For services to Tenants.
Martin Stewart Bartlett. For services to the community in Stratford-upon-Avon, Warwickshire.
Roger Beard. For services to the community in Newent, Gloucestershire.
Kevin Allan Beaumont. For services to Minor County Cricket.
Mervyn Best. For services to the community in Northern Ireland.
Andrew Bignell. For services to Public Libraries.
Trudie Jane Bird. For services to Charitable Fundraising and the community in Milton Keynes.
Winifred Yvonne Craig Birnie, Treasurer, Rothiemurchus and Aviemore Tennis Club. For services to Sport in Badenoch and Strathspey.
Alison Elizabeth Blayney. For services to the community in Kilcooley, Northern Ireland.
June Patricia Boyne (June Ranger). For services to Dance in Swanage.
Anne Elizabeth Bradshaw, Lately Head of Operations and Regulatory Affairs, Imperial College Healthcare NHS Trust. For services to Laboratory Medicine.
Kimberley Ann Briggs, Resource and Finance Director, East Belfast Community Development Agency. For services to the community in East Belfast.
Thomas George Dennis Brock. For services to the community in Sunbury on Thames.
Ann Isabel Brogan, Co-Lead for Emergency Responders, Glasgow and Renfrewshire and Chair, Volunteer Fundraisers, Renfrewshire. For voluntary service in Renfrewshire.
Maureen Bruce. For services to Young People and the community in Cheshunt, Hertfordshire.
Michael David Brunton. For services to the community in Allington and Boscombe, Wiltshire.
Wilfred Burt. For services to Scouting, Young People and the community in Stoke on Trent.
Deborah Ann Burton, President, Forest Fire Alert Association, the Algarve, Portugal. For services to the community in the Algarve, Portugal
Martin Burton. For services to Public Libraries.
Reverend John Walter Butcher, Force Chaplain, West Midlands Police. For services to West Midlands Police and the community in Birmingham.
Jean Butterfield. Town Councillor, Harrogate Town Council. For services to Local Government.
Pauline Elizabeth Byles, Associate Head, Dr. Triplett's C of E Primary School]]. For services to Education and the community in London.
Andrew John Callard. For voluntary service to Weightlifting.
Raymond Stephen Carroll, Car Pool Manager, Northern Ireland Office. For public service.
Ian Lee Carter. For services to the Church and charity in Essex.
Sandra Cartner. For services to Charitable Fundraising.
Julie Frances Cashell. Manager, Oaklands Care Home. For services to Older People in Powys.
William Robert Caskey, Watch Commander, Magherafelt Fire Station. For services to the community in Magherafelt.
David John Cawthorn. For services to Hockey.
Asal Chaharsough-Shirazi, Founder, Jeunvie Skincare and the Autoimmune Support Awareness London. For services to Autoimmune Disease Awareness and Education.
Lynn Mary Chantrey, Police Staff Volunteer, Lincolnshire Police. For voluntary service to the community in Lincolnshire.
Mary Francisca Sarah Chapman. For services to Adult Education in Rochester and Medway, Kent.
Winifred Taggart Chinery, Nurse, Southend University Hospital NHS Foundation Trust. For services to Nursing and Patient Safety.
Christopher John Chittell, Actor. For services to Drama and charity.
Barry Frederick Clark. For services to Libraries.
Patricia Diane Clarke, Diabetes Specialist Nurse, Primary Integrated Community Services Ltd. For services to Diabetes Care.
David Allan Clegg, Founder, Trebus Projects. For services to People with Dementia.
Kathleen Cleveland-Dunn. For services to Charitable Fundraising in North London.
Lorna Clyne. For voluntary service to Hockey in Scotland.
Valerie Anne Collard. For services to Children and charity.
Anthony Frederick Charles Collier. For services to Charity, Fundraising and the community in Cheshire.
Richard David Collins. For services to the community in Cookstown, County Tyrone.
Mary Kidd Conacher. For services to Kayaking and Canoeing in Scotland.
Isabel Charlene Almeida Condeco. For services to Slamannan Parish Church and the community in Stirlingshire.
David Cook, Lately Driver, Government Car Service. For public service.
Frederick Robert Cookes. For services to the community in Barston Village, Solihull.
Maria Coulter, Personal and Business Coach, The Construction Coach. For services to Diversity and Inclusion in the Construction Industry.
Bernard Coyne. For voluntary service to Rugby Union in Middlesbrough.
David Masson Craig. For services to Outdoor Education and Canoeing on Speyside.
Valerie Violet Crichton. For services to Road Racing in Northern Ireland.
Elizabeth Mary Crockett. For services to the community in Worthing, West Sussex.
Janet Mary Croxson. For services to the community in Brockdish, Norfolk.
Anne Cunningham, Volunteer, Thames Valley Police. For services to Policing and the community in Faringdon, Oxfordshire.
Stewart Cusden, lately Chair, British Benevolent Fund, Madrid, Spain. For services to the British community in Spain.
Munsif Dad. For political service.
Andrew Dalton. For services to the community in Morley, West Yorkshire.
Stanley Francis Davies. For services to the community in Braintree, Essex.
Beverly Jean Denbury, Chairperson and Founder, The Journey of Hope, Botswana. For services to breast cancer awareness in Botswana.
Joanna Louise Dervisoglu. For services to Women following Mastectomy Surgery.
Dr. Sivaramkrishnan Devaraj, Volunteer. For services to Health Charity Fundraising and General Practice.
Elizabeth Dimmock. For services to Gender Equality.
Robert Patrick Doherty. For services to Young People through Golf in Portrush, Northern Ireland.
Brigid Dougherty, Staff Officer, Probation Board for Northern Ireland. For services to Criminal Justice.
James Downing, Founder, London Youth Rowing. For services to Rowing and Young People in London.
Richard Dunk. For voluntary service to the Royal National Lifeboat Institution.
Janet Dunn. For services to the community in Sefton.
Jean Dunn, Nurse, County Durham and Darlington NHS Foundation Trust. For services to Nursing.
Susan Durrant, C2, Ministry of Defence. For services to Defence.
Jennifer Durward, Volunteer, Accord Hospice, Paisley. For services to Palliative Care in Renfrewshire.
Shirley Muriel Ellis. For services to People with Learning Disabilities in Pwllheli, Gwynedd.
Fiona Ruth Ellwood, Lately Senior Lecturer and External Examiner, University of Chester and Patron, The Society of British Dental Nurses. For services to Dentistry.
Jonathan Eno. For services to Jazz Music Education.
Justine Charlotte Everett, Ground Operations Manager, EasyJet. For services to Border Security.
Judith Farquharson. For services to the community in Killingworth.
Rosemary Ann Fell. For voluntary service to the British Malaysian Society.
Siobhan Fennell, Founder, Accessible Belper. For services to Transport Accessibility, Inclusion and Disability Awareness.
Kathryn Jane Fielding. For services to Goalball and Blind and Partially Sighted People.
Deborah Jane Fletcher. For services to the community in Folkestone, Kent.
Julie Elizabeth Fountain, Dental Care Professional and Manager, Teeth Team Limited. For services to Dentistry.
Anthony William Freeman. For services to charity and the community in Taunton, Somerset.
Dr. Peter Michael Frost. For services to community in Peckham, London.
Horace Alfred Gafan, Lately Dock Master, Gibdock Limited, Gibraltar. For services to the ship repair industry in Gibraltar
Nigel James Gayner JP. For services to the community in Southend on Sea, Essex.
John Stanley Gibbons, Choral and Music Director. For services to Music.
Leonard Gibson. For services to World War Two Remembrance and the community in Sunderland.
Carol Anne Gilson. For services to the community in Honiton, Devon.
Michael John Gittus JP. For services to the community in Alcester, Warwickshire.
John Glover. For services to Athletics.
James McCrorie Gourlay, Founder, Vaspar Football Club. For services to Youth and Professional Football.
Heather Jane Gracey. For services to the community in Lisburn.
Kate Mary-Rose Grant. For services to the community in Cookstown, County Tyrone.
Robert George Bruce Grant. For services to charity.
Jennifer Valmai Margaret Greenwood. For services to the community in Lydgate, Greater Manchester.
Thomas William Howard Greenwood. For services to Music and the community in Richmond upon Thames.
Barry Gribben, Building Supervisor, Edenderry Primary School. For services to Education and Sport in Armagh.
John David Griffin. For services to Running in Wales.
Alan Thomas Griffiths. For services to the community in Foleshill, Coventry.
Frederick Wayne Gruba. For services to Victims of Terrorism.
Marilyn Haddon. For services to Charitable Fundraising.
Clare Janette Haggart, Co-Director, Phoenix Theatre. For services to Theatre and the Arts in the North East of Scotland.
Michael William Haines. For services to People with Disabilities in Cambridgeshire.
Enid Hales. For services to the community in Newton-le-Willows, Merseyside.
Margaret Frances Hall. For services to the community in Dunfermline and the Kuvela Othandwen charity.
Caroline June Hampson. For services to the Arts and the community in Bedwas, Caerphilly.
Jeffrey Gerard Hancock, Police Staff, Metropolitan Police Service. For services to charity.
Simon Christopher Harding. For voluntary service to the community in Bury St Edmunds.
Leonard Hardy. For services to Armed Forces Veterans in Warwickshire.
Georgina Lynde Harvey, President, Original Charity Shop and Library, Javea, Spain. For services to charity
Doris Agatha Harper-Wills. For services to Arts Education and Culture.
Graham Leslie Harris. For services to the community in the Mendips, Somerset.
His Honour John David Woodburn Hayman. For services to the community in Binsted and Alton, Hampshire.
Susan Margaret Henderson, Student Services Manager, University of Winchester. For services to Higher Education.
Valerie Jane Hepworth. For services to the Yorkshire Gardens Trust and Conservation.
June Mary Herron. For services to Highland Dancing and the community in Elgin and Moray.
John Peter Hess. For services to the community in Chorlton, Cheshire.
Stephen Hicks, Lately Police Constable, Metropolitan Police Service. For services to Young People in Enfield, London.
John Noel Hillier. For voluntary service to Athletics.
David Alfred Hitcham. For services to the community in Aylsham.
Andrew Edmund Forster Hitchen. For services to music in Harrogate, North Yorkshire.
Bruce Anthony Hoad, Director and Strategic Advisor, Operation Florian, Republic of Moldova. For services to emergency service personnel and vulnerable communities in the Republic of Moldova.
David Hogben. For services to the community in Herne Bay, Kent.
Elizabeth Anne Hoggan. For services to the community in Cupar and to Dr. Graham's Homes in Kalimpong, India.
Helen Holland. For voluntary service to the community in North Belfast.
Susan Elizabeth Hollingworth. For services to Music and the community in Scunthorpe.
Robert William Irwin Holmes, Staff Officer, Benefit Security Division, Department for Communities, Northern Ireland Executive. For services to Fundraising.
Isabel Graham Hood, Environmental Campaigner. For services to Environmental Conservation.
Stephen Hoskins. For services to Young People in the Scouting Movement in Northern Ireland.
Joan Howarth. For voluntary service to the community in Somerset and Wiltshire.
Major Brian Michael Hudson. For voluntary service to the community in Sussex.
Christine Anne Hughes, Physiotherapist. For services to People with Learning Disabilities in Wrexham, North Wales.
Courtney Hughes. For services to Older and Vulnerable People in Oxfordshire.
Gareth James Hughes. For services to Fundraising and Autism Awareness.
Gerald Humes. For voluntary and charitable services.
Judith Margaret Hutton. For services to the community in Ilkley, West Yorkshire.
Ronald Aloysius Hyde-Williams, Lately Data and MI Officer, Department for Business, Energy and Industrial Strategy. For public service and Diversity and Inclusion.
Susan Joy James. For services to Save the Children.
Richard Jay. For services to Young People and Music in Northern Ireland.
Dr. Pauline Jeffree. For services to the community in Beckenham.
Ian Kevin Jenkins, Caseworker, Driver and Vehicle Licensing Agency. For public and community service in Swansea.
Wendy Johnson. Head of Adult Safeguarding and Mental Health, Great Western Hospitals NHS Foundation Trust. For services to Nursing.
Annie Johnston. For services to Irish Craftwork.
Catherine Carson Johnston. For services to the community in Ladykirk, Berwickshire.
Walter Kammerling. For services to Holocaust Education and Awareness.
Vallabh Kaviraj. For services to Asian Media and the South Asian community in the UK.
Brian Edward Keen. For services to the community in Riccall, North Yorkshire.
Gabriele Keenaghan. For services to Holocaust Education and Awareness.
Dr. Anne (Rex) Kelly. For services to Victims of Modern Slavery.
Peter Ernest Kidd. For services to the community in Little Bealings, Suffolk.
Nicholas Hector Kier DL. For services to the community in Bedfordshire.
Hannah Kirk. For services to Holocaust Education.
Robert Samuel Kirk. For services to Holocaust Education.
Alison Jane Kitson, District Nurse, Cumbria Partnership NHS Foundation Trust. For services to Nursing.
Terence Arthur Knights. Civilian Instructor, Exmouth Squadron, RAF Air Cadets. For voluntary service to Young People and the community in Exmouth.
Subramaniam Chettiar Kugasenan Chettiar (Raj Chettiar). For services to the Tamil community in West London.
Santosh Diwarkanath Kundi. For services to Education and charity in the UK and Abroad.
Mary Winifred Lambert, School Governor, Broad Heath Primary School. For services to Education.
Norman George Larke, Chairman, Chatteris Branch, The Royal British Legion. For voluntary service to the ex-Service community in Cambridgeshire.
Shamsa Jabeen Latif. For services to Disadvantaged People in South Yorkshire.
James Thomas Laverty. For services to Swimming and Disability Sport.
Rhiannon Katherine Lawrence, Chair of Governors, Curzon C of E Combined School, Buckinghamshire. For services to Education.
Mark Edward Le Sage. For voluntary service to the community and to the Rehabilitation of Offenders.
Kathleen Emily Lee, Nurse, Medident, Muscat, Oman. For services to the health and welfare of British nationals overseas
Marion Levett, Project Manager, Women4Women. For services to Women in Abusive Situations and the community in Clackmannanshire.
Ruzena Levy, For services to Holocaust Education.
Eileen Joyce Lindsay. Dance Teacher, The Lindsay School of Dance. For services to Dance and the community in North East Scotland.
Martin Stephen Lown, Group Commander, Hereford and Worcester Fire and Rescue Service. For services to The Fire Fighters Charity.
Karen Jane Macaulay. For voluntary service to Lancashire Constabulary.
Christina Fraser MacDonald, Member, Carnoustie Branch, Royal British Legion Scotland. For voluntary service to Veterans and the community in Carnoustie.
Katherine Ruth Macpherson. For voluntary service to Women's Running in County Durham.
Irene Nora Elizabeth Macwilliam. For services to Textile Art in Northern Ireland.
Colin Philip Magill. For services to Local Government and the community in County Down.
Ruth Elizabeth Maltman TD DL. For services to the community in Glasgow.
Dr. Maryanne Zonia Ajanthini Mariyaselvam, National Innovation Accelerator Fellow, Clinical Research Fellow, Queen Elizabeth Hospital King's Lynn NHS Trust and University of Cambridge. For services to Healthcare.
John Campbell Martin. For services to the Farming community in Northern Ireland.
Kathleen Margaret Martin. For services to the community in Chalfont St Giles.
Jill May, Member and Fundraiser, Cancer Research UK. For services to Cancer Research UK.
Jane Elizabeth Mayo, Chairman, Campbeltown Community Business Ltd, Cambeltown Picture House. For services to Cultural Heritage, Business and charity in Argyll and Bute.
Hazel Davina McAllan, Chair, Balnagask Community Centre. For services to the community in Aberdeen.
Thomas McArdle, Street Cleansing Operative. For services to the community in Liverpool.
Peter Michael McCartney. For services to the community in Merseyside.
Andrew McClarty. For services to charity.
Denise McCunnell – For services to Victims of Sexual Abuse.
Susan McDonald. Director, Active Communities (Scotland) Limited. For services to Community Sport, Health and Wellbeing in Renfrewshire.
Robert Alastair McFarland, Head of Technology, Limavady High School. For services to Education and the community in Londonderry.
Breda McGrenaghan. For services to Cancer Patients in County Fermanagh.
Philip McGrenaghan. For services to Cancer Patients in County Fermanagh.
Brendan McInerney. For services to Volunteering, the Public Sector and the community in Gloucestershire.
Christina Elizabeth McIntosh. For services to the Environment and the community in Alness, Ross-shire.
George Clarke McLaughlin. For services to the Northern Ireland Fire Brigade and voluntary service to the community in Limavady.
Sally Theresa Anne McMahon. For services to Libraries.
Francis Joseph McNally, Deputy Principal, Department for Infrastructure, Northern Ireland Executive. For services to Government in Northern Ireland and Prostate Cancer Awareness.
Alexandra McNaul. Nursery Assistant, Kylemore Nursery School. For services to Education and to the community in Portrush, Northern Ireland.
Robert McQuillan. For services to Music in Ballymena.
Roger Stanford Mead. For charitable services in Cornwall.
Norman Mellor. For services to charity in Huddersfield.
James Alfred Edward Mercer. For services to Young People and Football in County Armagh.
Elizabeth Milne, Co-Director, Phoenix Theatre. For services to Theatre and the Arts in the North East of Scotland.
John Charles Minor. For services to Community Support and Cohesion.
Karen Mitchell, Lead Cancer Nurse, Oxford University Hospitals NHS Foundation Trust. For services to Cancer Patients and Nursing.
William Henderson Moore. For services to People with Special Educational Needs in Ellesmere Port.
Diana Ruth Moran. For charitable services.
Phillips Montague Mosscrop. For services to the community in Macclesfield.
David Macaulay Murray, Emergency Response and First Aid volunteer, British Red Cross. For voluntary service to the Red Cross.
Sarah Neil. For services to the Trichorhinophalangeal Syndrome Support Group.
Michael Kenneth Nicholls. For services to the community in Selsey, West Sussex.
Hayley Nortcliffe, Sergeant, West Yorkshire Police. For services to Policing.
Mary Isobel Nunn, Lately Nursing Officer, Tiverton Division, St John Ambulance. For voluntary service to First Aid Provision in Devon.
David Overton, Volunteer, Suffolk Special Constabulary Recruitment. For services to Policing and the community in Suffolk.
James Edward Packham, Immigration Officer, Home Office. For services to National Security.
Nicholas John Palmer, lately Counter Terrorism and Extremism Liaison Officer, Tunis, Tunisia. For services to British nationals overseas and justice.
Harold Clifford Panton. For services to Heritage in Lincolnshire.
Simon Colin Neil Paul. For services to the community in Lechlade on Thames, Gloucestershire.
Graham Peart. For services to the community in High Wycombe, Buckinghamshire.
Kay Penkethman. For services to Homeless People in Liverpool.
Dr. Brian Frank Perry. For services to the community in Chertsey, Surrey.
Barbara Jean Pettegree, Founder and Manager, The Rosemary Foundation. For services to End of Life Care.
Molly Cecilia Poulter. For services to the community in Maidstone, Kent.
Judith Marion Povey. For voluntary service to Girlguiding and the community in Alderley Edge, Cheshire.
Pamela Jane Powell, Chair of Governors, Chapel St Leonards Primary School, Grantham Additional Needs Fellowship and Woodlands Academy, Spilsby, Lincolnshire. For services to Education.
John Stephen Pownceby. For services to School Athletics in Cumbria.
Carol Prowse. For services to the Arts and the community in Derbyshire.
Gillian Punt. For services to Charitable Fundraising.
Rebecca Ramsay. For services to the Prevention of Water Related Accidents.
Mark Andrew Ranola, Police Constable, Hampshire Constabulary. For services to Policing and the community in Hampshire.
Keith John Rawlings. For services to charity.
Carol Reed. For services to Save the Children and the community in Canterbury.
Peter Leslie Reed. For services to Education and voluntary First Aid work at the University of Sussex.
Graham Reid, Guidance Manager, HM Revenue and Customs. For services to charity in Glasgow.
Rachael Renihan, Executive Assistant to the British Ambassador, British Embassy, Muscat, Oman. For services to UK/Oman relations.
Amanda Richard. For services to the Health and Wellbeing of Older People in the Scottish Borders.
Roberta Richmond. For services to Mental Health in East Belfast.
Alan John Robertson. For voluntary service to Kingussie Camanachd Club.
Emily May Robertson, Ward Sister, Older Person's Care, Manchester University NHS Foundation Trust. For services to Nursing.
Michael Antony Robertson, Conductor, Carnoustie and District Youth Brass Band. For services to Music in Angus.
Dr. Leonard Arthur Robinson. For voluntary service to the community in South Cumbria.
Wilfred Andrew Hiram Robinson. For services to the community in County Tyrone.
Andrew Roby. For services to Reducing Deforestation.
Kevin Timothy Routledge. For services to Sport and the community in Leicester.
Carole Ann Ryan, Lately Listing Adviser, Historic England. For services to the Historic Environment, Conservation and Cultural Heritage.
Helen Dora Sadler. For services to the community in Chester.
Erica Sarney. For services to Wildflower and Pollinator Conservation in Lancashire.
John Satterthwaite. For services to the community in Blucher, Newcastle-upon-Tyne.
Allan Schiller. For services to Music and charity.
Jeffrey David Scholes. For services to Young People and charity.
Matthew Thomas Scott, Senior Warden, Warwick University. For services to Students and the community in Warwick.
Terri Scott. For services to the Solihull Troubled Families Programme.
Richard Searling. For services to the Soul Music Industry and the community in the North of England.
Thomas James Servis. For voluntary and charitable services.
William James King Shaw. For voluntary and charitable service in Belfast.
Lauren Shea. For services to Promoting Science, Technology, Engineering and Mathematics to Young People.
Michael Albert Shea. For services to Foodbank in Farnborough.
Susan Diane Shea. For services to Foodbank in Farnborough.
Ian Kenneth Grant Sherriff, Academic Partnership Lead for Dementia, University of Plymouth. For services to People affected by Dementia.
David Wilson Shields. For services to Music and Amateur Dramatics in Northern Ireland.
Lesley Ann Sim. For services to Libraries.
Ernest Simon. For services to Holocaust Education and Remembrance.
Lynn Rae Simpson, Head Coach, Flyers Trampoline Club and Chair, Trampoline and Tumbling Technical Panel. For services to Trampolining.
Sarah Frances Simpson, Estates Clerk, Tidworth, Netheravon and Bulford Garrison. For services to the Army and the community in Wiltshire.
Emma Slater, Head of Music, West Lodge School, Kent. For services to Education.
Brian Sleight. For services to Scouting and the community in Fleet, Wisbech and Spalding.
May Glassford Smith, Fundraiser, National Society for the Prevention of Cruelty to Children. For charitable service.
Tony Spruce, Lately Police Community Support Officer, Cheshire Constabulary. For services to Policing and the community in Cheshire.
Maurice Noach Stone. For services to Dance and Community Cohesion.
Stephen Stone. For services to Wildlife Conservation.
Austin John William Stronge, For services to the welfare of former Royal Ulster Constabulary Officers and their Families in Northern Ireland.
Alison Suffield, Constable, Lancashire Police. For services to Policing.
Brian Thomas Sullivan. For services to charity and the Performing Arts.
Janet Edith Marion Swann. For services to People with Disabilities in Kent.
Cecelia Taggart. For voluntary services to Scouts and the community in Downpatrick, County Down.
Lee Tavinder. For services to Mental Health in Northern Ireland.
John Fredrick Taylor. For services to Young People through Scouting.
Glyn Thomas, Paramedic, Welsh Ambulance Service and St John Cymru Wales. For services to Pre-Hospital Care in North Wales.
Heather Mary Thomas. For services to The Goboka Rwanda Trust and the community in Bakewell, Derbyshire
Judith Margaret Thomas (Judith Burton), Lately Chair, Sutton Music Festival. For services to Music in Sutton.
Dr. Geoffrey Michael Thompson. For services to the Rural Youth in Northern Ireland.
James Alexander Thompson. For services to the community in Alnwick, Northumberland.
Clark Tracey, Jazz Musician. For services to Music and the Promotion of Jazz.
Yelèna Travis-Powell, Investigations Officer, National Crime Agency. For services to Law Enforcement and Diversity.
Martin Roger Trepte. For services to the Newspaper Industry and to charity.
June Elizabeth Trevithick. For services to the community in Callington, Cornwall.
Geshe Tashi Tsering. For services to Buddhism in the UK.
Sarah Jane Turner, Governance and Reporting Lead, Immigration Enforcement, Home Office. For services to the community in Croydon.
Heather Unwin. For services to the community in Preston, Lancashire.
Christopher Melroy Vallimae, Postman, Weston Super Mare. For services to the community in North Somerset.
Adriaan Petrus Charles Van Zyl, Warden, St Andrews Church. For services to the community in London.
Alan Neil Vollans. For voluntary service to Cricket and the community in South Yorkshire and Nottinghamshire.
George Hans Vulkan. For services to Holocaust Education and Remembrance.
Dr. Jessica Alice Feinmann Wade, Research Physicist, Blackett Laboratory, Imperial College London. For services to Gender Diversity in Science.
Brian Wallace Waters. For services to the community in Preston, Hertfordshire.
George Martyn Welch. For voluntary service to the community in South Cumbria.
Sean Richard Wheeler. For charitable service.
Dr. Lorraine Whewell. For voluntary service in the UK and Abroad.
Yvonne Tina White, Equalities Officer, UNISON. For services to Equality and Diversity on the Isle of Wight.
Muriel Doreen Wilkinson, Chair, Magenta Living, Wirral Residents Umbrella Association. For services to Housing.
Patricia Maura Williams. For services to the community in Wales.
Sandra Elizabeth Williams. For services to the community in the Vale of Glamorgan.
Guy Everis Williamson. For services to Boxing and the community in London.
Rachael Wilson (Rachael Sarjantson), Senior Officer, HM Prison Hull. For services to Prisoners and their Families.
Frederick Michael Douglas Witty, Retired. For services to the British community in Catalonia, Spain
Dorothy Anne Wonnacott. For public and political service.
Janet Wood. For services to Girlguiding and Young Women in Lancashire.
Yvonne Dorothy Woodcock. For services to the community in Doncaster, South Yorkshire.
Susan Woodward. For services to Disability Swimming.
Jill Wright. For voluntary service to Athletics in Berkshire.
Ernest Young. Conductor and Choirmaster. For services to Music.
Crown Dependencies
Isle of Man
Vincent Fox. For services to medical charities and the community.
Jersey
Richard Richomme. For services to overseas aid.
Royal Red Cross
Members of the Royal Red Cross, First Class (RRC)
Military
Lieutenant Colonel Deborah Louise Inglis, , Queen Alexandra's Royal Army Nursing Corps, Army Reserve
Queen's Police Medal (QPM)
England and Wales
Constable Firzana Ahmed – West Yorkshire Police
Warren Barlow – Lately, Detective Constable, Greater Manchester Police
Detective Chief Superintendent Kathryn Louise Barnes – Thames Valley Police
Temporary Chief Superintendent Simon Justin Barraclough – Greater Manchester Police
David Clement – Lately, Sergeant, Northumbria Police
Commander Jane Connors – Metropolitan Police Service
Commander Stuart Cundy – Metropolitan Police Service
Lee Carl Davenport – Lately, Chief Superintendent, West Mercia Police
Detective Constable Christopher Mark Davison – Metropolitan Police Service
Constable Simon Fahey – Surrey Police
Deputy Chief Constable Sara Glen – Hampshire Constabulary
Chief Constable Michael Trevor Griffiths – Civil Nuclear Constabulary
Detective Superintendent David Malyn – North Yorkshire Police
Temporary Chief Superintendent John Joseph McDermott – Kent Police
Temporary Chief Constable John Robins – West Yorkshire Police
Chief Constable Stephen Watson – South Yorkshire Police
Christine Williams – Lately, Detective Constable, Avon & Somerset Police
Alec Wood – Lately, Chief Constable, Cambridgeshire Constabulary
Northern Ireland
Ronald Charles Edwin Galwey – Lately, Detective Constable, PSNI
Jeremy Andrew Harris – Lately, Deputy Chief Constable, PSNI
Chief Superintendent Jonathan Stewart Roberts – PSNI
Overseas
Deputy Commissioner Paul Michael Wright – Bermuda Police Service
Queen's Fire Service Medal (QFSM)
England and Wales
Malcolm Livingstone Cowie – Lately, Watch Manager, Kent Fire and Rescue Service.
Chief Fire Officer Mark Hardingham – Suffolk Fire and Rescue Service.
Chief Fire Officer Paul Hedley – Northumberland Fire and Rescue Service.
Group Manager Jeremy Peter Leonard – Hampshire Fire and Rescue Service.
Watch Manager Joanne Stephens – USAR Team & Incident Investigation Team, Merseyside Fire and Rescue Service.
Queen's Ambulance Service Medal (QAM)
England and Wales
Deborah Joanne Goldsmith – Assistant Emergency Medical Services Controller - Welsh Ambulance Services NHS Trust.
Grayham Gareth McLean – Unscheduled Care Lead - Welsh Ambulance Services NHS Trust.
Paul Robert Nicholson – Assistant Director IM&T, North East Ambulance Service.
Steven John Wheaton – Assistant Chief Ambulance Officer – West Midlands Ambulance Service.
Northern Ireland
Jacqueline Mary O’Hara – Paramedic Station Supervisor – Northern Ireland Ambulance Service.
Queen's Volunteer Reserves Medal (QVRM)
Lieutenant Commander David Cooper, , Royal Naval Reserve
Lieutenant Colonel Graham Norman Cox, , The Rifles, Army Reserve
Corporal Lisa Jane Ingram, , The Royal Logistic Corps, Army Reserve
Lieutenant Colonel John Robert Longbottom, , The Honourable Artillery Company Territorial Army
Warrant Officer Class 2 Ian Donald Westall, , The Parachute Regiment, Army Reserve
Australia
The 2019 Queen's Birthday Honours for Australia were announced on 10 June 2019 by the Governor-General, Sir Peter Cosgrove.
Canada
The 2019 Canada Day Honours were announced on 29 June 2019 by the Governor General of Canada, the Right Honourable Julie Payette.
New Zealand
The 2019 Queen's Birthday Honours for New Zealand were announced on 3 June 2019 by the Governor-General, Dame Patsy Reddy.
Cook Islands
Below are the individuals appointed by Elizabeth II in her right as Queen of the Cook Islands, on the recommendation
of the Ministers of the Cook Islands.
Order of the British Empire
Officer of the Order of the British Empire (OBE)
Civil
Unakea Kauvai - For services to the community.
Member of the Order of the British Empire (MBE)
Civil
Ake Te Ariki Lewis - For her contribution to public services and the community.
British Empire Medal (BEM)
Civil
Vaine Teremoana Upokoina Mingi - For services to the community.
Tangaina Pattia - For services to the community.
Barbados
Below are the individuals appointed by Elizabeth II in her right as Queen of Barbados, on advice of Her Majesty's Barbados Ministers.
Order of the British Empire
Commander of the Order of the British Empire (CBE)
Civil
George Spencer Griffith - For services in the fields of social work and reproductive health.
Dr. Wendy Marlene Griffith-Watson - For service to education management and human resource development.
Officer of the Order of the British Empire (OBE)
Civil
Shirley Aileen King - For her contribution to public services.
Winston Walter Stafford - For services to social work and cricket administration.
Member of the Order of the British Empire (MBE)
Civil
Rodney Dacourtney Prescod - For services to secondary school education.
Bahamas
Below are the individuals appointed by Elizabeth II in her right as Queen of the Commonwealth of The Bahamas, on the advice of
Her Majesty's Bahamas Ministers.
Order of St Michael and St George
Knight Commander of the Order of St Michael and St George (KCMG)
Frederick Asa Hazlewood, - For services to business.
Companion of the Order of St Michael and St George (CMG)
Paul Adlai Scavella, Pastor - For services to religion and community.
Order of the British Empire
Officer of the Order of the British Empire (CBE)
Civil
Godfrey Brian Thomas - For services to business.
Member of the Order of the British Empire (MBE)
Civil
James Randolph Bain, - For services to business.
Kingsley Livingstone Black - For services to education and labour.
Dr. Christina Elizabeth Darville - For services to medicine and business.
Julieth Naomi Minnis, Nurse - For services to health.
Hugh Allison O’Brien - For services to the community.
Olvin Peter Rees - For services to business.
British Empire Medal (BEM)
Civil
Brian Berkley Brown - For services to the community.
Nesbitt Alphonso Higgins - For services to politics.
Robert John Roberts - For services to the community.
Reverend Dr. Ifill Earlin Russel - For services to religion.
Daniel Olander Sumner - For services to sports.
Reverend Dr. James Samuel Sweeting - For services to civics and religion.
Queen's Police Medal (QPM)
Paul Allison Rolle - For exceptional service in the Police Force.
Grenada
Below are the individuals appointed by Elizabeth II in her right as Queen of Grenada, on the advice of Her Majesty's Grenada Ministers.
Order of the British Empire
Commander of the Order of the British Empire (CBE)
Civil
Claris Charles - For services to education, trade unionism and foreign affairs.
Officer of the Order of the British Empire (OBE)
Civil
Dr. Michael Radix - For services to health and community service.
Member of the Order of the British Empire (MBE)
Civil
Sylvia Nyack - For services to business and community service.
British Empire Medal (BEM)
Civil
Raphael Anslem Johnson - For services to culture
Papua New Guinea
Below are the individuals appointed by Elizabeth II in her right as Queen of Papua New Guinea, on the advice of Her Majesty's Papua New Guinea Ministers.
Knight Bachelor
Walter Oma Nombe - For services to the community of the Eastern Highlands in the roles of Member, Minister and Premier of the Provincial Government.
Order of St Michael and St George
Companion of the Order of St Michael and St George (CMG)
The Honourable Job Pomat - For services to the community and as a Member of National Parliament including as Minister and currently as Speaker of Parliament.
The Honourable Joseph Malinu Yagi - For services to law, the community and the judiciary as a Senior Judge in the National and Supreme Courts of Papua New Guinea.
Order of the British Empire
Knight/Dame Commander of the Order of the British Empire (KBE/DBE)
Civil
Sandra Geok Mei Lau, - For services to commerce and the community through her philanthropic contribution in the areas of women and children welfare, education and health services.
The Honourable John Thomas Pundari, - For services to Papua New Guinea and the community as a Member of National Parliament and Speaker of Parliament.
Datuk Kie Yik Wong - For services to commerce and the community through significant investment in rural business enterprises, human resource and infrastructure development.
Commander of the Order of the British Empire (CBE)
Civil
Wayne Kenneth Golding, - For services to commerce and trade promotion and the Asia-Pacific Economic Cooperation Leaders’ Summit 2018.
James Sze Yuan Lau - For services to commerce, manufacturing, hospitality and property development.
Peter Allan Lowing, - For services to law, the legal profession and the community.
Dr. Thomas Webster - For public service, research and policy development in education and law reform.
Military
Colonel Mark Goina, - For distinguished service to the Papua New Guinea Defence Force.
Officer of the Order of the British Empire (OBE)
Civil
David Caradus - For services to commerce and taxation.
Dr. Alois Daton - For contribution to public services, taxation and gender equality.
Dr. Kulala Mulung - For services to the University of Technology, forestry and the environment.
Dr. Ken Ngangan - For his contribution to public services and public financial management and governance reform.
James Joseph Pang - For services to commerce, sport and the community.
David Manoa Toua - For services to commerce, the Business Council and the Asia-Pacific Economic Cooperation Leaders’ Summit 2018.
Robin Murray Woo - For services to manufacturing, the airline industry and the National Superannuation Fund
Military
Colonel Albert Palaua - For loyal service to the Papua New Guinea Defence Force.
Member of the Order of the British Empire (MBE)
Civil
Kamis Bira, Pastor - For services to the community and religion.
Dennis William Bux - For services to business and the security industry.
Monni Cross - For services to the Asia-Pacific Economic Cooperation Summit 2018.
Derek Andrew Daubney - For services to Trukai, sport and the community.
Fred Meraveka Eovo - For services to the church and the community.
Mark Steven Foxe - For services to Australia-Papua New Guinea relations.
Dr. Keith Kulakit Galgal - For services to agriculture research and agribusiness.
Antonio Sodicta Go - For services to commerce and the fishing industry.
Harriett Jack - For services to healthcare and the Good Samaritan Women Programme.
Dr. Etami Betty Koka - For services to healthcare and the Enga community.
Gustav Kraus - For services to the airline industry in the Pacific region.
Kelvin Laki - For services to Emergency Disaster Relief.
Leo Lemalu - For services to village court and the community.
Carlistius Jason Mari’Bera - For services to karate.
Anne Piwa Tarutia - For services to education, particularly for young children.
Onnie Teio - For services to victims of sexual and family violence.
Jethro Wala - For services to the Asia-Pacific Economic Cooperation Papua New Guinea Leaders’ Summit 2018.
Julie Tagual Wialu - For services to rural healthcare.
Lucas Yalipin - For services to the community.
Military
Lieutenant Colonel Nicholas Henry - For service to the Papua New Guinea Defence Force.
Lieutenant Colonel Francis Kari - For service to the Papua New Guinea Defence Force.
Lieutenant Colonel John Wani - For service to the Papua New Guinea Defence Force.
Imperial Service Order (ISO)
Alexis Oaengo Maino - For public service.
Tambon Tara - For public service.
British Empire Medal (BEM)
Civil
Roselyn Cecil Akua - For services to caring for abused women and children.
Daniel Kulumini Apakia - For services to village court.
Kwalam Apisah - For services to sport.
Kapiya Ayare - For services to the community.
Reverend Anna Besai - For services to the United Church and women's development.
Superintendent Clement Dalla - For services to the Royal Papua New Guinea Constabulary.
Rohu Gagai - For services to the community.
Agatha Gawi - For services to education.
Ilaita Gigimat - For services to basketball.
Chief Inspector Laboi Ambrose Igak - For services to the Royal Papua New Guinea Constabulary.
Ben Imal - For services to the Assemblies of God Church.
Eva Vinun Jesse - For services to education.
Rendey Kawage - For services to education.
Elijah Koju - For services to the community.
Sarufa Lakou - For services to education.
Larry Lavai - For services to the East Sepik provincial administration.
Aaron Luai - For public service.
Detective Chief Sergeant Ulagis Mantu - For services to policing and the community.
Siloe Mase - For services to the United Church.
Hannah Bennett McManus - For services to gymnastics.
Atai Mogola - For services to education.
Hanna Ogi - For services to education and women's development.
Jennifer Parina - For services to the National Research Institute.
Jessie Piliwas - For public service.
Sarenah Karess Pini - For services to sport.
Raphael Nime Poka - For services to the community.
John Umbu Pupu - For services to the community.
Mark Reto - For services to the community.
Monica Richard - For services to education and victims of sexual and family violence.
Martha Sere - For services to Emergency Disaster Restoration.
Tonny Sios - For services to the Seventh Day Adventist Church.
Vere Tere-Apisah - For services to sport.
Francis Posou Waitao - For services to the community.
Hiob Tupeno Wekiko - For services to the Evangelical Lutheran Church.
Biyu Yakipa - For services to rural healthcare.
Stanley Tumun Yekep - For public service
Military
Warrant Officer Robert Abba - For service to the Papua New Guinea Defence Force.
Chief Warrant Officer Ricks Kandi - For service to the Papua New Guinea Defence Force.
Chief Warrant Officer Pepena Pepena - For service to the Papua New Guinea Defence Force.
Chief Warrant Officer Mark Sakei - For service to the Papua New Guinea Defence Force.
Chief Warrant Officer Salestine Takendu - For service to the Papua New Guinea Defence Force.
Queen's Police Medal (QPM)
Chief Superintendent Anthony Wagambie Junior - For service to the Royal Papua New Guinea Constabulary.
Chief Superintendent John Kolopen - For service to the Royal Papua New Guinea Constabulary.
Chief Superintendent Jimmy Onopia - For service to the Royal Papua New Guinea Constabulary.
Solomon Islands
Below are the individuals appointed by Elizabeth II in her right as Queen of Solomon Islands, on the advice of Her Majesty's Solomon Island Ministers.
Order of St Michael and St George
Companion of the Order of St Michael and St George (CMG)
Sia Kee Ching, - For services to commerce and community development.
The Honourable Justice Edwin Peter Goldsbrough - For services to the judiciary.
Jeremy David Marshall - For services to commerce and community development.
Order of the British Empire
Officer of the Order of the British Empire (OBE)
Civil
Ruth Liloqula - For her contribution to public services and community development.
Adrian Edward Wickham - For services to commerce and community development.
Member of the Order of the British Empire (MBE)
Civil
Harry Anigafutu - For services to rural and community development.
Barnabas Baesodua - For services to rural and community development.
David Shenman - For services in the Correctional Service of Solomon Islands.
Matthew Varley - For services to the Royal Solomon Islands Police Force.
British Empire Medal (BEM)
Civil
Michael Arisia - For services to rural and community development.
James Manengelea - For services to vocational training and community development.
Martha Sura - For services to rural and community development.
Jenly Tegu Wini - For services to sport in the field of weightlifting.
Queen's Police Medal (QPM)
Solomon Andrew Wala - For services to the Royal Solomon Islands Police Force.
Saint Lucia
Below are the individuals appointed by Elizabeth II in her right as Queen of Saint Lucia, on the advice of Her Majesty's Saint Lucia Ministers.
Order of the British Empire
Commander of the Order of the British Empire (CBE)
Civil
Rick Wayne, - For services to entertainment, professional bodybuilding, advocacy and journalism.
Officer of the Order of the British Empire (OBE)
Civil
Maher Chreiki - For services to business
Member of the Order of the British Empire (MBE)
Civil
Dr. Owen Osbert Gabriel - For services to medicine.
Cleo Gregory Lorde - For services to entrepreneurship and business.
Margaret Roberts Steele - For services to broadcasting
British Empire Medal (BEM)
Civil
Gaspard Alfred Peter David Charlemagne - For services to education.
Pamela Mary Devaux - For services to charity.
Joseph Reilly Dolcy - For services to the St. Lucia Fire Service.
Vincent McDoom - For services to entertainment.
Mary Pierre - For services to the community.
Mary Joan Smith - For services to entrepreneurship and business.
Belize
Below are the individuals appointed by Elizabeth II in her right as Queen of Belize, on the advice of Her Majesty's Belize Ministers.
Order of St Michael and St George
Companion of the Order of St Michael and St George (CMG)
Audrey Joy Grant - For contribution to public services.
Order of the British Empire
Officer of the Order of the British Empire (OBE)
Civil
Alistair Mickenzie King - For services to entrepreneurship.
Lupita Quan - For her contribution to sport and business.
Member of the Order of the British Empire (MBE)
Civil
Michele Leticia Irving - For her contribution to community service.
Jeffery Ronald Locke - For his contribution to public services and the community.
Maria De Lourdes Matus - For her contribution to education.
Roland Yorke - For his contribution to community service.
Antigua and Barbuda
Below are the individuals appointed by Elizabeth II in her right as Queen of Antigua and Barbuda, on the advice of Her Majesty's Antigua and Barbuda Ministers.
Order of the British Empire
Officer of the Order of the British Empire (OBE)
Civil
Carmen Benjamin - For outstanding contribution to community development.
Member of the Order of the British Empire (MBE)
Civil
Shirlene Andrea Nibbs - For outstanding contribution to community and tourism development.
St Christopher and Nevis
Below are the individuals appointed by Elizabeth II in her right as Queen of Saint Christopher and Nevis, on the advice of Her Majesty's St Christopher and Nevis Ministers.
Order of the British Empire
Dame Commander of the Order of the British Empire (DBE)
Civil
Constance Viola Mitcham - For her contribution to national development and the law.
Commander of the Order of the British Empire (CBE)
Civil
Cameron Wilkinson - For his contribution to medicine.
Officer of the Order of the British Empire (OBE)
Civil
Denzil Crooke - For his contribution to commerce and business development.
Member of the Order of the British Empire (MBE)
Civil
Angeline Revan - For her contribution to education, community and public service.
Elphlin Warner - For his contribution to calypso and musical development.
See also
Australian honours system
New Zealand royal honours system
Canadian Honours System
Orders, decorations, and medals of the United Kingdom
2019 Canadian honours
References
External links
Birthday Honours List 2019
UK Birthday Honours List 2019 on The London Gazette
2019 awards
2019 awards in the United Kingdom
Birthday Honours
|
2614324
|
https://en.wikipedia.org/wiki/Exhaustion%20doctrine%20under%20U.S.%20law
|
Exhaustion doctrine under U.S. law
|
See also Exhaustion of intellectual property rights for a general introduction not limited to U.S. law.
The exhaustion doctrine, also referred to as the first sale doctrine, is a U.S. common law patent doctrine that limits the extent to which patent holders can control an individual article of a patented product after a so-called authorized sale. Under the doctrine, once an authorized sale of a patented article occurs, the patent holder's exclusive rights to control the use and sale of that article are said to be "exhausted," and the purchaser is free to use or resell that article without further restraint from patent law. However, under the repair and reconstruction doctrine, the patent owner retains the right to exclude purchasers of the articles from making the patented invention anew (i.e., making another article), unless it is specifically authorized by the patentee to do so.
Procedurally, the patent exhaustion doctrine operates as an affirmative defense, shielding authorized purchasers from infringement claims concerning the sale or use (including repair and modification) of a patented product after the patent owner authorized its sale.
Because only an "authorized" sale triggers the doctrine, it may be difficult or at least controversial to determine whether the exhaustion doctrine applies in a particular case: for example, when the patentee purports to restrict or condition the use or resale of the patented article once purchased and in the hands of an end user (post-sale restrictions); or when the patentee licenses another to manufacture and use or sell the patented product only in a particular field. The 2008 Supreme Court decision in Quanta Computer, Inc. v. LG Electronics, Inc., arguably leaves unclear the extent to which patentees can avoid the exhaustion doctrine by means of so-called limited licenses (licenses limited to a specified field of use). Since its development by the courts in the late 19th century, the patent exhaustion doctrine has raised questions regarding the scope of exclusive rights granted by patents and the extent to which a patent owner may extend those rights to control downstream use and sales of patented articles.
Overview
A patent gives the patent owner the right to exclude others from making, using, selling, offering for sale, or importing into the U.S. the patented invention (i.e., a product embodying the invention) during the term of the patent. The constitutional rationale behind providing these exclusive rights is to "promote the Progress of Science and useful Arts" by providing inventors the incentive to invest their time, labor, and funds in researching and developing innovative technology. Providing these protections, however, comes with social costs (monopoly rents) and limits the public's ability to freely alienate patented goods. Thus, public policy dictates that the patent owner's exclusive rights be limited in scope. Generally, when a patent owner receives compensation for the use of his or her invention through sale of a patented product, the purpose of patent law is fulfilled with respect to that product. Upon receiving compensation, the patent owner's rights to exclude others are exhausted and "the patent law affords no basis for restraining the use and enjoyment of the thing sold." Accordingly, a patent owner's voluntary introduction of a patented product into commerce without restriction prevents the patent owner from exercising any claimed right to exclude others from using or reselling the sold product.
Unlike the analogous first-sale doctrine in copyright, the patent exhaustion doctrine has not been codified into the patent statute, and is thus still a common law doctrine. It was first explicitly recognized by the Supreme Court in 1873 in Adams v. Burke. In that case, the patentee Adams assigned to another the right to make, use, and sell patented coffin lids only within a ten-mile radius of Boston. Burke (an undertaker), a customer of the assignee, bought the coffin lids from the manufacturer-assignee within the ten-mile radius, but later used (and effectively resold) the patented coffin lids outside of the ten-mile radius, in his trade in the course of burying a person. The patentee Adams sued the undertaker Burke for patent infringement, but the Supreme Court found no infringement liability: Once the coffin lids were lawfully made and sold, "there is no restriction on their use to be implied for the benefit of the patentee or his assignees or licensees." Because the sale was authorized (bought from an authorized seller within the ten-mile radius), the defendant acquired the right to use the coffin lids free from any claim of the patentee, even though he carried it outside the ten-mile radius to use it.
Limitations
The exhaustion doctrine is triggered only by a sale authorized by the patent holder. Thus, there are circumstances where it may be difficult to determine whether the exhaustion doctrine is triggered, in light of restrictions that the patentee has purported to place on the sale or use of the patented invention. Two general questions arise in these situations: (1) Was the sale authorized by the patentee? This can often be a complex factual question. (2) Regardless of whether authorized by the patentee, are those restrictions valid and recognizable under the law?
Generally, these cases involve one or more of the following scenarios: the patent owner: (1) sells one or more components of a multi-component patented product; (2) licenses another to make and sell patented product with certain restrictions on field in which the sale may be made; or (3) sells the article with restrictions directly on the purchasers or end-users (post-sale restraint).
Sale of incomplete articles
One scenario in which the exhaustion doctrine may or may not be triggered is when the patent holder sells an incomplete article or precursor or ingredient that does not directly practice or embody the patent in suit. In this situation, exhaustion is triggered by the authorized sale of the incomplete article if: (1) its "only reasonable and intended use was to practice the patent, and (2) it "embodies essential features" of the patented invention. Even if the exhaustion doctrine is applicable to the sale of an incomplete article, however, there is a separate analysis of whether the sale of that article was actually authorized, and therefore whether exhaustion was actually triggered.
The applicability of exhaustion to the sale of an incomplete article was recognized by the Supreme Court in 1942 in United States v. Univis Lens Co.. In that case, the patent holder sold lens blanks which had to be ground into finished lenses — the patented invention. The Court held that this sale exhausted the patents on the finished lenses because the lens blanks substantially "embodi[ed] essential features of the patented device and [were] without utility until . . . ground and polished as the finished lens of the patent." The Court noted that the grinding process was standard (conventional) and not central to the patents, indicating further that the lens blanks constituted a material part of the patented invention and all but completely practiced the patent, since only conventional further processing steps were needed to complete the invention.
In Quanta, the Supreme Court applied the same test to determine whether exhaustion is triggered by the licensing of a portfolio of product and method patents. In that case, the patent holder (LGE) authorized the licensee (Intel) by cross-license to manufacture and sell microprocessors and chipsets that (unless licensed) would infringe LGE product and method patents, as well as patents on computer systems containing the licensed microprocessors and chipsets. The Court found that, even though these Intel products did not directly practice the system patents, they sufficiently embodied the inventions of those patents, making the exhaustion doctrine applicable. First, the Court found that there was no reasonable use for the Intel products other than incorporating them into a computer system that practiced the LGE system patents. Second, the Intel products embodied essential features of the patented processes because the only necessary step to practice the patents was the addition of such standard computer parts as memories and buses. In addition, there was nothing inventive about the systems other than that they contained the inventive microprocessors and chipsets. Thus, under the Univis test, the Intel products sufficiently embodied the patents, making the exhaustion doctrine applicable.
Limitations on sale
Another scenario in which it may be difficult to determine if the sale of a patented article was authorized, and therefore if exhaustion is triggered, occurs when the patentee grants a license to make and sell with specific limitations on the field in which the seller may operate, such as sales to particular types of customer, specified territories, or other field-of-use limitations. If these limitations (or "restrictions") have been imposed, the licensee's sale to a purchaser exhausts only the patentee's rights to restrict use and resale when the restrictions have not been exceeded ("violated"). The theory is that if Alice owns Blackacre but not Whiteacre, she cannot convey good title to Bob by purporting to sell him Whiteacre. She can sell only what she owns. If the license limitations ("restrictions") are exceeded ("violated"), then exhaustion cannot occur and therefore is not triggered, and the patentee can successfully sue the licensee and any downstream customers for patent infringement.
The Supreme Court in General Talking Pictures Corp. v. Western Electric Co. has specifically upheld the legitimacy of field-of-use limitations in patent licenses to manufacture patented products. A licensee who exceeds ("violates") a field-of-use limitation by selling an article outside of the permissible field commits patent infringement. The exhaustion doctrine would provide no protection because the "violation" makes the sale "unauthorized" for the purposes of the exhaustion doctrine.
The field-of-use limitations on sale (those imposed on the licensee in selling the patented articles) are different from post-sale restrictions or limitations (those that purpose to restrict the use or sale of the patented article once purchased and in the hands of an end user). Patentees can avoid the exhaustion doctrine by imposing the former, but it is questionable that patentees can do so through the latter.
Limitations on sale must very explicitly bind the licensee or seller. For example, in Quanta, LGE licensed Intel to make products using LGE's patents. The license expressly stated that LGE was not licensing third parties to combine licensed products with any non-Intel products (i.e., microprocessors and chipsets purchased from a third party), and LGE required Intel to notify customers of that. Intel sold products to Quanta, who combined the Intel products with non-Intel products. LGE sued Quanta for patent infringement. The Supreme Court found that the licensing agreement failed to explicitly impose a field-of-use limitation, and therefore found that there were no conditions limiting to whom Intel could sell. The sale was thus "authorized," and exhaustion was triggered. In the Court's words, "The License Agreement authorized Intel to sell products that practiced the patents. No conditions limited Intel's authority to sell products substantially embodying the patents. . . . Intel's authorized sale to Quanta thus took its products outside the scope of the patent monopoly, and as a result, LGE can no longer assert its patent rights against Quanta."
Because the contractual documents in the Quanta case were insufficiently explicit, the Court applied the exhaustion doctrine, finding the sale "authorized" and unconditional, even though LGE attempted to impose some restrictions on use of the products. Therefore, purchasers of the patented product were free to use them without restrictions that the patentee sought to have imposed on them. The Court found that the licensing agreement did not impose any limitations on whom the licensee could sell to. The Quanta Court did not address, however, whether the restriction in the licensing agreement could be enforced by contract. In fact, the Court pointedly said it was not addressing that issue.
Post-sale limitations
The most difficult and unsettled area of the law regarding patent exhaustion involves cases in which a patentee purports to impose post-sale restrictions. Post-sale restrictions are those that purport to restrict the use or sale of the patented article once purchased and in the hands of an end user customer, rather than similar limitations on a manufacturer-licensee. Common post-sale restrictions include "single use only" and "refill only with proprietary ink" notices. Whether violations of such restrictions make a sale "unauthorized," and therefore make patent exhaustion inapplicable, is still unclear or at least controversial.
In 1992, the Federal Circuit approved the use of post-sale restrictions in Mallinckrodt, Inc. v. Medipart, Inc.. Specifically, the court held that patent owners could condition the sale of patented goods with a restrictive notice and thereby restrict the disposition of the goods by the purchasers, with the exception of such antitrust law violations as price-fixing and tie-in restrictions, or violations of "some other law or policy." The plaintiff in the case owned a patent on a medical device, which it sold to hospitals with a "single use only" notice label. The defendant purchased the used devices from hospitals, refurbished them, and resold them to hospitals. The Federal Circuit held that the single-use restriction was enforceable in accordance with the 1926 General Electric case, because the restriction was "reasonably within the patent grant. . . ."
The Supreme Court did not discuss the Mallinckrodt case in Quanta. As one commentator noted: "The Supreme Court, in Quanta, was widely expected to rule on whether Mallinckrodt was good law. But the Court sidestepped the issue by narrowly interpreting the license agreement so that it was not a conditional license. . . . Because the Supreme Court sidestepped the issue, it remains unclear to what extent a patentee can use a conditional license to impose restrictions on downstream purchasers."
At least two district courts have concluded that Mallinckrodt is no longer good law after Quanta. In Static Control Components, Inc. v. Lexmark Int'l, Inc., the court concluded that the Supreme Court's Quanta decision implicitly overruled Mallinckrodt. At issue in Static Control was Lexmark's so called "prebate" program, in which customers could buy cartridges that were subject to a single use for a 20 percent discounted price. In its original order, before Quanta was decided, the court rejected Static Control's argument that Lexmark's patent rights were exhausted as a result of the authorized sale of the cartridges. Relying heavily on Mallinckrodt, the court found that the sales were valid post-sale restrictions that avoided exhaustion. After Quanta was decided, however, the court reversed its original order and concluded that Lexmark's single use restriction was not enforceable under patent law because the court was "persuaded that Quanta overruled Mallinckrodt sub silentio." The court explained, "The Supreme Court's broad statement of the law of patent exhaustion simply cannot be squared with the position that the Quanta holding is limited to its specific facts. Further, the Federal Circuit relied in part on Mallinckrodt in reaching its decision in LG Electronics, Inc. v. Bizcom Electronics, Inc., 453 F.3d 1364, 1369 (Fed. Cir. 2006), the decision the Supreme Court reversed in Quanta. It is also worth noting that the Quanta decision did not mention a single Federal Circuit case."
The district court's conclusion, however, that Quanta overruled Mallinckrodt reflects the ambiguity in Quanta itself. The Static Control court noted that "[s]ales of Lexmark Prebate cartridges were unconditional" because "[n]o potential buyer was required to agree to abide by the Prebate terms before purchasing a cartridge. Thus, sales of Lexmark's Prebate toner cartridges were authorized and unconditional, just like sales of LGE's patented products in Quanta."
Therefore, both Quanta and Static Control can be seen as either cautionary tales about failed attempts to comply with the General Talking Pictures doctrine or to explicitly condition sales, without need to rule on whether the post-sale restrictions were valid, or as overruling Mallinckrodt'''s approval of post-sale restrictions. Which interpretation is correct remains to be seen. The Federal Circuit's decision in the en banc reargument of Lexmark Int'l v. Impression Prods. should provide a more definitive answer, subject of course to possible further review in the Supreme Court.
International exhaustion
An emerging issue is whether U.S. patent exhaustion is international or strictly national. Until recently, or at least since the formation of the Federal Circuit in 1982 until recently, most U.S. courts simply assumed that a sale outside the United States, even if made by the U.S. patent owner or its parent, subsidiary, or affiliate, or by the U.S. patent owner's licensee, did not trigger the exhaustion doctrine within the United States. Usually, the basis for the assumption was (1) the Supreme Court allegedly so held in Boesch v. Graff; (2) a foreign patent is a different property right that is not the same as a corresponding U.S. patent because foreign patent law is different from U.S. patent law and gives different scope to such a foreign patent; and (3) many cases hold that U.S. patent law has no "extraterritorial" application.
None of these points is on firm, sound ground. In the Boesch case, a seller entirely unrelated to the U.S. patent owner made the sale in Germany; the German seller had a right to sell the product under German law because it had begun preparation to manufacture the product before the U.S. patent owner applied for its German patent. The U.S. company (the patentee) had no complicity in the sale and did not profit from it, and could not possibly be accused of "double dipping." This is quite unlike the usual U.S. situation, such as that in the Lexmark and Jazz cases, in which the U.S. patent owner was responsible for the foreign sale, and therefore profited from it. The Boesch case is therefore not a proper precedent to support the general international exhaustion situation.
Whether foreign patents are comparable to U.S. patents is a factual issue that may differ from case to case, or nation to nation, and cannot be assumed one way or the other. Furthermore, 35 U.S.C. § 119(a), the U.S. patent statute governing when a U.S. patent can be based on a filing of a foreign patent application, provides that the U.S. patent and the corresponding foreign patent must be "for the same invention." Therefore, there may be far more similarity than the cases assume.
Finally, the statement that U.S. patent law is without extraterritorial application occurs universally in cases holding that liability for patent infringement under U.S. law should not be based on acts and conduct occurring outside the United States. And even that generality is suspect, for sometimes patent infringement liability in the United States is based on conduct outside the United States. Applying exhaustion on an international basis does not regulate acts and conduct performed outside the United States; it defines infringement remedies against importation into and sale in the United States on the basis of acts and conduct performed outside the United States.
The point is now pending decision in the Federal Circuit, because that court has ordered en banc rehearing on that issue in the Lexmark case. The reason that the issue has come to the fore is that the Supreme Court, in its recent copyright decision in Kirtsaeng v. John Wiley & Sons, Inc., held that a foreign sale authorized by the copyright owners exhausts U.S. copyright. The Supreme Court rested its decision mainly on common-law authority, quoting extensively from Coke's Institutes (Coke on Littleton), and saying that this stated the general rule from which any exception must be proved. Some have thought, therefore, that the same principle applies at least as forcefully in patent law as in copyright law, so that patent exhaustion should be international just as copyright exhaustion is.
In Europe and Japan, a regime of absolute or modified international exhaustion of patent rights is followed. Australia, New Zealand, and Norway also adopt international patent exhaustion.
The World Trade Organization (WTO) Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS) explicitly leaves to each member state the freedom to address exhaustion of intellectual property. A World Intellectual Property Organization (WIPO) report in 2010 provides a listing of various countries' statutory provisions on international exhaustion.
Standing or right to assert exhaustion
Another emerging issue under the exhaustion doctrine is what persons may assert the exhaustion doctrine as a defense to a claim of patent infringement. In most of the exhaustion cases discussed earlier in this article, the facts of the case follow what may be termed a "straight line" pattern: A patentee A (or its licensee) makes and sells a product a covered by patent P1 to customer C. C then does something with a that A has ordered (by some sort of agreement or putative agreement) C not to do. A patent infringement suit, A v. C, follows. Diagrammatically, this fact pattern may be represented as:
A → a (P1) → C
where a(P1) means that patent P1 covers product a and the → indicates a sale
New information-technology inventions can lead to exhaustion suits following a different fact pattern, because of peculiarities of information technology and present U.S. patent law. An information-technology invention may involve several aspects each of which has a separate stakeholder. For example, a smartphone, TV set, or set-top box may be economically important to both equipment manufacturers and content providers, as well as the end user public (i.e., consumers). A license or sale to one stakeholder may or may not trigger the exhaustion doctrine with respect to conduct by another stakeholder, perhaps depending on how relevant business transactions are structured.
Under present U.S. patent law, a method claim of a patent is infringed only when a single actor performs each step of the claim. Similarly, induced infringement of a method claim has the same requirement. System claims raise more complicated issues. One can make the system only by placing each element into combination with the others, but it is possible to be liable for using a system invention merely by commercially exploiting the system. Therefore, when both the relevant equipment manufacturer and content provider utilize aspects of the invention in a method claim, whether infringement liability attaches to them may depend on both how the relevant claim is written and how licenses or sales are structured. This is illustrated in pending smartphone litigation, in which structure dictated the legal outcome.
In Helferich Patent Licensing, LLC v. New York Times Co., the Federal Circuit overturned a district court's summary dismissal on exhaustion grounds of a patent infringement suit against content providers. The invention concerns methods and systems for alerting smartphone users to content that may be of interest to them, for example, breaking news stories. The way the invention works is along these lines: A content provider such as the New York Times sends a text message to its online subscribers' smartphones. The message might consist of a headline and the lead to a story, together with a hyperlink to the story as stored in the online database of the New York Times. A subscriber interested in reading the story clicks on the link and thus causes the browser for the smartphone to retrieve and display the story.
The way the claims were drafted is very important to the outcome. There are two relevant types of claim, One set considers only smartphone manufacturers, and the claims describe only acts performed in the smartphone (receiving signals, clicking on hyperlinks, etc.). The other set of claims considers only acts that the content providers perform (sending the text message alert, storing the news story, sending it out over the Internet in response to a hyperlink click, etc.). Thus, it is possible to infringe one set of these single-actor claims without infringing the other.
The patentee licensed substantially all smartphone manufacturers in the United States under the first set of patents. It then sought to license content providers. When some content providers, including the New York Times, refused to take licenses under the second set of patents, claiming that under the exhaustion doctrine they needed no licenses, the patentee sued them. Instead of the "straight line" fact pattern described above for prior exhaustion cases, this case has a different, bi-directional pattern. Diagrammatically, the fact pattern of this type of case is as follows:
P → lic (P1) → A, a
Patentee P licenses manufacturer A under patent P1 (the smartphone patents) to make smartphones a embodying the patented invention. A then sells smartphones a to consumers C.
A → a (P1) → C ← i (P2) ← B
Content provider B sends news alerts and content i to consumers C, thus practicing the method claimed in patent P2 (the content provider patents).
On appeal from the district court's summary judgment ruling, the Federal Circuit held that the structure of the patent licensing arrangement avoided the exhaustion doctrine. The court ruled that the exhaustion doctrine may be asserted only by an "authorized acquirer" — one who purchases the patented article from the patentee or its authorized seller. The court further explained this, using slightly different terminology:
[It is a] core notion that exhaustion lifts legal restrictions on an authorized acquirer. The doctrine has never applied unless, at a minimum, the patentee's allegations of infringement . . . entail infringement of the asserted claims by authorized acquirers . . . Here, as noted, that is not so, because infringement of the content claims has not been . . . shown to require that [the authorized] handset acquirers are practicing those claims.
As the patentee put it in its brief, and the court accepted, "the exhaustion doctrine protects only the ability of a purchaser (or other lawful possessor) of an article to use and sell the article." The content providers were not parties to the transaction that triggered whatever exhaustion there was — that transaction was the sale of smartphones by manufacturers to consumers. The exhaustion doctrine exists to protect the interests of purchasers, not third parties. The patentee told the Federal Circuit, and it apparently agreed, that the exhaustion doctrine does not immunize the conduct of the content providers, "regardless of the effect on the amount of licensed content available to their subscribers' handsets."
Moreover, the patent claims licensed to the manufacturers (the P1 of the diagram above) are not infringed by the conduct of the content providers accused of infringement. Their conduct infringes the P2 patent claims that were not licensed to the manufacturers. The only sale in the case was by the licensed smartphone manufacturers to the consumer end users, and that sale exhausted only the P1 claims. The Federal Circuit said exhaustion cannot occur as to unrelated patent claims. The court added that the content providers had not shown that the licensed P1 claims embodied substantially the same invention as the P2 patent claims under which the content providers were sued, so that the doctrine of the Univis and Quanta cases did not apply to expand the scope of the exhaustion.
There is another possible way to analyze cases of this type, but the parties did not raise it and the court did not address it. That would be to make an equitable estoppel analysis as to whether smartphone purchasers had reasonable expectations at the time of purchase and whether the result reached in the case unfairly and substantially derogated from the rights the purchasers expected to enjoy, as a result of conduct by the plaintiff. That is an approach similar to one of those that the House of Lords considered in the British Leyland case.
Comparable doctrines outside U.S.
Other countries recognize legal doctrines comparable to the exhaustion doctrine of U.S. patent law.
Canada
In Eli Lilly and Co. v. Apotex Inc., the Supreme Court of Canada adopted the principle that sale of a patented article exhausts the patentee's right in that article. In the Eli Lilly case the Supreme Court also took the position that subsequent purchasers are not bound by any contractual limitations imposed by the patentee, unless they are brought to their attention at the time of sale: "restrictive conditions imposed by a patentee on a purchaser or licensee do not run with the goods unless they are brought to the attention of the [subsequent] purchaser at the time of their acquisition." This principle appears to differ somewhat from U.S. patent law, in which bringing the restriction to the attention of the purchaser is generally immaterial.
Germany
Approximately 60 percent of European patent litigation is in German courts. German law has long recognized the exhaustion doctrine. In the Fullplastverfahren case, the German Federal Supreme Court stated:
The doctrine [of exhaustion] finds its justification in the argument that the holder of the rights who puts into circulation the product produced under the application of the protected procedure has had the opportunity to avail himself of the advantages granted by the patent.
A commentator asserts that the decision of the German Federal Supreme Court in the Brochure Rock case would require a contrary result as to the fact pattern of the U.S. Quanta case (discussed above). The sale of the chips would not exhaust the patent rights to the computer systems containing the chips, so that LG in that case would have been entitled to a further royalty payment from Quanta despite LG's license to the chip manufacturer Intel.
A recent decision of the Düsseldorf District Court, however, perhaps points to greater similarity between German and U.S.; patent law. The case had facts almost identical to those of the Quanta case. The court held that the sale of the component did not exhaust the patent rights on the system because, among other things, the components sold by the suppliers did not make use of the teachings of the system patent.
As for using the doctrine of the U.S. Quanta case, the Düsseldorf District Court stated that the rationale for such an "extended exhaustion doctrine" could only be to prevent the patent owner from enjoying the advantages of the patent more than once, that is, "double dipping" or "double charging." The court said that such a danger of double charging at different stages of the distribution chain and, thus, a rationale for an "extended exhaustion doctrine," might exist if, in one and the same patent, there is a claim to the overall device and a claim to an individual component of the overall device. That was not the case here.
A second basis for an "extended exhaustion doctrine" might exist if the overall device and its individual components are protected by different patents (as here), but only when the inventive concept of the two patents is the same and is substantially embodied in the component. But that was not true here, as it was in the Quanta case. This is the point of possible similarity to Quanta, but it is entirely in the form of obiter dicta,
The court ruled that the fact that the component had no reasonable use except in making the patented system (which was so in the Quanta case) did not matter, because that raised an implied license issue rather than an exhaustion issue. The component manufacturer's license expressly disclaimed any such implied license as to the system (as in the Quanta case).
References
External links
Box-wrap patent infringement
Quanta v. LG at scotuswiki.com.
Quanta Computer Inc v LGE Electronics Inc—Comments on the Reaffirmance of the Exhaustion Doctrine in the United States, [2008] Eur. Intell. Prop. Rev 527
Oral argument in Federal Circuit en banc hearing on Mallinckrodt and Jazz Photo'' cases
Intellectual property law of the European Union
United States patent law
Legal doctrines and principles
|
60056628
|
https://en.wikipedia.org/wiki/Stacy%20Margolin
|
Stacy Margolin
|
Stacy Margolin (born April 5, 1959) is a former American professional tennis player in the WTA tour and the ITF world tour from 1979 to 1987 whose career-high world singles ranking is No. 18 (career-high end of season ranking of No. 25 in 1979). In her eight professional seasons, Margolin competed in a total of twenty-five grand slam championships, which includes several appearances at Wimbledon, the US Open, and the French Open.
Margolin was a talented junior player, competing in numerous national tournaments, including multiple appearances at the Ojai Tennis Tournament. She played for the University of Southern California during her collegiate career and led the Trojans to a national championship. In her 192 career singles matches and 124 career doubles matches, Margolin won one title and has partnered with other notable players such as John McEnroe and Anne White.
Early life
Beginning when she was 10 years old, Margolin played in numerous USTA junior tournaments, achieving a rank of No. 6 in the Under-12 division in Southern California. She was ranked No. 17 in the nation after competing in the USTA Under-14 Junior Tennis Team National Competition. In 1975, she reached the No. 1 rank in Southern California Girls Under-16 and continue to win the U.S. Under-18 Indoor Championship in 1976 and become the No. 1 Southern California Girls Under-18 and No. 5 U.S. Girls Under-18. Margolin would win the Ojai Tennis Tournament, the country's oldest amateur tennis tournament, seven times — U14s, U16s, U18s, Doubles, Women's Open (twice), and Collegiate Division.
High school and collegiate career
At Beverly Hills High School, Margolin was not only the No. 1 women's singles player, but joined the men's varsity tennis team and became their No. 1 player as well.
She would then go on to be No. 1 women's singles player at the University of Southern California, where she went undefeated during her freshman and sophomore years in their dual home matches. She helped lead the USC Trojans to a USTA (1978) and an AIAW (1979) national team title. Margolin would become a two-time Collegiate All-American during those two years. As a freshman, she would become the USTA Collegiate Singles Champion.
Professional career
In 1977, Margolin was the U.S. 21-and-Under Champion and was a member of the U.S. Team participating in the Junior Wightman Cup. She won the Ojai Tennis Tournament in women's singles. Additionally, she was the runner-up to Tracy Austin at Avon Futures of Portland. At the 1977 Maccabiah Games in Israel — a competition for Jewish athletes — Margolin won gold, silver, and bronze medals at various tennis events.
In 1978, she was the U.S. 21-and-under Amateur Hard Court Champion as well as a U.S. Team Member in the Federation Cup held in the United Kingdom. Margolin went on to defeat Tracy Austin to become the Women's Southern California Sectional Champion and was the Southern California Sectional Mixed Doubles Champion with her brother, Mike Margolin. Margolin won her first and only tour championship, the 1978 WTA's Women in Tennis International Singles Champion held in San Antonio, Texas.
After turning professional in 1979, she reached a career-high No. 18 world ranking and finished the 1979 season ranked No. 25. Margolin was consistently ranked in the top 40 between 1980 and 1984, and would go on to be a Wimbledon Plate quarter finalist and a semi-finalist in the Wells Fargo Open in San Diego. She continued to compete on the tour and participate in 25 grand slam championships, including the 1978 Wimbledon and U.S. Open mixed doubles, in which she was partnered with John McEnroe. In 1988 she again won the Ojai Tennis Tournament in women's singles.
Personal life
After retiring from professional match play, Margolin earned a sociology degree from UCLA and a master's degree in clinical psychology from Pepperdine University. She became the Head Tennis Director of the Youth and Adult Recreation Department in Ojai, California, from 1995 to 1998. She then became a nutrition and wellness consultant/lecturer at the Weil Tennis Academy in Ojai, and was the head tennis coach of the boys and girls teams at the Thatcher School. Margolin self-published a book of poetry called Thoughts Allowed ... A Journey into a Woman's Mind, Heart & Soul in 2009. Currently, she works with her husband as a health coach in their hiking, biking, rock climbing, and tennis company, Trails by Potter.
Awards
Margolin won the Tennis Teaching Pro Outstanding Service Award from 1986 to 1989. She was inducted into the Southern California Jewish Sports Hall of Fame in 2004 as well as the Beverly Hills High School Athletic Hall of Fame in 2009. She entered the ITA Women's Collegiate Tennis Hall of Fame in 2014.
WTA Tour finals
Singles (1-0)
Grand Slam record
Singles
The result is on the right. The final opponent is on the left.
Doubles
The result is on the right. The partner is below the result. The final opponent is on the left.
Mixed Doubles
The result is on the right. The partner is below the result. The final opponent is on the left.
Charity work
Margolin organized the first Ojai Tennis Marathon in 2000, an event in which participants attempt to play fifty games of tennis in a single day to raise funding for the Ojai Valley Youth Foundation, of which Margolin's husband, Ian Potter, is on the board of directors. Margolin continues to organize the tennis marathon event as of 2015.
See also
List of select Jewish tennis players
References
1959 births
Living people
American female tennis players
Beverly Hills High School alumni
USC Trojans women's tennis players
Tennis people from California
Maccabiah Games medalists in tennis
Maccabiah Games gold medalists for the United States
Maccabiah Games silver medalists for the United States
Maccabiah Games bronze medalists for the United States
Jewish tennis players
Jewish American sportspeople
Competitors at the 1977 Maccabiah Games
21st-century American Jews
21st-century American women
|
24080
|
https://en.wikipedia.org/wiki/PostScript
|
PostScript
|
PostScript (PS) is a page description language in the electronic publishing and desktop publishing business. It is a dynamically typed, concatenative programming language. It was created at Adobe Systems by John Warnock, Charles Geschke, Doug Brotz, Ed Taft and Bill Paxton from 1982 to 1984.
History
The concepts of the PostScript language were seeded in 1976 by John Gaffney at Evans & Sutherland, a computer graphics company. At that time Gaffney and John Warnock were developing an interpreter for a large three-dimensional graphics database of New York Harbor.
Concurrently, researchers at Xerox PARC had developed the first laser printer and had recognized the need for a standard means of defining page images. In 1975-76 Bob Sproull and William Newman developed the Press format, which was eventually used in the Xerox Star system to drive laser printers. But Press, a data format rather than a language, lacked flexibility, and PARC mounted the Interpress effort to create a successor.
In 1978 John Gaffney and Martin Newell then at Xerox PARC wrote J & M or JaM (for "John and Martin") which was used for VLSI design and the investigation of type and graphics printing. This work later evolved and expanded into the Interpress language.
Warnock left with Chuck Geschke and founded Adobe Systems in December 1982. They, together with Doug Brotz, Ed Taft and Bill Paxton created a simpler language, similar to Interpress, called PostScript, which went on the market in 1984. At about this time they were visited by Steve Jobs, who urged them to adapt PostScript to be used as the language for driving laser printers.
In March 1985, the Apple LaserWriter was the first printer to ship with PostScript, sparking the desktop publishing (DTP) revolution in the mid-1980s. The combination of technical merits and widespread availability made PostScript a language of choice for graphical output for printing applications. For a time an interpreter (sometimes referred to as a RIP for Raster Image Processor) for the PostScript language was a common component of laser printers, into the 1990s.
However, the cost of implementation was high; computers output raw PS code that would be interpreted by the printer into a raster image at the printer's natural resolution. This required high performance microprocessors and ample memory. The LaserWriter used a 12 MHz Motorola 68000, making it faster than any of the Macintosh computers to which it attached. When the laser printer engines themselves cost over a thousand dollars the added cost of PS was marginal. But as printer mechanisms fell in price, the cost of implementing PS became too great a fraction of overall printer cost; in addition, with desktop computers becoming more powerful, it no longer made sense to offload the rasterization work onto the resource-constrained printer. By 2001, few lower-end printer models came with support for PostScript, largely due to growing competition from much cheaper non-PostScript ink jet printers, and new software-based methods to render PostScript images on the computer, making them suitable for any printer; PDF, a descendant of PostScript, provides one such method, and has largely replaced PostScript as de facto standard for electronic document distribution.
On high-end printers, PostScript processors remain common, and their use can dramatically reduce the CPU work involved in printing documents, transferring the work of rendering PostScript images from the computer to the printer.
PostScript Level 1
The first version of the PostScript language was released to the market in 1984. The suffix Level 1 was added when Level 2 was introduced.
PostScript Level 2
PostScript Level 2 was introduced in 1991, and included several improvements: improved speed and reliability, support for in-Raster Image Processing (RIP) separations, image decompression (for example, JPEG images could be rendered by a PostScript program), support for composite fonts, and the form mechanism for caching reusable content.
PostScript 3
PostScript 3 (Adobe dropped the "level" terminology in favor of simple versioning) came at the end of 1997, and along with many new dictionary-based versions of older operators, introduced better color handling and new filters (which allow in-program compression/decompression, program chunking, and advanced error-handling).
PostScript 3 was significant in terms of replacing the existing proprietary color electronic prepress systems, then widely used for magazine production, through the introduction of smooth shading operations with up to 4096 shades of grey (rather than the 256 available in PostScript Level 2), as well as DeviceN, a color space that allowed the addition of additional ink colors (called spot colors) into composite color pages.
Use in printing
Before PostScript
Prior to the introduction of PostScript, printers were designed to print character output given the text—typically in ASCII—as input. There were a number of technologies for this task, but most shared the property that the glyphs were physically difficult to change, as they were stamped onto typewriter keys, bands of metal, or optical plates.
This changed to some degree with the increasing popularity of dot matrix printers. The characters on these systems were drawn as a series of dots, as defined by a font table inside the printer. As they grew in sophistication, dot matrix printers started including several built-in fonts from which the user could select, and some models allowed users to upload their own custom glyphs into the printer.
Dot matrix printers also introduced the ability to print raster graphics. The graphics were interpreted by the computer and sent as a series of dots to the printer using a series of escape sequences. These printer control languages varied from printer to printer, requiring program authors to create numerous drivers.
Vector graphics printing was left to special-purpose devices, called plotters. Almost all plotters shared a common command language, HPGL, but were of limited use for anything other than printing graphics. In addition, they tended to be expensive and slow, and thus rare.
PostScript printing
Laser printers combine the best features of both printers and plotters. Like plotters, laser printers offer high quality line art, and like dot-matrix printers, they are able to generate pages of text and raster graphics. Unlike either printers or plotters, a laser printer makes it possible to position high-quality graphics and text on the same page. PostScript made it possible to exploit fully these characteristics by offering a single control language that could be used on any brand of printer.
PostScript went beyond the typical printer control language and was a complete programming language of its own. Many applications can transform a document into a PostScript program: the execution of which results in the original document. This program can be sent to an interpreter in a printer, which results in a printed document, or to one inside another application, which will display the document on-screen. Since the document-program is the same regardless of its destination, it is called device-independent.
PostScript is noteworthy for implementing 'on-the fly' rasterization in which everything, even text, is specified in terms of straight lines and cubic Bézier curves (previously found only in CAD applications), which allows arbitrary scaling, rotating and other transformations. When the PostScript program is interpreted, the interpreter converts these instructions into the dots needed to form the output. For this reason, PostScript interpreters are occasionally called PostScript raster image processors, or RIPs.
Font handling
Almost as complex as PostScript itself is its handling of fonts. The font system uses the PS graphics primitives to draw glyphs as curves, which can then be rendered at any resolution. A number of typographic issues had to be considered with this approach.
One issue is that fonts do not scale linearly at small sizes and features of the glyphs will become proportionally too large or small and start to look displeasing. PostScript avoided this problem with the inclusion of font hinting, in which additional information is provided in horizontal or vertical bands to help identify the features in each letter that are important for the rasterizer to maintain. The result was significantly better-looking fonts even at low resolution. It had formerly been believed that hand-tuned bitmap fonts were required for this task.
At the time, the technology for including these hints in fonts was carefully guarded, and the hinted fonts were compressed and encrypted into what Adobe called a Type 1 Font (also known as PostScript Type 1 Font, PS1, T1 or Adobe Type 1). Type 1 was effectively a simplification of the PS system to store outline information only, as opposed to being a complete language (PDF is similar in this regard). Adobe would then sell licenses to the Type 1 technology to those wanting to add hints to their own fonts. Those who did not license the technology were left with the Type 3 Font (also known as PostScript Type 3 Font, PS3 or T3). Type 3 fonts allowed for all the sophistication of the PostScript language, but without the standardized approach to hinting.
The Type 2 font format was designed to be used with Compact Font Format (CFF) charstrings, and was implemented to reduce the overall font file size. The CFF/Type2 format later became the basis for handling PostScript outlines in OpenType fonts.
The CID-keyed font format was also designed, to solve the problems in the OCF/Type 0 fonts, for addressing the complex Asian-language (CJK) encoding and very large character set issues. The CID-keyed font format can be used with the Type 1 font format for standard CID-keyed fonts, or Type 2 for CID-keyed OpenType fonts.
To compete with Adobe's system, Apple designed their own system, TrueType, around 1991. Immediately following the announcement of TrueType, Adobe published the specification for the Type 1 font format. Retail tools such as Altsys Fontographer (acquired by Macromedia in January 1995, owned by FontLab since May 2005) added the ability to create Type 1 fonts. Since then, many free Type 1 fonts have been released; for instance, the fonts used with the TeX typesetting system are available in this format.
In the early 1990s there were several other systems for storing outline-based fonts, developed by Bitstream and Metafont for instance, but none included a general-purpose printing solution and they were therefore not widely used.
In the late 1990s, Adobe joined Microsoft in developing OpenType, essentially a functional superset of the Type 1 and TrueType formats. When printed to a PostScript output device, the unneeded parts of the OpenType font are omitted, and what is sent to the device by the driver is the same as it would be for a TrueType or Type 1 font, depending on which kind of outlines were present in the OpenType font.
Other implementations
In the 1980s, Adobe drew most of its revenue from the licensing fees for their implementation of PostScript for printers, known as a raster image processor or RIP. As a number of new RISC-based platforms became available in the mid-1980s, some found Adobe's support of the new machines to be lacking.
This and issues of cost led to third-party implementations of PostScript becoming common, particularly in low-cost printers (where the licensing fee was the sticking point) or in high-end typesetting equipment (where the quest for speed demanded support for new platforms faster than Adobe could provide). At one point, Microsoft licensed to Apple a PostScript-compatible interpreter it had bought called TrueImage, and Apple licensed to Microsoft its new font format, TrueType. Apple ended up reaching an accord with Adobe and licensed genuine PostScript for its printers, but TrueType became the standard outline font technology for both Windows and the Macintosh.
Today, third-party PostScript-compatible interpreters are widely used in printers and multifunction peripherals (MFPs). For example, CSR plc's IPS PS3 interpreter, formerly known as PhoenixPage, is standard in many printers and MFPs, including those developed by Hewlett-Packard and sold under the LaserJet and Color LaserJet lines. Other third-party PostScript solutions used by print and MFP manufacturers include Jaws and the Harlequin RIP, both by Global Graphics. A free software version, with several other applications, is Ghostscript. Several compatible interpreters are listed on the Undocumented Printing Wiki.
Some basic, inexpensive laser printers do not support PostScript, instead coming with drivers that simply rasterize the platform's native graphics formats rather than converting them to PostScript first. When PostScript support is needed for such a printer, Ghostscript can be used. There are also a number of commercial PostScript interpreters, such as TeleType Co.'s T-Script.
Use as a display system
PostScript became commercially successful due to the introduction of the graphical user interface (GUI), allowing designers to directly lay out pages for eventual output on laser printers. However, the GUI's own graphics systems were generally much less sophisticated than PostScript; Apple's QuickDraw, for instance, supported only basic lines and arcs, not the complex B-splines and advanced region filling options of PostScript. In order to take full advantage of PostScript printing, applications on the computers had to re-implement those features using the host platform's own graphics system. This led to numerous issues where the on-screen layout would not exactly match the printed output, due to differences in the implementation of these features.
As computer power grew, it became possible to host the PS system in the computer rather than the printer. This led to the natural evolution of PS from a printing system to one that could also be used as the host's own graphics language. There were numerous advantages to this approach; not only did it help eliminate the possibility of different output on screen and printer, but it also provided a powerful graphics system for the computer, and allowed the printers to be "dumb" at a time when the cost of the laser engines was falling. In a production setting, using PostScript as a display system meant that the host computer could render low-resolution to the screen, higher resolution to the printer, or simply send the PS code to a smart printer for offboard printing.
However, PostScript was written with printing in mind, and had numerous features that made it unsuitable for direct use in an interactive display system. In particular, PS was based on the idea of collecting up PS commands until the showpage command was seen, at which point all of the commands read up to that point were interpreted and output. In an interactive system this was clearly not appropriate. Nor did PS have any sort of interactivity built in; for example, supporting hit detection for mouse interactivity obviously did not apply when PS was being used on a printer.
When Steve Jobs left Apple and started NeXT, he pitched Adobe on the idea of using PS as the display system for his new workstation computers. The result was Display PostScript, or DPS. DPS added basic functionality to improve performance by changing many string lookups into 32 bit integers, adding support for direct output with every command, and adding functions to allow the GUI to inspect the diagram. Additionally, a set of "bindings" was provided to allow PS code to be called directly from the C programming language. NeXT used these bindings in their NeXTStep system to provide an object oriented graphics system. Although DPS was written in conjunction with NeXT, Adobe sold it commercially and it was a common feature of most Unix workstations in the 1990s.
Sun Microsystems took another approach, creating NeWS. Instead of DPS's concept of allowing PS to interact with C programs, NeWS instead extended PS into a language suitable for running the entire GUI of a computer. Sun added a number of new commands for timers, mouse control, interrupts and other systems needed for interactivity, and added data structures and language elements to allow it to be completely object oriented internally. A complete GUI, three in fact, were written in NeWS and provided for a time on their workstations. However, the ongoing efforts to standardize the X11 system led to its introduction and widespread use on Sun systems, and NeWS never became widely used.
The language
PostScript is a Turing-complete programming language, belonging to the concatenative group. Typically, PostScript programs are not produced by humans, but by other programs. However, it is possible to write computer programs in PostScript just like any other programming language.
PostScript is an interpreted, stack-based language similar to Forth but with strong dynamic typing, data structures inspired by those found in Lisp, scoped memory and, since language level 2, garbage collection. The language syntax uses reverse Polish notation, which makes the order of operations unambiguous, but reading a program requires some practice, because one has to keep the layout of the stack in mind. Most operators (what other languages term functions) take their arguments from the stack, and place their results onto the stack. Literals (for example, numbers) have the effect of placing a copy of themselves on the stack. Sophisticated data structures can be built on the array and dictionary types, but cannot be declared to the type system, which sees them all only as arrays and dictionaries, so any further typing discipline to be applied to such user-defined "types" is left to the code that implements them.
The character "%" is used to introduce comments in PostScript programs. As a general convention, every PostScript program should start with the characters "%!PS" as an interpreter directive so that all devices will properly interpret it as PostScript.
"Hello world"
A Hello World program, the customary way to show a small example of a complete program in a given language, might look like this in PostScript (level 2):
%!PS
/Courier % name the desired font
20 selectfont % choose the size in points and establish
% the font as the current one
72 500 moveto % position the current point at
% coordinates 72, 500 (the origin is at the
% lower-left corner of the page)
(Hello world!) show % stroke the text in parentheses
showpage % print all on the page
or if the output device has a console
%!PS
(Hello world!) =
Units of length
PostScript uses the point as its unit of length. However, unlike some of the other versions of the point, PostScript uses exactly 72 points to the inch. Thus:
For example, in order to draw a vertical line of 4 cm length, it is sufficient to type:
0 0 moveto
0 113.385827 lineto stroke
More readably and idiomatically, one might use the following equivalent, which demonstrates a simple procedure definition and the use of the mathematical operators mul and div:
/cm {72 mul 2.54 div} def % 1 inch = 2.54 cm exactly
0 0 moveto
0 4 cm lineto stroke
Most implementations of PostScript use single-precision reals (24-bit mantissa), so it is not meaningful to use more than 9 decimal digits to specify a real number, and performing calculations may produce unacceptable round-off errors.
Software
List of software which can be used to render the PostScript documents:
Ghostscript
pstoedit
Zathura
See also
Adobe StandardEncoding (PostScript character set)
Document Structuring Conventions
Typeface
Computer font
Encapsulated PostScript
PostScript Printer Description (PPD)
Printer Command Language (PCL)
LaTeX
References
Further reading
(NB. This book (PLR3) together with the is the de facto defining work on PostScript 3 and is informally called "red book" due to its red cover.)
(NB. This edition (PLR2) covers PostScript Level 2 and also contains a description of Display PostScript, which is no longer discussed in the third edition.)
(NB. This edition (PLR1) covers PostScript Level 1.)
(NB. This introductory text is informally called "blue book" due to its blue cover.)
(NB. This book is informally called "green book" due to its green cover.)
(NB. This book is informally called "black book" due to its black cover.)
(NB. Official introductory comparison of PS, EPS vs. PDF.)
(NB. A thorough tutorial available online courtesy of the author.)
External links
Adobe Inc.
Computer printing
Computer-related introductions in 1982
Concatenative programming languages
Digital press
Digital typography
Dynamically typed programming languages
Office document file formats
Open formats
Page description languages
Stack-based virtual machines
Stack-oriented programming languages
Technical communication
Vector graphics
Postscript to PDF
|
5847313
|
https://en.wikipedia.org/wiki/Ttyrec
|
Ttyrec
|
ttyrec is a program or its file format capable of recording the TTY output of a text-mode program together with timestamps and then replaying it.
It is widely used for example in the NetHack community for storing game replays.
It is similar to the script command, but also allows for pausing, slowing down or speeding up playback. It can also stream the recording on the network and be used to transfer files with uudecode.
Recorders and players
original ttyrec (Unix)
Term::TtyRec (Perl)
Term::TtyRec::Plus (Perl)
Tie::Handle::TtyRec (Perl)
termrec (Win32, Unix)
Playback only
TTYPLAYER (Java)
IPBT (Unix)
Technical file format specification
Each chunk consists of a header using 32bit unsigned little-endian numbers:
sec – seconds, either since the beginning of the recording (0-based) or since the Unix epoch
usec – 0..999999 microseconds
len – length of the payload
and the actual payload written as text with vt100 control codes.
The format does not contain any information about the character set used nor about the terminal size needed to play back the file. termrec will inject this information as \e for UTF-8 or \e for not UTF-8 and as \eYX for size, but not all players will understand these codes.
Related formats
nh-recorder
Joey Hess's modifications of script
RealLogs
References
External links
How To Record And Share Terminal Screencasts Quickly
Record and share your terminal session with shelr.tv
User interfaces
Computer file formats
Unix software
|
3563743
|
https://en.wikipedia.org/wiki/Call%20logging
|
Call logging
|
Call logging is the collection, evaluation, and reporting of technical and statistical data about telephone calls. It does not encompass phone tapping or call recording.
Collecting data
Telephone call data, such as originating station, destination, start and ending times, and transmission characteristics, is collected from a telecommunications system or private branch exchange (PBX) in form of call detail records (CDRs). The equipment typically presents this data on older PBXs via a serial communications port, or more recently via a computer network over an Ethernet connection. From the interface, CDRs are collected on computer systems running call logging and analysis software. Some PBX manufacturers provide their own basic call logging software but many other third-party software packages are available.
Call logging software
The goal of the call logging software is to interpret the raw CDR data and produce graphical and summarizing reports. Call logging software packages differ in the sizes of PBX systems that they can support, from hundreds of extensions to hundreds of thousands of extensions. They also differ in the capability of logging specific types of events or data and support for specialized PBX features.
In general terms, call logging reports can highlight such areas as:
Cost Control – cost of calls, cost of trunk lines, costs by department or individual extension, number of unused extensions, etc. Call logging software can also discover instances of Telephone fraud.
Performance Management – looks at how long it is taking an organization to answer phone calls by operator, department or extension and demonstrates whether they meet acceptable target levels for that organization.
Capacity Management – judges whether the system is being over or under utilized. It examines trunk usage and call patterns that show where extra capacity is required or where cost savings can be achieved.
QoS Reporting – modern VoIP PBXs are able to output quality of service data in addition to standard CDRs. An up-to-date call logging package should be able to include this data along with its other reports to help monitor and improve system performance.
History
United Kingdom
During the 1970s, Post Office Telecommunications was embarking on upgrading the telephone network, with the view to modernizing the various established mechanical switching devices, consisting mostly of Strowger exchanges, employed in the UK telephone exchanges, and replacing them with an electronic system. This replacement system became known as System X. Concurrently, and as part of this network upgrade, a dedicated engineering group was formed within the division THQ (Telecoms) to design a call logging system and to establish its feasibility for integration within the various existing Strowger and electronic exchanges, prior to their eventual replacement. A mix of different telephone exchange equipment was selected for trial within Scotland, comprising Strowger pre-2000, 2000 and 4000 type switches located in Director telephone systems and non-Director areas. The call logging trial proved successful and while it was initially designed to gather phone call data and cost of billing details specific to the customers' call's, a hidden benefit emerged such that local management were also able to see a pattern of the types of calls being generated, i.e. calls to and from certain businesses in addition to billing information, which was used to ease flow of traffic during peak times in the exchange and to plan for future customer provision within a catchment area. The concept of this call logging equipment was also deployed in UXD exchanges for remote areas where a System X exchange was not considered feasible.
See also
Call management
Call-tracking software
References
Privacy of telecommunications
|
2237073
|
https://en.wikipedia.org/wiki/Pyrrichos
|
Pyrrichos
|
Pyrrichos (; called "Πούρρχο", Pourcho by local Maniots) is one of the oldest towns in Mani peninsula, Laconia, Greece. It is part of the municipal unit East Mani. It was promised to Achilles by the Achaeans if he took part in the Trojan War.
Name
According to one tradition Pyrrichos was named after Pyrrhichos, the legendary Laconian founder of Pyrrhichus.
According to another tradition Pyrrhichios was named after the son of Achilles, Pyrrhus (Πύρρος) (alternative name of Neoptolemus), who was the first who danced Pyrrhichus, after defeating in battle Eurypylus, son of Telephus, who fought on the side of the Trojans during the end of the Trojan War.
Another legend say that the name is after the Pyrrhichus who was one of the gods called Curetes.
Historical population
See also
List of settlements in Laconia
References
Cities in ancient Peloponnese
Populated places in Laconia
Populated places in the Mani Peninsula
|
41038
|
https://en.wikipedia.org/wiki/Digital%20subscriber%20line
|
Digital subscriber line
|
Digital subscriber line (DSL; originally digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines. In telecommunications marketing, the term DSL is widely understood to mean asymmetric digital subscriber line (ADSL), the most commonly installed DSL technology, for Internet access.
DSL service can be delivered simultaneously with wired telephone service on the same telephone line since DSL uses higher frequency bands for data. On the customer premises, a DSL filter on each non-DSL outlet blocks any high-frequency interference to enable simultaneous use of the voice and DSL services.
The bit rate of consumer DSL services typically ranges from 256 kbit/s to over 100 Mbit/s in the direction to the customer (downstream), depending on DSL technology, line conditions, and service-level implementation. Bit rates of 1 Gbit/s have been reached.
In ADSL, the data throughput in the upstream direction (the direction to the service provider) is lower, hence the designation of asymmetric service. In symmetric digital subscriber line (SDSL) services, the downstream and upstream data rates are equal. Researchers at Bell Labs have reached speeds over 1 Gbit/s for symmetrical broadband access services using traditional copper telephone lines, though such speeds have not yet been deployed elsewhere.
History
It was originally thought that it was not possible to operate a conventional phone line beyond low-speed limits (typically under 9600 bit/s). In the 1950s, ordinary twisted-pair telephone cable often carried four megahertz (MHz) television signals between studios, suggesting that such lines would allow transmitting many megabits per second. One such circuit in the United Kingdom ran some between the BBC studios in Newcastle-upon-Tyne and the Pontop Pike transmitting station. However, these cables had other impairments besides Gaussian noise, preventing such rates from becoming practical in the field. The 1980s saw the development of techniques for broadband communications that allowed the limit to be greatly extended. A patent was filed in 1979 for the use of existing telephone wires for both telephones and data terminals that were connected to a remote computer via a digital data carrier system.
The motivation for digital subscriber line technology was the Integrated Services Digital Network (ISDN) specification proposed in 1984 by the CCITT (now ITU-T) as part of Recommendation I.120, later reused as ISDN digital subscriber line (IDSL). Employees at Bellcore (now Telcordia Technologies) developed asymmetric digital subscriber line (ADSL) by placing wide-band digital signals at frequencies above the existing baseband analog voice signal carried on conventional twisted pair cabling between telephone exchanges and customers. A patent was filed by AT&T Bell Labs on the basic DSL concept in 1988.
Joseph W. Lechleider's contribution to DSL was his insight that an asymmetric arrangement offered more than double the bandwidth capacity of symmetric DSL. This allowed Internet service providers to offer efficient service to consumers, who benefited greatly from the ability to download large amounts of data but rarely needed to upload comparable amounts. ADSL supports two modes of transport: fast channel and interleaved channel. Fast channel is preferred for streaming multimedia, where an occasional dropped bit is acceptable, but lags are less so. Interleaved channel works better for file transfers, where the delivered data must be error-free but latency (time delay) incurred by the retransmission of error-containing packets is acceptable.
Consumer-oriented ADSL was designed to operate on existing lines already conditioned for Basic Rate Interface ISDN services. Engineers developed high speed DSL facilities such as high bit rate digital subscriber line (HDSL) and symmetric digital subscriber line (SDSL) to provision traditional Digital Signal 1 (DS1) services over standard copper pair facilities.
Older ADSL standards delivered 8 Mbit/s to the customer over about of unshielded twisted-pair copper wire. Newer variants improved these rates. Distances greater than significantly reduce the bandwidth usable on the wires, thus reducing the data rate. But ADSL loop extenders increase these distances by repeating the signal, allowing the LEC to deliver DSL speeds to any distance.
Until the late 1990s, the cost of digital signal processors for DSL was prohibitive. All types of DSL employ highly complex digital signal processing algorithms to overcome the inherent limitations of the existing twisted pair wires. Due to the advancements of very-large-scale integration (VLSI) technology, the cost of the equipment associated with a DSL deployment lowered significantly. The two main pieces of equipment are a digital subscriber line access multiplexer (DSLAM) at one end and a DSL modem at the other end.
A DSL connection can be deployed over existing cable. Such deployment, even including equipment, is much cheaper than installing a new, high-bandwidth fiber-optic cable over the same route and distance. This is true both for ADSL and SDSL variations. The commercial success of DSL and similar technologies largely reflects the advances made in electronics over the decades that have increased performance and reduced costs even while digging trenches in the ground for new cables (copper or fiber optic) remains expensive.
These advantages made ADSL a better proposition for customers requiring Internet access than metered dial up, while also allowing voice calls to be received at the same time as a data connection. Telephone companies were also under pressure to move to ADSL owing to competition from cable companies, which use DOCSIS cable modem technology to achieve similar speeds. Demand for high bandwidth applications, such as video and file sharing, also contributed to the popularity of ADSL technology.
Early DSL service required a dedicated dry loop, but when the U.S. Federal Communications Commission (FCC) required incumbent local exchange carriers (ILECs) to lease their lines to competing DSL service providers, shared-line DSL became available. Also known as DSL over unbundled network element, this unbundling of services allows a single subscriber to receive two separate services from two separate providers on one cable pair. The DSL service provider's equipment is co-located in the same telephone exchange as that of the ILEC supplying the customer's pre-existing voice service. The subscriber's circuit is rewired to interface with hardware supplied by the ILEC which combines a DSL frequency and POTS signals on a single copper pair.
By 2012, some carriers in the United States reported that DSL remote terminals with fiber backhaul were replacing older ADSL systems.
Operation
Telephones are connected to the telephone exchange via a local loop, which is a physical pair of wires. The local loop was originally intended mostly for the transmission of speech, encompassing an audio frequency range of 300 to 3400 hertz (commercial bandwidth). However, as long-distance trunks were gradually converted from analog to digital operation, the idea of being able to pass data through the local loop (by utilizing frequencies above the voiceband) took hold, ultimately leading to DSL.
The local loop connecting the telephone exchange to most subscribers has the capability of carrying frequencies well beyond the 3400 Hz upper limit of POTS. Depending on the length and quality of the loop, the upper limit can be tens of megahertz. DSL takes advantage of this unused bandwidth of the local loop by creating 4312.5 Hz wide channels starting between 10 and 100 kHz, depending on how the system is configured. Allocation of channels continues to higher frequencies (up to 1.1 MHz for ADSL) until new channels are deemed unusable. Each channel is evaluated for usability in much the same way an analog modem would on a POTS connection. More usable channels equate to more available bandwidth, which is why distance and line quality are a factor (the higher frequencies used by DSL travel only short distances).
The pool of usable channels is then split into two different frequency bands for upstream and downstream traffic, based on a preconfigured ratio. This segregation reduces interference. Once the channel groups have been established, the individual channels are bonded into a pair of virtual circuits, one in each direction. Like analog modems, DSL transceivers constantly monitor the quality of each channel and will add or remove them from service depending on whether they are usable. Once upstream and downstream circuits are established, a subscriber can connect to a service such as an Internet service provider or other network services, like a corporate MPLS network.
The underlying technology of transport across DSL facilities uses modulation of high-frequency carrier waves, an analog signal transmission. A DSL circuit terminates at each end in a modem which modulates patterns of bits into certain high-frequency impulses for transmission to the opposing modem. Signals received from the far-end modem are demodulated to yield a corresponding bit pattern that the modem passes on, in digital form, to its interfaced equipment, such as a computer, router, switch, etc.
Unlike traditional dial-up modems, which modulate bits into signals in the 300–3400 Hz audio baseband, DSL modems modulate frequencies from 4000 Hz to as high as 4 MHz. This frequency band separation enables DSL service and plain old telephone service (POTS) to coexist on the same cables. On the subscriber's end of the circuit, inline DSL filters are installed on each telephone to pass voice frequencies but filter the high-frequency signals that would otherwise be heard as hiss. Also, nonlinear elements in the phone could otherwise generate audible intermodulation and may impair the operation of the data modem in the absence of these low-pass filters. DSL and RADSL modulations do not use the voice-frequency band so high-pass filters are incorporated in the circuitry of DSL modems filter out voice frequencies.
Because DSL operates above the 3.4 kHz voice limit, it cannot pass through a loading coil, which is an inductive coil that is designed to counteract loss caused by shunt capacitance (capacitance between the two wires of the twisted pair). Loading coils are commonly set at regular intervals in POTS lines. Voice service cannot be maintained past a certain distance without such coils. Therefore, some areas that are within range for DSL service are disqualified from eligibility because of loading coil placement. Because of this, phone companies endeavor to remove loading coils on copper loops that can operate without them. Longer lines that require them can be replaced with fiber to the neighborhood or node (FTTN).
Most residential and small-office DSL implementations reserve low frequencies for POTS, so that (with suitable filters and/or splitters) the existing voice service continues to operate independently of the DSL service. Thus POTS-based communications, including fax machines and dial-up modems, can share the wires with DSL. Only one DSL modem can use the subscriber line at a time. The standard way to let multiple computers share a DSL connection uses a router that establishes a connection between the DSL modem and a local Ethernet, powerline, or Wi-Fi network on the customer's premises.
The theoretical foundations of DSL, like much of communication technology, can be traced back to Claude Shannon's seminal 1948 paper: A Mathematical Theory of Communication. Generally, higher bit rate transmissions require a wider frequency band, though the ratio of bit rate to symbol rate and thus to bandwidth are not linear due to significant innovations in digital signal processing and digital modulation methods.
Naked DSL
Naked DSL is a way of providing only DSL services over a local loop. It is useful when the customer does not need the traditional telephony voice service because voice service is received either on top of the DSL services (usually VoIP) or through another network (E.g., mobile telephony). It is also commonly called an unbundled network element (UNE) in the United States; in Australia it is known as a unconditioned local loop (ULL); in Belgium it is known as "raw copper" and in the UK it is known as Single Order GEA (SoGEA).
It started making a comeback in the United States in 2004 when Qwest started offering it, closely followed by Speakeasy. As a result of AT&T's merger with SBC, and Verizon's merger with MCI, those telephone companies have an obligation to offer naked DSL to consumers.
Typical setup
On the customer side, a DSL modem is hooked up to a phone line. The telephone company connects the other end of the line to a DSLAM, which concentrates a large number of individual DSL connections into a single box. The DSLAM cannot be located too far from the customer because of attenuation between the DSLAM and the user's DSL modem. It is common for a few residential blocks to be connected to one DSLAM.
The above figure is a schematic of a simple DSL connection (in blue). The right side shows a DSLAM residing in the telephone company's telephone exchange. The left side shows the customer premises equipment with an optional router. The router manages a local area network which connects PCs and other local devices. The customer may opt for a modem that contains both a router and wireless access. This option (within the dashed bubble) often simplifies the connection.
Exchange equipment
At the exchange, a digital subscriber line access multiplexer (DSLAM) terminates the DSL circuits and aggregates them, where they are handed off to other networking transports. The DSLAM terminates all connections and recovers the original digital information. In the case of ADSL, the voice component is also separated at this step, either by a filter integrated in the DSLAM or by specialized filtering equipment installed before it.
Customer equipment
The customer end of the connection consists of a DSL modem. This converts data between the digital signals used by computers and the analog voltage signal of a suitable frequency range which is then applied to the phone line.
In some DSL variations (for example, HDSL), the modem connects directly to the computer via a serial interface, using protocols such as Ethernet or V.35. In other cases (particularly ADSL), it is common for the customer equipment to be integrated with higher-level functionality, such as routing, firewalling, or other application-specific hardware and software. In this case, the equipment is referred to as a gateway.
Most DSL technologies require the installation of appropriate DSL filters to separate the DSL signal from the low-frequency voice signal. The separation can take place either at the demarcation point, or with filters installed at the telephone outlets inside the customer premises.
Modern DSL gateways often integrate routing and other functionality. The system boots, synchronizes the DSL connection and finally establishes the internet IP services and connection between the local network and the service provider, using protocols such as DHCP or PPPoE.
Protocols and configurations
Many DSL technologies implement an asynchronous transfer mode (ATM) layer over the low-level bitstream layer to enable the adaptation of a number of different technologies over the same link.
DSL implementations may create bridged or routed networks. In a bridged configuration, the group of subscriber computers effectively connect into a single subnetwork. The earliest implementations used DHCP to provide the IP address to the subscriber equipment, with authentication via MAC address or an assigned hostname. Later implementations often use Point-to-Point Protocol (PPP) to authenticate with a user ID and password.
Transmission modulation methods
Transmission methods vary by market, region, carrier, and equipment.
Discrete multitone modulation (DMT), the most common kind, also known as Orthogonal frequency-division multiplexing (OFDM)
Trellis-coded pulse-amplitude modulation (TC-PAM), used for HDSL2 and SHDSL
Carrierless amplitude phase modulation (CAP), deprecated in 1996 for ADSL, used for HDSL
Two-binary, one-quaternary (2B1Q), used for IDSL and HDSL
DSL technologies
DSL technologies (sometimes collectively summarized as xDSL) include:
Symmetric digital subscriber line (SDSL), umbrella term for xDSL where the bitrate is equal in both directions.
ISDN digital subscriber line (IDSL), ISDN-based technology that provides a bitrate equivalent to two ISDN bearer and one data channel, 144 kbit/s symmetric over one pair
High-bit-rate digital subscriber line (HDSL), ITU-T G.991.1, the first DSL technology that used a higher frequency spectrum than ISDN, 1,544 kbit/s and 2,048 kbit/s symmetric services, either on 2 or 3 pairs at 784 kbit/s each, 2 pairs at 1,168 kbit/s each, or one pair at 2,320 kbit/s
High-bit-rate digital subscriber line 2/4 (HDSL2, HDSL4), ANSI, 1,544 kbit/s symmetric over one pair (HDSL2) or two pairs (HDSL4)
Symmetric digital subscriber line (SDSL), specific proprietary technology, up to 1,544 kbit/s symmetric over one pair
Single-pair high-speed digital subscriber line (G.SHDSL), ITU-T G.991.2, standardized successor of HDSL and proprietary SDSL, up to 5,696 kbit/s per pair, up to four pairs
Asymmetric digital subscriber line (ADSL), umbrella term for xDSL where the bitrate is greater in one direction than the other.
ANSI T1.413 Issue 2, up to 8 Mbit/s and 1 Mbit/s
G.dmt, ITU-T G.992.1, up to 10 Mbit/s and 1 Mbit/s
G.lite, ITU-T G.992.2, more noise and attenuation resistant than G.dmt, up to 1,536 kbit/s and 512 kbit/s
Asymmetric digital subscriber line 2 (ADSL2), ITU-T G.992.3, up to 12 Mbit/s and 3.5 Mbit/s
Asymmetric digital subscriber line 2 plus (ADSL2+), ITU-T G.992.5, up to 24 Mbit/s and 3.5 Mbit/s
Very-high-bit-rate digital subscriber line (VDSL), ITU-T G.993.1, up to 52 Mbit/s and 16 Mbit/s
Very-high-bit-rate digital subscriber line 2 (VDSL2), ITU-T G.993.2, an improved version of VDSL, compatible with ADSL2+, sum of both directions up to 200 Mbit/s. G.vector crosstalk cancelling feature (ITU-T G.993.5) can be used to increase range at a given bitrate, e.g. 100 Mbit/s at up to 500 meters.
G.fast, ITU-T G.9700 and G.9701, up to approximately 1 Gbit/s aggregate uplink and downlink at 100m. Approved in December 2014, deployments planned for 2016.
Bonded DSL Rings (DSL Rings), a shared ring topology at 400 Mbit/s
Cable/DSL gateway
Etherloop Ethernet local loop
High-speed voice and data link
Rate-adaptive digital subscriber line (RADSL), designed to increase range and noise tolerance by sacrificing upstream speed
Uni-DSL (Uni digital subscriber line or UDSL), technology developed by Texas Instruments, backwards compatible with all DMT standards
Hybrid Access Networks combine existing xDSL deployments with a wireless network such as LTE to increase bandwidth and quality of experience by balancing the traffic over the two access networks.
The line-length limitations from telephone exchange to subscriber impose severe limits on data transmission rates. Technologies such as VDSL provide very high-speed but short-range links. VDSL is used as a method of delivering triple play services (typically implemented in fiber to the curb network architectures).
See also
Dynamic spectrum management (DSM)
John Cioffi – Known as "the father of DSL"
List of countries by number of Internet subscriptions
List of device bandwidths
References
Further reading
pp 53–86
External links
ADSL Theory—Information about the background & workings of ADSL, and the factors involved in achieving a good sync between your modem and the DSLAM.
American inventions
Modems
Internet access
|
8577251
|
https://en.wikipedia.org/wiki/Linux%20Mint
|
Linux Mint
|
Linux Mint is a community-driven Linux distribution based on Ubuntu (in turn based on Debian), bundled with a variety of free and open-source applications. It can provide full out-of-the-box multimedia support for those who choose to include proprietary software such as multimedia codecs.
The Linux Mint project was created by Clément Lefèbvre and is actively maintained by the Linux Mint Team and community.
History
Linux Mint began in 2006 with a beta release, 1.0, code-named 'Ada', based on Kubuntu. Linux Mint 2.0 'Barbara' was the first version to use Ubuntu as its codebase. It had few users until the release of Linux Mint 3.0, 'Cassandra'.
Linux Mint 2.0 was based on Ubuntu 6.10, using Ubuntu's package repositories and using it as a codebase. It then followed its own codebase, building each release from the previous one, but continuing to use the package repositories of the latest Ubuntu release. This made the two systems' bases almost identical, guaranteeing full compatibility between them, rather than requiring Mint to be a fork.
In 2008, Linux Mint adopted the same release cycle as Ubuntu and dropped its minor version number before releasing version 5 'Elyssa'. The same year, in an effort to increase compatibility between the two systems, Linux Mint decided to abandon its codebase and changed the way it built its releases. Starting with Linux Mint 6 'Felicia', each release was based completely on the latest Ubuntu release, built directly from it, and made available approximately one month after the corresponding Ubuntu release (usually in May or November).
In 2010, Linux Mint released Linux Mint Debian Edition (LMDE). Unlike the other Ubuntu-based editions (Ubuntu Mint), LMDE was originally a rolling release based directly on Debian and not tied to Ubuntu packages or its release schedule. It was announced on May 27, 2015 that the Linux Mint team would no longer support the original rolling release version of LMDE after January 1, 2016. LMDE 2 'Betsy' was a long term support release based on Debian Jessie. When LMDE 2 was released it was announced that all LMDE users would be automatically upgraded to new versions of MintTools software and new desktop environments before they were released into the main edition of Linux Mint.
On February 20, 2016, the Linux Mint website was breached by unknown hackers who briefly replaced download links for a version of Linux Mint with a modified version containing malware. The hackers also breached the database of the website's user forum. Linux Mint immediately took its server offline and implemented enhanced security configuration for their website and forum.
Releases
Every version of Linux Mint is given a version number and code-named with a feminine first name ending in 'a' and beginning with a letter of the alphabet that increased with every major revision. Version 18 broke from the pattern with the name 'Sarah', though in English it retains the same final vowel sound as all of the other releases.
Initially, there were two Linux Mint releases per year. Following the release of Linux Mint 5 in 2008, every fourth release was labeled a long-term support (LTS) version, indicating that it was supported (with updates) for longer than traditional releases. Versions 5 and 9 had three years of support, and all LTS versions following received five years of support.
On May 31, 2014, with the release of Linux Mint 17, the Linux Mint team adopted a new release strategy. Starting with the release of Mint 17, all future versions were planned to use a LTS version of Ubuntu as a base, until 2016. Under this strategy, Mint 17.1 was released on November 29, 2014, Mint 17.2 was released on June 30, 2015, and Mint 17.3 was released on December 4, 2015. The 17.x releases are intended to be an easy, optional upgrade. All three versions included upgrades to the Cinnamon and MATE Desktop Environments and various Mint tools. In addition, Mint 17.2 and 17.3 included an upgrade to the LibreOffice suite. The 18.x series follows the pattern set by the 17.x series, by using Ubuntu 16.04 LTS as a base.
Linux Mint does not communicate specific release dates as new versions are published 'when ready', meaning that they can be released early when the distribution is ahead of schedule or late when critical bugs are found. New releases are announced, with much other material, on the Linux Mint blog.
On January 3, 2018, the Linux Mint Team released news of Linux Mint 19 'Tara'. The team stated that the 19.x releases would use GTK 3.22 and be based on Ubuntu 18.04 LTS, with support provided until 2023. On June 29, 2018, Linux Mint 19 'Tara' Cinnamon was released. Then, on December 24, 2019, Linux Mint 19.3, 'Tricia' was released, with security updates available until 2023.
On June 27, 2020, Linux Mint 20 'Ulyana' was released. It is an LTS version with support until 2025. On January 8, 2021 Linux Mint 20.1 'Ulyssa' was released. On July 8, 2021 Linux Mint 20.2 'Uma' was released.
Up to 2014 there had been two Linux Mint releases per year, about one month after the Ubuntu releases they were based on. Each release was given a new version number and a code name, using a female first name starting with the letter whose alphabetical index corresponds to the version number and ending with the letter "a" (e.g., "Elyssa" for version 5, "Felicia" for version 6). There is also an OEM version for ease of installation for hardware manufacturers.
Releases were timed to be approximately one month after Ubuntu releases (which in turn are about one month after GNOME releases and two months after X Window System releases). Consequently, every Linux Mint release came with an updated version of both GNOME and X and features some of the improvements brought in the latest Ubuntu release. Support for most releases was discontinued two months after the next release, but since the mid-2008 v5 every fourth release has been labelled a long-term support (LTS) version, indicating that it is supported (with updates) for longer, three years for v5 and v9, and five years thereafter.
Linux Mint 17 "Qiana" LTS was released on 31 May 2014, remaining current until the end of November 2014 and supported until April 2019. In mid-2014 the successor to 17 Qiana was announced to be 17.1 Rebecca; the development team said that from a technical point of view Linux Mint was no longer tied to the Ubuntu schedule, so it could be released at any time, although the six-month cycle provided rhythm, leading to a late November 2014 target. Linux Mint 17 LTS would be the first release of the 17.x series, and for two years applications would be backported to 17.x, with security updates until 2019.
The latest release is Linux Mint 20.3 "Una", released on January 7, 2022. As an LTS release, it will be supported until 2025.
Linux Mint Debian Edition, not compatible with Ubuntu, is based on Debian and updates are brought in continuously between major versions (of LMDE).
Linux Mint Debian Edition release history
Gallery
Features
Linux Mint primarily uses free and open-source software. Up to and including version 17.3, the installation process included some proprietary software, such as plug-ins and codecs that provide Adobe Flash, MP3, and DVD playback, by default. The installer for version 18 no longer included any proprietary software. Since version 18.1, the installer has provided an option to include third-party and proprietary software (graphics and Wi-Fi drivers, Flash, MP3 and other codecs).
Linux Mint comes with a wide range of software installed, including LibreOffice, Firefox, Thunderbird, HexChat, Pidgin, Transmission, and VLC media player. Additional software that is not installed by default can be downloaded using the package manager, adding a PPA, or adding a source to the sources file in the etc directory. Linux Mint allows networking ports to be closed using its firewall, with customized port selection available. The default Linux Mint desktop environments, Cinnamon and MATE, support many languages. Linux Mint can also run many programs designed for Microsoft Windows (such as Microsoft Office), using the Wine Windows compatibility layer software for Linux, or virtualization software, including VMware Workstation and VirtualBox, or KVM (Kernel-based Virtual Machine, built into the Linux kernel) hypervisor using Virtual Machine Manager.
Linux Mint is available with a number of desktop environments to choose from, including the default Cinnamon desktop, MATE and Xfce. Other desktop environments can be installed via APT, Synaptic, or via the custom Mint Software Manager.
Linux Mint implements Mandatory Access Control with AppArmor to enhance security by default, and restricts the default network-facing processes.
Linux Mint actively develops software for its operating system. Most of the development is done in Python and the source code is available on GitHub.
Software by Linux Mint
Cinnamon
The Cinnamon desktop environment is a fork of GNOME Shell based on the innovations made in Mint Gnome Shell Extensions (MGSE). It was released as an add-on for Linux Mint 12 and has been available as a default desktop environment since Linux Mint 13.
MintTools
Software Manager (mintInstall): Designed to install software from the Ubuntu and Linux Mint software repositories, as well as Launchpad PPAs. Since Linux Mint 18.3, the Software Manager has also been able to install software from Flatpak remotes, and is configured with Flathub by default. It features an interface heavily inspired by GNOME Software, and is built upon GTK3.
Update Manager (mintUpdate): Designed to prevent inexperienced users from installing updates that are unnecessary or require a certain level of knowledge to configure properly. It assigns updates a safety level (from 1 to 5), based on the stability and necessity of the update. Updates can be set to notify users (as is normal), be listed but not notify, or be hidden by default. In addition to including updates specifically for the Linux Mint distribution, the development team tests all package-wide updates. In newer versions of the operating system, this safety level mechanism is largely deactivated in favour of system snapshots created by the Timeshift tool.
Main Menu (mintMenu): Created for the MATE desktop environment. It is a menu of options including filtering, installation, and removal of software, system and places links, favourites, session management, editable items, custom places and many configuration options.
Backup Tool (mintBackup): Enables the user to back up and restore data. Data can be backed up before a fresh install of a newer release then restored.
Upload Manager (mintUpload): Defines upload services for FTP, SFTP and SCP servers. Services are then available in the system tray and provide zones where they may be automatically uploaded to their corresponding destinations. As of Linux Mint 18.3, this software is no longer installed by default but is still available in the Linux Mint software repositories.
Domain Blocker (mintNanny): A basic domain blocking parental control tool introduced with v6. Enables the user to manually add domains to be blocked system-wide. As of Linux Mint 18.3, this software is no longer installed by default but is still available in the Linux Mint software repositories.
Desktop Settings (mintDesktop): A tool for configuration of the desktop.
Welcome Screen (mintWelcome): Introduced in Linux Mint 7, an application that starts on the first login of any new account. It provides links to the Linux Mint website, user guide, and community website.
USB Image Writer/USB Stick Formatter (mintStick): A tool for writing an image onto a USB drive or formatting a USB stick.
System Reports (mintReport): Introduced in Linux Mint 18.3, the purpose of System Reports is to allow the user to view and manage automatically generated application crash reports.
Installation
Linux Mint can be booted and run from a USB flash drive on any PC capable of booting from a USB drive, with the option of saving settings to the flash drive. A USB creator program is available to install on Ubuntu (but not LMDE) Live Linux Mint on a USB drive. Alternatively, the Linux Mint ISO can be burned to a DVD to boot from.
The Windows installer Mint4Win allows Linux Mint to be installed from within Microsoft Windows, much like the Wubi installer for Ubuntu. The operating system could then be removed, as with other Windows software, using the Windows Control Panel. This method requires no partitioning of the hard drive. It is only useful for Windows users, and is not meant for permanent installations because it incurs a slight performance loss. This installer was included on the Live DVD until Linux Mint 16 but removed in the Linux Mint 16 'Petra' release because the size of the Live DVD images would have exceeded what the software could reliably handle.
Installation supports a Logical Volume Manager (LVM) with automatic partitioning only, and disk encryption since Linux Mint 15. UTF-8, the default character encoding, supports a variety of non-Roman scripts.
Editions
Linux Mint has multiple editions that are based on Ubuntu, with various desktop environments available. Linux Mint also has an edition based on Debian.
Ubuntu-based editions
As of Linux Mint 13, there are two main editions of Linux Mint developed by the core development team and using Ubuntu as a base. One includes Linux Mint's own Cinnamon as the desktop environment while the other uses MATE. Linux Mint also develops an additional version that features the Xfce desktop environment by default; since the release of version 19 (Tara) in June 2018, the three editions are released simultaneously.
Beginning with the release of Linux Mint 19, the KDE edition was officially discontinued; however, the KDE 17.x and 18.x releases will continue to be supported until 2019 and 2021, respectively. Older releases, now also obsolete, included editions that featured the GNOME, LXDE, and Fluxbox desktop environments by default.
Cinnamon (Edge) Edition
In addition to its regular ISO images, Linux Mint sometimes provides an “edge” ISO image for its latest release. This image ships with newer components to be able to support the most modern hardware chipsets and devices.
OEM version
The distribution provided an OEM version for manufacturers to use; however, this version was discontinued with the release of v18 Sarah in order to reduce the number of ISO images that needed to be maintained. Manufacturers wanting to perform an OEM install now have the option to choose so in the live CD boot menu.
No Codecs version
The distribution provided a 'No Codecs' version for magazines, companies, and distributors in the United States, Japan, and countries where the legislation allows patents to apply to software and distribution of restricted technologies may require the acquisition of third-party licences; however, this version was discontinued with release of v18 Sarah. Users now have the option of whether or not to install multimedia codecs during the installation; additionally, multimedia codecs can also be installed via a link on the Mint Welcome Screen any time after installation.
LMDE
The Linux Mint Debian Edition (LMDE) uses Debian Stable as the software source base rather than Ubuntu. LMDE was originally based directly on Debian's Testing branch, but is designed to provide the same functionality and look and feel as the Ubuntu-based editions. LMDE has its own package repositories.
LMDE claims certain advantages and disadvantages compared to 'Mint Main' (i.e., the Ubuntu-based editions):
LMDE is faster and more responsive than Ubuntu-based editions.
LMDE requires a deeper knowledge and experience with Linux and Debian package management.
Debian is less user-friendly and desktop-ready than Ubuntu, with some rough edges.
LMDE 1
The original LMDE (now often referred to as LMDE 1) had a semi-rolling release development model, which periodically introduced 'Update Packs' (tested snapshots of Debian Testing). Installing an Update Pack allowed the user to keep LMDE 1 current, without having to reinstall the system every six months as with Mint Main. As of May 17, 2015, it has an upgrade path to LMDE 2.
LMDE 2
LMDE 2 (a.k.a. Betsy) was released on April 10, 2015. LMDE 2 is based on Debian Stable, but receives automatic updates to the latest versions of MintTools and the installed desktop environment before they are released into the Mint Main edition. LMDE 2 is available with both the MATE and Cinnamon desktop environments. Both image versions received an update in January 2017. As of the start of 2019, this version is no longer supported.
LMDE 2 remains based on sysvinit but with a 'functional logind' from systemd.
LMDE 3
LMDE 3 (a.k.a. Cindy) is 'very likely' to complete the switch to systemd from sysvinit. It is based on Debian Stretch, and was released on August 31, 2018, shipping as a single edition with Cinnamon. As of July 1, 2020, this version is no longer supported.
LMDE 4
LMDE 4 (a.k.a. Debbie) is based on Debian Buster (version 10), and was released on March 20, 2020. It is the current version of LMDE. This version ships as a single edition using Cinnamon.
LMDE 5
LMDE 5 (a.k.a. Elsie) will be based on Debian Bullseye (version 11). It will ship with a Cinnamon desktop environment and support both amd64 and i386 architectures.
Development
Individual users and companies using the operating system act as donors, sponsors and partners of the distribution. Linux Mint relies on user feedback to make decisions and orient its development. The official blog often features discussions where users are asked to voice their opinion about the latest features or decisions implemented for upcoming releases. Ideas can be submitted, commented upon and rated by users via the Linux Mint Community Website.
The community of Linux Mint users use Launchpad to participate in the translation of the operating system and in reporting bugs.
Most development is done in Python and organized online using GitHub, making it easy for developers to provide patches, implement additional features, and also fork Linux Mint sub-projects (for example the Linux Mint menu was ported to Fedora). With each release, features are added that are developed by the community. In Linux Mint 9, for instance, the ability to edit menu items is a feature that was contributed by a Linux Mint user.
Reception
In May 2013, David Hayward of TechRadar praised Linux Mint for focusing on desktop users.
In a 2012 online poll at Lifehacker, Linux Mint was voted the second best Linux distribution, after Ubuntu, with almost 16% of the votes. In October 2012 (Issue 162), Linux Format named Linux Mint the best distro for 2012. In July 2013 (Issue 128), Linux User & Developer gave Linux Mint 15 'Olivia' a score of 5/5, stating 'We haven't found a single problem with the distro ... we're more than satisfied with the smooth, user-friendly experience that Linux Mint 15, and Cinnamon 1.8, provides for it to be our main distro for at least another 6 months'.
Reviews of Linux Mint 18 'Sarah' were somewhat mixed, with several that were quite favourable and others critical of several specific new problems, with multiple reviews complaining about the lack of multimedia/codec support by default. Multimedia codecs that had previously been included in the standard Mint distribution were no longer included in 'Sarah', but could be loaded with a graphical application that one Ars Technica reviewer said should be obvious for new users.
ZDNet Contributing Editor Steven J. Vaughan-Nichols reviewing Linux Mint 19 and LM 19.1 in articles 'The Linux Mint desktop continues to lead the rest' in July 2018 and 'The better-than-ever Linux desktop' in December 2018 noted quality, stability, security and user-friendliness of Linux Mint comparing to other popular distributions. In ZDNet review of Linux Mint 19.2, it was noted '... after looking at many Linux desktops year in and out, Linux Mint is the best of the breed. It's easy to learn (even if you've never used Linux before), powerful, and with its traditional windows, icons, menus, and pointers (WIMP) interface, it's simple to use'.
Minimum hardware requirements
For Linux Mint 20.2, either Cinnamon, MATE, or XFCE edition:
2 GB RAM (4 GB recommended)
20 GB of hard-drive space (100 GB recommended)
Screen of 1024×768 resolution
Either a CD/DVD drive or a USB port for the installation media
Internet access is helpful
Versions prior to Linux Mint 20 allowed booting from either i386 (32 bit) or amd64 (64 bit) architectures.
Starting with Linux Mint 20 only the amd64 (64 bit) architecture will be supported. This is because Canonical decided to drop 32-bit support from Ubuntu 20.04, which is the base from which Linux Mint 20 is derived. LMDE still supports the x86 architecture.
See also
List of Ubuntu-based Linux distributions
References
Further reading
External links
Differences in Linux Mint desktop choices - Cinnamon, MATE, Xfce, or KDE
Computer-related introductions in 2006
2006 software
Ubuntu derivatives
X86-64 Linux distributions
Free software operating systems
Linux distributions
|
4218602
|
https://en.wikipedia.org/wiki/Tommy%20Prothro
|
Tommy Prothro
|
James Thompson "Tommy" Prothro Jr. (July 20, 1920 – May 14, 1995) was an American football coach. He was the head coach at Oregon State University from 1955 to 1964 and the University of California, Los Angeles (UCLA) from 1965 to 1970, compiling a career college football record of 104–55–5 ().
Prothro moved to the professional ranks of the National Football League (NFL) in 1971 as head coach of the Los Angeles Rams, a position he held for two seasons. He then coached the San Diego Chargers from 1974 to 1978, tallying a career NFL mark of 35–51–2 (). Prothro was inducted into the College Football Hall of Fame as a coach in 1991.
Early life and playing career
Prothro, a native of Memphis, Tennessee, was the son of major league baseball player and manager Doc Prothro, who played for three teams between 1920 and 1926, then managed the Philadelphia Phillies from 1939 to 1941 before buying the minor league Memphis Chicks. His uncle, Clifton B. Cates, was commandant of the United States Marine Corps from 1948 to 1952.
The younger Prothro found his niche in football, starting out as a quarterback for Wallace Wade's Duke Blue Devils. In 1941, Prothro's versatility on the field helped him win the Jacobs award as the best blocker in the Southern Conference as the Blue Devils reached the 1942 Rose Bowl. During his time at the school, Prothro also competed in baseball and lacrosse, and graduated from the school in 1942 with a degree in political science.
Prothro was selected in the fifth round of the 1942 NFL Draft by the New York Giants, but rejected the opportunity in favor of a budding coaching career and a brief attempt at professional baseball.
Assistant coaching career and military service
Prothro spent that fall as an assistant coach at Western Kentucky University. He then entered the U.S. Navy during World War II, serving for 39 months. Prothro was promoted to lieutenant and served as a gunnery officer aboard the USS Breton (CVE023), an escort aircraft carrier.
After the war, Prothro served from 1946 to 1948 as an assistant coach at Vanderbilt University, under head coach Red Sanders, coaching the freshmen during his first year. When Sanders became head coach at UCLA, he brought Prothro with him. Over the next six years, Prothro used the single-wing formation as UCLA's backfield coach, helping the Bruins to an undefeated season and national championship in 1954.
College head coaching career
Oregon State
That success translated into his hiring as head coach at Oregon State College on February 1, 1955. The Beavers had won just one of nine games the previous season, but improved to six wins in Prothro's first season, then reached the 1957 Rose Bowl. In 1962, the Beavers won a 6–0 decision over Villanova University in the Liberty Bowl; they were led by quarterback Terry Baker, who won the Heisman Trophy. Baker's 99-yard run from scrimmage was the only score in the game and remains an NCAA record. In 1964, Oregon State were admitted into the AAWU and tied for first place with USC. Due to their recent entry into that conference with schedules set years in advance, the Beavers and Trojans did not meet in 1964. Although Oregon State was assured of a better overall record (8–2) than USC (6–3), the AAWU announced it would delay its decision regarding the Rose Bowl berth until after USC's final game vs. undefeated and top-ranked Notre Dame. This made USC fans infer that, if the Trojans had a strong showing against heavily favored Notre Dame, they might somehow get the Rose Bowl berth despite Oregon State's better record. USC upset Notre Dame, 20–17, and USC fans were outraged when Oregon State was awarded the Rose Bowl anyway. This would be a factor two years later. In the 1965 Rose Bowl, the Beavers went ahead 7–0 in the second quarter, but went on lose big to Michigan 34–7. Ten days later, Prothro left Oregon State to replace Bill Barnes at UCLA. Prothro compiled a 63–37–2 mark in his decade at Oregon State, with only one losing season. He was replaced by Dee Andros, the head coach at Idaho, whose Vandals had played Oregon State tough in 1964 in Corvallis, defeated 10-7 by a late third quarter OSU punt return. The previous year, he led Idaho to its first winning season in a quarter century.
UCLA
1965
On January 11, 1965, he was hired as head coach at UCLA to replace William F. Barnes. In the 1965 football season, the Bruins lost their season opening game 13–3 at Michigan State, who then rose to become the top-ranked team in the country. The unheralded Bruins would go on a seven-game undefeated streak, surprising national powers like Syracuse and Penn State. Going into the 1965 UCLA–USC rivalry football game ranked #7, the conference championship and 1966 Rose Bowl were on the line. #6 USC, led by Heisman Trophy winner Mike Garrett led 16–6 until UCLA got a touchdown on a pass from Gary Beban to Dick Witcher with four minutes to play. After the two-point conversion made it 16–14, UCLA recovered an onside kick. Beban then hit Kurt Altenberg on a 50-yard bomb and UCLA won, 20–16. Integrated UCLA then faced all-white Tennessee in the newly built Liberty Bowl stadium in Memphis, Prothro's native city. On the last play of the game, Tennessee defensive back Bob Petrella intercepted a UCLA pass to save a Volunteer win by a score of 37–34. Tennessee's winning drive was aided by a controversial pass interference call, the clock had questionably stopped twice, and a dropped pass that appeared to be a lateral was recovered by UCLA but was later ruled an incomplete forward pass. After the game, Prothro stated, "For the first time in my life, I am ashamed to be a Southerner."
The Bruins went to the 1966 Rose Bowl as a 14½ point underdog in a rematch with undefeated and #1 ranked powerhouse Michigan State. UCLA, now dubbed "The Miracle Bruins" by Sports Illustrated, vanquished the heavily favored Spartans 14–12. That victory gave UCLA an 8–2–1 mark, prevented the Spartans from winning the AP title, and resulted in Prothro earning Coach of the Year accolades from his coaching colleagues. UCLA finished #4 that season, and due to their small size, earned the moniker "Gutty little Bruins."
1966
Heading into the final game of the 1966 season vs. USC, UCLA was 2–1 in conference games, 8–1 overall and ranked #5 in the country. The Bruins, featuring a "dream backfield" of All-Americans Gary Beban and Mel Farr, lost only one game, at rainy Washington, 16–3, where Huskies' head coach Jim Owens had devoted his entire season to beating Prothro. UCLA had beaten UW the season before, 28–24, with Prothro's trick play, the Z-streak in which a receiver trots towards the sideline like he's going out of the game and then runs a streak pattern unguarded by the inattentive defender. USC was 4–0 in conference and 7–1 overall, having lost to the unranked Miami Hurricanes. The Bruins and Trojans played a different number of conference games due to uneven scheduling caused by new AAWU members Oregon and Oregon State and schedules made years in advance. It was widely assumed that only losses would be considered and the winner of the 1966 UCLA-USC game would go to the 1967 Rose Bowl. UCLA star quarterback Gary Beban broke his ankle the week before in a win over Stanford, but backup Norman Dow, making his first and only start at quarterback, led UCLA to a 14–7 win. That left USC with a 4–1 conference record (7–2 overall) and #5 UCLA with a 3–1 conference record (9–1) overall. Due to their win over USC, it was widely assumed UCLA would get the Rose Bowl berth. However, a vote the next Monday among the AAWU conference athletic directors awarded USC the Rose Bowl berth. It was speculated that the directors believed Beban could not play for UCLA in the Rose Bowl due to the broken ankle, thereby giving the Big Ten Conference representative, Purdue, a better chance to win. As it turned out, Beban could have played. But a bigger reason was that this was to make up for 1964 when Oregon State was voted in ahead of USC. The coach of Oregon State in 1964 was Prothro. Another speculation was the vote was against UCLA out of pure jealousy by the rest of the conference, which voted 7–1 for the clearly inferior team. This vote deprived Prothro of being the first coach to earn three consecutive Rose Bowl berths and UCLA athletic director J. D. Morgan called it a "gross injustice" and the "a dark day in UCLA and AAWU Athletic history." Inflamed UCLA students who had gathered for the Rose Bowl celebration rally, took to the streets of Westwood in protest and actually blocked the 405 Freeway for a short time. Ironically, Morgan was the force behind establishing a tie-breaking method adopted by the conference one year later in which only loss column counted; the first tiebreaker was head-to-head results, followed by overall record. If there was still a tie, the Rose Bowl berth would go to the team that had not played in the Rose Bowl the longest. But it was too late for UCLA. In their final game, USC made the AAWU decision look bad by losing at home in the L.A. Coliseum to Notre Dame, 51–0. They went on to lose the Rose Bowl as well to Purdue, 14–13, finishing the season at 7–4.
1967
Two years later, Prothro helped a second quarterback capture the Heisman Trophy when Gary Beban was awarded the trophy after the regular season. He would bring his #1 ranked UCLA Bruin team to face #2 USC in one of the "Games of the Century". Despite playing with cracked ribs, Beban threw for 301 yards, but UCLA lost, 21–20, on a spectacular 64-yard run by O. J. Simpson in the 1967 USC vs. UCLA football game. Another big factor was UCLA's acclaimed sophomore kicker Zenon Andrusyshyn missing a chip shot field goal, and having two field goals and an extra point attempt blocked.
1968
In what was acknowledged to be a rebuilding year, the Bruins opened the 1968 season with a 63–7 defeat of Pittsburgh and a win over Washington State. The season ground to a halt at Syracuse and with the season-ending injury of quarterback Billy Bolden, and UCLA would win only one more game, over Stanford 20–17. The Bruins gave #1 USC and Heisman Trophy winner O. J. Simpson a scare in a 28–16 loss; UCLA trailed 21–16 late in the fourth quarter and had the ball inside USC's 10-yard line, but USC recovered a fumble and then used almost all of the remaining time in driving for their insurance touchdown.
1969
This was the year Prothro had geared his recruiting efforts towards as he believed this was his best team and was capable of contending for the national championship. The Bruins, quarterbacked by a sensational Jr. College transfer Dennis Dummit discovered by Prothro, were undefeated until they faced #10 Stanford in Palo Alto. Once again, Prothro was let down by now senior kicker Zenon Andrusyshyn as he missed a short field goal late in the game with the score tied 20–20. Suddenly, two long Jim Plunkett passes had Stanford in field goal range in the final seconds, but UCLA blocked Steve Horowitz's field goal attempt, and preserved the tie.
Once again, the UCLA-USC game would decide the Pac-8 title and the 1970 Rose Bowl berth. UCLA was ranked 6th with a 5–0–1 record in conference and 8–0–1 overall USC was #5 and was 6–0 in conference and 8–0–1 overall (tied Notre Dame in South Bend, 14–14); UCLA and USC were both unbeaten coming into their rivalry game for the first time since 1952. UCLA scored midway through the fourth quarter to take a 12–7 lead (knowing he need a win and not a tie to advance to the Rose Bowl, Prothro had the Bruins go for two after each touchdown and each attempt failed). USC then drove to the winning touchdown with 1:38 to play to win 14–12. The Trojans were aided by two controversial calls; the first was a dubious pass interference call on UCLA's Danny Graham on a 4th-and-10 incompletion. Secondly, on the winning touchdown pass reception, USC receiver Sam Dickerson appeared to be either out of bounds, out of the back of the end zone, or both. This loss supposedly was harder for Prothro to take than the 1967 loss and the freak officiating calls resembled the debacle at Tennessee in 1965.
1970
In his final season at UCLA, Prothro's team suffered a rash of key injuries and finished 6–5, yet they were three close games from a 9–2 season and Rose Bowl berth. Before those injuries set in, UCLA took a 3–0 record into Austin to play defending national champ and top ranked Texas. Trailing 13–3 at the half, UCLA rallied and had a 17–13 lead in the final minute. But with 12 seconds left, Texas completed a long pass when their receiver caught the ball between two UCLA defenders, who then collided, allowing the receiver to score. UCLA also blew a 20-point fourth quarter lead against Oregon, when Ducks sophomore quarterback Dan Fouts rallied his team to three touchdowns and a 41–40 win. Finally, there came the showdown with Stanford; the game was expected to be a shootout between UCLA quarterback Dennis Dummit and Heisman winner Jim Plunkett. But the defenses ruled as UCLA took a 7–6 lead into the 4th quarter. Stanford took a 9–7 lead on a field goal, but UCLA was driving to a potential game-winning field goal or touchdown themselves when they completed a pass inside the Stanford 10-yard-line, only to have the receiver get sandwiched by two defenders on the tackle and fumble. This game ultimately decided the Pac-8 championship and 1971 Rose Bowl representative. The season ended on a high note however, when UCLA beat rival USC, 45–20, in a game that was not that close. This would end up being Prothro's final game at UCLA. Prothro was frustrated by bizarre officiating at critical moments, numerous last minute narrow losses, and losing out of the Rose Bowl by the conference vote in 1966. Prothro also decried the Pac-8 rule that only allowed the conference champion to go to a bowl game; he witnessed many lower ranked inferior teams (often ones he defeated during the season) go to bowl games while his Bruins stayed home. After George Allen was fired by the Los Angeles Rams, Prothro accepted that job.
The briefcase
One of Prothro's unusual characteristics was the fact he carried a briefcase to the sidelines in each game he coached at Oregon State and UCLA. Dressed in a suit and tie, fedora, and thick black framed glasses, he looked more like he was going to a business meeting than to coach a football game. The mystery was nobody knew what, if anything, was in the briefcase. Prothro was never seen opening it during games, and even his players weren't sure what was in it. Some speculated game plans, some thought scouting reports, and some thought it was empty. Los Angeles Times sports columnist Jim Murray once suggested in jest that all the briefcase contained was "a couple of peanut-butter sandwiches."
NFL head coaching career
Los Angeles Rams
On January 2, 1971, Prothro accepted a new challenge when he was hired as head coach of the Los Angeles Rams. In the first season, playing the league's toughest schedule, he guided an aging Rams team to an 8–5–1 record, missing the playoffs when the San Francisco 49ers came from behind to beat the Detroit Lions, 31–27, in the season's final game and win the NFC West by one half game. In his second year, the Rams showed their age when injuries hit the team in the second half of the season. After starting 5–2–1, the Rams lost five of their last six games to finish 6–7–1, good for third place in the NFC West. After two seasons in which he compiled a 14–12–2 record and failed to reach the playoffs, Prothro was dismissed on January 24, 1973, in favor of Chuck Knox. However, Prothro left his mark on the team by trading many aging veterans, often to George Allen's Washington Redskins, and stocking up young talent and draft picks; players such as Lawrence McCutcheon, Isiah Robertson, Dave Elmendorf, Larry Brooks, Jim Bertelsen, Jack "Hacksaw" Reynolds, and Hall of Famer Jack Youngblood were the core of the Rams teams of the 1970s that won seven straight NFC Western division titles.
Six weeks after his departure, Prothro filed a $1.9 million lawsuit against the Rams, alleging new Rams owner Carroll Rosenbloom breached his contract by dismissing him "without cause". However, on May 23, 1973, the two sides settled out of court, with Prothro being paid $225,000 to cover the final three years of his contract. For the next eight months, Prothro remained out of the game, actively pursuing investment strategies, as well as his main hobby, competitive bridge.
San Diego Chargers
The San Diego Chargers then hired Prothro as their new head coach on January 8, 1974, and also put him in charge of rebuilding the once-proud franchise that had become mired in mediocrity and a drug scandal. During his first two years, the team continued to struggle, going 5–9 in 1974 and bottoming out with a 2–12 mark in 1975. But from 1974 to 1977, Prothro also drafted a number of players who would have a major impact on the franchise in years to come. Some of these players included wide receiver John Jefferson, centers Bob Rush and Don Macek, linebackers Woodrow Lowe and Don Goode, defensive linemen Gary "Big Hands" Johnson, Louie Kelcher and Fred Dean. He was also instrumental in the development of Dan Fouts into a hall of fame quarterback.
These drafts paid immediate dividends as the Chargers improved to 6–8 in 1976, and 7–7 in 1977, including a 12–7 win over rival Oakland that cost the Raiders the division title. The team seemed ready to make their move during the 1978 NFL season. However, a 1–3 start, marked by a loss to the Raiders in what became known as the Holy Roller game of September 10 that ultimately cost the Chargers a playoff spot, caused Prothro to abruptly resign as head coach in favor of Don Coryell. The Chargers finished 1978 with a 9–7 record, their first winning season since 1969, and the team he helped build then won three straight AFC Western Division titles and made the playoffs every year from 1979 to 1982.
Cleveland Browns
After less than five months away from the game, Prothro once again returned on February 14, 1979, this time as Player Personnel Director of the Cleveland Browns. During his three years with the team, he was responsible for drafting future Pro Bowl players Cody Risien and Hanford Dixon among others. The Browns improved from an 8–8 record in 1978 to 9–7 in 1979, and then supplanted the two time defending Super Bowl champion Pittsburgh Steelers as AFC Central Division champs in 1980 with an 11–5 record. Known as the "Kardiac Kids," the team, in both 1979 and 1980, won several games near the end of regulation
or in overtime. Only an ill-advised interception in the end zone (when the Browns were in easy field goal range) in a 14–12 playoff loss to the Oakland Raiders cost Cleveland a shot at Prothro's former team, the Chargers, in the AFC title game. He resigned his post with Cleveland after the 1981 season.
Retirement
Prothro would not return to football in any official capacity for the remainder of his life, but was honored for his career efforts by selection to the UCLA Athletic Hall of Fame in 1985, the Oregon Sports Hall of Fame in 1989, and the College Football Hall of Fame in 1991. An expert bridge player, for a number of years he partnered with Omar Sharif in international competition. He died in 1995 after a three-year battle with cancer.
Legacy
Prothro was known as a master tactician with an uncanny ability to get the most out his players and team. His teams were often not as physically gifted or they were much smaller than their opponents, but through great teamwork, superior game plans, and an assortment of trick plays, they often made up for physical disadvantages by outsmarting the other teams. Even in the pros, he had an aging Rams team in playoff contention until the final game of the season, often relying on outsmarting other teams that had better talent. As a disciple of the single wing formation under Red Sanders, Prothro preferred athletic quarterbacks who could run and pass (Terry Baker, Gary Beban), even bringing some of that philosophy to the pros and having Rams QB Roman Gabriel make some big plays on designed runs. He later made his mark as an excellent evaluator and developer of talent as he built the Chargers and Browns from being sub-.500 teams to division champions.
On August 22, 2016, The Tournament of Roses announced Bobby Bell, Ricky Ervins, Tommy Prothro, and Art Spander would be inducted into the Rose Bowl Hall of Fame in the Class of 2016. The Rose Bowl Hall of Fame Induction Ceremony then took place on January 1, 2017, outside the Rose Bowl Stadium, one day before the kickoff of the 103rd Rose Bowl Game on Monday January 2, 2017.
Head coaching record
College
Professional
References
External links
1920 births
1995 deaths
Cleveland Browns executives
Duke Blue Devils football players
Los Angeles Rams coaches
Oregon State Beavers football coaches
San Diego Chargers coaches
UCLA Bruins football coaches
Vanderbilt Commodores football coaches
Western Kentucky Hilltoppers football coaches
College Football Hall of Fame inductees
United States Navy personnel of World War II
United States Navy officers
American contract bridge players
Players of American football from Memphis, Tennessee
Sportspeople from Memphis, Tennessee
Deaths from cancer in Tennessee
|
59006704
|
https://en.wikipedia.org/wiki/Xiang%20Li%20%28hacker%29
|
Xiang Li (hacker)
|
Xiang Li () is a Chinese computer hacker. He is serving a twelve-year sentence in federal prison in the United States.
Early life
Li was born in Chengdu, China in 1979.
Career
From Chengdu, he operated "CRACK99", a website that sold stolen software globally from 2008 until his arrest by U.S. authorities in 2011. During that time, he sold over $100 million in industrial-grade software, the access controls of which had been circumvented by software cracking. The software had civilian and military applications, including aerospace and aviation simulation and design, communications systems design, electromagnetic simulation, explosives simulation, intelligence analysis, precision tooling, oil field management, and manufacturing plant design.
Operation, arrest and prosecution
Investigation
One of the software titles for sale on CRACK99 was "Satellite Tool Kit 8.0" ("STK"), now known as Systems Tool Kit, designed by Analytical Graphics Incorporated (AGI) to enable the U.S. military to simulate missile launches and flight trajectories of aircraft and satellites. AGI brought this fact to the attention of U.S. Department of Homeland Security Investigations in December 2009. A team of prosecutors and agents from the Department of Justice, Homeland Security and the Defense Criminal Investigative Service initiated an undercover investigation in 2010. As part of that investigation, federal agents purchased STK software from the CRACK99 website, as well as other advanced software used in spacecraft design and programmable logic devices.
Lurement and arrest in Saipan
U.S. undercover agents posed as criminals who were reselling software obtained from CRACK99. Li and the agents engaged in lengthy email and Skype conversations about increasing sales by expanding the U.S. market. Ultimately, Li agreed to meet the agents in Saipan to discuss future business opportunities. On June 6, 2011, Li met with undercover agents in Saipan. Li provided agents with 20 gigabytes of proprietary data hacked from a defense contractor.
"It's the database," explained Li, "I was thinking [it] would be difficult to pass through the custom." This data included military and civilian aircraft image models, a software module containing data associated with the International Space Station, and a high resolution, 3-dimensional imaging program.
Li further advised the undercover agents: "Don’' just sell it … randomly! … Only the familiar and reliable customers… The products…are pretty…um…like confidential. [Don’t]… go and tell other people."
The agents asked if Xiang Li could get software in addition to what he had listed on CRACK99. "I mean as long as [you] can tell me the name," Li said, "I could find a way to get it ...." Xiang Li asked the agents: "I want to ask a question. … Will [your] customers be able to find me? Will [they] be also contacting me? …. Will [the customers] be able to locate me?"
Shortly thereafter, Li was arrested, waived his right to remain silent, and confessed to his crimes.
Conviction
A federal grand jury indicted Li on multiple federal charges involving the sale of more than $100 million in stolen software. The $100 million figure was based on the results from search warrants executed on Xiang Li's email accounts, which revealed about 600 illegal transactions between April 2008 and August 2010. In January 2013, the federal district court in Delaware accepted Li's guilty plea to one count each of conspiracy to commit criminal copyright infringement and conspiracy to commit wire fraud, exposing him to a maximum of 25 years of incarceration.
In June 2013, the court held a sentencing hearing. Li contended that software piracy was "prevalent" in China, opining that "[p]robably ten million people in China are doing things illegally with software." The U.S. government agreed that cyber theft is prevalent in China, but contended that the prevalence of Chinese piracy is not a defense, and pointed the court to a report estimating that China's illegal software market reached $9 billion in 2011, out of a total market of nearly $12 billion, thus setting a piracy rate of 77 percent. The government emphasized the advanced nature of the software sold by Li and the fact that many of the software products had military applications.
The court noted the extensive amount of crime that the defendant was engaged in, finding: "This was nothing less than a crime spree, and it was brazen." The court found that the software was "highly sophisticated" and "ended up with individuals and sometimes in countries that are not authorized to have those software materials". The court sentenced Li to 12 years in prison, the longest criminal copyright sentence ever imposed. The Xiang Li case was featured in the CNN series Declassified.
American customers
Li sold software worth over $600,000 to Dr. Ronald Best, the “Chief Scientist” of a U.S. defense contractor involved in applications such as radio communication, radar, and microwave technology. Best used the cracked software to design components for Patriot missiles and radar for Marine One (the President's helicopter) and the Army's Blackhawk helicopter.
Another U.S. customer was Cosburn Wedderburn, who purchased over $1,000,000 in stolen software. At the time, Wedderburn was a NASA engineer.
References
1977 births
Living people
People from Chengdu
Hacking (computer security)
21st-century Chinese criminals
Chinese male criminals
|
2328658
|
https://en.wikipedia.org/wiki/Apache%20Derby
|
Apache Derby
|
Apache Derby (previously distributed as IBM Cloudscape) is a relational database management system (RDBMS) developed by the Apache Software Foundation that can be embedded in Java programs and used for online transaction processing. It has a 3.5 MB disk-space footprint.
Apache Derby is developed as an open source project under the Apache 2.0 license. For a time, Oracle distributed the same binaries under the name Java DB. In June 2015 they announced that for JDK 9 they would no longer be doing so.
History
Apache Derby originated at Cloudscape Inc, an Oakland, California, start-up founded in 1996 by Nat Wyatt and Howard Torf to develop Java database technology. The first release of the database engine, then called JBMS, was in 1997. Subsequently, the product was renamed Cloudscape and releases were made about every six months.
In 1999 Informix Software, Inc., acquired Cloudscape, Inc. In 2001 IBM acquired the database assets of Informix Software, including Cloudscape. The database engine was re-branded to IBM Cloudscape and releases continued, mainly focusing on embedded use with IBM's Java products and middleware.
In August 2004 IBM contributed the code to the Apache Software Foundation as Derby, an incubator project sponsored by the Apache DB project. In July 2005 the Derby project graduated from the Apache incubator and is now being developed as a sub-project of the DB Top Level Project at Apache. Prior to Derby's graduation from incubation, Sun joined the Derby project with an intent to use Derby as a component in their own products, and with the release of Java 6 in December 2006, Sun started packaging Derby in the JDK branded as Java DB.
In March 2007 IBM announced that they would withdraw marketing and support for the Cloudscape product, but would continue to contribute to the Apache Derby project.
The Java DB database is Oracle's supported distribution of Apache Derby.
Technologies
Derby embedded database engine
The core of the technology, Derby's database engine, is a full-functioned relational embedded database-engine, supporting JDBC and SQL as programming APIs. It uses IBM DB2 SQL syntax.
Derby Network Server
The Derby network server increases the reach of the Derby database engine by providing traditional client server functionality. The network server allows clients to connect over TCP/IP using the standard DRDA protocol. The network server allows the Derby engine to support networked JDBC, ODBC/CLI, Perl.
Embedded Network Server
An embedded database can be configured to act as a hybrid server/embedded RDBMS; to also accept TCP/IP connections from other clients in addition to clients in the same JVM.
Database utilities
ij: a tool that allows SQL scripts to be executed against any JDBC database.
dblook: Schema extraction tool for a Derby database.
sysinfo: Utility to display version numbers and class path.
See also
List of relational database management systems
Comparison of relational database management systems
H2
HSQLDB
References
Bibliography
External links
Internals of Derby, An Open Source Pure Java Relational Database Engine deployable in an embedded OSGi environment
Oracle Java DB Site
Why IBM is open sourcing Cloudscape as Derby, IBM developerWorks site
Apache Derby performance results in the JPA Benchmark
Compliance matrix with SQL 2003
Configure and Install Derby Database
Derby
Free database management systems
Free software programmed in Java (programming language)
IBM software
Software using the Apache license
|
35875424
|
https://en.wikipedia.org/wiki/Surround%20SCM
|
Surround SCM
|
Surround SCM is a software configuration management application developed by Seapine Software, now owned by Perforce since 2017. Perforce integrated the software with its Helix ALM product.
Architecture
Surround SCM has a client–server architecture. The server manages a central database of file versions and branches. Users work on files on their local hard drive and submit changed files together in changelists. The client and server communicate via a TCP/IP connection using 512-bit encryption.
Server
Surround SCM stores data in an industry-standard relational database management system. The database contains both the file contents and metadata (file state, file attributes, branching and merging history, changelists, filters, users, groups, labels, etc.). A proxy server can optionally be installed to improve performance of file retrievals for distributed teams.
Clients
There are several different categories of Surround SCM clients: GUI, CLI, API, Web UI, and plugin.
The cross-platform GUI client is developed with Qt and available on Windows, Mac OS X, and Linux. It fully supports all end-user operations and administration operations.
The command line interface (CLI) is also available on Windows, Mac OS X, and Linux. The CLI can be used in any command shell or script. Build scripts generally access Surround SCM files via the CLI.
Surround SCM’s open API allows users to write applications that access branches, repositories, and files on the Surround SCM Server using the C, Java, and .Net programming languages.
The plugin interfaces integrate Surround SCM client functionality into third-party applications. Surround SCM plugins are available for Eclipse, IntelliJ IDEA, KDevelop, Visual Studio, NetBeans, JDeveloper, PowerBuilder, WebStorm, Windows Explorer, Mac OS X Finder, Linux file system, Bugzilla, JIRA, Microsoft TFS, TestTrack, Ant, NAnt, Hudson, Jenkins, TeamCity, CruiseControl, CruiseControl.NET, Dreamweaver, FinalBuilder, Microsoft Office, and QA Wizard.
Release History
Major release versions of Surround SCM, along with their release dates:
version 1.0 (September 3, 2002)
version 1.1 (October 1, 2002)
version 1.2 (January 29, 2003)
version 1.5 (April 21, 2003)
version 2.0 (August 26, 2003)
version 2.1 (December 15, 2003)
version 3.0 (August 2, 2004)
version 3.1 (February 7, 2005)
version 4.0 (July 19, 2005)
version 4.1 (January 30, 2006)
version 5.0 (November 2, 2006)
version 2008.0 (October 9, 2007)
version 2008.1 (April 21, 2008)
version 2009.0 (February 5, 2009)
version 2009.1 (June 30, 2009)
version 2010.0 (November 16, 2009)
version 2010.1 (May 3, 2010)
version 2011.0 (October 21, 2010)
version 2011.1 (June 1, 2011)
version 2012.0 (February 9, 2012)
version 2012.1 (March 9, 2012)
version 2013.0 (October 22, 2012)
version 2013.1 (March 20, 2013)
version 2013.2 (September 12, 2013)
version 2014.0 (March 14, 2014)
version 2014.1 (September 5, 2014)
version 2015.0 (December 17, 2014)
version 2015.1 (September 8, 2015)
version 2016.0 (April 11, 2016)
version 2016.1 (October 6, 2016)
version 2017.1 (April 24, 2017)
version 2017.2 (September 18, 2017)
version 2018.1 (March 5, 2018)
version 2018.2 (August 30, 2018)
version 2019.1 (February 11, 2019)
version 2019.2 (October 15, 2019)
version 2020.1 (May 26, 2020)
version 2021.1 (July 28, 2021)
Features
Surround SCM features include:
Branching and merging
File and change set labeling
Graphical file history
Changelist and atomic transactions
Filters
Search file contents
Shelves
Configurable workflow
Email notifications
Custom fields
Code review capabilities
Role-based security groups
Single sign-on
Data stored in an RDBMS
External reports
Cross-platform GUI and CLI
Electronic signatures
Automatic client upgrades
Proxy server
Shadow folders
Awards
In 2008 Surround SCM won a Jolt Award in the Change and Configuration Management category.
See also
Comparison of revision control software
List of revision control software
References
External links
Perforce Surround SCM website
Proprietary version control systems
File comparison tools
Configuration management
|
19009594
|
https://en.wikipedia.org/wiki/Government%20Engineering%20College%2C%20Mananthavady
|
Government Engineering College, Mananthavady
|
Government Engineering College, Wayanad is an engineering college established and managed by the Government of Kerala, India.It is affiliated to the APJ Abdul Kalam Technological University, and is approved by the All India Council for Technical Education (AICTE), New Delhi.[1]
History
The college was inaugurated in 1999 with an intake of 120 students in Computer Science and Electronics and Communication Engineering. A new course on Electrical and Electronics Engineering started in 2010 with intake of 60 students and another course on Mechanical Engineering was started in 2014 with an intake of 60 students. The college is affiliated to A P J Abdul Kalam Technological University. It is the one and only engineering college in the entire district of Wayanad.
Courses offered
There are 4 full time B.Tech courses - Computer Science & Engineering with intake of 66 student, Electronics & Communication Engineering with intake of 132 student , Electrical & Electronics Engineering with intake of 66 student and Mechanical Engineering with intake of 66 student,around 1300+ students are studying. There are two M.Tech courses. M.Tech in Communication Engineering & Signal Processing started in 2011 with intake of 18 students. A new M.Tech course on Computer Science & Engineering with specialization in Networks and Security started in 2014 with intake of another 18 students. B.Tech Course in Computer Science & Engineering has been accredited by NBA(National Board of Accreditation) from 2017-21.
Faculty
The faculty are selected by the Public Service Commission, Kerala, on a merit basis.
Staff advisory system
Immediately after admission to the college, each student is assigned a staff adviser. The staff adviser guides the student in curricular and extracurricular activities during the period of study in the college.
Campus discipline
Any act of ragging is dealt with as per the provisions of the Kerala Prohibition of ragging Act, 1998. While on campus, students carry their college identity cards and comply with the dress code:
The Campus
GEC Wayanad is located at Thalapuzha, from Manathavady town. The college is located in the hilly district of Wayanad. The campus is spread across a vast area of 25 acres. Wayanad was formerly called the "Wayalnadu" of Kerala, which is the elevated picturesque plateau on the crest of the Western ghats. This college is one among the four new engineering colleges in the state established in 1999. It was inaugurated by the Hon. Education Minister, Mr. P.J. Joseph on 17 January 2000.
Academics
Admissions
Admissions to the BTech Degree programs are carried out on the basis of rank in the common entrance examination conducted by the Government of Kerala.
Departments
The college is structured into seven departments:
Electrical and Electronics Engineering
Electronics and Communication Engineering
Computer Science and Engineering
Mechanical Engineering
community
1.NSS (National Service Scheme)
2.IEEE
3.Natural club
4.FLOSS cell
5.Bhomithrasena club
6.Alumini Association GECWWA
7.ISTE
8 Thinker Hub
References
External links
http://www.gecwyd.ac.in/ Official website
gecwyd.etlab.in/user/login etlab link
Engineering colleges in Kerala
Colleges affiliated to Kannur University
Universities and colleges in Wayanad district
Educational institutions established in 1999
1999 establishments in Kerala
Mananthavady Area
|
6226503
|
https://en.wikipedia.org/wiki/Xtraview%20Encryption%20System
|
Xtraview Encryption System
|
Xtraview Video Encryption System refers to the now-defunct patented "encryption" system used on Xtraview and a number of other Top Up TV services, including Setanta Sports, Television X, Babestation and Red Hot TV.
Unlike the other encryption system used by Top Up TV, Mediaguard, the Xtraview Video Encryption System was not a true encryption system. Instead, an MHEG application directed the user's set-top box to a hidden videostream when a correct PIN is entered. Unlike traditional channel encryption methods, Xtraview did not require a viewing card. This is an advantage over digital terrestrial television in the UK, where the vast majority of set-top boxes have no ability to decrypt pay channels.
Access to a channel protected using the Xtraview technology was granted by calling a premium rate telephone number. During the call, users were asked to give a number displayed on screen. In response, they were given a PIN to unlock the service.
a similar system is in use by Babestation Xtreme, Red Hot TV, Television X and briefly by the now defunct TView on digital terrestrial television.
Criticism
The PIN system has been subject to widespread hacking. Without encryption, the system was easily circumvented by set-top boxes that are able to access individual videostreams when individual stream PIDs are entered. More recently, the PIN algorithm itself was cracked, allowing others to access the service.
Another downfall is that because the application is MHEG generated, if the set-top box was switched off, access to these channels was lost. It is also stated on-screen before purchase that not all boxes are compatible. Another factor is that a few cheaper boxes do not have MHEG support at all, and therefore cannot access the service.
External links
Top Up TV Homepage
Digital rights management systems
Television technology
|
10105587
|
https://en.wikipedia.org/wiki/Expand%20%28Unix%29
|
Expand (Unix)
|
expand is a program that converts tab characters into groups of space characters, while maintaining correct alignment. It is available in Unix operating systems and many Unix-like operating systems. The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities.
Example
For example:
$ echo -e "foo\tbar" | expand | xxd -g 1 -u
0000000: 66 6F 6F 20 20 20 20 20 62 61 72 0A foo bar.
$ echo -e "foo\tbar" | xxd -g 1 -u
0000000: 66 6F 6F 09 62 61 72 0A foo.bar.
$
Here the echo command prints a string of text that includes a tab character, then the output is directed into the expand command. The resulting output is then displayed in hexadecimal and as characters by the xxd dump command. At the second prompt, the same echo output is sent directly to the xxd command. As can be seen by comparing the two, the expand program converts the tab (specified as '\t' to the echo program) into spaces.
See also
List of Unix commands
Unexpand
References
External links
Standard Unix programs
Unix SUS2008 utilities
|
1133059
|
https://en.wikipedia.org/wiki/ClamWin%20Free%20Antivirus
|
ClamWin Free Antivirus
|
ClamWin Free Antivirus is a free and open-source antivirus tool for Windows. It provides a graphical user interface to the Clam AntiVirus engine.
Features
Scanning scheduler (only effective with user logged in).
Automatic virus database updates on a regular basis.
Standalone virus-scanner.
Context menu integration for Windows Explorer.
Add-in for Microsoft Outlook.
A portable version that can be used from a USB flash drive.
There are Firefox extensions that allow the users to process downloaded files with ClamWin.
Real-time scanning
ClamWin Free Antivirus scans on demand; it does not automatically scan files as they are read and written.
The non-affiliated projects Clam Sentinel and Winpooch are add-ons that provide a real-time scanning capability to ClamWin.
Updates
ClamWin Free Antivirus has a virus database which is updated automatically when it detects connection to the Internet. A small balloon tip appears on the taskbar icon indicating completion status of the update process. It retries to establish connection with the server if it fails to download the updates first time.
Effectiveness
Historically ClamWin Free Antivirus has suffered from poor detection rates and its scans have been slow and less effective than some other antivirus programs. For example, in 2009 ClamWin Free Antivirus failed to detect almost half of the trojan horses, password stealers, and other malware in AV-TEST's "zoo" of malware samples.
In the 1–21 June 2008 test performed by Virus.gr, ClamWin Free Antivirus version 0.93 detected 54.68% of all threats and ranked 37th out of 49 products tested; the best scored over 99%.
In the 10 August-05 September 2009 test performed by Virus.gr, ClamWin Free Antivirus version 0.95.2 detected 52.48% of all threats and ranked 43 out of 55 products tested; the best scored 98.89%.
On 6 September 2011 cNet gave ClamWin Free Antivirus a rating of excellent, 4 of 5 stars.
See also
List of antivirus software
List of free and open-source software packages
ClamTk, a similar interface for ClamAV, but for Linux desktop use.
References
External links
Antivirus software
Free antivirus software
Free security software
Free software programmed in C++
Free software programmed in Python
Portable software
Windows security software
Windows-only free software
|
12327623
|
https://en.wikipedia.org/wiki/VE-Suite
|
VE-Suite
|
VE-Suite is an open source based virtual engineering software toolkit that simplifies information management so users can simultaneously interact with engineering analyses and graphical models to create a virtual decision-making environment. It is available under the GNU Lesser General Public License (LGPL) and is composed of four main software engines:
VE-CE is the software engine responsible for the synchronization of the data between the various analysis and process models and the engineer
VE-Xplorer is the decision-making environment that allows the engineer to visually interact with the equipment models
VE-Conductor, the graphical user interface, is the engineer's mechanism to control models and other information
VE-Open connects the core engines of VE-Suite and transfers data from user-defined information sources to VE-Suite software engines
These software engines coordinate the flow of data from the engineer to the virtual components being designed.
In nearly all aspects of the engineering process—design, manufacturing, and maintenance—the tools employed at each phase rely on virtual models (e.g., software tools) to reduce cost and shorten development time. This results in a variety of software tools being used across a wide range of vendors and engineering firms. In this environment, engineers are required to manually move information from one software package to another. VE-Suite was designed to support real-time, collaborative design using disparate software tools so engineers, designers, and managers can obtain in intuitive feel for a product's performance in real time.
VE-Suite's features include:
Information Management
In engineering decision making, it is necessary to understand the vast amounts of information regarding a particular product. VE-Suite enables users to interact with objects in a virtual space without being concerned with technical information such as costing.
Component Manipulation
Product components are viewable at any scale and can be modified in real time without having to go back to the analysis and modeling process. They can be virtually assembled, much like building a physical model, but without the time and expense; they can be combined to create new components; and they can be distributed across computational resources.
Visualization
VE-Suite provides a virtual reality environment in which users can immerse themselves in the data and better understand it. The ability to visually interact with information allows users to analyze complex patterns, synthesize opportunities, and evaluate alternative processes.
Collaboration
VE-Suite is designed with an open interface to allow the integration of other open-source and commercial software packages. Combining various simulation programs, data from diverse sources, and high fidelity visualization throughout the product development lifecycle produces an experience similar to physical inspection of an actual device. In such an environment, people from various disciplines with diverse but complementary experience can collaborate.
Workflow
Following is an illustration of the VE-Suite workflow.
The first VE-Suite tool the engineer works with is VE-Conductor. He or she first double-clicks a particular icon on the right hand tree view, which publishes the object to be investigated on the design canvas in VE-Conductor. The engineer can then double-click on this object to cause a customized graphical user interface (GUI) of this object to appear. Through this interface, the engineer can modify specific input parameters for the particular object under investigation. Once the appropriate values have been set by the engineer, the job is submitted to VE-CE, which schedules the appropriate models for execution and sends the input data to the respective models. Once the models have been executed, the data generated by the models is accessible in VE-Xplorer within the graphical decision-making environment.
Everything that has occurred up to this point has occurred without user intervention; the software tools contained within VE-Suite have handled the information integration and model execution. Once the model execution is complete, the engineer can then choose to interrogate the high fidelity data by requesting volume renders, vector planes, contour planes, streamlines, animated massless particles, or transient animations if the data is transient. During this workflow process, the engineer interacts with VE-Conductor and visually interacts with the data in the VE-Xplorer-generated graphical decision-making environment. The complexity of information integration and execution of the distributed models is handled without input from the engineer.
References
Bockelie, M., Swensen, D.A., Denison, M.K., Maguire, M., Yang, C., Chen, Z., Sadler, B., Senior, C.L., Sarofim, A.F. “A Computational Workbench Environment for Virtual Power Plant Simulation”, Contract DE-FC26-00NT41047, Final Report, December, 2004.
Bryden, K. M. and McCorkle, D. S., “VE-Suite: A Foundation for Building Virtual Engineering Models of High Performance, Low Emission Power Plants,” 29th International Technical Conference on Coal Utilization & Fuel Systems, Clearwater, Florida, 38-46 (2004).
Huang, G., Bryden, K. M., and McCorkle, D. S., “Interactive Design using CFD and Virtual Engineering”, in the Proceedings of the 10th AIAA/ISSMO Multidisciplinary Analysis and Optimization Conference, AIAA-2004-4364, September 2004.
McCorkle, D. S., Bryden, K. M., and Kirstukas, S. J.; “Building a Foundation for Power Plant Virtual Engineering,” 28th International Technical Conference on Coal Utilization & Fuel Systems, Clearwater, Florida, 63-71 (2003).
McCorkle, D. S., Bryden, K. M., and Swensen, D. A., “Using Virtual Engineering Tools to Reduce NOx Emissions,” in the Proceedings of ASME Power 2004, POWER2004-52021, pp 441–446, March 2004.
Swensen, D.A., Maguire, M., Yang, C., and Bockelie, M.J., “Computational Frameworks for Practical, Engineering Applications”, presented at the SIAM Computational Sciences and Engineering Conference 2005, Orlando, Florida, USA, February 12-February 15, 2005.
External links
VE-Suite
VRJuggler
VTK
OSG
wxWidgets
Bullet
ACE/TAO
Computer-aided engineering software
Virtual reality
Software that uses wxWidgets
2000s software
|
16911228
|
https://en.wikipedia.org/wiki/Adaptive%20quality%20of%20service%20multi-hop%20routing
|
Adaptive quality of service multi-hop routing
|
In multi-hop networks, Adaptive Quality of Service routing (AQoS or AQR) protocols have become increasingly popular and have numerous applications. One application in which it may be useful is in Mobile ad hoc networking (MANET).
Adaptive QoS routing is a cross-layer optimization adaptive routing mechanism. The cross-layer mechanism provides up-to-date local QoS information for the adaptive routing algorithm, by considering the impacts of node mobility and lower-layer link performance. The multiple QoS requirements are satisfied by adaptively using forward error correction and multipath routing mechanisms, based on the current network status. The complete routing mechanism includes three parts: (1) a modified dynamic source routing algorithm that handles route discovery and the collection of QoS related parameters; (2) a local statistical computation and link monitoring function located in each node; and (3) an integrated
decision-making system to calculate the number of routing paths, coding parity length, and traffic distribution rates.
Introduction
A wireless ad hoc network consists of a collection of mobile nodes interconnected by multihop wireless paths with wireless transmitters and receivers. Such networks can be spontaneously created and operated in a self-organized manner, because they do not rely upon any preexisting network infrastructure.
The emergence of multimedia applications in communications has generated the need to provide
mobile quality-of-service (QoS) support in ad hoc networks, and such applications require a stable path to guarantee QoS requirements. However, the topology of ad hoc networks is highly dynamic due to the unpredictable node mobility. In addition, wireless channel bandwidth is limited. So, QoS provisioning in such networks is complex and challenging.
QoS routing usually involves two tasks: collecting and maintaining up-to-date state information about the network and finding feasible paths for a connection based on its QoS requirements. Many approaches currently exist to perform QoS routing, most of which consist of routing across the Network layer of the OSI model only. Some approaches utilize both the Network and Data link layer but do not consider the cross layer behaviors. This makes quantifying the QoS parameters difficult and leads to considerations of QoS but does not guarantee QoS.
To address this problem, appropriate cross-layer cooperation is required. Adaptive QoS schemes provide QoS information by factoring the impacts of node mobility and lower-layer link parameters into QoS performance.
Traditional QoS approaches
Most QoS approaches tend to focus on only one QoS parameter (e.g., packet loss, end-to-end delay, and bandwidth). For example, while many of the QoS-related schemes are successful in reducing packet loss by adding redundancy in the packet, they do this at the expense of end-to-end delay. Because packet loss and end-to-end delay are inversely related, it may not be possible to find a path that simultaneously satisfies the delay, packet loss, and bandwidth constraints. Some proposed QoS routing algorithms do consider multiple metrics, but without considering cross-layer cooperation. Multipath routing is another type of QoS routing that has received much attention, since it can provide load balancing, fault tolerance, and higher aggregate bandwidth. Although this approach decreases packet loss and end-to-end delay, it is only efficient and reliable if a relationship can be found between the number of paths and QoS constraints.
Adaptive QoS scheme overview
To implement an adaptive multipath routing scheme, three functions distributed in different parts of the network are needed. First, a modified dynamic source routing function is needed. It handles route discovery and collecting the local QoS-related information along the selected
routes. Second, there is a local statistical computation and link monitoring function located in each node. This function is used to support the above routing function. It will manage and build the local routing information in each node, which includes a QoS-related table. The third function will be in charge of the final decision-making process. The adaptive routing parameters are derived from the decision-making algorithm based on the QoS constraints. They are the number N of selected paths, parity length k of the FEC, code and the set {R} of the traffic distribution rates on each path. With these functions, adaptive multipath QoS routing is implemented.
QoS requirements can be based on either a delay or a delay and bandwidth requirement, or a packet loss requirement. FEC parity length is derived from the difference between the QoS delay requirement and the average delay on selected paths under the packet-loss constraint. Average packet loss under this FEC scheme is achieved by using multiple routing paths. At the same time, the packet distribution rate on each path is determined under fair packet-loss and load-balance principles. Routing maintenance under the same QoS guarantees is achieved without increasing its computational complexity. This required to be understand.
Adaptive QoS performance
Three functions (routing function, local statistic computation and monitoring function, and integrated decisionmaking function) are implemented in the different parts of the mobile network. Due to the distributed structure, the computation and implementation complexity of the routing scheme are reduced. Also, since routes are discovered based on the up-to-date local information and selected by the optimization computation, routing parameters (e.g., number of paths, FEC parity length, and traffic distribution rate) are dynamic and optimized. In addition to supporting multiple QoS requirements, traffic balancing and bandwidth resources are factored into our decisionmaking process. The distributed structure of the local QoS statistics used in the routing enables this QoS support mechanism to be scalable in mobile networks. Simulation results indicate that the performance (i.e., packet loss and end-to-end delay) are much better and less susceptible to the state changes (i.e., node mobility, transmission power, channel characteristics, and the traffic pattern) of the network, compared to a nonadaptive routing strategy.
See also
List of ad hoc routing protocols
References
"Adaptive QoS Routing by Cross-Layer Cooperation in Ad Hoc Networks", Hongxia Sun & Herman Hughes, EURASIP Journal on Wireless Communications and Networking May 2005, Adaptive QoS Routing
Telecommunications engineering
Internet architecture
Network performance
Streaming
Teletraffic
|
346883
|
https://en.wikipedia.org/wiki/IEEE%20802.1X
|
IEEE 802.1X
|
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over IEEE 802.11, which is known as "EAP over LAN" or EAPOL. EAPOL was originally designed for IEEE 802.3 Ethernet in 802.1X-2001, but was clarified to suit other IEEE 802 LAN technologies such as IEEE 802.11 wireless and Fiber Distributed Data Interface (ANSI X3T9.5/X3T12 and ISO 9314) in 802.1X-2004. The EAPOL was also modified for use with IEEE 802.1AE ("MACsec") and IEEE 802.1AR (Secure Device Identity, DevID) in 802.1X-2010 to support service identification and optional point to point encryption over the internal LAN segment.
Overview
802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device that provides a data link between the client and the network and can allow or block network traffic between the two, such as an Ethernet switch or wireless access point; and the authentication server is typically a trusted server that can receive and respond to requests for network access, and can tell the authenticator if the connection is to be allowed, and various settings that should apply to that client's connection or setting. Authentication servers typically run software supporting the RADIUS and EAP protocols. In some cases, the authentication server software may be running on the authenticator hardware.
The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant's identity has been validated and authorized. With 802.1X port-based authentication, the supplicant must initially provide the required credentials to the authenticator - these will have been specified in advance by the network administrator and could include a user name/password or a permitted digital certificate. The authenticator forwards these credentials to the authentication server to decide whether access is to be granted. If the authentication server determines the credentials are valid, it informs the authenticator, which in turn allows the supplicant (client device) to access resources located on the protected side of the network.
Protocol operation
EAPOL operates over the data link layer, and in Ethernet II framing protocol has an EtherType value of 0x888E.
Port entities
802.1X-2001 defines two logical port entities for an authenticated port—the "controlled port" and the "uncontrolled port". The controlled port is manipulated by the 802.1X PAE (Port Access Entity) to allow (in the authorized state) or prevent (in the unauthorized state) network traffic ingress and egress to/from the controlled port. The uncontrolled port is used by the 802.1X PAE to transmit and receive EAPOL frames.
802.1X-2004 defines the equivalent port entities for the supplicant; so a supplicant implementing 802.1X-2004 may prevent higher-level protocols from being used if it is not content that authentication has successfully completed. This is particularly useful when an EAP method providing mutual authentication is used, as the supplicant can prevent data leakage when connected to an unauthorized network.
Typical authentication progression
The typical authentication procedure consists of:
Initialization On detection of a new supplicant, the port on the switch (authenticator) is enabled and set to the "unauthorized" state. In this state, only 802.1X traffic is allowed; other traffic, such as the Internet Protocol (and with that TCP and UDP), is dropped.
Initiation To initiate authentication the authenticator will periodically transmit EAP-Request Identity frames to a special Layer 2 address (01:80:C2:00:00:03) on the local network segment. The supplicant listens on this address, and on receipt of the EAP-Request Identity frame, it responds with an EAP-Response Identity frame containing an identifier for the supplicant such as a User ID. The authenticator then encapsulates this Identity response in a RADIUS Access-Request packet and forwards it on to the authentication server. The supplicant may also initiate or restart authentication by sending an EAPOL-Start frame to the authenticator, which will then reply with an EAP-Request Identity frame. Negotiation (Technically EAP negotiation)'' The authentication server sends a reply (encapsulated in a RADIUS Access-Challenge packet) to the authenticator, containing an EAP Request specifying the EAP Method (The type of EAP based authentication it wishes the supplicant to perform). The authenticator encapsulates the EAP Request in an EAPOL frame and transmits it to the supplicant. At this point, the supplicant can start using the requested EAP Method, or do a NAK ("Negative Acknowledgement") and respond with the EAP Methods it is willing to perform.
Authentication If the authentication server and supplicant agree on an EAP Method, EAP Requests and Responses are sent between the supplicant and the authentication server (translated by the authenticator) until the authentication server responds with either an EAP-Success message (encapsulated in a RADIUS Access-Accept packet), or an EAP-Failure message (encapsulated in a RADIUS Access-Reject packet). If authentication is successful, the authenticator sets the port to the "authorized" state and normal traffic is allowed, if it is unsuccessful the port remains in the "unauthorized" state. When the supplicant logs off, it sends an EAPOL-logoff message to the authenticator, the authenticator then sets the port to the "unauthorized" state, once again blocking all non-EAP traffic.
Implementations
An open-source project known as Open1X produces a client, Xsupplicant. This client is currently available for both Linux and Windows. The main drawbacks of the Open1X client are that it does not provide comprehensible and extensive user documentation and the fact that most Linux vendors do not provide a package for it. The more general wpa_supplicant can be used for 802.11 wireless networks and wired networks. Both support a very wide range of EAP types.
The iPhone and iPod Touch support 802.1X as of the release of iOS 2.0.
Android has support for 802.1X since the release of 1.6 Donut.
Chrome OS has supported 802.1X since mid-2011.
Mac OS X has offered native support since 10.3.
Avenda Systems provides a supplicant for Windows, Linux and Mac OS X. They also have a plugin for the Microsoft NAP framework. Avenda also offers health checking agents.
Windows
Windows defaults to not responding to 802.1X authentication requests for 20 minutes after a failed authentication. This can cause significant disruption to clients.
The block period can be configured using the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\dot3svc\BlockTime DWORD value (HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\wlansvc\BlockTime for wireless networks) in the registry (entered in minutes). A hotfix is required for Windows XP SP3 and Windows Vista SP2 to make the period configurable.
Wildcard server certificates are not supported by EAPHost, the Windows component that provides EAP support in the operating system. The implication of this is that when using a commercial certification authority, individual certificates must be purchased.
Windows XP
Windows XP has major issues with its handling of IP address changes that result from user-based 802.1X authentication that changes the VLAN and thus subnet of clients. Microsoft has stated that it will not backport the SSO feature from Vista that resolves these issues.
If users are not logging in with roaming profiles, a hotfix must be downloaded and installed if authenticating via PEAP with PEAP-MSCHAPv2.
Windows Vista
Windows Vista-based computers that are connected via an IP phone may not authenticate as expected and, as a result, the client can be placed into the wrong VLAN. A hotfix is available to correct this.
Windows 7
Windows 7 based computers that are connected via an IP phone may not authenticate as expected and, as a result, the client can be placed into the wrong VLAN. A hotfix is available to correct this.
Windows 7 does not respond to 802.1X authentication requests after initial 802.1X authentication fails. This can cause significant disruption to clients. A hotfix is available to correct this.
Windows PE
For most enterprises deploying and rolling out operating systems remotely, it is worth noting that Windows PE does not have native support for 802.1X. However, support can be added to WinPE 2.1 and WinPE 3.0 through hotfixes that are available from Microsoft. Although full documentation is not yet available, preliminary documentation for the use of these hotfixes is available via a Microsoft blog.
Linux
Most Linux distributions support 802.1X via wpa_supplicant and desktop integration like NetworkManager.
Federations
eduroam (the international roaming service), mandates the use of 802.1X authentication when providing network access to guests visiting from other eduroam enabled institutions.
BT (British Telecom, PLC) employs Identity Federation for authentication in services delivered to a wide variety of industries and governments.
Proprietary extensions
MAB (MAC Authentication Bypass)
Not all devices support 802.1X authentication. Examples include network printers, Ethernet-based electronics like environmental sensors, cameras, and wireless phones. For those devices to be used in a protected network environment, alternative mechanisms must be provided to authenticate them.
One option would be to disable 802.1X on that port, but that leaves that port unprotected and open for abuse. Another, slightly more reliable option is to use the MAB option. When MAB is configured on a port, that port will first try to check if the connected device is 802.1X compliant, and if no reaction is received from the connected device, it will try to authenticate with the AAA server using the connected device's MAC address as username and password. The network administrator then must make provisions on the RADIUS server to authenticate those MAC-addresses, either by adding them as regular users or implementing additional logic to resolve them in a network inventory database.
Many managed Ethernet switches offer options for this.
Vulnerabilities in 802.1X-2001 and 802.1X-2004
Shared media
In the summer of 2005, Microsoft's Steve Riley posted an article detailing a serious vulnerability in the 802.1X protocol, involving a man in the middle attack. In summary, the flaw stems from the fact that 802.1X authenticates only at the beginning of the connection, but after that authentication, it's possible for an attacker to use the authenticated port if he has the ability to physically insert himself (perhaps using a workgroup hub) between the authenticated computer and the port. Riley suggests that for wired networks the use of IPsec or a combination of IPsec and 802.1X would be more secure.
EAPOL-Logoff frames transmitted by the 802.1X supplicant are sent in the clear and contain no data derived from the credential exchange that initially authenticated the client. They are therefore trivially easy to spoof on shared media and can be used as part of a targeted DoS on both wired and wireless LANs. In an EAPOL-Logoff attack a malicious third party, with access to the medium the authenticator is attached to, repeatedly sends forged EAPOL-Logoff frames from the target device's MAC Address. The authenticator (believing that the targeted device wishes to end its authentication session) closes the target's authentication session, blocking traffic ingressing from the target, denying it access to the network.
The 802.1X-2010 specification, which began as 802.1af, addresses vulnerabilities in previous 802.1X specifications, by using MACSec IEEE 802.1AE to encrypt data between logical ports (running on top of a physical port) and IEEE 802.1AR (Secure Device Identity / DevID) authenticated devices.
As a stopgap, until these enhancements are widely implemented, some vendors have extended the 802.1X-2001 and 802.1X-2004 protocol, allowing multiple concurrent authentication sessions to occur on a single port. While this prevents traffic from devices with unauthenticated MAC addresses ingressing on an 802.1X authenticated port, it will not stop a malicious device snooping on traffic from an authenticated device and provides no protection against MAC spoofing, or EAPOL-Logoff attacks.
Alternatives
The IETF-backed alternative is the Protocol for Carrying Authentication for Network Access (PANA), which also carries EAP, although it works at layer 3, using UDP, thus not being tied to the 802 infrastructure.
See also
AEGIS SecureConnect
IEEE 802.11i-2004
References
External links
IEEE page on 802.1X
GetIEEE802 Download 802.1X-2016
GetIEEE802 Download 802.1X-2010
GetIEEE802 Download 802.1X-2004
GetIEEE802 Download 802.1X-2001
Ultimate wireless security guide: Self-signed certificates for your RADIUS server
WIRE1x
Wired Networking with 802.1X Authentication on Microsoft TechNet
IEEE 802.01x
Networking standards
Computer access control protocols
Computer network security
|
1665342
|
https://en.wikipedia.org/wiki/NPAPI
|
NPAPI
|
Netscape Plugin Application Programming Interface (NPAPI) is an application programming interface (API) of the Web Browsers that allows plugins to be integrated.
Initially developed for Netscape browsers, starting in 1995 with Netscape Navigator 2.0, it was subsequently adopted by other browsers.
In NPAPI architecture, a plugin declares content types (e.g. "audio/mp3") that it can handle. When the browser encounters a content type it cannot handle natively, it loads the appropriate plugin, sets aside space within the browser context for the plugin to render and then streams data to it. The plugin is responsible for rendering the data. The plugin runs in-place within the page, as opposed to older browsers that had to launch an external application to handle unknown content types. NPAPI requires each plugin to implement and expose approximately 15 functions for initializing, creating, deleting and positioning plugin content. NPAPI also supports scripting, printing, full-screen plugins, windowless plugins and content streaming.
NPAPI was frequently used for plugins which required intensive, low-level performance such as video players, including Adobe Flash Player and Microsoft Silverlight, as well as platforms for web applications such as the Java Runtime Environment.
NPAPI support among major browsers started to wane since 2015 and it was gradually deprecated over the last years. With the advent of HTML5, all major web browsers have removed support for 3rd party NPAPI plugins for security reasons. There are some smaller browsers such as Pale Moon and Waterfox Classic that still support NPAPI plugins.
Scripting support
Scripting is a feature allowing JavaScript code in a web page to interact with the plugin. Various versions of Netscape and then Mozilla supported this feature using different technologies, including LiveConnect, XPConnect, and NPRuntime.
LiveConnect
LiveConnect is a feature of Web browsers that allows Java and JavaScript software to intercommunicate within a Web page. From the Java side it allows an applet to invoke the embedded scripts of a page, or to access the built-in JavaScript environment, much as scripts can. Conversely, from the JavaScript side, it allows a script to invoke applet methods, or to access Java runtime libraries, much as applets can.
LiveConnect was used in Netscape 4 to implement scriptability of NPAPI plugins.
The Open Java Interface-dependent implementation of LiveConnect was removed from the Mozilla source code tree in late June 2009 as part of the Mozilla 2 cleanup effort. It is no longer needed with the release of a redesigned Java Runtime Environment from Sun Microsystems. However the old implementation was restored for Gecko 1.9.2, as Apple had yet to port the newer JRE over to Mac OS X.
The Java–JavaScript functionality supported by the redesigned Java Runtime Environment is still called "LiveConnect", despite the Open Java Interface-specific approach having been abandoned. With Netscape 4, NPAPI was extended to allow plugins to be scripted. This extension is called LiveConnect. A plugin could implement a Java class and expose an instance of it. The class could be called from JavaScript and from Java applets running within the page.
The disadvantage of LiveConnect is, that it is heavily tied to the version of Java embedded within the Netscape browser. This prevented the browser from using other Java runtimes, and added bloat to the browser download size, since it required Java to script plugins. Additionally, LiveConnect is tricky to program: The developer has to define a Java class for the plugin, run it through a specialized Java header compiler, and implement native methods. Handling strings, exceptions, and other Java objects from C++ is non-obvious. In addition, LiveConnect uses an earlier and now obsolete application programming interface (API) for invoking native C++ calls from Java, called JRI. The JRI technology has long since been supplanted by JNI.
XPConnect
XPConnect (Cross Platform Connect) is a technology which enables simple interoperation between XPCOM and JavaScript.
Object connection
XPConnect allows JavaScript objects to transparently access and manipulate XPCOM objects. It also enables JavaScript objects to present XPCOM compliant interfaces to be called by XPCOM objects. A main goal is that objects communicating from either side of an XPCOM style interface should not generally need to know or care about the implementation language of the object on the other side of the interface.
XPConnect's primary reason for existence is to replace handwritten code used in places where native code needs to interact with JavaScript code. An example is the DOM module.
Security
Full privileges are only granted by default to chrome scripts, i.e. scripts that are part of the application or of an extension. For remote HTML/XHTML/XUL documents, most XPCOM objects are not accessible by the scripts as they have limited privileges due to security reasons. Even if they are accessible (e.g. the XMLHttpRequest object), the usual security restrictions can also be found (e.g. cannot open URLs of other domains).
Mozilla was already using XPCOM to define the interfaces to many objects implemented in C++. Each interface was defined by an IDL file, and run through an IDL compiler that produced header files and a language-neutral type library that was a binary representation of the interface. This binary described the interface, the methods, the parameters, the data structures and enumerations.
XPConnect uses the type library information to marshal calls between different thread contexts and between JavaScript and natively compiled C++. XPConnect is used extensively throughout Mozilla. Starting with Netscape 6.1 and Mozilla 0.9.2, NPAPI was extended, so that a plugin could return a scriptable interface to itself and XPConnect would marshal calls to it from JavaScript and the C++ implementation.
XPConnect has no Java dependency. However, the technology is based on XPCOM. Thus the plugin developer must be familiar with reference counting, interfaces and IDL to implement scripting. The dependency on XPCOM led to certain dynamic linking issues (e.g. the fragile base class problem) which had to be solved before the plugin would work correctly with different browsers. XPCOM has since been changed to supply a statically linked version to address such issues. This approach also requires an .xpt file to be installed next to the dynamic-link library (DLL); otherwise the plugin appears to work, but the scripting does not, causing confusion.
NPRuntime
At the end of 2004, all major browser companies using NPAPI agreed on NPRuntime as an extension to the original NPAPI to supply scripting, via an API that is similar in style to the old C-style NPAPI and is independent of other browser technologies like Java or XPCOM. It is only supported by Firefox ESR (Extended Support Release) and Safari.
Support
Because of the age of the API, security issues, and adoption of alternative technologies such as HTML5, many software vendors began to phase out NPAPI support in 2013.
Internet Explorer
Internet Explorer versions 3 through 5.5 SP2 supported NPAPI, allowing plugins that functioned in Netscape Navigator to function in Internet Explorer. Support came via a small ActiveX control (named "plugin.ocx") that acted as a shim between ActiveX and the NPAPI plugin. Microsoft dropped support in version 5.5 SP2 onwards for security reasons.
Google Chrome
Google Chrome permanently dropped all NPAPI support from all platforms in September 2015. In September 2013, Google announced that it would phase out NPAPI support in its Google Chrome browser during 2014, stating that "[its] 90s-era architecture has become a leading cause of hangs, crashes, security incidents, and code complexity". In May 2014, NPAPI support was removed from the Linux version of Chrome 35 and later. In April 2015, Chrome for Windows and OS X (versions 42 and later) disabled NPAPI support by default. However, until September 2015 (version 45), users could re-enable NPAPI.
Opera
Opera dropped support with version 37 in May 2016.
Firefox
Mozilla Firefox release 52.0 in March 2017 removed all support for NPAPI except for Flash. Meanwhile, the ESR channel retained general support for this feature with version 52 ESR being the last NPAPI resort. Firefox 69.0 disabled the Flash NPAPI by default. In Firefox 85.0, released in January 2021, NPAPI support was completely removed. In the ESR channel, support for Flash NPAPI ended with version 78.15.0, released in October 2021.
Safari
Safari has dropped support for all NPAPI plugins except for Flash with version 12 released in September 2018. Flash support has been removed from Safari 14, released in September 2020.
SeaMonkey
SeaMonkey stopped supporting NPAPI plugins from version 2.53.1, with the exception of Flash. NPAPI support was completely removed in SeaMonkey 2.53.7, released in March 2021.
Support
The following list of web browsers support all NPAPI plugins:
360 Secure Browser () or 360 Extreme Explorer ()
Basilisk
K-Meleon (Goanna engine)
Pale Moon (Pale Moon future roadmap)
Uzbl
Waterfox (Allowing running NPAPI plugins but only the 64-bit one)
Similar technologies
ActiveX
Internet Explorer and browsers based on Internet Explorer use ActiveX controls, ActiveX documents and ActiveX scripting to offer in-page extensibility on par with NPAPI. Although commonly associated with Internet Explorer, ActiveX is integration technology that allows any computer program to integrate parts of other computer programs that support such integration. Internet Explorer, however, is discontinued and its replacement, Microsoft Edge, does not support ActiveX.
PPAPI
On 12 August 2009 a page on Google Code introduced a new project called Pepper, with the associated Pepper Plugin API (PPAPI); PPAPI is a derivative of NPAPI aimed to make plugins more portable and more secure. This extension is designed specifically to ease the implementation of out-of-process plugin execution.
PPAPI was initially only supported by Google Chrome and Chromium. Later, other Chromium-based browsers such as Opera and Vivaldi added PPAPI plugin support.
In February 2012 Adobe Systems announced that future Linux versions of Adobe Flash Player would be provided only via PPAPI. The previous release, Flash Player 11.2, with NPAPI support, would receive security updates for five years. In August 2016 Adobe announced that, contrary to their previous statement, it would again support the NPAPI Flash Player on Linux and keep releasing new versions of it.
In August 2020, Google announced that support for PPAPI would be removed from Google Chrome and Chromium in June 2022.
See also
Netscape Server Application Programming Interface (NSAPI)
References
External links
Plugin development documentation on Mozilla Developer Center, including the NPAPI API
An ActiveX control that hosts plugins – a replacement for plugin.ocx that was removed from Internet Explorer.
Book on Programming Netscape Plug-Ins by Zan Oliphant
Nixysa: A glue code generation framework for NPAPI plugins. Apache 2.0 license.
NPAPI Tutorial Building a Firefox Plugin (Part two, Part three, Part four)
Opera 15+ extensions documentation
Application programming interfaces
Software add-ons
Web browsers
|
24274635
|
https://en.wikipedia.org/wiki/Bit-Twist
|
Bit-Twist
|
Bit-Twist is a libpcap-based packet generator and packet capture file modifier and replayer. It complements tcpdump, a packet capturing tool also built upon the packet capturing engine libpcap. Bit-Twist allows you to regenerate packets from one or more pcap files. It also comes with a comprehensive pcap file editor to allow advance manipulation of packet information, e.g. fields in Ethernet, ARP, IP, ICMP, TCP, and UDP headers, prior to regenerating the packets onto the network.
Bit-Twist is commonly used to simulate network traffic to test firewall rules, IDS, and IPS. Bit-Twist runs on FreeBSD, NetBSD, OpenBSD, Mac OS X, Linux, and Microsoft Windows.
External links
Bit-Twist official website
Internet Protocol based network software
|
30874186
|
https://en.wikipedia.org/wiki/Marble%20Blast%20Gold
|
Marble Blast Gold
|
Marble Blast Gold is a 2002 3D platform game. It was pre-installed on some Apple Inc. computers like the iMac, iBook, and Mac mini. It is also available for Windows operating systems as well as various Linux distributions. The sequel, Marble Blast Ultra, was released a few years later for the Xbox 360 platform with new features and improved graphics. Marble Blast XP, a version for the Net Jet online game system, has updated graphics and a marble selector. Marble Blast Gold was also ported over to the Microsoft Xbox through the Xbox Live Arcade service the following year with enhanced graphics.
The game was originally released in December 2002 as Marble Blast and then updated in May 2003, being renamed as Marble Blast Gold. At some point during 2003, it was also licensed to eGames to be resold under the name Marble Blaster.
Modifications of the game have also been created by the Marble Blast community, most notably Marble Blast Platinum, PlatinumQuest, Marble Blast Powered Up, and Marble Blast Emerald.
Gameplay
Basic gameplay involves taking the perspective of an autonomous marble moving on its own from a start pad to an end pad, without falling out of bounds. Levels may contain hazards to make this more difficult. The player controls the marble spin, and therefore movement, and can also make the marble jump. There is a variety of power-ups available to the player, which are collected by touching them with the marble. Some levels must be completed within a Qualification time, to increase difficulty. Each level also has a "Gold Time", an additional challenge to complete the level in a specified time-frame. Each gold time is always possible but usually involves finding hidden powerups and/or taking shortcuts. Some levels require a number of gems to be picked up before the level can be finished. There are 100 levels, categorized by difficulty: 24 Beginner, 24 Intermediate, and 52 Advanced.
Custom levels
Marble Blast Gold has support for user-created custom levels, which may be shared between users. To date, there are over 1,850 downloadable custom levels for Marble Blast Gold.
Reception
Marble Blast Gold received critical acclaim from critics upon release.
On GameRankings, Marble Blast Gold received an 8.4/10 rating, "Addictive gameplay and sweet levels lead to some of the best fun that $14.99 can buy". On Gametunnel, the game was rated 9/10 overall, "Marble Blast Gold is another great entry into the marble genre and a showpiece for the Torque engine. Highly recommended!" On GamersInfo, the reviewer noted: "The game can be a lot of fun, especially if you are the type that likes to challenge your hand–eye coordination."
Discontinuation
On January 31, 2011, GarageGames lost the distribution rights of several of its games, including Marble Blast Gold, to InterActive, Corp. MBG was eventually taken down from other sites as well, such as RealArcade. This also caused the direct sequel, Marble Blast Ultra, to be delisted from Xbox Live Arcade later in 2011. On February 1, 2011, Marble Blast Gold was removed from the GarageGames store and is no longer available for purchase. However, the full game can still be downloaded for free at Marble Blast. Demos for Windows, Mac, and Linux are also still available. The license to the Marble Blast franchise is retained by IAC. It is unknown if the Xbox version is still available; the only known source is a video on YouTube showing the original Xbox Live Arcade with Marble Blast Gold on it. Many fans have reacted negatively towards its discontinuation.
See also
Marble Blast Ultra
Super Monkey Ball
References
2002 video games
Puzzle video games
Linux games
MacOS games
Windows games
Torque (game engine) games
Marble games
Video games developed in the United States
Xbox games
Original Xbox Live Arcade games
|
7543392
|
https://en.wikipedia.org/wiki/Industrial%20PC
|
Industrial PC
|
An industrial PC is a computer intended for industrial purposes (production of goods and services), with a form factor between a nettop and a server rack. Industrial PCs have higher dependability and precision standards, and are generally more expensive than consumer electronics. They often use complex instruction sets, such as x86, where reduced instruction sets such as ARM would otherwise be used.
History
IBM released the 5531 Industrial Computer in 1984, arguably the first "industrial PC". The IBM 7531, an industrial version of the IBM AT PC was released May 21, 1985. Industrial Computer Source first offered the 6531 Industrial Computer in 1985. This was a proprietary 4U rackmount industrial computer based on a clone IBM PC motherboard.
Applications
Industrial PCs are primarily used for process control and/or data acquisition. In some cases, an industrial PC is simply used as a front-end to another control computer in a distributed processing environment. Software can be custom written for a particular application or an off-the-shelf package such as TwinCAT, Wonder Ware, Labtech Notebook or LabView can be used to provide a base level of programming.
Analog Devices got exclusive sales for OEM European industrial market and provided MACSYM 120 combined IBM 5531 and MACBASIC a multitasking basic running on C/CPM from Digital Research. Analog and digital I/O cards plugged inside PC and/or extension rack made MAC120 as one of the most powerful and easy to use controller for plant applications at this date.
An application may simply require the I/O such as the serial port offered by the motherboard. In other cases, expansion cards are installed to provide analog and digital I/O, specific machine interface, expanded communications ports, and so forth, as required by the application.
Industrial PCs offer different features than consumer PCs in terms of reliability, compatibility, expansion options and long-term supply.
Industrial PCs are typically characterized by being manufactured in lower volumes than home or office PCs. A common category of industrial PC is the 19-inch rackmount form factor. Industrial PCs typically cost considerably more than comparable office style computers with similar performance. Single-board computers and back planes are used primarily in Industrial PC systems. However, the majority of industrial PCs are manufactured with COTS motherboards.
A subset of industrial PCs is the Panel PC where a display, typically an LCD, is incorporated into the same enclosure as the motherboard and other electronics. These are typically panel mounted and often incorporate touch screens for user interaction. They are offered in low cost versions with no environmental sealing, heavier duty models sealed to IP67 standards to be waterproof at the front panel and including models which are explosion proof for installation into hazardous environments.
Construction and features
Virtually all industrial PCs share an underlying design philosophy of providing a controlled environment for the installed electronics to survive the rigors of the plant floor. The electronic components themselves may be selected for their ability to withstand higher and lower operating temperatures than typical commercial components.
Heavier metal construction as compared to the typical office non-rugged computer
Enclosure form factor that includes provision for mounting into the surrounding environment (19" rack, wall mount, panel mount, etc.)
Additional cooling with air filtering
Wider operating temperature range than normal PCs, with the widest temperature ranges being -40 to 75°C
Alternative cooling methods such as forced air, liquid, and conduction
Expansion card retention and support
Enhanced EMI filtering and gasket
Enhanced environmental protection such as dust proof, water spray or immersion proof, etc.
Sealed MIL-SPEC or Circular-MIL connectors
More robust controls and features
Higher grade power supply
Controlled access to the controls through the use of locking doors
Controlled access to the I/O through the use of access covers
Inclusion of a watchdog timer to reset the system automatically in case of software lock-up
See also
Embedded system
Rugged computer
References
Classes of computers
Industrial computing
Personal computers
|
31836283
|
https://en.wikipedia.org/wiki/Robert%20Dewar
|
Robert Dewar
|
Robert Berriedale Keith Dewar (21 June 1945 – 30 June 2015) was an American computer scientist and educator. He helped to develop programming languages and compilers and was an outspoken advocate of freely licensed open-source software. He was a cofounder, CEO, and president of the AdaCore software company. He was also an enthusiastic amateur performer and musician, especially with the Village Light Opera Group in New York City.
Early life and education
Dewar was born in Oxford, England, one of two sons of the theoretical chemist Michael J. S. Dewar and Mary Dewar, née Williamson, a historian and scholar of English Tudor history. In 1959, he moved with his parents from England to Chicago, Illinois, when his father accepted a teaching job at the University of Chicago. Dewar attended the University of Chicago, earning a Bachelor of Science (B.S.) in 1964, and a Doctor of Philosophy (Ph.D.) in chemistry in 1968. He began to work with computers during graduate school.
Career
Dewar was first Assistant Professor of Information Science and later Associate Professor of Computer Science at the Illinois Institute of Technology (IIT) from 1968 to 1975, before becoming Research Associate Professor of Computer Science at New York University (NYU) in 1975, where he was Full Professor of Computer Science from 1976 to 2005, and becoming chair of the department.
He was involved with developing international standards in programming and informatics, as a member of the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 (WG 2.1) on Algorithmic Languages and Calculi, which specified, maintains, and supports the languages ALGOL 60 and ALGOL 68. He was involved in the design of ALGOL 68, and was WG 2.1 chairperson from 1978 to 1983.
He was associate director of the Courant Institute of Mathematical Sciences from 1994 to 1997. Until his death, he was president of AdaCore, which he cofounded in 1994, and served as its CEO until 2012. Dewar was an outspoken advocate of freely licensed open-source software and an expert in copyright and patent law for software. He was in demand as a speaker at conferences and expert witness in legal actions.
Software contributions
While at the IIT, Dewar created the original SPITBOL compiler, with Ken Belcher in 1971, and Macro SPITBOL, with Tony McCann in 1974. These implementations of SNOBOL4, which quickly gained widespread popularity, are still being used today. In the 1970s, he was a principal author of the Realia COBOL compiler, today marketed by Computer Associates, and still widely used in commercial environments.
Dewar became involved with the language Ada from its early days as a Distinguished Reviewer of the Ada 1983 design proposed by Jean Ichbiah that was selected by the United States Department of Defense (US DoD). He was codirector, with Edmond Schonberg, of the team at NYU that produced Ada/Ed, an interpreter for Ada 83 written in SETL and the first Ada implementation to pass the strenuous ACVC validation suite, mandated for being allowed to use the trademarked name Ada.
Dewar and Schonberg went on to produce GNAT, a free software compiler for Ada that forms part of the GNU Compiler Collection (GCC). Dewar also participated in the SETL project at NYU, and co-authored the handbook Programming With Sets: An Introduction to SETL. He influenced the design of the language ABC, in particular its SETL-style high-level data types, such as associative arrays. Guido van Rossum, the author of the language Python, wrote that the use of the colon in Python is due to Dewar's wife.
Personal life
He was married to Karin Dewar, née Anderson (died 2013), and had two children, Jenny (born 1965) and Keith (born 1969), and two grandchildren. Dewar was known as an engaging and witty conversationalist.
Dewar played the bassoon, recorder, and other musical instruments and enjoyed singing. He was an enthusiastic and valued member and benefactor of the Village Light Opera Group (VLOG) for 35 years, serving them in many capacities, from producer and president to music director, and on stage from Harem Guard to the title role in Gilbert and Sullivan's The Mikado. VLOG's Dewar Center for the Performing Arts was named in recognition of Robert and Karin Dewar's contributions. He was also a member of the North American Heckelphone Society and performed with other groups until only months before his death.
He died of cancer at age 70 at his home in Bennington, Vermont.
Publications
See also
Realia Spacemaker (1982)
References
External links
, New York University
1945 births
English emigrants to the United States
American computer scientists
American technology chief executives
Free software programmers
University of Chicago alumni
Illinois Institute of Technology faculty
New York University faculty
2015 deaths
|
37275667
|
https://en.wikipedia.org/wiki/Redshift%20%28software%29
|
Redshift (software)
|
Redshift is an application that adjusts the computer display's color temperature based upon the time of day. The program is free software, and is intended to reduce eye strain as well as insomnia.
Redshift transitions the computer display's color temperature evenly between daytime and night temperatures to allow the user's eyes to slowly adapt. At night, the color temperature is low and is typically 3000–4000 K, preferably matching the room's lighting temperature. Typical color temperature during the daytime is 5500–6500 K.
Features
Redshift is primarily distributed for and used on the Linux operating system.
Redshift can be used to set a single color temperature and brightness ("one shot mode") or can adjust the temperature and brightness continuously to follow the sun's elevation, in which case it will transition to the night color temperature settings near twilight. The temperature and brightness settings for daytime and night can be user-configured.
To determine the Sun's elevation the software requires the user's location in form of latitude and longitude.
On Linux and BSD operating systems, Redshift supports multiple monitors through the X extensions RandR (preferred) or VidMode, or through the Direct Rendering Manager. Because Redshift can only be configured to use the same gamma correction on all monitors it controls, it is usually desirable to run one instance of the program per monitor.
Interfaces
Redshift originally possessed only a command-line interface, but now has graphical user interfaces (GUIs) that support most Linux desktop environments. Those GUIs include redshift-gtk, redshift-plasmoid, and nightshift.
redshift-gtk is included in Redshift's source tree. In addition to a windowed interface, it provides a tray status icon that can enable or disable Redshift or adjust the screen's color temperature automatically.
Redshift can be opened with the use of terminal, panel launchers or startup commands: the command 'redshift -O #TEMP' (#TEMP being a number from 1000 to 25000) will set the temperature and the command 'redshift -x' to exit Redshift.
A simple script can be made and called upon to set the colour temp manually via a shortcut or panel launcher:
Create a new file and copy in the following:#!/bin/bash
shouldloop=true;
while $shouldloop; do
read -p "What temp would you like? 1000-25000K: " scale
if "$scale" -ge 1000 && "$scale" -le 25000; then
redshift -O $scale
shouldloop=false;
elif $scale = "x"; then
exit
elif $scale = "X"; then
exit
else
echo "Invalid value or outside range. x to exit..."
fi
done
Save the file in your /home/$user directory.
Change the properties of the file so it can be executed (using chmod or context menu permissions).
Create a new launcher ("set temp") referring to the file you have named above and select "Open in Terminal".
Create a new launcher ("exit redshift") with the command redshift -x (no need to open this in terminal).
Use the launcher to set temperature or exit Redshift.
Reviews
Redshift has been positively reviewed by Linux users, who note that Redshift has some installation and user interface advantages compared to the f.lux Linux port xflux. However, f.lux's systems have since been updated to enhance its dimmed display.
Ubuntu MATE provides Redshift installed by default since their 17.10 release.
Linux Mint Cinnamon provides Redshift installed by default since their 18.3 release.
See also
F.lux
Red Moon (software)
Night Shift (software) - a feature of macOS and iOS that provides a similar function
References
External links
Project website on GitHub
2011 software
Free software
Ergonomics
Sleep
|
19373038
|
https://en.wikipedia.org/wiki/Memex%20Technology%20Limited
|
Memex Technology Limited
|
Memex Technology Limited is a Scottish software company delivering mission-critical information systems and services for the Law Enforcement and Security markets. It is headquartered in Peel Park in East Kilbride. In July 2010 it was acquired by SAS Institute Inc. with the aim of expanding SAS' presence in the law enforcement market.
Areas of business
Memex has developed a number of software databases and analysis applications used by UK and US Police Forces. Approximately 25% of the United Kingdoms Police Forces make use of Memex's software, and a number of United States federal agencies use Memex in counter-terrorism.
The company has a global presence, operating through a network of commercial partners. The United States is the country where Memex has the strongest presence outside the UK, and the company has a dedicated office in Vienna, Virginia.
History
The company is named after the concept of Memex, a machine that could act as an extension to the human memory, into which vast amounts of varied information could be deposited and later retrieved.
In 1972, as technology progressed, two academics in Edinburgh set out to realise Dr. Bush's vision. Professor Fred Heath, then Dean of Computing at Heriot-Watt University, and Dr. Graham Woyka designed the state diagrams and circuitry necessary to implement Bush's Memex concept.
During this process, Woyka and Heath founded the Research and Development firm Memex Group Limited.
In 1984, Memex released the first of its hardware database solutions - the Memex Intelligence Engine, which remained at the core of the company's software products for many years. In its early years, Memex experienced steady growth, primarily selling into Military markets.
The software version of the Memex Intelligence Engine was developed in 1988 and three markets emerged for the software: Law Enforcement, Defence Intelligence and Commercial Fraud.
The company was subject to a management buy-out in 2001 and merged with SAS in 2010 and became SAS Public Security.
See also
Crimint – A database system provided by Memex to the Metropolitan Police, UK
References
External links
Memex Technology Limited website
Software companies of Scotland
Companies based in Vienna, Virginia
Data companies
|
9006174
|
https://en.wikipedia.org/wiki/Power%20to%20the%20edge
|
Power to the edge
|
Power to the edge refers to the ability of an organization to dynamically synchronize its actions; achieve command and control (C2) agility; and increase the speed of command over a robust, networked grid. The term is most commonly used in relation to military organizations, but it can equally be used in a civilian context.
"Power to the edge" is an information and organization management philosophy first articulated by the U.S. Department of Defense in a publication by Dr. David S. Alberts and Richard E. Hayes in 2003 titled: "Power to the Edge: Command...Control...in the Information Age." This book was published by the Command and Control Research Program and can be downloaded from the Program's website.
Principles
Power to the edge advocates the following:
Achieving situational awareness rather than creating a single operational picture
Self-synchronizing operations instead of autonomous operations
Information "pull" rather than broadcast information "push"
Collaborative efforts rather than individual efforts
Communities of Interest (COIs) rather than stovepipes
"Task, post, process, use" rather than "task, process, exploit, disseminate"
Handling information once rather than handling multiple data calls
Sharing data rather than maintaining private data
Persistent, continuous information assurance rather than perimeter, one-time security
Bandwidth on demand rather than bandwidth limitations
IP-based transport rather than circuit-based transport
Net-Ready KPP rather than interoperability KPP
Enterprise services rather than separate infrastructures
COTS based, net-centric capabilities rather than customized, platform-centric IT
Agility
The philosophy of power to the edge is aimed at achieving organizational agility. Such agility has six attributes:
Robustness: the ability to maintain effectiveness across a range of tasks, situations, and conditions
Resilience: the ability to recover from or adjust to misfortune, damage, or a destabilizing perturbation in the environment
Responsiveness: the ability to react to a change in the environment in a timely manner
Flexibility: the ability to employ multiple ways to succeed and the capacity to move seamlessly between them
Innovation: the ability to do new things and the ability to do old things in new ways
Adaptation: the ability to change work processes and the ability to change the organization
See also
Network-centric organization
Network-centric warfare
Network simulator
External links
Command and Control Research Program
References
Command and Control Research Program Website
Power to the Edge by Alberts and Hayes (2003)
Power to the Edge presentation by Dr. Margaret Myers, CIO-DOD
"Command and Control Implications of Network-Centric Warfare"
Management
Command and control
Net-centric
|
19343159
|
https://en.wikipedia.org/wiki/InterCon%20Systems%20Corporation
|
InterCon Systems Corporation
|
InterCon Systems Corporation (a Virginia Corporation) was founded in April 1988 by Kurt D. Baumann and Mikki Barry to produce software to connect Macintosh computers together. At the time, there was no real concept of the Internet and there was still a question of whether the TCP/IP protocols or OSI protocols would be adopted widely. Over the next 9 years, the company grew from three employees to over 100 and sold software in the US, Europe and Japan.
In June 1995, InterCon was acquired by PSINet and continued to sell and maintain its suite of TCP/IP software.
In February 1996, PSINet merged InterCon with Software Ventures (another Macintosh communication software company).
In February 1997, InterCon's engineering group and its products were sold to Ascend Communications.
Products
In 1988, InterCon was pursuing two product lines, TCP/Connect (based originally on NCSA Telnet), and an email product. Unfortunately, the licensing for the email product fell through in negotiations, so it was never sold, and InterCon would have to wait a few more years (until TCP/Connect II) before it could provide email to customers.
TCP/Connect
TCP/Connect was InterCon's flagship product. Launched at Macworld Conference & Expo in August 1988, the product provided the same features as NCSA Telnet, with commercial technical support as its only significant added benefit. This was to change rapidly over the next few months, and by October of that year, InterCon was showing the product at the first InterOp Expo with new features including a graphical FTP Client (one of the first on the Macintosh) and IBM 3270 emulation.
Over the next few years, InterCon added more terminal emulation and file transfer capabilities to the product, but no other major protocols until the product was replaced with a significant rewrite: TCP/Connect II.
TCP/Connect II
TCP/Connect II was to remain InterCon's flagship product from 1990 until 1995. Although TCP/Connect was primarily a terminal emulation and file transfer program, TCP/Connect II branched out into a full-fledged internet suite. At introduction, it featured email and network news reader support along with additional terminal emulations in addition to the already-popular IBM 3270, and DEC VT-240 emulations.
Over the next 5 years, the product evolved quickly and kept or set the pace for many advanced features, including embedded graphics and multimedia content in email; advanced email automation, filtering, and highlighting; a high-speed web browser; a gopher client; and many minor features and protocols.
After the introduction of InterCon's web browser in TCP/Connect II, AOL licensed the browser in 1995 for use with their dial-up networking services. In order to separate the browser from the rest of the suite, it was dubbed WebShark.
tcpCONNECT4
tcpCONNECT4 (renamed from TCP/Connect II and with additional features) was a "do-everything suite of TCP/IP applications for Internet or intranet use" that was released in 1996 and had few changes before the company's sale to Ascend Communications.
NFS/Share
NFS/Share was InterCon's second most popular product and provided high-performance access to file servers using the NFS protocol. NFS was used widely in educational environments because it was the key file sharing system for Sun Microsystems's line of UNIX servers. NFS/Share's adoption mirrored that popularity, finding a home in many educational institutions and pre-press environments.
NFS/Share used many techniques to increase performance and provide a smooth experience for users, as such providing some of the best performance in the marketplace.
Shark Series
In 1995, InterCon decided to more directly approach the consumer market with a series of "Shark" branded products; NetShark, WebShark, and MailShark. The products were directly derived from the source code for TCP/Connect II (or 4 at the time) and was missing the Terminal Emulation technology.
NetShark
NetShark (and the derivative MailShark) was an internet suite product based on TCP/Connect but including only email and web clients. The slimmed-down version was aimed at consumers, but never really became a popular offering.
MailShark
MailShark was created but never sold. It contained only the email portions of TCP/Connect.
WebShark
WebShark contained only the web browser portion of TCP/Connect. WebShark was licensed by AOL for use with their Macintosh clients to provide access to the web. A rebranded WebShark similarly shipped as Apple's eWorld Web Browser.
InterPPP/InterSLIP
InterSLIP and InterPPP were software packages that enabled Macintosh users to communicate over TCP/IP using dial-up lines without having to use an embedded TCP/IP stack. These products worked with Apple's MacTCP.
InterPrint
InterPrint was a printing product designed to allow Macintoshes to print to PostScript printers connected over TCP/IP networks. Mostly used in corporate and prepress environments, the product integrated directly into Apple's printer architecture.
InterServer Publisher
InterServer Publisher was a web server package designed to run in the background on a Macintosh.
Planet X
Planet X was an X Window System client for Macintosh that allowed you to send the screen from your Macintosh as a window to any X Window System server. The product was developed by a third party and was marketed and sold by InterCon starting in 1991.
WatchTower
WatchTower was the first SNMP Network Monitoring System developed for the Macintosh computer Developed by GBP Software (now ClueTrust) and published and sold by InterCon starting in 1990, WatchTower was the first product of its kind on the Macintosh. Although it was never a high volume product (not surprising at a retail price of $2,495), it did represent the first monitor (and agent) for the Macintosh.
IPv6 Participation
When the initial research for IPv6 was being done, InterCon participated by creating an implementation of the SIPP protocol running on the Macintosh as part of an experimental version of TCP/Connect II. Although SIPP wasn't adopted, this early effort confirmed the interest of Internet software vendors in creating IPv6-capable software.
Internet Services in Japan (IIKK)
In 1992, InterCon saw the need to expand commercial internet services in Japan in order to bolster its position in the TCP/IP market there. To do this, the company created a Japanese subsidiary, IIKK and partnered with AT&T JENS (a subsidiary of AT&T) to create the first commercial internet service providers in the country.
IIKK's initial POP was in Joi Ito's bathroom.
IIKK's first offices were in an old karaoke bar in Myogadani.
PSINet purchased IIKK and it became the core of PSINet Japan.
References
Companies established in 1988
Defunct companies of Japan
Defunct Internet service providers
Internet service providers of Japan
|
3421940
|
https://en.wikipedia.org/wiki/Cyber-security%20regulation
|
Cyber-security regulation
|
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. There are numerous measures available to prevent cyberattacks.
Cybersecurity measures include firewalls, anti-virus software, intrusion detection and prevention systems, encryption, and login passwords. There have been attempts to improve cybersecurity through regulation and collaborative efforts between the government and the private sector to encourage voluntary improvements to cybersecurity. Industry regulators, including banking regulators, have taken notice of the risk from cybersecurity and have either begun or planned to begin to include cybersecurity as an aspect of regulatory examinations.
Background
In 2011 the DoD released a guidance called the Department of Defense Strategy for Operating in Cyberspace which articulated five goals: to treat cyberspace as an operational domain, to employ new defensive concepts to protect DoD networks and systems, to partner with other agencies and the private sector in pursuit of a "whole-of-government cybersecurity Strategy", to work with international allies in support of collective cybersecurity and to support the development of a cyber workforce capable of rapid technological innovation. A March 2011 GAO report "identified protecting the federal government's information systems and the nation's cyber critical infrastructure as a governmentwide high-risk area" noting that federal information security had been designated a high-risk area since 1997. As of 2003 systems protecting critical infrastructure, called cyber critical infrastructure protection of cyber CIP has also been included.
In November 2013, the DoD put forward the new cybersecurity rule (78 Fed. Reg. 69373), which imposed certain requirements on contractors: compliance with certain NIST IT standards, mandatory reporting of cybersecurity incidents to the DoD, and a "flow-down" clause that applies the same requirements to subcontractors.
A June 2013 Congressional report found there were over 50 statutes relevant to cybersecurity compliance. The Federal Information Security Management Act of 2002 (FISMA) is one of the key statutes governing federal cybersecurity regulations.
United States
Federal government
There are few federal cybersecurity regulations and the ones that exist focus on specific industries. The three main cybersecurity regulations are the 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002 Homeland Security Act, which included the Federal Information Security Management Act (FISMA). The three regulations mandate that healthcare organizations, financial institutions, and federal agencies should protect their systems and information. For example, FISMA, which applies to every government agency, "requires the development and implementation of mandatory policies, principles, standards, and guidelines on information security." However, the regulations do not address numerous computer-related industries, such as Internet Service Providers (ISPs) and software companies. Furthermore, the regulations do not specify what cybersecurity measures must be implemented and require only a "reasonable" level of security. The vague language of these regulations leaves much room for interpretation. Bruce Schneier, the founder of Cupertino's Counterpane Internet Security, argues that companies will not make sufficient investments in cybersecurity unless the government forces them to do so. He also states that successful cyberattacks on government systems still occur despite government efforts.
It has been suggested that the Data Quality Act already provides the Office of Management and Budget the statutory authority to implement critical infrastructure protection regulations by the Administrative Procedure Act rulemaking process. The idea has not been fully vetted and would require additional legal analysis before a rulemaking could begin.
State governments
State governments have attempted to improve cybersecurity by increasing public visibility of firms with weak security. In 2003, California passed the Notice of Security Breach Act, which requires that any company that maintains personal information of California citizens and has a security breach must disclose the details of the event. Personal information includes name, social security number, driver's license number, credit card number or financial information. Several other states have followed California's example and passed similar security breach notification regulations. Such security breach notification regulations punish firms for their cybersecurity failures while giving them the freedom to choose how to secure their systems. Also, the regulation creates an incentive for companies to voluntarily invest in cybersecurity to avoid the potential loss of reputation and the resulting economic loss that can come from a successful cyber attack.
In 2004, the California State Legislature passed California Assembly Bill 1950, which also applies to businesses that own or maintain personal information for California residents. The regulation dictates for businesses to maintain a reasonable level of security and that they required security practices also extend to business partners. The regulation is an improvement on the federal standard because it expands the number of firms required to maintain an acceptable standard of cybersecurity. However, like the federal legislation, it requires a "reasonable" level of cybersecurity, which leaves much room for interpretation until case law is established.
Proposed regulation
The US Congress has proposed numerous bills that expand upon cybersecurity regulation. The Consumer Data Security and Notification Act amends the Gramm-Leach-Bliley Act to require disclosure of security breaches by financial institutions. Congressmen have also proposed "expanding Gramm-Leach-Bliley to all industries that touch consumer financial information, including any firm that accepts payment by a credit card." Congress has proposed cybersecurity regulations similar to California's Notice of Security Breach Act for companies that maintain personal information. The Information Protection and Security Act requires that data brokers "ensure data accuracy and confidentiality, authenticate and track users, detect and prevent unauthorized activity, and mitigate potential harm to individuals."
In addition to requiring companies to improve cybersecurity, Congress is also considering bills that criminalize cyberattacks. The Securely Protect Yourself Against Cyber Trespass Act (SPY ACT) was a bill of this type. It focused on phishing and spyware bill and was passed on May 23, 2005, in the US House of Representatives but died in the US Senate. The bill "makes unlawful the unauthorized usage of a computer to take control of it, modify its setting, collect or induce the owner to disclose personally identifiable information, install unsolicited software, and tamper with security, anti-spyware, or anti-virus software."
On May 12, 2011, US Barack Obama proposed a package of cybersecurity legislative reforms to improve the security of US persons, the federal government, and critical infrastructure. A year of public debate and Congress hearings followed, resulting in the House of Representative passing an information sharing bill and the Senate developing a compromise bill seeking to balance national security, privacy, and business interests.
In July 2012, the Cybersecurity Act of 2012 was proposed by Senators Joseph Lieberman and Susan Collins. The bill would have required creating voluntary "best practice standards" for protection of key infrastructure from cyber attacks, which businesses would be encouraged to adopt through incentives such as liability protection. The bill was put to a vote in the Senate but failed to pass. Obama had voiced his support for the Act in a Wall Street Journal op-ed, and it also received support from officials in the military and national security including John O. Brennan, the chief counterterrorism adviser to the White House. According to The Washington Post, experts said that the failure to pass the act may leave the United States "vulnerable to widespread hacking or a serious cyberattack." The act was opposed by Republican senators like John McCain who was concerned that the act would introduce regulations that would not be effective and could be a "burden" for businesses. After the Senate vote, Republican Senator Kay Bailey Hutchison stated that the opposition to the bill was not a partisan issue but it not take the right approach to cybersecurity.The senate vote was not strictly along partisan lines, as six Democrats voted against it, and five Republicans voted for it. Critics of the bill included the US Chamber of Commerce, advocacy groups like the American Civil Liberties Union and the Electronic Frontier Foundation, cybersecurity expert Jody Westby, and The Heritage Foundation, both of whom argued that although the government must act on cybersecurity, the bill was flawed in its approach and represented "too intrusive a federal role."
In February 2013, Obama proposed the Executive Order Improving Critical Infrastructure Cybersecurity. It represents the latest iteration of policy but is not considered to be law as it has not been addressed by Congress yet. It seeks to improve existing public-private partnerships by enhancing timeliness of information flow between DHS and critical infrastructure companies. It directs federal agencies to share cyber threat intelligence warnings to any private sector entity identified as a target. It also tasks DHS with improving the process to expedite security clearance processes for applicable public and private sector entities to enable the federal government to share this information at the appropriate sensitive and classified levels. It directs the development of a framework to reduce cyber risks, incorporating current industry best practices and voluntary standards. Lastly, it tasks the federal agencies involved with incorporating privacy and civil liberties protections in line with Fair Information Practice Principles.
In January 2015, Obama announced a new cybersecurity legislative proposal. The proposal was made in an effort to prepare the US from the expanding number of cyber crimes. In the proposal, Obama outlined three main efforts to work towards a more secure cyberspace for the US. The first main effort emphasized the importance of enabling cybersecurity information sharing. By enabling that, the proposal encouraged information sharing between the government and the private sector. That would allow the government to know what main cyber threats private firms are facing and would then allow the government to provide liability protection to those firms that shared their information. Furthermore, that would give the government a better idea of what the US needs to be protected against. Another main effort that was emphasized in this proposal was to modernize the law enforcement authorities to make them more equipped to properly deal with cyber crimes by giving them the tools they need in order to do so. It would also update classifications of cyber crimes and consequences. One way this would be done would be by making it a crime for overseas selling of financial information. Another goal of the effort is to place cyber crimes prosecutable. The last major effort of the legislative proposal was to require businesses to report data breaching to consumers if their personal information had been sacrificed. By requiring companies to do so, consumers are aware of when they are in danger of identity theft.
In February 2016, Obama developed a Cybersecurity National Security Action Plan (CNAP). The plan was made to create long-term actions and strategies in an effort to protect the US against cyber threats. The focus of the plan was to inform the public about the growing threat of cyber crimes, improve cybersecurity protections, protects personal information of Americans, and to inform Americans on how to control digital security. One of the highlights of this plan include creating a "Commission on Enhancing National Cybersecurity." The goal of this is to create a Commission that consists of a diverse group of thinkers with perspectives that can contribute to make recommendations on how to create a stronger cybersecurity for the public and private sector. The second highlight of the plan is to change Government IT. The new Government IT will make it so that a more secure IT can be put in place. The third highlight of the plan is to give Americans knowledge on how they can secure their online accounts and avoid theft of their personal information through multi-factor authentication. The fourth highlight of the plan is to invest 35% more money that was invested in 2016 into cybersecurity.
Other government efforts
In addition to regulation, the federal government has tried to improve cybersecurity by allocating more resources to research and collaborating with the private sector to write standards. In 2003, the President's National Strategy to Secure Cyberspace made the Department of Homeland Security (DHS) responsible for security recommendations and researching national solutions. The plan calls for cooperative efforts between government and industry "to create an emergency response system to cyber-attacks and to reduce the nation's vulnerability to such threats
" In 2004, the US Congress allocated $4.7 billion toward cybersecurity and achieving many of the goals stated in the President's National Strategy to Secure Cyberspace. Some industry security experts state that the President's National Strategy to Secure Cyberspace is a good first step but is insufficient. Bruce Schneier stated, "The National Strategy to Secure Cyberspace hasn't secured anything yet." However, the President's National Strategy clearly states that the purpose is to provide a framework for the owners of computer systems to improve their security rather than the government taking over and solving the problem. However, companies that participate in the collaborative efforts outlined in the strategy are not required to adopt the discovered security solutions.
In the United States, the US Congress is trying to make information more transparent after the Cyber Security Act of 2012, which would have created voluntary standards for protecting vital infrastructure, failed to pass through the Senate. In February 2013, the White House issued an executive order, titled "Improving Critical Infrastructure Cybersecurity," which allows the executive branch to share information about threats with more companies and individuals. In April 2013, the House of Representatives passed the Cyber Intelligence Sharing and Protection Act (CISPA), which calls for protecting against lawsuits aimed at companies that disclose breach information. The Obama administration said that it might veto the bill.
India
In the light of the hacking of the website of the Indian Space Agency's commercial arm in 2015, Antrix Corporation and government's Digital India programme, a cyberlaw expert and advocate at the Supreme Court of India, Pavan Duggal, stated that "a dedicated cyber security legislation as a key requirement for India. It is not sufficient to merely put cyber security as a part of the IT Act. We have to see cyber security not only from the sectoral perspective, but also from the national perspective."
European Union
Cybersecurity standards have been of great prominence in today's technology driven businesses. To maximize their profits, corporations leverage technology by running most of their operations by the internet. Since there are a large number of risks that entail internetwork operations, such operations must be protected by comprehensive and extensive regulations. Existing cybersecurity regulations all cover different aspects of business operations and often vary by region or country in which a business operates. Because of the differences in a country's society, infrastructure, and values, one overarching cyber security standard is not optimal for decreasing risks. While US standards provide a basis for operations, the European Union has created a more tailored regulation for businesses operating specifically within the EU. Also, in light of Brexit, it is important to consider how the UK has chosen to adhere to such security regulations.
Three major regulations within the EU include the ENISA, the NIS Directive and the EU GDPR. They are part of the Digital Single Market strategy.
ENISA
The European Union Agency for Cybersecurity (ENISA) is a governing agency that was originally set up by the Regulation (EC) No 460/2004 of the European Parliament and of the Council of 10 March 2004 for the Purpose of Raising Network and Information Security (NIS) for all internetwork operations in the EU. ENISA currently runs under Regulation (EU) No 526/2013, which has replaced the original regulation in 2013. ENISA works actively with all member states of the EU to provide a range of services. The focus of their operations are on three factors:
Recommendations to member states on the course of action for security breaches
Policy making and implementation support for all members states of the EU
Direct support with ENISA taking a hands-on approach to working with operational teams in the EU
ENISA is made up of a management board that relies on the support of the executive director and the Permanent Stakeholders Group. Most operations, however, are run by the heads of various departments.
ENISA has released various publications that cover all major issues on cybersecurity. ENISA's past and current initiatives include the EU Cloud Strategy, Open Standards in Information Communications Technology, a Cyber Security Strategy of the EU and a Cyber Security Coordination Group. ENISA also works in collaboration with existing international standard organizations like the ISO and the ITU.
NIS Directive
On July 6, 2016, the European Parliament set into policy the Directive on Security of Network and Information Systems (the NIS Directive).
The directive went into effect in August 2016, and all member states of the European Union were given 21 months to incorporate the directive's regulations into their own national laws. The aim of the NIS Directive is to create an overall higher level of cybersecurity in the EU. The directive significantly affects digital service providers (DSPs) and operators of essential services (OESs). Operators of essential services include any organizations whose operations would be greatly affected in the case of a security breach if they engage in critical societal or economic activities. Both DSPs and OES are now held accountable for reporting major security incidents to Computer Security Incident Response Teams (CSIRT). While DSPs are not held to as stringent regulations as operators of essential services, DSPs that are not set up in the EU but still operate in the EU still face regulations. Even if DSPs and OES outsource the maintenance of their information systems to third parties, the NIS Directive still holds them accountable for any security incidents.
The member states of the EU are required to create a NIS directive strategy, which includes the CSIRTs, in addition to National Competent Authorities (NCAs) and Single Points of Contact (SPOCs). Such resources are given the responsibility of handling cybersecurity breaches in a way that minimizes impact. In addition, all member states of the EU are encouraged to share cyber security information.
Security requirements include technical measures that manage the risks of cybersecurity breaches in a preventative manner. Both DSP and OES must provide information that allows for an in depth assessment of their information systems and security policies. All significant incidents must be notified to the CSIRTs. Significant cybersecurity incidents are determined by the number of users affected by the security breach as well as the longevity of the incident and the geographical reach of the incident. A NIS 2 is in the making.
EU Cybersecurity Act
The EU Cybersecurity Act establishes an EU-wide cybersecurity certification framework for digital products, services and processes. It complements the NIS Directive. ENISA will have a key role in setting up and maintaining the European cybersecurity certification framework.
EU GDPR
The EU General Data Protection Regulation (GDPR) was set into place on 14 April 2016, but the current date of enforcement is set to be on 25 May 2018. The GDPR aims to bring a single standard for data protection among all member states in the EU. Changes include the redefining of geographical borders. It applies to entities that operate in the EU or deal with the data of any resident of the EU. Regardless of where the data is processed, if an EU citizen's data is being processed, the entity is now subject to the GDPR.
Fines are also much more stringent under the GDPR and can total €20 million or 4% of an entity's annual turnover, whichever is higher. In addition, like in previous regulations, all data breaches that effect the rights and freedoms of individuals residing in the EU must be disclosed within 72 hours.
The overarching board, the EU Data Protection Board, EDP, is in charge of all oversight set by the GDPR.
Consent plays a major role in the GDPR. Companies that hold data in regards to EU citizens must now also offer to them the right to back out of sharing data just as easily as when they consented to sharing data.
In addition, citizens can also restrict processing of the data stored on them and can choose to allow companies to store their data but not process it, which creates a clear differentiation. Unlike previous regulations, the GDPR also restricts the transfer of a citizen's data outside of the EU or to a third party without a citizen's prior consent.
The proposed ePrivacy Regulation is also planned to be applicable from 25 May 2018.
Reactions
While experts agree that cybersecurity improvements are necessary, there is disagreement about whether the solution is more government regulation or more private-sector innovation.
Support
Many government officials and cybersecurity experts believe that the private sector has failed to solve the cybersecurity problem and that regulation is needed. Richard Clarke states that "industry only responds when you threaten regulation. If industry does not respond [to the threat], you have to follow through." He believes that software companies must be forced to produce more secure programs. Bruce Schneier also supports regulation that encourages software companies to write more secure code through economic incentives. US Representative Rick Boucher (D–VA) proposes improving cybersecurity by making software companies liable for security flaws in their code. In addition, to improving software security, Clarke believes that certain industries, such as utilities and ISPs, require regulation.
Opposition
On the other hand, many private-sector executives and lobbyists believe that more regulation will restrict their ability to improve cybersecurity. Harris Miller, a lobbyist and president of the Information Technology Association of America, believes that regulation inhibits innovation. Rick White, former corporate attorney and president and CEO of the lobby group TechNet, also opposes more regulation. He states that "the private-sector must continue to be able to innovate and adapt in response to new attack methods in cyber space, and toward that end, we commend President Bush and the Congress for exercising regulatory restraint."
Another reason many private-sector executives oppose regulation is that it is costly and involves government oversight in private enterprise. Firms are just as concerned about regulation reducing profits as they are about regulation limiting their flexibility to solve the cybersecurity problem efficiently.
See also
CERT Coordination Center
Cyber security standards
Cybersecurity Information Sharing Act
Default password
List of data breaches
Medical device hijack
National Cyber Security Division
National Strategy to Secure Cyberspace
Presidential directive
Proactive cyber defence
United States Computer Emergency Readiness Team
United States Department of Homeland Security
Notes
"A chronology of data breaches reported since the ChoicePoint incident." (2005). Retrieved October 13, 2005.
"Electronic privacy information center bill track: Tracking privacy, speech and civil liberties in the 109th congress." (2005). Retrieved October 23, 2005.
"How computer viruses work." (2005). Retrieved October 10, 2005.
"The National Strategy to Secure Cyberspace." (2003). Retrieved December 14, 2005.
"Notice of security breach – civil code sections 1798.29 and 1798.82 – 1798.84." 2003). Retrieved October 23, 2005.
"Richard Clarke interview." (2003). Retrieved December 4, 2005.
Gordon, L. A., Loeb, M. P., Lucyshyn, W. & Richardson, R. (2005). " 2005 CSI/FBI computer crime and security survey." Retrieved October 10, 2005.
Heiman, B. J. (2003). Cybersecurity regulation is here. RSA security conference, Washington, D.C. Retrieved October 17, 2005.
Kirby, C. (2003, December 4, 2003). "Forum focuses on cybersecurity". San Francisco Chronicle.
Lemos, R. (2003). "Bush unveils final cybersecurity plan." Retrieved December 4, 2005.
Menn, J. (2002, January 14, 2002). "Security flaws may be pitfall for Microsoft". Los Angeles Times, pp. C1.
Rasmussen, M., & Brown, A. (2004). "California Law Establishes Duty of Care for Information Security." Retrieved October 31, 2005.
Schmitt, E., Charron, C., Anderson, E., & Joseph, J. (2004). "What Proposed Data Laws Will Mean for Marketers." Retrieved October 31, 2005.
Jennifer Rizzo. (August 2, 2012) "Cybersecurity bill fails in Senate." Accessed August 29, 2012.
Paul Rosenzweig. (July 23, 2012) "Cybersecurity Act of 2012: Revised Cyber Bill Still Has Problems." The Heritage Foundation. Accessed August 20, 2012.
Ed O'Keefe & Ellen Nakashima. (August 2, 2012 ) "Cybersecurity bill fails in Senate." The Washington Post. Accessed August 20, 2012.
Alex Fitzpatrick. (July 20, 2012) "Obama Gives Thumbs-Up to New Cybersecurity Bill." Mashable. Accessed August 29, 2012.
Brendan Sasso. (August 4, 2012) "After defeat of Senate cybersecurity bill, Obama weighs executive-order option". The Hill. Accessed August 20, 2012.
Jaikumar Vijayan. (August 16, 2012) "No partisan fight over cybersecurity bill, GOP senator says". Computerworld. Accessed August 29, 2012.
Carl Franzen. (August 2, 2012) "As Cybersecurity Bill Fails In Senate, Privacy Advocates Rejoice". TPM. August 29, 2012.
Alex Fitzpatrick. (August 2, 2012) "Cybersecurity Bill Stalls in the Senate". Mashable. Accessed August 29, 2012.
Jody Westby (August 13, 2012) "Congress Needs to Go Back To School on Cyber Legislation". Forbes. Accessed August 20, 2012.
References
Government in the United States
Computer security procedures
Cyberwarfare
Politics and technology
Regulation of technologies
|
43922987
|
https://en.wikipedia.org/wiki/Xerox%20500%20series
|
Xerox 500 series
|
The Xerox 500 series was a line of computers from Xerox Data Systems (XDS) introduced in the early 1970s as backward-compatible upgrades for the Sigma series machines.
Although orders for the Xerox 530 were deemed "encouraging" as of January 1974,
the systems had failed to gain traction by the time Xerox sold its Data Systems Division in 1975. The buyer, Honeywell, Inc., continued to support existing 500-series systems until 1984 but discontinued manufacturing.
Binary integer arithmetic was standard on all models; floating-point was optional on the 530, and standard on the 550 and 560. The 560 also supported decimal arithmetic. The 550 and 560 included one or more "system control processors" (CPs) to handle interrupts, diagnostics, clocks, direct I/O, and operator communications. Systems were clusterable, with multiple "basic processors" (BPs), I/O processors (IOPs), and "system control processors" (CPs) sharing busses and memory.
16 bit systems (Xerox 530)
The Xerox 530 system was a 16-bit computer aimed at upgrading the 16-bit Sigma 2 and 3 systems. The 530 was the first system of the line introduced in early 1973.
The 530 supported memory sizes of 8 K to 64 K 16-bit words (16 KB to 128 KB) with a cycle time of 800 ns. The memory protection feature protected the foreground (real-time) program from the background tasks.
When IBM dropped the 16-bit IBM 1130, Xerox began marketing the 530 as a possible successor,
including mention of COBOL and RPG. Both the 1130 and Xerox 530 had Indirect addressing and 8-bit relative addressing.
On the IBM 1130/1800 magnetic tape drives were only available as a special feature—RPQ (Request Price Quotation). The Xerox 530 offered a choice of a 7-track drives operating at 37.5 inches per second (ips) or nine-track, 75 ips drives.
32 bit systems (Xerox 550, 560)
The Xerox 550 and Xerox 560 systems were 32-bit computers introduced in 1974. The 550 was aimed at real-time applications and intended as an upgrade for the Sigma 5. The 560 was aimed at the general-purpose Sigma 6, 7, and 9 upgrade market.
The systems were microprogrammed and constructed using large-scale and medium-scale integration (LSI and MSI) and magnetic-core memory. They featured independent Input/Output Processors (IOP), and "Direct Control" instructions for direct input/output of a single word via a parallel interface
The 550 and 560 supported 16 K to 256 K 32-bit words (64 KB to 1 MB) . Main memory cycle time was 645 ns. Virtual memory and memory protection were standard features.
A 590 system was designed but never built.
Operating systems
The 530 could run either the Basic Control Monitor (BCM) or the Real-time Batch Monitor (RBM) operating systems.
RBM could run a combination of real-time and general-purpose batch jobs running at the same time. An example of this could be RJE to a larger machine while running local computing.
The 550 ran the Control Program for Real-Time (CP-R) operating system. The 560 ran the CP-V operating system.
Much as IBM's Job Control Language was known for its "//" (Slash-Slash), Xerox's used an exclamation point, which it called "Bang."
References
External links
Photo of a Xerox 530 system with tape drive and printer
Computer-related introductions in 1973
Computer-related introductions in 1974
Mainframe computers
Minicomputers
500 series
32-bit computers
|
41591498
|
https://en.wikipedia.org/wiki/OpenGov
|
OpenGov
|
OpenGov is a government technology company that offers cloud software for public sector accounting, planning, budgeting, citizen services, and procurement. OpenGov serves over 1,000 cities, counties, and state agencies across 49 states. In April 2020, OpenGov released a full-cloud enterprise resource planning (ERP) system designed specifically for municipal and county governments.
History
OpenGov, which is headquartered in Silicon Valley, was founded in 2012 by Zachary Bookman, Nate Levine, Dakin Sloss, and Joe Lonsdale in response to the 2008 financial crisis. According to Account Executive David Spolidoro, OpenGov is "on a mission to power more effective and accountable government." The company's founders and several advisors met while working with California Common Sense, a non-profit non-partisan organization, which advocates for open data and open government principles. After observing the public sector's struggle to combat the ongoing budget crisis with outdated software systems, the group founded OpenGov with the long-term goal of bringing a modern cloud ERP to local and state governments.
In April 2016, OpenGov acquired Ontodia, a leading developer of Open data CKAN, allowing OpenGov to build out its offerings with a managed open data CKAN and dashboards to OpenGov's Reporting & Transparency suite.
In October 2017, OpenGov acquired government-serving tech company, Peak Democracy of Berkeley, California, to expand its public engagement, communication, and feedback tools.
In September 2019, OpenGov acquired ViewPoint Cloud, a platform used by city and state governments to manage community development operations, such as permitting, licensing, inspections, and code enforcement.
In April 2020, OpenGov launched the first fully-integrated cloud ERP designed specifically for local government, which consists of a fully-integrated Reporting & Transparency Platform as well as three comprehensive software suites: Budgeting & Planning, Accounting, Financial Management, and Citizen Services.
In October 2020, OpenGov acquired ClearRec, a Texas-based company, to incorporate its step-by-step bank reconciliation process technology into the OpenGov ERP Cloud.
2020 was OpenGov's best growth since its founding as it experienced “more than 100% year-over-year growth, launching more than 300 customers."
In June 2021, OpenGov acquired ProcureNow to enable its customers to run budgeting, procurement and financial operations through the same vendor.
OpenGov operates in all 50 states and, in April 2021, announced the opening of its office location in Milwaukee, Wisconsin, making it the company's sixth company location in the country and its second in the Midwest.
OpenGov was included in the Forbes list of America's Best Startup Employers 2021 in position 288.
OpenGov was included in Energage’s 2021 Top Workplaces USA within the Tech Industry.
Campaigns
On September 15, 2021, OpenGov announced its "Across America" campaign to "raise awareness of local public sector visionaries, who have devoted themselves to the betterment of their communities during a challenging time and highlight the important role they’ve played in continuing to help us move forward." As a part of the campaign, the company's CEO, Zac Bookman, embarked on a 4,000 mile cross-country biking tour, stopping along the way to thank local leadership. In support of this campaign, OpenGov also partnered up with Sandra Day O'Connor Institute to increase awareness for civic engagement and civil discourse, among other goals. On September 21, 2021, Bookman stopped in Salida, Colorado, as a part of the campaign and met with local city officials, where he was later given a tour of the downtown historic district by Salida's Treasurer Merrel Bergin. According to City Administrator Drew Nelson, OpenGov's platform has saved department heads significant amounts of time. The city has also expanded its use of the platform.
Customers
As of April 2020, OpenGov serves 1,000 government entities, including state agencies, city governments, school districts, and other special districts.
Municipalities
The City of Palo Alto was OpenGov's first customer, following a collaboration between the city and employees from nonprofit California Common Sense to launch a comprehensive open data platform.
Other notable municipality customers include Minneapolis, MN, San Antonio, TX, Richmond, VA, Tampa, FL, Savannah, GA, St. Petersburg, FL, Stamford, CT, Scranton, PA, Chapel Hill, NC, Oakland, CA, Topeka, KS, Lubbock, TX, San Antonio, TX, and Tucson, AZ.
In October 2019, the city of Plattsburgh, New York, signed a seven-year deal with OpenGov to use OpenGov's budgeting software. Despite being a seven-year deal, the contract can be terminated within 90 days of notice. OpenGov will charge the city of Plattsburgh a one-time start-up fee of $4,000 followed by an annual charge of $18,000.
Following a chain of cyber attacks and scandals, the city of Scranton, Pennsylvania, partnered up with OpenGov to use its cloud based ERP to restore public trust, improve safety, and accelerate the city's operations. The City's Business Administrator, Karl Deeley, stated that Scranton's operations had not undergone any major changes since the 1980s, so its partnership with OpenGov will enable the city to decrease resiliency on its old infrastructure.
In September 2021, the municipality of Durango, Colorado, announced its partnership with OpenGov to increase transparency with its citizens by allowing them to view the city's finances, as well as the spending of other government entities, real time. The effort to increase transparency came after Durango's former finance director, Julie Brown, was caught embezzling over $700,000 across 11 years. Durango also lost millions of dollars through clerical errors in 2019, which OpenGov's software could reduce and prevent down the road.
Counties
Notable county customers of OpenGov include Dallas County, TX, Middlesex County, NJ, Montgomery County, PA, Denton County, TX, Maui County, HI, Delaware County, OH, and Suffolk County, NY.
In June 2021, Crook County, Oregon, joined OpenGov's list of clients when it started to use OpenGov's budget and financing software, enabling residents to interact with the budget. Crook County's budgeting was done by a small team, so the county decided to automate its budgeting process through OpenGov, improving the efficiency and the effectiveness of the budgeting process.
States
In 2019, the State of West Virginia partnered with OpenGov to launch statewide financial reporting between the State and West Virginia municipalities, after having launched a transparency initiative with OpenGov in the previous year.
In 2020, the State of Idaho Controller's Office, which had already used OpenGov software to improve fiscal transparency, began using OpenGov to manage CARES Act grant funding due to the COVID-19 crisis.
Schools and Special Districts
Notable OpenGov school and special district customers include the Menlo Park City School District, Cal Poly San Luis Obispo, Loudoun County Public Schools, VA, Cincinnati Public Schools, OH, Northern Virginia Regional Park Authority, VA, and the Jackson County Water and Sewerage Authority in Georgia.
Companies
On January 11, 2021, OpenGov announced its partnership with Fyllo, a cannabis compliance software company, to streamline the ability of local municipalities to not only write and approve new cannabis regulations, but to also create a thorough compliance tracking solution. This comes in response to Fyllo’s report of an increase of 55% in the number of government meetings about marijuana regulation throughout the U.S. Cannabis legislation provides a new source of income for many local governments, so OpenGov and Fyllo will be working with local governments to allow "government officials to easily track regulations and policies tied to these processes to ensure that municipalities are compliant with state and federal law."
Board members
OpenGov's board consists of Co-Founder & Chairman Joe Lonsdale, Co-Founder & CEO Zac Bookman, Marc Andreessen of Andreessen Horowitz, Vice Chair of First Republic Bank Katherine August-deWilde, Co-Founder and former President of Medallia, Amy Pressman and Cisco Executive chairman John Chambers.
Advisors
OpenGov is advised by experts from the technology, financial, and public service sectors. Examples include:
Adrian Fenty, Mayor of Washington D.C. from 2007 to 2011
Lawrence H. Summers, Former U.S. Secretary of the Treasury
Pierre Lamond, venture capitalist
Byron Dorgan, Former U.S. Senator from North Dakota
Karen White, CEO of RMS
Maury Blackman, President & CEO of Premise
Funding
OpenGov has raised $128 million from venture capital and angel investors. A$3 million Series A round in 2012 included venture funds 8VC, Founder Collective, Valiant Capital, and "a number of high-profile angel investors." In 2013, the company raised $4 million in further investment from 8VC and new investor Thrive Capital.
On May 15, 2014, OpenGov announced a new $15 million Series B round of funding including investments from Andreessen Horowitz, 8VC, Group 11, Streamlined Ventures, Sway Ventures, and Thrive Capital.
An additional $25 million Series B round in October 2015 included additional investments from Andreessen Horowitz, 8VC, Thrive Capital, and Sway Ventures, as well as new investors Glynn Capital, Scott Cook, and Ashton Kutcher and Guy Oseary’s Sound Ventures. Marc Andreessen was also added to the board during the October 15, 2015, round.
In May 2017, the company raised $30 million in a Series C founding round and in September 2019, the startup picked up an additional $51 million in a Series D round led by Weatherford Capital and 8VC (Lonsdale’s investment firm), with participation from existing investor Andreessen Horowitz.
In mid-August 2021, Weatherford Capital, a private investment firm in Florida, closed nearly $355 million in its first round of investments for the government technology space, with OpenGov being one of the multiple civic technology companies that received a portion of the investments.
See also
Accountability
e-democracy
e-government
Freedom of information legislation
Local government
Public trust
Open government data
Transparency
Government budget
E-permitting
Fund Accounting
References
Software companies based in California
Financial software companies
Companies based in Mountain View, California
Software
Web applications
Software companies of the United States
|
40301836
|
https://en.wikipedia.org/wiki/N%2B%2B
|
N++
|
N++ is a platform video game developed and published by Metanet Software. It is the third installment of the N franchise, which started with the Adobe Flash game N. It is the sequel to N+. The game was initially released for the PlayStation 4 on July 28, 2015, in North America, and July 29, 2015, in Europe, and was later released for the Microsoft Windows and macOS operating systems on August 25, 2016, and December 26, 2016, respectively. The Xbox One version was released on October 4, 2017. The Linux version of the game was released on May 31, 2018. An expansion to the game, entitled N++ Ultimate Edition, was released for the Windows version of the game on April 21, 2017, as a free update to the game. N++ Ultimate Edition was released for the Nintendo Switch on May 24, 2018.
Gameplay
Gameplay consists of platform-style jumping, dodging, climbing and rebounding from walls, collecting gold pieces to extend the time allotted to complete each level.
Release
N++ was announced at as the sequel to the game N+. The game was released on PlayStation 4 in North America on July 28, 2015, and July 29 in Europe as a timed exclusive. In February 2016, Metanet developer Raigan Burns stated that they were working to bringing the title to the Steam selling website for personal computers. The Microsoft Windows version was released on August 25, 2016, with the OS X version following on December 26, 2016. A version for Linux was announced, and released on May 31, 2018.
An expansion, entitled N++ Ultimate Edition, was announced on December 5, 2016, and was reported to nearly double the size of the original game with more levels and new colour schemes. The expansion was released for free on April 21, 2017 for the Windows version of the game. It brings the level count to 4340, adds 60 new colour schemes, and adds a new Hardcore game mode, aimed towards veteran players.
Reception
Review aggregator website Metacritic gives N++ an average score of 84/100 for the PS4 version, 88/100 for the Xbox One version and 90/100 for the PC version. GameSpot awarded it a score of 8 out of 10, saying "N++ may represent an 'if it ain’t broke, don’t fix it' sort of expansion, but the exhilaration that it continues to offer speaks to the idea that it may have been perfect to begin with."
PC Gamer's Shaun Prescott gave the PC version of the game a 92/100 rating, describing the game as "a masterful distillation of classic action-platforming gameplay, doling out tension and elation in equal measure."
References
External links
2015 video games
Flash games ported to consoles
Indie video games
Video games about ninja
Platform games
PlayStation 4 games
Linux games
MacOS games
Video games developed in Canada
Windows games
Xbox One games
Nintendo Switch games
Multiplayer and single-player video games
|
3882218
|
https://en.wikipedia.org/wiki/Programming%20language%20theory
|
Programming language theory
|
Programming language theory (PLT) is a branch of computer science that deals with the design, implementation, analysis, characterization, and classification of formal languages known as programming languages and of their individual features. It falls within the discipline of computer science, both depending on and affecting mathematics, software engineering, linguistics and even cognitive science. It has become a well-recognized branch of computer science, and an active research area, with results published in numerous journals dedicated to PLT, as well as in general computer science and engineering publications.
History
In some ways, the history of programming language theory predates even the development of programming languages themselves. The lambda calculus, developed by Alonzo Church and Stephen Cole Kleene in the 1930s, is considered by some to be the world's first programming language, even though it was intended to model computation rather than being a means for programmers to describe algorithms to a computer system. Many modern functional programming languages have been described as providing a "thin veneer" over the lambda calculus, and many are easily described in terms of it.
The first programming language to be invented was Plankalkül, which was designed by Konrad Zuse in the 1940s, but not publicly known until 1972 (and not implemented until 1998). The first widely known and successful high-level programming language was Fortran, developed from 1954 to 1957 by a team of IBM researchers led by John Backus. The success of FORTRAN led to the formation of a committee of scientists to develop a "universal" computer language; the result of their effort was ALGOL 58. Separately, John McCarthy of MIT developed Lisp, the first language with origins in academia to be successful. With the success of these initial efforts, programming languages became an active topic of research in the 1960s and beyond.
Some other key events in the history of programming language theory since then:
1950s
Noam Chomsky developed the Chomsky hierarchy in the field of linguistics, a discovery which has directly impacted programming language theory and other branches of computer science.
1960s
The Simula language was developed by Ole-Johan Dahl and Kristen Nygaard; it is widely considered to be the first example of an object-oriented programming language; Simula also introduced the concept of coroutines.
In 1964, Peter Landin is the first to realize Church's lambda calculus can be used to model programming languages. He introduces the SECD machine which "interprets" lambda expressions.
In 1965, Landin introduces the J operator, essentially a form of continuation.
In 1966, Landin introduces ISWIM, an abstract computer programming language in his article The Next 700 Programming Languages. It is influential in the design of languages leading to the Haskell programming language.
In 1966, Corrado Böhm introduced the programming language CUCH (Curry-Church).
In 1967, Christopher Strachey publishes his influential set of lecture notes Fundamental Concepts in Programming Languages, introducing the terminology R-values, L-values, parametric polymorphism, and ad hoc polymorphism.
In 1969, J. Roger Hindley publishes The Principal Type-Scheme of an Object in Combinatory Logic, later generalized into the Hindley–Milner type inference algorithm.
In 1969, Tony Hoare introduces the Hoare logic, a form of axiomatic semantics.
In 1969, William Alvin Howard observed that a "high-level" proof system, referred to as natural deduction, can be directly interpreted in its intuitionistic version as a typed variant of the model of computation known as lambda calculus. This became known as the Curry–Howard correspondence.
1970s
In 1970, Dana Scott first publishes his work on denotational semantics.
In 1972, logic programming and Prolog were developed thus allowing computer programs to be expressed as mathematical logic.
A team of scientists at Xerox PARC led by Alan Kay develop Smalltalk, an object-oriented language widely known for its innovative development environment.
In 1974, John C. Reynolds discovers System F. It had already been discovered in 1971 by the mathematical logician Jean-Yves Girard.
From 1975, Gerald Jay Sussman and Guy Steele develop the Scheme programming language, a Lisp dialect incorporating lexical scoping, a unified namespace, and elements from the actor model including first-class continuations.
Backus, at the 1977 Turing Award lecture, assailed the current state of industrial languages and proposed a new class of programming languages now known as function-level programming languages.
In 1977, Gordon Plotkin introduces Programming Computable Functions, an abstract typed functional language.
In 1978, Robin Milner introduces the Hindley–Milner type inference algorithm for ML. Type theory became applied as a discipline to programming languages, this application has led to tremendous advances in type theory over the years.
1980s
In 1981, Gordon Plotkin publishes his paper on structured operational semantics.
In 1988, Gilles Kahn published his paper on natural semantics.
There emerged process calculi, such as the Calculus of Communicating Systems of Robin Milner, and the Communicating sequential processes model of C. A. R. Hoare, as well as similar models of concurrency such as the actor model of Carl Hewitt.
In 1985, the release of Miranda sparks an academic interest in lazy-evaluated pure functional programming languages. A committee was formed to define an open standard resulting in the release of the Haskell 1.0 standard in 1990.
Bertrand Meyer created the methodology Design by contract and incorporated it into the Eiffel programming language.
1990s
Gregor Kiczales, Jim Des Rivieres and Daniel G. Bobrow published the book The Art of the Metaobject Protocol.
Eugenio Moggi and Philip Wadler introduced the use of monads for structuring programs written in functional programming languages.
Sub-disciplines and related fields
There are several fields of study which either lie within programming language theory, or which have a profound influence on it; many of these have considerable overlap. In addition, PLT makes use of many other branches of mathematics, including computability theory, category theory, and set theory.
Formal semantics
Formal semantics is the formal specification of the behaviour of computer programs and programming languages. Three common approaches to describe the semantics or "meaning" of a computer program are denotational semantics, operational semantics and axiomatic semantics.
Type theory
Type theory is the study of type systems; which are "a tractable syntactic method for proving the absence of certain program behaviors by classifying phrases according to the kinds of values they compute". Many programming languages are distinguished by the characteristics of their type systems.
Program analysis and transformation
Program analysis is the general problem of examining a program and determining key characteristics (such as the absence of classes of program errors). Program transformation is the process of transforming a program in one form (language) to another form.
Comparative programming language analysis
Comparative programming language analysis seeks to classify programming languages into different types based on their characteristics; broad categories of programming languages are often known as programming paradigms.
Generic and metaprogramming
Metaprogramming is the generation of higher-order programs which, when executed, produce programs (possibly in a different language, or in a subset of the original language) as a result.
Domain-specific languages
Domain-specific languages are languages constructed to efficiently solve problems of a particular part of domain.
Compiler construction
Compiler theory is the theory of writing compilers (or more generally, translators); programs which translate a program written in one language into another form. The actions of a compiler are traditionally broken up into syntax analysis (scanning and parsing), semantic analysis (determining what a program should do), optimization (improving the performance of a program as indicated by some metric; typically execution speed) and code generation (generation and output of an equivalent program in some target language; often the instruction set of a CPU).
Run-time systems
Run-time systems refer to the development of programming language runtime environments and their components, including virtual machines, garbage collection, and foreign function interfaces.
Journals, publications, and conferences
Conferences are the primary venue for presenting research in programming languages. The most well known conferences include the Symposium on Principles of Programming Languages (POPL), Programming Language Design and Implementation (PLDI), the International Conference on Functional Programming (ICFP), the International Conference on Object Oriented Programming, Systems, Languages and Applications (OOPSLA) and the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS).
Notable journals that publish PLT research include the ACM Transactions on Programming Languages and Systems (TOPLAS), Journal of Functional Programming (JFP), Journal of Functional and Logic Programming, and Higher-Order and Symbolic Computation.
See also
SIGPLAN
Timeline of programming languages
Very high-level programming language
References
Further reading
Abadi, Martín and Cardelli, Luca. A Theory of Objects. Springer-Verlag.
Michael J. C. Gordon. Programming Language Theory and Its Implementation. Prentice Hall.
Gunter, Carl and Mitchell, John C. (eds.). Theoretical Aspects of Object Oriented Programming Languages: Types, Semantics, and Language Design. MIT Press.
Harper, Robert. Practical Foundations for Programming Languages. Draft version.
Knuth, Donald E. (2003). Selected Papers on Computer Languages. Stanford, California: Center for the Study of Language and Information.
Mitchell, John C. Foundations for Programming Languages.
Mitchell, John C. Introduction to Programming Language Theory.
O'Hearn, Peter. W. and Tennent, Robert. D. (1997). Algol-like Languages. Progress in Theoretical Computer Science. Birkhauser, Boston.
Pierce, Benjamin C. (2002). Types and Programming Languages. MIT Press.
Pierce, Benjamin C. Advanced Topics in Types and Programming Languages.
Pierce, Benjamin C. et al. (2010). Software Foundations.
External links
Lambda the Ultimate, a community weblog for professional discussion and repository of documents on programming language theory.
Great Works in Programming Languages. Collected by Benjamin C. Pierce (University of Pennsylvania).
Classic Papers in Programming Languages and Logic. Collected by Karl Crary (Carnegie Mellon University).
Programming Language Research. Directory by Mark Leone.
λ-Calculus: Then & Now by Dana S. Scott for the ACM Turing Centenary Celebration
Grand Challenges in Programming Languages. Panel session at POPL 2009.
|
53120412
|
https://en.wikipedia.org/wiki/United%20States-Israel%20Advanced%20Research%20Partnership%20Act%20of%202016
|
United States-Israel Advanced Research Partnership Act of 2016
|
The United States-Israel Advanced Research Partnership Act of 2016 (H.R. 5877) was a bill introduced in the United States House by U.S. Representative John Ratcliffe (R-Texas). The Democratic cosponsor is Representative James Langevin (D-RI). The legislation, which was signed into law, allows the U.S. and Israel to cooperate on cybersecurity technologies research and development.
Background
Cybersecurity industry experts believe that collaboration between countries is one of the best way to prevent cyber attacks. A critical need exists for countries to share research and development in the cybersecurity world.
The United States and Israel work together in a research and development program called the Homeland Security Advanced Research Projects Agency.
A 2014 law authorized the Department of Homeland Security to work with Israel on a pilot program to improve:
Border security
Maritime security
Aviation security
Legislative details
H.R. 5877 makes the program permanent by removing the “pilot” designation and adds cybersecurity as the fourth program area.
The law allows the Department of Homeland Security to work together with Israel on cybersecurity initiatives.
The law doesn't authorize any new expenditures. Because the Department of Homeland Security is already carrying out activities similar to this, the Congressional Budget Office estimated that the law would not affect spending. Additionally, H.R. 5877 does not contain any intergovernmental or private-sector mandates.
Legislative history
The bill followed this path from introduction to being signed into law:
7/14/16 - The bill was introduced in the House.
11/15/16 - It was amended and reported favorably by the House Committee on Homeland Security.
11/29/16 - The bill was passed by the full House of Representatives by voice vote.
12/10/16 - The Senate passed the bill by unanimous consent.
12/16/16 - President Barack Obama signed the bill into law, making it Public Law 114-304.
See also
Homeland Security Act of 2002
Information security
Israeli Ministry of Public Security
Network security
References
External links
Homeland Security Advanced Research Projects Agency website
Homeland Security Advanced Research Projects Agency fact sheet
Statutory law
|
20420243
|
https://en.wikipedia.org/wiki/Scott%20Aaronson
|
Scott Aaronson
|
Scott Joel Aaronson (born May 21, 1981) is an American theoretical computer scientist and David J. Bruton Jr. Centennial Professor of Computer Science at the University of Texas at Austin. His primary areas of research are quantum computing and computational complexity theory.
Early life and education
Aaronson grew up in the United States, though he spent a year in Asia when his father—a science writer turned public-relations executive—was posted to Hong Kong. He enrolled in a school there that permitted him to skip ahead several years in math, but upon returning to the US, he found his education restrictive, getting bad grades and having run-ins with teachers. He enrolled in The Clarkson School, a program for gifted youngsters run by Clarkson University, which enabled Aaronson to apply for colleges while only in his freshman year of high school. He was accepted into Cornell University, where he obtained his BSc in computer science in 2000, and where he resided at the Telluride House. He then attended the University of California, Berkeley, for his PhD, which he got in 2004 under the supervision of Umesh Vazirani.
Aaronson had shown ability in mathematics from an early age, teaching himself calculus at the age of 11, provoked by symbols in a babysitter's textbook. He discovered computer programming at age 11, and felt he lagged behind peers, who had already been coding for years. In part due to Aaronson getting into advanced mathematics before getting into computer programming, he felt drawn to theoretical computing, particularly computational complexity theory. At Cornell, he became interested in quantum computing and devoted himself to computational complexity and quantum computing.
Career
After postdoctorates at the Institute for Advanced Study and the University of Waterloo, he took a faculty position at MIT in 2007. His primary area of research is quantum computing and computational complexity theory more generally.
In the summer of 2016 he moved from MIT to the University of Texas at Austin as David J. Bruton Jr. Centennial Professor of Computer Science and as the founding director of UT Austin's new Quantum Information Center.
Awards
Aaronson is one of two winners of the 2012 Alan T. Waterman Award.
Best Student Paper Awards at the Computational Complexity Conference for the papers "Limitations of Quantum Advice and One-Way Communication" (2004) and "Quantum Certificate Complexity" (2003).
Danny Lewin Best Student Paper Award at the Symposium on Theory of Computing for the paper "Lower Bounds for Local Search by Quantum Arguments" (2004).
2017 Simons Investigator
He was elected as an ACM Fellow in 2019 "for contributions to quantum computing and computational complexity".
He was awarded the 2020 ACM Prize in Computing "for groundbreaking contributions to quantum computing".
Popular work
He is a founder of the Complexity Zoo wiki, which catalogs all classes of computational complexity. He is the author of the much-read blog "Shtetl-Optimized".
In the interview to Scientific American he answers why his blog is called shtetl-optimized, and about his preoccupation to the past:
He also wrote the essay "Who Can Name The Bigger Number?". The latter work, widely distributed in academic computer science, uses the concept of Busy Beaver Numbers as described by Tibor Radó to illustrate the limits of computability in a pedagogic environment.
He has also taught a graduate-level survey course, "Quantum Computing Since Democritus", for which notes are available online, and have been published as a book by Cambridge University Press. It weaves together disparate topics into a cohesive whole, including quantum mechanics, complexity, free will, time travel, the anthropic principle and more. Many of these interdisciplinary applications of computational complexity were later fleshed out in his article, "Why Philosophers Should Care About Computational Complexity". Since then, Aaronson published a book entitled Quantum Computing Since Democritus based on the course.
An article of Aaronson's, "The Limits of Quantum Computers", was published in Scientific American, and he was a guest speaker at the 2007 Foundational Questions in Science Institute conference. Aaronson is frequently cited in the non-academic press, such as Science News, The Age, ZDNet, Slashdot, New Scientist, The New York Times, and Forbes magazine.
Love Communications plagiarism
Aaronson was the subject of media attention in October 2007, when he accused Australian advertising agency Love Communications of plagiarizing a lecture he wrote on quantum mechanics in an advertisement of theirs. He alleged that a commercial for Ricoh Australia by Sydney-based agency Love Communications appropriated content almost verbatim from the lecture. Aaronson received an email from the agency claiming to have sought legal advice and saying they did not believe that they were in violation of his copyright.
Dissatisfied, Aaronson pursued the matter, and the agency settled the dispute without admitting wrongdoing by making a charitable contribution to two science organizations of his choice. Concerning this matter, Aaronson stated, "Someone suggested [on my blog] a cameo with the models but if it was between that and a free printer, I think I'd take the printer."
Personal life
Aaronson is married to computer scientist Dana Moshkovitz.
References
External links
Aaronson's blog
Aaronson homepage
UT Austin Quantum Information Center homepage
American people of Jewish descent
Jewish scientists
Cornell University alumni
UC Berkeley College of Engineering alumni
MIT School of Engineering faculty
Institute for Advanced Study visiting scholars
Theoretical computer scientists
Science bloggers
1981 births
Living people
American expatriates in Hong Kong
Simons Investigator
University of Texas at Austin faculty
Quantum information scientists
Fellows of the Association for Computing Machinery
|
13447510
|
https://en.wikipedia.org/wiki/Rational%20Software%20Modeler
|
Rational Software Modeler
|
Rational Software Modeler (RSM), made by IBM's Rational Software division, is a Unified Modeling Language (UML) 2.0-based visual modeling and design tool. Rational Software Modeler is based on the Eclipse open-source software framework and is used for visual modeling and model-driven development (MDD) with UML for creating applications and web services. IBM ceased marketing Rational Software Modeler in 2010 and ended support for it in 2015. Much of the same functionality is now available through Rational Software Architect.
Overview
The capabilities of the last major release (Version 7) of Rational Software Modeler include:
Support for UML version 2.1
Support for model-to-model transformations
Model management for parallel development and architectural re-factoring, e.g., split, combine, compare and merge models and model fragments
Support for application of design patterns
It is integrated with other IBM Rational Software tools, such as ClearCase configuration management and ClearQuest exception handling (defect reports and change requests).
RSM is engineered as a plugin that sits on top of the open-source Eclipse development platform. RSM can be installed either on top of an existing Eclipse v3.2 installation, or as a new Eclipse v3.2 instance.
As RSM is Eclipse-based, it can use third-party Eclipse plugins, as well as plugins specifically for Rational tools.
History
Rational Software has a long history in application modeling, beginning in the early 1990s with the work of Grady Booch, James Rumbaugh and Ivar Jacobson. They combined competing modeling approaches to form what eventually became the Unified Modeling Language.
Rational Software's first visual modeling and development tool was Rational Rose, a stand-alone modeling tool that integrated the application programming interface (API) level with third-party Integrated Development Environments (IDEs) in order to support a variety of programming languages and other implementation technologies.
While Rational Rose was an important step towards bringing Model-driven development (MDD) closer to practicing software developers, it was found that only a small fraction of developers used modeling on a routine basis. A key problem was identified – developers didn't like to leave their IDE. They wanted visual modeling to be integrated — not with their IDE, but rather inside their IDE.
Rational responded to this need in 2002 with IBM Rational XDE software, providing a development environment for the programming technologies emerging at the time: Java and Microsoft .NET. IBM Rational XDE was characterized as the next generation of IBM Rational Rose — not a new version of it (hence the name change), and not necessarily a replacement for Rose (since IBM Rational XDE was purposefully restricted to support only a select number of IDEs and implementation technologies). However, with each addition of a tool or capability came another point-to-point integration requirement. As more and more capabilities were added, Rational began to reach the practical limits of this style of tool integration.
For the next-generation MDD products, model-driven development functions were built on top of Eclipse to form a more complete MDD tool. IBM Rational Software Architect, IBM Rational Software Modeler and IBM Rational Systems Developer were the result of these changes; merging the silos that previously defined modeling, development and code analysis into a more integrated design.
IBM Rational Software Modeler versions
v6.0: Released December 2004. Based on Eclipse v3.0, UML v2.0.
v7.0: Released December 2006. Based on Eclipse v3.2, UML v2.1.
v7.5: Released September 2008.
v7.5.5.5: Last version released.
List of Eclipse-based IBM analysis, design and construction products
Rational Application Developer
Rational Software Architect
Rational Systems Developer
Rational Business Developer Extension
WebSphere Integration Developer
See also
List of integrated development environments
Rational Software
References
External links
IBM Rational Software Modeler, Version 7.5 Information Center (RSM V7.5 InfoCenter)
IBM Rational Software Modeler, Version 7.5 Release Notes (RSM V7.5 Release Notes)
Product home page for Rational Software Modeler
IBM developerWorks page for Rational Software Modeler
Architecture Management Team Blog
Integrated development environments
Software Modeler
|
798685
|
https://en.wikipedia.org/wiki/Joel%20Spolsky
|
Joel Spolsky
|
Avram Joel Spolsky (born 1965) is a software engineer and writer. He is the author of Joel on Software, a blog on software development, and the creator of the project management software Trello. He was a Program Manager on the Microsoft Excel team between 1991 and 1994. He later founded Fog Creek Software in 2000 and launched the Joel on Software blog. In 2008, he launched the Stack Overflow programmer Q&A site in collaboration with Jeff Atwood. Using the Stack Exchange software product which powers Stack Overflow, the Stack Exchange Network now hosts over 170 Q&A sites.
Biography
Spolsky was born to Jewish parents and grew up in Albuquerque, New Mexico, and lived there until he was 15. He then moved with his family to Israel, where he attended high school and completed his military service in the Paratroopers Brigade. He was one of the founders of the kibbutz Hanaton in Lower Galilee. In 1987, he returned to the United States to attend college. He studied at the University of Pennsylvania for a year before transferring to Yale University, where he was a member of Pierson College and graduated in 1991 with a BS summa cum laude in Computer Science.
Spolsky started working at Microsoft in 1991 as a Program Manager on the Microsoft Excel team, where he designed Excel Basic and drove Microsoft's Visual Basic for Applications strategy. He moved to New York City in 1995 where he worked for Viacom and Juno Online Services. In 2000, he founded Fog Creek Software and created the Joel on Software blog. Joel on Software was "one of the first blogs set up by a business owner".
In 2005, Spolsky co-produced and appeared in Aardvark'd: 12 Weeks with Geeks, a documentary documenting Fog Creek's development of Project Aardvark, a remote assistance tool.
In 2008, Spolsky co-founded Stack Overflow, a question and answer community website for software developers, with Jeff Atwood. He served as CEO of the company until Prashanth Chandrasekar succeeded him in the role on October 1, 2019. Spolsky remains the company's Chairman.
In 2011, Spolsky launched Trello, an online project management tool inspired by Kanban methodology.
In 2016, Spolsky announced the appointment of Anil Dash as Fog Creek Software's new CEO, with Spolsky continuing as Stack Overflow's CEO and as a Fog Creek Software board member. The company has since been renamed Glitch.
He is the author of five books, including User Interface Design for Programmers and Smart and Gets Things Done. He is also the creator of "The Joel Test".
Spolsky coined the term fix it twice for a process improvement method. It implies a quick, immediate solution for fixing an incident and a second, slower fix for preventing the same problem from occurring again by targeting the root cause. His use of the term Shlemiel the painter's algorithm, referring to an algorithm that is not scalable due to performing too many redundant actions, was described by salon.com's Scott Rosenberg as an example of good writing "about their insular world in a way that wins the respect of their colleagues and the attention of outsiders."
Spolsky made an appearance at the WeAreDevelopers Conference 2017, stating how developers are writing the script for the future. In his speech, Spolsky talks about how software is eating the world, how it is becoming more evident in everyday life as people interact with more software on a day-to-day basis, and how developers are helping to shape how the world will work as technology keeps evolving. He uses the metaphor "we are just little vegetables floating in software soup", referring to our constant use of software for the most mundane activities, including work, social networking, and even taking a cab.
In December 2019, Spolsky revealed he was the Chairman of an open-source simulation startup called HASH.
Personal life
In 2015, Spolsky announced his marriage to his husband, Jared, on social media and his blog. He lives on the Upper West Side of Manhattan.
Publications
See also
List of LGBT people from New York City
Tech companies in the New York metropolitan area
Leaky abstraction
References
External links
Joel on Software
Links to essays in 'Best Software Writing I'
1965 births
American emigrants to Israel
Israeli bloggers
American bloggers
Living people
People from Albuquerque, New Mexico
American computer programmers
American software engineers
American technology writers
American computer businesspeople
Israeli businesspeople
Microsoft employees
University of Pennsylvania alumni
Yale University alumni
Jewish American writers
Jewish bloggers
LGBT businesspeople from the United States
LGBT people from New Mexico
LGBT Jews
21st-century American non-fiction writers
Businesspeople in software
21st-century American Jews
|
1165316
|
https://en.wikipedia.org/wiki/Active%20Desktop
|
Active Desktop
|
Active Desktop was a feature of Microsoft Internet Explorer 4.0's optional Windows Desktop Update that allowed users to add HTML content to the desktop, along with some other features. This function was intended to be installed on the then-current Windows 95 operating system. It was also included in Windows 98 and later Windows operating systems up through 32-bit XP, but was absent from XP Professional x64 Edition (for AMD64) and all subsequent versions of Windows. Its status on XP 64-bit edition (for Itanium) and on both 32-bit and 64-bit versions of Windows Server 2003 is not widely known. This corresponded to version Internet Explorer 4.0 to 6.x, but not Internet Explorer 7.
HTML could be added both in place of the regular wallpaper and as independent resizable desktop items. Items available on-line could be regularly updated and synchronized so users could stay updated without visiting the website in their browser.
Active Desktop worked much like desktop widget technology in that it allowed users to place customized information on their desktop.
History
The introduction of the Active Desktop marked Microsoft's attempt to capitalize on the push technology trend led by PointCast.
Active Desktop allowed embedding a number of "channels" on the user's computer desktop that could provide continually-updated information such as web pages, without requiring the user to open dedicated programs such as a web browser. Example uses include overview over news headlines and stock quotes. However, its most notable feature was that it allowed Motion JPEGs and animated GIFs to animate correctly when set as the desktop wallpaper.
Active Desktop debuted as part of an Internet Explorer 4.0 preview release in July 1997, and came out with the launch of the 4.0 browser in September that year. for Windows 95 and Windows NT 4.0, as a feature of the optional Windows Desktop Update offered to users during the upgrade installation. While the Windows Desktop Update is commonly referred to (improperly) as Active Desktop itself, it is actually an entire Windows shell upgrade from v4.0 to v4.71, or v4.72, with numerous changes to the Windows interface, resulting in an appearance and functionality level nearly indistinguishable from the then yet-to-be-released Windows 98. Features include the option to allow uppercase filenames (the old v4.0 desktop would forcibly display uppercase filenames in title case), configurable one-click hot-tracking file selection, customizable per-folder HTML display settings, QuickLaunch mini-buttons on the Taskbar next to the Start button, upgraded Start Menu allowing drag and drop item reordering and allowing right-click context menus for item renaming, etc. With the update, Windows Explorer featured an Address bar in which Internet addresses can be entered and seamlessly browsed.
Active Desktop never attained any significant degree of popularity, as its drawbacks included high use of system resources and reduction in system stability. The component was retained in Windows XP but was replaced by a feature named Windows Sidebar in Windows Vista. Sidebar in turn was called Windows Desktop Gadgets in Windows 7, which also allows components to be added to the desktop, but it was also discontinued due to security issues; Windows 8 replaced it with live tiles in the Start screen, which were replaced with Widgets in Windows 11. Windows Server 2003 R2 32-bit is the most recent Microsoft operating system to support Active Desktop. It appears that the 64-bit version of Windows XP no longer supports Active Desktop. However, it still provides the option to display Web pages and channels built with Microsoft's Channel Definition Format (CDF) on the desktop.
The HTML displaying capabilities are now mainly used for creating original wallpapers and adding search boxes to the desktop. For example, a user could copy the following code to display Wikipedia's search-box on the desktop:
<form
action="http://en.wikipedia.org/wiki/Special:Search"
id="searchform"
name="searchform">
<input
accesskey="f"
id="searchInput"
name="search"
type="text"
value="" />
<input
id="searchGoButton"
name="go"
type="submit"
value="Go" />
</form>
See also
Active Channel
Channel Definition Format
References
External links
Internet Explorer 4.0 Desktop Gallery (archived)
Detailed technical documentation of Internet Explorer 4.0 features/changes (archived)
Windows components
Discontinued Windows components
Push technology
Windows 98
|
66251064
|
https://en.wikipedia.org/wiki/2021%20in%20Ireland
|
2021 in Ireland
|
Events during the year 2021 in Ireland. As in most of the world, the COVID-19 pandemic has dominated events in Ireland during this year.
Incumbents
President: Michael D. Higgins
Taoiseach: Micheál Martin (FF)
Tánaiste: Leo Varadkar (FG)
Minister for Finance: Paschal Donohoe (FG)
Chief Justice:
Frank Clarke (until 10 October 2021)
Donal O'Donnell (since 11 October 2021)
Dáil: 33rd
Seanad: 26th
Events
January
1 January
Munster Technological University officially opened as Ireland's newest and second technological university, and was described by Higher Education Minister Simon Harris as an "important milestone".
Minister for Children Roderic O'Gorman announced that the resumption of pre-school programmes would be delayed until 11 January, in line with the reopening of primary and secondary schools.
2 January
3,394 cases of COVID-19 were confirmed in the Republic of Ireland.
The Director of the National Virus Reference Laboratory Cillian de Gascun announced that a further 9 cases of the UK variant of COVID-19 had been detected in the Republic of Ireland from 23 December to 29 December, bringing the total number of cases identified to 16.
It was revealed that there were approximately 9,000 positive COVID-19 tests not yet logged on the HSE's IT systems, due to both limitations in the software; and lack of staff to check and input details, meaning there is an effective ceiling of approximately 1,700 to 2,000 cases that can be logged each day.
3 January – 4,962 cases of COVID-19 were confirmed in the Republic of Ireland.
4 January – 6,110 cases of COVID-19 were confirmed.
5 January
A 95-year-old woman became the first nursing home resident in the Republic of Ireland to receive the Pfizer/BioNTech COVID-19 vaccine.
An infectious diseases consultant became the first healthcare worker in the Mater University Hospital to receive the COVID-19 vaccine.
The Taoiseach announced that up to 135,000 people would be vaccinated nationwide by the end of February 2021.
6 January
7,836 cases of COVID-19 were confirmed in the Republic of Ireland.
The Government agreed a number of new lockdown measures including the closure of all schools until February with Leaving Certificate students allowed to attend school for three days a week, the closure of all non-essential construction sites with certain exceptions at 6pm on 8 January, the requirement from 9 January for all passengers from the UK and South Africa to have a negative PCR test that they acquired within 72 hours of travelling and the prohibition of click-and-collect services for non-essential retail.
The Tánaiste announced that the Moderna COVID-19 vaccine would allow 10,000 more people in Ireland to be vaccinated per week.
It was announced that Minister for Justice Helen McEntee tested positive for COVID-19.
7 January
NPHET confirmed that the backlog of cases due to a delay in reporting positive laboratory results have been cleared.
The Government was forced to abandon plans for Leaving Certificate students to attend school on three days a week, and instead students will return to homeschooling along with other students until February, after the ASTI directed its members not to return to in-school teaching.
The rollout of the Pfizer/BioNTech COVID-19 vaccine in private and voluntary nursing homes began nationwide, with 22 nursing homes of 3,000 residents and staff to be vaccinated.
The Tánaiste announced that the Government would consider banning the sale of alcohol after a certain time in a day, while all pubs, restaurants and other businesses were set to remain closed until April.
8 January
8,248 cases of COVID-19 were confirmed in the Republic of Ireland – the highest number of confirmed cases recorded in a single day so far since the pandemic reached Ireland.
Chief Medical Officer Tony Holohan confirmed that three cases of the South African variant of COVID-19 had been detected in the Republic of Ireland by whole genome sequencing associated with travel from South Africa.
Met Éireann issued multiple Status Yellow low temperature and ice warnings as it was forecast to be extremely cold with temperatures plummeting to between -1 and -7 degrees Celsius.
9 January – A major fire that broke out at an animal feed storage facility near the Port of Cork was brought under control.
11 January
The purchase of alcohol with supermarket vouchers as well as a number of multi-buy schemes were banned under new legislation that came into effect.
Figures revealed by the Our World in Data organisation showed that Ireland had the highest daily number of new confirmed COVID-19 cases in the world for every million people.
Gardaí received new COVID-19 enforcement powers, including the power to fine people €100 in breach in the 5km travel limit.
12 January
The Mother and Baby Homes Commission of Investigation published its final report. The 3,000-page document stated that approximately 9,000 children died in Mother and Baby Homes between 1925 and 1998.
The Government agreed that all passengers arriving into Ireland would need a negative PCR COVID-19 test taken 72 hours before departure from Saturday 16 January.
The first shipment of the Moderna COVID-19 vaccine arrived in the Republic of Ireland.
The Fine Gael parliamentary party agreed to readmit three senators who attended the Oireachtas Golf Society dinner in Clifden in August 2020.
The Irish Prison Service announced that three prisoners in Portlaoise and Mountjoy Prisons tested positive for COVID-19.
13 January
Taoiseach Micheál Martin issued a formal apology to victims and survivors of Mother and Baby Homes, on behalf of the state, and promised that the apology would be followed by actions, including access to counselling and records, provision of medical cards, and a system of reparations.
The Irish Nurses and Midwives Organisation (INMO) called for the Government to declare a national emergency and for all private hospital capacity to be fully nationalised into the public healthcare system as the number of hospitalisations doubled the peak of April 2020.
14 January
Gardaí issued 29 fines to people breaching the 5km travel limit over the previous 7 days including three people who travelled 80km to "collect burgers from a takeaway" in Ringsend, Dublin.
The National Transport Authority announced that reduced timetables for bus operators in Dublin would recommence from Monday 18 January and would run at 80% capacity.
The Fianna Fáil parliamentary party agreed to readmit three senators who attended the Oireachtas Golf Society dinner in Clifden in August 2020.
15 January – The Chief Medical Officers of Ireland and Northern Ireland Tony Holohan and Michael McBride issued a joint statement urging everyone to stay at home.
16 January
Around 1,800 healthcare workers received the Moderna COVID-19 vaccine at three mass vaccination centres that opened in Dublin, Galway and Portlaoise.
The Department of Health announced the suspension of all nursing and midwifery student placements for two weeks due to the impact of the COVID-19 pandemic on staffing levels.
17 January
The Government requested early deliveries of the Oxford–AstraZeneca COVID-19 vaccine as discussions to secure early delivery of the vaccine got underway.
The Irish Nurses and Midwives Organisation (INMO) called for further clarity on the decision to suspend nursery and midwifery student placements for two weeks.
18 January – The number of patients with COVID-19 being treated in hospitals around the country reached a record 2,023, with 200 in ICUs and over 400 people receiving high-grade ventilation and respiratory support.
19 January
93 deaths of COVID-19 were confirmed in the Republic of Ireland.
The Government was forced to abandon plans to reopen special schools on Thursday 21 January for thousands of children with special educational needs following safety concerns among staff unions.
20 January
The St Patrick's Day parade in Dublin was cancelled for a second year.
Taoiseach Micheál Martin congratulated Joe Biden on his inauguration as the 46th President of the United States.
22 January
Taoiseach Micheál Martin confirmed that there would be no easing of Level 5 lockdown restrictions at the end of January and suggested the current restrictions would be in place for at least another four weeks.
Gardaí issued 771 fines to people breaching the 5km travel limit since 11 January with the majority issued in Wicklow, Cork, Laois and Longford, while 30 fines were issued for the non-wearing of face coverings in certain locations.
The Chief Clinical Officer of the Health Service Executive (HSE) Colm Henry stated that COVID-19 transmission levels remain too high for schools to reopen in February.
The Health Service Executive (HSE) confirmed that 11 residents of a nursing home in North County Dublin died after testing positive for COVID-19.
A woman was arrested after Lord Mayor of Dublin Hazel Chu was targeted by a group of anti-mask protestors for wearing a face mask outside the Mansion House, Dublin.
23 January – Taoiseach Micheál Martin stated that COVID-19 vaccinations for people over the age of 70 may be delayed due to issues with the supply of the Oxford–AstraZeneca COVID-19 vaccine, and also stated that COVID-19 restrictions would be in place for at least the first six months of the year and that not all of the 1 million students nationwide will be back in school before St Patrick's Day.
Met Éireann issued a national Status Yellow snow and ice warning as falls of hail, sleet and snow with icy and hazardous conditions was forecast to take place.
24 January – A national Status Yellow snow and ice warning remained in place and a low-temperature and ice warning came into effect as it was forecast to be very cold overnight, with temperatures expected to drop as low as -5 degrees Celsius, while Gardaí urged caution on icy roads after the west and east of the country was hit by snow.
25 January
Gardaí warned that foreign holidays were not deemed essential as 1,500 fines were issued to people breaching the 5km travel limit in the previous two weeks.
Minister for Health Stephen Donnelly announced that community vaccination of people aged 70 and over would begin in mid-February.
A meat processing plant in Bunclody, County Wexford confirmed 42 cases of COVID-19 following screening of all staff on 15 January.
The Garda Síochána, HSE and the Department of Health warned the public to be aware of possible scam text messages and phone calls relating to the COVID-19 vaccine.
26 January
Ireland's COVID-19 death toll passed 3,000 after 90 more COVID-19-related deaths were reported, bringing the death toll since the beginning of the pandemic to 3,066.
Chief Medical Officer Tony Holohan confirmed that a further 6 cases of the South African variant of COVID-19 had been detected in the Republic of Ireland.
The Government announced the extension of the Level 5 lockdown restrictions until 5 March, along with a number of new measures including a mandatory 14-day quarantine period for all people travelling into the country without a negative COVID-19 test, including all arrivals from Brazil and South Africa.
The Government made the wearing of face coverings in all banks, credit unions and post offices mandatory.
Talks between the Department of Education and unions continued with hopes that schools would be able to reopen on a phased basis between February and March.
28 January
A man was arrested in connection with the murder of 16-year-old Josh Dunne who was stabbed to death in Ballymun, Dublin on the night of 26 January.
Katie Taylor was named the RTÉ Sports Person of the Year 2020.
29 January
Taoiseach Micheál Martin paid tribute to RTÉ's Tommie Gorman who is retiring from the organisation in April after 41 years.
Ireland is expected to receive 300,000 fewer doses of the Oxford–AstraZeneca COVID-19 vaccine by the end of March as a result of a shortfall in deliveries to the EU.
Gardaí issued more than 2,400 fines to people breaching the 5km travel limit in the previous two weeks, including a man who travelled 200km to "collect a puppy as a gift" in Cork.
A 40-year-old Irish man died after he became ill while climbing Mount Kenya, the highest mountain in Kenya.
30 January
Met Éireann issued a Status Yellow snow and ice warning for 18 counties with temperatures forecast to drop to below freezing overnight.
Chief Medical Officer Tony Holohan announced that more cases had been confirmed in one month than throughout 2020 with over 1,000 deaths and more than 100,000 cases confirmed in January.
The Director of the National Virus Reference Laboratory Cillian de Gascun stated that there was no significant transmission of the South African COVID-19 variant in Ireland as cases of the variant identified had been contained.
February
1 February
The Department of Education agreed to reopen special schools with 50% capacity on Thursday 11 February and special classes in mainstream schools on Monday 22 February.
Europol warned travellers to watch for organised crime gangs selling fake negative COVID-19 certificates at airports.
Latest figures showed that in the last 4 days of January, Gardaí fined 280 people at Dublin Airport for leaving the country for non-essential travel, while more than 3,500 fines had been issued in total for breaches of COVID-19 regulations, with 2,100 fines for travelling without a reasonable excuse.
A nursing home in Tuam, County Galway appealed for help from qualified nurses following the deaths of 12 residents due to COVID-19.
It was announced that more than 30 residents of 4 Cork nursing homes and a community hospital in Kerry died in the previous two weeks following COVID-19 outbreaks.
2 February
101 deaths of COVID-19 were confirmed in the Republic of Ireland – the highest number of confirmed deaths recorded in a single day so far since the pandemic reached Ireland.
Latest figures showed a total of 1,543 staff and residents in nursing homes died during the pandemic with 369 in January alone.
Over 2,000 students who sat the postponed written Leaving Certificate exams in November 2020 received their results, with over 40% of the grades higher than the calculated grades students had received.
A video went viral on social media of Gardaí nationwide after they took to roofs, beaches and bogs to record a video of them taking part in the "Jerusalema Challenge".
3 February
Another outbreak of COVID-19 at a direct provision centre in Newbridge, County Kildare was confirmed.
The Department of Public Health expressed concern over increases in COVID-19 transmission linked to social gatherings involving the student population in the mid-west region.
4 February
The total number of COVID-19 cases in Ireland surpassed 200,000 cases, with over half confirmed in 2021.
Minister for Health Stephen Donnelly signed new regulations that empower Gardaí to call to the homes of people who arrive from international travel and ensure that they are abiding by mandatory quarantine rules, with a €2,500 fine or an imprisonment sentence of 6 months for non-compliance.
Gardaí began an investigation after a woman's body was discovered in a burning car in North Cork.
5 February
Widespread disruptions were predicted for the weekend, with heavy snow expected to fall across the country from Wednesday 10 February, as the Beast from the East was set to return.
It was announced that Ireland's first ever dedicated wildlife hospital would open in two weeks' time in County Meath.
Gardaí issued more than 375 fines to people breaching the 5km travel limit over the previous 7 days, bringing the total number of breaches to over 4,600.
Minister for Health Stephen Donnelly announced that the first batches of 21,600 doses of the AstraZeneca COVID-19 vaccine would arrive in the weekend, with 190,000 doses expected to arrive by the end of February.
Minister for Education Norma Foley announced a new phase of planning for the Leaving Certificate examinations.
A man in his 60s was arrested in connection with the death of 72-year-old Mary O'Keeffe whose body was discovered in a burning car in north Cork.
6 February – The first shipment of 21,600 AstraZeneca COVID-19 vaccines arrived in the Republic of Ireland.
7 February – A 62-year-old man was charged with the murder of 72-year-old Mary O'Keeffe whose body was found in a burning car near the village of Doneraile in north Cork on 4 February.
8 February
Minister for Housing Darragh O'Brien confirmed that the Government is working to reopen the construction sector on 5 March.
People living in Northern Ireland who cross the border without a reasonable excuse face a €100 fine from today.
Gardaí investigated whether a couple found dead at their house in County Cavan may have died as a result of accidental poisoning.
Met Éireann issued a Status Yellow snow and ice warning for six eastern counties as up to 5cm of snow was expected over the next 24 hours.
9 February
The Government announced funding of €160 million in additional supports for businesses affected by COVID-19.
Tánaiste Leo Varadkar announced that the Government is working on a revised version of the "Living with COVID-19" plan which he hoped would be announced in the week of 22 February.
Latest figures released by the National Public Health Emergency Team showed that more than one in three deaths from COVID-19 in February reported were associated with outbreaks in nursing homes.
10 February
Taoiseach Micheál Martin announced that fines for non-essential travel abroad would be increased from €500 to €2,000, after a request was made to Minister for Health Stephen Donnelly to sign off on the increase.
Minister for Education Norma Foley and Minister of State for Special Education Josepha Madigan announced details of a return to in-school teaching and learning for students attending special classes in secondary schools from Monday 22 February, after a deal was agreed between teacher and SNA trade unions and the Department of Education.
Director of the National Virus Reference Laboratory Cillian de Gascun stated that the Government should be vaccinated as soon as possible and that Taoiseach Micheál Martin should receive his vaccine ahead of travel if he is to visit the United States for St Patrick's Day.
The World Health Organization praised Ireland's recovery from the third wave of COVID-19 but warned of the danger of a fourth wave.
The GAA announced that there would be no inter-county Gaelic games activity until Easter at the earliest.
11 February
Taoiseach Micheál Martin stated that the majority of the current Level 5 lockdown restrictions were set to be extended until the Easter period, with only schools and the construction sector likely to be allowed to reopen before Easter.
Up to 4,000 children with additional educational needs returned to in-person education as special schools nationwide reopened their doors, under plans agreed between the Department of Education and teacher and SNA trade unions.
The ASTI withdrew from discussions with the Department of Education on the Leaving Certificate 2021 after it said that the plan being developed would not provide a "meaningful Leaving Certificate" for students.
Director-General of the HSE Paul Reid suggested that healthcare workers who refuse to take the COVID-19 vaccine may be removed from their frontline duties.
Status Yellow warnings for snow, ice and strong winds came into effect with sleet and snow expected to sweep across the country.
12 February
The Department of Health added a further 18 countries to the Government's COVID-19 "high-risk" list for international travel.
Chair of the NPHET Irish Epidemiological Modelling Advisory Group Philip Nolan stated that it will be at least six weeks before COVID-19 cases drop to around 100 a day and that the country should be at around 200–400 cases a day heading into March and approaching 100–200 cases a day by the end of March.
Gardaí issued more than 6,500 fines to people breaching COVID-19 regulations over the past month, with over 4,900 fines issued for non-essential travel.
It was confirmed that the traditional St Patrick's Day meeting between US President Joe Biden and Taoiseach Micheál Martin at the White House will now take place virtually due to the COVID-19 pandemic.
Two men were arrested after Gardaí seized €7.4 million worth of drugs in County Kildare on the night of 11 February.
Gardaí began a murder investigation after a 44-year-old man, Paddy Lyons, was shot dead in Ballymun on the night of 11 February.
13 February
The ASTI re-joined discussions with the Department of Education on the Leaving Certificate 2021 after pulling out on 11 February.
The pace of the COVID-19 vaccine rollout in Ireland is set to increase from Monday 15 February with the first doses administered to over-85s in the community and the first widespread use of the AstraZeneca vaccine.
Up to 8,000 people were left without power as stormy weather prevailed across the country.
Met Éireann issued a Status Orange wind warning for Donegal, Galway and Mayo with an additional Status Yellow wind warning for the rest of the country as more unsettled weather was forecast across the country.
15 February
Minister for Health Stephen Donnelly confirmed locations for 37 vaccination centres across all counties as part of the country's COVID-19 vaccination programme.
Vaccines officially began for the third cohort in Ireland's prioritisation list, with over 80,000 people expected to receive COVID vaccines.
No new deaths of COVID-19 was confirmed by the Department of Health.
It was announced that two universities in Galway and Limerick had been hit by major COVID-19 outbreaks of up to nearly 250 confirmed cases due to students breaching Level 5 lockdown regulations, which caused clusters of infection involving up to 40 people.
17 February
Ireland's COVID-19 death toll surpassed 4,000 after 57 deaths were confirmed as Deputy Chief Medical Officer Ronan Glynn announced that 90% of COVID-19 cases in Ireland were the UK variant of COVID-19.
Minister for Education Norma Foley confirmed that Leaving Certificate examinations would proceed with students given the option between a modified version of calculated grades or written exams, while Junior Certificate examinations were cancelled for a second year in a row.
Four people, including two politicians, were expected to face charges over alleged breaches of COVID-19 regulations during an Oireachtas Golf Society event in Clifden, Galway in August 2020.
The Irish Prison Service announced that three prisoners in the Midlands Prison tested positive for COVID-19.
18 February
Gardaí seized more than €12 million worth of suspected cocaine at Ringaskiddy Port, Cork.
An Irishman, Richard O'Halloran, appealed to Chinese authorities to let him return to Ireland after being detained in China since 2019.
A 76-year-old retired school teacher, John McClean, who indecently and sexually abused 23 children over 17 years in the 70s, 80s and 90s at Terenure College was jailed for eight years.
19 February
Ulster Bank confirmed a phased withdrawal from the Republic of Ireland over the coming years that would be managed in an "orderly and considered manner".
Deputy Chief Medical Officer Ronan Glynn confirmed that three cases of the Brazilian variant of COVID-19 had been detected in the Republic of Ireland all associated with travel from Brazil.
Strict Level 5 restrictions were expected to remain in place until May as all primary school students were to return by 15 March, with the first four classes in primary schools and Leaving Certificate students the first to return on 1 March.
Latest figures showed that as of 18 February, Gardaí had issued over 8,000 fines to people breaching COVID-19 regulations, with over 6,500 fines issued for non-essential travel and 944 fines issued for attending or hosting house parties.
Taoiseach Micheál Martin expressed his condolences to Chief Medical Officer Tony Holohan and his family after his wife, Emer, died following a long illness with multiple myeloma.
Stephen Silver, a 44-year-old man, was sent forward for trial to the Central Criminal Court charged with the murder of Detective Garda Colm Horkan in June 2020.
20 February
Taoiseach Micheál Martin stated that pubs and restaurants would likely not reopen until the middle of the summer.
Nearly 1,000 patients over the age of 85 received their first dose of a COVID-19 vaccine at the country's first mass vaccination centre at The Helix in Dublin City University.
Following a request from the HSE, the Irish Air Corps delivered the first consignment of COVID-19 vaccines to the Aran Islands in County Galway and to Árainn Mhór in County Donegal.
The Department of Foreign Affairs announced that the Passport Service had suspended most of its operations due to Level 5 restrictions, with holidaymakers facing delays of up to two months in securing a passport.
Joan Lucey, a 73-year-old retired nurse, who was suing the HSE over cervical smear tests died hours before mediation in the case started.
Met Éireann issued a Status Yellow wind warning for the entire country with wet conditions expected across the country.
Treaty United were accepted to join the League of Ireland by the Football Association of Ireland.
21 February – Facebook shut down and restricted access to a number of Instagram accounts that were advertising an illegal "lockdown rave" on St Patrick's Day.
22 February
The Cabinet COVID-19 sub-committee agreed that Level 5 restrictions would remain in place until 5 April at the earliest under the Government's revised Living with COVID-19 plan, due to be published on 23 February.
Special classes in mainstream primary and secondary schools reopened as the phased reopening of schools continued.
Met Éireann issued a Status Orange rainfall warning for Cork, Kerry, Tipperary and Waterford, with Status Yellow rainfall and wind warnings issued for the rest of the country.
A married couple, who are former solicitors, were jailed for defrauding a number of banks and credit unions of almost €400,000.
Celyn Eadon, a 29-year-old man, who stabbed his mother to death after she took his drugs and burned them was jailed for 14 years.
23 February
Taoiseach Micheál Martin announced the extension of Level 5 lockdown restrictions for another six weeks until 5 April at the earliest as the Government published its new revised Living with COVID-19 plan called "The Path Ahead", which includes the phased reopening of schools and childcare and the extension of the COVID-19 Pandemic Unemployment Payment and the Employment Wage Subsidy Scheme.
Minister for Health Stephen Donnelly announced an update to the COVID-19 Vaccine Allocation Strategy with people aged between 16 and 69 who are at very high risk of developing severe COVID-19 moved up the priority list, after the National Public Health Emergency Team endorsed recommendations by the National Immunisation Advisory Committee.
24 February
Minister for Health Stephen Donnelly announced that Ireland had ordered enough vaccines to vaccinate 10.3 million people with 18.5 million doses of COVID-19 vaccines ordered.
Tánaiste Leo Varadkar addressed a meeting of Fine Gael TDs, Senators and MEPs and stated that criticism of how the Government had been communicating was reasonable, had been heard loud and clear, and would be taken on board, after a number of Fine Gael politicians launched an attack on Taoiseach Micheál Martin over his handling of the COVID-19 pandemic.
Minister of State for Road Transport Hildegarde Naughton announced a further extension to the expiry dates of driving licences in light of the disruption to licensing services caused by COVID-19 across the European Union, as National Driver Licence Service centres remain open to essential workers during the extended Level 5 restrictions.
The HSE apologised to the family of a 36-year-old woman who died shortly after giving birth almost five years ago in 2016.
25 February
The Director of the National Virus Reference Laboratory Cillian de Gascun confirmed that the first case of the B.1.525 variant of COVID-19, first identified in the United Kingdom and Nigeria, had been detected in the Republic of Ireland, while a further four cases of the South African variant had been detected, bringing the total to 15.
Gardaí began an investigation after a 17-year-old teenager was shot several times as he got into a taxi in Dublin on the night of 24 February.
Two men died in a road crash near Charleville in north County Cork.
26 February
Gardaí began a murder investigation following the discovery of the bodies of two elderly brothers at their isolated farm and a third brother in a river nearby in north Cork.
A 59-year-old Tipperary man who raped his partner's six-month-old baby niece over the course of seven months was jailed for 16 years.
Minister for Children Roderic O'Gorman published a white paper to end direct provision and to establish an international protection system.
Revenue officers seized €1.2 million worth of cannabis at Dublin Port.
The Department of Health added a further 13 countries to the Government's COVID-19 "high-risk" list for international travel, which brought the total number of countries added to 33.
Deputy Chief Medical Officer Ronan Glynn issued a letter appealing to parents to adhere to public health guidelines and not to congregate at school gates or to organise play dates, ahead of schools reopening and the return of 320,000 students from Monday 1 March.
Latest figures released by the CSO showed that Dublin, Donegal, Limerick, Louth and Monaghan were the hardest hit counties in terms of cases, while Cavan, Dublin, Kildare, Mayo and Monaghan were the counties with the most deaths.
Latest figures showed that as of 25 February, Gardaí had issued over 9,800 fines to people breaching COVID-19 regulations, with over 7,566 fines issued for non-essential travel and 1,386 fines issued for attending or hosting house parties.
27 February – 23 people were arrested and 3 Gardaí were injured (including one hospitalised), as around 500 protesters took part in an anti-lockdown protest in Dublin city centre, with fireworks being fired at Gardaí, while St Stephen's Green and the Iveagh Gardens closed in advance of the protest. The protest was widely condemned by the gardaí and politicians, including the Taoiseach, Tánaiste and Minister for Justice.
28 February
Ireland officially marked one year since the first case of COVID-19 in the country was confirmed on 29 February 2020.
13 people, including 12 men and 1 woman, were charged and remanded in custody for public order offences after anti-lockdown protests in Dublin city centre turned violent on 27 February, while Tánaiste Leo Varadkar stated that the violence on the streets of Dublin was "not a protest and was a riot".
A Garda was injured and taken to the Mater Hospital during an incident in Dublin on the night of 27 February.
Post-mortem examinations on the bodies of three brothers who were found dead in north Cork on 26 February were completed.
March
1 March
Over 320,000 junior primary school pupils and Leaving Certificate students nationwide returned to school for the first time since Christmas.
A school in north Dublin confirmed a case of COVID-19 on the first day of reopening schools nationwide as parents received an urgent letter from the school.
Bank of Ireland confirmed that it would close 103 branches across the island of Ireland.
2 March
A man in his 30s was arrested in connection with a firework attack on Gardaí at a violent anti-lockdown protest in Dublin city centre on 27 February.
Three men in their 20s were arrested and more than 50 fixed payment notices were issued in Limerick after Gardaí broke up a street party involving large groups of students drinking, dancing, singing and setting of fireworks, near the University of Limerick.
A secondary school in Cork confirmed a case of COVID-19 while a south Dublin school announced its closure due to a confirmed case of COVID-19 just one day after schools reopened.
3 March
One of the three men arrested following a street party in Castletroy, Limerick on the night of 2 March was charged with public order offences, as the University of Limerick warned that any student who were found breaking the university's code of conduct could face temporary suspension or expulsion, while Minister for Justice Helen McEntee urged young people to comply with COVID-19 restrictions.
Jake Merriman, a 30-year-old man, appeared in court charged in connection with a firework attack on Gardaí at an anti-lockdown protest in Dublin city centre on 27 February.
A large mural of Greta Thunberg in Dublin was vandalised just 24 hours after it was finished.
4 March
Niall Horan and Denise Chaila were announced as winners at the RTÉ Choice Music Prize awards.
A Dublin city mural of Greta Thunberg was repaired after it was vandalised just 24 hours after it was finished.
Deputy Chief Medical Officer Ronan Glynn announced that the Department of Health was made aware of four preliminary reports of stillbirths in Ireland that could potentially be associated with a condition called COVID Placentitis.
The HSE confirmed that a single outbreak of COVID-19 among students in the west of the country had led to more than 442 further cases in more than 200 separate household outbreaks, involving young adults aged 18 to 24.
6 March
Taoiseach Micheál Martin announced that Ireland had reached the milestone of half a million COVID-19 vaccines administered.
Gardaí arrested 6 people (5 men and 1 woman) as around 450 people attended an anti-lockdown protest in Cork city centre that ended without incident.
A man and a woman in their 30s were injured in a shooting in Bluebell, Dublin.
The body of a man who went missing after a kayaking accident in County Kildare last weekend was recovered.
7 March – President Michael D. Higgins signed into law the legislation to bring in mandatory hotel quarantine for certain passengers entering the country from high-risk countries.
8 March
HIQA advised NPHET that the duration of immunity following COVID-19 infection should be considered to be six months.
Around 100,000 children returned to pre-school under the Early Childhood Care and Education Scheme.
The Department of Education and the HSE confirmed that the gradual phased reopening of schools would proceed as planned with all primary pupils and fifth year students returning to school on 15 March.
RTÉ officially confirmed that Eoghan McDermott had left his 2FM role as a radio presenter on The RTÉ 2fm Breakfast Show after 3 weeks of "unplanned leave" and that he would not be returning due to the expiry of his contract.
Gardaí investigated a threatening phone call that claimed there was a bomb at the home of Minister for Justice Helen McEntee.
Seven people were arrested in County Cavan after Gardaí foiled an alleged extortion and blackmail attempt.
9 March
A man was arrested as part of an investigation into fraudulent claims over the COVID-19 Pandemic Unemployment Payment.
Motorists, pedestrians and householders were urged to take care as a Status Yellow wind warning came into effect with winds gusting to over 120kmh.
A further three cases of the Brazilian variant were detected in the country, bringing the total to 6.
Minister for Education Norma Foley lost her appeals against findings that two home-schooled students were unfairly excluded from the Leaving Certificate calculated grades process.
10 March
Taoiseach Micheál Martin confirmed that Ireland was to receive a further 46,500 doses of the Pfizer–BioNTech COVID-19 vaccine before the end of March.
Met Éireann issued a Status Orange wind warning for Cork and Kerry as very wet and windy weather continued across the country.
11 March
It was announced that Minister for Justice Helen McEntee would take six months of paid maternity leave from 30 April to 31 October 2021, and would remain a member of the Government without portfolio. Minister for Social Protection Heather Humphreys was assigned responsibility for the Department, in addition to her current portfolio.
Ireland officially marked one year since the first death of COVID-19 in the country was confirmed on 11 March 2020, the same day when COVID-19 was declared a pandemic.
A 16-year-old schoolboy was charged with raping a girl at a park in Dublin.
Tomasz Krzysztof Piotrowski, a 35-year-old man, was sentenced to life in prison for the murder of his mother in 2019.
Under new nursing home visitation guidance approved by NPHET, residents in nursing homes would be permitted two visits per week on general compassionate grounds from 22 March.
12 March
Latest figures showed that as of 11 March, Gardaí had issued over 13,600 fines to people breaching COVID-19 regulations, with over 10,013 fines issued for non-essential travel and 2,040 fines issued for attending or hosting house parties.
Gardaí confirmed that two people were arrested and more than 80 fines were issued after around 300 people gathered for the funeral of a young Traveller man in Carrick-on-Shannon on 11 March, despite Level 5 restrictions limiting mourners to 10 people.
Nine residents at a nursing home with an outbreak of COVID-19 in Trim, County Meath died after the first doses of a COVID-19 vaccine were administered there.
The Passport Office of the Department of Foreign Affairs was ready to begin issuing more passports to applicants after it expanded the criteria for what was a reasonable excuse to travel during the period of Level 5 restrictions.
13 March – More than 100 people gathered outside a church in Dublin for the funeral of George Nkencho, who was shot dead by Gardaí in December 2020.
14 March
The administration of the AstraZeneca COVID-19 vaccine was suspended in Ireland by the National Immunisation Advisory Committee (NIAC) as a precautionary measure following concerns over serious blood clots in Norway.
Gardaí upgraded the inquiry into Tánaiste Leo Varadkar surrounding the leaking of a GP contract to a rival organisation as a criminal investigation.
Former editor of The Guardian Alan Rusbridger resigned from the Future of Media Commission after reports that he was supportive of the IRA.
There were no new deaths of COVID-19 reported on the island of Ireland.
Two men in their 20s were charged after three Gardaí were assaulted following a house party in Milford, County Donegal on 13 March.
15 March
Over 350,000 remaining primary school pupils and fifth year students nationwide returned to school for the first time since Christmas.
30,000 fewer people received a COVID-19 vaccine from 15 March due to the temporary suspension of the AstraZeneca COVID-19 vaccine in Ireland.
President of Sinn Féin Mary Lou McDonald called for Tánaiste Leo Varadkar to resign or be removed as Gardaí continued to investigate the leaking of a GP contract to a rival organisation in 2019.
16 March
The Garda Síochána urged people to stay at home for St Patrick's Day as a significant policing operation was put in place to deal with planned protests in Dublin city with 2,500 Gardaí being deployed across the country.
President Michael D. Higgins thanked Queen Elizabeth for her St Patrick's Day wishes as she acknowledged with fondness her visit to Ireland ten years ago in 2011.
Preparations were being finalised for "virtual" St Patrick's Day celebrations across the country, with online events taking place for a second year due to COVID-19 restrictions.
Latest figures released by the HSE showed that 1,842 tests for COVID-19 were carried out in 108 schools in the past 7 days, with 44 positive cases confirmed in primary, secondary and special schools across the country.
17 March
For the second time, there were no traditional St. Patrick's Day parades held in any part of the country.
Gardaí arrested 21 people after around 700 protestors took part in a number of anti-lockdown protests in Dublin city centre, Herbert Park and at the RTÉ campus in Donnybrook.
Taoiseach Micheál Martin held virtual meetings with US President Joe Biden, Vice President Kamala Harris and Speaker of the House of Representatives Nancy Pelosi.
18 March – It was confirmed that 7 Gardaí were injured (including five hospitalised) after being kicked, punched and spat at in separate violent anti-lockdown protests which took place in Dublin on St Patrick's Day.
19 March
NIAC recommended that the AstraZeneca COVID-19 vaccine could continue to be used in Ireland following approval from the European Medicines Agency (EMA) on 18 March.
Latest figures showed that as of 18 March, Gardaí had issued over 15,358 fines to people breaching COVID-19 regulations, with over 11,072 fines issued for non-essential travel and over 2,300 fines issued for attending or hosting house parties.
James Bernard McGovern, a Fermanagh boxer, was jailed for over three years for assaulting two senior businessmen at a Cavan filling station in 2019.
20 March
The HSE resumed administering the AstraZeneca COVID-19 vaccine at a number of hospitals across the country after a precautionary pause.
Gardaí arrested 11 people and issued a number of fines after around 200 protestors took part in an anti-lockdown protest in the Phoenix Park in Dublin city centre.
21 March – Minister for Public Expenditure and Reform Michael McGrath stated that mandatory hotel quarantine for travellers arriving into Ireland from designated countries would come into effect by the end of the week.
22 March
Professor Martin Cormican warned that Ireland could be facing another wave of COVID-19 cases and described case numbers as "stuck" and possibly rising, while Chief Clinical Officer Colm Henry described the situation as "disheartening".
It was announced that President Michael D. Higgins and his wife Sabina Higgins received their first doses of a COVID-19 vaccine on 19 March.
A primary school in Carrick-on-Suir, County Tipperary closed after two positive cases of COVID-19 were confirmed.
23 March – The booking portal for mandatory hotel quarantine in Ireland opened for those arriving into the country from Friday 26 March, with a 12-night stay for passengers arriving from high risk countries costing €1,875 each.
24 March
An Bord Pleanála granted planning permission for what would be the country's tallest building at Custom House Quay in Cork city centre.
The Government announced that five new walk-in COVID-19 test centres would open in Dublin and Offaly on 25 March in an effort to bring down cases that are high in certain areas.
NPHET postponed a key meeting on deciding whether any Level 5 restrictions could be eased from 5 April so that latest trends in COVID-19 data could be taken into account in its final analysis for the Government.
Lidl Ireland sued the Irish Farmers' Association (IFA) for defamation over ads about the supermarket's own-brand milk.
The State Examinations Commission and Minister for Education Norma Foley issued new guidelines to schools advising that face coverings would be required during the Leaving Certificate oral exams, which begin on Friday 26 March.
25 March
The Central Bank of Ireland fined Ulster Bank almost €38 million for dozens of regulatory breaches in its handling of its tracker mortgage customers.
An Bord Pleanála gave the green light to Tayto Park for a new €15.5 million "Coaster 2021" rollercoaster for the theme park.
A man in his 30s was arrested in Bandon, County Cork in relation to allegedly making fraudulent COVID-19 Pandemic Unemployment Payment claims whilst he was living in southern Asia during 2020.
26 March
Ireland's mandatory hotel quarantine system for all passengers arriving into the country from high-risk countries came into force at 4 am.
The Leader of the Labour Party Alan Kelly called for the chief executive of the Beacon Hospital to resign after it gave 20 leftover COVID-19 vaccines to a number of teachers and staff at a private secondary school in Bray, County Wicklow on 23 March.
Latest figures showed that as of 25 March, Gardaí had issued over 16,834 fines to people breaching COVID-19 regulations, with over 12,336 fines issued for non-essential travel and over 2,700 fines issued for attending or hosting house parties.
The Department of Education confirmed that the final phase of the gradual reopening of schools would proceed as planned with all remaining secondary school students returning to school after the Easter holidays on 12 April.
Two women from Bishopstown in County Cork became the first same-sex couple in the country to be legally recognised as the parents of their babies from birth.
27 March
Minister for Health Stephen Donnelly requested the HSE to suspend vaccine operations at the Beacon Hospital following controversy after 20 teachers received COVID-19 vaccines at the private hospital.
Gardaí began an investigation after three people absconded from a mandatory hotel quarantine facility near Dublin Airport while on a smoking break outside under supervision, with one person located.
Met Éireann issued a Status Yellow wind warning for Donegal, Galway, and Mayo with gusts expected to reach up to 100 km/h.
28 March – A second person who absconded from a mandatory hotel quarantine facility on 27 March was located, while a search for the third male continued.
29 March
Latest figures released by the CSO showed that serious crime dropped by over a third in 2020 during the pandemic, while over 1,000 breaches of COVID-19 regulations were classified as crimes by Gardaí including the non-wearing of face coverings and international travel.
Gardaí began a criminal investigation after a man in his 50s was found seriously injured in an apartment complex in Dublin city centre.
30 March
The Government announced a phased easing of Level 5 restrictions from Monday 12 April, with people allowed to travel within their county, two households allowed to meet socially outdoors, people who are fully vaccinated against COVID-19 allowed to meet other fully vaccinated people indoors, and the resumption of all residential construction projects from that date.
Minister for Health Stephen Donnelly announced an update to the COVID-19 Vaccine Allocation Strategy with priority groups being changed to an age-based system after vulnerable people with underlying conditions were vaccinated.
Gardaí began a murder investigation after a 52-year-old man died from stab wounds in Dublin city centre on 29 March, while a man and a woman were arrested.
The HSE confirmed that three passengers staying in mandatory hotel quarantine tested positive for COVID-19.
The CEO of VHI stepped aside pending an investigation into his receipt of a COVID-19 vaccine at the Beacon Hospital.
31 March
Irish journalist Yvonne Murray, who reports for RTÉ News and Current Affairs from China, was forced to leave the country because of mounting pressure from the Chinese authorities and over sinister threats to her husband.
Taoiseach Micheál Martin confirmed that shoe shops would be allowed to sell children's footwear by appointment only.
The Taoiseach told the Dáil that a national portal allowing for everyone to register for a COVID-19 vaccine would be available by the third week in April.
The HSE announced that seven new walk-in COVID-19 testing centres for asymptomatic people would open from April in Dublin, Meath, Westmeath, Kildare and Galway in an effort to bring down cases that are high in certain areas.
A 47-year-old man appeared in court charged with the murder of a 52-year-old man in Dublin on 29 March.
April
1 April
Deputy Chief Medical Officer Ronan Glynn and Northern Ireland Chief Medical Officer Michael McBride issued a joint statement urging the public across Ireland to continue to follow public health advice to ensure everyone can have a safe Easter.
An independent review of the COVID-19 vaccination programme at the Coombe Hospital found that a consultant brought two leftover vaccine doses home to administer them to two family members.
Dublin GAA suspended senior football manager Dessie Farrell for 12 weeks after a number of Dublin footballers were photographed attending a training session on the morning of 31 March in breach of COVID-19 regulations.
Plans by the Department of Health to expand mandatory hotel quarantine to 43 additional countries, including the United States, Germany and France, sparked a major row within Government, after the Attorney General, the European Union and a number of ministers expressed concerns about the plans.
A new code of conduct aimed to give employees the right to switch off from work outside of normal working hours, including the right to not respond immediately to emails, telephone calls or other messages was signed into effect by Tánaiste and Minister for Enterprise, Trade and Employment Leo Varadkar.
The Department of Health added a further 26 countries to the Government's COVID-19 "high-risk" list for international travel and removed one country, which brought the total number of countries added to 59.
2 April – Two women in their 30s were arrested and charged after refusing to enter mandatory hotel quarantine upon arrival in Dublin Airport from Dubai.
3 April – Around 300 protestors took part in an anti-lockdown protest at the National Monument on the Grand Parade in Cork city centre.
4 April
Gardaí arrested 8 people as part of a policing plan around an anti-lockdown protest planned in Dublin city centre.
The High Court made orders allowing two women who refused to enter mandatory hotel quarantine after arriving into Dublin Airport following their return from a trip to Dubai for cosmetic procedures to leave Mountjoy Women's Prison and continue to quarantine at a designated hotel.
Two non-public events led by President Michael D. Higgins to commemorate the 1916 Easter Rising took place at Áras an Uachtaráin and at the GPO in O'Connell Street.
6 April
A number of Gardaí were forced to self-isolate after a guest staying at a quarantine hotel tested positive for COVID-19.
Minister for Education Norma Foley defended the Government decision to change the vaccine roll-out schedule to an aged-based system stating it was "not a value judgement on any given profession", as teachers' unions continued to call for their members to be prioritised.
Three women who absconded from a mandatory hotel quarantine facility in Dublin were found by Gardaí almost 200km away near Loughrea, County Galway.
7 April
The three teacher unions voted for an emergency motion backing industrial action, up to and including strike action, if they were not prioritised for vaccination.
Minister for Health Stephen Donnelly confirmed that a failure to follow vaccination reserve list protocols led to teachers and special needs assistants (SNAs) in a number of special needs schools in Dublin and Wicklow to receive COVID-19 vaccinations from the Health Service Executive (HSE) on 6 April.
8 April
People were being warned about a "sophisticated" phone scam where members of the public were targeted by criminals purporting to be a named official from the Department of Social Protection.
Monaghan GAA suspended senior football manager Séamus McEnaney for 12 weeks after a dossier sent to the Department of Justice showed video and photographic evidence of a training session taking place in breach of COVID-19 regulations.
The CEO of the HSE Paul Reid announced that Ireland had reached the milestone of one million COVID-19 vaccines administered.
The Health Products Regulatory Authority (HPRA) began an investigation after the first case of a very rare blood clot in the brain of a person after vaccination with the AstraZeneca vaccine was confirmed in a 40-year-old Dublin woman.
Latest figures from the HSE showed that 10 confirmed cases of COVID-19 had been detected among arrivals into Ireland who were in mandatory hotel quarantine.
Taoiseach Micheál Martin and Minister for Foreign Affairs Simon Coveney condemned the ongoing unrest and violence in Northern Ireland and both called for calm.
9 April
President Michael D. Higgins and Taoiseach Micheál Martin paid tributes to Prince Philip, Duke of Edinburgh following his death in Windsor Castle.
The HSE announced that five new walk-in COVID-19 testing centres for asymptomatic people would open from 10 April in Dublin, Limerick and Waterford in an effort to bring down cases that are high in certain areas.
A Garda was being treated in hospital in Cork after she was dragged by a car for around 30 metres during a drugs search in Baltimore on the night of 8 April.
A fully vaccinated woman quarantining in a Dublin hotel after her arrival into the country from Israel asked the High Court for an inquiry into what she claimed amounted to unlawful detention.
Latest figures showed that as of 8 April, Gardaí had issued over 19,865 fines to people breaching COVID-19 regulations, with over 13,972 fines issued for non-essential travel and over 3,300 fines issued for attending or hosting house parties.
Following an incorporeal Cabinet meeting, the Department of Health added a further 16 countries to the Government's COVID-19 "high-risk" list for international travel and removed three countries, which would come into effect from 4 am on Thursday 15 April.
10 April – Rachael Blackmore became the first woman to win the Grand National.
11 April – An Irish man and an Israeli woman who challenged their detention in mandatory hotel quarantine and claimed they had been fully vaccinated against COVID-19 were released pending court hearings.
12 April
The phased easing of Level 5 restrictions began with the 5km travel limit lifted, the resumption of all residential construction work, two households could meet up outdoors and the full reopening of all schools.
The NIAC recommend that only people over 60 years of age should get the AstraZeneca COVID-19 vaccine and that a second dose of the vaccine should not be given to anyone who developed unusual blood clots with low platelets after the first dose.
A man in his 40s appeared in court facing 232 charges of sexual assault, sexual exploitation, cruelty and other charges.
13 April
The HSE announced that all AstraZeneca clinics were cancelled for the rest of the week, except for those arranged for certain people aged over 60.
Minister for Health Stephen Donnelly announced that mandatory hotel quarantine bookings were paused on a precautionary basis, in order to ramp up capacity in the system.
A three-year-old girl died following a road traffic accident in County Tipperary.
16 April
KBC Bank Ireland announced that it was in discussions about the possible sale of its performing loan assets and liabilities to Bank of Ireland.
The European Commission urged the Government of Ireland to amend or possibly scrap mandatory hotel quarantine for EU citizens and sought clarifications as to why a number of EU member states were subject to the rules.
Latest figures showed that as of 15 April, Gardaí had issued over 20,280 fines to people breaching COVID-19 regulations, with over 14,650 fines issued for non-essential travel and over 3,500 fines issued for attending or hosting house parties.
17 April
The national flag at State buildings was flown at half-mast as a mark of respect for Prince Philip, whose funeral took place.
Gardaí began a murder investigation after a 24-year-old woman was fatally stabbed in Dublin.
18 April – President Michael D. Higgins celebrated his 80th birthday.
19 April
A 29-year-old man was charged with the murder of his partner, Jennifer Poole, in Dublin on 17 April.
The Director of the National Virus Reference Laboratory Cillian de Gascun confirmed that three cases of the B.1.617 variant of COVID-19, first identified in India, had been detected in the Republic of Ireland.
20 April
A nursing home in County Louth suspended all indoor visits after two staff members who had been fully vaccinated tested positive for COVID-19.
The Department of Health confirmed that Chief Medical Officer Tony Holohan had returned to work after taking leave following the death of his wife.
21 April – Carphone Warehouse confirmed its closure of all 80 stores in the Republic of Ireland with 486 jobs.
22 April
An outbreak of at least 70 COVID-19 cases was confirmed at Intel's construction site in Leixlip, County Kildare.
Gardaí made a direct appeal to a 14-year-old girl missing from County Louth to contact them.
25 April – A 22-year-old man died after falling 20 metres into a blowhole from cliffs in County Cork.
26 April
The further easing of Level 5 restrictions came into effect with all sports pitches, golf courses, tennis courts, zoos, pet farms and heritage sites reopening.
Minister for Health Stephen Donnelly announced that Ireland was to donate 700 oxygen concentrators to India as part of efforts to assist with the COVID-19 outbreak in the country.
27 April
New recommendations by NIAC were approved by the Government with the Johnson & Johnson and AstraZeneca COVID-19 vaccines recommended for people aged 50 and older, pregnant women offered an mRNA vaccine between 14 and 36 weeks gestation, and people aged under 50 years who had a COVID-19 infection receiving just one vaccine dose and be considered fully-vaccinated.
A primary school in County Offaly closed following confirmation of 23 cases of COVID-19.
Former Housing Minister Eoghan Murphy resigned his seat as a TD for Dublin Bay South to pursue a career in international co-operation, human rights and democracy.
A former Sinn Féin councillor was charged at the Special Criminal Court with the murder of David Byrne at the Regency Hotel in 2016.
29 April
The Government announced a reopening plan for the country throughout May and June from 10 May, with inter-county travel allowed, the reopening of all hairdressers, libraries, museums and galleries, up to 50 people allowed to attend religious services, the resumption of click-and-collect services and the allowances of three households to meet outdoors (including in private gardens) and a vaccinated household to meet an unvaccinated household indoors from that date.
Four Gardaí and a private citizen were charged as part of a two-year investigation into alleged Garda corruption in the south of the country.
30 April
Minister for Health Stephen Donnelly announced that nearly 150 cases of variants of concern had been identified in Ireland, including: 71 cases of the South African variant, 27 cases of the Brazilian variant, 8 cases of the Indian variant, 6 cases of the New York variant and 20 cases of the Nigerian variant.
The Department of Health added a further 5 countries to the Government's COVID-19 "high-risk" list for international travel and removed 6 countries, which would come into effect from 4 am on Tuesday 4 May.
Chief Medical Officer Tony Holohan stated that there were concerns around the level of COVID-19 in Donegal and that there were outbreaks occurring in lots of different settings in the county.
Latest figures showed that as of 29 April, Gardaí had issued over 20,974 fines to people breaching COVID-19 regulations, with over 14,749 fines issued for non-essential travel and over 3,900 fines issued for attending or hosting house parties.
Three people were arrested after Gardaí seized over €1 million worth of suspected cocaine, cannabis and tablets during searches in County Meath.
May
1 May
Around 370 protestors took part in an anti-lockdown protest at the National Monument on the Grand Parade in Cork city centre.
The HSE announced that seven new walk-in COVID-19 testing centres for asymptomatic people would open in Dublin, Cork, Kildare and Mayo in an effort to bring down cases that are high in certain areas.
3 May
In an open letter to those who had been fully vaccinated, Chief Medical Officer Tony Holohan praised the sacrifices people had made over the past year and advised those who were vaccinated to make the most of socialising outdoors.
Gardaí began an investigation of an incident at Howth DART station in which a woman was knocked onto a train track in April.
4 May – A special hotline to allow the public to inform the Gardaí about illegal parties or gatherings in County Donegal was set up in response to a spike in the number of COVID-19 cases in the county in recent days.
5 May
A 15-year-old boy was charged with the murder of 48-year-old mother-of-two Urantsetseg Tserendorja, who was originally from Mongolia, in Dublin in January.
An Post confirmed that the price of a postage stamp for a standard letter was to increase by 10 cent to €1.10 from the end of May.
6 May
A 22-year-old man appeared in court charged with the murder of a 76-year-old man, Kwok Ping Cheng, who was attacked with an axe at his home in Dublin on 29 April.
The first doses of the Janssen COVID-19 vaccine (Johnson & Johnson) were administered through homeless services at a temporary vaccination clinic set up in Dublin.
Around 120 revellers defied an emergency court order after attending a post-wedding celebration involving members of the Traveller community in a marquee in County Longford on 5 May.
7 May
The Department of Tourism, Culture, Arts, Gaeltacht, Sport and Media announced that all summer Irish language college courses in the Gaeltacht were cancelled for a second year running.
Teva Pharmaceuticals confirmed plans to close its Sudocrem production plant in Dublin by the end of 2022, with the loss of more than 100 jobs.
A 46-year-old man was jailed for life for the murder of his estranged wife's partner in 2019.
An Asian hornet was identified in the wild in Ireland for the first time.
8 May
More than 140,000 people across the world signed up to participate in the Darkness into Light event to raise funds for suicide prevention charity Pieta House.
The Department of Health added a further 2 countries to the Government's COVID-19 "high-risk" list for international travel and removed 11 countries, which would come into effect from 4 am on Wednesday 12 May.
9 May – Taoiseach Micheál Martin received his first dose of a COVID-19 vaccine in Cork City Hall and urged people to get vaccinated to protect themselves, while a record 52,278 doses were administered on Friday 7 May.
10 May
The further easing of Level 5 restrictions came into effect with all hairdressers, barbers, beauticians, galleries, museums, libraries and other cultural attractions reopening, the resumption of non-essential retail on a phased basis, inter-county travel and in-person religious services, and the allowance of three households (or six people) from individual households to meet outdoors.
The Central Criminal Court lifted an order preventing the identification of an 11-year-old boy who was murdered by a relative in November 2019.
Met Éireann issued a Status Yellow thunderstorm warning for 13 counties in Leinster, Ulster and Munster, with hail and heavy downpours, and a risk of spot flooding forecast.
The Irish Prison Service confirmed that an outbreak of 19 cases of COVID-19 had been identified at Mountjoy Prison.
13 May
A man and woman, both in their mid-40s, died in a house fire in County Roscommon, about 13km from Ballinasloe, County Galway at around 2am.
Three teenage boys were arrested in connection with an attack on young girls at Howth Junction DART station in Dublin in April.
14 May
The Health Service Executive shut down all of its IT systems after a major ransomware cyberattack, with many hospital appointments cancelled, while the COVID-19 vaccination programme had not been affected by the attack.
A former RTÉ sports producer pleaded guilty to child sex abuse offences in Ireland, the UK and the Philippines.
A retired Garda superintendent, two Garda sergeants, and two Gardaí, were charged with attempting to pervert the course of justice at Limerick District Court.
The 2021 National Ploughing Championships, due to have taken place in County Laois in September, was cancelled for a second year due to uncertainty over COVID-19 restrictions.
15 May
The HSE stated that there was "substantial cancellations across all outpatient services with widespread cancellation of radiology services" following a ransomware attack on its IT systems.
The Department of Health announced that there would be no daily COVID-19 figures update provided due to the HSE cyberattack, with backdated figures being published "when possible".
The Department of Health removed 5 countries from the Government's COVID-19 "high-risk" list for international travel with immediate effect. The countries removed were: Bermuda, Iran, Montenegro, Palestine and Serbia.
Several thousand people attended a protest in support of Palestine in Dublin city centre, amid rising tensions and violence in Gaza.
16 May
The Department of Health confirmed that it had been the victim of a separate cyber attack similar to the ransomware attack on the Health Service Executive, prompting the shutting down of much of its IT infrastructure.
President Michael D. Higgins and Minister for Tourism, Culture, Arts, Gaeltacht, Sport and Media Catherine Martin officiated at the National Famine Commemoration at Glasnevin Cemetery in Dublin.
17 May
The further easing of Level 5 restrictions came into effect with the reopening of all non-essential retail for the first time in over four months.
The National Immunisation Advisory Committee (NIAC) confirmed that people in their 40s would be given a choice to accept the Janssen or AstraZeneca COVID-19 vaccine or opt to wait for another vaccine.
18 May – Ireland's Lesley Roy failed to qualify for the Eurovision Song Contest Grand Final 2021.
19 May
The COVID-19 vaccine registration portal opened to people aged between 45 and 49 on a phased basis, starting with people aged 49.
Pfizer announced that it would begin using its west Dublin facility as part of its supply chain for its COVID-19 vaccine.
20 May
A 44-year-old woman who suffocated her three children was found not guilty of murder by reason of insanity.
It was reported that the organised cyber crime group that attacked the HSE and the Department of Health IT systems provided a decryption key, while the public was advised to be aware of a number of call and text scams in the wake of the cyber attack.
21 May – Minister for Rural and Community Development Heather Humphreys announced the return of the Tidy Towns competition after it was cancelled in 2020 due to the pandemic.
22 May – The Department of Health removed 6 countries from the Government's COVID-19 "high-risk" list for international travel with immediate effect.
25 May – A man was arrested after two Gardaí were injured in a shooting in Blanchardstown.
26 May – Under new COVID-19 safety guidelines issued by Fáilte Ireland, a maximum of six people aged 13 years and over would be allowed per table when restaurants, pubs and cafés open in June, with up to 15 people allowed when accompanying children under the age of 12.
27 May – The Chief Executive of the HSE Paul Reid stated that the cost of the cyber attack on its IT systems could exceed €100 million.
28 May
A 38-year-old man, Daniel Goulding, was charged with five firearm offences after shots were fired from a house in Blanchardstown on the night of 25 May.
The HSE confirmed that data relating to 520 patients, including sensitive information, was published online following the ransomware attack on 14 May.
The Government announced a further reopening plan for the country throughout June, July and August, with the reopening of all hotels from 2 June, outdoor hospitality, cinemas, swimming pools, gyms from 7 June, and indoor hospitality from 5 July.
The Department of Health removed 4 countries from the Government's COVID-19 "high-risk" list for international travel with immediate effect.
29 May – Four people were arrested for public order offences after large crowds gathered in parts of Dublin city centre, while Chief Medical Officer Tony Holohan stated that he was "absolutely shocked" by the crowds that gathered.
31 May – It was announced that the 2021 edition of the Rose of Tralee would be cancelled for the second year in a row.
June
1 June
According to a new study published by the Irish Medical Journal, medics reported what they believed to be the first case of COVID-19 reinfection in Ireland in a 40-year-old female healthcare worker.
The Government launched a €3.5 billion Economic Recovery Plan to achieve rapid job creation and economic growth after the pandemic, with the COVID-19 Pandemic Unemployment Payment and the Employment Wage Subsidy Scheme extended until September 2021, when gradual reductions would begin.
2 June
The COVID-19 vaccine registration portal opened to people aged between 40 and 44 on a phased basis, starting with people aged 44.
The gradual easing of COVID-19 restrictions on the tourism and hospitality sector came into effect with the reopening of all hotels, B&Bs, self-catering accommodation and hostels.
A probationary Garda avoided a jail sentence for breaching COVID-19 restrictions, and instead received a €1,000 fine for the breach along with a charge for being intoxicated in public.
The Department of Education announced that Leaving Certificate results would be delayed for a second year in a row, with students to receive their results on 3 September.
The Director of the National Virus Reference Laboratory Cillian de Gascun confirmed that there had been 115 cases of the Indian variant of COVID-19 detected in Ireland.
3 June
HIQA advised NPHET that the duration of immunity following COVID-19 infection should be extended from six to nine months.
The Government's emergency COVID-19 powers including additional Garda powers introduced to deal with COVID-19 was extended until November 2021.
Minister for Further and Higher Education Simon Harris stated that he expected students and staff to be back on campus for the new academic year of 2021/22.
Dublin City Council confirmed that it was to install toilets, bins across the city from the bank holiday weekend, along with staff to maintain them, following criticism of a lack of facilities in the capital to allow people to socialise outdoors.
A man died while climbing Mount Brandon in County Kerry.
4 June
Minister of State with responsibility for the Office of Public Works Patrick O'Donovan appealed to people visiting St Stephen's Green in Dublin to respect the site after reckless behaviour was witnessed on 3 June when a group of people gained access to the bandstand which had been fenced off for health and safety reasons.
A man in his 20s died after getting into difficulty while swimming off the Dalkey coast in Dublin.
5 June
14 people (including 5 juveniles) were arrested for public order offences and a Garda received hospital treatment on the night of 4 June, after violence broke out in Dublin city centre in which glass bottles were thrown at Gardaí, which resulted in a patrol car being damaged. Minister for Health Stephen Donnelly described the incidents as "thuggish behaviour and completely unacceptable".
Minister for Health Stephen Donnelly received his first dose of a COVID-19 vaccine in Greystones, County Wicklow.
The Department of Health added a further 5 countries to the Government's COVID-19 "high-risk" list for international travel, which would come into effect from 4 am on Tuesday 8 June.
6 June – 19 people (including 2 juveniles) were arrested for public order offences and two Gardaí received hospital treatment on the night of 5 June, after violence broke out in Dublin's south city centre for a second consecutive night in which a person was assaulted, a bin was set on fire and glass bottles were thrown, which resulted in a patrol car being damaged.
7 June
A three-month-old baby girl died after being attacked by a dog in west Waterford.
The gradual easing of COVID-19 restrictions continued with the reopening of all bars, restaurants and cafés for outdoor service, gyms, swimming pools, leisure centres, cinemas and theatres, the partial resumption of driver theory test services, and the allowance of an unvaccinated household to visit another unvaccinated household indoors.
14 people (including 3 juveniles) were arrested for public order offences on the night of 6 June, after violence broke out in Dublin's south city centre for a third consecutive night, while Gardaí arrested 8 people in Cork.
9 June
The United States Biden administration formally rebuked the United Kingdom in a rare démarche concerning the effects of the UK government's handling of Brexit on Northern Ireland. The US accused the UK of inflaming tensions in Europe and the North.
Leaving Certificate exams got underway at schools throughout the country, with far lower numbers of students sitting individual exams compared to a normal year.
A 46-year-old man pleaded guilty to murdering Rose Hanrahan, 78, at her Limerick home four years ago in 2017.
10 June
A Garda appeared in court charged with coercive control, criminal damage, sexual assault, assault causing harm and harassment of his former partner over a three-year period.
The first in a series of live pilot concerts took place at the Iveagh Gardens, Dublin, with James Vincent McMorrow and special guest Sorcha Richardson playing to 500 people at the show.
15 June
The Government agreed to increase the self-isolation period for travellers arriving in Ireland from Britain from 5 to 10 days for those who are not fully vaccinated amid Delta variant concerns.
Thousands of people from Donegal and Mayo gathered in Dublin for a protest in support of a 100% redress scheme for homes and other buildings affected by blocks defective due to the mineral mica.
16 June – Legislation was passed, the Climate Action and Low Carbon Development (Amendment) Bill 2021, to halve greenhouse gas emissions within nine years and to achieve a climate neutral economy ("net zero") by 2050. Farmers marched in Dublin to protest against effects of the Bill on farming and rural communities.
17 June – HSE Chief Clinical Officer Colm Henry confirmed that there had been 180 cases of the Delta variant detected in Ireland.
18 June – Three men were arrested on the night of 17 June following an altercation on South William Street in which glass bottles were thrown at staff members of a premises.
19 June
A primary school in County Offaly confirmed a suspected case of the Delta variant with the children told to self isolate at home.
After discussing the evolving profile of COVID-19 across the island, the Chief Medical Officers of Ireland and Northern Ireland Tony Holohan and Michael McBride issued a joint statement reminding people who intended to travel across the border to be alert to the epidemiological situation in the relevant local areas and to ensure that they avoid activities which could place them or their families at risk of COVID-19 infection.
A young man was rushed to hospital with suspected stab injuries after a fight broke out involving up to 30 people near St Stephen's Green.
20 June – The COVID-19 vaccine registration portal opened to people aged between 35 and 39 on a phased basis, starting with people aged 39.
21 June
An inquest into the death of George Nkencho formally opened in the Dublin coroner's court held in the RDS before being adjourned for six months until 14 December.
Gardaí in Dublin began a murder investigation after a man in his 60s was stabbed to death at his home in south County Dublin on the night of 20 June.
Minister for Justice Heather Humphreys spoke to Garda Commissioner Drew Harris about the legal issues around outdoor drinking and pledged to take legislative action to facilitate outdoor hospitality if it was required, after Gardaí warned that alcohol licences were not valid for areas outside pubs and restaurants.
Chief Medical Officer Tony Holohan stated that the latest data showed a "concerning increase in transmission" of the Delta variant of COVID-19 in Ireland.
22 June
The HSE's Director of Public Health for the Midlands Una Fallon announced that a COVID-19 outbreak in Athlone had been identified as "probably" the Delta variant after a cluster of 14 primary cases associated with socialising by the River Shannon were confirmed on Friday 11 June.
A 30-year-old man appeared in court charged with the murder of his 65-year-old father in Dublin on 20 June.
23 June – It was confirmed that at least three quarters of the HSE's IT servers had been decrypted and 70% of computer devices were back in use, following the cyber attack in May.
24 June
HSE Chief Clinical Officer Colm Henry confirmed that there had been 210 cases of the Delta variant detected in Ireland.
Garda Commissioner Drew Harris publicly apologised to domestic violence victims who made emergency calls for help but did not receive the standard of service from Gardaí that they required and to which they were entitled.
29 June – Due to the rapidly increasing incidence of the Delta variant, the Government announced that the planned reopening of indoor dining and drinking in restaurants and pubs on 5 July would be delayed until at least 19 July when a system to verify vaccination or immunity would be implemented, while 50 guests would be permitted to attend wedding celebrations as an exception from July.
30 June
Minister for Education Norma Foley announced that 2022 Leaving Certificate students would be granted more choice and more time in State exam papers to compensate for the loss of learning they had suffered.
European Commissioner for Justice Didier Reynders stated that Ireland was the only European Union member state that would not be ready to comply with the EU Digital COVID-19 Certificate for travel when it would come into effect from 1 July 2021 due to the cyber attack on the Health Service Executive.
July
1 July – Chief Medical Officer Tony Holohan announced that a fourth wave of COVID-19 was beginning in Ireland following an increase in cases caused by the Delta variant.
2 July
Minister for Health Stephen Donnelly announced an expansion of the vaccination rollout programme to younger people with 750 pharmacies to begin administering the Janssen COVID-19 vaccine to people in the 18 to 34 age group who opted in for earlier vaccination from 5 July, while vaccination centres would begin administering the AstraZeneca vaccine to the group from 12 July.
The Government agreed a deal to purchase one million unwanted COVID-19 vaccine doses from Romania.
A man died in a fall on the Dartry Mountains in County Sligo.
3 July – Over 3,500 people attended a pilot music festival featuring Gavin James, Denise Chaila and Sharon Shannon in Dublin, with antigen testing used for entry.
5 July
Over 500 pharmacies around the country began administering the Janssen COVID-19 vaccine to people aged 18 to 34 who opted-in to receive it.
In a statement, Chief Medical Officer Tony Holohan stated that more than 70% of all cases were now accounted for by the Delta variant, as it continued to present a risk to those who were unvaccinated or waiting for a second dose of vaccine.
A meeting between the hospitality sector and senior government officials took place to discuss the reopening of indoor dining and drinking with representatives told that indoor dining could reopen for 1.8 million fully vaccinated people with a self-regulated vaccine pass system.
A 47-year-old Romanian man was jailed for life for the murder of 78-year-old Rose Hanrahan in Limerick in 2017.
6 July
Deutsche Bank announced plans to cut up to 450 full-time and contractor roles at its Dublin office.
A 44-year-old man who stabbed a fisherman 40 times following a row over drugs was jailed for ten years.
7 July
The COVID-19 vaccine registration portal opened to people aged between 30 and 34 on a phased basis, starting with people aged 34.
The 2021 Dublin Marathon was cancelled for the second year in a row.
A teenage boy died and another was critically injured in a single vehicle road crash in County Kerry at around 1:10am.
8 July
The Chief Executive of the HSE Paul Reid stated that the Delta variant was to "outmatch" Ireland's supply of COVID-19 vaccines in July, while latest figures showed that 352 cases of the Delta variant had been detected in Ireland.
An investigation got under way after three men were killed in a collision between a car and a lorry on the N7 at Rathcoole in Dublin.
Over 1,000,000 people watched RTÉ's coverage of England's UEFA Euro 2020 semi-final clash with Denmark on the evening of 7 July.
9 July
AA Roadwatch ended its radio traffic and travel reports after 32 years.
Basketball Ireland began an investigation after the Chief Executive Bernard O'Byrne posted on social media asking if England player Raheem Sterling should have been awarded a penalty in their UEFA Euro 2020 semi-final win over Denmark, which included the phrase "Black Dives Matter".
The Labour Party's Ivana Bacik won the Dublin Bay South by-election.
10 July – Former Minister for Agriculture, Food and the Marine Barry Cowen requested a special meeting of the Fianna Fáil parliamentary party to discuss the result of the Dublin Bay South by-election, after the party's candidate, Deirdre Conroy, received just 5% of the share of first preference votes.
12 July
Over 1.1 million people watched RTÉ's coverage of Italy's UEFA Euro 2020 final victory against England on the evening of 11 July.
Fully vaccinated people began receiving their EU Digital COVID-19 Certificates via email or post.
The Government approved legislation for the resumption of indoor hospitality, with proofs of vaccination needed for those who were vaccinated or recovered from COVID-19, while those under 18 would be required to be accompanied by a fully vaccinated person.
13 July
It was revealed that people aged 16 and over would be offered a vaccine by the end of September, with the Government examining the possibility of vaccinating those aged 12 to 15 during the autumn, while it was confirmed that children aged under 12 would not now need to take a PCR test when entering the country.
The Chief Executive of Basketball Ireland Bernard O'Byrne stepped down with immediate effect following his "ill-judged" social media comment regarding Raheem Sterling.
14 July
Gardaí seized over €34 million worth of cocaine disguised as coal, which was concealed in a shipment of bags to Ireland.
The National Car Testing (NCT) service revoked 34,000 two-year NCT certificates incorrectly issued due to a system error.
15 July
Hundreds of people gathered outside the Convention Centre in Dublin on the night of 14 July to protest against the Government's response to the COVID-19 pandemic after the Dáil passed legislation to allow for the reopening of indoor dining.
Two men were arrested in connection with the investigation into the armed robbery of a credit union in County Louth over eight years ago in 2013 during which a Garda was shot dead.
16 July
Chief Medical Officer Tony Holohan stated that cases of COVID-19 were increasing in 22 out of 26 counties, with the majority of cases occurring in people who had not been fully vaccinated, after 1,173 cases were reported – the highest number since February.
Weekend temperatures were set to reach 27 degrees Celsius across the country, as Met Éireann said it had been the hottest day of the year so far.
UEFA confirmed that the Aviva Stadium would host the 2024 Europe League final.
17 July
Met Éireann recorded a temperature of 29.5 degrees Celsius in Athenry, County Galway, making it the hottest day of the year so far.
COVID-19 cases continued to rise after a further 1,377 cases were reported, the highest in six months.
18 July – Met Éireann issued a High Temperature Advisory with temperatures expected to be in the high 20s for the next week.
19 July – Ireland joined the rest of the EU in implementing the Digital COVID-19 Certificate as travel restrictions into and out of the country eased.
20 July
Met Éireann issued a Status Orange high temperature warning for six counties in the Midlands and the rest of the country on a Status Yellow warning, with temperatures expected to reach 30 degrees Celsius in some areas.
It was announced that AIB was set to close 15 branches in urban and suburban areas in the Republic of Ireland and merge their operations with others nearby.
21 July
The Government agreed that indoor dining in pubs and restaurants could resume on Monday 26 July for fully vaccinated and COVID-19 recovered people, after President Michael D. Higgins signed the legislation underpinning new guidelines into law.
Met Éireann recorded a temperature of 30.1 degrees Celsius at Mount Dillon in County Roscommon, making it the hottest day of the year so far.
22 July
A woman in her late 20s died in a drowning incident on the Longford–Cavan border, while in a separate incident, a man in his 70s drowned in County Leitrim.
Met Éireann extended the Status Yellow high temperature warning issued nationwide to Saturday 24 July.
Ireland had its first tropical night in 20 years after temperatures stayed above 20 degrees in certain parts of the country.
Deputy Chief Medical Officer Ronan Glynn stated that the number of COVID-19 cases related to overseas travel had increased "very sharply", after it was revealed that the Delta variant now accounted for 90% of cases in Ireland.
23 July
The Chair of the NPHET Epidemiological Modelling Advisory Group Philip Nolan stated that people had forgotten how easily the virus spread and that people were "getting too close".
Met Éireann issued a Status Orange thunderstorm and rain warning for Galway, Clare and Tipperary and the rest of the country on a Status Yellow warning.
A man in his 60s died after being recovered from the sea in Dublin.
Draft guidelines for the reopening of bars and restaurants indoors on Monday 26 July were published. Under the guidelines, the EU Digital COVID Certificate (DCC) would be the primary evidence for proof of immunity, all customers would have to show photo ID and contact tracing details for all customers would have to be taken, with an online QR code scanner developed to verify people's DCCs.
24 July – Around 1,500 protestors gathered in Dublin city centre to protest against vaccines, new legislation allowing for the reopening of indoor dining and the Digital COVID Certificate.
26 July
Restaurants, cafés and bars reopened for indoor dining and drinking for the first time since December 2020, operating under strict new public health regulations.
Minister for Education Norma Foley stated that she was confident that a full reopening of schools from late August and early September would go ahead as planned.
Met Éireann issued a Status Yellow rain and thunderstorm warning for Ireland.
A man in his 60s died after getting into difficulty while swimming at Tramore beach in County Waterford.
A specialist at the Department of Public Health in the Midlands raised concerns about gatherings of teenagers and young adults who wanted to deliberately catch COVID-19 so they could get their Digital COVID Certificate of Recovery.
27 July
After the COVID-19 vaccine registration portal opened to people aged 16 and 17 for the Pfizer or Moderna vaccines, the Government agreed to extend the COVID-19 vaccination programme to those aged 12 to 15 and to increase the limit of number of guests permitted at weddings from 50 to 100 from 5 August.
Gardaí began a major investigation after a female member of the Defence Forces was allegedly raped by a male colleague in a mandatory quarantine hotel facility in Dublin.
28 July
It was announced that some of the 38 vaccination centres would allow walk-in vaccinations on certain days and times without an appointment.
Minister for Health Stephen Donnelly confirmed that children would not have to be vaccinated against COVID-19 to attend school.
Joe Canning announced his retirement from inter-county hurling at the age of 32.
Following criticism of former Minister for Children and Youth Affairs Katherine Zappone being appointed as UN special envoy for freedom of expression, it was revealed that Zappone approached Minister for Foreign Affairs Simon Coveney to offer herself for the position before her appointment was made.
29 July
President Michael D. Higgins sent a message of congratulations after Fintan McCarthy and Paul O'Donovan won the men's lightweight double sculls final at the 2020 Summer Olympics.
The President also wrote to the Oireachtas to raise concerns about the volume of complex legislation he had been asked to consider in short periods of time.
30 July – Tánaiste Leo Varadkar and Minister for Tourism Catherine Martin urged pubs and restaurants to continue to adhere to the guidance for indoor dining ahead of the bank holiday weekend, and reiterated that both the Digital COVID Certificate and the HSE Vaccination Card were acceptable proofs of immunity.
August
2 August
A male motorist in his 80s died following a road crash in Clogheen, County Tipperary.
The body of a man believed to be in his 50s was discovered in a south Dublin park.
3 August
Two people died after a bus struck a number of parked cars and hit a pedestrian in County Cork.
Taoiseach Micheál Martin stated that a deal had been completed to secure 700,000 Pfizer COVID-19 vaccines from Romania.
Chief Medical Officer Tony Holohan warned that virus outbreaks were originating through symptomatic people attending workplaces, eating out and visiting friends, and urged symptomatic people to stay at home, even if vaccinated.
4 August
Political pressure was mounting on former Minister for Children Katherine Zappone after she organised an outdoor 50-person event at the Merrion Hotel in Dublin on 21 July and stated that she was "assured" by the hotel that the event was "in compliance with Government COVID-19 restrictions and guidelines". Zappone ultimately declined her UN role after the appointment process was criticised.
Met Éireann issued a Status Yellow thunderstorm warning for Ireland.
Laois County Council refused to grant a licence to hold the 2021 Electric Picnic music festival following the most up-to-date public health advice made available to the council from the Health Service Executive.
5 August
A video emerged online appearing to show multiple breaches of COVID-19 regulations at the pub owned by Independent TD Danny Healy-Rae in Kilgarvan, County Kerry, with young people gathering in the pub wearing no masks, with no social distancing and with access to the bar.
34-year-old Daniel Murtagh was found guilty and sentenced to life imprisonment for the murder of 30-year-old Nadine Lott, his former partner, in County Wicklow in 2019.
6 August
In the wake of the Merrion Hotel controversy, Fáilte Ireland updated its hospitality guidelines to allow customers book multiple tables and host outdoor gatherings with live music for up to 200 people.
Speaking on RTÉ News: Six One, Tánaiste Leo Varadkar expressed his regret for attending the Merrion Hotel event, but said it was not in breach of Government regulations, and "probably" not in breach of Fáilte Ireland guidelines.
Around 88kg of heroin, worth more than €12 million, was seized by Revenue at Rosslare Port.
In the 2021 Munster abuse case, five members of a family were convicted on a range of charges including the rape, sexual assault and exploitation of five children after a trial at the Central Criminal Court.
Following a meeting of the Cabinet COVID-19 sub-committee, it was announced that the Government would publish a roadmap by the end of August for the easing or ending of remaining COVID-19 restrictions.
Gardaí began preliminary inquiries into an indoor gathering at the pub owned by Independent TD Danny Healy-Rae.
8 August – Kellie Harrington was awarded an Olympic gold medal for her lightweight boxing final win in Tokyo.
9 August – The 2021 All-Ireland Senior Football Championship semi-final between Kerry and Tyrone was postponed to 15 August due to COVID-19 issues in the camp of the Ulster champions, while the final was postponed to 4 September.
10 August – Olympic gold medallist Kellie Harrington, bronze medallist Aidan Walsh and the remaining Irish Olympians returned home to Ireland.
11 August
Gardaí appealed for information after a 25-year-old man died following a stabbing in Tallaght in Dublin.
The HSE launched its portal for people to list their close contacts to enable faster contact tracing.
The COVID-19 vaccine registration portal opened to people aged 12 to 15 for the Pfizer or Moderna vaccines.
12 August
A man in his 30s and a woman in her 20s were arrested on suspicion of murder following the death of a four-year-old boy in Limerick in March.
The Chief Executive of the HSE Paul Reid said the vaccination programme was in "the final leg" after more than 50,000 people aged 12 to 15 registered to receive the COVID-19 vaccine, with 90% of adults partially vaccinated and 80% fully vaccinated.
13 August – A 26-year-old man was charged with the murder of 25-year-old Ademola Giwa in Tallaght, Dublin, on 11 August.
14 August – Irish Olympic hero Jack Woolley was hospitalised after being badly beaten up in Dublin on the night of 13 August.
15 August – Following Tyrone's withdrawal from the 2021 All-Ireland Senior Football Semi-Final, the GAA confirmed in a statement that the semi-final would be postponed to Saturday 28 August, with the final subsequently postponed to 11 September.
18 August
In the wake of the 2021 Taliban offensive, the Department of Foreign Affairs confirmed that it was helping 25 Irish citizens and eight dependents leave Afghanistan.
Ireland received its largest ever weekly shipment of COVID-19 vaccines, with over 540,000 doses delivered to the HSE, including the first batch of unwanted vaccines from the Romanian Government.
The Lord Mayor of Dublin Alison Gilliland said more Gardaí would patrol the city centre following reports of anti-social behaviour and after the random attack of Irish Olympian Jack Woolley.
19 August
Two men died following a collision involving three vehicles in County Meath.
HSE CEO Paul Reid said it was never too late to register to receive a COVID-19 vaccine, urging those who had not yet received a vaccine to come forward, as latest figures showed that over 120,000 people aged 12 to 15 had registered for a vaccine.
Following a meeting of the Government Committee on COVID-19, it was revealed that a roadmap for the phased reopening of all remaining closed industries, including the live entertainment and arts sector, would be published on 31 August.
20 August
A couple and an infant were among four people killed in a three-vehicle collision on the M6 near Ballinasloe, County Galway on the evening of 19 August.
Gardaí and the Road Safety Authority issued an appeal to all roads users to take greater care following the deaths of six people on Irish roads in the space of 24 hours.
21 August
An 18-year-old man was arrested after a 20-year-old male passenger died in a single-vehicle crash in County Limerick. The 20-year-old male passenger was killed, just hours before he was due to be married.
A man in his mid-20s was arrested after he allegedly attacked a shop owner with a glass bottle taken from the shelf of the business before he tried to take cash from the till.
22 August
Limerick won the 2021 All-Ireland Senior Hurling Championship Final against Cork.
HSE CEO Paul Reid said the threat from COVID-19 was still "very real", with the number of patients being treated in hospitals with COVID-19 at its highest level since the end of March, increasing to 314.
23 August
Six Irish people were airlifted off Sweden's highest mountain, Kebnekaise, after being stranded overnight.
Following crowds of people gathering after the All-Ireland Hurling Final on 22 August, Gardaí began investigating alleged breaches of COVID-19 regulations at a pub near Croke Park, while several pubs were temporarily shut by Gardaí due to anti-social behaviour and a lack of social distancing.
Music industry representatives criticised the Government after 40,000 people were allowed to attend the All-Ireland Senior Hurling Final at Croke Park, while the live entertainment industry remained closed, with representatives from a number of live event and music industry groups stating that the Taoiseach and Foreign Affairs Minister's attendance at the final was a "blatant disregard" for the live events industry.
Visitors to University Hospital Galway were being asked to come only if "absolutely necessary" as the hospital dealt with a COVID-19 outbreak and record numbers at its emergency department.
24 August
Minister for Health Stephen Donnelly said the Government would continue to ease COVID-19 restrictions "as quickly as possible" and that all remaining COVID-19 restrictions would be eased before Christmas.
Chief Medical Officer Tony Holohan warned of an "extremely high incidence" of the disease in Ireland and that mask wearing in public places had decreased, while the Chair of the NPHET Irish Epidemiological Modelling Advisory Group Philip Nolan said the peak of the fourth wave could be reached in September.
A woman in her 60s died following a collision between a car and a truck in Longford.
25 August
The husband of a woman who died with COVID-19 after giving birth to their daughter urged anyone who was unsure about receiving the COVID-19 vaccine to get the vaccine.
A row over the return to school of teachers in early stages of pregnancy intensified after the three teacher unions condemned the Minister for Education and the Department of Education for the "failure to provide alternative time-bound working arrangements for teachers who have been ineligible to receive vaccines."
A 31-year-old man was charged with the attempted murder of his mother at their family home in Innishannon, in County Cork in June.
26 August
In a letter to the Government, the NPHET recommended that there should be no widespread further easing of COVID-19 restrictions until 90% of over 16-year-olds were fully vaccinated.
Ellen Keane won Ireland's first medal of the 2020 Paralympic Games in Tokyo, claiming gold in the SB8 100m breaststroke.
27 August
A 29-year-old man died in a car crash in County Louth.
Gardaí launched an investigation following the discovery of the body of a teenager in Meath.
28 August
Gardaí launched a murder investigation following the death of a 19-year-old man who sustained a gunshot wound at a house in County Meath on 27 August.
Cyclists Katie-George Dunlevy and Eve McCrystal claimed a silver medal for Ireland in the B 3,000m individual pursuit at the 2020 Tokyo Paralympics.
Taoiseach Micheál Martin refused to confirm or deny reports that the NPHET would be disbanded following a report from the Irish Independent.
29 August
Ireland's Jason Smyth won gold for the sixth time after a dramatic T13 100m final at the Paralympic Games in Tokyo.
Gardaí seized €1.3m worth of cannabis following a search operation in County Meath.
A cyclist in his 50s died in a collision involving a car and a bicycle in County Galway.
30 August
Nicole Turner won silver in the S6 50m butterfly, taking home Ireland's fourth medal of the Paralympic Games.
A man in his 50s was arrested after two men were injured in a stabbing incident in Carlow.
Dublin Airport issued an apology after significant delays caused 118 passengers to miss their flights on 29 August.
Chief Medical Officer Tony Holohan advised parents to exercise caution in relation to after-school activities as children began to return to classrooms across the country.
Cork University Maternity Hospital publicly apologised to the husband and family of a mother-of-three who died alongside her newborn baby boy after she fell out of a hospital bed after apparently suffered a seizure.
Tributes were paid to a student and skilled sportsman in his 20s who died after he was struck by a car while holidaying in Greece.
31 August
The Government announced a further reopening plan for the country, with all remaining COVID-19 restrictions to be eased by 22 October, including the two-metre social distancing rule depending on the requirement of individual sectors, while masks would still be required in the health and retail sectors and on public transport.
New figures from the CSO showed that the country's population was estimated to stand at 5.01 million in April, marking the first time the population had risen above five million since the 1851 census.
Ireland's Katie-George Dunlevy and Eve McCrystal won gold in the women's road time trial B at the Fuji International Speedway in Tokyo, while Gary O'Reilly won bronze in the men's road time trial H5.
September
1 September
Public transport began operating at 100% capacity across the country, as the Government's plan for easing most COVID-19 restrictions by 22 October began, while the GAA announced that an additional 1,150 tickets would be available with 41,150 people allowed to attend the All-Ireland football final on 11 September.
Taoiseach Micheál Martin announced that NPHET would cease to exist as a separate body over time and that their role and the vaccine taskforce would be transitioned into the normal functions of the Department of Health and the HSE.
Under changes to the COVID-19 vaccination programme, NIAC recommended that pregnant women could be offered an mRNA COVID-19 vaccine at any stage of pregnancy and that immunocompromised individuals aged 12 and older could receive a third additional vaccine dose.
The organisers of Electric Picnic officially cancelled the 2021 music festival.
A 20-year-old Irish man was arrested following the death of a 22-year-old Limerick man on the island of Ios in Greece.
2 September – The Government launched a housing strategy underpinned by €4 billion in guaranteed State funding annually for the next five years.
3 September
Katie-George Dunlevy and Eve McCrystal won their second gold medal of the 2020 Tokyo Paralympics in the women's road race B event.
A 50-year-old man appeared in court charged with the murder of Conor O'Brien in County Meath.
Over 61,000 students received their Leaving Certificate exam results with grades significantly higher compared to 2020, with the number of students achieving H1s in some popular subjects rising by more than 7 percentage points.
4 September
The eighth National Services Day has been marked with ceremonies around the country.
According to the Health Protection Surveillance Centre (HPSC), four cases of the new Mu COVID-19 variant, first discovered in Colombia, had been identified in Ireland.
5 September
Tánaiste Leo Varadkar faced criticism after a photograph emerged on social media showing him at the Mighty Hoopla music festival in London on the same weekend Electric Picnic was cancelled in Ireland due to the Government's COVID-19 restrictions.
During a major operation carried out by Gardaí targeting the gang behind the ransomware attack on the Health Service Executive (HSE), the Garda National Cyber Crime Bureau seized several domains used in the cyberattack and other ransomware attacks.
6 September
Organised indoor and outdoor events and mass gatherings returned and live music and dancing were permitted at weddings, as the further easing of COVID-19 restrictions took place.
The HSE estimated that between 10,000 and 12,000 children were restricting their movements as a result of being designated a close contact of a COVID-19 case.
Documents released showed that Katherine Zappone was told of her impending appointment to a UN role by the Minister for Foreign Affairs more than four months before the matter was agreed by Cabinet.
The trial of a man accused of murdering Bobby Messett at Bray Boxing Club in 2018 collapsed because there were not enough jurors to continue the case after one of them became seriously ill.
All clean plastic packaging waste including soft plastic could now be placed in Irish household recycling bins.
7 September
CAO offers were released, with a significant rise in the points requirement for most third level courses.
An error was discovered in the Leaving Certificate grading process, affecting 1,800 students who sat the Leaving Certificate Applied programme.
The HSE ceased walk-in testing nationwide to reduce queues at centres and called on people to book slots online as testing volume increased by 35%.
8 September
The number of children restricting their movements as a result of being designated a close contact of a COVID-19 case increased to 16,000, after more than 100 schools contacted the HSE over cases among pupils.
Minister for Health Stephen Donnelly announced an update to Ireland's COVID-19 vaccination programme, with residents aged 65 years and older living in long term residential care facilities and people aged 80 years and older living in the community to receive a booster dose of an mRNA COVID-19 vaccine.
A spokesperson for the Taoiseach said Micheál Martin did have confidence in Minister for Foreign Affairs Simon Coveney, after Sinn Féin leader Mary Lou McDonald called on the Taoiseach to sack Coveney over "behaviour not of the standard expected of a minister".
Gardaí in County Kerry began a criminal investigation into a fatal firearms incident at a domestic residence near Lixnaw, where the bodies of three family members were discovered on the night of 7 September.
10 September – Latest figures showed that 90% of adults in Ireland were fully vaccinated against COVID-19, while the seven-millionth dose was administered.
11 September
Tyrone won the 2021 All-Ireland Senior Football Championship Final against Mayo.
A man died after becoming ill on the Maamturk mountain range in Conamara, County Galway, while taking part in an adventure race.
Gardaí in Cork appealed for information following an assault which left a man in his 40s seriously injured on the evening of 10 September.
12 September
An infectious disease specialist in St. James's Hospital Professor Cliona Ní Cheallaigh stated that most children under the age of 12 in Ireland would contract COVID-19 by early 2022 if more wasn't done to make schools safer.
Galway won the 2021 All-Ireland Senior Camogie Championship Final against Cork.
A motorcyclist in his 40s died following a collision with a car in Renmore, County Galway shortly after 10am.
14 September
Two 16-year-old teenagers were hospitalised after being slashed, stabbed and beaten with hammers in an attack outside a chip shop in the East Wall area of Dublin on the night of 13 September.
Chief Medical Officer Tony Holohan warned that new COVID-19 restrictions could not be ruled out and "may be required in the future", despite very high levels of COVID-19 vaccine uptake.
The remains of Baby John, one of the Kerry Babies, were exhumed by Gardaí at Holy Cross Cemetery, Caherciveen, County Kerry.
15 September
Chief Medical Officer Tony Holohan told the Oireachtas Joint Committee on Health that Ireland was on track to proceed with the full easing of COVID-19 restrictions in October.
It was revealed that Ireland was to donate up to two million COVID-19 vaccines to developing countries.
The Government won its motion of confidence, tabled by Sinn Féin, in Minister for Foreign Affairs Simon Coveney by a majority of 92 to 59, with the support of TDs in the Independent Group and Regional Independent group.
Fianna Fáil TD Marc MacSharry resigned from the parliamentary party and voted no confidence in Minister Coveney.
President Michael D. Higgins declined an invitation to attend a church service with Britain's Queen Elizabeth next month to mark Northern Ireland's centenary.
A motorcyclist in his 20s died in a collision in Dublin city centre.
The 2021 National Ploughing Championships went ahead in Ratheniska, County Laois on a much scaled-back level, with the trade exhibition element and the world ploughing contest cancelled due to uncertainty over COVID-19 restrictions.
16 September
NPHET agreed to recommend that the Government proceed with its plan for a further easing of restrictions from Monday 20 September and also agreed that masks should not be required for children under 13.
The Higher Education Minister Simon Harris denied leaking the appointment of Katherine Zappone as a UN envoy and said he was "very seriously" considering a complaint to the Dáil's disciplinary committee.
17 September
The President defended his decision not to attend a church service in Armagh in October marking the centenary of Northern Ireland and did not intend to revisit the decision.
The Environmental Protection Agency confirmed that unsafe water entered the public drinking water supply at two water treatment plants in August, with 52 cases of illness confirmed, including bacteria linked to E. coli.
18 September
Minister for Housing, Local Government and Heritage Darragh O'Brien announced an audit of all water treatment plants following the revelation of problems at two water treatment plants in August.
Gardaí seized just under €130,000 worth of drugs and cash following the search of a home in Cork.
A man in his 50s died in a single-vehicle road crash on the M3 motorway in County Meath.
Gardaí in Limerick begun an investigation after a man in his 30s was discovered with serious injuries in the Westfield Park area on the evening of 17 September.
A motorbike Garda was injured in Dublin in a collision with a car.
The HSE reported more than 1,000 social media posts for misinformation about the COVID-19 pandemic and the vaccination programme.
19 September
Several hundred of Ireland's Afghan community gathered at the GPO in Dublin to protest against the Taliban regime in Afghanistan.
Gardaí in Limerick arrested an 18-year-old woman on suspicion of assault causing harm in relation to an incident where a man suffered serious injuries.
Latest figures showed that over 90% of Irish people over the age of 16 were now fully vaccinated against COVID-19, the highest rate in the European Union.
20 September
Thousands of workers across the country began returning to their offices and places of work, as COVID-19 restrictions further eased with rules around organised indoor group activities being relaxed and limits on outdoor group activities for participants being removed.
A 16-year-old boy who raped a teenage girl in a field near a holiday resort in County Wexford in 2019 was sentenced to five years detention, while his 19-year-old brother, who was 17 at the time and also raped the girl, was sentenced to six years in prison.
Several politicians condemned a protest outside the home of Tánaiste Leo Varadkar on 19 September, in which Gardaí attended.
22 September
Following advice from Chief Medical Officer Tony Holohan, asymptomatic primary school children and those in childcare facilities identified as close contacts of a confirmed case of COVID-19 would no longer have to restrict their movements or get tested from Monday 27 September.
Gardaí, the Armed Support Unit and five ambulances attended the scene of a violent clash between two families at a funeral in Tuam, County Galway, with up to 11 people hospitalised.
23 September
A light aircraft with four people on board crash landed on the beach off Carnsore Point in County Wexford.
Garda Commissioner Drew Harris said a number of Gardaí were under investigation after they continued to cancel 999 calls without going through the proper procedure, after it was revealed that a further 53 emergency calls were cancelled.
A group of students gathered outside the Dáil to highlight the accommodation crisis at third-level, which they said was worse than ever.
24 September
The HSE announced that immunocompromised people would be notified of an appointment for a third dose of COVID-19 vaccine from Wednesday 29 September, as Ireland's COVID-19 booster vaccination campaign would commence.
Students and young people protested for climate action across Dublin, Belfast, Cork and Galway.
25 September
Ireland's mandatory hotel quarantine system ended immediately following an announcement by Minister for Health Stephen Donnelly, with all countries removed from the list of "high-risk" countries for international travel.
A 75-year-old man who left a Donegal hospital against medical advice while suffering with severe symptoms of COVID-19 died.
26 September
Paddy Prendergast, the final surviving member of the last Mayo team to achieve All-Ireland Senior Football glory 70 years ago in 1951, died at the age of 95.
Pelletstown railway station, Ireland's newest train station, was officially opened by Minister for Transport Eamon Ryan and Tánaiste Leo Varadkar in north Dublin.
27 September
Most asymptomatic primary school children and those in childcare facilities who were identified as close contacts of a confirmed case of COVID-19 no longer needed to restrict their movements or get tested, while latest figures showed that 91.4% of Irish adults aged 18 and older were now fully vaccinated.
It was revealed that an extra bank holiday in 2021 could generate up to €20 million in tourism revenue, while the Government planned to give frontline workers a bonus as a reward for their efforts during the COVID-19 pandemic.
A large fire broke out at the Glenisk plant in Killeigh, County Offaly.
Gardaí in Dublin appealed for witnesses following the discovery of a man's body in the Grand Canal in Dolphins Barn.
28 September – According to the Bloomberg COVID-19 resilience ranking, Ireland was named the best country to be in for how it dealt with the pandemic and the rise of the Delta variant.
29 September – A 39-year-old Brazilian man was found guilty of the murder of his French wife in Dublin on 25 October 2017.
30 September
A pilot nightclub event took place at the Button Factory in Dublin, which included a 60% capacity crowd of 450 people, vaccination certificates and antigen testing.
The Comptroller and Auditor General found there were not enough checks carried out by the Department of Social Protection when people applied for the COVID-19 Pandemic Unemployment Payment in 2020, with 9.4% of claimants not eligible.
A 53-year-old woman who was suffering from a mental disorder when she stabbed a man she lived with to death was found not guilty of murder by reason of insanity at the Central Criminal Court.
IT systems at NUI Galway were put offline, after an attempted cyberattack, with all internet traffic into and out of the university blocked.
October
1 October
No positive COVID-19 tests were reported at a pilot nightclub event in Dublin on 30 September, with the promotors stating they felt it was very successful.
A new report published by the CSO revealed that nurses and midwives were most likely to contract COVID-19 during the first wave in March 2020 with sales and retail assistants and checkout operators the workers most likely to contract it in the second and third waves.
Electric Ireland announced its second price increase for residential customers in 2021, becoming the latest energy provider to raise prices.
Ireland's newest technological university, Technological University of the Shannon: Midlands Midwest, spanning six campuses across Limerick, Clare, Tipperary and Westmeath formally opened.
2 October
In a video message on Twitter, Chief Medical Officer Tony Holohan said that the number of COVID-19 cases had "stabilised".
The first cartons of goat's milk came off the line at the Glenisk plant in County Offaly, following a fire which caused extensive damage to its facility.
Two men in their 40s were arrested following an alleged stabbing in County Longford.
3 October – Gardaí attended a protest outside the home of Chief Medical Officer Tony Holohan.
4 October
34-year-old Daniel Murtagh was given the mandatory life sentence for the murder of Nadine Lott in December 2019.
A man in his 20s died, a woman in her 20s was injured and a man in his 30s was arrested, following a single-vehicle road crash in Ballyfermot in Dublin.
The Government signed off on the National Development Plan – Project Ireland 2040 – which would commit to expenditure on capital projects totalling more than €165 billion.
A man in his 40s died and two people were in a serious condition in hospital after an assault in a house in Blanchardstown in west Dublin.
5 October
The Chair of NPHET's Epidemiological Modelling Advisory Group Philip Nolan said that the Irish population was in a good place in relation to easing the remaining restrictions by 22 October.
A six-year-old boy who was deprived of oxygen at his birth was awarded €18 million in settlement of his High Court action against the National Maternity Hospital.
Gardaí were searching for a convicted drug dealer and gunman who escaped from an open prison on the night of 4 October.
7 October – The Government announced that it would send two representatives (Minister for Foreign Affairs Simon Coveney and Chief Whip Jack Chambers) to a ceremony in Armagh marking the centenary of Northern Ireland, after the President declined an invitation to the event in September.
8 October
Doors officially closed for the last time at 88 Bank of Ireland branches around the country.
Several thousand homeowners affected by mica marched through Dublin city centre.
A further 2,002 cases of COVID-19 were reported. Deputy Chief Medical Officer Ronan Glynn said the case numbers reflected an increased number of positive tests collected over the previous three days.
10 October
A woman in her 20s was arrested as part of an investigation into a hit-and-run incident in Limerick in which four people were injured, one seriously.
HSE CEO Paul Reid said the number of people in ICU with COVID-19 had risen by 20% in one week, with 67% of the ICU patients not vaccinated and 3% partially vaccinated.
11 October
The number of patients being treated in hospital with COVID-19 increased to 400, the highest since 8 March, while HSE Chief Clinical Officer Colm Henry revealed that up to 50,000 adults over the age of 40 were not yet vaccinated.
Gardaí investigating the disappearance of Deirdre Jacob and other women who went missing in Leinster over 20 years ago said a new search had begun because of unusual activity noticed on the evening she disappeared.
A woman was remanded in custody after she was charged in connection with a road crash in Limerick on 10 October, which left a man in a critical condition and three women with injuries.
A 19-year-old Waterford woman made history as she took over Taoiseach Micheál Martin's office to mark International Day of the Girl.
12 October
Minister for Finance Paschal Donohoe and Minister for Public Expenditure and Reform Michael McGrath announced Budget 2022.
Gardaí issued a Child Rescue Ireland Alert to trace missing two-year-old Aoife Haynes Murphy and said they had serious concerns about her welfare.
The Road Safety Authority warned road users of the dangers posed by fog with dense fog forecast across Leinster and Munster.
13 October
A further 2,066 cases of COVID-19 were reported. Deputy Chief Medical Officer Ronan Glynn said there were still 300,000 adults who had not been vaccinated and that two out of every three people in ICU were unvaccinated.
Taoiseach Micheál Martin said he could not guarantee that the removal of COVID-19 restrictions on 22 October would proceed as planned and that the trajectory of the virus had taken a wrong turn with a sudden increase in case numbers, while Minister for Health Stephen Donnelly said he was self-isolating after experiencing mild symptoms.
Garda Commissioner Drew Harris set up an investigation to examine the handling of cases where allegations of domestic or sexual abuse had been made against members of the Gardaí.
Police in Georgia detained five people in connection with the death of 28-year-old Tom Kennedy from Mayo, who was recovered from a river near the eastern city of Gori on 7 October.
16 October
A further 2,180 cases of COVID-19 were reported, the highest number of confirmed cases recorded in a single day since January.
Gardaí in Cork began an investigation after a 25-year-old man was seriously injured in a shooting incident in the city on the night of 15 October.
The Department of Foreign Affairs provided consular assistance following the death of a 24-year-old Irish man in Spain, who died from drowning in a swimming pool.
18 October
NPHET urged the Government to pause the easing of restrictions on Friday 22 October, with social distancing, mask-wearing and vaccine certificates to remain, while the NIAC approved vaccine boosters for people aged 60 and over.
A primary school in County Wexford closed until after the mid-term break in November after 34 cases of COVID-19 were detected at the school.
19 October
A further 2,399 cases of COVID-19 were reported, the highest number of confirmed cases recorded in a single day since 22 January.
The Government published a revised plan for the easing of restrictions on 22 October, with nightclubs allowed to reopen, the return of normal trading hours in pubs and restaurants, no attendance limits on weddings and religious ceremonies and 100% capacity allowed at sporting venues, while the continued use of masks, vaccine certificates and social distancing measures would remain in place until at least February 2022.
A primary school in County Wicklow closed over concerns at a high incidence of COVID-19 at the school.
The Government approved a new Road Traffic Bill which legislates, for the first time, the use of e-scooters and e-bikes on Irish roads.
21 October – Updated guidelines for hospitality and for the reopening of nightclubs on 22 October were published, with nightclubs allowed to operate at 100% capacity, a maximum of 1,500 people permitted to dance or stand at live music venues and multiple table bookings allowed in pubs and restaurants.
22 October
A further 2,466 cases of COVID-19 were reported, the highest number of confirmed cases recorded in a single day since 21 January.
Nightclubs and late venues reopened after almost 600 days of closure, as new guidelines were published.
A woman in her early 20s was seriously injured after being struck in the face by a firework in Galway's Eyre Square.
A 39-year-old man was sentenced to life in prison for the murder of his wife at their home in Dublin in 2017.
25 October
A woman in her 20s was in a serious condition in Beaumont Hospital following a hit-and-run in north Dublin on the night of 24 October.
Gardaí appealed for witnesses after a man in his 40s was also in a serious condition in University Hospital Galway following a hit-and-run in County Galway.
The Climate Change Advisory Council finalised two five-year carbon budgets which seek to reduce Ireland's greenhouse gas emissions by 51% within a decade.
The HSE announced that pop-up vaccination clinics at maternity hospitals would be developed, after it was revealed that 20 pregnant or postpartum women needed intensive care treatment for COVID-19 since the end of June 2021.
27 October
A woman in her 30s was arrested after two men were injured in stabbings in Dublin on the night of 26 October.
Met Éireann issued a Status Orange rain warning for Waterford, Wexford and Wicklow with seven other counties under a Status Yellow warning.
28 October
The HSE began to send antigen tests to people who were deemed close contacts of a COVID-19 case.
A woman was seriously injured after being struck by a Luas near Heuston Station in Dublin.
The Health Protection Surveillance Centre confirmed the first two flu cases of the season in Ireland.
30 October
A further 2,966 cases of COVID-19 were reported, the highest number of confirmed cases recorded in a single day since 16 January.
A man in his 40s died following a road crash in County Clare.
31 October
A woman in her 50s died after she was struck by a car in Drimnagh, Dublin.
Met Éireann issued a series of Status Yellow wind warnings across the country, with gusts of up to 90 to 110km/h forecast.
November
1 November – Following new advice from the National Immunisation Advisory Committee, Minister for Health Stephen Donnelly authorised the use of booster vaccines for healthcare staff.
2 November
A further 3,726 cases of COVID-19 were reported.
A ceremony was held in Dublin to remember the lives of people lost during the COVID-19 pandemic.
Student nurses from around the country were joined by their work colleagues outside the Dáil as they held a protest calling for Government support.
A cyclist in his 40s died following a road crash in Ranelagh, Dublin.
4 November
Gardaí arrested a 32-year-old man and began a murder investigation after the body of a 32-year-old woman was discovered in her home in Dublin.
The Government published its Climate Action Plan which aims to reduce greenhouse gas emissions by 51% by the year 2030.
5 November
A further 3,903 cases of COVID-19 were reported.
The HSE began rolling out COVID-19 booster vaccines for those aged 60 and over.
17 people were arrested following an investigation into suspected COVID-19 social welfare fraud at a number of business premises in Dublin.
6 November
32-year-old Diego Costa Silva was charged with the murder of his wife Fabiole Camara De Campos in their home in Finglas, Dublin on 4 November.
Minister for the Environment, Climate and Communications Eamon Ryan cancelled his trip to the COP26 conference in Glasgow, after testing positive for COVID-19.
7 November – It was confirmed that Minister for the Environment and Climate Eamon Ryan tested negative for COVID-19 after taking a second test and would now travel to COP26.
8 November
Three men were found guilty of abducting and torturing businessman Kevin Lunney in September 2019, while a fourth man was found not guilty.
Minister of State for Public Health, Well Being and National Drugs Strategy Frank Feighan tested positive for COVID-19.
10 November – Tributes were paid to a 13-year-old teenager who died after he was struck in the head by a sliotar at his school in Kilkenny.
11 November – A 14-year-old teenager became Ireland's youngest person to die with COVID-19.
12 November
A further 5,483 cases of COVID-19 were reported, while NPHET recommended to Government that people who frequently go to nightclubs, bars and restaurants should take twice weekly antigen tests, extending the use of COVID certificates to areas outside of hospitality, mask-wearing in outdoor sporting events and that people work from home.
Gardaí began an investigation after a man in his late 20s was found seriously injured with a gunshot wound to the head in Finglas, Dublin on the night of 11 November.
Ennis was awarded the title of Ireland's tidiest town.
16 November – The Government announced a series of measures in a bid to curb the spread of COVID-19, with a closing time for bars, restaurants and nightclubs to be midnight, household contacts of a person with COVID-19 to restrict movements for five days and take three antigen tests, people required to work from home where possible and vaccination certificates required for cinemas and theatres.
20 November – A further 5,959 cases of COVID-19 were reported.
25 November – Gardaí began a murder investigation after a 65-year-old man died with serious head and body injuries in Balbriggan on 24 November.
26 November
Minister for Health Stephen Donnelly announced that COVID-19 booster vaccines would be offered to everyone aged 16 and over, starting with pregnant women aged over 16, those aged 40 to 49 and those aged 16 to 39, following new recommendations from NIAC.
The 2021 edition of The Late Late Toy Show aired, marking the 13th hosted by Ryan Tubridy and the 46th edition overall.
27 November
The NPHET Epidemiological Modelling Advisory Group began meeting to monitor the Omicron variant situation in Europe, and began considering further required measures.
Thousands of people attended a protest against COVID-19 restrictions and vaccine passports at the GPO on Dublin's O'Connell Street.
29 November – Minister for Health Stephen Donnelly said it was likely that the new Omicron variant was in Ireland after the Department of Health confirmed that 11 suspected cases of the new variant were sent for whole genome sequencing.
30 November – The Government announced additional measures in a bid to curb the spread of COVID-19, with parents of children aged 12 and under urged to reduce socialisation indoors, a negative test required for people arriving into Ireland from Friday 3 December, the re-establishment of mandatory hotel quarantine, the wearing of face coverings for children aged 9 years and over on public transport, in retail and for children in third class and above.
December
1 December – Tests carried out at the National Virus Reference Laboratory confirmed that the first case of the Omicron variant had been detected in Ireland.
3 December – The Government reintroduced a series of measures that would commence from 7 December to 9 January amid concerns of the Omicron variant, with nightclubs to close, bars and restaurants to revert back to six adults per table and no multiple table bookings allowed, indoor cultural and sporting events to operate at 50% capacity, a maximum of four households allowed to meet indoors, the Pandemic Unemployment Payment to be reinstated and the requirement of vaccination certificates extended to gyms, leisure centres and hotel bars.
5 December – Status Orange and Yellow wind warnings were issued for the country by Met Éireann ahead of the arrival of Storm Barra.
6 December – Met Éireann issued Status Red wind warnings for Kerry, Cork and Clare, as the country braced for Storm Barra to batter Ireland with gusts expected to reach 140km/h, while the Department of Education advised schools in counties with Status Red and Orange weather warnings to close.
7 December – Around 65,000 homes and businesses were without power in Cork and Kerry, as Storm Barra battered Ireland with gusts of up to 160km/h, causing fallen trees, flooding and disruption to transport. Schools in counties with Status Red and Orange weather warnings were advised to remain closed.
9 December – Chief Medical Officer Tony Holohan announced in a statement that five additional cases of the Omicron variant had been detected, bringing to six the total number of cases that had been identified in Ireland following whole genome sequencing.
12 December – Four additional cases of the Omicron variant were detected, bringing to 10 the total number of cases that had been identified in Ireland following whole genome sequencing.
13 December
A 38-year-old double killer was sentenced to life in prison for the murder of his friend whose decapitated remains were found in a shallow grave in woods in 2016.
A man who used his car to repeatedly run over Irish boxing champion Kevin Sheehy was found guilty of his murder in 2019.
The Department of Health announced that eight additional cases of the Omicron variant had been detected, bringing to 18 the total number of cases that had been identified in Ireland following whole genome sequencing.
The NIAC recommended that people would be able to receive a booster dose three months after their second dose.
14 December – The Government signed off on a plan to assist households struggling with the rising cost of electricity bills in a €210 million scheme, with all domestic electricity customers to receive a once-off €100 credit.
15 December – The Department of Health announced that 24 additional cases of the Omicron variant had been detected, bringing to 42 the total number of Omicron cases identified in Ireland, while Chief Medical Officer Tony Holohan urged people to take precautions to avoid being in isolation for Christmas.
17 December – To curb the spread of COVID-19 over the Christmas period, the Government announced an 8pm closing time for bars, restaurants, live events, cinemas and theatres that would commence from 20 December to 30 January.
18 December – Chief Medical Officer Tony Holohan called on the public to help flatten the curve after a further 7,333 cases of COVID-19 were reported, the highest number reported since early January.
19 December
Chief Medical Officer Tony Holohan announced that the Omicron variant was now the dominant variant in Ireland after it was confirmed that 52% of COVID-19 cases were now due to Omicron.
Minister for the Environment, Climate and Communications Eamon Ryan began self-isolating after testing positive for COVID-19.
A number of people were injured in Birr, County Offaly after a car driven by a teen suspected of drink-driving mounted a footpath.
21 December – 31-year-old Logan Jackson was sentenced to life in prison for the murder of 20-year-old Irish boxing champion Kevin Sheehy in Limerick in 2019.
22 December – Five people were injured in a multi-vehicle collision at Dublin Airport in which a truck collided with a number of buses and cars.
23 December
Chief Medical Officer Tony Holohan confirmed that almost 75% of cases were now due to the Omicron variant, after a further 7,411 cases of COVID-19 were reported.
Minister for Health Stephen Donnelly announced that booster vaccines would be offered to everyone aged 30 and over from 29 December and to all remaining age groups from 10 January.
Gardaí began an investigation after the bodies of an 88-year-old father and 50-year-old son were found at a house in a suspected murder-suicide in Letterkenny, County Donegal.
24 December
A further 11,182 cases of COVID-19, the highest daily number recorded in a single day since the pandemic began, were reported. 83% of cases were now due to the Omicron variant.
A man in his 40s was arrested after a 40-year-old woman died during an assault at a property in Enniskerry, County Wicklow.
25 December
A further 13,765 cases of COVID-19 were reported in a new daily record, overtaking the 11,182 cases announced on Christmas Eve.
A 51-year-old woman was in a serious condition in hospital after she was stabbed several times near her home in north county Cork.
27 December
Gardaí in Navan appealed for witnesses after a man in his 40s was injured in a stabbing in County Meath.
A man in his 20s died and a woman in her 50s were seriously injured in a two-vehicle collision in Wexford, while two people were killed in separate road traffic incidents in Dublin and Mayo, bringing to six the number of road fatalities on the island of Ireland in 24 hours.
29 December
A further 16,428 cases of COVID-19 were reported, overtaking the 13,765 cases announced on Christmas Day. Chief Medical Officer Tony Holohan expressed concern and stated that "every individual should consider themselves potentially infectious".
The Department of Foreign Affairs stated that lessons had been learned, after an image emerged showing at least 20 senior officials and staff from the department gathering at Iveagh House in breach of public health guidelines in June 2020.
30 December
A record 20,554 cases of COVID-19 were reported.
Chief Medical Officer Tony Holohan confirmed that 92% of cases were now due to the Omicron variant, while he urged people to keep social contacts low and not to hold household gatherings on New Year's Eve. Minister for Health Stephen Donnelly announced new advice on COVID-19 testing and the period of isolation.
31 December – Minister for Health Stephen Donnelly announced that booster vaccines would be offered to everyone aged 16 and over from 2 January 2022, eight days earlier than planned.
Deaths
January
1 January – Liam Reilly, 65, singer-songwriter, lead singer of Bagatelle
2 January – Michael McKevitt, 71, founder of the Real IRA, cancer
6 January – James Cross, 99, Irish-born British diplomat and kidnapping survivor (October Crisis), COVID-19.
7 January – Jim Townsend, 83, politician, county councillor and Senator
9 January – Barbara Hewson, 59, barrister, pancreatic cancer.
10 January – Theo English, 90, hurler (Marlfield, Tipperary senior team, Munster).
11 January – Robert Warke, 90, Anglican prelate, Bishop of Cork, Cloyne and Ross (1988–1998).
14 January
Éamonn Ryan, 79, Gaelic footballer (Glenville, Watergrasshill, Imokilly, Cork senior team) and manager (Cork senior ladies' football team)
Brian Moller, 85, Anglican priest, Dean of Connor
16 January – David Shaw-Smith, 81, filmmaker
19 January – Brian Hillery, 83, politician, Senator and TD, short illness.
21 January – Jerry Kiernan, 67, Olympic long-distance runner, (1984)
23 January
Harry Perry, 86, Olympic boxer.
Roy Torrens, 72, cricket player and manager.
24 January – Patrick O'Donoghue, 86, Roman Catholic prelate, Bishop of Lancaster (2001–2009).
26 January – Cara O'Sullivan, 58, coloratura soprano, long illness.
29 January – Joe Pat Prunty, 88, Gaelic footballer (Roslea Shamrocks, Fermanagh junior team) and businessman, short illness. Born in Northern Ireland
30 January – Mick Kerr, 86, Gaelic footballer (Beragh Red Knights, Tyrone senior team). Born in Northern Ireland
February
2 February – John O'Keeffe, 95, Gaelic footballer (Millstreet, Cork senior team).
4 February
Harry Donnelly, 83, Gaelic footballer (Athlone, Offaly senior team).
Ben Hannigan, 77, footballer (Shelbourne, Wrexham, Dundalk, Cork Celtic, Shamrock Rovers).
5 February – Edward Moore, 50, cricketer (national team).
7 February – Tommy Kenny, 87, ladies' Gaelic football administrator, President of the LGFA (1977-1979).
8 February – Rynagh O'Grady, 69, actress (Abbey Theatre, Father Ted).
9 February
Christy Ryan, 63, Gaelic footballer and hurler (St. Finbarr's, Cork senior teams, Munster), cancer.
Éamonn Breslin, 80, Gaelic footballer (Ballyfermot Gaels, Dublin senior team).
12 February – Tom Scullion, 81, Gaelic footballer (Bellaghy, Derry senior team) and manager (Derry senior team).
18 February – Mark Van Drumpt, sports physiotherapist (Garryowen, Limerick), cancer.
21 February – Joe Burke, 81, Irish button accordion player.
22 February
Martin Heffernan, 76, Gaelic footballer (Tullamore, Offaly senior team) and administrator.
Jack Quaid, 88, hurler (Feohanagh-Castlemahon, Limerick senior team, Munster).
23 February - Gary Halpin, 55, rugby union player (Wanderers F.C., Leinster, London Irish, Harlequins, national team), unexpectedly.
24 February
Tom Foley, 74, racehorse trainer, cancer.
Enda McDonagh, 90, Roman Catholic priest and academic.
26 February
Noel Elliott, 74, rugby union player (Dolphin R.F.C., Munster, national team), illness.
Des McAleenan, 53, association footballer (Connecticut Wolves, Albany Alleycats) and coach (New York Red Bulls, Colombian national team), suicide.
27 February - Mike Burns, 84, journalist (RTÉ News at One, This Week, World Report).
March
2 March – Liam Carroll, 70, property developer and businessman.
6 March
Tom Moloughney, 80, hurler (Kilruane MacDonaghs, Tipperary senior team).
Carmel Quinn, 95, actress and singer.
Ned Cleary, 90, Gaelic football trainer and administrator (Castlehaven).
8 March – Fergal McCann, 47, Gaelic football coach (Killyclogher St Mary's, Carrickmore St Colmcille's, Tyrone senior team), long illness.
15 March – Alan Kane, 75, Gaelic footballer (Aodh Ruadh, St. Joseph's, Donegal senior team).
16 March – Jimmy Stafford, 77, Gaelic footballer (University College Dublin, Cavan senior team, Combined Universities).
22 March – P. J. McGrath, 79, Gaelic footballer (Mayo senior team), referee and administrator.
23 March – Noel Bridgeman, 74, drummer (Skid Row), cancer.
25 March – Jim Quaid, 88, hurler (Feohanagh-Castlemahon, Limerick senior team).
April
5 April – Veronica Dunne, 93, opera singer and singing teacher.
6 April
Packy McGarty, 87, Gaelic footballer (Mohill, Leitrim senior team, Connacht).
Mattie Hetherton, 69, Gaelic footballer (Cavan senior team).
Tim F. Hayes, 74, Gaelic footballer (Clonakilty, Cork senior team, Munster).
Denis Donoghue, 92, literary critic.
9 April – Paddy Cahill, 44, filmmaker and cycling advocate.
10 April
Shay Healy, 78, broadcaster, journalist and songwriter, Parkinson's disease.
Lee Dunne, 86, author and playwright.
15 April – Tom Sailí Ó Flaithearta, 90, actor.
21 April – Gerry Mackey, 87, footballer (Shamrock Rovers, King's Lynn, Limerick, national team).
23 April – Detta Ó Catháin, Baroness Ó Catháin, 83, businesswoman and British life peer.
26 April – Austin Flynn, 87, hurler (Abbeyside, Waterford senior team, Munster).
27 April – Rory Young, 53, conservationist, gunshot wound.
May
1 May – Tom Hickey, 77, actor.
3 May
Alan Keely, 38, footballer (Shelbourne, Finn Harps, Waterford United).
Seán Corcoran, 74, singer and music collector.
4 May
Alan McLoughlin, 54, English-born footballer (Swindon Town, Southampton, Portsmouth, national team), cancer.
Kathleen Reynolds, 88, spouse of the Taoiseach (1992–1994).
William Warner Westenra, 7th Baron Rossmore, 90, Anglo-Irish noble, photographer and author.
12 May
Séamus Deane, 81, poet, novelist and critic.
Dixie Hale, 85, footballer (Waterford, Shamrock Rovers, Swansea Town, Watford).
15 May – Tim Falvey, 87, politician.
23 May – Barney Curley, 81, horse trainer and punter (Yellow Sam betting coup).
25 May – Johnny Everard, 97, hurler and Gaelic footballer (Moyne-Templetuohy, Tipperary senior teams).
26 May – Vincent Daly, 72, Gaelic footballer (Longford senior team).
30 May – John Carpenter, 84, football referee.
June
3 June – Cathal Flynn, 87, Gaelic footballer (Leitrim senior team, Connacht).
7 June – John McDonnell, 82, athletics coach.
16 June – J. Peter Neary, 71, economist.
17 June – Mary Frances McDonald, 91, feminist and women’s rights campaigner.
27 June – Noel Furlong, 83, businessman and poker player.
30 June – Barbara Murphy, 56, nephrologist.
July
4 July – Rick Laird, 80, jazz fusion bassist (Mahavishnu Orchestra, Brian Auger and the Trinity), lung cancer.
11 July – Charlie Gallagher, 80, Scottish-born footballer (Celtic, national team).
12 July – Seán McCarthy, 84, politician, TD (1981–1989), Minister of State for Science and Technology (1987–1989) and Senator (1989–1992).
13 July - Ronnie Kavanagh, 90, rugby union player (Wanderers F.C., Leinster, national team).
15 July - Joe Cassidy, 51, singer-songwriter (Butterfly Child), sepsis.
16 July
Desmond Fennell, 92, writer, essayist, cultural philosopher and linguist.
Finbarr Gantley, 70, hurler (Beagh, Galway senior team, Connacht).
17 July – Jo Jo Barrett, 77, Gaelic footballer (Austin Stacks, Kerry senior team) and manager (Austin Stacks, Clara, Wexford senior team).
18 July – Donal Sheehan, 81, hurler (Na Piarsaigh, Cork senior team).
19 July – Noel Lucey, 82, Gaelic footballer (Glenbeigh-Glencar, Laune Rangers, Kerry senior team).
21 July – Desmond O'Malley, 82, politician, TD (1968–2002) and leader of the Progressive Democrats (1985-1993).
27 July
Tommy Connolly, 74, footballer (Dundalk) and manager (Dundalk).
Ray McBride, 69, dancer and actor (Into the West, Angela's Ashes, Ballykissangel).
August
3 August – Noel Lynch, 74, politician, Member of the London Assembly (2003-2004).
8 August – Colum McKinstry, 71, Gaelic footballer (Clan na Gael, Armagh senior team, Ulster) and manager (Clan na Gael). Born in Northern Ireland.
14 August – James McCartan Snr, 83, Gaelic footballer (Glenn, Down senior team, Ulster) and manager (Down). Born in Northern Ireland.
24 August
Liam O'Brien, 72, hurler (James Stephens, Kilkenny senior team, Leinster).
P. J. Garvey, 50, Gaelic footballer and hurler (Hospital-Herbertstown , Limerick senior teams).
29 August
Pat Nolan, 84, hurler (Oylegate-Glenbrien, Wexford senior team, Leinster).
Rodney Rice, 76, journalist and broadcaster, short illness.
30 August – Seán McGuinness, 76, hurling manager (Antrim senior team, Down senior team, Ulster). Born in Northern Ireland.
September
4 September – Donncha Ó Dúlaing, 88, broadcaster.
11 September – Mick Flannelly, 91, hurler (Mount Sion, Waterford senior team, Munster).
15 September – Thomas Ryan, 92, artist.
18 September – Anto Finnegan, 48, Gaelic footballer (St. Paul's, Antrim senior team), motor neuron disease. Born in Northern Ireland.
23 September
Billa O'Connell, 91, entertainer.
Mervyn Taylor, 89, politician, TD (1981–1997), Minister for Labour (1993) and Minister for Equality and Law Reform (1993–1994 and 1994–1997).
24 September – Grey Ruthven, 2nd Earl of Gowrie, 81, Irish-born British politician, businessman, and arts administrator.
25 September – Paddy Prendergast, 95, Gaelic footballer (Dungloe, Ballintubber, Donegal senior team, Mayo senior team, Connacht).
October
8 October – Tony MacMahon, 82, button accordion player and broadcaster.
12 October – Paddy Moloney, 83, musician, composer, and producer (The Chieftains).
14 October – Gerry Robinson, 72, businessman and television executive.
16 October – Máire Mhac an tSaoi, 99, Irish language scholar, poet, writer, and academic.
17 October – Brendan Kennelly, 85, poet and academic.
24 October – John Traynor, 73, criminal, cancer.
27 October – Gay McIntyre, 88, jazz musician.
28 October – Davy Tweed, 61, rugby union player (Ballymena R.F.C., Ulster, national team), road traffic accident. Born in Northern Ireland.
31 October – Simon Young, 62, broadcaster, long illness.
November
1 November – Maurice Price, 83, association footballer (Shamrock Rovers) and coach (national team).
2 November
Des Ferguson, 91, Gaelic footballer and hurler (St Vincent's, Gaeil Colmcille, Dublin senior teams) and coach (Meath senior teams).
John Joe O'Hagan, 91, Gaelic footballer (Clonoe O'Rahilly's, Tyrone senior team) and manager (Eglish St Patrick's). Born in Northern Ireland.
Declan Mulligan, 83, rock musician, singer and songwriter.
8 November – Seán FitzPatrick, 73, banker and former chairman of Anglo-Irish Bank, heart attack.
9 November
Austin Currie, 82, politician, MP (1964–1972), TD (1989–2002) and Minister of State for Justice (1994–1997). Born in Northern Ireland.
John Kinsella, 89, composer.
18 November – George Eogan, 91, archaeologist.
20 November – Ray McLoughlin, 82, rugby union player (Gosforth, Barbarians, British & Irish Lions, national team).
22 November – Ned Rea, 77, hurler (Effin, Faughs, Limerick senior team, Munster).
26 November – Norman Allen, 93, Gaelic footballer and hurler (St. Vincent's, Dublin senior teams).
30 November
Barney Carr, 98, Gaelic footballer (Warrenpoint, Down senior team) and manager (Down).
Mary Maher, 81, American-born trade unionist, feminist, and journalist.
December
1 December
Seánie O'Leary, 69, hurler (Youghal, Cork senior team, Munster) and coach (Imokilly).
Jas Murphy, 98, Gaelic footballer (Kerins O'Rahilly's, Garda, Kerry senior team, Cork senior team, Munster).
2 December – Tom McGarry, 74, hurler (Treaty Sarsfields, Limerick senior team, Munster), footballer (Limerick) and rugby union player (Young Munster).
4 December – Andy McCabe, 76, Gaelic footballer (Crosserlough, Cavan senior team, Ulster).
12 December
Toddy O'Sullivan, 87, politician, TD (1981–1997) and Minister of State (1986–1987 and 1994–1997).
Martin Quinn, 83, Gaelic footballer (Kilbride, Meath senior team).
13 December – Liam Kavanagh, 86, politician, TD (1969–1997), MEP {1973–1981) and Minister for Labour (1981–1982 and 1982–1983).
22 December
Thomas Kinsella, 93, poet.
Eddie Wallace, 71, footballer (Shelbourne, Galway, Drogheda United) and manager (Athlone Town).
24 December – Shirley Bottolfsen, 87, humanitarian activist.
26 December - Denis J. Hickie, 78, rugby union player (St Mary's College, Leinster, national team).
27 December
Jim Sherwin, 81, producer, broadcaster and sports commentator.
Patsy Dorgan, 85, footballer (Blackburn Rovers, Cork Hibernians, Cork Celtic).
28 December – Chris Wall, 79, politician, Senator (2007).
See also
Politics of the Republic of Ireland
References
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.