id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
1927356
|
https://en.wikipedia.org/wiki/Shaun%20Cody
|
Shaun Cody
|
Shaun Michael Cody (born January 22, 1983) is a former American football nose tackle. He played college football for the University of Southern California (USC), and was recognized as a consensus All-American. The Detroit Lions chose him in the second round of the 2005 NFL Draft. He is currently a commentator for the USC football team.
Early years
Cody was born in Whittier, California. After spending his freshman year at Damien High School in La Verne, he attended Los Altos High School in Hacienda Heights, and he played for the Los Altos Conquerors high school football team. Lining up as defensive end, Cody recorded 105 tackles and 22 sacks as a senior, while helping Los Altos to a 14–0 record and its second consecutive CIF Division VII championship. As a junior, he had 150 tackles, 51 tackles for losses, 35 sacks, 10 deflections and 10 forced fumbles. Cody was recognized by USA Today as its 2000 All-USA Defensive Most Valuable Player. He also played in the first-ever U.S. Army All-American Bowl game on December 30, 2000.
One of the most-sought after recruits of his class, Cody was particularly heavy recruited by the USC Trojans and their newly hired coaches Pete Carroll and Ed Orgeron. Cody was Carroll's first blue-chip recruit, which attracted other talented players and eventually led to USC's dominance in the early 2000s.
College career
Cody attended the University of Southern California, and played for coach Pete Carroll's USC Trojans football team from 2001 to 2004. He was a backup defensive lineman for USC's first four games of 2001, and started the last eight at tackle, and posted 39 tackles, including seven for losses (with five sacks), and one fumble recovery. He was a first-team Freshman All-America selection. As a sophomore in 2002, Cody started for his second season at defensive while starting the first six games, and compiled 20 tackles, including one for a loss, a deflection, fumble recovery, and a blocked field goal.
Cody started all thirteen games as a junior defensive tackle in 2003, and had 26 tackles, including 10.5 for losses (with six sacks), plus a forced fumble, a deflection and three blocked field goals. He was a first-team All-Pac-10 selection and received third-team All-American honors from the Associated Press. He was recognized as a first-team All-Pac-10 selection and consensus first-team All-American as a senior in 2004, after he compiled a career-high 45 tackles (29 solo), 10 sacks, 13 stops for losses, two forced fumbles, two fumble recoveries and three pass deflections. He was also a team captain and voted Pac-10 Defensive Player of the Year.
Professional career
2005 NFL Draft
Projected as a late first-round selection by Sports Illustrated, Cody was ranked as the No. 2 defensive tackle available in the 2005 NFL Draft, behind only Travis Johnson. He eventually was the fourth lineman off the boards, after Johnson, Luis Castillo, and his USC teammate Mike Patterson.
Detroit Lions
Cody was selected with the fifth pick of the second round of the 2005 NFL Draft out of the University of Southern California. He played four seasons for the Lions, recording 91 tackles, 1.5 sacks, one forced fumble and one interceptions in 53 games, before becoming a free agent following the 2008 season.
Houston Texans
An unrestricted free agent in the 2009 offseason, Cody agreed to terms on a three-year contract with the Houston Texans on March 23, 2009. In Week 9 against the Buffalo Bills in 2012, Cody suffered a punctured lung and broken ribs, but later returned to finish the game.
Personal life
Cody participated in a series for Spike TV entitled Super Agent, in which a number of sports agents competed to work for him and negotiate his NFL contract.
Cody is the host of "On The Nose", a behind-the-scenes internet video show with a humorous, irreverent style, interviewing several Texans including Connor Barwin and Bob McNair.
References
External links
Official Website
Detroit Lions bio
Houston Texans bio
USC Trojans bio
American football defensive tackles
All-American college football players
1983 births
Living people
Detroit Lions players
Houston Texans players
USC Trojans football players
People from Hacienda Heights, California
People from Whittier, California
|
6924675
|
https://en.wikipedia.org/wiki/List%20of%20Mega64%20episodes
|
List of Mega64 episodes
|
Mega64 was a DVD-exclusive series released from 2004 to 2010. The show has a story that is based around the characters playing video games in real life. The "real" video games are usually just the characters out in public acting out the video game.
Version 1
Episode 1: Life Inside A Console
The show begins in the apartment of Dr. Poque, an ex-video game programmer turned mad scientist who claims to have created the "greatest thing to happen to video gaming since Bubble Bobble". He calls it the Mega64, a revolutionary system that uses virtual reality helmets to download any video game into the user's brain and memories. It also plays movies, sends faxes, does advanced probability calculations, and has a spacious storage compartment.
To Poque's great frustration however, he is unable to sell his system to any video game companies, getting the same response from each of them: that tapping into the minds of children is too risky. Desperate for the success of his invention, Poque sought out video game nerds all across the Internet, offering the chance to beta test an innovative new system. Unbeknownst to them, it's all a trap. Poque captures all who show and they are imprisoned in a vast dungeon deep under his apartment complex. Though given food and living quarters, they are forced to undergo his digital experiments day in and day out. Through these experiments, Poque seeks to find the one video game no player wishes to leave, and then unleash it onto the public to gain total world domination.
Though a vast number of subjects endure these experiments, the show follows the day-to-day life of Rocko and Derek, whom Poque seems to show a particular interest in.
Rocko and Derek begin their digital misadventures with Super Mario Bros. and Kid Icarus, before Derek can't take it anymore. Poque, seeing himself as a merciful man, allows Rocko and Derek a break from experiments and they are introduced to one of their fellow subjects, Sean.
Sean is in charge of delivering Rocko and Derek e-mail from other test subjects like them. The concept of Sean's job is really only used as a method of introducing the character, and after the first episode, Rocko and Derek seldom answer any other e-mails.
Sean presents himself as a sort of awkwardly psychotic individual. Immediately after his introduction Sean becomes one of the show's less explained enigmas, at least for now.
Rocko and Derek go on to test an additional game, this one created specifically for the Mega64 by an independent company called Suxxor Games. The game XXX, Y takes an extreme and/or totally radical approach to graphing, and then by suggestion of Rocko, the two delve into the world of Banjo Kazooie. Rocko realizes that some positive can come out of their fate to test the Mega64, and that someday they will defeat Poque, because good always overcomes evil.
The episode ends with a confusing epilogue by a Sombrero Guy, and when Rocko asks, "Um, who are you?" the man just takes his hat off and gloomily walks away.
Episode 2: I Feel Asleep
The episode starts with a conversation between Derek and Rocko where Rocko draws a picture of his girlfriend for Derek and the two find a bloody knife on the floor which is never explained.
After Dr. Poque puts up a "BRB" sign, Marcus is introduced to the show. Marcus is a puppet and also Dr. Poque's assistant. He refers to almost everyone as "son" and has an extremely deep voice. The scene ends with Rocko and Derek beating up Marcus.
After a session of Punch-Out!!, it is revealed that the food supply has been cut off from the dungeon. Marcus shows up and reveals that he knows how to find out what's wrong, by logging into Dr. Poque's camera network setup. Marcus gives them the password, which is Dr. Poque's first name. We do not hear it, but Rocko says it sounds like "some kind of butt disease." They manage to get the camera working again, only to see Dr. Poque's hispanic roommate, Horatio. Horatio always wears a hat, a blue jogging suit, and dark sunglasses. He is constantly annoying and stealing from Dr. Poque.
Horatio reveals that he accidentally opened a spam e-mail that downloaded a virus to the central computer which is cutting off the food supply. Rocko volunteers to go into the Mega64 to terminate the virus. Rocko ends up getting captured by the virus, and Dr. Poque downloads a codec to erase the virus, but he can't find it. So Derek goes into Metal Gear Solid as Solid Snake in order to sneak his way around a grocery store and find the codec. However, as Snake, Derek is too obsessed with instead locating and destroying Metal Gear than finding the codec, and fails the mission. Sean then goes into the game as Raiden and finds the codec, thus returning the virus to its human form.
Episode 3: Poque
The episode starts with a mysterious figure explaining his hatred for Dr. Poque. It goes into a Shenmue skit, then Derek and Rocko reveal that there is a big invention Dr. Poque's been waiting to show them. As Dr. Poque is telling them about it, he gets a mysterious message from a hacker. He passes on the new project to Marcus.
Marcus reveals that the new invention is a multiplayer add-on. Derek and Rocko go into a game of Super Dodge Ball with other Mega64 gamers. After the game, Derek and Rocko get a mysterious call from a man calling himself Tony telling them to "Eat at Joe's." After telling him he has the wrong number, he screams and hangs up.
Meanwhile, back at the hideout... Dr. Poque figures out that the hacker got in through the new network adapter they installed. Dr. Poque gets Horatio to go set up a firewall. The hacker then reveals himself to Dr. Poque as "tr1gg3r s3r1ou5!!!!1" (his real name is Rion Specter). He insults the Mega64, saying that all console games are inferior to PC games. After revealing that he's never heard of the Dreamcast, Dr. Poque insists on giving him a lesson through a music video, "Nuttin' But A Dreamcast", a parody of Dr. Dre's "Nuthin' But a "G" Thang". The video is concluded with a guest-appearance by Hunkty Krunkty, a fictional rapper in the Mega64 Universe.
After the music video, the hacker tells Dr. Poque that he hacked the Mega64 and that when Derek and Rocko go into it next, he's going to kill them. He loads up Duke Nukem Forever with God mode in order to kill them. But at the last second, Dr. Poque breaks back in and loads the hacker, Derek and Rocko into Street Fighter II, in which Derek and Rocko beat up Rion, and he is left trapped in the game, seemingly forgotten about.
Horatio comes back saying he put the firewall up, and that Dr. Poque might need a new car, never explaining what happened to the car. Sean then comes in and asks if Derek and Rocko got a phone call, they say that some guy called telling them to "eat at Joe's, and his name was Tony." Sean suddenly has a flashback where Tony comes into his house and kills his girlfriend because he didn't eat at Joe's, threatening to "kill all the people he loves."
Episode 4: The Gangs Returned To Class And Became Honor Students
The episode starts out with a rainy nighttime sequence where Horatio is dragging some heavy bags around a house. It is unexplained for now.
Three days earlier, Dr. Poque gets an e-mail from a "big gaming company that has much interest in his product." After a Tetris game, Derek and Rocko get pranked by Horatio. Sean hears the word "prank" and rushes in, Horatio and Sean argue about who is the better prankster, Sean eventually leaves, warning them of "Sean's Prank Assault."
Dr. Poque then tells the crew that he got an e-mail saying a representative from a big video game company is coming in three days to take a tour of his console testing lair and preview the Mega64. Horatio brings out a muffin to give to Dr. Poque to celebrate, but there is a razor blade in it, revealing it to be a prank. Dr. Poque recovers from this incident and starts preparing for their visitor. He tells Derek and Rocko to "watch a movie" to kill some time. They are shown a trailer of Super Mario Bros. the Movie 2: Bloodlust, a fictional movie.
Dr. Poque realizes that the apartment is extremely messy and suspicious. He asks Horatio to clean it up, and decides that if the representative gets too suspicious, Horatio is going to kill the representative off when he hears the code word "Delaware". He then asks Derek and Rocko to come up with a game where there's a peaceful community, to show off the Mega64's capabilities. Derek suggests River City Ransom and they are loaded into the game.
When they exit the game, their faces have sharpie on them, another prank by Horatio. Dr. Poque walks back into his room to find mousetraps everywhere, which he quickly gets injured by. Rocko then does another session of Shenmue. Dr. Poque then decides, because he is covered in bandages, to get someone who looks like him to pretend to be him. Despite Rocko's obvious resemblance, he chooses Marcus.
Dr. Poque is about to train Marcus in how to act like him when the representative, Rick, shows up. Confused, Dr. Poque learns that Horatio has been putting sleeping pills into his drinks and turning all the clocks backwards, so while Dr. Poque thinks it's been one day, it's really already been three, revealing yet another prank.
Marcus, posing as Dr. Poque, gives Rick a tour of the apartment after they watch a Mega64 Console Commercial and another commercial for the Mega64 version of Soul Calibur II, with a new hidden character, Star Wars Kid.
After Rick says he needs to talk the offer over with his associates in Delaware, Horatio bursts out of a pile of dirty laundry and beats him to death with a hammer. He leaves to get a buzzsaw and some trash bags, thus explaining the beginning of the episode. Sean comes in laughing saying that he pranked Dr. Poque, that Rick was actually his brother and he made up the whole e-mail and big video game company in order to get the location of the Compound. Sean then realizes that his brother has been killed and the episode ends with him crying and screaming.
Episode 5: Eyes of Skull Has A Secret
The episode starts with Sean and a mysterious masked man (called The Specter) having a conversation in an unspecified dining room. The Specter tells Sean that he can change his fate, then he suddenly is awoken by Rocko and Derek, revealing the sequence to possibly be a dream. Sean starts telling Rocko and Derek about the dream but they're uninterested so Sean hides behind the Mega64 to sulk.
As Rocko and Derek are about to load WarioWare, Sean comes in with a pizza and a soda, trying to prove that he is fun. He then throws the soda at the Mega64, causing it to fry while Derek and Rocko are connected. Dr. Poque angrily tells Sean to leave the project for good. Dr. Poque is about to unplug them when he sees readings he's never seen before, saying that they're "merging with the programming." He insists on leaving them connected for the sake of science, while Horatio leaves and tries to come up with a way to stop Poque.
Dr. Poque sees that Rocko and Derek's minds are projecting "gibberish." Among this gibberish is a trailer for a fictional video game called Aggressive Caroling, a fictional PSA for Rabies, and a skit for Frogger.
Meanwhile, Horatio figures out that if they blow up the Core of the Mega64 then the system will reset back to zero. He calls Sean to ask him to go inside and hit the Core. Sean is walking through the tunnels beneath Dr. Poque's apartment. He is sitting in a corner sulking when Marcus shows up and comforts him. Marcus leaves and The Specter shows up. He hands Sean a gold helmet so he can enter the Mega64.
As he hands him the helmet, the power in the compound goes out and Sean is loaded into The Legend of Zelda as Link. Sean's signal is "the most powerful energy signal ever detected inside the Mega64." As Link, Sean finds the Core, and despite being shot by Dr. Poque, who goes into the Mega64 to stop Sean, he manages to destroy the Core.
After the Mega64 resets, Derek and Rocko find themselves in the dining room that Sean and The Specter were in earlier. Dr. Poque is there too, and before performing a system reset that sends them back into the Dungeon, he says "You weren't supposed to find out about this place."
Derek and Rocko come out of the Mega64 in the Dungeon and decide that Dr. Poque must be connected to the Mega64 somehow and they intend to find out so they can find a way out of there. They realize that Sean isn't there, and Sean is shown walking down an unknown road, still dressed as Link.
Several days later... all seems to be okay with Derek and Rocko. Meanwhile, Dr. Poque goes to meet with two mysterious men, Kain and Wanser. It is suggested that they are representatives from a company that Dr. Poque is working for. They state that "the council" is "less than pleased" with his progress. Dr. Poque apologizes and promises he won't make the same mistakes again. As Poque is walking away, his internal monologue is interrupted by the Sombrero Guy. Dr. Poque yells at him and he walks away dejected.
Mega64 is a DVD-exclusive series that can be only purchased on their website. The show has a story that is based around the characters playing video games in real life. The "real" video games are usually just the characters out in public acting out the video game. This is a summary of the second DVD, entitled "Mega64: Version 2". For a list of the skits on the show, see the List of Mega64 skits.
Version 2
Episode 1: This Story Is Happy End
The episode starts with a young girl watching TV after she's returned from school. She sees the intro to Episode 1 from Version 1 on her TV and is very disgusted. It then goes into a Super Mario Bros. 2 skit.
A scene later, Dr. Poque returns home to find more bills in the mail. He asks Horatio for a solution, and Horatio puts the bills with a box full of others that he's been putting away. Dr. Poque asks why they have no money, and they go through a list of games they've developed that aren't selling. (See the skit list) Horatio suggests they just steal the money, citing his friend Carlos who is now in prison. Dr. Poque comes up with the idea to create a video to help rehabilitate prisoners.
Derek and Rocko are having a discussion about how they've been trapped for six months and how every attempt to escape has failed when Sean shows up with no explanation about how he got out of the Mega64. Rocko suggests they look for clues in another game while he looks for a way to escape, so Derek and Sean load up Hitman.
Meanwhile, Dr. Poque finishes his program to make prisoners docile. He recruits Marcus to deliver the program to the Mega64, and warns him not to watch it, but he does anyway. After deciding that it's crap, he "fixes it" and turns it into an extremely violent video which Derek views, making him extremely aggressive and violent. After threatening to kill Rocco in various ways, Rocco moves in with Sean.
Sean lives in an all white room with a file cabinet, a broken alarm clock, two chairs, and a picture of two clowns. To make the situation less awkward, Rocco and Sean load up Ghosts 'n Goblins. Dr. Poque then discovers that Marcus tampered with his program, he instructs Horatio to "take Marcus out." Misinterpreting this, Horatio takes Marcus out for the day.
Meanwhile, Rocko wakes up to find Sean staring at him, because Sean doesn't sleep. He runs away to the Mega64, where Dr. Poque has just convinced Derek to use a program that has much "blood and guts," but really it is the original program that Dr. Poque hopes will make Derek go back to normal. Hearing Dr. Poque, and thinking the program really is violent, Rocko goes into the program as well. The program has no effect on Derek, and ends up making Rocko extremely wimpy.
Dr. Poque then decides that he can use video games to make Rocko and Derek go back to normal. He loads Derek into Mappy-Land in order to make him happier, which he quickly rejects. Dr. Poque then loads Rocko into Grand Theft Auto in order to toughen him up, which similarly has no effect. Dr. Poque is out of ideas when Sean comes in with a program he wrote. It is extremely creepy and it snaps Rocko and Derek back to normal. The episode ends with a tribute to Michael Jackson's Thriller.
Episode 2: Ode To Sue
The episode starts with Horatio playing Xbox in Dr. Poque's room. Dr. Poque says that "between yelling at your game here and talking to your little internet girlfriend, it's getting pretty annoying". Without Poque realizing, Horatio steals a $20 bill out of Poque's pocket. Horatio then challenges Poque to a $20 bet to get a girl in the apartment by the end of the day.
After a session of Dig Dug, Derek gets the idea to dig their way out of the dungeon while Dr. Poque is busy with his date with the girl he met on the internet. Rocko asks him how they'll escape once they're out, and Derek reveals he has the keys to Dr. Poque's truck, which Horatio flushed down the toilet when Poque ate his Pop-Tarts.
While Dr. Poque gets ready for his date, Marcus and Horatio go to Sidne's house and bring her and her friends over to the apartment. That night, Dr. Poque's date, Sue arrives. When Poque goes to get the dinner he prepared, it is gone. Horatio and his friends admit to eating it, and Dr. Poque warns them not to mess with him for the rest of the night.
Poque goes back to Sue with Hot Pockets and Sue asks who Rocko and Derek are. Dr. Poque plays dumb and then asks them to put on a show for him and Sue. They load up Resident Evil.
The awkward date continues, with Poque and Sue being interrupted and annoyed by Horatio, Marcus, and their friends, until finally Poque freaks out and introduces Sue to his roommates, "the world's stupidest peon over here in blue... and the world's most retarded puppet." Marcus comes in with a "Hey, son!" and Sue is instantly attracted to him and they run off together.
The next day, Marcus and Sue come back from their date and Poque leaves the apartment angry. Thinking Poque is gone, Rocko decides they should keep digging their way out. As he leaves to get the wooden swordfish to dig their way out, Dr. Poque comes down to the dungeon for the first time and forces Derek to cheer him up by playing Luigi's Mansion. It fails to cheer up Dr. Poque, and Derek inspires him to go win Sue back.
Dr. Poque comes back to Sue with a poorly edited music video of him dancing on the beach to the song "Please Let Me Die (I Want To Die)" by TIM (Spoof of the Finnish rock band HIM, complete with spoof heartagram.) Afterwards, Sue gets disgusted when Marcus and Poque begin fighting over her and she storms out of the apartment. Derek and Rocko manage to dig out of the dungeon right as Dr. Poque leaves to chase after Sue. Sue stands in the road while Poque tries to get her to come back. Right when it seems like she is going to give Poque another chance, Derek and Rocko hit her with Dr. Poque's truck, thus, killing her. They step out of the truck in shock and put themselves back in the dungeon. Sean then jumps out of the back of the truck, runs away yelling "Oh, shit, Not again! No!" and jumps in the bushes far away.
Episode 3: And Suddenly, Ezra Didn't Feel So Alone Anymore
The episode starts with a "dude from the future" arriving in front of the Mega64 only to find no one there, so he leaves. Derek and Rocko walk in and sit down as a smaller screen appears in the bottom right corner of the screen. During the intro song, a young man named Benny sits down in front of the smaller screen and starts singing along to the song.
After the intro, Rocko and Derek go into a session of Donkey Konga. Rocko asks who Benny is, and Benny says he lives in the same apartment complex just a few doors down. Dr. Poque tells them to ignore him. Rocko insists on knowing how Benny got there, and Benny explains that he got a new webcam and when he went to the bathroom there was a power surge and when he returned his webcam signal was in their apartment/dungeon. The power surge was caused by the Future Dude coming back in the beginning of the episode.
Dr. Poque then explains that the Mega64 isn't selling because it's not sleek and portable. To fix this, he has come up with the MSFP (Mega64 Portable). He orders Rocko and Derek to build them. Meanwhile, Dr. Poque will hack his way into a public-access television cable TV station so they can air an MSFP special. Rocko comes up with a plan to load the MSFP with maps so whoever purchases it can find them and help them escape.
Later on, the crew is on public-access television airing the MSFP special. After a clip of California Games, the commercial shows off the various uses and portability of the MSFP. The only caller they get is Benny, so Horatio decides to get his mom to buy one since it is Dr. Poque's birthday. As the crew goes off the air, Benny tells Poque about Rocko and Derek's escape plan, thus ruining it.
As Rocko and Derek are sulking, Sean comes in and tells them he created a video with their location and included it in the MSFP, but because of his incompetence he screws it up, and the MSFP ends up slicing off Horatio's mom's hand. Horatio and his mom say they'll sue Dr. Poque for $2 million if he doesn't get her a new hand.
After a session of BurgerTime, Dr. Poque reveals that he's going to give Horatio's mom a robot, called 2Poque, to help her out instead of a new hand. The robot ends up cutting her other hand off, and she insists on getting $4 million or two new hands. Marcus finally shows up and Benny instantly begins making fun of him. Marcus disappears and then reappears on Benny's smaller screen. He cuts Benny's hands off and then the smaller screen goes blank. Dr. Poque then offers Horatio's mom Benny's hands, and she accepts the offer.
Rocko then asks what happened to the extra MSFPs they made, and Sean says he buried them. 1,000 years later, the Future Dude and a gorilla with wings named Ezra find an MSFP and the Future Dude goes back to when the message was recorded to save them, thus explaining the beginning of the episode.
Episode 4: What The Hell Happened To Mega64?
The episode starts with a session of Paperboy. Afterwards, Dr. Poque calls the whole crew together with his new meeting alarm. He informs them that Teddy Beans, an old college rival of his, is coming to the apartment. He gets all of them to pretend to be his business partners and when Teddy Beans show up he is given a quick tour of the apartment when suddenly a group of masked men rush into the apartment with guns drawn.
The head terrorist, Danny America, an older man with an eyepatch and a Russian accent, walks in and demands that Poque hand over $300,000. Teddy Beans says that there is no way he has that much and makes fun of Dr. Poque. Danny America laughs along with him and then suddenly shoots Teddy in the head, killing him. Before being taken away by the terrorists, Dr. Poque sends a fax down to the dungeon stating that he is in trouble, has opened the holding chamber, and that the terrorists are coming after them next.
The group leaves the dungeon and splits up, Derek goes off on his own and is quickly captured, while Sean and Rocko go off in another direction. Rocko goes off to steal a car so they can rescue Derek while Sean waits. Meanwhile, at the terrorist's hideout, Marcus and Horatio are put under the watchful eye of Danny America's first lieutenant and sister, Gruntilda. Meanwhile, Danny America continually interrogates Dr. Poque about the whereabouts of the $300,000, which Poque keeps insisting he doesn't have. In order to show him how poor he is, he shows him a video of his work on his PSP, which is an Ico skit.
Derek is brought into the terrorist's camp, and is put in the boiler room with Dr. Poque. Danny America decides to put Lobo Fuerte in charge of capturing Sean and Rocko. He is a mysterious man in a gas mask holding a briefcase. Meanwhile, Sean beats up a group of thugs while waiting for Rocko. Rocko finally shows up in a stolen car and they start driving. They are quickly chased down, captured and brought to the terrorist camp.
Danny America brings Poque back out to interrogate him further. He then reveals that his plan is to buy 10,000 stuffed parrots for $30 each and sell them on the internet for $200 in order to make huge profits. One of the terrorists tells Danny that they've found information leading to a duffel bag containing $300,000. Dr. Poque is taken back to the boiler room.
The episode then takes a "commercial break" containing a parody commercial for Internet2. When the show comes back, Sean and Rocko kill their captors and take their guns. Sean enters the room with Gruntilda, Marcus, and Horatio, and Marcus kills Gruntilda while she is distracted. As they are leaving, Sean runs into Lobo Fuerte and they both pour gasoline on their bodies, tie their wrists together with a long piece of rope, and fight with lighters.
Meanwhile, Rocko manages to get himself captured as well. But then the terrorists bring in the duffel bag, which contains a 2Poque robot. It quickly kills all of the terrorists. Meanwhile, just when it appears Lobo Fuerte is going to win the fight, Sean knocks him down, cuts the rope, then lights him on fire. Derek and Dr. Poque come out to see that everyone is dead. Then suddenly, Teddy Beans comes in with a gun drawn, revealing he faked his death and he masterminded the entire thing. Teddy says "So long, Dr. Diarrhea Poque" (revealing Dr. Poque's first name) before getting shot by the Sombrero Guy. When Derek asks who he is, he vanishes like magic.
Episode 5: Summer Semester
The episode begins with Poque watching a news story about opossums popping up due to electrical storms when he sees Horatio walk past his door while carrying a drum. Poque decides to investigate and finds Horatio with the drum and a suspended cymbal and Marcus at a keyboard trying to form a band. Poque doesn't want them to play because he's "extremely jumpy" around loud noises. Horatio promises to not make much noise and starts drumming with his fingers quietly and slowly. Poque agrees to that and walks back to his room where the finger drumming is still audible. He then uses a pair of scissors to trim his eyelashes, a retractable blade to trim his beard, and a knife to remove a bit of food stuck between his teeth. He then grabs a mug and starts to take a sip when Horatio bangs the cymbal and starts drumming loudly, causing Poque to spill his beverage on himself. He then yells to him about playing that loudly while he was drinking "an ice-cold coca-cola beverage" was the worst time to do so and calls him dumb.
After a Katamari Damacy skit, we see Sean and Rocko at the Mega64, where Rocko explains that Poque forced them back into the dungeon after the events of the last episode. Rocko then asks Sean if he's had trouble remembering anything lately. Rocko reveals that he's had difficulty remembering small details like "my old address or a lot of phone numbers I used to know." Sean then says that he has it worse because he doesn't remember anything besides working for Poque, not even how he came to work for him.
We then cut to Horatio's room where he and Marcus are jamming loudly just as Poque storms into the room demanding that they stop. Horatio then asks if he'd like to join their band, which they named Mega64. We then cut to Poque incompetently playing a guitar with Horatio and Marcus and then another cut is made to Poque's room where we find that Horatio and Marcus are kicking him out of the band. Poque says that he's taking the name Mega64 with him and Horatio says that's fine and renames his band to Summer Semester.
Meanwhile, Rocko is standing next to the Mega64 when Derek walks in with the disk containing Sean's behavioral modification program. Derek reveals that he's been studying it and found something hidden at the end. Derek loads the program for Rocko who watches the end of it. After it fades to white it does nothing for a while before slightly fading in on The Specter. He slowly whispers "Sean. Bring me Sean." Rocko takes off his helmet and is noticeably disturbed by what he saw. Rocko and Derek decide that they need to get Sean to see it and walk off to find him.
Poque is in his room playing his guitar when Horatio and Marcus burst in announcing that "a strange looking guy with a red face" from a record label wants them to record an album and that one of their songs is capable of killing opossums. They gloat about it for a while and then leave.
Rocko and Derek bring Sean to the Mega64 so they can show him The Specter in his program. Sean puts on his helmet while Derek loads the program. However, instead of The Specter, Sean sees a series of images that quickly flash before him while a screeching noise plays. Sean then faints and falls off the chair.
Later at night, Poque is in his room sleeping while a figure watches him. Poque wakes up and then screams when he sees the figure and the figure hisses back at him. Poque turns the light on to reveal that the figure has gray skin, some fur under his neck and a black nose. Poque demands to know who he is and the figure replies that his name is Thark and he wants to see "the creator of Mega64."
Back in the dungeon, Rocko and Derek are trying to wake Sean up. Derek manages to slap him awake and they ask him what he saw. Sean says that he doesn't remember what happened to him after he put his helmet on. To apologize for slapping him in the face, Rocko and Derek go off to find a drink for Sean. After they leave, we find that Sean does remember what happened and he leaves to investigate.
We come back to Poque and Thark and find that Thark meant he wanted to see the Horatio and Marcus of the band Mega64. He then tells Poque that he's a man-opossum from fifty years in the future. Horatio and Marcus' opossum killing song forced opossums to evolve to a point where they gained psychic abilities and enslaved humanity. However, another one of their songs had the same effect on snakes and the two species had a "manimal" war which the man-opossums lost. They then built a time machine to go back in time to stop the creation of the snake song. Poque tells Thark where the album is being recorded and they rush over.
Sean is walking through the corridors underneath the dungeon and we see that they correspond with they the images that Sean saw. He is about to walk in a door when we cut back to Thark and Poque at the recording studio where we find that Horatio and Marcus have already made the album and that they know about the manimal war because their contact from the record label is Jessse, a man-snake. Horatio decides that they should have a battle of the bands to settle the war. Both sides agree to it and they leave to prepare.
Sean is looking in the room from the images when he comes upon a box. After a Seaman skit, Sean enters the Mega64 room with some papers which turn out to be blueprints to the Mega64. Rocko notices that Sean's name is mentioned on the blueprints several times and Derek finds a disk for the Mega64. They load it up and put on their helmets to watch it. The program starts off with a black screen playing ominous piano music. The word "FALZ" fades in followed by "PROJECT MEGA64" and then followed by "TEST DATA ALPHA STAGE." The program then shuts off because Poque has rerouted as much power as he can to power his "new kickass amp." There's still enough power left to play Altered Beast so Poque loads it up.
After the skit, Poque and Thark meet up with Horatio, Marcus and Jessse at a beach for the battle. Poque and Thark go first and Horatio, Marcus and Jessse go next. After they play, Poque has Rocko, Derek and Sean decide the winner. They pick Jessse's song as the winner and then Rocko points out if they destroy the master copy of the album then neither side will come into existence. Horatio then scratches it with sand and Thark and Jessse pop out of existence. Poque then asks Rocko, Derek and Sean if they were running a program when he rerouted the power because the Mega64 destroys anything loaded in it if it shuts down while running a program.
Episode 6: Stranger
The episode starts with a Resident Evil 4 skit in which the characters get arrested. Rocko then drinks out of a cup that has an offensive saying on it, Derek explains that Marcus is trying to sell cups to gourmet restaurants as "conversation starters." Then, a new character named Jon rides his bike by and talks to Rocko and Derek.
After a session of Feel the Magic: XY/XX, Sean and Jon leave to check out Sean's room. Rocko questions the fact that they haven't seen Dr. Poque in days and that Jon showed up out of nowhere and Derek gets mad at him for assuming everyone is out to get him.
Upstairs, Horatio and Marcus are discussing Marcus's cups and the new guy, Jon. We then see Dr. Poque sitting in a bathtub and putting on a helmet. This is when he experiences his flashbacks.
Back in Sean's room, Jon tells him that there is someone who haunts the Mega64. He died while connected to it because of the "age-limit bug." Jon explains that it was dangerous for anyone too old to use the Mega64. It's been fixed since, but Jon says FALZ still only lets teenagers beta test it. He explains that FALZ is the team that really invented the Mega64. He said that they only use Poque because of his connections and that the man who haunts the Mega64 can travel between the Mega64 and the real world, and bring things back with him. Seans says that he has met this man, and after an awkward silence Sean puts on his helmet to play a game.
Meanwhile, Derek and Rocko play a game of A Boy and His Blob: Trouble on Blobolonia. When Derek gets out, he yells at Rocko for not being the blob, but Rocko is behind the Mega64 trying to fix it. Jon walks in and tells Derek not to play discs that don't belong to him. When Derek is bent down, he knocks Derek out and says that he'll never stop FALZ and that "the only threat to FALZ is Sean, and I've already taken care of him." Jon drags Derek out and Rocko has seen the whole thing.
We then see the television show Judgemental Night (Parody of Judgement Day) interrupted by a U62 news update that says that televisions in the city are being interrupted by a pirate signal showing Derek and Rocko using the Mega64. The news story shows that Mega64 has gotten a fan base who have conventions, make skit suggestions and make songs about Mega64. Kevin Smith is apparently interested in directing the movie. Other members of the fanbase include Paul Farkas, Ricky "Thumbs" Jackson, Tim Heidecker, and Eric Wareheim.
After the news broadcast, Marcus goes down the dungeon and Rocko tells him that Jon is trying to overthrow the place. Marcus vows to take out Jon and connects himself to the Mega64 to get into Street Fighter II while Rocko goes to rescue Sean. Marcus recruits tr1gg3r s3r1ou5!!!!1, who has been stuck in the game since the last time they encountered him, to help them stop Jon. Marcus gets to him agree to help stop Jon by hacking the Mega64 after Marcus says he'll get him out of the Mega64 and help him find Poque.
Meanwhile, Rocko finds Sean on the floor in Jon's room and then Jon comes in hits Rocko in the knee with a wrench and then puts on a Mega64 helmet to get the secret thoughts he drained out of Sean's brain. When he puts it on, he gets hacked by tr1gg3r s3r1ou5!!!!1 and he sees random images, including an Aggressive Caroling skit and another Legend of Zelda skit. When he takes off the helmet, Marcus attacks him, but then Jon rips the puppet apart, seemingly killing him.
Jon and Sean then run up to the apartment. Horatio then walks into Jon's room and sees Marcus on the floor torn in pieces. Jon starts typing on Dr. Poque's computer to gas the whole place and kill everyone when the power goes out and Horatio comes in and beats up Jon in a fit of rage. As Jon gets up, Dr. Poque shoots him and kills him.
Later, everyone is hanging out and having a good time, Horatio has even taped up and fixed Marcus, Trigger Serious has finally come out of the Mega64, and Sean says that he's gonna go find FALZ and find out who really made the Mega64. Suddenly, just as Dr. Poque is about to say what he learned that day, a giant evil rabbit in a Santa Claus costume, known as "frankie.jpg", bursts into his room punches Horatio in the face, knocks over Marcus who is yelling "Help me!" and attacks Dr. Poque who is left screaming "it's loose!"
Flashbacks
The episode also explains more of Dr. Poque's past through flashbacks. The first one shows Poque three years ago applying for a job with SharnoTech developing video games. He runs into his friend Gary who set him up with the interview and explains that he got the job. A while later, he is on the phone with his girlfriend explaining that he is doing well at his job and might get to show some of his work to Brion Specter. They get in an argument about his arrogance and he hangs up on her. While lying on the couch he sees a laser pointer light on his wall and looks outside but there is no one there.
Then, two years later, Poque is at work goofing off. His co-workers ask why he has been doing other stuff instead of making the games he is supposed to make. He ignores them and then his boss shows up upset. That night, he sees the red light again and goes out to the street and sees Kain who claims to be from FALZ. Kain tells him he is brilliant and that they need Poque to develop something new. He tells Poque to meet him the next night and Poque goes to the location and when he arrives there are many people dressed in the same way present-Poque dresses and they welcome him to FALZ.
Then, one year later, in a board meeting, he is showing off the Mega64 to his co-workers who look disturbed at the idea. Dr. Poque is then leaving, apparently having been fired. Poque's co-worker tells him that Brian Specter's son has been crying in the lobby all day because his dad didn't show up last night. And the last time anyone saw Brian, he was using the Mega64. This reveals that tr1gg3r s3r1ou5!!!!1 is the son of Brion Specter, who is the man who haunts the Mega64, and explains why his son is out to get revenge on Poque.
More flashbacks show Horatio kidnapping Rocko and Derek, and Dr. Poque putting on his FALZ uniform and being informed that in one year someone (Jon) will be sent to check on his progress.
Version 3
Frankie
Version 3 begins how Version 2 ended, with Frankie bursting into Poque's room, he jumps on Poque, who fends him off with a Guitar Hero controller, Frankie eats Marcus and is then wounded by 2 gunshots fired by a hunter, Ted Geisel (Scott Kelso), Frankie attacks Ted, ripping of his right arm and fleeing.
After the Super Mario Bros. 3 skit, Rocko and Derek awake from the Mega 64 to find with them in the Dungeon is Nicole, a very enthusiastic and easily excited 14-year-old girl who is the daughter of Ted the Hunter.
Upstairs, Dr. Poque reveals that Frankie (Michael J. Nelson) used to be a mall Santa and was going to be the original test subject for the Mega 64, Poque and Horatio kidnapped him and brought him the testing Dungeon but after he started to eat his own poop, strange things started to happen which lead to him transforming from human into a giant rabbit, Ted decided the best course of action is to trap him using the bathroom.
In the Dungeon, Nicole has explained about Frankie and Derek leaves to tell Sean, leaving Rocko and Nicole alone, after an awkward silence they get talking and Rocko tells a story about how he made a bet with Derek for his package of food, as Rocko is talking about his package Derek walks back in and gets the wrong end of the stick, after the abrupt ending to his story Rocko shows Nicole the Dead Rising skit.
After the skit, Derek and Sean both want a private word with Rocko, after Nicole leaves, Derek confronts Rocko about his 'sexual advances' on Nicole and remind him that Nicole is a minor.
Upstairs, Ted takes advantage of Frankie's apparent fondness for eating poop by using his own poop for bait for a trap, but after Ted sets the bait, he realizes he's out of toilet paper, he walks to Poque's other bathroom where he finds toilet paper and Frankie who attacks and kills Ted, Frankie then goes back to Poque's room to attack Horatio and Poque.
In the Dungeon, Rocko wakes up from playing Skate or Die and wonders where Nicole is, shes in the other room and says she'll be in in a moment, but Rocko is met by Sean in a blazer who asks Rocko to sit down, he is then presented with transcripts of chat logs in a parody of To Catch a Predator, Rocko says he's done nothing wrong, Derek comes in and directly accuses Rocko of doing 'sexy stuff' with Nicole, Rocko strongly denies the accusations and says that his relationship with Nicole is innocent and that the reason he's taken a shine to her is because she is a new face in the dungeon, After Derek and Sean are convinced that Rocko isn't partaking in an illicit affair with a minor, all 3 of them decide to hang out with Nicole.
In the next room where Nicole is, she is in a sexual pose and asks when they are going to do her, Rocko, Derek and Sean kick her out of the Dungeon immediately.
Meanwhile, back in Poque's room, Frankie is attacking Poque and Horatio, as Frankie is about to defeat them, he suddenly and frantically starts grabbing at his chest, he falls to his knees as Marcus bursts out of his chest covered in blood, Frankie drops dead as Horatio and Poque look on in disbelief.
Bigger Boat
After playing Final Fantasy 12 on the Mega 64, Sean vows not to play any games with sexy costumes for the rest of the week; however, Dr Poque has a new idea to sell more Mega 64 systems, Sexy 64 an all-male gaming league that will give the Mega 64 a more sexy image, Poque uploads a program that lets the Rocko, Derek and Sean take sexy pictures for a calendar, they go along with it hopeful to hide messages of their captivity in the calendars.
Back upstairs Poque is concerned with the whereabouts of Horatio, Marcus informs him that he left after winning $10,000 on a scratch card and then relays a lengthy and insulting message that Horatio left for Poque.
During Marcus's delivery of Horatio's message, Horatio himself calls up Poque and informs him that he bought a boat for $10,000 from Gregzlist.com and that it should have been delivered to the apartment already, Poque goes outside with Horatio still on the phone, the boat has arrived much to the dismay of Poque, he asks Horatio what kind of boat he ordered, he says that they had the big boat but he bought the Bigger Boat, which says 'BIGGER' on the back; however, the boat outside Poque's house says the N word instead of 'Bigger'. Horatio doesn't believe Poque and says that if his boat truly has the N word on it, he'll eat his hat.
While Dr Poque asks Rocko, Derek and Sean to crack on with Sexy 64, while he figures out how to deal with the boat, he tries to tow the boat with his car, but as he attaches the rope, he is shot at by a ranting Patriot (Dallas McLaughlin) who tells Poque he is protecting the freedom of speech by keeping the boat there at all costs, Poque tries to compromise by just painting over the N word; however, the Patriot shoots the brush from his hands and then vomits.
In the Dungeon Rocko and Derek play NBA Jam to pass time while their Sexy 64 photos are printed; however, Derek finds a photo they didn't take of Rocko and Derek standing over the grave of 'Poque 1029-3454', Rocko suspects that The Specter may have given them this information and Sean identifies that it's not a date on the grave but a frequency, Sean punches in the feqency while Derek and Rocko strap into the Mega 64.
Rocko and Derek are shown a mysterious title screen for 'Down' and are transported to an unknown realm within the Mega 64, they soon meet a cloaked man with white skin and an horrendous grin, he speaks to Rocko and Derek in an unknown language (with English subtitles) asking nonsensical questions, though he does notice that Rocko and Derek are confused by the situation, before any sense could be made of what was happening, Dr Poque cuts the power to the Mega 64 and says he need there help.
He needs Rocko, Sean and Derek to dance in front of the boat as a distraction so that he and Marcus can sneak up on the Patriot and disarm him, Poque also introduces shock collars for them so that they don't attempt an escape.
Outside armed with three Sexy 64 shirts and a boom box, Rocko, Derek and Sean dance for the Patriot, who is now showing physical signs of a decline in health.
During the dance the Patriot starts vomiting blood and collapses on the floor, Derek, Rocko and Sean try to help him but get shocked by the collars, the Patriot continues to sputter up blood and ends his life by shooting himself with his rifle, soon after his death, a Medical agent(Kevin Bushong) shows up and explains that the boat is filled with rats infected with bubonic plague and that he'd have to take away the boat and the plague infected body of the Patriot. Poque realizes the irony of the situation when he finds that the bubonic plague, also known as the "black plague", is linked to a boat with the N word inscribed on it.
As the boat is towed away, Horatio returns wearing a pizza hat and after Poque confirms that the boat said the N word, he grabs a slice of pizza from the hat and is attacked by a pizza hungry Marcus.
The Wizard II
The episode opens with Horatio answering a call from a FALZ Agent (Brad Davis) who wishes to talk to Dr Poque, Horatio says that he'll tell Poque that he called and hangs up, he then tries to locate the origin of a bad smell that's fills the apartment, he is soon joined by Poque who is also looking for the origin of the bad smell, they are interrupted by a knock on the door from Sean Legerton(Sean Legerton) who asks if this is the wizard's house, a confused Poque says no, closes the door and continues looking for the source of the bad smell with Horatio and Marcus, They find that the origin of the smell was the decomposing body of Jon(John Wanser), who was killed by Poque in Version 2.
In the Dungeon Rocko is plating Assassin's Creed, after he wakes he finds that Derek is looking in on Poque arguing with Horatio about Jon's body, they both decide to get rid of it ASAP, however when they take it outside Sean Lagerton and another man(Eric Badour) are taking pictures, when confronted by Poque, they explain that they are looking for a wizard so that they can get a wish and tell him that they are not moving until they see a wizard.
Back in the Dungeon, Sean is in a dark secluded room at a computer terminal, he is searching for the address of FALZ HQ, but cannot get the information as it requires a password, elsewhere Rocko and Derek decide to go back to the mysterious realm they visited in Bigger Boat, however they notice that the video uplink to Poques room is now outside with Sean Lagerton and the other wizard seeker, Poque runs by quickly and explains that they will be the entertainment/distraction for the wizard seekers and that Rocko and Derek are to take suggestions as to what experiments they'll do next from them, Poque leaves.
Rocko and Derek take the opportunity to try and escape, they explain that they are under the two wizard seekers and have been held captive for two years, Sean Legarton is unenthusiastic to help and asks what he'll get out of it, Rocko asks what he wants, the wizard seekers argue about a Halo skit vs a Counter Strike skit, but they settle on a God of War skit.
It has been a long running gag in the Mega 64 Podcast and various interviews that the skit suggestions that are given by fans are terrible and in order to lower the amount of skit suggestions the crew received on email they set up a Skit Suggestion forum on their site, it is flooded with terrible skit ideas from fans, so all skits mentioned by the wizard seekers in this episode are exactly how there were suggested to the Mega 64 crew by the fans.
After the God of War skit, Sean Legarton complains that it sucks and suggests an equally bad Sneak King skit, then a Ninja Turtles skit, after Rocko and Derek disconnect they ask for rescue, the seekers decline as the skit they suggested were not funny and walk away from the video uplink.
With the seekers gone Rocko and Derek decide to go back to the mysterious realm from Bigger Boat, they appear in a forest and spot a man with dreadlocks and sunglasses who flees upon spotting them, they quickly follow him, Rocko is held at knife point by the man who accuses them of trying to take her back, Derek explains that they have no idea what is going on, the man takes them to see the guild leader.
In Poque's room, Poque asks Horatio why there are people outside asking for a wizard, Horatio explains that him and Marcus are filming a sequel to The Wizard entitled The Wizard 2, Horatio promises that in 2 hours the street would be clear, however 2 hours later a full mob of wizard seekers have taken over the street, bringing cameras and gifts of salt, the mob is subject to a U62 news report which includes a wizard expert in the form of Preacher Z (Garrett Hunter) and a shrine that has been built by Hairy Garry the Feral Child (Tommy Tallarico)
Meanwhile, Rocko and Derek meet the Guild Leader (Luke Chatfield) asks them why they sought him out and if they came here for her, both Rocko and Derek still have no idea whats going on, they explain about the code that brought them there and about the cloaked man they met last time they entered the code, the Guild Leader explains that they had spoken to a Messenger and that the world they were in was a game, the man with dreadlocks takes them into the back room and shows them a girl (Laura Loza), the Guild Leader tells them that the game is called The Blacks.
The power to the Mega 64 is cut again, the video uplink that's outside is now filled with the mob, demanding to see a wizard, Derek ask why he wants to see a wizard, Sean Lagerton explains that his little brother has Scoliosis and that he wants the wizard to cure it, he then asks for a Counter Strike skit again and then they do a Track & Field skit, a Halo/Frogger hybrid skit, a Star Wars skit and a Scarface skit, Sean Lagerton and the mob still demand to see a wizard before they rescue Derek and Rocko who get frustrated and tell the mob that there is no such thing as wizards, the mob turns angry and Sean Lagerton smashes Poque's car with his signature tire
iron.
Back in Poque's room, Horatio remembers the call from FALZ and tells Poque, afterwards the FALZ Agent calls back and demands to talk to Jon, Poque puts him on hold, Marcus tells Poque that he'll take care of everything.
The FALZ Agent is taken off hold, Marcus is puppeteering Jon's corpse and manages to fool the FALZ Agent and Horatio has come up with a way to get rid of the body.
Meanwhile, at the computer terminal, Sean is asleep however the terminal starts to beep with an alert tone, he has received a message containing FALZ's address.
Outside, Horatio has dressed Jon's body up as a Wizard and has rigged it up with a loud speaker and strings to puppet it, the mob are stunned to silence, Horatio as The Wizard explains that there is magic inside us all and that he will perform one final act of magic called The Great Goodbye, Horatio then uses explosives, sending pieces of Jon's body all over the ecstasy stricken mob.
As Poque is thanking Horatio, a real Wizard(Derrick Acosta) appears thanking them for helping him get rid of the mob and grants them one wish, Dr Poque uses it to bring back the one girl he loved, Sue, The Wizard grants it and disappears.
Mega64! (Musical episode)
This episode opens up with Dr Poque showing the FALZ Agent the PaRappa the Rapper skit, The Agent is curious about Jon's whereabouts but buys the excuse Poque gives as the Agent needs to talk mainly to Poque, he explains that there is a monetary problem with Poque's set up and that he needs to raise $10,000 in 7 days or else the project will be terminated.
Poque sings about how he's dead if he doesn't make the money for FALZ, in the dungeon Rocko and Derek sing about their tedious life and how they hope to be rescued and in Horatio's room, he sings about helping out Dr Poque and goes online to find a way to make money fast.
Back in Poque's room, Horatio tells Poque that there is a local talent show where the prize is $10,050, Poque bursts into song about how convenient it is that the prize money is $10,000 and ponders how he's going to win the show, he decides to put on a play about the Mega 64, which will win the show and create awareness of the Mega 64 system, after the song Horatio says that he'll help Poque by using Horatio's Acting Troop(HAT), Poque asks Rocko and Derek to audition.
However Marcus sings of a plan to sabotage the play, because when the gang moved into the apartment Poque asked Marcus to sign the lease, and if FALZ destroy the apartment Marcus would get all the insurance money.
Rocco and Derek audition in the form of a Singstar skit, Poque and Horatio are not impressed with their singing skills and ask what else they can do, after Derek and Rocco sing of their other talents Sean reveals that he grind a rail with soap shoes, Poque and Horatio are impressed by his talent and put him as the finale of the show, Sean then sings about how this is the greatest moment of his life with a song called Handful of the Sky.
Horatio assembles his acting troop and sings a song to warm up all of the performers, afterward Horatio is approached by an admirer(Geoff The Hero) who is then cut for wearing baby blue.
Dr Poque brings Sean along to the HAT practice, Sean then briefly talks to a fellow performer and then eats a muffin set aside just for him, but as he bites into it, he walks outside and pulls a razor blade from his bloody mouth, he is then clubbed and knocked out by Marcus.
Sean wakes up strapped to a table in an empty room, where Marcus accuses Sean of trying to ruin his plan of sabotaging the show and he explains the origin of the term break a leg, he then puts a block of wood in between Sean's legs and as Sean is begging for mercy, Marcus breaks both his legs with a sledgehammer. This, of course, is a parody of Stephen King's Misery.
The day of the talent show arrives and Horatio has no show as his acting troop has all left with the exception of Rocko and Derek, who he cuts, Horatio's admirer is the only person willing to work with him, however Horatio tells him that he hates him and that he never wants him.
Marcus is perched in the back of the theater armed with a sniper rifle and Dr Poque is in the front row along with his laptop which is uplinked to the FALZ Agent.
As Horatio's turn to go on stage come around, he rolls out a television which shows the Elite Beat Agents skit, afterward Horatio comes onstage and rants about how his troop left him and how he doesn't know where Marcus is and how he can't rely on Jon cos he was killed, The FALZ Agent hears this and cuts the connection with Poque's laptop, after his rant Horatio enters a bizarre song about how great he is but breaks his boom box.
Horatio then finishes by reprising the first song in the episode but this time he sings about his broken boom box, he is then joined by Rocko and Derek who did not know until now that Horatio was trying to save them, Marcus then enters the song singing about why Rocko and Derek are trying to save the play, finally Poque joins in and sings about how he's a dead man now that FALZ know what happened to Jon, but he appreciates Horatio's attempt to help, during the finale of the song, Horatio's admirer walks out on stage and is shot by Marcus who had only bought 1 bullet.
After $10,000 Reprise, Sean wheels himself out and attempts sings the chorus of Handful of the Sky, however he cannot sing as well as he did before due to his lip injury, after he's finished sing the theater bursts into a standing ovation and Horatio's Acting Troop win the contest.
In the lobby Poque tries to sell some Mega 64 systems, but is unsuccessful.
Project Whoosh
The episode begins with an unknown person in a hooded sweatshirt putting on music and getting on his bike. He leaves the garage on his bike and cruises down a long downhill sidewalk, before making a right curve into the street where he is hit head on by a car and slides across the pavement. Garrett quickly steps out of the car and shows concern to the man he ran over. The unknown person lifts up his head and assures that him he's going to be alright. He has red hair and a red mustache. It is Marcus. The rest of the episode details the back story of Marcus's past.
Marcus is a man who joins FALZ to earn money to buy the Eiffel Tower for the woman he loves and ends up losing his body to the Mega64 through multiple uses as a test subject. To hold his mind, the FALZ members use the puppet to house his conscience.
During the tales of Marcus's past, Pouqe has to deal with the newly risen Zombie Sue.
To kill Zombie Sue, Horatio sets out to find a gun to shoot her with. A gun he can not seem to remember where he put. Thus setting him off on a small adventure to find it.
Sean somehow ends up escaping the dungeon and travels to the abandoned warehouse of FALZ old headquarters to find answered to his past and strange visions. He finds a delusional man who, once seeing Sean, starts screaming, "It was you. It was you! You created the Mega64! You! YOU!" Sean is confused.
Horatio returns with the gun and kills Zombie Sue.
The episode is left to be continued.
Delaware
At FALZ HQ the Test subject is killed by a blind, cling-film–wielding assassin called Tony who attempts to kill Sean but after a struggle, an injured Sean escapes and Tony seems to be killed meanwhile The FALZ organization invade Dr Poque's apartment complex, Poque activates Twopoque who is quickly destroyed by the FALZ henchmen, Poque and Marcus are captured, Horatio escapes and Rocko and Derick are captured but kill their guard and split up, Rocko goes into Poque's room where he meets the head of FALZ, Garret.
Garret explains to a confused Rocko that FALZ are letting Dr Poque go and offers Rocko the chance to head up FALZ's latest project, elsewhere Derrick finds a FALZ recruitment tape for the DOWN community, which uses the Mega64 system to play 'the world's most elaborate game' The Blacks, which helps with another mysterious project known as Project W.
Garret finds it tough to explain the concept of The Blacks to Rocko without the aid of the video Derrick found, he explains it as a world that exists outside reality in the users mind that they would never want to leave, he then explains that the Mega64 system is a box of magic and that when the box was put into a body, it became conscious and that the waves emitted cross peoples minds who then join FALZ, Garret describes FALZ as the immune system of the Mega64, Garret also explains the next step in FALZ's plan which is to harness the power of the specter who haunts the Mega64 using a mysterious Deathbox and that FALZ need to find Sean.
Poque is taken behind the Apartment building, where he is left with fellow prisoners Marcus and Trigger Serious who explains that he has been stalking Poque and sympathizes with him because of the way FALZ treat him and apologizes afterward the lead FALZ henchman gives Poque the change of redemption with FALZ by killing Trigger Serious, Poque doesn't do it saying that he doesn't blame him for anything and Trigger Serious does not blame Poque for the Mega 64's age limit bug killing his father(Brian Specter), the lead henchman explains that there is no age limit bug and that FALZ stabbed Brian to guilt Poque into joining FALZ, the henchman then kills Trigger Serious.
Back in Poque's room Rocko finds it hard to understand that Sean is the creator of the Mega64, Garret explains that the more times you use the Mega64, the more your mind slips away and that Sean had done more testing than all other subjects combined, Rocko then tells Garret that Sean was heading to FALZ HQ, Garret is shocked and tells Rocko that they kept the Mega64 at Poque's apartment to keep it hidden as they don't know where the Mega64 came from and that FALZ had been hiding from a group who claim it was theirs first, little is known about the group only that they consist of seven deadly assassins and that when one of them is killed, they sound an alarm to alert the other members, FALZ call them The Killers. While Rocko is looking through Garret's file on The Killers he notices that Lobo Fuerte was one of them.
Meanwhile, after suffering severe injuries from his fight with Tony, Sean collapses and is taken into the Mega64 universe where he meets The Specter who tells Sean to destroy FALZ and gives him a sword and a pair of golden soap shoes, Sean wakes up in the real world without injuries and grinds the soaps back to the apartment.
Garret assembles all the FALZ higher ups behind the apartment, Derrick tries to rescue Rocko but fails and gets captured, Horatio attempts to rescue the gang but is pegged by a rock, Sean Legerton also attempts a rescue but is shot in the back.
Elsewhere a stunned Sean encounters Tony which causes him to have a flashback to a conversation between himself and Rick. Garret is banging on the door demanding to speak to the creator of the Mega64, Sean tells Rick not to go and that he will take credit for the Mega64 and save Rick from the hands of FALZ, but Rick is determined to go and tells Sean that is anything goes wrong he'll send an encrypted message that can be unlocked by the password Delaware. Sean knocks Tony out and goes with FALZ. Back in the present Sean destroys Tony and continues back to the apartment, after Sean has left Tony's body, an alarm sounds, Tony was one of The Killers.
At the apartment Sean arrives, Garret unloads on him but Sean teleports to dodge all the bullets, as Garret reloads, Sean runs at him with the sword, as he is about to kill Garret the Deathbox sounds, Sean has lost his sword, soaps and his injuries have returned, Garret shoots and kills Sean, he then goes to execute Rocko and Derek, as he about to pull the trigger, his radio goes of, one of the Henchmen(Dan Paladin) says he's found Sean in the attic of the Apartment, a confused Garret asks the henchman to describe Sean, the henchman is killed after doing so, an irate Garret screams 'Where Is He?', and from behind he hears the answer, 'Here', Garret turns around and puts a bullet in the mysterious figure, he and all of FALZ unload on Sombrero Guy, he survives and wipes out all of FALZ except Garret, Sombrero Guy leaves Garret's fate in the hands of Dr Poque, Garret stalls Poque long enough to retrieve his pistol and as Poque pulls the trigger, Garret takes aim and fires.
Garret is killed instantly, Poque is in a critical condition, the Sombrero Guy walks over to Sean's corpse and revives him with an Indian chant, after which Sombrero Guy leaves Earth.
Horatio, Rocko, Derek, Marcus and Sean are all gathered around Poque. Horatio asks him why he didn't ask for Sombrero Guy's help, to which he responds that, 'it couldn't last. it was just too much fun' and passes away.
One month later, a young girl is flicking through TV channels, her TV then picks up the pirate signal of Horatio TV, with FALZ gone, Horatio has taken over the Mega64 Project, saying that he's doing the project out of love, just like the man who did it before him, Horatio proclaims that 'This is the new Mega64!'
References
Lists of American non-fiction television series episodes
|
55962863
|
https://en.wikipedia.org/wiki/2017%20New%20Orleans%20Bowl
|
2017 New Orleans Bowl
|
The 2017 New Orleans Bowl was a college football bowl game played on December 16, 2017, at the Mercedes-Benz Superdome in New Orleans, Louisiana, United States. The 17th edition of the New Orleans Bowl featured the Sun Belt Conference co-champion Troy Trojans against the Conference USA West Division champion North Texas Mean Green. It began at 1 P.M. EST and aired on ESPN. It was one of the 2017–18 bowl games that concluded the 2017 FBS football season. Sponsored by freight company R+L Carriers, the game was officially known as the R+L Carriers New Orleans Bowl. Troy defeated North Texas, 50–30.
Teams
The game featured the Troy Trojans against the North Texas Mean Green. It was the eleventh all-time meeting between the schools; with Troy's victory, it now leads the series 9–2. The Trojans and Mean Green played together in the Sun Belt from 2004 until 2012, when North Texas joined Conference USA.
Troy Trojans
This was the Trojans' fourth New Orleans Bowl; their record in the game is now 2–2, as they previously won the 2006 and 2010 editions of the game and lost in 2008.
North Texas Mean Green
This was the Mean Green's fifth New Orleans Bowl, moving them into a two-way tie with Southern Miss for most appearances in that game (not counting Louisiana–Lafayette's two vacated bowl wins). The Mean Green's New Orleans Bowl record is now 1–4, with their only win in the game coming in 2002 over Cincinnati. It was the Mean Green's first New Orleans Bowl as a representative of Conference USA; their four previous appearances had all been as a Sun Belt member. The Mean Green went 9–3 overall (7–1 in conference) in the regular season, losing to SMU (54–32), Iowa (31–14), and FAU (69–31). They lost again to FAU (41–17) in the C-USA title game to bring their record to 9–4 (7–2).
Game summary
On Troy's 1st drive, they faced an early third down. QB Brandon Silvers found Damion Willis for the first down. Later in the drive, Silvers found Willis for a beautiful pass-and-catch and found Sam Letton down to the North Texas 1-yard line. Senior RB Josh Anderson scored from a yard out to give Troy a 7–0 lead. On North Texas' second play from scrimmage, Jamal Stadom sacked QB Mason Fine and forced a fumble which Troy recovered at the 14-yard line. It took Troy just two plays to score as Silvers found Willis for 8 yards, and Anderson scored again from 2 yards out. Troy went for a two-point conversion, and Silvers found John Johnson in the back of the end zone for a 15–0 lead. Troy forced a three-and-out and got the ball back. However, on third-and-7, Joshua Wheeler sacked Silvers and Troy had to punt to North Texas. Mason Fine led a drive in which he found Rico Bussey for a 12-yard TD. Brandon Silvers then led a drive in which he found Damion Willis for a 22–7 lead.
Scoring summary
Statistics
References
2017–18 NCAA football bowl games
2017
2017
2017
2017 in sports in Louisiana
December 2017 sports events in the United States
|
30865656
|
https://en.wikipedia.org/wiki/University%20of%20Birmingham%20Guild%20of%20Students
|
University of Birmingham Guild of Students
|
The University of Birmingham Guild of Students (previously Birmingham University Guild of Students; BUGS) is the officially recognised body that represents around 37,000 students at the University of Birmingham. The Guild functions as a students' union as per the Education Act 1994.
History
The Institution had its first foundations in the Mason Science College in the centre of Birmingham around 1876. The university itself formally received its Royal Charter in 1900, with the Guild of Students being provided for as a Student Representative Council. As a consequence, both the Guild and the university officially celebrated their centenaries in 2000. Mason College had had a union of sorts with a club house opening in Great Charles Street in 1905. The Guild of Students, having been provided for in the 1900 Charter, was formed in 1909 as the Guild of Undergraduates, being based at Edgbaston.
The Guild possesses archives that go back to the First World War, establishing a very long tradition of what is referred to as 'modern Students' Unionism'. Alongside Liverpool Guild of Students, the Guild was a founding member of the National Union of Students.
The Guild of Students occupies the Union Building (often referred to as just 'the Guild'), situated at the edge of campus by the East Gate, for a peppercorn rent from the university. The building itself, by Holland W. Hobbiss, dates to 1928 and has been added to and amended, most significantly in the 1950s, when a south wing was added, and again in the 1960s, when a much larger west wing was built. At 10,000 square metres, it is one of the largest Student Union buildings in the UK.
It is not known for certain why the organisation is named a 'Guild of Students' as opposed to a 'Union of Students', in line with the vast majority of its English peers. It shares its name with five other student unions, including Liverpool Guild of Students and University of Exeter Students' Guild.
The Guild introduced new branding in 2007, intended to replace the previous 'BUGS' brand, which had been adopted in 2000.
Activities
The Guild provides representation to all students at the university and campaigns to create change on issues affecting students at a local and national level. This is achieved through regular meetings with University Senior Officers and Managers, as well as through lobbying Birmingham City Council, the Government and other bodies. The Guild also runs campaigns focused on particular issues; campaigns have included a drive to see wheelie bins across the city, an initiative to improve campus security and have the university install CCTV across all halls of residence, and strong participation in the NUS campaign against the introduction of £3,000 top-up fees (a campaign that continues, despite the measure being approved by Parliament in January 2004).
The Guild boasts 24/7 welfare support channels for its members. Guild Advice provides professional and impartial advice on all manner of student issues, from academic problems, financial woes, immigration and other international troubles, housing worries, and employment rights. It also arranges individual representation for students facing academic appeals, disciplinary hearings and other procedures. All students in halls of residence can seek similar advice from their team of Student Mentors, who are on hand day or night for emergency issues, while Niteline provides a confidential listening and information service through telephone and email overnight. The Guild's welfare services are complemented by the Job Zone, which seeks and promotes part-time student vacancies, and the liberation associations.
With one of its three constitutional objects being to promote 'social intercourse', the Guild maintains social space, bars and event nights; all of these provide an income, without which initiatives including campaigns, the ARC, Job Zone, Niteline and many student groups would struggle to exist. The major weekly night is Saturday's 'Fab 'N' Fresh', with other popular events including 'Very Important Tuesdays' (VIT), which have hosted acts such as Samantha Mumba, Wheatus and Cyndi Lauper, society-themed evenings such as 'The Mix', student group events and irregular gigs and comedy evenings. Further commercial revenue is generated through marketing and retail activities, including a supermarket, and the Guild acts as the official retailer of university branded merchandise for this purpose.
The Guild finished a £4 million redevelopment in July 2010, with the ground floor of the building being completely overhauled, creating for the first time a dedicated membership area with all of the key services in one place. In addition, the brand new bar started serving food, and the Guild opened its very own letting agent, the SHAC.
Societies & volunteering
The Guild also supports over 300 student groups and societies, actively promoting student involvement, volunteering and social participation. Its oldest society is Carnival, the Guild's charitable RAG (Raising And Giving) society, while one of its newest is Occult and Paranormal Society; all manner of groups, such as Fetish Society, Rock Music, Circus, InterVol (International Volunteers), Mountaineering, and Jazz and Blues, come in between.
The Guild publishes a newspaper called Redbrick. It also has a radio station, Burn FM, which broadcasts online via its website during Autumn and Spring Terms, and Guild Television, the university's student TV station. All three media outlets are editorially independent and are encouraged to hold the Guild Executive to account. However, as the groups and the Executive are all part of the same organisation, the trustees reserve the right to edit content that poses legal or other risks to the Guild, which at times has caused friction amid claims of political censorship.
The Guild has a Student Groups department, which hosts and supports a large variety of student-led societies and volunteering projects. Notable societies and projects include:
The Computer Science Society
The Computer Science Society at the University of Birmingham, often referred to as CSS, is the official Computer Science society at the University of Birmingham. The society has won two awards in 2017, namely the "Society of the Year" and "Outstanding Event" awards and since then have also won the "Community Award" in 2019 and "The Great Achievement in EPS Award" in 2020.
The society also actively encourages its members to improve their skills by making pull requests on their GitHub to make changes and improvements to the official website, giving members practise at using essential skills needed in the industry but not taught at the university. In addition to this they also run hackathons that members can attend to learn new skills and meet new people.
CSS also regularly host workshops to guide students through important information they will need to succeed in the industry. They work with the Google Developer Student Clubs in order to effectively deliver peer-to-peer learning of programming concepts and logic to ensure students are properly prepared for real world problems. The School of Computer Science is one of the biggest schools at the university with over 460 students enrolled in 2021.
The Astronomical Society
The University of Birmingham Astronomical Society, generally known as AstroSoc, is the official astronomical society of the University of Birmingham, and was formed in the 1920s. The society meets weekly for general meetings; these include observing nights, talks and presentations.
The society also runs programmes to improve the public understanding of astronomy. These include a series of public talks known as the Patrick Moore Lecture Series, Tea, Talk and Telescope. AstroSoc also participate in the university's Astronomy in the City events, which include astronomy and astrophysics talks, and the chance to observe the night sky.
In 2006, the Society won the Institute of Physics' Best Student Group. In 2003 and 2005, the Society won the best website of a student society. Past Chair of the Society Samuel George won the 2007 Guild Awards Ross Barlow Memorial for most outstanding individual student for his work with AstroSoc. In 2009, it was awarded 'Best Event' at the University of Birmingham at the annual 'Guild Awards'.
InterVol
InterVol is an international volunteering charity that was founded at the Guild, notable for being the first Guild volunteering project or society to become a registered charity in the United Kingdom.
InterVol was set up as a society in 2003 by a group of students brought together by the Involve (now Student Development) department at the University of Birmingham Guild of Students.
InterVol focuses on student-led sustainable development projects overseas that aim to make a long term difference to children, communities and the environment. InterVol works in close partnership with local NGOs in each country. InterVol became a registered charity in England and Wales in May 2010. InterVol's charitable objects are to act as a resource for international volunteers at universities in the United Kingdom while promoting development projects that focus on education, health, conservation and the relief of poverty.
Debating Society
The University of Birmingham Debating Society is the largest debating society on campus; it practises debating in the British Parliamentary Style as do other university debating societies, such as Oxford Union, Cambridge Union and Durham Union Society.
The society runs weekly workshops and holds regular public debates, where anyone at the University of Birmingham can see guest speakers debate.
The society holds an annual Inter-Varsity competition and regularly competes in national and international Inter-Varsity debating competitions, such as the World Debating Championships. In 2009, the society was ranked 11th in the UK according to Britishdebate.com. The society is currently ranked 96th in the World based on the last five World Debating Competitions.
Governance
The Guild is a students' union for the purposes of the Education Act 1994. Under section 67 of the Act, all students of the university are by law automatically members of the Guild unless they deliberately opt out; the role of the Guild is to represent this body of membership. However, the University of Birmingham does not disclose any details of its students to the Guild, which naturally makes the Guild's job of democratically representing its membership something of a challenge.
The Guild's constitution sets out in detail how the organisation should be run.
The Guild's sovereign body and Union Council is Guild Council, made up of elected councillors representing academic, student group and hall of residence constituencies, as well as 12 who have a cross-campus mandate. There are 130 seats on Guild Council. The role of Guild Council is legislative: it hears, debates and votes on policy proposals to guide the Guild Executive; it holds the Executive to account over their actions in pursuit of approved policy and their duties generally; and it has a role in setting the Guild's priorities.
In August 2008, the Guild moved from its previous model of an unincorporated association to become a charitable company limited by guarantee (CLG) and, as result, a Trustee Board was established to provide guidance, expertise and strategic oversight of the Guild of Students. The Guild became a charity in 2010.
This decision was made following a Referendum that took place in February 2008 and was approved by over 4,000 students, the Executive, Guild Council and the university. Key to the governance review was a need to clarify how decisions were made and by whom, especially in respect to the role of the Trustee Board and Guild Council.
The Trustees have ultimate responsibility for the day-to-day management of the Guild, which is delegated to the Chief Executive and Management Team. They ensure the Guild remains legally compliant and solvent, in accordance with Memorandum and Articles of Association, the By-laws and Guidance and Strategy documents. In the past, when it had far fewer members than today, this group of trustees was Guild Council. The Trustee Board is now made up of seven Sabbatical (Officer) Trustees; four Student Trustees, with at least one undergraduate, one postgraduate and one international student; and seven external trustees, one of whom is a nominee from the university.
Executive
Day-to-day, and in the absence of Guild Council over University vacation periods, the Guild is run by a Committee of Executive Officers. The makeup of the committee changed for the 2006–7 academic session as Guild Council adopted the outcomes of an executive review, albeit with numerous amendments, and has had several slight alterations since then.
There are currently 14 Executive officers, seven of which are full-time Sabbatical Officers, with the remaining seven being student 'non-sabbatical' officers. Five of these are Liberation Officers, whose remits focus on the liberation of certain groups that may face barriers or be disadvantaged within Higher Education, or may face barriers or be oppressed within wider society as well.
Warden
The Warden's role is to act as a safety net and make sure that the Guild is always in the right hands. Unlike other officers, the Warden may not be a student, and holds a three-year term of office. He/she has an advisory role and some disciplinary duties, but the main task is to step in and administer the Guild in the unlikely event that all of the Executive Officer posts become vacant. Without the Warden, it is likely under English Law that in this circumstance, administration would pass to the university. While seemingly unlikely, there has been an occasion in the Guild's history when Guild Council saw fit to dismiss the entire Executive, at which point the Warden of the day stepped in and immediately held fresh elections.
Finances
The Guild has an annual turnover of approximately £5.5 million.
A large portion of that money is the block grant, an annual sum of money from the university. In 2016–2017, this was £1.8 million, equivalent to approximately £50 per student. The Guild also receives money for the performance of several service contracts. One of the most significant of these is the £350,000 for the Student Mentor Scheme, equivalent to £75 per hall resident. The Residence Associations also receive grants from the university equal to £100 per hall resident.
Most of the rest of the Guild's turnover is through its venues trading activity.
Media controversy
Over the 2005–2006 academic session, the Guild made national and international press over several controversial issues.
The year started with President Richard Angell banning the National Blood Service from the Guild's popular Freshers' Fair over the service's policy of banning gay and bisexual men from giving blood for life. This policy remained in effect until it was overturned at the start of the 2009–2010 academic year.
In January 2006, a row erupted as the Guild became aware of and subsequently took issue with some of the policies sought by its Evangelical Christian Union society. The Union sought not to allow non-Christians to become members, have the outgoing leaders appoint new leaders (rather than have the members elect them), and require members to sign an evangelical doctrinal quasi-contract. Although the Union later agreed to hold elections, the Union members felt that their religious beliefs prevented them from being able to make any more concessions. The Guild stated that they believed the law prevented them from accommodating the society, as student unions are required to make all of their activities available to all students. The Christian Union stated that they believed they were being deprived of their legal rights. Guild Council ultimately derecognised the society, although it was subsequently re-admitted to the Guild in 2013 .
At Guild Council in June 2006, President Richard Angell proposed a motion titled 'Ding Dong the Witch is Dead' that the Guild should 'have a party' on the occasion of former Prime Minister Margaret Thatcher's death, which was met with widespread criticism, even making The Times national newspaper.
References
Further reading
External links
Guild of Students Website
Guild of Students
Birmingham
|
33517500
|
https://en.wikipedia.org/wiki/LabLynx
|
LabLynx
|
LabLynx, Inc. is a privately owned, funded, and managed American corporation that develops, supports, and markets laboratory information management system (LIMS) solutions. Its primary offerings over the years have included webLIMS and ELab. The company’s primary clients include laboratories in the agriculture, clinical, environmental, forensics, health care, and manufacturing industries, including government agencies. The company is known for introducing one of the first browser-based LIMS products in 1997 and being in the laboratory informatics industry for decades.
History
Before LabLynx was a company, it was a LIMS product offered by Atlanta Systems Consultants, Inc. (ASC). Formed in 1992, ASC’s LabLynx division later began work on a laboratory information management system designed specifically for a web browser. ASC demonstrated its new Internet Explorer-based LabLynx LIMS at Pittcon in 1997, among the first browser-based LIMS to appear at the time. The company again showcased LabLynx at Pittcon in 1998 and soon after picked up a major LIMS-based contract with the U.S. Customs Service.
By July 2000, the LabLynx division of ASC separated to become its own incorporated entity. And while ASC eventually ceased to exist in 2005, LabLynx, Inc. went on to diversify its offerings. The LabLynx’s browser-based LIMS previously demonstrated at Pittcon in 1997 expanded to become ELab, which in 2001 took on an application service provider (ASP) model of distribution. In 2004 LabLynx released a browser-based tool called openLIMS, which gave consultants and end-users the ability "to build custom LIMS solutions that are geared to the exact operational needs of many different laboratories."
On June 19, 2006, LabLynx established the Laboratory Informatics Institute, an open membership group with the purpose of advancing the field of laboratory informatics and shaping the standards associated with it.
In 2011, LabLynx was involved in an initiative to standardize and structure the transmission of laboratory data that first originates in a LIMS or LIS and then moves to a person's or population of people's electronic health records. This laboratory results interface (LRI) pilot began in August 2011 and included collaborations with the supported open source project mdDigest and the U.S. Office of the National Coordinator for Health Information Technology (ONC).
In February 2015, LabLynx released HealthCloudPOL, a cloud-based laboratory information system (LIS) for the physician office laboratory (POL).
Community history
Since transitioning from Atlanta Systems Consultants, Inc. to LabLynx, Inc. in 2000, LabLynx has become increasingly active in the laboratory informatics community. Projects that LabLynx has started or been involved in within the community include:
the Laboratory Informatics Institute, an open trade association with the mission of educating, standardizing, and promoting the laboratory informatics industry
LIMSfinder, an online interactive magazine released by the Laboratory Informatics Institute
LIMSbook, a LIMS buyer’s guide released by the Laboratory Informatics Institute
LIMSforum, a LinkedIn discussion group created to facilitate the exchange of ideas and technical information across the fields of laboratory, science, and health informatics
LIMSwiki, a Creative Commons-licensed wiki with the goal of bringing related informatics communities together to maintain a repository of information about the industry
Products
LabLynx products past and present include:
ELab/LabLynx LIMS, a modular, validated laboratory information management system (LIMS) (The software was originally called LabLynx LIMS, then it became ELab, then LabLynx LIMS again.)
webLIMS, a hosted LIMS software package based on the "software as a service" (SaaS) model of distribution
HealthCloudPOL, a cloud-based laboratory information system (LIS) for the physician office laboratory (POL), introduced by the company in early 2015
References
External links
Official website
Software companies established in 2000
Companies based in Atlanta
Healthcare software companies
Information systems
Information technology companies of the United States
Laboratory software
Laboratory information management system
American companies established in 2000
|
59791
|
https://en.wikipedia.org/wiki/Trojan
|
Trojan
|
Trojan or Trojans may refer to:
Of or from the ancient city of Troy
Trojan language, the language of the historical Trojans
Arts and entertainment
Music
Les Troyens ('The Trojans'), an opera by Berlioz, premiered part 1863, part 1890
The Trojan, a 1950s Jamaican sound system led by Duke Reid
Trojan Records, a British record label, founded in 1968
"Trojans" (The Damned song), a song by The Damned on their 1985 album Phantasmagoria
Trojans (EP), by Atlas Genius, 2013
Other uses in arts and entertainment
Trojan (video game), 1986
Trojan, a 1991 novel by James Follett
Troy, a 2004 historical war drama
"Trojan" (Red Dwarf), a 2012 episode of the TV comedy
People
Trojan (surname), including a list of people with the name
Places
Trojan, Gauteng, South Africa
Trojan, South Dakota U.S.
Trojan (mountain), on the border of Albania and Montenegro
Trojan Peak, a mountain in California
Transportation and military
GWR No. 1340 Trojan, a British locomotive, built in 1897
Trojan (automobile), a former British vehicle manufacturer (1914–1965)
Trojan, a Saltwood Miniature Railway locomotive, used from 1928 to 1970
AL-60F-5 Trojan, a variant of the Aermacchi AL-60 aircraft (1950s–60s)
Trojan Armoured Vehicle Royal Engineers, a British combat engineering vehicle (in service since 2007)
North American T-28 Trojan, an American military trainer aircraft (1950s)
Other uses
several sports teams named Trojans
Trojan (brand), American condoms
Trojan (celestial body), that shares the orbit of a larger one
Trojan horse (computing), or trojan, computer malware
Trojan Nuclear Power Plant, in Oregon, U.S.
Trojans, a group of scholars in the Grammarians' War in England 1519–1521
Trojan–Tauranac Racing, a Formula One constructor
See also
The Trojan Women (Τρῳάδες, Trōiades, 415 BC), a play by Euripides
The Trojan Women (film), 1971
Tommy Trojan, a statue at the University of Southern California
Troian (disambiguation)
Trojan Horse (disambiguation)
Trojan skinhead, a British cultural identity
Troyan (disambiguation)
Language and nationality disambiguation pages
|
42701246
|
https://en.wikipedia.org/wiki/Cal%20State%20Fullerton%20Titans%20tennis
|
Cal State Fullerton Titans tennis
|
The Cal State Fullerton Titans women's tennis team competes at the NCAA Division I Collegiate level and is a member of the Big West Conference. All home collegiate tennis matches are played at the California State University, Fullerton, Titan Courts, located in Fullerton, California.
The Cal State Fullerton Titans men's tennis team first fielded a team in 1960 and disbanded after the 1987 season.
Conference membership history
Titans women's tennis
1966–1970: AIAW
1971–1976: SCWIAC (Southern California Women's Intercollegiate Athletic Conference)
1976–1984: Western Collegiate Athletic Association
1984–1985: PacWest
1986–1988: Pacific Coast Athletic Association
1989–present: Big West Conference
Titans men's tennis
1960–1962: Unknown
1962–1964: NAIA
1964–1966: Ind./Col/ Dist. III
1967–1974: California Collegiate Athletic Association/Division II
1974–1987: Pacific Coast Athletic Association/Division I
Conference school rivals
Long Beach State 49ers
UC Irvine Anteaters
History of women's program
Coach Dr. Jean A. Barrett years (1966–68)
Dr. Jean A. Barrett started at Orange State College (known now as Cal State Fullerton) in 1963 she was a Professor of Health, Physical Education and Recreation at Fullerton getting her degree's a B.S. from Cortland State Teachers College in 1952 and an Ed.M. from the University of Buffalo and an Ed.D. from State University of New York at Buffalo. Barrett was a pioneer in Physical Education and Women's Athletics at CSUF she was the first female faculty member in the Physical Education Department (now the Department of Kinesiology). Barrett served 28 years at the University and served a number of leadership roles there also. Barrett like the former Titans Men's Tennis Coach Ernest A. Becker who started also the Titan Men's Tennis Program mentored her tennis student-athletes while she was coaching her teams. In the school year 1966–67 she was the Titans Women's Director of Intercollegiate Activities and started a Women's Tennis Program at Cal State Fullerton and they were known as the Titanettes Tennis Team they had nine matches that season and was off to a good start according to their leader Barrett. One of the first Women Tennis letterwinners from that starting season in 1967 to play for Barrett was former La Habra Highlander High School tennis player Cindy L. Gohring a senior class student-athlete at Cal State Fullerton that school year. In 1967 the Titans and Barrett were in the overall national picture for women collegiate athletics called The Division for Girl's and Women's Sports, which set the standards for intercollegiate competition but does not allow women's athletic scholarships, this lasted until 1972. In 1967 it formed the Commission on Intercollegiate Athletics for Women and begins offering national championships in many sports including tennis the Individual National Singles Champion from that year was Patsy Rippy of Odessa College and doubles title went to Jane Albert and partner Julie Anthony of Stanford. In 1968 the USLTA sponsors the first National Team Championship in Women's Intercollegiate Tennis and known now as Trinity University (Texas) coached by Shirley Rushing wins the team title and Emilie Burrer also of Trinity University (Texas) wins the Individual National Championship for singles and doubles that year with partner Becky Vest. For the 2016–17 season for the current Titan Women's Team it will be the 50th anniversary since the Tennis Program for Women was started at Cal State Fullerton.
Coach Virginia Scheel years (1968–1973)
The Titans women's varsity tennis team first started competing in the 1967–68 academic school year the year Coach Scheel's first came to CSUF and finished eight in their conference. Scheel had a Titan tennis team/program financial budget when she started of $100.00 for the season. Scheel was a professor of Kinesiology and Health Promotion at Fullerton and was a grad from La Verne College now known as (University of La Verne) she was also after her tennis coaching career at Fullerton was the president of Western Society of Physical Education of College Women for academic year 1984–85 this society was founded in 1921 and deals with issues and concerns related to disciplines in higher education and human movement the group of women represents colleges from the western territory of Canada to Hawaii to Utah and down to Arizona she was a well rounded collegiate coach. The 1970 Titan squad had a record finish of first in the conference in only their third year of competing in collegiate women's tennis. In 1972, Coach Virginia Scheel's Titans had an undefeated women's tennis season, according to the coach. In the 1973 CSUF women's season, Scheel's team, led by number 1 singles player a former transfer student-athlete from Fullerton Junior College Hornets Sue Marta, had a victory, defeating the USC Trojans in that year also the Titans women's tennis program also moved up in league class to the "A" bracket. Marta also had a career high impressive victory over Cal State L.A. Golden Eagle Tina Watanabe their Number 1 player on the team and a 1973 NCAA National Collegiate Singles Tournament finalists that was held in Auburn, Alabama Watanabe had victories on the Women's Pro Circuit over Tracy Austin, Steffi Graf and Monica Seles and had a World Singles Ranking of 79th at one point in her professional career. Another standout Titan tennis player on that 1973 team is Michelle Rauland who after competing on that '73 team in January 1974 competed with the professional women
tennis players at one of the circuit stops for the Virginia Slims Tour in Mission Viejo, California the tournament was played on hard courts and Rauland was beaten in the early
rounds by Penny Johnson 1-6, 2-6 the winner of the tournament was Chris Evert beating in the finals Billie Jean King 6-3, 6-1 in 1974 the prize money for the tournament
was $50,000 for the professionals.
Standout Titan individual women tennis performers in singles and doubles under Coach Virginia Scheel tenure:
1970, 1971, 1972: Dawn Crossen-Wilson '73
1970, 1971, 1972: Kathy Blonder '75
Coach Jean Davenport years (1973–1976)
Coach Jean Davenport's, a Virginia State University grad with a "MS" from Michigan State the Titan Health Ed. Instructor coached the 1975 Titans Team which was led by a Junior Fullerton's number No. 1 player Kathy Wright a former Stanford University player during her first year there. Davenport's
said her team's greatest assets are persistence and strict conditioning. The team also achieved academic excellence in the classroom with an overall GPA of 3.3 and Davenport said this
Titan team has a record wide age range on the team with student tennis athletes 18 to 45 with the eldest player being a Orange Coast College transfer student-athlete named
Eileen Stephens who competed on the Titans team as a junior class and senior class member at the age of 44 and 45 years old.
Standout Titan individual women tennis performers in singles and doubles under Coach Jean Davenport tenure:
1973, 1974: Sue Marta
1974: Kathy Wright
Coach Jan Billings years (1976–1982)
In a historic time for Division I Women's Athletics Ellen Linderman '81 who played on the 1977, 1978 and 1979 Titan squad's was one of the first women to receive an Athletic Scholarship because of Title IX from the Athletic Department by Coach Jan Billings at that time in the program at the University.
The 1980 Titans squad was led by a number 1 freshman player named Pia Tamayo who was also a member of the Philippines Federation Cup Team and went three sets, losing (6–2, 2–6, 0–6) to tennis professional Hana Mandlíková from the Czechoslovakia Fed Cup Team; the match took place in Santa Clara, California. Tamayo as an international junior tournament player competed at The Wimbledon Championships "Girls Singles Bracket" playing in 1978, 1979 and 1980 defeated in each year in the second round after winning her first round matches in '78 losing to Anna-Maria Fernandez 2-6, 3-6 and in '79 to player Sonia Davies 6-7, 6-3, 5-7 and in '80 after her first year for the Titans to another player Kate Brasher 1-6, 6-2, 4-6. Tamayo played one successful year for the Titans and went on to finish her collegiate career at Princeton University and was a 3-time All-Ivy League Tennis Selection for the Tigers. Carol Christian who played her 1980 first year/season as the number No. 2 singles player behind Tamayo on the Titan team, she played at Pacific High School in San Bernardino, Ca. during her junior's years and as a junior player she played Tracy Austin and lost 0–6, 2–6 in the finals of The 31st Annual Fullerton Junior Tennis Tournament. Christian won the Singles and Doubles Titles at The National Indoor Girls' Tennis Championships at Mt. Clemens, Michigan and she was also ranked No. 1 in singles in Southern California Sectionals in the girls' 14-and-under class as a junior player. Christian also during the 1980 Titan season beat Cal Berkeley's top singles player as her highlight victory of that season. She had an 8–2 record in the league in singles and had a 1–1 record against UCLA's Becky Bell the No. 2 singles player for the Bruins, the league again as in the past was the toughest in the nation with conference members like UCLA, USC, Arizona State, Arizona, Long Beach State and San Diego State these school's were in top ten rankings in many season's year in year out in Division I Women's Tennis nationally. As a sophomore Christian played her last season in 1981 as a Titan as the number No. 1 singles player on the team and played with her Pacific High School teammate Sherrie Shellhammer on that Titan team for Coach Jan Billings. Christian went onto playing professionally in 1984 competing in the US Open, Wimbledon and French Open and in 1988–89 years competed in the Australian Open along with the US Open and French Open her highest singles professional ranking was No. 111 on August 1, 1988 and her highest doubles ranking was No. 199 December 21, 1986. Christian was honored by Southern California Tennis Association as for women tennis players from 1960–80 in the "SoCal So Good" article of tennis individuals who have made an impact on the game locally by the Southern California Tennis Hall of Fame that took place on July 20, 2002.
Billings coached from 1977-79 recently retired UNLV women's basketball coach (2008-2020) who also is the former UCLA women's basketball coach from (1993-2008) Kathy Olivier who played on
the Titans women's tennis team during those two season/years during the late 1970s while Olivier attended Cal State Fullerton as a student-athlete known by her name Kathy Ricks.
Standout Titan individual women's tennis performers in singles and doubles under Coach Jan Billings tenure:
1977: Jodi Foster
1978, 1979: Karen Peterson
1980: Pia Tamayo
1980, 1981: Carol Pat Christian
1982: Kristi Blankenship '86
Coach Bill Cole years (1982–83)
Coaching record (1 Year/Season, 5 Wins–23 Losses)
The 1983 Titans women's team was led by first year Coach Bill Cole '87 MS who played collegiately from 1975 to 1977 at the University of Buffalo in a conference so tough that four of which members were ranked in the top five nationally overall which included teams like UCLA, USC, Stanford and San Diego State. Under Cole's direction that year he said he established various goals for his team and was highlighting personal improvements of the Titans players because the team's competition was far greater that year in the conference than other conferences and the season was a success for the players in those terms with the goals they laid out for the year.
Standout Titan individual women's tennis performers in singles and doubles under Coach Bill Cole tenure:
1983: Kristi Blankenship '86
Coach Bill Etchegaray years (1983–85)
Coaching record (2 Years/Seasons, 17 Wins–44 Losses)
The 1985 team was coached by the former Cal State Los Angeles Golden Eagles tennis player Bill Etchegaray and led by number 1 singles player Kristi Blankenship '86 who had a (30–10) senior season won-loss record, was selected at the end of that year by the NCAA Regional Committee to participate in the NCAA Division I Women's Singles Tennis Championship Tournament held at Oklahoma State University in Oklahoma City, Oklahoma. Blankenship represented the Titans very well was defeated in the tournament by University of Miami Hurricanes talented "All-American" and top 16 seeded player in the championships Lise Gregory by a score of (5–7, 4–6). A year later in 1986 Blankenship '86 won The Ojai Women's Open Invitational Singles Championship/The Foothill Cup defeating Kathy May-Paben who formerly had a professional tennis ranking of number 10 in 1977. Blankenship '86 joins other past notable champions Maureen Connolly in 1951, Billie Jean King in 1965 and 1966, Tracy Austin in 1977, USC's Stacy Margolin in 1976 and 1978, USC's Cecilia Fernandez 1982 and 1983, Stanford's Patty Fendick in 1985 who have won the prestigious Ojai Tennis Tournament.
Standout Titan individual women's tennis performers in singles and doubles under Coach Bill Etchegaray tenure:
1984, 1985: Kristi Blankenship '86
Coach Brad Allen years (1985–89)
Coaching record (4 Years/Seasons, 48 Wins–55 Losses)
In 1986, the Titans women's tennis program was almost discontinued by the Athletic Department. Athletic Director Ed Carroll's plan was to drop as many minor sports as possible (diving, golf, & men's tennis were dropped) to increase the funding for the football program. A.D. Ed Carroll tried to drop the women's tennis program in a closed secret meeting. However, the Board of Regents did not agree and the women's tennis program was not discontinued. Newly hired Titans Women's Tennis Coach, Brad Allen, found out about the attempted elimination of the program when he read it in the school newspaper. Coach Allen was hired in December 1985 four weeks prior to the start of the 1986 season and the team had no coach for the previous six months because the athletic department hoped the program would be discontinued.
The first year for Coach Allen was extremely difficult because the team budget was $5,000 and his competitors had a $50,000 budget. The first-year team budget paid for the team to buy enough tennis balls for practice, home matches, and uniforms, but no money was left for travel, equipment, or scholarships. The team lost almost all of their matches that first year. Allen had a (48–55) career record over four seasons with 20 of those losses coming in that first year.
Coach Allen was able to save and promote the tennis program through record fundraising of about $11,000 a year and unknown to the players, he wrote scholarships from his own checkbook. Allen and the team sold fireworks, beer at UCLA football games, held tennis clinics and USTA sanctioned tournaments, and more to raise money. Now, with the increased budget through fundraising Allen was able to add more talented players. Since the 1987 season, Allen's Titans squad held the team record for most victories in a season with 15 wins and had the first winning season in the Titan's Division 1 history. During the years 1986-1989, the Titans had winning seasons three years in a row.
The Titans highlights were wins over Loyola Marymount, Nebraska, Cornell, Cal State Los Angeles, and conference wins over San Jose State, UNLV, UC Irvine, UOP, and Long Beach State. Another highlight came in 1989 against Harvard University when Kelli Moore and Caroline Sporer split sets against the #2 ranked doubles team in the nation. Harvard won the first set 6-4 and the Titans won the second set 7-6 and had the momentum. The Harvard team already had enough points to win the overall team match and the Harvard coach refused to play the third and final doubles set out of fear of her players losing the match and dropping their national #2 ranking. Coach Allen said, "In my opinion, Kelli Moore and Caroline Sporer were one of the best doubles teams in the country!"
Coach Allen was fired in 1989 by A.D. Ed Carroll after Allen filed a grievance against the athletic department based on his annual salary of $4,800 and a team budget of $5,000 a year. Coach Allen won the grievance after it was decided his firing was obvious retribution for filing the grievance. Coach Allen laughingly said, "Firing a coach that set school records for wins, fundraising, the number of student-athletes on the Honor Roll, and positive media coverage, including being on the front page of the Los Angeles Times Sports section would have been impossible to prove." Allen won his job back and could have returned as Head Coach at a significantly higher salary. However, Coach Allen declined the offer because he had already moved out of state, purchased a new home, and was preparing for his upcoming marriage. Coach Allen stated, "I'll never forget my time at Fullerton and especially I loved my time on the tennis courts with the team. I will forever be proud of the outstanding team members. They gave their all on the tennis courts and the entire team was always on the Honor Roll as well. I love them all and I am grateful for the opportunity I had to work with and to know such fine young ladies."
Prior to joining the Titans Women's Tennis Program and Coach Brad Allen's squad for the 1988 season player Nicole Brechtbuhl won the 1986 California Junior College State Doubles Individual title her freshmen year and in 1987 Brechtbuhl won the California Junior College State Singles Individual title in her second year.
Standout Titan individual women's tennis performers in singles and doubles under Coach Brad Allen tenure:
Jennifer Aafedt '90
Nicole Brechtbuhl '90
Colleen Duignan '91
Kelli Moore '91
Caroline Sporer '92
Coach Bill Reynolds years (1989–2013)
Coaching record (24 Years/Seasons, 178 Wins–391 Losses)
In 1992 Titans Roseann Alva '94 with her performance came out of nowhere to get into the finals in the number No. 1 flight singles championship round of The Big West Conference Women's Collegiate Tennis Championship Tournament only to lose to her competitor from UC Santa Barbara (2–6, 2–6) in the final, coincidentally in the 1992 season the Titans women's tennis team never won a match all season. The year before in 1991 Alva '94 and Titan teammate Kelli Moore '91 made Big West First Team Doubles All-Conference as a result from the successful season performance for the doubles pair.
The women's team has enjoyed much success over the years as a member in the Big West Conference since the 1988. Under Reynolds tenure with standout individual performances in singles and doubles by players:
Kelli Moore '91
Roseann Alva '94
Caroline Sporer '95
Debbie Vonusa '98
Eleanor Luzano '02
Amy Medlin '03
Summer Tantee
Carla Rocha '05
Adriana Hockicko '06
Ana Iacob '06
Ioana Sisoe '06
Ruya Inapulat '07
Gina Le '07
Mal-Ly Tran '07
Kalika Slevcove
Tiffany Mai '14
Morgan McIntosh '14
In 1999-00 school year Titan women's tennis player Poornima Swaminathan '00 received the "Titan Female Scholar Athlete of the Year Award" while playing for her Titan Coach Bill Reynolds.
In 2006 Titan women's tennis player Ruya Inalpulat '07 who played No. 1 Singles and Doubles her senior year received the "Arthur Ashe Scholarship Award" for outstanding achievements both on and off the tennis court.
Titans Former women's tennis Coach Bill Reynolds has had the longest coaching tenure at Fullerton, coaching the team from 1989 to 2013, with a total of 178 career match victories. His most successful season according to wins was the 1991 season where the Titans had 15 victories that season the most for a season in his Titan career and his team that year was led by Roseann Alva '94 and Kelli Moore '91 with highlight victories over Oregon, Colorado, Washington, Boise State, Long Beach State and Fresno State. In 2013 Reynolds was named "Big West Conference Co-Tennis Coach of the Year". Reynolds '72 played collegiately and graduated from UC Santa Barbara where his father was the former head tennis coach there.
Coach Dianne Matias years (2013–2021)
Coaching record (8 Years/Seasons, 109 wins–60 losses)
Midway through the 2016 season the third-year Titans Coach Dianne Matias the former USC Trojans (2004–2007) collegiate tennis player has led the Titans Team as of March 8, 2016 as the new rankings came out as mentioned midway through the season to a No. 67 national ranking by Oracle/ITA Division I Women's Collegiate Tennis Rankings. Currently rated No. 1 is Cal Berkeley and from the west is Pepperdine at No. 17, Stanford at No. 23, UCLA at No. 25, USC at No. 43. The Titans squad's led by Co-Captains Alexis Valenzuela '17 and Camille De Leon '17 current team record on the season is 10 wins – 1 loss as to the reasoning for their deserving current national ranking. For Division I for the Titans Women's Tennis program this is a historical feat this has not been done before as a Division I program. Back in the late seventies and early eighties the Titans had some good teams and good individual players but they always played in the toughest conference in the nation for Women's Tennis so they always had a brutal schedule each season playing the top teams.
On April 2, 2016, the current Titan Women's squad surpass the single season historical record for wins in a season of 15 from Coach Brad Allen's 1988 team with a victory over UC Irvine 6–1 to give them their 16th victory on the year so far and a current record of 16–3. The victory against UC Irvine snapped a losing streak against the Anteaters which dated back to
1998.
On April 12, 2016, the new Oracle/ITA Collegiate Division I National Women's Tennis Doubles Rankings came out and the Titans doubles team of Alexis Valenzuela '17 & Camille De Leon '17 were given a ranking of 45th in the nation quite an accomplishment for the Titan tennis duo who are 13–1 on the season currently. The last time historically a Titan women's tennis player was in the national spotlight was back in 1985 when Kristi Blankenship '86 competed/qualified in The NCAA Division I Collegiate National Women's Tennis Singles Championship Tournament in Oklahoma City, Oklahoma.
On May 4, 2016, following a record-setting season for the Titan Tennis team third-year Coach Dianne Matias was voted Big West Conference Women's Tennis Coach of the Year. Matias led the team to a (17–6) record on the season and the most Big West Conference victories (6–2) in a season and a 3rd-place finish in the conference with a winning percentage of (.739) and also a ranking of No. 67 in the nation by Oracle/ITA Collegiate Tennis Women's Rankings. This is the second Conference Coach of the Year award won by a Titan coach the first was won by Coach Bill Reynolds in 2013 for their season then.
On June 2, 2016, the final Oracle/ITA Collegiate Division I National Women's Tennis Doubles Rankings came out for 2015–16 season year end rankings and the Titan doubles team of Alexis Valenzuela '17 & Camille De Leon '17 were given a ranking of 56th in the nation for the season.
On April 29, 2018, in team format of the 2018 Big West Conference Tournament Championships the Titans made it to their first ever "Big West Conference" finals before they were defeated by University of Hawaii 2–4 for the championship prior to this result their only conference title was in 1970. Also at stake for
the conference champion was an automatic berth in the 2018 NCAA Division I Women's Tennis Team Format Championship Tournament. The Titans defeated Cal Poly Mustangs in the semi-finals of the conference championships 4–0 on Saturday and with their loss in the finals they finished their season with a record of 20–6.
On May 31, 2018, No. 3 Singles player Karla Portalatin on the Titans squad to compete for the Dominican Republic team in Fed Cup play the event is known as the World Cup of Women's Tennis. Portalatin team will compete in Metepec, Mexico on June 18–23, 2018 for her home country the last Titan woman tennis player to compete in Fed Cup was Pia Tamayo who played for the Titans in 1980. Portalatin in Fed Cup competition played Barbados on June 20, 2018 and her country won 2 to 1 as Portalatin competed in doubles with her partner Kelly Williford and won over the Barbados doubles team of Gabrielle Leslie and Tangia Riley-Codrington 6-2, 6-1 and on June 22, 2018 Portalatin and her country competed against Mexico and were beat 3 to 0 as Portalatin and her doubles partner Kelly Williford lost to the Mexico doubles team of Daniela Morales Beckmann and Maria Jose Portillo Ramirez by a score of 1-6, 3-6 at Club Deportivo La Asuncion in Metepec the format was played as a round robin competition as Portalatin country Dominican Republic finished second of the three countries competing in the 2018 Fed Cup Americas Zone Group II-Pool A with the top team (country) in each pool advancing to Group I.
On June 6, 2018, the final season team rankings came out and the Titans were ranked 81st nationally by ITA and also ranked 7th in the Southwest Regional team rankings along with No. 1 Singles player Genevieve Zeidan ranked in the Southwest Regional at #17 individually.
Standout individual performances under Coach Dianne Matias tenure since 2013–14 season in the Big West Conference in singles and doubles by players:
Alexis Valenzuela '17
Camille De Leon '17
Morgan McIntosh '14
Megan Sandford
Sarah Nuno
Karla Portalatin
Genevieve Zeidan
History of Titans men's tennis program
Coach Dr. Ernest "Ernie" A. Becker years (1960–1962)
The Cal State Fullerton Titans Tennis team was started first with a men's varsity team in 1960 started by Dr. Ernest Becker who was the founding Dean of Students at Orange County State College which is now known today as California State University, Fullerton and also was a philosophy professor joined the school in 1959 and also became the first Director of Athletics. Becker known as "Ernie" to everyone was an Amherst College grad and "Mammoths" tennis letterman as a player on the team and received a graduate degree in "Divinity" and a doctorate degree in "Higher Education" from the University of Southern California, he started his professional career as a journalist working at one time for "The Christian Science Monitor" and other news organizations. He was the first men's tennis coach and known as a father figure for the young team and also was enjoying practicing with the team and having annual faculty exhibition matches against the varsity team with such faculty members as Thomas Ashley, Nish Jamgotch, Orrington Ramsey, Ronald Calhoun, Lee Kerschner and of course Dr. Becker. He was a true pioneer in getting this men's Titan tennis program started at Fullerton. He had Mitchel Saadi '64 as the "Team Captain" in the early years of the program and also Becker had tennis professional Stan Smith's brother Ken Smith Jr. on the Titan team. Becker in 1940 while in India was playing tennis matches with the "Maharaja of Patiala" and his Prime Minister. Becker during World War II was playing exhibition matches and was a practice player hitting balls and getting tips on the game with legendary tennis professional Bill Tilden and also tennis pro Vinnie Richards as well as National Doubles Champion and Davis Cup Team Captain Gardnar Mulloy, Davis Cup member Wayne Sabin and National Women's Doubles Champion Helen Marlow through playing matches with these notable players he was adding more knowledge of the game by the time he started the Titans Men's Tennis Program and coaching his players during those early years of the Program. Becker retired in 1977 at Cal State Fullerton as he held his final position at the school of "Director of the Career Placement Center". Coach Becker passed away on January 5, 1998 he was 83 years old.
Standout Titan individual men's tennis performers in singles and doubles under Coach Dr. Ernest A. Becker tenure:
Mitchel Saadi '64
Coach Neale R. Stoner years (1963–1964)
The next men's tennis coach at Orange State College taking over for Coach Thomas J. Ashley who also was a political science professor at that time in 1963 was Coach Neale R. Stoner the future Cal State Fullerton Titans Director of Athletics from (1972–1979) and tennis enthusiast for a season and a half coaching the tennis team in Fullerton, Ca.. During this time period in which the Titans tennis team was involved in from 1963 to 1966 Cal State Los Angeles dominated the Division II Small College Division for Men's Tennis winning the "National Team Championship Titles" three years and Runner-up one year in a four-year span coached by Scotty Deeds and lead by national individual champion players Gilbert Rodriquez, Gary Johnson, John Lee and also Joe Huey. In a team dual match on March 9, 1964 the Titans competed against Cal State Los Angeles and the Titans were defeated that day Coach Stoner tabbed Cal State Los Angeles "the best small college team around and said the Titans had bitten off more than they could chew". On the 1963 team the Titans had a female student-athlete on the squad because there was no Titans women's team until the 1966–67 school year by the name of Rosalie Passovoy '63 who beat the number 6 player on the team and earn a spot and a letter on the team, her doubles partner on the team was Ben Wade '63. Former Anaheim High School and UCLA Bruins 1959 tennis letterman transfer Mike Bouck was the number 1 Flight Singles player on the 1962–63 Titans team had very good results with Orange State College(CSUF) played two years with the team but prior to that as a Bruin in that 1959 season his team won the PAC-8 Conference and had a 15–1 team record that was coached by collegiate tennis legendary Coach J.D. Morgan (161-18 collegiate record from 1951–1966) who Bouck played with four All-Americans on the team that included 1959 PAC-8 Singles Champion Allen Fox, Roger Werksman, Dale Rohland and Norm Perry a very strong UCLA Bruins team that year. Bouck in 1957 competing one year/season for Fullerton Junior College teamed up with Mr. Nelson in The Ojai Valley Men's Junior College Doubles Tennis Championships Division and were finalists in The Frank T. Heffelfinger Challenge Cup there at Ojai losing to future Cal State Los Angeles player Gilbert Rodriquez and partner Eduardo Guzman of Modesto Junior College both of them were finalists in the Singles Championship play that year. On the 1963–64 Titans squad was former Fullerton Junior College Hornet tennis player Stan Kula a legend in Orange County, California tennis circles who was their top player on that '64 Titan team and back in 1959 Kula from Anaheim High School was the CIF High School Individual Doubles Champion with doubles partner Don Kliss that year.
In a dual match on April 21, 1964 the Titans took on arch rival Long Beach State College(known now as Long Beach State University) Kula the Titans number 1 seed/man on the team beat highly ranked
national collegiate player John Allgood of the 49ers in singles 8-6, 4-6, 6-2, Allgood in his collegiate tennis career was seeded in the top eight for the National Collegiate Men's Tennis Championships held in Los Angeles also in that dual match with the 49ers Kula and his teammate partner Mike Bouck won also in doubles but the Titans team was outlasted by the depth in the 49ers lineup and were beaten in that dual team match. Kula after college beat many touring tennis professionals like Rod Laver, Stan Smith, Pancho Gonzales, Bob Lutz and even Billie Jean King and was also the Titans coach for the 1965 season.
Standout Titan individual men's tennis performers in singles and doubles under Coach Neale Stoner tenure:
1963: Mike Bouck
1964: Stan Kula '67
Coach Dr. Michael Yessis years (1966–1969)
In 1967 first year Titans Head Men's Tennis Coach Dr. Michael Yessis a College of New York grad and a professor of Physical Education at Fullerton said "We have a small squad and we have a very rough schedule – rougher than the previous year" in that year. Yessis also commented on the existing Titan Tennis Courts saying "The courts are slow, which handicaps an attempt to play a fast attacking game". "New construction at the courts may remedy this situation" says Yessis the athletic department has plans to supplement the tennis facilities at that time with four new tennis courts hopefully by the 1968 season according to Yessis. Titan tennis player's Steve White '68 an Antelope Valley Junior College transfer and Jose Nino '68 a "Two-Time Titan Team MVP" played in the 1967 NCAA Men's Division II Tennis Championships at Cal State University, Los Angeles and the NCAA Men's Tennis Team Championship was won by conference member Long Beach State University lead by Fred Suessmann and
Dennis Trout. From 1967 to 1973 the NCAA Men's Division II National Tennis Team Championship Title's went to a CCAA Conference member each year from those seven seasons with outstanding coaches within the conference like Long Beach State Coach Dan Campbell, Cal State Northridge Coach Dave Sterle, UC Irvine Coach Myron McNamara and Cal State Los Angeles Coach Scotty Deeds and that is why in the 1969 season again Titans Tennis Coach Dr. Michael Yessis said "We are in the toughest league in the State" second only to the Pac 8 Division I Men's Tennis Conference, really in the nation during that time period.
Standout Titan individual men's tennis performers in singles and doubles under Coach Dr. Michael Yessis tenure:
Steve White '68
Coach Bob Osborn years (1970–1971)
The 1971 CSUF Men's team led by Bruce Westforth a transfer student athlete from Fullerton Junior College recorded the most wins in a season from when the program started in the early sixties to then with a record that season of (15 wins-12 losses) but had a losing record in there conference(1971 Conference Tennis Champion San Fernando Valley State College which is now known as Cal State Northridge Matadors) said Titans Coach Bob Osborn "You have to credit a strong conference and some good players" Osborn went on to say "We had a team with a good attitude and good efforts in every match". Osborn coached the Titan Men's team that one school year, he was also an assistant men's basketball coach under head coach Alex Omalev and was a graduate of Whittier College in 1958 where Osborn was "All-S.C.I.A.C. Honors" in basketball.
Coach Craig Neslage years (1971–1974)
The 1973 Titans team led by Coach Craig Neslage had quite a fiery tennis player named Oscar Meyer a Cal Poly Pomona Bronco transfer who played at the No. 1 position on the team for two years who was a former member of the Mexico's Davis Cup Team. Neslage who coached the Titans from 1971 to 1974 for three seasons and one of his issues he tangled with was the fan area loyalty to the tennis program during those years he said "Fullerton area has no loyalty the problem is obvious he diagnose and confirmed the disease that has spread throughout at Fullerton" during his time period. Neslage was an outstanding fundraiser for the Titans Men's Tennis Program by the time he moved on after the 1974 season in his career he left the Program with a budget better than when he started with the Program, the next coach was in a better situation financially for the Program in 1975. Neslage was an All-American collegiate tennis player at UC Irvine during his playing days. After serving for his country in the Vietnam War the honorable veteran Paul McWherter came to play for the 1973–74 Titans after competing successfully for Bellevue Junior College in the State of Washington where he was the 1972–73 Junior College Singles & Doubles Champion there in the State a good find for Coach Craig Neslage and while playing one year at CSUF he played number No. 2 and No. 3 Singles for the Titans while playing with ambidextrous strokes and serving righthanded. One of Neslage's
players Mark Hamilton '75 a few years after graduating from Fullerton went on to be the men's tennis coach for the Texas Tech Red Raiders for seasons 1979 and 1980 and had a coaching record of 24 wins-29 losses during his two-year career there and also is recorded as being the 2nd men's coach in their history of there tennis program.
Standout Titan individual men's tennis performers in singles and doubles under Coach Craig Neslage tenure:
1972: Bruce Westforth
1973: Alan Foster, Dave Sallee
1974: Oscar Meyer
Coach Ron Witchey years (1974–1979)
(Assistant Coaches: Jonathan Walters '76, 1975–76 Season and John Nordstrom '78, 1976–1978 Seasons)
In the 1974–75 academic year when the Titans Men's Tennis program became a member of the Pacific Coast Athletic Association (PCAA) they moved up to the Division I large school level and also they added a new tennis coach named Ron Witchey a Dennison University grad taking over the last part of the 1975 season taking over for short term Titan Coach Steve Warfield who himself as a collegiate tennis player was a 1970 Division III All-American from the University of Redlands during his playing days. Witchey was a former Titan Track coach from 1965 to 1972 and cross country coach. Witchey quickly became a better organizer and manager of the tennis team according to their Titan team captain Gary Quandt '75 that season. Witchey installing the team to work on mental toughness, physical conditioning, and developing a positive attitude when he arrived to take over the team that season. The 1976 and 1977 season's the Titans men's team added many new and formidable player's like their No. 1 singles player Bob Goldstein, Mt. SAC Junior College transfer twin brothers Mike Duran and Gil Duran '79 a two-fisted forehand/backhand player, Kelly Davidson '77, Gregg Henderson, Phil Beilin and Pete Fischer '79 who all had very good results during those two years in the PCAA Conference in there singles or doubles flights in the conference tournament against highly regarded opponents, the team finished third in 1976 and second in 1977 respectively in conference play. In a highlight result in the 1976 season brother's Mike Duran and Gil Duran '79 were finalists in The Ojai Men's Independent College Doubles Championship/The Joseph O. Bixler Trophy only to be defeated by Jeff Williams-Bob Wright of UC Irvine. The 1979 Titans were led by a conference tournament performance by Dave Barrows '81 who was a finalists in the number 4 flight singles that year losing to a player from a good UC Irvine team, San Jose State Spartans won the PCAA conference team competition coming in second was UC Irvine Anteaters and CSUF finished fifth in the conference that year.
1975 NCAA Men's Individual Singles & Doubles Division I Tennis Championships held in Corpus Christi, Texas on June 20, 1975 participated by Titan players:
Pete Fischer '79 lost "Singles 1st Round" to opponent Gary Albertine, LSU Match Score: 0-6, 6-4, 3-6
Gregg Henderson lost "Singles 1st Round" to opponent Glen Holroyd, Arizona State University Match Score: 4-6, 1-6
Gary Quandt '75 lost "Singles 1st Round" to opponent Mark Brandenburg, University of Minnesota Match Score: 1-6, 1-6
Duane Stotland '75 lost "Singles 1st Round" to opponent Alejandro Hernandez, BYU Match Score: 0-6, 2-6
Gregg Henderson-Pete Fischer '79 lost "Doubles 1st Round" to opponents Gary Plock-Graham Whaling, University of Texas Match Score: 3-6, 2-6
Duane Stotland '75-Keith Christman '78 lost "Doubles 1st Round" to opponents Rich Andrews-Mike Greenberg, University of Washington Match Score: 4-6, 0-6
PCAA Men's Titan Individual Singles & Doubles Conference Champions and Runner-up's during Coach Ron Witchey tenure:
1976 Phil Beilin, No. 6 Singles Flight Champion (Opponent: Chuck Phillips, San Jose State Match Score: 6-4, 6-1)
1976 Pete Fischer '79-Gregg Henderson, No. 2 Doubles Flight Runner-up (Opponent: Geoff Martinez-Kirk Terrell, Long Beach State Match Score: 4-6, 4-6)
1977 Bob Goldstein, No. 1 Singles Flight Runner-up (Opponent: Nial Brash, San Jose State Match Score: 4-6, 0-6)
1977 Mike Duran, No. 2 Singles Flight Champion (Opponent: Matt Iwerson, San Jose State Match Score: 6-4, 7-6)
1977 Gregg Henderson, No. 5 Singles Flight Runner-up (Opponent: Don Paulsen, San Jose State Match Score: 6-2, 1-6, 4-6)
1977 Gil Duran '79-Kelly Davidson '77, No.3 Doubles Flight Runner-up (Opponent: Matt Iwerson-Don Paulsen, San Jose State Match Score: 5-7, 6-2, 6-7)
1979 Dave Barrows '81, No. 4 Singles Flight Runner-up (Opponent: Paul Oldenburg, UC Irvine Match Score: 3-6, 2-6)
Coach Paul K. Miller year (1979–1980)
(Assistant Coach: Jim Worth)
The 1980 Titans Men's Tennis team was led by senior player and team captain Dave Barrows '81 and newcomer Tim Giller both were the top players on the team
and during the season Giller had the only highlight victory of the regular season in singles against Pepperdine University 3-time All-American Division I Singles Collegiate tennis player Glenn Michibata that went three sets in the Titans 1-8 dual match loss to the Waves. That year/season in 1980 the assistant coach Jim Worth a military veteran and inspiration to the Titan team players from Brea, California who was hired by Coach Paul K. Miller was a wheelchair competitive tennis player in Southern California and was a pioneer with "International Tennis Hall of Famer" Brad Parks, David Saltz and Dave Kiley in starting a circuit/tour for competitive wheelchair tennis players with grand slam tournaments all around the world and wheelchair tennis is played in over 100 countries today.
Coach Jan Billings years (1980–1982)
(Assistant Coach: Dave Barrows '81, 1980–81 Season)
In the early eighties under Coach Jan Billings the backbone of the Titans team was players Frank Ellis '83 and Michael Moore '84 who competed through the ups and downs of the men's tennis program. Billings who coached both the men's and women's Titan squad's from 1979 through 1982 3 years total during that time period and coached the women's team a total of 6 years. Billings had help with the 1980–81 Men's team with former Titans player Dave Barrows '81 was the assistant coach for the season.
Coach Ed Burt years (1982–1984)
Then came in toward the early mid-eighties was Coach Ed Burt who brought in a lot of talented good recruits and the tennis program was on the rise again with the additions of English junior college player by way of Florida Julian Lowin '85, Donny Young, South African player Craig McSmythe (1983 Ojai CIF H.S. Interscholastic Doubles Champion/The Wightman Cup/(Indio H.S.), William Schuster '85, Tim Macres, David Pratt and Everette Brunelle (1983 Ojai CIF H.S. Interscholastic Doubles Champion/The Wightman Cup/(Indio H.S.) the Titans added depth to their line up with these highly competitive players. These Titans teams were competing with collegiate tennis powerhouse's on their schedule like highly nationally ranked USC Trojans and also highly nationally ranked Pepperdine Waves along with San Diego State Aztecs, Boston University Terriers, South Carolina Gamecocks, Princeton Tigers, Nebraska Cornhuskers, University of New Mexico Lobos, University of San Diego Toreros and PCAA Conference highly national ranked foes UC Irvine Anteaters and Long Beach State 49ers at the time, even Division III number one nationally ranked opponent University of Redlands Bulldogs was really good during that time period on the Titans schedule. During Burt's short tenure the Titans had many victories against very good competitive school's likely due to their recruits and their depth in the line up of the Titan team. One of
the individual highlights from the 1984 season was Julian Lowin '85 victory in a singles flight match in a dual match against UC Irvine Anteaters player Bruce Man Son Hing who was the 39th nationally ranked NCAA Division I Collegiate singles tennis player in 1984 according to the "ITCA Intercollegiate National Final Rankings" Lowin won 6-1, 6-7, 7-5 in a tremendous match but in the hard-fought dual match UC Irvine won 5-4 over the Titans by a point.
Coach Mike Muscare years (1985–1987)
The 1986 team was led by Fausto Bucheli '87 and had a new coach named Mike Muscare who last coached the season before for the CSUSB Coyotes but the season for the Titans had again a competitive Division I collegiate schedule with many tough opponents in their PCAA Conference. The 1987 team had better success of the 2 years coached by Muscare in which the Titan team had 15 victories on the season 3 of the victories the team beat military academies Army, Navy and Air Force and were led by No. 1 singles player Driss Benomar '88. Sanjeev Khanna '91 is the last known varsity intercollegiate Titan men's tennis player that played in the last season for the men's tennis program in 1987 for the CSUF varsity tennis team that competed in the PCAA Conference to have graduated from California State University, Fullerton.
Championships
Titans NCAA Tennis Championship appearances
Women's team results
Yearly Titans Women's Varsity Tennis historical results/standings
Titans NCAA/Oracle ITA Women's Collegiate Tennis Team Division I National Ranking Historical ratings
Titans NCAA/Oracle ITA Women's Collegiate Tennis Singles/Doubles Individual Division I National Ranking Historical ratings
Men's team results
Discontinued Titans Men's Varsity Tennis yearly historical records/standings
Titan tennis military veteran members
Coach Thomas Jess Ashley, United States Marine Corps (USMC)
Coach Dr. Ernest A. Becker, United States Navy (USN)
Jim Blondin '63, United States Marine Corps (USMC), 1955–63
Jon Brettmann '63, United States Army (USA), 1956–64
Don Dannenbring '63, United States Army (USA)
Richard Drake '66, '71, United States Army (USA), 1960-62 & 1980-2001
Tim Draxler '73, United States Marine Corps (USMC), Vietnam Veteran 1966-69
Gil Duran '79, United States Navy Reserve (USNR), 1987-07
Mike Duran, United States Air Force (USAF) 1979-86
Ellery Ehrlich '69, United States Army (USA), Vietnam Veteran 1970-71
Lyle Jordan '91, United States Navy (USN)
Coach Mark Kabacy, United States Air Force (USAF)
Paul McWherter, United States Army (USA)
Gray Nesbit '70, United States Navy (USN) 1971-73
Mitchel Saadi '64, United States Army (USA)
Mark Sigman '74, United States Navy (USN)
C. Ken Smith '63, United States Army (USA)
Neil Stenton '64, United States Army (USA)
Mike Stone '67, United States Navy (USN) 1967-71
Coach Neale R. Stoner '62, United States Army (USA)
Steve White '68, United States Army Reserve (USAR) 1968-72
Asst. Coach Jim Worth, United States Army (USA)
Coach Dr. Michael Yessis, United States Army (USA)
References
1960 establishments in California
Sports clubs established in 1960
|
12414545
|
https://en.wikipedia.org/wiki/FutureWave%20Software
|
FutureWave Software
|
FutureWave Software, Inc was a software development company based in San Diego, California. The company was co-founded by Charlie Jackson and Jonathan Gay on January 22, 1993. VP of Marketing was Michelle Welsh who also came from Silicon Beach Software, then Aldus Corporation.
The company's first product was SmartSketch, a drawing program for the PenPoint OS and EO tablet computer. When pen computing did not take off, SmartSketch was ported to the Microsoft Windows and Macintosh platforms.
As the Internet became more popular, FutureWave realized the potential for a vector-based web animation tool that might challenge Macromedia Shockwave technology. In 1995, FutureWave modified SmartSketch by adding frame-by-frame animation features and re-released it as FutureSplash Animator on Macintosh and Windows. By that time, the company had added a second programmer Robert Tatsumi, artist Adam Grofcsik, and PR specialist Ralph Mittman.
In December 1996, FutureWave was acquired by Macromedia, who renamed the animation editor Macromedia Flash.
References
Defunct software companies of the United States
Adobe Flash
Adobe Inc.
Software companies established in 1993
Software companies disestablished in 1996
1996 mergers and acquisitions
Companies based in San Diego
|
42034815
|
https://en.wikipedia.org/wiki/Margaret%20R.%20Fox
|
Margaret R. Fox
|
Margaret R. Fox (1916-2006) was an American electronics engineer and computer scientist. She was the Chief of the Office of Computer Information, part of the Institute for Computer Science and Technology of the National Bureau of Standards (now the National Institute of Standards and Technology) from 1966 to 1975 and was the first secretary of the American Federation of Information Processing Societies.
Education
Fox graduated from Wisconsin State College of Milwaukee in 1940.
Work
She taught school before joining the U.S. Naval Reserve in 1943. She was stationed at the Naval Research Station in Washington, D.C. and after her discharge in 1946, she continued working as an electronics engineer in radar. Fox joined the National Bureau of Standards as a member of the technical staff of the Electronic Computer Laboratory in 1951 and later joined the Research Information Center and Advisory Service on Information Processing, where she produced reviews and bibliographies. Along with Samuel N. Alexander, Fox prepared and planned a series of college computer courses beginning in 1966. She chaired the Technical Program Committee and in 1973, she became representative of the Bureau's Center for Computer Sciences and Technology.
She was appointed Chief of the Office of Computer Information, part of the Institute for Computer Science and Technology of the National Bureau of Standards (now the National Institute of Standards and Technology) in 1966. Fox held this position until 1975.
Society of Women Engineers
Fox was in charge of the Technical Program for the first International Conference of Women Engineers and Scientists (ICWES) which was held in New York City, United States of America in 1964 and was organised by the Society of Women Engineers (SWE). She worked alongside Beatrice Hicks the Conference Director and Ruth Shafer the Operations Chairman and Elsie Eaves who managed the PR for the conference.
Fox was elected a Fellow of SWE in 1991.
References
Further reading
Oral history interview with Margaret R. Fox, interviewed April 13, 1984, by James Baker Ross. Charles Babbage Institute, University of Minnesota.
1916 births
American electronics engineers
American women computer scientists
American computer scientists
2006 deaths
20th-century American women scientists
Computer science educators
People from Argyle, Wisconsin
20th-century American engineers
21st-century American women
|
295096
|
https://en.wikipedia.org/wiki/Carl%20Sassenrath
|
Carl Sassenrath
|
Carl Sassenrath (born 1957 in California) is an architect of operating systems and computer languages. He brought multitasking to personal computers in 1985 with the creation of the Amiga Computer operating system kernel, and he is the designer of the REBOL computer language, REBOL/IOS collaboration environment, the Safeworlds AltME private messaging system, and other products. Carl is currently a Principal Engineer at Roku, Inc.
Background
Carl Sassenrath was born in 1957 to Charles and Carolyn Sassenrath in California. His father was a chemical engineer involved in research and development related to petroleum refining, paper production, and air pollution control systems.
In the late 1960s his family relocated from the San Francisco Bay Area to the small town of Eureka, California. From his early childhood Sassenrath was actively involved in electronics, amateur radio, photography, and filmmaking. When he was 13, Sassenrath began working for KEET a PBS public broadcasting television station. A year later he became a cameraman for KVIQ (American Broadcasting Company affiliate then) and worked his way up to being technical director and director for news, commercials, and local programming.
In 1980 Sassenrath graduated from the University of California, Davis with a B.S. in EECS (electrical engineering and computer science). During his studies he became interested in operating systems, parallel processing, programming languages, and neurophysiology. He was a teaching assistant for graduate computer language courses and a research assistant in neuroscience and behavioral biology. His uncle, Dr. Julius Sassenrath, headed the educational psychology department at UC Davis, and his aunt, Dr. Ethel Sassenrath, was one of the original researchers of THC at the California National Primate Research Center.
Career
Hewlett-Packard
During his final year at the university, Sassenrath joined Hewlett Packard's Computer Systems Division as a member of the Multi-Programming Executive (MPE) file system design group for HP3000 computers. His task was to implement a compiler for a new type of control language called Outqueue—a challenge because the language was both descriptive and procedural. A year later, Sassenrath became a member of the MPE-IV OS kernel team and later part of the HPE kernel group.
While at HP Sassenrath became interested in minimizing the high complexity found in most operating systems of that time and set out to formulate his own concepts of a microkernel-based OS. He proposed them to HP, but found the large company complacent to the "smaller OS" ideas.
In late 1981 and early 1982 Sassenrath took an academic leave to do atmospheric physics research for National Science Foundation at Amundsen–Scott South Pole Station. Upon returning, Sassenrath reached an agreement with HP to pursue independent research into new areas of computing, including graphical user interfaces and remote procedure call methods of distributed computing.
Later in 1982, impressed by the new computing ideas being published from Xerox PARC, Sassenrath formed an HP project to develop the modern style of window-based mouse-driven GUIs. The project, called Probus (for professional business workstation) was created on a prototype Sun Microsystems workstation borrowed from Andy Bechtolsheim while he was at Stanford University. Probus clearly demonstrated the power of graphical user interfaces, and the system also incorporated hyperlinks and early distributed computing concepts.
At HP, Sassenrath was involved with and influenced by a range of HP language projects including Ada, Pascal, Smalltalk, Lisp, Forth, SPL, and a variety of experimental languages.
Amiga Computer
In 1983, Carl Sassenrath joined Amiga Computer, Inc., a small startup company in Silicon Valley. As Manager of Operating Systems he was asked to design a new operating system for the Amiga, an advanced multimedia personal computer system that later became the Commodore Amiga.
As a sophisticated computer for its day (Amiga used 28 DMA channels along with multiple coprocessors), Sassenrath decided to create a preemptive multitasking operating system within a microkernel design. This was a novel approach for 1983 when other personal computer operating systems were single tasking such as MS-DOS (1981) and the Macintosh (1984).
The Amiga multitasking kernel was also one of the first to implement a microkernel OS methodology based on a real-time message passing (inter-process communication) core known as Exec (for executive) with dynamically loaded libraries and devices as optional modules around the core.
This design gave the Amiga OS a great extensibility and flexibility within the limited memory capacity of computers in the 1980s. Sassenrath later noted that the design came as a necessity of trying to integrate into ROM dozens of internal libraries and devices including graphics, sound, graphical user interface, floppy disc, file systems, and others. This dynamic modular method also allowed hundreds of additional modules to be added by external developers over the years.
After the release of the Amiga in 1985, Sassenrath left Commodore-Amiga to pursue new programming language design ideas that he had been contemplating since his university days.
Apple Computer
In 1986, Sassenrath was recruited to Apple Computer's Advanced Technology Group (ATG) to invent the next generation of operating systems. He was part of the Aquarius project, a quad-core CPU project (simulated on Apple's own Cray XMP-48) that was intended to become a 3D-based successor to the Macintosh.
During that period the C++ language had just been introduced, but Sassenrath, along with many other Apple researchers, preferred the more pure OO implementation of the Smalltalk language. Working at ATG with computing legends like Alan Kay, Larry Tessler, Dan Ingalls, Bill Atkinson and others provided Sassenrath with a wealth of resources and knowledge that helped shape his views of computing languages and systems.
Sassenrath Research
In 1988, Sassenrath left Silicon Valley for the mountains of Ukiah valley, 2 hours north of San Francisco. From there he founded multimedia technology companies such as Pantaray, American Multimedia, and VideoStream. He also implemented the Logo programming language for the Amiga, managed the software OS development for CDTV, one of the first CD-ROM TV set-top boxes, and wrote the OS for Viscorp Ed, one of the first Internet TV set-top boxes.
REBOL Technologies
In 1996, after watching the growth and development of programming languages like Java, Perl, and Python, Sassenrath decided to publish his own ideas within the world of computer languages. The result was REBOL, the relative expression-based object language. REBOL is intended to be lightweight, and specifically to support efficient distributed computing.
Sassenrath describes REBOL as a balance between the concepts of context and symbolism, allowing users to create new relationships between symbols and their meanings. By doing so, he attempts to merge the concepts of code, data, and metadata. Sassenrath considers REBOL experimental because it provides greater control over context than most other programming languages. Words can be used to form different grammars in different contexts (called dialecting). Sassenrath claims REBOL is the ultimate endpoint for the evolution of markup language methodologies, such as XML.
In 1998, Sassenrath founded REBOL Technologies, a company he still runs. The company has released several versions of REBOL and produced additional products such as REBOL/View, REBOL/Command, REBOL/SDK, and REBOL/IOS.
Sassenrath implemented REBOL V3.0 and released it to GitHub on December 12, 2012: https://github.com/rebol/r3.
Roku
Since 2010, Sassenrath has worked at Roku, Inc in product development.
Personal
Sassenrath lives in Ukiah, California, where he grows grapes and makes wine, and is interested in amateur radio, video production, quantum electrodynamics, and boating. He volunteers with the Television Improvement Association, a community organization that brings free, over-the-air television broadcasts into the Ukiah area.
Other references
Amiga ROM Kernel Reference Manual: Exec; Carl Sassenrath; Commodore; 1986
Guru's Guide to the Commodore Amiga; Carl Sassenrath; 1989
The Object Oriented Amiga Exec; Tim Holloway; Byte Magazine; 1991
REBOL Bots; Web Techniques; 9/1999
Inside the REBOL Scripting Language; Dr. Dobb's Journal; 6/2000
REBOL for Dummies; Ralph Roberts; Hungry Minds; 2000
REBOL Programming; Olivier Auverlot; Éditions Eyrolles; 2001
Computing Encyclopedia, Vol 5: People; Smart Computing; 2002
The REBOL IOS Distributed Filesystem; Dr. Dobb's Journal; 9/2002
The REBOL/Core Users Guide; Carl Sassenrath; 2000–2005
Notes
External links
Personal home page
Biographic notes at REBOL.com
Carl's Blog at REBOL.com
TIA - The TV Improvement Association
Interview Obligement, May 2007
MakeDoc - Lightweight document markup
Jeudy, Sébastien, Interview with Carl Sassenrath, Obligement, May 2007, accessed October 10, 2013
1957 births
Living people
American computer scientists
Programming language designers
Amiga people
People from Ukiah, California
University of California, Davis alumni
Engineers from California
Amateur radio people
|
21839519
|
https://en.wikipedia.org/wiki/Genius%20%28mathematics%20software%29
|
Genius (mathematics software)
|
Genius (also known as the Genius Math Tool) is a free open-source numerical computing environment and programming language, similar in some aspects to MATLAB, GNU Octave, Mathematica and Maple. Genius is aimed at mathematical experimentation rather than computationally intensive tasks. It is also very useful as just a calculator. The programming language is called GEL and aims to have a mathematically friendly syntax. The software comes with a command-line interface and a GUI, which uses the GTK+ libraries. The graphical version supports both 2D and 3D plotting. The graphical version includes a set of tutorials originally aimed at in class demonstrations.
History
Genius was the original calculator for the GNOME project started in 1997, but was split into a separate project soon after the 0.13 release of GNOME in 1998. Because of this ancestry, it was also known as Genius Calculator or GNOME Genius. There was an attempt to merge Genius and the Dr. Geo interactive geometry software, but this merge never materialized. Version 1.0 was released in 2007 almost 10 years after the initial release.
Example GEL source code
Here is a sample definition of a function calculating the factorial recursively
function f(x) = (
if x <= 1 then
1
else
(f(x-1)*x)
)
GEL contains primitives for writing the product iteratively and hence we can get the following iterative
version
function f(x) = prod k=1 to x do k
See also
Comparison of numerical analysis software
Notes
Array programming languages
Free educational software
Free mathematics software
Free software programmed in C
Numerical analysis software for Linux
Numerical analysis software for MacOS
Numerical programming languages
Science software that uses GTK
Unix programming tools
|
50796938
|
https://en.wikipedia.org/wiki/ClearCenter
|
ClearCenter
|
ClearCenter is headquartered in New Zealand, and has its primary product offices in Orem, Utah, along with marketing, support, research and development facilities around the world, ranging from Canada, Taiwan, China, Netherlands, UK and India helping to develop ClearCenter's Hybrid Products for an emerging type of Managed Service Provider known as the emerging Hybrid Service Provider.
Many of ClearCenter’s products are based upon ClearFoundation’s ClearOS (an open source software operating system).
History
ClearCenter was founded by Michael Proper in 2009. Before founding ClearCenter, Michael Proper founded another company in 2000 named DirectPointe which helped to create and grow the Managed Service Provider (MSP) sector and was ranked #1 in the top-100 Managed Service Providers globally in 2007 and 2008.
ClearCenter currently has customers in 150+ countries.
Business Model
Most of the products by ClearCenter are open source with a community version and free-to-use. The ClearCenter WebConfig and ClearSDN have fully developed APIs that are open to use for developers.
Products
ClearOS Software
ClearOS is a Linux distribution, based upon Red Hat Enterprise Linux and CentOS. The ClearOS Community offering is licensed and managed by ClearFoundation. First launched in 2002 under the name of ClarkConnect, and changed to its present name in 2009 with the release of ClearOS 5.1 version on October 6, 2009. The current stable version is 7.2, and the beta version is 7.3. ClearOS is offered in two editions - Community and Professional. The Community edition is all free/open source software and free of cost. The Professional edition is a paid version which is offered with a one-time fee or monthly fee to select ClearCenter's partners.
Acquisitions
Witsbits (2015)
References
American companies established in 2009
Companies based in Orem, Utah
Information technology companies of New Zealand
Linux companies
New Zealand brands
|
35032475
|
https://en.wikipedia.org/wiki/DOLLx8
|
DOLLx8
|
Digital One Line Link (DOLLx8) is a technology architecture that consists of data communication protocol, synchronous serial data bus and a communication system for embedded systems and electronics. DOLLx8 use ASCII characters in its data protocol, differential signaling in the bus system, where the communication consists of an active long-distance technology based on system logic where handling of the communication is done automatically by the microcontroller and its internal embedded Real-time operating system (RTOS) and software.
A traditional local area network (LAN) is based on Ethernet, a network system used in personal computers where one PC is able to talk to another PCs. In embedded systems, RS-232 TTL (Transistor-Transistor Logic) has dominated the market over a longer period of time as the most common communication standard that also works as an internal embedded network system. With the use of MAX 232 integrated circuit (IC), the RS-232 TTL may connect to an external RS-232 connection where the immediate advantage of using MAX 232 is that there is no need of using positive and negative power supply. It is also possible to connect to USB via RS-232 to USB converter, and even if the original standard for RS-232 was basically a point-to-point system for the serial port on PCs, it is still possible to use RS-232 in small local area network using micro-controller and source code to control the signals and data transmission.
A DOLLx8 embedded network uses its own specific interface system named DOLLx8 Dataport that via DOLLx8 eMaster unit connects to external RS-232 and from there to USB directly, but requires the installation of a separate DOLLx8 driver. DOLLx8 runs on its own internal clock system that allows the DOLLx8 Dataport bus speed to be independent of the RS-232 baud speed set on the PC side, and can thus be determined by the user. With DOLLx8, USB works as a virtual communication port and can be set to a maximum speed of 128,000 kbps.
MISOLIMA
MISOLIMA is a registered trademark of FIKO Software Co., Ltd. and are being used for all products from FIKO Software which also includes products other than software, electronics and embedded systems. One such product-range is MISOLIMA Home and Offices that is ready-built modular houses supplied with DOLLx8 technologies such as home automation, solar cells and GSM alarm. MISOLIMA accounts for most of the product developments in cooperation with other companies that use DOLLx8 technologies, where MISOLIMA gets grants from the National Innovation Agency in the development of DOLLx8 for Android.
MISOLIMA established Thailand's first foreign owned software and technology park in Chiang Mai in 2001/2002 with approvals from the Thailand Board of Investment under the name Cyber Media Park for e-Gravity (CMPEG)" where the name was later on changed to MISOLIMA Software and Technology Park (MSTP). MSTP consists of 11 400 square meters (122 708 square feet) land area with main building of 1 600 square meters (17 222 square feet).
History
The first DOLL (Digital One Line Link) version was developed as a joint project between Norway, England and Hungary by Anne Selene FIKO and her team in the early 1990s and was used in home automation, electronic control- and audio system. The early DOLL system was back then based on 18 – bit Pulse-width modulation (PWM) where the communication was 120 Khz and was divided into 10-bit address and 8-bit data word. The signal was sent three times before the electronics of the receiver side (with the right set address code) was able to approve the data transfer and accept the 8 data bits. The reason why the data was sent 3 times was that it should make sure that the receiver did not receive erroneously information in the data network.
Some years later, around 1995 and until 1999, the DOLL was further developed together with a new group of developers in New Zealand and then became the DOLLx8 versions 1.0 to 3.0. DOLLx8 was then also extended into applications such as audio where it was emphasized on that the system should send feedbacks to the master unit and where one could check the status of all devices connected to the network.
The DOLLx8 system was in the period 2001 to 2003 re-developed so that it could receive commands via text messages rather than just data and address bits, and was then developed for both cascade (2-port) and parallel networking using RS-232 and USB. Such cascade and parallel networks had its pros and cons, where links between the units had weaknesses in such way that it had limited cable length of 16 meters, while the RS-232 TTL version had the same limitation but with only 5 meters. With such limitations, the best solution was a cascade network where each device in the network was acting as a signal buffer, where data was received on port one and went out buffered on port two. The major drawback of such solution was that if a device did not work as intended due to errors in the system, the rest of the devices would not be able to communicate with either master devices nor the rest of the network. In the same period MISOLIMA received export subsidies from the Department of International Trade Promotion and held exhibition at Comdex 2002 in Las Vegas, United States
From 2003 to 2006 DOLLx8 was also developed for embedded systems within aviation through Aeronautical Software and Technology Lab (ASLT) in Thailand where ASLT developed a DOLLx8 streaming system for the transfer of GPS-, navigation (navaid), terrain, and MEMS gyroscope data for Electronic Map Display (EMD) and Primary Flight Display (PFD). The system could then receive GPS data in NMEA and binary formats, along with other aircraft data and transmit this along with the flight plan, terrain and navigation data so that both instruments could use the same flight data over one or two DOLLx8 data lines. The advantage of such technology was that the aircraft or helicopters would need only one GPS antenna for two or more GPS based instruments. The streaming system that was developed back then by ASLT was also used in later versions and is now a permanent part of DOLLx8 in connection with sensor streaming technologies and GSM data transfer via GPRS.
Today's system
The latest version of DOLLx8 is far more advanced than earlier versions and is based on 20-year experience in control systems and sensor technologies, where weaknesses in previous versions has meant that MISOLIMA has by research and development (R&D) developed, extended its expertise, created technologies and come up with products that are also suitable for educational purposes. The latest version of DOLLx8 as of February 2012 is 3.18b.
DOLLx8 bus signals
The DOLLx8 bus works with five logical signals at 5 volts each, where the bus-line requires resistors as electrical termination (terminator) of 120 ohm. The system uses standard UTP category-5 Ethernet cable (twisted pair cable) with eight contact points and RJ-45 as end-piece connected to i.e. the DOLLx8 eMaster unit. DOLLx8 devices may connect to a PC or server via UTP cable, but can also be used "stand alone" without a central computer.
This table shows the bus signals and color codes in DOLLx8 contact points on MISOLIMA eSherlock 1800Tx8 where the contact 'C2 is connected to the RJ-45 end-piece of the UTP cable. The signals corresponding to the same contact point (1-8) on the RJ-45 connector if the RJ-45 connector is held in the hand with the locking tab facing down and the cable opening is held towards the body. The connectors are numbered 1-8 and goes from left to right.
DAT+ and DAT- signals will be activated as soon as data is placed in the internal data buffer memory. DAT- goes positive and then activates the BSEL lines 3.5ms after the DAT lines are activated. The bus speed in DOLLx8 network is managed by the CLK signal and are currently set to 36kHz, which represents 14 milliseconds between each clock pulse. The bus clock is controlled by a positive BSEL- signal (BSEL + goes then simultaneously negative or low) and remains high as long as there is data in the data buffer memory. When data communication is completed and DAT receives HEX 0D 0A (CRLF) from the data buffer memory, the BSEL+ signal goes high again while BSEL signal goes low, which results in that the CLK signal ceases. The DOLLx8 system is then passively in standby or hibernation mode with minimal power consumption that leads to zero electromagnetic interference (EMI) in the network.
Application
The DOLLx8 solution is used in vehicles, buses, trains, caravans, marine, aviation, laboratories, homes, offices, buildings and in other automated systems.Vikan, Tore; "Det ukjente dataeventyret", Trønder-Avisa (Norwegian newspaper), 14 January 2012, page 10-13 of section 2 DOLLx8 is based on program-controlled embedded system, or integrated systems technology, and may therefore also interface to multiple systems such as RS-232, RS-422, RS-485, Controller Area Network (CAN-bus), GSM, USB and more, but may also be connected to wireless systems such as Bluetooth, Wi-Fi, VHF, GSM, laser or Internet for communication without the use of the data buffers between the units. DOLLx8 as multi-functional data network with mixture of combinatorial logics may connect via single or multiple connection-points adapted to multiple systems as defined in Common Hybrid Interface Protocol System (CHIPS).
Modules
MISOLIMA DOLLx8 system is based on several complete small modules and can be used in various integrated electronic projects. The main module is ePAT MCU with a clock frequency of 18.432 MHz, which is also the main unit used in most DOLLx8 systems. ePAT MCU uses only internal memory and distributed memory capacity, according to this table;
· 256 byte as on-chip RAM (used for variables)
· 1 Kbyte as on-chip XRAM (used to buffer variables)
· 32 Kbytes as on-chip Flash Memory (for software)
· 2 Kbyte as on-chip Flash memory (Bootloader)
· 2 Kbyte as on-chip EEPROM (used for users settings)
ePAT MCU also includes three 16-bit counters, two serial ports, five I/O ports (4x8 = 32 bits + 1x2 bits), five channels 16-bit PCA (Programmable Counter Array) with 8-bit PWM, 21-bit watchdog counter and 8x10-bit analog-to-digital converters (ADC). ePAT has integrated switched-mode power supply (SMPS) on the upper side of the PCB which handles power input from 5 to 30Vdc. Beside ePAT MCU, there exists also i.e. small GPS and GSM modules.
DOLLx8 protocol system (version 3.18b)
DOLLx8 protocol system is based on ASCII-text and/or hexadecimal values, where the users can control device features, settings and parameters via PC, Internet, smartphone or regular mobile phone via SMS. DOLLx8 devices such as fleet management, GSM alarm systems have features such as for Master Phone, where the owner or owners of the system can alone use the mobile network to control DOLLx8 devices. For all others calling the devices via GSM will be treated as a normal phone call. The owner of Master Phone can also use a SpyCall function where the owner can call the device and listen into what's being said without those on the other end knowing about it.
All DOLLx8 devices have an integrated unique vendor and product ID that consists of 12-digits hexadecimal values which includes Country Code, Company Code, Product ID, Manufacturer Product ID, User's Product ID and User sub-Product ID.
A DOLLx8 command may according to the table hereunder look like this: @ax, 02C002A030010, ON <CRLF>. If this command is sent to a DOLLx8 device with a buzzer installed it will start to buzz until the "OFF" command is sent to the device. If the command was successfully sent and received by the device with the right ID, then the device will acknowledge with #ax,02C002A030010,ON followed by <CRLF> as confirmation that the device has executed the command.
It is also possible to use a key name instead of the 12-digit Vendor and Product ID and if the key name is set to "living room" then the same command would look like this @ax,living room,ON <CRLF>.
(1) All DOLLx8 device has a product identification code consisting of an ASCII character
(2) All DOLLx8 devices have a functional identification code consisting of an ASCII character
(3) The Country Code is specified as 3-digit hexadecimal code
(4) Company Code is specified as 3-digit hexadecimal code and together with the assigned Country Code it becomes manufacturer ID.
(5) DOLLx8 message can be 32 characters, but in SMS it can be a maximum of 160 characters
The Product ID bytes from #5 to #16 can also be replaced with a user-defined key names such as "living room"
Example of DOLLx8 VB code
This section shows how to send a command to DOLLx8 via MISOLIMA.DLL and Visual Basic 6.0. In this case, an integrated light function on MISOLIMAs eSinclar PWM4 RGB + W''' LED light system is turned ON and changes colors automatically where according to the next two VB examples the speed between red, green and blue can be adjusted up or down by the user. The result of this code, you can see on YouTube
Declare Function fnSendDataToDevice Lib "MISOLIMA.dll" Alias "SENDDATATODEVICE" _
(sCommand As String, _
sDeviceID As String, _
nData As String) As Long
Option Explicit
Dim sDeviceName As String
Dim lRetVal As Long
Private Sub Form_Load()
sDeviceName = "eSinclair"
End Sub
Private Sub btnPatern1_Click()
lRetVal = fnSendDataToDevice("@sB", sDeviceName, "P1") ' Activates RGB pattern #1 in eSinclair PWM4 LED light module
End Sub
Adjusting color change speed opp
Private Sub btnAdjUp_Click()
lRetVal = fnSendDataToDevice("@sB", sDeviceName, "T+")
End Sub
Adjusting color change speed down
Private Sub btnAdjDwn_Click()
lRetVal = fnSendDataToDevice("@sB", sDeviceName, "T-")
End Sub
Internet of Things
In addition to the above-mentioned protocol system, the latest version of DOLLx8 has also integrated Internet of Things'' (IoT) functions which, among other things, registering an IoT serial number that consist in total of 281,474,976,710.655 unique combinations. This IoT serial number is registered by the manufacturer and together with the 12-digit DOLLx8 Product ID, this becomes the "IoT product-ID" which can then be identified as a unique number on a worldwide basis.
See also
References
Network architecture
|
754849
|
https://en.wikipedia.org/wiki/Larry%20Tesler
|
Larry Tesler
|
Lawrence Gordon Tesler (April 24, 1945 – February 16, 2020) was an American computer scientist who worked in the field of human–computer interaction. Tesler worked at Xerox PARC, Apple, Amazon, and Yahoo!
While at PARC, Tesler's work included Smalltalk, the first dynamic object-oriented programming language, and Gypsy, the first word processor with a graphical user interface (GUI) for the Xerox Alto. During this, along with colleague Tim Mott, Tesler developed the idea of copy and paste functionality and the idea of modeless software. While at Apple, Tesler worked on the Apple Lisa and the Apple Newton, and helped to develop Object Pascal and its use in application programming toolkits including MacApp.
Biography
Early career
Tesler was born on April 24, 1945, in the Bronx in New York City, to Jewish parents Isidore, an anesthesiologist, and Muriel (). Tesler lived in the Bronx through his childhood and graduated from the Bronx High School of Science in 1961. While in high school, he was guided towards computers by a teacher after showing the teacher an algorithm for generating prime numbers. Through this, he learned of a program at Columbia University where he was able to spend a half-hour each week on their computer systems, through which he taught himself programming before college. He went on to Stanford University in 1961 when he was 16, studying computer science and graduating in 1965 with a degree in mathematics. At Stanford, he had spent time as a student programmer for Joshua Lederberg on the LINC platform, and was a colleague of Larry Breed, Charles Brenner, Douglas Hofstadter, Roger Moore, and Bill Strachan.
During college and afterward, Tesler did some programming jobs on the side, and after graduation, worked as a consultant offering his programming services in the area. As he was one of only a few computer programmers listed in the Palo Alto phone directory he received a good deal of work. However, a regional recession caused this consulting work to dry up. Tesler also worked at Stanford Artificial Intelligence Laboratory (SAIL) in the late 1960s. With Horace Enea he designed Compel, an early single assignment language. This functional programming language was intended to make concurrent processing more natural and was used to introduce programming concepts to beginners.
During his time at Stanford, Tesler had participated in the counterculture of the 1960s, including the anti-Vietnam War protests. In the late 1960s, Tesler became involved in the Midpeninsula Free University, part of the Free Speech Movement, where he taught classes with titles such as "How to end the IBM Monopoly", "Computers Now", and "Procrastination".
Xerox PARC
Tesler left Stanford Artificial Intelligence Laboratory due to a number of factors in the early 1970s; he recognized that artificial intelligence would not be a usable technology for many years, and his marriage to his college girlfriend had recently ended in divorce. He took his daughter and moved to Oregon with a number of Vietnam War veterans who were returning there to build homes. There was little computing technology in this area and he could not get a job with the local bank, the only firm nearby with a computer system. He called Stanford to see if they had anything, and learned that Alan Kay, whom Tesler had worked with while at SAIL and then a member of Xerox Palo Alto Research Center (PARC), had been actively looking for him shortly after his departure. Kay wanted Tesler to join him at PARC. Tesler could not be hired at PARC due to a hiring freeze, so Tesler instead took a short-term project offered by Les Earnest from SAIL to write a "document compiler", a means to easily produce printable manuals from simple text files. In order to carry out this project, Tesler wrote Pub, which was then recognized as one of the first uses of markup language; it was later distributed on ARPANet.
PARC approached Tesler with an offer in 1971, but wanted to place Tesler in the On-Line Office System Group. Tesler had been more interested in Xerox's work with personal computers, so he turned down the offer. By early 1973, PARC had established development of the Xerox Alto, the first computer system designed around a graphical user interface (GUI), and Tesler accepted an offer for a position splitting his time between the Office System Group and the Learning Research Group, which Kay was heading. Some of Tesler's main projects at PARC were the Gypsy word processor for the Office System Group, and Smalltalk, the first dynamic object-oriented programming language, with the Learning Research Group. While working on Gypsy, Tesler and his colleague Tim Mott started writing ideas down envisioning the future of interactive computer use, considering current text-based user interfaces would move to GUIs with icons representing documents, and to develop ease-of-use. From there, the two developed the basic copy and paste function, now a standard feature in computing. Tesler also established the idea that computer interfaces should be modeless, where all actions are available to a user at all times, rather than modal, requiring the user to enter a specific mode to perform them. Gypsy was programmed to include both of these concepts.
Tesler also was part of a team with Adele Goldberg and Douglas Fairbairn that worked on the Xerox NoteTaker, a portable computer system Alan Kay had envisioned. Tesler, then a novice to hardware programming and design, worked with Fairbairn on the design, which included the first functioning Ethernet protocol written in software rather than on hardware. Tesler and Fairbairn took the NoteTaker prototype on cross-country trips to demonstrate the unit to Xerox executives. At one layover during the trip, Tesler and Fairbairn briefly tested the unit at an airport and while in flight, which Tesler believed was the first-ever use of a computer in these situations. The NoteTaker did not gain traction as Xerox had turned its attention back to the Xerox Alto.
Tesler was a proponent of ease-of-use for user interfaces while at PARC. Tesler is considered the originator of the phrase "user-friendly" as a measure of usability after a salesman told him that word processors were difficult to sell because they were "just so unfriendly". Tesler is also tied to the origins of the phrase "what you see is what you get"; he and his colleagues were complaining about the way documents printed out differently to their appearance on the screen. Tesler said, "What you see on the screen should be what you get when you print it." Another person simplified this to the well-known abbreviation "WYSIWYG" which gained traction as a functional goal within PARC and beyond. Tesler also is credited with coining the term "browser" after creating a Smalltalk code browser in response to a coworker having difficulty in parsing through someone else's code.
Tesler had been present during both of Steve Jobs's fateful visits to PARC in late 1979, a couple of years after Jobs had cofounded Apple Computer. During the first visit, Tesler demonstrated to Jobs the Xerox Alto, including its computer mouse-driven GUI features, Gypsy, and Smalltalk. While the Alto had been a mere curiosity for Xerox, Jobs saw a huge amount of potential in the graphical interface, and immediately after returning to Apple's headquarters, set his team on creating a similar graphical user interface for their first product, the Apple Lisa, incorporating additional information provided by Xerox, later refined into the first Apple Macintosh. However, while the Macintosh was Apple's flagship to becoming a major manufacturer of personal computers, Xerox fell behind.
Apple Computer
Tesler was one of several Xerox PARC employees who left the company in 1980 to join Apple Computer following Jobs's visits. Tesler said his reasons for leaving included the fact that Apple had clearly gotten the idea of computers and was much more excited in the work PARC was doing while Xerox still thought itself a copier company, and that he found Apple's management much more approachable than Xerox's. Tesler started at Apple in July 1980 supporting the development of the Apple Lisa, and worked for them until 1997, holding various positions, including Vice President of AppleNet, the division within Apple working on Internet technologies (not to be confused with AppleNet, the never-shipped network for the Lisa), Vice President of the Advanced Technology Group, and Chief Scientist.
Part of Tesler's work with the Lisa was to develop object-oriented programming extensions to the Pascal programming language allowing easier manipulation of the GUI. Tesler worked with Pascal's creator, Niklaus Wirth, to develop Object Pascal in 1985 which was used to create the Lisa Toolkit. When Apple moved onto the Macintosh platform, the same concepts were brought forward to create MacApp, a similar Object Pascal-based class library for the Macintosh's GUI functions released in 1985.
Starting in 1990, Tesler was named vice president of Apple's Newton Group under the Advanced Technology Group, and led the efforts of developing the Apple Newton, one of the first personal digital assistants and predecessor of the tablet computer. However, Tesler claimed some decisions related to the Newton's release, such as deciding against an Apple-developed handwriting recognition software, over a third-party which slowed down the device, were estimated to have cost Apple millions of dollars. Tesler voluntarily left the group just before the Newton shipped in 1993 and became Apple's chief scientist within the Advanced Technology Group. He explored a number of potential projects being developed by the group, but these had been too risky for Apple at the time, so the group focused on networking strategies. Tesler decided to leave Apple in 1997. One of his last acts was to close the Advanced Technology Group as Apple was struggling too much financially to support such a research program at that time.
In 1991, Tesler contributed the article "Networked Computing in the 1990s" to the Scientific American Special Issue on Communications, Computers, and Networks of September 1991.
Later career
One of the last programs that Tesler oversaw at Apple was a programming language aimed for use by schoolchildren, named Cocoa (unrelated to the Cocoa application programming interface later released by Apple). With Apple's permission, Tesler spun out and cofounded Stagecast Software in Palo Alto in 1997, where his small team further developed Stagecast Creator, a programming environment aimed for educational uses that had been under development at Apple. Stagecast Creator was released in 1999, just at the time that the education market had turned financially downhill, and sales of the program were not sufficient to keep the company in business. Tesler dismissed most of the employees in mid-2000, and then left, leaving two employees to continue the company.
Tesler joined Amazon in Seattle in October 2001. Initially he had been hired as a vice president of engineering, and was shortly thereafter promoted to the vice president of shopping experience, where he helped to improve the Amazon website interface, including developing its book preview program. While Tesler enjoyed the job at Amazon, his wife had remained in Silicon Valley, and he also felt distant from venture capitalists that were plentiful in Silicon Valley, and opted to leave Amazon. Tesler moved back to Silicon Valley in 2005 to join Yahoo! as vice president of their User Experience and Design group. After three years, he found that Yahoo! had too many competing product lines and a lack of focus, and left in 2008. He worked for a year at the personal genetics information company 23andMe as product fellow, before establishing himself as an independent consultant in December 2009 to help Silicon Valley companies with designing their user interfaces and experiences.
Personal life
After his first marriage ended in divorce in 1969, Tesler married Colleen Barton, a geophysicist.
Tesler had kept his countercultural attitudes beyond his early career, which he became known for at his other positions. He also maintained an attitude that being successful in Silicon Valley was a "rite of passage", and those who succeed should try to help fund new ventures and to educate others. The Computer History Museum, on Tesler's death, described Tesler as having "combined computer science training with a counterculture vision that computers should be for everyone".
Tesler maintained his strong preference for modeless software well beyond his time at PARC. To promote his preference, as of 1995, Tesler equipped his automobile with a personalized California license plate reading "NOMODES". Along with others, he had also been using the phrase "Don't Mode Me In" for years, as a rallying cry to eliminate or reduce modes. His personal website was located at "nomodes.com" and on Twitter had used the handle "@nomodes".
Tesler died in Portola Valley, California, on February 16, 2020, at the age of 74.
See also
AI effect
List of programmers
List of computer scientists
Law of conservation of complexity
References
External links
Publications by Larry Tesler from Interaction-Design.org
Computer History Museum, Larry Tesler Oral History Interview
Stagecast site
Founders
1999 Lecture on Novice Programming
Larry Tesler home page
Publications by Larry Tesler from Interaction-Design.org
Computer History Museum, Larry Tesler Oral History Interview
Stagecast site
Founders
1999 Lecture on Novice Programming
1945 births
2020 deaths
American computer programmers
American computer scientists
Human–computer interaction researchers
Programming language designers
20th-century American scientists
21st-century American scientists
Scientists at PARC (company)
Scientists from New York (state)
Apple Inc. employees
The Bronx High School of Science alumni
Stanford University alumni
American Jews
|
476310
|
https://en.wikipedia.org/wiki/MirOS%20BSD
|
MirOS BSD
|
MirOS BSD (originally called MirBSD) is a discontinued free and open source operating system which started as a fork of OpenBSD 3.1 in August 2002. It was intended to maintain the security of OpenBSD with better support for European localisation. Since then it has also incorporated code from other free BSD descendants, including NetBSD, MicroBSD and FreeBSD. Code from MirOS BSD was also incorporated into ekkoBSD, and when ekkoBSD ceased to exist, artwork, code and developers ended up working on MirOS BSD for a while.
Unlike the three major BSD distributions, MirOS BSD supports only the x86 and SPARC architectures.
One of the project's goals was to be able to port the MirOS userland to run on the Linux kernel, hence the deprecation of the MirBSD name in favour of MirOS.
History
MirOS BSD originated as OpenBSD-current-mirabilos, an OpenBSD patchkit, but soon grew on its own after some differences in opinion between the OpenBSD project leader Theo de Raadt and Thorsten Glaser. Despite the forking, MirOS BSD was synchronised with the ongoing development of OpenBSD, thus inheriting most of its good security history, as well as NetBSD and other BSD flavours.
One goal was to provide a faster integration cycle for new features and software than OpenBSD. According to the developers, "controversial decisions are often made differently from OpenBSD; for instance, there won't be any support for SMP in MirOS". There will also be a more tolerant software inclusion policy, and "the end result is, hopefully, a more refined BSD experience".
Another goal of MirOS BSD was to create a more "modular" base BSD system, similar to Debian. While MirOS Linux (linux kernel + BSD userland) was discussed by the developers sometime in 2004, it has not materialised.
Features
Development snapshots are live and installation CD for x86 and SPARC architectures on one media, via the DuaLive technology.
Latest snapshots have been extended to further boot a grml (a Linux-based rescue system, x86 only) via the Triforce technology
mksh (MirBSD Korn shell): an actively developed flavour of KornShell and heir of pdksh
The base system and some MirPorts store "dotfiles" data in ~/.etc. directory in user's home to avoid cluttering the root of the home directory
Application packages from the NetBSD-derived pkgsrc repositories were configured for use in MirBSD starting in 2011.
The most important differences to OpenBSD were:
Completely rewritten, GRUB multi boot compatible, boot loader and boot manager without an 8 GiB limit and with Soekris support
Slim base system (without NIS, Kerberos, BIND, i18n, BSD games, etc.), Bind and the BSDgames being available as a port
Binary security updates for stable releases
ISDN support
IPv6 support in the web server software
wtf, a database of acronyms
Some of the GNUtools (like gzip and *roff) were replaced by original UNIX code released by Caldera International (SCO) under a BSD licence
64-bit time handling routines (time_t)
Correct handling of leap seconds
Full GCC 3.4 support: C, C++, Pascal, Objective-C
Current versions of the GNU developer toolchain (rcs, binutils, gdb, texinfo, lynx etc.)
GNU CVS 1.12 with custom extensions
Improved random number generator
Uses sv4cpio with/without CRC instead of tar archives as its package format; support for new formats in cpio
Improved support for UTF-8 and the Unicode BMP, including wide character support for libncurses ("libncursesw") and friends
In fact, MirBSD only supports the BMP, so the "UTF-8" support is limited to the part common between UTF-8 and CESU-8.
Cooperation
Aside from cooperating with other BSDs, submitting patches to upstream software authors, and synergy effects with FreeWRT, there was an active cooperation with Grml both in inclusion and technical areas. Other projects, such as Debian are also fed with MirSoftware.
MirPorts
MirPorts was a derivative of the OpenBSD ports tree and was developed by Benny Siegert. MirPorts does not use the package tools from OpenBSD written in Perl, but continues to maintain the previous C-based tools. New features are in-place package upgrades and installing a MirPorts instance as a non-root user. Unlike OpenBSD ports, MirPorts are not tied to specific OS versions and even on stable releases using the newest version was recommended. MirLibtool was a modified version of GNU libtool 1.5 installed by MirPorts to build shared libraries in a portable way.
Multiple platforms are supported "out of the box":
MirOS BSD (-stable and -current)
OpenBSD (-stable and -current)
MidnightBSD
Mac OS X (10.4 and newer) / Darwin
Following the MirOS BSD policy of faster software availability to the user, many ports removed for political reasons in OpenBSD (e.g. all the DJB software or the Flash Plugin) have been kept in MirPorts and can continue to be used. MirPorts was intended to be a place for unofficial or rejected OpenBSD ports.
See also
Comparison of BSD operating systems
Notes
References
External links
Berkeley Software Distribution
OpenBSD
Software forks
|
34478566
|
https://en.wikipedia.org/wiki/Cigital
|
Cigital
|
Cigital was a software security managed services firm based in Dulles, VA. The services they offered included application security testing, penetration testing, and architecture analysis. Cigital also provided instructor-led security training and products such as SecureAssist, a static analysis tool that acts as an application security spellchecker for developers.
History
Cigital was established in 1992 with grants from DARPA In 1999 the firm created ITS4, which according to Cigital, was the world's first static analysis tool. The technology in this product was eventually licensed to Kleiner Perkins and used as the basis for the creation of Fortify Software in 2003. In 2010, Fortify was acquired by Hewlett Packard for $300 million.
BSIMM (Build Security In Maturity Model) is a software security measurement framework that helps organizations compare their software security to other organizations. BSIMM was started as a joint project by Cigital and Fortify Software.
In 2002, Cigital announced finding a vulnerability in Visual C++ .Net compiler (related to a GS compiler flag being inefficient). Cigital was criticized for not following responsible disclosure in this case, however, Cigital has defended its position due to the nature of the vulnerability.
On November 30, 2016, Cigital was acquired by Synopsys, an electronic design automation company.
Acquisitions
In November 2014, Cigital acquired IViz Security an information security company which is into on-demand application penetration testing.
In November 2016, it was announced that Synopsys, Inc. would be acquiring Cigital and Codiscope.
References
External links
Synopsys Software Integrity Website
Software companies based in Virginia
Companies based in Dulles, Virginia
Software companies of the United States
|
44284590
|
https://en.wikipedia.org/wiki/Shazia%20Sadiq
|
Shazia Sadiq
|
Professor Shazia Sadiq is a computer scientist based in Queensland, Australia.
Background
Originally from Pakistan, Sadiq was one of a handful of women to undertake studies in a computer science program within Pakistan at Quaid-i-Azam University, Islamabad, Pakistan in 1980s, and wrote her first computer program in Fortran using punched cards.
Later she received a NORAD scholarship to undertake masters in computer science from the Asian Institute of Technology, Bangkok, Thailand. She then went on to do a PhD in Information Systems at the University of Queensland, Brisbane Australia, with Professor Maria Orlowska.
Since 2001 Sadiq has been based in the School of Information Technology and Electrical Engineering, at the University of Queensland, which she conducts research and teaching in databases and information systems.
She serves as deputy chair on the Australian Academy of Science’s National Committee on Information and Communication Sciences and formerly as vice president of the Asia Pacific Chapter of IQ International – the International Association of Information and Data Quality.
Education
Doctor of Philosophy (The University of Queensland, Brisbane, Australia, 2002)
Masters in Computer Science (Asian Institute of Technology, Bangkok, Thailand, 1993)
Masters in Computer Science (Quaid-i-Azam University, Islamabad, Pakistan, 1989)
Research and advocacy
Sadiq’s research is focussed on developing innovative solutions for Business Information Systems. She has published over 100 publications in prestigious journals and conferences such as SIGMOD, VLDBJ, TKDE, WWWJ, ISJ, CAiSE, ER, and BPM. and received grants. Her work on declarative modelling of complex and dynamic business requirements has been applied in the areas of business process management, and GRC (governance, risk and compliance) with close to a 1000 citations on the collective works. Sadiq is leading a world-class group of researchers and students in the area of big data quality and integration with novel applications in transportation, social media and learning analytics. In addition to the research work, Sadiq also contributes to the professional community of data and information quality professionals through her role as a board member of the AsiaPacific Chapter of the International Association of Information and Data Quality and as convener of the Queensland Data Quality Roundtable.
Sadiq has also contributed to the enhancement of Information and Communications Technology (ICT) education for the last fifteen years. She has devoted considerable energy towards raising awareness of the importance of ICT skills for a number of disciplines, while ensuring that ICT students are equipped with the knowledge and confidence to tackle the rising challenges of a constantly evolving ICT landscape and a data driven society. Her teaching innovations have been recognized through publications in leading conferences and journals, leadership roles at national and international ICT educational forums and University awards for teaching excellence.
Sadiq is an active supporter of initiatives towards improving female participation in ICT. She developed an interactive workshop series, which has been delivered to over a thousand high school students since 2006. The aim of the initiative is to promote interest in ICT related study and professional pursuits especially for female students. The basic rationale behind the design of the workshops is to demonstrate computing principles and techniques by masking them in various socially relevant applications such as health, forensics, genetics, fashion, movie making, game design, environment modeling etc.
Sadiq also gives role model talks; and participates in various girls in ICT events, such as “GIDGITS” and “Technology Takes You Anywhere”.
Awards
Women in Technology Award for InfoTech Research 2012
The University of Queensland Award for Teaching Excellence 2012
Fellow of the Australian Academy of Technology and Engineering 2020
External links
Professor Shazia Sadiq, Australian Academy of Science
References
Australian women scientists
Living people
Year of birth missing (living people)
|
1972559
|
https://en.wikipedia.org/wiki/Narayan%20Rane
|
Narayan Rane
|
Narayan Tatya Rane (born 10 April 1952) is an Indian politician and former Chief Minister of Maharashtra. He currently serves as Minister of Micro, Small and Medium Enterprises in the Second Modi ministry. He has previously held Cabinet Ministry positions for Industry, Port, Employment and Self-employment; Revenue; and Industry in the Government of Maharashtra.
He was a member of Shiv Sena and opposition leader of Vidhan Sabha until July 2005, when he joined Indian National Congress party. He quit Congress in September 2017 and launched the Maharashtra Swabhiman Paksha. In 2018, he declared support for Bharatiya Janata Party and was elected to the Rajya Sabha on a BJP nomination. On 15 October 2019, he joined Bhartiya Janata Party and merged his party, Maharashtra Swabhiman Paksha, into the BJP.
Personal life
Narayan Rane was born to Tatu Sitaram Rane and Laxmibai Rane in Maharashtra. He dropped out from 11th grade. He has two sons: Nilesh and Nitesh Rane. Nitesh is a politician and member of the Maharashtra Legislative Assembly.
Political career
Shiv Sena
Rane joined Shiv Sena in his early twenties and started his political career as local
Shakha Pramukh at Chembur, Mumbai. He then became the Councillor of Kopargaon. Under the BJP-Shiv Sena coalition government, Rane first received the Revenue Ministry portfolio. He succeeded Manohar Joshi as Chief Minister in 1999, when Joshi was forced to resign due to a land use controversy. Later that year, the BJP-Sena alliance led by Rane lost the October 1999 Maharashtra elections to an INC-NCP coalition. The election campaign opened a breach between Rane and Uddhav Thackeray, the president of Shiv Sena. Relations between Thackeray and Rane finally ruptured completely in 2005, when Rane submitted his resignation from the party. In response Thackeray and Shiv Sena expelled Rane from the party on 3 July 2005, accusing Rane of "gangsterism" and "betrayal of the party."
Indian National Congress
Rane joined the Indian National Congress in 2005, receiving his old post as Revenue Minister under the Second Desmukh Ministry. In a 2005 by-election, he won re-election from his old Malvan seat in the Konkan region on a Congress ticket. In the wake of 2008 Mumbai attacks, Vilasrao Deshmukh, then Chief Minister of Maharashtra resigned, and Sonia Gandhi elevated Ashok Chavan as Chief Minister. Rane accused Congress leadership of breaching its promises to make him Chief Minister, and was suspended by the party. After Rane apologized, the INC revoked this suspension. Prithviraj Chavan appointed Rane as Minister of Industry in his first ministry, elevating Balasheb Thorat to Rane's old Revenue portfolio. Rane resigned from the Cabinet in July 2014 over differences with the party's leadership on the INC's campaign effort. The BJP and SHS went on to claim victory in the 2014 Maharashtra Legislative Assembly election, in which Rane lost his bid for re-election to a Shiv Sena candidate.
In 2016, the INC appointed Rane as a member of the Maharashtra Legislative Council. The appointment did not suppress the increasingly public feud between Rane and Congress leadership, however, prompting speculation about Rane's future in the party. On 21 September 2017, Rane resigned both from the INC and from his membership on the Maharashtra Legislative Council.
Maharashtra Swabhiman Paksha
Through press at the time expected Rane's resignation to result in an appointment to Devendra Fadnavis's cabinet, Shiv Sena, still led by Rane's longtime rival Uddhav Thackeray, threatened to withdraw from the BJP-led coalition if Rane was admitted. Temporarily without a party, Rane formed a new political party in October 2017 called the Maharashtra Swabhiman Paksha and indicated it would ally with Bharatiya Janata Party. However, when Rane ran for Rajya Sabha in 2018, he did so under a BJP party line.
Bharatiya Janata Party
Rane merged his party, Maharashtra Swabhiman Paksha, with the Bharatiya Janata Party on October 15, 2019. Following that year's legislative assembly elections in Maharashtra, the BJP-Sena alliance broke down completely. During the July 2021 Cabinet reshuffle, Modi elevated Rane to Minister of Micro, Small and Medium Enterprises. Political writer Aditi Phadnis interpreted this as a BJP attempt to make inroads in the Marathi strongholds of their former allies, Shiv Sena.
Newspaper Prahaar
Rane launched the Marathi daily Prahaar on 8 October 2008, under the ownership of Rane Prakashan Pvt. Ltd. While he serves as the Consulting Editor, journalist Madhukar Bhave is the editor of the newspaper.
Controversies
In August 2011, Urban Development Deputy Secretary BK Gahart claimed in a deposition before the inquiry committee investigating the Adarsh Housing Society scam that while Rane was Chief Minister in the 1999 Shiv Sena-BJP ministry, he expedited a land allocation at the behest of Adarsh Housing Society. The BJP-Sena opposition unsuccessfully campaigned for Rane's resignation as Industry Minister, but when the inquiry committee completed its report in April 2013, indicting four former Chief Ministers of Maharashtra, Rane was not included.
In August 2021, while traveling under the BJP Jan Ashirwad Yatra initiative (a program under which Modi ministers traveled their home constituencies and regions), Rane claimed Uddhav Thackeray, the Chief Minister of Maharashtra following the 2019 Maharashtra political crisis, forgot the year of India's independence during an Independence Day speech, requiring prompting by an aide. Rane went on to declare that, "Had I been there, I would have given him a slap." Maharashtra Police arrested Rane in Ratnagiri on 24 August. A court conditionally granted him bail the following day.
See also
Narayan Rane ministry
List of chief ministers of Maharashtra
Shiv Sena
References
External links
Facebook Page
1952 births
Living people
Chief Ministers of Maharashtra
Members of the Maharashtra Legislative Assembly
Leaders of the Opposition in the Maharashtra Legislative Assembly
Maharashtra MLAs 1995–1999
Maharashtra MLAs 2004–2009
Maharashtra MLAs 2009–2014
Indian National Congress politicians
Shiv Sena politicians
Bharatiya Janata Party politicians from Maharashtra
Narendra Modi ministry
|
68290258
|
https://en.wikipedia.org/wiki/Noeasy
|
Noeasy
|
Noeasy (stylized in all caps) is the second studio album by South Korean boy band Stray Kids. It was released on August 23, 2021, through JYP Entertainment, and distributed by Dreamus, nine months after its predecessor, Japanese extended play All In (2020), and eleven months after the Korean reissue In Life (2020). The title is a word play of "noisy" and "no easy" to express the group will always strive to be noisiest even though they struggle the hardships and convey the concept of leaving a loud impact on the world with their music.
For the album, 3Racha (Bang Chan, Changbin, and Han), an in-house production team from the members of Stray Kids, primarily worked with many Korean and foreign songwriters and producers, including Versachoi, HotSauce, Hong Ji-sang, Krysta Youngs, and the group's other members, among others. It consists of fourteen tracks, utilizes various music genre of hip hop, EDM, pop, R&B, and rock, including the lead single "Thunderous", and the previous releases: "Wolfgang" from the competition show Kingdom: Legendary War, and "Mixtape: Oh" from their Mixtape Project
Upon its release, Noeasy received generally favorable reviews, praised its creativity, storytelling, depth substances, and unique energy. The album peaked atop Gaon Album Chart and within the top-20 in Australia, Austria, Belgium, Denmark, Finland, Hungary, Japan, the Netherlands, Poland, and Switzerland. It has sold over 1.3 million copies as of 2021 alone and certified million by Korea Music Content Association (KMCA), making it the first million-selling album of the group and their label. Noeasy won Best Album (Bonsang) at the 36th Golden Disc Awards.
Background
Stray Kids uploaded the video Step Out 2021 via their social media on January 1, 2021, containing the group's accomplishments in 2020, and to-do plans of 2021, including their upcoming second studio album. From April to June, the group participated the Mnet's competitive reality television show Kingdom: Legendary War, joining Ateez, The Boyz, BtoB, iKon, and SF9, and ended up as a winner. During the program, they released the song "Wolfgang" on May 28, from the EP [[Kingdom: Legendary War#Kingdom <Finale: Who Is the King?>|Kingdom <Final: Who Is the King?>]], as a part of the final performance competition. It followed by the Mixtape Project single "Mixtape: Oh", surprisingly released on June 26, along with the announcement that Hyunjin would be resuming the group's scheduled activities starting in July after his hiatus from group activities since late February due to bullying accusations.
On June 29, the South Korean news outlet SpoTV News reported that the group would release an album in late August and also hold Kingdom Week, a television program benefit for the winner. Later, JYP Entertainment confirmed that the group is currently preparing a new album but had still not decided on the album format. Hyunjin also would be participating in the promotions for the new album. About a month later, the group announced that their second studio album Noeasy via the album trailer "Thunderous", was scheduled for release on August 23, which marks their first Korean physical release in 11 months since the reissue In Life in September 2020.
Before the album announcement, in early July, Stray Kids released SKZ Camp Song: Howl in Harmony, a camp-type online program that shows the process of the members creating their songs and making their accomanying music videos in each team for five episodes. They were separated into three teams: Quokka Bbang Daengi (Han, Seungmin, I.N; formerly Margarine Bbang) to write the song "Gone Away", Yeoreum Wangja (Lee Know, Changbin, Felix) for "Surfin'", and Bekka Wang (Bang Chan, Hyunjin) for "Red Lights". Additionally, the B-side "Sorry, I Love You" was teased a little bit by the members on their V Live's live streaming content Chan's Room in early April, and "The View" was teased only as a title on the music video of "Mixtape: Oh" in late June.
Title and concept
The album title Noeasy is a word play of "noisy", which describes the misconception of the music the group made as "noise music", and "no easy", about obstacles and downs and lows of life. Both meanings combined to express that even though the group goes through hardships, they will always strive to be the noisiest. Bang Chan, a member, and leader of the group said to several South Korean news outlets, "it [Noeasy] means that we want to leave a loud impact on the world with our music." Seungmin also said, "the meaning (of Noeasy) is something like, 'life is not easy because of the naggers who tell us to do this and that, but we are Stray Kids, and we are not backing down.' …"
Music and lyrics
Noeasy is forty-six minutes and thirty-five seconds long, consisting of 14 tracks of various genres of music. The first four tracks of the album are described as hip hop, and EDM songs with aggressive bass sounds represent fighting and satirizing against the group's antis and haters. Track 5 to 9 shows a part of "emotional" tracks with pop, rock, and R&B sound. The album ends up with three sub-unit songs and two previous-release songs. All tracks were produced and mainly written by Bang Chan, Changbin, and Han, who work together as 3Racha, a production team of Stray Kids. Other members also participate to write songs. Lee Know and Felix co-wrote "Surfin'". Hyunjin co-wrote "Red Lights". Seungmin and I.N co-wrote "Gone Away". In addition to the members, many Korean and foreign songwriter-producers also participated, such as Versachoi, HotSauce, Hong Ji-sang, Krysta Youngs, among others.
Songs
Noeasy opens with "Cheese", an EDM intro track, with a "strong" rock sound, "cheerful" energy, and mixing "rough" bass synth, which uses the word "cheese" as a wordplay to compare smiling with a variety of cheeses. The lyrics respond flippantly to anti-fans and haters who pay attention. "Thunderous", the second track, and the album's lead single, is a hip hop and trap song that includes various elements of Korean traditional music (gugak), brass instruments, and chuimsae. The song expresses the firm belief that they will not be discouraged and keep to their principles no matter what anyone says. The Korean title "Sori-kkun" () has a dual meaning of jansori-kkun () meaning "nagger", and sori-kkun () meaning "(pansori) singer".
The third track, "Domino" is hip-hop-influenced with a doorbell sound at the beginning referencing the pizza brand, "intense" beats, "distinctive" sounds, and high-pitch taepyeongso, it compares their "extraordinary" ambition and confidence to a game of domino. The lyrics imply that their actions act as a single nudge that pushes everyone to follow after them in a domino effect. "Ssick", the fourth track, is a midtempo hip hop and EDM song, which has the dual meaning of "sick", which means "cool" in English, and the Korean word ssik () means "grin smile". It talks about the aspects of fame, shows how they are legendary and make people fall for them, and shows the important message slips of how feeling special about themselves is enough.
"The View", the fifth track, is described as a "rhythmic", "summery", and "hopeful healing" upbeat synth-pop song based on EDM sound, which blows away the frustration of the difficult past and future while feeling refreshed when looking and appreciating the view in front without worries. "Sorry, I Love You", the mid-tempo R&B sixth track, expresses a feeling of guilt and regret for liking someone and potentially ruining a friendship. The seventh track, "Silent Cry" is an alternative rock song that describes two people who cannot see each other hurting, and giving comfort to someone weary of the cruel world and unable to speak. The eighth track, "Secret Secret" is a slow-tempo R&B song that conveys comfort and sympathy to listeners with the desire to let the secrets that they do not want to be shared with anyone but rain. "Star Lost", the dance-pop, soft rock ninth track, is a "feel-good" song with a nostalgic composition for their fans who feel alone in the world to believe in self.
The upbeat alternative R&B tenth track, performed by Bang Chan and Hyunjin, "Red Lights" features a "wild" feeling created by "violent" string sound and electric guitar, giving a "ripened sexy charm". It uses the theme of continuing to love someone despite the red flags although it causes suffering, to talk about the unhealthy obsession or compulsion one can have towards their work. The summer-vibe upbeat dance-pop eleventh track, "Surfin'", which was sung by Lee Know, Changbin, Felix, is described as "like a glass of carbonated water" with tropical sounds and marimba beats with lyrics about having little adventures every now and then can heal the soul and mind, allowing them to keep their life on track and not only focus on working. "Gone Away", the ballad twelfth track, describes an unrequited one-sided love and the frustration of someone who is not able to be with their lover with Han, Seungmin, and I.N's vocals.
"Wolfgang", the hip hop thirteenth track, describes a wolf pack making music by following Wolfgang Amadeus Mozart and compares the habit of a wolf to hunt for prey in a group to Stray Kids. It was intended to imprint a cohesive and solid appearance and unstoppable will toward the goal. The album concludes with the song from Mixtape Project, "Mixtape: Oh", a mid-tempo electropop song with a reggaeton rhythm that describes the frustration of feeling immature in front of the object of one's desire and expresses one's feelings of resentment and frustration at oneself for being clumsy and immature in front of the person they love.
Release
Stray Kids sets Noeasy to release as CD both limited and standard version, and to digital music platform and streaming services on August 23, 2021. The jewel case version of the album was released on August 30, one week after the official release date. Previewing and pre-orders for the limited version album began on July 22, the same day with the trailer release, the 2 types of standard versions began one week later, and the jewel case version began on the day after release date on several record store.
The album's limited and standard versions contain a CD-R, a package sleeve, a photobook, a lyrics book, a randomized member sticker, a unit folded poster, photocards, and a double-sided photocard. The jewel case version, which features a member solo cover, contains a CD-R, a sticker, and a randomized photocard. The limited version exclusively includes a randomized pop-up card and an all-member photocard set. A randomized poster, frame photocard, and a special mini photobook are available for pre-order solely.
Promotion
On July 22, 2021, Stray Kids released a two-and-half-minute-long official comeback trailer named "Thunderous" and announced their second studio album Noeasy scheduled for release on August 23. Directed by Lee Hye-sung, and produced by Sushivisual with a superhero theme, the trailer shows the members transform into avengers corps against the ear-shaped "sound monster" with inventing technology, weapons, and brainstorming strategies in an apocalyptic world. On August 2, they released the exclusive clip that shows behind-the-scenes footage of the trailer. It shows the members tease about the undisclosed lead single and the member Felix appeared alone and greeted Stays (fan club name).
The group released the track's snippet videos called "unveil: track" for the eight out of new twelve tracks, i.e., "Cheese", Bang Chan and Hyunjin's "Red Lights", Han, Seungmin and I.N's "Gone Away", Lee Know, Changbin and Felix's "Surfin'", "Domino", "Sorry, I Love You", "The View", and "Secret Secret". The teaser images were uploaded in 3 sets. The first concept is a red sporty and avant-garde outfit with a smoke background. The second concept is black-and-white outfit with a plain white for individual and unit teaser images, and hanok background for group teaser image. The third concept is pastel casual outfits surrounded by neon light properties.
The complete track listing was announced on August 12, serving "Thunderous" as the album's lead single and included the previous-releases "Wolfgang", and "Mixtape: Oh" on it. The 44-second and 25-second music video teasers of the lead single "Thunderous" were released on August 20–21, and the performance video teaser with SKZoo costume on the following day. The online cover artwork, and the 24-minute long documentary video Intro: "Noeasy" for introducing the album were also released on August 23, the same of the day of release. During promotion, the group held a listening party via Stationhead on August 27 (KST) and appeared on several television and radio programs, including the domestic music programs, Weekly Idol, After School Club, Day6's Kiss the Radio, and Cultwo Show, etc. In addition to the lead single, the B-side accompanying music videos for "The View", "Cheese", "Red Lights", "Surfin'", and "Gone Away", and live videos for "Sorry I Love You", and "Secret Secret" were also released.
Kingdom Week <No+>
Stray Kids appeared on Kingdom Week <No+>, a television variety show that benefits the winner of Kingdom: Legendary War, which aired on Mnet for 7 episodes from August 17 to 23. The first and second episodes, titled No Cut, showed the group's behind-the-scenes during Kingdom: Legendary War, with commentary by the members Felix and Seungmin. In the third to fifth episodes, titled No Solo, appeared the members to head to the villa for resting and play a game called "buddy catcher". The sixth episode, titled Non Stop, collected the group's best performance chosen by the members. The final episode, airing the same day as the album was released, held the album showcase, called Stray Kids Comeback Show "Noeasy".
Singles
"Thunderous" serves as a lead single (title track) of Noeasy. It was accompanied by a music video posted to YouTube, Naver TV, and V Live, directed by Bang Jae-yeob. Both were released on August 23, 2021, alongside the album. It peaked at number 33 on South Korea's Gaon Digital Chart, number 3 on the US World Digital Song Sales, and number 80 on the Billboard Global 200, and took six wins from music programs: twice on Show Champion, twice on M Countdown, once on Music Bank, and once on Inkigayo. The accompanying music video reached 50 million views on YouTube in 6 days release and 100 million views in 55 days, making it the group's fastest and fifth 100-million-view music video.
Live performances
Stray Kids gave the debut performances of Noeasy with a showcase, called Stray Kids Comeback Show "Noeasy", held on the same day as the release date, as part of the final episode of Kingdom Week <No+>. The group performed the lead single "Thunderous", and the B-side "The View" for the first time at the show, alongside the show's final competition song "Wolfgang", and "Grow Up" from their debut EP I Am Not (2018). The group promoted "Thunderous" on several music programs in South Korea: M Countdown, Music Bank, Show! Music Core, Inkigayo, and Show Champion for three weeks, August 26 – September 12, along with "The View" in the first week of promotion, and "Secret Secret" at Show! Music Core on September 4. "Domino" was also promoted and performed during September 24–26 on Music Bank, Show! Music Core, and Inkigayo. Additionally, "Sorry, I Love You" was performed for the first time at Unite On: Live Concert on November 6.
Songs from Noeasy were also performed at several awards ceremonies and year-end annual music shows. The group gave the debut performances of the sub-unit tracks "Red Lights", "Surfin'", and "Gone Away" as a medley, alongside "Thunderous" at the 2021 The Fact Music Awards on October 2. They performed "Domino", "Thunderous", additionally showed Lee Know's solo dance performance, and 3Racha's rap performance at the 2021 Asia Artist Awards on December 2. "Cheese" was given their debut performance on December 11 at the 2021 Mnet Asian Music Awards as part of medley, titled Stray Kids World Domination, alongside the "hero" version of "Thunderous", and the unreleased song "Hey, Monster", performed by 3Racha. The group performed "Thunderous" with new arragement at 36th Golden Disc Awards on January 8, 2022, alongside "Top", and "Wolfgang".
Described as "mega performance" and "action movie-like feeling", "Thunderous" was performed at the 2021 KBS Song Festival on December 17, which shot at Namhansanseong, Gwangju, Gyeonggi Province with the theme With K-Culture, collaborated K-pop and K-cultural asset. They performed the Christmas version of "Thunderous" at 2021 SBS Gayo Daejeon on December 25, additionally using canes, group dance, and parodying Squid Game ttakji, and dalgona game, alongside "Winter Falls" from the single album Christmas EveL, and covered IU's "Merry Christmas Ahead", performed by the members Changbin, Han, Felix, Seungmin, and I.N, as part of Christmas carol medley with various artists. They concluded 2021 with "Thunderous" performance at 2021 MBC Gayo Daejejeon on December 31, adding New Year's bell ringging before New Year ceremony, alongside 2PM's "Only You" cover.
As an ambassador for the Korea Pavilion of Expo 2020, held at Dubai, United Arab Emirates, Stray Kids performed "Thunderous", as part of the opening show of the Korea Pavilion's Korea National Day with the Little Angels, and K-Tigers on January 17, 2022. The group also performed "Thunderous", alongside "Miroh", "God's Menu", and "Back Door" at the Korea National Day K-Pop Concert on the same day, joining Forestella, (G)I-dle, Golden Child, Sunmi, and Psy. The debut performance of "Silent Cry" was given on the group's second fan meeting 2nd #LoveStay 'SKZ's Chocolate Factory', which was held on February 12–13 at Olympic Hall.
Critical reception
Upon its release, Noeasy received positive reviews from music critics. According to Rolling Stone India, Divyansha Dongre appreciated the group "keeps their identity intact as they reflect on hate directed towards their artistry" with "centered around a powerful message of self-expression." Tamar Herman from South China Morning Post summarized the album "offers a lot of different styles to suit listeners and finds its strength in the band's creativity and storytelling," and also tells Stray Kids have grown with each release. Writing for Pinkvilla, Ayushi Agrawal considered the album as "a book that can only be penned by Stray Kids," and praised the album "reinstated their tag of 'self-producing idols' in a way that is above and beyond any expectations," and "reaffirms the group's self-made mighty footing in the music industry." Ruby C writing for NME rated the album four out of five stars, and described the album as both claps of thunder and gradually subsided storms, and "filled with depth, creative substance and a whole repertoire of 'noise' to boot."
Chu Seung-hyun from Seoul Economy Daily wrote Noeasy contains "full of unique bold and energetic appearance." Crystal Bell of Teen Vogue describes the album as "more than noise", and compliments the group "perfect their ability to make even the quiet parts unabashedly loud, showing us how to live with the noise — not run away from it." The Lantern writer Chloe McGowan gave 4.5 out of five score, and said the album features "fast-paced chart-toppers", "sultry anthems", "serotonin-boosting bops" and "heartbreaking ballads", all "incredibly on-brand" for the self-produced idol group. McGowan also said, "Stray Kids fully utilizes the individual talent of each member on this album as they continue to push boundaries and expectations for K-pop while testing the limits and creative devices of their own sound." Molly Matthews, a music critic from Redbrick, gave the album full-score ratings and described it as "jaw-dropping" and "jam-packed" with "energy, emotions, and charisma". She also said every part of Noeasy "drips in gold" from lyrics, vocals, rap to instrumentals.
Year-end lists
Awards and nominations
Commercial performance
On August 17, 2021, it was reported that pre-orders for Noeasy had surpassed 830,000 copies, and surpassed 930,000 pre-orders on the day of release, breaking their previous record of 300,000 pre-orders for In Life. According to Hanteo Chart, Noeasy sold 355,946 copies on the first day, and 641,589 copies in the first week.
Upon its release, Noeasy debuted and peaked at number one on the thirty-fifth, and thirty-sixth week, two consecutive weeks of South Korean Gaon Album Chart for the issue date of August 22–28, and August 29 – September 4, respectively, becoming the group's fifth number one album on the chart, after Clé 1: Miroh, Clé: Levanter, Go Live, and In Life. The album has sold 1,127,800 as of the end of August making it the first million-selling album of the group, and their label, JYP Entertainment, and the sixth 2021 South Korean million-selling albums, after BTS's Butter, NCT Dream's Hot Sauce, Seventeen's Your Choice, Baekhyun's Bambi, and Exo's Don't Fight the Feeling. All of the album's 14 tracks also entered the Gaon Download Chart simultaneously for the first time, earning all top-40 hits.
Noeasy received a million certification by Korea Music Content Association (KMCA) on October 7. Noeasy ranked at number eight on the 2021 year-end Gaon Album Chart, selling 1,303,106 copies as of the end of the year.
In Japan, Noeasy peaked at number 2 on the Oricon Albums Chart, and number 21 on Billboard Japan Hot Albums. In the United States, the album entered the Billboard Heatseekers Album at number 4, World Albums at number 5, Independent Albums at number 38, and Top Current Album Sales at number 69 for the chart issue date of September 4, 2021. Its tracks "Cheese", "Thunderous", "Domino", "Ssick", "The View", "Sorry, I Love You", "Red Lights", and "Wolfgang", charted simultaneously at top 25 on the World Digital Song Sales. The album entered several national charts in Australia (14), Austria (12), Belgium both Flanders (13) and Wallonia (5), Croatia (34), Denmark (3), Finland (5), Germany (64), Hungary (5), Lithuania (22), the Netherlands (18), Norway (27), Poland (6), Spain (67), and Switzerland (10). It additionally entered the component charts of Swedish Physical Albums (10), and the UK Album Downloads (26).
Track listing
Notes
"Cheese", "Domino", "Ssick", and "Wolfgang" are stylized in all caps.
"Mixtape: Oh" is stylized as "Mixtape : OH".
Track titles in Korean translation:
Track 2 "" (Sori-kkun) means "singer" of Korean traditional music storytelling pansori.
Track 4 "" (Ssik) means "grin smile" and play with a word "sick".
Track 6 "" (Jo-ahaeseo Mi-an) means as same as the English title.
Track 8 "" (Malhal Su Eomneun Bimil) means "a secret that can't be told".
Track 10 "" (Gangbak) means "compulsion" or "obsession".
Track 14 "" (Ae) means "love" or "child".
Credits and personnel
Credits adapted from the album liner notes.
Musicians
Stray Kids
Bang Chan (3Racha) – lead vocals , background vocals , lyrics , composition , arrangement , instrumentation
Changbin (3Racha) – lead vocals , background vocals , lyrics , composition
Han (3Racha) – lead vocals , background vocals , lyrics , composition , vocal directing
Lee Know – lead vocals , background vocals , lyrics , composition
Hyunjin – lead vocals , background vocals , lyrics , composition
Felix – lead vocals , background vocals , lyrics , composition
Seungmin – lead vocals , background vocals , lyrics , composition
I.N – lead vocals , background vocals , lyrics , composition
Versachoi – composition , arrangement , instrumentation
HotSauce – composition , arrangement , keyboard , drum programming , computer programming
ByHVN (153/Joombas) – composition , arrangement , keyboard , drum , bass
Krysta Youngs – lyrics , composition , background vocals
Telykast – composition , arrangement , instrumentation , drums , keyboard , computer programming
Millionboy – composition , arrangement , instrumentation
Hong Ji-sang – composition , arrangement , background vocals , electric guitar , bass , keyboard , computer programming
JinbyJin – composition , arrangement , guitar , piano , synthesizer , computer programming , vocal directing
Moa "Cazzi Opeia" Carlebecker – composition
Gabriel Brandes – composition
Earattack – lyrics , composition , arrangement , background vocals , instrumentation
Callous – lyrics
DaviDior – composition , arrangement , instrumentation
Nickko Young – guitar
Armadillo – composition , arrangement , instrumentation
Gump – composition , arrangement , instrumentation
Jung So-ri – guitar
Jeon Sang-min – piano
Yi Sung-chan – bass
Holy M – composition , arrangement , bass , computer programming
Kobee – composition , arrangement , guitar , drum , computer programming
Technical
KayOne Lee – digital editing
HotSauce – digital editing
Lee Hwa-shin – digital editing
Jung Yu-ra – digital editing
Woo Min-jung – digital editing
Lee Sang-yeop – recording
Lim Hong-jin – recording
Goo Hye-jin – recording
Eom Se-hee – recording
Hong Ji-sang – recording
Park Eun-jung – recording , mixing
Bang Chan (3Racha) – recording
Choi Hye-jin – recording , mixing
Yoon Won-kwon – mixing
Tony Maserati – mixing
Master Key – mixing
Jay-P Gu – mixing
Shin Bong-won – mixing
Lee Tae-sub – mixing
David K. Younghyun – mix engineering
Kang Seo-yeon – mix engineering
Kwon Nam-woo – mastering
Chris Gehringer – mastering
Will Quinnell – mastering assistant
Others
J.Y. Park "The Asiansoul" – executive producer
Jimmy Jeong – executive producer
Bang Jae-yeob – video production, director
Jung Min-hee (Mu: Creative) – photographer
Kim Chan (Prod) – photographer
Jay – hair/makeup director
Seo Ji-hye – hair/makeup director
Jung Min-ju – hair/makeup director
Jeon Ji-won – hair/makeup director
Park Jung-ah – style director
Lee So-young – style director
Ahn Yu-na – style director
Hyun Seung-jae (Zesstype) – album logo design
Laundry Office – album design
Locations
JYP Publishing (KOMCA) – original publishing , sub-publishing
153/Joombas Music Publishing – original publishing
Trevor Klaiman Music (BMI) – original publishing
Kyle M T Music (ASCAP) – original publishing
Linus AK Music (ASCAP) – original publishing
Petal Rock Publishing (ASCAP) – original publishing
Copyright Control – original publishing , sub-publishing
EKKO Music Rights Europe (powered by CTGA) – original publishing , sub-publishing
Fujipacific Music Korea Inc. – sub-publishing
JYPE Studios – recording , mixing
Jisang's Studio – recording
Channie's Room – recording
Studio DDeepKick – mixing
Chapel Swing Studios (Valley Glen) – mixing
821 Sound – mixing , mastering
Klang Studio – mixing
Glab Studios – mixing
Sterling Sound – mastering
Charts
Weekly charts
Monthly charts
Year-end charts
Certifications and sales
Release history
See also
List of best-selling albums in South Korea
List of Gaon Album Chart number ones of 2021
References
2021 albums
JYP Entertainment albums
Korean-language albums
Stray Kids albums
|
50077408
|
https://en.wikipedia.org/wiki/Digital%20Guardian
|
Digital Guardian
|
Digital Guardian is an American data loss prevention software company that produces products designed to detect and stop malicious actions by users and malware on endpoints. Digital Guardian provides software both at the end-user level and in corporate networks, servers, databases, and the cloud. These products are designed to detect and stop malicious actions by users and malware on endpoints. It puts data events into context and applies a granular set of rules to protect it against threats.
The company holds 20 patents for its technology. Its customers include about 300 Global 2000 companies, as well as seven of the 10 largest brands in the world. It is considered to be a leader in the global data loss prevention market.
History
The company was founded in 2003 under the name Verdasys. From the start, its flagship product was Digital Guardian, a data-centric security platform monitoring and encrypting all proprietary or sensitive information passing through a desktop, laptop, or enterprise server.
In 2008, Verdasys launched SiteTrust, an encryption software service for banks, brokerages, and other big companies that served customers over the Internet and were legally liable for losses from online fraud. Its client-side software package turned on whenever the user visited a website protected by the SiteTrust service and spawned a new instance of the user's Web browser, shutting out malware and creating a secure space around all communications with the protected site.
An agreement between Verdasys and Fidelis Security Systems (now Fidelis Cybersecurity) in 2010 enabled customers to acquire and implement an integrated solution consisting of Fidelis XPS network appliances and Digital Guardian enterprise information protection in a single offering from Verdasys.
In early 2012, Verdasys expanded its data leak prevention portfolio to the cloud to help enterprises protect their data stored on its networks and reduce costs. When one of its customers, a large insurance company, requested Verdasys to take over the job of monitoring and protecting the data, Verdasys introduced two new offerings: Managed Service for Information Protection (MSIP) and Information Protection as a Service (IPaaS), offering data protection as a managed service. The Digital Guardian platform completed EAL2+ evaluation under the Communications Security Establishment's Common Criteria Evaluation and Certification Scheme in December 2012.
Verdasys introduced a data connector in 2013 that contained malware threats detected by FireEye's platform. Before Verdasys' connector, the malware had to be handled manually. In December, Gartner's Magic Quadrant placed Digital Guardian among the five leaders of the global data loss prevention market.
Ken Levine, previously a McAfee executive, joined the company as CEO in 2014 and focused on simplifying its product. In March, Verdasys raised $12 million in a venture funding, bringing the company's total raised capital to $69 million. The funding round was led by existing investors GE Pension Trust and Fairhaven Capital, with a new, individual investment from Brookline Venture Partners.
2014 was also a year of several major partnerships and acquisitions. In March, Identity Finder LLC partnered with Verdasys, bringing its Sensitive Data Manager, capable of automatically finding, classifying and securing sensitive information. In August, Verdasys changed its name to Digital Guardian and increased its staff to 150. At the time, its security software had been installed on about two million servers, laptops or other devices.
In October, the company acquired Armor5, a provider of cloud control solutions focusing specifically on preventing employees who bring their own mobile device to work from copying and removing company files or data.
In May 2015, the company acquired Savant Protection, enabling IT organizations to deploy a unique agent for whitelisting the applications that can be used on any particular endpoint. When Blue Coat Systems launched the Alliance Ecosystem of Endpoint Detection and Response in July 2015, Digital Guardian was among the alliance-founding members. The ecosystem allows sharing of actionable intelligence gathered from endpoint security solutions. Also in July, IT consulting firm Atos and Digital Guardian partnered up to deliver Atos’ cloud-based data loss prevention service.
In October, the company bought Code Green Networks, based in Silicon Valley, which contributed its True DLP gear. The acquisition of Code Green Networks provided Digital Guardian with network, discovery, and cloud data loss prevention.
The company added 100 customers in 2015, bringing the total count to nearly 500, including General Electric and DuPont. At the end of the year, Digital Guardian announced $66 million in new funding, the firm's largest round since it was founded. Returning investors in the round were GE Pension Trust (advised by GE Asset Management), Fairhaven Capital Partners, Loring Wolcott & Coolidge, Special Situation Funds and Brookline Venture Partners. New investors were LLR Partners, Mass Mutual Ventures (the corporate venture capital arm of Massachusetts Mutual Life Insurance Company) and the venture unit of Siemens Financial Services. The company raised $135 million since its founding.
In January 2016, Gartner's Magic Quadrant for Enterprise Data Loss Prevention placed Digital Guardian among the four leaders of the global data loss prevention market for the fourth consecutive time. BostInno included Digital Guardian among 16 Boston tech firms to watch in 2016. The company was placed 148th on the list of top 500 cybersecurity firms in the world, released by Cybersecurity Ventures in 2015.
Products and services
A data loss prevention software platform, Digital Guardian integrates content, context and location awareness along with encryption and data level controls to reduce the risk of information loss or misuse, and purposeful data theft. Its host-based security technology empowers organizations to monitor, control, audit and prevent data from wrongful disclosure or malicious theft, while automatically enforcing data security policies and procedures. This scalable platform provides multiple, independent layers of protection to enable secure data sharing across physical, virtual, mobile and cloud environments.
The architecture of the platform has three parts:
Digital Guardian for Data Visibility and Control enables users to understand where an organization's sensitive data is and how it's being used with kernel-level data visibility, while also delivering device control and encryption.
Digital Guardian for Data Loss Prevention adds deeper data visibility and fine-grained control and protection to stop insider threats, and includes advanced classification by context, content and user with email and file control and encryption.
Digital Guardian for Advanced Threat Protection provides real-time threat protection by following the attack sequence from initial contact through many attack stages, while offering flexible controls to defend in a manner commensurate with the customer's risk tolerance. It also extends the existing security ecosystem with integrations with network solutions, like FireEye, and SIEM technologies, such as Splunk.
Digital Guardian allows businesses to host and manage on premise or choose managed security programs. When deployed as a managed service, Digital Guardian does not collect the actual data itself. Rather, it aggregates the metadata about the files and documents and watches for patterns of activity. Metadata is encrypted, hashed and digitally signed before being transferred to Digital Guardian's hosting facilities via FIPS 140-2 certified messaging protocol. Digital Guardian then provides updated analytics, alerts and reports. Administrators can continuously monitor data, application and system access and usage, whether end users are online, offline or in virtual environments. Organizations can apply specific risk-based policy controls to adhere to data governance and compliance rules.
For example, the health service organization Cigna uses Digital Guardian software to monitor all ports and encrypt data transfers. When employees try to transfer files to a USB flash drive, they are prompted to type in the reasons for the transfer. The data they actually transferred is compared to those reasons.
Digital Guardian also provides support for the ShareFile file sharing and storage systems, extending data loss prevention capabilities to organizations that support virtual desktops.
References
External links
Computer security software companies
Software companies established in 2003
Software companies of the United States
Companies based in Middlesex County, Massachusetts
|
38400822
|
https://en.wikipedia.org/wiki/HTC%20One%20%28M7%29
|
HTC One (M7)
|
HTC One (codenamed and retroactively called M7) is a touchscreen-based Android smartphone designed, developed, and manufactured by HTC. The smartphone was unveiled on 19 February 2013 at press events in New York City and London and is HTC's seventh flagship smartphone. It is the successor to the company's 2012 flagship model, the One X—which was critically acclaimed, but commercially unsuccessful due in part to insufficient marketing efforts. To make the device stand out among its competition, HTC One was developed with a major emphasis on unique hardware and software features; which included a unibody aluminum frame, a 1080p full-HD display, dual front-facing stereo speakers, a camera with a custom image sensor and the ability to automatically generate montages of media, an updated version of HTC's Sense user experience, BlinkFeed—an aggregator of news and social network content, and an electronic program guide app with the ability to serve as a universal remote via an IR blaster located in the device's power button.
Beginning in March 2013, HTC One was made available to mobile operators and major retailers in at least 181 countries. Manufacturing delays led to a staggered release beginning in late March, with its release date in certain markets (such as Asia and North America) pushed to late-April. Nevertheless, with around 5 million units being sold during its first two months of worldwide availability, HTC stated that the One was the most successful launch in the company's history.
HTC One was praised for the quality of its industrial design, high-density 468 ppi display, and high-power 2.6W RMS stereo sound system, and was well-received for its overall performance and improved user experience in comparison to earlier HTC devices. However, some aspects of the device, such as its photo quality, battery life, and certain elements of the device's operating system, were subject to scrutiny by critics. The device has received numerous awards and accolades, including being named "Best New Mobile Device" by the GSM Association at Mobile World Congress 2013, and was named the best smartphone of 2013 at the same conference one year later. It was succeeded by HTC One (M8) on 25 March 2014.
History
Development
Although HTC has developed several notable Android devices, such as Dream — the first publicly released Android device, it failed to capitalize on first-mover advantage, and has struggled financially in recent years due to the increasing market share captured by other vendors, such as Samsung and Apple. In some markets, HTC released numerous carrier-specific phones and relied heavily on wireless providers to promote its products, a strategy that was unsuccessful in the face of Samsung and Apple's strong marketing efforts. The company's flagship phone in 2012, the One X, received critical acclaim from reviewers, but was commercially unsuccessful in the wake of Samsung Galaxy S III and iPhone 5. In response, the company planned to take bigger risks with their next flagship device to make it stand out among its competitors, and also planned to take a more direct role in promoting its products—doubling its marketing budget for 2013.
Details of the new device, codenamed "M7", were leaked from various sources in the weeks prior to its official unveiling. HTC's CEO Peter Chou officially confirmed and briefly revealed a prototype for the new device during a company event on 1 February 2013. Leaked information speculated that the M7 would include a 1080p display, a quad-core processor, a redesigned version of HTC's Sense software, and carry design traits from HTC Butterfly. The M7 was officially unveiled under the HTC One product line at a special launch event on 19 February 2013, in New York City and London. HTC originally announced that HTC One would be released worldwide in March 2013 through 185 carriers and retailers in 80 countries, making it the largest global launch in the company's history.
Release
HTC initially announced that the One would be released in the United Kingdom on 15 March. However, due to high demand and supply issues (especially surrounding the components used by its camera), HTC announced on 22 March that the device would "roll out in the U.K., Germany and Taiwan next week and across Europe, North America and most of Asia-Pacific before the end of April." In the United Kingdom, online pre-orders were shipped by some carriers around the time of HTC's announcement. In late-April 2013, HTC One was released across major carriers in the United States and Australia, and a network-unlocked 32 GB version also became available on the HTC web store. In the United States, the 64 GB HTC One is exclusively sold by AT&T. Following the delays, HTC North Asia's president Jack Tong announced that the company would double its production capacity for the device by mid-May to meet growing demand and competition for the device, and to make up for sales lost by the release delays. On 22 August 2013, four months after it was released by its competitors, Verizon Wireless became the final major carrier to release HTC One in the United States.
Alongside its stock silver model, HTC One has been offered in three additional color finishes; black, red, and blue. Color variants are exclusive to certain carriers and retailers; in Australia, the black variant is exclusive to Telstra, while the red variant (released in July 2013) has been exclusive to Phones 4u in the UK and Sprint in the United States. The blue variant (released in September 2013) is exclusive to Carphone Warehouse in the UK and Best Buy in the U.S. A champagne-colored HTC One was released on select European carriers in late-November 2013.
A special variant electroplated in 18 carat gold was unveiled by HTC in October 2013 as part of a collaboration with Goldgenie and the Music of Black Origin Awards. Five models were produced in a limited production run; out of the five, one model was given to the winner of the "Best Newcomer" category at the ceremony in Glasgow on 19 October, and others were given away in a promotional contest. Discussing the partnership, HTC's EMEA president Phil Blair explained that "the best artists have always been given gold discs to celebrate their success, but today most people listen to music on their phone. We wanted to celebrate that fact." Valued at US$4,442 (£2,750), the gold HTC One is the most expensive product produced in company history.
Litigation
In April 2013, Nokia was granted a preliminary injunction in the Netherlands against STMicroelectronics, which had supplied HTC with microphone components for the device that contained Nokia's proprietary technology. Despite the injunction being against STM, Nokia still used the injunction to publicly accuse HTC of copying technology from its products. HTC would still be able to use the remaining microphones it acquired in good faith; the offending component was replaced with an alternative version in future production runs.
In December 2013, HTC One Mini was banned from sale in the United Kingdom as the result of another patent infringement lawsuit by Nokia. While HTC One was also affected by the ruling, its sales ban was stayed by the court pending an appeal; the judge indicated that banning HTC One sales would have a negative effect on the company. The case also inadvertently revealed, that HTC was planning to launch a successor to HTC One in early 2014.
Features
Design
HTC One uses a unibody aluminum frame sourced from custom-grade aluminum; the choice of material was intended to give the device a solid, premium feel in comparison to smartphones made with a plastic shell. The frame is etched with channels in which the polycarbonate is inset using zero-gap injection molding. The polycarbonate forms a band around the edge of the device, covers the top and bottom ends, and bisects the back with two lines, one of which flows around the camera below. The two polycarbonate bands across the back are used to insulate its antennas, while the ring around the camera is used as a loop antenna for the One's near field communication (NFC) functionality. Alongside its display are two aluminum endpieces with a tight grid of laser-cut holes forming the speaker grilles behind which sit two stereo sound speakers; the metal volume keys are smoothly inlaid on the left side of the frame. The unibody frame itself takes at least 200 minutes of precision CNC cutting to machine, and the final result is a solid slate of anodized aluminum, white polycarbonate, and tempered glass with chamfered, polished edges.
Two capacitive navigation keys, "Back" and "Home", are located below the display, flanked by HTC's logo in the center. While other recent HTC devices (such as the One X) used a three-key layout with "Back", "Home", and "Recent apps" keys, HTC designers believed that using only two navigation keys as opposed to three would reduce user confusion. As with other HTC devices lacking a hardware "Menu" key (as per revised Android human interface guidelines introduced in 2012, which deprecate their use), apps that have not been updated to reflect the newer guidelines display a "Menu" button on a black bar on the bottom of the screen.
Hardware
HTC One uses a 4.7 inch, 1080p Super LCD 3 touchscreen display with a pixel density of 468 ppi. The backside of the device houses the camera, the LED flash, and the secondary microphone. At the top of the device is a 0.14-inch (3.6 mm) headphone jack and the power/lock key, which also functions as an infrared blaster. At the bottom is the primary microphone and a microUSB port for both data connections and charging; the device can stream HDMI via the microUSB port using MHL.
The device incorporates a 1.7 GHz quad-core Snapdragon 600, an ARMv7 SoC, with 2 GB of RAM. The chip provides support for LTE networks where they are available. Most HTC One models come with either 32 or 64 GB of internal, non-expandable storage—unlike the international model, the Chinese and Japanese models include a microSD slot and a removable back cover. Its internal components are arranged in a pyramid-like layout similar to HTC Butterfly and HTC Windows Phone 8X with larger components (such as the screen and battery) positioned towards the front and smaller components (such as the motherboard) positioned towards the back. This internal layout also allows the device to have a curved backing.
The One's audio system incorporates two front-facing BoomSound stereo speakers, Beats Audio software equalizer, and HDR audio recording. The BoomSound stereo system is controlled by two five-volt NXP TFA9887 integrated circuits combining NXP's CoolFlux audio DSP, a class-D amplifier with current sensing, and a DC-to-DC converter to boost the output level of micro-speakers up to five times (up to 2.6 W RMS) without damaging the driver.
Camera
HTC One is equipped with a 4.0-megapixel rear-facing camera module that contains a custom image sensor marketed as UltraPixel, which is composed of pixels that are 2.0 µm in size. Most high-end smartphones at the time of its release used 8- or 13-megapixel cameras with pixel sizes ranging from 1.4 to 1.0 µm, both of which are considerably smaller in size than the pixels found in the One's UltraPixel sensor. Although these smaller pixel sizes were typically necessary to ensure that the camera sensor did not compromise the design of the phone, there were concerns that this could result in a loss of dynamic range and sensitivity, and also result in poor performance in low-light environments. As such, HTC stated that its camera design with larger sensor pixels could notably increase overall image quality, especially in low-light environments. The camera also includes optical image stabilization, and is further enhanced by improvements to the Sense camera software and the ImageChip 2 image processor.
In September 2013, HTC confirmed "isolated reports" of users experiencing a purple or red tint with the camera in low-light conditions. The company stated that it had been working to correct these issues, and would release a fix in a later software update. That fix was not launched until the end of 2015, leading to the need to send the devices to be physically repaired by HTC.
Operating system and software
HTC One is powered by Android, a Linux-based open source operating system developed by Google. Among other features, the software allows users to maintain customized home screens which can contain shortcuts to applications and widgets for displaying information. Four shortcuts to frequently used applications can be stored on a dock at the bottom of the screen; the button in the center of the dock opens the application drawer, which displays a menu containing all of the applications installed on the device. A notifications tray accessible by pulling from the top of the screen allows users to view notifications received from other apps, as well as enable the One's "Power Saver" mode.
Pre-loaded applications on HTC One provide access to Google's various services, including Google Play, which can be used to download and purchase apps, music, movies, and e-books. Other pre-installed apps on HTC One include a browser with Adobe Flash support, Calendar, Contacts, Dropbox, Facebook, FM Radio, Google Chrome for Android, Kid Mode, Music, Notes, Polaris Office, SoundHound, Tasks, TuneIn Radio, and Weather (data provided by AccuWeather). The Recent Apps menu, which displays nine recently opened apps on a grid of thumbnails, is accessed by double-tapping the Home key, while Google Search is accessed by long-pressing the key. As with previous devices in its series, and adhering to its official deprecation in Android 3.0, HTC One does not include a "Menu" button. By default, apps which are not specifically built for Android 3.0 or later display a virtual menu key on a black bar at the bottom of the screen; this black bar is removable in Android 4.2.2 and later if users choose to enable the "Menu" key functionality by long-pressing the "Home" key.
HTC One shipped with Android 4.1.2 "Jelly Bean" and version 5.0 of HTC's proprietary Sense software suite. In comparison to previous versions of the software, Sense 5 uses a flat, minimalist visual style with refreshed icons and the condensed variant of the Roboto font family. Instead of a traditional home screen display with apps and widgets, Sense 5 defaults to a screen known as BlinkFeed, a news aggregator which displays a scrolling grid of news headlines from selected sources (as syndicated by Mobiles Republic) and social network content in a similar fashion to Flipboard and Windows Phone’s live tiles. New content is synchronized every two hours when connected to a mobile network, but more frequently while on Wi-Fi. Directly above the BlinkFeed display is a clock which displays the user’s local time and weather forecast; the signature flip clock widget seen on previous HTC devices was replaced by a simpler digital clock for Sense 5. Hundreds of different clock designs by HTC’s designers, narrowed down to 25, were considered before the final design was chosen. As with previous versions of Sense, users can still add or remove pages on the home screen for housing app shortcuts and widgets; one such page is provided by default, and which page to display by default can be set by the user. However, BlinkFeed will always occupy the left-most page of the home screen. The application drawer uses a 3x4 grid to display application shortcuts by default, but can still be changed back to the denser 4x5 grid used by past versions. Apps can also be sorted into folders within the drawer; a number of preset folders are provided, such as "Google", "Media", "Productivity", "Tools", and pre-loaded apps provided by the user's wireless carrier, where applicable.
The camera app includes a new shooting mode known as Zoe (alluding to the zoetrope), which captures a short video alongside each photo taken. Individual frames can be saved from the clip, while the frames can also be used with other editing features such as Sequence Shot (which superimposes multiple frames into a composite image). Photos taken in Zoe mode are also displayed with animated thumbnails in the gallery. The Highlights feature can automatically generate a montage video from photos and videos with multiple theme and soundtrack options. The resulting video can be exported, or posted online through the HTC Share service (where they are accessible for 30 days). A television guide app is also provided, which incorporates remote control functionality via an infrared blaster hidden in the One's power button, show recommendations powered by Peel, and the ability to display show reminders as stories on BlinkFeed. An updated music app now includes a visualizer and support for on-screen lyrics. An updated version of the Get Started feature (as introduced by HTC One X+) allows users to perform initial setup for their One via a web-based service, while a new Sync Manager allows data to be migrated from iOS device backups or HTC devices with Android 4.0 and higher. As with all devices in the One series, 25 GB of Dropbox storage is available free for two years. Using NFC, the One can also share content between other compatible Android devices with Android Beam, and conduct mobile payments where compatible systems (such as FeliCa in Japan) are available.
Software revisions
In July 2013, HTC began rolling out an upgrade to Android 4.2.2 in selected regions; alongside internal changes, it added a quick settings panel to the notification area, Instagram support for BlinkFeed, auto focus/auto exposure lock to the camera, additional Highlights themes, and optimized how Zoes are saved (producing a static JPG and a MP4 video file, instead of saving each frame as a separate image file). The upgrade also added the ability to show the current battery percentage on the status bar, more consistent behavior for the home key, allows the removal of icons from the home screen's dock, allows the Home key to serve as the deprecated "Menu" key in certain apps by long-pressing (in lieu of displaying it on a black bar on-screen), allows Google Now to be accessed by swiping up from the home button, and adds support for displaying widgets on the lock screen (however, unlike stock Android, only one widget can be placed on the lock screen at a time).
In North America, Android 4.2.2 was only available as the pre-loaded software on Verizon Wireless' HTC One, since HTC considered 4.2 to be relatively minor on smartphones. Instead, North American models were to be upgraded directly to Android 4.3, which was scheduled for a release in late-September 2013. HTC had previously released the Android 4.3 upgrade for the Google Play edition in early August 2013. On 25 September 2013, HTC began rolling out the upgrade, starting with unlocked models. Alongside the internal changes introduced by Android 4.3, the update adds the ability to use custom soundtracks on Highlights videos, and also corrects low-light camera issues introduced by the 4.2.2 upgrade.
In late-October 2013, HTC released Sense 5.5 for HTC One, a software revision which adds RSS and Google+ support to BlinkFeed, allows users to disable BlinkFeed entirely, adds a tool for making animated GIFs, and additional Highlights themes. Shortly after its unveiling on 31 October 2013, HTC confirmed an upcoming release of Android 4.4.2 for all HTC One models, beginning with the Google Play version, and for Sense-equipped models in January 2014. For 4.4, HTC introduced a web page that allows users to track the development and release process of Android upgrade for its products, and aimed to release the 4.4 upgrade for HTC One within 90 days of the release of its source code.
An update to HTC Sense 6.0, as introduced on HTC One (M8), was released in May 2014. The update introduces a refreshed interface with updated versions of stock apps such as BlinkFeed, customizable color themes and fonts, along with a new "Extreme Power Saving Mode", which caps CPU usage and disables non-essential applications, multitasking services, and sensors to conserve battery life when running low; the mode only allows access to the phone, messaging, e-mail, calendar, and calculator apps.
Following its unveiling, HTC committed to releasing updates to Android 5.0 "Lollipop", again within 90 days of the release of its source code. Per this commitment, HTC planned to release Lollipop by the end of January 2015, but the company missed its deadline due to bugs in the operating system that needed to be addressed by Google. Android 5.0 was released for unlocked HTC One models on 6 February 2015. Android 5.0 is the final version of Android that will be made available to HTC One models with firmware serviced by HTC, as only models with firmware serviced by Google will receive Android 5.1.
Model variants
Several hardware and software variants of HTC One were released in selected regions in 32 GB and 64 GB models. HTC One 801e (M7_U) was released in Taiwan. HTC One 801s (M7_UL) was released in Australia, Hong Kong, and Singapore. HTC One 801n (M7_UL) was released in Europe, the Middle East and Africa. HTC One 801n LTE versions (M7_WLJ, M7_WLV), the Verizon HTC One HTC6500LVW (M7_WLV) LTE version, and the Sprint HTC One (HTC M7_WLS) LTE version were released in North America only in 32 GB models. HTC J One HTL22 was released in Japan, and HTC TD101 802w/d/t in mainland China. A developer edition and Google Play edition were also released in the United States in 32 GB and 64 GB models.
Developer Edition
A Developer Edition of the 64 GB HTC One was released in limited quantities in the United States, exclusively from HTC's website on 19 April 2013. This variant ships with an unlocked bootloader, which can be used for the development and installation of custom ROMs. The Developer Edition is also unlocked for use on GSM and LTE networks of T-Mobile and AT&T; however, it does not support T-Mobile's AWS-based HSPA+ network.
Google Play edition
On 30 May 2013, HTC announced that Google Play would sell a variant of HTC One with a stock Android operating system as a Google Experience device (similarly to Nexus devices). It was released in the United States on 26 June 2013 alongside a similar version of Samsung Galaxy S4. While still carrying Beats Audio support, infrared functionality was not initially available, but was enabled by the update to Android 4.3.
Chinese variant
HTC One variants were unveiled for release in China in late-April 2013 with HTC TD101 802w for China Unicom, HTC TD101 802d for China Telecom, and HTC TD101 802t for China Mobile. Unlike the international version, the Chinese models feature a removable back cover, exposing a microSD slot for storage expansion and dual SIM card slots. Complementing this feature, a special edition with a Wang Leehom-autographed back cover was also released. HTC stated that it was able to include an SD card slot in the Chinese model because its radio hardware did not take up as much internal space as that of the international models.
Japanese variant
An HTC One variant known as HTC J One (HTL22) or One J was announced for Japanese carrier au by KDDI in May 2013. J One is similar to the Chinese versions, and includes support for the NFC-based payment system FeliCa.
Reception
Critical reception
HTC One was released to favorable reviews. At the 2013 Mobile World Congress, it won the "Best New Mobile Device" award from the GSM Association, and received TechRadar’s "Best Phone" and "Best in Show" awards. Following its release, HTC One also received an "Editor’s Choice Gold" award from AnandTech. In August 2013, HTC One was awarded "Best European Advanced Smartphone 2013–2014" by the European Imaging and Sound Association, and at the T3 Gadget Awards 2013, HTC One won "Gadget of the Year", "Phone of the Year", and the T3 Design Award. At Mobile World Congress 2014, it was named the best smartphone of 2013 during the Global Mobile Awards.
Walt Mossberg of The Wall Street Journal favored the One over its closest rival, Samsung's Galaxy S4, considering the One to be "more polished-looking, and quite capable" in comparison. In a later review conducted 4 months later in August 2013, Boy Genius Report’s Zach Epstein also favored the One over the Galaxy S4, stating that "among the [Galaxy S4, Moto X] and the rest of the Android phones on the market right now, the HTC One is in a class by itself". Epstein cited differences in hardware construction and industrial design, as well as various features of Sense 5.0; one example included the higher-quality IR blaster and TV app on the One compared to the S4.
The New York Times''' technology columnist David Pogue praised the attention to detail in its design, along with its performance, camera, and display quality; and considered it to be "the most beautiful [Android phone] you’ve ever seen". However, Pogue criticized HTC's continuing usage on the Sense user interface, the arrangement of its physical navigation keys, the inability for users to expand its storage or replace its battery, and its "typical [one day] 4G LTE Android" battery life. In conclusion, Pogue stated that "you could quibble with the software overlays, but it would be hard to imagine a more impressive piece of phone hardware."The Verge gave HTC One an 8.3 out of 10; aside from the positioning of its power button and navigation keys, which were considered to be hard to reach, its hardware design was praised for having a "totally unique and somehow still understated" look, while its 1080p display was considered to be one of the sharpest displays on a smartphone—although not bright enough to be seen properly in direct sunlight. In combination with its stereo speakers, the One was considered a good phone for viewing videos and playing games, while its call quality was judged as being sufficient. With regard to performance, HTC One was considered to be "an impressively powerful phone across the board" due to its high scores on various benchmark tests. Its camera received mixed reviews; while it had better low-light performance than its competitors as advertised, the One's photos were criticized for looking "soft and mushy" due to extensive post-processing and only looked relatively good at smaller sizes applied by services such as Facebook and Instagram. The Zoe features were considered unique and useful, but the HTC Share service was panned for being "kind of like Vine, except [that] your clips only last a few months and no one’s ever going to use it." The One was also criticized for its "decidedly average" battery life, and for some of the "unintuitive" design changes that HTC made to the Android UI.Wired’s Michael Calore praised HTC One’s "truly gorgeous" and "seamless" design, and considered the quality of its internal speakers to be the best of any smartphone thus far. The display was considered to be sharp with "faithful" color reproduction, but too dim for use in bright sunlight. Its camera was panned for producing images that lacked the sharpness of its competitors, but the camera software itself was still noted for its advanced options and Zoe shooting mode. HTC One's user interface was considered cleaner and closer to the stock Android design than previous releases, while BlinkFeed was considered to be "slick" and "useful", yet "far from original". Some of HTC's changes to the Android UI were criticized, including its "cramped" on-screen keyboard, and its deviation from the common three-key button layout used by other manufacturers. Calore also criticized HTC for shipping the phone with Android 4.1.2 when Android 4.2 had been released three months prior to its official announcement. These factors, along with unsatisfactory battery life experienced by Calore, prompted him to give HTC One a rating of 7.0 out of 10.
The One's industrial design and camera were also praised by both CNET (who gave the phone a 4 out of 5) and PC Magazine (who gave the phone an Excellent rating); however, PC Magazine criticized the inability to properly perform digital cropping and zooming on images taken with the camera, along with the non-removable "bloatware" applications added by AT&T in its version. CNET panned BlinkFeed for its lack of content sources and for not being able to use custom sources or turn it off completely, but praised the updates to Sense and the TV app. Again, the "bloatware" added by Sprint and AT&T was criticized, but HTC's placement of carrier apps in their own separate folder in the application drawer was noted.
Sales
On 23 May 2013, The Wall Street Journal'' reported that sales of HTC One had reached around 5 million since its launch in March. By comparison, Apple's iPhone 5 sold five million units within its first three days of availability and Samsung Galaxy S4 shipped 10 million units within its first month of availability. While not quoting any further numbers, Mark Woodward, president of HTC's North American division, considered HTC One's launch to have been the most successful in the company's history. In response to its success, HTC released two other HTC One-branded devices throughout 2013 that extended traits and design elements from the device into other form factors, including the mid-range HTC One Mini, and HTC One Max phablet.
See also
Comparison of smartphones
References
External links
Android (operating system) devices
One
Mobile phones introduced in 2013
Discontinued smartphones
Smartphones
Mobile phones with infrared transmitter
|
367329
|
https://en.wikipedia.org/wiki/Open%20Inventor
|
Open Inventor
|
Open Inventor, originally IRIS Inventor, is a C++ object oriented retained mode 3D graphics toolkit designed by SGI to provide a higher layer of programming for OpenGL. Its main goals are better programmer convenience and efficiency. Open Inventor exists as both proprietary software and free and open-source software, subject to the requirements of the GNU Lesser General Public License (LGPL), version 2.1.
Early history
Around 1988–1989, Wei Yen asked Rikk Carey to lead the IRIS Inventor project. Their goal was to create a toolkit that made developing 3D graphics applications easier to do. The strategy was based on the premise that people were not developing enough 3D applications with IRIS GL because it was too time-consuming to do so with the low-level interface provided by IRIS GL. If 3D programming were made easier, through the use of an object oriented API, then more people would create 3D applications and SGI would benefit. Therefore, the credo was always “ease of use” before “performance”, and soon the tagline “3D programming for humans” was being used widely.
Use
OpenGL (OGL) is a low level application programming interface that takes lists of simple polygons and renders them as quickly as possible. To do something more practical like “draw a house,”the programmer must break down the object into a series of simple OGL instructions and send them into the engine for rendering. One problem is that OGL performance is highly sensitive to the way these instructions are sent into the system, requiring the user to know which instructions to send and in which order, and forcing them to carefully cull the data to avoid sending in objects that aren't even visible in the resulting image. For simple programs a tremendous amount of programming has to be done just to get started.
Open Inventor (OI) was written to address this issue, and provide a common base layer to start working with. Objects could be subclassed from a number of pre-rolled shapes like cubes and polygons, and then easily modified into new shapes. The “world” to be drawn was placed in a scene graph run by OI, with the system applying occlusion culling on objects in the graph automatically. OI also included a number of controller objects and systems for applying them to the scene, making common interaction tasks easier. Finally, OI also supplied a common file format for storing “worlds,” and the code to automatically save or load a world from these files. Basic 3D applications could then be written in a few hundred lines under OI, by tying together portions of the toolkit with “glue” code.
On the downside OI tended to be slower than hand-written code, as 3D tasks are notoriously difficult to make perform well without shuffling the data in the scene graph by hand. Another practical problem was that OI could only be used with its own file format, forcing developers to write converters to and from the internal system.
Performer
About a year into the Inventor project, a different philosophy began to emerge. Instead of simply making it easy to write applications on SGI systems, the goal was changed to make it difficult to write slow applications. Members of the Inventor team left to form their own group, which founded the basis of the OpenGL Performer project. Performer was also based on an internal scene graph, but was allowed to modify it for better speed as it saw fit, even dropping “less important” objects and polygons in order to maintain guaranteed performance levels. Performer also used a number of processes to run tasks in parallel for added performance, allowing it to be run (in one version) on multiple processors. Unlike Inventor, Performer remained proprietary so that SGI would have the agility to modify the API as needed to keep in step with the latest hardware enhancements.
Mid 1990s
At some point in the mid-1990s it was realized that there was no good reason that the two systems could not be combined, resulting in a single high-level API with both performance and programmability. SGI started work on yet another project aimed at merging the two, eventually culminating in Cosmo 3D. However Cosmo had a number of practical problems that could have been avoided with better design.
Eventually all of these ideas would come together to create the OpenGL++ effort, along with Intel, IBM and DEC. Essentially a cleaned up and more “open” version of Cosmo 3D, work on Cosmo ended and SGI turned to OpenGL++ full-time. The OpenGL++ effort would drag on and eventually be killed, and SGI then tried again with Microsoft with the similar Fahrenheit project, which also died. In 1994 SGI licensed Open Inventor to two third-party developers, Template Graphics Software (TGS) and Portable Graphics; in 1996 TGS bought Portable Graphics, making them the sole licensee.
Recent history
After many years of being solely available under proprietary licensing from TGS, now FEI, Inventor has been released under the LGPL open source license, in August 2000, which is available from SGI.
At approximately the same time, an API clone library called Coin3D was released by the company SIM (Systems in Motion). SIM was later acquired by the Kongsberg group and re-branded as Kongsberg SIM. The Coin library had been written in a clean room fashion from scratch, sharing no code with the original SGI Inventor library, but implementing the same API for compatibility reasons. Kongsberg ended development of Coin3D in 2011 and released the code under the BSD 3-clause license.
The open source version from SGI is not currently maintained and SGI has not shown any commitment to do further development of the library. However, the open source release is used in MeVisLab (MeVis Medical Solutions AG and Fraunhofer MEVIS) and development on it continues.
Thermo Scientific Open Inventor is still thriving, under active development and has added numerous improvements to the original Inventor API specifically for medical imaging, medical image computing, 3D reflection seismology, and petroleum reservoir modeling.
The Open Inventor API is still commonly used for a wide range of scientific and engineering visualization systems around the world, having proven itself well designed for effective development of complex 3D application software.
In 2004, TGS was acquired by Mercury Computer Systems, and in June 2009, the entity became an independent company again called Visualization Sciences Group (VSG). In 2012, VSG was acquired by FEI Company. In 2016, FEI Company was acquired by Thermo Fisher Scientific (Materials & Structural Analysis Division), which continues to develop and support Open Inventor.
References
External links
Official SGI Open Inventor Site
Thermo Scientific Open Inventor, Commercial implementation of the API
Open Inventor Users' Forum
Coin3D, Independent implementation of the API
3D scenegraph APIs
Application programming interfaces
C Sharp libraries
C++ libraries
Cross-platform software
Graphics libraries
Java (programming language) libraries
Java development tools
OpenGL
Software development kits
Software that uses Qt
Virtual reality
|
36933034
|
https://en.wikipedia.org/wiki/William%20Appleton%20%28entrepreneur%29
|
William Appleton (entrepreneur)
|
William "Bill" Appleton (born May 23, 1961) is an American entrepreneur and technologist best known as the programmer of the first rich media authoring tool World Builder, the multimedia programming language SuperCard, a best-selling CD-ROM Titanic: Adventure Out of Time, the DreamFactory Software REST API platform, and Snapshot Org Management for Salesforce.
Early life and background
Originally from Oak Ridge, Tennessee, Appleton graduated from Oak Ridge High School in 1979 before moving on to Davidson College, where he studied philosophy, painting and economics. In 1984 Appleton passed up an economics graduate fellowship at Vanderbilt University and moved into his parents’ basement, where he developed programs for his Macintosh computer.
Career
Appleton has designed and written more than 30 professional software publications throughout his career, including World Builder, the first-ever rich media authoring tool. Appleton also created the multimedia programming language SuperCard and developed Titanic: Adventure Out of Time, a national best-selling CD-ROM game that sold more than 5 million copies worldwide. He was the founder and Chief Technology Officer of DreamFactory Software and developed a serverless REST API platform in the enterprise space. Currently he is the Chief Technology Officer at Metazoa working on Snapshot Org Management for Salesforce.
In 1989, Appleton won the Silicon Beach Software Technical Innovation Award, presented for his work in hypermedia development environments. Appleton owns two patents. The first, issued in 1997, covers a method for the production of digital movies. The second, issued in 1998, describes a computer display system for the real-time display of digital movie frames.
Appleton’s software applications include the following:
Silicon Beach Software
1985, Enchanted Scepters
1986, World Builder
1988, Apache Strike
1989, SuperCard
TeleRobotics Inc.
1986, Course Builder
1987, Video Builder
Symmetry Corp
1988, HyperDA
Reactor
1991, Creepy Castle
Cyberflix
1993, Lunicus
1994, Jump Raven
1995, Dust: A Tale of the Wired West
1996, Skull Cracker
1996, Titanic: Adventure Out of Time
1996, Timelapse
1997, Power Rangers Zeo vs. The Machine Empire
1998, Redjack: Revenge of the Brethren
Disney Interactive
1997, MathQuest
1998, The D Show
1998, ReadingQuest
1999, Villains’ Revenge
MessageBay
2000, VoiceAnimation
2001, VideoAnimator
DreamFactory Software
2002, DreamFactory Player
2003, SBuilder
2005, DreamTeam
2006, OrgView
2006, SnapShot
2006, Carousel
2006, FormFactory
2006, Web Meeting Mashup
2008, TableTop
2008, Monarch
2009, GamePlan
2010, Retail Relay
2011, LaunchPad
2013, DreamFactory API Platform
CyberFlix
After stints in Silicon Valley and Chicago, Appleton moved back home to Knoxville, Tennessee. From 1994 to 1998, Appleton served as founder and president of Cyberflix Inc., a Knoxville-based multimedia computer programming company specializing in interactive movie production. While at Cyberflix, Appleton worked on the hit titles Lunicus and Jump Raven, both of which were sold to Paramount Technology Group. In a 1993 interview with the Chicago Tribune, Appleton discussed what he saw as the future of video game characters. "Great dramatic issues will be played out on CD-ROM, things that will play all of the human emotions, love hate, joy, greed, childbirth, death, promotion, firing – you name it," he was quoted as saying.
Cyberflix launched its hit title Titanic: Adventure Out of Time in November 1996. Production costs totaled $2 million, and the game retailed for $50. The Titanic title went on to sell millions of copies and become an international best-selling CD-ROM game. The game features an interactive, authentic replica of the Titanic ship that took two years of research to create digitally and included the use of the ship’s original blueprints. At the time, the Discovery Channel called it "the most historically accurate digital model of Titanic available." Titanic: Adventure Out of Time earned a MacHome Journal Home Choice Award in 1997, as well as a first place prize for best animation at the World Animation Celebration. By 1998, Cyberflix had 35 employees, and annual revenue exceeded $3 million. Throughout his career, Appleton has worked with Disney, Paramount and Viacom to create applications for content development.
DreamFactory
Appleton served as the chief technology officer of DreamFactory Software, a Campbell, California-based company he co-founded. DreamFactory builds software tools for the enterprise, originally targeting Salesforce.com users and currently developing a cloud service platform for enterprise companies to move their apps and data freely without any lock-in restrictions to any hosted cloud. Appleton is also credited with developing third-party enterprise applications for Cisco WebEx Connect, Microsoft Windows Azure and Intuit WorkPlace.
Personal life
Appleton lives in Los Gatos, California.
References
1961 births
Living people
People from Oak Ridge, Tennessee
Davidson College alumni
American computer programmers
American video game programmers
|
24950688
|
https://en.wikipedia.org/wiki/Brad%20A.%20Myers
|
Brad A. Myers
|
Brad Allan Myers is a professor in the Human-Computer Interaction Institute at Carnegie Mellon University. He earned his PhD in computer science at the University of Toronto in 1987, under Bill Buxton.
In 2017, Brad Myers received the Association for Computing Machinery's SIGCHI Lifetime Achievement Award in Research, for outstanding fundamental and influential research contributions to the study of human-computer interaction. Myers is the winner of nine best paper type awards and three Most Influential Paper awards and is the author or editor of 475 publications.
, Myers was the 28th most published author in the field of human-computer interaction. He was elected to the CHI Academy in 2004 as one of the "principal leaders of the field" of HCI and is an IEEE Fellow and an ACM Fellow. Myers is a leading researcher in the field of programming by demonstration and created the Garnet and Amulet toolkits. He is one of a select few who has attended every CHI conference. You can see documentation online of his extensive collection of CHI ribbons.
Education
Myers received his BS degree in Computer Science and MS degree in Computer Science and Engineering under MIT in 1980, whilst simultaneously interning at Xerox Parc for his Master’s thesis. He then received his PhD in Computer Science from the University of Toronto in 1987.
Work
Myers's work is focused on building computer systems, most of them have rock-themed names. His work since the 1970s at many distinguished institutes including Xerox Parc, MIT Architecture Machine Group (Now the Media Lab), and the Three Rivers Computer Corporation pioneered many systems and innovations that are still in use today. His work with window managers produced SAPPHIRE in the early 1980s, while working for PERQ Systems Corporation. It is one of the first commercial window managers with feature that became widely adopted such as progress bars.
Myers’s MIT Master’s thesis was one of the earliest data visualization systems. While working for PERQ Systems Corporation in the early 80s, Myers created Sapphire, one of the first commercial window managers with a number of features that later became widespread.
His University of Toronto dissertation described Peridot, a programming by demonstration system that specified the look and behaviors of widgets without conventional programming.
He has done a number of research projects on handheld devices, such as the Pebbles, exploring the different uses of these devices and how they communicate with other systems. Another focus of Myers's work is the Natural Programming project. It focuses on programming languages and making programming easier and more correct by making it more natural.
Memberships
Journal of Visual Languages and Sentient Systems.
Journal of Visual Languages and Computing.
Human-Computer Interaction Journal.
Interacting with Computers.
References
External links
Brad Myers's website
Human-Computer Interaction Institute
Amulet
Garnet
American computer scientists
Human–computer interaction researchers
Living people
Human-Computer Interaction Institute faculty
Year of birth missing (living people)
|
8605007
|
https://en.wikipedia.org/wiki/Entropic%20security
|
Entropic security
|
Entropic security is a security definition used in the field of cryptography. Modern encryption schemes are generally required to protect communications even when the attacker has substantial information about the messages being encrypted. For example, even if an attacker knows that an intercepted ciphertext encrypts either the message "Attack" or the message "Retreat", a semantically secure encryption scheme will prevent the attacker from learning which of the two messages is encrypted. However, definitions such as semantic security are too strong to achieve with certain specialized encryption schemes. Entropic security is a weaker definition that can be used in the special case where an attacker has very little information about the messages being encrypted.
It is well known that certain types of encryption algorithm cannot satisfy definitions such as semantic security: for example, deterministic encryption algorithms can never be semantically secure. Entropic security definitions relax these definitions to cases where the message space has substantial entropy (from an adversary's point of view). Under this definition it is possible to prove security of deterministic encryption.
Note that in practice entropically-secure encryption algorithms are only "secure" provided that the message distribution possesses high entropy from any reasonable adversary's perspective. This is an unrealistic assumption for a general encryption scheme, since one cannot assume that all likely users will encrypt high-entropy messages. For these schemes, stronger definitions (such as semantic security or indistinguishability under adaptive chosen ciphertext attack) are appropriate. However, there are special cases in which it is reasonable to require high entropy messages. For example, encryption schemes that encrypt only secret key material (e.g., key encapsulation or Key Wrap schemes) can be considered under an entropic security definition. A practical application of this result is the use of deterministic encryption algorithms for secure encryption of secret key material.
Russell and Wang formalized a definition of entropic security for encryption. Their definition resembles the semantic security definition when message spaces have highly-entropic distribution. In one formalization, the definition implies that an adversary given the ciphertext will be unable to compute any predicate on the ciphertext with (substantially) greater probability than an adversary who does not possess the ciphertext. Dodis and Smith later proposed alternate definitions and showed equivalence.
References
A. Russell and Y. Wang. How to fool an unbounded adversary with a short key. Appeared at Advances in Cryptology—Eurocrypt 2002.
Y. Dodis and A. Smith. Entropic Security and the encryption of high-entropy messages. Appeared at the Theory of Cryptography Conference (TCC) 2005.
Cryptography
|
24310774
|
https://en.wikipedia.org/wiki/Enterprise%20forms%20automation
|
Enterprise forms automation
|
Enterprise forms automation is a company-wide computer system or set of systems for managing, distributing, completing, and processing paper-based forms, applications, surveys, contracts, and other documents. It plays a vital role in the concept of a paperless office.
JetForm Corporation first used the term "enterprise forms automation" in the mid 1990s to describe their solution to automating paperwork. This process was later acquired by Adobe Systems, and is now part of the Adobe LiveCycle suite of products. In 2004, Efficient Technology Inc, became the first company to apply this term to software as a service.
Enterprise forms automation refers to the automation of paper-based processes that specifically rely on documents (forms, applications, etc.) that retain a paper-based look and experience, even if not printed out for interaction. To be considered an ‘enterprise forms automation’ solution, a system must meet enterprise software requirements, and specifically focus on automating paperwork and paper-based forms.
Impact
Organizations implement enterprise software solutions to automate major functions and large processes, as these areas offer the greatest cost savings compared to smaller projects. Enterprise-level implementations often cost over $100,000 and therefore take many months to produce cost savings. As such, organizations ignore automating smaller functions, due to the lack of immediate financial benefit or cost savings. As functions become more automated while software costs for enterprise systems drop in price, organizations begin automating lower-level functions to become more efficient. In addition, through the advent of standards like Adobe's PDF model and service models like Quik!, companies seek to automate the filling out of forms via enterprise forms automation solutions.
Automating forms also has a positive ‘green’ impact on the environment. To reduce waste and carbon emissions, companies seek ways to eliminate paper. An enterprise forms automation system can eliminate paper entirely, or significantly reduce how much paper a company uses—also reducing shipping costs, and printing and storage costs of paper forms. In addition, automating paper-based processes greatly speeds up the time it takes to perform transactions, which results in fewer errors, rejections, and revisions—and frees up time spent by users on manual labor.
Implementation
DMS
Modern implementation of the paperless office concept has two main focuses: creating documents and managing documents. Since major systems have already displaced paper altogether (e.g., enterprise resource planning, customer relationship management, accounting software, etc.), paper that remains in use is largely generated by processes that capture data, generate reports, and distribute communications. As software and computers have evolved, the first problem addressed has been management of existing and legacy documents through document management systems.
Document management and archiving systems do offer some form automation functions. Typically, the point at which document management systems start working with a document is when the document is scanned or sent into the system. Many document management systems can read documents via optical character recognition (OCR) and use that data within the document management system. While this technology is essential to a paperless office it does not address the processes that generate paper in the first place.
The ultimate step towards eliminating paper is to change the way that documents are created. In 1993 Adobe Systems introduced the Portable Document Format (PDF) to facilitate the exchange of documents in a universal manner across most computer platforms. This format has laid the foundation for creating, transporting, working on, and archiving electronic documents—and in 2008 became an ISO standard. In addition, the PDF model established a method for automating forms that can be pre-filled with existing data and manually entered on a PC screen—which can reduce or eliminate printed forms.
Implementation tools
A typical enterprise forms automation implementation typically combines:
A library of electronic versions of paper-based documents (PDF format or comparable format)
Data store of existing data or web pages that collect data to fill onto forms
Software that pre-fills existing data from databases and data stores onto electronic forms
Software that saves forms in process or partially completed
Software that captures and translates electronic form data
Workflow systems that manage interaction with forms and data
Two-way messaging between forms and systems during submission and validation
Barcode software that matches images of forms with electronic form data
Digital signature solutions that capture signatures electronically
Implementation challenges
The primary challenge to using these technologies is resource planning and implementation costs. However, all necessary technologies have existed since at least 2000. Furthermore, the U.S. Congress signed the Electronic Signatures in Global and National Commerce Act (ESIGN Act) into law, which lets companies accept digital signatures as valid signatures. Even with the law in effect, companies have been slow to adopt such solutions due to the cost and skills required to design, build, and maintain them at reasonable cost.
A secondary challenge is integrating electronic forms into an existing process, whereby existing data stores can be accessed and supplied to and from the forms. While tools to assist with integration exist, most implementations require custom programming for specific forms and data sources.
Many of these challenges are addressed by middleware solutions, technology platforms, and services that tie the pieces together. Known as Enterprise Application Integration (“EAI”), developers of EAI solutions are continually introducing new cost-effective methods to take advantage of web-based and centrally-managed capabilities and leverage legacy systems. With each advancement in EAI technologies enterprise forms automation becomes easier to implement and manage.
See also
Document automation
Form (document)
Intelligent document
References
Adobe Inc.
Documents
Office work
Open formats
Paper products
Business software
|
1442890
|
https://en.wikipedia.org/wiki/Ptx%20%28Unix%29
|
Ptx (Unix)
|
ptx is a Unix utility, named after the permuted index algorithm which it uses to produce a search or concordance report in the Keyword in Context (KWIC) format. It is available on most Unix and Unix-like operating systems (e.g. Linux, FreeBSD). The GNU implementation uses extensions that are more powerful than the older SysV implementation.
The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities.
There is also a corresponding IBM mainframe utility which performs the same function. Permuted indexes are often used in such places as bibliographic or medical databases, documentation, thesauri, or web sites to aid in locating entries of interest.
See also
Concordancer
References
Information retrieval systems
Unix text processing utilities
|
2045683
|
https://en.wikipedia.org/wiki/Yvette%20Clarke
|
Yvette Clarke
|
Yvette Diane Clarke (born November 21, 1964) is an American politician serving as the U.S. representative for New York's 9th congressional district since 2013. A member of the Democratic Party, she first entered Congress in 2007, representing New York's 11th congressional district until redistricting. Clarke represented the 40th district in Brooklyn on the New York City Council from 2002 to 2006.
Early life, family, and education
Clarke was born in Flatbush, Brooklyn, on November 21, 1964, to Lesley Clarke and former city councilwoman Una Clarke, both immigrants from Jamaica. She graduated from Edward R. Murrow High School and earned a scholarship to enroll at Oberlin College in Ohio, which she attended from 1982 to 1986. While studying at Oberlin, she spent a summer interning in the Washington, D.C. office of Representative Major Owens, where she told Roll Call that she worked on legislative issues involving Caribbean-American trade.
Early career
Before entering politics, Clarke worked as a childcare specialist and trained community residents to care for the children of working parents. Later, she served as an assistant to State Senator Velmanette Montgomery and Assemblywoman Barbara Clark, both of Queens. Clarke also worked as director of business development for the Bronx Overall Economic Development Corporation and was the second director of the Bronx portion of the New York City Empowerment Zone.
New York City Council
Clarke was elected to the 40th district of the New York City Council in 2001. She succeeded her mother, former City Council member Una S. T. Clarke, who held the seat for more than a decade, making theirs the first mother-to-daughter succession in city council.
She cosponsored City Council resolutions that opposed the war in Iraq, criticized the federal USA PATRIOT Act, and called for a national moratorium on the death penalty. She was a frequent critic of the Bush administration's policies, and opposed budget cuts by Bush and Congress on several programs addressing women's rights and poverty. She later voted against extending provisions of the Patriot Act after the election of President Barack Obama.
Committee on Contracts (chair)
Committee on Education
Committee on Fire & Criminal Justice Services
Committee on Health
Committee on Land Use
Committee on Planning, Dispositions & Concessions
Committee on Rules, Privileges & Elections
U.S. House of Representatives
District
Clarke's district, redrawn from the 11th in 2013, includes Sheepshead Bay, Gerritsen Beach, Brownsville, Crown Heights, East Flatbush, Flatbush, Kensington, Midwood, Prospect Heights, Prospect Lefferts Gardens and Park Slope.
Tenure
In April 2007, Clarke was the sole member of Congress to oppose a bill to rename the Ellis Island Library after British-born Bob Hope, saying in a statement, "Bob Hope is a great American and a fantastic human being, [but] I see the museum and all aspects of the island to be greater than any one human being."
On September 29, 2008, Clarke voted in support of HR 3997, the Emergency Economic Stability Act of 2008. The act failed, 205–228. She wrote legislation to improve the process of removing the names of individuals who believe they were wrongly identified as a threat when screened against the No Fly List used by the Transportation Security Administration, which passed 413–3 on February 3, 2009. In November 2009 she was one of 54 members of Congress to sign on to a controversial letter to President Obama, urging him to use diplomatic pressure to resolve the blockade affecting Gaza. On March 25, 2010, she introduced the International Cybercrime Reporting and Cooperation Act – H.R.4962.
Clarke supported the Prison Ship Martyrs' Monument Preservation Act (H.R. 1501; 113th Congress), a bill that would direct the Secretary of the Interior to study the suitability and feasibility of designating the Prison Ship Martyrs' Monument in Fort Greene Park in Brooklyn as a unit of the National Park System (NPS). Clarke argued the bill was a good idea because "this monument commemorates not only the sacrifices of soldiers in the Revolutionary War who dedicated themselves to the cause of liberty, but a reminder that even in wartime we must protect basic human rights. These thousands of deaths were an atrocity that should never occur again."
On September 17, 2013, Clarke introduced the Homeland Security Cybersecurity Boots-on-the-Ground Act (H.R. 3107; 113th Congress), a bill that would require the United States Department of Homeland Security (DHS) to undertake several actions designed to improve the readiness and capacity of DHS's cybersecurity workforce. DHS would also be required to create a strategy for recruiting and training additional cybersecurity employees.
Committee assignments
Committee on Energy and Commerce (Vice Chair)
Subcommittee on Communications and Technology
Subcommittee on Commerce, Manufacturing and Trade
Subcommittee on Oversight and Investigations
Committee on Small Business
Subcommittee on Economic Growth, Tax and Capital Access
Subcommittee on Contracting and Workforce
United States House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Innovation(Chair)
Caucus memberships
Congressional Black Caucus, First Vice Chair
Congressional Caribbean Caucus, Chair
Congressional Caucus on Multicultural Media, Chair
Congressional Caucus on Black Women and Girls, Co-chair
Congressional Caucus on Black Men and Boys, Co-chair
Congressional Progressive Caucus.
Congressional Arts Caucus
Medicare for All Caucus
Policy positions
Israel
Clarke has said she supports a two-state solution to the Israeli-Palestinian conflict. Some of her stances have subjected her to public criticism by constituents in her district, which is roughly 20% Jewish according to 2010 Census estimates. In 2010, Clarke signed two petitions urging Obama to pressure Israel to resolve the Gaza Blockade, which she later retracted. In 2009, she voted against H.R. 867, which sought to condemn the controversial Goldstone Report commissioned by the United Nations. In 2015 Clarke indicated she would vote for the JCPOA, known as the Iran nuclear deal, despite appeals from some of her Jewish constituents and local advocacy groups to vote against it. Explaining her decision, Clarke said in a statement, "Iran is on the verge of creating a nuclear bomb, right now. The JCPOA provides a pathway that holds great potential to forever change this reality." In 2015, Clarke attended Prime Minister of Israel Benjamin Netanyahu's speech before a joint session of Congress after initially expressing uncertainty.
Abortion
Clarke has stated that she is pro-choice. She has earned high ratings from interest groups such as NARAL Pro-Choice America and Planned Parenthood for her votes against legislation to place restrictions on abortion rights, including the No Taxpayer Funding for Abortion Act of 2011, which would have prohibited federal funds from being used to cover abortions. Her ratings with pro-life organizations such as the National Right to Life Committee have been correspondingly low.
Budget, spending and tax issues
Clarke has consistently opposed legislation to reduce government spending and cut taxes, including voting against the Job Protection and Recession Prevention Act of 2012, which sought to extend tax cuts established during George W. Bush's administration through the end of 2013. Clarke received a 92% rating from the National Journal for being liberal on economic policy in 2011, while she received a 15% rating from the National Taxpayers Union for her positions on tax and spending in 2011, and a 2% rating from the Citizens Against Government Waste in 2010.
Environmental policy
Clarke has supported efforts to combat climate change and limit fossil fuel consumption. She has generally opposed legislation that gives priority to economic over conservation interests, such as the Stop the War on Coal Act of 2012 and the Conservation and Economic Growth Act of 2012. She has supported legislation that increases conservation efforts and regulation of the energy industry, such as the Offshore Drilling Regulations and Other Energy Law Amendments Act of 2010. In 2011 Clarke received 100% ratings from Environment America, the League of Conservation Voters, and the Sierra Club, the latter on her clean water positions, while she received a 14% rating over the period 2008–11 from the Global Exchange for her loyalty to the finance, insurance, and real estate lobbies. She was strongly critical of the Trump administration's decision to withdraw from the Paris Agreement.
Immigration
Clarke has called for immigration reform that would create a path to citizenship for undocumented immigrants living in the United States and direct resources away from enforcement. In 2010, she voted for the DREAM Act, which passed the House but was blocked in the Senate. Clarke has voted against legislative proposals to constrain immigration. She praised the Obama administration's DACA program and condemned the Trump administration's termination of the program, calling it "cruel and vindictive." She has also called for extending the Temporary Protected Status granted to Haitian immigrants seeking refuge after the 2010 earthquake in Haiti, and for the abolition of ICE.
Technology
On April 10, 2019, Clarke and Senators Ron Wyden and Cory Booker introduced the Algorithmic Accountability Act of 2019, legislation granting additional powers to the Federal Trade Commission in addition to forcing companies to study whether race, gender or other biases influence their technology.
On January 11, 2022, Clarke and Representative Ritchie Torres sent a letter to Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency (CISA), requesting more information on efforts to reduce security risks to federal networks through the adoption of multi-factor authentication requirements. The letter argues that broad adoption of multi-factor-authentication is essential to protect the security of federal networks and systems.
In the media
On the Colbert Report, in its "Better Know a District" segment in early September 2012, when Stephen Colbert asked Clarke what she would have changed in 1898, the year Brooklyn merged with New York City, if she could go back in time, Clarke answered the abolition of slavery. Colbert replied, "Slavery…Really? I didn't realize there was slavery in Brooklyn in 1898". (Slavery was abolished in New York State in 1827.) Clarke responded, "I'm pretty sure there was", saying the Dutch owned slaves in New York in 1898. The next day, Clarke was unavailable for comment, and her media representative stated the statements were meant in jest.
2016 presidential election
Clarke endorsed Hillary Clinton for president in 2016 and cast a vote for her as a superdelegate at the 2016 Democratic National Convention. During the 2016 campaign, Clarke appeared with Clinton at an event at Medgar Evers College.
Political campaigns
In 2004, Clarke, then a member of the New York City Council, made her first run for Congress for the 11th district against incumbent Major Owens, for whom she had interned in college. Clarke's run followed an unsuccessful bid by her mother in 2000 against Owens for the same seat. Clarke lost the 2004 Democratic primary to Owens, who won 45.4% of the vote to her 28.9% in a multi-candidate race. After the 2004 election, Owens declined to seek reelection, after which Clarke announced her intention to run again in 2006. Owens later called Clarke and her mother's successive political campaigns against him "[a] stab in the back."
2006
In May 2006, another Caribbean-American candidate, Assemblyman N. Nick Perry, withdrew from the race to succeed Owens, leading some observers to contend that Clarke's chances for winning the race would improve now that another candidate from the same community was no longer competing.
Degree controversy
In August 2006, Crain's New York Business and the Daily News reported that Clarke's Oberlin transcripts indicated that she had not graduated, contrary to what her campaign literature claimed. Clarke initially said she thought she had earned sufficient credits to graduate from Oberlin, then later said she had completed her degree by attending courses at Medgar Evers College. In 2011, Clarke suggested that she planned to finish her degree at Oberlin by completing independent academic projects.
Election results
On September 12, 2006, Clarke won the Democratic nomination with a plurality, 31.20%, of the vote in a four-person primary, defeating then-councilman David Yassky, State Senator Carl Andrews, and Major Owens's son, Christopher Owens. In the November 7 general election, Clarke was elected to the House of Representatives with 89% of the vote against Republican nominee Stephen Finger.
2008
Clarke was reelected on November 4 by a large margin.
2010
Clarke was reelected on November 2 by a large margin.
2012
Clarke was challenged in the Democratic primary by Sylvia Kinard, an attorney and ex-wife of former New York City Comptroller and mayoral candidate Bill Thompson. Clarke defeated Kinard with 88.3% of the vote. She had $50,000 in her campaign account before the June primary. In the November general election, Clarke defeated Republican nominee Daniel Cavanagh.
2014
Clarke was reelected with 89.5% of the vote, defeating Cavanagh again.
2016
Clarke ran unopposed in the primary and defeated Alan Bellone in the November general election with 92.4% of the vote.
2018
On June 26, Clarke narrowly defeated primary challenger Adem Bunkeddeko with 51.9% of the vote. She defeated Republican nominee Lutchi Gayot in the November 6 general election.
2020
Clarke faced a four-way Democratic primary against Adem Bunkeddeko, Chaim Deutsch, and former army veteran and Democratic Socialists of America member Isiah James.
See also
List of African-American United States representatives
Women in the United States House of Representatives
References
External links
Congresswoman Yvette Clarke official U.S. House website
Yvette Clarke for Congress
|-
|-
|-
1964 births
21st-century American politicians
21st-century American women politicians
African-American members of the United States House of Representatives
African-American people in New York (state) politics
African-American women in politics
American people of Jamaican descent
American United Methodists
Democratic Party members of the United States House of Representatives
Female members of the United States House of Representatives
Living people
Medgar Evers College alumni
Members of the United States House of Representatives from New York (state)
New York City Council members
New York (state) Democrats
Oberlin College alumni
People from Flatbush, Brooklyn
Women New York City Council members
Women in New York (state) politics
Edward R. Murrow High School alumni
African-American New York City Council members
21st-century African-American women
21st-century African-American politicians
20th-century African-American people
20th-century African-American women
|
50117569
|
https://en.wikipedia.org/wiki/Epistory%20-%20Typing%20Chronicles
|
Epistory - Typing Chronicles
|
Epistory - Typing Chronicles is a 2016 action-adventure, typing video game developed by Fishing Cactus. The game was released on Steam Early Access in September 2015 and was officially released on March 30, 2016, for Linux, Microsoft Windows, and OS X, and on February 2, 2021 for Stadia. In the game, a young girl rides a fox with three tails. The game's story follows a writer's writing process, which unfolds like paper on-screen and is narrated from the perspective of the writer's internal thoughts. The game later received a spiritual sequel, Nanotale - Typing Chronicles.
Development
Part of the challenge in making Epistory was to "feel like a game and not just a typing application". To that end, the developers emphasised player choice in gameplay design decisions. The game was developed in Unity, using the Tiled map editor. The use of Tiled made the ground tiles look artificial, so this was fixed using Shader Forge. The EFJI keys were used to move the character through the world to encourage good use of the home keys. The art design was influenced by another game project that Fishing Cactus was working on, with a World War I theme. Because the frame story of Epistory is about a writer, it seemed like a natural choice to have a paper-themed world. Later, the decision was made to take it into 3D and incorporate papercraft and origami designs. Epistory used random methods to populate levels with trees, which were then manually checked and edited by the designers before being saved as the level.
Epistory was released on Steam Early Access on 30 September 2015. Mac and Linux editions of Epistory were released on Steam Early Access in October 2015. Chapter Two was released in November 2015, and the price was increased to $12.99. Due to the popularity of the early access edition of the game, the deadline for release was pushed back to 2016 and more resources were devoted to the art design of the game, resulting in art assets that didn't match the earlier levels of the game. These were used in later levels to give the impression of the world becoming deeper as the player explores it. Epistory was available in English, French and German from the early access period, and Spanish was added later on. Mod support was added in June 2016, which allows players to change the words they typed in-game, add translations, and add support for different keyboard layouts.
Reception
The game was nominated for the Indie of the Year Awards at IndieDB. Had an honorable mention in the 17th Independent Games Festival's Excellence in Visual Art category. The game received "mixed or average" reviews, according to video game review aggregator Metacritic. Multiple reviewers wrote in praise of its typing mechanics. Joshua Vanderwall, writing for the Escapist, described Epistory as a meditative experience. The game is a finalist for Best 3D Visuals at the Unity Awards 2016.
Localization
The game has been localized to 8 languages besides English: French, German, Spanish, Polish, Portuguese-Brazil, Russian, Czech (trans. Jan Balek) and Japanese. The localized versions have been in some cases marked as significantly more difficult, because all forementioned languages use alphabets with more characters than English, e.g. Spanish (29 without accents), Russian (33 letters), Czech (41/42 letters). Despite the higher difficulty the localized game is still accessible to younger audience.
References
External links
2016 video games
Action-adventure games
Linux games
Indie video games
MacOS games
Typing video games
Windows games
Video games developed in Belgium
|
9912495
|
https://en.wikipedia.org/wiki/Simulation%20hypothesis
|
Simulation hypothesis
|
The simulation hypothesis is a proposal regarding the nature of existence which posits that all of existence is an artificial simulation, such as a computer simulation. Some versions rely on the development of a simulated reality, a proposed technology that would be able to convince its inhabitants that the simulation was "real".
The simulation hypothesis bears a close resemblance to various other skeptical scenarios from throughout the history of philosophy. The hypothesis was popularized in its current form by Nick Bostrom. The suggestion that such a hypothesis is compatible with all human perceptual experiences is thought to have significant epistemological consequences in the form of philosophical skepticism. Versions of the hypothesis have also been featured in science fiction, appearing as a central plot device in many stories and films. The hypothesis popularized by Bostrom is very disputed, with, for example, theoretical physicist Sabine Hossenfelder, who called it pseudoscience and cosmologist George F. R. Ellis, who stated that "[the hypothesis] is totally impracticable from a technical viewpoint" and that "protagonists seem to have confused science fiction with science. Late-night pub discussion is not a viable theory." A bigger proposal that builds on this idea is that Earth could be the end of a long stack of simulations.
Origins
There is a long philosophical and scientific history to the underlying thesis that reality is an illusion. This skeptical hypothesis can be traced back to antiquity; for example, to the "Butterfly Dream" of Zhuangzi, or the Indian philosophy of Maya, or in Ancient Greek philosophy Anaxarchus and Monimus likened existing things to a scene-painting and supposed them to resemble the impressions experienced in sleep or madness.
Aztec philosophical texts theorised that the world was a painting or book written by the Teotl.
In philosophy
Nick Bostrom's premise:
Nick Bostrom's conclusion:
The simulation argument
In 2003, philosopher Nick Bostrom proposed a trilemma that he called "the simulation argument". Despite the name, Bostrom's "simulation argument" does not directly argue that humans live in a simulation; instead, Bostrom's trilemma argues that one of three unlikely-seeming propositions is almost certainly true:
"The fraction of human-level civilizations that reach a posthuman stage (that is, one capable of running high-fidelity ancestor simulations) is very close to zero", or
"The fraction of posthuman civilizations that are interested in running simulations of their evolutionary history, or variations thereof, is very close to zero", or
"The fraction of all people with our kind of experiences that are living in a simulation is very close to one."
The trilemma points out that a technologically mature "posthuman" civilization would have enormous computing power; if even a tiny percentage of them were to run "ancestor simulations" (that is, "high-fidelity" simulations of ancestral life that would be indistinguishable from reality to the simulated ancestor), the total number of simulated ancestors, or "Sims", in the universe (or multiverse, if it exists) would greatly exceed the total number of actual ancestors.
Bostrom goes on to use a type of anthropic reasoning to claim that, if the third proposition is the one of those three that is true, and almost all people live in simulations, then humans are almost certainly living in a simulation.
Bostrom claims his argument goes beyond the classical ancient "skeptical hypothesis", claiming that "...we have interesting empirical reasons to believe that a certain disjunctive claim about the world is true", the third of the three disjunctive propositions being that we are almost certainly living in a simulation. Thus, Bostrom, and writers in agreement with Bostrom such as David Chalmers, argue there might be empirical reasons for the "simulation hypothesis", and that therefore the simulation hypothesis is not a skeptical hypothesis but rather a "metaphysical hypothesis". Bostrom states he personally sees no strong argument as to which of the three trilemma propositions is the true one: "If (1) is true, then we will almost certainly go extinct before reaching posthumanity. If (2) is true, then there must be a strong convergence among the courses of advanced civilizations so that virtually none contains any individuals who desire to run ancestor-simulations and are free to do so. If (3) is true, then we almost certainly live in a simulation. In the dark forest of our current ignorance, it seems sensible to apportion one's credence roughly evenly between (1), (2), and (3)... I note that people who hear about the simulation argument often react by saying, 'Yes, I accept the argument, and it is obvious that it is possibility #n that obtains.' But different people pick a different n. Some think it obvious that (1) is true, others that (2) is true, yet others that (3) is true."
As a corollary to the trilemma, Bostrom states that "Unless we are now living in a simulation, our descendants will almost certainly never run an ancestor-simulation."
Criticism of Bostrom's anthropic reasoning
Bostrom argues that if "the fraction of all people with our kind of experiences that are living in a simulation is very close to one", then it follows that humans probably live in a simulation. Some philosophers disagree, proposing that perhaps "Sims" do not have conscious experiences the same way that unsimulated humans do, or that it can otherwise be self-evident to a human that they are a human rather than a Sim. Philosopher Barry Dainton modifies Bostrom's trilemma by substituting "neural ancestor simulations" (ranging from literal brains in a vat, to far-future humans with induced high-fidelity hallucinations that they are their own distant ancestors) for Bostrom's "ancestor simulations", on the grounds that every philosophical school of thought can agree that sufficiently high-tech neural ancestor simulation experiences would be indistinguishable from non-simulated experiences. Even if high-fidelity computer Sims are never conscious, Dainton's reasoning leads to the following conclusion: either the fraction of human-level civilizations that reach a posthuman stage and are able and willing to run large numbers of neural ancestor simulations is close to zero, or some kind of (possibly neural) ancestor simulation exists.
Some scholars categorically reject—or are uninterested in—anthropic reasoning, dismissing it as "merely philosophical", unfalsifiable, or inherently unscientific.
Some critics propose that the simulation could be in the first generation, and all the simulated people that will one day be created do not yet exist.
The cosmologist Sean M. Carroll argues that the simulation hypothesis leads to a contradiction: if humans are typical, as it is assumed, and not capable of performing simulations, this contradicts the arguer's assumption that it is easy for us to foresee that other civilizations can most likely perform simulations.
Physicist Frank Wilczek raises an empirical objection, saying that the laws of the universe have hidden complexity which is "not used for anything" and the laws are constrained by time and location – all of this being unnecessary and extraneous in a simulation. He further argues that the simulation argument amounts to "begging the question," due to the "embarrassing question" of the nature of the underlying reality in which this universe is simulated. "Okay if this is a simulated world, what is the thing in which it is simulated made out of? What are the laws for that?"
It has been argued that humans cannot be the ones being simulated, since the simulation argument uses its descendants as the ones running the simulations. In other words, it has been argued that the probability that humans live in a simulated universe is not independent of the prior probability that is assigned to the existence of other universes.
Arguments, within the trilemma, against the simulation hypothesis
Some scholars accept the trilemma, and argue that the first or second of the propositions are true, and that the third proposition (the proposition that humans live in a simulation) is false. Physicist Paul Davies uses Bostrom's trilemma as part of one possible argument against a near-infinite multiverse. This argument runs as follows: if there were a near-infinite multiverse, there would be posthuman civilizations running ancestor simulations, which would lead to the untenable and scientifically self-defeating conclusion that humans live in a simulation; therefore, by reductio ad absurdum, existing multiverse theories are likely false. (Unlike Bostrom and Chalmers, Davies (among others) considers the simulation hypothesis to be self-defeating.)
Some point out that there is currently no proof of technology that would facilitate the existence of sufficiently high-fidelity ancestor simulation. Additionally, there is no proof that it is physically possible or feasible for a posthuman civilization to create such a simulation, and therefore for the present, the first proposition must be taken to be true. Additionally there are limits of computation.
Physicist Marcelo Gleiser objects to the notion that posthumans would have a reason to run simulated universes: "...being so advanced they would have collected enough knowledge about their past to have little interest in this kind of simulation. ...They may have virtual-reality museums, where they could go and experience the lives and tribulations of their ancestors. But a full-fledged, resource-consuming simulation of an entire universe? Sounds like a colossal waste of time." Gleiser also points out that there is no plausible reason to stop at one level of simulation, so that the simulated ancestors might also be simulating their ancestors, and so on, creating an infinite regress akin to the "problem of the First Cause."
In physics
In physics, the view of the universe and its workings as the ebb and flow of information was first observed by Wheeler. Consequently, two views of the world emerged: the first one proposes that the universe is a quantum computer, while the other one proposes that the system performing the simulation is distinct from its simulation (the universe). Of the former view, quantum-computing specialist Dave Bacon wrote,
In many respects this point of view may be nothing more than a result of the fact that the notion of computation is the disease of our age—everywhere we look today we see examples of computers, computation, and information theory and thus we extrapolate this to our laws of physics. Indeed, thinking about computing as arising from faulty components, it seems as if the abstraction that uses perfectly operating computers is unlikely to exist as anything but a platonic ideal. Another critique of such a point of view is that there is no evidence for the kind of digitization that characterizes computers nor are there any predictions made by those who advocate such a view that have been experimentally confirmed.
Advocates
Elon Musk firmly believes in the simulation hypothesis. In a podcast with Joe Rogan, Musk said "If you assume any rate of improvement at all, games will eventually be indistinguishable from reality" before concluding "that it's most likely we're in a simulation." He also stated in a 2016 interview that "there's a one in billions chance we're in base reality".
Another high-profile proponent of the hypothesis is astrophysicist Neil Degrasse Tyson, who said in an NBC News interview that the hypothesis is correct, giving "better than 50-50 odds" and adding:
However, in a subsequent interview with Chuck Nice on a YouTube episode of StarTalk, Tyson shares that his friend J. Richard Gott, a professor of astrophysical sciences at Princeton University made him aware of a strong objection to the simulation hypothesis. The objection points out that the common trait that all hypothetical high fidelity simulated universes possess is the ability to produce high fidelity simulated universes. And being that our current world does not possess this ability it would mean that we are either the real universe, and therefore simulated universes have not yet been created, or we are the last in a very long chain of simulated universes, an observation that makes the simulation hypothesis seem less probable. Regarding this objection Tyson remarks "that changes my life."
Consequences
Economist Robin Hanson argues a self-interested occupant of a high-fidelity simulation should strive to be entertaining and praiseworthy in order to avoid being turned off or being shunted into a non-conscious low-fidelity part of the simulation. Hanson additionally speculates that someone who is aware that he might be in a simulation might care less about others and live more for today: "your motivation to save for retirement, or to help the poor in Ethiopia, might be muted by realizing that in your simulation, you will never retire and there is no Ethiopia."
Testing the hypothesis physically
A method to test one type of simulation hypothesis was proposed in 2012 in a joint paper by physicists Silas R. Beane from the University of Bonn (now at the University of Washington, Seattle), and Zohreh Davoudi and Martin J. Savage from the University of Washington, Seattle. Under the assumption of finite computational resources, the simulation of the universe would be performed by dividing the continuum space-time into a discrete set of points. In analogy with the mini-simulations that lattice-gauge theorists run today to build up nuclei from the underlying theory of strong interactions (known as quantum chromodynamics), several observational consequences of a grid-like space-time have been studied in their work. Among proposed signatures is an anisotropy in the distribution of ultra-high-energy cosmic rays, that, if observed, would be consistent with the simulation hypothesis according to these physicists. In 2017, Campbell et al. proposed several experiments aimed at testing the simulation hypothesis in their paper "On Testing the Simulation Theory".
In 2019, philosopher Preston Greene suggested that it may be best not to find out if we're living in a simulation since, if it were found to be true, such knowing may end the simulation.
Other uses in philosophy
Besides attempting to assess whether the simulation hypothesis is true or false, philosophers have also used it to illustrate other philosophical problems, especially in metaphysics and epistemology. David Chalmers has argued that simulated beings might wonder whether their mental lives are governed by the physics of their environment, when in fact these mental lives are simulated separately (and are thus, in fact, not governed by the simulated physics). Chalmers claims that they might eventually find that their thoughts fail to be physically caused, and argues that this means that Cartesian dualism is not necessarily as problematic of a philosophical view as is commonly supposed, though he does not endorse it. Similar arguments have been made for philosophical views about personal identity that say that an individual could have been another human being in the past, as well as views about qualia that say that colors could have appeared differently than they do (the inverted spectrum scenario). In both cases, the claim is that all this would require is hooking up the mental lives to the simulated physics in a different way.
Brain in a vat and parsimony
Skeptical arguments have historically played a role in the evolution of philosophical discussion, particularly in the fields of ontology, metaphysics, the theory of knowledge and the philosophy of science. The fallibility of perception, knowledge and thought have been made obvious employing several arguments. Solipsist scenarios, a common ground of debate in this fields, are extreme cases prompting these dilemmas for further discussion.
In virtue of computational simplicity, achieving this last kind of simulations with equal resolution seems much more undemanding than assembling a super simulator that runs a complete reality, including multiple participants. If humanity was being simulated, as noted by Lorenzo Pieri, it is more "likely to be one of such Brain-in-a-Vat or «solo players», as it is much easier to simulate the inputs to the brain than the full-blown reality".
This probabilistic argument deferring to parsimony, is based on the idea that "if we randomly select the simulation (…) the likelihood of picking a given simulation is inversely correlated to the computational complexity of the simulation".
Science fiction themes
Science fiction has highlighted themes such as virtual reality, artificial intelligence and computer gaming for more than fifty years.
Jokester (1956) by Isaac Asimov explores the idea that humor is actually a psychological study tool imposed from without by extraterrestrials studying mankind, similarly to how humans study mice. Simulacron-3 (1964) by Daniel F. Galouye (alternative title: Counterfeit World) tells the story of a virtual city developed as a computer simulation for market research purposes, in which the simulated inhabitants possess consciousness; all but one of the inhabitants are unaware of the true nature of their world. The book was made into a German made-for-TV film called World on a Wire (1973) directed by Rainer Werner Fassbinder. The film The Thirteenth Floor (1999) was also loosely based on this book. We Can Remember It for You Wholesale is a short story by American writer Philip K. Dick, first published in The Magazine of Fantasy & Science Fiction in April 1966, and was the basis for the 1990 film Total Recall and its 2012 remake. In Overdrawn at the Memory Bank, a 1983 television film, the main character pays to have his mind connected to a simulation.
The same theme was repeated in the 1999 film The Matrix, which depicted a world in which artificially intelligent robots enslaved humanity within a simulation set in the contemporary world. The 2012 play World of Wires was partially inspired by the Bostrom essay on the simulation hypothesis.
In the animated sitcom Rick and Morty , episode 01-04 titled M. Night Shaym-Aliens! demonstrates a low-quality simulation that attempts to trap the two titular protagonists; because the operation is less ‘realistic’ than typically-operated ‘reality’, it becomes obvious. This infers one of two options for the hypothesis: either, our perceivable ‘reality’ is an almost flawless, detailed and unnoticeably computed simulation that compares relatively highly, or it’s relatively minimal but ‘ reality ’ is all oneself would recognise and would have no comparative rival to differentiate between.
See also
Advaita Vedanta
Avatamsaka Sutra
Boltzmann brain
Brain in a vat
Depersonalization-derealization disorder
Digital physics
Fine tuned universe
Holographic principle
Interface theory
Mathematical universe hypothesis
Simulation video game
Virtual reality
Zhuangzi
References
Further reading
"Are We Living in a Simulation?" BBC Focus magazine, March 2013, pages 43–45. Interview with physicist Silas Beane of the University of Bonn discussing a proposed test for simulated reality evidence. Three pages, three photos, including one of Beane and a computer-generated scene from the film The Matrix. Publisher: Immediate Media Company, Bristol, UK.
"Do We Live in the Matrix?" by Zeeya Merali, Discover, December 2013, pages 24–25. Subtitle: "Physicists have proposed tests to reveal whether we are part of a giant computer simulation."
Conitzer, Vincent. A Puzzle about Further Facts. Open access version of article in Erkenntnis.
Lev, Gid'on. Life in the Matrix. Haaretz Magazine, April 25, 2019, page 6.
Tom Campbell, Houman Owhadi, Joe Sauvageau, David Watkinson: On testing the simulation theory. .
Virk, Rizwan. The Simulation Hypothesis: An MIT Computer Scientist Shows Why AI, Quantum Physics, and Eastern Mystics All Agree We Are In a Video Game.
External links
Are We Living in a Computer Simulation? Nick Bostrom's Simulation Argument webpage.
Techniques for programming a Simulation Universe at the Planck level
Our Universe Is A Massive Neural Network: Here's Why
Arguments in philosophy of mind
Consensus reality
Epistemological theories
Hyperreality
Hypotheses
Internalism and externalism
Limits of computation
Metaphysical theories
Nick Bostrom
Science fiction themes
Virtual reality
|
6615610
|
https://en.wikipedia.org/wiki/Performance%20engineering
|
Performance engineering
|
Performance engineering encompasses the techniques applied during a systems development life cycle to ensure the non-functional requirements for performance (such as throughput, latency, or memory usage) will be met. It may be alternatively referred to as systems performance engineering within systems engineering, and software performance engineering or application performance engineering within software engineering.
As the connection between application success and business success continues to gain recognition, particularly in the mobile space, application performance engineering has taken on a preventive and perfective role within the software development life cycle. As such, the term is typically used to describe the processes, people and technologies required to effectively test non-functional requirements, ensure adherence to service levels and optimize application performance prior to deployment.
The term performance engineering encompasses more than just the software and supporting infrastructure, and as such the term performance engineering is preferable from a macro view. Adherence to the non-functional requirements is also validated post-deployment by monitoring the production systems. This is part of IT service management (see also ITIL).
Performance engineering has become a separate discipline at a number of large corporations, with tasking separate but parallel to systems engineering. It is pervasive, involving people from multiple organizational units; but predominantly within the information technology organization.
Performance engineering objectives
Increase business revenue by ensuring the system can process transactions within the requisite timeframe
Eliminate system failure requiring scrapping and writing off the system development effort due to performance objective failure
Eliminate late system deployment due to performance issues
Eliminate avoidable system rework due to performance issues
Eliminate avoidable system tuning efforts
Avoid additional and unnecessary hardware acquisition costs
Reduce increased software maintenance costs due to performance problems in production
Reduce increased software maintenance costs due to software impacted by ad hoc performance fixes
Reduce additional operational overhead for handling system issues due to performance problems
Identify future bottlenecks by simulation over prototype
Increase server capability
Performance engineering approach
Because this discipline is applied within multiple methodologies, the following activities will occur within differently specified phases. However, if the phases of the rational unified process (RUP) are used as a framework, then the activities will occur as follows:
During the first, Conceptual phase of a program or project, critical business processes are identified. Typically they are classified as critical based upon revenue value, cost savings, or other assigned business value. This classification is done by the business unit, not the IT organization. High level risks that may impact system performance are identified and described at this time. An example might be known performance risks for a particular vendor system. Finally, performance activities, roles and deliverables are identified for the Elaboration phase. Activities and resource loading are incorporated into the Elaboration phase project plans.
Elaboration
During this defining phase, the critical business processes are decomposed to critical use cases. Probe cases will be decomposed further, as needed, to single page (screen) transitions. These are the use cases that will be subjected to script driven performance testing.
The type of requirements that relate to performance engineering are the non-functional requirements, or NFR. While a functional requirement relates to which business operations are to be performed, a performance related non-functional requirement will relate to how fast that business operation performs under defined circumstances.
Construction
Early in this phase a number of performance tool related activities are required. These include:
Identify key development team members as subject matter experts for the selected tools.
Specify a profiling tool for the development/component unit test environment.
Specify an automated unit (component) performance test tool for the development/component unit test environment; this is used when no GUI yet exists to drive the components under development.
Specify an automated tool for driving server-side unit (components) for the development/component unit test environment.
Specify an automated multi-user capable script-driven end-to-end tool for the development/component unit test environment; this is used to execute screen-driven use cases.
Identify a database test data load tool for the development/component unit test environment; this is required to ensure that the database optimizer chooses correct execution paths and to enable reinitializing and reloading the database as needed.
Deploy the performance tools for the development team.
Presentations and training must be given to development team members on the selected tools.
The performance test team normally does not execute performance tests in the development environment, but rather in a specialized pre-deployment environment that is configured to be as close as possible to the planned production environment. This team will execute performance testing against test cases, validating that the critical use cases conform to the specified non-functional requirements. The team will execute load testing against a normally expected (median) load as well as a peak load. They will often run stress tests that will identify the system bottlenecks. The data gathered, and the analysis, will be fed back to the group that does performance tuning. Where necessary, the system will be tuned to bring nonconforming tests into conformance with the non-functional requirements.
If performance engineering has been properly applied at each iteration and phase of the project to this point, hopefully this will be sufficient to enable the system to receive performance certification. However, if for some reason (perhaps proper performance engineering working practices were not applied) there are tests that cannot be tuned into compliance, then it will be necessary to return portions of the system to development for refactoring. In some cases the problem can be resolved with additional hardware, but adding more hardware leads quickly to diminishing returns.
Transition
During this final phase the system is deployed to the production environment. A number of preparatory steps are required. These include:
Configuring the operating systems, network, servers (application, web, database, load balancer, etc.), and any message queueing software according to the base checklists and the optimizations identified in the performance test environment
Ensuring all performance monitoring software is deployed and configured
Running statistics on the database after the production data load is completed
Once the new system is deployed, ongoing operations pick up performance activities, including:
Validating that weekly and monthly performance reports indicate that critical use cases perform within the specified non functional requirement criteria
Where use cases are falling outside of NFR criteria, submit defects
Identify projected trends from monthly and quarterly reports, and on a quarterly basis, execute capacity planning management activities
Service management
In the operational domain (post production deployment) performance engineering focuses primarily within three areas: service level management, capacity management, and problem management.
Service level management
In the service level management area, performance engineering is concerned with service level agreements and the associated systems monitoring that serves to validate service level compliance, detect problems, and identify trends. For example, when real user monitoring is deployed it is possible to ensure that user transactions are being executed in conformance with specified non-functional requirements. Transaction response time is logged in a database such that queries and reports can be run against the data. This permits trend analysis that can be useful for capacity management. When user transactions fall out of band, the events should generate alerts so that attention may be applied to the situation.
Capacity management
For capacity management, performance engineering focuses on ensuring that the systems will remain within performance compliance. This means executing trend analysis on historical monitoring generated data, such that the future time of non compliance is predictable. For example, if a system is showing a trend of slowing transaction processing (which might be due to growing data set sizes, or increasing numbers of concurrent users, or other factors) then at some point the system will no longer meet the criteria specified within the service level agreements. Capacity management is charged with ensuring that additional capacity is added in advance of that point (additional CPUs, more memory, new database indexing, et cetera) so that the trend lines are reset and the system will remain within the specified performance range.
Problem management
Within the problem management domain, the performance engineering practices are focused on resolving the root cause of performance related problems. These typically involve system tuning, changing operating system or device parameters, or even refactoring the application software to resolve poor performance due to poor design or bad coding practices.
Monitoring
To ensure that there is proper feedback validating that the system meets the NFR specified performance metrics, any major system needs a monitoring subsystem. The planning, design, installation, configuration, and control of the monitoring subsystem are specified by an appropriately defined monitoring process.
The benefits are as follows:
It is possible to establish service level agreements at the use case level.
It is possible to turn on and turn off monitoring at periodic points or to support problem resolution.
It enables the generation of regular reports.
It enables the ability to track trends over time, such as the impact of increasing user loads and growing data sets on use case level performance.
The trend analysis component of this cannot be undervalued. This functionality, properly implemented, will enable predicting when a given application undergoing gradually increasing user loads and growing data sets will exceed the specified non functional performance requirements for a given use case. This permits proper management budgeting, acquisition of, and deployment of the required resources to keep the system running within the parameters of the non functional performance requirements.
See also
Java performance
Scalability
Software quality
Software testing
Web performance
References
Further reading
Database Performance Tuning Guide
Practical Performance Analyst - Performance Engineering Community & Body Of Knowledge
Performance Engineering Methodology
A Performance Engineering Strategy
A Performance Process Maturity Model
The Every Computer Performance Book
Exploring UML for Performance Engineering
Introduction to Modeling Based Performance Engineering
Leveraging ITIL to Improve Application Performance
Patterns & Practices Performance Engineering
Performance and Scalability of Distributed Software Architectures
Performance Engineering Best Practices (High Level)
Software Engineering and Performance: A Road-map
The Vicious Cycle of Computer Systems Performance and IT Operational Costs
Microsoft Windows Server Performance Team
Gathering Performance Requirements
Performance Testing Web Services: Strategies and Best Practices
Performance Evaluation of an Air Traffic Control System using the Application Response Measurement (ARM) Standard
Integration of Performance Management in ITIL
Information technology management
Software performance management
Software optimization
|
14097209
|
https://en.wikipedia.org/wiki/Code%20Composer%20Studio
|
Code Composer Studio
|
Code Composer Studio (CCStudio or CCS) is an integrated development environment (IDE) to develop applications for Texas Instruments (TI) embedded processors.
Texas Instruments embedded processors include TMS320 DSPs, OMAP system-on-a-chip, DaVinci system-on-a-chip, Sitara applications processors, Hercules microcontrollers, Simplelink MCUs (MSP432 and Wireless connectivity microcontrollers), MSP430 and Tiva/Stellaris microcontrollers. It also enables debugging on several subsystems such as Ducati, IVA Accelerator and PRU-ICSS.
Code Composer Studio is primarily designed as for embedded project design and low-level (baremetal) JTAG based debugging. However, the latest releases are based on unmodified versions of the Eclipse open source IDE, which can be easily extended to include support for OS level application debug (Linux, Android, Windows Embedded) and open source compiler suites such as GCC.
Early versions included a real time kernel called DSP/BIOS and its later inception SYS/BIOS. Currently, the successor to these tools, the TI-RTOS embedded tools ecosystem, is available for downloading as a free plugin to Code Composer Studio.
History
Originally Code Composer was a product from a company called GO DSP located in Toronto, Canada, and it was acquired by TI in 1997. After the acquisition, Code Composer was bundled with a real-time kernel named DSP/BIOS and its name was appended with the word Studio.
CCS releases up until 3.3 were based on a proprietary interface, but TI was already working in parallel on the development of an IDE based on the open-source Eclipse. This IDE was named Code Composer Essentials (CCE) and was designed for the MSP430 line of microcontrollers. This expertise was used to completely overhaul the previous CCS and starting with release 4.0 all versions are also based on Eclipse.
Code Composer was originally developed for DSP development, therefore one of its main differentiators at the time was the availability of graphical visualization tools (XY graphs, FFT magnitude and phase, constellation, raw image visualization) and support for visualizing memory in several numeric formats (decimal, floating-point).
Starting in 2015, a Cloud computing version of CCS was introduced and is part of the suite TI Cloud Tools, which also hosts Resource Explorer and Pinmux.
Versions
Code Composer
4.10 (latest version in 2001). Supported all TMS320 DSPs at that time: C2x, C24x, C3x, C4x, C5x, C54x and C6x. The version for C3x/C4x is still sold by Texas Instruments' partner Spectrum Digital. Support varied through the years, initially Windows 95, NT4 and 98, with the latest release supporting 2000 and XP.
Code Composer Studio
1.x (1999). General release that dropped support for C2x, C3x, C4x and C5x DSPs. v1.3 added support for ARM. Supports Windows 95, 98, 98SE, NT4 and 2000, as well as Sun Solaris 2.6, 2.7 and 8.
2.0 (2001). General release that added support for the upcoming C55x and C64x DSPs. Across the years it added support for TMS470 ARM7 (2.10), OMAP ARM9 plus C55x DSP (2.10) and C2x DSPs (2.12). Supports Windows 98SE, Me, 2000 and XP.
3.0 (2005). Limited release that supported only C62x, C64x and C67x DSPs. Supports Windows 2000 and XP.
3.1 (2005). General release. Supports Windows 2000 and XP.
3.2 (2006). Limited release that supported only the new C64x+ DSPs. Supports Windows 2000 and XP.
3.3 (2006). General release that supported all device families, and across the years it added support for OMAP Cortex A8 plus C64x+ DSP, TMS570 (ARM Cortex R4), C672x and C674x DSPs (3.3.82). A limited version for C24x DSPs only is still sold by TI. Supports Windows 2000 and XP.
4.0 (2009). General release based on a modified version of Eclipse 3.2. Dropped support for C24x DSPs and added support for MSP430, Stellaris (ARM Cortex M3) and DaVinci devices. Adds support for SYSBIOS and its updated debug components (ROV, Execution Graph) while keeping support for DSP/BIOS legacy debug components (RTA, LOG_Printf). Supports Windows XP, Vista and 7. Release 4.2 introduced the Grace plug-in and SYSBIOS for MSP430 devices.
5.0 (2010). General release that uses an unmodified version of Eclipse 3.6 and later 3.7. It was hosted also in Linux. Added support for C66x DSPs, Sitara (ARM9 and Cortex A8) and Tiva (ARM Cortex M4) devices. Supports Windows XP and 7. Release 5.3 implements a completely reworked Trace interface as well as version 2.0 of Grace.
6.0 (2014). General release that uses an unmodified version of Eclipse 4.3. Added support for CC26x and CC32x wireless microcontrollers. Dropped support for C54x DSPs. Supports Windows XP, 7 and 8.x.
6.1 (2015). General release that uses an unmodified version of Eclipse 4.4. Introduced beta support for Mac OS X. Added support for CC25x and MSP432 (the introductory Mac version supports only MSP devices). Supports Windows XP, 7 and 8.x.
6.1.1 Added support for SimpleLink™ CC26xx and CC13xx MCU platform of devices. Added support for automatic firmware update for XDS110. Added OS X platform support for CCS for MCU devices (Beta). Improved EnergyTrace tool for profiling application's energy consumption, battery lifetime, monitoring internal device states and determining execution hotspots (statistical function profile).
6.1.2 Bug fixes. First OS X released to the public in Beta. Last version that supports the Grace plug-in.
6.1.3 Integration with Eclipse v4.5.1 and CDT 8.7. Added support for OS X for MCU devices. Support for GCC for MSP430. Improved Cortex A15 SM debug support. Improved EnergyTrace tool for profiling application's energy consumption, battery lifetime, monitoring internal device states and determining execution hotspots (statistical function profile).
6.2.0 (2016). First 64-bit version for Linux (Windows still 32-bit). Beta release of the online Resource Explorer.
7.0.0 (2016). Integration with Eclipse 4.6 with CDT 9.0 and JRE 8. First release that is free of charge and without limitations for all devices and Debug Probes. Production release of the online Resource Explorer. Dropped support for Windows XP and the Stellaris devices.
7.1.0 (2016). Bug fixes. Added support for EnergyTrace HDR (High Dynamic Range) for Simplelink MCUs. Beta version of ROV2.
7.2.0 (2017). Bug fixes. Production version of ROV2.
7.3.0 (2017). Bug fixes.
7.4.0 (2017). Bug fixes and other updates including device support.
8.1.0 (2018). Bug fixes.
CCS Cloud
1.0 (2015). General release that adds support for all MSP430, MSP432 and Tiva C device families.
1.1 (2015). General release that adds debug capabilities for all devices above. Added CC2650 device support.
1.6 (2017). General release with bug fixes.
Licensing
Over the years CCS followed the trend of the software industry for reduced and free-of-charge software licensing, reflected across the releases:
CCS releases up to 2.x were separated per device family, i.e., every device family required the purchase of a separate license and a separate software Each license's SRP was US$3,600.00 (apart from release 2.3, which was about US$4,500.00)
Starting with releases 3.x, all device families were included in the same license (then called Platinum). The license's SRP was the same (US$3,600.00). There was a C2x-only limited license that retailed for US$600.00.
Starting with release 4.x, CCS can be used for free in several scenarios that include development boards, software device simulators and even the use of a standalone emulator named XDS100. Also, it can be used with a codesize limitation of 16kB on MSP430 devices. This release also introduced the floating license, which can be installed on a server and be used across a company's or university's Intranet at almost the cost of a full license.
A full license for CCS release 4.x had an SRP of US$1,995.00 and a microcontroller-only license was US$495.00. This microcontroller license covered all MSP430, Stellaris and C2x devices.
A full license for CCS releases 5.x and 6.x has an SRP of US$495.00 and the microcontroller-only license ceased to exist.
Starting in September 2016, the floating license model ceased to exist.
For CCS release 7.x the paid license ceased to exist. The software and all its components are distributed with a TSPA license.
The free license model was also retrofitted to all public CCS releases since v4.
For all releases an annual paid subscription fee was required to grant updates for upcoming major releases.
Starting in August 2015, the concept of subscription fee ceased to exist.
JTAG Debug probe support
Historically CCS supported only JTAG debug probes from TI - also called XDS emulators. The XDS510-class and the more advanced XDS560-class emulators are supported across all releases, but the new low-cost XDS100-class emulator started to be supported starting with the latest patches to release 3.3.
Releases 4.x added support for an updated design of the existing XDS100-class emulator (called XDS100v2) and, in release 4.2, added support for an updated design of the XDS560-class emulator (called XDS560v2).
Release 5.2 added support for the new XDS200-class emulators.
Up until release 4.x, CCS supported only XDS emulators. With the integration of MSP430 and Stellaris microcontrollers, support was added for their respective JTAG debug probes: MSP-FET430 (both parallel and USB versions) and ICDI.
Release 5.x also saw the introduction of Beta support for J-Link JTAG debug probes from Segger.
Release 6.0.x saw the introduction of the new MSP-FET debug probe for MSP430 devices and the new XDS200-class of debug probes for processors.
Release 6.1.x saw the introduction of the new XDS110-class of debug probes for processors. It also saw the migration to full production support for J-Link JTAG debug probes from Segger.
Release 7.x saw the integration of J-Link JTAG debug probes from Segger directly in the CCS installer. It is also the first release to support the standalone version of XDS110.
64-bit releases do not support Spectrum Digital XDS510USB JTAG debuggers.
See also
eXpressDSP
References
External links
Integrated development environments
Texas Instruments
|
28842404
|
https://en.wikipedia.org/wiki/Howard%20Rubenstein%20%28physician%29
|
Howard Rubenstein (physician)
|
Howard S. Rubenstein (1931 – September 20, 2020) was an American physician, playwright and translator of classical Greek drama.
Life and works
Rubenstein was born in 1931 in Chicago and attended Lake View High School. He was a magna cum laude graduate of Carleton College, where he was elected to Phi Beta Kappa and Sigma Xi and won the Noyes Prize for excellence in ancient Greek studies. He received his MD degree from Harvard Medical School in 1957 and was a physician for over 40 years, most of them at Harvard University. For several years, he was a medical consultant for the State of California.
After retiring from the practice of medicine, he lived with his wife Judy in San Diego, where he wrote.
He published translations of Agamemnon by Aeschylus and The Trojan Women by Euripides. His translations were praised by the classical scholars P. E. Easterling and Oliver Taplin. The production of his adaptation of The Trojan Women won more Billie Awards (San Diego Playbill) than any other play of the 2000-1 San Diego theater season.
He also published stage adaptations of Jean Racine's Britannicus and the 20th century Yiddish dramatic poem, The Golem, by H. Leivick.
He wrote an historical comic tragedy Tony and Cleo and "Maccabee" an epic poem in free verse based upon the books of Maccabees.
He also wrote SHILOH: A Narrative Play, The Defiant Soul, and Romance of the Western Chamber—a Musical (Book and Lyrics) with Music by Max Lee, based on the classic Chinese comedy XI Xiang Ji; World Premiere in Rubenstein's English (with Mandarin supertitles), Dongpo Theatre, Hangzhou, China 2011; Western Premiere, TADA! Theater, off-off Broadway, 2017; west coast USA premiere, Don Powell Theater, San Diego, July 2020.
Rubenstein died of metastatic cancer at the age of 89 on September 20, 2020. His adaptation of Prometheus Bound by Aeschylus premiered posthumously at The Tank in March 2021.
Selected works
Agamemnon: A play by Aeschylus translated from the Greek into English with reconstructed stage directions, introduction, notes and synopsis, Granite Hills Press, 1998.
The Trojan Women: A play by Euripides; translated from the Greek into English and adapted in response to Aristophanes’ and Aristotle's criticism, Granite Hills Press, 2002.
Britannicus: A play in two acts, adapted from Jean Racine's Britannicus, Granite Hills Press, 2009.
The Golem: Man of Earth: A play in two acts based on historical events, a medieval Jewish legend, kabbalah, and the Yiddish dramatic poem by H. Leivick, Granite Hills Press, 2007.
Tony and Cleo: A play in two acts, Granite Hills Press, 2008.
Maccabee: An epic poem in free verse based upon the books of Maccabees, Granite Hills Press, 2004.
References
1931 births
Writers from Chicago
Physicians from California
Greek–English translators
Jewish American writers
Carleton College alumni
Harvard Medical School alumni
2020 deaths
21st-century American Jews
|
39542067
|
https://en.wikipedia.org/wiki/Jacket%2C%20Missouri
|
Jacket, Missouri
|
Jacket (sometimes spelled Jackett) is an unincorporated community in the southeastern corner of McDonald County, Missouri, United States. It is located on Missouri Route KK, approximately one-half mile north of the Missouri-Arkansas border and one mile west of the McDonald and Barry county border. The community is on the east bank of Big Sugar Creek.
Pioneer Settlement
The hilly and rocky Ozark Mountains land that would become Jacket had served for centuries as a home to native tribes, the last being the Osage, who lived in the area until the United States government took their land in 1808 and 1815. Thus, by the mid-19th century those living in the area were mainly pioneers from eastern states, such as Kentucky and Tennessee, and other parts of Missouri and Arkansas.
The first settlers of European descent arrived in Jacket around 1840-41, among them a John Rose, James Boles and a man known as Clemons. Clemons built a water-powered corn cracker at the spot where Otter Creek, which flows north from Pea Ridge, converges into Big Sugar Creek. Both the names Big Sugar Creek and Jacket are believed to have been coined around this time. According to local legend, Big Sugar Creek is named for the groves of sugar maples that grew on its banks and Jacket is in reference to the colonies of yellow jacket wasps populous in the area, though an alternative theory for the origin of the Jacket name dates slightly later, to the Civil War, from bushwhackers from the south who called themselves Yellow Jackets.
Clemons sold his corn cracker to Henry Schell (1810-1863) in 1846, a purchase which is said to have been possible by Schell selling a young slave boy for $400. Schell had previously established the community of Shell Knob in Barry County. In moving to Jacket, he brought his wife, Elizabeth Yocum Schell, and their young children to make a claim on the large tracts of land that were open in the area for homesteading. He then built a grist mill at the site of the corn cracker and had a house built west of the mill out of lumber that had been sawed at the Van Winkle mill in War Eagle, Arkansas. By the time of his murder by bushwhackers in 1863, he had amassed landholdings of more than 1,000 acres.
Civil War
In the summer of 1863, the Civil War was in full swing, and southwest Missouri and northwest Arkansas was an area torn by loyalties between the North and the South. Henry Schell’s four oldest sons were all off fighting for the Confederate States of America. On July 11, 1863 he was working in his mill when he either heard or saw a group of bushwhackers heading his way. He took off toward his house by foot, but was shot as he went up the hill. His wife, daughters and some neighbor women took his body and prepared it for burial, using a meal box from the mill to serve as a coffin, and buried him in the front yard of his home. One of his sons, a blacksmith by trade, later put a wrought iron fence around the grave. Following his death, his 1,000 acres was divided among his descendants, who built homes, started businesses and set aside land for churches, a cemetery and a school. Over time, his descendants continued to subdivide their acreage and sold off plots to other families.
Early 20th Century Commerce
Though Henry Schell's grist mill was destroyed by a flood a few years after his death, it was eventually replaced, by his son, also Henry Schell (1841-1928), one-quarter mile north on Big Sugar Creek. And in this new location, a central core developed for the community.
Atop the hill directly north of his mill, the younger Henry Schell established the Jacket store prior to 1908, at some point taking on Jasper Armstrong (1888-1967) as a partner in the venture. Like many similar businesses, the Jacket general store served as the center of the community and acted as more than just a place to buy merchandise, but a place to meet and talk and, in later years, incorporated a gas pump. Schell was appointed the postmaster for Jacket on January 27, 1908, though mail service delivery in the community did not start until October 2, 1911. Additionally in October 1911, Schell sold out his share in the store to Jasper Armstrong's stepbrother Joseph J.Vaughn (1878-1955), who also moved his blacksmith shop to the location. Together Vaughn and Armstrong operated the store, until Jasper Armstrong moved to Powell, Missouri to operate a store there, then Vaughn partnered with a different stepbrother Thomas J. Armstrong (1893-1957) in the business, and later with Thomas and Jasper's nephew Alvin Armstrong (1893-1951). Later, Joseph Vaughn's younger brother Edgar Vaughn (1885-1976) took over the store along with Alvin Armstrong. Following Henry Schell, the office of postmaster for the Jacket post office that operated in the store changed to Jasper Armstrong in 1912, followed by Thomas Armstrong in 1918 and finally Alvin Armstrong in 1920, who served in the role until the Jacket post office was discontinued on April 30, 1930, with mail service shifting to Garfield, Arkansas.
Ownership of the business shifted several times in the following years, with Ben Evans running it until October 1933, when a Jack Branam bought it. Then, in 1936, Tom Armstrong, who had been living in California, returned to Jacket and took back over the business. In February 1938, another merchant took his place, Joe DeMoss, though Edgar Vaughn had required it by 1941, when he sold the business for the last time. The store remained shuttered until February 1943, when Ben Evans returned and reopened it, though his return proved shore lived, with it closing again August 1 of that year. It would not stay closed though, reopening at least one more time, with Cline and Eva Carden operating it until a final closure around 1950.
In addition to the mill, store and blacksmith shop, a small tomato canning factory also operated in Jacket, a venture also owned by members of the Schell family, who ran similar operations in Powell, Missouri and Pea Ridge.
Community Life
An Extension Homemakers club was active among the women in the community through the 1930s and into the 1940s, while two 4-H clubs were established in 1937, one aimed toward boys with a focus on farming and another toward girls on sewing clothing.
For most of the 20th century, both Antioch Church of Christ and Sugar Creek Baptist Church catered to the souls of the community. The Church of Christ, with a distinctive flagstone exterior, continues to hold services. The original one-room Baptist church was built in 1897 by a group of local men as a meeting house for two congregations, one of Primitive Baptist and another of Missionary Baptist. It was designed with two doors on the front, in accordance with Primitive Baptist followings at the time that the men would enter through one door and the women and children through the other. The Missionary Baptists would use the building on the first and third Sunday of the month and the Primitives on either one or both of the additional Sundays. Over time, the two congregations merged into one and joined the Southern Baptist Convention. Starting in 1965 several additions and updates were made to the church, including the addition of an education wing at the back of the original building, to which a second story was added in the mid 1970s. The interior was modernized with paneling and fluorescent lighting, the two doors on the front of the church were replaced with a set of double doors, a porch was added and a steeple with a bell was put on the roof. Despite the updating and a surge in growth only a few years prior, by the mid 1980s membership was in decline, so in 1986 the congregation voted to close the church. In the early years of the last century, the grounds of the old Baptist church served as the location for annual 4th of July celebrations and other community events.
The Jacket school, also known as the Pleasant View school, taught generations of Jacket area children from the first through the eighth grade. In its history, there were at least three different buildings that housed the school. The earliest known building was replaced by a new school in 1923, and that building was destroyed by a fire the day before school was set to start in 1937, after which the final Jacket school building was constructed. In the late 1950s, all the rural schools in this area were consolidated into a new building on the Southwest R-V school district campus in Washburn. The 1937 building remained standing until destroyed in a fire on Thursday, October 22, 1963. The fire also burned four acres of surrounding brush, until extinguished by a Missouri Conservation Commission fire crew, who estimated the value of the destroyed building at $300.
In 1929, the county authorized the building of a bridge across Big Sugar Creek in Jacket, replacing the ford, which was unusable in high water. The single-lane bridge was built on concrete supports with steel girders and wood decking and railing, crossing the creek an eighth of a mile north of where the Civil War-era Schell mill stood. The bridge remained in use until replaced by a two-lane concrete bridge in early 1993. The south end of the current bridge sits at the approximate location of the earlier Schell mill.
Decline
Jacket’s commerce activity faded following the construction of the bridge and the increase in automobile ownership, which provided local residents with the option of leaving the community on a more regular business to do their shopping, go to work, or attend church. By 1960, the store, blacksmith shop, grist mill, post office, tomato plant and school were all shuttered. Today, only remnants of the community remain, the old general store building remains standing, though now converted into a barn, and the former Baptist church is also still extant, but in use as a private residence, while the tomato canning plant, blacksmith shop, gristmill and school are all no longer.
References
McDonald County
Northwest Arkansas
Unincorporated communities in Missouri
|
38229253
|
https://en.wikipedia.org/wiki/Atef%20Helmy
|
Atef Helmy
|
Atef Helmy Nagib (; born 23 April 1950) is an Egyptian communication and technology expert and the former minister of communications and information technology.
Early life and education
Atef Helmy was born in Cairo in 1950. He holds a Bachelor of Science in Communication and Electrical Engineering having graduated with Honors from the Military Technical College in 1973. He also received a diploma in Computer Science from the Faculty of Engineering, Ain Shams University in 1979 and a master's degree in Information Technology also from the Faculty of Engineering, Ain Shams University in 1982.
Career
Helmy was appointed as a teaching assistant in the Military Technical College upon graduation in 1973 and immediately joined the war effort with the Egyptian Armed Forces during the 1973 war. He continued to serve in the armed forces in the field of communications and information technology from 1973 to 1983.
In 1983, Helmy resigned from the armed forces and travelled to Abu Dhabi, United Arab Emirates to join NCR and grew his career within the company until he became General Manager of NCR Dubai. Helmy moved to Egypt in 1996 to establish Oracle Egypt and lead it as its Managing Director. In 2005, he launched, in Cairo, one of Oracle's largest global support centers, which was a key reference that portrayed Egypt as one of the top destinations for outsourcing and offshoring, bringing Oracle's total workforce in Egypt to over 800 professionals. He retired from Oracle in 2006 and subsequently founded Prime Business Consulting in 2007. Helmy also undertook several public roles in the ICT sector, including chairman of the Egyptian Chamber of Communications & Information Technology (CIT).
Political career
Helmy served as Egypt's Minister of Communications & Information Technology from January 2013 to March 2015, first as one of the independent members of the Qandil cabinet, and then subsequently served in the cabinets of Hazem El Biblawy and Ibrahim Mahlab
As ICT Minister, Helmy chaired the Boards of the National Telecommunications Regulatory Authority (NTRA), the Information Technology Industry Development Agency (ITIDA), and the National Telecommunication Institute (NTI). He also chaired the Board of Trustees of the Information Technology Institute (ITI), the Technology Innovation and Entrepreneurship Center (TIEC), and oversaw the institutional development of Egypt Post.
Helmy was responsible for the National ICT Strategy 2013-2020 which envisioned Egypt's transformation into the global digital economy, and spearheaded several national initiatives to achieve this goal, namely:
عاطفCreating the necessary infrastructure to make Egypt the Internet Digital Hub of the Region
عاطفDeveloping a national integrated digital platform (Digital Society) to contribute to sustainable socio-economic development, and
عاطفSupporting the ICT industry development and job creation through fostering innovation and attracting FDI
Helmy also participated in the following major projects that:
Broadband Initiative
Digital Dividend
Unified Telecom License
The new Infrastructure Company
Cloud Computing
Mobile Money & Financial Inclusion
Technology Parks
New Suez Canal ICT Infrastructure and services
Government to Citizens (G2C) digital services
local manufacturing of smart meters, smartphones and tablets
establishment of enabling ecosystem to enhance education, healthcare and other sectors through technology
Resignation
Helmy and three other ministers of Qandil Cabinet resigned from office on 1 July due to government's reaction to mass demonstrations in the country. He was again appointed minister of communications and information technology on 16 July 2013 to the interim cabinet led by Hazem Al Beblawi.
Post-ministry career
Atef Helmy was appointed as chairman of the board of Orange Egypt from April 2016 to April 2017. Additionally, he has focused his post-ministry to development activities in Egypt, Africa, and the Arab world, through the following roles:
Chairman, Prime Business Consulting
Senior Advisor, Orange Middle East & Africa (OMEA)
Ambassador of Orange to the Smart Africa Alliance
Board Member, SAMENA Council
Founding Member, Arab Federation for Digital Economy
Founding Member, Egypt Fintech Association
Honorary Member, American Chamber of Commerce
Member, Board of Trustees, British University in Egypt
Member, Board of Trustees, Beit El Zakat (Egypt House of Alms & Charity)
Board Member, Al Mohandes Insurance
Board Member, Al Hayat Insurance
Awards and recognition
Atef Helmy was appointed as Chairman of the World Summit for Information Societies (WSIS+10) high-level event in Geneva in June 2014 Youtube interview
Helmy was also awarded the Golden Medallion from the International Telecommunication Union (ITU) during the event
Personal life
Helmy is married and has 3 children and 8 grandchildren.
References
Communications Ministers of Egypt
Living people
1950 births
Egyptian chief executives
Government ministers of Egypt
Qandil Cabinet
Beblawi Cabinet
20th-century Egyptian engineers
21st-century Egyptian engineers
Egyptian electrical engineers
|
30318609
|
https://en.wikipedia.org/wiki/2011%20USC%20Trojans%20football%20team
|
2011 USC Trojans football team
|
The 2011 USC Trojans football team represented the University of Southern California in the 2011 NCAA Division I FBS college football season. The Trojans were led by head coach Lane Kiffin in his second season. They played their home games at the Los Angeles Memorial Coliseum and are members of the South Division of the Pac-12 Conference. After a triple-overtime loss to Stanford, the Trojans won their last four games, including a 50–0 win over rival UCLA in the regular-season finale. USC ended their season ranked No. 6 in the AP Poll with a 10–2 record overall and finished first in the South Division with a 7–2 record in Pac-12 play. However, as part of a post-season ban mandated by the NCAA, the Trojans could not participate in the conference championship game or play in a bowl game. USC concluded their season with two thousand-yard receivers (Robert Woods and Marqise Lee), a thousand-yard rusher (Curtis McNeal), and a 3,000-yard passer (Matt Barkley) for the first time since the 2005 season, when Kiffin served as offensive coordinator.
Coaching staff
Schedule
Game summaries
Minnesota
Robert Woods caught 17 passes – the most ever for a USC player – gained 177 yards, and had 3 touchdowns as USC defeated Minnesota 19–17 on September 3. Quarterback Matt Barkley also set a USC record by completing 34 passes during the game; Barkley had 45 attempts and finished with 304 yards passing. Despite those offensive records, Minnesota nearly completed a second half comeback. After trailing 19–3 at the half, Minnesota kept the Trojans scoreless in the second half. The Golden Gophers narrowed USC's lead to 2 points with 8:03 left in the game when their backup quarterback, Max Shortell, passed the ball to Brandon Green for a touchdown. Minnesota prevented USC from scoring on the ensuing possession. On their final possession, Minnesota started their drive at their own 9-yard line with 2:04 left to play. Cornerback Torin Harris intercepted a pass by Shortell to end the threat and preserve the win for USC.
After the game, the Pac-12 Conference named Woods as its offensive player of the week. In addition to his record-breaking 17 receptions, Woods returned three kickoffs for 73 yards.
Utah
The contest between USC and Utah, the first between the two teams since Utah's win in the 2001 Las Vegas Bowl, was the first conference game in the history of the new Pac-12. A game between California and Colorado was scheduled earlier in the day, but since the game was scheduled as a non-conference game years ahead of time, it did not count as a conference game in the official standings.
The Trojans pulled ahead in the first quarter 10 to zero, but Utah scored two touchdowns off of USC turnovers to close the gap to 17–14. The fourth quarter remained scoreless until the final seconds, when the Utes lined up for a 41-yard field goal to tie. The kick was blocked by Matt Kalil and recovered by Torin Harris, who returned it for a touchdown. The USC sideline rushed the field, which netted the team an unsportsmanlike conduct penalty. Though such penalties are dead-ball fouls and are assessed on the following play, the officials erroneously negated the touchdown and the final score was initially reported as 17–14.
Two hours after the game ended, Pac-12 officials corrected the score to 23–14. The correction was particularly significant for gambling, as the nine-point victory allowed the Trojans to narrowly edge the 8.5 point spread. Some bettors were able to cash in on either score, while some were limited to the original score, depending on casino house rules.
Syracuse
Source:
Arizona State
USC had won the last 11 meetings, with Arizona State last defeating USC in 1999. In this game, USC led 22–21 in the third quarter, but Arizona State then scored 22 unanswered points to win 43–22.
Arizona
California
USC pulled out to a 20–0 halftime lead over the Golden Bears. Matt Barkley threw two touchdowns in the first half, to Brandon Carswell and Marqise Lee. USC tested out the No. 1 national wide receiver recruit George Farmer at running back. He gained 4 yards on 4 carries and caught 1 pass for 14 yards in the game. In the second half, Cal quarterback Zach Maynard, who struggled in the first half, heated up a little bit. He ran for a 3-yard touchdown, but it was not nearly close enough to outscore the Trojans. USC won by a final score of 30–9. Barkley finished with 195 yards and 2 touchdowns, Curtis McNeal lit up the Golden Bears defense for 86 yards and a touchdown, Lee caught 4 passes for 81 yards and a touchdown. USC star receiver Robert Woods only finished with 36 yards.
Notre Dame
Stanford
Colorado
Colorado jumped off to a surprising lead after a Toney Clemons 37-yard touchdown pass from Tyler Hansen. USC then scored 28 unanswered points in the 1st half. Matt Barkley threw all 4 touchdowns in the first half. Two were to freshman wide receiver Marqise Lee (33 and 25 yards), one to freshman tight end Xavier Grimble (5 yards), and one to sophomore superstar Robert Woods (15 yards). Colorado kicker Will Oliver added a 30-yard field goal right before the half. At halftime, USC led 28–10. In the third, Barkley hit Woods again for a 45-yard bomb that put the Trojans up 35–10. Clemons and Hansen connected again in the 4th quarter, followed by a 19-yard screen pass to USC freshman running back Amir Carlisle that sealed the win for the Trojans. Barkley broke the all-time USC record in this game for most touchdown passes in a single game with 6. He finished 25/39 with 318 yards, 6 touchdowns, and 1 INT. USC running backs Curtis McNeal and Carlisle picked up the slack with normal tailback Marc Tyler out. Both had 10 carries, with McNeal picking up 90 yards and Carlisle getting 86. Woods and Lee were amazing though with 9 catches and 2 touchdowns each! Woods finished with 130 yards, while Lee tallied 124 yards. USC climbed to a 7–2 record, with a 4–2 record in the Pac-12. Colorado still has not picked up a conference win as they fell to 1–9 (0–6).
Washington
After Southern California lost to Washington on last-gasp field goals in each of the last two years, the Trojans made sure the final seconds of the latest meeting did not matter at all. Marqise Lee caught a touchdown pass and returned the second-half kickoff 88 yards for a score, and Curtis McNeal had a 79-yard touchdown sprint among his career-high 148 yards rushing in USC's 40–17 victory over Washington. Matt Barkley passed for 174 yards and one touchdown while running for an early score for the Trojans, who made sure Huskies kicker Erik Folk played no significant role, as he did in each of Washington coach Steve Sarkisian's first two meetings with his former employer.
Oregon
UCLA
Matt Barkley tied his own school record by once again completing six touchdown passes and surpassed the conference record for total touchdown passes in a season with 39 total. He passed for 423 yards, completing 35 of 42 passes (83.3 percent), and no interceptions. Robert Woods set the conference's single-season receptions record while catching 12 passes for 113 yards and two touchdowns. True freshman Marqise Lee had 13 catches for 224 yards and two touchdowns. Meanwhile, Curtis McNeal rushed for 124 yards and a touchdown on 12 carries (10.3 avg) to eclipse 1,000 yards on the season. This marked the first time that USC had two thousand yard receivers, a three-thousand yard passer, and a thousand-yard rusher since 2005, when Kiffin was the offensive coordinator. The Trojans' defensive effort was led by safety T. J. McDonald, who had a game-high 10 tackles, including one for loss, a pass breakup, and an interception that he returned for 25 yards. Cornerback Nickell Robey, linebacker Hayes Pullard, and safety Jawanza Starling each had nine tackles. Robey also had two sacks and two pass breakups.
The Trojans, who finished first in the South Division, were not eligible for the post-season due to NCAA-imposed sanctions, so the Bruins were declared the South Division champions.
Rankings
Depth chart
Notes
May 26, 2011 – NCAA upheld all findings and penalties against USC in their infractions case on former players Reggie Bush and O. J. Mayo. The USC football team will not participate in this season's Pac-12 Football Championship Game and bowl games.
July 18, 2011 – Running back Marc Tyler has been suspended for the season opener against Minnesota for making inappropriate comments to the media.
October 25, 2011 – Sophomore running back Dillon Baxter is no longer a member of the football team, however he is still being supported by USC Academic Support Services.
November 27, 2011 – Lane Kiffin announces that Dillon Baxter will no longer be a member of the football program moving forward. Baxter is expected to transfer.
December 4, 2011 – USC is ranked No. 5 in the AP Poll despite being on NCAA probation.
References
External links
USC
USC Trojans football seasons
USC Trojans football
|
23122896
|
https://en.wikipedia.org/wiki/Software%20testability
|
Software testability
|
Software testability is the degree to which a software artifact (i.e. a software system, software module, requirements- or design document) supports testing in a given test context. If the testability of the software artifact is high, then finding faults in the system (if it has any) by means of testing is easier.
Formally, some systems are testable, and some are not. This classification can be achieved by noticing that, to be testable, for a functionality of the system under test "S", which takes input "I", a computable functional predicate "V" must exists such that is true when S, given input I, produce a valid output, false otherwise. This function "V" is known as the verification function for the system with input I.
Many software systems are untestable, or not immediately testable. For example, Google's ReCAPTCHA, without having any metadata about the images is not a testable system. Recaptcha, however, can be immediately tested if for each image shown, there is a tag stored elsewhere. Given this meta information, one can test the system.
Therefore, testability is often thought of as an extrinsic property which results from interdependency of the software to be tested and the test goals, test methods used, and test resources (i.e., the test context). Even though testability can not be measured directly (such as software size) it should be considered an intrinsic property of a software artifact because it is highly correlated with other key software qualities such as encapsulation, coupling, cohesion, and redundancy.
The correlation of 'testability' to good design can be observed by seeing that code that has weak cohesion, tight coupling, redundancy and lack of encapsulation is difficult to test.
A lower degree of testability results in increased test effort. In extreme cases a lack of testability may hinder testing parts of the software or software requirements at all.
In order to link the testability with the difficulty to find potential faults in a system (if they exist) by testing it, a relevant measure to assess the testability is how many test cases are needed in each case to form a complete test suite (i.e. a test suite such that, after applying all test cases to the system, collected outputs will let us unambiguously determine whether the system is correct or not according to some specification). If this size is small, then the testability is high. Based on this measure, a testability hierarchy has been proposed.
Background
Testability, a property applying to empirical hypothesis, involves two components.
The effort and effectiveness of software tests depends on numerous factors including:
Properties of the software requirements
Properties of the software itself (such as size, complexity and testability)
Properties of the test methods used
Properties of the development- and testing processes
Qualification and motivation of the persons involved in the test process
Testability of software components
The testability of software components (modules, classes) is determined by factors such as:
Controllability: The degree to which it is possible to control the state of the component under test (CUT) as required for testing.
Observability: The degree to which it is possible to observe (intermediate and final) test results.
Isolateability: The degree to which the component under test (CUT) can be tested in isolation.
Separation of concerns: The degree to which the component under test has a single, well defined responsibility.
Understandability: The degree to which the component under test is documented or self-explaining.
Automatability: The degree to which it is possible to automate testing of the component under test.
Heterogeneity: The degree to which the use of diverse technologies requires to use diverse test methods and tools in parallel.
The testability of software components can be improved by:
Test-driven development
Design for testability (similar to design for test in the hardware domain)
Testability hierarchy
Based on the number of test cases required to construct a complete test suite in each context (i.e. a test suite such that, if it is applied to the implementation under test, then we collect enough information to precisely determine whether the system is correct or incorrect according to some specification), a testability hierarchy with the following testability classes has been proposed:
Class I: there exists a finite complete test suite.
Class II: any partial distinguishing rate (i.e. any incomplete capability to distinguish correct systems from incorrect systems) can be reached with a finite test suite.
Class III: there exists a countable complete test suite.
Class IV: there exists a complete test suite.
Class V: all cases.
It has been proved that each class is strictly included into the next. For instance, testing when we assume that the behavior of the implementation under test can be denoted by a deterministic finite-state machine for some known finite sets of inputs and outputs and with some known number of states belongs to Class I (and all subsequent classes). However, if the number of states is not known, then it only belongs to all classes from Class II on. If the implementation under test must be a deterministic finite-state machine failing the specification for a single trace (and its continuations), and its number of states is unknown, then it only belongs to classes from Class III on. Testing temporal machines where transitions are triggered if inputs are produced within some real-bounded interval only belongs to classes from Class IV on, whereas testing many non-deterministic systems only belongs to Class V (but not all, and some even belong to Class I). The inclusion into Class I does not require the simplicity of the assumed computation model, as some testing cases involving implementations written in any programming language, and testing implementations defined as machines depending on continuous magnitudes, have been proved to be in Class I. Other elaborated cases, such as the testing framework by Matthew Hennessy under must semantics, and temporal machines with rational timeouts, belong to Class II.
Testability of requirements
Requirements need to fulfill the following criteria in order to be testable:
consistent
complete
unambiguous
quantitative (a requirement like "fast response time" can not be verification/verified)
verification/verifiable in practice (a test is feasible not only in theory but also in practice with limited resources)
Treating the requirement as axioms, testability can be treated via asserting existence of a function (software)
such that input generates output , therefore . Therefore, the ideal software generates the tuple which is the input-output set ,
standing for specification.
Now, take a test input , which generates the output , that is the test tuple . Now, the question is whether or not or . If it is in the set, the test tuple passes, else the system fails the test input. Therefore, it is of imperative importance to figure out : can we or can we not create a function that effectively translates into the notion of the set indicator function for the specification set .
By the notion, is the testability function for the specification .
The existence should not merely be asserted, should be proven rigorously. Therefore, obviously without algebraic consistency, no such function can be found, and therefore, the specification cease to be termed as testable.
See also
Testability
References
Robert V. Binder: Testing Object-Oriented Systems: Models, Patterns, and Tools,
Stefan Jungmayr: Improving testability of object-oriented systems,
Wanderlei Souza: Abstract Testability Patterns, ISSN 1884-0760
Boris Beizer: , Software Testing Techniques
Software testing
Software quality
|
41225149
|
https://en.wikipedia.org/wiki/Nelson%20Agholor
|
Nelson Agholor
|
Nelson Efamehule Agholor (born May 24, 1993) is a Nigerian-American football wide receiver for the New England Patriots of the National Football League (NFL). He played college football at USC and was selected by the Philadelphia Eagles in the first round of the 2015 NFL Draft. During his five seasons with the Eagles, he won a Super Bowl title in Super Bowl LII. Agholor also played one season with the Las Vegas Raiders before joining the Patriots.
Early years
Born in Lagos, Nigeria, Agholor moved to the United States when he was five years old. He attended Berkeley Preparatory School in Tampa, Florida where he played running back, wide receiver, and defensive back for the Berkeley Buccaneers. He was rated by Rivals.com as a five-star recruit and was ranked as the third best wide receiver in his class. He committed to the University of Southern California in January 2012 over Notre Dame, Oklahoma, Florida, Florida State, and Alabama.
College career
As a true freshman in 2012, Agholor played in all 13 games as a backup wide receiver and recorded 19 receptions for 340 yards and two touchdowns.
As a sophomore in 2013, he became a starter. Agholor started all 14 games, totaling 56 receptions, 918 yards, and six touchdowns as a receiver. Along with being the leading receiver, Agholor returned punts and kicks for the Trojans. He returned 18 punts for 343 yards and two touchdowns, and 10 kickoffs for 175 yards. Agholor was recognized as a second-team All-American by numerous sports outlets for his punt returning. Agholor returned as a starter his junior season in 2014. He led the team with 104 receptions for 1,313 yards and 12 touchdowns.
After his junior season, Agholor decided to forgo his senior season and entered the 2015 NFL Draft.
Statistics
Professional career
Philadelphia Eagles
Agholor was selected by the Philadelphia Eagles in the first round with the 20th overall pick of the 2015 NFL Draft. He signed a four-year contract on May 7, 2015, worth around $9.4 million with a signing bonus of $5.1 million.
2015
On December 13, 2015, Agholor scored his first NFL career touchdown, a 53-yard reception from quarterback Sam Bradford, in a matchup against the Buffalo Bills. During his rookie season in 2015, Agholor played 13 games with 283 receiving yards and a touchdown.
2016
During his second season in 2016, Agholor played 15 games with 365 receiving yards and two touchdowns.
2017
On March 13, 2017, it was reported that Agholor would switch from the #17, which he wore in his first two seasons, to the #13. He opted to give the #17 to newly acquired free agent wide receiver Alshon Jeffery.
During the 2017 season, Agholor found more success when he was switched to a slot receiver role. On September 10, 2017, in the season opening 30–17 victory over the Washington Redskins, Agholor had a 58-yard receiving touchdown from quarterback Carson Wentz in the first quarter. He finished the game with six receptions for 86 yards. On September 17, in a Week 2 27–20 loss to the Kansas City Chiefs, he recorded his second touchdown of the season late in the fourth quarter to cut into the Chiefs' lead. He would end the 2017 regular season with his best season yet, getting more receiving yards and touchdowns than his previous two seasons combined.
During Super Bowl LII against the New England Patriots, Agholor finished with nine receptions for 84 receiving yards as the Eagles won 41–33, earning their first Super Bowl championship in franchise history.
2018
On April 30, 2018, the Eagles exercised the fifth-year option on Agholor's contract in order to retain him for the 2019 season.
In the 2018 season opener, against the Atlanta Falcons, Agholor completed his first career NFL pass attempt to Nick Foles on a trick play that went for 15 yards. The play helped set up an eventual Jay Ajayi-rushing touchdown in the Eagles' 18–12 victory. In the next game, he scored his first receiving touchdown of the 2018 season as part of an eight-reception, 88-yard performance against the Tampa Bay Buccaneers. He put his best statistical performance of the season in the Week 16 32–30 victory over the Houston Texans with five receptions for 116 yards and a touchdown. Overall, in the 2018 season, he finished with 64 receptions for 736 yards and four touchdowns.
2019
In Week 2 against the Atlanta Falcons, Agholor caught eight passes for 107 yards and his first receiving touchdown of the season. However, with his team down late in the fourth quarter, he dropped a wide-open pass that could have led to the go-ahead score after losing it in the lights of Mercedes-Benz Stadium. The Eagles lost the game 24–20 as a result.
In Week 3 against the Detroit Lions, Agholor caught eight passes for 50 yards and two touchdowns as the Eagles lost 27–24. Overall, Agholor finished the 2019 season with 39 receptions for 363 receiving yards and three receiving touchdowns.
Las Vegas Raiders
On March 25, 2020, Agholor signed a one-year contract with the Las Vegas Raiders.
Agholor entered training camp competing for a starting wide receiver job against Tyrell Williams, Zay Jones, Hunter Renfrow, and rookies Henry Ruggs and Bryan Edwards. At the end of training camp, head coach Jon Gruden named Agholor the fourth wide receiver on the Raiders’ depth chart, behind Ruggs, Edwards, and Renfrow.
Agholor made his debut with the Raiders in Week 1 against the Carolina Panthers. During the game, Agholor caught one pass for a 23 yard touchdown in the 34–30 win.
Following an injury to Edwards in Week 3, Agholor stepped into the starting lineup in Week 4 against the Buffalo Bills and caught 4 passes for 44 yards and a touchdown. In Week 5 against the Kansas City Chiefs, Agholor caught two passes for 67 yards, including a 59-yard touchdown reception, as the Raiders won 40–32. In Week 7 against the Tampa Bay Buccaneers, he had five receptions for 107 receiving yards and a touchdown in the 45–20 loss. In Week 14, against the Indianapolis Colts, he had five receptions for 100 yards and a touchdown in the 44–27 loss.
In Week 16 against the Miami Dolphins, Agholor recorded 5 catches for 155 yards, including an 85 yard touchdown reception, during the 26–25 loss. Agholor finished the season with 48 receptions for 896 yards and 8 touchdowns in 16 games (13 starts).
New England Patriots
On March 19, 2021, Agholor signed a two-year, $26 million contract with the New England Patriots. Agholor caught his first touchdown from Mac Jones against the Miami Dolphins.
NFL career statistics
Regular season
Playoffs
References
External links
Las Vegas Raiders bio
Philadelphia Eagles bio
USC Trojans bio
1993 births
Living people
American football wide receivers
Las Vegas Raiders players
New England Patriots players
Nigerian emigrants to the United States
Nigerian players of American football
Philadelphia Eagles players
Players of American football from Tampa, Florida
USC Trojans football players
|
31944086
|
https://en.wikipedia.org/wiki/Robert%20Schriesheim
|
Robert Schriesheim
|
Robert A. Schriesheim (born 1960) is an American business executive, who has been a director, chairman and CFO of a number of companies. According to a published interview with FTI Consulting in November 2021 he is chairman of Truax Partners LLC and has partnered with institutional investors leading large enterprises through complex transformations serving in various executive leadership and board roles. According to a 2016 Wall Street Journal article, he has a "history of working in partnership with private equity firms, hedge funds and institutional investors in special situation circumstances". According to Barron's and CFO magazine, Schriesheim has "spent most of his career at the high end of the strategy spectrum, embroiled in complex restructurings" focused on capital allocation.
Career
Schriesheim currently serves as a board member of a portfolio of publicly traded companies including Houlihan Lokey, an international investment banking firm and Skyworks Solutions, a global provider of semiconductors to the mobile communications market. Schriesheim served as the full-time chairman of the finance committee of the board and was credited with leading the corporate restructuring of Frontier Communications, a Fortune 500 telecommunications services provider during which, according to a November 2021 interview with FTI Consulting, $5 billion in market value was generated and was recognized with the 2021 M&A Advisor’s Annual Turnaround Award for Telecommunications Services Deal of the Year.
Other boards he has served on include NII Holdings, formerly known as Nextel International, a provider of wireless communications services in Latin America, primarily in Brazil acquired by América Móvil; FirstAdvantage, a portfolio company of private equity firm Symphony Technology Group, which is an international provider of employee screening solutions acquired by Silver Lake; Outcome Health a digital media company operating a patient point-of-care health intelligence platform where he was an investor designated board representative of an equity investor consortium including Goldman Sachs Investment Partners, CapitalG (formerly Google Capital) and Pritzker Venture Capital Group. Previously, he also served as a board director of a number of public companies including Forest City Realty Trust where he was nominated by Starboard Value and which was subsequently sold to Brookfield Asset Management, Lawson Software, Inc.; Georgia Gulf Corp, now known as Axiall; Co-chairman of MSC Software, acquired by Symphony Technology Group and Elliott Associates; Dobson Communications, acquired by ATT; Golden Telecom, Acquired by VimpelCom; and Global Telesystems, a European communications provider, backed by Soros Private Equity Affiliates which was acquired by KPNQwest.
Until 2016, Schriesheim served as executive vice president and chief financial officer of troubled Sears Holdings Corporation which was controlled by chairman and CEO Edward S. Lampert. During Schriesheim's tenure, Sears managed its balance sheet and reconfigured its asset portfolio as part of a strategic transformation including the spin-offs of Lands' End, Sears Canada, Sears Hometown and Outlet Stores, Orchard Supply Hardware and the separation of Seritage Growth Properties, a public REIT. According to an article published in The Wall Street Journal on May 26, 2016, and other publications, Schriesheim was described as having been selected by Eddie Lampert as CFO in 2011 and raised $9 billion of capital through various spin-offs and financings — and departed Sears in October 2016 to focus on his board director portfolio. Two years after Schriesheim's departure in 2016, Sears Holdings filed for Chapter 11 in October 2018.
Prior to joining Sears Holdings, Schriesheim was senior vice president and chief financial officer for publicly traded global human resources business services provider Hewitt Associates until its sale to Aon. Prior to Hewitt, Schriesheim was a board member, executive vice president and chief financial officer of Lawson Software, a publicly traded Enterprise Resource Planning software provider until its acquisition by Infor Global Solutions and Golden Gate Capital.
Education
He attended the Pingry School, a college preparatory school in New Jersey, graduating in 1978, graduated from Princeton University with a degree in chemistry and from the University of Chicago Booth School of Business with an MBA.
While at Princeton he was a member of the Princeton Men's Varsity Swim team.
Notable roles
Schriesheim led the corporate restructuring of Frontier Communications a Fortune 500 nationwide telecommunications provider with over $7 billion in revenue as the full time finance committee chairman overseeing the refreshment of the board of directors, installation of a new CEO, implementation of an operational turnaround plan, initiating a new strategy for reinvestment while concurrently recapitalizing an over levered balance sheet. According to a published interview with FTI Consulting in November 2021, the company moved through a pre-arranged chapter 11 process emerging in April 2021 resulting in the reduction of $10 billion in debt from the $17.5 billion at the start of the restructuring while generating $5 billion in market value for the benefit of the bond holders.
He was named as executive vice president and chief financial officer of Sears Holdings in August 2011 to navigate Sears through a corporate transformation according to a release issued by Sears. Sears Holdings operating through 2,000 Sears and Kmart stores with total 2011 revenues of $41 billion and approximately 200,000 employees. Sears Holdings was formed in 2005 through the merger of Kmart and Sears engineered by billionaire investor and financier Edward S. Lampert who served as chairman and CEO of Sears Holdings.
Before Sears, he was CFO of Hewitt Associates reporting to CEO Russell P. Fradin. Hewitt was an NYSE-listed public company and the world's leading global provider of human resources and outsourcing solutions with $3B+ in revenues and 23,000 employees in 30 countries. Within 6 months of Schriesheim joining Hewitt, it was announced, in July 2010 that Aon Corporation would acquire Hewitt for $4.9 billion in a transaction that closed in October 2010 at a 41% premium to the prior day's closing price resulting in $1.5 billion of shareholder value.
Prior to Hewitt, he was executive vice president and chief financial officer from 2006 to 2009, and a board director of Lawson Software from 2006 until July 2011. In a Barron's article Schriesheim was credited for the turnaround in financial performance. Lawson's investors included Forbes 400 billionaire Romesh T. Wadhwani through his private equity firm Symphony Technology Group with Wadhwani serving Lawson as Co-Chairman. Lawson announced its sale April 2011 to software company Infor Global Solutions (backed by private equity firm Golden Gate Capital) for $2 billion for a 14% premium to the stock price before speculation and 35% premium to the 52-week average closing price. Billionaire investor Carl Icahn had earlier taken a 10.9% stake in the company and supported the sale to Infor.
He was named a board director of MSC Software, a global provider of simulation software, in December 2007 and was later named co-chairman. In May 2008 activist hedge fund Elliott Associates founded by billionaire investor Paul Singer disclosed it held a 5.5% stake in MSC Software. MSC was sold to private equity firm Symphony Technology Group, controlled by Romesh T. Wadhwani, for $390 million in 2009 with an interesting twist being that financing was provided by activist hedge fund Elliott Associates.
He was a board director of Dobson Communications – the largest independent rural wireless provider in the US with over $1 billion in revenues from 2004 until its sale in 2007 to ATT for $5.1 billion resulting in $2.5 billion of shareholder value creation.
In addition Schriesheim has been a board member of Skyworks Solutions an innovator of high reliability analog and mixed signal semiconductors since 2006.
From 1999 to 2002, Schriesheim was executive vice president, CFO and a board member of NYSE-listed Global TeleSystems ("GTS") (the owner of Ebone a European broadband optical and IP network service provider. He was brought in to help restructure and refocus the company. GTS was a pan-European communications services provider, backed by hedge fund Investor and Philanthropist Alan B. Slifka and affiliates of Forbes 400 billionaire hedge fund Investor and Philanthropist George Soros and Soros Private Equity. GTS had revenues of over $1 billion and operations in 20 countries in Europe as well as a NASDAQ-listed subsidiary, Golden Telecom, which held communications assets in Russia. GTS was a portfolio of communications assets in Western and Eastern Europe which went through an IPO in 1998. It subsequently experienced challenges with an over-levered balance sheet as Europe went through deregulation of the communications industry and was impacted by the dot.com downturn. In 2001, to facilitate the sale, GTS undertook a pre-arranged filing under Chapter 11 of the United States Bankruptcy Code (U.S.B.C.) and, in prearranged proceedings, a petition for surseance (moratorium), offering a composition, in the Netherlands to restructure its debt, in excess of $2 billion. All proceedings were approved, confirmed and completed by March 31, 2002 as part of the sale of the company to KPNQwest.
Earlier in his career he was affiliated with Brooke Group, a Leveraged buyout firm controlled by Bennett S. LeBow. Investor Bennett S. LeBow acquired control of Western Union through an outside of chapter 11 process that included the concurrent acquisition of the international telex operations of ITT as part of a complex leveraged recapitalization that was financed by Drexel Burnham and Michael Milken in a process that included many prominent investors who had also attempted to acquire control including Richard Rainwater and Jay Pritzker. LeBow installed Schriesheim at Western Union from 1987 to 1990 as a special adviser to CEO Robert J. Amman to help oversee a restructuring of the company. They executed a strategy of redirecting Western Union from being an asset-based provider of communications services into a provider of consumer-based money transfer financial services and divested the company's telecommunications assets. Ultimately, LeBow's $25 million investment to acquire control of Western Union in 1987 was rewarded when the company was acquired by First Financial Management in 1993 for $1.15 billion also making Carl Icahn a return of 3 to 4 times his investment in the bonds in the process. First Financial Management was subsequently acquired in 1995 by First Data Corp in a $6.6 billion merger.
Early life and family
Schriesheim was raised in Summit, New Jersey, a suburb of New York City, by parents Beatrice and Dr. Alan Schriesheim who were scientists and educators and he has an older sister. His father is Dr. Alan Schriesheim the Director emeritus and retired CEO of Argonne National Laboratory, and an internationally noted chemist. In 2008 The Schriesheim Distinguished Graduate Fellowship was established at the Eberly College of Science at Penn State University. His mother Beatrice Schriesheim was a long-time high school chemistry teacher committed to improving science education in the United States. She was born in 1930 in Poland and survived the Holocaust by escaping the Nazi invasion in 1939, surviving imprisonment in Siberia and arriving in the US in 1947. Her memoirs, "Bea's Journey", documented her Holocaust journey and her life in the United States. They were self-published in 2003 after her death at the age of 73.
References
External links
CFO Magazine Profile "A CFO's Strategy: Verticals within Verticals" November 12, 2009 http://www.cfo.com/article.cfm/14455175
Barron's May 28, 2007 "SAP, Oracle and...Who?" http://online.barrons.com/article/SB118014674191715517.html?mod=seekingalpha
1960 births
Living people
American financial businesspeople
20th-century American Jews
Pingry School alumni
Princeton University alumni
University of Chicago Booth School of Business alumni
21st-century American Jews
|
52918006
|
https://en.wikipedia.org/wiki/IEEE%20Computer%20Science%20and%20Engineering%20Undergraduate%20Teaching%20Award
|
IEEE Computer Science and Engineering Undergraduate Teaching Award
|
The IEEE Computer Science & Undergraduate Teaching Award is a Technical Field Award of the IEEE that was established by the IEEE Computer Society in 1999. It is presented for outstanding contributions to undergraduate computer science education through teaching and service.
The award nomination requires a minimum of 3 endorsements.
Recipients of this award receive a certificate, and honorarium.
Recipients
The recipients of the IEEE Computer Science & Engineering Undergraduate Teaching Award include the following people:
2017: Sven Koenig
2016: Mark Sherriff
2015: Henry C.B. Chan
2014: Elizabeth Gerber
2013: Robert J. Fornaro
2012: Mark Guzdial
2011: Benjamin Hescott
2010: No Award
2009: Judy Robertson
2008: Elizabeth L. Burd
2007: Darrin M. Hanna
2006: No Award
2005: No Award
2004: No Award
2003: Sally A. Fincher
2002: Alan Clements
2001: Steven S. Skiena, and David G. Meyer
2000: No Award
1999: Joseph L. Zachary, and Bruce W. Weide and Timothy J. Long
References
Computer Science and Engineering Undergraduate Teaching Award
Computer science education
|
3234218
|
https://en.wikipedia.org/wiki/Dejan%20Ristanovi%C4%87
|
Dejan Ristanović
|
Dejan Ristanović (, Belgrade, 16 April 1963), is a well known Serbian writer and computer publicist.
In January 1981 he wrote the first article on personal computers for the popular science magazine Galaksija (Galaxy). During the following years he wrote many articles about programmable calculators and home computers.
In December 1983 he wrote a special edition of Galaksija called "Computers in Your Home" (Računari u vašoj kući), the first computer magazine in former Yugoslavia. This issue featured entire schematic diagrams guides on how to build computer Galaksija, created by Voja Antonić.
The series of special editions was eventually developed into computer magazine Računari (Computers). Ristanović was a contributor of Računari for 11 years. After that, in 1995 Ristanović founded the PC Press publishing company and magazine PC, the first privately owned computer magazine in Serbia. Ristanović has been the editor-in-chief of PC for more than 10 years.
In 1989 he co-founded Sezam BBS, which eventually become a major BBS system and evolved to Internet provider Sezam Pro, which in 2009 merged in Orion Telecom.
Dejan Ristanović is the author of about 20 books and more than 500 magazine articles about computers, written in the Serbian and English languages. He also operates the www.ti59.com nostalgia home page of TI-59 programmable calculators.
Dejan Ristanović is alumnus of Mathematical Gymnasium Belgrade, graduated in 1981 (search term in the list: "Ристановић Дејан").
References
External links
Dejan Ristanović's home page
Dejan Ristanovic's home page
List of publications
TI-59 page
Sezam Pro Internet provider
Orion Telecom
Mathematical Gymnasium Belgrade
Magazine founders
Serbian technology writers
Computer programmers
Serbian businesspeople
Serbian journalists
Galaksija (computer)
Living people
Year of birth missing (living people)
Serbian magazine editors
|
312757
|
https://en.wikipedia.org/wiki/Tron
|
Tron
|
Tron is a 1982 American science fiction action-adventure film written and directed by Steven Lisberger from a story by Lisberger and Bonnie MacBird. The film stars Jeff Bridges as Kevin Flynn, a computer programmer and video game developer who is transported inside the software world of a mainframe computer where he interacts with programs in his attempt to escape; it also stars Bruce Boxleitner, David Warner, Cindy Morgan, and Barnard Hughes. Tron, along with The Last Starfighter, has the distinction of being one of cinema's earliest films to use extensive computer-generated imagery (CGI).
The inspiration for Tron dates back to 1976, when Lisberger became intrigued with video games after seeing Pong. He and producer Donald Kushner set up an animation studio to develop Tron with the intention of making it an animated film. To promote the studio itself, Lisberger and his team created a 30-second animation featuring the first appearance of the title character. Eventually, Lisberger decided to include live-action elements with both backlit and computer animation for the actual feature-length film. Various studios had rejected the storyboards for the film before Walt Disney Productions agreed to finance and distribute Tron. There, backlit animation was finally combined with the computer animation and live action.
Tron was released on July 9, 1982. The film was a moderate success at the box office, and received positive reviews from critics, who praised its groundbreaking visuals and acting but criticized its storyline as being incoherent. Tron received nominations for Best Costume Design and Best Sound at the 55th Academy Awards, but was not nominated in the Best Visual Effects category. Tron spawned multiple video games (including an arcade tie-in released shortly after the film), and as it became a cult film, a multimedia franchise including comic books. A sequel titled Tron: Legacy, directed by Joseph Kosinski, was released in 2010, with Bridges and Boxleitner reprising their roles and Lisberger acting as producer, which itself was followed by the animated series Tron: Uprising, set between the two films.
Plot
Kevin Flynn is a leading software engineer, formerly employed by the computer corporation ENCOM, who now runs a video game arcade and attempts to hack into ENCOM's mainframe system. However, ENCOM's Master Control Program (MCP) halts his progress. Within ENCOM, programmer Alan Bradley and his girlfriend, engineer Lora Baines, discover that the MCP has closed off their access to projects. When Alan confronts the senior executive vice president, Ed Dillinger, Dillinger claims that the security measures are an effort to stop outside hacking attempts. However, when Dillinger privately questions the MCP through his computerized desk, he realizes the MCP has expanded into a powerful virtual intelligence and has become power-hungry, illegally appropriating personal, business, and government programs to increase its own capabilities. Dillinger rose to the top of ENCOM by presenting Flynn's games as his own. The MCP blackmails Dillinger with information about his plagiarizing Flynn's games if he does not comply with its directives.
Lora deduces that Flynn is the hacker, and she and Alan go to his arcade to warn him. Flynn reveals that he has been trying to locate evidence proving Dillinger's plagiarism, which launched Dillinger's rise in the company. Together, the three form a plan to break into ENCOM and unlock Alan's "Tron" program, a self-governing security measure designed to protect the system and counter the functions of the MCP. Once inside ENCOM, the three split up and Flynn comes into direct conflict with the MCP, communicating with his terminal. Before Flynn can get the information he needs to reveal Dillinger's acts, the MCP uses an experimental laser to digitize and upload Flynn into the ENCOM mainframe cyberspace, where programs are living entities appearing in the likeness of the human "Users" (programmers) who created them.
Flynn learns that the MCP and its second-in-command, Sark, rule and coerce programs to renounce their belief in the Users. The MCP forces programs that resist to play in deadly games and begins putting Flynn in duels. Flynn meets other captured programs, Ram and Tron, between matches. Partnered, the three escape into the mainframe during a light cycle match (an arcade game Flynn wrote the program for and is skilled at), but Flynn and Ram become separated from Tron by an MCP pursuit party. While attempting to help Ram, who was wounded in the pursuit, Flynn learns that he can manipulate portions of the mainframe by accessing his programmer knowledge. Ram recognizes Flynn as a User and encourages him to find Tron and free the system before "derezzing" (dying). Using his new ability, Flynn rebuilds a vehicle and disguises himself as one of Sark's soldiers.
Tron enlists help from Yori, a sympathetic program, and at an I/O tower receives information from Alan necessary to destroy the MCP. Flynn rejoins them, and the three board a hijacked solar sailer to reach the MCP's core. However, Sark's command ship destroys the sailer, capturing Flynn and Yori and presumably killing Tron. Sark leaves the command ship and orders its deresolution, but Flynn keeps it intact by again manipulating the mainframe, while Sark reaches the MCP's core on a shuttle carrying captured programs. While the MCP attempts to absorb captive programs, Tron, who turns out to have survived, confronts Sark and critically injures him, prompting the MCP to give him all its functions. Realizing that his ability to manipulate the mainframe might give Tron an opening, Flynn leaps into the beam of the MCP, distracting it. Seeing the break in the MCP's shield, Tron attacks through the gap and destroys the MCP and Sark, ending the MCP's control over the mainframe and allowing the captured programs to communicate with users again.
Flynn reappears in the real world, rematerialized at his terminal. Tron's victory in the mainframe has released all lockouts on computer access, and a nearby printer produces the evidence that Dillinger had plagiarized Flynn's creations. The next morning, Dillinger enters his office to find the MCP deactivated and the proof of his theft publicized. Flynn is subsequently promoted to CEO of ENCOM and is happily greeted by Alan and Lora as their new boss.
Cast
Jeff Bridges as Kevin Flynn, a former programmer and video game developer at ENCOM and video arcade proprietor who is beamed into the ENCOM mainframe via a digitizing laser by the Master Control Program.
Bridges also portrays Clu (Codified Likeness Utility), a hacking program developed by Flynn to find evidence of Dillinger's theft in the mainframe.
Bruce Boxleitner as Alan Bradley, Flynn's work partner and fellow programmer at ENCOM.
Boxleitner also portrays Tron, a security program developed by Bradley to self-monitor communications between the MCP and the real world.
David Warner as Ed Dillinger, the Senior Executive Vice President of ENCOM and former co-worker of Flynn's, who used the MCP to steal Flynn's work and pass it off as his own, earning himself a series of undeserved promotions.
Warner also portrays Sark, a command program developed by Dillinger to serve as the MCP's second-in-command.
Warner also provides the uncredited voice of the Master Control Program (MCP), a rogue artificial intelligence operating system (originally a chess program created by Dr. Gibbs and "improved" by Dillinger) which monitors and controls ENCOM's mainframe.
Cindy Morgan as Dr. Lora Baines, Bradley's co-worker and girlfriend, as well as assistant to Dr. Gibbs on the digitization experiment.
Morgan also portrays Yori, an input/output program developed by Dr. Baines and an ally of Tron.
Barnard Hughes as Dr. Walter Gibbs, a co-founder of ENCOM running the company's science division, who creates the SHV 20905 digitizing laser with Dr. Baines's assistance.
Hughes also portrays Dumont, a "guardian" program developed by Dr. Gibbs to protect input/output junctions in the mainframe.
Hughes also provides the uncredited voice of the Master Control Program's original incarnation.
Dan Shor as Roy Kleinberg, an ENCOM employee
Shor also portrays Ram, an actuarial program possibly developed by Kleinberg to sort out connections between ENCOM and an unnamed insurance company, who is a close ally of Tron and Flynn.
Peter Jurasik as Crom, a compound interest program matched against Flynn on the Game Grid.
Tony Stephano as Peter, Dillinger's assistant.
Stephano also portrays Sark's Lieutenant.
Production
Origins
The inspiration for Tron occurred in 1976 when Steven Lisberger, then an animator of drawings with his own studio, looked at a sample reel from a computer firm called MAGI and saw Pong for the first time. He was immediately fascinated by video games and wanted to do a film incorporating them. According to Lisberger, "I realized that there were these techniques that would be very suitable for bringing video games and computer visuals to the screen. And that was the moment that the whole concept flashed across my mind". The film's concept of entering a parallel game world was also inspired by the classic tale Alice in Wonderland.
Lisberger had already created an early version of the character 'Tron' for a 30 second long animation which was used to promote both Lisberger Studios and a series of various rock radio stations. This backlit cel animation depicted Tron as a character who glowed yellow; the same shade that Lisberger had originally intended for all the heroic characters developed for the feature-length Tron. This was later changed to blue for the finished film (see Pre-production below). The prototype Tron was bearded and resembled the Cylon Centurions from the 1978 TV series Battlestar Galactica. Also, Tron was armed with two "exploding discs", as Lisberger described them on the 2-Disc DVD edition (see Rinzler).
Lisberger elaborates: "Everybody was doing backlit animation in the 70s, you know. It was that disco look. And we thought, what if we had this character that was a neon line, and that was our Tron warrior – Tron for electronic. And what happened was, I saw Pong, and I said, well, that's the arena for him. And at the same time I was interested in the early phases of computer generated animation, which I got into at MIT in Boston, and when I got into that I met a bunch of programmers who were into all that. And they really inspired me, by how much they believed in this new realm."
He was frustrated by the clique-like nature of computers and video games and wanted to create a film that would open this world up to everyone. Lisberger and his business partner Donald Kushner moved to the West Coast in 1977 and set up an animation studio to develop Tron. They borrowed against the anticipated profits of their 90-minute animated television special Animalympics to develop storyboards for Tron with the notion of making an animated film. But after Variety mentioned the project briefly during its early phase, it caught the attention of computer scientist Alan Kay. He contacted Lisberger and convinced him to use him as an adviser on the movie, then persuaded him to use real CGI instead of just hand-animation.
Bonnie MacBird wrote the first drafts of Tron with extensive input from Lisberger, basing the original personality of Alan on Alan Kay. He gave her and Lisberger the same tour of Xerox PARC that famously inspired the Apple Macintosh, and their many conversations (and a class she took with Donald Knuth at Stanford) inspired her to include many computer science references. As a result of working together, Kay and MacBird became close and later married. She also created Tron as a character (rather than a visual demo) and Flynn. Originally MacBird envisioned Flynn more comedically, suggesting the then-30-year-old Robin Williams for the role. Besides many story changes after the script went to Disney, including giving it "a more serious tone with quasi religious overtones", and removing most of the scientific elements, none of her dialogue remains in the final film, and there was a "rather bitter credits dispute."
The film was eventually conceived as an animated film bracketed with live-action sequences. The rest involved a combination of computer-generated visuals and back-lit animation. Lisberger planned to finance the movie independently by approaching several computer companies but had little success. However, one company, Information International Inc., was receptive. He met with Richard Taylor, a representative, and they began talking about using live-action photography with back-lit animation in such a way that it could be integrated with computer graphics. At this point, there was a script and the film was entirely storyboarded, with some computer animation tests completed. He had spent approximately $300,000 developing Tron and had also secured $4–5 million in private backing before reaching a standstill. Lisberger and Kushner took their storyboards and samples of computer-generated films to Warner Bros., Metro-Goldwyn-Mayer, and Columbia Pictures – all of which turned them down.
In 1980, they decided to take the idea to Walt Disney Productions, which was interested in producing more daring productions at the time. Tom Wilhite, Disney's vice president for creative development, watched Lisberger's test footage and convinced Ron Miller to give the movie a chance. However, Disney executives were uncertain about giving $10–12 million to a first-time producer and director using techniques which, in most cases, had never been attempted. The studio agreed to finance a test reel which involved a flying disc champion throwing a rough prototype of the discs used in the film. It was a chance to mix live-action footage with back-lit animation and computer-generated visuals. It impressed the executives at Disney and they agreed to back the film. MacBird and Lisberger's script was subsequently re-written and re-storyboarded with the studio's input. At the time, Disney rarely hired outsiders to make films for them, and Kushner found that he and his group were given a chilly reception because they "tackled the nerve center – the animation department. They saw us as the germ from outside. We tried to enlist several Disney animators, but none came. Disney is a closed group." As a result, they hired Wang Film Productions for the animation.
Production
Because of the many special effects, Disney decided in 1981 to film Tron completely in 65-mm Super Panavision (except for the computer-generated layers, which were shot in VistaVision and both anamorphic 35mm and Super 35 which were used for some scenes in the "real" world and subsequently "blown up" to 65 mm). Three designers were brought in to create the look of the computer world. French comic book artist Jean Giraud (also known as Moebius) was the main set and costume designer for the film. Most of the vehicle designs (including Sark's aircraft carrier, the light cycles, the tank, and the solar sailer) were created by industrial designer Syd Mead. Peter Lloyd, a high-tech commercial artist, designed the environments. Nevertheless, these jobs often overlapped, leaving Giraud working on the solar sailer and Mead designing terrain, sets and the film's logo. The original 'Program' character design was inspired by Lisberger Studios' logo of a glowing bodybuilder hurling two discs.
To create the computer animation sequences of Tron, Disney turned to the four leading computer graphics firms of the day: Information International, Inc. of Culver City, California, who owned the Super Foonly F-1 (the fastest PDP-10 ever made and the only one of its kind); MAGI of Elmsford, New York; Robert Abel and Associates of California; and Digital Effects of New York City. Bill Kovacs worked on the film while working for Robert Abel before going on to found Wavefront Technologies. The work was not a collaboration, resulting in very different styles used by the firms.
Tron was one of the first films to make extensive use of any form of computer animation, and it is celebrated as a milestone in the industry though only fifteen to twenty minutes of such animation were used, mostly scenes that show digital "terrain" or patterns, or include vehicles such as light-cycles, tanks and ships. Because the technology to combine computer animation and live action did not exist at the time, these sequences were interspersed with the filmed characters. One of the computers used had only 2 MB of memory and no more than 330 MB of storage. This put a limit on detail of background; and at a certain distance, they had a procedure of mixing in black to fade things out, a process called "depth cueing". The film's Computer Effects Supervisor Richard Taylor told them "When in doubt, black it out!", which became their motto. Originally the film was meant to use white backgrounds like in THX 1138 inside the Grid, but it would require such huge amounts of lights that it was decided to use black backgrounds instead.
The computers at the time could not do animation, so the frames had to be produced one by one. In some of the more complex sequences, like the Solar Sailer moving through metal canyons, each frame could take up to six hours to produce. There was no way to digitally print them on film either; rather, a motion picture camera was placed in front of a computer screen to capture each individual frame.
Most of the scenes, backgrounds, and visual effects in the film were created using more traditional techniques and a unique process known as "backlit animation". In this process, live-action scenes inside the computer world were filmed in black-and-white on an entirely black set, placed in an enlarger for blow-ups and transferred to large format Kodalith high-contrast film. These negatives were then used to make Kodalith sheets with a reverse (positive) image. Clear cels were laid over each sheet and all portions of the figure except the areas that were exposed for the later camera passes were manually blacked out. Next the Kodalith sheets and cel overlays were placed over a light box while a VistaVision camera mounted above it made separate passes and different color filters. A typical shot normally required 12 passes, but some sequences, like the interior of the electronic tank, could need as many as 50 passes. About 300 matte paintings were made for the film, each photographed onto a large piece of Ektachrome film before colors were added by gelatin filters in a similar procedure as in the Kodaliths. The mattes, rotoscopic and CGI were then combined and composed together to give them a "technological" appearance. With multiple layers of high-contrast, large format positives and negatives, this process required truckloads of sheet film and a workload even greater than that of a conventional cel-animated feature. The Kodalith was specially produced as large sheets by Kodak for the film and came in numbered boxes so that each batch of the film could be used in order of manufacture for a consistent image. However, this was not understood by the filmmakers and, as a result, glowing outlines and circuit traces occasionally flicker as the film speed varied between batches. After the reason was discovered, this was no longer a problem as the batches were used in order and "zinger" sounds were used during the flickering parts to represent the computer world malfunctioning as Lisberger described it. Lisberger later had these flickers and sounds digitally corrected for the 2011 restored Blu-ray release as they were not included in his original vision of the film. Due to its difficulty and cost, this process of back-lit animation was not repeated for another feature film.
Sound design and creation for the film was assigned to Frank Serafine, who was responsible for the sound design on Star Trek: The Motion Picture in 1979.
At one point in the film, a small entity called "Bit" advises Flynn with only the words "yes" and "no" created by a Votrax speech synthesizer.
BYTE wrote: "Although this film is very much the personal expression of Steven Lisberger's vision, nevertheless [it] has certainly been a group effort". More than 569 people were involved in the post-production work, including 200 inkers and hand-painters, 85 of them from Taiwan's Cuckoo's Nest Studio. Unusually for an English-language production, in the end credits the Taiwanese personnel were listed with their names written in Chinese characters.
This film features parts of the Lawrence Livermore National Laboratory; the multi-storey ENCOM laser bay was the target area for the SHIVA solid-state multi-beamed laser. Also, the stairway that Alan, Lora, and Flynn use to reach Alan's office is the stairway in Building 451 near the entrance to the main machine room. The cubicle scenes were shot in another room of the lab. At the time, Tron was the only film to have scenes filmed inside this lab.
The original script called for "good" programs to be colored yellow and "evil" programs (those loyal to Sark and the MCP) to be colored blue. Partway into production, this coloring scheme was changed to blue for good and red for evil, but some scenes were produced using the original coloring scheme: Clu, who drives a tank, has yellow circuit lines, and all of Sark's tank commanders are blue (but appear green in some presentations). Also, the light-cycle sequence shows the heroes driving yellow (Flynn), orange (Tron), and red (Ram) cycles, while Sark's troops drive blue cycles; similarly, Clu's tank is red, while tanks driven by crews loyal to Sark are blue.
Because of all the personal information about citizens which exist inside computer networks, such as social security number and driver's license, the idea was that each real world person has a digital counterpart inside the Grid based on information about them, which is why it was decided to use some of the same actors in both worlds.
Budgeting the production was difficult by reason of breaking new ground in response to additional challenges, including an impending Directors Guild of America strike and a fixed release date. Disney predicted at least $400 million in domestic sales of merchandise, including an arcade game by Bally Midway and three Mattel Intellivision home video games.
The producers also added Easter eggs: during the scene where Tron and Ram escape from the Light Cycle arena into the system, Pac-Man can be seen behind Sark (with the corresponding sounds from the Pac-Man arcade game being heard in the background), while a "Hidden Mickey" outline (located at time 01:12:29 on the re-release Blu-ray) can be seen below the solar sailer during the protagonists' journey. The film set also included the arcade games Space Invaders (1978), Asteroids (1979) and Pac-Man (1980).
Tron was originally meant to be released during the Christmas season of 1982, but when chairman of the Disney board Card Walker found out the release date of Don Bluth's film The Secret of NIMH was in early July, he rushed it into a summer release to be able to compete with Bluth, and it ended up competing with films like E.T. the Extra-Terrestrial, Star Trek II: The Wrath of Khan, Blade Runner and Poltergeist.
Music
The soundtrack for Tron was written by pioneer electronic musician Wendy Carlos, who is best known for her album Switched-On Bach and for the soundtracks to many films, including the Stanley Kubrick-directed films A Clockwork Orange and The Shining. The music, which was the first collaboration between Carlos and her partner Annemarie Franklin, featured a mix of an analog Moog synthesizer and Crumar's GDS digital synthesizer (complex additive and phase modulation synthesis), along with non-electronic pieces performed by the London Philharmonic Orchestra (hired at the insistence of Disney, which was concerned that Carlos might not be able to complete her score on time). Two additional musical tracks ("1990's Theme" and "Only Solutions") were provided by the American band Journey after British band Supertramp pulled out of the project. An album featuring dialogue, music and sound effects from the film was also released on LP by Disneyland Records in 1982.
Reception and legacy
Box office
Tron was released on July 9, 1982, in 1,091 theaters in the United States and Canada grossing USD $4 million on its opening weekend. It went on to gross $33 million in the United States and Canada and $17 million overseas, for a worldwide gross of approximately $50 million, which was Disney's highest-grossing live action film for 5 years.
In addition, the film had $70 million in wholesale merchandise sales.
Despite the gross and merchandise sales, it was seen as a financial disappointment, and the studio wrote off some of its $17 million budget.
Critical response
The film was well received by critics. Roger Ebert of the Chicago Sun-Times gave the film four out of four stars and described it as "a dazzling movie from Disney in which computers have been used to make themselves romantic and glamorous. Here's a technological sound-and-light show that is sensational and brainy, stylish and fun". However, near the end of his review, he noted (in a positive tone), "This is an almost wholly technological movie. Although it's populated by actors who are engaging (Bridges, Cindy Morgan) or sinister (Warner), it's not really a movie about human nature. Like Star Wars or The Empire Strikes Back but much more so, this movie is a machine to dazzle and delight us". Ebert closed his first annual Overlooked Film Festival with a showing of Tron. Gene Siskel of the Chicago Tribune also awarded four out of four stars, calling it "a trip, and a terrifically entertaining one at that...It's a dazzler that opens up our minds to our new tools, all in a traditional film narrative." Each gave the film two thumbs up. Tron was also featured in Siskel and Ebert's video pick of the week in 1993.
InfoWorld's Deborah Wise was impressed, writing that "it's hard to believe the characters acted out the scenes on a darkened soundstage... We see characters throwing illuminated Frisbees, driving 'lightcycles' on a video-game grid, playing a dangerous version of jai alai and zapping numerous fluorescent tanks in arcade-game-type mazes. It's exciting, it's fun, and it's just what video-game fans and anyone with a spirit of adventure will love—despite plot weaknesses."
On the other hand, Variety disliked the film and said in its review, "Tron is loaded with visual delights but falls way short of the mark in story and viewer involvement. Screenwriter-director Steven Lisberger has adequately marshalled a huge force of technicians to deliver the dazzle, but even kids (and specifically computer game geeks) will have a difficult time getting hooked on the situations". In her review for The New York Times, Janet Maslin criticized the film's visual effects: "They're loud, bright and empty, and they're all this movie has to offer". The Washington Post'''s Gary Arnold wrote, "Fascinating as they are as discrete sequences, the computer-animated episodes don't build dramatically. They remain a miscellaneous form of abstract spectacle". In his review for The Globe and Mail, Jay Scott wrote, "It's got momentum and it's got marvels, but it's without heart; it's a visionary technological achievement without vision".
Colin Greenland reviewed the home video release of Tron for Imagine magazine, and stated that "three plucky young programmers descend into the micro-world to battle the Master Control Program with a sacred frisbee. Loses much of its excitement on the little screen."
On review aggregation website Rotten Tomatoes, the film holds a 71% rating based on the reviews of 66 critics, with an average rating of 6.4/10. The website's consensus states: "Though perhaps not as strong dramatically as it is technologically, TRON is an original and visually stunning piece of science fiction that represents a landmark work in the history of computer animation." Metacritic gave the film a score of 58 based on 13 reviews, indicating "mixed or average reviews".
In the year it was released, the Motion Picture Academy refused to nominate Tron for a special-effects award because, as director Steven Lisberger puts it, "The Academy thought we cheated by using computers". The film did, however, earn Oscar nominations in the categories of Best Costume Design and Best Sound (Michael Minkler, Bob Minkler, Lee Minkler, and James LaRue).
Cultural effect
In 1997, Ken Perlin of the Mathematical Applications Group, Inc. won an Academy Award for Technical Achievement for his invention of Perlin noise for Tron.
The film, considered groundbreaking, has inspired several individuals in numerous ways. John Lasseter, head of Pixar and Disney's animation group, described how the film helped him see the potential of computer-generated imagery in the production of animated films, stating "without Tron, there would be no Toy Story."
The two members of the French house music group Daft Punk, who scored the sequel, have held a joint, lifelong fascination with the film. Also, in Gorillaz' music video for the song "Feel Good Inc.", Russel, the fictional drummer of the band, can be seen wearing an Encom hat.Tron developed into a cult film and was ranked as 13th in a 2010 list of the top 20 cult films published by The Boston Globe.
The film heavily inspired the music video for Danish pop/dance group Infernal's 2006 hit single "From Paris to Berlin".
The Disco Biscuits, a Philadelphia-based jam band heavily influenced by electronic music, played an entire free-form set to correspond with Tron, which was projected onto a partially transparent curtain in the front of the stage for their December 31, 2015 New Year's Eve show from the PlayStation Theater in New York City's Times Square.
In 2008, the American Film Institute nominated this film for its Top 10 Science Fiction Films list.
Books
A novelization of Tron was released in 1982, written by American science fiction novelist Brian Daley. It included eight pages of color photographs from the movie. In the same year, Disney Senior Staff Publicist Michael Bonifer authored a book entitled The Art of Tron which covered aspects of the pre-production and post-production aspects of Tron. A nonfiction book about the making of the original film, The Making of Tron: How Tron Changed Visual Effects and Disney Forever, was written by William Kallay and published in 2011.
Television Tron made its television debut, as part of Disney Channel's first day of programming, on April 18, 1983, at 7:00PM (ET).
Home media Tron was originally released on VHS, Betamax, LaserDisc, and CED Videodisc in 1983. As with most video releases from the 1980s, the film was cropped to the 4:3 pan and scan format. The film saw multiple re-releases throughout the 1990s, most notably an "Archive Collection" LaserDisc box set, which featured the first release of the film in its original widescreen 2.20:1 format. By 1993, Tron had grossed in video rentals.Tron saw its first DVD release on December 12, 2000. This bare-bones release utilized the same non-anamorphic video transfer used in the Archive Collection LaserDisc set, and it did not include any of the LD's special features. On January 15, 2002, the film received a 20th Anniversary Collector's Edition release in the forms of a VHS and a special 2-Disc DVD set. This set featured a new THX mastered anamorphic video transfer and included all of the special features from the LD Archive Collection release, plus an all-new 90 minute "Making of Tron" documentary.
To tie in with the home video release of Tron: Legacy, the movie was finally re-released by Walt Disney Studios Home Entertainment on Special Edition DVD and for the first time on Blu-ray Disc on April 5, 2011, with the subtitle "The Original Classic" to distinguish it from its sequel. Tron was also featured in a 5-Disc Blu-ray Combo with the 3D copy of Tron: Legacy. The film was re-released on Blu-ray and DVD in the UK on June 27, 2011.
Sequels
Tron: Uprising (TV series)
Tron: Uprising takes place during the time period between the story lines of the two movies Tron (1982) and Tron: Legacy (2010). In the series, young program Beck becomes the leader of a revolution inside the computer world of The Grid, tasked with the mission of freeing his home and friends from the reign of Clu and his henchman, Gen. Tesler. To prepare for the challenge, Beck is trained by Tron – the greatest warrior The Grid has ever known – who mentors Beck as he grows beyond his youthful nature into a courageous and powerful leader. Destined to become the system's new protector, Beck adopts Tron's persona to battle the forces of evil.
Tron: Legacy
On January 12, 2005, Disney announced it had hired screenwriters Brian Klugman and Lee Sternthal to write a sequel to Tron. In 2008, director Joseph Kosinski negotiated to develop and direct TRON, described as "the next chapter" of the 1982 film and based on a preliminary teaser trailer shown at that year's San Diego Comic-Con, with Lisberger co-producing. Filming began in Vancouver, British Columbia in April 2009. During the 2009 Comic-Con, the title of the sequel was revealed to be changed to Tron: Legacy. The second trailer (also with the Tron: Legacy logo) was released in 3D with Alice In Wonderland. A third trailer premiered at Comic-Con 2010 on July 22. At Disney's D23 Expo on September 10–13, 2009, they also debuted teaser trailers for Tron: Legacy as well as having a light cycle and other props from the film there. The film was released on December 17, 2010, with Daft Punk composing the score.
See also
Tron (franchise)
Tron (hacker)
Demoscene
Isekai
Golden age of arcade video games
Automan - Early eighties TV series inspired by the film.
Superhuman Samurai Syber-Squad Digimon Adventure Code Lyoko Zixx ReBoot ReBoot: The Guardian Code''
References
External links
1982 films
1982 in computing
1980s science fiction action films
1980s science fiction adventure films
American films
American chase films
American science fiction action films
American science fiction adventure films
Cyberpunk films
English-language films
Films scored by Wendy Carlos
Films about artificial intelligence
Films about computing
Films about video games
Films about virtual reality
Films adapted into comics
Films adapted into television shows
Films directed by Steven Lisberger
Films produced by Ron W. Miller
Films set in 1982
Films shot in Los Angeles
Films with live action and animation
Religion in science fiction
Rotoscoped films
Tron films
Walt Disney Pictures films
Works about computer hacking
1982 directorial debut films
Films produced by Donald Kushner
|
20388902
|
https://en.wikipedia.org/wiki/VDPAU
|
VDPAU
|
Video Decode and Presentation API for Unix (VDPAU) is a royalty-free application programming interface (API) as well as its implementation as free and open-source library () distributed under the MIT License. VDPAU is also supported by Nvidia.
The VDPAU interface is to be implemented by device drivers, such as Nvidia GeForce driver, nouveau, amdgpu, to offer end-user software, such as VLC media player or GStreamer, a standardized access to available video decompression acceleration hardware in the form of application-specific integrated circuit (ASIC) blocks on graphics processing units (GPU), such as Nvidia's PureVideo or AMD's Unified Video Decoder and make use of it.
VDPAU is targeted at Unix-like operating systems (including Linux, FreeBSD, Solaris).
Functional range of the interface
VDPAU allows video programs to access the specialized video decoding ASIC on the GPU to offload portions of the video decoding process and video post-processing from the CPU to the GPU.
Currently, the portions capable of being offloaded by VDPAU onto the GPU are motion compensation (mo comp), inverse discrete cosine transform (iDCT), VLD (variable-length decoding) and deblocking for MPEG-1, MPEG-2, MPEG-4 ASP (MPEG-4 Part 2), H.264/MPEG-4 AVC and VC-1, WMV3/WMV9 encoded videos. Which specific codecs of these that can be offloaded to the GPU depends on the generation version of the GPU hardware.
History
VDPAU was originally designed by Nvidia for their PureVideo SIP block present on their GeForce 8 series and later GPUs.
On March 9, 2015, Nvidia released VDPAU version 1.0 which supports High Efficiency Video Coding (HEVC) decoding for the Main, Main 4:4:4, Main Still Picture, Main 10, and Main 12 profiles.
Device drivers and video controllers implementing VDPAU
VDPAU is implemented in X11 software device drivers, but relies on acceleration features in the hardware GPU.
All Nvidia graphic cards for which the driver implements VDPAU are listed in Nvidia PureVideo.
S3 Graphics added VDPAU to the Linux drivers of their Chrome 400 video cards. As of version 14.02.17 of its Linux device driver, VDPAU is available with the S3 Chrome 430 GT, S3 Chrome 440 GTX, S3 Chrome 530 GT and the S3 Chrome 540 GTX hardware.
ATI/AMD released an open source driver for Radeon HD 4000+ graphic cards featuring VDPAU acceleration.
Intel does not offer VDPAU drivers, they only support their VA-API. It is, however, possible to use Intel's VA-API drivers by way of libvdpau-va-gl.
Nvidia hopes other GPU designers will make their products compatible with the open source VDPAU library and provide drivers with VDPAU acceleration by mentioning example names of hardware specific drivers for Intel and ATI: libvdpau_intel.so and libvdpau_ati.so. Intel has stated they are considering VDPAU.
sunxi SoCs (Allwinner) have experimental VDPAU implementation.
Mesa as of v8.0 includes VDPAU for video cards that utilize Gallium3D.
Generic VDPAU driver
As of late 2013, there is an independently developed back-end driver that in turn uses OpenGL (for drawing and scaling), and VA-API if available (for decoding). It has been reported to work on some Intel graphics and Adobe Flash Player.
The accelerated scaling with just OpenGL functionality is needed mostly because of Flash player, which uses un-accelerated scaling if VDPAU is unavailable. Almost all other video software that runs on Linux or FreeBSD supports Xv. It's essential for full-screen video on slower computers without native VDPAU support.
The VDPAU to VA-API translation for HW decoding is useful with recent Intel graphics hardware, as some software supports HW decoding through VDPAU but not VA-API.
Software that supports VDPAU
Avidemux as of version 2.6
Boxee
FFmpeg
GStreamer
Fluendo
MPlayer
MythTV
Kodi (formerly XBMC)
Xine
MLT
Adobe Flash 10.2 Stage Video and later versions
VLC media player 2.1
mpv
VDPAU can also be used as a backend for VA-API and OpenMAX IL, which themselves cover a subset of the VDPAU capabilities; so any software that uses the VA-API or OpenMAX IL is also partly capable of using VDPAU (e.g., VLC media player).
Nvidia VDPAU Feature Sets
Nvidia VDPAU Feature Sets are different hardware generations of GPU's supporting different levels of (Nvidia PureVideo) hardware decoding capabilities. For feature sets A, B and C, the maximum video width and height are 2048 pixels, minimum width and height 48 pixels, and all codecs are currently limited to a maximum of 8192 macroblocks (8190 for VC-1/WMV9).
Partial acceleration means that VLD (bitstream) decoding is performed on the CPU, with the GPU only performing IDCT, motion compensation and deblocking. Complete acceleration means that the GPU performs all of VLD, IDCT, motion compensation and deblocking.
Feature Set A
Supports complete acceleration for H.264 and partial acceleration for MPEG-1, MPEG-2, VC-1/WMV9
Feature Set B
Supports complete acceleration for MPEG-1, MPEG-2, VC-1/WMV9 and H.264.
Note that all Feature Set B hardware cannot decode H.264 for the following widths: 769-784, 849-864, 929-944, 1009-1024, 1793-1808, 1873-1888, 1953-1968, 2033-2048 pixels.
Feature Set C
Supports complete acceleration for MPEG-1, MPEG-2, MPEG-4 Part 2 (a.k.a. MPEG-4 ASP), VC-1/WMV9 and H.264.
Global motion compensation and Data Partitioning are not supported for MPEG-4 Part 2.
Feature Set D
Similar to feature set C but added support for decoding H.264 with a resolution of up to 4032 × 4080 and MPEG-1/MPEG-2 with a resolution of up to 4032 × 4048 pixels.
Feature Set E
Similar to feature set D but added support for decoding H.264 with a resolution of up to 4096 × 4096 and MPEG-1/MPEG-2 with a resolution of up to 4080 × 4080 pixels. GPUs with VDPAU feature set E support an enhanced error concealment mode which provides more robust error handling when decoding corrupted video streams.
Feature Set F
Introduced dedicated HEVC Main (8-bit) and Main 10 (10-bit) video decoding up to 4096 × 2304 pixels resolution.
Feature Set G
Hardware support for HEVC Main 12 (12-bit) video decoding but VDPAU does not currently support this profile.
Feature Set H
Feature Set H are capable of hardware-accelerated decoding of 8192x8192 (8k resolution) H.265/HEVC video streams.
libvdpau standalone VDPAU library
The libvdpau standalone VDPAU library is distributed by Nvidia independently of their proprietary Linux graphics driver in an effort to help the adoption of VDPAU by those outside of Nvidia. This open source library package contains a wrapper library and a debugging library allowing other manufacturers to implement VDPAU in their device drivers.
See also
PureVideo
Unified Video Decoder
DirectX Video Acceleration (DXVA) – the VDPAU equivalent API for Microsoft Windows operating-system.
Video Acceleration API (VA API) – an alternative video acceleration API for Linux/UNIX operating-system.
X-Video Bitstream Acceleration (XvBA) – an alternative video acceleration API for Linux/UNIX operating-system.
X-Video Motion Compensation (XvMC) API – alternative and oldest video acceleration API for Linux/UNIX operating-system.
Distributed Codec Engine (libcde) is a Texas Instruments API for the video codec engine in OMAP based embedded systems
Video Decode Acceleration Framework is Apple Inc.'s API for hardware-accelerated decoding of H.264 on Mac OS X
VideoToolbox is an API from Apple Inc. for hardware-accelerated decoding on Apple TV and Mac OS X.
OpenMAX IL (Open Media Acceleration Integration Layer) - a royalty-free cross-platform media abstraction API from the Khronos Group
References
External links
VDPAU (Video Decode and Presentation API for Unix) by Nvidia
NVIDIA VDPAU Benchmarks
A NVIDIA VDPAU Back-End For Intel's VA-API
VDPAU usage by MythTV
Application programming interfaces
Freedesktop.org
Nvidia software
Video acceleration
Video acceleration APIs available on Linux
Video libraries
Video processing
X Window extensions
|
15697260
|
https://en.wikipedia.org/wiki/Yuriy%20Polyakov
|
Yuriy Polyakov
|
Yuriy Sergeyevich Polyakov (Russian: Юрий Сергеевич Поляков, born September 3, 1980 in Moscow, Soviet Union) is a Russian-American scientist at Duality Technologies. He is best known for his work in cryptography (homomorphic encryption, lattice-based cryptography), chemical engineering (theory of filtration processes, mathematical modeling of chemical reactors), and physics (stochastic time series analysis).
Biography
Polyakov wrote his first scientific paper when he was a freshman student at the Moscow State University of Environmental Engineering. In April 1998, he moved to the United States. Polyakov received a Bachelor of Science in computer information systems summa cum laude from Excelsior College in 2002 and Master of Science in computer science from New Jersey Institute of Technology in 2003, where he carried out scientific research in computer science and computational mathematics. In 2004, he defended his PhD dissertation in Chemical Engineering at the Moscow State University of Environmental Engineering. In 2006, Polyakov started scientific cooperation with Serge Timashev in the analysis of stochastic time series (Flicker-Noise Spectroscopy). In 2007, he defended the DSc dissertation in Physics and Mathematics at the Karpov Institute of Physical Chemistry, Moscow, Russia.
Scientific achievements
Main results in chemical engineering include the development of a novel filtration process – depth membrane filtration, systematic study of nonuniform particle deposition on the inner and outer surfaces of ultrafiltration and microfiltration membranes, and mathematical modeling of coupled heat and mass transfer with chemical conversions. Main results in computer science and computational mathematics include the development of an approximate method for nonlinear differential and integrodifferential equations and development of a feedback algorithm for switch location with application to network design. Serge Timashev and Yuriy Polyakov developed a phenomenological theory for the analysis of natural time and space series with stochastically varying components, Flicker-Noise Spectroscopy, that may be used for problems such as the diagnosis of health conditions and earthquake prediction. Most significant results in cryptography include the development of efficient algorithms for homomorphic encryption and application of homomorphic encryption for privacy-preserving genomic analysis.
Software
He is a co-author and project lead for the PALISADE open-source lattice cryptography software library. He is also a co-author of the Flicker-Noise Spectroscopy toolkit for time and space series analysis.
Honors and awards
He received Moscow Mayor’s Young Scientist Award in 2005. Listed in multiple biographical reference books.
References
External links
Homepage of Yuriy Polyakov
1980 births
Living people
Moscow State University alumni
American computer scientists
Russian computer scientists
American chemical engineers
Russian inventors
Russian emigrants to the United States
21st-century American inventors
|
68330637
|
https://en.wikipedia.org/wiki/Rupal%20Patel%20%28scientist%29
|
Rupal Patel (scientist)
|
Rupal Patel is a professor at Northeastern University Bouvé College of Health Sciences, USA in the area of speech science, audiology and information science. She is the director of the university's Communication Analysis and Design Laboratory.
Education
Patel gained her B. Sc. degree in neuropsychology from University of Calgary, graduating in 1993. She undertook further study at University of Toronto and gained her doctorate in the subject of speech language pathology in 2000.
Career
In 2003 she was appointed as an assistant professor at Northeastern University, and was promoted to professor in 2014. Her post is jointly between the university's Bouvé College of Health Sciences and Khoury College of Computer Sciences, reflecting her research. This has concentrated on the acquisition and impairment of speech, specifically prosody, in healthy speakers and those with neuromotor disorders. This has led to the very practical design of speech enhancement and learning technologies to generate naturalistic synthetic voices for those with speech disorders by making use of their residual speaking ability.
Since the mid 2000s she has led development of computer systems that can generate a naturalistic synthetic voice. This resulted from her work on speech analysis. Those with speech disorders can often produce a sound, but cannot shape it into speech with their mouths. Her research group developed a computer system that allowed speech to be different for each individual based on their natural sound. The pitch, loudness, breathiness and clarity of normal speech was generated by applying the computer system to a recording of a sample of the sound the individual was able to produce. By 2013 she could produce synthetic voices in the laboratory.
She founded the spin-out company VOCALiD in 2014 and has continued development of the machine learning and speech blending used for generating the synthetic voices. By the early 2020s the systems were able to reproduce existing voices as well as synthesise new ones. One use was for voice actors to be able to have an exact copy, or clone, of their voice to use in their work.
Publications
Patel is the author or co-author of over 60 scientific publications or book chapters. In 2013 she was invited to present a TED talk about Synthetic voices, as unique as fingerprints.
References
Year of birth missing (living people)
Living people
University of Calgary alumni
University of Toronto alumni
Northeastern University faculty
Speech production researchers
Speech and language pathologists
Applied linguists
Phonologists
Canadian women in business
|
7915695
|
https://en.wikipedia.org/wiki/Raspberry%20Software
|
Raspberry Software
|
Raspberry Software is a software company based near Ipswich in Suffolk, England which in the past offered support for legacy applications and currently develops software for mobile devices. The company has been quite successful, winning the Anglian Business Award 2005 for Technology, after just a year in business.
The company was formed around the time of the Business Objects acquisition of Crystal Decisions in 2004 to take over support of the Holos product line which has now ceased. The directors of Raspberry Software are all former employees of Crystal Decisions.
Raspberry Software currently collaborate with iansyst Ltd on the joint venture Mobispeech, developing a piece of mobile learning software called CapturaTalk.
References
Pocket PC software
Software companies of the United Kingdom
Computer companies of the United Kingdom
Companies based in Suffolk
|
1592267
|
https://en.wikipedia.org/wiki/VectorLinux
|
VectorLinux
|
VectorLinux, abbreviated VL, is a Linux distribution for the x86 platform based on the Slackware Linux distribution, originally developed by Canadian developers Robert S. Lange and Darell Stavem. Since version 7 the Standard Edition is also available for the x86-64 platform, known as VLocity64 7.
Editions
Four editions of VectorLinux are maintained: SOHO, Standard, Light and Live.
SOHO Edition (Discontinued after version 7.0)
The SOHO (Small Office/Home Office) Edition is designed for modern computers and is based on the KDE desktop environment. Applications include LibreOffice, Java, the GIMP, Xsane, CUPS, Xara Xtreme, financial applications, and others. A deluxe edition of SOHO, which contains additional applications, is also available.
Standard Edition
Standard Edition is a freely downloadable distribution based on Xfce and specifically designed for use on older computers with slower processors and less RAM. The Deluxe Standard Version contains the standard edition plus numerous additional applications specific to that VL version. The CD includes many extra applications which you can add to build the system which best fits your requirements. Additional included applications are Libreoffice and GIMP among many others.
Light Edition
The Light Edition is designed for older computers with limited resources. Version 7.2 is based upon the IceWM window manager. It is supplied with Seamonkey as the browser/email client/html editor and includes some of the applications found in the Standard Edition. Additional applications are available through the package manager or by compiling user applications. Light Edition is usable on computers with 256 MB of RAM.
Live Edition
The Live Editions are bootable CDROMs which contain the VectorLinux operating system on the CD. This enables the user to test a distribution on a system without the need of re-partitioning and installing to the hard drive. It is also possible to install VectorLinux from the Live Edition CD. VectorLinux presently has two Live Editions: Standard and SOHO. The latest edition is a preview of the Deluxe Edition.
The SuperGamer distribution is based on the VectorLinux code base.
Version 7.1 does not have a live edition.
Version 7.2 Standard (XFCE) has a live edition. Version 7.2 Light (IceWM) does not have a live edition.
Features
One prominent feature that all VL versions have in common is the standard installation of system administration applications: VasmCC handles system configuration, while slapt-get with its GUI front-end Gslapt manages software installation and removal.
VasmCC stands for 'Vector Administrative and Services Menu Control Center', and it configures everything from disk partitions to X.Org Server. In addition to offering a GUI interface, a text mode parallel to the GUI VasmCC is available. VasmCC has been available since Vector 2.0 was released and has been upgraded continually over the years, with the addition of GUI functionality in SOHO 3.2. Configuration tools like netconfig and alsaconf are also available in Vector.
Gslapt is a GUI front-end to the slapt-get software management tool. Combined with lzma-compression and dependency tracking, the inclusion of Gslapt offers VectorLinux users the ability to quickly install and remove software while avoiding so-called 'dependency hell.' File compression via lzma allows low and high bandwidth users alike to minimize download times.
Package management
Two graphical frontends have been written for slapt-get, the backwards-compatible dependency-tracking extension to Slackware's package tools used by VectorLinux. VL-APT was the first, written originally by the Vector developers to serve the need for GUI package installation and management, while gslapt was written by the original developers of slapt-get for the same purpose. Until recently, either option has been viable; however, recent changes in the slapt-get packaging format have made VL-APT obsolete, and the developers of Vector have consequently promoted gslapt as the preferred method of graphical package management.
VL-APT (now deprecated) and gslapt are configured by default to use Vector's repository, which offers the majority of most users' needs. However, alternative sources, including mirrors of the official archives around the world, can be added through their respective configuration menus, or directly, through the textual slapt-getrc configuration. There is criticism, at least partially justified, regarding the size of the Vector package selection. These deficiencies have stimulated significant volunteer and developer response, and many desired software packages have now entered the Vector repository.
In fact, it is not uncommon to use the information in /etc/slackware-version in Vector to download and install Slackware packages from LinuxPackages(dot)net, a common Slackware repository, GnomeSlackBuild, etc.
Vector Linux uses .tlz packages (LZMA-packed), though .tbz and .tgz are supported too. Pkgtools are taken from Tukaani Linux project and are non-standard - there are improvements over standard pkgtools in speed of operation, but have not been updated for a while.
See also
List of Linux distributions
Comparison of Linux distributions
References
External links
VectorLinux 7: Fast, Flexible, and Supported - OS News
Taking A Good Long Look At Vector Linux 5.9 Standard - O'Reilly Linux DevCenter Blog
Vector Linux 5.9: Light, fast Slackware-based distro | tuxmachines.org
Vector Linux SOHO 5.9 Deluxe -- Not Just For The Office - O'Reilly News
Slackware
Linux distributions without systemd
Linux distributions
|
14623908
|
https://en.wikipedia.org/wiki/4587%20Rees
|
4587 Rees
|
4587 Rees, provisional designation , is a Mars-crosser and former near-Earth object on an eccentric orbit from the asteroid belt, approximately in diameter. It was discovered during the second Palomar–Leiden Trojan survey on 30 September 1973, by Dutch astronomer couple Ingrid and Cornelis van Houten at Leiden, and Tom Gehrels at the Palomar Observatory in California. The assumed S-type asteroid has a rotation period of 7.9 hours and is likely elongated in shape. It was named after British astrophysicist Martin Rees.
Orbit and classification
Rees is a Mars-crossing asteroid, a dynamically unstable group between the main belt and the near-Earth populations, crossing the orbit of Mars at 1.66 AU. It orbits the Sun at a distance of 1.31–4.01 AU once every 4 years and 4 months (1,583 days; semi-major axis of 2.66 AU). Its orbit has a high eccentricity of 0.51 and an inclination of 25° with respect to the ecliptic. The body's observation arc begins with its first observation as at Palomar in September 1960, or 13 years prior to its official discovery observation.
Former near-Earth object
Before 2014, Rees has been a near-Earth object of the Amor group, as its perihelion was slightly less than 1.3 AU due to the body's osculating orbit.
Close approaches
In July 2072, Rees will pass from Mars, the closest since it passed from the Red Planet on 28 January 1843. The asteroid will also pass from the second largest asteroid, 4 Vesta, on 30 January 2121.
Palomar–Leiden Trojan survey
The survey designation "T-2" stands for the second Palomar–Leiden Trojan survey, named after the fruitful collaboration of the Palomar and Leiden Observatory in the 1960s and 1970s. Gehrels used Palomar's Samuel Oschin telescope (also known as the 48-inch Schmidt Telescope), and shipped the photographic plates to Ingrid and Cornelis van Houten at Leiden Observatory where astrometry was carried out. The trio are credited with the discovery of several thousand asteroid discoveries.
Naming
This minor planet was named after Martin Rees (born 1942), a much awarded English cosmologist and astrophysicist who has studied the galactic evolution. Rees became Astronomer Royal and President of the Royal Society in 1995 and 2005, respectively. He is also the director of the Institute of Astronomy and a professor of astronomy at the University of Cambridge. The asteroid's name was proposed by Jan Oort, and the was published by the Minor Planet Center on 28 April 1991 ().
Physical characteristics
Rees is an assumed, stony S-type asteroid. Other sources published by EARN assume an Sr-subtype that transitions from the S-type to the rare R-type asteroids.
Rotation period
In May 2016, a rotational lightcurve of Rees was obtained from photometric observations by Robert Stephens at the Center for Solar System Studies in California. Lightcurve analysis gave a well-defined rotation period of hours with a brightness variation of 0.55 magnitude (), indicative of an elongated, non-spheroidal shape. The result confirms previous observations by Czech astronomer Petr Pravec (7.7886 h) and by astronomers at the Palomar Transient Factory (7.790 h) from April 2003 and October 2012, respectively ().
Diameter and albedo
The Collaborative Asteroid Lightcurve Link assumes a standard albedo for an S-type asteroid of 0.20 and calculates a diameter of 2.03 kilometers based on an absolute magnitude of 15.87.
Notes
References
External links
Asteroid 4587 Rees, Small Bodies Data Ferret
Dictionary of Minor Planet Names, Google books
Discovery Circumstances: Numbered Minor Planets (1)-(5000) – Minor Planet Center
004587
004587
Discoveries by Cornelis Johannes van Houten
Discoveries by Ingrid van Houten-Groeneveld
Discoveries by Tom Gehrels
3239
Minor planets named for people
Named minor planets
6378
19730930
|
22243707
|
https://en.wikipedia.org/wiki/Resource%20Hacker
|
Resource Hacker
|
Resource Hacker (also known as ResHacker or ResHack) is a free resource extraction utility and resource compiler for Windows developed by Angus Johnson. It can be used to add, modify or replace most resources within Windows binaries including strings, images, dialogs, menus, VersionInfo and Manifest resources. It can also create resource files (*.res) from scratch and the latest release provides a number of text templates to facilitate this.
In 2002 the author stated that he had "no plans to continue development". However, since then he has released more updates.
In 2011 the author stated that he would neither release nor sell the source code.
On November 19, 2009, version 3.5.2 was released as a beta. This build added support for 64-bit executables and for displaying PNG images.
On September 16, 2011, version 3.6 was released with support for PNG icons.
On May 2, 2015, version 4.0 was released with improved support for 32-bit image files, resources can be started from scratch (with a number of resource templates), and numerous cosmetic improvements.
On August 17, 2015, version 4.2.5 was released. This build added support for changing a text resource format: Unicode, UTF-8, ANSI.
On October 14, 2016, version 4.5.28 was released.
On March 28, 2018, version 4.6.32 was released bringing minor cosmetic updates.
On April 13, 2018, version 4.7.34 was released.
On June 29, 2018, version 5.1.1 was updated.
On January 3, 2019, version 5.1.7 was published.
On November 20, 2020, version 5.1.8 was published, fixing an issues with PNG images not displaying, adding scrolling & zooming of image resources, and fixing a bug with 100MB+ binary resources crashing the hex editor.
References
External links
Resource Hacker homepage
Programming tools for Windows
|
20036999
|
https://en.wikipedia.org/wiki/Saint%20Michael%20College%20of%20Caraga
|
Saint Michael College of Caraga
|
Saint Michael College of Caraga also referred to by its acronym SMCC is a private, Roman Catholic, elementary, secondary, and college school run by the Roman Catholic Diocese of Butuan in Nasipit, Agusan del Norte in the Philippines. It was established in 1948 by the Missionarii Sacratissimi Cordis (MSC) fathers. Its main campus is located at Atupan Street, Barangay 4 Poblacion, Nasipit, Agusan del Norte. And the second campus that houses the Elementary Department, Senior High School, and Cultural and Arts Office is located in Barangay Triangulo, Nasipit, Agusan del Norte.
History
In 1948, Nasipit was still a part of the parish of Buenavista, whose parish priest was late Fr. Martin Westeinde, a Dutch MSC. As the town progressed, population also increased and business gained momentum with the start of the logging industry of Nasipit, Lumber Company (NALCO). Fr Martin and his co-adjutor Fr. Atanacio de Castro saw the need of putting up a secondary school. Fr. De Castro was placed in charge of the school.
It started its operation on July 1, 1948, with Rev. Fr. Francisco Van Dyke as the first director. He was succeeded by Rev. Fr. Enrique Van Ma-anen, Rev. Fr. Vicente Portillo, Rev. Fr. Mateo Van Santvoord, and Rev. Fr. Anthony Krol in the order of succession. Rev. Fr. Krol was the last Dutch priest who served as the school director.
The school site is beside the rectory with an area of . Fr. Gerard Cruijen, one of the subsequent directors, converted the nipa- wooden structure into a two-storey building with 16 classrooms.
When the Filipinization Law was implemented in 1975 a layman, Mr Gregorio Orais, became the first layman school director until he retired in 1977. He was followed by Mr. Antonio L. Suarez, the first layman director/principal of the school. Faro Gatchalian followed until 1985, then Mrs. Necita Lim took the helm of directorship until 1991 while acting also as the principal of St. James High School of Buenavista, an adjacent town of Nasipit. In 1991, Fr. Achilles Ayaton became the school director until 1993. In 1994, Msgr. Cesar L. Gatela took over the school's directorship until 1999, when he succumbed to a cardiac arrest. In his term, he bought 19 computers integrating the Computer technology subject in all levels of the High School Department.
The Teatro, Sayaw, at Awit Production(TESAW Production), Center of the Michaelinian Performing Arts was established on June 1, 1997, with Dr. Dennis P. Mausisa as the founder and artistic director.
In 1999, Msgr. Juan de Dios Pueblos, the Bishop of Butuan appointed Msgr. Bienvinido A. Betaizar, PC as the school director who was later promoted as School President until at present.
June 2000, Msgr. Betaizar opened the Grade School department with Mrs. Minda R. Cocon as the first Principal offering Grades I-IV and the College Department with Technical Courses offering with Mr. Antonio L. Suarez as the college administrator until his death in February 2002.
June 2001, Baccalaureate Programs were opened which include Bachelor of Elementary Education, Bachelor of Secondary Education major in English, Bachelor of Science in Business Administration major in Financial Management and Bachelor of Arts in English Language. The Planning and Development Center was established with Dr. Dennis P. Mausisa as the Head of Office.
February 16, 2001, the name Saint Michael's Institute was replaced with Saint Michael College of Caraga as suggested by Mrs. Vanica P. del Rosario during the 1st SMI General Assembly. The name was duly approved by the Securities and Exchange Commission.
In 2002, within three years of operation the College Department was named as one of the Top Three Performing Schools in the Caraga for the Kabalikat Award 2002 of TESDA. Additional courses were opened like 2-Year Computer-Based Accounting Technology, 2 Year Tourism Technology and 2 Year Computer-Technician. Speech subject was introduced in all departments complete with the state of the art speech facilities.
2003, the Accounting Department was established.
June 10, 2005, a four-storey concrete building was inaugurated. The Elementary Department was transferred from the Montinola Building to the main campus where the new building is situated. The new building housed the different offices, Preschool, High School, Mini Hotel, AVR and Faculty Rooms. Bachelor of Science in Computer Science was opened. Mini School bus was acquired.
2006, SMCC Angel Festival was introduced by Dr. Mausisa to the Michaelinian community.
2007, SMCC launches the SMCC Website www.smccnasipit.edu.ph.
2008, College Department awarded by TESDA Region XIII as MODEL TVET Provider School in Agusan del Norte-Butuan City. The SMCC school logo was changed.
2009, Bureau of Immigration granted the school the accreditation permit to accept Foreign Students from Preschool to College. Commission on Higher Education granted the permit to operate Bachelor of Science in Hotel and Restaurant Management.
2010, Bachelor of Science in Information Technology and One Year Seafarer were opened.
2012, additional programs were opened the Bachelor of Science in Criminology, Bachelor of Science in Tourism Management, additional majors in Secondary Education in Math and Science, and the Housekeeping NCII. TESDA bundled programs were opened the Two year Hotel and Restaurant Management with qualifications in Food and Beverage Services NC II and Housekeeping NCII, Two year Information Technology with qualifications in Computer Hardware Servicing NCII and Computer Programming NC IV and Two year Computer Electronics Servicing NC II. New School's Vision and Mission Statement(DBES) as agreed by the DBES Board.
At present, SMCC is one of the Catholic schools in Agusan del Norte and Caraga region.
Departments
Elementary Department
Preschool, Grades 1-6
Junior High School Department
Grade 7, Grade 8, Grade 9, Grade 10
Senior High School Department
Grade 11 and 12
Strands: General Academic Strand (GAS), Humanities and Social Sciences (HUMSS), Science and Technology, Engineering, and Mathematics (STEM), Accounting, Business, and Management (ABM), Maritime, Home Economics and Information Technology
Colleges
College of Tourism Hospitality Business and Management
College of Teacher Education
College of Arts and Sciences
College of Computing and Information Sciences
College of Criminal Justice Education
Technical Department
School's Radio Station
The school FM station is DXSM 89.5 Kabayaning Michaelinian FM. It was first heard on the 1st of December 2017. The radio station now is the arm of the school to promote Catholic Education and teachings.
Official publication
The Saint Michael College of Caraga has its own publication called the Michaelinian Mirror, which is the only publication in the school. It publishes the latest news and events inside the school.
External links
SMCC Official Website
Catholic universities and colleges in the Philippines
Universities and colleges in Agusan del Norte
|
31585744
|
https://en.wikipedia.org/wiki/List%20of%20research%20groups%20at%20the%20University%20of%20Massachusetts%20Amherst
|
List of research groups at the University of Massachusetts Amherst
|
The following is a list of research labs and centers located at the University of Massachusetts Amherst:
Antennas and Propagation Laboratory (Electrical and Computer Engineering)
Apiary Laboratory (Entomology, Microbiology)
Architecture and Real Time Laboratory (Electrical and Computer Systems Engineering)
Autonomous Learning Laboratory (Computer Science)
Center for Advanced Sensor and Communication Antennas (CASCA) (Electrical and Computer Engineering)
Center for Applied Mathematics and Mathematical Computation (Mathematics)
Center for Economic Development
Center for Education Policy
Center for Energy Efficiency and Renewable Energy (Mechanical and Industrial Engineering)
Center for Geometry, Analysis, Numerics, and Graphics (Mathematics)
Center for Intelligent Information Retrieval (Computer Science)
Center for Public Policy and Administration
Center for e-design
Complex Systems Modeling and Control Laboratory (Electrical and Computer Systems Engineering)
Emerging Electronics Laboratory (Electrical and Computer Systems Engineering)
Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere (Electrical and Computer Systems Engineering)
Feedback Control Systems Lab (Electrical and Computer Systems Engineering)
Information Systems Laboratory (Electrical and Computer Systems Engineering)
Knowledge Discovery Laboratory (Computer Science)
Labor Relations and Research Center
Laboratory For Perceptual Robotics (Computer Science)
Laboratory for Millimeter Wavelength Devices and Applications (Electrical and Computer Systems Engineering)
Massachusetts Center for Renewable Energy Science and Technology
Microwave Remote Sensing Laboratory (MIRSL)(Electrical and Computer Systems Engineering)
Multimedia Networks Laboratory (Electrical and Computer Systems Engineering)
Multimedia Networks and Internet Laboratory (Electrical and Computer Systems Engineering)
Nanoscale Computing Fabrics Lab (Electrical and Computer Systems Engineering)
National Center for Digital Governance
Network Systems Laboratory (Electrical and Computer Systems Engineering)
Political Economy Research Institute
Reconfigurable Computing Laboratory (Electrical and Computer Systems Engineering)
Scientific Reasoning Research Institute
Soil Mechanics Laboratories (located at Marston Hall and ELAB-II)
Terahertz Laboratory (Electrical and Computer Systems Engineering)
The Environmental Institute
VLSI CAD Laboratory (Electrical and Computer Systems Engineering)
VLSI Circuits and Systems Laboratory (Electrical and Computer Systems Engineering)
Virtual Center for Supernetworks
Wind Energy Center (formerly the Renewable Energy Research Laboratory) (Mechanical and Industrial Engineering)
Wireless Systems Laboratory (Electrical and Computer Systems Engineering)
Yield and Reliability of VLSI Circuits (Electrical and Computer Systems Engineering)
University of Massachusetts Amherst
|
50507566
|
https://en.wikipedia.org/wiki/Josiah%20Zayner
|
Josiah Zayner
|
Josiah Zayner (born February 8, 1981) is a biohacker, artist, and scientist best known for his self-experimentation and his work making hands-on genetic engineering accessible to a lay audience, including CRISPR.
Education
At the age of 19, Zayner worked at Motorola as a programmer. He has a BA in plant biology from Southern Illinois University and a Ph.D in biophysics (2013) from the University of Chicago. Before receiving his Ph.D he earned an MSc in cell and molecular biology from Appalachian State University.
Career
He spent two years as a researcher at the Mountain View, California's NASA Ames Space Synthetic Biology Research Center, where he worked on Martian colony habitat design. While at the agency, Zayner also analyzed speech patterns in online chat, Twitter, and books, and found that language on Twitter and online chat is closer to how people talk than to how they write. Zayner found NASA's scientific work less innovative than he expected, and upon leaving in January 2016, he launched a crowdfunding campaign to provide CRISPR kits to let the general public experiment with editing bacterial DNA. He also continued his grad school business, The ODIN, which sells kits to let the general public experiment at home. The company's main adviser is George Church, professor of genetics at Harvard Medical School and director of PersonalGenomes.org. As of May 2016, The ODIN had four employees and operated out of Zayner's garage.
He refers to himself as a biohacker and believes in the importance of letting the general public participate in scientific experimentation, rather than leaving it segregated to labs. Zayner found the academic biohacking community to be exclusive and hierarchical, particularly with respect to the types of people who decide what is "safe". He hopes that his projects can let even more people experiment in their homes. Other scientists have responded that biohacking is inherently exclusive for its dependence on leisure time and money, and that deviance from general safety rules could lead to even harsher regulations for all. Zayner's public CRISPR kit campaign coincided with wider public scrutiny over genetic modification. Zayner maintained that these fears were based on misunderstandings of the product, as genetic experiments on yeast and bacteria cannot produce a viral epidemic. In April 2015, Zayner ran a hoax on Craigslist to raise awareness about the future potential of forgery in forensic genetic testing. Zayner later used CRISPR to attempt to edit his own genes and is the first known person to do so. His CRISPR kit was displayed at the Cooper Hewitt's 2019 Nature Design Triennial.
In February 2016, Zayner attempted a full body microbiome transplant on himself, including a fecal transplant, to experiment with microbiome engineering and to see if he could treat his gastrointestinal and other health issues. The microbiome from the donor's feces successfully transplanted in Zayner's gut according to DNA sequencing done on samples. This experiment was documented by filmmakers Kate McLean and Mario Furloni and turned into the short documentary film Gut Hack.
In December 2016, Zayner created a fluorescent beer by engineering yeast to contain the green fluorescent protein from jellyfish. Zayner's company, The ODIN, released kits to allow people to create their own engineered fluorescent yeast, which was met with some controversy as the FDA declared that the green fluorescent protein can be seen as a color additive. Zayner views the kit as a way that an individual can use genetic engineering to create new things in their everyday life.
In 2019, Zayner launched a curriculum (Bioengineering 101 ) featuring a series of educational videos directed at those studying biotechnology for the first time. Zayner was featured in Unnatural Selection (stylized as "unnatural selection"), a TV documentary series that presents an overview of genetic engineering, which was released on Netflix in October 2019.
In 2020, Zayner, David Ishee and Dariia Dantseva, who form a group of Biohackers named The Central Dogma Collective (CDC) tested a DNA based coronavirus vaccine on themselves and live-streamed the whole process and made all protocols and data open source and freely available to the public. The DNA vaccine expressed the SARS-CoV2 spike protein once inside human cells to elicit an immune response. They measured IgG and IgM spike protein antibody response and antibody neutralization of Spike protein RBD domain binding to the ACE2 receptor. All three individuals had an immune response and neutralization response to the vaccine.
Art
In the arts, Zayner's work has been featured in the San Francisco Museum of Modern Art, Cooper Hewitt, Smithsonian Design Museum, Philadelphia Museum of Art and others.
While at the University of Chicago Zayner created a musical instrument, the Chromochord, which stimulates light-, oxygen-, and voltage-sensing proteins and translates their reactions into music. Together with composer Francisco Castillo Trigueros he received a grant from the university to compose music and create audio visual art installations using the work. Zayner, gave a musical performance using the Chromochord at NY MoMA PS1.
Zayner was a resident artist at Stochastic Labs in Berkeley, California where he worked with the new media artist Lynn Hershman Leeson to create an art installation about genetic engineering, which included a booth designed by Zayner that attempted to reverse engineer a person's DNA from their picture. The installation was shown at ZKM and Deichtorhallen.
Medical investigation
The California Department of Consumer Affairs informed Zayner in May 2019 of their investigation into a complaint against him for practicing medicine without a license. By September of the same year Zayner received notice that the investigation had been concluded, and “no further action is anticipated.”
Facebook and YouTube removal
Facebook removed his company's products and YouTube removed his livestreams. YouTube removed a Reason (magazine) video Biohackers Are on a Secret Hunt for the Coronavirus Vaccine claiming that it is "medical misinformation".
References
Further reading
Living people
1980s births
University of Chicago alumni
NASA people
DIY culture
American biophysicists
Southern Illinois University alumni
Appalachian State University alumni
|
16788888
|
https://en.wikipedia.org/wiki/Magento
|
Magento
|
Magento is an open-source e-commerce platform written in PHP. It uses multiple other PHP frameworks such as Laminas and Symfony. Magento source code is distributed under Open Software License (OSL) v3.0. Magento was acquired by Adobe Inc in May 2018 for $1.68 billion.
The software was originally developed by Varien Inc., a US private company headquartered in Culver City, California, with assistance from volunteers and open source software contributors.
More than 100,000 online stores have been created on this platform. The platform code has been downloaded more than 2.5 million times, and $155 billion worth of goods have been sold through Magento-based systems in 2019. Two years ago, Magento accounted for about 30% of the total market share.
Varien published the first general-availability release of the software on March 31, 2008. Roy Rubin, the former CEO of Varien, later sold a share of the company to eBay, which eventually completely acquired and then sold the company to Permira; Permira later sold it to Adobe.
On November 17, 2015, Magento 2.0 was released. Among the features changed in V2 were:
significant performance and security improvements, especially when paired with PHP version 7+
integrated server-side Apache Varnish caching with minimal tuning
reduced database table locking issues
enterprise-grade database scalability
rich snippets for structured data
new file structure with easier customization
CSS pre-processing using LESS & CSS URL resolver
modular code base structure, offering fine-grain customization
improved coding patterns
built-in client-side JavaScript minimization and optimization
improved static content browser caching
Magento employs the MySQL or MariaDB relational database management system, the PHP programming language, and elements of the Zend Framework. It applies the conventions of object-oriented programming and model–view–controller architecture. Magento also uses the entity–attribute–value model to store data and as of version 2.4 it requires Elasticsearch for its catalog search capability. On top of that, Magento 2 introduced the Model-View-ViewModel pattern to its front-end code using the JavaScript library Knockout.js.
History
Magento officially started development in early 2007. Seven months later, on August 31, 2007, the first public beta version was released.
Varien, the company owning Magento, formerly worked with osCommerce. Varien had originally planned to fork osCommerce but later decided to rewrite it as Magento.
In the first years of its existence, the platform has been the winner of the "Best of Open Source Software Awards" and "SourceForge Community Choice Awards" several times.
In February 2011, eBay announced it had made an investment in Magento in 2010, worth a 49% ownership share of the company.
On June 6, 2011, eBay announced that it would be acquiring the rest of Magento, which would join its new X.Commerce initiative. Magento's CEO and co-founder Roy Rubin wrote on the Magento blog that "Magento will continue to operate out of Los Angeles, with Yoav Kutner and me as its leaders.".
Yoav Kutner left Magento in April 2012, citing that the vision for Magento had changed since the time of acquisition due to high-level staff changes.
As a result of the breakup of eBay following Carl Icahn's raid, Magento was spun out as an independent company by the new owner Permira private equity fund on 3 November 2015.
In May 2018 it was announced that Magento would be acquired by Adobe for $1.68bn with a view to integrating it into Adobe Experience Cloud, its Enterprise CMS platform. The acquisition was finalized on June 19, 2018.
Overview
Magento provides two distinct platforms: Magento Open Source (previously Magento Community Edition) and Magento Commerce; the latter is available in an on-premises version (previously Magento Enterprise Edition) or as a platform-as-a-service (previously Magento Enterprise Cloud Edition). There were also two former platforms, Magento Professional Edition, and Magento Go.
Magento Open Source
Magento Open Source, previously Magento Community Edition, is an open-source eCommerce platform. Developers can implement the core files and extend its functionality by adding new plug-in modules provided by other developers. Since the first public beta version was released in 2007, Magento Open Source has been developed and customized in order to provide a basic eCommerce platform.
The current release and each of the previous historical release versions of the 1.X and 2.X version branches of Magento Open Source are available on the Magento Commerce, Inc. website for download as single-file downloads. Development of the 2.X version branch of Magento Open Source is coordinated publicly on GitHub. Magento 1.9.4, the last version of Magento 1.X to be released, reached end-of-life on June 30, 2020.
The latest actively supported versions of Magento Open Source are 2.3.7-p1, 2.4.2-p2 and 2.4.3
Magento will remain Open source after the recent acquisition by Adobe.
OpenMage Initiative
A fork of the last ever release of Magento 1.x (version 1.9.4.5) was made available on GitHub under an initiative named OpenMage which is short for Opensource Magento. Shortly afterwards a new unofficial community driven project was created to offer long term support and patches to Magento 1.x users.
Magento 2
Magento 2 has many new and improved features, developer tools, and its architecture is quite different from all the previous versions. Magento 2 was announced in 2010. It was planned for release in 2011, and its merchant beta version was released in July 2015. Since then Magento 1 and Magento 2 have existed simultaneously.
Magento caters to three levels of businesses; small business, mid-market, and enterprise.
Magento Commerce / Adobe Commerce
Released April 11, 2016, Magento Commerce is an eCommerce platform as a service.
As part of a long-term project to integrate the acquired Magento sales, marketing, and product teams within the Adobe Experience Cloud business unit, in April 2021 Magento Commerce was rebranded to Adobe Commerce..
Magento Commerce (On-Premises)
Magento Commerce (On-Premises), previously "Magento Enterprise Edition" is derived from Magento Open Source and has the same core files. Unlike Open Source, this is not free but has more features and functionality. This product is designed for large businesses that require technical support with installation, usage, configuration, and troubleshooting. Although Magento Commerce has annual maintenance fees, neither Open Source nor Commerce (On-Premises) include hosting. The Magento team develops Magento Commerce by cooperating with users and third parties. Development on the 2.X branch of Magento Commerce is coordinated publicly on GitHub.
The latest actively supported versions of Magento Commerce is 2.3.4 (EE and CE) released on October 8, 2019.
Magento Partners
Solution Partners
Magento Solution Partners are development agencies who specialise in eCommerce delivery for Magento Commerce merchants and have extensive experience implementing, maintaining and upgrading Magento eCommerce websites. Many Magento solution partners develop their own extensions, solutions and customisation into the Magento Commerce platform.
Technology Partners
Magento Technology Partners are companies or products that help merchants improve their website out of the box. They cover more than 20 different categories including marketing automation, payments, content management, shipping, tax, hosting, and performance. To ensure quality and compatibility, all Magento Technology Partners pass a rigorous business and technology review. Magento Technology Partners can be found in the official website directory.
Security concerns
In 2015 it was reported that outdated or unpatched Magento web stores are susceptible to a cross-site scripting attack, which allows attackers to perform online skimming to steal user credit card information. According to a security expert, more than 4000 Magento web stores were vulnerable to such an attack in October 2016.
In 2017 security company DefenseCode reported that Magento CE web stores are susceptible to Remote Code Execution attack, which allows attackers to perform web skimming, steal stored credit card information of future and previous customers, take control of the database, and in some instances even the complete server - including other Magento instances. It's suspected that up to 260,000 Magento web stores could be vulnerable to such an attack in April 2017.
In 2019, Magento reported potential Vulnerability in its Admin URL location for its 2.1.x, 2.2.x, and 2.3.x versions. It also reported critical security breach for customers running version 1.0.2 (and earlier versions) of the Magestore Store Locator extension. Similar incidences of Magecart attack and Magento killer have also been faced by e-commerce store owners.
Events
"Imagine eCommerce" is the annual Magento eCommerce conference that has run since 2011. The first event was held in February 2011 in Los Angeles with more than 600 Magento merchants, partners, and developers. The goals of the event is sharing ecommerce ideas and providing networking opportunity sessions.
Besides Imagine, Magento also organizes local "Magento Live" events in which the participants will have opportunities to learn more about ecommerce in general, get introduced to local Magento partners and learn about upcoming changes to the Magento software itself. Magento Live events have been held in Australia (Sydney), UK (London), The Netherlands (Amsterdam), Spain (Barcelona), France (Paris) and Germany (München).
There is a non-profit organization that was established in 2019 and that contributes up to more than 24 global "Meet Magento" events per year named "Magento Association" The association is open to all companies who are active in ecommerce in any way and want using Magento commerce now or in future. The project has been run on all developed market of Magento like Germany, Austria, Switzerland, France, Sweden, Denmark, Italy, Spain, the Netherlands, Poland, Romania, Russia and also Vietnam.
Certification
There are four different Magento certifications. Three of them aim to prove developers' competency in implementing modules; one (Certified Solution Specialist) targets business users (consultants, analysts, project managers). Magento Front End Developer Certification is mainly focused on improving the user interface (UI) of back end developers who implement the core modules. The Plus certification tests deep understanding of Magento Enterprise modules and the entire architecture.
Resources
Magento DevBox is a Docker container that allows for the easy installation of the latest Magento 2 CE or EE platform in a virtual environment. It also allows developers to link to an existing local Magento 2 installation. As of June 2017, it is still in beta.
Magento Commerce 2.3.4 released on January 28, 2020, the latest version is v2.3.4, download it from tech resources page or GitHub.
Magento 1 migration to Magento 2 can be done by the official Data Migration Tool. The migration can be performed by developers with extensive Magento 1 and 2 experience.
Magento also has a diverse group of eCommerce articles written to help B2B and B2C companies. These can be found in the blog section of the website.
eCommerce case studies are also another portion of the Magento website that provides inside information on how Magento impacts brands.
Criticism and controversy
A TechCrunch article reports that according to its sources, former Magento employees claim they've collectively been ‘cheated out’ of nearly 7-10% of Magento, a stake that would have been worth approximately $18 million when eBay acquired the company.
See also
Comparison of shopping cart software
List of online payment service providers
References
EBay
Free e-commerce software
Companies based in Culver City, California
Software companies based in California
Free software programmed in PHP
Software using the Academic Free License
Free content management systems
Software using the Open Software License
Software companies of the United States
2010 mergers and acquisitions
|
87026
|
https://en.wikipedia.org/wiki/Tapestry
|
Tapestry
|
Tapestry is a form of textile art, traditionally woven by hand on a loom. Tapestry is weft-faced weaving, in which all the warp threads are hidden in the completed work, unlike most woven textiles, where both the warp and the weft threads may be visible. In tapestry weaving, weft yarns are typically discontinuous; the artisan interlaces each coloured weft back and forth in its own small pattern area. It is a plain weft-faced weave having weft threads of different colours worked over portions of the warp to form the design.
Tapestry is relatively fragile, and difficult to make, so most historical pieces are intended to hang vertically on a wall (or sometimes in tents), or sometimes horizontally over a piece of furniture such as a table or bed. Some periods made smaller pieces, often long and narrow and used as borders for other textiles. European tapestries are normally made to be seen only from one side, and often have a plain lining added on the back. However, other traditions, such as Chinese kesi and that of Pre-Columbian Peru, make tapestry to be seen from both sides. Most weavers use a natural warp thread, such as wool, linen or cotton. The weft threads are usually wool or cotton but may include silk, gold, silver, or other alternatives.
Tapestry should be distinguished from the different technique of embroidery, although large pieces of embroidery with images are sometimes loosely called "tapestry", as with the famous Bayeux Tapestry, which is in fact embroidered. From the Middle Ages on European tapestries could be very large, with images containing dozens of figures. They were often made in sets, so that a whole room could be hung with them.
In late medieval Europe tapestry was the grandest and most expensive medium for figurative images in two dimensions, and despite the rapid rise in importance of painting it retained this position in the eyes of many Renaissance patrons until at least the end of the 16th century, if not beyond. The European tradition continued to develop and reflect wider changes in artistic styles until the French Revolution and Napoleonic Wars, before being revived on a smaller scale in the 19th century.
Terms and etymology
In English, "tapestry" has two senses, both of which apply to most of the works discussed here. Firstly it means work using the tapestry weaving technique described above and below, and secondly it means a rather large textile wall hanging with a figurative design. Some embroidered works, like the Bayeux Tapestry, meet the second definition but not the first. The situation is complicated by the French equivalent tapisserie also covering needlepoint work, which can lead to confusion, especially with pieces such as furniture covers, where both techniques are used.
According to the Oxford English Dictionary, the earliest use in English was in a will of 1434, mentioning a "Lectum meum de tapstriwerke cum leonibus cum pelicano". They give a wide definition, covering: "A textile fabric decorated with designs of ornament or pictorial subjects, painted, embroidered, or woven in colours, used for wall hangings, curtains, covers for seats, ..." before mentioning "especially" those woven in a tapestry weave.
The word tapestry derives from Old French , from , meaning "to cover with heavy fabric, to carpet", in turn from , "heavy fabric", via Latin ( ), which is the Latinisation of the Greek (; , ), "carpet, rug". The earliest attested form of the word is the Mycenaean Greek , , written in the Linear B syllabary.
"Tapestry" was not the common English term until near the end of the classic period for them. If not just called "hangings" or "cloths", they were known as "arras", from the period when Arras was the leading production centre. Arazzo is still the term for tapestry in Italian, while a number of European languages use variants based on Gobelins, after the French factory; for example both Danish and Hungarian use gobelin (and in Danish tapet means wallpaper). Thomas Campbell argues that in documents relating to the Tudor royal collection from 1510 onwards "arras" specifically meant tapestries using gold thread.
Production
Tapestry is a type of weaving. Various designs of looms can be used, including upright or "high-warp" looms, where the tapestry is stretched vertically in front of the weaver, or horizontal "low-warp" looms, which were usual in large medieval and Renaissance workshops, but later mostly used for smaller pieces. The weaver always works on the back of the piece, and is normally following a full-size drawn or painted cartoon, or possibly another tapestry; depending on the set up, this reverses (is a mirror image of) the tapestry image. The cartoon was generally created from a smaller modello, which in "industrial" workshops from at least the late Middle Ages on was produced by a professional artist, who often had little or no further involvement in the process. The cartoon was traced onto the warp lines by the weaver, and then placed where it could still be seen, sometimes through a mirror, when it hung behind the weaver. With low-warp looms the cartoon was usually cut into strips and placed beneath the weaving, where the weaver could see it through the "web" of threads. The Raphael Cartoons, which are very rare examples of surviving cartoons, were cut in this way.
In European "industrial" tapestries the warp threads were normally wool, but in more artisanal settings, and older ones, linen was often used. The weft threads were wool, with silk, silver or gold thread used in the most expensive tapestries. Some famous designs, such as the Sistine Chapel tapestries and the Story of Abraham set probably first made for King Henry VIII, survive in versions with precious metals and other versions without. Using silk might increase the cost by four times, and adding gold thread increased the cost enormously, to perhaps fifty times that of wool alone.
The weavers were usually male, as the work was physically demanding; spinning the threads was usually a female preserve. Apart from the design and materials, the quality of tapestries varies with the tightness of the weaving. One modern measure of this is the number of warp threads per centimetre. It is estimated that a single weaver could produce a square yard of medium quality tapestry in a month, but only half that of the finest quality.
Function
The success of decorative tapestry can be partially explained by its portability (Le Corbusier once called tapestries "nomadic murals"). The fully hand-woven tapestry form is more suitable for creating new figurative designs than other types of woven textile, and the looms could be much larger. Kings and noblemen could fold up and transport tapestries from one residence to another. Many kings had "wardrobe" departments with their own buildings devoted to the care, repair, and movement of tapestries, which were folded into large canvas bags and carried on carts. In churches, they were displayed on special occasions. Tapestries were also draped on the walls of palaces and castles for insulation during winter, as well as for decorative display. For special ceremonial processions such as coronations, royal entries and weddings, they would sometimes be displayed outside. The largest and best tapestries, designed for more public spaces in palaces, were only displayed on special occasions, reducing wear and fading. Presumably the smaller personal rooms were hung permanently.
Many smaller pieces were made as covers for furniture or cushions, or curtains and bed hangings. Others, especially in the case of those made for patrons outside the top of the elite, were cut up and reused for such functions when they, or tapestries in general, came to seem old-fashioned. Bags, and sometimes clothing were other re-uses. The Beauvais Manufactory became rather a specialist in furniture upholstery, which enabled it to survive after the French Revolution when this became the main remaining market. In the case of tapestries with precious metal thread, they might be burned to recover the metal, as Charles V's soldiers did to some of the Sistine Chapel tapestries, and the French Directory government did in the 1790s to most of the royal collection from the Renaissance.
In the Middle Ages and the Renaissance, a rich tapestry panel woven with symbolic emblems, mottoes, or coats of arms called a baldachin, canopy of state or cloth of state was hung behind and over a throne as a symbol of authority. The seat under such a canopy of state would normally be raised on a dais.
As paintings came to be regarded as more important works of art, typically by the 17th century, tapestries in palaces were moved less, and came to be regarded as more or less permanent fittings for a particular room. It was at this point that many old tapestries were cut to allow fitting around doors and windows. They also often suffered the indignity of having paintings hung on top of them. Some new tapestries were made to fit around a specific room; the design of the Gobelins set from Croome Court, now in New York, has a large field with an ornamental design that could easily be adjusted in size to fit the measurements of the customer's room.
Early history
Ancient
Much is unclear about the early history of tapestry, as actual survivals are very rare, and literary mentions in Greek, Roman and other literature almost never give enough detail to establish that a tapestry technique is being described. From ancient Egypt, tapestry weave pieces using linen were found in the tombs of both Thutmose IV (d. 1391 or 1388 BC) and Tutankhamen (c. 1323 BC), the latter a glove and a robe.
Pieces in wool, given a wide range of dates around two millennia ago, have been found in a cemetery at Sanpul (Shampula) and other sites near Khotan in the Tarim Basin. They appear to have been made in a variety of places, including the Hellenistic world. The largest fragments, known as the Sampul tapestry and probably Hellenistic in origin, apparently came from a large wall-hanging, but had been reused to make a pair of trousers.
Early and High medieval
The Hestia Tapestry from Byzantine Egypt around 500–550, is a largely intact wool piece with many figures around the enthroned goddess Hestia, who is named in Greek letters. It is 114 x 136.5 cm (44.9 x 53.7 inches) with a rounded top, and was presumably hung in a home, showing the persistence of Greco-Roman paganism at this late date. The Cleveland Museum of Art has a comparable enthroned Virgin Mary of similar date. Many of the small borders and patches with images with which the early Byzantine world liked to decorate their clothing were in tapestry.
A number of survivals from around the year 1000 show the development of a frieze shape, of a large long tapestry that is relatively short in height. These were apparently designed to hang around a hall or church, probably rather high; surviving examples have nearly all been preserved in churches, but may originally have been secular. The Cloth of St Gereon, from around 1000, has a repeat pattern centred on medallions with a motif of a bull being attacked by a griffin, taken from Byzantine silk (or its Persian equivalent) but probably woven locally in the Rhineland. It survived in a church in Cologne, Germany.
The five strips of Överhogdal tapestries, from Sweden and dated to within 70 years of 1100, have designs in which animals greatly outnumber human figures, and have been given various interpretations. One strip has geometrical motifs. The Skog tapestry, also from Sweden but probably early 14th-century, is comparable in style.
The most famous frieze hanging is the Bayeux Tapestry, actually an embroidery, which is 68.38 metres long and 0.5 metres wide () and would have been even longer originally. This was made in England, probably in the 1070s, and the narrative of the Norman Conquest of England in 1066 is very clear, explained by tituli in Latin. This may have been an Anglo-Saxon genre, as the Liber Eliensis records that the widow of the Anglo-Saxon commander Byrhtnoth gave Ely Abbey a tapestry or hanging celebrating his deeds, presumably in the style of the Bayeux Tapestry, the only surviving example of such a work. This was given immediately after his death in 991 at the Battle of Maldon, so had probably been hanging in his home previously.
A group with narrative religious scenes in a clearly Romanesque style that relates to Rhineland illuminated manuscripts of the same period was made for Halberstadt Cathedral in Germany around 1200, and shaped differently to fit specific spaces. These may well have been made by nuns, or the secular canonesses of nearby Quedlinburg Abbey.
In this period repeated decorative motifs, increasingly often heraldic, and comparable to the styles of imported luxury fabrics such as Byzantine silk, seem to have been the common designs. Of the tapestries mentioned above, the Cloth of St Gereon best represents this style.
Peak period, after about 1350
A decisive shift in European tapestry history came around 1350, and in many respects set the pattern for the industry until the end of its main period of importance, in the upheavals following the French Revolution. The tapestries made for the very small number of customers able to commission the best pieces were now extremely large, and extremely expensive, very often made in sets, and often showed complicated narrative or allegorical scenes with large numbers of figures. They were made in large workshops concentrated in a number of cities in a relatively small region of northern France and the Southern Netherlands (partly to be near supplies of English wool). By convention all these are often called "Flemish tapestries", although most of the production centres were not in fact in the County of Flanders.
Before reaching the weaving workshop, the commissioning process typically involved a patron, an artist, and a merchant or dealer who sorted out the arrangements and contracts. Some tapestries seem to have been made for stock, before a customer had emerged. The financing of the considerable costs of setting up a workshop is often obscure, especially in the early period, but rulers supported some workshops, or other wealthy people. The merchants or dealers were very likely also involved.
Weaving centres
Where surviving tapestries from before around 1600 were made is often unclear; from 1528 Brussels, by then clearly the main centre, required its weavers to mark tapestries of any size with the city's mark and that or the weaver or merchant. At any one time from 1350 to 1600 probably only one or two centres could produce the largest and finest royal orders, and groups of highly skilled weavers migrated to new centres, often driven to move by wars or the plague. At first Paris led the field, but the English occupation there after 1418 sent many to Arras, already a centre. Arras in turn was sacked in 1477, leading to the rise of Tournai, until a serious plague early in the next century. Brussels had been growing in importance, and now became the most important centre, which it remained until the Eighty Years War disrupted all the Netherlands. Brussels had a revival in the early 17th century, but from around 1650 the French factories were increasingly overtaking it, and remained dominant until both fashion and the upheavals of the French Revolution and the Napoleonic Wars brought the virtual end of the traditional demand for large tapestries.
There was always some tapestry weaving, mostly in rather smaller workshops making smaller pieces, in other towns in northern France and the Low Countries. This was also the case in other parts of Europe, especially Italy and Germany. From the mid-16th century many rulers encouraged or directly established workshops capable of high-quality work in their domains. This was most successful in France, but Tuscany, Spain, England and eventually Russia had high-quality workshops, normally beginning with the importation of a group of skilled workers from the "Flemish" centres.
Patrons
The main weaving centres were ruled by the French and Burgundian branches of the House of Valois, who were extremely important patrons in the Late Medieval period. This began with the four sons of John II of France (d. 1362), whose inventories reveal they owned hundreds of tapestries between them. Almost the only clear survival from these collections, and the most famous tapestry from the 14th century, is the huge Apocalypse Tapestry, a very large set made for Louis I, Duke of Anjou in Paris between 1377 and 1382.
Another of the brothers, Philip the Bold, Duke of Burgundy (d. 1404) was probably an even more extravagant spender, and presented many tapestries to other rulers around Europe. Several of the tapestry-weaving centres were in his territories, and his gifts can be seen as a rather successful attempt to spread the taste for large Flemish tapestries to other courts, as well as being part of his attempt to promote the status of his duchy. Apart from Burgundy and France, tapestries were given to several of the English Plantagenets, and the rulers of Austria, Prussia, Aragon, Milan, and at his specific request, to the Ottoman Sultan Bazajet I (as part of a ransom deal for the duke's son). None of the tapestries Philip commissioned appear to survive. Philip's taste for tapestries was to continue very strongly in his descendants, including the Spanish Habsburgs.
Subjects and style
The new style of grand tapestries that were large and often in sets mostly showed subjects with large numbers of figures representing narrative subjects. The iconography of a high proportion of narrative tapestries goes back to written sources, the Bible and Ovid's Metamorphoses being two popular choices.
It is a feature of tapestry weaving, in contrast to painting, that weaving an area of the work containing only relatively plain areas of the composition, such as sky, grass or water, still involves a relatively large amount of slow and skilled work. This, together with the client's expectation of an effect of overpowering magnificence, and the remoteness of the main centres from Italian influence, led to northern compositions remaining crammed with figures and other details long after classicizing trends in Italian Renaissance painting had reduced the crowding in paintings.
An important challenge to the northern style was the arrival in Brussels, probably in 1516, of the Raphael Cartoons for the pope's Sistine Chapel commission of a grand set depicting the Acts of the Apostles. These were sent from Rome and used the latest monumental classicizing High Renaissance style, which was also reaching the north through prints.
Hunting
Hunting scenes were also very popular. These were usually given no specific setting, although sometimes the commissioner and other figures might be given portraits. The four Devonshire Hunting Tapestries (1430-1450, V&A), probably made in Arras, are perhaps the largest set of 15th-century survivals, showing the hunting of bears, boars, deer, swans, otters, and falconry. Very fashionably dressed ladies and gentlemen stroll around beside the slaughter. Another set, from after 1515, show a similar late-medieval style, although partly made with silk, so extra-expensive.
But the twelve pieces in Les Chasses de Maximilien (1530s, Louvre), made in Brussels for a Habsburg patron, show an advanced Renaissance compositional style adapted to tapestries. These have a hunting scene for each month in the year, and also show specific locations around the city. Goya was still designing hunting scenes in the 1770s.
Military
After a probable gap since the 11th century, in the late 14th century sets of tapestries returned as the grandest medium for "official military art", usually celebrating the victories of the person commissioning them. Philip the Bold commissioned a Battle of Roosbeke set two years after his victory in 1382, which was five metres high and totalled over 41 metres in width. John of Gaunt, Duke of Lancaster insisted it was changed when Philip displayed it at a diplomatic meeting in Calais in 1393 to negotiate a peace treaty; Gaunt regarded the subject-matter as inappropriate for the occasion. The Portuguese Pastrana Tapestries (1470s) were an early example, and a rare survival from so early.
Many sets were produced of the lives of classical heroes that included many battle scenes. Not only the Trojan War, Alexander the Great, Julius Caesar and Constantine I were commemorated, but also less likely figures such as Cyrus the Great of ancient Persia.
There were many 15th-century sets of contemporary wars, especially celebrating Habsburg victories. Charles V commissioned a large set after his decisive victory at the Battle of Pavia in 1525; a set is now in the Museo di Capodimonte in Naples. When he led an expedition to North Africa, culminating in the Conquest of Tunis in 1535 (no more lasting than that of Tangier depicted in the Pastrana tapestries), he took the Flemish artist Jan Cornelisz Vermeyen with him, mainly to produce drawings for the set of tapestries ordered on his return.
Contemporary military subjects became rather less popular as many 16th-century wars became religious, sometimes allegorical subjects were chosen to cover these. But the Battle of Lepanto was commemorated with a Brussels set, and the defeat of the Spanish Armada with the Armada Tapestries (1591); these were made in Delft, by a team who also made many tapestries of Dutch naval victories. The Armada set were destroyed in the Burning of Parliament in 1834, but are known from prints. Both sets adopted a high and distant aerial view, which continued in many later sets of land battles, often combined with a few large figures in the foreground. The French tapestries commissioned by Louis XIV of the victories early in his reign were of this type. Right at the end of the 16th century, a set (now in Madrid) was commissioned of the Triumphs and battles of Archduke Albert, who had just been made sovereign of the Spanish Netherlands (his military career had in fact been rather unsuccessful). The city council of Antwerp ordered it from the workshop of Maarten Reymbouts the Younger in Brussels, to be first seen on the occasion of his Royal entry to Antwerp in late 1599.
A set produced for John Churchill, 1st Duke of Marlborough showing his victories was varied for different clients, and even sold to one of his opponents, Maximilian II Emanuel, Elector of Bavaria, after reworking the general's faces and other details.
Millefleur style
Millefleur (or millefleurs) was a background style of many different small flowers and plants, usually shown on a green ground, as though growing in grass. Often various animals are added, usually all at about the same size, so that a rabbit or dove and a unicorn are not much different in size. Trees are usually far too small and out of scale with the flowers around them, a feature also generally found in medieval painting.
The millefleur style was used for a range of different subjects from about 1400 to 1550, but mainly between about 1480 and 1520. In many subjects the millefleur background stretches to the top of the tapestry, eliminating any sky; the minimization of sky was already a feature of tapestry style; the Devonshire Hunting Tapestries show an early stage of the style. Prominent millefleur backgrounds, as opposed to those mostly covered with figures, are especially a feature of allegorical and courtly subjects. The Lady and the Unicorn set in Paris are famous examples, from around 1500.
Millefleur backgrounds became very common for heraldic tapestries, which were one of the most popular relatively small types, usually more tall than wide. These usually featured the coat of arms of the patron in the centre, with a wide floral field. They would often be hung behind the patron when he sat in state or dined, and were made for many nobles who could not afford the huge narrative sets bought by royalty. Enghien was a smaller weaving centre that seems to have specialized in these. Earlier types of heraldic tapestries had often repeated elements of the heraldry in patterns.
Landscape
After about 1520 the top workshops moved away from millefleur settings towards naturalistic landscape, with all the elements sized at a consistent perspective scale. Tapestries whose main content was landscape and animals are known as verdure subjects (from the French for "greenery"). This genre has suffered more than most from colour changes as the greens of tapestries are especially prone to fade, or turn to blues. Smaller tapestries of this type remained popular until the 18th century, and had the advantage that workshops could make them without a specific order, and distribute them across Europe via a network of dealers. From about 1600 they followed the wider trends in European landscape painting and prints. Oudenarde specialized in these, but they were produced in many towns. As with paintings, the addition of a figure or two could elevate such pieces to a depiction of a story from classical mythology, or a hunting subject.
Arrival of Renaissance style and subjects
Tapestry weavers in the Netherlands had become very comfortable working with the Gothic style by the late 15th century, and were slow to reflect the stylistic changes of the Italian Renaissance; perhaps pressure from the customers for tapestries led the way. Prints enabled Italian designs to be seen in the north.
A distinctive Italian subject was the Petrarchan triumph, derived from his poem-cycle I trionfi (before 1374). The first recorded tapestries were a three piece set ordered by Duke Philip the Bold of Burgundy from Paris in 1399. A set made in the 1450s for Giovanni de' Medici, a leading patron of the latest Florentine style, used cartoons sent from Italy to the Netherlandish weavers. But the subjects suited the tapestry weavers style, as most designs included packed crowds of elaborately-dressed figures, and there were moral messages to be drawn.
16th century
The 16th century continued the taste for tapestry, and was arguably the finest period in the history of the medium. By now the tapestry-producing towns were mostly ruled by the Habsburg family, who replaced the Valois as the dominant patrons. At the start of the century Tournai was perhaps still the largest weaving centre, but after a plague it was replaced by Brussels, which as the Netherlandish administrative capital of the Valois and Habsburgs in recent decades was probably already the main centre for the highest quality weaving by 1500. But there were many other towns where tapestries were woven.
Tapestries were commissioned in the Netherlands by rulers across Europe, from King Henry VIII in England, to Pope Leo X and Sigismund II Augustus of Poland and Lithuania. Ownership of smaller tapesties was also spreading more widely through the nobility and bourgeoisie. From 1528 tapestries of larger sizes made in Brussels had to be so marked, and with the maker's or dealer's mark, making the task of the historian much easier. After an agreement between the relevant guilds in 1476, the cartoons for the main designs had to be supplied by a member of the painters' guild, while the weavers could elaborate these with detail, especially in millefeur designs. This ensured a high quality of design for Brussels pieces.
At the beginning of the century Late Gothic styles held sway, and both the most famous sets of millefleur "unicorn" tapestries were made around 1500, perhaps to designs from Paris: The Lady and the Unicorn (now Paris), and The Hunt of the Unicorn (now New York). Pope Leo's set for the Sistine Chapel, designed by Raphael in 1515–16, marked the introduction of the full Italian High Renaissance style to tapestry, and the top northern designers now attempted to adopt it, which was rather a struggle for them, although the wide distribution of prints across Europe gave them one easy route, which many took. Les Chasses de Maximilien (The Hunts of Maximilian) was a series of twelve huge Brussels tapestries designed by Bernard van Orley in the 1530s for the Habsburgs, one of the most successful efforts to achieve an up-to-date Renaissance style. Technically, Brussels tapestries in the last quarter of the 15th century had already become sophisticated enough to begin to incorporate more illusionistic elements, distinguishing between different textures in their subject-matter, and including portraits of individuals (now mostly unknown) rather than generic figures.
Over the century oil paintings mostly moved from a panel support to canvas, allowing a far greater size, and began to compete seriously with tapestries. The authenticity of the master's touch that paintings allowed, but tapestry did not, became appreciated by the most sophisticated patrons, including the Habsburgs. However, Charles V and Philip II of Spain continued to spend huge sums on tapestries, apparently believing them the most magnificent form of decoration, and one that maintained continuity with their Burgundian ancestors.
17th century
The early part of the 17th century saw the taste for tapestry among the elite continuing, although painting was steadily gaining ground. Brussels remained much the most important weaving centre, and Rubens, mostly based in Antwerp not far away, brought the grand Baroque style to the medium, with Jacob Jordaens and others also designing many. In later generations important designers included Justus van Egmont (d. 1674), Ludwig van Schoor (d. 1702) and Jan van Orley (d. 1735, the last of a long-lasting dynasty). The Brussels workshops declined somehat in the second half of the century, both as large Flemish Baroque paintings took some of their market, and French competition squeezed the remaining niche for tapestries.
Production in Paris revived from 1608, flagging in the civil wars of the 1640s, but starting again in 1658 when Nicolas Fouquet founded a workshop. After his fall Colbert mostly merged this to the new Gobelins Manufactory he founded for the king in 1663, which continues to this day. The Beauvais Manufactory, always a private enterprise, was founded by Colbert in 1664, but only became significant from twenty years later. Aubusson tapestry, probably a continuation of earlier small workshops, continued but was to become more significant in the next century. The Gobelins works, fed designs in the latest Style Louis XIV by the court artists, became increasingly dominant over the rest of the century, and by 1700 was the most admired and imitated workshop in Europe.
The Mortlake Tapestry Works outside London were founded in 1619, with encouragement from King Charles I of England, using Flemish weavers at the start, and in the 1620s and 1630s were producing some of the best quality tapestry in Europe. The Medici workshop in Florence continued, and from 1630 was joined by one in Rome, started by Cardinal Francesco Barberini with the inevitable imported Flemish director. Both the Mortlake and Rome workshops petered out around the end of the century. In Germany, workshops were established in Munich in 1604, and some nine further cities by the end of the century, many sponsored by the local ruler.
18th century
Around the start of the century there was increased interest in landscape subjects, some still with hunting scenes, but others showing genre subjects of rural life.
Few new workshops were begun in the century, the main exception being the Royal Tapestry Factory in Madrid. This was started in 1720, soon after Spain lost its territories in Flanders under the Treaty of Utrecht. Philip V of Spain brought Jacob van der Goten and six of his sons to Madrid. Much the best known tapestries are those designed by Francisco Goya from 1775. These mostly show genre scenes of lovers or country people recreating. Both his cartoons and the tapestries made from them mostly survive, with many of the cartoons in the Prado, and the tapestries still in the royal palaces. As with Raphael's cartoons for the Sistine Chapel tapestries, modern critics tend to prefer the cartoons. The works were privately owned by the van der Gotens and descendants until 1997, and the last member of the family resigned as chair in 2002. Apart from pauses during wars, the works has continued to produce tapestries.
Around the mid-century, the new Rococo style proved very effective in tapestries, now a good deal smaller than before. François Boucher produced 45 cartoons for Beauvais, and then by 1753 followed the animal painter Jean-Baptiste Oudry as artistic director at Gobelins. Oudry's best known set was the eight-strong The Pastoral Amusements made from the 1720s onwards in many repetitions.
During the second half of the century, the main Brussels workshops gradually closed, the last in 1794. Tapestry suited neither Neoclassicism nor Romanticism very well, and this together with the disruptions of the French Revolution and Napoleonic Wars brought the production of large figurative tapestries almost to a halt across Europe.
19th century
In the 19th century, William Morris resurrected the art of tapestry-making in the medieval style at Merton Abbey. Morris & Co. made successful series of tapestries for home and ecclesiastical uses, with figures based on cartoons by Edward Burne-Jones. The set of six Holy Grail tapestries of the 1890s, repeated a number of times, are the largest they made, and perhaps the most successful.
Traditional tapestries are still made at the Gobelins factory in Paris, and the royal factory in Madrid. They and a few other old European workshops also repair and restore old tapestries; the main British workshop is at Hampton Court Palace, a department of the Royal Collection Trust.
Outside Europe
The Chinese kesi is a tapestry weave, normally using silk on a small scale compared to European wall-hangings. Clothing for the court was one of the main uses. The density of knots is typically very high, with a gown of the best quality perhaps involving as much work as a much larger European tapestry. Initially used for small pieces, often with animal, bird and flower decoration, or dragons for imperial clothing, under the Ming dynasty it was used to copy paintings.
The Death of Polydorus is one of an unusual set of seven large tapestry hangings made in China for the Portuguese governor of Macao in the 1620s, blending Western and Chinese styles. Most of the hangings are embroidery, but the faces and flesh parts of the figures are appliqué painted silk satin pieces, reflecting a Chinese technique often used for Buddhist banners, and the larger forms of thangka.
Kilims and Navajo rugs are also types of tapestry work, the designs of both mostly restricted to geometrical patterns similar to those of other rug weaving techniques.
The Moroccan Handira is a hand-woven tapestry made by Berber women in the Middle-Atlas as part of a girl's dowry. This creamy sequined tapestry features embroidery and mirrored sequins believed to warn off the evil eye and to bring baraka, the Moroccan word for good luck and prosperity. The tapestry is worn by the bride as a cover on her wedding day before using it as a throw in her marital bedroom.
Contemporary tapestry
What distinguishes the contemporary field from its pre-World War II history is the predominance of the artist as weaver in the contemporary medium. This trend has its roots in France during the 1950s, where one of the "cartoonists" for the Aubusson tapestry studios, Jean Lurçat spearheaded a revival of the medium by streamlining colour selection, thereby simplifying production, and by organizing a series of Biennial exhibits held in Lausanne, Switzerland. The Polish work submitted to the first Biennale, which opened in 1962, was quite novel. Traditional workshops in Poland had collapsed as a result of the war. Also art supplies in general were hard to acquire. Many Polish artists had learned to weave as part of their art school training and began creating highly individualistic work by using atypical materials like jute and sisal. With each Biennale the popularity of works focusing on exploring innovative constructions from a wide variety of fiber resounded around the world.
There were many weavers in pre-war United States, but there had never been a prolonged system of workshops for producing tapestries. Therefore, weavers in America were primarily self-taught and chose to design as well as weave their art. Through these Lausanne exhibitions, US artists/weavers, and others in countries all over the world, were excited about the Polish trend towards experimental forms. Throughout the 1970s almost all weavers had explored some manner of techniques and materials in vogue at the time. What this movement contributed to the newly realized field of art weaving, termed "contemporary tapestry", was the option for working with texture, with a variety of materials and with the freedom for individuality in design
In the 1980s it became clear that the process of weaving weft-faced tapestry had another benefit, that of stability. The artists who chose tapestry as their medium developed a broad range of personal expression, styles and subject matter, stimulated and nourished by an international movement to revive and renew tapestry traditions from all over the world. Competing for commissions and expanding exhibition venues were essential factors in how artists defined and accomplished their goals.
Much of the impetus in the 1980s for working in this more traditional process came from the Bay Area in Northern California where, twenty years earlier, Mark Adams, an eclectic artist, had two exhibits of his tapestry designs. He went on to design many large tapestries for local buildings. Hal Painter, another well-respected artist in the area became a prolific tapestry artist during the decade weaving his own designs. He was one of the main artists to "...create the atmosphere which helped give birth to the second phase of the contemporary textile movement – textiles as art – that recognition that textiles no longer had to be utilitarian, functional, to serve as interior decoration."
Early in the 1980s many artists committed to getting more professional and often that meant traveling to attend the rare educational programs offered by newly formed ateliers, such as the San Francisco Tapestry Workshop, or to far-away institutions they identified as fitting their needs. This phenomenon was happening in Europe and Australia as well as in North America.
Opportunities for entering juried tapestry exhibits were beginning to happen by 1986, primarily because the American Tapestry Alliance (ATA), founded in 1982, organised biennial juried exhibits starting in 1986. The biennials were planned to coincide with the Handweavers Guild or America's "Convergence" conferences. The new potential for seeing the work of other tapestry artists and the ability to observe how one's own work might fare in such venues profoundly increased the awareness of a community of like-minded artists. Regional groups were formed for producing exhibits and sharing information.
The desire of many artists for greater interaction escalated as an international tapestry symposium in Melbourne, Australia in 1988 lead to a second organization committed to tapestry, the International Tapestry Network (ITNET). Its goal was to connect American tapestry artists with the burgeoning international community. The magazines were discontinued in 1997 as communicating digitally became a more useful tool for interactions. As the world has moved into the digital age, tapestry artists around the world continue to share and inspire each other's work.
By the new millennium however, fault lines had surfaced within the field. Many universities that previously had strong weaving components in their art departments, such as San Francisco State University, no longer offered handweaving as an option as they shifted their focus to computerized equipment. A primary cause for discarding the practice was the fact that only one student could use the equipment for the duration of a project whereas in most media, like painting or ceramics, the easels or potters wheels were used by several students in a day. Worldwide, people from all different cultures began adopting these forms of decor for profession and personal use.
At the same time, "fiber art" had become one of the most popular mediums in their art programs. Young artists were interested in exploring a wider scope of processes for creating art through the materials classified as fiber. This shift to more multimedia and sculptural forms and the desire to produce work more quickly had the effect of pushing contemporary tapestry artists inside and outside the academic institutions to ponder how they might keep pace in order to sustain visibility in their art form.
Susan Iverson, a professor in the School of the Arts at Virginia Commonwealth University, explains her reasons:
I came to tapestry after several years of exploring complex weaves. I became enamored with tapestry because of its simplicity — its straightforward qualities. It allowed me to investigate form or image or texture, and it had the structural integrity to hold its own form. I loved the substantial quality of a tapestry woven with heavy threads—its object quality.
Another prominent artist, Joan Baxter, states:
My passion for tapestry arrived suddenly on the first day of my introduction to it in my first year at ECA [Edinburgh College of Art.] I don't remember ever having consciously thought about tapestry before that day but I somehow knew that eventually I'd be really good at this. From that day I have been able to plough a straight path deeper and deeper into tapestry, through my studies in Scotland and Poland, my 8 years as a studio weaver in England and Australia and since 1987 as an independent tapestry artist. The demanding creative ethos of the tapestry department gave me the confidence, motivation and self-discipline I needed to move out into the world as a professional tapestry weaver and artist. What was most inspiring for me as a young student was that my tutors in the department were all practising, exhibiting artists engaging positively with what was then a cutting edge international Fibre Art movement.
Archie Brennan, now in his sixth decade of weaving, says of tapestry:
500 years ago it was already extremely sophisticated in its development-- aesthetically, technically and in diversity of purpose. Today, its lack of a defined purpose, its rarity, gives me an opportunity to seek new roles, to extend its historic language and, above all, to dominate my compulsive, creative drive. In 1967, I made a formal decision to step away from the burgeoning and exciting fiber arts movement and to refocus on woven tapestry's long-established graphic pictorial role.
In the mid-twentieth century, new tapestry art forms were developed by children at the Ramses Wissa Wassef Art Centre in Harrania, Egypt.
Jacquard tapestries, colour and the human eye
The term tapestry is also used to describe weft-faced textiles made on Jacquard looms. Before the 1990s tapestry upholstery fabrics and reproductions of the famous tapestries of the Middle Ages had been produced using Jacquard techniques but more recently, artists such as Chuck Close, Patrick Lichty, and the workshop Magnolia Editions have adapted the
computerised Jacquard process to producing fine art.
Typically, tapestries are translated from the original design via a process resembling paint-by-numbers: a cartoon is divided into regions, each of which is assigned a solid colour based on a standard palette. However, in Jacquard weaving, the repeating series of multicoloured warp and weft threads can be used to create colours that are optically blended – i.e., the human eye apprehends the threads’ combination of values as a single colour.
This method can be likened to pointillism, which originated from discoveries made in the tapestry medium. The style's emergence in the 19th century can be traced to the influence of Michel Eugène Chevreul, a French chemist responsible for developing the colour wheel of primary and intermediary hues. Chevreul worked as the director of the dye works at Les Gobelins tapestry works in Paris, where he noticed that the perceived colour of a particular thread was influenced by its surrounding threads, a phenomenon he called “simultaneous contrast". Chevreul's work was a continuation of theories of colour elaborated by Leonardo da Vinci and Goethe; in turn, his work influenced painters including Eugène Delacroix and Georges-Pierre Seurat.
The principles articulated by Chevreul also apply to contemporary television and computer displays, which use tiny dots of red, green and blue (RGB) light to render colour, with each composite being called a pixel.
List of famous tapestries
The Trojan War tapestry referred to by Homer in Book III of the Iliad, where Iris disguises herself as Laodice and finds Helen "working at a great web of purple linen, on which she was embroidering the battles between Trojans and Achaeans, that Ares had made them fight for her sake." Though the composition of the Iliad spanned a period of approximately 700 years, it is worth noting that this method of weaving was in common use in or before the eighth century BC.
The Sampul tapestry, woollen wall hanging, 3rd–2nd century BC, Sampul, Ürümqi Xinjiang Museum.
The Hestia Tapestry, 6th century, Byzantine Egypt, Dumbarton Oaks Collection.
The Cloth of St Gereon – early 11th-century, the oldest European tapestry still extant.
The Överhogdal tapestries - Viking hangings of 1040 to 1170.
The Bayeux Tapestry is an embroidered cloth — not an actual tapestry — nearly 70 metres (230 ft) long, which depicts the events leading up to the Norman conquest of England, likely made in England — not Bayeux — in the 1070s
The Apocalypse Tapestry depicts scenes from the Book of Revelation. It was woven between 1373 and 1382. Originally 140 m (459 ft), the surviving 100m are displayed in the Château d'Angers, in Angers.
The six-part piece La Dame à la Licorne (The Lady and the Unicorn), stored in l'Hôtel de Cluny, Paris.
The Devonshire Hunting Tapestries, four Flemish tapestries dating from the mid-fifteenth century depict men and women in fashionable dress of the early fifteenth century hunting in a forest. The tapestries formerly belonged to the Duke of Devonshire and are now in the Victoria and Albert Museum.
The Justice of Trajan and Herkinbald, a tapestry dating from about 1450.
The Triumph of Fame, a tapestry made in Flanders in the 1500s.
The Hunt of the Unicorn is a seven piece tapestry from 1495 to 1505, currently displayed at The Cloisters, Metropolitan Museum of Art in New York.
Les Chasses de Maximilien (The Hunts of Maximilian) is a series of twelve tapestries woven in Brussels after the designs of Bernard van Orley.
The Life and Miracles of St Adelphus, an early 16th-century cycle of tapestries (four surviving parts), total length , in the Église Saint-Pierre-et-Saint-Paul, Neuwiller-lès-Saverne.
The tapestries for the Sistine Chapel, designed by Raphael in 1515–16, for which the Raphael Cartoons, or painted designs, also survive.
The Jagiellonian tapestries, (mid 16th century) a collection of 134 tapestries at the Wawel Castle in Kraków, Poland displaying various religious, natural, and royal themes. These famous tapestries, created in Arras, were collected by Polish Kings Sigismund I the Old and Sigismund II Augustus, whose reigns were between 1506 and 1572.
The Valois Tapestries are a cycle of 8 hangings depicting royal festivities in France in the 1560s and 1570s
The History of Constantine, a series of tapestries designed by Peter Paul Rubens and Italian artist Pietro da Cortona in 1622.
The Death of Polydorus, one of a set of seven tapestries showing a scene from the Iliad by Homer.
The biggest collection of Flanders tapestry is in the Spanish royal collection, there is 8000 metres of historical tapestry from Flanders, as well as Spanish tapestries designed by Goya and others. There is a special museum in the Royal Palace of La Granja de San Ildefonso, and others are displayed in various historic buildings.
The Pastoral Amusements, also known as "Les Amusements champêtres", a series of 8 Beauvais Tapestries designed by Jean-Baptiste Oudry between 1720 and 1730.
The Prestonpans Tapestry is a 104 metres long embroidery which tells the story of Bonnie Prince Charlie and the Battle of Prestonpans.
Le Bouquet (1951) by Marc Saint-Saens is among the best and most representative French tapestries of the fifties. It is a tribute to Saint-Saens's predilection for scenes from nature and rustic life.
Triumph of Peace (1953) by Peter Colfs. On display in the United Nations Headquarters, Delegates' lobby of the General Assembly, it was at the time of production with 43.5 x 28.5 feet (13.3 m x 8.7 m) the largest mural tapestry in the world.
Christ in Glory, (1962) for Coventry Cathedral designed by Graham Sutherland. Up until the 1990s this was the world's largest vertical tapestry.
The World Trade Center Tapestry, a large 1973 tapestry by Joan Miró and Josep Royo.
The Quaker Tapestry (1981–1989) is a modern set of embroidery panels that tell the story of Quakerism from the 17th century to the present day.
The New World Tapestry is a 267 feet long embroidery, begun in the 1980s, which depicts the colonisation of the Americas between 1583 and 1648, which was displayed at the British Empire and Commonwealth Museum, now defunct.
The Great Tapestry of Scotland is a modern series of embroidered cloths, made up of 160 hand stitched panels, depicting aspects of the history of Scotland from 8500 BC until 2013. At 143 metres (469 ft) long, it is the longest tapestry in the world.
Notes
References
Campbell, Thomas P. and Ainsworth, Maryan Wynn, Tapestry in the Renaissance: Art and Magnificence, 2002, Metropolitan Museum of Art, , fully online
Campbell (2007): Campbell, Thomas P., Henry VIII and the Art of Majesty: Tapestries at the Tudor Court, 2007, Yale University Press, , google books
Campbell (2008): Campbell, Thomas P. “How Medieval and Renaissance Tapestries Were Made.” 2008, Heilbrunn Timeline of Art History. New York: The Metropolitan Museum of Art, online
Embroidery and Tapestry Weaving, by Grace Christie, 1912, from Project Gutenberg. Technical handbook.
Olson, Rebecca. Arras Hanging: The Textile That Determined Early Modern Literature and Drama, University of Delaware Press, 2013,
Osborne, Harold (ed), "Tapestry", in The Oxford Companion to the Decorative Arts, 1975, OUP,
Pepper, Simon. "Battle pictures and military scenes" 2 (i), in Grove Art Online (restricted access, refs to sections), accessed March 22, 2011
Russell, Carol K. Tapestry Handbook. The Next Generation, Schiffer Publ. Ltd., Atglen, PA. 2007,
"Tapestries in the Royal Collection", Royal Collection
"V&A": "What is tapestry?", Victoria and Albert Museum
Further reading
Thomas P Campbell, Tapestry in the Baroque: Threads of Splendor, 2007, Metropolitan Museum of Art
Bremer–David, Clarissa, Woven Gold - Tapestries of Louis XIV, 2016, Getty Publications / Yale
Souchal, Geneviève, Masterpieces of tapestry from the fourteenth to the sixteenth century, 1974, Metropolitan Museum of Art
External links
The West Dean College, Tapestry Studio
Weaving
|
380180
|
https://en.wikipedia.org/wiki/Load%20testing
|
Load testing
|
Load testing is the process of putting demand on a system and measuring its response.
Software load testing
The term load testing is used in different ways in the professional software testing community. Load testing generally refers to the practice of modeling the expected usage of a software program by simulating multiple users accessing the program concurrently. As such, this testing is most relevant for multi-user systems; often one built using a client/server model, such as web servers. However, other types of software systems can also be load tested. For example, a word processor or graphics editor can be forced to read an extremely large document; or a financial package can be forced to generate a report based on several years' worth of data. The most accurate load testing simulates actual use, as opposed to testing using theoretical or analytical modeling.
Load testing lets you measure your website's quality of service (QOS) performance based on actual customer behavior. Nearly all the load testing tools and frameworks follow the classical load testing paradigm: when customers visit your website, a script recorder records the communication and then creates related interaction scripts. A load generator tries to replay the recorded scripts, which could possibly be modified with different test parameters before replay. In the replay procedure, both the hardware and software statistics will be monitored and collected by the conductor, these statistics include the CPU, memory, disk IO of the physical servers and the response time, the throughput of the system under test (SUT), etc. And at last, all these statistics will be analyzed and a load testing report will be generated.
Load and performance testing analyzes software intended for a multi-user audience by subjecting the software to different numbers of virtual and live users while monitoring performance measurements under these different loads. Load and performance testing is usually conducted in a test environment identical to the production environment before the software system is permitted to go live.
As an example, a website with shopping cart capability is required to support 100 concurrent users broken out into the following activities:
25 virtual users (VUsers) log in, browse through items and then log off
25 VUsers log in, add items to their shopping cart, check out and then log off
25 VUsers log in, return items previously purchased and then log off
25 VUsers just log in without any subsequent activity
A test analyst can use various load testing tools to create these VUsers and their activities. Once the test has started and reached a steady-state, the application is being tested at the 100 VUser loads as described above. The application's performance can then be monitored and captured.
The specifics of a load test plan or script will generally vary across organizations. For example, in the bulleted list above, the first item could represent 25 VUsers browsing unique items, random items, or a selected set of items depending upon the test plan or script developed. However, all load test plans attempt to simulate system performance across a range of anticipated peak workflows and volumes. The criteria for passing or failing a load test (pass/fail criteria) are generally different across organizations as well. There are no standards specifying acceptable load testing performance metrics.
A common misconception is that load testing software provides record and playback capabilities like regression testing tools. Load testing tools analyze the entire OSI protocol stack whereas most regression testing tools focus on GUI performance. For example, a regression testing tool will record and playback a mouse click on a button on a web browser, but a load testing tool will send out hypertext the web browser sends after the user clicks the button. In a multiple-user environment, load testing tools can send out hypertext for multiple users with each user having a unique login ID, password, etc.
The popular load testing tools available also provide insight into the causes for slow performance. There are numerous possible causes for slow system performance, including, but not limited to, the following:
Application server(s) or software
Database server(s)
Network – latency, congestion, etc.
Client-side processing
Load balancing between multiple servers
Load testing is especially important if the application, system, or service will be subject to a service level agreement or SLA.
Load testing is performed to determine a system's behavior under both normal and anticipated peak load conditions. It helps to identify the maximum operating capacity of an application as well as any bottlenecks and determine which element is causing degradation. When the load placed on the system is raised beyond normal usage patterns to test the system's response at unusually high or peak loads, it is known as stress testing. The load is usually so great that error conditions are the expected result, but there is no clear boundary when an activity ceases to be a load test and becomes a stress test.
The term "load testing" is often used synonymously with concurrency testing, software performance testing, reliability testing, and volume testing for specific scenarios. All of these are types of non-functional testing that are not part of functionality testing used to validate suitability for use of any given software.
User experience under load test
In the example above, while the device under test (DUT) is under production load - 100 VUsers, run the target application. The performance of the target application here would be the User Experience Under Load. It describes how fast or slow the DUT responds, and how satisfied or how the user actually perceives performance.
Browser-level vs. protocol-level users
Historically, all load testing was performed with automated API tests that simulated traffic through concurrent interactions at the protocol layer (often called protocol level users or PLUs). With the advance of containers and cloud infrastructure, the option is now present to test with real browsers (often called browser level users or BLUs). Each approach has its merits for different types of applications, but generally, browser-level users will be more akin to the real traffic that a website will experience and provide a more realistic load profile and response time measurement. BLUs are certainly a more expensive way of running tests and cannot work with all types of applications, specifically those that are not accessible through a web browser like a desktop client or API-based application.
Load testing tools
Physical load testing
Many types of machinery, engines, structures, and motors are load tested. The load may be at a designated safe working load (SWL), full load, or at an aggravated level of load. The governing contract, technical specification or test method contains the details of conducting the test. The purpose of a mechanical load test is to verify that all the component parts of a structure including materials, base-fixings are fit for task and loading it is designed for.
Several types of load testing are employed
Static testing is when a designated constant load is applied for a specified time.
Dynamic testing is when a variable or moving load is applied.
Cyclical testing consists of repeated loading and unloading for specified cycles, durations and conditions.
The Supply of Machinery (Safety) Regulation 1992 UK state that load testing is undertaken before the equipment is put into service for the first time. Performance testing applies a safe working load (SWL), or other specified load, for a designated time in a governing test method, specification, or contract. Under the Lifting Operations and Lifting Equipment Regulations 1998 UK load testing after the initial test is required if a major component is replaced, if the item is moved from one location to another or as dictated by the competent person.
Car charging system
A load test can be used to evaluate the health of a car's battery. The tester consists of a large resistor that has a resistance similar to a car's starter motor and a meter to read the battery's output voltage both in the unloaded and loaded state. When the tester is used, the battery's open circuit voltage is checked first. If the open circuit voltage is below spec (12.6 volts for a fully charged battery), the battery is charged first. After reading the battery's open circuit voltage, the load is applied. When applied, it draws approximately the same current the car's starter motor would draw during cranking. Based on the specified cold cranking amperes of the battery, if the voltage under load falls below a certain point, the battery is bad. Load tests are also used on running cars to check the output of the car's alternator.
See also
Internet Application Management
Soak testing
Stress testing
System testing
Web testing
Web server benchmarking
References
External links
Modeling the Real World for Load Testing Web Sites by Steven Splaine
What is Load Testing? by Tom Huston
4 Types of Load Testing and when each should be used by David Buch
Performance, Load, Stress or Endurance Test? Which do you want? by Chris Jones
Software testing
Quality assurance
Load testing tools
Tests
|
24453337
|
https://en.wikipedia.org/wiki/Ancestral%20Quest
|
Ancestral Quest
|
Ancestral Quest is a genealogy software application for Microsoft Windows developed by Incline Software, LC. It features data entry with sourcing capabilities and scrapbook extensions; a print engine for standard or custom charts and reports; a web page creator; a collaboration engine; and an extension tool for other genealogy databases.
Ancestral Quest was the first desktop genealogy software program to be certified to access, update, and synchronize with newer versions of FamilySearch.
Languages
Developed in English, Ancestral Quest allows for translation to other languages using language modules. These user-created files allow Ancestral Quest screens and reports to be translated or customized. A user can create his or her own language module, or leverage the module of someone else. The Danish, French, German, Norwegian, and Spanish language modules are completely translated, and the Chinese, Finnish, and Swedish language modules currently have all basic screens and reports translated.
Features
Creates a family tree, documenting sources and adding scrapbook items
Researches the Internet with search engine interfaces
Prints standard and custom charts, reports or books
Creates web pages
Imports and exports GEDCOM files
Extends the use of other databases, such as Personal Ancestral File or FamilySearch
Can be used on a flash drive
Collaborate with other researchers, using a single master database
Can convert Personal Ancestral File (PAF) files
History
Version history
Ancestral Quest 1.0: 1994
Ancestral Quest 1.1: 1995
Ancestral Quest 2.0: 1996
Ancestral Quest 2.1: 1997
Ancestral Quest 3.0: 1999
Ancestral Quest 10.0: 2002 - collaboration, research manager, global find/replace, PAF5.x support, fan charts, enhanced reporting
Ancestral Quest 11.0: 2003 - memorize source citations, detailed change log, print to PDF, drop line charts, online IGI lookups
Ancestral Quest 12.0: 2007 - individual summary screen, language translation, UNICODE
Ancestral Quest 12.1: 2008 - link and sync with new FamilySearch, flash drive support
Ancestral Quest 12.1: 2010 - Build 23 - Switched to FamilyTree API Version 2 for nFS, display age at marriage/death on family view, added ghost lines between children on family view, minor bug fixes
Ancestral Quest 12.1: 2010 - Build 26 - Allows use of external viewer for photos, Improved Check/Repair, Assorted Bug Fixes
Ancestral Quest 14.0: 2012 - Research Timeline, Color Coding, Tags, improvements to fan charts, FamilySearch Family Tree, LDS features
Ancestral Quest 14.0: 2015 - Mac Version available 19 August 2015
Ancestral Quest 15.0: 2016
Ancestral Quest 16.0: 2019
AQ technology in other products
In 1998, AQ was licensed for resale through Individual Software, and has been sold by them under the names of "Family Ties", "Family Trees Quick & Easy", "Heritage Family Tree Deluxe", and "Family Tree Heritage". In 1999, the AQ code was licensed to the LDS Church and became the base of the Windows versions of Personal Ancestral File. Millions of copies of PAF have been distributed. In 2001, the AQ code was licensed to Ancestry.com, and became the base of Ancestry Family Tree. Nearly a million copies of AFT were distributed.
Company history
In 1998, Incline Software merged with The Hope Foundation. In 2001, this merger ended
and Incline Software again became the custodian of AQ.
References
External links
AncestralQuest, Yahoo! Group
Windows-only genealogy software
|
41181813
|
https://en.wikipedia.org/wiki/Xbox%20system%20software
|
Xbox system software
|
The Xbox system software is the operating system developed exclusively for the Xbox consoles. Across the four generations of Xbox consoles, the software has been based on a version of Microsoft Windows and incorporating DirectX features optimized for the gaming console. The user interface, the Xbox Dashboard, provides access to games, media players, and applications, and integrates with Xbox Live for online functionality.
Though initial iterations of the software for the original Xbox and Xbox 360 were based on heavily modified versions of Windows, the newer consoles feature operating systems that are highly compatible with Microsoft's desktop operating systems, allowing for shared applications and ease-of-development between personal computers and the Xbox line.
Common features
Across all four generations of the Xbox platform, the user interface of the system software has been called the Xbox Dashboard. While its appearance and detailed functions have varied between console generations, the Dashboard has provided the user the means to start a game from the optical media loaded into the console or off the console's storage, launch audio and video players to play optical media discs, or start special applications for the Xbox such as streaming media services from third parties. The Dashboard also provides a menu of settings and configuration pages for the console that the user can adjust.
The Dashboard has supported integration with the Xbox Live service since November 2002. Xbox Live provides online functionality to the Xbox, including friends list, game achievement tracking, matchmaking support for online games, in-game communications, and a digital game storefront. While some portions of the Xbox Live service are free, a subscription-tier Xbox Live Gold is generally required to play most multiplayer games on the console.
Starting with the Xbox 360 and continuing through its current consoles, Microsoft has offered a means for users to opt into a beta test version of the console's system software. When first launched for the Xbox 360 in September 2010, this was called the Xbox Live Preview Program, and initially required an invitation from Microsoft after applying for the program. On the release of the Xbox One in 2014, the program was renamed to Xbox Preview Program, and Microsoft made this program open to all rather than restricting through invitation. Later in November 2016 rebranded to the Xbox Insider Program, corresponding to the similar Windows Insider program for those testing its computer operating system. With the Xbox Insider Program, testing not only included updates to the system software but upcoming game and application patches from both first and third-parties.
Each iteration of the Xbox software has brought some form of backward compatibility to the newer console. On the Xbox 360, selected original Xbox console games could be played through emulation after downloading an emulation profiles to local storage. The Xbox One was not initially shipped with backward compatibility support, but was later added by January 2015 by another emulator to support selected Xbox 360 games, with hundreds of titles added over the following years. A similar emulator was developed and released in October 2017 for the Xbox One for a limited selection of original Xbox console games. Achieving Xbox One-backward compatibility on the Xbox Series X and Series S was a target goal for the newer consoles, and as such, these new consoles are fully backward compatible with all games in the Xbox One library with the exception of those requiring Kinect support. The supported list includes the Xbox and Xbox 360 games that were playable via emulation on the Xbox One.
Xbox (first generation) software
The original Xbox runs a custom operating system which is based on a heavily modified version of Windows 2000, an approach that Microsoft engineer Don Box called "fork and run". It exports APIs similar to those found in Microsoft Windows, such as Direct3D. While Windows 2000 was built for multitasking of multiple applications including memory paging, the Xbox console was planned to only run one application at a time, and these features were removed for the Xbox software. When loading a game, the operating system would unload itself to give all of the console's resources to the game, and then when the player left the game, the operating system would load back up again.
Xbox Live support was not originally part of the system software as shipped in 2001, but added later in November 2002. While the Xbox was still being supported by Microsoft, the Xbox Dashboard was updated via Live several times to reduce cheating and add features.
Microsoft released a dynamic background for its current Xbox One and Xbox Series X/S system software in May 2021 that is based on the original Xbox system software appearance.
The original Xbox operating system source code was leaked in 2020.
Xbox 360 software
The Xbox 360 system software was also a modified version of Windows 2000, expanding beyond the original Xbox console's operating system. This would prove troublesome for Microsoft from multiple directions. For the Xbox division, it made it difficult to bring in other Microsoft applications like Internet Explorer and Silverlight which had to be modified to work on the Xbox software. For Microsoft, the separate fork of these apps for the Xbox 360 and for the versions they were developing for the mobile-based Windows CE environment became difficult to maintain. These complexities led Microsoft towards its "Windows Everywhere" approach around 2010, reviewing all the dependencies within the desktop, Xbox, and mobile versions of Windows atop the MinWin process and creating a CoreSystem that contained the basic functionality of Windows that could be ported to other systems.
User interface
Microsoft released the Xbox 360 console on November 22, 2005, a whole year earlier than both the Sony PlayStation 3 and Nintendo Wii. Having the advantage of the lead, Microsoft was able to experiment with various customization options for the consumer's individual consoles. The ability to customize the way the console looked with various themes to fit the front and sides of it was something very different for home console users. In system, the Xbox 360 Dashboard had the ability to have multiple profiles with password on the same console with each user being able to customize the dashboard to exactly fit their own unique style. There were premium themes available for purchase on the Xbox Live Marketplace apart from the default styles. Originally there were five tabs or sections known as the "blades" for the Xbox 360 menu, namely the Marketplace, Xbox Live, Games, Media and System. In scrolling from left to right, each section would have a different-colored background signifying its own unique area but users also had the option to change all sections to one background color as well.
In 2008 however, when the gaming scene changed dramatically because of the competitions with the PlayStation 3 and the Wii, a new Xbox Dashboard titled the New Xbox Experience (NXE) was launched, which features major changes in both the user interface and other functionalities. The new user interface had a navigation system similar to that of Windows Media Center. It contained a New pop-up/in-game Live Guide, using a redesigned version of the "blades" interface, a tabbed interface that featured five "blades". Also, users were able to create personalized Avatars, essentially mini characters of themselves. Furthermore, selecting an avatar is now required by the Xbox Live service. A slightly modified version of NXE was released in 2010 alongside the Kinect as to provide support for motion-sensing controls of the Dashboard.
A full reworking of the interface was released in late 2011 based on the Metro design inspired by Windows Phone. The many enhancements that were included with this update pushed the system to a more modernized interface and improved features that pushed the envelope for social gaming and media.
Multimedia features
While the Xbox 360 console is primarily designed to play games just like other video game consoles, it can be used as a media player too. Similar to the PlayStation 3 from Sony, Xbox 360 has media center capabilities built in, so it is relatively easy to set up. With the Xbox 360 users can also copy videos directly to the hard drive, or play via a USB stick. There are two ways to watch videos on Xbox 360. The first is to download videos from the Xbox Live Marketplace. Some of these videos are available for free while others have to be paid. Microsoft is in control of what videos are available through the Xbox Live Marketplace. The second is to stream videos from a Windows Media Center PC by using Xbox 360 as a Media Center Extender. In this way users are in control of what videos they want to watch, however there are restrictions on what kind of video they can play back. More specifically, it only supports playback of DVR-MS, MPEG-1, MPEG-2 and WMV videos. Every Xbox 360 can play DVD movies out of the box using the built-in DVD drive, with no additional parts necessary, although the user may control everything with an optional remote. There are other improvements to the experience on the Xbox 360 over the original Xbox too, including the ability to upscale the image so it will look better. Progressive scan is another feature of the DVD output in the Xbox 360 that produces smoother output when playing movies on televisions that support high definition, although using a dedicated DVD player would offer even more features and sound quality.
Updates
The first version of the Xbox 360 system software was 2.0.1888.0, released on November 22, 2005, as shipped in the original Xbox 360 consoles, although the version numbered "2.0" was available at product launch. Over the course of next a few years saw the continuous updates of the system software.
While early updates such as version 2.0.4532.0 released on October 31, 2006 added support for 1080p video output and the external HD DVD drive attachment, version 2.0.7357.0 released on November 19, 2008 was the first major upgrade of the system software, titled the New Xbox Experience that had added many new features, including a completely redesigned GUI. It included changes in the menu system, featuring a more 3-dimensional visual style with more options and sections, new sound effects (menus only, notification sounds remain the same), support for 1440×900 and 1680×1050 16:10 resolutions (letter-boxed) over VGA, HDMI and when using DVI, as well as the abilities to preview themes before setting them, to disable notifications (new messages, chat requests, etc.) or mute the notification sound, and to change to QWERTY keyboard in place of alphabetical keyboard.
Subsequent system software updates continued to add new features or make other changes, including bug fixes. An example of the new features introduced in version 2.0.8498.0 released on August 11, 2009 was the addition of Display Discovery to allow console to override factory settings for HDTV resolutions and refresh rates as well as discovering the best possible resolution and refresh rates that the HDTV is capable of displaying (Selected HDTVs).
Version 2.0.12611.0, released on November 1, 2010, three days before the release of the Kinect, also added features such as the ability to install game updates to the HDD (select games only) and a visual refresh to incorporate elements of Microsoft's Metro design style. It also featured a new boot screen animation with redesigned Xbox 360 orb and ribbons. New anti-piracy 2.5 scheme to newly released games was also added in this version, later updated to anti-piracy 2.6 in the version 2.0.13599.0 released on July 19, 2011.
Version 2.0.14699.0 released on December 6, 2011 introduced a redesigned interface.
The releases after the version 2.0.16197.0 released October 16, 2012 were minor, consisting of bug fixes, or as a mandatory updates preparing for subsequent growth of the service.
On June 15, 2020, the dashboard advertisements were removed via a server-side update.
Xbox One and Xbox Series X/S software
System
The Xbox One console system software contains a heavily modified Hyper-V hypervisor (known as NanoVisor) as its host OS and two partitions. One of the partitions, the "Exclusive" partition is a custom virtual machine (VM) for games; the other partition, the "Shared" partition is a custom VM for running multiple apps including the OS.
As part of its ongoing "Windows Everywhere" approach, Microsoft revamped the operating system in the Xbox One to be closer to its current Microsoft Windows products as to provide greater compatibility between personal computers and the Xbox line. The OS was based on Windows 8 Core at the Xbox One launch in 2013. The UI maintained the same "Metro" design that had been used in the last Xbox 360 update, and which resembled the desktop Windows 8 interface.
In November 2015, Microsoft released the "New Xbox One Experience" which replaced the base system with Windows 10 Core, allowing Universal Windows Platform apps to be available on Xbox One. According to the current head of Microsoft's Gaming division, Phil Spencer, "The importance of entertainment and games to the Windows ecosystem has become really prevalent to the company". The program that Microsoft launched allows developers to build a single app that can run on a wide variety of devices, including personal computers and Xbox One video game consoles. According to Polygon, Microsoft removed the distinction between Xbox One and Windows PC, and the software has been called "Windows 10 on Xbox One".
Since 2016, all Xbox One consoles could be updated to include a development kit for universal Windows applications on Xbox One, with official support for the platform and Cortana coming in summer 2016.
As Microsoft continued to refine Windows 10 with the Fluent Design System, the Xbox One interface was also modified to reflect these changes by 2017. Microsoft has since continued to refine this interface to add and remove integrated features, such as inclusion of Xbox Game Pass support and removal of Cortana voice commands. Ahead of the release of the Xbox Series X and Series S consoles in November 2020, Microsoft updated the Xbox One software to reflect changes in the Dashboard that would also be present in the newer consoles. This included improved performance in some of the storefront features and readability improvements to the interface, which were also propagated across Xbox Game Pass and mobile apps.
User interface
The system software's interface uses a geometrical placement of squares and rectangular items that scrolls as a continuous vertical line, using the Metro design language that is also seen in Windows 8, Windows 10, and other Microsoft products. By default, the dashboard is divided into "Home", "Community", "Mixer", "Game Pass" and "Store" sections; the "Home" section contains a recent apps and games list. The "Community" section allows users to view their friends' in-game activities and captures, post status updates, as well as view trending content. The "Mixer" section shows an overview on streams on Microsoft's own Mixer service, while the "Store" section serves as a portal to the games, video, music, and app marketplaces. In general, the top level menu of the Xbox One feels a lot less cluttered than the Xbox 360's dashboard. For example, the friends tab has been removed and replaced with a dedicated app that users can load up to see what their connections are doing. There are a couple of columns for settings options and an area for "pinned" favorites, a "main" screen showing current and recent apps and games that the user played or used, and a small "What's New" section highlighting some recently added content. In total, the interface is very clean and sparse. Microsoft also introduced a new way to multitask called Snap, which allows Xbox One users to open multiple panes in a single window.
When Microsoft upgraded the Windows 8-based Core to a Windows 10-based one, they made a tour of the new user interface up on Xbox Wire, promising faster, easier navigation, improved community features and, the return of Xbox Avatars. The main feature on the home screen is a list of the most recently played games. Selecting any given title will give users more information about announcements, achievements, social activity and so forth. It is also more focused on the actual games they are playing, which is part and parcel of the company's new direction under Phil Spencer, the current head of Microsoft's Xbox division.
Multimedia features
While like other video game consoles the Xbox One is primarily designed for playing games, it is more than a game console. It is an entertainment hub for games, television, music, and videos. Mainly the console focuses on functionality and entertainment as a whole. At Gamescom 2014 Microsoft unveiled a new plan to remedy this and make earnest on the Xbox One's label as the "all-in-one entertainment" solution by way of expanding its media support. The Xbox One's media player is quite similar to the Xbox 360's playback suite in terms of form and function, however the newer console now supports more than 30 formats including the MKV container and GIF files. The Xbox One console also does some unique things. For example, its owners can control their television broadcasts using the device, as well as use it as a functioning DVR. Apart from streaming music and videos via Play (Charms > Devices > Play), there is also a networked approach. There are two primary ways to do this. The first is to stream media from a computer or tablet, and the second is to play it directly off of a USB flash drive. The advantage of this method over the Play system is that users can do it all from wherever they sit via the Xbox One, instead of sending the video from a PC to their console. Aside from multimedia files, Xbox One plays CDs, DVDs and Blu-ray Discs, and it also comes with DLNA and MKV support, which means that downloaded video files can be streamed via the PC or transported via external hard drive and USBs. Meanwhile, the interactive TV Guide allows users to turn on and control a television with their voice. Furthermore, the system comes with a comprehensive range of applications related to multimedia features. In the United States, video channels include Amazon Instant Video, Crackle, Hulu Plus and Netflix. Microsoft announced that the Xbox One was awarded for its multimedia capabilities at the 66th Annual Technology & Engineering Emmy Awards in early 2015, and the prize was given for the Xbox One's television-on-demand functions.
Updates
Microsoft aims to release frequent updates to the Xbox One console, mainly containing new or improved features and faster installation and loading times for games and apps. Along with introducing improvements and fixes for native console apps and software, the monthly updates to the Xbox One system software introduce major features that are voted on or requested by the community, though some months have included more than one update. Starting in February 2014, beta releases of updates are tested before going live to check for unwanted bugs and stability.
The following table lists major updates to the Xbox One and Xbox Series X/S system software.
References
External links
What’s new: Xbox system updates
Xbox Consoles
Game console operating systems
Software version histories
Software
Windows 10
Xbox One software
Proprietary operating systems
|
36109560
|
https://en.wikipedia.org/wiki/IOS%206
|
IOS 6
|
iOS 6 is the sixth major release of the iOS mobile operating system developed by Apple Inc, being the successor to iOS 5. It was announced at the company's Worldwide Developers Conference on June 11, 2012, and was released on September 19, 2012. It was succeeded by iOS 7 on September 18, 2013.
iOS 6 added a new Apple Maps app, replacing Google Maps as the default mapping service for the operating system; a dedicated Podcasts app, as a central location for podcasts; and a Passbook app, for managing different types of tickets, boarding passes, coupons, and loyalty cards. The App Store received a visual overhaul, bringing a card-based app layout as well as tweaks to search algorithms. Facebook was integrated into the operating system, incorporating status messages, like buttons, and contact and event synchronization to several of Apple's apps. New privacy controls allow users more fine-grained app permissions, as well as an option to prevent targeted advertising. Siri was added to more devices, and updated with more functionality, including the ability to make restaurant reservations, launch apps, retrieve movie reviews and sports statistics, and read items from the Notification Center.
Reception of iOS 6 was positive. Critics noted that the operating system did not offer any significant speed improvements or major redesigned elements, but instead focused on refinements, with a general consensus that Apple "isn't overhauling things for the sake of it." iOS 6 didn't "completely change the way you use your device," but "each of the tweaks will make many daily smartphone actions easier across the board," and critics noted that refinement of "something that already works extremely well" is "something other companies would do well to emulate."
The release of Apple Maps, however, attracted significant criticism, due to inaccurate or incomplete data. The issues prompted an open letter of apology from Apple CEO Tim Cook, and played a contributing role in the dismissal of Scott Forstall from the company, who had supervised iOS development since its inception.
History
iOS 6 was introduced at the Apple Worldwide Developers Conference on June 11, 2012.
iOS 6 was officially released on September 19, 2012.
Updates
System features
Siri
Apple's Siri intelligent personal assistant, introduced in iOS 5 with the release of the iPhone 4S, was updated to include the ability to make restaurant reservations, launch apps, read items from Notification Center, dictate Facebook and Twitter updates, retrieve movie reviews, detailed sports statistics, and more.
Siri received language support for Italian, Korean, and Cantonese, and device support for iPhone 5, fifth-generation iPod Touch, and third-generation iPad.
In iOS 6.1, Siri was integrated with Fandango, allowing users to buy film tickets by voice. The feature was only available in the United States at launch.
Facebook integration
Facebook came integrated in several of Apple's native apps with iOS 6. Facebook features could be directly accessed from within native apps such as Calendar, which could synchronize Facebook events; Contacts, which could show Facebook friend information, and the App Store and Game Center, which featured Facebook's like button; as well as through a widget in the Notification Center, which allowed users to post status updates to the social network.
Settings
The Settings app received multiple changes in iOS 6. The icon was revised to match the System Preferences icon used in the then-named OS X computer operating system developed by Apple; and a "Do Not Disturb" mode was added, which allows users to disable phone sounds. Additional options for Do Not Disturb mode include being able to allow phone calls from a specific group of contacts, and allowing sound on the second call if someone calls repeatedly. A crescent moon icon will appear in the status bar when Do Not Disturb mode is enabled.
New privacy settings became available to users. In addition to "Location Services," the following menus were added in iOS 6: "Contacts," "Calendars," "Reminders," and "Photos." The updated privacy menus allow users more fine-grained privacy permission controls for each app, with new notifications when apps want access to information in each of the categories.
iOS 6 also came with a "Limit ad tracking" user control setting to allow users the option to prevent targeted advertising. Apple's "Advertising Identifier" was described by Apple as "a nonpermanent, nonpersonal, device identifier, that advertising networks will use to give you more control over advertisers' ability to use tracking methods. If you choose to limit ad tracking, advertising networks using the Advertising Identifier may no longer gather information to serve you targeted ads."
In iOS 6.1, a "Reset Advertising Identifier" setting was added to allow users to reset the identifier used by advertising companies.
Other
iOS 6 added a Twitter widget in the Notification Center, where users could tweet without going into the app. This saved resources.
The Share Sheet interface was updated to display a grid of icons, as opposed to a list, of different apps to which users could share content.
App features
Maps
A new Apple Maps app replaced Google Maps as the default mapping app on the operating system. Apple Maps used Apple's vector-based engine, making for smoother zooming. New to Maps was turn-by-turn navigation with spoken directions and 3D views in certain countries, "Flyover" views in some major cities, and real-time traffic.
At launch, turn-by-turn navigation was only available for iPhone 4S and later, and iPad 2 (cellular capability required) and later, while "Flyover" view was only available for iPhone 4S and later, fifth-generation iPod Touch, and iPad 2 and later.
Passbook
A new Passbook app was added, to retrieve documents such as boarding passes, admission tickets, coupons and loyalty cards.
An iOS device with Passbook can replace a physical card when scanned to process a mobile payment at participating locations. The app has context-aware features such as notifications for relevant coupons when in the immediate vicinity of a given store, and automatic visibility of boarding passes when the user is at an airport, with notifications for gate changes.
Photos and Camera
The Camera app was updated to include a new Panorama mode that allowed users to take 240-degree panoramic photos.
The Photos app received updates to the Photo Stream functionality, letting users remove images, as well as share custom Photo Streams with other people or the public.
App Store
The App Store on iOS 6 had a brand new user interface that removed the "Categories" tab and replaced it with "Genius," Apple's search and recommendation engine. It also made use of cards rather than lists to present apps. There were also tweaks to the App Store's search algorithm, resulting in a "trend to favor newer companies," which sparked both developer concerns and praise.
The App Store also updated apps without requiring the iTunes password, and when installing or updating an app, users were no longer automatically returned to the home screen.
Phone
Upon receiving calls, iOS 6 enabled users to swipe up the lock screen to reveal "Reply with message" or "Remind me later." The "Reply with message" feature shows several pre-determined messages with an option for a custom message, while the "Remind me later" feature offers several options (such as an hour later, when the user gets home, or when the user leaves the current location) to enable a reminder.
Podcasts
Podcast functionality was separated from the iTunes app and received its own Podcasts app in iOS 6, in order to "centralize and promote podcast listening and downloading for users."
Safari
The Safari web browser was updated with a full-screen landscape view for iPhone and iPod Touch users.
Reading List, a feature introduced in iOS 5, received offline support, in which text, images, and layout from saved articles get stored on the user's device.
FaceTime
FaceTime video calling was updated to work over a cellular connection, in addition to Wi-Fi.
Clock
The Clock app, which had been on iPhone and iPod Touch since their original release, became available on iPad. The clock design looked similar to a Swiss railway clock, and Apple formed an agreement with the Swiss Federal Railways to license the design for its own use.
Removed functionality
The YouTube app, which had been a default app on iOS developed by Apple, was removed. Apple told The Verge that the reason for the removal was due to an expired license, but that YouTube users could still view videos through the Safari web browser. The company also confirmed that Google, which owns YouTube, was developing its own app, with a then-upcoming release through App Store. The Apple-developed YouTube app remained on iOS 5 and previous iOS versions. In June 2017, former YouTube employee Hunter Walk tweeted that Apple contacted YouTube to make it a default app on the original iPhone to ensure mass market mobile launch for the video-sharing service, but required handling development efforts itself. In 2012, YouTube made the "gutsy move" to discontinue the license in an effort to "take back control of our app" by developing it themselves.
Reception
The reception of iOS 6 was positive. Dan Seifert of The Verge wrote that "iOS 6 looks nearly identical to iOS 5. There are a few subtle tweaks here and there. But for every small change to the look of iOS details, there are ten things that remain the same." While praising the iPhone 4S for being a "snappy performer," he noted that "When it comes to speed, iOS 6 doesn't feel terribly different from iOS 5". Craig Grannell of TechRadar wrote that "iOS 6 is rather like the iPhone 5 or OS X Mountain Lion - the refinement of something that already works extremely well. Apple isn't overhauling things for the sake of it but, in the main, making the iOS experience gradually better. That in itself is something other companies would do well to emulate." Jason Parker of CNET wrote that "iOS 6 is a welcome upgrade for any iOS user, but it's not going to completely change the way you use your device. Instead, each of the tweaks here will make many daily smartphone actions easier across the board and offer some relief to those waiting for certain features (sending images from e-mail and call controls, for example)."
Problems
Maps app launch
In iOS 6, Apple replaced Google Maps with its own Apple Maps as the default mapping service for the operating system, and immediately faced criticism for inaccurate or incomplete data, including a museum in a river, missing towns, satellite images obscured by clouds, missing local places, and more.
Apple CEO Tim Cook issued a letter on Apple's website apologizing for the "frustration caused by the Maps application," and recommended downloading alternative map apps from the App Store. Scott Forstall, the then-VP of iOS software engineering, was involuntarily dismissed from his role at Apple in October 2012 after he "refused to sign his name to a letter apologizing for shortcomings in Apple's new mapping service."
Advertising Identifier privacy skepticism
In September 2012, Sarah Downey, a "privacy expert" with the software company Abine expressed her concern that in spite of the new "Advertising Identifier," Apple didn't disclose details on what the identifier was actually based on. She stated: "I need them to tell me why it's not identifying because as we've seen from a lot other "non-identifying" pieces of data, they can identify you quite easily," and that "If you're using the opt-out, [Apple] may no longer gather information to serve you targeted ads. To me, that says they may still collect your information to do things other than serve you targeted ads, like build databases about you to send you marketing or to sell to third parties."
Abnormal data usage
Many users reported a higher-than-normal data usage after upgrading to iOS 6, causing some to be heavily billed for data largely exceeding their data plan. Steve Rosenbaum of The Huffington Post wrote that "The bug is the result of an iOS 6 problem that connects the phone to the cellular data network whenever the phone is connected to a WiFi signal," and also stated that Apple had released a patch.
FaceTime certificate expiration
In April 2014, users who were still running iOS 6 could not connect to FaceTime due to the expiration of a certificate. Apple released a support document explaining the problem, adding that devices capable of upgrading to iOS 7 must do so to fix the issue, while devices stuck on iOS 6 would receive an iOS 6.1.6 update.
Supported devices
With this release, Apple dropped support for older devices, specifically the third-generation iPod Touch and the first-generation iPad.
iPhone
iPhone 3GS
iPhone 4
iPhone 4S
iPhone 5
iPod Touch
iPod Touch (4th generation)
iPod Touch (5th generation)
iPad
iPad 2
iPad (3rd generation)
iPad (4th generation)
iPad Mini (1st generation)
References
External links
2012 software
Tablet operating systems
|
82392
|
https://en.wikipedia.org/wiki/MetaComCo
|
MetaComCo
|
MetaComCo (MCC) was a computer systems software company started in 1981 and based in Bristol, England by Peter Mackeonis and Derek Budge. A division of Tenchstar, Ltd.
MetaComCo's first product was an MBASIC compatible interpreter for IBM PCs, which was licensed by Peter Mackeonis to Digital Research in 1982, and issued as the Digital Research Personal Basic, running under CP/M. Other computer languages followed, also licensed by Digital Research and MetaComCo established an office in Pacific Grove, California, to service their United States customers.
In 1984 Dr. Tim King joined the company, bringing with him a version of the operating system TRIPOS for the Motorola 68000 processor which he had previously worked on whilst a researcher at the University of Cambridge.
This operating system was used as the basis of AmigaDOS (file-related functions of AmigaOS); MetaComCo won the contract from Commodore because the original planned Amiga disk operating system called Commodore Amiga Operating System (CAOS) was behind schedule; timescales were incredibly tight and TRIPOS provided a head start for a replacement system.
MetaComCo also developed ABasiC for the Amiga, the first BASIC interpreter provided with Amigas. MetaComCo also worked with Atari Corporation to produce the BASIC initially provided with the Atari ST in 1985: ST BASIC.
The company also sold the Lattice C compiler for the Sinclair QL and the Atari ST and range of other languages (e.g. Pascal, BCPL) for m68k-based computers. MetaComCo also represented LISP and REDUCE software from the RAND Corporation.
Several of the team at MetaComCo went on to found Perihelion Software. Mackeonis founded Triangle Publishing, the software publishing company responsible for creating the ST Organizer for the Atari ST and PC Organizer and Counterpoint (a GUI system) for Amstrad Computers and GoldStar computers.
References
Finkel, Andy. "In the beginning was CAOS". Amiga Transactor. 1988.
Reimer, Jeremy. "A history of the Amiga", Ars Technica Oct 2007.
Peck, Robert. The ABasiC manual. 1985.
External links
Overview
History (German)
Atari ST
Amiga
Software companies of the United Kingdom
Companies established in 1981
|
8603119
|
https://en.wikipedia.org/wiki/Exanet
|
Exanet
|
Exanet, Ltd. was an Israeli software company that provided scalable network-attached storage software solutions to partners.
Exanet software was hardware independent. Their clustered NAS software storage solution provided single-file system scalability, and was compatible with Linux, Mac, and Windows operating systems. After the company went into temporary receivership, on February 19, 2010 Exanet's intellectual property was acquired by Dell.
History
Exanet was founded in 2000 by Giora Yaron and Yossi Ben-Shoshan, and raised $30 million in two rounds of venture capital funding.
In 2003, ExaStore started shipping its first products. In January 2006, Exanet joined the Intel Storage Community. In November 2006, Exanet introduced ExaStore-ICM, providing automated data storage and delivery services. In March 2008, Exanet introduced its "solution" products: ExaStore Clustered NAS system and ExaStore Clustered NAS Server.
Exanet was headquartered in Israel with offices in the USA, UK, Germany, France, Ukraine, and Japan. Investors included Eitan Wertheimer's Microdent Ltd., Evergreen Venture Partners, Coral Group, and LTG Development Capital.
On December 12, 2009, Exanet went into temporary receivership, after failing to secure an additional round of financing. The company had an estimated 80 employees.
Acquisition by Dell
In February 2010 the company IP was acquired by Dell Inc. for $12 million.
Dell continued development of the NAS capability, which was marketed as the Dell Fluid File System or FluidFS. This product comes as an appliance, where the controller running the software is a Dell PowerEdge server and the storage can be any of the three Dell storage product-lines: Dell PowerVault, EqualLogic or Compellent using iSCSI or Fibre Channel connections.
Products
Exanet was an OEM provider of enterprise storage software called ExaStore. ExaStore had the following components:
ExaStore software
Intel-based servers (nodes)
Standard Gigabit Ethernet or 10 Gigabit Ethernet networking components
Fibre Channel attached disk array storage
ExaSearch
ExaSearch is a search engine, which integrates with Exanet’s scalable, ExaStore, network attached storage (NAS) software, allowing customers to turn stored data into accessible information.
ExaSearch includes a search engine capable of searching multiple sources: file servers, email systems, groupware, databases and employee directories. It can process unstructured data and queries, and allows immediate access to newly generated content through real-time indexing. The product is designed to integrate with ExaStore software resulting in a clustered NAS solution combined with enterprise-class search capabilities.
References
External links
Exanet Ltd.
Software companies of Israel
Defunct companies of Israel
Defunct computer companies of Israel
Companies acquired by Dell
|
30521008
|
https://en.wikipedia.org/wiki/Arch%20Hurd
|
Arch Hurd
|
Arch Hurd is an operating system based on Arch Linux, but uses the GNU Hurd kernel instead of the Linux kernel.
The Arch Hurd project was founded on an Arch Linux forum thread in January 2010 and, after a few weeks with many contributions, progressed to the point where it could boot in a virtual machine. It aims to provide an Arch-like user environment (BSD-style init scripts, i686-optimised packages, use of the pacman package manager, rolling-release, and a KISS set up) on the Hurd which is stable enough for use.
, the official packages were last updated in May 2019.
Despite having a small development team, much progress has been made since its founding, such as booting on real hardware, packaging everything for a basic web server, and the production of an unofficial graphical LiveCD.
In June 2011, Arch Hurd announced successful integration of Device Driver Environment (DDE) — the framework for Linux drivers on Hurd, which improves the network hardware support in the distribution and makes it nearly usable.
See also
GNU Hurd
Arch Linux
Hurd variants
Debian GNU/Hurd
References
External links
Official Page (archived version)
Free software operating systems
Unix variants
Microkernel-based operating systems
Operating system distributions bootable from read-only media
|
62260656
|
https://en.wikipedia.org/wiki/TREAC
|
TREAC
|
TREAC or the TRE Automatic Computer was one of the first British computers, and in the world.
History
It was developed by the Telecommunications Research Establishment (TRE) in Worcestershire. The University of Manchester had been developing some of the first computers in the late 1940s and early 1950s. From 1947, the TRE in Worcestershire had been developing computers. The main part of the Manchester team had previously been at TRE. TRE had produced much of the electronics for the United Kingdom (for radar) during World War II, and came under the Ministry of Supply.
Development
TREAC was developed in the early 1950s. TREAC produced the first computer synthesised music. It ran its first computer program in 1953; from 1958 different sorts of computer programs could be written. All information was fed in and fed out on punched paper tape. TREAC was a parallel computer, the first in the UK.
Closure
TREAC was switched off in 1962, and replaced with the Royal Radar Establishment Automatic Computer (RREAC, the UK's first solid state computer).
See also
Hollerith Electronic Computer
SEAC (computer)
SWAC (computer)
References
1950s computers
Computer music
Computer-related introductions in 1953
Early British computers
Malvern, Worcestershire
Musical instruments invented in the 1950s
Science and technology in Worcestershire
Synthesizer electronics
|
22172878
|
https://en.wikipedia.org/wiki/Kaspersky%20Lab
|
Kaspersky Lab
|
Kaspersky Lab (; Russian: Лаборатория Касперского, tr. Laboratoriya Kasperskogo) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky, and Alexey De-Monderik; Eugene Kaspersky is currently the CEO. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.
Kaspersky expanded abroad from 2005 to 2010 and grew to $704 million in annual revenues by 2020, up 8% from 2016, though annual revenues were down 8% in North America due to U.S. government security concerns. As of 2016, the software has about 400 million users and has the largest market-share of cybersecurity software vendors in Europe. Kaspersky Lab ranks fourth in the global ranking of antivirus vendors by revenue. It was the first Russian company to be included into the rating of the world's leading software companies, called the Software Top 100 (79th on the list, as of 6/29/2012). Kaspersky Lab is ranked 4th in Endpoint Security segment according to IDC data for 2010. According to Gartner, Kaspersky Lab is currently the third largest vendor of consumer IT security software worldwide and the fifth largest vendor of Enterprise Endpoint Protection. In 2012 Kaspersky Lab was named a "Leader" in the Gartner Magic Quadrant for Endpoint Protection Platforms.
The Kaspersky Global Research and Analysis Team (GReAT) has led the discovery of sophisticated espionage platforms conducted by nations, such as Equation Group and the Stuxnet worm. Various covert government-sponsored cyber-espionage efforts were uncovered through their research. Kaspersky also publishes the annual Global IT Security Risks Survey. As of 2014, Kaspersky's research hubs analyze more than 350,000 malware samples per day.
Kaspersky has faced controversy over allegations that it has engaged with the Russian Federal Security Service (FSB)—ties which the company has actively denied. The U.S. Department of Homeland Security banned Kaspersky products from all government departments on 13 September 2017. In October 2017, subsequent reports alleged that hackers working for the Russian government stole confidential data from the home computer of an American National Security Agency contractor via Kaspersky antivirus software. Kaspersky denied the allegations, reporting that the software had detected Equation Group malware samples which it uploaded to its servers for analysis in its normal course of operation. The company has since announced commitments to increased accountability, such as soliciting independent reviews and verification of its software's source code, and announcing that it would migrate some of its core infrastructure for foreign customers from Russia to Switzerland.
History
The first version of Kaspersky Lab's antivirus software was developed by Eugene Kaspersky in 1989 in response to the Cascade Virus. Early versions had just 40 virus definitions and were mostly distributed to friends and family members. Eugene continued developing the software at KAMI, resulting in the AntiViral Toolkit Pro (AVP) product released in 1992. It was popularized in 1994 after a competitive analysis by Hamburg University gave Eugene's software first place.
In 1997, Eugene Kaspersky, his wife Natalya Kaspersky, and Alexey De-Monderik left KAMI to form Kaspersky Lab, and to continue developing the antivirus product, then called AVP. The product was renamed Kaspersky Anti-Virus after an American company registered the AVP trademark in the US.
In 1998, a Taiwanese student released a virus called CIH. During the first three weeks of the outbreak, Kaspersky Lab's AVP was the only software at the time able to remove it. This increased demand and led to deals with antivirus companies in Japan, Finland and Germany to integrate AVP into their software.
According to WIRED, Kaspersky's software was "advanced for the time". For example, it was the first software to monitor viruses in an isolated quarantine. The company's revenue grew 280 percent from 1998 to 2000, with about 60 percent of its revenue coming from foreign sales. Natalya worked to broker deals abroad and localize the software. It opened offices in the UK, Poland, Holland and China. It later expanded to Germany, France, the US and Japan. By 2000, the company had 65 employees and sales in more than 40 countries. Kaspersky opened new offices in South East Asia and the Middle East in 2008 and in South Africa in 2009. It also expanded in India, the Middle East and Africa in 2010. In 2009, retail sales of Kaspersky Lab's antivirus products reached almost 4.5 million copies per year.
In 2011, General Atlantic bought a 20 percent share of Kaspersky Lab for $200 million, with the expectation of helping the company go public. A few months later, the decision was made to keep the firm private and Kaspersky re-purchased the shares from General Atlantic. This was followed by numerous executive departures in 2011 and 2014 regarding disputes over going public and over Eugene's management style.
On January 1, 2012, Kaspersky Lab officially left the Business Software Alliance (BSA) over SOPA. The BSA had supported the controversial anti-piracy bill, but Kaspersky Lab did not support it stating, "we believe that such measures will be used contrary to the modern advances in technology and the needs of consumers," and to show their disapproval, announced their intent to leave on December 5, 2011.
By 2013, the company had an unaudited $667 million in annual revenues. In 2014, Kaspersky Lab signed a distribution deal with Ingram Micro, which significantly expanded its reseller program.
In August 2015, two former Kaspersky employees alleged that the company introduced modified files into the VirusTotal antivirus database to trick software from Kaspersky competitors into triggering false positives in virus and malware scans. A possible motive is that Eugene allegedly was furious at competitors perceived to be "unfairly" free-riding on Kaspersky's malware discoveries via the open-source VirusTotal database. The company denied the allegations. On his personal blog, Eugene Kaspersky compared the accusations to unsubstantiated conspiracy theories. Reuters followed up by publishing leaked emails allegedly from Kaspersky alluding to "falsies" and "rubbing out" foreign competitors; Kaspersky Lab stated the emails "may not be legitimate and were obtained from anonymous sources that have a hidden agenda".
In 2016, Kaspersky executive Ruslan Stoyanov was arrested by Russian authorities on charges predating his work at Kaspersky. In 2019, he was convicted of treason.
Products
Kaspersky Lab develops and markets antivirus, internet security, password management, endpoint security, and other cybersecurity products and services. It is the fourth or fifth largest endpoint security vendor and the third largest consumer IT security software company. It is the sixth largest overall IT security company. Its revenues are about 15 percent from Russian companies domestically, one-third from European organizations and one-fourth from U.S. organizations. The software has about 400 million users in all.
Kaspersky's consumer software include the Antivirus, Internet Security and Total Security products. The Antivirus software includes malware protection, monitors the PC for suspicious program behavior, and warns users about potentially dangerous websites. The Internet Security software adds privacy features, parental controls, anti-phishing tools. Total Security adds parental controls, adult website filters, diagnostic tools, a Password Manager application, and other features. Kaspersky's software is available for Macs, PCs, Android, iOS, Windows Mobile, BlackBerry and Symbian.
For businesses the company markets the Kaspersky Endpoint Security for Business suite. It includes a centralized user interface and management application called the Kaspersky Security Center. The cybersecurity software itself is called the Kaspersky Security Network. The Kaspersky Administration KitSecurity Center manages configuration, installation and remote use. The business suite also has quarantine, reporting, and other features. Its software product for businesses with 25 staff or less is called Kaspersky Small Office Security (KSOS). Within the suite are products specifically for virtualization security, mobile security, and fraud protection among others. Kaspersky also develops a free tool that helps businesses gain access to Windows devices that are infected by ransomware.
Partnerships
The Kaspersky Anti-Virus engine also powers products or solutions by other security vendors, such as Check Point, Bluecoat, Juniper Networks, Microsoft Forefront, Netintelligence, Clearswift, FrontBridge, Netasq, Wedge Networks, and others. Altogether, more than 120 companies are licensing technology from Kaspersky Lab. Kaspersky Lab also has a number of partnerships with various technology companies.
The International Multilateral Partnership Against Cyber Threats in which Datuk Mohd Noor Amin acts as the Chairman, announced the appointment of Harry Cheung – Managing Director of Kaspersky Lab, APAC – as the Goodwill Ambassador for Greater China.
Kaspersky Lab runs several global sponsorships, for example, the Scuderia Ferrari Racing Team and geographical expeditions.
On 16 December 2021, Kaspersky Lab announced it had extended it's 10 year partnership with Scuderia Ferrari and also become the brand’s Esports team partner.
Market assessments and reception
According to PC Magazine, Kaspersky AntiVirus and competitor Bitdefender are both consistently ranked at the top in independent competitive tests. PC Magazine's own malware and phishing tests had similar results and praised the software's "bonus security tools". Under "Cons" the magazine said it took longer-than-expected to complete a scan. The same magazine said the Kaspersky Total Security product had an "impressive feature list" and praised the extra features in the Total Security product, like password management, encryption and parental controls. PC Magazine said the product had scored highly in lab tests for antivirus, antiphishing and other features. It had "so-so" scores in anti-malware tests and wasn't able to catch all spam.
Kaspersky's 2013 Endpoint Security for Windows product was the top-ranked enterprise antivirus software in a competitive test by Dennis Technology Labs, followed by Symantec Endpoint Protection. AV-Comparatives has awarded Kaspersky "Product of the Year" for 2015, based on the number of high scores it has gotten throughout the year on a wide range of tests. PC Magazine praised the software's features, but said it lacked policy management and deployment options. Kaspersky's parental controls software was reviewed by PC Magazine. The reviewer said it was "well-rounded, very affordable parental control and monitoring". It praised the software's content filtering, child profiles, social media monitoring and other features, but criticized that some features were only available on iOS or Android.
The anti-virus software testing group AV-Comparatives gave the Windows XP version of Kaspersky AV an "Advanced+" rating (its highest) in both its February 2008 on-demand detection test (with the fourth highest detection rate among 16 products tested). However, in the Retrospective/Proactive Test May 2008, Kaspersky received the "Standard" rating, detecting 21% of new malware with 1-month old signatures and receiving a substantial amount of false positives.
The firewall included in Kaspersky Internet Security 7.0 got a "Very Good" rating in Matousec's Firewall challenge, with a result of 85%. Kaspersky Anti-Virus 7.0 has achieved a 6.5 result out of 8 in the Anti Malware Labs rootkit detection test. It has also achieved a 31 out of 33 detection of polymorphic viruses and a 97% result in the self-protection test.
In 2007, Kaspersky Internet Security 7 received an award from the British magazine PC Pro and also won a place in its "A List".
Kaspersky has passed most of Virus Bulletin comparative tests since August 2003. In 2005, according to PC World magazine, Kaspersky anti-virus software provided the fastest updates for new virus and security threats in the industry.
In PC World magazine's March 2010 comparison of consumer security suites, Kaspersky Internet Security 2010 scored 4.5/5 stars, and was rated second overall. In the December 2011 version of AV-Comparatives' annual reports, Kaspersky Lab's software has achieved highest overall ranking and has earned the AV Comparatives' "Product of the Year" award.
On 1 February 2012, the Kaspersky Internet Security has earned "AV-TEST Award for Best Repair 2011" award in the field of home user products from AV-TEST Institute. On 28 January 2013, the Kaspersky Endpoint Security has earned "AV-TEST Award for Best Protection 2012" and "AV-TEST Award for Best Repair 2012" awards in the field of corporate products from AV-TEST Institute.
Later in 2013, Kaspersky earned the product of the year award from AV-Comparatives and the highest score among Enterprise solutions in a Dennis Technology Labs report.
Kaspersky has also received certification of its products through the OESIS OK Certification Program, which verifies that the applications are interoperable with third-party technology solutions like NAC and SSL VPN products from Cisco Systems, Juniper Networks, F5 Networks, and others.
Malware discovery
Kaspersky Lab's Global Research and Analysis Team (GReAT) was established in 2008. It investigates cybersecurity threats and other work by malware operations. IT security companies are often evaluated by their ability to uncover previously unknown viruses and vulnerabilities. Kaspersky's reputation for investigating cyber-security threats has been influential in gaining sales and prestige. Beginning around 2010, Kaspersky exposed a series of government-sponsored cyber-espionage and sabotage efforts. These include Stuxnet, Duqu, Flame, Gauss, Regin and the Equation Group. According to Wired, "many of them [were] seemingly launched by the US and its UK and Israeli allies. Kaspersky is especially well-known for its work uncovering Stuxnet and Flame."
Stuxnet
In 2010, Kaspersky Lab worked with Microsoft to counter-act the Stuxnet worm, which had infected 14 industrial locations in Iran using four zero-day vulnerabilities in Microsoft Windows. According to IEEE Spectrum, the circumstances "strongly suggest" the worm was developed by the United States and Israel to damage centrifuges in Iran's nuclear-enrichment program. It was the first discovery of a major government-sponsored cyber-attack.
Flame
In May 2012, Kaspersky Lab identified the malware Flame, which a researcher described as potentially "the most sophisticated cyber weapon yet unleashed". According to the researchers in Kaspersky Lab, the malware had infected an estimated 1,000 to 5,000 machines worldwide when asked by the United Nations International Telecommunication Union to investigate reports of a virus affecting Iranian Oil Ministry computers. As Kaspersky Lab investigated, they discovered an MD5 hash and filename that appeared only on customer machines from Middle Eastern nations. After discovering more pieces, researchers dubbed the program "Flame" after the name of one of its modules.
Flame was an earlier variant of Stuxnet. Kaspersky never verified the source of the software, but it is suspected to have been developed by the National Security Agency (NSA) to transmit keystrokes, Skype calls and other data. Kaspersky created algorithms to find similar malware and found Gauss that July, which collected and transmitted data from devices infected by bluetooth or USB drives.
Red October
In January 2013, Kaspersky discovered the Red October malware, which had been used for widespread cyber-espionage for five years. It targeted political targets like embassies, nuclear sites, mostly in Europe, Switzerland and North America. The malware was likely written by Russian-speaking hackers and the exploits by Chinese hackers. That June, Kaspersky discovered NetTraveler, which it said was obtaining data on emerging technology from government targets and oil companies. Kaspersky did not identify who was behind it, but it was similar to other cyber-espionage coming from Beijing, China. Later that same year, Kaspersky discovered a hacker group it called Icefog after investigating an cybersecurity attack on a Japanese television company. Kaspersky said the hacker group, possibly from China, was unique in that they targeted specific files they seemed to know about before planting malware to extract them.
Mask
In February 2014, Kaspersky identified the malware Mask, which infected 380 organizations in 31 countries. Many organizations that were affected were in Morocco. Some of the files were in Spanish and the group is believed to be a nation-state conducting espionage, but Kaspersky did not speculate on which country may have developed it.
Regin
In November 2014, Symantec and Kaspersky authored papers that contained the first disclosure of malicious software named Regin. According to Kaspersky, Regin is similar to QWERTY, a malware program discovered the next year. Regin was used to take remote control of a computer and is believed to have originated from the Five Eyes alliance. That same month Kaspersky reported on the Darkhotel attack, which targeted users of wireless networks at hotels in Asia. It asked users to update their software, then downloaded malware that gave up their passwords.
Equation Group
In 2015, Kaspersky identified a highly sophisticated threat actor that it called "The Equation Group". The group incorporated sophisticated spying software into the firmware of hard drives at banks, government agencies, nuclear researchers and military facilities, in countries that are frequent targets of US intelligence efforts. It is suspected to have been developed by the National Security Agency (NSA) and included many unique technical achievements to better avoid detection. That same day, Kaspersky announced the discovery of a hacker group it called Carbanak, which was targeting banks and moving millions of dollars into fake accounts. Carbanak was discovered when one bank asked Kaspersky to investigate suspicious behavior from its ATMs. A similar malware using some of the same techniques as Carbanak was discovered in 2016 and dubbed Carbanak 2.0.
Duqu
In June 2015, Kaspersky reported that its own network had been infiltrated by government-sponsored malware. Evidence suggested the malware was created by the same developers as Duqu and Stuxnet, in order to get intelligence that would help them better avoid detection by Kaspersky in the future. Kaspersky called it Duqu 2.0. The malicious software resided in memory to avoid detection. The hack was believed to have been done by the same group that did Duqu in 2011. It used exploits in Microsoft installer files.
Android cyber-espionage
In June 2015, Kaspersky Lab and Citizen Lab both independently discovered software developed by Hacking Team and used by 60 governments around the world to covertly record data from the mobile phones of their citizens. The software gave police enforcement a "menu of features" to access emails, text messages, keystrokes, call history and other data. Kaspersky also identified 37,000 attacks against banking companies that used modifications of the malware called Asacub and took control of Android devices. Asacub targeted mostly banking customers in the U.S., Russia and Ukraine using an SMS message that baited users into installing a Trojan.
Silverlight
In 2016, Kaspersky discovered a zero day vulnerability in Microsoft Silverlight. Kaspersky identified a string of code often used by exploits created by the suspected author. It then used YARA rules on its network of Kaspersky software users to find that string of code and uncover the rest of the exploit. Afterwards, Microsoft issued a "critical" software patch to protect its software from the vulnerability.
Poseidon Group
In 2016, Kaspersky uncovered the Poseidon Group, which would infiltrate corporations with malware using phishing emails, then get hired by the same company as a security firm to correct the problem. Once hired, Poseidon would install additional malware and backdoors. In June 2016 Kaspersky helped uncover a Russian hacking group, leading to 50 arrests.
Titanium
In 2019, Kaspersky uncovered Titanium, a very advanced and insidious backdoor malware APT, developed by PLATINUM, a cybercrime collective. Kaspersky Lab reported the malware on 8 November 2019.
Bans and allegations of Russian government ties
Since 2015, Kaspersky was alleged to have close ties to the Russian government by various western media outlets, and finally the US government itself. In 2017, President Trump signed the legislation to ban software of Kaspersky on government computers. US government institutions were prohibited from buying and installing Kaspersky software on their computers and other devices.
See also
Antivirus software
Comparison of antivirus software
Comparison of computer viruses
Titanium (malware)
Shaltai Boltai
Vault 7
Notes
References
External links
Cyber Threat Real-Time Map
Log of cybersecurity discoveries
Antivirus software
Companies based in Moscow
Computer security companies
Information technology companies of Russia
Computer security software companies
Privately held companies of Russia
Software companies established in 1997
Software companies of Russia
Technology companies of Russia
Russian brands
1997 establishments in Russia
|
8998900
|
https://en.wikipedia.org/wiki/SIMMON
|
SIMMON
|
SIMMON (SIMulation MONitor) was a proprietary software testing system developed in the late 1960s in the IBM Product Test Laboratory, then at Poughkeepsie, N.Y. It was designed for the then-new line of System/360 computers as a vehicle for testing the software that IBM was developing for that architecture.
SIMMON was first described at the IBM SimSymp 1968 symposium, held at Rye, New York.
SIMMON was a hypervisor, similar to the IBM CP-40 system that was being independently developed at the Cambridge Scientific Center at about that same time. The chief difference from CP-40 was that SIMMON supported a single virtual machine for testing of a single guest program running there. CP-40 supported many virtual machines for time-sharing production work. CP-40 evolved by many stages into the present VM/CMS operating system. SIMMON was a useful test vehicle for many years.
SIMMON was designed to dynamically include independently developed programs (test tools) for testing the target guest program. The SIMMON kernel maintained control over the hardware (and the guest) and coordinated invocation of the test tools.
Processing modes
Two modes of operation were provided:
Full simulation
Interrupt
Full simulation mode
In this mode, each instruction in the guest program was simulated without ever passing control directly to the guest. As an Instruction Set Simulator, SIMMON was unusual in that it simulated the same architecture as that on which it was running, i.e. that of the IBM System/360/370. While an order of magnitude slower than Interrupt mode (below), it allowed close attention to the operation of the guest. This would be the mode used by various instruction trace test tools.
Interrupt mode
Interrupt mode (a/k/a Bump mode) constrained the guest program to run in user program state, with the SIMMON kernel handling all hardware interrupts and simulating all privileged instructions the guest attempted to execute. This mode could be used, for example, by a test tool to simulate a hardware device.
Some SIMMON test tools
These were some test tools that were developed for use with SIMMON.
ERGENT
(ERror GENeration and Test):
This test tool was developed to test the device support error recovery in IBM's PCP (Primary Control Program) operating system, then being developed. It used a novel and very efficient table-driven finite state machine (FSM) to inject simulated errors and verify that the operating system followed the detailed specifications of actions to be taken to attempt recovery.
The table driven FSM aspect was granted U.S. Patent
in October, 1972.
MAPPER
MAPPER (not to be confused with the Unisys product of the same name) was a statistical performance analysis tool.
It operated by allowing the program under test to run in Interrupt mode, but also used the system timer to periodically interrupt it.
The addresses where the tested program was interrupted were recorded and later summarized and tabulated in the form of a map, showing the density of interrupts over the memory addresses. The result resembled nuclear scintigraphy images, showing the parts of the program most frequently used under the test conditions.
HOTSPOTS
HOTSPOTS was an instruction trace tool written to help identify performance problem areas in IBM's MFT operating system. Branch trace data was written to tape, then summarized. The report took the form of a listing similar to a storage dump, with program entry points and exit points identified, including frequency of use for each instruction sequence.
These data identified the Memory Management component as consuming about 20% of CPU resources, and was used to justify a task force to try to improve the performance.
Stress
While not a specific test tool, the distorted timing relationships while running under SIMMON found a number of problems, particularly in the input/output sections. Unless a SIMMON tool was put in place to normalize and delay I/O events, these would appear to the guest program as happening unnaturally quickly.
Programs tested
Programs under test -- so-called guest programs -- had to be capable of stand-alone operation on the bare hardware. SIMMON provided services for the test tools, but not for the guest.
These were some of the programs that had been tested using SIMMON:
Various Customer Engineer (CE) stand-alone diagnostic programs
DOS/360 (including BOS and TOS)
OS/360 (PCP. MFT and MVS)
A number of Product Test tools
See also
Software testing
References
Debuggers
Software testing tools
1960s software
Operating system kernels
IBM mainframe software
|
54692968
|
https://en.wikipedia.org/wiki/Network%20eavesdropping
|
Network eavesdropping
|
Network eavesdropping, also known as eavesdropping attack, sniffing attack, or snooping attack, is a method that retrieves user information through the internet. This attack happens on electronic devices like computers and smartphones. This network attack typically happens under the usage of unsecured networks, such as public wifi connections or shared electronic devices. Eavesdropping attacks through the network is considered one of the most urgent threats in industries that rely on collecting and storing data.
A typical network eavesdropper may be called a Black-hat hacker and is considered a low-level hacker as it is simple to network eavesdrop successfully. The threat of network eavesdroppers is a growing concern. Research and discussions are brought up in the public's eye, for instance, types of eavesdropping, open-source tools, and commercial tools to prevent eavesdropping. Models against network eavesdropping attempts are built and developed as privacy is increasingly valued. Sections on cases of successful network eavesdropping attempts and its laws and policies in the National Security Agency are mentioned. Some laws include the Electronic Communications Privacy Act and the Foreign Intelligence Surveillance Act.
Types of attacks
Types of network eavesdropping include intervening in the process of decryption of messages on communication systems, attempting to access documents stored in a network system, and listening on electronic devices. Types include electronic performance monitoring and control systems, keystroke logging, man-in-the-middle attacks, observing exit nodes on a network, and Skype & Type.
Electronic performance monitoring and control systems (EPMCSs)
Electronic performance monitoring and control systems are used by employees or companies and organizations to collect, store, analyze, and report actions or performances of employers when they are working. The beginning of this system is used to increase the efficiency of workers, but instances of unintentional eavesdropping can occur, for example, when employees' casual phone calls or conversations would be recorded.
Keystroke logging
Keystroke logging is a program that can oversee the writing process of the user. It can be used to analyze the user's typing activities, as keystroke logging provides detailed information on activities like typing speed, pausing, deletion of texts, and more behaviors. By monitoring the activities and sounds of the keyboard strikes, the message typed by the user can be translated. Although keystroke logging systems do not explain reasons for pauses or deletion of texts, it allows attackers to analyze text information. Keystroke logging can also be used with eye-tracking devices which monitors movements of the user's eyes to determine patterns of the user's typing actions which can be used to explain the reasons for pauses or deletion of texts.
Man-in-the-middle attack (MitM)
A Man-in-the-middle attack is an active eavesdropping method that intrudes on the network system. It can retrieve and alter the information sent between two parties without anyone noticing. The attacker hijacks the communication systems and gains control over the transport of data, but cannot insert voice messages that sound or act like the actual users. Attackers also create independent communications through the system with the users acting as if the conversation between users is private.
The “man-in-the-middle” can also be referred to as lurkers in a social context. A lurker is a person who rarely or never posts anything online, but the person stays online and observes other users' actions. Lurking can be valuable as it lets people gain knowledge from other users. However, like eavesdropping, lurking into other users' private information violates privacy and social norms.
Observing exit nodes
Distributed networks including communication networks are usually designed so that nodes can enter and exit the network freely. However, this poses a danger in which attacks can easily access the system and may cause serious consequences, for example, leakage of the user’s phone number or credit card number. In many anonymous network pathways, the last node before exiting the network may contain actual information sent by users. Tor exit nodes are an example. Tor is an anonymous communication system that allows users to hide their IP address. It also has layers of encryption that protect information sent between users from eavesdropping attempts trying to observe the network traffic. However, Tor exit nodes are used to eavesdrop at the end of the network traffic. The last node in the network path flowing through the traffic, for instance, Tor exit nodes, can acquire original information or messages that were transmitted between different users.
Skype & Type (S&T)
Skype & Type (S&T) is a new keyboard acoustic eavesdropping attack that takes advantage of Voice-over IP (VoIP). S&T is practical and can be used in many applications in the real world, as it does not require attackers to be close to the victim and it can work with only some leaked keystrokes instead of every keystroke. With some knowledge of the victim’s typing patterns, attackers can gain a 91.7% accuracy typed by the victim. Different recording devices including laptop microphones, smartphones, and headset microphones can be used for attackers to eavesdrop on the victim's style and speed of typing. It is especially dangerous when attackers know what language the victim is typing in.
Tools to prevent eavesdropping attacks
Computer programs where the source code of the system is shared with the public for free or for commercial use can be used to prevent network eavesdropping. They are often modified to cater to different network systems, and the tools are specific in what task it performs. In this case, Advanced Encryption Standard-256, Bro, Chaosreader, CommView, Firewalls, Security Agencies, Snort, Tcptrace, and Wireshark are tools that address network security and network eavesdropping.
Advanced encryption standard-256 (AES-256)
It is a cipher block chaining (CBC) mode for ciphered messages and hash-based message codes. The AES-256 contains 256 keys for identifying the actual user, and it represents the standard used for securing many layers on the internet. AES-256 is used by Zoom Phone apps that help encrypt chat messages sent by Zoom users. If this feature is used in the app, users will only see encrypted chats when they use the app, and notifications of an encrypted chat will be sent with no content involved.
Bro
Bro is a system that detects network attackers and abnormal traffic on the internet. It emerged at the University of California, Berkeley that detects invading network systems. The system does not apply as detection of eavesdropping by default, but can be modified to an offline analyzing tool for eavesdropping attacks. Bro runs under Digital Unix, FreeBSD, IRIX, SunOS, and Solaris operating systems, with the implementation of approximately 22,000 lines of C++ and 1,900 lines of Bro. It is still in the process of development for real-world applications.
Chaosreader
Chaosreader is a simplified version of many open-source eavesdropping tools. It creates HTML pages on the content of when a network intrusion is detected. No actions are taken when an attack occurs and only information such as time, network location on which system or wall the user is trying to attack will be recorded.
CommView
CommView is specific to Windows systems which limits real-world applications because of its specific system usage. It captures network traffic and eavesdropping attempts by using packet analyzing and decoding.
Firewalls
Firewall technology filters network traffic and blocks malicious users from attacking the network system. It prevents users from intruding into private networks. Having a firewall in the entrance to a network system requires user authentications before allowing actions performed by users. There are different types of firewall technologies that can be applied to different types of networks.
Security agencies
A Secure Node Identification Agent is a mobile agent used to distinguish secure neighbor nodes and informs the Node Monitoring System (NMOA). The NMOA stays within nodes and monitors the energy exerted, and receives information about nodes including node ID, location, signal strength, hop counts, and more. It detects nodes nearby that are moving out of range by comparing signal strengths. The NMOA signals the Secure Node Identification Agent (SNIA) and updates each other on neighboring node information. The Node BlackBoard is a knowledge base that reads and updates the agents, acting as the brain of the security system. The Node Key Management agent is created when an encryption key is inserted to the system. It is used to protect the key and is often used between Autonomous Underwater Vehicles (AUVs), which are underwater robots that transmit data and nodes.
Snort
Snort is used in many systems, and it can be run in an offline mode using stream4. Stream4 reassembles preprocessors with another stream option. The snort-reply patch feature is often used to reconstruct executions. It is currently developed by Cisco and acts as a free network intrusion detection system.
Tcptrace
Tcptrace is used to analyze pcap-based network intercepts, which is a packeting capture network application that detects network traffic. It has an important feature that monitors eavesdropping attacks and can reconstruct captured TCP streams.
Wireshark
Wireshark, or also named Ethereal, is a widely used open-source eavesdropping tool in the real world. Most of the features in Ethereal are packet-oriented and contain a TCP reassembly option for experiments on tracking intrusion attempts.
Models against the attacks
Models are built to secure system information stored online and can be specific towards certain systems, for example, protecting existing documents, preventing attacks on the processing of instant messages on the network, and creating fake documents to trace malicious users.
Beacon-bearing decoy documents
Documents containing fake but private information such as made-up social security numbers, bank account numbers, and passport information will be purposely posted on a web server. These documents have beacons that will be triggered when a user attempts to open them, which then alarms another site that records the time accessed of the documents and IP address of the user. The information collected from the beacons is then regularly be sent to Tor exit nodes which then the user will be caught in the malicious act.
Butterfly encryption scheme
The Butterfly encryption scheme uses timestamps and updates pseudorandom number generators (PRNG) seeds in a network system to generate authentication keys and parameters for encrypted messages to be sent out. This scheme can perform in entities that are searching for a relatively low cost but efficient security scheme, and can work in different systems as it has a simple design that is easy to modify for specific purposes. The Butterfly encryption scheme is effective because it uses a changing parameter and has an unpredictable timestamp that creates a high-level security system.
Crypto phones (Cfones)
Cfones is a model built to protect VoIP communications. It uses Short Authenticated Strings (SAS) protocol that requires users to exchange keys to ensure no network intruders are in the system. This is specific to communication systems that involve both voice messages and text messages. In this model, a string is given to actual users, and to connect with another user, strings have to be exchanged and have to match. If another user tries to invade the system, the string will not match, and Cfones blocks attackers from entering the network. This model is specific to preventing man-in-the-middle attacks.
Friendly-jamming schemes (DFJ and OFJ)
Friendly-jamming schemes (DFJ and OFJ) are models that can decrease the eavesdropping risk by purposely interfering the network when an unknown user is near the area of the protected area. The models are tested by the probability of eavesdrop attacks in a testing environment, and are found that there is a lower probability of attacks compared to a system with no friendly-jamming schemes installed. A feature of the DFJ and OFJ schemes is that the models offer a large coverage secure area that is protected from eavesdroppers effectively.
Honey encryption scheme (HE)
A honey encryption scheme is used to strengthen the protection of private information of instant messaging systems, including WhatsApp and Snapchat, as well as tracking down the eavesdropper’s information. HE contains fake but similar plaintext during the decryption phase of the process of instant messaging with an incorrect key. This makes messages that the eavesdropper is trying to decrypt to be gibberish messages. HE schemes are used in specific systems not limited to instant messaging systems, passwords, and credit cards. However, applying it to other systems is still a difficult task as changes inside the scheme have to be made to fit the system.
Internet of Things framework (IoT)
The Internet of Things framework involved four layers of security measures that are management layer, cloud layer, gateway layer, and IoT device layer. The management layer handles web and mobile applications. The cloud layer looks over the service and resource management. It acts as an access point for users to connect to other internet services. The gateway layer manages the packet filtering module. It links the endpoint network of the services, processes the documents or information, and contains security tasks including authentication, authorization, and encryption. The two main tasks of the gateway layer are to detect users and perform filtering of the actual user and malicious users. The IoT device layer looks over the gateway layer’s performance and double-checks whether all malicious users are removed from the network, specifically, attestation is a mechanism to measure the end-point integrity and removes nodes from the network if necessary.
Cases of network eavesdropping
Completely trusting network devices or network companies can be risky. Users of devices are oftentimes unaware of the threats on the internet and choose to ignore the importance of protecting their personal information. This paves the way for malicious hackers to gain access to private data that users may not be aware of. A few cases of network eavesdropping discussed include Alipay and Cloud computing.
Alipay
Private information from a user of mobile payment apps, in this case, Alipay, is retrieved using a hierarchical identification specific to mobile payment apps. The system first recognizes the app used from traffic data, then categorizes the user’s distinct actions on the app, and lastly distinguishes comprehensive steps within each action. Distinct actions on mobile payment apps are generalized in a few groups including making a payment, transfer money between banks, scanning checks, and looking at previous records. By classifying and observing the user’s specific steps within each group of actions, the attacker intercepts the network traffic using and obtains private information of app users. Strategies to prevent incidents are made such as fingerprint or facial identification, and email or text confirmation of actions performed on the app.
Cloud computing
Cloud computing is a computing model that provides access to many different configurable resources, including servers, storage, applications, and services. The nature of the Cloud makes it vulnerable to security threats, and attackers can easily eavesdrop on the Cloud. Particularly, an attacker can simply identify the data center of the Virtual Machine used by cloud computing, and retrieve information on the IP address and domain names of the data center. It becomes dangerous when the attacker gains access to private cryptographic keys for specific servers which they may get data stored in the cloud. For example, the Amazon EC2 platform based in Seattle, Washington, WA, USA, was once at risk of such issues but has now used Amazon Web Service (AWS) to manage their encryption keys.
Medical records
Sometimes users can choose what they put online and should be responsible for their actions, including whether or not a user should take a photo of their social security number and send it through a messaging app. However, data like medical records or bank accounts are stored in a network system in which companies are also responsible for securing user’s data. Medical records of patients can be stolen by insurance companies, medical laboratories, or advertising companies for their interests. Information such as name, social security number, home address, email address, and diagnosis history can be used to track down a person. Eavesdropping reports of a patient’s medical history is illegal and is dangerous. To deal with network threats, many medical institutes have been using endpoint authentication, cryptographic protocols and data encryption.
Related laws and policies
Electronic Communications Privacy Act (ECPA)
In Title III of the Electronic Communications Privacy Act (ECPA), it states that it is a “federal crime to engage in wiretapping or electronic eavesdropping; to possess wiretapping or electronic eavesdropping equipment; to use to disclose information obtained through illegal wiretapping or electronic eavesdropping, or to disclose information secured through court-ordered wiretapping or electronic eavesdropping, to obstruct justice.” Federal and state law enforcement officials may be allowed to intercept with the wire, oral, and electronic communications if and only if a court order is issued, consent of the parties, or when a malicious user is trying to access the system. If the law is violated, there may be a criminal penalty, civil liability, administrative and professional disciplinary action, and or exclusion of evidence. A general penalty is not more than five years of imprisonment and no more than $250,000 for individuals and not more than $500,000 for organizations. If damages are created, there may be a $100 fine per day of violation or $10,000 in total.
Foreign Intelligence Surveillance Act (FISA)
The Foreign Intelligence Surveillance Act gives out court orders for “electronic surveillance, physical searches, installation, and use of pen registers and traps and trace devices, and orders to disclose tangible items.” Court orders issued on electronic surveillance allow the federal officials to use electronic surveillance which includes eavesdropping without violating the Electronic Communications Privacy Act or Title III specifically.
Organization of Economic Cooperation and Development (OECD)
A guideline to protecting the privacy of data of health patients is issued by the Organization of Economic Cooperation and Development (OECD). The policy states that individual patient data or personal data should be secure, and patients will not face any arbitrary losses related to invading their personal information or health conditions. The policy acts as a minimum standard for eHealth usages and it should be followed by all medical institutes for protecting the privacy of patient’s data.
See also
Black hat (computer security)
Crowdsensing
Eavesdropping
Endpoint detection and response
Endpoint security
Intrusion detection system
Packet analyzer
Security hacker
Van Eck phreaking
References
Computer networking
Computer security
|
16008731
|
https://en.wikipedia.org/wiki/Confluence%20%28software%29
|
Confluence (software)
|
Confluence is a web-based corporate wiki (collaboration software) developed by Australian software company Atlassian. Atlassian wrote Confluence in the Java programming language and first published it in 2004. Confluence Standalone comes with a built-in Tomcat web server and hsql database, and also supports other databases.
The company markets Confluence as enterprise software, licensed as either on-premises software or software as a service running on AWS.
History
Atlassian released Confluence 1.0 on March 25, 2004, saying its purpose was to build "an application that was built to the requirements of an enterprise knowledge management system, without losing the essential, powerful simplicity of the wiki in the process."
In recent versions, Confluence has evolved into part of an integrated collaboration platform and has been adapted to work in conjunction with Jira and other Atlassian software products, including Bamboo, Clover, Crowd, Crucible, and Fisheye.
In 2014, Atlassian released Confluence Data Center to add high availability with load balancing across nodes in a clustered setup.
Analysis
The book Social Media Marketing for Dummies in 2007 considered Confluence an "emergent enterprise social software" that was "becoming an established player." Wikis for Dummies described it as "one of the most popular wikis in corporate environments," "easy to set up and use," and "an exception to the rule" that wiki software search capabilities don't work well.
eWeek cited in 2011 such new features in version 4 as the auto-formatting and auto-complete, unified wiki and WYSIWYG, social network notifications and drag and drop integration of multimedia files. Use cases include basic enterprise communication, collaboration workspaces for knowledge exchange, social networking, Personal Information Management and project management. German newspaper Computerwoche from IDG Business Media compares it to Microsoft SharePoint and finds it "a good starting point" as a platform for social business collaboration, while SharePoint is better suited to companies with more structured processes.
Confluence includes set up CSS templates for styles and formatting for all pages, including those imported from Word documents. Built in search allows queries by date, the page's author, and content type such as graphics.
The tool has add-ons for integration with standard formats, with a flexible programmable API allowing expansion. The software is relevant as an outline tool for requirements that can be linked to tasks in the Jira issue tracker by the same company.
Discontinuation of wiki markup
As of version 4.0, in 2011, Confluence ended support for wiki markup language. This led to a sometimes-heated discussion by some previous versions' users who objected to the change. In response, Atlassian provided a source code editor as a plugin, which allows advanced users the ability to edit the underlying XHTML-based document source. However, although the new source markup is XHTML-based, it is not XHTML compliant.
Additionally, wiki markup can be typed into the editor and Confluence's autocomplete and auto-format function converts the wiki markup to the new format. After the real-time conversion, content can not be edited as wiki markup again.
Security
Confluence Cloud data is encrypted in transit and at rest.
Limitations
There is no standard way of adding captions to images in the server version, but captions can be added to images in the cloud version.
See also
Comparison of wiki software
Comparison of wiki hosting services
List of applications with iCalendar support
List of content management systems
List of wiki software
References
Atlassian products
Proprietary wiki software
Java (programming language) software
Technical communication tools
Knowledge markets
Wiki farms
|
6809416
|
https://en.wikipedia.org/wiki/SoftQuad%20Software
|
SoftQuad Software
|
SoftQuad Software was a Canadian software company best known for HoTMetaL, the first commercial HTML editor. It is also known for Author/Editor, the first specialized SGML editor, and Panorama, the first browser plugin for SGML. Panorama demonstrated the need for standardization of SGML on the web, which eventually resulted in the development of the XML specification.
HoTMetaL was one of a series of applications created by SoftQuad for editing, viewing and publishing structured (SGML and XML) content. It was based upon a popular SGML Editor called Author/Editor and has since evolved into XMetaL.
Early history
SoftQuad started its life in 1984 as a technology-oriented spin-off of Toronto's Coach House Press. Its founders were Yuri Rubinsky, David Slocombe and Stan Bevington.
SoftQuad was started in order to improve automated typesetting at Toronto's Coach House Press, and for many years developed an enhanced commercial version of the text formatting program troff, developed under license from AT&T, called sqtroff. It was sold with a suite of associated programs, corresponding to AT&T's Documenter's Workbench, under the name SoftQuad Publishing Software (SQPS).
SoftQuad's business headquarters was in Toronto. After SQPS was largely supplanted by Author/Editor as SoftQuad's main product, product development was transitioned to the Vancouver area, retaining the Toronto team as combined professional services and customization development for Author/Editor and its associated software development kit, called "Sculptor". This arrangement arose out of a highly coincidental reunion of Yuri Rubinsky (in Toronto) and his high school friend Peter Sharpe. Peter Sharpe led the development of Author/Editor.
By virtue of its early lead and its charismatic leader, Yuri Rubinsky, SoftQuad provided considerable leadership to the nascent SGML community. For example, Yuri Rubinsky was the first president of SGML Open.
Author/Editor
Author/Editor appeared on the market in 1988 as the world's first specialized SGML editing application. The first version ran on the Macintosh. Windows and Unix versions followed in 1991. Author/Editor 3.0 was summarized as "a very pure structure editor which validates the document all the time. Documents which have a structure that doesn't comply with their document type definition can be edited by turning rules checking off, which can be helpful when re-arranging documents. The main window is a QUASIWYG representation of text, a structure view and a context view are also available. The structure view shows tags indented, the context view shows paths in the same way. An element list is used to pick up an element to insert. The representation on screen is done with a style editor, which generates style files. The program has many DTD with it, but new DTD's are imported by the RulesBuilder, which converts a DTD to a structure definition required by Author/Editor. There is an English thesaurus and a dictionary for spell checking."
After several versions, Author/Editor was sold with the Panorama suite to Interleaf in September, 1998. At the same time, the Toronto development team, led by David A. Keldsen, joined Interleaf to help focus the company on content management and create new products. By that point, SoftQuad's focus had shifted to its descendants, HoTMetaL and XMetaL. Interleaf did not produce new versions of Author/Editor. Sales were discontinued in 2000.
Author/Editor had sibling products RulesBuilder and Sculptor, the Application Builder. RulesBuilder was used for compiling SGML DTDs to a fully resolved and validated binary form that Author/Editor could consume. Sculptor was used to build customized user interfaces for Author/Editor. ApplicationBuilder used Scheme for its customization language. Sculptor is conceptually the ancestor of today's XMetaL Developer.
Panorama
Panorama was a multi-platform web browser plugin for SGML content. There was a style editor and support for linking using a mixture of SGML HyTime and TEI Pointers. There was also support for distributed annotations.
Panorama was described as "A browser for SGML texts. The NCSA (National Center for Supercomputer Applications) includes the [free] version of Panorama into its Mosaic delivery. The Mosaic [browser] will launch Panorama when it encounters any other SGML file than an HTML file. Panorama will have a style editor to define the outlook of documents. The commercial version has additional features like the ability to create annotations and customized bookmarks."
SoftQuad goes public
In 1992, SoftQuad went public on the Vancouver Stock Exchange through a reverse takeover of BC's "Hatco". In January 1994, SoftQuad was listed on the Toronto Stock Exchange.
HoTMetaL
Released in 1994, HoTMetaL was the first commercial HTML authoring product. SoftQuad was able to beat other products to the market by virtue of the fact that HTML was defined as an application (Document Type Definition) of SGML. By virtue of this strong base and early lead, HoTMetaL became very popular as a tool for creating HTML web sites.
HoTMetaL was initially free, but a commercial version HoTMetaL Pro was soon released. Early versions of HoTMetaL ran on Windows and Unix. HoTMetaL Pro also ran on Macintosh, but by version 5, it was restricted to Windows.
On the basis of HoTMetaL's early success, SoftQuad was able to go public on the NASDAQ stock exchange as SWEBF.
Over time, however, companies like Microsoft and Netscape increasingly saw HTML authoring tools as loss leaders to tempt web developers into their product suites.
In addition, HoTMetaL adhered to the SGML philosophies that dictated that content should adhere to standards and that the structure and presentation of content should be separate. HoTMetaL was excellent at visualizing the structure of the content, and of enforcing the standards. But neither of these were as important to Web designers as "What You See Is What You Get" presentation of the content, which was better provided by products like DreamWeaver and FrontPage.
In September, 1996, SoftQuad released HoTMetaL Intranet Publisher (HiP). HiP was essentially an Intranet Content Management System.
Corporate transitions
After Yuri Rubinsky's death in January 1996, SoftQuad went through a variety of transitions.
In November 1996, SoftQuad reported substantial revenue growth but also substantial losses.
In December 1996, SoftQuad acquired Alpha Software, creator of popular desktop database publishing software. Alpha's software was intended to be integrated with SoftQuad's to enable Web-based publishing of database-stored information.
Alpha Software's Richard Rabins was made an Executive Vice President of SoftQuad International Inc. In September, 1997, he became CEO after SoftQuad's losses mounted. The positions of President and Chief Financial Officer were also changed at the same time. Essentially, the Alpha Software team was asked to use its experience in commercial software to turn the struggling company around.
In June 1998, Rabins decided to change the company's direction from markup technologies to a children's game subsidiary (NewKidCo) of SoftQuad International's Alpha software subsidiary.
On October 9, 1998, SoftQuad was delisted from NASDAQ (but not the Toronto Stock Exchange) after falling under the minimum share price guidelines.
On November 10, 1998, SoftQuad International Inc. sold the assets (including trademarks) of SoftQuad Inc. (the structured authoring tools business) to private investors and management. This meant that after the purchase, SoftQuad was a private company again, this time named "SoftQuad Software Ltd." The parent company, SoftQuad International Ltd. was later renamed "NewKidCo" to reflect the fact that they did intended to pursue a different business than the historical SoftQuad and the new SoftQuad Software.
In December 2000, SoftQuad bought Advanced Data Engineering (ADEI), a conversion tools company from Petaluma, California. ADEI employees became the core of SoftQuad's XML consulting business.
In September 2000, SoftQuad released a short-lived product called MarketAgility.
From a press release of the time: "MarketAgility Enterprise is a server-based solution built on Microsoft
SQL Server and is administered through a simple browser interface. It automates the collection, normalization and incremental updating of product information from wherever it resides in an enterprise into an XML-based master catalog."
In January 2001, a former employee of SoftQuad formed a company called Enfolding Systems Corp. That company was acquired by Blast Radius in August 2002 and later, as a subsidiary of Blast Radius, acquired the SoftQuad assets from Corel Corp.
In August 2001, SoftQuad Software Ltd. was bought by desktop software vendor Corel for about US$37 million in stock. After the Corel Acquisition, SoftQuad ceased to exist as a company, though many employees remained with the company as part of Corel's XMetaL division in Vancouver.
Subsequently, SoftQuad and most assets of the company were sold to Blast Radius in 2002.
In 2004, Just Systems acquired SoftQuad's remaining assets, including its flagship XMetaL product, from Blast Radius. Today, XMetaL and most other Softquad assets are owned by JustSystems and the core code of XMetaL is maintained by some of the same programmers who worked at various incarnations of SoftQuad.
Controversy
In March 2000, SoftQuad merged with American Sports Machine, effectively becoming an OTCBB public company. The new company was quickly renamed SoftQuad Software Ltd. and given the stock symbol SXML.
In late 2000, SoftQuad stock was involved in the Bermuda Short sting. 58 stock brokers and executives were indicted in the case which involved "defrauding the shareholders of C-Me-Run, SoftQuad and JagNotes by artificially inflating the market price of these stocks through illegal means."
In 2004, two men caught in the Bermuda Short sting pleaded guilty to stock fraud involving SoftQuad and other penny stocks. Court records state
that Paul D. Lemmon and Mark Valentine "conspired to unjustly enrich
themselves by defrauding a fictitious foreign mutual fund (the “Fund”) through paying undisclosed
payoffs and kickbacks to brokers in exchange for causing the Fund to purchase large amounts of overpriced C-Me-Run, SoftQuad and JagNotes stocks."
XMetaL
XMetaL was one of the first XML authoring products and has remained popular for almost a decade. Unlike tools like the popular XML Spy, XMetaL used a word processor metaphor and was designed to be used by writers and not programmers.
Along with Cisco and Hewlett-Packard, Microsoft was an early site-license customer for XMetaL and according to public reports, still uses XMetaL widely.
Notable SoftQuad employees
Yuri Rubinsky
Peter Sharpe
David Slocombe
Lauren Wood
Michael Fergusson
David A. Keldsen
Frank Ruffolo
James Clark
Murray Maloney
Liam Quin
Farook Wadia
Mark Brader
Pontus Hedman
Wendy Harrison
Ian Darwin
Pierre Garigue
David Polk
Rodney Boyd
Donald Teed
Bill Clarke
Teddy Mihail
References
Notes
troff text processing FAQ
SoftQuad software used in the publication of the SGML Standard
Richard Rabins announces a new focus for SoftQuad International on childrend's software
Press Release after SoftQuad International sells assets of SoftQuad Inc.
Softquad buys Softquad
History of American Sports Machine and SoftQuad Software's public phase
Anatomy of the Bermuda Short Sting
Interleaf technology acquisition
Corel Buys XML Developer Softquad
External links
sqtroff product box
Almost 500 articles on SoftQuad history
Defunct software companies
Companies based in Toronto
Companies based in Vancouver
Software companies established in 1984
Software companies disestablished in 2001
2001 mergers and acquisitions
|
42379563
|
https://en.wikipedia.org/wiki/Next-generation%20firewall
|
Next-generation firewall
|
A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functions, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).
Next-generation firewall vs. traditional firewall
NGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.
NGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.
Evolution of next-generation firewalls
Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.
Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But blocking a web application that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.
Protection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.
NGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network.
See also
Network security
Unified threat management
References
Firewall software
|
2088863
|
https://en.wikipedia.org/wiki/Secure%20telephone
|
Secure telephone
|
A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack. Concerns about massive growth of telephone tapping incidents led to growing demand for secure telephones.
The practical availability of secure telephones is restricted by several factors; notably politics, export issues, incompatibility between different products (the devices on each side of the call have to use the same protocol), and high (though recently decreasing) price of the devices.
Well-known products
The best-known product on the US government market is the STU-III family. However, this system has now been replaced by the Secure Terminal Equipment (STE) and SCIP standards which defines specifications for the design of equipment to secure both data and voice. The SCIP standard was developed by the NSA and the US DOD to derive more interoperability between secure communication equipment. A new family of standard secure phones has been developed based on Philip Zimmermann's VoIP encryption standard ZRTP.
VoIP and direct connection phones
As the popularity of VoIP grows, secure telephony is becoming more widely used. Many major hardware and software providers offer it as a standard feature at no extra cost.
Examples include the Gizmo5 and Twinkle. Both of the former work with offerings from the founder of PGP, Phil Zimmermann, and his VoIP secure protocol, ZRTP. ZRTP is implemented in, amongst others, Ripcord Networks product SecurePC with up to NSA Suite B compliant Elliptic Curve math libraries. ZRTP is also being made available for mobile GSM CSD as a new standard for non-VoIP secure calls.
The U.S. National Security Agency is developing a secure phone based on Google's Android called Fishbowl.
Historically significant products
Scramblers were used to secure voice traffic during World War II, but were often intercepted and decoded due to scrambling's inherent insecurity. The first true secure telephone was SIGSALY, a massive device that weighed over 50 tons. The NSA, formed after World War II, developed a series of secure telephones, including the STU I, STU II and STU-III, as well as voice encryption devices for military telephones.
In 1989 an Irish company called Intrepid developed one of the most advanced secure phones. Called Milcode, the phone was the first to implement code-excited linear prediction (or CELP) which dramatically improved voice quality and user operability over previous LPC (Linear Predictive Coding) and LPC-10e versions.
Milcode also boasted significantly higher levels of security than previous secure telephones. The base model offered a proprietary encryption algorithm with a key length of 512 bits, and a more advanced model with a key length of 1024 bits. Key exchange used a public key, based on Diffie-Hellman, as opposed to a plug-in datakey. A new key was generated for each phone call. Milcode was also able to encrypt fax and data and was electromagnetically shielded to NATO TEMPEST standards.
Other products of historical significance are PGPfone and Nautilus (designed as a non-key escrow alternative to Clipper, now officially discontinued, but still available on SourceForge), SpeakFreely, and the security VoIP protocol wrapper Zfone developed by the creator of PGP.
Scrambling, generally using a form of voice inversion, was available from electronic hobbyist kit suppliers and is common on FRS radios. Analog scrambling is still used, as some telecommunications circuits, such as HF links and telephone lines in the developing world, are of very low quality.
See also
Microphone blocker
Mobile phone tracking
Secure Real-time Transport Protocol (SRTP)
SCIP
TETRA
A5/1
ZRTP
Secure voice
References
External links
Seminar on crypto phones by Zidu Wang
Cryptographic hardware
|
62363263
|
https://en.wikipedia.org/wiki/Christopher%20J.%20Hadnagy
|
Christopher J. Hadnagy
|
Christopher James Hadnagy is an American author, IT-entrepreneur and information technology security consultant. Hadnagy is known for IT security education and establishing Innocent Lives Foundation, an organization that helps tracking and identifying child trafficking. Hadnagy is a founder of Social-Engineer.Org, an information technology and educational organization in the field of computer security headquartered in Orlando, Florida. He is also an author of a number of publications such as Social-Engineering: The Art of Human Hacking and Unmasking the Social Engineer: The Human Element of Security.
Hadnagy currently serves as Professor of Social Engineering at the University of Arizona’s Center of Academic Excellence in Cyber Operations.
Career
In 2009, Hadnagy founded Social-Engineer, LLC. (2009), a company providing education and training courses in cyber security and defense against black hat hacking. The company's main focus has been on educating firms on the methods used by malicious attackers. The company has applied various methods of defending computer security systems in order to identify vulnerabilities and maintain sustainable levels of security. Hadnagy established the social engineering penetration testing framework, providing a repository of information for security professionals. The hub resources include The Social-Engineer.Org Podcast and The Social-Engineer newsletter.
Hadnagy also created a social engineering training course and certification, Advanced Practical Social Engineering, attended by law enforcement, military, and private sector professionals. Hadnagy is a graduate of Paul Ekman’s courses in microexpressions and holds certifications as an Offensive Security Certified Professional (OSCP) and an Offensive Security Wireless Professional (OSWP).
Handagy was banned from hacker conference DEF CON for code of conduct violations, per an announcement within the organization’s “Post DEF CON 29 Transparency Report”.
Community involvement and crime prevention against children
In 2017, Christopher Hadnagy founded Innocent Lives Foundation, an organization with the focus on preventing crimes against children, including child trafficking, pedophilia and child pornography production. The organization applies various security techniques such as seeking the assistance of information security specialists, utilizing date from open-source intelligence (OSINT) and collaborating with law enforcement. The foundation has been supported by a number of American public figures.
Bibliography
Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You, Christopher Hadnagy, Seth Schulman, 2021, Harper Business ()
Social Engineering: The Science of Human Hacking, Christopher Hadnagy, 2018, John Wiley & Sons Inc. ()
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious, by Christopher Hadnagy, Michele Fincher and Robin Dreeke, 2015, John Wiley & Sons Inc. ()
Unmasking the Social Engineer: The Human Element of Security, Christopher Hadnagy, 2014, John Wiley & Sons, Inc. ()
Social Engineering: The Art of Human Hacking, Christopher Hadnagy, 2010, Wiley Publishing, Inc. ()
Books reception
Hadnagy's books received generally positive reviews from the industry critics and reviewers. According to Ben Rothke from the Cybersecurity Canon: "Unmasking the Social Engineer: The Human Element of Security helps a reader to understand that "Ensuring that social engineering is part of the overall information security program is no longer an option".
Slashdot website concludes:"One can sum up all of Social Engineering: The Art of Human Hacking in two sentences from page 297, where author Christopher Hadnagy writes 'tools are an important aspect of social engineering, but they do not make the social engineer. A tool alone is useless; but the knowledge of how to leverage and utilize that tool is invaluable.' Far too many people think that information security and data protection is simply about running tools, without understanding how to use them. In this book, Hadnagy shows how crucial the human element is within information security'."
Maria Patricia Prandini from Isaca Journal Book Reviews praised the book Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails for detailed analysis of cyber security techniques and noticed that the book is available to a wide readership, and not only professionals in IT industry.
References
External links
Innocent Lives Foundation
American computer specialists
21st-century American male writers
Year of birth missing (living people)
Living people
Social engineering (computer security)
|
46407042
|
https://en.wikipedia.org/wiki/Identity%20Registration%20Protocol
|
Identity Registration Protocol
|
The Internet Assigned Numbers Authority (IANA) officially assigned TCP port 4604 to the Identity Registration Protocol (IRP) created by Sixscape Communications, Pte. Ltd. The assignment was issued by IANA on 17 March 2014, and is listed in the official IANA resource registry.
There are a very limited number of port numbers, which are assigned by IANA for protocols recognized as viable, complying with current protocol design standards, and not already covered by existing Internet standards. For example, port 25 was assigned to the SMTP email protocol many years ago. This establishes a standard and eliminates conflicts with other protocols. The technical review of IRP was performed by Lars Eggert, the distinguished chair of the Internet Research Task Force.
IRP was created by Lawrence E. Hughes, co-founder and CTO of Sixscape Communications, to allow applications to register their name, email address, UserID, their current IPv6 address and other information with the company's Domain Identity Registry server. IRP also supports all functions of a Public Key Infrastructure and an authenticated Address Registry. Sixscape's Domain Identity Registry server issues and manages X.509 client digital certificates for authentication and secure messaging. The Address Registry feature enables a new connectivity paradigm, called End2End Direct, in which user applications can connect directly to each other rather than via intermediary servers as is common with Client/Server architecture applications common on the older IPv4 Internet.
IRP is a streaming network protocol (TCP based, connection oriented). It is a Client/Server design with clearly defined server and client roles and implementations. It is secured with TLS v1.2 using the latest, strongest ciphersuites (e.g. Diffie Hellman Ephemeral for key exchange, AES256 for symmetric encryption and SHA2/384 for message digest). It does server to client authentication using an X.509 Server certificate, similar to web or email servers. It normally does client to server authentication with X.509 client certificates (usually obtained via IRP), with fallback to Username/Password Authentication (UPA) if needed. UPA can be disabled on a per-user basis. IRP protocol messages are valid XML documents.
References
External links
Official IANA resource registry
Data transmission
|
63860
|
https://en.wikipedia.org/wiki/Picture%20archiving%20and%20communication%20system
|
Picture archiving and communication system
|
A picture archiving and communication system (PACS) is a medical imaging technology which provides economical storage and convenient access to images from multiple modalities (source machine types). Electronic images and reports are transmitted digitally via PACS; this eliminates the need to manually file, retrieve, or transport film jackets, the folders used to store and protect X-ray film. The universal format for PACS image storage and transfer is DICOM (Digital Imaging and Communications in Medicine). Non-image data, such as scanned documents, may be incorporated using consumer industry standard formats like PDF (Portable Document Format), once encapsulated in DICOM. A PACS consists of four major components: The imaging modalities such as X-ray plain film (PF), computed tomography (CT) and magnetic resonance imaging (MRI), a secured network for the transmission of patient information, workstations for interpreting and reviewing images, and archives for the storage and retrieval of images and reports. Combined with available and emerging web technology, PACS has the ability to deliver timely and efficient access to images, interpretations, and related data. PACS reduces the physical and time barriers associated with traditional film-based image retrieval, distribution, and display.
Types of images
Most PACS handle images from various medical imaging instruments, including ultrasound (US), magnetic resonance (MR), Nuclear Medicine imaging, positron emission tomography (PET), computed tomography (CT), endoscopy (ES), mammograms (MG), digital radiography (DR), phosphor plate radiography, Histopathology, ophthalmology, etc. Additional types of image formats are always being added. Clinical areas beyond radiology; cardiology, oncology, gastroenterology, and even the laboratory are creating medical images that can be incorporated into PACS. (see DICOM Application areas).
Uses
PACS has four main uses:
Hard copy replacement: PACS replaces hard-copy based means of managing medical images, such as film archives. With the decreasing price of digital storage, PACS provide a growing cost and space advantage over film archives in addition to the instant access to prior images at the same institution. Digital copies are referred to as Soft-copy.
Remote access: It expands on the possibilities of conventional systems by providing capabilities of off-site viewing and reporting (distance education, telediagnosis). It enables practitioners in different physical locations to access the same information simultaneously for teleradiology.
Electronic image integration platform: PACS provides the electronic platform for radiology images interfacing with other medical automation systems such as Hospital Information System (HIS), Electronic Medical Record (EMR), Practice Management Software, and Radiology Information System (RIS).
Radiology Workflow Management: PACS is used by radiology personnel to manage the workflow of patient exams.
PACS is offered by virtually all the major medical imaging equipment manufacturers, medical IT companies and many independent software companies. Basic PACS software can be found free on the Internet.
Architecture
The architecture is the physical implementation of required functionality, or what one sees from the outside. There are different views, depending on the user. A radiologist typically sees a viewing station, a technologist a QA workstation, while a PACS administrator might spend most of their time in the climate-controlled computer room. The composite view is rather different for the various vendors.
Typically a PACS consists of a multitude of devices. The first step in typical PACS systems is the modality. Modalities are typically computed tomography (CT), ultrasound, nuclear medicine, positron emission tomography (PET), and magnetic resonance imaging (MRI). Depending on the facility's workflow most modalities send to a quality assurance (QA) workstation or sometimes called a PACS gateway. The QA workstation is a checkpoint to make sure patient demographics are correct as well as other important attributes of a study. If the study information is correct the images are passed to the archive for storage. The central storage device (archive) stores images and in some cases reports, measurements and other information that resides with the images. The next step in the PACS workflow is the reading workstations. The reading workstation is where the radiologist reviews the patient's study and formulates their diagnosis. Normally tied to the reading workstation is a reporting package that assists the radiologist with dictating the final report. Reporting software is optional and there are various ways in which doctors prefer to dictate their report. Ancillary to the workflow mentioned, there is normally CD/DVD authoring software used to burn patient studies for distribution to patients or referring physicians. The diagram above shows a typical workflow in most imaging centers and hospitals. Note that this section does not cover integration to a Radiology Information System, Hospital Information System and other such front-end system that relates to the PACS workflow.
More and more PACS include web-based interfaces to utilize the internet or a wide area network (WAN) as their means of communication, usually via VPN (Virtual Private Network) or SSL (Secure Sockets Layer). The clients side software may use ActiveX, JavaScript and/or a Java Applet. More robust PACS clients are full applications which can utilize the full resources of the computer they are executing on and are unaffected by the frequent unattended Web Browser and Java updates. As the need for distribution of images and reports becomes more widespread there is a push for PACS systems to support DICOM part 18 of the DICOM standard. Web Access to DICOM Objects (WADO) creates the necessary standard to expose images and reports over the web through truly portable medium. Without stepping outside the focus of the PACS architecture, WADO becomes the solution to cross platform capability and can increase the distribution of images and reports to referring physicians and patients.
PACS image backup is a critical, but sometimes overlooked, part of the PACS Architecture (see below). HIPAA requires that backup copies of patient images be made in case of image loss from the PACS. There are several methods of backing up the images, but they typically involve automatically sending copies of the images to a separate computer for storage, preferably off-site.
Querying (C-FIND) and Image (Instance) Retrieval (C-MOVE and C-GET)
The communication with the PACS server is done through DICOM messages that are similar to DICOM image "headers", but with different attributes. A query (C-FIND) is performed as follows:
The client establishes the network connection to the PACS server.
The client prepares a C-FIND request message which is a list of DICOM attributes.
The client fills in the C-FIND request message with the keys that should be matched. E.g. to query for a patient ID, the patient ID attribute is filled with the patient's ID.
The client creates empty (zero length) attributes for all the attributes it wishes to receive from the server. E.g. if the client wishes to receive an ID that it can use to receive images (see image retrieval) it should include a zero-length SOPInstanceUID (0008,0018) attribute in the C-FIND request messages.
The C-FIND request message is sent to the server.
The server sends back to the client a list of C-FIND response messages, each of which is also a list of DICOM attributes, populated with values for each match.
The client extracts the attributes that are of interest from the response messages objects.
Images (and other composite instances like Presentation States and Structured Reports) are then retrieved from a PACS server through either a C-MOVE or C-GET request, using the DICOM network protocol. Retrieval can be performed at the Study, Series or Image (instance) level. The C-MOVE request specifies where the retrieved instances should be sent (using separate C-STORE messages on one or more separate connections) with an identifier known as the destination Application Entity Title (AE Title). For a C-MOVE to work, the server must be configured with mapping of the AE Title to a TCP/IP address and port, and as a consequence the server must know in advance all the AE Titles that it will ever be requested to send images to. A C-GET, on the other hand, performs the C-STORE operations on the same connection as the request, and hence does not require that the "server" know the "client" TCP/IP address and port, and hence also works more easily through firewalls and with network address translation, environments in which the incoming TCP C-STORE connections required for C-MOVE may not get through. The difference between C-MOVE and C-GET is somewhat analogous to the difference between active and passive FTP. C-MOVE is most commonly used within enterprises and facilities, whereas C-GET is more practical between enterprises.
In addition to the traditional DICOM network services, particularly for cross-enterprise use, DICOM (and IHE) define other retrieval mechanisms, including WADO, WADO-WS and most recently WADO-RS.
Image archival and backup
Digital medical images are typically stored locally on a PACS for retrieval. It is important (and required in the United States by the Security Rule's Administrative Safeguards section of HIPAA) that facilities have a means of recovering images in the event of an error or disaster.
While each facility is different, the goal in image back-up is to make it automatic and as easy to administer as possible. The hope is that the copies won't be needed; however, disaster recovery and business continuity planning dictates that plans should include maintaining copies of data even when an entire site is temporarily or permanently lost.
Ideally, copies of images should be maintained in several locations, including off-site to provide disaster recovery capabilities. In general, PACS data is no different than other business critical data and should be protected with multiple copies at multiple locations. As PACS data can be considered protected health information (PHI), regulations may apply, most notably HIPAA and HIPAA Hi-Tech requirements.
Images may be stored both locally and remotely on off-line media such as disk, tape or optical media. The use of storage systems, using modern data protection technologies has become increasingly common, particularly for larger organizations with greater capacity and performance requirements. Storage systems may be configured and attached to the PACS server in various ways, either as Direct-Attached Storage (DAS), Network-attached storage (NAS), or via a Storage Area Network (SAN). However the storage is attached, enterprise storage systems commonly utilize RAID and other technologies to provide high availability and fault tolerance to protect against failures. In the event that it is necessary to reconstruct a PACS partially or completely, some means of rapidly transferring data back to the PACS is required, preferably while the PACS continues to operate.
Modern data storage replication technologies may be applied to PACS information, including the creation of local copies via point-in-time copy for locally protected copies, along with complete copies of data on separate repositories including disk and tape based systems. Remote copies of data should be created, either by physically moving tapes off-site, or copying data to remote storage systems. Whenever HIPAA protected data is moved, it should be encrypted, which includes sending via physical tape or replication technologies over WAN to a secondary location.
Other options for creating copies of PACS data include removable media (hard drives, DVDs or other media that can hold many patients' images) that is physically transferred off-site. HIPAA HITECH mandates encryption of stored data in many instances or other security mechanisms to avoid penalties for failure to comply.
The back-up infrastructure may also be capable of supporting the migration of images to a new PACS. Due to the high volume of images that need to be archived many rad centers are migrating their systems to a Cloud-based PACS.
Integration
A full PACS should provide a single point of access for images and their associated data. That is, it should support all digital modalities, in all departments, throughout the enterprise.
However, until PACS penetration is complete, individual islands of digital imaging not yet connected to a central PACS may exist. These may take the form of a localized, modality-specific network of modalities, workstations and storage (a so-called "mini-PACS"), or may consist of a small cluster of modalities directly connected to reading workstations without long term storage or management. Such systems are also often not connected to the departmental information system. Historically, Ultrasound, Nuclear Medicine and Cardiology Cath Labs are often departments that adopt such an approach.
More recently, Full Field digital mammography (FFDM) has taken a similar approach, largely because of the large image size, highly specialized reading workflow and display requirements, and intervention by regulators. The rapid deployment of FFDM in the US following the DMIST study has led to the integration of Digital Mammography and PACS becoming more commonplace.
All PACS, whether they span the entire enterprise or are localized within a department, should also interface with existing hospital information systems: Hospital information system (HIS) and Radiology Information System (RIS).
There are several data flowing into PACS as inputs for next procedures and back to HIS as results corresponding inputs:
In: Patient Identification and Orders for examination. These data are sent from HIS to RIS via integration interface, in most of hospital, via HL7 protocol. Patient ID and Orders will be sent to Modality (CT,MR,etc) via DICOM protocol (Worklist). Images will be created after images scanning and then forwarded to PACS Server. Diagnosis Report is created based on the images retrieved for presenting from PACS Server by physician/radiologist and then saved to RIS System.
Out: Diagnosis Report and Images created accordingly. Diagnosis Report is sent back to HIS via HL7 usually and Images are sent back to HIS via DICOM usually if there is a DICOM Viewer integrated with HIS in hospitals (In most of cases, Clinical Physician gets reminder of Diagnosis Report coming and then queries images from PACS Server).
Interfacing between multiple systems provides a more consistent and more reliable dataset:
Less risk of entering an incorrect patient ID for a study – modalities that support DICOM worklists can retrieve identifying patient information (patient name, patient number, accession number) for upcoming cases and present that to the technologist, preventing data entry errors during acquisition. Once the acquisition is complete, the PACS can compare the embedded image data with a list of scheduled studies from RIS, and can flag a warning if the image data does not match a scheduled study.
Data saved in the PACS can be tagged with unique patient identifiers (such as a social security number or NHS number) obtained from HIS. Providing a robust method of merging datasets from multiple hospitals, even where the different centers use different ID systems internally.
An interface can also improve workflow patterns:
When a study has been reported by a radiologist the PACS can mark it as read. This avoids needless double-reading. The report can be attached to the images and be viewable via a single interface.
Improved use of online storage and nearline storage in the image archive. The PACS can obtain lists of appointments and admissions in advance, allowing images to be pre-fetched from off-line storage or near-line storage onto online disk storage.
Recognition of the importance of integration has led a number of suppliers to develop fully integrated RIS/PACS. These may offer a number of advanced features:
Dictation of reports can be integrated into a single system. Integrated speech-to-text voice recognition software may be used to create and upload a report to the patient's chart within minutes of the patient's scan, or the reporting physician may dictate their findings into a phone system or voice recorder. That recording may be automatically sent to a transcript writer's workstation for typing, but it can also be made available for access by physicians, avoiding typing delays for urgent results, or retained in case of typing error.
Provides a single tool for quality control and audit purposes. Rejected images can be tagged, allowing later analysis (as may be required under radiation protection legislation). Workloads and turn-around time can be reported automatically for management purposes.
Acceptance testing
The PACS installation process is complicated requiring time, resources, planning, and testing. Installation is not complete until the acceptance test is passed. Acceptance testing of a new installation is a vital step to assure user compliance, functionality, and especially clinical safety. Take for example the Therac-25, a radiation medical device involved in accidents in which patients were given massive overdoses of radiation, due to unverified software control.
The acceptance test determines whether the PACS is ready for clinical use and marks the warranty timeline while serving as a payment milestone. The test process varies in time requirements depending on facility size but contract condition of 30-day time limit is not unusual. It requires detailed planning and development of testing criteria prior to writing the contract. It is a joint process requiring defined test protocols and benchmarks.
Testing uncovers deficiencies. A study determined that the most frequently cited deficiencies were the most costly components. Failures ranked from most-to-least common are: Workstation; HIS/RIS/ACS broker interfaces; RIS; Computer Monitors; Web-based image distribution system; Modality interfaces; Archive devices; Maintenance; Training; Network; DICOM; Teleradiology; Security; Film digitizer.
History
One of the first basic PACS was created in 1972 by Dr Richard J. Steckel.
The principles of PACS were first discussed at meetings of radiologists in 1982. Various people are credited with the coinage of the term PACS. Cardiovascular radiologist Dr Andre Duerinckx reported in 1983 that he had first used the term in 1981. Dr Samuel Dwyer, though, credits Dr Judith M. Prewitt for introducing the term.
Dr Harold Glass, a medical physicist working in London in the early 1990s secured UK Government funding and managed the project over many years which transformed Hammersmith Hospital in London as the first filmless hospital in the United Kingdom. Dr Glass died a few months after the project came live but is credited with being one of the pioneers of PACS.
The first large-scale PACS installation was in 1982 at the University of Kansas, Kansas City. This first installation became more of a teaching experience of what not to do rather than what to do in a PACS installation.
Regulatory concerns
In the US PACS are classified as Medical Devices, and hence if for sale are regulated by the USFDA. In general they are subject to Class 2 controls and hence require a 510(k), though individual PACS components may be subject to less stringent general controls. Some specific applications, such as the use for primary mammography interpretation, are additionally regulated within the scope of the Mammography Quality Standards Act.
The Society for Imaging Informatics in Medicine (SIIM) is the worldwide professional and trade organization that provides an annual meeting and a peer-reviewed journal to promote research and education about PACS and related digital topics.
See also
DICOM
Electronic Health Record (EHR)
Electronic Medical Record (EMR)
Enterprise Imaging
Medical device
Medical image sharing
Medical imaging
Medical software
Radiographer
Radiology
Radiology Information System
Teleradiology
Vendor Neutral Archive (VNA)
Visible Light Imaging
X-ray
References
Citations
Sources
External links
PACS History Web Site
USC IPILab Research Article on Backup
Medical imaging
Electronic health records
|
23526077
|
https://en.wikipedia.org/wiki/X/Open%20Transport%20Interface
|
X/Open Transport Interface
|
The X/Open Transport Interface (XTI) is an Open Group specification for network application programming present in UNIX System V operating systems. It provides OSI transport layer services with protocol independence. Although Open Group considers this specification withdrawn, an implementation is part of the standard programming interfaces on modern UNIX System V operating systems where it is implemented using the STREAMS character input/output mechanism.
Overview
The X/Open Transport Interface is a specification that defines an independent transport-service interface for network applications. Programs using XTI can be run over a variety of transport providers, such as the Transmission Control Protocol (TCP), Xerox Network Systems (XNS), Systems Network Architecture (SNA), X.25, Asynchronous Transfer Mode (ATM) or any other transport layer provider that function at Layer 4 of the OSI Model.
XTI provides similar functionality as the Berkeley sockets interface, however it is protocol independent in contrast to the socket interface which is heavily biased toward the Internet Protocols. It is based on the UNIX System V Transport Layer Interface (TLI)., which is a transport service definition adhering to the Open Systems Interconnection (OSI) model.
XTI consists of a cooperating STREAMS module, link library application programming interface (API), header files, and the rules and restrictions elaborating how XTI processes work and interact.
Protocol independence
XTI is protocol independent. However, applications still need to be aware of the desired transport system in order to select it. Applications can achieve this transport protocol independence using the Network Selection Facilities also provided by the XTI/TLI library (libnsl).
Sockets-to-XTI/TLI equivalents
Although XTI/TLI is similar to the BSD socket interface, neither is included or includes the other one and several
functions having the same role have different behavior. Both, the TLI and BSD sockets interfaces in UNIX SVR 3 and SVR 4 operating systems releases are implemented using the same underlying STREAMS Transport Service Interface.
The following table shows approximate equivalence between the POSIX XTI and sockets interfaces:
To ascertain the proper sequence of library function calls, XTI/TLI uses state indicators, in a similar manner to the sockets API. However, some socket API functions can be called from multiple states (e.g. sendmsg from unbound state on connectionless socket, connect from unbound state on connection-oriented socket); whereas XTI API functions can only be issued from a specific and corresponding state (e.g. t_bind may only be issued from the unbound state, t_connect only from the bound state).
XTI/TLI Asynchronous Mode
Real-time XTI end user application will use XTI interface asynchronously (otherwise there are no guarantees about how long a call waiting for data will block). The set of functions is the same as synchronous calls but when initializing transport endpoint, O_NONBLOCK parameter is provided. XTI asynchronous mode permits end user application be notified about various events of file handles: connections indications requests, new data, time outs.
XTI refines TLI
XTI refines TLI, providing additional error messages, additional events to manage flow control and simplifies functions parameters (XTI always opens transport endpoints as read-write). Also, XTI checks the value of qlen to prevent blocking indefinitely when application issue t_listen. Additional utility functions have been added: t_strerror() and t_getprotaddr().
Implementations
The XTI library is found in UNIX System V but also has ports for other systems, such as OpenSS7 for Linux.
Notes
References
Programming Interfaces Guide - Sun Microsystems, Inc. September 2008
External links
Networking Services (XNS) Issue 5.2, The Open Group, January 2000
Issuer The Issuer of XTI Technical Standard
Introduction to Networking Technologies
Connections Oriented Example of a TCP communications using XTI interface.
Application programming interfaces
ja:Transport Layer Interface
|
13896696
|
https://en.wikipedia.org/wiki/Comparison%20of%20screencasting%20software
|
Comparison of screencasting software
|
This page provides a comparison of notable screencasting software, used to record activities on the computer screen. This software is commonly used for desktop recording, gameplay recording and video editing. Screencasting software is typically limited to streaming and recording desktop activity alone, in contrast with a software vision mixer, which has the capacity to mix and switch the output between various input streams.
Comparison by specification
Comparison by features
The following table compares features of screencasting software. The table has seven fields, as follows:
Product name: Product's name; sometime includes edition if a certain edition is targeted
Audio: Specifies whether the product supports recording audio commentary on the video
Entire desktop: Specifies whether product supports recording the entire desktop
OpenGL: Specifies whether the product supports recording from video games and software that employ OpenGL to render digital image
Direct3D: Specifies whether the product supports recording from video games or software that employ Direct3D to render digital image
Editing: Specifies whether the product supports editing recorded video at least to some small extent, such as cropping, trimming or splitting
Output: Specifies the file format in which the software saves the final video (audio output types are omitted)
See also
Comparison of webcam software
References
Screencasting software
Lists of software
|
37531091
|
https://en.wikipedia.org/wiki/2015%20in%20video%20games
|
2015 in video games
|
The year 2015 saw releases of numerous video games as well as a follow-up to Nintendo's portable 3DS console, the New Nintendo 3DS. Top-rated games originally released in 2015 included Metal Gear Solid V: The Phantom Pain, The Witcher 3: Wild Hunt, Bloodborne, Undertale, and Fallout 4. Sales of video games in 2015 reached $61 billion, according to analysis firm SuperData, an 8% increase from 2014. Of this, the largest sector was in computer game sales and subscription services, accounting for $32 billion. Mobile games revenues were at $25.1 billion, a 10% increase from 2014. Digital sales on consoles made up the remaining $4 billion.
In the United States, the Entertainment Software Association (ESA) and the NPD Group estimated total video game market revenues at $23.5 billion, a 5% increase from 2014. Of this, the total software market was $16.5 billion, with the NPD Group estimating retail sales subset at $13.1 billion. The ESA reported that there were 2,457 companies in the United States involved in developing or publishing video games that directly supported 65,678 workers (37,122 in developing, 28,556 in publishing) with about another 154,000 indirectly supporting the industry, such as through contracting or video game journalism. The total contribution to the US's gross national product from the industry was $11.7 billion.
In the United Kingdom, the total video game market was valued at nearly 4.2 billion, according to figures from Ukie and MCV. The largest segments were in digital software (£1.2 billion) and mobile games (£664 million), while sales of consoles dropped to £689 million.
Top-rated games
Major awards
Critically acclaimed titles
Metacritic (MC) and GameRankings (GR) are aggregators of video game journalism reviews.
Financial performance
Highest-grossing games
The following were 2015's top ten highest-grossing video games in terms of worldwide revenue (including physical sales, digital purchases, subscriptions, microtransactions, free-to-play and pay-to-play) across all platforms (including mobile, PC and console platforms). Three of the top ten highest-grossing games are published or owned by Tencent, including the top-grossing title League of Legends.
Best-selling games
Events
{| class="wikitable sortable"
|-
! Month
! Day(s)
! Event
|-
| rowspan="3"|January
| 7
| Zombie Studios, the creator of the Spec Ops series, was shut down.
|-
| 23–25
| PAX South 2015 held in Henry B. Gonzalez Convention Center
|-
| 30
| Sega continues reduction of western businesses and focus on digital that began in 2012.
|-
| rowspan="5"|February
| rowspan="2"|3
| Sony sold Sony Online Entertainment to Columbus Nova. The company was renamed into Daybreak Game Company.
|-
| Video game critic Joystiq was shut down by AOL.
|-
| 19
| Sega Networks, a subsidiary of Sega, acquired Demiurge Studios.
|-
| 20
| tri-Ace, the developer of Star Ocean and Valkyrie Profile, was acquired by Nepro Japan.
|-
| 25
| The website version of video game critic Computer and Video Games was merged into GamesRadar+ by Future plc.
|-
| rowspan="7"|March
| 2–6
| Game Developers Conference 2015 held in San Francisco, California.
|-
| 2–6
| Independent Games Festival held in San Francisco, California.
|-
| 4
| Electronic Arts shut down the headquarters of Maxis in Emeryville, which has created franchises such as SimCity and Spore.
|-
| 6–8
| PAX East 2015 held at the Boston Convention and Exhibition Center.
|-
| 12–14
| EGX Rezzed 2015 held at the Tobacco Dock, London.
|-
| 17
| Nintendo Co. Ltd. announced their affiliation with Japanese mobile game developer DeNA and Nintendo Switch, a new console.
|-
| 23
| Raven Software celebrated its 25th anniversary.
|-
| rowspan="6"|April
| 1
| Bandai Namco Games was renamed into Bandai Namco Entertainment.
|-
| 15
| 2K Australia, the developer of Borderlands: The Pre-Sequel was shut down by Take-Two Interactive.
|-
| 17
| Phil Harrison, the World Wide Corporate Vice President of Microsoft Studios departed from Microsoft.
|-
| 20
| Matthew Armstrong, creator of the Borderlands series, left Gearbox Software.
|-
| 27
| Following the cancellation of Silent Hills, Konami delisted itself from the New York Stock Exchange.
|-
| 30
| Services of OnLive were discontinued as the asset was acquired by Sony Computer Entertainment.
|-
| rowspan="3"|May
| 4
| Spark Unlimited, the developer of Lost Planet 3 and Call of Duty: Finest Hour was shut down.
|-
| 22
| BioWare celebrated its 20th anniversary.
|-
| 26
| Oskari Häkkinen, head of franchise development of Remedy Entertainment, left Remedy.
|-
| rowspan="11"|June
| 3
| CEO of Remedy Entertainment, Matias Myllyrinne, departed from the company for Wargaming.
|-
| 8
| Paul Sams replaced Ru Weerasuriya as Ready at Dawn's CEO.
|-
| 9
| Chris Avellone, co-founder of Obsidian Entertainment, departed from the company.
|-
| 11
| Housemarque celebrated its 20th anniversary.
|-
| 12
| Arc System Works purchased the rights to develop video games for the Double Dragon, River City Ransom, and Super Dodge Ball series from the now-defunct Technos.
|-
| 16–18
| E3 2015 held at the Los Angeles Convention Center.
|-
| 16
| Square Enix unveiled new studio Tokyo RPG Factory.
|-
| 21
| Tale of Tales, the developer of Sunset, was closed down.
|-
| 24
| People Can Fly, formerly Epic Games Poland, was split from Epic Games. It became an independent studio and acquired the Bulletstorm IP.
|-
| 29
| Disney Infinity publisher Disney Interactive was merged with Disney Consumer Products, the developer of Playmation to form a new division called "Disney Consumer Products and Interactive Media"
|-
| 30
| Club Nintendo was discontinued in North America.
|-
| rowspan="10"| July
| 4–5
| MineCon has been held at the ExCeL London Exhibition and Conference Centre.
|-
| 11
| Satoru Iwata, President and CEO of Nintendo, died at age 55.
|-
| 13
| Electronic Arts formed new studio called EA Motive. The studio is led by former Ubisoft director Jade Raymond.
|-
| 17–19
| SGC 2015 to be held at the Embassy Suites Frisco Hotel & Convention Centre.
|-
| 22
| John Smedley stepped down as Daybreak Game Company's President and CEO.
|-
| 23–26
| QuakeCon 2015 to be held in Dallas, Texas.
|-
| 27
| China's government fully lifts the ban on the sales of video game consoles within the country.
|-
| 27
| Razer Inc. acquired all the software assets of Ouya.
|-
| rowspan="2"| 29
| Windows 10 was released.
|-
| Yager Development filed for insolvency for its production division Yager Productions GmbH
|-
| rowspan="3"|August
| 5–9
| Gamescom 2015 was held in Cologne, Germany.
|-
| 21
| Remedy Entertainment celebrated its 20th anniversary.
|-
| 28–31
| PAX Prime to be held in Seattle, WA.
|-
| rowspan="8"|September
| 2
| 2015 GameStop Expo at The Venetian Las Vegas resort.
|-
| 14
| Tatsumi Kimishima is appointed president of Nintendo after the death of Satoru Iwata in July 2015. Nintendo EAD and Nintendo SPD was merged, forming Nintendo Entertainment Planning & Development.
|-
| 15
| Sony announced that Project Morpheus was renamed into PlayStation VR.
|-
| 17–20
| Tokyo Game Show 2015 at the Makuhari Messe in Tokyo.
|-
| 24
| Maxis was reassigned to the EA Mobile division of Electronic Arts.
|-
| 24–27
| EGX 2015 at the NEC in Birmingham, UK.
|-
| rowspan="2"|30
| Club Nintendo was discontinued in Europe and Japan.
|-
| Twisted Pixel Games was separated from Microsoft Studios and became an independent studio again.
|-
| rowspan="9"|October
| 2
| Microsoft purchased Havok from Intel.
|-
| 2-4
| EGS was held at Centro Banamex in Mexico City.
|-
| 3
| FiraxiCon was held by Firaxis Games at the Baltimore Convention Center in Maryland.
|-
| 6
| Ubisoft acquired The Crew'''s developer Ivory Tower.
|-
| 8-12
| Brasil Game Show 2015 held in Expo Center Norte, São Paulo
|-
| 11–13
| Firstlook festival 2015 at Jaarbeurs Utrecht in Utrecht, Netherlands.
|-
| 13
| Ubisoft acquired Longtail Studios and renamed it to Ubisoft Halifax.
|-
| 28
| Paris Games Week in Paris, France.
|-
| 29
| Paradox Interactive purchased White Wolf Publishing and all its assets, including World of Darkness and Vampire: The Masquerade from CCP Games.
|-
| rowspan="7"|November
| 2
| Activision Blizzard acquired Candy Crush Saga developer King for $5.9 billion.
|-
| 4
| Konami shuttered its Los Angeles division.
|-
| 6–7
| BlizzCon 2015 at Anaheim Convention Center in Anaheim, California.
|-
| rowspan="3"|6
| Activision Blizzard established a new TV and film studio Activision Blizzard Studios.
|-
| 2K China closed by Take-Two Interactive. Their next game, Borderlands Online was cancelled.
|-
| NCSoft launched a new mobile division named Iron Tiger.
|-
| 12–15
| G-STAR 2015 in Bexco, Busan, South Korea.
|-
| rowspan="9"|December
| 3
| The Game Awards 2015 held in Los Angeles, California.
|-
| 5–6
| PlayStation Experience 2015 held in San Francisco, California.
|-
| 7
| Flying Wild Hog opened a new studio in Cracow, Poland.
|-
| 9
| A new development studio was established by Bethesda Game Studios in Montreal.
|-
| 10
| Electronic Arts established Competitive Gaming Division, a new division headed by Peter Moore which focuses on ESports.
|-
| 11–13
| GaymerX held at the San Jose Marriott Convention Center in San Jose, California.
|-
| 12
| Gearbox Software opened new studio in Quebec.
|-
| rowspan="2"|16
| Crystal Dynamics' studio head Darrell Gallagher left the company.
|-
| Kojima Productions was reestablished as an independent studio headed by Hideo Kojima.
|}
Hardware releases
The list of game-related hardware released in 2015 in North America.
Series with new entries
Series with new installments in 2015 include Anno, Assassin's Creed, Batman: Arkham, Battlefield, Call of Duty, Disgaea, Dirt, Fallout, Fatal Frame, Five Nights at Freddy's, Forza Motorsport, Guitar Hero, Halo, Heroes of Might and Magic, Hotline Miami, Just Cause, King's Quest, Kirby, Magicka, Mario Party, Mario vs. Donkey Kong, Mario & Luigi, Metal Gear, Minecraft, Mortal Kombat, Need for Speed, OlliOlli, Resident Evil, Rock Band, StarCraft, Star Wars: Battlefront, Tales, The Witcher, Tomb Raider, Tom Clancy's Rainbow Six, Tony Hawk's Pro Skater, Total War, Toy Soldiers, Xenoblade Chronicles, Yakuza and Yoshi.
In addition, 2015 saw the introduction of several new properties, including Bloodborne, Dying Light, Evolve, Life Is Strange, Ori, Rocket League, Splatoon, Undertale, and Until Dawn.
Game releases
The list of games released in 2015 in North America.
January–March
April–June
July–September
October–December
Cancelled video games
Cancelled
Borderlands Online (Win)
Broforce (PSVita)
Dying Light (PS3, X360)
Furious 4 (Win, PS3, X360)
Galak-Z: The Dimensional (PSVita)
Gone Home (WiiU)
Human Element (Win, PS4, XBO)
Kaio: King of Pirates (3DS)
Mad Max (PS3, X360)
Mortal Kombat X (PS3, X360)
Project CARS (WiiU)
Scrolls (iOS)
Shadow Realms (Win)
Silent Hills (PS4)
The Black Glove (N/A)
On hold
Hellraid (PS4, XBO, Win)
Phantom Dust'' (Xbox One)
Notes
References
2015 in video gaming
Video games by year
|
9780918
|
https://en.wikipedia.org/wiki/Wait%20%28system%20call%29
|
Wait (system call)
|
In computer operating systems, a process (or task) may wait on another process to complete its execution. In most systems, a parent process can create an independently executing child process. The parent process may then issue a wait system call, which suspends the execution of the parent process while the child executes. When the child process terminates, it returns an exit status to the operating system, which is then returned to the waiting parent process. The parent process then resumes execution.
Modern operating systems also provide system calls that allow a process's thread to create other threads and wait for them to terminate ("join" them) in a similar fashion.
An operating system may provide variations of the wait call that allow a process to wait for any of its child processes to exit, or to wait for a single specific child process (identified by its process ID) to exit.
Some operating systems issue a signal (SIGCHLD) to the parent process when a child process terminates, notifying the parent process and allowing it to retrieve the child process's exit status.
The exit status returned by a child process typically indicates whether the process terminated normally or abnormally. For normal termination, this status also includes the exit code (usually an integer value) that the process returned to the system. During the first 20 years of UNIX, only the low 8 bits of the exit code have been available to the waiting parent. In 1989 with SVR4, a new call waitid has been introduced that returns all bits from the exit call in a structure called siginfo_t in the structure member si_status. Waitid is a mandatory part of the POSIX standard since 2001.
Zombies and orphans
When a child process terminates, it becomes a zombie process, and continues to exist as an entry in the system process table even though it is no longer an actively executing program. Under normal operation it will typically be immediately waited on by its parent, and then reaped by the system, reclaiming the resource (the process table entry). If a child is not waited on by its parent, it continues to consume this resource indefinitely, and thus is a resource leak. Such situations are typically handled with a special "reaper" process that locates zombies and retrieves their exit status, allowing the operating system to then deallocate their resources.
Conversely, a child process whose parent process terminates before it does becomes an orphan process. Such situations are typically handled with a special "root" (or "init") process, which is assigned as the new parent of a process when its parent process exits. This special process detects when an orphan process terminates and then retrieves its exit status, allowing the system to deallocate the terminated child process.
If a child process receives a signal, a waiting parent will then continue execution leaving an orphan process behind. Hence it is sometimes needed to check the argument set by wait, waitpid or waitid and, in the case that WIFSIGNALED is true, wait for the child process again to deallocate resources.
See also
exit (system call)
fork (system call)
Spawn (computing)
Wait (command)
References
Process (computing)
C POSIX library
System calls
|
11717542
|
https://en.wikipedia.org/wiki/Id%20Tech%205
|
Id Tech 5
|
id Tech 5 is a proprietary game engine developed by id Software. It follows its predecessors, id Tech 1, 2, 3 and 4, all of which have subsequently been published under the GNU General Public License. It was seen as a major advancement over id Tech 4. The engine was first demonstrated at the WWDC 2007 by John D. Carmack on an eight-core computer; however, the demo used only a single core with single-threaded OpenGL implementation running on a 512 MB 7000 class Quadro video card. id Tech 5 was first used in the video game Rage, followed by Wolfenstein: The New Order, The Evil Within and Wolfenstein: The Old Blood. It was followed up by id Tech 6.
Features
The initial demonstration of the engine featured 20 GB of texture data (using a more advanced MegaTexture approach called Virtual Texturing, which supports textures with resolutions up to 128,000 × 128,000 pixels), and a completely dynamic and changeable world. This technique allows the engine to automatically stream textures into memory as needed, meaning that developers need not concern themselves with memory restraints or texture limits. This has the advantage of simplifying the creation of content, by eliminating the need to adapt content for different platforms. The engine automatically optimizes resources for cross-platform development, making it possible to render the same models on different platforms, while creating them for only one platform, further simplifying cross-platform development.
One of the visually evident features the renderer included is a penumbra in the shadowing (soft edges), by using shadow maps. In contrast, id Tech 4, which featured volume-based shadows, had very sharply defined shadows. Numerous other advanced graphical effects such as various materials for lighting, high dynamic range rendering-centric effects, bloom, crepuscular rays (volumetric lighting), radiosity, soft particles, pixel shader effects, alpha to coverage, post processing, Screen Space Reflection, dynamic water surfaces, procedural animation, cloth simulation, depth of field, and motion blur, are contained. Multi-threaded processing on the CPU is done for many of its tasks, including rendering, game logic, AI, physics, and sound processing.
The engine comes with a content-creation tools package called id Studio, which is supposed to be much more user-friendly and polished than in earlier versions. Previously, content creation required artists to run various command-line tools beyond the level editor's own tools, while id Tech 5 allows for all work to be done 'in-engine'.
While id Software will be using the engine solely for creating shooter games, the engine also has the capability to operate outside of this genre. Steve Nix from id Software stated that "Not only do we think people can make games outside the action-shooter space with our technology, we encourage it. We'd actually like to see those games made."
Marketing and licensing
The engine was first publicly shown during the 2007 Apple Worldwide Developers Conference keynote address, then was later shown privately to an audience of potential licensees at E3 2007. The first public demonstration focusing exclusively on the engine took place at QuakeCon in the same year during the annual keynote held by John Carmack.
An interview with John Carmack, the lead graphics engine developer at id (at the time), indicated that like its predecessors, id Tech 5 would eventually be released as open-source. The move to open source would likely come many years after id Tech 5's release as a proprietary engine. At QuakeCon 2007, Carmack told LinuxGames that he would integrate as little proprietary software as possible into id Tech 5, as "eventually id Tech 5 is going to be open source also. This is still the law of the land at id, that the policy is that we’re not going to integrate stuff that’s going to make it impossible for us to do an eventual open source release." Carmack resigned from id in 2013, and no source code release followed the launch of id Tech 6 in 2016.
At QuakeCon 2010, id CEO Todd Hollenshead announced that while id Tech 5 could be shared with internal ZeniMax Media developers, the engine will not be available for external licensing. On November 10, 2010 it was announced that the first ZeniMax internal developer to work with the engine would be MachineGames.
Games using id Tech 5
Rage (2011) – id Software
Wolfenstein: The New Order (2014) – MachineGames
Wolfenstein: The Old Blood (2015) – MachineGames
The Evil Within (2014) – Tango Gameworks
See also
First-person shooter engine
id Tech 4
id Tech 6
List of game engines
References
External links
From Texture Virtualization to Massive Parallelization (SIGGRAPH 2009)
Timothee Besset's Blog post on possible porting to Linux
Media
2011 software
3D graphics software
Global illumination software
Id Tech
Proprietary software
Video game engines
Virtual reality
|
208356
|
https://en.wikipedia.org/wiki/Text%20file
|
Text file
|
A text file (sometimes spelled textfile; an old alternative name is flatfile) is a kind of computer file that is structured as a sequence of lines of electronic text. A text file exists stored as data within a computer file system. In operating systems such as CP/M and MS-DOS, where the operating system does not keep track of the file size in bytes, the end of a text file is denoted by placing one or more special characters, known as an end-of-file marker, as padding after the last line in a text file. On modern operating systems such as Microsoft Windows and Unix-like systems, text files do not contain any special EOF character, because file systems on those operating systems keep track of the file size in bytes. Most text files need to have end-of-line delimiters, which are done in a few different ways depending on operating system. Some operating systems with record-orientated file systems may not use new line delimiters and will primarily store text files with lines separated as fixed or variable length records.
"Text file" refers to a type of container, while plain text refers to a type of content.
At a generic level of description, there are two kinds of computer files: text files and binary files.
Data storage
Because of their simplicity, text files are commonly used for storage of information. They avoid some of the problems encountered with other file formats, such as endianness, padding bytes, or differences in the number of bytes in a machine word. Further, when data corruption occurs in a text file, it is often easier to recover and continue processing the remaining contents. A disadvantage of text files is that they usually have a low entropy, meaning that the information occupies more storage than is strictly necessary.
A simple text file may need no additional metadata (other than knowledge of its character set) to assist the reader in interpretation. A text file may contain no data at all, which is a case of zero-byte file.
Encoding
The ASCII character set is the most common compatible subset of character sets for English-language text files, and is generally assumed to be the default file format in many situations. It covers American English, but for the British Pound sign, the Euro sign, or characters used outside English, a richer character set must be used. In many systems, this is chosen based on the default locale setting on the computer it is read on. Prior to UTF-8, this was traditionally single-byte encodings (such as ISO-8859-1 through ISO-8859-16) for European languages and wide character encodings for Asian languages.
Because encodings necessarily have only a limited repertoire of characters, often very small, many are only usable to represent text in a limited subset of human languages. Unicode is an attempt to create a common standard for representing all known languages, and most known character sets are subsets of the very large Unicode character set. Although there are multiple character encodings available for Unicode, the most common is UTF-8, which has the advantage of being backwards-compatible with ASCII; that is, every ASCII text file is also a UTF-8 text file with identical meaning. UTF-8 also has the advantage that it is easily auto-detectable. Thus, a common operating mode of UTF-8 capable software, when opening files of unknown encoding, is to try UTF-8 first and fall back to a locale dependent legacy encoding when it definitely isn't UTF-8.
Formats
On most operating systems the name text file refers to file format that allows only plain text content with very little formatting (e.g., no bold or italic types). Such files can be viewed and edited on text terminals or in simple text editors. Text files usually have the MIME type text/plain, usually with additional information indicating an encoding.
Microsoft Windows text files
MS-DOS and Microsoft Windows use a common text file format, with each line of text separated by a two-character combination: carriage return (CR) and line feed (LF). It is common for the last line of text not to be terminated with a CR-LF marker, and many text editors (including Notepad) do not automatically insert one on the last line.
On Microsoft Windows operating systems, a file is regarded as a text file if the suffix of the name of the file (the "filename extension") is .txt. However, many other suffixes are used for text files with specific purposes. For example, source code for computer programs is usually kept in text files that have file name suffixes indicating the programming language in which the source is written.
Most Microsoft Windows text files use "ANSI", "OEM", "Unicode" or "UTF-8" encoding. What Microsoft Windows terminology calls "ANSI encodings" are usually single-byte ISO/IEC 8859 encodings (i.e. ANSI in the Microsoft Notepad menus is really "System Code Page", non-Unicode, legacy encoding), except for in locales such as Chinese, Japanese and Korean that require double-byte character sets. ANSI encodings were traditionally used as default system locales within Microsoft Windows, before the transition to Unicode. By contrast, OEM encodings, also known as DOS code pages, were defined by IBM for use in the original IBM PC text mode display system. They typically include graphical and line-drawing characters common in DOS applications. "Unicode"-encoded Microsoft Windows text files contain text in UTF-16 Unicode Transformation Format. Such files normally begin with Byte Order Mark (BOM), which communicates the endianness of the file content. Although UTF-8 does not suffer from endianness problems, many Microsoft Windows programs (i.e. Notepad) prepend the contents of UTF-8-encoded files with BOM, to differentiate UTF-8 encoding from other 8-bit encodings.
Unix text files
On Unix-like operating systems text files format is precisely described: POSIX defines a text file as a file that contains characters organized into zero or more lines, where lines are sequences of zero or more non-newline characters plus a terminating newline character, normally LF.
Additionally, POSIX defines a as a text file whose characters are printable or space or backspace according to regional rules. This excludes most control characters, which are not printable.
Apple Macintosh text files
Prior to the advent of macOS, the classic Mac OS system regarded the content of a file (the data fork) to be a text file when its resource fork indicated that the type of the file was "TEXT". Lines of Macintosh text files are terminated with CR characters.
Being certified Unix, macOS uses POSIX format for text files. Uniform Type Identifier (UTI) used for text files in macOS is "public.plain-text"; additional, more specific UTIs are: "public.utf8-plain-text" for utf-8-encoded text, "public.utf16-external-plain-text" and "public.utf16-plain-text" for utf-16-encoded text and "com.apple.traditional-mac-plain-text" for classic Mac OS text files.
Rendering
When opened by a text editor, human-readable content is presented to the user. This often consists of the file's plain text visible to the user. Depending on the application, control codes may be rendered either as literal instructions acted upon by the editor, or as visible escape characters that can be edited as plain text. Though there may be plain text in a text file, control characters within the file (especially the end-of-file character) can render the plain text unseen by a particular method.
See also
ASCII
EBCDIC
Filename extension
List of file formats
Newline
Syntax highlighting
Text editor
Unicode
Notes and references
External links
C2: the Power of Plain Text
Computer data
|
5645723
|
https://en.wikipedia.org/wiki/Gorky%2017
|
Gorky 17
|
Gorky 17 (released as Odium in North America) is a turn-based tactics tactical role-playing game developed by Polish studio Metropolis Software and published by Monolith Productions for Microsoft Windows in 1999. The game was later ported to Linux by Hyperion Entertainment and published by Linux Game Publishing in 2006. The AmigaOS 4 version was released in 2015.
Gameplay
The game features two modes: In the real-time 'exploration' mode, the player controls game characters using a mouse in a point-and-click manner to navigate the player characters through the city as well as interacting with various objects in the game world. Combat takes place in preset encounters located in specific areas of each level map. In the combat mode, the screen is divided into squares with player and computer-controlled characters taking turns trying to eliminate the opposing party. In one turn each game character can move by a certain number of squares and use a weapon once, or decide to take cover instead. Weapons have different tactical effects, for example the pistol can only be fired orthogonally, while the rifle can be fired orthogonally and diagonally. The game ends if any player-controlled character dies.
Plot
The player commands a small group of NATO operatives who must reveal the mystery behind the sudden appearance of hybrid creatures in a former Soviet military base at a small Polish town near Lubin. The area is surrounded by NATO troops and media from all over the world, and the first group sent into town disappears without a trace. The main hero of the story is the 40-year-old Canadian soldier Cole Sullivan, a commando team member with extensive scientific knowledge. His team's task is to explain the hybrids' presence and to find the missing members of Group One.
Development and release
Work on the game began at least as early as 1997, at which time it was known only by the working title "Haunted City" (which Adrian Chmielarz of Metropolis Software clarified has almost nothing to do with the game and "just somehow stuck"). The game was rendered entirely using Real3D.
The developers debated over whether combat in the game should be realtime, turn-based, or a combination of both.
Hyperion Entertainment also announced an AmigaOS 4 version of the game, but nothing was heard of the port since then. At the Amiga30th Anniversary Dinner in 2015 the AmigaOS version was finally demonstrated in a near finished state with an estimated release of Christmas 2015.
Reception
The PC version received above-average reviews according to the review aggregation website GameRankings.
IGN rated the game as "decent", highlighting the mix of turn-based strategy, adventure and RPG genres. Graphically, "the environments themselves are nicely drawn, character animations are very fluid, and the atmosphere presented is ultimately quite captivating." Criticisms included the lack of a line-of-sight mechanic and some interface flaws. Eric Bratcher of NextGen called it "A groundbreaking title kept from four-star status only by the at-times unwieldy mechanics and some minimal balance issues."
Sequels
Gorky Zero: Beyond Honor is a third-person isometric stealth action game. The story serves as a prequel to Gorky 17. The game was published in North America and the United Kingdom by JoWooD Entertainment.
Gorky Zero 2: Aurora Watching is a third-person stealth action game, and a sequel to Gorky Zero. The game was published in North America by Dreamcatcher Interactive as Soldier Elite, and in Europe by Enlight Software as Aurora Watching. The English translation ignores all ties to the previous Gorky titles, for example changing the protagonist's name from Cole Sullivan to White Fox. The English language story concerns the protagonist infiltrating a secret Russian base where scientists are developing enhanced human soldiers called "Crazy Ivans".
References
External links
Official website
1999 video games
AmigaOS 4 games
Linux games
MacOS games
Monolith Productions games
Post-apocalyptic video games
Tactical role-playing video games
Video games developed in Poland
Video games set in 2008
Video games set in Poland
Windows games
Biopunk
|
182837
|
https://en.wikipedia.org/wiki/Pattern%20language
|
Pattern language
|
A pattern language is an organized and coherent set of patterns, each of which describes a problem and the core of a solution that can be used in many ways within a specific field of expertise. The term was coined by architect Christopher Alexander and popularized by his 1977 book A Pattern Language.
A pattern language can also be an attempt to express the deeper wisdom of what brings aliveness within a particular field of human endeavor, through a set of interconnected patterns. Aliveness is one placeholder term for "the quality that has no name": a sense of wholeness, spirit, or grace, that while of varying form, is precise and empirically verifiable. Alexander claims that ordinary people can use this design approach to successfully solve very large, complex design problems.
What is a pattern?
When a designer designs something – whether a house, computer program, or lamp – they must make many decisions about how to solve problems. A single problem is documented with its typical place (the syntax), and use (the grammar) with the most common and recognized good solution seen in the wild, like the examples seen in dictionaries. Each such entry is a single design pattern. Each pattern has a name, a descriptive entry, and some cross-references, much like a dictionary entry. A documented pattern should explain why that solution is good in the pattern's contexts.
Elemental or universal patterns such as "door" or "partnership" are versatile ideals of design, either as found in experience or for use as components in practice, explicitly described as holistic resolutions of the forces in recurrent contexts and circumstances, whether in architecture, medicine, software development or governance, etc. Patterns might be invented or found and studied, such as the naturally occurring patterns of design that characterize human environments.
Like all languages, a pattern language has vocabulary, syntax, and grammar – but a pattern language applies to some complex activity other than communication. In pattern languages for design, the parts break down in this way:
The language description – the vocabulary – is a collection of named, described solutions to problems in a field of interest. These are called design patterns. So, for example, the language for architecture describes items like: settlements, buildings, rooms, windows, latches, etc.
Each solution includes syntax, a description that shows where the solution fits in a larger, more comprehensive or more abstract design. This automatically links the solution into a web of other needed solutions. For example, rooms have ways to get light, and ways to get people in and out.
The solution includes grammar that describes how the solution solves a problem or produces a benefit. So, if the benefit is unneeded, the solution is not used. Perhaps that part of the design can be left empty to save money or other resources; if people do not need to wait to enter a room, a simple doorway can replace a waiting room.
In the language description, grammar and syntax cross index (often with a literal alphabetic index of pattern names) to other named solutions, so the designer can quickly think from one solution to related, needed solutions, and document them in a logical way. In Christopher Alexander's book A Pattern Language, the patterns are in decreasing order by size, with a separate alphabetic index.
The web of relationships in the index of the language provides many paths through the design process.
This simplifies the design work because designers can start the process from any part of the problem they understand and work toward the unknown parts. At the same time, if the pattern language has worked well for many projects, there is reason to believe that even a designer who does not completely understand the design problem at first will complete the design process, and the result will be usable. For example, skiers coming inside must shed snow and store equipment. The messy snow and boot cleaners should stay outside. The equipment needs care, so the racks should be inside.
Many patterns form a language
Just as words must have grammatical and semantic relationships to each other in order to make a spoken language useful, design patterns must be related to each other in position and utility order to form a pattern language. Christopher Alexander's work describes a process of decomposition, in which the designer has a problem (perhaps a commercial assignment), selects a solution, then discovers new, smaller problems resulting from the larger solution. Occasionally, the smaller problems have no solution, and a different larger solution must be selected. Eventually all of the remaining design problems are small enough or routine enough to be solved by improvisation by the builders, and the "design" is done.
The actual organizational structure (hierarchical, iterative, etc.) is left to the discretion of the designer, depending on the problem. This explicitly lets a designer explore a design, starting from some small part. When this happens, it's common for a designer to realize that the problem is actually part of a larger solution. At this point, the design almost always becomes a better design.
In the language, therefore, each pattern has to indicate its relationships to other patterns and to the language as a whole. This gives the designer using the language a great deal of guidance about the related problems that must be solved.
The most difficult part of having an outside expert apply a pattern language is in fact to get a reliable, complete list of the problems to be solved. Of course, the people most familiar with the problems are the people that need a design. So, Alexander famously advocated on-site improvisation by concerned, empowered users, as a powerful way to form very workable large-scale initial solutions, maximizing the utility of a design, and minimizing the design rework. The desire to empower users of architecture was, in fact, what led Alexander to undertake a pattern language project for architecture in the first place.
Design problems in a context
An important aspect of design patterns is to identify and document the key ideas that make a good system different from a poor system (that may be a house, a computer program or an object of daily use), and to assist in the design of future systems. The idea expressed in a pattern should be general enough to be applied in very different systems within its context, but still specific enough to give constructive guidance.
The range of situations in which the problems and solutions addressed in a pattern apply is called its context. An important part in each pattern is to describe this context. Examples can further illustrate how the pattern applies to very different situation.
For instance, Alexander's pattern "A PLACE TO WAIT" addresses bus stops in the same way as waiting rooms in a surgery, while still proposing helpful and constructive solutions. The "Gang-of-Four" book Design Patterns by Gamma et al. proposes solutions that are independent of the programming language, and the program's application domain.
Still, the problems and solutions described in a pattern can vary in their level of abstraction and generality on the one side, and specificity on the other side. In the end this depends on the author's preferences. However, even a very abstract pattern will usually contain examples that are, by nature, absolutely concrete and specific.
Patterns can also vary in how far they are proven in the real world. Alexander gives each pattern a rating by zero, one or two stars, indicating how well they are proven in real-world examples. It is generally claimed that all patterns need at least some existing real-world examples. It is, however, conceivable to document yet unimplemented ideas in a pattern-like format.
The patterns in Alexander's book also vary in their level of scale – some describing how to build a town or neighbourhood, others dealing with individual buildings and the interior of rooms. Alexander sees the low-scale artifacts as constructive elements of the large-scale world, so they can be connected to a hierarchic network.
Balancing of forces
A pattern must characterize the problems that it is meant to solve, the context or situation where these problems arise, and the conditions under which the proposed solutions can be recommended.
Often these problems arise from a conflict of different interests or "forces". A pattern emerges as a dialogue that will then help to balance the forces and finally make a decision.
For instance, there could be a pattern suggesting a wireless telephone. The forces would be the need to communicate, and the need to get other things done at the same time (cooking, inspecting the bookshelf). A very specific pattern would be just "WIRELESS TELEPHONE". More general patterns would be "WIRELESS DEVICE" or "SECONDARY ACTIVITY", suggesting that a secondary activity (such as talking on the phone, or inspecting the pockets of your jeans) should not interfere with other activities.
Though quite unspecific in its context, the forces in the "SECONDARY ACTIVITY" pattern are very similar to those in "WIRELESS TELEPHONE". Thus, the competing forces can be seen as part of the essence of a design concept expressed in a pattern.
Patterns contain their own rationale
Usually a pattern contains a rationale referring to some given values. For Christopher Alexander, it is most important to think about the people who will come in contact with a piece of architecture. One of his key values is making these people feel more alive. He talks about the "quality without a name" (QWAN).
More generally, we could say that a good system should be accepted, welcomed and happily embraced as an enrichment of daily life by those who are meant to use it, or – even better – by all people it affects. For instance, when discussing a street café, Alexander discusses the possible desires of a guest, but also mentions people who just walk by.
The same thinking can be applied to technical devices such as telephones and cars, to social structures like a team working on a project, or to the user interface of a computer program. The qualities of a software system, for instance, could be rated by observing whether users spend their time enjoying or struggling with the system.
By focusing on the impacts on human life, we can identify patterns that are independent from changing technology, and thus find "timeless quality" (Alexander).
Generic structure and layout
Usually the author of a pattern language or collection chooses a generic structure for all the patterns it contains, breaking each into generic sections like context, problem statement, solution etc.
Christopher Alexander's patterns, for instance, each consist of a short name, a rating (up to two '*' symbols), a sensitizing picture, the context description, the problem statement, a longer part of text with examples and explanations, a solution statement, a sketch and further references. This structure and layout is sometimes referred to as the "Alexandrian form".
Alexander uses a special text layout to mark the different sections of his patterns. For instance, the problem statement and the solution statement are printed in bold font, the latter is always preceded by the "Therefore:" keyword. Some authors instead use explicit labels, which creates some degree of redundancy.
Meaningful names
When design is done by a team, pattern names will form a vocabulary they can share. This makes it necessary for pattern names to be easy to remember and highly descriptive. Some examples from Alexander's works are WINDOW PLACE (helps define where windows should go in a room) and A PLACE TO WAIT (helps define the characteristics of bus stops and hospital waiting rooms, for example).
Aggregation in an associative network (pattern language)
A pattern language, as conceived by Alexander, contains links from one pattern to another, so when trying to apply one pattern in a project, a designer is pushed to other patterns that are considered helpful in its context.
In Alexander's book, such links are collected in the "references" part, and echoed in the linked pattern's "context" part – thus the overall structure is a directed graph. A pattern that is linked to in the "references" usually addresses a problem of lower scale, that is suggested as a part of the higher-scale problem. For instance, the "PUBLIC OUTDOOR ROOM" pattern has a reference to "STAIR SEATS".
Even without the pattern description, these links, along with meaningful names, carry a message: When building a place outside where people can spend time ("PUBLIC OUTDOOR ROOM"), consider to surround it by stairs where people can sit ("STAIR SEATS"). If you are planning an office ("WORKSHOPS AND OFFICES"), consider to arrange workspaces in small groups ("SMALL WORKING GROUPS"). Alexander argues that the connections in the network can be considered even more meaningful than the text of the patterns themselves.
The links in Alexander's book clearly result in a hierarchic network. Alexander draws a parallel to the hierarchy of a grammar – that is one argument for him to speak of a pattern language.
The idea of linking is generally accepted among pattern authors, though the semantic rationale behind the links may vary. Some authors, however, like Gamma et al. in Design Patterns, make only little use of pattern linking – possibly because it did not make that much sense for their collection of patterns. In such a case we would speak of a pattern catalogue rather than a pattern language.
Usage
Alexander encouraged people who used his system to expand his language with patterns of their own. In order to enable this, his books do not focus strictly on architecture or civil engineering; he also explains the general method of pattern languages. The original concept for the book A Pattern Language was that it would be published in the form of a 3-ring binder, so that pages could easily be added later; this proved impractical in publishing. The pattern language approach has been used to document expertise in diverse fields. Some examples are architectural patterns, computer science patterns, interaction design patterns, pedagogical patterns, pattern gardening, social action patterns, and group facilitation patterns. The pattern language approach has also been recommended as a way to promote civic intelligence by helping to coordinate actions for diverse people and communities who are working together on significant shared problems. Alexander's specifications for using pattern languages as well as creating new ones remain influential, and his books are referenced for style by experts in unrelated fields.
It is important to note that notations such as UML or the flowchart symbol collection are not pattern languages. They could more closely be compared to an alphabet: their symbols could be used to document a pattern language, but they are not a language by themselves. A recipe or other sequential set of steps to be followed, with only one correct path from start to finish, is also not a pattern language. However, the process of designing a new recipe might benefit from the use of a pattern language.
Simple example of a pattern
Name: ChocolateChipRatio
Context: You are baking chocolate chip cookies in small batches for family and friends
Consider these patterns first: SugarRatio, FlourRatio, EggRatio
Problem: Determine the optimum ratio of chocolate chips to cookie dough
Solution: Observe that most people consider chocolate to be the best part of the chocolate chip cookie. Also observe that too much chocolate may prevent the cookie from holding together, decreasing its appeal. Since you are cooking in small batches, cost is not a consideration. Therefore, use the maximum amount of chocolate chips that results in a really sturdy cookie.
Consider next: NutRatio or CookingTime or FreezingMethod
Origin
Christopher Alexander, an architect and author, coined the term pattern language. He used it to refer to common problems of the design and construction of buildings and towns and how they should be solved. The solutions proposed in the book include suggestions ranging from how cities and towns should be structured to where windows should be placed in a room.
The framework and philosophy of the "pattern language" approach was initially popularized in the book A Pattern Language that was written by Christopher Alexander and five colleagues at the Center for Environmental Structure in Berkeley, California in the late 1970s. While A Pattern Language contains 253 "patterns" from the first pattern, "Independent Regions" (the most general) to the last, "Things from Your Life", Alexander's book The Timeless Way of Building goes into more depth about the motivation and purpose of the work. The following definitions of "pattern" and "pattern language" are paraphrased from A Pattern Language:
"A pattern is a careful description of a perennial solution to a recurring problem within a building context, describing one of the configurations that brings life to a building. Each pattern describes a problem that occurs over and over again in our environment, and then describes the core solution to that problem, in such a way that you can use the solution a million times over, without ever doing it the same way twice."
A pattern language is a network of patterns that call upon one another. Patterns help us remember insights and knowledge about design and can be used in combination to create solutions.
Application domains
Christopher Alexander's idea has been adopted in other disciplines, often much more heavily than the original application of patterns to architecture as depicted in the book A Pattern Language. Examples since the 1990s include software design patterns in software engineering and, more generally, architectural patterns in computer science, as well as interaction design patterns. Since the late 1990s, pedagogical patterns have been used to document good practices in teaching. Since at least the mid-2000s, the idea of pattern language was introduced into systems architecture design. The book Liberating Voices: A Pattern Language for Communication Revolution, containing 136 patterns for using information and communication to promote sustainability, democracy and positive social change, was published in 2008 along with a website containing even more patterns. The deck "Group Works: A Pattern Language for Bringing Life to Meetings and Other Gatherings" was published in 2011. The idea of a pattern language has also been applied in permaculture design.
Ward Cunningham, the inventor of wiki, coauthored a paper with Michael Mehaffy arguing that there are deep relationships between wikis and pattern languages, and that wikis "were in fact developed as tools to facilitate efficient sharing and modifying of patterns".
See also
Feng shui
Method engineering
Modular design
Modularity
Complementary architecture
Rule of thumb
Shearing layers
Systems theory
Typology (urban planning and architecture)
References
Further reading
Christopher Alexander, Sara Ishikawa, Murray Silverstein (1974). 'A Collection of Patterns which Generate Multi-Service Centres' in Declan and Margrit Kennedy (eds.): The Inner City. Architects Year Book 14, Elek, London. .
Alexander, C. (1977). A Pattern Language: Towns, Buildings, Construction. USA: Oxford University Press. .
Alexander, C. (1979). The Timeless Way of Building. USA: Oxford University Press. .
Schuler, D. (2008). Liberating Voices: A Pattern Language for Communication Revolution. USA: MIT Press. .
Leitner, Helmut (2015): Pattern Theory: Introduction and Perspectives on the Tracks of Christopher Alexander. .
External links
About patterns in general
A Pattern Language for Pattern Writing by Gerard Meszaros and Jim Doble
Use of patterns for scenario development for large scale aerospace projects
Lean Startup Business Model Pattern
What Is a Quality Use Case? from the book Patterns for Effective Use Cases
Online pattern collections
patternlanguage.com, by the Center for Environmental Structure
Fused Grid – A Contemporary Urban Pattern "a collection and synthesis of neighbourhood patterns"
hcipatterns.org – Patterns for HCI
The Portland Pattern Repository
Group Works: A Pattern Language for Bringing Life to Meetings and Other Gatherings – A pattern language of group process
The Core Protocols – A set of team communication patterns
Liberating Voices! Pattern Language Project — Short versions of patterns available in Arabic, Chinese, and Spanish
Architectural theory
Cybernetics
Design
Knowledge representation
fi:Suunnittelumalli
|
57162135
|
https://en.wikipedia.org/wiki/Kathy%20Pham
|
Kathy Pham
|
Kathy Pham is a Vietnamese American computer scientist and product management executive. She has held roles in leadership, engineering, product management, and data science at Google, IBM, the Georgia Tech Research Institute, Harris Healthcare, and served as a founding product and engineering member of the United States Digital Service (USDS) in the Executive Office of the President of the United States at The White House. In 2021, Pham was named the Deputy Chief Technology Officer of the Federal Trade Commission.
Pham is a Fellow and Faculty member at the Harvard Kennedy School where she created and teaches Product Management and Society. She has held positions as Fellow at Mozilla, Fellow at the Rita Allen Foundation, and Fellow at the Harvard Berkman Klein Center where she co-founded the Ethical Tech Group and was part of the Ethics and Governance of Artificial Intelligence Fellows in partnership with the MIT Media Lab. At Mozilla, Pham co-leads the Responsible Computer Science Challenge and co-founded the Mozilla Fix the Internet Incubator. Pham founded Product and Society, which focuses on product management, ethics, and the public interest. Pham has been part of a championship StarCraft II team, and placed 1st the Imagine Cup competition, representing the United States with a sentiment analysis (EmotionAI) engine.
Early life and education
Pham’s parents were Vietnamese boat people, who spent several years in refugee camps before immigrating to the United States. Her brother, United States Marine Corps Captain David Pham, was presented the Purple Heart medal during combat operations in Afghanistan.
Pham attended Windsor Forest High School in Savannah, Georgia where she was a member of the volleyball team and graduated as Salutatorian of her graduating class.
Pham earned a Bachelor of Science in Computer Science from the Georgia Institute of Technology. She also holds a Master of Science in Computer Science from both the Georgia Institute of Technology and Supélec, specializing in cryptography and human computer interaction. While in university, Pham was the chair of Georgia Tech's Women in Computing, director of technology at Phi Mu Fraternity, researcher in the Bio-Medical Informatics and Bio-Imaging Lab, and founded the southeast chapter of United for Sight.
Career
Pham began her career as a software engineer building flights simulation and healthcare interoperability software at the Georgia Tech Research Institute and Harris Healthcare. She then was a consultant and data scientist at IBM who focused on healthcare analytics. There, she also led IBM’s Employee Charitable Contribution Campaign and founded the After Hours Gaming League for StarCraft II with a team that made it to the league gaming finals. At Google, she held roles in product management, technical program management, and data science on Google Health, Google People Operations, and Google Search. She founded Google’s first Business Intelligence Summit, called SELECT*.
Pham left Google in 2014 to join and build the United States Digital Service, where she led and contributed to public services across the Veterans Affairs, Department of Defense, Precision Medicine Initiative, and Cancer Moonshot, spanning engineering, product management, and people operations. Pham was a guest speaker to the White House State of Science, Technology, Engineering, and Math (SoSTEM), following the State of the Union address in 2015.
Pham was a 2017-2019 Fellow, and now Affiliate, at Harvard University’s Berkman Klein Center for Internet and Society, where her research spans technology, policy, healthcare, artificial intelligence, and the social responsibility and ethics of the tech industry. As a member of the 2018 MIT Media Lab and Berkman Klein Center Assembly, Pham's work addressed the ethics and governance of Artificial Intelligence with a focus on community involvement and community voices, and she co-founded ai-in-the-loop. Pham teaches Product Management and Society at the Harvard Kennedy School of government.
From 2018 to 2021, at Mozilla, Pham was a Fellow and Co-Director of the Responsible Computer Science Challenge, where she also co-edited the Teaching Responsible Computing Playbook along with Atri Rudra. In 2020, Pham co-founded the Fix the Internet Incubator at Mozilla, supporting 50 teams and start-ups world-wide in the first year.
In 2021, Pham was named Deputy Chief Technology Officer of the Federal Trade Commission.
Pham is active with outreach and activism, and has been notable for bringing her infant daughter along for a keynote address prompting the hashtag #LittleKeynoteSpeaker. She works closely with immigrant communities to help navigate government services. Pham has served as an advisory board member of the Anita Borg Institute and the Make the Breast Pump Not Suck Initiative.
Pham is the founder and executive director of the Cancer Sidekick Foundation and the founder of the Boston Chapter of Women in Product. She coined the term Cancer Patient Sidekick.
Honors
Inducted into the Computing Hall of Fame at the Georgia Institute of Technology (2021)
Inaugural 40 under 40, Georgia Institute of Technology (2020)
Invited to give Commencement Class Day Farewell Lecturer, Harvard Kennedy School (2020)
Invited to give Commencement Speaker, Harvard University, Extension School (2019)
One of the youngest members to be inducted in the Georgia Tech Greek Hall of Fame. (2017)
First Lady Michelle Obama’s Guest to the 2015 State of the Union
Nguoi Viet’s 40 under 40
First Place, representing the United States in the international Imagine Cup “Olympics for Technology” competition with over 300,000 competitors.
Georgia Tech College of Computing’s Most Outstanding Junior
Finalist for the Anita Borg Memorial Scholarship
Salutatorian of Windsor Forest High School graduating class
References
External links
KathyPham.com
Profile at USDS.gov
Living people
Year of birth missing (living people)
American women computer scientists
American computer scientists
Artificial intelligence ethicists
Google employees
IBM employees
Berkman Fellows
Executive Office of the President of the United States
Georgia Tech alumni
Harvard Kennedy School faculty
American people of Vietnamese descent
Scientists from Georgia (U.S. state)
21st-century American women
|
20358463
|
https://en.wikipedia.org/wiki/Easy%20Java%20Simulations
|
Easy Java Simulations
|
Old name ""EJS"" Easy Java Simulations or new name since 2014 EJSS, or Easy JavaScript Simulations, is an open-source software tool, part of the Open Source Physics project, designed for the creation of discrete computer simulations.
A discrete computer simulation, or simply a computer simulation, is a computer program that tries to reproduce, for pedagogical or scientific purposes, a natural phenomenon through the visualization of the different states that it can have. Each of these states is described by a set of variables that change in time due to the iteration of a given algorithm.
In creating a simulation with the help of EJSS, the user does not program the simulation at the level of writing code, instead the user is working at a higher conceptual level, declaring and organizing the equations and other mathematical expressions that operate the simulation. EJSS handles the technical aspects of coding the simulation in the Java programming language, thus freeing the user to concentrate on the simulation's content.
The generated Java or JavaScript code can, in terms of efficiency and sophistication, be taken as the creation of a professional programmer.
EJSS is written in the Java programming language and the created simulation are in Java or JavaScript. Java Virtual Machines (JVM) are available for many different platforms; a platform for which a JVM is available can run Java programs. Though Java applets were popular before 2014, JavaScript Applets outputs can be run on almost any device now, including Android and iOS.
EJSS has its own format for storing the simulations, which is based on XML, EJS and EJSS and carries the extension .xml, .ejs and .ejss. It contains not only the code for the simulation, but also the rest of the things, like the html introduction.
References
Wolfgang Christian and Francisco Esquembre, Modeling Physics with Easy Java Simulations The Physics Teacher, Volume 45, Issue 8, November 2007, pp. 468–528
Francisco Esquembre, "Easy Java Simulations: a software tool to create scientific simulations in Java", Computer Physics Communications, Volume 156, Issue 2, 1 January 2004, Pages 199-204
Anne Cox, Computational Modeling in Intro Physics Labs: Tracker and EJS, 2009 American Association of Physics Teachers Summer Meeting
External links
Simulation software
Plotting software
Cross-platform software
Free software programmed in Java (programming language)
|
1205754
|
https://en.wikipedia.org/wiki/Z%20Application%20Assist%20Processor
|
Z Application Assist Processor
|
The IBM System z Application Assist Processor (zAAP), previously known as the zSeries Application Assist Processor, is a mainframe processor introduced by IBM in 2004. zAAP engines are dedicated to running specific Java and XML workloads under z/OS, accelerating performance. zAAPs are available for zSeries 990 and 890 servers and later zSeries and zEnterprise models. Beginning with the IBM z13, the zAAP functionality is integrated with zIIP processors (zAAP on zIIP).
Currently a zAAP engine contains the same underlying hardware as any other mainframe engine. However, IBM uses microcode to limit code execution to Java and XML workloads only. As with Integrated Facility for Linux (IFL) and zIIP, zAAPs are not specifically optimized to run Java faster or better. IBM does not change the "software model" or MSU rating on its mainframes with the installation of zAAPs. Consequently, IBM's customers do not incur software license charges for their zAAPs, reducing their costs of running Java- and XML-oriented applications. The number of zAAPs cannot exceed the number of central processors (CPs, general purpose engines) within a zSeries/z9 machine.
IBM made the zAAP feature (i.e. the microcode) generally available on June 30, 2004, although the required z/OS release was not generally available until September 24, 2004. zAAPs work with z/OS V1R6 and higher, and Java 1.4.1 and higher. IBM modified the z/OS dispatcher and Workload Manager (WLM) to switch pure Java workload to the dedicated engines. These modifications are completely transparent to Java applications. However, because Java must at least occasionally call native system services (I/O services, for example), some conventional processor (CP) capacity must be available to initiate and sustain a zAAP engine. Major software subsystems that could benefit from zAAP (i.e. that rely on Java workloads) include WebSphere Application Server, WebSphere Business Integration Server Foundation, WebSphere Process Server, WebSphere Message Broker, DB2, CICS Transaction Server, CICS Transaction Gateway, IMS, and (JZOS and z/OS UNIX System Services) Batch, among others. In 2007, IBM added zAAP support to the XML System Services for z/OS, so now products such as DB2 9 for z/OS can also take advantage of zAAPs for XML-related processing.
The first commercial production workload for zAAP began on September 1, 2004, at an undisclosed Midwestern U.S. insurance company performing claims processing. The company used Java 1.4.2, WebSphere Application Server Version 5.1, and a near-final z/OS V1R6 build on a zSeries 990 (2084-304/A08 with two zAAPs). This deployment is probably a mainframe record for speed of both development and adoption, since IBM only began its zAAP design project in 2003.
Support for zAAPs
Third-party independent software vendors (ISVs) have introduced support for execution of their products on zAAP Specialty Engines by using Java or XML Services toolkit from IBM.
For example, Ivory Server for z/OS and Ivory Server for CICS from GT Software, Inc. provide zAAP support for XML parsing using the optional IBM z/OS XML Services feature. The Ivory Server for Java will also take advantage of the zAAP in addition to supporting zIIP and the Integrated Facility for Linux (IFL).
See also
Integrated Facility for Linux (IFL)
zIIP
References
External links
IBM mainframe technology
Java enterprise platform
|
54550380
|
https://en.wikipedia.org/wiki/Charles%20O%27Bannon%20Jr.
|
Charles O'Bannon Jr.
|
Charles Edward O'Bannon Jr. (born March 1, 1999) is an American college basketball player for the TCU Horned Frogs of the Big 12 Conference. He previously played for the USC Trojans.
High school career
O'Bannon attended Bishop Gorman High School in Las Vegas, Nevada. He averaged 21.4 points as a senior at Bishop Gorman. In December 2016, he committed to the USC Trojans. He chose USC over UNLV, NC State, and UCLA.
College career
O'Bannon struggled with injuries during his two and a half seasons at USC. After suffering an injury to his left pinky finger that required surgery, he redshirted the 2018-19 season. O'Bannon injured his middle finger early in the following season and played three games. He played a total of 18 games at USC and averaged 1.8 points and 0.8 rebounds per game. In January 2020, O'Bannon transferred to TCU and was later granted a waiver for immediate eligibility.
Career statistics
College
|-
| style="text-align:left;"| 2017–18
| style="text-align:left;"| USC
| 14 || 0 || 5.1 || .217 || .125 || 1.000 || .6 || .1 || .3 || .0 || 1.3
|-
| style="text-align:left;"| 2018–19
| style="text-align:left;"| USC
| 1 || 0 || 10.0 || .000 || – || – || 1.0 || .0 || .0 || .0 || .0
|-
| style="text-align:left;"| 2019–20
| style="text-align:left;"| USC
| 3 || 0 || 6.3 || .000 || – || 1.000 || 1.3 || .3 || .7 || .0 || .7
|-
| style="text-align:left;"| 2020–21
| style="text-align:left;"| TCU
| 25 || 16 || 18.0 || .407 || .368 || .756 || 3.8 || .4 || .8 || .5 || 6.8
|- class="sortbottom"
| style="text-align:center;" colspan="2"| Career
| 43 || 16 || 12.8 || .366 || .345 || .800 || 2.6 || .3 || .6 || .3 || 4.4
Personal life
Chuck is the son of Charles O'Bannon and the nephew of Ed O'Bannon.
References
External links
TCU Horned Frogs bio
USC Trojans bio
USA Basketball bio
1999 births
Living people
American men's basketball players
Basketball players from Long Beach, California
Basketball players from Nevada
Bishop Gorman High School alumni
McDonald's High School All-Americans
Shooting guards
Small forwards
Sportspeople from Las Vegas
TCU Horned Frogs men's basketball players
USC Trojans men's basketball players
|
38255214
|
https://en.wikipedia.org/wiki/Capture%20NX
|
Capture NX
|
Capture NX is a photo editing computer program developed by Nik Software in partnership with Nikon for macOS and Microsoft Windows.
In September 2012, Google acquired Nik Software, but Capture NX has remained a Nikon software and is advertised as a Nikon product.
In July 2014, Nikon released a new software Capture NX-D to replace Capture NX 2. As such, Nikon D810 is the first camera to support only Capture NX-D. Capture NX-D was developed based on SILKYPIX Developer Studio and does not contain the U-Point technology from Nik Software.
Since February 2020, the current release of the software does not install on Windows 7 anymore.
Features of both Capture NX products
Complete raw image format support from import to export (for supported cameras), including Nikon's own RAW format NEF (Nikon Electronic File).
Non-destructive image editing.
Color management control with Soft Proofing.
Color Aberration Control, D-Lighting (High Speed/High Quality), Image Dust Off, Vignette Control and Fisheye-to-Rectilinear Image Transformation.
Noise Reduction: global or selective adjustments.
Color Balance, Contrast/Brightness, Saturation/Warmth.
Lens correction tools, such as chromatic aberration or distortion control.
Auto Retouch Brush, to remove blemishes and dust from images. (not in Capture NX-D V 1.0 but will be added later)
Shadow/Highlight Adjustment, to open up shadows or recover blown out highlights.
Improved Edit List, to apply common editings like auto color aberration, auto red-eye correction, vignette control, tone curves, contrast and highlight, exposure compensation and shadow protection.
Filters, Ratings and Sorting Toolbar.
Features of Capture NX-D only
All changes are saved to a Sidecar File in subfolder NKS_PARAM.
At this moment relatively low performance (for versions 1.0x - 1.3x) comparing to latest versions of Capture NX 2.4x
Features of Capture NX only
All changes are saved to the NEF file.
Color Control Point editing for hue, brightness and saturation.
Selection Control Points, selectively edit photographs without the need to manually outline or mask the area for editing.
Plug-In Interface for Nik Color Efex Pro
Ability to use Dust Off Reference photo created by some Nikon DSLR's to automatically remove dust from images
See also
Adobe Photoshop Lightroom
Aperture (software)
iPhoto
External links
Capture NX website
Nik Software website
Nikon Corporation website
References
Photo software
|
581638
|
https://en.wikipedia.org/wiki/Native%20%28computing%29
|
Native (computing)
|
In computing, native software or data-formats are those that were designed to run on a particular operating system. In a more technical sense, native code is code written specifically for a certain processor. In contrast, cross-platform software can be run on multiple operating systems and/or computer architectures.
For example, a Game Boy receives its software through a cartridge, which contains code that runs natively on the Game Boy. The only way to run this code on another processor is to use an emulator, which simulates an actual Game Boy. This usually comes at the cost of speed.
Applications
Something running on a computer natively means that it is running without any external layer requiring fewer software layers. For example, in Microsoft Windows the Native API is an application programming interface specific for Windows NT kernel, which can be used to give access to some kernel functions, which cannot be directly accessed through a more universal Windows API.
Operating systems
Used to designate the lowest level of virtualization or the absence of virtualization. For instance the term “Native VM” is used to ensure reference to the lowest level operating system, the one that actually maintains direct control of the hardware when multiple levels of virtualization occur.
Machine code
Machine code, also known as native code, is a program which is written in machine language. Machine code is usually considered the lowest level of code for a computer, that, in its lowest level form, is written in binary (0s and 1s), but is often written in hexadecimal or octal to make it a little easier to handle. These instruction sets are then interpreted by the computer. With this, there is no need for translation. machine code is strictly numerical and usually isn't what programmers program in, due to this complex nature. Machine code is also as close as you can get to the processor, so using this language, you are programming specifically for that processor as machine code for each processor may differ. Typically programmers will code in high-level languages such as C, C++, Pascal, (or other directly compiled languages) which gets translated into assembly code, which then translates it into machine code (or in most cases the compiler generates machine code directly). Since each CPU is different, programs need to be recompiled or rewritten in order to work on that CPU.
Data
Applied to data, native data formats or communication protocols are those supported by a certain computer hardware or software, with maximal consistency and minimal amount of additional components.
For example, EGA and VGA video adapters natively support code page 437. This does not preclude supporting other code pages, but it requires either a font uploading or using graphic modes.
References
Computer jargon
|
16469065
|
https://en.wikipedia.org/wiki/3451%20Mentor
|
3451 Mentor
|
3451 Mentor is a large Jupiter trojan from the Trojan camp, approximately in diameter. It was discovered on 19 April 1984, by Czech astronomer Antonín Mrkos at the Kleť Observatory in the Czech Republic. The uncommon Jovian X-type asteroid is one of the largest Jupiter trojans and has a rotation period of 7.7 hours. It was named after Mentor from Greek mythology.
Orbit and classification
Mentor is a large Jovian asteroid orbiting in the trailing Trojan camp at Jupiter's Lagrangian point, 60° behind its orbit in a 1:1 resonance . It is also a non-family asteroid of the Jovian background population.
It orbits the Sun at a distance of 4.8–5.5 AU once every 11 years and 8 months (4,254 days; semi-major axis of 5.14 AU). Its orbit has an eccentricity of 0.07 and an inclination of 25° with respect to the ecliptic. The asteroid was first observed as at Simeiz Observatory in April 1950. The body's observation arc begins at Crimea–Nauchnij in March 1983, one year prior to its official discovery observation at Klet.
Physical characteristics
Mentor is an X-type asteroid, according to the SMASS classification, the SDSS-based taxonomy and observations by Pan-STARRS. It has also been characterized as a primitive P-type asteroid by the Wide-field Infrared Survey Explorer (WISE), and as an assumed, carbonaceous C-type by the Collaborative Asteroid Lightcurve Link (CALL). Its V–I color index of 0.77 is notably lower than that of a Jovian D-type asteroid, which is the dominant spectral type among the Jupiter trojans (also see table below).
Rotation period
A large number of rotational lightcurves of Mentor have been obtained, since its first photometric observations by William Hartmann (1988). The first rotation period of hours with a brightness variation of was reported by Stefano Mottola, who observed Mentor in February 1993, using the former ESO 1-metre telescope at the La Silla Observatory in Chile (). Follow-up observations by Mottola at the Calar Alto Observatory in July 1998 gave a refined period of hours and an amplitude of magnitude ().
In 2006 and 2007, photometric observations of Mentor were made at the Roque de los Muchachos (7.68 and 7.682 h) and Oakley Observatory (7.70 h). Additional period determinations by Laurent Bernasconi (7.699 h) Federico Manzini (>6 h) and René Roy (7.727 and 7.6 h) were made between 2006 and 2010, and reported at Behrend's website. In 2012, observations in the R- and S-band at the Palomar Transient Factory gave a period of 7.694 and 7.677 hours ().
Follow-up observations by Daniel Coley and Robert Stephens at GMARS in 2010, and the Center for Solar System Studies during 2013–2017, measured four well-defined periods including and hours with a brightness amplitude of 0.46 and 0.21 magnitude, respectively ().
Diameter and albedo
According to the surveys carried out by the Japanese Akari satellite and the NEOWISE mission of NASA's WISE telescope, Mentor measures 117.91 and 126.29 kilometers in diameter and its surface has an albedo of 0.075 and 0.044, respectively. CALL assumes a standard albedo for a carbonaceous asteroid of 0.057 and calculates a diameter of 116.30 kilometers based on an absolute magnitude of 8.4. Mentor together with 624 Hektor and 884 Priamus are the three largest Jupiter trojans for which the Supplemental IRAS Minor Planet Survey (SIMPS), conducted by IRAS, provides no data (in the table below, placeholder figures from the LCDB are shown instead).
Naming
This minor planet was named by the discoverer from Greek mythology after Mentor, father of Imbrius and son of spearman Imbrus at Pedaseus. Mentor fought with the Trojans against the Greeks in the Trojan War. In Homer's Iliad, he was described as a man who was rich in horse. The official naming citation was published by the Minor Planet Center on 29 November 1993 ().
Notes
References
External links
Lightcurve Database Query (LCDB), at www.minorplanet.info
Dictionary of Minor Planet Names, Google books
Asteroids and comets rotation curves, CdR – Geneva Observatory, Raoul Behrend
Discovery Circumstances: Numbered Minor Planets (1)-(5000) – Minor Planet Center
003451
Discoveries by Antonín Mrkos
Minor planets named from Greek mythology
Named minor planets
003451
19840419
|
25258699
|
https://en.wikipedia.org/wiki/Systancia
|
Systancia
|
Systancia is a French software company that develops software for desktop and application virtualisation, cloud computing and remote access security solutions. It was founded in 1998 and is located in Sausheim, France.
Systancia acquired IPdiva, a security solutions provider at the end of 2013.
In 2012, Systancia received finance from the French Deposits and Consignments Fund (now known as BPI), for enabling accelerated conditions for its international development.
History
Systancia's earliest developments date back to 1998 with a view to creating new types of low-cost, multi-processor computers (Intel) providing administration for the remote execution of user applications on the most available servers and desktops thereby making redundant resources available to companies for the execution of their usual applications.
It entered Deloitte's 2010 Technology Fast 500 EMEA list, a ranking of the 500 fastest growing technology companies in EMEA, ranked Number 268.
Products
AppliDis - Application and desktop virtualization
Developed by Systancia, AppliDis is a virtualisation software that incorporates both application and desktop virtualization as a single product, with management through a single web console. The latest version, AppliDis Fusion 5, was released on 20 May 2015.
The application virtualization is based on Microsoft Windows Terminal Services (via the RDP - Remote Desktop Protocol). The desktop virtualization (also called Virtual Desktop or VDI - Virtual Desktop Infrastructure) is based on the exchange with different hypervisors such as ESX, VMware Vcenter, Citrix XenServer, Microsoft Hyper-V Server, Parallels Inc., Virtual Iron. AppliDis Fusion 4 is application transparent, meaning it can manage and virtualise all Windows applications and desktops ( Windows operating system: XP, Vista, Seven, Windows 8, Windows 10 or under Windows RDS).
AppliDis ezPrint - Printing by using a centralised environment
AppliDis ezPrint (formerly AppliDis Universal Printer) is a universal printing software ( local or remote connection, centralised or virtualised architecture) that allows the administration of user print options with a single printer on the server. It provides compression features that reduce the size of print files from application servers to local printers.
IPdiva Secure - External access protection, control and traceability
IPdiva Secure is a security software for all external access to IT system resources:
secure and monitored synchronisation to and from smartphones / mobiles (ActiveSync mode),
secure application and system access (VPN SSL portal mode),
secure Intranet access (Reverse proxy mode).
IPdiva Secure software is based on a distributed architecture:
IPdiva Server: acts as a centralised gatekeeper for external access requests:single point of entry to the sites hosting the systems or access to published applications, mutual authentication and access control, central repository for all traces of remote access.
IPdiva Gateway: acts as an interface between IPdiva Server and the applications, files or systems to be accessed remotely.
The communication is secured between IPdiva Server and IPdiva Gateway via an outgoing SSL server, without any intervention on the firewall or router in place.
IPdiva Care - Check and record: surveillance and video recording
IPdiva Care is security software that controls and records all actions (TSE/RDP VNC or SSH) carried out the sensitive servers.
References
External links
Systancia official website
Systancia France website
Software companies of France
Software companies established in 1998
Virtualization software
Remote desktop
Remote administration software
|
19926355
|
https://en.wikipedia.org/wiki/Norton%20PC%20Checkup
|
Norton PC Checkup
|
Norton PC Checkup was a program downloaded either separately or as a bundle with updates to Adobe Flash, provided to enable users to perform a system checkup of their Microsoft Windows based personal computers. It was launched by Symantec in October 2008.
The program has since been succeeded by Norton Live.
Criticism
This software was initially criticized by users for its similarity to various malware "virus removers", but a software fix was published by Symantec to resolve this problem.
This software was also installed on Toshiba Windows 7 laptops under the name of Toshiba Security Dashboard. The problem with this was, a user was unable to uninstall the software because there was no uninstaller in the program folder, and it wasn't even listed in Programs and Features. The solution was to uninstall the Toshiba Security Dashboard, thus uninstalling the Norton Product.
References
External links
Adobe software
NortonLifeLock software
|
18324048
|
https://en.wikipedia.org/wiki/John%20De%20Margheriti
|
John De Margheriti
|
John De Margheriti (born July 1962) is an Italian-born Australian electrical engineer, software developer and entrepreneur. De Margheriti is widely seen as a founding 'father' of Australia's video games industry and Australia's most experienced interactive entertainment business executive.
He is the founder and former CEO of BigWorld Pty Limited and the founder of parent company Micro Forté Pty Limited. De Margheriti is also the Executive Chairman of the Academy of Interactive Entertainment, the Chairman of Canberra Technology Park, the founder of the Game Developers' Association of Australia, the founder of the Australian Game Developers Conference, and the founder of the three Canberra business parks, the co-founder of DEMS Entertainment, the co-founder of Dreamgate Studios, the co-founder of Game Plus and co-founder of The Film Distillery
De Margheriti has been recognised as an Honorary Ambassador for Canberra due to his contribution to Australia's national capital.
Early years
Born in Rome, Italy, De Margheriti arrived in Canberra with his family in 1970. He experimented with CB radios and electronics early as a young teenager. When he was sixteen De Margheriti experimented with making computer games independently. During his senior years at Hawker College, De Margheriti co-created an amateur science fiction film after watching the 1977 film, Star Wars: Episode IV – A New Hope. During the development of his amateur film, he co-developed a robotics system entitled 3DIM that would enable him to film complex stop-motion animation footage of large scale spaceship models. De Margheriti's need to create scrolling film credits led him to discover computers as a tool. The film involved dozens of actors and as a result, De Margheriti gained his first taste in management working with actors and prop builders. During filming he met Steve Wang which would later form the basis of a longstanding business association. He wrote his first computer game called “Maze” on a PDP-11 and his peer, Steve Wang developed a computer game called “Caves”, also on a PDP-11 computer.
De Margheriti graduated with a degree in electrical engineering from the UNSW Sydney (UNSW). Wang also went on to study at UNSW in the field of computer science. Together they devoted much of their time during university hours to developing computer games. They pooled their money to purchase a Commodore PET. During this time John also met Stephen Lewis and he joined the group, helping make games on the Commodore PET.
The most memorable game that they developed during university years was made for the Commodore 64. Whilst working part-time at the Computer 1 computer store in to put himself through university, De Margheriti met Gerry Gerlach who was interested in finding a person who could develop a computer game based on the recent Australian win of the Americas Cup sailing. After a conversation with Gerlach, De Margheriti approached his friends at the university and pulled together a team including Wang, Stephen Lewis and John Reidy capable of developing the simulation game. The team spent 72 hours straight developing a demo, pitched it to Armchair Entertainment and won a contract to develop the Americas Cup Sailing Simulation game for the Commodore 64 and Amstrad which was ultimately developed and then sold to Electronic Arts.
Soon after starting to develop their first game, Wang and Lewis tactfully told De Margheriti that his true strength was not programming but managing and winning new projects for the fledgling group. This “truth” ultimately saw De Margheriti become the entrepreneur and visionary for a group of profit and not for profit companies that have offices around the globe.
In addition to the Americas Cup Sailing Simulation, De Margheriti went on to program two other of games for Electronic Arts including Demon Stalkers and Fireking for the Commodore 64 and IBM PC, which was later released by Sydney-based Strategic Studies Group. http://www.ssg.com.au/
Later career
Micro Forte Pty Limited
Between 1985 and 1988, De Margheriti turned his focus towards business negotiations and contract development. He co-founded a games development company called Micro Forté Pty Limited and wrote games for a new company called Electronic Arts.
In 1995 De Margheriti came up with the concept of developing a software solution that would somehow group bulletin board services (BBS) together so that many people could play games together. He called this concept Game Net. Game Net was a precursor to what would later become known as BigWorld Technology. De Margheriti's idea was to allow large scale Multi User Dungeons [MUDs] to be developed where hundreds of people could be playing together in a multiplayer game. He was greatly influenced by an EA friend Danielle/Dan Bunten who had designed M.U.L.E, Modem Wars as well as a game called Command HQ which he often played with Stephen Lewis.
Those seminal games influenced De Margheriti in terms of coming up with the concept of building what is now commonly known as Massively Multiplayer Online Games (MMOGs). While developing the idea of Game Net, De Margheriti became increasingly more aware of the advent of the internet particularly after playing Ultima Online and Meridian 59, two of the first MMOGs.
He realised that these two games were an extension of the multiplayer games he loved and that in the future many developers would want to create massively multiplayer games. De Margheriti decided to switch his focus away from BBS, and made the decision to build a middleware engine that would help developers deal with the complexities of creating these online games. In 1996 Stephen Lewis and John lodged patents for a Communication System and Method and in 1999 he lodged an application for funding through AusIndustry's R&D Start program and received a multimillion-dollar grant. This was subsequently matched by venture capital from Allen & Buckeridge, an Australian Venture capital firm. The name of “Large Scale Multi Player Universe” (LSMPU) was originally used to describe the server, client and tools middleware system that De Margheriti had in mind. In 2011 the Micro Forte company acquired all the shares from the venture capital company.
The Academy of Interactive Entertainment
In 1996, during Micro Forté's expansion years, there was a need for the hiring of 3D animators and artists. At that time there was a clear lack of knowledge in that area and little or no available talent. De Margheriti established the Academy of Interactive Entertainment (AIE) as a business unit of Micro Forté to work towards solving this problem. The academy was to focus on developing 3D animation skills, and a course taught by De Margheriti, Steve Wang and other 3D experts was created for a group of 10 students.
Later on in 1997 it was spun out as a separate non profit organisation called the Academy of Interactive Entertainment Limited (AIE) to assist the greater industry. De Margheriti had realised that Micro Forté's shortages were not just his shortages; other industry related companies like Beam Software were also suffering a similar fate. The AIE has since grown from a small division of Micro Forté with 10 students, to an independent, nationally accredited, small registered training organisation that specialises in education for computer game development and the 3D Digital Content Industry. The AIE now has campuses in Canberra, Sydney, Melbourne, Online, Adelaide, Seattle, and Lafayette.
Other developments
In 1999 De Margheriti realised that to really help the Australian games industry grow, not only for Micro Forté's needs, but to solve the problem that the nation had, a wider support infrastructure was needed for the Australian industry. He established, personally funded and launched the inaugural Australian Game Developers Conference (AGDC) to foster the growth and collective presence of the Australian Games Industry. The AGDC at its peak had over 1,200 delegates and brought in numerous international speakers and publishers. The conference also brought capital to the Australian games industry. In December 2005, the GDAA announced that it would hold its own conference, Game Connect Asia Pacific (GCAP), and so De Margheriti in turn also announced the closing of the privately held (AGDC) to ensure that the GDAA would not have to compete with AGDC. In his AGDC closing talk he hoped that the GDAA could take their new conference, GCAP, to a whole new level for Australia.
It was at the inaugural Australian Game Developers Conference (AGDC) that De Margheriti, along with Adam Lancman and others, formed the local industry representative body titled the Game Developers Association of Australia [GDAA] in order to increase the profile of the Australian games industry both domestically and internationally. De Margheriti acted as treasurer until late 2005 when he resigned from the Board to focus his energies on expanding BigWorld Pty Limited. De Margheriti is credited with creating and personally funding the GDAA (determining its aims and objectives, board composition, voting rights, constitution, web pages and accounting needs) as well as choosing its first President and Board. The AIE funded the Australian Game Developers Conference and donated most if not all its profits made from AGDC to the GDAA.
De Margheriti is a founding member of the Association of Christian Entertainment.
De Margheriti established Canberra Technology Park (CTP) in 1997, a business park to facilitate the growth of the computer game development, 3D animation and other information technology [IT] related industries within Canberra.
In November 2000, ACT Chief Minister, Gary Humphries, appointed De Margheriti Honorary Ambassador for Canberra in recognition of De Margheriti's contribution in assisting Canberra to develop a significant business base. De Margheriti continues to foster business growth for start ups, mentor industry rookies and support industry development. He has participated as a guest presenter at industry conferences; is pro-active in seeking government support and assistance for the Australian industry, and features in industry related media. Since 2005 De Margheriti has focused more on his growing world-wide businesses and is less involved in local industry politics.
In 2005 De Margheriti took over the site management of the Capital Region Enterprise and Employment Development Association (CREEDA) Business Centres , and Erindale that had gone into liquidation, with a view to negotiate a long term lease on the sites. De Margheriti's main motivation in taking over the defunct sites was to restore an important business incubator function in Australia's capital city, Canberra. The sites were re-branded as Canberra Business Parks and in May 2008, De Margheriti largely donated the CBP name [and associated brands] and business, which were now a profitable business [almost operating at full capacity] to the ACT Government and the local business community.
De Margheriti saw an opportunity within the online game market for a definitive MMOG middleware solution. His studios shifted their focus into developing the multi award-winning BigWorld Technology which he later [2002] spun out into a middleware company - BigWorld Pty Limited. On 7 August 2012 Wargaming acquired BigWorld middleware firm for $45M.
Published games
References
External links
Video game businesspeople
Living people
University of New South Wales alumni
1962 births
|
25024127
|
https://en.wikipedia.org/wiki/Tribsoft
|
Tribsoft
|
Tribsoft was a Canadian software company that specialized in porting computer games to the Linux platform.
It was responsible for porting Jagged Alliance 2, as well as gaining the porting rights to Europa Universalis, Majesty: The Fantasy Kingdom Sim and Jagged Alliance 2: Unfinished Business. In the end only Majesty was ever ported and that was done by Linux Game Publishing. Europa Universalis II was also said to be coming to Linux.
Sometime in 2002 the owner of Tribsoft mentioned that he was "taking a short break" from porting games to Linux. This break eventually became permanent, when Tribsoft shut down in late 2002.
See also
Hyperion Entertainment
Linux Game Publishing
Loki Software
References
External links
Tribsoft Website (Internet Archive, Jan 22, 2002)
Tribsoft at LinuxGames
Gamespy - Tribsoft Linux Ports
Linux Journal Review of Jagged Alliance 2
Review: Jagged Alliance 2 for Linux
Software companies disestablished in 2002
Defunct video game companies of Canada
Linux companies
Linux game porters
|
10048878
|
https://en.wikipedia.org/wiki/College%20of%20Engineering%2C%20Perumon
|
College of Engineering, Perumon
|
The College of Engineering Perumon (; Entrance Commissioner's Code: PRN ) was started in 2000 under the Co-operative Academy of Professional Education ( CAPE Kerala ) Society. The society was formed to establish educational institutions to provide education and training, research and development, and consultancy. The society is promoted by the Co-operation Department of the government of Kerala and is an autonomous society.
The institution functions on a no-profit no-loss basis, a system upheld by the Supreme Court of India. The AICTE (All India Council for Technical Education) has given approval for the conduct of the courses. The state government has sanctioned five B.Tech degree courses.
Affiliated university
The institution is affiliated to A P J Abdul Kalam Technological University .
Admission
Admission is through Central Counseling by the Government of Kerala. Candidates are admitted based on the state-level Common Entrance Exam (KEAM) conducted by the C E E. From 2003, 50% of the seats are treated as Government seats, and the balance 35% as Management Quota. 15% of the seats are reserved for NRIs.
Courses
The institution offers B.Tech courses in
Computer Science & Engineering
Electronics and Communication Engineering, NBA Accredited
Electrical and Electronics Engineering, NBA Accredited
Information Technology
Mechanical Engineering
M.Tech course in
Computer and Information Science.
The duration of each B.Tech course is 4 years and the duration of M.Tech course is 2 Yrs.
Location
The institution has 25 acres of land (10 hectares) as allotted by the government of Kerala on the banks of the Ashtamudi Lake. It is at Kuzhiyathu Junction along the Kollam - Perumon Road (via - Anchalummoodu) 12 km away from Kollam Railway Station /bus stand via NH 47. The nearest railway station is Perinad, Panayam at 1 km distance. The site is 78 km from Thiruvananthapuram Airport (nearest airport) and the Kochi Harbour is 165 km north.
Departments
Electronics and Communication Engineering
Computer Science and Engineering
Electrical and Electronics Engineering
Information Technology
Mechanical Engineering (Started recently; from 2011 - 2012 onwards)
The colleges started M.Tech course in Computer and Information Science in 2011.
The annual intake for each course is:
Electronics and Communication Engineering - 126 seats
Computer Science and Engineering - 63 seats
Electrical and Electronics Engineering - 63 seats
Information Technology - 63 seats
Mechanical Engineering - 63 seats
Electronics and Communication Engineering Department(NBA Accredited)
The laboratories under the Department of Electronics & Communication Engineering are :
Electronic Circuits and Digital Laboratory
Micro processor and Advanced Micro Processor Laboratory
Communication and Microwave Laboratory
Digital Signal Processing and Project Laboratory
Website of the Electronics and Communication Engineering Department: earnestcep.in
Electrical and Electronics Engineering Department(NBA Accredited)
The department has the following laboratories:
Basic Electrical Engineering Laboratory
Electrical Machines Laboratory
Electrical Measurements Laboratory
Power Electronics Laboratory
Advanced Electrical Engineering Laboratory.
Computer Science and Engineering Department
The Computer Science and Engineering is equipped with the following laboratories:
Programming Laboratory
Internet Laboratory
Hardware/Networking Laboratory
Project Laboratory - 2
PG and Research Lab
Website of the Computer Science and Engineering Department : ascicep.com
Information Technology Department
The Department of Information Technology laboratories are :
Systems and Application Laboratory
Internet Laboratory
Multimedia Laboratory.
Mechanical Engineering Department
A B.Tech course in the discipline was started in 2011. The Block as well as the following laboratories under this department are in process of setting up.
Fluid Mechanics Lab
Hydraulic Machinery Lab
Thermal Engineering Lab
Metrology and Measurements Lab
HMT Lab
CAD-CAM Lab
Department Associations
EARNEST is the Electronics and Communication Engineering Department student’s association (Electronics Association Rendering Newly Emerging Scientific Thoughts). It was formed to cultivate interest in science and technology among the students. It organizes technical seminars, paper presentations, and personality development programs.
ASCI is the Computer Science and Information Technology Department student’s association. It organizes lecturers, seminars and technical talks by faculty and visitors. It hosts short-term courses, workshops, exhibitions, quizzes, paper presentations, code debugging, and gaming.
DYUTHI is the Electrical and Electronics Engineering Department association. It organizes lecturers, seminars and technical talks by personalities. It hosts short term courses, workshops, exhibitions, and competitions. The association conducts industrial visits to such as KSEB, KMML, and KEL, enabling students to familiarize with procedures and engineering practices in the field.
TRAMS is the Mechanical Engineering Department Association (The Royal Association of Mechanical Students). TRAMS conducts seminars, technical expos and cultural expos. One of the ventures is named Auto psych : The Quilon Motor Show. The association conducts industrial visits to major mechanical industries like KMML, NTPC, IOCl, enabling students to familiarize with engineering practices.
Technical and non-technical organizations
National Service Scheme (NSS)
The National Service Scheme (N.S.S) is a youth movement in the country. The scheme provides opportunities for teachers and students to gain experience of community service.
Indian Society for Technical Education
The Indian Society for Technical Education (ISTE) is a national society for teachers and students of the technical education system. The objective of the ISTE is to assist and contribute to the production and development of professional engineers and technocrats. A student chapter of ISTE functions in the college. The chapter runs training programs, seminars, and talks, to enhance the professional knowledge of the student.
Institute of Electrical and Electronics Engineers (IEEE)
The aim of the Institute of Electrical and Electronics Engineers (IEEE), USA, is to create an awareness in trainee engineers of technological innovations. A student chapter of IEEE in the college will be started in the college.
Clubs
Music Club
Arts Club
Sports Club
Literary Club
Robotics Club
Aerospace Interest Club
Facilities
Cricket ground
Football ground
Badminton court
Volleyball court
Canteen
Stationery shop
Central Library
Gymnasium
Parking
Parent Teacher Association (P.T.A.)
The objectives of the PTA are:
To work for the welfare of the students and the institution.
To offer suggestions for the successful functioning of the college.
To promote participation of the parents in the programs of the college and to establish better liaison with the teachers.
All parents/guardians of the students, and staff members, are members of the association. It is compulsory for a parent/guardian of a student on the rolls of the college to be a member of the PTA.
Anti-Ragging Squad
Any type of ragging, teasing, torturing, or misbehavior to the junior students is strictly prohibited. Legal actions will be taken against those students who are found guilty. A team has been selected to eradicate ragging from the campus
Alumni Association
The College of Engineering Perumon Alumni Association was formed in 2005. The association was inaugurated by Mrs. Kalavathi (General Manager, BSNL) on 22 August 2010.
The Association promotes interaction amongst the alumni, faculty and students.
See also
Cochin University of Science and Technology
TKM College of Engineering
College of Engineering Karunagappally
List of colleges affiliated with CUSAT
List of Engineering Colleges in Kerala
A P J Abdul Kalam Technological University
References
External links
Official website
Facebook page
Samskara ( Literary Club - Facebook page )
CAPE Kerala
Association of Computer Science And Information Technology ( ASCI - website )
Electronics Association Rendering Newly Emerging Scientific Thoughts ( EARNEST - website )
Engineering colleges in Kollam district
Educational institutions established in 2000
2000 establishments in Kerala
|
32678
|
https://en.wikipedia.org/wiki/Vocoder
|
Vocoder
|
A vocoder (, a contraction of voice and encoder) is a category of speech coding that analyzes and synthesizes the human voice signal for audio data compression, multiplexing, voice encryption or voice transformation.
The vocoder was invented in 1938 by Homer Dudley at Bell Labs as a means of synthesizing human speech. This work was developed into the channel vocoder which was used as a voice codec for telecommunications for speech coding to conserve bandwidth in transmission.
By encrypting the control signals, voice transmission can be secured against interception. Its primary use in this fashion is for secure radio communication. The advantage of this method of encryption is that none of the original signal is sent, only envelopes of the bandpass filters. The receiving unit needs to be set up in the same filter configuration to re-synthesize a version of the original signal spectrum.
The vocoder has also been used extensively as an electronic musical instrument. The decoder portion of the vocoder, called a voder, can be used independently for speech synthesis.
Theory
The human voice consists of sounds generated by the opening and closing of the glottis by the vocal cords, which produces a periodic waveform with many harmonics. This basic sound is then filtered by the nose and throat (a complicated resonant piping system) to produce differences in harmonic content (formants) in a controlled way, creating the wide variety of sounds used in speech. There is another set of sounds, known as the unvoiced and plosive sounds, which are created or modified by the mouth in different fashions.
The vocoder examines speech by measuring how its spectral characteristics change over time. This results in a series of signals representing these modified frequencies at any particular time as the user speaks. In simple terms, the signal is split into a number of frequency bands (the larger this number, the more accurate the analysis) and the level of signal present at each frequency band gives the instantaneous representation of the spectral energy content. To recreate speech, the vocoder simply reverses the process, processing a broadband noise source by passing it through a stage that filters the frequency content based on the originally recorded series of numbers.
Specifically, in the encoder, the input is passed through a multiband filter, then each band is passed through an envelope follower, and the control signals from the envelope followers are transmitted to the decoder. The decoder applies these (amplitude) control signals to corresponding amplifiers of the filter channels for re-synthesis.
Information about the instantaneous frequency of the original voice signal (as distinct from its spectral characteristic) is discarded; it was not important to preserve this for the vocoder's original use as an encryption aid. It is this "dehumanizing" aspect of the vocoding process that has made it useful in creating special voice effects in popular music and audio entertainment.
The vocoder process sends only the parameters of the vocal model over the communication link, instead of a point-by-point recreation of the waveform. Since the parameters change slowly compared to the original speech waveform, the bandwidth required to transmit speech can be reduced. This allows more speech channels to utilize a given communication channel, such as a radio channel or a submarine cable.
Analog vocoders typically analyze an incoming signal by splitting the signal into multiple tuned frequency bands or ranges. A modulator and carrier signal are sent through a series of these tuned bandpass filters. In the example of a typical robot voice, the modulator is a microphone and the carrier is noise or a sawtooth waveform. There are usually between eight and 20 bands.
The amplitude of the modulator for each of the individual analysis bands generates a voltage that is used to control amplifiers for each of the corresponding carrier bands. The result is that frequency components of the modulating signal are mapped onto the carrier signal as discrete amplitude changes in each of the frequency bands.
Often there is an unvoiced band or sibilance channel. This is for frequencies that are outside the analysis bands for typical speech but are still important in speech. Examples are words that start with the letters s, f, ch or any other sibilant sound. These can be mixed with the carrier output to increase clarity. The result is recognizable speech, although somewhat "mechanical" sounding. Vocoders often include a second system for generating unvoiced sounds, using a noise generator instead of the fundamental frequency.
In the channel vocoder algorithm, among the two components of an analytic signal, considering only the amplitude component and simply ignoring the phase component tends to result in an unclear voice; on methods for rectifying this, see phase vocoder.
History
The development of a vocoder was started in 1928 by Bell Labs engineer Homer Dudley, who was granted patents for it, on March 21, 1939, and on Nov 16, 1937.
To demonstrate the speech synthesis ability of its decoder part, the Voder (Voice Operating Demonstrator), was introduced to the public at the AT&T building at the 1939–1940 New York World's Fair. The Voder consisted of a switchable pair of electronic oscillator and noise generator as a sound source of pitched tone and hiss, 10-band resonator filters with variable-gain amplifiers as a vocal tract, and the manual controllers including a set of pressure-sensitive keys for filter control, and a foot pedal for pitch control of tone. The filters controlled by keys convert the tone and the hiss into vowels, consonants, and inflections. This was a complex machine to operate, but a skilled operator could produce recognizable speech.
Dudley's vocoder was used in the SIGSALY system, which was built by Bell Labs engineers in 1943. SIGSALY was used for encrypted high-level voice communications during World War II. The KO-6 voice coder was released in 1949 in limited quantities; it was a close approximation to the SIGSALY at 1200 bit/s. In 1953, KY-9 THESEUS 1650 bit/s voice coder used solid state logic to reduce the weight to from SIGSALY's 55 tons, and in 1961 the HY-2 voice coder, a 16-channel 2400 bit/s system, weighted and was the last implementation of a channel vocoder in a secure speech system.
Later work in this field has since used digital speech coding. The most widely used speech coding technique is linear predictive coding (LPC), which was first proposed by Fumitada Itakura of Nagoya University and Shuzo Saito of Nippon Telegraph and Telephone (NTT) in 1966. Another speech coding technique, adaptive differential pulse-code modulation (ADPCM), was developed by P. Cummiskey, Nikil S. Jayant and James L. Flanagan at Bell Labs in 1973.
Applications
Terminal equipment for Digital Mobile Radio (DMR) based systems.
Digital Trunking
DMR TDMA
Digital Voice Scrambling and Encryption
Digital WLL
Voice Storage and Playback Systems
Messaging Systems
VoIP Systems
Voice Pagers
Regenerative Digital Voice Repeaters
Cochlear Implants: Noise and tone vocoding is used to simulate the effects of Cochlear Implants.
Musical and other artistic effects
Modern implementations
Even with the need to record several frequencies, and additional unvoiced sounds, the compression of vocoder systems is impressive. Standard speech-recording systems capture frequencies from about 500 Hz to 3,400 Hz, where most of the frequencies used in speech lie, typically using a sampling rate of 8 kHz (slightly greater than the Nyquist rate). The sampling resolution is typically 12 or more bits per sample resolution (16 is standard), for a final data rate in the range of 96–128 kbit/s, but a good vocoder can provide a reasonably good simulation of voice with as little as 2.4 kbit/s of data.
"Toll quality" voice coders, such as ITU G.729, are used in many telephone networks. G.729 in particular has a final data rate of 8 kbit/s with superb voice quality. G.723 achieves slightly worse quality at data rates of 5.3 kbit/s and 6.4 kbit/s. Many voice vocoder systems use lower data rates, but below 5 kbit/s voice quality begins to drop rapidly.
Several vocoder systems are used in NSA encryption systems:
LPC-10, FIPS Pub 137, 2400 bit/s, which uses linear predictive coding
Code-excited linear prediction (CELP), 2400 and 4800 bit/s, Federal Standard 1016, used in STU-III
Continuously variable slope delta modulation (CVSD), 16 kbit/s, used in wide band encryptors such as the KY-57.
Mixed-excitation linear prediction (MELP), MIL STD 3005, 2400 bit/s, used in the Future Narrowband Digital Terminal FNBDT, NSA's 21st century secure telephone.
Adaptive Differential Pulse Code Modulation (ADPCM), former ITU-T G.721, 32 kbit/s used in STE secure telephone
(ADPCM is not a proper vocoder but rather a waveform codec. ITU has gathered G.721 along with some other ADPCM codecs into G.726.)
Vocoders are also currently used in developing psychophysics, linguistics, computational neuroscience and cochlear implant research.
Modern vocoders that are used in communication equipment and in voice storage devices today are based on the following algorithms:
Algebraic code-excited linear prediction (ACELP 4.7 kbit/s – 24 kbit/s)
Mixed-excitation linear prediction (MELPe 2400, 1200 and 600 bit/s)
Multi-band excitation (AMBE 2000 bit/s – 9600 bit/s)
Sinusoidal-Pulsed Representation (SPR 600 bit/s – 4800 bit/s)
Robust Advanced Low-complexity Waveform Interpolation (RALCWI 2050bit/s, 2400bit/s and 2750bit/s)
Tri-Wave Excited Linear Prediction (TWELP 600 bit/s – 9600 bit/s)
Noise Robust Vocoder (NRV 300 bit/s and 800 bit/s)
Linear prediction-based
Since the late 1970s, most non-musical vocoders have been implemented using linear prediction, whereby the target signal's spectral envelope (formant) is estimated by an all-pole IIR filter. In linear prediction coding, the all-pole filter replaces the bandpass filter bank of its predecessor and is used at the encoder to whiten the signal (i.e., flatten the spectrum) and again at the decoder to re-apply the spectral shape of the target speech signal.
One advantage of this type of filtering is that the location of the linear predictor's spectral peaks is entirely determined by the target signal, and can be as precise as allowed by the time period to be filtered. This is in contrast with vocoders realized using fixed-width filter banks, where spectral peaks can generally only be determined to be within the scope of a given frequency band. LP filtering also has disadvantages in that signals with a large number of constituent frequencies may exceed the number of frequencies that can be represented by the linear prediction filter. This restriction is the primary reason that LP coding is almost always used in tandem with other methods in high-compression voice coders.
Waveform-interpolative
Waveform-interpolative (WI) vocoder was developed in AT&T Bell Laboratories around 1995 by W.B. Kleijn, and subsequently a low- complexity version was developed by AT&T for the DoD secure vocoder competition. Notable enhancements to the WI coder were made at the University of California, Santa Barbara. AT&T holds the core patents related to WI, and other institutes hold additional patents.
Artistic effects
Uses in music
For musical applications, a source of musical sounds is used as the carrier, instead of extracting the fundamental frequency. For instance, one could use the sound of a synthesizer as the input to the filter bank, a technique that became popular in the 1970s.
History
Werner Meyer-Eppler, a German scientist with a special interest in electronic voice synthesis, published a thesis in 1948 on electronic music and speech synthesis from the viewpoint of sound synthesis. Later he was instrumental in the founding of the Studio for Electronic Music of WDR in Cologne, in 1951.
One of the first attempts to use a vocoder in creating music was the "Siemens Synthesizer" at the Siemens Studio for Electronic Music, developed between 1956 and 1959.
In 1968, Robert Moog developed one of the first solid-state musical vocoders for the electronic music studio of the University at Buffalo.
In 1968, Bruce Haack built a prototype vocoder, named "Farad" after Michael Faraday. It was first featured on "The Electronic Record For Children" released in 1969 and then on his rock album The Electric Lucifer released in 1970.
In 1970, Wendy Carlos and Robert Moog built another musical vocoder, a ten-band device inspired by the vocoder designs of Homer Dudley. It was originally called a spectrum encoder-decoder and later referred to simply as a vocoder. The carrier signal came from a Moog modular synthesizer, and the modulator from a microphone input. The output of the ten-band vocoder was fairly intelligible but relied on specially articulated speech. Some vocoders use a high-pass filter to let some sibilance through from the microphone; this ruins the device for its original speech-coding application, but it makes the talking synthesizer effect much more intelligible.
In 1972, Isao Tomita's first electronic music album Electric Samurai: Switched on Rock was an early attempt at applying speech synthesis technique in electronic rock and pop music. The album featured electronic renditions of contemporary rock and pop songs, while utilizing synthesized voices in place of human voices. In 1974, he utilized synthesized voices in his popular classical music album Snowflakes are Dancing, which became a worldwide success and helped to popularize electronic music.
In 1973, the british band Emerson, Lake and Palmer used a vocoder on their album Brain Salad Surgery, for the song "Karn Evil 9: 3rd Impression".
The 1975 song "The Raven" from the album Tales of Mystery and Imagination by The Alan Parsons Project features Alan Parsons performing vocals through an EMI vocoder. According to the album's liner notes, "The Raven" was the first rock song to feature a digital vocoder.
Pink Floyd also used a vocoder on three of their albums, first on their 1977 Animals for the songs "Sheep" and "Pigs (Three Different Ones)", then on A Momentary Lapse of Reason on "A New Machine Part 1" and "A New Machine Part 2" (1987), and finally on 1994's The Division Bell, on "Keep Talking".
The Electric Light Orchestra was a famous user of the vocoder, being among the first to use it in a commercial context with their 1977 album Out of the Blue. The band extensively uses it on the album, including on the hits "Sweet Talkin' Woman" and "Mr. Blue Sky". On following albums, the band made sporadic use of it, notably on their hits "The Diary of Horace Wimp" and "Confusion" from their 1979 album Discovery, the tracks "Prologue", "Yours Truly, 2095", and "Epilogue" on their 1981 album Time, and "Calling America" from their 1986 album Balance of Power.
In the late 1970s, French duo Space Art used a vocoder during the recording of their second album, Trip in the Centre Head.
Phil Collins used a vocoder to provide a vocal effect for his 1981 international hit single "In the Air Tonight".
Vocoders have appeared on pop recordings from time to time, most often simply as a special effect rather than a featured aspect of the work. However, many experimental electronic artists of the new-age music genre often utilize vocoder in a more comprehensive manner in specific works, such as Jean-Michel Jarre (on Zoolook, 1984) and Mike Oldfield (on QE2, 1980 and Five Miles Out, 1982).
Vocoder module and use by M. Oldfield can be clearly seen on his "Live At Montreux 1981" DVD (Track "Sheba").
There are also some artists who have made vocoders an essential part of their music, overall or during an extended phase. Examples include the German synthpop group Kraftwerk, the Japanese new wave group Polysics, Stevie Wonder ("Send One Your Love", "A Seed's a Star") and jazz/fusion keyboardist Herbie Hancock during his late 1970s period. In 1982 Neil Young used a Sennheiser Vocoder VSM201 on six of the nine tracks on Trans. The chorus and bridge of Michael Jackson's "P.Y.T. (Pretty Young Thing)". features a vocoder ("Pretty young thing/You make me sing"), courtesy of session musician Michael Boddicker.
Coldplay have used a vocoder in some of their songs. For example, in "Major Minus" and "Hurts Like Heaven", both from the album Mylo Xyloto (2011), Chris Martin's vocals are mostly vocoder-processed. "Midnight", from Ghost Stories (2014), also features Martin singing through a vocoder. The hidden track "X Marks The Spot" from A Head Full of Dreams was also recorded through a vocoder.
Noisecore band Atari Teenage Riot have used vocoders in variety of their songs and live performances such as Live at the Brixton Academy (2002) alongside other digital audio technology both old and new.
The Red Hot Chili Peppers song "By the Way" uses a vocoder effect on Anthony Kiedis' vocals.
Among the most consistent uses of vocoder in emulating the human voice are Daft Punk, who have used this instrument from their first album Homework (1997) to their latest work Random Access Memories (2013) and consider the convergence of technological and human voice "the identity of their musical project". For instance, the lyrics of "Around the World" (1997) are integrally vocoder-processed, "Get Lucky" (2013) features a mix of natural and processed human voices, and "Instant Crush" (2013) features Julian Casablancas singing into a vocoder.
Producer Zedd, American country singer Maren Morris and American musical duo Grey made a song titled The Middle which featured a vocoder and reached top ten of the charts in 2018.
Voice effects in other arts
"Robot voices" became a recurring element in popular music during the 20th century. Apart from vocoders, several other methods of producing variations on this effect include: the Sonovox, Talk box, and Auto-Tune, linear prediction vocoders, speech synthesis, ring modulation and comb filter.
Vocoders are used in television production, filmmaking and games, usually for robots or talking computers. The robot voices of the Cylons in Battlestar Galactica were created with an EMS Vocoder 2000. The 1980 version of the Doctor Who theme, as arranged and recorded by Peter Howell, has a section of the main melody generated by a Roland SVC-350 vocoder. A similar Roland VP-330 vocoder was used to create the voice of Soundwave, a character from the Transformers series.
In 1967 the Supermarionation series Captain Scarlet and the Mysterons it was used in the closing credits theme of the first 14 episodes to provide the repetition of the words "Captain Scarlet".
See also
Audio timescale-pitch modification
Auto-Tune
Homer Dudley
List of vocoders
Phase vocoder
Silent speech interface
Talk box
Werner Meyer-Eppler
References
Multimedia references
External links
Description, photographs, and diagram for the vocoder at 120years.net
Description of a modern Vocoder.
GPL implementation of a vocoder, as a LADSPA plugin
O'Reilly Article on Vocoders
Object of Interest: The Vocoder The New Yorker Magazine mini documentary
Audio effects
Electronic musical instruments
Music hardware
Lossy compression algorithms
Speech codecs
Robotics
|
10376213
|
https://en.wikipedia.org/wiki/No.%201%20Radio%20School%20RAF
|
No. 1 Radio School RAF
|
No. 1 Radio School is based at RAF Cosford and forms part of the Defence School of Communications and Information Systems. Its motto is Thorough, which was the motto of the Royal Air Force Electrical and Wireless School.
Mission
"To train and develop Air minded war-winners to enable Information Advantage through Cyber and Space capabilities to achieve Cross Domain Effects across the RAF and Defence"
History
The School was originally known as The School for Wireless Operators, and was part of the Royal Flying Corps, when it was formed at the Town Hall, Farnborough in 1915. The school was transferred to the Royal Air Force (RAF) in 1918 when the RAF was formed by Lord Trenchard, in 1919 the school was moved from Farnborough to RAF Flowerdown in Hampshire.
The school had a number of name changes from The Electrical & Wireless School, to No 1 Signals School, until finally becoming known as No 1 Radio School in 1943, when all radio and signal schools were called radio schools and there were 15 in total.
In 1950 the school moved from RAF Cranwell to RAF Locking where it remained for the next 48 years, until it was disbanded on 1 Oct 98, where it became known as Communications-Electronics (C-E) Training Wing, 1 School of Technical Training (Det RAF Locking). The school was then re-formed at DSAE Cosford as No 1 Radio School, in Flowerdown Hall on the 60th anniversary of No 1 Radio School in 2003.
The school also incorporates the Aerial Erector School (AES) which is based at RAF Digby.
Role
No. 1 Radio School is responsible for Phase 2 and 3 training of RAF Engineering Communications Electronics (Eng CE) officers, Trade Group 4 Cyberspace Communications Specialists (formerly I.C.T. Technicians) and Communications Infrastructure Technicians (commonly known as Aerial Erectors).
Phase 2 Training:
Phase 2 training provides initial specialist training to prepare Service personnel for their first employment in the wider RAF. Phase 2 training normally follows on from Phase 1 Training, which is initial training in the basic military skills required by all Service personnel.
Phase 3 Training:
Phase 3 Training prepares Service personnel for further employment with increased skill base and/or responsibility. It also encompasses training to meet career aspirations and professional development.
Training
The Radio School currently consists of 3 squadrons to deliver and support all the required Phase 2 & 3 training. These squadrons consist of:
* Training Delivery Squadron (TDS) which comprises 5 flights:
Air Defence and Systems (ADAS) Flight - Covers Air Defence RADAR systems, Air Field Navigational aids and communication systems. These courses are primarily Phase 3 operational courses for locations around the World.
Network Applications - This area covers Network Applications and Network Information Systems including Cyber Courses as well as an introduction to Programming.
Network Infrastructure. This flight covers core network installation and fault resolution tasks; specifically: Health & Safety, Data Communications theory and installations, Information Technology Essentials, Introduction to Networks and Structure Cabling.
Networks Deployed. This area focuses on the theory and practical execution of Radio and Satellite Communications from a Phase 2 aspect and delivers the DII Land Deployed Phase 3 training.
Engineering Management Training Flight. The Phase 2 training of Engineering Officers', Phase 2 training of Information Communication Technology technicians in Air Operations and technical documentation as well as the delivery of Trade Management Training for newly promoted Junior and Senior Non-Commissioned Officers.
Academic Accreditation Group (AAG). Deals with all the relevant course accreditation to professional bodies and companies including the management of the No1 Radio School CISCO Academy programme.
Cyberspace Communications Specialist phase 2 students - Lecturers deliver communication principles (Maths, Electronics, Radio) and Information Management principles.
Foundation Degree students - Lecturers deliver advanced communications and Radar principles, CISCO network management training along with Information management and Cyber Security delivery.
Phase 3 training - Lecturers deliver CISCO Network theory and practical training via CISCOs NetAcad platform and through the use of physical equipment as well as Information administration and management training. These courses ensure students are fully prepared for front-line operational environments.
*Training Management Support Squadron (TMSS) is split into 4 flights and 1 school:
Trainee Management Flight (TMF) - Hold responsibility for the discipline, welfare, care and management of all students within No 1 Radio School, whether phase 2 or 3. Engineering Support Flight (ESF) - Manage the provision, delivery and installation of all engineering requirements within the School, from mobile and fixed IT infrastructure and equipment to Radar systems used in the delivery of training.Business Development Flight (BDF) - Collate, coordinate and deliver on business cases throughout No 1 Radio School, providing new and upgraded equipment and infrastructure in support of training. Support Flight (Spt Flt) - Provides administrative support to all No 1 Radio School personnel and students. Aerial Erector School (AES) - Provides specialist Working at Height (WaH) and cable infrastructure training for Defence.Cyberspace Communications SpecialistsThe purpose of Cyberspace Communications Specialist training is to:
Train Cyberspace Communication Specialists to meet the RAF's requirement for Cyber, communication, computers, information networks, sensors and detection systems, in order to undertake air operations.
Students undertake a 34-week specialist training course at No. 1 Radio School, RAF Cosford. This course prepares the students for their first tour at an operational unit, giving them skills and experiences ranging from Radio Principles to Network Administration and Cyber Security.Communication Infrastructure Technician (CIT)The purpose of CIT training is to:
Provide specialist Working at Height (WaH) and cable infrastructure training. Students undertake a 26-week specialist training course at RAF Digby.Engineering Officer Further Training (Communications Electronics) (EOFT (CE))'''
The purpose of EOFT (CE) is to:
Prepare newly commissioned Junior Officers for their foundation tours as cyberspace engineers and information specialists.
Upon completion of Initial Officer Training at RAFC Cranwell, students complete a 26-week training course that prepares newly commissioned junior officers for, and provides them with the skills necessary to undertake, the many varied first tours that an Eng (CE) officer might undertake. The key theme throughout the course, which is split over three terms, is to embed an appreciation of how technology is a key enabler of operations. Term 1 of the course provides an introduction to communications doctrine, communications organisations within Defence and the responsibilities of an Eng (CE) officer, as well as an academic module looking at RADAR and telecommunications principles. Term 2 builds on the application of those modules taught during Phase 1, and introduces the officers to cyberspace and information services, systems and applications. The final term of the course consolidates the earlier taught modules and culminates in a scenario-based final exercise that simulates and assesses the officers in the type of environment that they could expect to find themselves in their first tour as Eng (CE) officers.
In order to enhance their learning and to continue their development, the officers undertake a number of visits to RAF stations and joint organisations, such as RAF Waddington, Air Command, and the Permanent Joint Headquarters, and undertake an adventurous training and force development package.
Qualifications
No. 1 Radio School is a Cisco accredited academy, with the training that the students receive being recognised by a wide range of civilian employers and backed by transferable qualifications.
Students completing the Defence Cyber Protect training also achieve the CompTIA Security+ (S+) and Cyber Security Analyst (CySA+) qualifications
References
Vocational education in the United Kingdom
Radio School
|
68820132
|
https://en.wikipedia.org/wiki/Zhao%20Chunjiang
|
Zhao Chunjiang
|
Zhao Chunjiang (born 28 April 1964) is a Chinese engineer who is the director of National Engineering Research Center for Information Technology in Agriculture, and an academician of the Chinese Academy of Engineering.
Biography
Zhao was born in Baoding, Hebei, on 28 April 1964. He attended Hebei Agricultural University where he received his bachelor's degree in crop cultivation and farming in 1985. After completing his master's degree at the Crop Research Institute of Beijing Academy of Agricultural and Forestry Sciences in 1988, he attended China Agricultural University where he obtained his doctor's degree in 1993.
He was associate research fellow at Beijing Academy of Agriculture and Forestry Sciences in 1991 and was promoted to research fellow in 1996. In 1999, he was appointed director of Beijing Agricultural Information Technology Research Center. In 2001, he became director of National Engineering Research Center for Information Technology in Agriculture, concurrently serving as deputy leader of the Expert Steering Group for Whole Process Mechanization of Crop Production, Ministry of Agriculture and Rural Areas since May 2021.
Honours and awards
2007 State Science and Technology Progress Award (Second Class)
2010 State Science and Technology Progress Award (Second Class)
27 November 2017 Member of the Chinese Academy of Engineering (CAE)
August 2021 Fellow of the Academy of the United Nations Sciences and Technology Organization (AUNSTO)
References
1964 births
Living people
People from Baoding
Engineers from Hebei
Hebei Agricultural University alumni
China Agricultural University alumni
Members of the Chinese Academy of Engineering
|
35829266
|
https://en.wikipedia.org/wiki/Police%20IT
|
Police IT
|
Police IT is the flagship project of the Karnataka State Police aimed at digitizing all the processes involved in policing from basic functions like Crime, Law and Order maintenance and traffic to ancillary functions like police motor transport and training; and connecting all the locations of the Karnataka State Police viz. Police stations, Circle office, sub-divisional police offices, district police offices, campus networks at COP, CID, Chief office and other offices of special units. It has been brought under CCTNS now.
The software comprises 12 modules over which MIS is overlaid to support different workflows and their interdependence in regular policing. It has identified 64 end users who have different roles in the day to day policing work and user interfaces catering to their individual needs have been created. The software could generate 417 different reports which help in supervision, the ultimate aim being to support the executive in policy-making, saving much time in surveying and paper work.
Currently the software is in the verge of integration with seven other legacy systems in different departments of the Karnataka Government so that the whole of policing could go digital in the days to come.
Background
Several initiatives have been introduced in the past to leverage IT in police functioning. Some of these include central government initiated programs such as the NCRB-led CCIS (Crime and Criminals Information System) and CIPA (Common Integrated Police Application), and State-led initiatives such as e-COPS in Andhra Pradesh, Thana Tracking System in West Bengal, CAARUS in Tamil Nadu and HD IITS in Gujarat.
In 2008 CCTNS (Crime and Criminal Tracking Network and Systems) was conceived as a Mission Mode Project fully sponsored by the Government of India under the National e-Governance Plan to provide a comprehensive integrated application platform and a nationwide networked environment for sharing real time crime and criminal information across more than 15000 Police stations, nearly 6000 higher offices of the country.
Since all these systems were standalone in nature covering only processes regarding Crime in general, a strong need was felt to create a comprehensive system supporting all the police requirements in the state and the Karnataka state police has come up with Police IT as its ERP for policing.
Objectives
The reports generated and the workflows included are designed considering the following objectives
Help executive in Planning by easy access to information and real time statistics generation
Optimum Staffing of men by deploying them for core tasks
Effective Direction and Control by higher offices
Improved Coordination between various offices
Customized Reporting by generation of a wide range of reports
Reduction in paper work and manual register maintenance
Technology
The Police IT software is built on .NET 2.0 framework on Windows 2008 Enterprise Server. Database interface has been built using ADO.NET. Data storage is UNICODE based resulting in comprehensive support of Kannada, the official language of the state. Reports have been developed using Crystal Reports and transmission is in Adobe PDF Document. Database layer is developed using MS SQL 2005.
MPLS is used to connect the major LANs at District Police Office (DPO), Commissioner of Police (COP offices), Crime Investigation Department (CID), Chief's Office etc. through a 2-4 Mbps MPLSnetwork to the State Police Data Center at Madiwala. VPNoBB connects all other locations inclusive of all police stations with a 512- 2048kbit/s bandwidth to the State Police Data Center. A central aggregation bandwidth of 155 Mbps, fiber optic MPLS connects the Data Center to the whole state.
Work Flow Modules
The Police IT software application has been divided into 12 modules with different workflows with the facility of exporting data across modules along with the possibility of generating reports with information across different modules. The core functions of policing are incorporated in Crime, Law & Order and Traffic modules. The three modules namely Finance, Administration and Stores provide the administrative support required for the department. Armed, Motor Transport and Training modules provide the ancillary support and the Wireless and the FSL are technical modules. The functionalities of these modules are achieved from inception till conclusion in each case by providing users at different levels in hierarchy with different rights to update and supervise by role based access. The whole application in its journey towards a paperless office helps the police which is a documentation intensive department do away with hundreds of records the maintenance of which is both manpower intensive and time consuming.
Crime
This module facilitates the collection of detailed information about the history of the crime and criminals and assists in investigation process. It allows for capturing of crime data from the time of registration of First Information Report and monitors the case even after conviction. In addition it allows generation of a comprehensive account of the crime.
Workflow of crime module
The workflow for crime process starts with registration of First Information Report which can be done by an SHO and then the case can be investigated by him on his own or assigned/transferred to another investigating officer. In property offences, details of property have to be entered and classification of crime is required for report generation at later point of time under different heads. The investigating officer then starts a case diary detailing the progress of the case. The Investigating Officer, on completion of the investigation files the charge sheet or final report in the court of jurisdiction. Court progress of these cases are noted till disposal and on disposal, if the accused is convicted, conviction memo is prepared and then the case may go for appeal.
The application captures all the details in each of these processes under different components of the crime module such as FIR, Case Assignment, Crime Classification, Case Diary, Crime Details, Property Seizure, Property Movement, Arrest and Court Surrender memo, Bail Bond, Remand Application, Witness Details, Charge Sheet, Court Progress Diary, Court Disposal, Conviction Memo, Result of Appeal, MOB (Modus operandi Bureau), BCR(a), BCR(b)History sheet, Case Transfer, and FSL (Forensic Science Labaratory Request). Similar workflow based components are designed in all the modules to cater to the respective services.
Law and Order
This module collates data relating to activities involved in facilitating maintenance of law and order in the state. It is subdivided into Law and order activities, Intelligence and Foreigners’ registration modules. Law and order activities are mainly carried out at police station level while Intelligence and Foreigners’ registration module will be used at District and Commissioner’s districts.
Traffic
This module covers various activities of law and order issue related to traffic. This captures and collates data relating to accidents and enforcement of IMV Act (Indian Motor Vehicles Act 1988) and fine collection. The module generates 53 reports related to the traffic incidents, accidents and violations based on various criteria like age of vehicle and driver and accident prone areas which help in perspective planning for better traffic management and avoiding accidents.
This module in future is expected to be integrated with BTRAC, the Bangalore Traffic Police’ technology-driven traffic-management system and Black Berry systems for a totally digitized traffic control system across the state.
Finance
This module covers information pertaining to the budget and expenditure of the department which includes financial transactions like payables to various vendors, loans to police personnel
Administration
This module helps in managing the activities related to police administration in an orderly manner and gives brief or comprehensive reports as required. The module supports personnel administration related activities. Business processes covered under this module cover the entire period of engagement of the police personnel with the department starting from recruitment till retirement through maintenance of service records, transfers, leave, punishments, promotions, retirement and into pension initiation.
Stores
The Stores module takes care of stocks, purchases, indent, issues of all items used in Police Department such as General Items, Motor Vehicles, Wireless Instruments, FSL Instruments, Arms and Ammunition, Vehicle Spare parts, Fuel, Oil and Lubricants and properties like land, building and quarters. The details pertaining to kit articles are also maintained.
Armed Reserve (AR)
The state police reserve includes State Reserve Police, City Armed Reserves and District Armed reserves. They supplement the regular police in the maintenance of law and order. The module captures details of deployment of platoons and personnel at various places for performing law and order duties from the state, district and city reserve. This module, apart from helping in administration and maintenance related activities of reserve police personnel, assists the higher authorities in getting the details of availability of platoons in various reserve police units at any point of time which acts as an important input in planning deployment of available platoons. Armory is generally located in the District Armed reserve and also the State reserve police has its own Armory in many cases. Armory is a sub module in the Armed reserve module of police IT which captures the details of the issue and return of all weapons and ammunition to the men and maintains the details stock of all weapons and ammunition at various levels and places and also captures the details of firing practice.
Motor Transport (MT)
This module maintains the history of the vehicles of the police department throughout the lifetime from procuring and maintenance till disposal or condemnation. The comprehensive coverage includes maintenance of history sheets, capturing of day-to-day activities of vehicles, drivers, fuel consumption, petrol bunk transactions and regular inspections. This module eliminates the maintenance more than 15 kinds of forms and other records and also eliminates the time in formal communication for vehicle repairs, maintenance and overhauls.
Training
Various state and national level academies, institutes and units provide training to officers of all ranks, and other police and clerical personnel. The courses offered vary from induction courses to refresher and theme courses. This module covers all the activities relating to handling of these courses at various institutes and units along with library management activities like book keeping and issuing. Details related to on the job training provided to personnel at all levels is captured in this module
Wireless
This module captures operations of the police wireless and control room and includes information relating to both equipment maintenance and operations. The operations include maintenance of wireless log, transmission of approved messages, message logs, etc. and equipment maintenance includes maintenance of registers related to purchase, usage and repairs.
Forensic Science Lab (FSL)
FSL is the testing laboratory of the police department with its laboratories at national and state levels which conducts various tests on the requests coming from the police department and other Government departments. This module captures the administrative functionality of the FSL Unit as a whole. This involves capturing and maintaining the information of the cases registered in FSL on request from police station or otherwise, flow of the case through the different sections in FSL, status of the case at each point of time till its final disbursement back to the requested unit. It also captures the various other day-to-day activities of FSL like scene of crime requisition, court duty attendance and ammunition and equipment usage.
MIS
Management Information system module is the dashboard of Police IT. This dashboard gives all the details in a tabular and graphical format pertaining to all modules of Police IT.
KGSC Services
Apart from functionalities in these modules, the software also caters to capturing of the details of petitions and other requests that come under the purview of the police department as identified by the Karnataka Guarantee of Services to Citizens’ Act 2011 which specifies timelines and standards for the services to be provided to citizens by the government agencies including law enforcement departments.
KSPWAN
KSPWAN is the Karnataka State Police Wide Area Network created exclusively for facilitating real time exchange of information among smaller computer networks prevalent at DPOs, campus networks at COP, CID, Chief office etc. and all other locations such as Police Stations, Circles, SDPOs, and other offices of special units by integrating them into one network.
This network presently caters to the information exchange within the department but intends to create a wider network bringing all other departments related with policing as a part of the same network.
Currently the network includes
906 Police Stations
234 Circle Offices
129 Sub-Divisional Police Offices
30 District Police Offices
6 Range Offices
6 Regional Forensic Laboratories
12 Karnataka State Reserve Police Battalions
1 Railways Police Unit
1 Police Headquarters
1 State Crime Record Bureau
Special Units
Legacy Systems
These are digitized modules which are already functional in certain wings in police department and in various departments of the Karnataka government catering to different requirements of administration.
E-Beat
It is the new system of Beat service adopted by Karnataka Police with an aim to introduce technology for ensuring accountability and efficiency. The system uses radio frequency based technology to perform beat service, wherein in place of the Point books in the Beat area, an RFID (Radio Frequency Identification) Tag is installed; the RFID Tag contains a microchip with a unique identifier stored on it. This unique identifier can only be read using a RFID Reader which operates at a similar frequency. The information regarding the beat constables performing the beat, the beat no to which it should be used for beat service, the beat point locations to be visited is fed into it before assigning it to the beat constable and deployed. The beat constables carry the reader to the beat, read the unique ids from the beat point location, complete the beat and return the reader to the Station House Officer with a detailed report along with it. The SHO will download the contents from the reader which is basically the date and time of visit to a beat point along with name and designation of the person who visited the beat points.
The system ensures physical presence of the police personnel on beat which itself is a deterrent for unlawful activities. Also the system keeps track of manpower utilization and assists the SHO in devising strategies for crime prevention and monitoring of human resources. The e-beat application provides various reports which assist the SHO in keeping track of the offences and correlate with the beat performance and crime occurrence.
GCARE
GIS Based Crime Analysis and Reporting Engine is a desktop-based Geographic Information System (GIS) developed for State Crime Records Bureau (SCRB), Karnataka State Police by the Karnataka State Remote Sensing Applications Centre (KSRSAC). With this application, the information stored in the Crime Criminal Information System (CCIS) database can be viewed against spatial background over a map.
The main functionalities in G-CARE are Crime mapping, Crime Analysis, Village Analysis and Hotspot Analysis. The Data Capture involves creation of point data by capturing each and every FIR number on the correct location of the map. In Crime analysis, the CCIS data queried according to user defined criteria are displayed on the map with help of graphical symbols. In village analysis the information about a location and its sensitivity will be displayed on the map with graphics. Hotspot Analysis involves identifying spots of repeated occurrence of a particular crime over a district boundary.
G-CARE allows viewing of all the police station boundaries, their subsequent circles and subdivisions up to the district level. A module has also been developed to monitor and display the areas spatially, affected by illegal mining/quarrying along with the villages affected by the rampant usage of illicit liquor. The system retrieves information which helps to analyze the situation which in turn will help easy and fast decision making in SCRB.
Black Berry
This is an initiative of the Bangalore traffic police which brings together all aspects of operational traffic policing in one unified system. The Bangalore traffic police Officers are provided with a Black Berry Smart phone and a Bluetooth printer and they can access the history of any driver and vehicle and issue challans on the spot to offenders. The system is capable of pulling out data from more than two million cases in less than two minutes. Vigilance is also observed through video cameras set up at different traffic signals and the traffic staff at the control room continuously update the database of offenders’ vehicles monitoring the footage recorded.
Online booking of violations using Black Berry and video monitoring also ensures tracking of habitual offenders and unpaid violation notices issued in the past. The system has resulted in better traffic management and increased revenue and has been replicated by the Hyderabad Traffic Police in Andhra Pradesh.
Dial 100
It is the Public Distress Response system which uses GSM, Wireless Media, and Computer based Command and control from Police control room, multiple vehicle mount terminals and GIS based navigation and guidance. On receipt of complaint / grievance from public by Dial 100 to Control Room, an incident report is generated and is transferred to the dispatcher electronically in real time.
The wireless operator/dispatcher assesses the incident report along with all details of complaint, address, telephone number and scene of crime and GIS map (Digital Map) of the city / locality to help dispatcher to see the address on the map for the incident. GPS based Vehicle tracking system displays the real time availability of the PCR(Police Control Room) vehicles which will respond to the emergency call. The dispatcher based on above information will instantaneously transfer the incident report to the identified Patrol van on to its Mobile Data Terminal (MDT) for attending to the emergency and the system enables the dispatcher to monitor the patrol van in real time on his computer. After successfully attending the emergency calls the system /dispatcher closes the event. The calls handled by the Police control room are fully monitored and stored in computer systems to facilitate the response process to be computerized.
Automated Finger Print Identification System (AFIS)
It is a software used to capture and search Finger Prints of suspects, arrested and convicted persons. The software facilitates search of ten digit fingerprints of arrested and suspected persons and chance prints developed at crime scene by FP Experts. It uses Minutiae based search after converting the fingerprints available on ten-digit F.P. slips and lifted chance prints to their digital form. Since it is a Minutiae based search even the most partial chance prints not having delta or core i.e., complete pattern, are successfully searched on the entire database of AFIS and the search results are offered with great speed and fool-proof accuracy.
The Karnataka State Police installed an imported portable live scan device in various police stations in the State under the Police Modernization scheme for obtaining ten-digit fingerprints of arrested and convicted persons at police station level and to get the search results on-line from the jurisdiction finger print units/central AFIS server within the least possible time limit.
At present each District FP Unit is connected to the DPO via network and also the central AFIS server installed in State FPB, to facilitate fast & accurate search of ten prints and chance prints on-line and communication of search results within few minutes.
e-Procurement
This is the digital platform created by the department of e-governance for facilitating the process of procurement of supplies/ work/ services to all government departments. The e-procurement value chain consists of suppliers/vendors registration, indent management, E-tendering, e-auctioning, catalogue management, and contract management.
More than 400 suppliers/vendors have enrolled through the website after fulfilling qualifying criteria to participate in the e-tendering. The departments and their sub-units opting for e-procurement have to register themselves with the Centre for e-governance. When a tender is published on the e-procurement portal, it gets notified to all the vendors along with different dates, cut off dates in the process. The department can receive bids in the electronic form which will be saved in an encrypted format. A total of 24 government departments including the Karnataka state police are utilizing this service
HRMS
This is the web-based application merging basic HR activities and processes with Information technology. Currently it is rolled out in the entire state and is generating salary bills of more than five lakh employees of all categories and pay scales like State, Centre, UGC, AICTE, Judicial etc. and is also maintaining employee service history. The HRMS system takes care of the two main functions Service Record Maintenance and Payroll Generation of employees.
The Payroll module automates the pay process by gathering data on employee time and attendance, calculating various deductions and taxes, and generating periodic pay cheques and employee tax reports. The pay bill is then submitted to Treasury for payment. The SR(Service Record) or maintenance function covers all other HR aspects from recording the details of new employee joining service to his retirement. The system records basic demographic and address data, training and development, capabilities and skills management records and other related activities.
Khajane
The Online Treasury Project of the Karnataka State Government is a Government-to-government (G2G) project which computerizes all the 216 Treasury offices in Karnataka and is connected to a central server at the State Secretariat. A citizen interface is provided for service pensions and Social security pensions which is an exception to its G2G nature. The entire treasury activity can be tracked through this system from the time of approval of the state Budget to the point of rendering accounts to the government. The applications being supported by the system presently are payments, receipts, deposits, pensions, stamps, social security pensions and report generation etc.
GPS based Automatic Vehicle Location System (AVLS)
GPS based Automatic Vehicle Location System (AVLS) is an electronic device installed in a vehicle to enable the owner or a third party to track the vehicle's location and also receive additional information about vehicle. Karnataka state police has taken a decision to equip all their deployment vehicles, especially those of the Karnataka State Reserve Police(KSRP) and district armed reserve with AVLS. This enables police officials to find out the deployment location of any vehicle in real time. By this senior officials can supervise deployment effectively as well as can deploy the nearest police vehicle in case of law and order situations or any other emergencies and this would ensure faster police presence whenever required.
Deployment Team
The application is deployed by the SCRB Police IT team. The team monitors the training, deployment, implementation and hand holding tasks related to Police IT. A team is also constituted in every unit under the overall leadership of the Unit Officer which consists of the officers and officials of various levels to deploy the application in their concerned units. The table shows the deployment status of each of the modules and some of the important sub components.
Challenges
The project was started from scratch and faced different challenges at different stages. Due to the lack of skilled manpower and the nature of works being multifaceted in nature the requirement validation had proved a difficult task and identification of processes and workflows was another big task. Then the bureaucratic resistance to change and the need for giving technical training to semi-skilled manpower had been biggest problems in implementation. The project currently being under phased deployment, duplication of works is another problem. The coordination with other departments which are comparatively less digitized is another major problem currently being faced by the department.
Rewards and recognitions
Mr. Suresh P, Police Inspector and Mr.Raja Imam Kasim, Police Inspector of SCRB were honored with the Karnataka Chief Minister's Medal for Meritorious Service for remarkable contribution in the field of Capacity Building for Police IT
Central e-Mission Team of CCTNS project has recognized the utility of the software and has requested for sharing of the source code.
Way forward
Integration of Police IT Project with Legacy Systems and CCTNS has been approved by the state government and is in progress under the Challenge Fund Scheme established to support innovative ideas in technology by the state government. Provision of digital signature to officers at different levels and persuading other departments like judiciary and revenue departments to go online to accept the reports of the police online forms next priority after integration with CCTNS. The state government has expressed its willingness to provide technical support to the center and other states in their efforts at digitizing their respective policing processes and departments.
References
Karnataka State Police
Karnataka Police academy
Bangalore City Traffic police
Cyber Police, Bangalore
Bangalore Commissioner office
CCTNS Crime and Criminal Tracking Network System
ECops, AP Police
E-Beat Karnataka Police
AP State Police
National e-governance plan
HRMS System
State remote sensing application centre
E-government in India
Science and technology in Karnataka
Karnataka Police
|
3935256
|
https://en.wikipedia.org/wiki/Design%20Web%20Format
|
Design Web Format
|
Design Web Format (DWF) is a file format developed by Autodesk for the efficient distribution and communication of rich design data to anyone who needs to view, review, or print design files. Because DWF files are highly compressed, they are smaller and faster to transmit than design files, without the overhead associated with complex CAD drawings (or the management of external links and dependencies). With DWF functionality, publishers of design data can limit the specific design data and plot styles to only what they want recipients to see and can publish multisheet drawing sets from multiple AutoCAD drawings in a single DWF file. They can also publish 3D models from most Autodesk design applications.
DWF files are not a replacement for native CAD formats such as AutoCAD drawings (DWG). The sole purpose of DWF is to allow designers, engineers, project managers, and their colleagues to communicate design information and design content to anyone needing to view, review, or print design information – without these team members needing to know AutoCAD or other design software.
An Autodesk DWF advocate blog cites as DWFs strengths over alternatives that the files have very high mathematical precision, and contain meta-data for sheets, objects and markup data. Another significant strength is that comments and markup can be reintroduced to, and edited in, some Autodesk products, such as Revit and AutoCAD.
The AutoCAD file format (.dwfx) is based on ISO/IEC 29500-2:2008 Open Packaging Conventions.
Technology
DWF is a file format developed by Autodesk for representing design data in a manner that is independent of the original application software, hardware, and operating system used to create that design data. A DWF file can describe design data containing any combination of text, graphics, and images in a device independent and resolution independent format. These files can be one sheet or multiple sheets, very simple or extremely complex with a rich use of fonts, graphics, color, and images. The format also includes intelligent metadata that captures the design intent of the data being represented.
The DWF technology centers on three components:
C++ libraries for developers
a viewer for project team members who wish to view design data without knowing AutoCAD
a writer that allows anyone to create a DWF file from any application
DWF Toolkit
DWF is an open file format. Autodesk publishes the DWF specification and makes available C++ libraries for any developer who wants to build applications around the DWF format, with the DWF Toolkit. Furthermore, DWF is based on other industry standards such as ZLIB, XML, and common image formats.
DWF files (since version 6.0) are a ZIP-compressed container for the drawing files; despite the first few bytes of the file containing a DWF header, renaming a .dwf file to .zip will allow the component files inside to be viewed with archive compression software. Amongst various XML and binary files, is a PNG format thumbnail preview.
DWF can be interfaced with .NET Libraries.
Design Review
Autodesk Design Review is a free viewing application that enables all members of the project team to easily view, measure, markup and print designs shared electronically. Built around the DWF file format, Design Review enables users to view and print complex 2D and 3D drawings, maps, and models published from Autodesk design applications or from the DWF Writer.
Also, all Markups and Annotations created in Design Review can be imported to the original file when using Autodesk applications, such as AutoCAD, Inventor or Revit Architectural. This feature makes DWF the ideal format for design reviewing and collaboration processes.
Although an Autodesk representative stated on the Official Autodesk user Forums in September 2013 that the application would be discontinued, an update to Autodesk Design Review was released in 2017.
DWF Writer
Autodesk DWF Writer software publishes the DWF format from CAD applications that do not offer built-in DWF publishing, such as Bentley MicroStation or Dassault's Solidworks software. Autodesk DWF Writer is a Windows printer driver that converts files to DWF format. The result is that the entire project team can standardize on a common file format to exchange and review designs and sheet sets, at no additional cost.
Freewheel
In 2007, Autodesk introduced an online translator for DWFs called Freewheel. Freewheel was a way to view a DWF file without downloading software. It was also a web service which offered developers a web-based interface for viewing, querying, and manipulating DWF files.
Freewheel has been replaced by the web based viewing and editing web service Autodesk 360.
Platforms
Autodesk's DWF viewers (except for Freewheel) are all based on Microsoft Windows.
The DWF Toolkit is available on Microsoft Windows, Linux, and Mac OS X.
History
The DWF format first appeared in 1995 as part of the unveiling of Autodesk's "WHIP!" Netscape Navigator plug-in. The format was originally referred to as the Drawing Web Format, since DWF files were generated by the Autodesk Internet Publishing Kit. As the format grew in use beyond just AutoCAD, it was renamed to Design Web Format. Although originally a 2D-only format, DWF has evolved to include 3D. Today DWF files are generated by all Autodesk products. In addition, there are a variety of third-party applications that make use of the format.
Alternatives
PDF is an internationally recognized open file format developed by Adobe Systems to allow electronic exchange of any printable document, independent of the source application software, hardware and operating system. PDF/E is a subset of v1.6 of the PDF specification specifically designed for engineering use.
SVG (Scalable Vector Graphics) is an open, XML based file format. It is suitable for use both as a format for creating and editing drawings and as a format for viewing and publication. For instance, Inkscape uses SVG as its native format, and both the Firefox and Opera browsers natively display SVG.
See also
CAD
DWG
DXF
PDF
PDF/E
Epaper (Portable Drawing)
Scalable Vector Graphics (SVG)
References
External links
New format DWFx based on XML Paper Specification
CAD file formats
Vector graphics markup languages
|
1583207
|
https://en.wikipedia.org/wiki/McIntire%20School%20of%20Commerce
|
McIntire School of Commerce
|
The McIntire School of Commerce is the University of Virginia's undergraduate business school and graduate business school for Commerce, Global Commerce, Accounting, Management of Information Technology, and Business Analytics. It was founded in 1921 through a gift by Paul Goodloe McIntire.
The two-year McIntire program offers undergraduate students B.S. degrees in Commerce with concentrations in Accounting, Finance, Information Technology, Management, and Marketing. Undergraduate students at UVA apply to gain admission during their second year; upon acceptance, they enter the Commerce school at the start of their third year. Some students apply during their third year, and will enter upon their fourth year (thus spending a total of five years as an undergraduate as McIntire offers a two-year program).
McIntire offers five graduate programs: M.S. in Commerce, M.S. in Global Commerce, M.S. in Accounting, M.S. in Management of Information Technology, and M.S. in Business Analytics, the latter delivered in partnership with the Darden School of Business.
McIntire also offers certificate programs in business for non-business students, graduates, and working professionals in academic-year residential, summer residential, and online formats.
History
In 1920, the University of Virginia began offering students majoring in economics the opportunity to specialize in business administration. One year later a $200,000 donation from stockbroker, alumnus and Charlottesville philanthropist Paul Goodloe McIntire made the establishment of the McIntire School of Commerce and Business Administration possible. Over the next three decades McIntire operated as a separate entity from the College of Arts and Sciences, but worked closely with the James Wilson School of Economics. In 1952, the University's Board of Visitors approved the establishment of the McIntire School as a professional school to be administered as a separate unit of the University, distinct from the College.
Monroe Hall was opened in 1930 and became the home for the McIntire School.
Academics
McIntire offers degrees in the following disciplines:
B.S. in Commerce
The B.S. in Commerce is a 57-credit-hour upper-divisional school program for third- and fourth-year UVA students.
Students apply for enrollment at McIntire during the spring of their second year. Students accepted into the program begin coursework in the fall of their third year. Once they begin, students are enrolled in a 12-credit, block-style class called the Integrated Core Experience (the "ICE Block"). Blocks are taught by a group of professors, with each professor specializing in an aspect of business (marketing, finance, communications, strategy, systems, organizational behavior, and quantitative analysis). Professors conduct subject-based coursework on a rotating basis.
During the first semester at McIntire, students while in their ICE Blocks are assigned to teams. Each team assumes the role of an analyst, and works on a semester-long project for one of four Fortune 500 companies (CarMax, AB InBev, Hilton, or Margaritaville in the 2018-2019 academic year). The team-based project requires students to advise senior management on a problem or objective the company is facing.
Students then specialize in one of five "concentrations": Accounting, Finance, Information Technology, Management, and Marketing (International Business was offered in the past as a concentration, but has since been discontinued). Depending on the requirements of the concentration, students begin taking classes for their concentration either in the second or third semester at McIntire. Each concentration has its own coursework, with some required courses fixed for the concentration and other required courses offered to students as a choice of electives; the level of course required, both fixed and electives, varies from concentration to concentration. The Finance concentration, for example, has four required fixed courses plus one required elective (from a selection of various courses), while the Marketing concentration has one fixed requirement plus two required electives (also from a selection of various courses). Students who wish to are able to select more than one concentration, but cannot choose more than two concentrations.
McIntire students can also choose to study in an area of specialty that spans across several disciplines, called a "track". Generally, students may select a track during the spring semester of the third year or the start of the fourth year. McIntire students may complete up to two tracks if course scheduling allows, but cannot complete three or more tracks. McIntire offers tracks in Advertising and Digital Media, Business Analytics, Entrepreneurship, Global Commerce, Quantitative Finance, and Real Estate.
M.S. in Commerce
The ten-month, 40-credit-hour M.S. in Commerce integrates foundational business skills, a specialization in business analytics, finance, or marketing & management, and concludes with the Global Immersion Experience (GIE). The required GIE is an in-depth overview of your designated region during a one-week residency in Charlottesville, followed by overseas travel with a class cohort on an intensive three-week schedule of academic, company, and cultural visits.
M.S. in Global Commerce
The M.S. in Global Commerce is a three-continent, one-year program designed for recent high-potential business or management major graduates with little to no prior work experience. Students learn in three different locations and earn the M.S. in Global Commerce from UVA McIntire in Charlottesville, Virginia at UVA, as well as an M.S. in Global Strategic Management from ESADE Business School in Barcelona, Spain, and a certificate in International Business from Lingnan (University) College at Sun Yat-sen University.
M.S. in Accounting
McIntire's M.S. in Accounting is a nine-month, 30-credit-hour program that prepares students for professional practice by sharpening the analytical and technical skills they need to excel in the field of accounting.
M.S. in Management of Information Technology
The M.S. in MIT is a one-year program that integrates technical and business-related knowledge and skills. The program helps students understand how current and emerging technologies can best be applied to make their organizations more profitable, productive, and competitive. The executive format of the program allows working professionals from a wide range of industries and functional areas of expertise to remain on the job while completing their degree.
M.S. in Business Analytics
The M.S. in Business Analytics is a one-year program delivered by McIntire faculty in collaboration with UVA’s Darden School of Business at the University's facilities in the downtown Arlington, Va., district of Rosslyn. Intended for early-career professionals with a minimum of two years of work experience, the program combines weekend, in-person sessions, and online instruction, to offer students a broad mix of analytical and technical skills as well as foundational business knowledge and leadership instruction.
McIntire Certificate Programs
McIntire offers graduate certificates in Business Fundamentals, Sustainable Business, Business Essentials, Cybersecurity for Business Leaders, as well as individual modular courses in Executive Management. Courses are delivered in multiple formats including academic-year residential, summer residential, and online.
Rankings
In 2009, McIntire was ranked number one nationally for undergraduate business schools by Bloomberg BusinessWeek. Between 2011, the same magazine ranked McIntire second in the country, praising the school's academics.
In 2012, McIntire was ranked as America's 5th best undergraduate business school by U.S. News & World Report.
In 2015, the M.S. in Commerce was ranked 1st among one-year, pre-work-experience master's in management programs by higher education research website Value Colleges.
In 2017, McIntire's B.S. in Commerce ranked as third best undergraduate business program overall in the U.S. by business education website Poets&Quants, and was ranked 1st in the U.S. by alumni satisfaction for student experience.
In 2017, McIntire's M.S. in Commerce program ranked 2nd worldwide in master's in management (MiM) programs by The Economist, and was the only U.S. school to appear in the top ten.
In 2018, McIntire's B.S. in Commerce ranked as the 2nd best undergraduate business program overall in the U.S. by business education website Poets&Quants, and was ranked 1st in the U.S. by alumni satisfaction for student experience.
In 2019, The Economist ranked McIntire's M.S. in Commerce degree as the top U.S.-based master’s in management program and No. 6 worldwide.
In 2020, Global education organization QS ranked McIntire’s M.S. in Global Commerce the #3 multi-campus program in its QS World Universities Rankings®. The program also known as Global 3 signifying its unique partnership with two other international institutions, was also named as the #11 master’s in management program out of 152 in the world.
In 2021, McIntire's B.S. in Commerce once again ranked as the 2nd best undergraduate business program overall in the U.S. by business education website Poets&Quants, and was ranked 1st in the U.S. by alumni satisfaction for student experience, maintaining a top three spot on the list for the fourth consecutive year.
Back to the Lawn
The McIntire School has moved from its original location in Monroe Hall to Rouss Hall. This migration, entitled "Back to the Lawn" by the school, began in April 2005, and was completed in December 2007. The move entailed an extensive expansion and renovation of Rouss Hall to fit the needs of the Commerce School. The 132,000-square-foot Robertson Hall adjoins historic Rouss Hall, creating a 156,000-square-foot academic complex on the Lawn. The major renovation of Rouss Hall and the construction of the adjoining Robertson Hall created a new academic complex to house the McIntire School of Commerce, and to fit the School's new and expanding needs. Some of the extensive renovations and expansions includes, among others, a state-of-the-art computer-trading center, computer labs, conference rooms, study lounges, student lounges, and meeting rooms.
Monroe Hall is now occupied by the offices of the Undergraduate Association Deans for the College and Graduate School of Arts & Sciences, as well as the Department of Economics. The former occupy the original south portion of the building, while the latter occupies the Balfour Addition on the north side of Monroe Hall (prior to 2005, the Department of Economics was located in Rouss Hall; effectively, the Department of Economics and the McIntire School of Commerce traded buildings).
Notable alumni
Tiki Barber, former professional football player
Ronde Barber, former professional football player
Ben Olsen, former professional soccer player and former coach of D.C. United
Charles L. Glazer, former U.S. Ambassador to El Salvador
Brereton Jones, former Governor of Kentucky
Alexis Ohanian, co-founder of Reddit
Ben Pollack, world record-holding powerlifter
References
University of Virginia schools
Business schools in Virginia
1921 establishments in Virginia
Educational institutions established in 1921
|
48677372
|
https://en.wikipedia.org/wiki/DesignSpark%20Mechanical
|
DesignSpark Mechanical
|
DesignSpark Mechanical is a free 3D CAD (computer-aided design) solid modelling software application.
DesignSpark Mechanical enables users to solid model in a 3D environment and create files for use with 3D printers.
Using the direct modelling approach, it allows for unlimited and frequent design changes using an intuitive set of tools. This free 3D CAD software is offered as a payment free download, but requires a one-time registration with DesignSpark.com to receive the latest community news and product promotions.
In order to create engineering drawings in the same framework, DesignSpark Mechanical Drawing, which is not free, would also be required.
Background
DesignSpark Mechanical is based on the SpaceClaim Engineer application and is the product of a collaboration between RS Components and Ansys, Inc.
An introductory brochure is available here.
The goal to offer a free 3D CAD software with many features of high-end software is to engage with those such as Engineering Students or small businesses who may not require or who cannot afford premium branded 3D CAD software.
Rapid prototyping
DesignSpark Mechanical supports Rapid Prototyping through SpaceClaim's 3D direct modelling methodology using the Pull, Move, Fill and Combine tools that allow a user to interact with digital 3D objects like modelling with clay, all available in the free 3D CAD version.
3D CAD library
3D models for more than 75,000 products from the RS catalog are available for download within the software.
Add-on modules
Paid add-on modules are available and provide functionality for the free 3D CAD DesignSpark Mechanical software, such as full support of two popular 3D file formats (Export and import file type: STEP & IGES) and an associative drawing environment, adding many functions such as cosmetic Threading, GD&T, Annotations and more.
See also
Comparison of 3D computer graphics software
Comparison of computer-aided design editors
DesignSpark PCB
DesignSpark PCB Pro
References
Further reading
"Diseñar en 3D con DesignSpark Mechanical". Automática e instrumentación. No. 454, 2013. pages 36–37.
"推出3D设计软件 DesignSpark Mechanical". Global Electronics China. No. 10. 2013.
"DesignSpark Mechanical upgraded with optional modules". New Electronics.
"48-Hour 3D Design Challenge With DesignSpark Mechanical". EE Times.
"DesignSpark Mechanical: It's Not Your Grandmother's MCAD!". EE Times.
"DesignSpark Mechanical gets 3D print slicing in v4 upgraded". ElectronicsWeekly.com.
"DesignSpark Mechanical User Design Challenge". Engineering.com.
"DesignSpark Mechanical Power Hack". Engineering.com.
"Independent software reviews on Capterra". Capterra.com.
External links
Official Forum
Independent review of software
Computer-aided design software
|
4436254
|
https://en.wikipedia.org/wiki/MAMP
|
MAMP
|
MAMP is a solution stack composed of free and open-source and proprietary commercial software used together to develop and run dynamic websites on Apple Macintosh computers.
Specifications and uses
The name MAMP is an acronym that stems from the names of the components of the system: macOS (the operating system); Apache (the web server); MySQL or MariaDB (the database management system); and PHP, Perl, or Python (programming languages used for web development). The name is derived from LAMP, a similar stack of all open-source software widely used for web sites, but substituting the proprietary macOS for the open-source Linux OS. (Similar "AMP" stacks exist for other operating systems.) MAMP is not limited to these choices of components, however; Nginx can be used in place of Apache, for example, and the same goes for substituting MariaDB for MySQL.
Some of the software packages that comprise MAMP (particularly Apache and PHP) are pre-installed with macOS; compatible versions of the remainder are readily available for installation and use. MAMP is commonly used with and to develop for popular CMS programs such as WordPress and Drupal by setting up a local development environment on laptop or desktop computers, without the need for a standalone web server.
References
Web development software
Web server software
PHP
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.