id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
40459936 | https://en.wikipedia.org/wiki/Randall%20Cunningham%20II | Randall Cunningham II | Randall Wade Cunningham II (born January 4, 1996) is a former American high jumper. He competed collegiately for the USC Trojans Men's track & field team. A dual-sport athlete, he also played quarterback at Bishop Gorman High School. He is a five-time Nevada Interscholastic Activities Association (NIAA) state champion (three times in track and twice in football). He is a 2-time NCAA Track Champion, and 4-time NCAA All-American, U.S. Junior National Champion, and Pan American Junior Athletics Championships Champion.
In track, he set USA Track & Field (USATF) and Amateur Athletic Union (AAU) national 15–16-year-old boys high jump records with a heights of and , respectively, as a sophomore. As a junior, he posted the highest jump of the year by an American high school student in Spring 2013 with a height of . He was the 2013 Nevada Track & Field Gatorade Athlete of the Year. He won the NIAA state high jump championship as a freshman, as a junior and as a senior.
In football, he led Gorman to its fifth consecutive Nevada Interscholastic Activities Association (NIAA) state championship in 2013 and declined numerous Division I Football Bowl Subdivision (FBS) scholarship offers as well as an offer to play football at Yale University. He is the son of retired National Football League quarterback Randall Cunningham, nephew of retired NFL fullback Sam Cunningham and older brother of World Champion Vashti Cunningham.
During his freshman year at USC, he became an All-American by placing 8th in the year-end National Collegiate Athletic Association (NCAA) outdoor championships. During the subsequent summer he became the U.S. Junior National high jump Champion and won a gold medal at the 2015 Pan American Junior Athletics Championships. He won the 2016 NCAA outdoor championships as a sophomore and was an All-American as a junior. He won the NCAA indoor championship as a senior.
Career
Football
Cunningham attended nearby Silverado High School in Las Vegas for his freshman season. His father, who had previously coached his youth teams, was hired as the football team's offensive coordinator and for the track team's staff in December 2009. In August 2011, his father resigned his positions and transferred his son to Bishop Gorman just prior to his sophomore year.
Due to NIAA rules which require a transfer student to wait a year before participating in athletic activities, Randall II was required to sit out his sophomore year in both football and track and field at Bishop Gorman. Then, he backed up four-time state champion starting quarterback Anu Solomon as a junior. That season, he compiled 298 yards and two touchdowns on 21–32 passing with four interceptions and added 42 rushes for 483 yards and seven touchdowns. By his junior year, his 40-yard dash speed was laser-timed at 4.6 seconds. As a senior, he inherited a team that Solomon had led to four consecutive state championships. Despite not starting until his senior season, he entered the year with football scholarship offers from Mississippi State, LSU, Baylor, Syracuse, Arizona State, Utah and UNLV. USA Today predicted that Baylor and LSU may be favorites because of their strong track programs.
During his senior season, the team played a schedule of out-of-state schools for its first 6 games before beginning league competition. Bishop Gorman won 4 of those games. Its October 4 contest with Miami's Booker T. Washington High School was broadcast on ESPNU at a time when Washington was the number one ranked high school in the country. By that time, he had added offers from Kansas State and Yale. In the five previous seasons under head coach Tony Sanchez, Bishop Gorman had gone 60–5 and not lost by more than 14 points. Bishop Gorman entered the game with national rankings of 18 by Rivals.com, 32 by Student Sports. Gorman trailed 14–12 with 8:35 remaining when Cunningham fumbled. Washington scored a touchdown and then another following Cunningham's third interception, resulting in a 28–12 defeat. Subsequently, Cunningham led Gorman through an undefeated Southwest League regular season, marking the seventh consecutive such occurrence for the school. By mid-November, Cunningham stated "I like USC, UCLA, Kansas State, Texas, ASU, and Indiana - and Oregon as well". On December 7, he led Gorman to a 48–14 victory over Edward C. Reed High School in the state championship, rushing for 4 touchdowns and 213 yards on 22 carries and throwing for a touchdown and 111 yards on 9-of-11 passing. Cunningham was briefly recruited by Clay Helton, USC quarterback coach under Steve Sarkisian, but USC did not make him a football scholarship offer. After accepting a track scholarship to USC, Cunningham announced he would attempt to walk-on to the football team.
Track
On August 1, 2010, Cunningham placed second in the 13–14 age group at the USATF National Junior Olympics with a high jump of . As a freshman, he won the May 20, 2011 NIAA AAAA high jump championship with a jump of . As a sophomore, he sat out of NIAA competition after transferring. His father's best high jump in high school was . On June 24, 2012, Cunningham established the USATF 15–16 age group Outdoor Track & Field record with a jump of . Cunningham won the August 2012 National AAU Junior Olympic Games high jump with a jump of . He actually won the 15–16 age group with a height of . The Junior Olympic age group record of by Johnnie Bartley had stood since 1986, but Cunningham continued to jump past his winning height to establish a new Junior Olympic record. By April 11 of his 2013 junior season, he had already cleared , which was the NIAA state championship record, four times that season. In the May 18, 2013 NIAA state championships, he achieved a high jump of , which was the best height by a high school high jumper in the nation that year. He earned the 2013 Nevada Track & Field Gatorade Player of the Year award. In the August 2013 AAU Junior Olympics, he was second or third in the 17–18 age group with a height of or , depending on the source. On January 3, 2014, he made a verbal commitment to the USC Trojans track team, shunning over 30 football scholarship offers. In 2014 at the annual Mt. SAC (Mt. San Antonio College) Relays, he set the American high school season best for boys of on the same April 12 day his sister Vashti did so for girls with . He was surpassed by Bryant O'Georgia of Arizona by one quarter inch in May. Cunningham placed first in the May 24, 2014 NIAA state championship with a high jump of and second with a long jump of .
As a freshman at the University of Southern California, Cunningham finished second at the Pac-12 Outdoor Championships with a height of and tied for 8th at the 2015 NCAA Division I Outdoor Track and Field Championships (). Two weeks later, he won the U.S. Junior National Championship with a . His top 8 finish in the NCAAs earned him All-American recognition. In his freshman year, Randall was coached by 2-time Olympian Jamie Nieto who took over as the USC assistant coach in charge of jumps and multi-events on August 20, 2014. Later that summer he earned a gold medal at the 2015 Pan American Junior Athletics Championships with a jump of . His sister Vashti also won gold at that same competition.
As a sophomore, he was second again at the Pac-12 Outdoor Championship with a height of and won the 2016 NCAA Division I Outdoor Track and Field Championships with a height of , which is an outdoor personal best. Cunningham no-heighted at the July 8, 2016 Olympic Trials qualifying round after three unsuccessful attempts at . The trials were held during a torrential downpour that was deemed severe enough to suspend the women's pole vault event and that seemed to impair the men's discus event.
As a junior, Cunningham was recognized on March 6 as the west region Men's Field Athlete of the Year for the indoor season by the United States Track & Field and Cross Country Coaches Association. He placed fourth at the March 11, 2017 NCAA Division I Indoor Track and Field Championships with a height of , earning him another All-American recognition.
As a senior, Cunningham won the 2018 NCAA Division I Indoor Track and Field Championships with a USC record height of .
Personal
In a highly anticipated birth, Cunningham II was born to Randall Cunningham and Felicity (née De Jager) in Las Vegas on January 4, 1996. He is well known as the son of 2-time All-American punter and 4-time Pro Bowl quarterback Cunningham. He is also the nephew of College Football Hall of Fame running back Sam Cunningham. In addition, he has two other Cunningham uncles (A.C. and Bruce) who played Division I football. His mother, Felicity, is a native South African who was formerly a professional ballerina with the Dance Theatre of Harlem. His younger sister, Vashti Cunningham, is a World Indoor Champion and subsequently signed a professional contract with Nike while still in high school. His brother, Christian, died at age 2. Cunningham also competed in the long jump in high school.
As of his junior year in high school, Cunningham intended to compete in both football and track in college, although his father's alma mater, UNLV, does not have a men's track program. Baylor, who made him his first offer, has coined the nickname RC2, a reference to RG3, for him. He aspired to break the national high school record of , and he also aspires to be an Olympic high jumper, but the automatic qualifying jump for the 2012 team was . The qualifying standard for the 2016 Olympics was .
Notes
External links
Cunningham's high jump stats at Dyestat.com
Cunningham's track stats at Athletic.net
Cunningham's football stats
Cunningham's USC bio
1996 births
Living people
American male high jumpers
Bishop Gorman High School alumni
Sportspeople from Las Vegas
Track and field athletes from Nevada
USC Trojans men's track and field athletes |
65491762 | https://en.wikipedia.org/wiki/Decree%20on%20Islamic%20Defenders%20Front | Decree on Islamic Defenders Front | The Decree on Islamic Defenders Front or Joint Decree 220-4780 2020, M.HH-14.HH.05.05 2020, 690 2020, 264 2020, KB/3/XII/2020, 320 2020 is a decree enacted by six ministries and departments in Indonesia to prohibit any activity related to the Islamic Defenders Front (FPI) and the use of its related symbols. The decree was enacted on 30 December 2020, and is currently in force. The decree was read by Deputy Minister of Human Rights and Law, Eddy Hiariej. The Indonesian government argues that the Islamic Defenders Front and its members violated the law and accuse its members of links to terrorists, justifying the ban. The decree prohibits any association with Islamic Defender Fronts and justifies the arrest of anyone involved in its activities or carrying any symbols related to it. The ministers of the Ministries of Home Affairs, Law and Human Rights, Communication and Information Technology, the Attorney General, the Chief of the National Police, and the National Counter Terrorism Agency signed the law.
Background
Call for Disbandment
There have been calls to disband Islamic Defenders Front (FPI) for many years beginning in June 2000 when FPI members attacked the National Commission on Human Rights headquarters. The agency had been investigating the Indonesian Army's former General Wiranto's involvement in various human rights violations during the May 1998 riots and the Indonesian occupation of East Timor. Although the FPI was established by hard-line Islamic scholars, they supported right-wing elements in politics and the military, which supported former president Suharto and tried to prevent this from coming to light.
Over the years, the increased vigilantism of the FPI worried the public and caused unrest for many Indonesians. There have been demands by Indonesians, mainly mainstream Muslims, other religious organizations, political communities and ethnic groups, for the FPI to be disbanded or banned. In the aftermath of the Monas Incident, the moderate Islamic organization, Nadhlatul Ulama, and its wings sent an open letter to Indonesia's then-president, Susilo Bambang Yudhoyono (SBY), calling on the government to take action against the FPI by disbanding it and any of its factions. Former president Abdurrahman Wahid, in the aftermath of that incident, voiced his support for disbanding the FPI after visiting the victims of its attack, saying he disagreed with is use of violence and its threats against national security and safety. However, he said law enforcement agencies had not disbanded the FPI because it was "supported by law enforcement".
A collaborative study undertaken by Arizona State University Tempe, the Singapore Institute of Management, Sunan Kalijaga State Islamic University, and Manado State Islamic College, published in 2013, found that there was collusion between the government and factions of the state security forces with the FPI for their own gain.
The study revealed the FPI enjoyed legislative protection then. There was an attempt to disband it by the SBY administration. Gamawan Fauzi, the Minister of the Interior, studied ways to end FPI activity and disestablish the organization. However, piece of legislation at that time, Ormas Law (Law No. 17 of 2013), required that the disbanding process must be exhaustive and finally must be supported by a court decision. The regulation at the time prevented the government from easily disbanding an organization. Such a lengthy and exhaustive process made the disbandment process one that was no longer pursued.
Over time, because of the state's uncertain future and its lack of control, the FPI's influence and actions grew. The FPI used Islamic jargon to further cement its influence. At its peak of power, there was a perception that "whoever is against the FPI was against Islam". Such a perception made the situation very difficult.
Loss of Government Support and Disbandment by Jokowi Administration
Over time, the FPI gradually lost political favor with the ruling government. Despite that, the FPI still maintained a militant mass of individuals under its umbrella. Until the end of the SBY administration, the FPI enjoyed a good relationship with government. During 2014, the FPI took a stance against Jokowi even before his rise to the presidency. After Jokowi gained the presidency, the FPI participated in various anti-government actions. It now became a pressure group to bring pressure against Jokowi and his administration. Islamic far-right groups and the Islamist Party, such as the Prosperous Justice Party, used the FPI to mount opposition, despite this possibly resulting in further polarization of the Indonesian people. During Jokowi's presidency, the FPI also led various Islamist mass protests known as Aksi Bela Islam (Actions 411, 212, 313, 11–2, 21–2, 31–3, 5-5, and so on) which tried to undermine Jokowi's presidency and used identity politics leading to launch a smear campaign against Jokowi, branding him as an "un-Islamic leader". This resulted in not only electoral defeats in Islamic provinces like Aceh, West Sumatra, Riau, Banten, West Java, West Nusa Tenggara during the election, but unsuccessful government programs in those areas. Jokowi grew tired of the FPI and its use of identity politics. The FPI used political buzzers (social media political operators tasked with making particular online conversation subjects trend), online or not, not only for smearing anyone who opposed them but also to build their own image which seems grandiose to commoners and layman, to make them appear "big" and "holy", when in truth they are demonizing and harmful.
In a post-return action celebrating the return of Muhammad Rizieq Shihab, the hardline Islamist scholar, the FPI launched the "Revolusi Akhlak" ("Moral Revolution") campaign. Despite its name, the proposed revolution does not emphasize the change of one's morals, but revolution against Indonesian leaders Shihab saw as "immoral leaders" and their "immoral leadership" worthy of being toppled. Shihab promoted Indonesia's transformation turned into a Sharia-based country with Tauhid as the basis of the state system. He also threatened to use weapons to wage open war against the government if, as it claimed, they must keep the "Ulamas ... oppressed", further escalating political tension. Fadhli Harahab, a political analyst, denounced Shihab's so -called revolution as "camouflage of seditious acts" He added Shihab is a hypocrite, as his acts and those of the FPI are immoral and are contrary to Islamic moral standards. He warned the public not to swallow Shihab's misleading statements.
Back in 2017, in a shocking move, Joko Widodo and his administration issued Government Regulation instead of Law No. 2/2017. The Government Regulation (later signed into law as Law No. 16 of 2017) amended the previous Ormas Law (Law No. 17 of 2013). The new law removed the need for a lengthy process and a court decision to disband an unruly and threatening organization for the sake of national unity and integrity and maintaining peace and order. The new law made it much easier for the government to disband an organization, despite many Indonesian human rights activists maintaining this law might violate human rights in an authoritarian manner. Despite that opposition, the government banned Hizbut Tahrir Indonesia (HTI) on 19 July 2017 using the new law. After the banning of the HTI, far-right Indonesian Islamic group, including the FPI, feared their existence might be threatened by the law.
On 30 December 2020, like the HTI, the FPI was finally banned using the same law. The ban was announced after the capture of FPI leader, Muhammad Rizieq Shihab, on 13 December 2020 for violating Indonesia's COVID-19 restrictions and anti-government incitement.
Content
The decree is six pages long decree divided into three parts detailing with justifications, considerations, and decisions on why the FPI should be banned.
The justification part contains seven points, summarized as:
For the sake of preserving state ideology and basic state consensus: Pancasila, 1945 Constitution, state integrity, and Bhinneka Tunggal Ika, the law regulating community/mass organization had been enacted (Law No. 16 of 2017 as Amendment of Law No. 17 of 2013 (Law of Community/Mass Organization), in Indonesia colloquially called the "Undang - Undang Ormas/UU Ormas" ("Ormas Law")).
The FPI organization constitution had been proved to conflict with the law.
The FPI Certification of Registration, Certification of Registration No. 01-00-00/010/D.III.4/VI/2014 dated 20 June 2014, was valid until 20 June 2019, but the FPI does not fulfil the requirements to extend the certificate past that time. Since the expiration date, FPI was dissolved de jure.
As Ormas Law prescribed, a community/mass organization must not commit acts against the law.
FPI members and administrators (and also ex-members and ex-administrators) had been found to be participating in terrorism (35 individuals, with 29 already sentenced), and other criminal acts (206 individuals, with 100 already sentenced).
The FPI also participated in illegal sweepings, which sweepings must be performed by authorities.
The Ministry of Home Affairs, Ministry of Law and Human Rights, Ministry of Communication and Information Technology, Attorney General, Chief of the National Police, and National Counter Terrorism Agency needed to issue the decree.
The consideration part contained references to establish the decree. The consideration part referring Constitution of Indonesia, related laws in force, and a Constitutional Court Decision.
UUD 1945 (Art. 28, 28C verse 2, 28E verse 3, and 28J)
Law No. 39 of 1999 (Law of Human Rights)
Law No. 9 of 2015 as Amendment of Law No. 23 of 2014 (Law of Local Government)
Law No. 16 of 2017 as Amendment of Law No. 17 of 2013 (Law of Community/Mass Organization)
Constitutional Court Decision No. 82/PUU-XI/2013 dated 23 December 2014
The decision part, deciding:
Declaring the FPI as unregistered organization, hence dissolved de jure.
However, even though already dissolved de jure, the FPI continues to commit acts that disturb the peace, are against public order, and against the law.
Forbidding any activities and display of any symbols and attributes of the FPI.
If an offense is found as detailed in decision No. 3, law enforcement officers can take proper action to stop the activity.
Asking the people:
Not to be influenced by FPI activities.
To report to law enforcement officers the sighting any activities and use of FPI symbols and attributes.
To assign the signatories of the decree (the ministries, police, and counter terrorism agency) to coordinate with each other and take proper legal actions as prescribed by the law.
The decree is effective on the date of stipulation.
Follow-Up and Derivatives
The chief of the Indonesian National Police issued an edict known as Chief of Indonesian National Police Edict No. Mak/1/I/2021. The edict prohibited involvement of the public, both directly or indirectly, in FPI or FPI-related activity, encouraged the public to report any FPI symbols, encouraged Municipal Police (Satpol-PP) (with support of TNI - POLRI) to clear the symbols, banners, posters, pamphlets, etc., and prohibited any sharing, access, and creation of content related to Islamic Defender Fronts online. The last point in the edict caused concern among journalists, as it may limit them in relating news about the FPI. However, the Indonesia National Police ensured the edict does not conflict with the rights of journalists as provided and protected by Law in Press (Law No. 40 of 1999). Inspector General Argo Yuwono, head of the Indonesia National Police Public Relations Division, later clarified that as long as the content is not a hoax, inciting conflicts, division, ethnic-race-religion (SARA) sensitive, and potentially causing public disorder and threatening public safety and security, it is still allowed.
Soon after the decree was announced, on 30 December 2020, Minister of Administrative and Bureaucratic Reform, Tjahjo Kumolo, announced that a rule to regulate public servants not joining the FPI or participating in FPI activities was tabled by the Ministry with the State Civil Apparatus Commission, and the Civil Service Agency. Sanctions were being decided, with severe punishment leading to the proposal to fire the guilty public servant. On 25 January 2021, the Ministry with the Civil Service Agency issued Joint Decree No.2/2021 2/SE/I/2021. The decree forbids state civil apparatus members to be part of, affiliated with, or supporting illegal organizations. The decree also explicitly mentioned the FPI along with previously banned organizations in Indonesia like the Communist Party of Indonesia, Jamaah Islamiyah, Millah Abraham (more well known in Indonesia as Gerakan Fajar Nusantara or Gafatar), Hizbut Tahrir Indonesia (HTI), and the Jamaah Ansharut Daulah (JAD). Sanctions included firing of the public servant.
Minister of Communication and Information Technology, Johnny G. Plate, announced that internet activity of the FPI or related to it will be prohibited and limited. He added he will clean Indonesian digital space. The ministry also coordinated with the Indonesian National Police, the Indonesian State Intelligence Agency, and various Internet service providers, and digital platform companies that operate in Indonesia to ensure it will happen.
On 5 January 2021, the Indonesian Financial Transaction Reports and Analysis Center (PPATK), the Indonesian financial intelligence agency, temporarily suspended activities and transactions of the FPI and its affiliates financial accounts. 59 bank accounts were suspended. The suspension was enforced as a follow up to the decree. These accounts are currently being investigated for any suspicious transactions related to money laundering or financial crime or any criminal crimes committed by the FPI. M. Natsir Kongah, head of PPATK Public Relation Division, mentioned that more than "hundreds of millions rupiahs" are frozen from the 59 bank accounts. Further analysis by PPATK increased the number of suspended accounts to 92. On 31 January 2021, PPATK submitted their investigation report to the Indonesian National Police's Criminal Investigation Agency. On 2 February 2021, the Criminal Investigation Agency's General Crime Directorate announced the opening of a case. During the announcement, representatives from the Police's Special Economy Crime Directorate, Special Detachment 88, and PPATK investigators were present.
Response
After the official disbanding of the FPI, its central committee and many FPI branches reacted strongly. South Sulawesi Regional FPI claimed the disbandment of the FPI is a "Great disaster for Muslims and Islam". The Central Java Regional FPI vowed to rebuild the organization again after Jokowi's presidency, or soon after so-called "regime change". The FPI Solo branch announced another name and form of the FPI would surface. The FPI Cianjur branch also lamented the government's disbandment decision. Sugito Atmo Prawiro, one of Muhammad Rizieq Shihab's lawyers, said the FPI's central committee will discuss the future of the FPI, either transforming into a new organization or changing its form into some kind of Majlis Ta'lim (lit: Long board).
Soon after its disbandment, a tweet on the FPI's main Twitter account announced the formation of the Front Pejuang Islam (English: Islamic Fighters Front) with a new motto Tetap Tegak Walau Tangan Terikat (English: Always Stand Up Straight Even Hands Are Bound), and tried to agitate the police and the military who are taking down any FPI groups in Petamburan FPI HQ. Separately before the announcement, the Ciamis branch of the FPI announced the same replacement name as the FPI. The FPI vowed to fight their disbandment in court.
Many parties appreciated the FPI disbandment. The Indonesian Democratic Party of Struggle (PDI-P) supported the move by the government, believing it had been made after deep and careful study. Nasdem also supported the move. Golkar supported the government's decision and claimed the move is had been anticipated for a long time as the "Public had known their track (the FPI) record". The United Development Party (PPP) supported the government's decision for the sake of public safety and national integrity. The Gerindra, a long-time ally of the FPI, criticized the decision as "unlawful" and "unconstitutional" although they supported the government's move to weed out radicalism and its movements. Muhammadiyah also responded and asked the government to remain just and fair. Muhammadiyah's youth wing, Pemuda Muhammadiyah, supported the government's move and its decision. Nahdlatul Ulama responded that any organizations must meet the legal standing to operate in Indonesia. The Prosperous Justice Party (PKS), continued to support the FPI and criticized the government move, claiming the FPI was still needed to maintain the democratic process and empower the opposition against the current government. They claimed the government had already failed to ensure freedom of speech and organization as outlined in the constitution.
Criticism
The Indonesian Youths' National Committee (KNPI) criticized the dissolution as unfair because the FPI was unlike the Communist Party of Indonesia (PKI), which was attempting a coup. Aziz Yanuar, an attorney for Muhammad Rizieq Shihab, criticized the dissolution as a diversion from the case of the shooting of six FPI members in December 2020. The Secretary General of the Indonesian Ulema Council (MUI), Amirsyah Tambunan, said "education is much better than dissolution". Politician Amien Rais said the dissolution was a political way to destroy Indonesian democracy.
Indonesian legal experts criticized the decree. Margarito Kamis, a legal expert, said that a ministerial decree is not the law and the existence of the organization is not based upon that organization being registered or not. Another legal expert, Refly Harun, said the decree can be viewed as a government attack against the FPI to weaken its power, even weakening the FPI's ability to defend itself against many cases befalling it. Arif Nurul Imam, an Indo Strategic Research and Consulting political analyst, said although he appreciated the government move as the FPI always acts and tries to undermine national integrity, he feared the decision would not kill the FPI's extreme ideology and may incite the FPI to become a clandestine organization continuing to urge its former members to undermine national integrity. He added the decree may spark a polemic by legal and human rights activists.
Bivitri Susanti, called the decree "clever and difficult to challenge" but said the decree is ineffective, as it still makes it possible for former FPI members to operate under a new name, and the constitution still granted them the right to organize. However, she noted the wording of the decree made it somewhat "court-proof", as the wording of the decree declaring the ban itself did not mention the FPI being "forbidden" and "disbanded". These two words would make the decree flawed, as they could be seen as depriving the human rights of former FPI members. The decree means the FPI has lost its legal standing and any future FPI would be "acts against the law", allowing law enforcement officers to take steps according to the law.
References
Decrees
Legal history of Indonesia
2020 documents
Joko Widodo |
149998 | https://en.wikipedia.org/wiki/Csound | Csound | Csound is a domain-specific computer programming language for audio programming. It is called Csound because it is written in C, as opposed to some of its predecessors.
It is free software, available under the LGPL-2.1-or-later.
Csound was originally written at MIT by Barry Vercoe in 1985, based on his earlier system called Music 11, which in its turn followed the MUSIC-N model initiated by Max Mathews at the Bell Labs.
Its development continued throughout
the 1990s and 2000s, led by John Fitch at the University of Bath.
The first documented version 5 release is version 5.01 on March 18, 2006.
Many developers have contributed to it, most notably Istvan Varga, Gabriel Maldonado, Robin Whittle, Richard Karpen, Iain McCurdy, Michael Gogins, Matt Ingalls, Steven Yi, Richard Boulanger, Victor Lazzarini and Joachim Heintz.
Developed over many years, it currently has nearly 1700 unit generators.
One of its greatest strengths is that it is completely modular and extensible by the user.
Csound is closely related to the underlying language for the Structured Audio extensions to MPEG-4, SAOL.
Csound code
Csound takes two specially formatted text files as input. The orchestra describes the nature of the instruments and the score describes notes and other parameters along a timeline. Csound processes the instructions in these files and renders an audio file or real-time audio stream as output.
The orchestra and score files may be unified into a single structured file using markup language tags (a CSD file with filename extension .csd). Here is a very simple example of a unified Csound data file which produces a wave file containing a one-second sine wave tone of 1 kHz at a sample rate of 96 kHz:
<CsoundSynthesizer>
<CsOptions>
csound -W -d -o tone.wav
</CsOptions>
<CsInstruments>
sr = 96000 ; Sample rate.
kr = 9600 ; Control signal rate.
ksmps = 10 ; Samples per control signal.
nchnls = 1 ; Number of output channels.
instr 1
a1 oscil p4, p5, 1 ; Oscillator: p4 and p5 are the arguments from the score, 1 is the table number.
out a1 ; Output.
endin
</CsInstruments>
<CsScore>
f1 0 8192 10 1 ; Table containing a sine wave. Built-in generator 10 produces a sum of sinusoids, here only one.
i1 0 1 20000 1000 ; Play one second of one kHz at amplitude 20000.
e
</CsScore>
</CsoundSynthesizer>
As with many other programming languages, writing long programs in Csound can be eased by using an integrated environment for editing, previewing, testing, and debugging. The one now officially supported is CsoundQt, and it has many features, such as automatic code insertion, integrated documentation browser, integrated widgets for graphically controlling parameters in realtime, plus a button for playing the code.
Csound 5
Version 5.01 was released on March 18, 2006 – 20 years after csound's first release. Csound 5 is available in binary and source code for Linux, Microsoft Windows and Mac OS X from the SourceForge Csound project. It is much improved and expanded compared to the original software, effectively made into a software library with an API. A variety of front ends have been developed for it. In addition to the basic C API, there are also Python, Java, Lisp, Tcl and C++ among other bindings, like one from Haskell which allows control of Csound from a purely functional environment.
The use of plug-ins allows additional capabilities without modifications to the Csound code, as there is the possibility to write user-defined opcodes as extensions to the original language. LADSPA and DSSI are supported, but VST support has been removed.
Real-time performance through MIDI was added in the 1990s. Another addition was the support of FLTK widgets (graphical interface components with sliders, knobs, etc.) for controlling real-time audio, and integration of custom graphical interfaces written in Python.
Csound 6
Csound 6 has been in development since its features were hashed out at the Csound Conference held in 2011 in Hanover. Csound 6 was released in July 2013 and is now available on GitHub. Csound 6 is also available for Android. The major new features of Csound 6 include:
A bison/flex based parser for the Csound language is now standard. It generates an abstract syntax tree that is accessible via the Csound API. The tree can then be compiled to a Csound performance runtime using the API. Therefore, after the tree has been compiled, it can be manipulated by user code before compiling it to a Csound performance runtime. Alternatively, the user could create the entire abstract syntax tree from another language, then compile the tree to a Csound performance runtime.
There is a new built-in multi-dimensional array type. Arrays can be passed to instruments and opcodes. Arithmetic may be performed directly on arrays.
There is a new type system that enables user-defined types to be used in the Csound language.
The orchestra can be re-compiled at any time, or individual instruments can be compiled at any time, during a running performance. This enables true "live coding" in Csound performances.
The Csound API has been rationalized and simplified.
Csound can take advantage of any number of CPUs for concurrent processing during performance. This occurs without any changes to Csound code. This produces substantial speedups of most Csound processing. For example, a piece that renders in 100 seconds with 1 core should render in about 50 seconds with 4 cores.
Csound can compile orchestras and scores directly from strings of text, enabling the use of Csound in environments where writing to the file system is not permitted.
Score events such as notes can be scheduled to sample accurate times, even if synthesis is processed in blocks of samples.
All opcodes that return a single value may be used as functions in the orchestra language.
Audio analysis file formats can be byte-order independent.
A single score statement can contain multiple string parameters.
Most oscillator opcodes will use an internal sine function table if the table number is omitted.
Command-line options can be set programmatically using the Csound API.
Numerous duplicate areas of code within Csound have been rationalized.
An Android app was built which provides user-defined graphical user interfaces and JavaScript-based algorithmic composition using HTML5.
The development of Csound 6 was led by John ffitch, Steven Yi and Victor Lazzarini.
Csound for live performance
Currently only Csound score or note events can be generated in real time (as opposed to instruments, which are only definable at compile time, when csound first starts; in Csound 6 this limitation is removed). The set of sound processors is defined and compiled at load time, but the individual processing objects can be spawned or destroyed in real time, input audio processed in real time, and output generated also in real time. Note events can be triggered based on OSC communications within an instrument instance, spawned by MIDI, or entered to stdin (by typing into a terminal or sending textual statements from another program). The use of Csound 5 as a live performance tool can be augmented with a variety of third-party software. Live Event Sheet within CsoundQt can be used to modify the score in real-time. In addition, interfaces to other programming languages can be used to script Csound. A paper detailing the use of Csound with Qt or Pure Data in real-time musical synthesis was presented at the 2012 Linux Audio Conference The Ounk project attempts to integrate Python with Csound while CsoundAC provides a way to do algorithmic composition from Python using Csound as backend. Audivation's Csound for Live packages various opcodes into Max/MSP wrappers suitable for use in Ableton Live.
Csound is also available for mobile systems (iOS, Android).
Front-ends: IDEs and music composition environments
MacCsound is an integrated Csound programming environment for Macintosh (no update since early 2011).
Csound Editor is an integrated programming environment for Csound [Windows].
WinXoundPro another IDE for Csound.
CsoundQt another GUI front end for CSound [Windows/Mac/*NIX]. It is now included in the CSound distribution.
Dex Tracker Dex Tracker a tracker style front end for csound Including a grid editor and code generation tools, and the ability to save your favorite sounds and rhythms as presets.
blue A music composition environment for Csound.
Bol Processor BP2. A music composition environment for Csound and MIDI.
Automated CSound Orchestra Automated Csound orchestra building from individual instruments in csd format, convert midi to CSound, and record to Csound in real time (Windows program).
AlgoScore An algorithmic composition environment where one works in a graphical score, for Csound and MIDI.
Cecilia (in versions 1–4) a production frontend for Csound. (Cecilia 5 has migrated to pyo as backend.)
Cabbage production environment for Csound-based cross-platform audio plugins.
Lettuce a Windows frontend/editor for Csound5.
Csound-x for Emacs an Emacs frontend for Csound.
One Laptop per Child (OLPC)
Csound5 was chosen to be the audio/music development system for the OLPC project on the XO-1 Laptop platform.
See also
Audio signal processing
Software synthesizer
Computer music
Comparison of audio synthesis environments
List of music software
References
Further reading
This is a book mostly about programming sound directly using the C language, but it does have a couple of chapters about programming Csound opcodes.
External links
Audio programming languages
Free audio software
Electronic music software
Software synthesizers |
1027251 | https://en.wikipedia.org/wiki/I%20Yabba-Dabba%20Do%21 | I Yabba-Dabba Do! | I Yabba-Dabba Do! is a 1993 American animated made-for-television film based on the 1960s series, The Flintstones and its spin-off, The Pebbles and Bamm-Bamm Show. It premiered on ABC on February 7, 1993.
Plot
Pebbles, who now works for an ad agency and Bamm-Bamm, who works in a car repair shop, decide to get married after Bamm-Bamm proposes with a poem, in the middle of the street (after Pebbles mistakenly thinks he was trying to dump her when Bamm-Bamm read her a letter that started "Dear Pebbles"). However, Fred loses the family savings when he bet it on his team, the Bedrock Brontos. Fred tries asking for a raise from Mr. Slate, but is dismissed from his job because of his violent temper.
Fred enlists Barney's help in bringing more money for the wedding, but they fail, losing Barney's money to a real estate con artist and becoming more in debt than before. Meanwhile, Wilma's mother Pearl Slaghoople arrives to help with the wedding. Pebbles and Bamm-Bamm decide to elope in Rock Vegas because of their parents' arguing and fighting. Wilma and Betty discover the truth about Fred and Wilma's nest egg, and Fred is forced out of the house. After seeing that even Dino’s mad at him, Fred finally realizes the error of his ways and decides to fix his mistakes. Reconciling with Barney, Wilma, Betty and Pearl, Fred asks Barney to help search for Pebbles and Bamm-Bamm.
Fred and Barney travel to Rock Vegas looking for Pebbles and Bamm-Bamm. They stop at a casino where Barney wins more money. They are attacked by the Wedding Whackers gang after mistaking them for Pebbles and Bamm-Bamm getting married and took a photo of them robbing a newlywed couple. Shortly afterwards they are rescued by Pebbles and Bamm-Bamm. During the chase, the photo of the Wedding Whackers is destroyed, so the four are captured as suspects of being the marriage whackers, along with the real marriage whackers.
While in detainment, Fred reveals all the trouble he has gone through to try to help Pebbles with her wedding ceremony which leads the marriage whackers to reveal to their crimes, to the dismay of the Whackers' mother. Since Barney made a lot of money on his casino wins on the big wheel, they can use it to pay for the wedding, replace their nest eggs and pay off their debts. Fred, Barney, Pebbles and Bamm-Bamm finally reunite with Wilma, Betty and the others. Mr. Slate rehires Fred, and Pebbles and Bamm-Bamm get married, with Fred, Barney, Dino, Wilma and Betty as the happy ones seeing them getting married. Fred gets his job back from Mr Slate and is given a raise after being invited to the wedding. At the end, Pebbles and Bamm-Bamm reveal they are moving to Hollyrock with Barney paying their way with his share of the Rock Vegas winnings, at which Fred gets angry with Barney and they start to fight again.
Voice cast
Henry Corden as Fred Flintstone
Frank Welker as Barney Rubble and Dino
Jean Vander Pyl as Wilma Flintstone and Martha Slate
B.J. Ward as Betty Rubble
Janet Waldo as Pearl Slaghoople & Additional Voices
Megan Mullally as Pebbles Flintstone-Rubble
Jerry Houser as Bamm-Bamm Rubble
John Stephenson as Mr. Slate
Joseph Barbera as Himself
William Hanna as Himself
Darryl Phinnessee as Wedding Reception Singer/Piano Player singing "I Yabba Dabba Do"
Randy Crenshaw as The Lodge Patron #2, The Mammoth
Henry Polic II as the Seagull Writer
Nielsen ratings
The film brought in a 12.4/19 rating/share in its original airing and was watched by 22 million viewers. The film came in second place in its timeslot, and ranking 35th out of 94 programs that week.
Home media
Cartoon Network, with association with Turner Home Video, released the movie on VHS on January 14, 1997. Then Warner Home Video released it on April 21, 1998, and again in 1999 and 2000, but they are now out of print. On October 9, 2012, Warner Archive released The Flintstones- I Yabba-Dabba Do! on DVD in region 1 as part of their Hanna–Barbera Classics Collection. This is a Manufacture-on-Demand (MOD) release, available through Warner's online store, Amazon.com and Wal-Mart.com.
On August 4, 2020, Warner Bros. Home Entertainment gave it its first wide release as part of the DVD collection The Flintstones: 2 Movies & 5 Specials.
Syndication
This spinoff movie has aired on Cartoon Network in the 1990s, then ran on Boomerang in the 2000s. It is now available on the Boomerang app, alongside A Flintstone Family Christmas and other Flintstones spin-offs, with the exception of the sequel Hollyrock-a-Bye Baby.
Sequel
Hollyrock-a-Bye Baby was released in 1993. The sequel is considered very difficult to syndicate after its original broadcast and the attempt of releasing it on home media was delayed until 2012 mainly due to the involved suggestive material relating to child birth. However, it has eventually aired on Cartoon Network and Boomerang usually as part of Mother's Day special programming in the early 2000s until it never ran again.
References
External links
1993 television films
1993 animated films
1993 films
1990s American animated films
The Flintstones films
Hanna-Barbera animated films
Films based on television series
Animated films based on animated series
American television films
American films
Animated comedy films
Films scored by John Debney
Television films based on television series
Films directed by William Hanna |
19967138 | https://en.wikipedia.org/wiki/Francisco%20Partners | Francisco Partners | Francisco Partners is an American private equity firm focused exclusively on investments in technology and technology-enabled services businesses. Founded in August 1999 and based in San Francisco with offices in London and New York, Francisco Partners Management L.P. has raised approximately USD $24 billion in committed capital as of June 2020 when the firm raised nearly $10 billion for tech company investments. As of 2020, Francisco Partners had more than $25 billion in assets under management and invested in over 300 companies in the technology sector.
History
1999–2011
Francisco Partners was founded in August 1999 in Menlo Park, California, during the emergence of dedicated technology buyout firms. Founders Sanford Robertson, Dipanjan Deb, David Stanton, Benjamin Ball, and Neil Garfinkel came from a variety of private equity firms. Robertson had been the founder of the technology-focused investment bank Robertson Stephens, while Deb left TPG Capital in August 1999 to help found the firm. Among its notable early investments, in 2000 the firm paid $375 million in cash to purchase 90% of Advanced Micro Devices' communications products division. Francisco Partners then raised $800 million in 2002 to purchase 90% of Global eXchange Services, a unit of the General Electric Company handling sales operations for about 30,000 multinational companies.
The firm purchased NPTest in 2003, the semiconductor-testing unit of Schlumberger, and by the following year Francisco Partners had more than 30 active portfolio companies. Francisco Partners purchased Smart Modular from the Solectron Corporation in 2004, with Smart Modular going public two years later. From 2005 until 2010 the firm owned the software company RedPrairie. In 2006 the company led a leveraged buyout of Metrologic Instruments, which makes laser and holographic-based scanners, and also purchased WatchGuard. The firm purchased API Healthcare in 2008 and by 2010 Francisco Partners' other healthcare holdings included AdvancedMD, Healthland, QuadraMed, and T-System.
2012–2015
By 2012, the Francisco Partners' funds had about $7 billion in capital and invested "exclusively in technology companies across sectors including semiconductors, capital equipment and electronics components." That year the company acquired the software company Ichor from American Industrial Partners, as well as Plex Systems and Kewill. The firm invested in Paymetric in 2013, selling the company to Vantiv in Atlanta, Georgia four years later. After acquiring the e-commerce services company Avangate in 2013, in 2014 the firm invested in the software company Prosper, with Francisco Partners' executive David Golob becoming a Prosper director. Also in 2014 Francisco Partners invested in the information technology company CoverMyMeds and paid $120 million for a majority stake in the controversial spy company NSO Group, sold in 2019. The firm completed raising about $2.9 billion for its fourth fund in 2015. That year the firm also purchased the California-based analytics company Procera Networks for $240 million and the Israeli workplace management company ClickSoftware Technologies for $438 million. The firm invested in GoodRx in 2015 as well.
2016–2019
Francisco joined with Elliott Management in June 2016 to buy the SonicWall and Quest Software subsidiaries from Dell as part of the spinoff of Dell Software. The SonicWall investment attracted some controversy in the press, as Francisco Partners had also invested in the competitor WatchGuard, going against norms in the private equity industry. Also in 2016, the firm sold Aesynt to Omnicell for $275 million and took Ichor Holdings public with an initial public offering. In late 2016, Francisco Partners launched its Agility fund, raising approximately $600 million of committed capital to focus on smaller technology deals. Shortly afterwards, Francisco Partners invested in Dynamo Software, Pet Circle, Discovery Education, and myON, the latter of which was sold in 2018. Additional investments in 2016 and 2017 included companies such as SmartBear Software, iconectiv, Connecture Inc., Betterment, and Sintec Media.
In 2017, Francisco Partners sold CoverMyMeds to McKesson and Paymetric to Vantiv, and also sold PayLease and Corsair. Francisco Partners bought, and subsequently sold, James Allen.com in 2017. In June 2017, Francisco Partners also acquired Sandvine, a Canadian public company that was combined with Procera, for $444 million. Francisco Partners was named Private Equity Firm of the Year by Mergers & Acquisitions in 2017. The firm's fifth fund, Francisco Partners V, was formed at the end of 2017 with approximately $4 billion of committed capital. The year after Francisco Partners V's launch, the firm acquired Bomgar Corporation, Renaissance Learning, and LegalZoom. In June 2018 Francisco Partners purchased VeriFone for $3.4 billion. Also in 2018, Blackstone’s Strategic Capital Group and Goldman Sachs’ Petershill program acquired a minority stake in Francisco Partners.
On September 30, 2019, Francisco Partners announced its intent to acquire Orchard Software Corporation, a privately owned company specializing in medical laboratory software.
2020
In 2020, Francisco Partners joined Diligent Corporation's Modern Leadership Initiative and pledged to create five new board roles among its portfolio companies for gender or ethnically diverse candidates.
On October 26, 2020, Francisco Partners announced the acquisition of Forcepoint, a cybersecurity company formerly owned by Raytheon Technologies. The firm, shortly thereafter, bought MyFitnessPal from Under Armour for $345 million. The acquisition completed on December 1, 2020.
On August 31, 2020, the deal closed for Francisco Partners to buy LogMeIn, most known for LastPass password manager, for $4.3 billion together with Evergreen Coast Capital Corp., a private equity affiliate of Elliot Management Corp.
In September 2020, Francisco Partners investment GoodRx went public on the Nasdaq, with a market cap of about $19.4 billion.
2021
On January 11, 2021, Francisco Partners completed acquisition of Forcepoint. Also in early 2021, Francisco Partners acquired MyHeritage for a reported 600 million dollars. In May 2021, Francisco Partners and TPG Capital agreed to acquire cloud-based integration business Boomi from Dell for $4 billion. They also completed an acquisition for the EHR vendor OfficeAlly in December 2021.
2022
On January 21, 2022, Francisco Partners acquired health data assets from IBM's Watson Health unit. These assets included Health Insights, MarketScan, Clinical Development, Social Program Management, Micromedex, and imaging software offerings. The assets were valued at a reported $1 billion dollars.
Business model
Francisco Partners specializes in financing divisional buyouts, "take privates" of public companies, sponsored mergers and acquisitions, growth equity financing, recapitalizations, and restructurings. The firm primarily invests in maturing or mature technology and technology-related companies in areas such as software, internet, healthcare, communications, hardware and technology services. The firm typically acquires a majority or controlling stake in its portfolio companies, but will occasionally acquire a minority interest in a company with board representation. Specializing in technology buyouts, Francisco has acquired former venture capital-backed companies as well as many divisions of large conglomerates and IT companies worldwide.
Offices and employees
The firm is based in San Francisco, California with an additional office in London, United Kingdom. Francisco Partners is currently led by CEO Dipanjan Deb, one of the firm's founders, along with Ezra Perlman and Deep Shah, co-presidents, and David Golob, chief investment officer.
List of investments
Top-ranked in 2020 among tech specialist private equity firms, Francisco Partners has a list of portfolio companies that changes frequently. Though not a comprehensive list, noteworthy acquisitions and investments include GoodRx, BeyondTrust, Renaissance Learning, MyHeritage, Forcepoint, Redis Labs, and Verifone.
In the past Francisco Partners has held, among others, investments or ownership of ClickSoftware Technologies, Comodo, Connecture, Discovery Education, iconectiv, LogMeIn, Perforce (50% ownership), Redis Labs, Sandvine (formerly Procera), and SmartBear Software.
References
External links
FranciscoPartners.com
Financial services companies established in 1999
Privately held companies based in California
Private equity firms of the United States
1999 establishments in California
Companies based in San Francisco |
17316163 | https://en.wikipedia.org/wiki/%28527604%29%202007%20VL305 | (527604) 2007 VL305 | , provisional designation , is an inclined Neptune trojan that shares Neptune's orbit in the Lagrangian point. It was discovered on 4 November 2007, by astronomers Andrew Becker, Andrew Puckett and Jeremy Kubica at the Apache Point Observatory in New Mexico, United States, although images from 2005 have also been recovered. It measures approximately 160 kilometers in diameter and was the sixth Neptune trojan to be discovered. , it is 34.1 AU from Neptune.
Orbit and classification
Neptune trojans can be considered resonant trans-Neptunian objects in a 1:1 mean-motion orbital resonance with Neptune. These trojans have a semi-major axis and an orbital period very similar to Neptune's (30.10 AU; 164.8 years).
belongs to the leading group, which orbits 60° ahead of Neptune's orbit. It orbits the Sun with a semi-major axis of 29.926 AU at a distance of 28.1–31.7 AU once every 163 years and 9 months (59,795 days). Its orbit has an eccentricity of 0.06 and an inclination of 28° with respect to the ecliptic. Its inclination is almost as high as that of .
Physical characteristics
Diameter
The discoverers estimate that has a mean-diameter of 160 kilometers based on a magnitude of 22.2. Based on a generic magnitude-to-diameter conversion, it measures approximately 110 kilometers in diameter using an absolute magnitude of 7.9 with an assumed albedo of 0.10.
Numbering and naming
This minor planet was numbered by the Minor Planet Center on 18 May 2019 (). As of 2019, it has not been named. If named, it will follow the naming scheme already established with 385571 Otrera and 385695 Clete, which is to name these objects after figures related to the Amazons, an all-female warrior tribe that fought in the Trojan War on the side of the Trojans against the Greek.
References
External links
MPEC 2008-E44 : 2007 VL305
AstDys-2 about
527604
Discoveries by Andrew C. Becker
Discoveries by Andrew W. Puckett
Discoveries by Jeremy Martin Kubica
20071104 |
25453138 | https://en.wikipedia.org/wiki/List%20of%20uncertainty%20propagation%20software | List of uncertainty propagation software | List of uncertainty propagation software used to perform propagation of uncertainty calculations:
Software
abacus Desktop calculator (Windows), handles multiple expressions.
app::errorcalculator Library and script to process tabular values.
ASUE Potent web interface powered by webMathematica to evaluate uncertainty symbolically using GUM. Webpage also allows symbolic uncertainty evaluation via ASUE framework (with reference), which is an extension to GUM framework.
Chaospy is an open source numerical Python library for doing UQ using advanced method of Monte Carlo and polynomial approximation, with an emphasis on composability and polynomial chaos expansion. Easy to integrate into existing Python code with libraries that can be directly imported into the user's environment. Packages can be downloaded from the Python Package Index (via pip) or through Conda. Developer version available via GitHub. Can also interface with any third-party software model.
Colby College uncertainty calculator Web browser-based. Formula input, then asks for values of variables.
Dakota is a comprehensive suite of tools for sampling-based optimization and UQ developed by Sandia National Laboratories.
Dempster Shafer with Intervals (DSI) Toolbox is a MATLAB toolbox for verified computing under Dempster–Shafer theory. It provides aggregation rules, fast (non) monotonic function propagation, plots of basic probability assignments, verified fault tree analysis (FTA), and much more.
EasyGraph is a graphing package that supports error propagation directly into the error bars.
EasyVVUQ is a Python3 library intended to facilitate verification, validation and uncertainty quantification (VVUQ) for a wide variety of simulations. Supports various sensitivity analysis and uncertainty quantification methods as well as different execution methods for simulations (traditional clusters and cloud computing).
epc error propagating calculator (epc) is an open source script-based tool that calculates the propagation of errors in variables. To quote the text on the Epc web page "This is done by repeated calculation of the expression using variable-values which are generated using a random number generator whose mean and standard-deviation match the values specified for the variable". Perl Script.
Error Propagation Calculator Free cross-platform calculator (macOS, Windows, Linux) written in Python. Essentially a GUI interface for the Python Uncertainties library. Easy to use and install. Handles up to 26 variable and error pairs per computation. Evaluates native python expressions. No prior knowledge of python language is required for use. Windows installer includes python dependencies.
ErrorCalc is a scientific calculator app for iPhone or iPad that performs error propagation (Supports Algebraic and RPN modes of entry)
FuncDesigner Library and stand-alone (via the Python shell). Involves automatic differentiation, possibly large-scale sparse.
Scripting language called 'fussy', similar to C.
GUMsim is a Monte Carlo simulator and uncertainty estimator for Windows. Standalone; detailed consequences of a model equation.
GUM Tree is a design pattern for propagating measurement uncertainty. An implementation exists in R and add-ons for Excel (real and complex numbers).
GUM Tree Calculator is a programmable Windows command-line tool with full support for uncertainty calculations involving real and complex quantities.
GUM Workbench uses a graphical user interface to implement a systematic way to analyze an uncertainty problem for single and multiple results. GUM + Monte Carlo. Free restricted educational version available.
gum_mc: GUM framework and Monte Carlo method. Standalone.
The Gustavus Adolphus propagator is an open source calculator that supports error propagation developed by Thomas Huber.
gvar is a Python library for first order uncertainty propagation with correlations. Features transparent handling of arrays, dictionaries and dictionaries of arrays; numerical computation with uncertainty propagation of splines, matrix operations, differential equations, integrals, power series and equations. Not trivial to install on Windows, a compiled binary is provided here.
The laffers.net propagator is a web-based tool for propagating errors in data. The tool uses the standard methods for propagation.
LNE-MCM is a free software for Windows dedicated to the evaluation of measurement uncertainty using Monte Carlo simulations according to Supplement 1 to the GUM. Moreover, additional features are implemented like the case of multivariate models, sensitivity analysis to provide an uncertainty budget and a goodness-of-fit test for the samples of the output quantities. MATLAB Runtime required.
Mathos Core Library Uncertainty package Open source (.NET targeting library).
MC-Ed is a native Windows software to perform uncertainty calculations according to the Supplement 1 to the Guide to the expression of uncertainty in measurement using Monte-Carlo method.
MCM Alchimia is a standalone sequential & multilingual software for uncertainty estimation. Windows desktop GUM + Monte Carlo. Supports least squares regression and interpolation models.
Measurements.jl is a free and open-source error propagation calculator and library. It supports real and complex numbers with uncertainty, arbitrary-precision arithmetic calculations, functional correlation between variables, mathematical and linear algebra operations with matrices and arrays, and numerical integration using Gauss–Kronrod quadrature.
MonteCarloMeasurements.jl is a free and open-source, nonlinear error propagation calculator and library that supports arbitrary multivariate distributions, differentiation, linear algebra and arbitrary-precision arithmetic. Propagates uncertainties by means of Monte-Carlo samples.
METAS UncLib is a C# software library and command-line calculator. A MATLAB wrapper and a Python wrapper exist. It supports: multivariate uncertainties, complex values, correlations, vector, and matrix algebra.
metRology package for R metRology is an R package to support metrological applications. Among other functions for metrology, it includes support for measurement uncertainty evaluation using algebraic and numerical differentiation and Monte Carlo methods. Includes first-order algebraic and numerical differentiation, including finite-difference with specified step size and Kragten's method, as well as Monte Carlo simulation. Evaluation can be applied to R expressions, formulae and functions.
MetroloPy, Python tools for dealing with physical quantities: uncertainty propagation and unit conversion. First order and Monte-Carlo propagation of uncertainty; handles relative, absolute, and expanded uncertainties of quantities with units.
MUSE Measurement Uncertainty Simulation and Evaluation using the Monte Carlo method. Interprets an XML model description file.
MUQ is an MIT developed collection of UQ tools for Markov Chain Monte Carlo sampling, Polynomial Chaos construction, transport maps, and many other operations. It has both C++ and Python interfaces.
OpenCOSSAN is a MATLAB toolbox for uncertainty propagation, reliability analysis, model updating, sensitivity and robust design optimization. Allows interacting with 3rd party solvers. Interfaces with HPC through GridEngine and OpenLava.
NIST Uncertainty Machine is an uncertainty calculator that uses Gauss' formula and Monte Carlo methods. Users access it through a web browser, but it runs in the R programming language on the server. Complete documentation.
OpenTURNS is a C++ and Python framework for probabilistic modelling and uncertainty management developed by the OpenTURNS consortium (Airbus, EDF R&D, IMACS, Phimeca, ONERA). It contains state of the art algorithms for univariate, multivariate and infinite dimensional probabilistic modelling (arithmetic of independent random variables, copulas, Bayesian models, stochastic processes and random fields), Monte Carlo simulation, surrogate modelling (Kriging, functional chaos decomposition, low rank tensor approximation, Karhunen-Loeve decomposition, mixture of experts), rare event estimation (variance reduction, FORM/SORM reliability methods), robust optimization, global sensitivity analysis (ANCOVA, Sobol' indices). It can interact with third-party software through a generic Python interface, which also allows to connect HPC facilities. It provides calibration (including bayesian) methods and a full set of interface to optimization solvers.
propagate: an R package that conducts error propagation by first- and second-order Taylor approximation (GUM 2008) and Monte-Carlo simulation (GUM 2008 S1), using full covariance structure.
PSUADE is a comprehensive suite of tools for sampling-based UQ (dimension reduction, response surface analysis, uncertainty propagation, sensitivity analysis, numerical optimization, statistical inference, optimization under uncertainty) developed at Lawrence Livermore National Laboratory.
QMSys GUM is a potent commercial tool for measurement uncertainty analysis including Monte Carlo simulation for Windows (free restricted educational version available).
Risk Calc supports probability bounds analysis, standard fuzzy arithmetic, and classical interval analysis for conducting distribution-free or nonparametric risk analyses. Also handles uncertainty about correlations.
SmartUQ is a commercial uncertainty quantification and analytics software package. Capabilities include DOE generation, emulator construction, uncertainty propagation, sensitivity analysis, statistical calibration, and inverse analysis.
SOERP implements second-order error propagation as a free Python library. Calculations are carried out naturally in calculator format and correlations are maintained. Automatically calculates all the first and second derivatives of an expression using the free Python package ad.
SCaViS is a free data-analysis program written in Java and supports Python and Groovy. Conducts error propagation by first- and second-order Taylor approximation and using a Monte Carlo approach for complex functions.
SCRAM is free fault tree and event tree analysis software that employs Monte Carlo simulation for uncertainty analysis in probability expressions.
S&T Missouri Uncertainty Calculator: web browser-based. Desk calculator style.
The Uncertainty Calculator is a JavaScript browser-based calculator that performs error propagation calculations.
Uncertainty Calculator runs JavaScript in the browser. Simple version: uses Crank Three Times to provide numerical answers. Fancy version: uses Monte Carlo to provide additional information including graphs of probability density and cumulative probability. Warns users of potential issues that other methods don't warn about. Handles correlations that arise during multi-step calculations. Numerous interactive pushbutton demos.
uncertainty calculator, Wilfrid Laurier University: web browser-based. Desk calculator style.
Uncertainties is a potent free calculator and Python software library for transparently performing calculations with uncertainties and correlations. Also handles matrices with uncertainties. Automatically calculates all the derivatives of an expression.
UncertRadio: Software for calculation of characteristic limits accordung to ISO 11929 (covering parts 1-3) for radioactivity measurements; besides the characteristic limits (decision threshold, detection limit and limits of the coverage interval) the software providess the Monte Carlo method for uncertainty determination. UncertRadio evaluations can be processed from within an Excel application.
Mathos Laboratory Uncertainty Calculator This is a web interface for uncertainty calculations.
UQLab is a software framework for uncertainty quantification developed at ETH Zurich. It is a general-purpose software running in MATLAB which contains state-of-the-art methods for Monte Carlo simulation, dependence modelling (copula theory), surrogate modelling (polynomial chaos expansions, Kriging (a.k.a. Gaussian process modelling), low-rank tensor approximations, global sensitivity analysis (ANOVA, Sobol’ indices, distribution-based indices), rare event simulation (a.k.a. reliability methods).
UQpy is an open-source Python toolbox and development environment for uncertainty quantification developed by the Shields Uncertainty Research Group (SURG) at Johns Hopkins University. It consists of a set of modules for various capabilities in forward and inverse UQ ranging from sampling methods for uncertainty propagation to reliability analysis, surrogate model construction, and Bayesian inference. Of particular note is that it is designed to interface with any Python model or third-party software model through the RunModel module. Packages can be downloaded from the Python Package Index (via pip) or through Conda. Developer version available via GitHub.
UncertaintyWrapper is a free and open source software Python package that propagates uncertainty using 1st order linear combinations. Covariance is also propagated. It approximates sensitivity with finite central differences. UncertaintyWrapper wraps any Python code even C extensions. It is vetted against Uncertainties, ALGOPY, Numdifftools and SymPy.
UQTk is a set of tools for forward and inverse uncertainty quantification on computational models. The functionality can be accessed through C++, command line apps, or Python. The uncertainty quantification approaches in UQTk rely extensively on Polynomial Chaos methods for representing random variables.
Comparison
See also
Automatic differentiation#Software, also can be used to obtain uncertainties
References
Y. C. Kuang, A. Rajan, M. P.-L. Ooi, and T. C. Ong (2014), "Standard uncertainty evaluation of multivariate polynomial," Measurement, vol. 58, pp. 483–494, Dec. 2014
A. Rajan, M. P. Ooi, Y. C. Kuang, and S. N. Demidenko, "Analytical Standard Uncertainty Evaluation Using Mellin Transform," Access, IEEE, vol. 3, pp. 209–222, 2015.
Auer, E., Luther, W., Rebner, G., Limbourg, P. (2010) A Verified MATLAB Toolbox for the Dempster-Shafer Theory. Proceedings of the Workshop on the Theory of Belief Functions
Bevington, P.R. and Robinson, D.K. (2002) Data Reduction and Error Analysis for the Physical Sciences, 3rd Ed., McGraw-Hill
Ferson, S., Kreinovich, V., Hajagos, J., Oberkampf, W. and Ginzburg, L. (2007) "Experimental Uncertainty Estimation and Statistics for Data Having Interval Uncertainty". Sandia National Laboratories Report: SAND2007-0939.
Patelli, E., An Open Computational Framework for Reliability Based Optimization, In proceeding of: The Eleventh International Conference on Computational Structures Technology, Dubrovnik, Croatia 4–7 September 2012
Lists of software
Numerical analysis
Numerical software |
33741859 | https://en.wikipedia.org/wiki/Cryptocat | Cryptocat | Cryptocat is a discontinued open-source desktop application intended to allow encrypted online chatting available for Windows, OS X, and Linux. It uses end-to-end encryption to secure all communications to other Cryptocat users. Users are given the option of independently verifying their buddies' device lists and are notified when a buddy's device list is modified and all updates are verified through the built-in update downloader.
Cryptocat was created by Nadim Kobeissi and further developed along with a community of open source contributors and is published under the terms of the GPLv3 license, although it has since been discontinued.
History
Cryptocat was first launched on 19 May 2011 as a web application.
In June 2012, Kobeissi said he was detained at the U.S. border by the DHS and questioned about Cryptocat's censorship resistance. He tweeted about the incident afterwards, resulting in media coverage and a spike in the popularity of the software.
In June 2013, security researcher Steve Thomas pointed out a security bug that could be used to decrypt any group chat message that had taken place using Cryptocat between September 2012 and 19 April 2013. Private messages were not affected, and the bug had been resolved a month before. In response, Cryptocat issued a security advisory, requested that all users ensure that they had upgraded, and informed users that past group conversations may have been compromised.
In February 2014, an audit by iSec Partners criticized Cryptocat's authentication model as insufficient. In response, Cryptocat made improvements to user authentication, making it easier for users to authenticate and detect man-in-the-middle attacks.
In February 2016, citing dissatisfaction with the project's current state after 19 months of non-maintenance, Kobeissi announced that he would be taking Cryptocat temporarily offline and discontinuing the development of its mobile application, pending a complete rewrite and relaunch of the software. In March 2016 Kobeissi announced the re-release of Cryptocat, rewritten completely as desktop software instead of the original web application software, as a public beta and the resumption of the service. The new desktop-centric approach allowed Cryptocat to benefit from stronger desktop integration, in a style similar to Pidgin.
In February 2019, it was announced that Cryptocat would be discontinued. As of December 2019, the cryptocat domain is for sale and links to the site for the Wire messenger.
Features
Cryptocat allows its users to set up end-to-end encrypted chat conversations. Users can exchange one-to-one messages, encrypted files, photos as well as create and share audio/video recordings. All devices linked to Cryptocat accounts will receive forward secure messages, even when offline.
All messages, files and audio/video recordings sent over Cryptocat are end-to-end encrypted. Cryptocat users link their devices to their Cryptocat account upon connection, and can identify each other's devices via the client's device manager in order to prevent man-in-the-middle attacks. Cryptocat also employs a Trust on first use mechanism in order to help detect device identity key changes.
Cryptocat also includes a built-in auto-update mechanism that automatically performs a signature check on downloaded updates in order to verify authenticity, and employs TLS certificate pinning in order to prevent network impersonation attacks.
Originally in 2013, Cryptocat offered the ability to connect to Facebook Messenger to initiate encrypted chatting with other Cryptocat users. According to the developers, the feature was meant to help offer an alternative to the regular Cryptocat chat model which did not offer long-term contact lists. This feature was disconnected in November 2015.
Reception and usage
In June 2013, Cryptocat was used by journalist Glenn Greenwald while in Hong Kong to meet NSA whistleblower Edward Snowden for the first time, after other encryption software failed to work.
In November 2013, Cryptocat was banned in Iran, shortly after the election of Iran's new president Hassan Rouhani who had promised more open Internet laws.
Cryptocat was listed on the Electronic Frontier Foundation's "Secure Messaging Scorecard" from 4 November 2014 until 13 March 2016. During that time, Cryptocat had a score of 7 out of 7 points on the scorecard. It had received points for having communications encrypted in transit, having communications encrypted with keys the provider did not have access to (end-to-end encryption), making it possible for users to independently verify their correspondent's identities, having past communications secure if the keys were stolen (forward secrecy), having its code open to independent review (open-source), having its security designs well-documented, and having completed an independent security audit.
Architecture
Encryption
Cryptocat uses a Double Ratchet Algorithm in order to obtain forward and future secrecy across messages, after a session is established using a four-way Elliptic-curve Diffie–Hellman handshake. The handshake mixes in long-term identity keys, an intermediate-term signed pre-key, and a one-time use prekey. The approach is similar to the encryption protocol adopted for encrypted messaging by the Signal mobile application. Cryptocat's goal is for its messages to obtain confidentiality, integrity, source authenticity, forward and future secrecy and indistinguishability even over a network controlled by an active attacker. The forward secrecy features of the protocol that Cryptocat uses are similar to those first introduced by Off-the-Record Messaging.
Cryptocat uses the Advanced Encryption Standard in Galois/Counter Mode for authenticated encryption, Curve25519 for Elliptic curve Diffie-Hellman shared secret agreement, HMAC-SHA256 for key derivation and Ed25519 for signing. In order to limit the effect of a long-term identity key compromise, long-term keys are used exclusively once for the initial Authenticated Key Exchange, and once for signing a newly generated intermediate-term signed prekey.
For the transport layer, Cryptocat adopts the OMEMO Multi-End Message and Object Encryption standard, which also gives Cryptocat multi-device support and allows for offline messaging.
Network
Cryptocat's network relies on a XMPP configuration served over WebSockets. According to the project's mission statement, Cryptocat's network only relays encrypted messages and does not store any data. In addition to the Cryptocat client's end-to-end encryption protocol, client-server communication is protected by TLS.
Distribution
From March 2011 until March 2016, Cryptocat was officially distributed through the Google Chrome Web Store, the Apple App Store and other official channels controlled by targeted platforms. After Cryptocat's re-write into desktop software in March 2016, the software became distributed exclusively through Cryptocat's own servers, which also handle signed update delivery.
See also
Comparison of instant messaging clients
Freedom of information
GNU Project
Hacktivism
Internet privacy
References
Further reading
External links
Cryptocat on GitHub
Cryptographic software
Internet privacy software
Free security software
Free instant messaging clients
Free software
Software using the GPL license |
402688 | https://en.wikipedia.org/wiki/Algorithmic%20probability | Algorithmic probability | In algorithmic information theory, algorithmic probability, also known as Solomonoff probability, is a mathematical method of assigning a prior probability to a given observation. It was invented by Ray Solomonoff in the 1960s.
It is used in inductive inference theory and analyses of algorithms. In his general theory of inductive inference, Solomonoff uses the prior obtained by this formula, in Bayes' rule for prediction .
In the mathematical formalism used, the observations have the form of finite binary strings, and the universal prior is a probability distribution over the set of finite binary strings . The prior is universal in the
Turing-computability sense, i.e. no string has zero probability. It is not computable, but it can be approximated.
Overview
Algorithmic probability deals with the following questions: Given a body of data about some phenomenon that we want to understand, how can we select the most probable hypothesis of how it was caused from among all possible hypotheses and how can we evaluate the different hypotheses? How can we predict future data and how can we measure the likelihood of that prediction being the right one?
Four principal inspirations for Solomonoff's algorithmic probability were: Occam's razor, Epicurus' principle of multiple explanations, modern computing theory (e.g. use of a universal Turing machine) and Bayes’ rule for prediction.
Occam's razor and Epicurus' principle are essentially two different non-mathematical approximations of the universal prior.
Occam's razor: among the theories that are consistent with the observed phenomena, one should select the simplest theory.
Epicurus' principle of multiple explanations: if more than one theory is consistent with the observations, keep all such theories.
At the heart of the universal prior is an abstract model of a computer, such as a universal Turing machine. Any abstract computer will do, as long as it is Turing-complete, i.e. every finite binary string has at least one program that will compute it on the abstract computer.
The abstract computer is used to give precise meaning to the phrase "simple explanation" . In the formalism used, explanations, or theories of phenomena, are computer programs that generate observation strings when run on the abstract computer. A simple explanation is a short computer program. A complex explanation is a long computer program. Simple explanations are more likely, so a high-probability observation string is one generated
by a short computer program, or perhaps by any of a large number of slightly longer computer programs. A low-probability observation string is one that can only be generated by a long computer program .
These ideas can be made specific and the probabilities used to construct a prior probability
distribution for the given observation. Solomonoff's main reason for inventing this prior is so that it can be used in Bayes' rule when the actual prior is unknown, enabling prediction under uncertainty. It predicts the most likely continuation of that observation, and provides a measure of how likely this continuation will be.
Although the universal probability of an observation (and its extension) is incomputable, there is a computer algorithm, Levin Search, which, when run for longer and longer periods of time, will generate a sequence of approximations which converge to the universal probability distribution.
Solomonoff proved this distribution to be
machine-invariant within a constant factor (called the invariance theorem).
Solomonoff invented the concept of algorithmic probability with its associated invariance theorem around 1960, publishing a report on it: "A Preliminary Report on a General Theory of Inductive Inference." He clarified these ideas more fully in 1964 with "A Formal Theory of Inductive Inference," Part I and Part II.
Further discussion
Solomonoff described a universal computer with a randomly generated input program. The program computes some possibly infinite output. The universal probability distribution is the probability distribution on all possible output strings with random input.
The algorithmic probability of any given finite output prefix q is the sum of the probabilities of the programs that compute something starting with q. Certain long objects with short programs have high probability.
Algorithmic probability is the main ingredient of Solomonoff's theory of inductive inference, the theory of prediction based on observations; it was invented with the goal of using it for machine learning; given a sequence of symbols, which one will come next? Solomonoff's theory provides an answer that is optimal in a certain sense, although it is incomputable. Unlike, for example, Karl Popper's informal inductive inference theory, Solomonoff's is mathematically rigorous.
Algorithmic probability is closely related to the concept of Kolmogorov complexity. Kolmogorov's introduction of complexity was motivated by information theory and problems in randomness, while Solomonoff introduced algorithmic complexity for a different reason: inductive reasoning. A single universal prior probability that can be substituted for each actual prior probability in Bayes’s rule was invented by Solomonoff with Kolmogorov complexity as a side product.
Solomonoff's enumerable measure is universal in a certain powerful sense, but the computation time can be infinite. One way of dealing with this issue is a variant of Leonid Levin's Search Algorithm, which limits the time spent computing the success of possible programs, with shorter programs given more time. Other methods of limiting the search space include training sequences.
Key people
Ray Solomonoff
Andrey Kolmogorov
Leonid Levin
See also
Solomonoff's theory of inductive inference
Algorithmic information theory
Bayesian inference
Inductive inference
Inductive probability
Kolmogorov complexity
Universal Turing machine
Information-based complexity
References
Sources
Li, M. and Vitanyi, P., An Introduction to Kolmogorov Complexity and Its Applications, 3rd Edition, Springer Science and Business Media, N.Y., 2008
Further reading
Rathmanner, S and Hutter, M., "A Philosophical Treatise of Universal Induction" in Entropy 2011, 13, 1076-1136: A very clear philosophical and mathematical analysis of Solomonoff's Theory of Inductive Inference
External links
Algorithmic Probability at Scholarpedia
Solomonoff's publications
Algorithmic information theory
Probability interpretations
Artificial intelligence |
774282 | https://en.wikipedia.org/wiki/Cognizant | Cognizant | Cognizant is an American multinational information technology services and consulting company. It is headquartered in Teaneck, New Jersey, United States. Cognizant is part of the NASDAQ-100 and trades under CTSH. It was founded as an in-house technology unit of Dun & Bradstreet in 1994, and started serving external clients in 1996.
After a series of corporate re-organizations there was an initial public offering in 1998.
Cognizant had a period of fast growth during the 2000s and became a Fortune 500 company in 2011; as of 2021, it is ranked 185.
History
Cognizant began as Dun & Bradstreet Satyam Software (DBSS), established with Satyam Computer Services as Dun & Bradstreet's in-house technology unit focused on implementing large-scale IT projects for Dun & Bradstreet businesses. In 1996, the company started pursuing customers beyond Dun & Bradstreet.
In 1996, Dun & Bradstreet spun off several of its subsidiaries including Erisco, IMS International, Nielsen Media Research, Pilot Software, Strategic Technologies and DBSS, to form a new company called Cognizant Corporation, headquartered in Chennai, India. Three months later, in 1997, DBSS renamed itself to Cognizant Technology Solutions. In July 1997, Dun & Bradstreet bought Satyam's 24% stake in DBSS for $3.4 million. Headquarters were moved to the United States, and in March 1998, Kumar Mahadeva was named CEO. Operating as a division of the Cognizant Corporation, the company focused on Y2K-related projects and web development.
In 1998, the parent company, Cognizant Corporation, split into two companies: IMS Health and Nielsen Media Research. After this restructuring, Cognizant Technology Solutions became a public subsidiary of IMS Health. In June 1998, IMS Health partially spun off the company, conducting an initial public offering of the Cognizant stock. The company raised $34 million, less than what the IMS Health underwriters had hoped. They earmarked the money for debt payments and upgrading company offices.
Kumar Mahadeva decided to reduce the company's dependence on Y2K projects: by Q1 1999, 26% of company's revenues came from Y2K projects, compared with 49% in early 1998. Believing that the $16.6 billion enterprise resource planning software market was saturated, Kumar Mahadeva decided to refrain from large-scale ERP implementation projects. Instead, he focused on applications management, which accounted for 37% of Cognizant's revenue in Q1 1999. Cognizant's revenues in 2002 were $229 million, and the company had zero debt with $100 million in the bank. During the dotcom bust, the company grew by taking on the maintenance projects that larger IT services companies did not want.
In 2003, IMS Health sold its entire 56% stake in Cognizant, which instituted a poison pill provision to prevent hostile takeover attempts. Kumar Mahadeva resigned as the CEO in 2003, and was replaced by Lakshmi Narayanan. Gradually, the company's services portfolio expanded across the IT services landscape and into business process outsourcing (BPO) and business consulting. Lakshmi Narayanan was succeeded by Francisco D'Souza in 2006. Cognizant experienced a period of fast growth during the 2000s, as reflected by its appearance in Fortune magazine's "100 Fastest-Growing Companies" list for ten consecutive years from 2003 to 2012.
In September 2014, Cognizant struck its biggest deal, acquiring healthcare IT services provider TriZetto Corp for $2.7 billion. Cognizant Shares, rose nearly 3 percent in pre-market trading.
On 24 June 2015, the company signed a multimillion-dollar agreement with Escorts Group in India to help Escorts' businesses in digital transformation and modernizing its operations across all business segments.
On 30 June 2015, it partnered with Singapore-based supermarket retailer NTUC FairPrice to perform digital transformation in NTUC's business to improve personalized and consistent customer service across multiple channels.
In April 2018, Cognizant and a consortium of Indian life insurers announced their development of a blockchain solution aimed at increasing efficiency through facilitating cross-company data sharing. The platform, which is built on Corda, a DLT platform developed by R3, was claimed to reduce dependency on third-party data intermediaries and aggregators for obtaining consumer profiles and policy details such as KYC due diligence, financial and medical underwriting, risk assessment, fraud detection and regulatory compliance.
In January 2022, Cognizant sold its acquisition Oy Samlink to Kyndryl.
Acquisitions
Business model
Like many other IT services firms, Cognizant follows a global delivery model based on offshore software R&D and offshore outsourcing. The company has a number of offshore development centers outside the United States and near-shore centers in the U.S., Europe and South America.
In its early years, Cognizant gained business from a number of American and European companies with the help of the Dun & Bradstreet brand. The company's senior executives envisaged the firm as a provider of high-end customer services on-par with the six contemporary major system integrators (Accenture, BearingPoint, Capgemini, Ernst & Young, Deloitte and IBM), but at lower prices.
Operations
Regions
The company has 318,400 employees globally, of which over 150,000 are in India across 10 locations with a plurality in Chennai. On 20 Jan, 1994 Cognizant registered its branch in Chennai, Tamil Nadu, India with the legal name Cognizant Technology Solutions India Private Limited. The other centers of the company are in Bangalore, Chennai, Coimbatore, Gurgaon, Noida, Hyderabad, Kochi, Kolkata, Mangalore, Mumbai, and Pune. The company has local, regional, and global delivery centers in the UK, Australia, Hungary, Netherlands, Spain, China, Philippines, Canada, Brazil, Argentina, Mexico etc.
Business units
Cognizant is organized into several verticals and horizontal units. The vertical units focus on specific industries such as Banking & Financial Services, Insurance, Healthcare, Manufacturing and Retail. The horizontals focus on specific technologies or process areas such as Analytics, mobile computing, BPO and Testing. Both horizontal and vertical units have business consultants, who together form the organization-wide Cognizant Consulting team. Cognizant is among the largest recruiters of MBAs in the industry; they are involved in business development and business analysis for IT services projects.
Corporate affairs
Management
Cognizant is led by Brian Humphries (CEO), Jan Siegmund (CFO) and Rajesh Nambia (President, Digital Business & Technology).
On 1 April 2019, Francisco D'Souza was replaced by Brian Humphries as the CEO.
Finance
Cognizant was listed on NASDAQ in 1998, and added to the NASDAQ-100 Index in 2004. After the close of trading on 16 November 2006, Cognizant moved from the mid cap S&P 400 to the S&P 500. Cognizant became a Fortune 500 company in 2011.
Corporate social responsibility
Cognizant's philanthropic and corporate social responsibility (CSR) initiatives are conducted through the Cognizant employees for the financial and administrative support of the Cognizant Foundation. Registered in March 2005 as a "Charitable Company" under the Indian Companies Act, the Cognizant Foundation aims to help "unprivileged members of society gain access to quality education and healthcare by providing financial and technical support; designing and implementing educational and healthcare improvement programs; and partnering with Non-Government Organizations (NGOs), educational institutions, healthcare institutions, government agencies and corporations".
Cognizant has a grassroots corporate social responsibility project called Outreach, for which Cognizant's employees volunteer to support schools and orphanages.
Awards
In 2015, the Fortune named it as the world's fourth most admired IT services company. In 2017, Cognizant was named in Fortunes Future 50 list.
Sponsorships
Over the year 2021, Cognizant signed multiple sponsorship agreements with sports, sailing and racing teams.
In January 2021, the newly rebranded Aston Martin Formula One team announced Cognizant as their title sponsor for the 2021 Formula One World Championship.In February 2021, Cognizant signed a sponsorship deal with the PGA TOUR and LPGA Tour to become a Global Partner of the Presidents Cup and a title partner of the LPGA Tour’s Founders Cup. Later in the year, in April, Cognizant signed an agreement to be SailGP's digital transformation partner.In June the same year, Cognizant became the Presenting Partner of THE JOHN SHIPPEN Shoot-Out Inaugural Golf Event.
Criticism and controversies
India
Bribery
Larsen & Toubro Ltd (L&T) paid million in bribes to Indian government officials on behalf of Cognizant Technology Solutions Corp. to secure permits, ranging from environmental clearance to power. L&T has made illicit payments and Cognizant reimbursed the money by disguising it as compensation for cost overruns.
Companies Act violations
In March 2019, significant publicity was raised because Cognizant repetitively violated the directives of the Registrar of Companies. The Company "has moved [sic] the Madras High Court fearing possibility of criminal prosecution being launched against it by [the] Registrar of Companies for alleged violation of the provisions of the Companies Act of 2013 and the Companies (Appointment and Disqualification of Directors) Rules of 2014." One of those questions was as to why the company had not disclosed complete information on stock options of its parent holding company — CTS Corporation in the United States — having been given to the employees, including its directors, and the payments running to several hundred crores of rupees (approx US $40 million) having been paid to the parent company in the US towards stock compensating recharge.
Discrimination
In 2018 a race discrimination suit was brought: "Three hundred former employees claim they were forced out of their jobs and replaced with 'less qualified' Indians after being poorly treated by their Indian supervisors and colleagues, given unjustifiably low performance ratings and denied promotions." Cognizant said it was "national origin" and not race.
Layoffs
200 senior executives, above the Director's Level were dismissed because they were not able to catch up with the latest technologies. The number of the executives that were dismissed is unusually high and questions the ability of the company to catch up with the latest technologies.
In 2017, eight employees filed petitions with the labor department, complaining Cognizant forced them to resign as part of a performance-based review. The labor department closed the case in favor of employees and advised company management to give one more opportunity for the petitioners to prove themselves. At the time Cognizant had also rolled out a ‘voluntary separation program’ for directors, associate vice-presidents and senior VP's which offed them 6–9 months of their salary.
In 2017, approximately 6000 Cognizant employees in Hyderabad/Bangalore/Chennai lost their job as a part of company's annual performance review process.
Tax evasion
The Income Tax department has frozen Cognizant Technology Solutions Corp's bank accounts and deposits in Chennai and Mumbai for allegedly evading a dividend distribution tax (DDT). A Cognizant spokesman confirmed the report and said in a statement that a court has instructed the tax department not to take further action pending further hearings. Cognizant failed to pay the tax of more than 25 billion rupees ($385 million) in the 2016-17 financial year, the Hindu newspaper reported, citing officials from the tax department.
The court asked the company to deposit 15 percent of the disputed tax, amounting to 4.9 billion rupees ($75 million) as security deposit till it decides on the case.
Ireland
Working conditions
In February 2018 the UK and Irish press expressed concerns about contractors employed by Cognizant in Dublin as part of the outsourcing contract with Google about the conditions of employment in relationship to compensation and basic employment allowances like sick leave.
United States
Corruption
In 2016, Cognizant announced that it was cooperating with US authorities in an investigation related to the Foreign Corrupt Practices Act, and carrying out its own probe to determine whether some payments made in India breached the law. The company also said President Gordon Coburn had resigned and would be replaced by Rajeev Mehta.
Crawford & Company lawsuit
Cognizant has been sued by Crawford & Company, the US-based independent providers of insurance claims-handling services, for alleged breach of contract. Cognizant had been mandated by Crawford to implement People Soft Financials software as part of an ERP project called Project Atlas that it was critical to Crawford's operations. Project Atlas included components for both internal operations and client-facing services.
Wage theft and H-1B visa violations
Cognizant leads the ranks of companies receiving H-1B visas from the United States. The company has been steadily increasing its U.S. work force. In January 2011, the company announced plans to expand its U.S. delivery centers, including a new 1,000-person (0.4% of worldwide workforce) facility in Phoenix, Arizona. In February 2011, Cognizant said it had 60 full-time recruiters actively hiring in the U.S.
In 2009, an investigation by the US Department of Labor (DoL) found Cognizant in violation of the H-1B provisions of the Immigration and Nationality Administrative Act. The DoL discovered that the company had stolen wages and benefits from 67 of its workers, for which they demanded they repay $509,607 in back wages. Joseph Petrecca, the director of the Wage and Hour Division's Northern New Jersey District Office noted that the company took immediate steps to correct the violations, saying the "level of cooperation sets a standard for others in the industry."
In 2016, the company was the subject of a lawsuit by workers for Walt Disney World who said workers from India were brought into the United States on H-1B visas in order to replace them. However, in October 2016, federal Judge Gregory A. Presnel of the United States District Court in Orlando dismissed the lawsuits, stating "none of the allegedly false statements put at issue in the complaint are adequate."
Cognizant was also required to pay $5.7 million in back pay and fines in a U.S. District Court ruling for a class action lawsuit. The lawsuit claimed that Cognizant did not provide quality assurance analysts the full value of their overtime pay.
Working conditions and mental health issues
In February 2019, an investigative report by The Verge described poor working conditions in Cognizant's Phoenix, Arizona, office. Cognizant employees tasked with content moderation for Facebook developed mental health issues, including posttraumatic stress disorder, as a result of exposure to graphic violence, hate speech, and conspiracy theories in the videos they were instructed to evaluate. Moderators at the Phoenix office reported drug abuse, alcohol abuse, and sexual intercourse in the workplace, and feared retaliation from terminated workers who threatened to harm them. In response, a Cognizant representative stated the company would examine the issues in the report.
The Verge published a follow-up investigation of Cognizant's Tampa, Florida, office in June 2019. Employees in the Tampa location described working conditions that were worse than the conditions in the Phoenix office. Content moderator Keith Utley suffered a heart attack while working for Cognizant in March 2018 and died in a hospital; the Tampa office lacked an on-site defibrillator. Moderators were required to sign non-disclosure agreements with Cognizant to obtain the job, although three former workers broke the agreements to provide information to The Verge. In the Tampa office, workers reported bed bugs, unsanitary work conditions, inadequate mental health resources, sexual harassment, workplace violence, and theft. As a result of exposure to videos depicting graphic violence, animal abuse, and child sexual abuse, some employees developed psychological trauma and posttraumatic stress disorder. Cognizant sanitized the office before The Verges visit, a practice the publication described as a "dog-and-pony-show phenomenon". In response to negative coverage related to its content moderation contracts, a Facebook director indicated that Facebook is in the process of developing a "global resiliency team" that would assist its contractors.
On October 30, 2019, Cognizant announced that it would phase out a portion of its content moderation contracts in 2020.
See also
Disney litigation
Srini Raju
Tech companies in the New York City metropolitan region
References
External links
Consulting firms established in 1994
Companies based in Bergen County, New Jersey
International information technology consulting firms
Information technology consulting firms of the United States
Management consulting firms of the United States
Outsourcing companies
American companies established in 1994
1994 establishments in New Jersey
Teaneck, New Jersey
Dun & Bradstreet
Corporate spin-offs
1998 initial public offerings
Technology companies established in 1994 |
41531 | https://en.wikipedia.org/wiki/Stanislaw%20Ulam | Stanislaw Ulam | Stanisław Marcin Ulam (; 13 April 1909 – 13 May 1984) was a Polish-American scientist in the fields of mathematics and nuclear physics. He participated in the Manhattan Project, originated the Teller–Ulam design of thermonuclear weapons, discovered the concept of the cellular automaton, invented the Monte Carlo method of computation, and suggested nuclear pulse propulsion. In pure and applied mathematics, he proved some theorems and proposed several conjectures.
Born into a wealthy Polish Jewish family, Ulam studied mathematics at the Lwów Polytechnic Institute, where he earned his PhD in 1933 under the supervision of Kazimierz Kuratowski. In 1935, John von Neumann, whom Ulam had met in Warsaw, invited him to come to the Institute for Advanced Study in Princeton, New Jersey, for a few months. From 1936 to 1939, he spent summers in Poland and academic years at Harvard University in Cambridge, Massachusetts, where he worked to establish important results regarding ergodic theory. On 20 August 1939, he sailed for the United States for the last time with his 17-year-old brother Adam Ulam. He became an assistant professor at the University of Wisconsin–Madison in 1940, and a United States citizen in 1941.
In October 1943, he received an invitation from Hans Bethe to join the Manhattan Project at the secret Los Alamos Laboratory in New Mexico. There, he worked on the hydrodynamic calculations to predict the behavior of the explosive lenses that were needed by an implosion-type weapon. He was assigned to Edward Teller's group, where he worked on Teller's "Super" bomb for Teller and Enrico Fermi. After the war he left to become an associate professor at the University of Southern California, but returned to Los Alamos in 1946 to work on thermonuclear weapons. With the aid of a cadre of female "computers", including his wife Françoise Aron Ulam, he found that Teller's "Super" design was unworkable. In January 1951, Ulam and Teller came up with the Teller–Ulam design, which is the basis for all thermonuclear weapons.
Ulam considered the problem of nuclear propulsion of rockets, which was pursued by Project Rover, and proposed, as an alternative to Rover's nuclear thermal rocket, to harness small nuclear explosions for propulsion, which became Project Orion. With Fermi, John Pasta, and Mary Tsingou, Ulam studied the Fermi–Pasta–Ulam–Tsingou problem, which became the inspiration for the field of non-linear science. He is probably best known for realising that electronic computers made it practical to apply statistical methods to functions without known solutions, and as computers have developed, the Monte Carlo method has become a common and standard approach to many problems.
Poland
Ulam was born in Lemberg, Galicia, on 13 April 1909. At this time, Galicia was in the Kingdom of Galicia and Lodomeria of the Austro-Hungarian Empire, which was known to Poles as the Austrian partition. In 1918, it became part of the newly restored Poland, the Second Polish Republic, and the city took its Polish name again, Lwów.
The Ulams were a wealthy Polish Jewish family of bankers, industrialists, and other professionals. Ulam's immediate family was "well-to-do but hardly rich". His father, Józef Ulam, was born in Lwów and was a lawyer, and his mother, Anna (née Auerbach), was born in Stryj. His uncle, Michał Ulam, was an architect, building contractor, and lumber industrialist. From 1916 until 1918, Józef's family lived temporarily in Vienna. After they returned, Lwów became the epicenter of the Polish–Ukrainian War, during which the city experienced a Ukrainian siege.
In 1919, Ulam entered Lwów Gymnasium Nr. VII, from which he graduated in 1927. He then studied mathematics at the Lwów Polytechnic Institute. Under the supervision of Kazimierz Kuratowski, he received his Master of Arts degree in 1932, and became a Doctor of Science in 1933. At the age of 20, in 1929, he published his first paper Concerning Function of Sets in the journal Fundamenta Mathematicae. From 1931 until 1935, he traveled to and studied in Wilno (Vilnius), Vienna, Zurich, Paris, and Cambridge, England, where he met G. H. Hardy and Subrahmanyan Chandrasekhar.
Along with Stanisław Mazur, Mark Kac, Włodzimierz Stożek, Kuratowski, and others, Ulam was a member of the Lwów School of Mathematics. Its founders were Hugo Steinhaus and Stefan Banach, who were professors at the Jan Kazimierz University. Mathematicians of this "school" met for long hours at the Scottish Café, where the problems they discussed were collected in the Scottish Book, a thick notebook provided by Banach's wife. Ulam was a major contributor to the book. Of the 193 problems recorded between 1935 and 1941, he contributed 40 problems as a single author, another 11 with Banach and Mazur, and an additional 15 with others. In 1957, he received from Steinhaus a copy of the book, which had survived the war, and translated it into English. In 1981, Ulam's friend R. Daniel Maudlin published an expanded and annotated version.
Move to the United States
In 1935, John von Neumann, whom Ulam had met in Warsaw, invited him to come to the Institute for Advanced Study in Princeton, New Jersey, for a few months. In December of that year, Ulam sailed to the US. At Princeton, he went to lectures and seminars, where he heard Oswald Veblen, James Alexander, and Albert Einstein. During a tea party at von Neumann's house, he encountered G. D. Birkhoff, who suggested that he apply for a position with the Harvard Society of Fellows. Following up on Birkhoff's suggestion, Ulam spent summers in Poland and academic years at Harvard University in Cambridge, Massachusetts from 1936 to 1939, where he worked with John C. Oxtoby to establish results regarding ergodic theory. These appeared in Annals of Mathematics in 1941. In 1938, Stanislaw's mother Anna hanna Ulam (maiden name Auerbach) died of cancer.
On 20 August 1939, in Gdynia, Józef Ulam, along with his brother Szymon, put his two sons, Stanislaw and 17 year old Adam, on a ship headed for the US. Eleven days later, the Germans invaded Poland. Within two months, the Germans completed their occupation of western Poland, and the Soviets invaded and occupied eastern Poland. Within two years, Józef Ulam and the rest of his family, including Stanislaw's sister Stefania Ulam, were victims of the Holocaust, Hugo Steinhaus was in hiding, Kazimierz Kuratowski was lecturing at the underground university in Warsaw, Włodzimierz Stożek and his two sons had been killed in the massacre of Lwów professors, and the last problem had been recorded in the Scottish Book. Stefan Banach survived the Nazi occupation by feeding lice at Rudolf Weigl's typhus research institute. In 1963, Adam Ulam, who had become an eminent kremlinologist at Harvard, received a letter from George Volsky, who hid in Józef Ulam's house after deserting from the Polish army. This reminiscence gave a chilling account of Lwów's chaotic scenes in late 1939. In later life Ulam described himself as "an agnostic. Sometimes I muse deeply on the forces that are for me invisible. When I am almost close to the idea of God, I feel immediately estranged by the horrors of this world, which he seems to tolerate".
In 1940, after being recommended by Birkhoff, Ulam became an assistant professor at the University of Wisconsin–Madison. Here, he became a United States citizen in 1941. That year, he married Françoise Aron. She had been a French exchange student at Mount Holyoke College, whom he met in Cambridge. They had one daughter, Claire. In Madison, Ulam met his friend and colleague C. J. Everett, with whom he collaborated on a number of papers.
Manhattan Project
In early 1943, Ulam asked von Neumann to find him a war job. In October, he received an invitation to join an unidentified project near Santa Fe, New Mexico. The letter was signed by Hans Bethe, who had been appointed as leader of the theoretical division of Los Alamos National Laboratory by Robert Oppenheimer, its scientific director. Knowing nothing of the area, he borrowed a New Mexico guide book. On the checkout card, he found the names of his Wisconsin colleagues, Joan Hinton, David Frisch, and Joseph McKibben, all of whom had mysteriously disappeared. This was Ulam's introduction to the Manhattan Project, which was the US's wartime effort to create the atomic bomb.
Hydrodynamical calculations of implosion
A few weeks after Ulam reached Los Alamos in February 1944, the project experienced a crisis. In April, Emilio Segrè discovered that plutonium made in reactors would not work in a gun-type plutonium weapon like the "Thin Man", which was being developed in parallel with a uranium weapon, the "Little Boy" that was dropped on Hiroshima. This problem threatened to waste an enormous investment in new reactors at the Hanford site and to make slow separation of uranium isotopes the only way to prepare fissile material suitable for use in bombs. To respond, Oppenheimer implemented, in August, a sweeping reorganization of the laboratory to focus on development of an implosion-type weapon and appointed George Kistiakowsky head of the implosion department. He was a professor at Harvard and an expert on precise use of explosives.
The basic concept of implosion is to use chemical explosives to crush a chunk of fissile material into a critical mass, where neutron multiplication leads to a nuclear chain reaction, releasing a large amount of energy. Cylindrical implosive configurations had been studied by Seth Neddermeyer, but von Neumann, who had experience with shaped charges used in armor-piercing ammunition, was a vocal advocate of spherical implosion driven by explosive lenses. He realized that the symmetry and speed with which implosion compressed the plutonium were critical issues, and enlisted Ulam to help design lens configurations that would provide nearly spherical implosion. Within an implosion, because of enormous pressures and high temperatures, solid materials behave much like fluids. This meant that hydrodynamical calculations were needed to predict and minimize asymmetries that would spoil a nuclear detonation. Of these calculations, Ulam said:
Nevertheless, with the primitive facilities available at the time, Ulam and von Neumann did carry out numerical computations that led to a satisfactory design. This motivated their advocacy of a powerful computational capability at Los Alamos, which began during the war years, continued through the cold war, and still exists. Otto Frisch remembered Ulam as "a brilliant Polish topologist with a charming French wife. At once he told me that he was a pure mathematician who had sunk so low that his latest paper actually contained numbers with decimal points!"
Statistics of branching and multiplicative processes
Even the inherent statistical fluctuations of neutron multiplication within a chain reaction have implications with regard to implosion speed and symmetry. In November 1944, David Hawkins and Ulam addressed this problem in a report entitled "Theory of Multiplicative Processes". This report, which invokes probability-generating functions, is also an early entry in the extensive literature on statistics of branching and multiplicative processes. In 1948, its scope was extended by Ulam and Everett.
Early in the Manhattan project, Enrico Fermi's attention was focused on the use of reactors to produce plutonium. In September 1944, he arrived at Los Alamos, shortly after breathing life into the first Hanford reactor, which had been poisoned by a xenon isotope. Soon after Fermi's arrival, Teller's "Super" bomb group, of which Ulam was a part, was transferred to a new division headed by Fermi. Fermi and Ulam formed a relationship that became very fruitful after the war.
Post war Los Alamos
In September 1945, Ulam left Los Alamos to become an associate professor at the University of Southern California in Los Angeles. In January 1946, he suffered an acute attack of encephalitis, which put his life in danger, but which was alleviated by emergency brain surgery. During his recuperation, many friends visited, including Nicholas Metropolis from Los Alamos and the famous mathematician Paul Erdős, who remarked: "Stan, you are just like before." This was encouraging, because Ulam was concerned about the state of his mental faculties, for he had lost the ability to speak during the crisis. Another friend, Gian-Carlo Rota, asserted in a 1987 article that the attack changed Ulam's personality: afterwards, he turned from rigorous pure mathematics to more speculative conjectures concerning the application of mathematics to physics and biology; Rota also cites Ulam's former collaborator Paul Stein as noting that Ulam was sloppier in his clothing afterwards, and John Oxtoby as noting that Ulam before the encephalitis could work for hours on end doing calculations, while when Rota worked with him, was reluctant to solve even a quadratic equation. This assertion was not accepted by Françoise Aron Ulam.
By late April 1946, Ulam had recovered enough to attend a secret conference at Los Alamos to discuss thermonuclear weapons. Those in attendance included Ulam, von Neumann, Metropolis, Teller, Stan Frankel, and others. Throughout his participation in the Manhattan Project, Teller's efforts had been directed toward the development of a "super" weapon based on nuclear fusion, rather than toward development of a practical fission bomb. After extensive discussion, the participants reached a consensus that his ideas were worthy of further exploration. A few weeks later, Ulam received an offer of a position at Los Alamos from Metropolis and Robert D. Richtmyer, the new head of its theoretical division, at a higher salary, and the Ulams returned to Los Alamos.
Monte Carlo method
Late in the war, under the sponsorship of von Neumann, Frankel and Metropolis began to carry out calculations on the first general-purpose electronic computer, the ENIAC at the Aberdeen Proving Ground in Maryland. Shortly after returning to Los Alamos, Ulam participated in a review of results from these calculations. Earlier, while playing solitaire during his recovery from surgery, Ulam had thought about playing hundreds of games to estimate statistically the probability of a successful outcome. With ENIAC in mind, he realized that the availability of computers made such statistical methods very practical. John von Neumann immediately saw the significance of this insight. In March 1947 he proposed a statistical approach to the problem of neutron diffusion in fissionable material. Because Ulam had often mentioned his uncle, Michał Ulam, "who just had to go to Monte Carlo" to gamble, Metropolis dubbed the statistical approach "The Monte Carlo method". Metropolis and Ulam published the first unclassified paper on the Monte Carlo method in 1949.
Fermi, learning of Ulam's breakthrough, devised an analog computer known as the Monte Carlo trolley, later dubbed the FERMIAC. The device performed a mechanical simulation of random diffusion of neutrons. As computers improved in speed and programmability, these methods became more useful. In particular, many Monte Carlo calculations carried out on modern massively parallel supercomputers are embarrassingly parallel applications, whose results can be very accurate.
Teller–Ulam design
On 29 August 1949, the Soviet Union tested its first fission bomb, the RDS-1. Created under the supervision of Lavrentiy Beria, who sought to duplicate the US effort, this weapon was nearly identical to Fat Man, for its design was based on information provided by spies Klaus Fuchs, Theodore Hall, and David Greenglass. In response, on 31 January 1950, President Harry S. Truman announced a crash program to develop a fusion bomb.
To advocate an aggressive development program, Ernest Lawrence and Luis Alvarez came to Los Alamos, where they conferred with Norris Bradbury, the laboratory director, and with George Gamow, Edward Teller, and Ulam. Soon, these three became members of a short-lived committee appointed by Bradbury to study the problem, with Teller as chairman. At this time, research on the use of a fission weapon to create a fusion reaction had been ongoing since 1942, but the design was still essentially the one originally proposed by Teller. His concept was to put tritium and/or deuterium in close proximity to a fission bomb, with the hope that the heat and intense flux of neutrons released when the bomb exploded, would ignite a self-sustaining fusion reaction. Reactions of these isotopes of hydrogen are of interest because the energy per unit mass of fuel released by their fusion is much larger than that from fission of heavy nuclei.
Because the results of calculations based on Teller's concept were discouraging, many scientists believed it could not lead to a successful weapon, while others had moral and economic grounds for not proceeding. Consequently, several senior people of the Manhattan Project opposed development, including Bethe and Oppenheimer. To clarify the situation, Ulam and von Neumann resolved to do new calculations to determine whether Teller's approach was feasible. To carry out these studies, von Neumann decided to use electronic computers: ENIAC at Aberdeen, a new computer, MANIAC, at Princeton, and its twin, which was under construction at Los Alamos. Ulam enlisted Everett to follow a completely different approach, one guided by physical intuition. Françoise Ulam was one of a cadre of women "computers" who carried out laborious and extensive computations of thermonuclear scenarios on mechanical calculators, supplemented and confirmed by Everett's slide rule. Ulam and Fermi collaborated on further analysis of these scenarios. The results showed that, in workable configurations, a thermonuclear reaction would not ignite, and if ignited, it would not be self-sustaining. Ulam had used his expertise in combinatorics to analyze the chain reaction in deuterium, which was much more complicated than the ones in uranium and plutonium, and he concluded that no self-sustaining chain reaction would take place at the (low) densities that Teller was considering. In late 1950, these conclusions were confirmed by von Neumann's results.
In January 1951, Ulam had another idea: to channel the mechanical shock of a nuclear explosion so as to compress the fusion fuel. On the recommendation of his wife, Ulam discussed this idea with Bradbury and Mark before he told Teller about it. Almost immediately, Teller saw its merit, but noted that soft X-rays from the fission bomb would compress the thermonuclear fuel more strongly than mechanical shock and suggested ways to enhance this effect. On 9 March 1951, Teller and Ulam submitted a joint report describing these innovations. A few weeks later, Teller suggested placing a fissile rod or cylinder at the center of the fusion fuel. The detonation of this "spark plug" would help to initiate and enhance the fusion reaction. The design based on these ideas, called staged radiation implosion, has become the standard way to build thermonuclear weapons. It is often described as the "Teller–Ulam design".
In September 1951, after a series of differences with Bradbury and other scientists, Teller resigned from Los Alamos, and returned to the University of Chicago. At about the same time, Ulam went on leave as a visiting professor at Harvard for a semester. Although Teller and Ulam submitted a joint report on their design and jointly applied for a patent on it, they soon became involved in a dispute over who deserved credit. After the war, Bethe returned to Cornell University, but he was deeply involved in the development of thermonuclear weapons as a consultant. In 1954, he wrote an article on the history of the H-bomb, which presents his opinion that both men contributed very significantly to the breakthrough. This balanced view is shared by others who were involved, including Mark and Fermi, but Teller persistently attempted to downplay Ulam's role. "After the H-bomb was made," Bethe recalled, "reporters started to call Teller the father of the H-bomb. For the sake of history, I think it is more precise to say that Ulam is the father, because he provided the seed, and Teller is the mother, because he remained with the child. As for me, I guess I am the midwife."
With the basic fusion reactions confirmed, and with a feasible design in hand, there was nothing to prevent Los Alamos from testing a thermonuclear device. On 1 November 1952, the first thermonuclear explosion occurred when Ivy Mike was detonated on Enewetak Atoll, within the US Pacific Proving Grounds. This device, which used liquid deuterium as its fusion fuel, was immense and utterly unusable as a weapon. Nevertheless, its success validated the Teller–Ulam design, and stimulated intensive development of practical weapons.
Fermi–Pasta–Ulam–Tsingou problem
When Ulam returned to Los Alamos, his attention turned away from weapon design and toward the use of computers to investigate problems in physics and mathematics. With John Pasta, who helped Metropolis to bring MANIAC on line in March 1952, he explored these ideas in a report "Heuristic Studies in Problems of Mathematical Physics on High Speed Computing Machines", which was submitted on 9 June 1953. It treated several problems that cannot be addressed within the framework of traditional analytic methods: billowing of fluids, rotational motion in gravitating systems, magnetic lines of force, and hydrodynamic instabilities.
Soon, Pasta and Ulam became experienced with electronic computation on MANIAC, and by this time, Enrico Fermi had settled into a routine of spending academic years at the University of Chicago and summers at Los Alamos. During these summer visits, Pasta, Ulam, and Mary Tsingou, a programmer in the MANIAC group, joined him to study a variation of the classic problem of a string of masses held together by springs that exert forces linearly proportional to their displacement from equilibrium. Fermi proposed to add to this force a nonlinear component, which could be chosen to be proportional to either the square or cube of the displacement, or to a more complicated "broken linear" function. This addition is the key element of the Fermi–Pasta–Ulam–Tsingou problem, which is often designated by the abbreviation FPUT.
A classical spring system can be described in terms of vibrational modes, which are analogous to the harmonics that occur on a stretched violin string. If the system starts in a particular mode, vibrations in other modes do not develop. With the nonlinear component, Fermi expected energy in one mode to transfer gradually to other modes, and eventually, to be distributed equally among all modes. This is roughly what began to happen shortly after the system was initialized with all its energy in the lowest mode, but much later, essentially all the energy periodically reappeared in the lowest mode. This behavior is very different from the expected equipartition of energy. It remained mysterious until 1965, when Kruskal and Zabusky showed that, after appropriate mathematical transformations, the system can be described by the Korteweg–de Vries equation, which is the prototype of nonlinear partial differential equations that have soliton solutions. This means that FPUT behavior can be understood in terms of solitons.
Nuclear propulsion
Starting in 1955, Ulam and Frederick Reines considered nuclear propulsion of aircraft and rockets. This is an attractive possibility, because the nuclear energy per unit mass of fuel is a million times greater than that available from chemicals. From 1955 to 1972, their ideas were pursued during Project Rover, which explored the use of nuclear reactors to power rockets. In response to a question by Senator John O. Pastore at a congressional committee hearing on "Outer Space Propulsion by Nuclear Energy", on January 22, 1958, Ulam replied that "the future as a whole of mankind is to some extent involved inexorably now with going outside the globe."
Ulam and C. J. Everett also proposed, in contrast to Rover's continuous heating of rocket exhaust, to harness small nuclear explosions for propulsion. Project Orion was a study of this idea. It began in 1958 and ended in 1965, after the Partial Nuclear Test Ban Treaty of 1963 banned nuclear weapons tests in the atmosphere and in space. Work on this project was spearheaded by physicist Freeman Dyson, who commented on the decision to end Orion in his article, "Death of a Project".
Bradbury appointed Ulam and John H. Manley as research advisors to the laboratory director in 1957. These newly created positions were on the same administrative level as division leaders, and Ulam held his until he retired from Los Alamos. In this capacity, he was able to influence and guide programs in many divisions: theoretical, physics, chemistry, metallurgy, weapons, health, Rover, and others.
In addition to these activities, Ulam continued to publish technical reports and research papers. One of these introduced the Fermi–Ulam model, an extension of Fermi's theory of the acceleration of cosmic rays. Another, with Paul Stein and Mary Tsingou, titled "Quadratic Transformations", was an early investigation of chaos theory and is considered the first published use of the phrase "chaotic behavior".
Return to academia
During his years at Los Alamos, Ulam was a visiting professor at Harvard from 1951 to 1952, MIT from 1956 to 1957, the University of California, San Diego, in 1963, and the University of Colorado at Boulder from 1961 to 1962 and 1965 to 1967. In 1967, the last of these positions became permanent, when Ulam was appointed as professor and Chairman of the Department of Mathematics at Boulder, Colorado. He kept a residence in Santa Fe, New Mexico, which made it convenient to spend summers at Los Alamos as a consultant.
In Colorado, where he rejoined his friends Gamow, Richtmyer, and Hawkins, Ulam's research interests turned toward biology. In 1968, recognizing this emphasis, the University of Colorado School of Medicine appointed Ulam as Professor of Biomathematics, and he held this position until his death. With his Los Alamos colleague Robert Schrandt he published a report, "Some Elementary Attempts at Numerical Modeling of Problems Concerning Rates of Evolutionary Processes", which applied his earlier ideas on branching processes to biological inheritance. Another, report, with William Beyer, Temple F. Smith, and M. L. Stein, titled "Metrics in Biology", introduced new ideas about biometric distances.
When he retired from Colorado in 1975, Ulam had begun to spend winter semesters at the University of Florida, where he was a graduate research professor. Except for sabbaticals at the University of California, Davis from 1982 to 1983, and at Rockefeller University from 1980 to 1984, this pattern of spending summers in Colorado and Los Alamos and winters in Florida continued until Ulam died of an apparent heart attack in Santa Fe on 13 May 1984.
Paul Erdős noted that "he died suddenly of heart failure, without fear or pain, while he could still prove and conjecture." In 1987, Françoise Ulam deposited his papers with the American Philosophical Society Library in Philadelphia. She continued to live in Santa Fe until she died on 30 April 2011, at the age of 93. Both Françoise and her husband are buried with her French family in Montparnasse Cemetery in Paris.
Challenge to economics
Alfred Marshall and his disciples dominated economic theory until the end of WWII. With the Cold War, the theory changed, emphasizing that a market economy was superior and the only sensible way. In Paul Samuelson's "Economics: An Introductory Analysis", 1948, Adam Smith's "invisible hand" was only a footnote. In later editions, it became the central theme. As Samuelson remembers, all this was challenged by Stanislaw Ulam: "[Y]ears ago... I was in the Society of Fellows at Harvard along with the mathematician Stanislaw Ulam. Ulam, who was to become an originator of the Monte Carlo method and co-discoverer of the hydrogen-bomb,... used to tease me by saying, 'Name me one proposition in all of the social sciences which is both true and non-trivial.' This was the test that I always failed. But now, some thirty years later ... an appropriate answer occurs to me: The Ricardian theory of comparative advantage ... That it is logically true need not be argued before a mathematician; that it is not trivial is attested by the thousands of important and intelligent men who have never been able to grasp the doctrine for themselves or to believe it after it was explained to them."
Impact and legacy
From the publication of his first paper as a student in 1929 until his death, Ulam was constantly writing on mathematics. The list of Ulam's publications includes more than 150 papers. Topics represented by a significant number of papers are: set theory (including measurable cardinals and abstract measures), topology, transformation theory, ergodic theory, group theory, projective algebra, number theory, combinatorics, and graph theory. In March 2009, the Mathematical Reviews database contained 697 papers with the name "Ulam".
Notable results of this work are:
Borsuk–Ulam theorem
Mazur–Ulam theorem
Kuratowski–Ulam theorem
Hyers–Ulam–Rassias stability
Lucky number
Ulam spiral
Ulam conjecture (in Number Theory)
Ulam conjecture (in Graph theory)
Ulam's packing conjecture
Ulam's game
Ulam matrix
Ulam numbers
With his pivotal role in the development of thermonuclear weapons, Stanislaw Ulam changed the world. According to Françoise Ulam: "Stan would reassure me that, barring accidents, the H-bomb rendered nuclear war impossible." In 1980, Ulam and his wife appeared in the television documentary The Day After Trinity.
The Monte Carlo method has become a ubiquitous and standard approach to computation, and the method has been applied to a vast number of scientific problems. In addition to problems in physics and mathematics, the method has been applied to finance, social science, environmental risk assessment, linguistics, radiation therapy, and sports.
The Fermi–Pasta–Ulam–Tsingou problem is credited not only as "the birth of experimental mathematics", but also as inspiration for the vast field of Nonlinear Science. In his Lilienfeld Prize lecture, David K. Campbell noted this relationship and described how FPUT gave rise to ideas in chaos, solitons, and dynamical systems. In 1980, Donald Kerr, laboratory director at Los Alamos, with the strong support of Ulam and Mark Kac, founded the Center for Nonlinear Studies (CNLS). In 1985, CNLS initiated the Stanislaw M. Ulam Distinguished Scholar program, which provides an annual award that enables a noted scientist to spend a year carrying out research at Los Alamos.
The fiftieth anniversary of the original FPUT paper was the subject of the March 2005 issue of the journal Chaos, and the topic of the 25th Annual International Conference of CNLS. The University of Southern Mississippi and the University of Florida supported the Ulam Quarterly, which was active from 1992 to 1996, and which was one of the first online mathematical journals. Florida's Department of Mathematics has sponsored, since 1998, the annual Ulam Colloquium Lecture, and in March 2009, the Ulam Centennial Conference.
Ulam's work on non-Euclidean distance metrics in the context of molecular biology made a significant contribution to sequence analysis and his contributions in theoretical biology are considered watersheds in the development of cellular automata theory, population biology, pattern recognition, and biometrics generally (David Sankoff, however, challenged conclusions of Walter by writing that Ulam had only modest influence on early development of sequence alignment methods.). Colleagues noted that some of his greatest contributions were in clearly identifying problems to be solved and general techniques for solving them.
In 1987, Los Alamos issued a special issue of its Science publication, which summarized his accomplishments, and which appeared, in 1989, as the book From Cardinals to Chaos. Similarly, in 1990, the University of California Press issued a compilation of mathematical reports by Ulam and his Los Alamos collaborators: Analogies Between Analogies. During his career, Ulam was awarded honorary degrees by the Universities of New Mexico, Wisconsin, and Pittsburgh.
In 2021, German film director Thorsten Klein made the film adaptation of the book Adventures of a Mathematician about Ulam's life
Bibliography
(autobiography).
See also
List of things named after Stanislaw Ulam
Biopic about Stanislaw Ulam, based on his autobiography, starring Jakub Gierszal
References
External links
1979 Audio Interview with Stanislaus Ulam by Martin Sherwin Voices of the Manhattan Project
1965 Audio Interview with Stanislaus Ulam by Richard Rhodes Voices of the Manhattan Project
1909 births
1984 deaths
Politicians from Lviv
Jews from Galicia (Eastern Europe)
People from the Kingdom of Galicia and Lodomeria
Polish agnostics
Jewish emigrants from Nazi Germany to the United States
Polish set theorists
Harvard University faculty
University of Wisconsin–Madison faculty
University of Colorado Boulder faculty
University of Colorado Denver faculty
University of Florida faculty
Members of the United States National Academy of Sciences
Manhattan Project people
People from Los Alamos, New Mexico
Jewish American scientists
20th-century Polish mathematicians
Mathematics popularizers
Monte Carlo methodologists
Cellular automatists
Jewish agnostics
Lviv Polytechnic alumni
Jewish physicists
Burials at Montparnasse Cemetery |
287801 | https://en.wikipedia.org/wiki/Hypermedia | Hypermedia | Hypermedia, an extension of the term hypertext, is a nonlinear medium of information that includes graphics, audio, video, plain text and hyperlinks. This designation contrasts with the broader term multimedia, which may include non-interactive linear presentations as well as hypermedia. It is also related to the field of electronic literature. The term was first used in a 1965 article written by Ted Nelson.
The World Wide Web is a classic example of hypermedia to access web content, whereas a non-interactive cinema presentation is an example of standard multimedia due to the absence of hyperlinks.
The first hypermedia work was, arguably, the Aspen Movie Map. Bill Atkinson's HyperCard popularized hypermedia writing, while a variety of literary hypertext and hypertext works, fiction and non-fiction, demonstrated the promise of links. Most modern hypermedia is delivered via electronic pages from a variety of systems including media players, web browsers, and stand-alone applications (i.e., software that does not require network access). Audio hypermedia is emerging with voice command devices and voice browsing.
Development tools
Hypermedia may be developed in a number of ways. Any programming tool can be used to write programs that link data from internal variables and nodes for external data files. Multimedia development software such as Adobe Flash, Adobe Director, Macromedia Authorware, and MatchWare Mediator may be used to create stand-alone hypermedia applications, with emphasis on entertainment content. Some database software, such as Visual FoxPro and FileMaker Developer, may be used to develop stand-alone hypermedia applications, with emphasis on educational and business content management.
Hypermedia applications may be developed on embedded devices for the mobile and the digital signage industries using the Scalable Vector Graphics (SVG) specification from W3C (World Wide Web Consortium). Software applications, such as Ikivo Animator and Inkscape, simplify the development of hypermedia content based on SVG. Embedded devices, such as the iPhone, natively support SVG specifications and may be used to create mobile and distributed hypermedia applications.
Hyperlinks may also be added to data files using most business software via the limited scripting and hyperlinking features built in. Documentation software, such as the Microsoft Office Suite and LibreOffice, allow for hypertext links to other content within the same file, other external files, and URL links to files on external file servers. For more emphasis on graphics and page layout, hyperlinks may be added using most modern desktop publishing tools. This includes presentation programs, such as Microsoft PowerPoint and LibreOffice Impress, add-ons to print layout programs such as Quark Immedia, and tools to include hyperlinks in PDF documents such as Adobe InDesign for creating and Adobe Acrobat for editing. Hyper Publish is a tool specifically designed and optimized for hypermedia and hypertext management. Any HTML editor may be used to build HTML files, accessible by any web browser. CD/DVD authoring tools, such as DVD Studio Pro, may be used to hyperlink the content of DVDs for DVD players or web links when the disc is played on a personal computer connected to the internet.
Learning
There have been a number of theories concerning hypermedia and learning. One important claim in the literature on hypermedia and learning is that it offers more control over the instructional environment for the reader or student. Another claim is that it levels the playing field among students of varying abilities and enhances collaborative learning.
A claim from psychology includes the notion that hypermedia more closely models the structure of the brain, in comparison with printed text.
Application programming interfaces
Hypermedia is used as a medium and constraint in certain application programming interfaces. HATEOAS, Hypermedia as the Engine of Application State, is a constraint of the REST application architecture where a client interacts with the server entirely through hypermedia provided dynamically by application servers. This means that in theory no API documentation is needed, because the client needs no prior knowledge about how to interact with any particular application or server beyond a generic understanding of hypermedia. In other service-oriented architectures (SOA), clients and servers interact through a fixed interface shared through documentation or an interface description language (IDL).
See also
Cybertext
Electronic literature
Hyperland is a 1990 documentary film that focuses on Douglas Adams and explains adaptive hypertext and hypermedia.
Metamedia
References
Further reading
Hypertext |
38866506 | https://en.wikipedia.org/wiki/Addepar | Addepar | Addepar, Inc. is an American wealth management platform for registered investment advisors specializing in data aggregation, analytics, and portfolio reporting.
History
Origins
In 2004, Joe Lonsdale co-founded Palantir Technologies, a company that builds software to enable the unification of data sets so that intelligence analysts can run queries for surveillance and monitoring, and financial institutions can identify fraud. In 2009, Lonsdale transitioned to an adviser and stopped working full-time at Palantir to launch Addepar.
2012–2013: RIA focus
In 2012, Addepar expanded its target clients to include RIAs. To this focus, RIABiz reported that Addepar in 2012 was "beginning to roll out a sales and marketing force to bring in the big clients." In doing so, Addepar and Advent's Black Diamond were competing for the same RIA customers. In October 2012, Bloomberg Businessweek reported that Joe Lonsdale was running Addepar "attempting to modernize the software that ultra-wealthy families and foundations use to manage their billions." In 2013, Addepar focused on expanding risk analytics and their client portal.
2013–2014: Management transition
In 2013, Addepar hired a head of sales from its competitor Advent (Black Diamond) who at the time was "widely considered the industry leader according to RIABiz. During 2013, Addepar's primary competition Black Diamond, Tamarac and Orion "pulled away in the battle for RIA market share, with each of the brands adding about 50% to their asset administration totals". In 2013, Addepar sought to transition out of start-up mode and hired a new CEO and COO to start building out the company's management. In January 2013 Eric Poirier previously of Palantir was hired and in July of that year became CEO.
2015–Present
In 2017, Addepar received a $140 million round of funding from Valor Equity Partners. While CEO Eric Poirier has not commented on the valuation of the company, the amount of funding the company has received likely makes it a unicorn. According to PitchBook the company's valuation stands at $500 million.
The same year, Addepar partnered with Morgan Stanley. Addepar provided software that consolidated information about the assets of ultra-wealthy Morgan Stanley clients and provided tailored reporting based on that information.
In May 2017, Addepar acquired AltX, a machine learning platform aimed at alt investments.
In January 2019, Addepar hired six new executives to the company's team. In June 2019, the company launched a mobile app to complement its portfolio management software. The app is built to provide a consolidated view of a client's portfolio.
Products and services
Addepar's platform provides analytics and performance analysis of portfolios and market data with software for managing high-net-worth and ultra-high-net-worth clients.
It's technology involves a mixture of proprietary and open-source software. The web frontend runs on Node.js and is developed with Ember, Lodash, QUnit, and D3. Addepar's backend services run primarily on Java, including with Jetty, and Jersey.
Addepar Platform
As Joe Lonsdale co-founded Addepar and Palantir Technologies; some of the first algorithms behind the Addepar platform were collaborated on by early Palantir employees.
In 2012, Fortune reported that Addepar was connecting family offices and endowments to their respective investment managers and third parties managing their assets "facilitating fund transfers, generating speedy reports, tracking currency conversions, and cutting down on data-entry errors."
The Addepar software facilitates both visualizing an investment portfolio's exposures at the individual asset class and also tabulating the portfolio's total value according to realtime value of the assets under management. In 2014, the Wall Street Journal reported the Addepar platform as providing investment advisors "a dashboard to track the performance of many types of asset classes in one place."
In April 2015, Addepar released a fully browser-based version of the platform.
Open API
In September 2016, Salesforce.com announced their partnership with Addepar for Salesforce's Wave Financial Services Cloud to facilitate financial advisers with the analytic tools to see across disparate and siloed asset classes producing a single visual whole for the client.
In October 2016, Addepar released their Open API to provide clients and integration partners what Crowdfund Insider explained as "a programmatic solution to tie Addepar’s data and calculations into a multitude of other products and systems."
Criticism and controversy
Housing benefits program
Addepar, Palantir, Facebook and Salesforce.com have been criticized for their programs to subsidize employee housing if employees live within a defined proximity to their headquarters to encourage employees to spend more time at work and due to increasing housing rents in the area. Business Insider reported there is no consensus as to whether or not this contributes to gentrification of neighborhoods claimed by the chief executive officer, John Liotti, of East Palo Alto community advocacy group Able Works. In defense of Addepar's $300 a month program, Head of People Lissa Minkin explained the program allowed for employees to allocate more time to their families and personal interests; specifically "not having a long commute makes a huge positive impact on maintaining a healthy work-life balance."
References
External links
Official website
Software companies based in California
Financial software companies
Companies based in Mountain View, California
2009 establishments in California
Software companies established in 2009 |
313771 | https://en.wikipedia.org/wiki/Jaleco | Jaleco | was a corporate brand name that was used by two previously connected video game developers and publishers based in Japan. The original Jaleco company was founded in 1974 as Japan Leisure Company, founded by Yoshiaki Kanazawa, before being renamed to simply Jaleco in the early 1980s. This company was later acquired in 2000 by PCCW, who rebranded it as their Japanese game division, PCCW Japan, before reverting it to Jaleco in 2002. In 2006, Jaleco became independent from PCCW and renamed to Jaleco Holding, having their video game operations spun off into a new company, also called Jaleco. This new spin-off company was sold to mobile developer Game Yarou in 2009, with Jaleco Holding renaming itself to Encom Holdings shortly after.
Jaleco is known for its arcade and home console video games produced in the 1980s and early 1990s, including City Connection, Bases Loaded, Ninja JaJaMaru-kun, Exerion, Idol Janshi Suchie-Pai and Rushing Beat. Jaleco also produced arcade cabinets for other game developers, alongside redemption arcade games and UFO catcher claw machines. In the past, the company produced amusement park equipment and aquarium parts, under their JAQNO brand name. Their North American division, Jaleco USA, published a number of titles for the NES and SNES, including Maniac Mansion, Pinball Quest and R-Type III.
In 2014, Jaleco's parent company Game Yarou filed for bankruptcy, causing Jaleco to vanish from the video game industry. The company's video game assets would be purchased by City Connection, an indie Japanese studio that continues to use their games for other side projects and licensing deals (the company itself being named after one of Jaleco's games). The original Jaleco company, Encom Holdings, quit the video game business in 2009, citing stiff competition in the industry, instead dealing in real estate. Encom dissolved in 2013, and was delisted from the JASDAQ that same year.
History
Jaleco was founded by Japanese businessman Yoshiaki Kanazawa on October 3, 1974. They were originally known as the , producing equipment for both amusement parks and arcade centers across Japan. The company was originally based out of Setagaya-ku, Tokyo.
Japan Leisure began production of arcade video games by 1982, and changed their corporate name to Jaleco, an anagram of their older name, in March 1983. Jaleco begian production of home console video games for the Nintendo Entertainment System in Japan. Towards the mid 1980s, Jaleco would begin production of equipment for aquarium tanks, which were released under their JAQNO brand name. A North American office, Jaleco USA, opened in Wheeling, Illinois – this division commonly published other third-party video games for both the NES and SNES consoles, notably Maniac Mansion and R-Type III, alongside distribution of Jaleco video games in the United States.
In late 1993, Jaleco's North American division departed from the arcade game scene, becoming solely a producer of games for home platforms. By 2000, Jaleco was struggling financially, being unable to produce a hit video game in several years. To keep the company afloat, Jaleco was acquired by Hong Kong-based company PCCW on November 1, 2000, where they became the Japanese division of the company, renamed to PCCW Japan. Heavy company restructuring was performing, with Jaleco's arcade division and other non-profitable areas of the company shuttering while retaining their home console video game division. In April 2001, PCCW Japan purchased the VR-1 Group, the holder of North American MMO developer VR-1 Entertainment, in order to have their operations expand globally. In October 2002, PCCW Japan merged Jaleco USA and VR-1 Entertainment into a new company, Jaleco Entertainment, relocating to Buffalo, New York. PCCW Japan was renamed back to Jaleco in 2004. They would continue to operate for several years as a subsidiary of PCCW, producing video games for home consoles and Japanese mobile phones, alongside soundtrack albums and applications for web browsers.
In August 2005, PCCW sold off Jaleco to Sandringham Fund SPC, alongside the subsidiary company Hyperlink Investments Group. On May 31, 2006, Jaleco's board of directors () renamed the company to Jaleco Holding, having their video game operations spun-off into a new company also known as Jaleco, which would become a subsidiary of Jaleco Holding. The corporate restructure was done in order to establish the company's non-video game products. In October 2007, Hyperlink Investments Group sold its stock in Jaleco Holding to Game Yarou, a Japanese mobile phone developer, and two South Korean corporations, STIC Pioneer Fund and A2i. Jaleco Holdings dissolved two subsidiary companies, FFBC Investment and J Consulting, in early 2008. Jaleco's North American division, Jaleco Entertainment, closed their doors later that year.
On January 15, 2009, Jaleco Holding sold off Jaleco to Game Yarou for a total of ¥1 (US$0.01); however, Game Yarou soon assumed ¥700,000,000 ($7.736 million) of Jaleco Holding's ¥16,000,000,000 ($17.68 million) loan. A spokesperson for Jaleco Holding cited "increasing competition in recent years in the video game market" as the reason for the company's retirement in the industry, which was proving to be difficult for the company to stay afloat. Under ownership from Game Yarou, Jaleco produced video games for Japanese mobile phones and web browsers, alongside licensing many of their older video games to third-party developers for use in other projects. On March 2, 2009, Jaleco announced that it would release a video game for the Wii, Ougon no Kizuna, on May 28 of that year.
By 2012, Game Yarou was in a financial crisis due to high debt and poor sales of their mobile titles – they were officially declared bankrupt by the Tokyo District Court on May 21, 2014. Jaleco would soon vanish from the video game industry, with their video games being acquired later that year by Japanese company City Connection, formerly known as Clarice Disk. The company continues to use Jaleco video games for a number of projects, alongside licensing them out to other developers for use in other products. Jaleco Holding renamed itself to Encom Holdings in April 2009, focusing on real estate and finance business in Japan and no longer being involved with video games. Encom Holdings dissolved on May 13, 2013, and was delisted from the JASDAQ that same day, due to poor reputation and loss of income.
Games
Arcade
Blue Print (1982, Japanese distribution only, developed by Ashby Computers and Graphics)
Check Man (1982, released by Zilec-Zenitone in the UK)
Naughty Boy (1982, released by Cinematronics in North America)
Pop Flamer (1982, released by Stern-Seeburg in North America)
Chameleon (1983, developed by Donga-Seiko)
Exerion (1983, released in North America by Taito)
Grasspin (1983, developed by Ashby Computers and Graphics)
Dingo (1983, developed by Ashby Computers and Graphics)
Saturn (1983, developed by Ashby Computers and Graphics)
Top Roller (1983, topped Japanese arcade chart in October 1983)
D-Day (1984)
Formation Z (1984, released by Williams in North America as Aeroboto)
Gate-In! Wai Wai Jockey (1984, Japan-exclusive, developed by Casio)
Parallel Turn (1984)
Pinbo (1984)
City Connection (1985, developed by Hect, released by Kitkorp in North America as Cruisin)
Field Combat (1985)
Vs. Ninja JaJaMaru-Kun (1985, Japan-exclusive)
Argus (1986, developed by NMK)
Momoko 120% (1986, Japan-exclusive)
Valtric (1986, developed by NMK)
Butasan (1987, Japan-exclusive, developed by NMK)
Exerizer (1987, released by Nichibutsu in North America as Sky Fox)
Psychic 5 (1987)
Ginga NinkyouDen (1987)
Arm Champs (1988, Japan-exclusive)
Dynamic Shoot Kyousou (1988, Japan-exclusive)
Ninja Kazan (1988)
Kick Off: Jaleco Cup (1988, Japan-exclusive)
Legend of Makai (1988, developed by NMK)
Moero!! Pro Yakyuu Homerun Kyousou (1988, Japan-exclusive)
NEW Moero!! Pro Yakyuu Homerun Kyousou (1988, Japan-exclusive)
P-47: The Phantom Fighter (1988)
Shingen: Samurai-Fighter (1988, Japan-exclusive)
Big Run: The Supreme 4WD Challenge: 11e Rallye (1989)
Hachoo! (1989, Japan-exclusive)
Jitsuryoku!! Pro Yakyuu (1989, Japan-exclusive)
Mahjong Daireikai (1989, developed by NMK, Japan-exclusive strip mahjong game)
Plus Alpha (1989)
Saint Dragon (1989, developed by NMK)
Alien Command (1990, ticket redemption game)
Cisco Heat (1990)
Ganbare JaJaMaru Saisho wa Goo (1990, Japan-exclusive)
Mahjong Channel Zoom In (1990, Japan-exclusive strip mahjong game)
Mahjong Kakumei (1990, Japan-exclusive strip mahjong game)
Rod Land (1990)
Big III: 3Reel Roulette (1990, Japan-exclusive)
64th Street: A Detective Story (1991, developed by C.P. Brain)
Avenging Spirit (1991, developed by C.P. Brain)
Earth Defense Force (1991)Grand Prix Star (1991)Joyful Cards: Jaleco 5Reel Poker (1991, Japan-exclusive)Circus Circus (1991, Japan-exclusive)Arabian Nights (1991, Japan-exclusive)Wonder Hunting (1991, Japan-exclusive)Mini Hunting (1991, Japan-exclusive)Gun Baron (1991)Arm Champs II (1992)Big Striker (1992, developed by C.P. Brain)Mahjong Kakumei 2: Princess League (1992, Japan-exclusive strip mahjong game)Soldam (1992)Wild Pilot (1992)B.O.T.S.S.: Battle of the Solar System (1992, North American distribution only, developed by MicroProse)Jokers Wild (1992, Japan-exclusive)Draw Poker (1992, Japan-exclusive)Four Jokers (1992, Japan-exclusive)Raise Bet Poker (1992, Japan-exclusive)Axis Bells (1992, Japan-exclusive, originally released by Wing as Lucky Bells)Slot Match: 3Reel Slot (1992, Japan-exclusive)Wonder Hunting II (1992, Japan-exclusive)Captain Flag (1993, Japan-exclusive)VS Super Captain Flag (1993, Japan-exclusive)Cybattler (1993)F-1 Grand Prix Star II (1993)Hayaoshi Quiz Ouza Ketteisen: The King of Quiz (1993, Japan-exclusive)Idol Janshi Suchie-Pai Special (1993, Japan-exclusive strip mahjong game)Peek-a-Boo! (1993, erotic game)Super Strong Warriors (1993, Japan-exclusive)Rolling Panic (1993, Japan-exclusive, originally released by Excellent System as Dream 9 Final)Basket Bull (1993, North America-exclusive ticket redemption game)Best Bout Boxing (1994)F-1 Super Battle (1994)Hayaoshi Quiz Grand Champion Taikai (1994, Japan-exclusive)Hayaoshi Quiz Nettou Namahousou (1994, Japan-exclusive)Idol Janshi Suchie-Pai II (1994, Japan-exclusive strip mahjong game)World PK Soccer (1994)Scud Hammer (1994, Japan-exclusive)Battle K-Road (1994, North American distribution only, originally released by Psikyo)Gunbird (1994, North American distribution only, originally released by Psikyo)Alley Cats (1994, North America-exclusive ticket redemption game)Spider Stompin (1994, North American distribution only, originally released by Island Design)Spider Splattin' (1994, North American distribution only, originally released by Island Design)Desert War (1995, developed by NMK)The Game Paradise: Master of Shooting! (1995)Mahjong Angel Kiss (1995, Japan-exclusive strip mahjong game)P-47 Aces (1995, developed by NMK)Tetris Plus (1995)Super Circuit Red Zone (1995)Gratia: Second Earth (1996)Ryuusei Janshi Kirara Star (1996, Japan-exclusive strip mahjong game)Super GT 24h (1996)World PK Soccer V2 (1996)Skating Shot (1996, Japan-exclusive prize redemption game)Over Rev (1997)Tetris Plus 2 (1997)Vs. Janshi Brandnew Stars (1997, Japan-exclusive strip mahjong game)Puzzle Uo Poko (1997, developed by Cave)Match Three (1997, North America-exclusive ticket redemption game, developed by HanaHo Games)Idol Janshi Suchie-Pai III (1999, Japan-exclusive strip mahjong game)VJ: Visual & Music Slap (1999, Japan-exclusive rhythm game)VJ: Visual & Music Slap DASH (1999, Japan-exclusive rhythm game)Rave Master (1999, Japan-exclusive rhythm game)Stepping Stage (1999, Japan-exclusive rhythm game)Stepping Stage Special (1999, Japan-exclusive rhythm game)Stepping Stage 2 SUPREME (1999, Japan-exclusive rhythm game)Stepping 3 SUPERIOR (1999, Japan-exclusive rhythm game)Rock'n Tread (1999, Japan-exclusive rhythm game)Rock'n Tread 2 (1999, Japan-exclusive rhythm game)Rock'n MegaSession (1999, Japan-exclusive rhythm game)Rock'n 3 (1999, Japan-exclusive rhythm game)Rock'n 4 (2000, Japan-exclusive rhythm game)Dream Audition (2000, Japan-exclusive rhythm game)
PCFighter Ace (1997, developed by VR-1)UltraCorps (1997, developed by VR-1)Fighter Ace II (1999, developed by VR-1)Fighter Ace 3.5 (2002, developed by Ketsujin Studios)Trailer Park Tycoon (2002)World Championship Pool 2004 (2004, developed by Blade Interactive)Room Zoom: Race for Impact (2004, developed by Blade Interactive)
MSXTop Roller (1984, released in Europe by Eaglesoft)Exerion II: Zorni (1984, released in Europe by Eaglesoft as Zorni)D-Day (1984, released in Europe by Eaglesoft)Formation Z (1985, released in Europe by Eaglesoft)Snake Runner (1986, released by Eaglesoft)Alien 8 (1986, Japanese distribution only, licensed from Ultimate Play the Game)Gunfright (1986, Japanese distribution only, licensed from Ultimate Play the Game)City Connection (1986, released in Europe by Eaglesoft)Ninja-kun: Majou no Bouken (1986, released in Europe by Eaglesoft as Ninja)Ninja JaJaMaru-kun (1986, released in Europe by Eaglesoft as Ninja II)Mississippi Satsujin Jiken: Murder on the Mississippi (1987, Japan-exclusive)Break In (1987, Japanese distribution only, licensed from Eaglesoft)Moero!! Nettou Yakyuu '88 (1988, Japan-exclusive)
NES/FamicomExerion (1985, Japan-exclusive, developed by TOSE)Formation Z (1985, Japan-exclusive, developed by Hect)Ninja-Kun: Majou no Bouken (1985, Japan-exclusive, developed by TOSE)Field Combat (1985, Japan-exclusive, developed by TOSE)City Connection (1985, developed by Axes Art Amuse)Ninja JaJaMaru-kun (1985, Japan-exclusive, developed by TOSE)Argus (1986, Japan-exclusive, developed by TOSE)Choplifter (1986, Japan-exclusive, developed by TOSE)JaJaMaru no Daibouken (1986, Japan-exclusive, developed by TOSE)Urusei Yatsura: Lum no Wedding Bell (1986, Japan-exclusive, developed by TOSE)Mississippi Satsujin Jiken: Murder on the Mississippi (1986, Japan-exclusive, developed by TOSE)Knight Lore: Majou no Ookami Otoko (1986, Famicom Disk System, developed by TOSE)Fuuun Shaolin Ken (1987, Famicom Disk System, developed by TOSE)Youkai Club (1987, Japan-exclusive, developed by TOSE)Bases Loaded (1987, developed by TOSE)Monty no Doki Doki Daidassou: Monty on the Run (1987, Famicom Disk System)Bio Senshi Dan: Increaser to no Tatakai (1987, Japan-exclusive, developed by Atlus)Esper Boukentai (1987, Japan-exclusive, developed by NMK)Ucuusen Cosmo Carrier (1987, Japan-exclusive, developed by TOSE)Druid: Kyoufu no Tobira (1987, Famicom Disk System)Racket Attack (1988, developed by TOSE)Fuuun Shaolin Ken: Ankoku no Maou (1988, Famicom Disk System, developed by TOSE)Wizards & Warriors (1988, Japanese distribution only, developed by Rare)Radical Bomber!! Jirai-Kun (1988, Famicom Disk System)Bases Loaded II: Second Season (1988, developed by TOSE)Big Challenge! Judo Senshuken (1988, Famicom Disk System)Maniac Mansion (1988)Big Challenge! Dogfight Spirit (1988, Famicom Disk System)Saiyuuki World (1988, Japan-exclusive, developed by NMK)Hoops (1988, developed by Aicom)Chuugoku Senseijutsu (1988, Japan-exclusive, developed by Aicom)Goal! (1988, developed by TOSE)Robowarrior (1988, North American & European distribution only, developed by Hudson Soft)JaJaMaru Ninpou Chou (1989, Japan-exclusive, developed by NMK)Big Challenge! Gun Fighter (1989, Famicom Disk System)Big Challenge! Go Go Bowling (1989, Famicom Disk System)Shin Moero!! Pro Yakyuu (1989, Japan-exclusive, developed by TOSE)Okkotoshi Puzzle Tonjan!? (1989, Japan-exclusive, developed by NMK)Terao no Dosukoi Oozumou (1989, Japan-exclusive, developed by TOSE)Pinball Quest (1990, developed by TOSE)The Astyanax (1990)JaJaMaru Gekimaden: Maboroshi no Kinmajou (1990, Japan-exclusive)Moero!! Judo Warriors (1990, Japan-exclusive)Bases Loaded 3 (1990, developed by TOSE)Totally Rad (1990, developed by Aicom)A Boy and His Blob: Trouble on Blobolonia (1990, Japanese distribution only, developed by Imagineering)Whomp 'Em (1990)Metal Mech: Man & Machine (1990, developed by Sculptured Software)The Last Ninja (1991, North America-exclusive, developed by Beam Software)Ninja JaJaMaru: Ginga Daisakusen (1991, Japan-exclusive)Bases Loaded 4 (1991, developed by TOSE)Tsurupika Hagemaru: Mezase! Tsuruseko no Akashi (1991, Japan-exclusive)Shatterhand (1991, North American & European distribution only, developed by Natsume)Pizza Pop! (1992, Japan-exclusive, developed by Arc System Works)Rampart (1992, North America-exclusive, developed by Bitmasters)Plasma Ball (1992, Japan-exclusive)Toukon Club (1992, Japan-exclusive, developed by Natsume)Goal! Two (1992, developed by TOSE)Rod Land (1992, developed by The Sales Curve)Cyberball (1992, North America-exclusive, developed by Tengen)The Young Indiana Jones Chronicles (1992, North America-exclusive)Mezase! Top Pro: Green ni Kakeru Yume (1993, Japan-exclusive)Pro Sport Hockey (1993, developed by TOSE)
Super NES/Super FamicomBig Run: The Supreme 4WD Challenge: 13e Rallye (1991, Japan-exclusive)Super Bases Loaded (1991, developed by TOSE)Earth Defense Force (1991)Rival Turf! (1992)Goal! (1992, developed by TOSE)Super Bases Loaded 2 (1992, developed by TOSE)Super Professional Baseball II (1992, Japan-exclusive, developed by TOSE)King Arthur's World (1992, developed by Argonaut Games)Brawl Brothers (1992)Pro Sport Hockey (1993, developed by TOSE)Tuff E Nuff (1993)Operation Logic Bomb: The Ultimate Search & Destroy (1993)Bishoujo Janshi Suchie-Pai (1993, Japan-exclusive strip mahjong game, developed by K.K. DCE)Utopia: The Creation of a Nation (1993, North American distribution only, developed by Gremlin Interactive)Super Goal! 2 (1993, developed by TOSE)The Peace Keepers (1993)Kingyo Chuuihou! Tobidase! Game Gakuen (1994, Japan-exclusive)Jurassic Park (1994, Japanese distribution only, developed by Ocean Software)Super Ninja-kun (1994, Japan-exclusive)HammerLock Wrestling (1994)R-Type III (1994, North American distribution only, developed by Irem)The Ignition Factor (1994)Takeda Nobuhiro no Super League Soccer (1994, Japan-exclusive, developed by TOSE)JWP Joshi Pro Wrestling: Pure Wrestle Queens (1994, Japan-exclusive)Super Bases Loaded 3: License to Steal (1994, developed by TOSE)Sterling Sharpe: End 2 End (1995, North America-exclusive, developed by TOSE)
GameCubeSuper Bubble Pop (2003, North America-exclusive, developed by Runecraft)Goblin Commander: Unleash the Horde (2003)Room Zoom: Race for Impact (2005, North America-exclusive, developed by Blade Interactive)World Championship Pool 2004 (2005, Europe-exclusive, developed by Blade Interactive)
WiiZenkoku Dekotora Matsuri (2008, Japan-exclusive, developed by Suzak)Ougon no Kizuna (2009, Japan-exclusive, developed by TownFactory)
Game BoyHero Shuugou!! Pinball Party (1990, Japan-exclusive)Bases Loaded for Game Boy (1990, developed by TOSE)
Maru's Mission (1991, developed by TOSE)
The Rescue of Princess Blobette (1990, Japanese distribution only, developed by Imagineering)
Battle Unit Zeoth (1990)
In Your Face (1990, North America-exclusive)
Fortified Zone (1991)
Banishing Racer (1991, Japan-exclusive)
Q*bert for Game Boy (1992, developed by Realtime Associates)
Ikari no Yousai 2 (1992, Japan-exclusive)
WordZap (1992, North America-exclusive, developed by Realtime Associates)
Rampart (1992, developed by C-Lab)
Avenging Spirit (1992)
Dirty Racing (1993, Japan-exclusive, developed by Gremlin Interactive)
Rod Land (1993, developed by Eurocom)
Goal! (1993, developed by TOSE)
Soldam (1993, Japan-exclusive)
Tetris Plus (1996, Japanese distribution only, developed by Natsume)
The Fidgetts (1997, North American distribution only, developed by Game Over Productions)
Dr. Franken II (1997, North America-exclusive, developed by MotiveTime)
Hayaoshi Quiz Ouza Ketteisen: The King of Quiz (1998, Japan-exclusive quiz game)
Game Boy Color
Get Mushi Club: Minna no Konchuu Daizukan (1999, Japan-exclusive)
Pocket Bowling (1999, North American distribution only, developed by Athena)
Game Boy Advance
Kawaii Pet Shop Monogatari 3 (2002, Japan-exclusive, released as PCCW Japan)
Sea Trader: Rise of Taipan (2002, North America-exclusive)
Scan Hunter: Sen Nen Kaiuo wo Oe! (2002, Japan-exclusive, released as PCCW Japan, developed by DA1)
Darius R (2002, Japan-exclusive, released as PCCW Japan, developed by RideonJapan)
Toukon Heat (2002, Japan-exclusive, released as PCCW Japan)
Jazz Jackrabbit (2002, developed by Game Titan)
Karnaaj Rally (2002, developed by Paragon 5)
Super Bubble Pop (2003, North America-exclusive, developed by Runecraft)
JaJa-Kun Jr. Denshouki (2004, Japan-exclusive)
Moero!! Jaleco Collection (2004, Japan-exclusive)
Nintendo DS
Brain Buster Puzzle Pak (2006, Japanese distribution only, developed by Suzak)
Chuukana Janshi Tenhoo Painyan Remix (2006, Japan-exclusive strip mahjong game)
Puchi Puchi Virus (2007, released in North America by NIS America)
Idol Janshi Suchie-Pai III Remix (2007, Japan-exclusive strip mahjong game)
Nep League DS (2007, Japan-exclusive)
Denjirou Sensei no Fushigi na Jikkenshitsu (2008, Japan-exclusive)
Chou!! Nep League DS (2008, Japan-exclusive)
Imasugu Tsukaeru Mamechishiki: Quiz Zatsugaku-Ou DS (2010, Japan-exclusive quiz game)
WiZmans World (2010, Japan-exclusive RPG)
PlayStation
Idol Janshi Suchie-Pai Limited (1995, Japan-exclusive strip mahjong game)
Bases Loaded '96: Double Header (1995)
Slam Dragon (1996, Japan-exclusive)
Tetris Plus (1996, developed by Natsume
Idol Janshi Suchie-Pai II Limited (1996, Japan-exclusive strip mahjong game)
Turf Wind '96: Take Yutaka Kyousouba Ikusei Game (1996, Japan-exclusive, developed by TOSE)
Tokyo Highway Battle (1996, North American & European distribution only, developed by Genki)
Ninja JaJaMaru-kun: Onigiri Ninpouchou (1997, Japan-exclusive, developed by Infinity)
BRAHMA Force: The Assault on Beltlogger 9 (1997, North American & European distribution only, developed by Genki)
Fantastep (1997, Japan-exclusive)
Cheesy (1997, Japanese distribution only, developed by CTA Developments)
Mini-Yonku Bakusou Kyoudai: Let's & Go!!: WGP Hyper Heat (1997, Japan-exclusive, developed by C-Lab)
Speed Racer (1998, North American distribution only, developed by Graphic Research)
GunBare! Game Tengoku 2: The Game Paradise 2 (1998, Japan-exclusive)
Suchie-Pai Adventure Doki Doki Nightmare (1998, Japan-exclusive erotic game)
T: Kara Hajimaru Monogatari (1998, Japan-exclusive)
Bakusou Kyoudai Let's & Go!! Eternal Wings (1998, Japan-exclusive)
Dragonseeds (1998)
Nectaris: Military Madness (1998, North American distribution only, developed by Matrix Software)
Punky Skunk (1998, North American distribution only, developed by Ukiyotei)
Battle Konchuuden (1999, Japan-exclusive)
Irritating Stick (1999, North American distribution only, developed by Saurus)
Option Tuning Car Battle 2 (1999, Japan-exclusive, developed by MTO)
K-1 Revenge (1999, North American distribution only, developed by Daft)
Juggernaut (1999, North American distribution only, developed by Will)
Vampire Hunter D (1999, North American distribution only, developed by Victor Interactive Software)
Shiibas 1-2-3 Destiny! (2000, Japan-exclusive)
K-1 Grand Prix (2000, North American distribution only, developed by Daft)
Vanark (2000, North American distribution only, developed by Bit Town)
Builder's Block (2000, North American distribution only, developed by Taito)
Super Bubble Pop (2002, North America-exclusive, developed by Runecraft)
Jaleco Collection Vol. 1 (2003, Japan-exclusive, released as PCCW Japan)
PlayStation 2
Stepping Selection (2000, Japan-exclusive)
Rock'n MegaStage (2000, Japan-exclusive)
Dream Audition (2000, Japan-exclusive)
Dream Audition 2 (2000, Japan-exclusive)
Super Micchan (2001, Japan-exclusive)
Dream Audition 3 (2001, Japan-exclusive)
Dream Audition Super Hit Disc 1 (2001, Japan-exclusive)
Dream Audition Super Hit Disc 2 (2001, Japan-exclusive)
Raging Blades (2002, released as PCCW Japan)
Hooligan: Kimi no Naka no Yuuki (2002, Japan-exclusive, released as PCCW Japan)
Baldur's Gate: Dark Alliance (2002, Japanese distribution only, released as PCCW Japan, developed by Snowblind Studios)
Toukon Inoki Michi: Puzzle de Daa! (2002, Japan-exclusive, released as PCCW Japan, developed by Matrix Software)
Idol Janshi R: Janguru Project (2002, Japan-exclusive strip mahjong game, released as PCCW Japan)
Lowrider (2002)
Sweet Legacy (2002, Japan-exclusive, released as PCCW Japan, developed by Frontwing)
Goblin Commander: Unleash the Horde (2003)
Otona no Gal Jan: Kimi ni Hane Man (2003, Japan-exclusive strip mahjong game, released as PCCW Japan)
World Championship Pool 2004 (2004, North America-exclusive, developed by Blade Interactive)
Room Zoom: Race for Impact (2005, Europe-exclusive, developed by Blade Interactive)
World Super Police (2005, developed by Suzak)
Otona no Gal Jan 2 (2005, Japan-exclusive strip mahjong game)
Idol Janshi Suchie-Pai IV (2007, Japan-exclusive strip mahjong game)
Xbox
NightCaster II: Equinox (2002)
Super Bubble Pop (2002)
Pulse Racer (2002, North America-exclusive)
Goblin Commander: Unleash the Horde (2003)
World Championship Pool 2004 (2003, developed by Blade Interactive)
Room Zoom: Race for Impact (2004, developed by Blade Interactive)
Kingdom Under Fire: The Crusaders (2005, Japanese distribution only, developed by Phantagram)
Sega Saturn
Idol Janshi Suchie-Pai Special (1995, Japan-exclusive strip mahjong game)
Idol Janshi Suchie-Pai Remix (1995, Japan-exclusive strip mahjong game)
Bases Loaded '96: Double Header (1995)
Idol Janshi Suchie-Pai II (1996, Japan-exclusive strip mahjong game)
Tetris Plus (1996, developed by Natsume)
Turf Wind '96: Take Yutaka Kyousouba Ikusei Game (1996, Japan-exclusive)
Fantastep (1997, Japan-exclusive)
Game Tengoku: The Game Paradise! (1997, Japan-exclusive)
Ninja JaJaMaru-kun: Onigiri Ninpouchou Gold (1997, Japan-exclusive)
Suchie-Pai Adventure Doki Doki Nightmare (1998, Japan-exclusive erotic game)
GT24 (1998, Japan-exclusive port of Super GT 24h)
Idol Janshi Suchie-Pai Mecha Genteiban (1998, Japan-exclusive strip mahjong game)
Idol Janshi Suchie-Pai Secret Album (1999, Japan-exclusive strip mahjong game)
Sega Dreamcast
Idol Janshi wo Tsukucchaou (1999, Japan-exclusive strip mahjong game)
Carrier (2000)
WonderSwan
Ganso JaJaMaru-kun (1999)
Moero!! Pro Yakyuu Rookies (2000, developed by TOSE)
3DO
Idol Janshi Suchie-Pai Special (1995, Japan-exclusive strip mahjong game)
Mobile
(2004, Japan-exclusive, developed by Inoki International)
(2009, Japan-exclusive, developed by Mobileday)
(2009, Japan-exclusive, developed by Mobileday)
Prototypes/cancelled games
Exerion (NES, 1985, cancelled North American release)
Block Buster (Arcade, 1987, also known as Bombs Away)
Vs. Great Tennis (Arcade, 1988)
Bashi Bazook: Morphoid Master (1988, cancelled North American release of Bio Senshi Dan: Increaser tono Tatakai)
Counter Force (Arcade, 1989)
R&T (Arcade, 1990, European prototype of Rod Land)
Super Dog Booby: Akachan Daibouken no Maki (Famicom, 1990, developed by Taito)
Taro's Quest (NES, 1990, cancelled North American release of JaJaMaru Ninpou Chou)
In Your Face (Arcade, 1991, developed by Jaleco USA)
Squashed (NES, 1991, cancelled North American release of Ninja JaJaMaru: Ginga Daisakusen)
War on Wheels (NES, 1991, developed by Sculptured Software)
Chimera Beast (Arcade, 1993, developed by C.P. Brain)
Kick for the Goal (Arcade, 1994, prototype version of World PK Soccer)
Crossroads (1999, PC, developed by VR-1)
Navy Force (2000, PS2)
Carrier 2: The Next Mutation (2001, PS2)
Lost Continents (2003, PC, developed by VR-1)
World Championship Pool 2004 (2005, GameCube, North American release cancelled)
Ninja JaJaMaru-kun: Pen wa Ken Yorimo Kyoushidegozaru (2006, DS)
References
External links
Jaleco Ltd.
SCROLL Issue 08: The Totally Loaded and Fortified Irritating Spirit of Battle Unit Jaleco
Video game companies of Japan
Video game companies established in 1974
Video game companies established in 2006
Video game companies disestablished in 2014
1974 establishments in Japan
2014 disestablishments in Japan
Defunct video game companies of Japan
Holding companies based in Tokyo
Amusement companies of Japan
Software companies based in Tokyo
Pacific Century Group
Video game development companies
Re-established companies
Japanese companies established in 1974
Japanese companies disestablished in 2014
Holding companies disestablished in 2014
Holding companies established in 2006 |
6631 | https://en.wikipedia.org/wiki/Bus%20%28computing%29 | Bus (computing) | In computer architecture, a bus (shortened form of the Latin omnibus, and historically also called data highway) is a communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.) and software, including communication protocols.
Early computer buses were parallel electrical wires with multiple hardware connections, but the term is now used for any physical arrangement that provides the same logical function as a parallel electrical bus. Modern computer buses can use both parallel and bit serial connections, and can be wired in either a multidrop (electrical parallel) or daisy chain topology, or connected by switched hubs, as in the case of USB.
Background and nomenclature
Computer systems generally consist of three main parts:
The central processing unit (CPU) that processes data,
The memory that holds the programs and data to be processed, and
I/O (input/output) devices as peripherals that communicate with the outside world.
An early computer might contain a hand-wired CPU of vacuum tubes, a magnetic drum for main memory, and a punch tape and printer for reading and writing data respectively. A modern system might have a multi-core CPU, DDR4 SDRAM for memory, a solid-state drive for secondary storage, a graphics card and LCD as a display system, a mouse and keyboard for interaction, and a Wi-Fi connection for networking. In both examples, computer buses of one form or another move data between all of these devices.
In most traditional computer architectures, the CPU and main memory tend to be tightly coupled. A microprocessor conventionally is a single chip which has a number of electrical connections on its pins that can be used to select an "address" in the main memory and another set of pins to read and write the data stored at that location. In most cases, the CPU and memory share signalling characteristics and operate in synchrony. The bus connecting the CPU and memory is one of the defining characteristics of the system, and often referred to simply as the system bus.
It is possible to allow peripherals to communicate with memory in the same fashion, attaching adaptors in the form of expansion cards directly to the system bus. This is commonly accomplished through some sort of standardized electrical connector, several of these forming the expansion bus or local bus. However, as the performance differences between the CPU and peripherals varies widely, some solution is generally needed to ensure that peripherals do not slow overall system performance. Many CPUs feature a second set of pins similar to those for communicating with memory, but able to operate at very different speeds and using different protocols. Others use smart controllers to place the data directly in memory, a concept known as direct memory access. Most modern systems combine both solutions, where appropriate.
As the number of potential peripherals grew, using an expansion card for every peripheral became increasingly untenable. This has led to the introduction of bus systems designed specifically to support multiple peripherals. Common examples are the SATA ports in modern computers, which allow a number of hard drives to be connected without the need for a card. However, these high-performance systems are generally too expensive to implement in low-end devices, like a mouse. This has led to the parallel development of a number of low-performance bus systems for these solutions, the most common example being the standardized Universal Serial Bus (USB). All such examples may be referred to as peripheral buses, although this terminology is not universal.
In modern systems the performance difference between the CPU and main memory has grown so great that increasing amounts of high-speed memory is built directly into the CPU, known as a cache. In such systems, CPUs communicate using high-performance buses that operate at speeds much greater than memory, and communicate with memory using protocols similar to those used solely for peripherals in the past. These system buses are also used to communicate with most (or all) other peripherals, through adaptors, which in turn talk to other peripherals and controllers. Such systems are architecturally more similar to multicomputers, communicating over a bus rather than a network. In these cases, expansion buses are entirely separate and no longer share any architecture with their host CPU (and may in fact support many different CPUs, as is the case with PCI). What would have formerly been a system bus is now often known as a front-side bus.
Given these changes, the classical terms "system", "expansion" and "peripheral" no longer have the same connotations. Other common categorization systems are based on the bus's primary role, connecting devices internally or externally, PCI vs. SCSI for instance. However, many common modern bus systems can be used for both; SATA and the associated eSATA are one example of a system that would formerly be described as internal, while certain automotive applications use the primarily external IEEE 1394 in a fashion more similar to a system bus. Other examples, like InfiniBand and I²C were designed from the start to be used both internally and externally.
Internal buses
The internal bus, also known as internal data bus, memory bus, system bus or front-side bus, connects all the internal components of a computer, such as CPU and memory, to the motherboard. Internal data buses are also referred to as local buses, because they are intended to connect to local devices. This bus is typically rather quick and is independent of the rest of the computer operations.
External buses
The external bus, or expansion bus, is made up of the electronic pathways that connect the different external devices, such as printer etc., to the computer.
Address bus
An address bus is a bus that is used to specify a physical address. When a processor or DMA-enabled device needs to read or write to a memory location, it specifies that memory location on the address bus (the value to be read or written is sent on the data bus). The width of the address bus determines the amount of memory a system can address. For example, a system with a 32-bit address bus can address 232 (4,294,967,296) memory locations. If each memory location holds one byte, the addressable memory space is 4 GiB.
Address multiplexing
Early processors used a wire for each bit of the address width. For example, a 16-bit address bus had 16 physical wires making up the bus. As the buses became wider and lengthier, this approach became expensive in terms of the number of chip pins and board traces. Beginning with the Mostek 4096 DRAM, address multiplexing implemented with multiplexers became common. In a multiplexed address scheme, the address is sent in two equal parts on alternate bus cycles. This halves the number of address bus signals required to connect to the memory. For example, a 32-bit address bus can be implemented by using 16 lines and sending the first half of the memory address, immediately followed by the second half memory address.
Typically two additional pins in the control bus -- a row-address strobe (RAS) and the column-address strobe (CAS) -- are used to tell the DRAM whether the address bus is currently sending the first half of the memory address or the second half.
Implementation
Accessing an individual byte frequently requires reading or writing the full bus width (a word) at once. In these instances the least significant bits of the address bus may not even be implemented - it is instead the responsibility of the controlling device to isolate the individual byte required from the complete word transmitted. This is the case, for instance, with the VESA Local Bus which lacks the two least significant bits, limiting this bus to aligned 32-bit transfers.
Historically, there were also some examples of computers which were only able to address words -- word machines.
Memory bus
The memory bus is the bus which connects the main memory to the memory controller in computer systems. Originally, general-purpose buses like VMEbus and the S-100 bus were used, but to reduce latency, modern memory buses are designed to connect directly to DRAM chips, and thus are designed by chip standards bodies such as JEDEC. Examples are the various generations of SDRAM, and serial point-to-point buses like SLDRAM and RDRAM. An exception is the Fully Buffered DIMM which, despite being carefully designed to minimize the effect, has been criticized for its higher latency.
Implementation details
Buses can be parallel buses, which carry data words in parallel on multiple wires, or serial buses, which carry data in bit-serial form. The addition of extra power and control connections, differential drivers, and data connections in each direction usually means that most serial buses have more conductors than the minimum of one used in 1-Wire and UNI/O. As data rates increase, the problems of timing skew, power consumption, electromagnetic interference and crosstalk across parallel buses become more and more difficult to circumvent. One partial solution to this problem has been to double pump the bus. Often, a serial bus can be operated at higher overall data rates than a parallel bus, despite having fewer electrical connections, because a serial bus inherently has no timing skew or crosstalk. USB, FireWire, and Serial ATA are examples of this. Multidrop connections do not work well for fast serial buses, so most modern serial buses use daisy-chain or hub designs.
Network connections such as Ethernet are not generally regarded as buses, although the difference is largely conceptual rather than practical. An attribute generally used to characterize a bus is that power is provided by the bus for the connected hardware. This emphasizes the busbar origins of bus architecture as supplying switched or distributed power. This excludes, as buses, schemes such as serial RS-232, parallel Centronics, IEEE 1284 interfaces and Ethernet, since these devices also needed separate power supplies. Universal Serial Bus devices may use the bus supplied power, but often use a separate power source. This distinction is exemplified by a telephone system with a connected modem, where the RJ11 connection and associated modulated signalling scheme is not considered a bus, and is analogous to an Ethernet connection. A phone line connection scheme is not considered to be a bus with respect to signals, but the Central Office uses buses with cross-bar switches for connections between phones.
However, this distinctionthat power is provided by the busis not the case in many avionic systems, where data connections such as ARINC 429, ARINC 629, MIL-STD-1553B (STANAG 3838), and EFABus (STANAG 3910) are commonly referred to as “data buses” or, sometimes, "databuses". Such avionic data buses are usually characterized by having several equipments or Line Replaceable Items/Units (LRI/LRUs) connected to a common, shared media. They may, as with ARINC 429, be simplex, i.e. have a single source LRI/LRU or, as with ARINC 629, MIL-STD-1553B, and STANAG 3910, be duplex, allow all the connected LRI/LRUs to act, at different times (half duplex), as transmitters and receivers of data.
Bus multiplexing
The simplest system bus has completely separate input data lines, output data lines, and address lines.
To reduce cost, most microcomputers have a bidirectional data bus, re-using the same wires for input and output at different times.
Some processors use a dedicated wire for each bit of the address bus, data bus, and the control bus.
For example, the 64-pin STEbus is composed of 8 physical wires dedicated to the 8-bit data bus, 20 physical wires dedicated to the 20-bit address bus, 21 physical wires dedicated to the control bus, and 15 physical wires dedicated to various power buses.
Bus multiplexing requires fewer wires, which reduces costs in many early microprocessors and DRAM chips.
One common multiplexing scheme, address multiplexing, has already been mentioned.
Another multiplexing scheme re-uses the address bus pins as the data bus pins, an approach used by conventional PCI and the 8086.
The various "serial buses" can be seen as the ultimate limit of multiplexing, sending each of the address bits and each of the data bits, one at a time, through a single pin (or a single differential pair).
History
Over time, several groups of people worked on various computer bus standards, including the IEEE Bus Architecture Standards Committee (BASC), the IEEE "Superbus" study group, the open microprocessor initiative (OMI), the open microsystems initiative (OMI), the "Gang of Nine" that developed EISA, etc.
First generation
Early computer buses were bundles of wire that attached computer memory and peripherals. Anecdotally termed the "digit trunk", they were named after electrical power buses, or busbars. Almost always, there was one bus for memory, and one or more separate buses for peripherals. These were accessed by separate instructions, with completely different timings and protocols.
One of the first complications was the use of interrupts. Early computer programs performed I/O by waiting in a loop for the peripheral to become ready. This was a waste of time for programs that had other tasks to do. Also, if the program attempted to perform those other tasks, it might take too long for the program to check again, resulting in loss of data. Engineers thus arranged for the peripherals to interrupt the CPU. The interrupts had to be prioritized, because the CPU can only execute code for one peripheral at a time, and some devices are more time-critical than others.
High-end systems introduced the idea of channel controllers, which were essentially small computers dedicated to handling the input and output of a given bus. IBM introduced these on the IBM 709 in 1958, and they became a common feature of their platforms. Other high-performance vendors like Control Data Corporation implemented similar designs. Generally, the channel controllers would do their best to run all of the bus operations internally, moving data when the CPU was known to be busy elsewhere if possible, and only using interrupts when necessary. This greatly reduced CPU load, and provided better overall system performance.
To provide modularity, memory and I/O buses can be combined into a unified system bus. In this case, a single mechanical and electrical system can be used to connect together many of the system components, or in some cases, all of them.
Later computer programs began to share memory common to several CPUs. Access to this memory bus had to be prioritized, as well. The simple way to prioritize interrupts or bus access was with a daisy chain. In this case signals will naturally flow through the bus in physical or logical order, eliminating the need for complex scheduling.
Minis and micros
Digital Equipment Corporation (DEC) further reduced cost for mass-produced minicomputers, and mapped peripherals into the memory bus, so that the input and output devices appeared to be memory locations. This was implemented in the Unibus of the PDP-11 around 1969.
Early microcomputer bus systems were essentially a passive backplane connected directly or through buffer amplifiers to the pins of the CPU. Memory and other devices would be added to the bus using the same address and data pins as the CPU itself used, connected in parallel. Communication was controlled by the CPU, which read and wrote data from the devices as if they are blocks of memory, using the same instructions, all timed by a central clock controlling the speed of the CPU. Still, devices interrupted the CPU by signaling on separate CPU pins.
For instance, a disk drive controller would signal the CPU that new data was ready to be read, at which point the CPU would move the data by reading the "memory location" that corresponded to the disk drive. Almost all early microcomputers were built in this fashion, starting with the S-100 bus in the Altair 8800 computer system.
In some instances, most notably in the IBM PC, although similar physical architecture can be employed, instructions to access peripherals (in and out) and memory (mov and others) have not been made uniform at all, and still generate distinct CPU signals, that could be used to implement a separate I/O bus.
These simple bus systems had a serious drawback when used for general-purpose computers. All the equipment on the bus had to talk at the same speed, as it shared a single clock.
Increasing the speed of the CPU becomes harder, because the speed of all the devices must increase as well. When it is not practical or economical to have all devices as fast as the CPU, the CPU must either enter a wait state, or work at a slower clock frequency temporarily, to talk to other devices in the computer. While acceptable in embedded systems, this problem was not tolerated for long in general-purpose, user-expandable computers.
Such bus systems are also difficult to configure when constructed from common off-the-shelf equipment. Typically each added expansion card requires many jumpers in order to set memory addresses, I/O addresses, interrupt priorities, and interrupt numbers.
Second generation
"Second generation" bus systems like NuBus addressed some of these problems. They typically separated the computer into two "worlds", the CPU and memory on one side, and the various devices on the other. A bus controller accepted data from the CPU side to be moved to the peripherals side, thus shifting the communications protocol burden from the CPU itself. This allowed the CPU and memory side to evolve separately from the device bus, or just "bus". Devices on the bus could talk to each other with no CPU intervention. This led to much better "real world" performance, but also required the cards to be much more complex. These buses also often addressed speed issues by being "bigger" in terms of the size of the data path, moving from 8-bit parallel buses in the first generation, to 16 or 32-bit in the second, as well as adding software setup (now standardised as Plug-n-play) to supplant or replace the jumpers.
However, these newer systems shared one quality with their earlier cousins, in that everyone on the bus had to talk at the same speed. While the CPU was now isolated and could increase speed, CPUs and memory continued to increase in speed much faster than the buses they talked to. The result was that the bus speeds were now very much slower than what a modern system needed, and the machines were left starved for data. A particularly common example of this problem was that video cards quickly outran even the newer bus systems like PCI, and computers began to include AGP just to drive the video card. By 2004 AGP was outgrown again by high-end video cards and other peripherals and has been replaced by the new PCI Express bus.
An increasing number of external devices started employing their own bus systems as well. When disk drives were first introduced, they would be added to the machine with a card plugged into the bus, which is why computers have so many slots on the bus. But through the 1980s and 1990s, new systems like SCSI and IDE were introduced to serve this need, leaving most slots in modern systems empty. Today there are likely to be about five different buses in the typical machine, supporting various devices.
Third generation
"Third generation" buses have been emerging into the market since about 2001, including HyperTransport and InfiniBand. They also tend to be very flexible in terms of their physical connections, allowing them to be used both as internal buses, as well as connecting different machines together. This can lead to complex problems when trying to service different requests, so much of the work on these systems concerns software design, as opposed to the hardware itself. In general, these third generation buses tend to look more like a network than the original concept of a bus, with a higher protocol overhead needed than early systems, while also allowing multiple devices to use the bus at once.
Buses such as Wishbone have been developed by the open source hardware movement in an attempt to further remove legal and patent constraints from computer design.
The Compute Express Link (CXL) is an open standard interconnect for high-speed CPU-to-device and CPU-to-memory, designed to accelerate next-generation data center performance.
Examples of internal computer buses
Parallel
ASUS Media Bus proprietary, used on some ASUS Socket 7 motherboards
Computer Automated Measurement and Control (CAMAC) for instrumentation systems
Extended ISA or EISA
Industry Standard Architecture or ISA
Low Pin Count or LPC
MBus
MicroChannel or MCA
Multibus for industrial systems
NuBus or IEEE 1196
OPTi local bus used on early Intel 80486 motherboards.
Conventional PCI
Parallel ATA (also known as Advanced Technology Attachment, ATA, PATA, IDE, EIDE, ATAPI, etc.), Hard disk drive, optical disk drive, tape drive peripheral attachment bus
S-100 bus or IEEE 696, used in the Altair 8800 and similar microcomputers
SBus or IEEE 1496
SS-50 Bus
Runway bus, a proprietary front side CPU bus developed by Hewlett-Packard for use by its PA-RISC microprocessor family
GSC/HSC, a proprietary peripheral bus developed by Hewlett-Packard for use by its PA-RISC microprocessor family
Precision Bus, a proprietary bus developed by Hewlett-Packard for use by its HP3000 computer family
STEbus
STD Bus (for STD-80 [8-bit] and STD32 [16-/32-bit]), FAQ
Unibus, a proprietary bus developed by Digital Equipment Corporation for their PDP-11 and early VAX computers.
Q-Bus, a proprietary bus developed by Digital Equipment Corporation for their PDP and later VAX computers.
VESA Local Bus or VLB or VL-bus
VMEbus, the VERSAmodule Eurocard bus
PC/104
PC/104-Plus
PCI-104
PCI/104-Express
PCI/104
Zorro II and Zorro III, used in Amiga computer systems
Serial
1-Wire
HyperTransport
I²C
I3C (bus)
SLIMbus
PCI Express or PCIe
Serial ATA (SATA), Hard disk drive, solid state drive, optical disc drive, tape drive peripheral attachment bus
Serial Peripheral Interface (SPI) bus
UNI/O
SMBus
Examples of external computer buses
Parallel
HIPPI High Performance Parallel Interface
IEEE-488 (also known as GPIB, General-Purpose Interface Bus, and HPIB, Hewlett-Packard Instrumentation Bus)
PC Card, previously known as PCMCIA, much used in laptop computers and other portables, but fading with the introduction of USB and built-in network and modem connections
Serial
Camera Link
CAN bus ("Controller Area Network")
eSATA
ExpressCard
Fieldbus
IEEE 1394 interface (FireWire)
RS-232
RS-485
Thunderbolt
USB
Examples of internal/external computer buses
Futurebus
InfiniBand
PCI Express External Cabling
QuickRing
Scalable Coherent Interface (SCI)
Small Computer System Interface (SCSI), Hard disk drive and tape drive peripheral attachment bus
Serial Attached SCSI (SAS) and other serial SCSI buses
Thunderbolt
Yapbus, a proprietary bus developed for the Pixar Image Computer
See also
Address decoder
Bus contention
Bus error
Bus mastering
Communication endpoint
Control bus
Crossbar switch
Memory address
Front-side bus (FSB)
External Bus Interface (EBI)
Harvard architecture
Master/slave (technology)
Network On Chip
List of device bandwidths
List of network buses
Software bus
References
External links
Computer hardware buses and slots pinouts with brief descriptions
Digital electronics
Motherboard
Communication interfaces |
42850937 | https://en.wikipedia.org/wiki/Mowag%20Trojan%20infantry%20fighting%20vehicle | Mowag Trojan infantry fighting vehicle | The AIFV (armored infantry fighting vehicle) Mowag Trojan was built as a prototype and tested in the New IFV program NSpz (Neuer Schützenpanzer) for Switzerland in 1990. The NSpz was intended to replace the M113 used by the Swiss Army. It was first equipped with the Steyr SP 3E/300 turret, and later with the Oerlikon GBA COA turret. It was equipped with various technological innovations such as outside lying fuel tanks, preheating and heating system, compartmentalized additional armor on the sides, which could be easily upgraded, splinter protection in the interior and s hydraulic rear ramp with integrated door and side protection. Due to financial shortages in the military budget, procurement should be begin with almost 10 years delay. MOWAG was not able to keep the production for the Trojans so long unused. Mowag participated no more in the second, later selection of NSpz, now called Schützenpanzer2000 (SP2000) in 1998 to 1999. The Swiss Army then purchased the Swedish CV90. The Trojan was the last tracked vehicle made by the company MOWAG . The Trojan was until 2005 owned by the company MOWAG. It is now at the Military Museum Full.
Finnish defense company Patria bought a license to build these, and they built a couple of prototypes in 25mm, 30mm and 35mm Bushmaster guns. These were made to compete for the Finnish Military acquisition program for a new armored vehicle, however the Swedish CV90 beat the Patria TC-200 and TC-500 and thus these Patria variants remained just prototypes and went no further.
Variants
Foreign Variants
Finland
Patria TC-200, 25, 30 or 35mm gun options with either 7.62 NATO or Russian PKM (Service version would have been the Russian PKM)
Patria TC-500, either IFV with 30mm or an anti-tank version with TOW launcher
References
Armoured fighting vehicles of Switzerland
Abandoned military projects of Switzerland |
37436694 | https://en.wikipedia.org/wiki/Ellis%20University | Ellis University | Ellis University was an accredited online for-profit college, based in Oakbrook Terrace, Illinois. The university offered online and in class undergraduate degrees in child development, interdisciplinary studies, accounting, business administration, and computer science, and graduate degrees in communications, business administration, and computer science. Ellis University was accredited by the Distance Education Accrediting Commission (DEAC). Ellis University was issued a show cause by DEAC and, while operating under threat of removal of accreditation, withdrew its accreditation on September 29, 2016. On December 1, 2016 Ellis University ceased operations after a show-cause was issued by their accreditor.
History
Ellis University was founded in 2008 in Chicago.
It was bought in 2012 and changed its name to John Hancock University. In 2015, it changed its name back to Ellis University.
Academics
Undergraduate
Bachelor of Arts in Child Development
Bachelor of Arts in Interdisciplinary Studies
Bachelor of Science in Accounting
Bachelor of Science in Business Administration
Bachelor of Science in Computer Science
Graduate
Master of Arts in Communication Arts
Master of Business Administration
Master of Science in Computer Science
References
External links
Official Ellis University website
1999 establishments in Illinois
Distance education institutions based in the United States
Educational institutions established in 1999
For-profit universities and colleges in the United States
Privately held companies based in Illinois
Universities and colleges in DuPage County, Illinois
Oakbrook Terrace, Illinois
Defunct private universities and colleges in Illinois |
661648 | https://en.wikipedia.org/wiki/Pluggable%20authentication%20module | Pluggable authentication module | A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API). PAM allows programs that rely on authentication to be written independently of the underlying authentication scheme. It was first proposed by Sun Microsystems in an Open Software Foundation Request for Comments (RFC) 86.0 dated October 1995. It was adopted as the authentication framework of the Common Desktop Environment. As a stand-alone open-source infrastructure, PAM first appeared in Red Hat Linux 3.0.4 in August 1996 in the Linux PAM project. PAM is currently supported in the AIX operating system, DragonFly BSD, FreeBSD, HP-UX, Linux, macOS, NetBSD and Solaris.
Since no central standard of PAM behavior exists, there was a later attempt to standardize PAM as part of the X/Open UNIX standardization process, resulting in the X/Open Single Sign-on (XSSO) standard. This standard was not ratified, but the standard draft has served as a reference point for later PAM implementations (for example, OpenPAM).
Criticisms
Since most PAM implementations do not interface with remote clients themselves, PAM, on its own, cannot implement Kerberos, the most common type of SSO used in Unix environments. This led to SSO's incorporation as the "primary authentication" portion of the would-be XSSO standard and the advent of technologies such as SPNEGO and SASL. This lack of functionality is also the reason SSH does its own authentication mechanism negotiation.
In most PAM implementations, pam_krb5 only fetches Ticket Granting Tickets, which involves prompting the user for credentials, and this is only used for the initial login in an SSO environment. To fetch a service ticket for a particular application, and not prompt the user to enter credentials again, that application must be specifically coded to support Kerberos. This is because pam_krb5 cannot itself get service tickets, although there are versions of PAM-KRB5 that are attempting to work around the issue.
See also
Implementations:
Java Authentication and Authorization Service
Linux PAM
OpenPAM
Identity management – the general topic
Name Service Switch – manages user databases
System Security Services Daemon – SSO implementation based on PAM and NSS
References
External links
Specifications:
The Original Solaris PAM RFC
X/Open Single Sign-on (XSSO) 1997 Draft Working Paper
Guides:
Pluggable Authentication Modules for Linux
Making the Most of Pluggable Authentication Modules (PAM)
Oracle Solaris Administration: Security Services: Using PAM
Open Group standards
Unix authentication-related software
Computer access control frameworks
Computer security standards
Application programming interfaces |
26627577 | https://en.wikipedia.org/wiki/OneLogin | OneLogin | OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that designs, develops, and sells a unified access management (UAM) platform to enterprise-level businesses and organizations. It was founded in 2009 by brothers Thomas Pedersen and Christian Pedersen.
History
OneLogin was founded in 2009 in San Francisco by Thomas and Christian Pedersen. The brothers were involved with the on-demand help desk application, Zendesk, before launching OneLogin.
OneLogin officially launched in 2010.
In 2019, OneLogin made several significant hires to its executive leadership team including appointing Rick Barr as Chief Operating Officer, Dayna Rothman as Chief Marketing Officer, and Vanessa Pegueros as Chief Trust & Security Officer.
Acquisitions and partnerships
In December 2015, OneLogin acquired San Diego-based Cafésoft, a provider of on-premise Web Access Management (WAM) software. The technology enables OneLogin to extend Single Sign-on to applications running on-premises.
In June 2016, OneLogin acquired Santa Clara, California-based Portadi, a cloud-based password management tool.
In November 2016, OneLogin acquired London-based Sphere Secure Workspace, a software vendor with container technology that runs on mobile devices.
In June 2017, OneLogin acquired Auckland, New Zealand-based ThisData, a cloud security company specializing in account takeover detection
Recognition
May 2015: Forrester Research ranked OneLogin as the top vendor in the Forrester Wave for Cloud Identity & Access Management.
March 2016: OneLogin named to the "Fast 50" privately held Internet security, networking, and storage companies by JMP Securities LLC.
April 2016: OneLogin named one of Fortune's Top 25 Workplaces in the Bay Area - SMB
April 2017: Fortune's Top 25 Workplaces in the Bay Area - SMB
August 2019: OneLogin's Brad Brooks Recognized as a Top-50 SaaS CEO.
November 2019: Gartner Peer Insights Customers' Choice for Access Management 2019.
March 2020: Cyber Defense Magazine's InfoSec Awards 2020 for Most Innovative Trusted Experience Platform️.
October 2020: OneLogin Wins "Remote Work Security Innovation of the Year" Designation in 2020 RemoteTech Breakthrough Awards Program.
November 2020: OneLogin Recognized as a Leader in Gartner's Magic Quadrant for Access Management.
August 2021: OneLogin Recognized as a Leader in The Forrester Wave: Identity As A Service (IDaaS) For Enterprise, Q3 2021.
Security
In August 2016, OneLogin reported that "an unauthorized user gained access to one of our standalone systems, which we use for log storage and analytics." The single user accessed the service for a month or more, and may have been able to see Secure Notes unencrypted. To remediate, OneLogin fixed the cleartext logging bug, locked down access to the log management system, and reset passwords.
On May 31, 2017, OneLogin detected and stopped unauthorized access in their US data region. According to a OneLogin blog post on the breach, "a threat actor used one of our AWS keys to gain access to our AWS platform via an API from an intermediate host with another, smaller service provider in the US."
See also
List of single sign-on implementations
References
External links
Federated identity
Identity management systems
Cloud applications
Access control software
Password authentication
Computer security companies
Software companies based in the San Francisco Bay Area
Active Directory
Computer security software companies
Computer security software
Computer access control
Companies based in San Francisco
Software companies of the United States |
70078670 | https://en.wikipedia.org/wiki/Azerbaijan%20Government%20CERT | Azerbaijan Government CERT | Azerbaijan Computer Emergency Response Team, officially known as Azerbaijan Government CERT (), is a computer emergency response team of the Republic of Azerbaijan responsible for cybersecurity and gathering data concerning information technology. It operates under the Special Communication and Information Security State Service of the government of Azerbaijan. It collectes data within its framework from relevant sources, including internet users, computer engineering groups, individuals or organizations and software developers. It coordinates with the foreign countries for gathering and analysing data from cybersecurity incidents involving both software and hardware tools designed for the prevention of internet and computer security.
Azerbaijan CERT develope framework for suggesting recommendations for software designed to maintain software and hardware tools entrusted with preventing unauthorised access to devices consisting personally identifiable information of the users. It operates within the scope of generalization and issues advisory in addition to providing technical support to users in the country. It also prevents cyberterrorism by spreading cybersecurity awareness. As national computer security agency, it provides assistance to the state governments concerning investigation of the computer incidents.
Duties and responsibilities
Headquartered in Special Communication & Information Security State Service of Azerbaijan, Baku, Azerbaijan, Azerbaijan Computer Emergency Response Team is entrusted with issuing advisory on specific software and hardware tools in collaboration with public and private vendors. It also coordinates with foreign CERTs in information technology sector, including cybercrimes. It also conduct research in collaboration with state authorities for obtaining data on cybersecurity incidents and assist them in preventing cyberattacks and malicious softwares and disruption of IT network system. The agency is also tasked with preventing denial-of-service attack within the jurisdiction of Azerbaijan.
References
Further reading
2008 establishments in Azerbaijan
Organizations based in Baku
Government agencies of Azerbaijan
Computer emergency response teams |
35262554 | https://en.wikipedia.org/wiki/Seq%20%28Unix%29 | Seq (Unix) | On Unix-like computer systems, seq is a utility for generating a sequence of numbers.
History
seq first appeared on 8th edition Research Unix in 1985, and was not adopted by other variants of Unix (such as commercial Unixes or BSD). Nevertheless, it was later adopted in Plan 9 from Bell Labs, and from there was copied into some modern BSD descendants like FreeBSD. Another version of seq was written in 1994 by Ulrich Drepper, for GNU, and is now available on all Linux distributions as part of the GNU Core Utilities. The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities.
Functionality
In its most basic use case, seq N prints out all the integers from 1 to N in sequence. This was convenient as the Unix shell at the time, the Bourne shell had no primitives for iterating over numbers, and its "for" command could only iterate over a list of words. seq was therefore used to generate such a list, as in this example:
# Remove file1 through file17:
for n in `seq 17`
do
rm "file$n"
done
seq had additional options for controlling the start (not just end) of the numeric sequence, its increment (a floating point number), and the formatting of the number. GNU seq changed the name and meaning of the format option (from -p to -f) and added an option to control the separator between the numbers (-s, defaults to a newline).
With other alternatives available (e.g., expr), and with more recent shells adding builtin numeric iteration, seq is less commonly used today. In the modern Linux shell, bash, the above example can be alternatively written as:
for n in {1..17}
do
rm "file$n"
done
and more efficiently, without actually generating the whole sequence in advance, as
for ((n=1; n<=17; n++))
do
rm "file$n"
done
References
seq manual page from 8th Edition Unix
seq manual page from FreeBSD
External links
Unix software
Utility software |
53802732 | https://en.wikipedia.org/wiki/Raouf%20Boutaba | Raouf Boutaba | Raouf Boutaba (born December 31, 1966) is an Algerian Canadian computer scientist. His research interests are in resource, network and service management in wired and wireless networked systems. His work focuses on network virtualization, network softwarization, cloud computing, and network security.
He has been a Full Professor in the David R. Cheriton School of Computer Science since 2007. In 2016, he became the Associate Dean of Research in the University of Waterloo’s Faculty of Mathematics, and in July 2019 was appointed its first Associate Dean of Innovation and Entrepreneurship. On July 1, 2020, he became the eighth Director of the David R. Cheriton School of Computer Science. He holds a University Research Chair at the University of Waterloo, and an INRIA International Chair in France.
Education and career
Boutaba was born in Tébessa, Algeria. After completing a BSc in computer engineering at the University of Annaba, Algeria in 1988, he completed an MSc in 1990 and a PhD in 1994 in computer science at Pierre and Marie Curie University, now part of Sorbonne University, in Paris, France.
In 1995, he joined the Centre de recherche en informatique de Montréal in Canada as the Lead Researcher, where he founded and lead the Telecommunications and Distributed Systems Research Division and later became its Director. In 1999, he joined the University of Waterloo's David R. Cheriton School of Computer Science as an Assistant Professor. He was promoted to Associate Professor in 2002 and to Full Professor in 2007. In 2016, Boutaba became the Associate Dean of Research in the Faculty of Mathematics and in July 2019 was appointed its first Associate Dean of Innovation and Entrepreneurship. He became a University Research Chair in 2018, a position typically held for seven years.
Boutaba held a Cheriton Faculty Fellowship at the University of Waterloo from 2007–2010 and again from 2012–2015. He also held a Faculty of Mathematics Fellowship from 2003–2005.
Boutaba held visiting professorships at the University of Toronto, Canada, the Pohang University of Science and Technology – POSTECH, Korea, the Universidade Federal do Rio de Janeiro, Brazil, the Université Pierre & Marie Curie – Paris VI, the Université de Versailles St-Quentin-en-Yvelines, Télécom ParisTech, Université Paris Nord – Paris XIII, Université Paris-Est-Marne-la-Vallée, Université Henry Descartes – Paris V, Lorraine Université d'Excellence, France.
Research contributions
Boutaba is known for his role in establishing automated network management, which directly led to the trend towards autonomic networking. His PhD thesis introduced fundamental concepts for automating network management tasks, including proactive and reactive management models, organizational management domains, goal-driven and policy-based management — the use of interpreted, easily modified policies to define rules for changes in networks’ behaviour facilitating network programmability and self-managing networks. Boutaba’s work on automated network management has been applied in various areas, including configuration, fault, and security management, and to various network technologies, including optical, wireless, and IP networks.
Boutaba is also known for his fundamental contributions to network virtualization, including virtual network resource allocation and management, user-controlled lightpaths, virtual network embedding, survivable virtual network embedding, multi-domain virtual network embedding, and data centre virtualization.
His research also includes major contributions to cloud resource management, software-defined networking, network function virtualization, resource management in wireless and mobile networks. His invention of distributed pattern matching — a generic framework for distributed search in large-scale environments — has applications in many areas, including Internet-scale service discovery, decentralized Web hosting, decentralized social networks, and information-centric networking.
Awards and honours
Boutaba was named a Fellow of the Institute of Electrical and Electronics Engineers in 2012 for contributions to network management methodologies and applications. He was named a Fellow of the Engineering Institute of Canada in 2013 for contributions to the management of communication networks and services, and Fellow of the Canadian Academy of Engineering in 2015 for pioneering contributions to automated and policy-based network management, which opened new exciting possibilities toward self-managing networks and autonomic computing, and groundbreaking work on network virtualization as a foundation for the future Internet architecture. In 2019, he was named a Fellow of the Royal Society of Canada, the country’s highest academic honour.
Boutaba received the 2009 Dan Stokesberry Award for particularly distinguished technical contribution to the growth of the network management field, the highest recognition for technical contributions in the area of network management. He was awarded the 2014 McNaughton Gold Medal, IEEE Canada's highest honour. In 2017, Boutaba was awarded an INRIA International Chair, a research position typically held for five years, and in 2018 a University Research Chair at the University of Waterloo, a position typically held of seven years.
Boutaba received several other national and international awards, including the following:
2016 IEEE Communications Society Technical Committee on Information Infrastructure and Networking technical achievement award for incredible contribution in the field of data communication infrastructure and network management
2016 IEEE Communications Society Donald W. McLellan Meritorious Service Award for dedicated and outstanding long-term service to the IEEE Communication Society and his high quality contributions to and his leadership in conferences, publications, standards and technical activities
2013 IBM Faculty Award for outstanding reputation and contributions in the field of service management automation
2012 Salah Aidarous Award for unremitting service and dedication to the IT and Telecommunications Network Operations and Management community
2011 Google Faculty Award for world-class research in cloud computing
2005–2009 IEEE Communications Society Distinguished Lecturer on Autonomic Computing and Communications
2009 IEEE Communications Society Joseph LoCicero Publications Award for outstanding service as founding Editor-in-Chief of the IEEE Transactions on Network & Service Management
2009 NSERC Discovery Accelerator Award awarded to 3% top researchers in science and engineering in Canada
2008 IEEE Communication Society 2008 Fred W. Ellersick Paper Prize
2007 IEEE Communications Society Harold Sobol Award for envisioning and implementing a converged strategy for the Society's network operations and management events that significantly increased their value to the industry and academic community in this field
2007 IFIP Silver Core for outstanding service to the International Federation for Information Processing as chair of the IFIP working group on network and distributed systems management
2005 Nortel Networks Award for Leadership Excellence in Technology Transfer
2002–2004 Distinguished speaker, IEEE Computer Society Distinguished Visitors Program
2004 Nortel Networks Research Excellence Award
2000 Premier’s Research Excellence Award
1998 Higher Education and Research Minister’s Prize for Best Graduating Computer Engineer
References
Fellow Members of the IEEE
Living people
1966 births |
18910758 | https://en.wikipedia.org/wiki/2008%20Washington%20Huskies%20football%20team | 2008 Washington Huskies football team | The 2008 Washington Huskies football team represented the University of Washington in the 2008 NCAA Division I FBS football season. Led by fourth-year head coach Tyrone Willingham, the team played its home games at Husky Stadium in Seattle. The Huskies were winless at 0–12, the worst record in the program's history.
On October 27, the Monday after a 33–7 home loss to Notre Dame, it was announced that Willingham would step down as head coach at the end of the season. UW president Mark Emmert indicated the decision to fire Willingham had been made shortly after the prior week's game against Oregon State. Athletic Director Scott Woodward said the announcement ended speculation of what was going to happen with Willingham, who had a year remaining on his contract.
"It became quite obvious that the performance on the football field wasn't up to what we talked about at the beginning of the season and previous to the season and it became more obvious as time went on," Woodward said in explaining his decision to make the move.
Schedule
Game summaries
Oregon
Washington opened the season with a game versus the Oregon Ducks at Autzen Stadium. It was the first time Washington opened the season with a conference opponent since 1998, when they defeated Arizona State, 42–38 in Tempe, Arizona.
Oregon crushed the Huskies, 44–10. Washington averaged a mere 2.2 rushing yards per carry, and was held scoreless in the second half.
"We just couldn't run the ball", coach Tyrone Willingham said.
The win was the 5th straight for the Ducks against the Huskies, which marks the first time Oregon has accomplished that feat since the series began in 1900.
BYU
The Huskies and Cougars met for the seventh time, with #15 BYU avoiding the upset in front of 64,611 fans at Husky Stadium.
A late Washington rally fell short and the game ended in controversy. Quarterback Jake Locker scored on a 3-yard touchdown run with 2 seconds remaining in the game, cutting BYU's lead to 28–27. But Locker was flagged for unsportsmanlike conduct, and the extra point attempt was moved back 15 yards. The ensuing PAT try was blocked, BYU players rushed the field, and a chorus of boos rained down from the Husky faithful.
"After scoring the touchdown, the player threw the ball into the air and we are required, by rule, to assess a 15-yard unsportsmanlike conduct penalty", Referee Larry Farina said in a statement given to Washington officials. "It is a celebration rule that we are required to call. It was not a judgment call."
Cougar quarterback Max Hall had 339 yards passing and three touchdowns, including a 15-yarder to tight end Dennis Pitta with 3:31 left in the game.
Locker finished 17-for-32 passing for 204 yards and added 62 yards rushing on 18 carries.
Washington safety Nate Williams had a game-high 13 tackles. He also put the hit on BYU tailback Harvey Unga that forced a touchdown-saving fumble that UW's Tripper Johnson recovered in the end zone in the 4th quarter.
Oklahoma
Oklahoma quarterback Sam Bradford completed 18 of 21 passes for 304 yards, matched his career high with five touchdown passes and ran for a sixth score to lead the Sooners in a rout against the overmatched Huskies, 55–14.
The Sooners scored their most points on the road against a school from a BCS conference since a 56–25 win at Texas Tech on November 22, 2003. They also handed Washington its largest margin of defeat at home since October 12, 1929, when it lost 48–0 to Southern California, a scant two weeks before the Wall Street Crash of 1929.
Washington lost three fumbles, missed two field goals and punted three times in the first half. The Huskies went into the locker room down 34–0 and didn't get on the board until Jake Locker scored on a 15-yard touchdown run with 5:37 remaining in the 3rd quarter.
Oklahoma, the highest-ranked nonconference team to visit Husky Stadium since 1969, gained 591 yards of total offense on the day.
Stanford
The Huskies fell to 0–4 (0–2 in the Pac-10) with a 35–28 loss to Stanford, and also lost quarterback Jake Locker for the rest of the season when he broke his right thumb in the second quarter while blocking downfield.
Stanford quarterback Tavita Pritchard, formerly of Clover Park High School, completed 16 of 24 passes for 224 yards and three touchdowns with no interceptions.
The Huskies' defense gave up 466 yards – and 244 of those came on the ground, despite Washington's agreement all week that its top defensive priority was stopping the run.
The Huskies were trailing 14–7 when Locker was hurt, and while replacement Ronnie Fouch injected some enthusiasm with some accurate passing, the Dawgs ultimately couldn't overcome another porous performance from its defense.
Just about the time Locker emerged from the locker room in the third quarter, Stanford's Anthony Kimble ran 83 yards for a touchdown with 9:35 left in the third quarter to put Stanford ahead 28–14, and all hope seemed to be gone.
Willingham opened his postgame news conference by saying it was "very difficult for me to stand before you...I felt like we could win the football game."
Arizona
On a breezy night in the Tucson desert, Arizona wasted little time putting away the Huskies. Arizona took a 17–0 lead after the first quarter and never looked back.
Facing the nation's second-ranked defense, Washington struggled behind quarterback Ronnie Fouch, a redshirt freshman making his first college start. Fouch completed 12 of 28 passes for 181 yards and one touchdown, a 20-yarder to Michael Gottlieb midway through the fourth quarter. Fouch also threw an interception.
"We played a complete game on offense, defense and special teams", Arizona coach Mike Stoops said. "We were very efficient and balanced. Our running backs were strong. (Quarterback) Willie Tuitama was excellent."
It was the Huskies' fifth loss of the season and seventh straight dating back to last season, giving the Dawgs the dubious distinction of having the longest losing streak in major college football.
Washington athletic director Scott Woodward met with reporters after the game to say that he stands by the position he has held all along – he does not intend to fire head coach Tyrone Willingham midseason.
"I stick with what I said last week", he said. "I told you last week that I was less happy than I was the week before. Well, I'm even less happy than I was. But we have seven games, and we are going to play those seven games and no, there is not going to be a change this week. We will look at the whole body of work of the season and assess it at the end of the season."
Oregon State
Oregon State's James Rodgers zipped through Washington's defense for 216 all-purpose yards and three touchdowns as the Beavers won their fifth straight over Washington for the first time in the series' history.
James' brother, Jacquizz Rodgers, did his part too: 94 yards rushing on 20 carries and a touchdown.
The Beavers ran for 230 yards and the Huskies turned the ball over four times in front of a disappointed homecoming crowd at Husky Stadium. The biggest cheers of the night were for former Husky head coach Don James and the 1977 Washington team that won the Rose Bowl when they were honored on the field after the third quarter.
The Huskies dropped their eighth straight dating back to last season, tied with North Texas for the longest losing streak in the country.
Washington took a rare lead on Jared Ballman's 45-yard field goal early in the first quarter. The Huskies had not led since the third quarter against BYU on September 6, and it was only their second lead of the entire season.
With under 3 minutes to go in the first quarter, Oregon State coach Mike Riley took a chance by going for it on fourth-and-1 at his own 43, and converted with Jacquizz Rodgers going for five yards. On the next play, the Beavers faked a dive to Jacquizz and handed instead to James Rodgers on a reverse, then watched him dash in front of the Beavers' bench for a 52-yard touchdown.
Later in the half, after Fouch was sacked and fumbled near midfield, James Rodgers struck again. Rodgers found space in the middle of Washington interior on a middle screen, then sprinted away from three Huskies for a 33-yard scoring pass to make it 17–3.
The Huskies were 3 of 12 on 3rd down conversions.
Notre Dame
Washington's offense, with redshirt freshman quarterback Ronnie Fouch making his third career start, did not cross midfield until 6 minutes remained in the game. The Huskies had just 51 total yards on 35 plays entering the fourth quarter. They had 5 yards passing at halftime, when the game was essentially over with Notre Dame up 17–0.
"I feel like we could have scored more, but we never want to embarrass a team", said Notre Dame wide receiver Golden Tate, who ran 21 yards for his first career touchdown on an end around in the opening quarter. "I think we let up once we had them 14–0."
Washington finished with 124 total yards against a defense that was allowing an average of 368 yards, 75th nationally.
"There was nothing that we did well tonight", a solemn Willingham said after the game.
USC
Mark Sanchez completed 15 of 19 passes for 167 yards and two touchdowns to Patrick Turner before coming out early in the third quarter, and Southern California scored TDs on its first six possessions in a 56–0 rout of Washington.
USC led 42–0 at the half.
The win before a crowd of 80,216 at the Los Angeles Memorial Coliseum was the 42nd in the last 43 home games for the Trojans.
The victory was the most lopsided in the history of the 78-game series, surpassing USC's 48–0 triumph in 1929. The Trojans have won the last seven games between the teams, but their margin of victory was just six points in 2006 and three points last season.
Washington moved to the Trojans' 6-yard line early in the fourth quarter, but Chris Galippo intercepted a pass by Fouch on second-and-goal and returned it 50 yards to the Huskies' 49.
The Huskies would threaten again later, getting to the USC 25 before Drew McAllister's interception turned them away to preserve the shutout.
"It was exciting to see so many of our young guys get in and to hold onto the shutout there at the end", USC Head coach Pete Carroll said. "It's really a source of pride for everyone."
It was the Huskies' first shutout loss since falling to USC 38–0 in 2004, their worst loss since a 65–7 decision at Miami in 2001, and their worst shutout loss since a 58–0 beating at Oregon in 1973.
Arizona State
Quarterback Rudy Carpenter rallied Arizona State with a pair of second half touchdowns to Michael Jones, and the Sun Devils kept their slim bowl hopes alive by pulling away for a 39–19 win over winless Washington on Saturday night in Seattle.
Washington opened the playbook in this game. The Huskies used reverses, direct snaps, and even a double pass that ended with quarterback Ronnie Fouch catching a second-quarter touchdown.
With the game tied at 16 in the third quarter, Washington's Chris Stevens blocked a punt and the Huskies took over at the Arizona State 14. But the Sun Devils defense held the Huskies to a second consecutive field goal inside the 10-yard line, and while it gave Washington a 19–16 lead, it would be the last points the Huskies scored.
Carpenter quickly led the Sun Devils down the field, capped by his 6-yard toss to Jones in the back of the end zone to give Arizona State a 23–19 lead. On their next possession, Carpenter hit Jones on a 2-yard fade to push the advantage to 30–19.
Carpenter hit seven straight passes during the two decisive scoring drives. He finished 22 of 31 for 218 yards.
Washington was 4–15 on 3rd down conversions, and ran for a meager 52 yards, 39 of which came on a late 4th quarter carry, after the game had already been decided.
Fouch finished 13 of 40 for 192 yards, with two interceptions.
The Huskies were held scoreless in the 4th quarter for the second consecutive game. The second half continues to be dreadful for the Dawgs: In the past 5 games, UW has managed to score a mere 27 second half points.
UCLA
Huskies head coach Tyrone Willingham already had been fired from his position. On October 27, 2008, the University of Washington announced that he will not be retained as head coach after the completion of Washington's 2008 football season. Willingham becomes the third Washington coach to be fired (out of the last four) since Hall of Fame coach Don James resigned in 1993 because of pending NCAA and Pac-10 sanctions against his team where his players were determined to have "accepted substantial and illegal benefits under James, likely with his knowledge".
UCLA coach Neuheisel had been fired in the summer of 2003 from the University of Washington in relation to his participation in a neighborhood pool for the 2003 NCAA Division I Men's Basketball Tournament and lies he told about his actions. The University of Washington had its probation extended for failing to monitor its football program. This was Neuheisel's first return to Husky Stadium following the firing. There was some booing, but not a significant amount. The Huskies had been on a winless streak all season, and were at 0–9.
The day was sunny and dry, so weather was not a factor as can often be the case in Seattle in November. Under the direction of quarterback Kevin Craft, the Bruins drove 80 yards in 12 plays. Running back Derrick Coleman rushed for a touchdown in the first half. In the second half, the Bruins launched a ninety-two-yard drive. Backed up against the goal line, running back Kahlil Bell ran four straight times, and Craft followed with several key pass completions. UCLA finally scored on a run by Bell, taking the 24–7 lead.
Washington State
On November 21, 2008, the 1–10 Washington State Cougars met the 0–10 Huskies in Pullman for the 101st Apple Cup. The media joked that the game was the "Crapple Cup" and "full of worms". The Huskies led for most of the game, until the Cougars forced their way into overtime with a fourth-quarter field goal by kicker Nico Grasu. Grasu hit two more field goals in the two overtime periods to lead the Cougars to their second straight Apple Cup victory, and fourth win in the teams' last five meetings. The win was the Cougars' lone victory over a Football Bowl Subdivision team in 2008 and assured the Huskies' place at the bottom of the Pac-10 standings.
California
The Bears' victory made their record at home perfect at 7–0 and made the Huskies the first 0–12 team in PAC-10 conference history and the only team in the country to finish the 2008 season without a victory. During the game Cal running back Jahvid Best set a school record for most rushing yards in a game at 311. The Huskies finished the season on a 14-game losing streak, as the team's last win had been against Cal at home in 2007.
NFL Draft
No Huskies were selected in the 2009 NFL Draft, which lasted seven rounds (256 selections).
References
Washington
Washington Huskies football seasons
College football winless seasons
Washington Huskies football |
8736 | https://en.wikipedia.org/wiki/Djbdns | Djbdns | The djbdns software package is a DNS implementation. It was created by Daniel J. Bernstein in response to his frustrations with repeated security holes in the widely used BIND DNS software. As a challenge, Bernstein offered a $1000 prize for the first person to find a security hole in djbdns, which was awarded in March 2009 to Matthew Dempsky.
, djbdns's tinydns component was the second most popular DNS server in terms of the number of domains for which it was the authoritative server, and third most popular in terms of the number of DNS hosts running it.
djbdns has never been vulnerable to the widespread cache poisoning vulnerability reported in July 2008, but it has been discovered that it is vulnerable to a related attack.
The source code has not been centrally managed since its release in 2001, and was released into the public domain in 2007. As of March 2009, there are a number of forks, one of which is dbndns (part of the Debian Project), and more than a dozen patches to modify the released version.
While djbdns does not directly support DNSSEC, there are third party patches to add DNSSEC support to djbdns' authoritative-only tinydns component.
Components
The djbdns software consists of servers, clients, and miscellaneous configuration tools.
Servers
dnscache — the DNS resolver and cache.
tinydns — a database-driven DNS server.
walldns — a "reverse DNS wall", providing IP address-to-domain name lookup only.
rbldns — a server designed for DNS blacklisting service.
pickdns — a database-driven server that chooses from matching records depending on the requestor's location. (This feature is now a standard part of tinydns.)
axfrdns — a zone transfer server.
Client tools
axfr-get — a zone-transfer client.
dnsip — simple address from name lookup.
dnsipq — address from name lookup with rewriting rules.
dnsname — simple name from address lookup.
dnstxt — simple text record from name lookup.
dnsmx — mail exchanger lookup.
dnsfilter — looks up names for addresses read from stdin, in parallel.
dnsqr — recursive general record lookup.
dnsq — non-recursive general record lookup, useful for debugging.
dnstrace (and dnstracesort) — comprehensive testing of the chains of authority over DNS servers and their names.
Design
In djbdns, different features and services are split off into separate programs. For example, zone transfers, zone file parsing, caching, and recursive resolving are implemented as separate programs. The result of these design decisions is a reduction in code size and complexity of the daemon program that provides the core function of answering lookup requests. Bernstein asserts that this is true to the spirit of the Unix operating system, and makes security verification much simpler.
Copyright status
On December 28, 2007, Bernstein released djbdns into the public domain. Previously the package was distributed free of charge as license-free software. However this did not permit the distribution of modified versions of djbdns, which was one of the core principles of open-source software. Consequently, it was not included in those Linux distributions which required all components to be open-source.
See also
Comparison of DNS server software
dbndns
DNS management software
References
External links
djbdns official homepage
N-DJBDNS
A guide to djbdns
The djbdns section of FAQTS
A djbdns guide and tutorial with addon
— Jonathan de Boyne Pollard's debunking of several myths relating to djbdns
— Jonathan de Boyne Pollard's list of the several known problems in djbdns
Supporting newer record formats through generic records.
LWN (Linux weekly news) looks at djbdns
DNS software
Public-domain software with source code
DNS server software for Linux |
7600533 | https://en.wikipedia.org/wiki/DGSCA | DGSCA | DGSCA ( UNAM Dirección General de Servicios de Cómputo Académico), a.k.a. Computo Academico UNAM, (informally pronounced De-Heh-Ska) previously known as PUC (Programa Universitario de Cómputo). It is the leading organization within the UNAM for computer technologies systems and held the distinction for being the first institution in México (and perhaps Latin America) to install and operate a Cray Y-MP super computer, in early 1990.
As a dependency of the UNAM it handles most affairs related to Supercomputing, Internet 2, Scientific Visualization and Virtual reality as well as the infrastructure of the UNAM's own M.A.N.. It currently houses Latin America's most powerful supercomputer, Kan Balam , and the first Virtual Reality complex in Mexico (Ixtli Observatory).
It also serves as the backbone for Mexico's CUDI network.
History
Since the University's purchase of an IBM 650 back in 1958 (arguably one of the first computers in Mexico) there had been a rising demand for people with very particular computer knowledge...that is how to program computer mainframes. For a time, the UNAM's Applied Mathematics and Systems Research Institute (IIMAS) was directly responsible for handling the university's computers but it soon came to the attention of the researchers that a separate entity for the sole purpose of administrating the computational resources (the hardware) was necessary. They got together with the Rector and developed a program for that purpose.
Enter PUC
On October 14, 1981, the Rector of the UNAM, Dr. Octavio Rivero Serrano inaugurated the Programa Universitario de Computo (~University Program for Computing) or P.U.C. At its core was a "DGSCA" but only as an administrative overseer to the four newly created subdirectives: Docencia, Academic Administration, Research and Central Administration.
Administrative overhaul
On the 14 May 1985, DGSCA was formally created out of PUC. Certain demands of the time had overwhelmed the responsibilities PUC and a formalization of its incorporation to the Academic General Secretary was necessary. As a result, only 3 of the former subdirectives were preserved (that is Central Administration was closed).
The last remnants of Central Administration (which had become part of DGSCA) are absorbed into the General Secretary in 1987. DGSCA becomes a subsystem of the Academic General Secretary.
From the people that worked in DGSCA, it is the institute that came to replace Computo Academico UNAM (the former institute in charge of maintaining the UNAM's Supercomputers). DGSCA grew out of a handful of people in IIMAS who were very enthusiastic about PUC and wanted to spearhead advanced computer applications, not only among the student population, but in the curricula as well. Some view its inception as an after-effect of the founding of Computer Engineering in the Faculty of Engineering, in which there was a growing need for experts in the field of supercomputing, but it was just one of many concurrent solutions to the same problem.
Provisionally composed of a few professors and student interns (or becarios), DGSCA soon came to adopt a more professional and independent infrastructure to address commercial clients requiring access to the supercomputer (the forementioned reforms in 1985 and 1987). Under this new presentation, DGSCA administered to the scientific and academic community with the full backing and recognition of the computer industry.
In 1991, along with the purchase of the Cray Y-MP, DGSCA moved its central office from the IIMAS complex to the building formerly housing the Cray X-MP Supercomputer. As the need arose to visualize the data processed by the Y-MP a new visualization department was created from the supercomputing department.
1998 saw the introduction of a new super computer to help complement the operations of the Y-MP (eventually replacing it) in the form of a 6 node SGI Cray Origin 2000. The Cray Y-MP itself was shut down and moved the UNAM's Science Museum (Universum) in 2000.
By 2008, DGSCA has established many branches throughout Mexico City and a few dependencies throughout the Republic, having several main divisions including D.C.I. (Computing for Research Division), D.C.D. (Computing for Academic aide Division), D.T. (Telecommunications Division) and the Systems Division.
Computing for Research Division
The two main strengths of DGSCA have always resided in the administration of the UNAM's supercomputing facilities and its internal network. Of these DCI (Division de Computo para la Investigacion) administrates the Supercomputing area of DGSCA. It further divides itself into the Department of SuperComputing, Visualization, Virtual Reality, the Ixtli V.R. observatory and Computer Security all having been subsequent outbranchings of SuperComputing.
As mentioned before, Visualization was created from SuperComputing in the 90's as the necessity to visualize large volumes of data became necessary; Virtual Reality was created from Visualization to tackle specific problems in making that data interactive and presentable in the Ixtli V.R. observatory.
The Ixtli observatory was formerly administered directly by the V.R. department, but in 2007 certain responsibilities had to be delegated to a separate focus group in order to enhance services. That group, the Ixtli department, now handles the maintenance of the facility as well as its presentation and client reception.
The Computer Security department was established around 1999 by Juan Carlos Guel. It was preceded 4 years prior (95-96) by the Computer Security Area founded by Diego Zamboni. The objective of the department being to collaborate with other computer security centers on developing secure software tools, making it one of the most renowned entities in Computer security both on a national level and in Latin America.
See also
UNAM—Universidad Nacional Autonoma de Mexico
Kan Balam—Current Supercomputer in operation within DGSCA
References
External links
DGSCA's Homepage
History and Rationale of DGSCA
Computing for Research Division
Supercomputing department
Scientific Visualization department
Virtual Reality department
Ixtli department
Computer Security
National Autonomous University of Mexico |
25918093 | https://en.wikipedia.org/wiki/Boris%20FX | Boris FX | Boris FX is a visual effects and video editing software plug-in developer based in Boston, Massachusetts, USA. The developer is best known for its four flagship products, Continuum (formerly Boris Continuum Complete/BCC), Sapphire, Mocha, and Silhouette.
Boris FX creates plug-in tools for feature film, broadcast television, and multimedia post-production workflows. The plug-ins support a variety of NLEs, including Adobe After Effects and Premiere Pro, Avid Media Composer, Apple Final Cut Pro X, and OFX hosts such as Autodesk Flame, Foundry NUKE, Blackmagic Design DaVinci Resolve and Fusion, and VEGAS Pro.
History
Boris FX was founded in 1995 by Boris Yamnitsky. The former Media 100 engineer (a member of the original Media 100 launch team in 1993) released “Boris FX,” the first plug-in based digital video effects (DVE) for Adobe Premiere and Media 100, in 1995. The plug-in won Best of Show at Apple Macworld in Boston, MA the same year.
Continuum
The initial “Boris FX” DVE plug-in created in 1995 has continued to be developed over the years. The product was renamed Boris Continuum Complete (BCC) in 2001 and was most recently rebranded as Continuum. Various Boris Continuum versions were bundled with Avid Media Composer since 2004.
In October 2015, Boris FX released Continuum (v10), the first product release since the Imagineer Systems acquisition. Continuum (v10) introduced integrated Mocha planar tracking and masking tools into the collection. In October 2017, the company released Continuum (v11), which includes Academy Award-nominated Primatte tech, and a new 360/VR Unit for editing tasks.
Particle Illusion
As part of the merger with GenArts in 2016, Boris FX acquired the rights to the Particle Illusion (formerly particleIllusion) product, a storied particle system from the original developer Alan Lorence, the founder of Wondertouch. In 2018, Boris FX released a redesigned version of the product to a larger NLE/compositing market as part of Continuum (2019). The new Particle Illusion plug-in supports Adobe, Avid, and many OFX hosts.
Final Effects Complete
In June 2005, Boris FX expanded its product line by acquiring Final Effects Complete from the Israeli software company Optibase. Final Effects Complete, featuring over 100 VFX plug-ins is available as a separate package for Adobe After Effects, Premiere Pro, and Avid Media Composer.
Media 100
In October 2005, Yamnitsky acquired Media 100 the company that launched his plug-in career. Boris FX had a long relationship with Media 100 which bundled Boris RED software as its main titling and compositing solution. Media 100’s video editing software is now available free to Mac OS users.
Mocha
In December 2014, Boris FX merged with Imagineer Systems, the UK-based developer of the Academy Award-winning planar motion tracking software, Mocha Pro. Mocha Pro’s features include planar tracking (motion tracking), rotoscoping, image stabilization, 3D camera tracking, and object removal. In June 2016, Mocha released (v5) which introduced Mocha Pro’s tools as plug-ins for Adobe After Effects and Premiere Pro, Avid Media Composer, and OFX hosts Foundry’s NUKE, Blackmagic Design Fusion, VEGAS Pro, and HitFilm for the first time.
Mocha’s product line also includes a lite-version of Mocha bundled with Adobe After Effects Creative Cloud known as Mocha AE. Mocha AE has been included with every version of After Effects since CS4. The lite-version of Mocha is also bundled with HitFilm Pro from FXhome. Mocha’s tracking SDK (software developers kit) is also licensed to other VFX products including SAM Quantel Pablo Rio, Silhouette FX, CoreMelt, and Motion VFX. In February 2017, Boris FX launched Mocha VR, based on Mocha’s planar tracking and masking tools. Mocha VR is the first 360-optimized plug-in for Adobe After Effects, Premiere Pro, Avid Media Composer. and OFX Hosts: Nuke, Fusion & Vegas Pro.
Mocha Pro has been used on major films and television shows including Birdman, Black Swan, the Harry Potter series, The Hobbit, and Star Wars.
Sapphire
In September 2016, Boris FX merged with former competitor, GenArts, developer of Sapphire high-end visual effects plug-ins. In March 2017, Sapphire released eight individual Sapphire Units based on separate effect categories. In October 2017, Boris FX released its first new version of Sapphire since the GenArts acquisition. Sapphire (v11) now includes integrated Mocha tracking and masking tools. Sapphire is available for Adobe, Avid, the Autodesk Flame family, and OFX hosts including Blackmagic DaVinci Resolve and Fusion, and Foundry’s NUKE. As part of the merger, Boris FX acquired the rights to Particle Illusion. In 2018, Boris FX reintroduced the product to the larger NLE/Compositing market.
Sapphire’s plug-ins have been used on major films including Avatar, the Harry Potter and the Prisoner of Azkaban, Iron Man, The Lord of the Rings, The Matrix trilogy, Titanic, and X-Men.
Silhouette
In September 2019, Boris FX merged with SilhouetteFX, Academy Award-winning developer of Silhouette, a high-end digital paint, advanced rotoscoping, motion tracking, and node-based compositing application for visual effects in film post-production. In November 2019, Boris FX released Silhouette 2020 which includes free built-in Mocha planar tracking, new rotoscoping tools such as magnetic splines and a visual overlay preview, three new paint brushes, and a paint detail separation workflow. In April 2020, Boris FX released the new Silhouette Paint plug-in product for Adobe, Autodesk, Nuke, and other OFX hosts.
Silhouette has been used on major films including Avatar, Avengers: Infinity War, Blade Runner 2049, Ex Machina, and Interstellar.
Digital Film Tools
In September 2019, Boris FX merged with Digital Film Tools, developer of Digital Film Tools plug-ins for photographers and visual effects artists. Its toolkit includes specialized camera lenses, film stock and grains, lens flares, and lighting gels. Digital Film Tools is available as a standalone application and a plug-in for Adobe Photoshop, Adobe After Effects, Adobe Premiere Pro, Apple Final Cut Pro, Avid, and OFX hosts Blackmagic DaVinci Resolve, Foundry Nuke, and VEGAS Pro.
Awards
1995
Boris FX, Mac World, Digital Video Magazine, Best of Show Award
2013
Imagineer Systems, Academy Awards, Scientific and Engineering Award
Soundbite, Studio Daily Prime Award
2016
Continuum, Post Magazine, NAB 2016 Post Pick
2017
Boris FX, Boris Yamnitsky, Digital Video Industry Innovator Award
Mocha VR, Post Magazine, NAB 2017 Post Pick
Mocha VR, Digital Video, 2017 NAB Best of Show Award Winner
2018
Mocha VR, Advanced Imaging Society, 2018 Lumiere Technology Award
2019
Silhouette, Academy Awards, Scientific and Engineering Award
Sapphire, Engineering Emmy Award
Mocha Pro, Engineering Emmy Award
Silhouette, Engineering Emmy Award
References
Video editing software
Software companies based in Massachusetts
Software companies of the United States |
6422368 | https://en.wikipedia.org/wiki/Brendan%20Loy | Brendan Loy | Brendan Loy is an American blogger.
Loy's first blog, titled The Irish Trojan's Blog, gained moderate attention on the Internet and in some media outlets for his posting on Hurricane Katrina. He currently runs two blogs. His primary blog, "The Living Room Times," covers politics, sports, news, weather, and other topics. His secondary blog, "The Pioneer Pulse," is devoted to covering the Denver Pioneers men's basketball team.
Loy worked for the Daily Trojan during his undergraduate studies at the University of Southern California, but Loy states that he was "forced to resign" from an editorial position. Loy has not stated the reasons for his resignation.
Loy is a native of Newington, Connecticut. He graduated from the University of Southern California in 2003 and Notre Dame Law School in 2007. He and his wife Becky have three daughters. He is currently a practicing attorney in Colorado.
Hurricane Katrina coverage
Loy's site became the "most frequently cited hurricane-related blog" for Katrina-related coverage, according to Intelliseek's Blogpulse.
Due to his hurricane coverage, Loy was the subject of articles in The New York Times, The Washington Post, and was covered by Slate's Mickey Kaus. Loy also appeared briefly in Spike Lee's 2006 HBO documentary film "When the Levees Broke: A Requiem in Four Acts."
Other media attention
Loy also authored a piece for Sports Illustrated on Campus titled "The Perfect Bracket: How to come out on top in your NCAA tournament pool."
Notes
External links
The Living Room Times, formerly titled The Irish Trojan's Blog
The Pioneer Pulse
"ND 'weather nerd' on mark; He used computer models to track storm, warn of impending doom on blog", South Bend Tribune, September 7, 2005
American bloggers
Living people
Notre Dame Law School alumni
University of Southern California alumni
Year of birth missing (living people)
People from Newington, Connecticut |
12880 | https://en.wikipedia.org/wiki/GnuCash | GnuCash | GnuCash is an accounting program that implements a double-entry bookkeeping system. It was initially aimed at developing capabilities similar to Intuit, Inc.'s Quicken application, but also has features for small business accounting. Recent development has been focused on adapting to modern desktop support-library requirements.
GnuCash is part of the GNU Project, and runs on Linux, GNU, OpenBSD, FreeBSD, Solaris, macOS, and other Unix-like platforms. A Microsoft Windows (2000 or newer) port was made available starting with the 2.2.0 series.
History
Programming on GnuCash began in 1997, and its first stable release was in 1998. Small Business Accounting was added in 2001. A Mac installer became available in 2004. A Windows port was released in 2007.
In May 2012, the development of GnuCash for Android was announced. This was an expense-tracking companion app for GnuCash, as opposed to a stand-alone accounting package, and is now abandoned.
Backwards compatibility issues
Gnucash maintains the ability to read older data files between major releases, as long as major releases are not skipped. If a user wishes to access historical data saved in old GnuCash files, they must install intermediate versions of GnuCash. For example, upgrading from 2.2 to 4.1 may not be possible; the user should upgrade from 2.2.9 to 2.4.15, then to 2.6.21, then 3.11, then 4.1. The other alternative is for users to export transactions files to a CSV format prior to upgrading GnuCash. Exporting of the account tree must be done as a separate step.
Features
Double-entry bookkeeping
Scheduled Transactions
Mortgage and Loan Repayment Assistant
Small Business Accounting Features
OFX, QIF Import, CSV Import
HBCI Support
Transaction-Import Matching Support
SQL Support
VAT/GST tracking and reporting
Multi-Currency Transaction Handling
Stock/Mutual Fund Portfolios
Online Stock and Mutual Fund Quotes
Built-in and custom reports and charts
Budget
Bank and Credit Card reconciliation
Check printing
Small business accounting features
Invoicing and Credit Notes (Credit note functionality was added with version 2.6)
Accounts Receivable (A/R)
Accounts Payable (A/P) including bills due reminders
Employee expense voucher
Limited Payroll Management through use of A/Receivable and A/Payable accounts.
Depreciation
Mapping to income tax schedules and TXF export for import into tax prep software (US)
Setting up tax tables and applying sales tax on invoices
Technical design
GnuCash is written primarily in C, with a small fraction in Scheme. One of the available features is pure fixed-point arithmetic to avoid rounding errors which would arise with floating-point arithmetic. This feature was introduced with version 1.6.
Users
Users on the GnuCash mailing list have reported using it for United States 501(c)3 non-profit organizations successfully. However, the reports need to be exported and edited.
Slaw, a Canadian legal webzine, offered this advice to lawyers just starting out in practice, especially those who are trying to pay off student loans, "The GnuCash software...should present a great alternative for lawyers looking for a solid accounting system at low cost. Do not believe that open source software is somehow second-class."
In April 2011, the Minnesota State Bar Association made their GnuCash trust accounting guide freely available in PDF format.
Download statistics
As of July 2018, SourceForge shows a count of over 6.3 million downloads of the stable releases starting from November 1999 Also, SourceForge shows that current downloads are running at ~7,000 per week. This does not include other software download sites as well as Linux distributions that provide download from their own repositories.
Project status
Open Hub's analysis based on commits up to May 2018 (noninclusive) concluded that the project has a mature, well established code base with increasing year-over-year development activity. Moreover, "Over the past twelve months, 51 developers contributed new code to GnuCash. This is one of the largest open-source teams in the world, and is in the top 2% of all project teams on Open Hub."
Notes
References
Further reading
External links
Accounting software for Linux
Cross-platform software
Free accounting software
Free software programmed in C
GNU Project software
Office software that uses GTK |
8442285 | https://en.wikipedia.org/wiki/RS%20Media | RS Media | The RS Media is another product in WowWee's line of biomorphic robots, based on a walking system designed by Mark Tilden. The RS Media uses basically the same body as the Robosapien V2, but a different brain based on a Linux kernel. As the name implies, the RS Media's focus is on multimedia capabilities, including the ability to record and playback audio, pictures and video. he retains and builds upon the Robosapien V2's sensor array and programmability.
Hardware
Two primary processors:
200MHz ARM9 with 64MB of flash RAM for the primary LINUX operating system and user files
Custom 16 bit processor for handling the biomorphic robot functions
16MB (2006 Model) or 32MB (2007 Model) of RAM
1 USB port
Stereo audio plug
SD card slot (accepts up to 1GB cards)
VGA color camera in the forehead for image recognition, and video recording
20kHz microphone in the chest for audio recording
1.9" 176x132 pixel color TFT supertwist LCD screen in his chest
11W 3-speaker system (2 x metal speakers + 1 back-mounted woofer)
Power-adapter port in foot
14 motors based on the configuration found in the Robosapien V2, providing 11 degrees of freedom
2 motors in each leg
2 motors for his head
3 motors in each hand
2 hip motors
Sensors
3 infrared (IR) detectors that use IR ranging for object detection
VGA quality camera in its forehead for video and human-tracking abilities
3 sound sensors for sound localization and audio recording
2 touch sensors on the back of each hand
1 toe and 1 heel touch sensor in each foot
Software
Unlike previous products in WowWee's Robo line of products, the RS Media is the first to feature bundled PC software. There are 4 applications: the BodyCon Editor, the Personality Editor, the Macro Editor, and the Media Organizer.
BodyCon Editor:
The BodyCon Editor allows the user to customize and preview the RS Media movements. The user can create a sequence of movements as well as voice and sound effects and save everything in a file for playback in the future. This file can also be included in a personality or to a user-created Macro.
Personality Editor:
The RS Media expands on the single personality that original Robosapien models came with, and comes with 4 different personalities (see below for more information). It also allows you to create your own personality from scratch.
Macro Editor:
The Macro Editor is actually a subcomponent of the Personality Editor, but it warrants its own description. The user can create their own macros which are sequences of commands that the RS Media can execute. Macros can also include conditional routines that are based on environmental or user feedback.
Media Organizer:
The Media Organizer gives the user a GUI interface to manage the audio, images, video, games, and personalities on the RS Media. Files can be uploaded, downloaded, deleted and moved around. The robot would need to be connected to the computer running the Media Organizer software using a USB cable.
3rd Party Software, Themes, and Utilities
There is some 3rd Party Software that people have developed to make using the RS Media easier.
RSM Remote:
It allows you to control most of RS Media's functions and even take a video, photo or audio recording, as well as tell him to track a certain color, all from a PC.
iMedia Screen Theme:
iMedia is an iPhone inspired theme for RS Media.
It replaces pictures for Control Mode, Arm Mode, Guard Mode and all Media Mode related pictures.
RS Media Time Sync:
A handy little app which will automatically synchronize your RSMedia's time with your PC's, without the hassle of setting it via the USB or Serial Console.
RS Media Tango! Screen Theme:
Unleash the Linux in your RSMedia with this Tango!/GNOME screen theme. Includes graphics for Control Mode, Arm Mode Guard Mode, All Program Modes, as well as Media Mode animations which fade in and out as you scroll through them.
More info and Download links for these things can be found at the Computers 'n' More Blog.
More Utilities, Themes and Software can also be found at Computers 'n' More
Personalities
A personality is a collection of the RS Media's audio responses. The RS Media ships with 4 personalities that the user can switch among using the remote control:
RS Media (default)
Service Bot 3000 - an English butler.
Space Bot - a fictional space captain
Billy-Joe Sapien - a cowboy
Users may also modify the existing personalities or create their own from scratch.
Multimedia features
The RS Media is capable of recording and playing MP3's, MPEG4's, JPEG's, as well as Java applications. It comes with 3 Java games that are controlled with the remote control and displayed to its LCD screen. It can also be used as an audio player via the stereo line-in port. The built-in memory can be supplemented by inserting an SD memory card (up to 1GB in size) into the SD slot.
Programming
Like other WowWee robots, the RS Media can be programmed to execute sequences of moves and audio clips either as a standalone program or as a reaction to a sound, touch or visual stimulus. The RS Media has the same programming mode as the V2, Puppet Mode, where the user can manually bend and move the robot's body parts to create a program. The most sophisticated way to program the RS Media is by use of the computer applications.
Hacking
As with other Robosapien models, the RS Media was designed with the possibility for modifications. In reference to the philosophy behind the 'hackability' of the robots, Tilden once said, "Years ago some bright AI lads asked if I could build a competent humanoid cradle into which they could put their smart programs. Took me a while, but here it is lads, inexpensive and ready to go right out of the box. Make it think, and let me know how it goes."
In spring of 2009, Helibot from the RoboCommunity has created a new driver to allow access to the Robot's Linux operating system via the USB port and a terminal program. This is now a part of the RSMedia Development Kit which is now available on SourceForge.
Applications for RS Media can be found at the RobotAppStore
Availability
The RS Media was released in October 2006 in Australia and the UK.
References
External links
RS Media at WowWee
Entertainment robots
Bipedal humanoid robots
WowWee
2006 robots |
69306757 | https://en.wikipedia.org/wiki/Bundeswehr%20Museum%20of%20German%20Defense%20Technology | Bundeswehr Museum of German Defense Technology | The Bundeswehr Museum of German Defense Technology also known as Wehrtechnisches Museum Koblenz and Wehrtechnische Studiensammlung Koblenz (WTS Koblenz) is the official Bundeswehr's Defense Technology Study Collection in Koblenz. It is one of Germany's important technical military exhibitions, with about 30,000 objects on an exhibition area of around . It is known as one of the most extensive collections of its kind internationally. The main focus of the museum is on defense technology and the military science library. It is a subsidiary of the Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support (BAAINBw - formerly the Federal Office of Defense Technology and Procurement).
History
The initial history of the WTS kicks off with the Krupp firing range in Meppen, which was established by Friedrich Krupp AG from 1877. The eventful history of the site and the holdings there during the First World War, the period of the Treaty of Versailles, the Second World War until the takeover of the properties by the Bundeswehr is documented only scarsly. Although there was considerable testing of weapons and equipment prior to 1945, only a few exhibits from this period, such as an early Bouclier roulant personnel carrier, have been transferred to the WTS. Pieces such as the Salvator Dormus self-loading pistol were also transferred from earlier holdings of the Army Weapons Office and the Wehrmacht from their collections on the history of defense and weapons technology. As a purposeful study collection, a predecessor institution of the WTS was established in 1961–62 as the "Collection of Weapons and Design Studies", initially at what was then Test Site 91 in Meppen/Emsland, on the former site of the Krupp firing range. On November 12, 1982, the facility was opened as the Wehrtechnische Studiensammlung in the former Langemarck barracks in Koblenz by the former President of the German Bundestag, Richard Stücklen. It was now directly subordinate to the Federal Office of Defense Technology and Procurement. The WTS was expanded in particular by the military historian Arnold Wirtgen, who was in charge of the WTS until 1988. From 1995 to 2021, the management was in the hands of his son Rolf Wirtgen. Since 2001, the WTS has participated in the Koblenz Long Night of Museums with a large number of visitors. On October 1, 2012, the subordination of the WTS changed to the newly established Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support (BAAINBw). Since the beginning of the COVID-19 pandemic, the WTS has been closed to visitors.
Tasks
Tasks within the framework of the Bundeswehr
The purpose of the collection is first of all to fulfill the core tasks of the service:
Tasks as a company archive of the BAAINBw
Participation in the training of employees in the armaments sector, in particular of junior engineers in the field of defense technology
Supporting the Bundeswehr in preparatory training for foreign missions and international arms control missions
Provision of technical expertise for other departments of the Federal Government
Cooperation in the Working Group of Military History Museums and Collections of the German Armed Forces
These tasks determine the personnel and financial resources of the Wehrtechnische Studiensammlung from the federal budget.
Tasks in the service of the public
The WTS is open to the public. Since 1982, about 1,000,000 people have visited the collection. It is generally perceived as a museum, published accordingly in local museum directories, and signposted as such. However, the WTS is not a museum by the definition of the Bundeswehr. As an official museum, the BMVg division operates the Military History Museum of the Bundeswehr in Dresden, which maintains various branch offices. For the WTS in Koblenz, this has consequences for the presentation and the mediation formats. A comprehensive museum concept, detailed military-historical descriptions, examples of use or armament-historical classifications are mostly missing. The WTS offers a thematically arranged special collection with a wealth of illustrative material on the development of armament, equipment, gear and uniforms from the early 19th century onwards, with a focus on the Bundeswehr. In connection with the service-related purpose of the collection for documentation and training, the exhibits are not demilitarized and are mostly fully functional. Today, the WTS is one of the largest collections of its kind in Europe, with about 30,000 collection items on about 7000 m2 of exhibition space. In addition, it operates a specialized defense technology and military science library with approx. 18,000 volumes and more than 30,000 technical service regulations. These can be consulted by appointment, provided they are not classified.
Exhibition
The collection and exhibition focuses on:
Small arms and machine guns
Artillery technology
Missile technology
Anti-tank hand weapons
Wheeled and tracked vehicles
Pioneer technology
Aircraft and naval technology
telecommunication, electronic and optical equipment
personal clothing and equipment
The exhibits mainly belong to the Bundeswehr. Experimental and prototype items originate from project developments and research projects, which were mainly carried out within the framework of the tasks of the various defense technology departments. The change of exhibits serves especially to update the exhibition. When new exhibits are put on display, others go to external storage facilities, are lent out or handed over, this almost exclusively in the area of the Bundeswehr. A representative selection of 30,000 exhibits presents a cross-section of the collection. Examples of exhibits The following selection shows exhibits and the range of the exhibition, which is fanned out from historical small parts to large military equipment and watercraft.
Publications and special exhibitions
Starting in 1987, the WTS published the book series "Wehrtechnik und wissenschaftliche Waffenkunde" (Defense Technology and Scientific Weaponry) on defense technology and technical-historical research topics of the WTS, initially by the publishing house E.S. Mittler in Herford, and most recently in 2012 by Bernard & Graefe in Bonn. In addition to the historians Arnold and Rolf Wirtgen, the mechanical engineer Wolfram Funk and historians Matthias Uhl and Hans-Dierk Fricke, among others, published in this series. Some of the publications can still be purchased at antiquarian booksellers.
Over the years, the Wehrtechnische Studiensammlung Koblenz has organized a number of special exhibitions to present specific areas of the collection.
Public perception
In its reports from 2009 and 2015, the Federal Court of Audit accused the WTS of making the collection expendable. In particular, it was accused of operating the collection without a viable concept and in an uneconomic fashion . The criticism of the Federal Court of Audit led to an intensive consideration of the future of the WTS by decision-makers: on July 12, 2016, State Secretary Dr. Karin Suder decided in a table discussion with department heads in the BMVg in favor of a fundamental preservation of the collection and against a dissolution and liquidation. On July 26. 2018, Vice Admiral Stawitzki, Head of the Equipment Department at the BMVg, visited the WTS and informeded himself about general conditions and future perspectives.[13] On 28.03.2019, MdB Josef Oster, Member of the Bundestag in the constituency 199 Koblenz, visited the WTS to get an impression of the special conditions of the facility.[14] In 2019, the WTS recorded 25,000 visitors, of which almost 9,000 were from the Bundeswehr.
In its 1/2021 issue, the newspaper Loyal reported on the current status of the WTS and the position of the Federal Ministry of Defense in evaluating the collection as important in terms of its mission and wanting to maintain it in the future. The article also quotes military historian Sönke Neitzel: "We need this technical memory. Technical history is not taught in the museums of the Bundeswehr or at the universities of the Bundeswehr. Higher engineering expertise on historical-technical issues is only available at the WTS. As a historian, I need this technical perspective." In particular, the technical-historical reference of the collection is evaluated as important in order to be able to better classify historical contexts.
Unlike the Military History Museum of the German Armed Forces, which presents the development of military in a historical-social context, the WTS focuses on technologies in defense engineering.
Along with the German Tank Museum in Munster, the Army History Museum in Vienna, the Swiss Military Museum in Full, the Bovington Tank Museum, and the Tank Museum in Saumur, the WTS is one of the most important defense technology collections internationally, but unlike them, it covers the entire technological and historical breadth of defense technology.
In the 2020 museum ranking of the website Testberichte.de, which ranked over 500 museums according to their popularity, the WTS achieved 34th place nationwide and second place in Rhineland-Palatinate.
Future
In the discussion for a future design of the WTS, the necessary infrastructure, a sufficient personnel framework and the economic efficiency in operation play a role above all. For a long time, the relocation of the WTS with all its functions to the former Fritsch barracks in front of Ehrenbreitstein fortress was discussed in Koblenz. This was prepared in 2005. It was intended to be implemented by the time of the Bundesgartenschau (Federal Garden Show) in 2011. The project was ready for decision around 2008, but was not realized. The Federal Minister of Defense Jung visited the WTS on July 1, 2008, and announced that the collection would remain in Koblenz. In 2016, a transfer to the southern part of the Deines-Bruchmüller-Barracks in Lahnstein was discussed. This approach, which aimed to involve the city of Lahnstein in a private-law operator model, failed. An integration into the Military History Museum of the German Armed Forces in Dresden was not pursued. Instead, this museum institution of the Bundeswehr took over numerous exhibits to Dresden and affiliated sites. A temporarily favoured option was the consolidation of the WTS and its satellite camps on the grounds of the Metternich field office (Wasserplatz) of Wehrtechnische Dienststelle 41 in Koblenz-Metternich. This project option was tied to the termination of the interim use with office containers by the Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support. Alternatively, the redevelopment of the site in the former Langemarck-Barracks was up for debate. A decision and resulting infrastructure measures were not announced until the end of 2021.
Association of Friends and Sponsors of the Wehrtechnische Studiensammlung
The Association Friends and Sponsors of the Wehrtechnische Studiensammlung (Verein der Freunde und Förderer der Wehrtechnischen Studiensammlung e.V.-VFF WTS e.V.) supports the WTS. The personnel and financial resources provided by the service ensure the performance of the collection's service-related tasks within the Bundeswehr. In 1979, the Association of Friends and Sponsors of the Wehrtechnische Studiensammlung e.V. was founded to support public access in particular and to promote the necessary museum tasks of the WTS. Among the founding members are several high-ranking soldiers, members of the Federal Office of Defense Technology and Procurement, and defense technology companies. The chairmanship was initially held by the respective mayor of Koblenz. Currently, the association is chaired by Andreas Biebricher as 1st chairman, and Christian Leitzbach as 2nd chairman. The board's scientific advisor is Rolf Hilmes, an expert renowned for the development of armor technology.
See also
Deutsches Panzermuseum – Munster, Germany
Australian Armour and Artillery Museum – Australia
Musée des Blindés – Paris, France
Nationaal Militair Museum – Soesterberg, The Netherlands
United States Army Ordnance Museum
Polish Army Museum – Warsaw, Poland
Literature
External links
References
Arsenals
Military historiography
Military history of Germany
Military and war museums in Germany
Libraries in Germany
Armories (military)
Tank museums
World War I museums
World War II museums |
3994700 | https://en.wikipedia.org/wiki/AMPRNet | AMPRNet | The AMPRNet (AMateur Packet Radio Network) or Network 44 is used in amateur radio for packet radio and digital communications between computer networks managed by amateur radio operators. Like other amateur radio frequency allocations, an IP range of was provided in 1981 for Amateur Radio Digital Communications (a generic term) and self-administered by radio amateurs. In 2001, undocumented and dual-use of as an internet telescope began, recording the spread of the Code Red II worm in July 2001. In mid-2019, part of IPv4 range was sold off for conventional use, due to IPv4 address exhaustion.
Amateur Radio Digital Communications (mode)
Beginning on 1 May 1978, the Canadian authorities allowed radio amateurs on the 1.25-meter band (220 MHz) to use packet radio, and later in 1978 announced the "Amateur Digital Radio Operator's Certificate".
Discussion on digital communication amateur radio modes, using the internet protocol suite and IPv4 addresses followed subsequently.
By 1988, one thousand assignments of address space had been made.
approximately 1% of inbound traffic volume to the network was legitimate radio amateur traffic that could be routed onwards, with the remaining 2‒100 gigabyte per day of Internet background noise being diverted and logged by the University of California San Diego (UCSD) internet telescope for research purposes.
By 2016, the European-based High-speed Amateur-radio Multimedia NETwork (HAMNET) offered a multi-megabit Internet protocol network with 4,000 nodes, covering central Europe.
History and design
The use of TCP/IP on amateur radio, using packet radio networks, occurred early on in the history of the Internet and preceded the appearance of the public Internet. The class A netblock of 16.7 million IP addresses was set aside for amateur radio users worldwide, having been secured in 1981 by Hank Magnuski; when computer networking was in its infancy and prior to Internet flag day when Network Control Program (NCP) was replaced by Transmission Control Protocol (TCP) on 1 January 1983. The initial name used by Jon Postel in was the "Amateur Radio Experiment Net".
Originally packet radio was used as a low level protocol for many competing higher level protocols, and TCP/IP users were essentially a minority due to the complexity of the configuration. The low baud rates also inflamed packet node site owners, as they saw the IP protocol as having too high of a protocol overhead. Very few systems operated over HF for this reason. The best solution on 1,200/9,600-baud VHF networks emerged as TCP/IP over ROSE (Radio Amateur Telecommunications Society "RATS" Open Systems Environment, based on X.25 CCITT standard). Within just a few years the public Internet made these solutions obsolete. The ROSE system today is maintained by the Open Source FPAC linux project.
The AMPRNet is connected by wireless links and Internet tunnels. Due to the bandwidth limitations of the radio spectrum, VHF and UHF links are commonly 1,200-baud, and usually restricted to a maximum of 9,600 baud. Although with the advent of mass-produced Wi-Fi equipment on and this technology is now being used to provide much faster links on nearby amateur frequencies. 300 baud is normally used on HF. Microwave links generally do not use packet radio, and instead use the commercial Wi-Fi access points (as high-speed multimedia radio (HSMM) or "hinternet"). The AMPRNet fully supports TCP/IP allowing for support of all network protocols.
The AMPRNet is composed of a series of subnets throughout the world. Portions of the network have point to point radio links to adjacent nodes, while others are completely isolated.
Geographically dispersed radio subnets can be connected using an IP tunnel between sites with Internet connectivity. Many of these sites also have a tunnel to a central router, which routes between the and the rest of the Internet using static routing tables updated by volunteers.
experimentation had moved beyond these centrally controlled static solutions, to dynamic configurations provided by Peer to Peer VPN systems such as n2n, and ZeroTier.
Address administration
The allocation plan agreed in late-1986 mandated (~8 million addresses) for use within the United States, under Federal Communications Commission (FCC) regulations; and mandated (~8 million addresses) for the Rest-of-World deployment, outside of FCC regulations.
Remaining Internet protocol (IP) addresses in this block are in the and networks, and theoretically available to any licensed amateur radio operator. The IP address management and assigning of addresses is done by volunteer coordinators with the proviso "we do not provide the same level of response as a commercial organisation." These addresses can possibly be made routable over the Internet if fully coordinated with the volunteer administrators. Radio amateurs wanting to request IP addresses within the AMPRNet should visit the AMPRNet Portal.
mirrorshades router
Since the 1990s most packets within the range were arranged to transit via an IP tunnel using IP in IP encapsulation to/from a router hosted at the University of California, San Diego. This forwarding router was originally named mirrorshades.ucsd.edu and later gw.ampr.org or "".
By 1996 higher-speed 56k modems briefly had greater throughput than was possible to forward via the "mirrorshades" central reflector router and back again.
Only IP addresses with an active Domain Name System (DNS) entry under ampr.org are passed by the packet filter for forwarding.
By 19 August 1999 daily encapsulated IP in IP traffic was ~100 kilobits per second, peaking to 0.14 megabits per second.
During mid-2000, the majority of unique IP addresses seen on the University of California, San Diego connection from CERFnet began with the prefix, except for 17% of IP addresses which did not.
In mid-2009 the mirrorshades server was upgraded and replaced after about ~1,100 days uptime.
A funding proposal in 2010 raised the possibility that "The legitimate traffic is also a potential research resource".
UCSD Network Telescope
Beginning in February 2001, as part of backscatter research and the CAIDA/UCSD network telescope project, the whole of the address block
was being advertised via the border gateway protocol (BGP) as a passive honeypot for Internet background noise and backscatter collection, based in the Center for Applied Internet Data Analysis at the San Diego Supercomputer Center. On 15 July 2001 the network monitoring of traffic recorded the spread of the Code Red II worm. Prior to July 2001, the project had been logging unsolicited TCP SYN packets destined for IP addresses within ; and after 19 July 2001 full incoming IP header logging took place. The IP address block was stated to have "high value to research".
Capture data for August 2001, using data compression and retaining only IP headers was 0.5 gigabyte per hour.
In 2002 the block was 0.4% of all internet IPv4 address space.
By September 2003, traffic was 0.75 terabytes per month and costing $2,500 per month for bandwidth. In October 2004 Limelight Networks began to sponsor the internet transit costs of the CAIDA network telescope.
In April 2009 the upstream rate limiting was removed, increasing the number of packets reaching the network telescope.
At the end of 2012, seaport.caida.org was the network telescope data capture server with thor.caida.org used for near real-time data access.
, the network was receiving backscatter from Denial-of-Service attacks (DoS) each measuring ~226 packets per second (mean peak average). Totalling 37 terabytes per month.
Support was supplied by Cisco Systems under a University Research Board (UBR) grant. The project was funded by an Advanced Networking Infrastructure and Research (ANIR) award, and Computer and Network Systems (CNS) award from the National Science Foundation (NSF); the United States Department of Homeland Security (DHS); and Network Modeling & Simulation (NMS) / Next Generation Internet Program (NGI) of the Defense Advanced Research Projects Agency (DARPA).
Feed
In May 2017, the Center for Applied Internet Data Analysis provided a new server for the AMPRNet gateway, in a different building.
As of mid-2017 a passive monitoring configuration was in use, involving a network switch with port mirroring set to duplicate the incoming packets being seen by the AMPRNet gateway to the UCSD network telescope capture server. The project funding proposal for "Sustainable Tools for Analysis and Research on Darknet Unsolicited Traffic" (STARDUST) specified a planned upgrading to 10 Gigabit Ethernet with a passive optical tap, in order to provide finer timestamping and avoid packet loss.
By July 2018, the replacement 10 Gigabit Ethernet infrastructure, using an optical splitter and Endace capture card, was operational.
Archives
The archived intermittent captures for 2001‒2008 were
The archived pcap captures from 2008‒2012 were of data uncompressed. In January 2012, five weeks of recent data were uncompressed.
Beginning on 22 March 2012, the raw hourly compressed pcap traces from 2003‒2012 were transferred to the National Energy Research Scientific Computing Center (NERSC) for long-term storage and research data archiving. This data migration of 104.66 Tebibyte took one week at a sustained rate of 1.5 gigabits per second via the Energy Sciences Network (ESnet).
For the 2012‒2017 period, 2.85 petabytes of data was collected (1.3 petabyte compressed).
, the overall total collected by the UCSD Network Telescope stood at 3.25 petabytes (uncompressed), stored across 129,552 hourly files.
Users of the collected data up to 2012 are requested to acknowledge that "Support for Backscatter Datasets and the UCSD Network Telescope is provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members."
Block size
The original Class A network allocation for amateur radio was made in the 1970s, and recorded in September 1981, which consisted of ~16 million IP addresses. As of 18 July 2019, the lower 75% of the block (~12 million addresses) remained for amateur radio usage, with the upper 25% (, ~4 million IP address) having been sold.
Owing to IPv4 address exhaustion, by 2016 the block was worth over .
The routing prefix aggregation stopped being advertised on 4 June 2019.
John Curran, CEO of the American Registry for Internet Numbers registry stated that a request for the transfer of IP addresses had been received and reviewed in accordance with ARIN policy.
On 18 July 2019, the designation recorded by Internet Assigned Numbers Authority was altered from " Amateur Radio Digital Communications" to " Administered by ARIN".
On 18 July 2019, there was a sale of address space to Amazon Technologies Inc, which was the highest bidder, for use by Amazon Web Services.
AMPRNet subsequently consisted of , and , with no plans to sell any more address space.
The aspiration expressed by those involved in the sale was that money be held by a non-profit 501(c)(3) organization for the advancement of amateur radio.
The sale raised over $50 million. Prior to sale, addresses in the block had been allocated to amateur radio areas for the outer space-amateur radio satellite service, to roaming, Oceania, Antarctica, the Arctic, Italy for (CisarNet) Germany for Stuttgart/Tübingen, Eppstein, plus the Germany/pan-European (HAMNET).
Responses
Paul Vixie stated after the sale of IP address space that "ampr.org can make better use of money than IP space in fulfilling its nonprofit mission, at this stage of the game."
Doug Barton, a former manager of Internet Assigned Numbers Authority, said the "reaction that we're seeing now is 100% predictable ... that doesn't change anything about my opinion that the sale itself was totally reasonable, done by reasonable people, and in keeping with the concept of being good stewards of the space.
Amateur Radio Digital Communications (committee)
An Amateur Radio Digital Communications committee was formed to offer advice on digital standards to the American Radio Relay League (ARRL) board of directors, following a meeting in 1981. The original working name was the "ARRL Ad Hoc Committee on Digital Communication", abbreviated to "digital committee".
During the mid-1980s, the committee had been meeting twice per year: during the middle of the year, and again at the annual Computer Networking conference.
In September 1987, the committee recommended the list of frequencies that would be used in North America for packet radio and digital communications.
In January 1988, the committee held a meeting to standardise AX.25 version 3.
In March 1988, the "Packet Radio Frequency Recommendations" were published by the committee.
During early 1993 the committee and ARRL board of directors were working on guidelines for semi-automatic digital stations, with the proposals passed to the Federal Communications Commission.
Amateur Radio Digital Communications (non-profit)
On 6 October 2011 a Californian non-profit company was founded with the name of "Amateur Radio Digital Communications", and recorded by the State of California on 11 October 2011 with an address of "5663 Balboa Avenue, Suite 432, San Diego, California—a UPS store address.
On 22 June 2012, 29 September 2015, and 18 September 2017, filings were made listing the company officers as:
Brian Kantor President or Chief Executive Officer
Erin Kenneally Secretary
Kimberly Claffy Treasurer or Chief Financial Officer
In 2011, the American Registry for Internet Numbers approved a request to change the registration of the whole network block from an individual contact, to the "Amateur Radio Digital Communications" non-profit company.
Activities were to "conserve scarce AMPRNet Internet protocol resources, and to educate networks users on how to efficiently utilize these resources as a service to the entire Internet community" initiated "in the second half of 2012 by via communications with American Registry for Internet Numbers (ARIN)".
Plans included "the issuance of grants and other financial support to educational institutions, foundations and other organizations. expected to commence in 2013 via a joint effort of the three founding Directors ".
During December 2017 Kantor announced their retirement from University of California San Diego.
Re-stated (changed) articles of incorporation for the "Amateur Radio Digital Communications" non-profit were signed on 13 December 2017, and filed on 17 December 2017.
In May 2019, Kantor signed an agreement extending UCSD/CAIDA's use of Amprnet addresses for data collection until 31 July 2023.
Brian Kantor died in November 2019. In February/March 2020, the Center for Networked Systems (CNS) of the University of California, San Diego (UCSD) received $225,000, given by ARDC to allow financial endowment of a student scholarship in the name of Alan Turing and honouring Brian Kantor.
Distributions
In May 2021, ARDC provided a one-off grant of to the Massachusetts Institute of Technology amateur radio club (W1MX) to save and rebuild the radome on top of the MIT Green Building .
In November 2021, ARDC awarded a five-year grant, for a total of , to support US-based activities around Amateur Radio on the International Space Station (ARISS-USA).
In January 2022, the Internet Archive received a grant of for assembling a planned Digital Library of Amateur Radio and Communications (DLARC).
See also
AX.25
High-speed multimedia radio
Winlink
References
Financial
Further reading
1980s
1990s
2000s
2010s
2019
Alt URL
2020s
External links
at CAIDA
AMPRNet Portal
Amateur Packet Radio Gateways
HamWAN
Amateur radio
Packet radio
Network architecture
Amateur radio organizations
1981 establishments
2001 establishments in California
University of California, San Diego
E-Science
Cyberinfrastructure
La Jolla, San Diego
2011 establishments in California
Non-profit organizations based in San Diego
Internet technology companies of the United States
Amateur radio companies
2017 establishments in California |
1245372 | https://en.wikipedia.org/wiki/Analytic%20hierarchy%20process | Analytic hierarchy process | The analytic hierarchy process (AHP), also analytical hierarchy process, is a structured technique for organizing and analyzing complex decisions, based on mathematics and psychology. It was developed by Thomas L. Saaty in the 1970s; Saaty partnered with Ernest Forman to develop Expert Choice software in 1983, and AHP has been extensively studied and refined since then. It represents an accurate approach to quantifying the weights of decision criteria. Individual experts’ experiences are utilized to estimate the relative magnitudes of factors through pair-wise comparisons. Each of the respondents compares the relative importance each pair of items using a specially designed questionnaire.
Uses and applications
AHP has particular application in group decision making, and is used around the world in a wide variety of decision situations, in fields such as government, business, industry, healthcare and education.
Rather than prescribing a "correct" decision, the AHP helps decision makers find one that best suits their goal and their understanding of the problem. It provides a comprehensive and rational framework for structuring a decision problem, for representing and quantifying its elements, for relating those elements to overall goals, and for evaluating alternative solutions.
Users of the AHP first decompose their decision problem into a hierarchy of more easily comprehended sub-problems, each of which can be analyzed independently. The elements of the hierarchy can relate to any aspect of the decision problem—tangible or intangible, carefully measured or roughly estimated, well or poorly understood—anything at all that applies to the decision at hand.
Once the hierarchy is built, the decision makers systematically evaluate its various elements by comparing them to each other two at a time, with respect to their impact on an element above them in the hierarchy. In making the comparisons, the decision makers can use concrete data about the elements, but they typically use their judgments about the elements' relative meaning and importance. It is the essence of the AHP that human judgments, and not just the underlying information, can be used in performing the evaluations.
The AHP converts these evaluations to numerical values that can be processed and compared over the entire range of the problem. A numerical weight or priority is derived for each element of the hierarchy, allowing diverse and often incommensurable elements to be compared to one another in a rational and consistent way. This capability distinguishes the AHP from other decision making techniques.
In the final step of the process, numerical priorities are calculated for each of the decision alternatives. These numbers represent the alternatives' relative ability to achieve the decision goal, so they allow a straightforward consideration of the various courses of action.
Several firms supply computer software to assist in using the process.
While it can be used by individuals working on straightforward decisions, the Analytic Hierarchy Process (AHP) is most useful where teams of people are working on complex problems, especially those with high stakes, involving human perceptions and judgments, whose resolutions have long-term repercussions.
It has unique advantages when important elements of the decision are difficult to quantify or compare, or where communication among team members is impeded by their different specializations, terminologies, or perspectives.
Decision situations to which the AHP can be applied include:
Choice – The selection of one alternative from a given set of alternatives, usually where there are multiple decision criteria involved.
Ranking – Putting a set of alternatives in order from most to least desirable.
Prioritization – Determining the relative merit of members of a set of alternatives, as opposed to selecting a single one or merely ranking them
Resource allocation – Apportioning resources among a set of alternatives
Benchmarking – Comparing the processes in one's own organization with those of other best-of-breed organizations
Quality management – Dealing with the multidimensional aspects of quality and quality improvement
Conflict resolution – Settling disputes between parties with apparently incompatible goals or positions
The applications of AHP to complex decision situations have numbered in the thousands, and have produced extensive results in problems involving planning, resource allocation, priority setting, and selection among alternatives. Other areas have included forecasting, total quality management, business process reengineering, quality function deployment, and the balanced scorecard. Many AHP applications are never reported to the world at large, because they take place at high levels of large organizations where security and privacy considerations prohibit their disclosure. But some uses of AHP are discussed in the literature. Recently these have included:
Deciding how best to reduce the impact of global climate change (Fondazione Eni Enrico Mattei)
Quantifying the overall quality of software systems (Microsoft Corporation)
Selecting university faculty (Bloomsburg University of Pennsylvania)
Deciding where to locate offshore manufacturing plants (University of Cambridge)
Assessing risk in operating cross-country petroleum pipelines (American Society of Civil Engineers)
Deciding how best to manage U.S. watersheds (U.S. Department of Agriculture)
More Effectively Define and Evaluate SAP Implementation Approaches (SAP Experts)
Integrated evaluation of a community sustanaibility in terms of environment, economy, society, institution, and culture.
Accelerated Bridge Construction Decision Making Tool to assist in determining the viability of accelerated bridge construction (ABC) over traditional construction methods and in selecting appropriate construction and contracting strategies on a case-by-case basis.
AHP is sometimes used in designing highly specific procedures for particular situations, such as the rating of buildings by historic significance. It was recently applied to a project that uses video footage to assess the condition of highways in Virginia. Highway engineers first used it to determine the optimum scope of the project, then to justify its budget to lawmakers.
The weights of the AHP judgement matrix may be corrected with the ones calculated through the Entropy Method. This variant of the AHP method is called AHP-EM.
Education and scholarly research
Though using the analytic hierarchy process requires no specialized academic training, it is considered an important subject in many institutions of higher learning, including schools of engineering and graduate schools of business. It is a particularly important subject in the quality field, and is taught in many specialized courses including Six Sigma, Lean Six Sigma, and QFD.
The value of the AHP is recognized in developed and developing countries around the world. China is an example—nearly a hundred Chinese universities offer courses in AHP, and many doctoral students choose AHP as the subject of their research and dissertations. Over 900 papers have been published on the subject in China, and there is at least one Chinese scholarly journal devoted exclusively to AHP.
The International Symposium on the Analytic Hierarchy Process (ISAHP) holds biennial meetings of academics and practitioners interested in the field. A wide range of topics is covered. Those in 2005 ranged from "Establishing Payment Standards for Surgical Specialists", to "Strategic Technology Roadmapping", to "Infrastructure Reconstruction in Devastated Countries".
At the 2007 meeting in Valparaíso, Chile, over 90 papers were presented from 19 countries, including the US, Germany, Japan, Chile, Malaysia, and Nepal. A similar number of papers were presented at the 2009 symposium in Pittsburgh, Pennsylvania, when 28 countries were represented. Subjects of the papers included Economic Stabilization in Latvia, Portfolio Selection in the Banking Sector, Wildfire Management to Help Mitigate Global Warming, and Rural Microprojects in Nepal.
Use
As can be seen in the material that follows, using the AHP involves the mathematical synthesis of numerous judgments about the decision problem at hand. It is not uncommon for these judgments to number in the dozens or even the hundreds. While the math can be done by hand or with a calculator, it is far more common to use one of several computerized methods for entering and synthesizing the judgments. The simplest of these involve standard spreadsheet software, while the most complex use custom software, often augmented by special devices for acquiring the judgments of decision makers gathered in a meeting room.
The procedure for using the AHP can be summarized as:
Model the problem as a hierarchy containing the decision goal, the alternatives for reaching it, and the criteria for evaluating the alternatives.
Establish priorities among the elements of the hierarchy by making a series of judgments based on pairwise comparisons of the elements. For example, when comparing potential purchases of commercial real estate, the investors might say they prefer location over price and price over timing.
Synthesize these judgments to yield a set of overall priorities for the hierarchy. This would combine the investors' judgments about location, price and timing for properties A, B, C, and D into overall priorities for each property.
Check the consistency of the judgments.
Come to a final decision based on the results of this process.
These steps are more fully described below.
Model the problem as a hierarchy
The first step in the analytic hierarchy process is to model the problem as a hierarchy. In doing this, participants explore the aspects of the problem at levels from general to detailed, then express it in the multileveled way that the AHP requires. As they work to build the hierarchy, they increase their understanding of the problem, of its context, and of each other's thoughts and feelings about both.
Hierarchies defined
A hierarchy is a stratified system of ranking and organizing people, things, ideas, etc., where each element of the system, except for the top one, is subordinate to one or more other elements. Though the concept of hierarchy is easily grasped intuitively, it can also be described mathematically. Diagrams of hierarchies are often shaped roughly like pyramids, but other than having a single element at the top, there is nothing necessarily pyramid-shaped about a hierarchy.
Human organizations are often structured as hierarchies, where the hierarchical system is used for assigning responsibilities, exercising leadership, and facilitating communication. Familiar hierarchies of "things" include a desktop computer's tower unit at the "top", with its subordinate monitor, keyboard, and mouse "below."
In the world of ideas, we use hierarchies to help us acquire detailed knowledge of complex reality: we structure the reality into its constituent parts, and these in turn into their own constituent parts, proceeding down the hierarchy as many levels as we care to. At each step, we focus on understanding a single component of the whole, temporarily disregarding the other components at this and all other levels. As we go through this process, we increase our global understanding of whatever complex reality we are studying.
Think of the hierarchy that medical students use while learning anatomy—they separately consider the musculoskeletal system (including parts and subparts like the hand and its constituent muscles and bones), the circulatory system (and its many levels and branches), the nervous system (and its numerous components and subsystems), etc., until they've covered all the systems and the important subdivisions of each. Advanced students continue the subdivision all the way to the level of the cell or molecule. In the end, the students understand the "big picture" and a considerable number of its details. Not only that, but they understand the relation of the individual parts to the whole. By working hierarchically, they've gained a comprehensive understanding of anatomy.
Similarly, when we approach a complex decision problem, we can use a hierarchy to integrate large amounts of information into our understanding of the situation. As we build this information structure, we form a better and better picture of the problem as a whole.
Hierarchies in the AHP
An AHP hierarchy is a structured means of modeling the decision at hand. It consists of an overall goal, a group of options or alternatives for reaching the goal, and a group of factors or criteria that relate the alternatives to the goal. The criteria can be further broken down into subcriteria, sub-subcriteria, and so on, in as many levels as the problem requires. A criterion may not apply uniformly, but may have graded differences like a little sweetness is enjoyable but too much sweetness can be harmful. In that case, the criterion is divided into subcriteria indicating different intensities of the criterion, like: little, medium, high and these intensities are prioritized through comparisons under the parent criterion, sweetness.
Published descriptions of AHP applications often include diagrams and descriptions of their hierarchies; some simple ones are shown throughout this article. More complex AHP hierarchies have been collected and reprinted in at least one book. More complex hierarchies can be found on a special talk page for this article.
The design of any AHP hierarchy will depend not only on the nature of the problem at hand, but also on the knowledge, judgments, values, opinions, needs, wants, etc. of the participants in the decision-making process. Constructing a hierarchy typically involves significant discussion, research, and discovery by those involved. Even after its initial construction, it can be changed to accommodate newly-thought-of criteria or criteria not originally considered to be important; alternatives can also be added, deleted, or changed.
To better understand AHP hierarchies, consider a decision problem with a goal to be reached, three alternative ways of reaching the goal, and four criteria against which the alternatives need to be measured.
Such a hierarchy can be visualized as a diagram like the one immediately below, with the goal at the top, the three alternatives at the bottom, and the four criteria in between. There are useful terms for describing the parts of such diagrams: Each box is called a node. A node that is connected to one or more nodes in a level below it is called a parent node. The nodes to which it is so connected are called its children.
Applying these definitions to the diagram below, the goal is the parent of the four criteria, and the four criteria are children of the goal. Each criterion is a parent of the three Alternatives. Note that there are only three Alternatives, but in the diagram, each of them is repeated under each of its parents.
To reduce the size of the drawing required, it is common to represent AHP hierarchies as shown in the diagram below, with only one node for each alternative, and with multiple lines connecting the alternatives and the criteria that apply to them. To avoid clutter, these lines are sometimes omitted or reduced in number. Regardless of any such simplifications in the diagram, in the actual hierarchy each criterion is individually connected to the alternatives. The lines may be thought of as being directed downward from the parent in one level to its children in the level below.
Evaluate the hierarchy
Once the hierarchy has been constructed, the participants analyze it through a series of pairwise comparisons that derive numerical scales of measurement for the nodes. The criteria are pairwise compared against the goal for importance. The alternatives are pairwise compared against each of the criteria for preference. The comparisons are processed mathematically, and priorities are derived for each node.
Consider the "Choose a Leader" example above. An important task of the decision makers is to determine the weight to be given each criterion in making the choice of a leader. Another important task is to determine the weight to be given to each candidate with regard to each of the criteria. The AHP not only lets them do that, but it lets them put a meaningful and objective numerical value on each of the four criteria.
Unlike most surveys which adopt the five point Likert scale, AHP's questionnaire is 9 to 1 to 9.
Establish priorities
This section explains priorities, shows how they are established, and provides a simple example.
Priorities defined and explained
Priorities are numbers associated with the nodes of an AHP hierarchy. They represent the relative weights of the nodes in any group.
Like probabilities, priorities are absolute numbers between zero and one, without units or dimensions. A node with priority .200 has twice the weight in reaching the goal as one with priority .100, ten times the weight of one with priority .020, and so forth. Depending on the problem at hand, "weight" can refer to importance, or preference, or likelihood, or whatever factor is being considered by the decision makers.
Priorities are distributed over a hierarchy according to its architecture, and their values depend on the information entered by users of the process. Priorities of the Goal, the Criteria, and the Alternatives are intimately related, but need to be considered separately.
By definition, the priority of the Goal is 1.000. The priorities of the alternatives always add up to 1.000. Things can become complicated with multiple levels of Criteria, but if there is only one level, their priorities also add to 1.000. All this is illustrated by the priorities in the example below.
Observe that the priorities on each level of the example—the goal, the criteria, and the alternatives—all add up to 1.000.
The priorities shown are those that exist before any information has been entered about weights of the criteria or alternatives, so the priorities within each level are all equal. They are called the hierarchy's default priorities. If a fifth Criterion were added to this hierarchy, the default priority for each Criterion would be .200. If there were only two Alternatives, each would have a default priority of .500.
Two additional concepts apply when a hierarchy has more than one level of criteria: local priorities and global priorities. Consider the hierarchy shown below, which has several Subcriteria under each Criterion.
The local priorities, shown in gray, represent the relative weights of the nodes within a group of siblings with respect to their parent. The local priorities of each group of Criteria and their sibling Subcriteria add up to 1.000. The global priorities, shown in black, are obtained by multiplying the local priorities of the siblings by their parent's global priority. The global priorities for all the subcriteria in the level add up to 1.000.
The rule is this: Within a hierarchy, the global priorities of child nodes always add up to the global priority of their parent. Within a group of children, the local priorities add up to 1.000.
So far, we have looked only at default priorities. As the Analytical Hierarchy Process moves forward, the priorities will change from their default values as the decision makers input information about the importance of the various nodes. They do this by making a series of pairwise comparisons.
Practical examples
Experienced practitioners know that the best way to understand the AHP is to work through cases and examples. Two detailed case studies, specifically designed as in-depth teaching examples, are provided as appendices to this article:
Simple step-by-step example with four Criteria and three Alternatives: Choosing a leader for an organization.
More complex step-by-step example with ten Criteria/Subcriteria and six Alternatives: Buying a family car and Machinery Selection Example.
Some of the books on AHP contain practical examples of its use, though they are not typically intended to be step-by-step learning aids. One of them contains a handful of expanded examples, plus about 400 AHP hierarchies briefly described and illustrated with figures. Many examples are discussed, mostly for professional audiences, in papers published by the International Symposium on the Analytic Hierarchy Process.
Criticisms
The AHP is included in most operations research and management science textbooks, and is taught in numerous universities; it is used extensively in organizations that have carefully investigated its theoretical underpinnings. While the general consensus is that it is both technically valid and practically useful, the method does have its critics.
In the early 1990s a series of debates between critics and proponents of AHP was published in Management Science and The Journal of the Operational Research Society, two prestigious journals where Saaty and his colleagues had considerable influence. These debates seem to have been settled in favor of AHP:
An in-depth paper discussing and rebutting the academic criticisms of AHP was published in Operations Research in 2001.
A 2008 Management Science paper reviewing 15 years of progress in all areas of Multicriteria Decision Making showed that AHP publications have far outnumbered those in any other area, characterizing their growth as "enormous."
Also in 2008, the major society for operations research, the Institute for Operations Research and the Management Sciences formally recognized AHP's broad impact on its fields.
Occasional criticisms still appear. A 1997 paper examined possible flaws in the verbal (vs. numerical) scale often used in AHP pairwise comparisons. Another from the same year claimed that innocuous changes to the AHP model can introduce order where no order exists. A 2006 paper found that the addition of criteria for which all alternatives perform equally can alter the priorities of alternatives.
In 2021, the first comprehensive evaluation of the AHP was published in a book authored by two academics from Technical University of Valencia and Universidad Politécnica de Cartagena, and published by Springer Nature. Based on an empirical investigation and objective testimonies by 101 researchers, the study found at least 30 flaws in the AHP and found it unsuitable for complex problems, and in certain situations even for small problems.
Rank reversal
Decision making involves ranking alternatives in terms of criteria or attributes of those alternatives. It is an axiom of some decision theories that when new alternatives are added to a decision problem, the ranking of the old alternatives must not change — that "rank reversal" must not occur.
There are two schools of thought about rank reversal. One maintains that new alternatives that introduce no additional attributes should not cause rank reversal under any circumstances. The other maintains that there are some situations in which rank reversal can reasonably be expected. The original formulation of AHP allowed rank reversals. In 1993, Forman introduced a second AHP synthesis mode, called the ideal synthesis mode, to address choice situations in which the addition or removal of an 'irrelevant' alternative should not and will not cause a change in the ranks of existing alternatives. The current version of the AHP can accommodate both these schools—its ideal mode preserves rank, while its distributive mode allows the ranks to change. Either mode is selected according to the problem at hand.
Rank reversal and AHP are extensively discussed in a 2001 paper in Operations Research, as well as a chapter entitled Rank Preservation and Reversal, in the current basic book on AHP. The latter presents published examples of rank reversal due to adding copies and near copies of an alternative, due to intransitivity of decision rules, due to adding phantom and decoy alternatives, and due to the switching phenomenon in utility functions. It also discusses the Distributive and Ideal Modes of AHP.
A new form of rank reversal of AHP was found in 2014 in which AHP produces rank order reversal when eliminating irrelevant data, this is data that do not differentiate alternatives.
There are different types of rank reversals. Also, other methods besides the AHP may exhibit such rank reversals. More discussion on rank reversals with the AHP and other MCDM methods is provided in the rank reversals in decision-making page.
Non-monotonicity of some weight extraction methods
Within a comparison matrix one may replace a judgement with a less favorable judgment and then check to see if the indication of the new priority becomes less favorable than the original priority. In the context of tournament matrices, it has been proven by Oskar Perron that the principal right eigenvector method is not monotonic. This behaviour can also be demonstrated for reciprocal n x n matrices, where n > 3. Alternative approaches are discussed elsewhere.
See also
Analytic hierarchy process – car example
Analytic hierarchy process – leader example
Analytic network process
Arrow's impossibility theorem
Decision making
Decision-making paradox
Decision-making software
Hierarchical decision process
L. L. Thurstone
Law of comparative judgment
Multi-criteria decision analysis
Pairwise comparison
Preference
Principal component analysis
Rank reversals in decision-making
References
Further reading
Saaty, Thomas L. Decision Making for Leaders: The Analytical Hierarchy Process for Decisions in a Complex World (1982). Belmont, California: Wadsworth. ; Paperback, Pittsburgh: RWS. . "Focuses on practical application of the AHP; briefly covers theory."
Saaty, Thomas L. Fundamentals of Decision Making and Priority Theory with the Analytic Hierarchy Process (1994). Pittsburgh: RWS. . "A thorough exposition of the theoretical aspects of AHP."
Saaty, Thomas L. Mathematical Principles of Decision Making (Principia Mathematica Decernendi) (2009). Pittsburgh: RWS. . "Comprehensive coverage of the AHP, its successor the ANP, and further developments of their underlying concepts."
Saaty, Thomas L., with Ernest H. Forman. The Hierarchon: A Dictionary of Hierarchies. (1992) Pittsburgh: RWS. . "Dozens of illustrations and examples of AHP hierarchies. A beginning classification of ideas relating to planning, conflict resolution, and decision making."
Saaty, Thomas L., with Luis G. Vargas The Logic of Priorities: Applications in Business, Energy, Health, and Transportation (1982). Boston: Kluwer-Nijhoff. (Hardcover) (Paperback). Republished 1991 by RWS, .
Kardi Teknomo. Analytic Hierarchy Process Tutorial (2012). Revoledu.
Kearns, Kevin P.; Saaty, Thomas L. Analytical Planning: The Organization of Systems (1985). Oxford: Pergamon Press. . Republished 1991 by RWS, .
with Joyce Alexander. Conflict Resolution: The Analytic Hierarchy Process (1989). New York: Praeger.
Vargas, Luis L.; Saaty, Thomas L. Prediction, Projection and Forecasting: Applications of the Analytic Hierarchy Process in Economics, Finance, Politics, Games and Sports (1991). Boston: Kluwer Academic.
Vargas, Luis L.; Saaty, Thomas L. Decision Making in Economic, Social and Technological Environments (1994). Pittsburgh: RWS.
Vargas, Luis L.; Saaty, Thomas L. Models, Methods, Concepts & Applications of the Analytic Hierarchy Process (2001). Boston: Kluwer Academic.
Peniwati, Kirti; Vargas, Luis L. Group Decision Making: Drawing Out and Reconciling Differences (2007). Pittsburgh: RWS.
External links
International Journal of the Analytic Hierarchy Process An online journal about multi-criteria decision making using the AHP.
easyAHP Online tool to make collaborative decisions using AHP easyAHP is a free online tool to make decisions in a collaborative or individual way. easy AHP uses AHP methodology: Analytic hierarchy process.
AHP video. (9:17 YouTube clip) Very thorough exposition of AHP by Dr. Klaus Göpel
Analytic Hierarchy Process (AHP) Example with Simulations using Matlab – Waqqas Farooq – AHP example for college selection using matlab.
An illustrated guide (pdf) – Dr. Oliver Meixner University of Wien – "Analytic Hierarchy Process", a very easy to understand summary of the mathematical theory
AHP example with Matlab implementation – AHP explanation with an example and matlab code.
R ahp package – An AHP open source package.
AHPy - An open source Python implementation of AHP with an optimal solver for missing pairwise comparisons
Introductory Mathematics of the Analytic Hierarchy Process – An introduction to the mathematics of the Analytic Hierarchy Process.
How to use AHP for Project Prioritization by Dr. James Brown (webinar)
Guide to use AHP in Excel A guide to using AHP in Excel by Dr. Richard Hodgett
Use the AHP Methodology to More Effectively Define and Evaluate Your SAP Implementation Approach by Jeetendra Kumar
Group decision-making
Multiple-criteria decision analysis
Industrial engineering
Project management techniques |
18797966 | https://en.wikipedia.org/wiki/UpdateStar | UpdateStar | UpdateStar is a freeware software application providing update information for approximately 1.3 million software programs. Implementing a social computing aspect, the update database is maintained by the users. UpdateStar uses advertising to refinance the free service and shares ad revenue 50/50 with the software authors via their Share program.
Software can be searched, downloaded and updated. In addition, UpdateStar is a freeware client that can be easily installed to inform users about available updates for their individual software setup. It allows downloading, installing and uninstalling the programs from within the client, which acts as an enhancement for the Add/Remove Programs control panel applet (Programs and Features on Windows Vista and above).
The software search engine at http://www.updatestar.com/ is built on top of UpdateStar’s user generated software and program database. Via the ad revenue sharing program Share, UpdateStar allows developers to use the UpdateStar website as a download mirror to participate from ad revenue created on their program’s webpages.
UpdateStar has been reviewed by Computerworld, Softpedia, PC Advisor, and c't among others.
History
UpdateStar was founded by Michael Ganss, Frank Alperstaedt, and Olaf Kehrer in 2007, and is based in Berlin. The software search engine website itself, however, did not launch until July 2008. The company is funded by the founders.
The current version of the site was released in July 2008. This included new software search capabilities with results based on user submitted information for more than 259,000 programs, a new professional services business section, and an UpdateStar freeware client section.
UpdateStar freeware has grown in popularity with about 50,000 users in 2007 and about 550,000 users in July 2008.
UpdateStar 4, released in March 2009 introduced an enhanced recognition algorithm and a registry cleaner, which removes remnants of uninstalled software. Updates appear almost on a daily basis for a software setup with 60 to 80 programs on a typical PC making it nearly impossible for a PC user to keep up. The program is available as freeware as well as the commercial Premium Edition with additional security advice for program, a cleaner for system maintenance and more.
UpdateStar provides the user with information about software updates available for software on their computer. This includes major releases provided by UpdateStar Freeware Edition as well as minor version upgrades and patches included with the Premium Edition. Many updates are published because of security reasons and newly included features. Either way software updates should be considered important or even critical in case of updates made available by the publishers for security reasons. UpdateStar Premium additionally offers security advice allowing for an identification of important software updates.
UpdateStar Premium includes a tool to clean the Windows Registry from superfluous and faulty software entries which are often the result of incompletely uninstalled software.
Two million users profit from the UpdateStar service per month (December 2009) and receive updates for their PCs software. UpdateStar provides users with program update information for 4.5 million installations - daily.
UpdateStar released version 5 on Oct 19, 2009 introducing improved version recognition, improved Windows 7 support, new language support for Korean and Lithuanian, and improved translations of Russian, Hungarian, and Romanian.
Attempts to download software from the UpdateStar site can lead to malware attacks.
Revenue model
UpdateStar uses the software search engine website to share ad revenue with software authors. Other professional services include software market research (Analytics) as well as targeted marketing services (Connect) to software vendors. This allows UpdateStar to provide their update information service for free to their user community.
Share - the ad sharing program
The UpdateStar website tracks created ad revenues on program pages. The Share program creates PPC based revenue streams. When users click on ads on a program’s download page in the UpdateStar web, the advertiser is charged and the advertising fee is split between UpdateStar and the software vendor, if the vendor participates as a Share partner.
UpdateStar website’s user traffic comes from targeted alerts about newly available updates for used software and offering information and downloads. Traffic multiplies with the number of updates and users. This way Share software vendor partners participate repeatedly from revenue created with their content (their software) as long as they participate.
Online Backup
In February 2010, UpdateStar began a commercial online backup service called UpdateStar Online Backup. Users of UpdateStar Online Backup can select files and folders through a desktop application, which are then periodically backed up to a remote data center. The program employs a differential backup algorithm to minimize the amount of data that needs to be backed up on subsequent runs.
UpdateStar offers plans with unlimited storage for home and business desktop computers and limited storage (100 GB, 250 GB, 500 GB) for server computers. The program runs on Windows XP, Windows Vista, Windows 7 (desktop edition), and Windows Server 2003 and Windows Server 2008 (server edition).
See also
User-generated content
Package manager
References
External links
UpdateStar online backup
KillerStartups about UpdateStar
Softpedia, Only the Latest Updates for the Software on Your PC
Utilities for Windows
Windows-only freeware
Proprietary package management systems |
43556639 | https://en.wikipedia.org/wiki/Sahana%20Software%20Foundation | Sahana Software Foundation | Sahana Software Foundation is a Los Angeles, California-based non-profit organization founded to promote the use of free and open-source software (FOSS) for disaster and emergency management. The foundation's mission statement is to "save lives by providing information management solutions that enable organizations and communities to better prepare for and respond to disasters." The foundation's Sahana family of software products include Eden, designed for humanitarian needs management; Vesuvius, focused on the disaster preparedness needs of the medical community; and legacy earlier versions of Sahana software including Krakatoa, descended from the original Sahana code base developed following the 2004 Indian Ocean tsunami. The word "Sahana" means "relief" in Sinhalese, one of two national languages of Sri Lanka.
History
The Sahana Software Foundation's roots began after the Indian Ocean earthquake and tsunami on December 26, 2004, when a team of Sri Lankan technology workers associated with the Lanka Software Foundation (LSF) developed software that could be used by the government to coordinate assistance for those affected by the tsunami. Sahana was created for information management and collaboration in the aftermath. The software was designed to resolve common coordination problems that arise during a disaster, including facilitating the search for missing people, aid and volunteer management, and victim tracking across refugee camps.
LSF, as the first owner of the intellectual property making up Sahana software, coordinated ongoing volunteer efforts to maintain the software, and managed the associated donated funds. Sahana software grew into a global free and open-source software project supported by hundreds of volunteer contributors from dozens of countries. It supported national and local authorities and relief agencies in their responses to numerous large-scale, sudden-onset disasters.
The software was originally deployed by the Sri Lankan government's Center of National Operations (CNO), which included the Center of Humanitarian Agencies (CHA). Additional funding was provided by the Swedish International Development Cooperation Agency (SIDA), IBM and the US National Science Foundation (NSF).
In early 2009, the directors of the Lanka Software Foundation decided to allow the Sahana group to spin off into its own organization. In 2009, the Sahana Software Foundation was established as a non-profit organization registered in the state of California. Mark Prutsalis was appointed as the group's first CEO.
In July 2014, the foundation announced that Michael Howden, a member of the board of directors, had been appointed as its new CEO.
Since September 2016, Devin Balkind has served as President.
Sahana FOSS Disaster Management System
The Sahana Free and Open Source Disaster Management System is emergency management and disaster preparedness software developed by the Sahana Software Foundation. Conceived during the 2004 Sri Lanka tsunami to help manage the disaster, Sahana software was deployed by the Sri Lankan government's Center of National Operations (CNO), which included the Center of Humanitarian Agencies (CHA). Funding was provided by the Swedish International Development Agency (SIDA). The project has grown, with deployments during other disasters such as the Asian Quake in Pakistan (2005), the Southern Leyte mudslide disaster in Philippines (2006), the Jogjakarta earthquake in Indonesia (2006) and the 2010 Haiti earthquake.
Sahana currently has three projects: Eden, being developed in Python; Agasti, being developed in PHP; and the localization project, L10n.
Community Resilience Mapping Tool
In 2012, the Los Angeles County Department of Public Health (LACDPH) and Emergency Network Los Angeles, a voluntary agency, reached out to nongovernmental community organizations working in disaster and pandemic preparedness to find a better way of communicating with LA County's diverse population, to build resilience. Along with the RAND Corporation, the nonprofit policy think tank, the groups started a project called Los Angeles County Community Disaster Resilience (LACCDR), to educate and engage community leaders to promote resiliency in Los Angeles County.
As part of the program, Sahana Software Foundation developed the Community Resilience Mapping Tool, to help communities collect data on vulnerabilities, hazards and resources within their own territories. The data allows communities to identify populations that could be affected by disasters, and plan the best way to allocate resources to help those people. Barriers like limited English proficiency, or low trust in public health, can be addressed through the tool.
Google Summer of Code project
From 2006 through 2014, Sahana has had a participating project in Google Summer of Code, a global program that offers student developers stipends to write code for various open-source software projects.
Humanitarian-FOSS community
Sahana has developed into a community founded by a humanitarian consultant, Paul Currion, and the Sahana project lead, Chamindra de Silva. Much of their work is based on the more generic ideals of "humanitarian-FOSS", where the ideals of FOSS are applied for building humanitarian-ICT applications or applications built to help alleviate human suffering. The community consists of a mailing list and an active wiki with membership including emergency management practitioners, humanitarian consultants, crisis management academics, and free and open-source developers from around the world. Domain representation in this group includes members from ISCRAM, UNDP, Red Cross, IBM, Saravodaya (the largest NGO in Sri Lanka), and Australian Fire Services.
They have been recognized by the Free Software Foundation (FSF), where it inspired a new FSF Award for Projects of Social Benefit, which is broader in coverage than humanitarian-FOSS and by the UNDP IOSN on their Humanitarian-FOSS Portal.
Deployments
In addition to the Sri Lankan government, Sahana software has also been officially deployed by the governments of the United States, Pakistan, the Philippines, Bangladesh, India, Taiwan, and China. It was also part of the Strong Angel III, a test of US civil and military disaster response.
Sahana software has been deployed in conjunction with the following disasters and aid organizations:
Tsunami - Sri Lanka 2005 - Officially deployed in the Center of National Operations (CNO) for the Government of Sri Lanka.
AsianQuake - Pakistan 2005 - Officially deployed with the National Database and Registration Authority (NADRA) for the Government of Pakistan.
Southern Leyte mudslide disaster - Philippines 2006 - Officially deployed with the National Disaster Coordinating Council (NDCC) and the Office of Civil Defense for the Government of the Philippines.
Sarvodaya - Sri Lanka 2006 - Deployed for Sri Lanka's largest NGO.
Terre des Hommes - Sri Lanka 2006 - Deployed with new Child Protection Module for Switzerland-based Terre des Hommes, the county's largest private aid organization for children.
Yogjakarta earthquake - Indonesia 2006 - Deployed by the Australian Computer Society (ACS), the Indonesian-based urRemote aid organization, and the Indonesian Whitewater Association and Indonesian Rescue Source NGOs.
Peru earthquake - 2007 - Deployed and localized into Spanish.
Myanmar cyclone - Myanmar 2008 - Deployed and localized into Burmese.
Haiti earthquake - Haiti 2010 - Deployed and localized in Port-au-Prince and Haiti.
Floods in Bosnia and Herzegovina, Serbia and Croatia 2014 - Deployed and localized in Bosnia, Serbia, and Croatia.
Research
The Sahana Project has resulted in independent research projects. Professor Louiqa Raschid of the University of Maryland was leading a team in Sahana and Disaster Management research in 2013.
Sahana has been presented at numerous conferences, workshops, and events, and has had one paper accepted for an international conference; a paper on Sahana and Disaster Management was accepted for the 2nd International Conference on Information and Automation 2006. Due to the lack of previous research in ICT for disaster management, research has played a key role in Sahana's development.
Awards and recognition
Sahana software was the recipient of the 2006 Free Software Foundation Award for Projects of Social Benefit. The award is presented to a free software project that intentionally and significantly benefits society through collaboration to accomplish an important social task.
Sahana software and its role supporting post-tsunami disaster relief in Sri Lanka were featured in the 2006 BBC World documentary The Code-Breakers.
In March 2010, the Sahana Software Foundation won non-profit disaster planning coordinator Private and Public Businesses, Inc.'s Best Practices Award, given for exemplary planning practices or responses to a critical incident. The award recognized the foundation's role under the leadership of former CEO Mark Prutsalis for providing coordination and support within 48 hours of the Haiti earthquake.
In April 2010, Sahana was recognized as one of four Cool Vendors in research company Gartner's annual Risk Management and Compliance report, citing Sahana's innovation.
In 2013, Sahana was recognized by the University of Maryland as "the world's leading open source software program for the rapid deployment of humanitarian response management", after its disaster management support role helping New York City police officers respond to Hurricane Sandy. The Sahana Software Foundation was recognized as a Computerworld Honors Laureate in the Human Services category for 2013.
Notes
External links
Launchpad Code Repository
Companies based in Los Angeles
Free software project foundations in the United States
Emergency management software
Emergency organizations |
2184112 | https://en.wikipedia.org/wiki/Topeka%20High%20School | Topeka High School | Topeka High School (THS) is a public secondary school in Topeka, Kansas, United States. It serves students in grades 9 to 12, and one of four high schools operated by Topeka USD 501 school district. In the 2010–2011 school year, there were 1,840 students enrolled.
Topeka High School was established in 1871, and moved to its current location in 1931. At the time, it was among the first million dollar high schools west of the Mississippi River. Topeka High offers a variety of sports and extracurricular activities, and notable alumni include Charles Curtis, 31st Vice President of the United States.
History
Early history
The Topeka Board of Education established Topeka High School in 1871, and the first classes were held on the 3rd floor of Lincoln College (now Washburn University) at the time located where the GAR Memorial Hall is currently. Over the next 10 years, the school was moved to various locations, including the Washburn Building at 10th and Jackson, and a room situated above the Topeka YMCA and Daily Capital newspaper. In 1882, the first black student graduated from Topeka High. Attendance continued to outgrow the capacity of the school facilities, and in 1894 a new school was completed on the northwest corner of 8th and Harrison, at a cost of $85,000. Topeka High School's student population had reached 1,000 by 1903, and a decision was made to construct a Manual Training High School across the street on the southwest corner of 8th and Harrison, at a cost of $100,000. One third of the new building would be for manual training, and the remainder used for academic classes.
In 1915, an auditorium and cafeteria were added to the north school, and the old auditorium was converted to classes. Soon after, a portable frame building was constructed to serve as a study hall and library, and in 1923, an administration building known as 'The Annex' was added to the west side of the south building. In 1921, Topeka High's cafeteria cook Ida M. Moyer was declared "Champion Pie Baker of the World". It was calculated that over the previous 6 years, Moyer had baked 37,248 pies.
Current location era
Overcrowding persisted at the new facility, made worse in 1924 when Topeka's Fire Marshall closed the school's 4th floor, calling it "the biggest fire trap in the city". A committee planning the construction of a new high school recommended that one large school be built, and that it occupy an entire city block. They wished it to be "an addition to the City's public buildings, and not just another building". Bishop James Wise offered to sell the grounds of Bethany College and other church property for a price of $142,000, and in 1928, Topeka voters approved issuing bonds of $1.1 million (=$14 million in 2014 adjusted for inflation) to finance construction of the new Topeka High School. Thomas Williamson (an alumnus from 1907) and Ted Griest were selected as architects, and Linus Burr Smith as designer. Construction of the new school took 18 months, and the total cost was $1.8 million. The school opened in September 1931, and there were 2000 students enrolled by the following year.
A spar from the USS Constitution ("Old Ironsides") was acquired with the assistance of Vice President Curtis, and mounted on a nautical base in the plaza to serve as a flagpole. It was dedicated in October 1931. After years of wear, a replacement spar, also from the USS Constitution, was installed in 2004. Topeka High's 'Hoehner Auditorium' was selected as the site for the inauguration of Kansas Governor Payne Ratner, on January 9, 1939. In 1957, Time and Newsweek listed Topeka High among the 38 best schools in the nation.
Two new high schools helped ease the crowded conditions at Topeka High: Highland Park High School was annexed into Topeka in 1958, and Topeka West High School was completed in 1961. Restructuring of the district curriculum meant that in 1980, students in the 9th grade would begin attending high school. In 1984, Topeka High installed a computer-assisted automated dialing device which called home each time a student was truant. Principal Ned Nusbaum commented, "It's been a very effective tool for getting kids into class". The US Dept of Education recognized Topeka High as a "School of Excellence" in 1989.
In 2001, Topeka High awarded an honorary diploma to the Honorable Eric S. Rosen, Justice, Kansas Supreme Court—a longtime supporter of the school. The school celebrated its 75th Anniversary at its current site on September 17, 2006. In 2007, Topeka High School was ordered to stop providing free condoms to students, as it was contrary to school district policy. The annual Martin Luther King event, sponsored by the state of Kansas, took place in Hoehner Auditorium in 2012. Topeka High is located near the Statehouse, and the governor's celebration at the new venue was well received.
Campus
The 1931 campus is a stunning, three-story Gothic building of almost 278,000 square feet designed by Thomas W. Williamson, a 1907 graduate of Topeka High School.
Notable architecture includes an ornate bell tower, which rises 165 feet over the main building entrance and contains an 18-note Deagan tubular tower chime. In 1974, the tower was rededicated in honor of Thomas Williamson.
The library was modeled after the Great Hall at Hampton Court Palace. Much of the wood shelving is hand-carved, and the ceiling is hand-painted. The original chairs, now 75 years old, remain in the library and have been restored by the Topeka High School Historical Society.
The 1931 building was fitted with a water supply and drain for a pool, though rising costs and concerns about segregation delayed the pool's construction until 1957. In 2005, the 20-yard swimming pool located underneath the gym was closed and converted into Laney Gym (after former swim coach Chet Laney). It is used for P.E. classes and wrestling. An additional gym was constructed on the soccer field located on the northwest side of the school where JV basketball games, Freshman basketball games, and volleyball games are played. Varsity basketball continues to be played in the "Dungeon."
The school building contains 4 fireplaces, and a greenhouse built in the late 1970s.
In 2000, the school installed air conditioning.
Topeka High School was listed on the National Register of Historic Places in September 2005.
Academics
In 1988, Topeka High School was selected as a Blue Ribbon School. The Blue Ribbon Award recognizes public and private schools which perform at high levels or have made significant academic improvements.
Topeka High has eight classes on a traditional bell schedule Monday, Tuesday, and Friday. On Wednesday and Thursday, the schedule changes to a modified block schedule. Odd numbered classes are on Wednesday and even numbered classes are on Thursday. In 2017 it was decided that Trojan time would be every single day during the 4th class period. Before it was only on Thursdays. Trojan Time allows students to sign out to specific locations for further help from teachers, or just stay in their current class and study. Six percent of Topeka High's enrollment comes as transfer students. Students outside the attendance zone come to the school for its strong fine arts program, including a music program (jazz band, drum line, wind ensembles, orchestra, and concert choirs,) its forensic and debate teams, as well as its foreign language program, which offers Spanish, German, Mandarin, and French. Also, THS also supports a Marine Corps JROTC drill team (1999–present).
Journalism
The school newspaper, The World, is a member of the High School National Ad Network. The school yearbook is "The Sunflower". Both publications are members of JEA and NSPA. Topeka High, under the former direction of Richard Green, has also built up its broadcast journalism program. The Newsdesk a bi-monthly news broadcast showcasing student news and feature packages. Under the direction of Green, The Newsdesk has won multiple statewide broadcasting awards. "The Newsdesk" is filmed on campus in "The Tom Browne Memorial News Room".
Debate and Forensics
Topeka High maintains a strong tradition of debate and forensics throughout its prolific history. The school has qualified nearly 180 competitors to the National Tournament of the National Speech and Debate Association and before 2013, had qualified students every year for 33 straight years. The school has 6 national champions, more than any other school in the Flint Hills. The debate squad has won 4 state championships, finished second 6 times, and third place twice. The forensics squad boasts 12 state championships, with a string of 7 straight championships from 1995 to 2002. Topeka High forensics has 40+ individual 6A State Speech champions. The Debate and Forensics squad is coached by Dustin Rimmey.
Students
Students arrive from USD 501 middle schools, including: Robinson, Jardine, Landon, Eisenhower and Chase. Six percent transfer into THS from outside the Topeka Public Schools district, such as other school districts or parochial schools. The senior class of 2011 had 370 students, and more than 80% enrolled in some kind of post secondary education. More than $1.2 million in scholarships were awarded to Topeka High seniors in 2005.
National merit scholars (1999–2005)
The National Merit Scholarship Program is a college scholarship competition that includes taking the PSAT/NMSQT. The school has had 19 Semi-finalists, 35 Commended Scholars, 7 National Achievement Scholars, 3 Corporate Sponsor Merit Scholars, and 3 Hispanic Scholars.
Foreign exchange programs
Ten to fifteen students per year attend THS from countries such as Belgium, Turkmenistan, Japan, South Korea, Turkey, Germany, Thailand, Brazil, Switzerland. Students are sponsored by the following exchange programs: AFS, AIFS, ASSE, CHI, AYUSA, ERDT, WISE, ISE, and Share.
Traditions
Running of the halls: During first period of days that THS has a home football game, the students gather in the halls of Troy, cheerleaders and the drill team, flag team, and marching band march through the halls to promote school spirit.
Extracurricular activities
The school offers many extracurricular activities, including performing arts, school publications, and clubs.
Athletics
The school teams are known as the "Trojans", and are classified as a 6A school, the largest classification in Kansas according to the Kansas State High School Activities Association. Throughout its history, Topeka has won 30 state championships in various sports. Many graduates have gone on to participate in collegiate athletics.
Boys' Basketball
An important part of the school's men's basketball history was the 1949 separation of the basketball teams between black and white players. White basketball players were on the Trojan team, and black athletes were on the Rambler basketball team. There were two different cheer-leading teams. While classes were integrated, blacks didn't have equal representation on the student council and separate school parties were held for black couples and white couples.
The first black Topeka High basketball team, the Cardinals, started in 1929, and the Ramblers started in 1935. In 2009 the school looked back at the historic separation of the teams. Former UNC coach Dean Smith came back with a number of others that were associated with the Ramblers to discuss the team's history. There is no separation of the teams now, and is currently one of the most diverse basketball teams in Topeka. In the 2009–10 basketball season they were shown to be a lot stronger than past seasons after beating cross-town rival, Highland Park High School, the defending state champions for the past three years. The 2009–10 team is coached by Pat Denney.
State Championships
Notable alumni
Nancy Kassebaum Baker, former U.S. Senator from Kansas, 1978–1996
Chris Barnes, professional bowler
Bill Bunten, mayor of Topeka from 2005 to 2013
Charles Curtis, 31st Vice President of the United States
Rich Davis, class of 1944, founder of KC Masterpiece barbecue sauce
Aaron Douglas, artist during the Harlem Renaissance
Jean Dubofsky, class of 1960, first woman to become a Colorado Supreme Court Justice, lead attorney in Romer v. Evans which overturned Colorado Amendment 2 in the US Supreme Court, resulting in a landmark ruling for LGBT rights in the United States
Clarence T. "Curly" Edwinson, decorated World War II fighter pilot, collegiate football star and world champion skeet shooter
Elizabeth Farnsworth, television news anchor
Ruth Garver Gagliardo, advocate for library services for children
Aulsondro Hamilton (aka Emcee N.I.C.E.), class of 1990, musician, actor
Coleman Hawkins, prominent jazz tenor saxophonist
Jane Heap, significant figure in development and promotion of literary modernism; edited The Little Review with her partner Margaret Caroline Anderson
Teven Jenkins, offensive tackle for the Chicago Bears
Gordon Jump, actor, WKRP in Cincinnati
Ben Lerner, poet and author
Lutie Lytle, pioneering African-American lawyer and first woman in North America to teach at a chartered law school (Central Tennessee University School of Law, 1898–99)
Eric McHenry, poet
Kirke Mechem, class of 1943, composer of Tartuffe and other works
Karl and William C. Menninger, co-founders of Menninger Foundation
Travis Schuldt, actor on Scrubs and Passions
Brig Gen Howard S. Searle, responsible for rebuilding Kansas Army National Guard after World War II
Warren W. Shaw, judge; Eisenhower staff member during World War II; representative in Kansas House of Representatives; and 1956 Republican nominee for Kansas governor
John Brooks Slaughter, first African-American director of the National Science Foundation
Dean Smith, head basketball coach at University of North Carolina, 1961–1997; member of College Basketball Hall of Fame
Rex Stout, mystery novelist
Bradbury Thompson, graphic designer
Mike Torrez, retired Major League Baseball pitcher
Thomas Williamson, class of 1907, architect
Max Yoho, class of 1953, Kansas author
Jayne Houdyshell, class of 1974, stage, film and television actress
Notable faculty
Marie L. French, received the National Teacher of the Year Award from President Kennedy in 1962
Margaret Hill McCarter, teacher and novelist; first woman to speak at a Republican National Convention
Marilyn L. Miller, president of the American Library Association
Duane Pomeroy, Kansas politician
Howie Shannon, professional basketball player and coach
See also
List of high schools in Kansas
List of unified school districts in Kansas
Other high schools in Topeka USD 501 school district
Highland Park High School in Topeka
Hope Street Charter Academy in Topeka
Topeka West High School in Topeka
References
External links
Topeka High School
Topeka Public Schools
Public high schools in Kansas
School buildings on the National Register of Historic Places in Kansas
Education in Topeka, Kansas
Educational institutions established in 1871
Schools in Shawnee County, Kansas
1871 establishments in Kansas
National Register of Historic Places in Shawnee County, Kansas |
58574904 | https://en.wikipedia.org/wiki/Evil%20maid%20attack | Evil maid attack | An evil maid attack is an attack on an unattended device, in which an attacker with physical access alters it in some undetectable way so that they can later access the device, or the data on it.
The name refers to the scenario where a maid could subvert a device left unattended in a hotel room – but the concept itself also applies to situations such as a device being intercepted while in transit, or taken away temporarily by airport or law enforcement personnel.
Overview
Origin
In a 2009 blog post, security analyst Joanna Rutkowska coined the term "Evil Maid Attack"; due to hotel rooms being a common place where devices are left unattended. The post detailed a method for compromising the firmware on an unattended computer via an external USB flash drive – and therefore bypassing TrueCrypt disk encryption.
D. Defreez, a computer security professional, first mentioned the possibility of an evil maid attack on Android smartphones in 2011. He talked about the WhisperCore Android distribution and its ability to provide disk encryption for Androids.
Notability
In 2007, former U.S. Commerce Secretary Carlos Gutierrez was allegedly targeted by an evil maid attack during a business trip to China. He left his computer unattended during a trade talk in Beijing, and he suspected that his device had been compromised. Although the allegations have yet to be confirmed or denied, the incident caused the U.S. government to be more wary of physical attacks.
In 2009, Symantec CTO Mark Bregman was advised by several U.S. agencies to leave his devices in the U.S. before travelling to China. He was instructed to buy new ones before leaving and dispose of them when he returned so that any physical attempts to retrieve data would be ineffective.
Methods of attack
Classic evil maid
The attack begins when the victim leaves their device unattended. The attacker can then proceed to tamper with the system. If the victim's device does not have password protection or authentication, an intruder can turn on the computer and immediately access the victim's information. However, if the device is password protected, as with full disk encryption, the firmware of the device needs to be compromised, usually done with an external drive. The compromised firmware often provides the victim with a fake password prompt identical to the original. Once the password is input, the compromised firmware sends the password to the attacker and removes itself after a reboot. In order to successfully complete the attack, the attacker must return to the device once it has been unattended a second time to steal the now-accessible data.
Another method of attack is through a DMA attack in which an attacker accesses the victim's information through hardware devices that connect directly to the physical address space. The attacker simply needs to connect to the hardware device in order to access the information.
Network evil maid
An evil maid attack can also be done by replacing the victim's device with an identical device. If the original device has a bootloader password, then the attacker only needs to acquire a device with an identical bootloader password input screen. If the device has a lock screen, however, the process becomes more difficult as the attacker must acquire the background picture to put on the lock screen of the mimicking device. In either case, when the victim inputs their password on the false device, the device sends the password to the attacker, who is in possession of the original device. The attacker can then access the victim's data.
Vulnerable interfaces
Legacy BIOS
Legacy BIOS is considered insecure against evil maid attacks. Its architecture is old, updates and Option ROMs are unsigned, and configuration is unprotected. Additionally, it does not support secure boot. These vulnerabilities allow an attacker to boot from an external drive and compromise the firmware. The compromised firmware can then be configured to send keystrokes to the attacker remotely.
Unified Extensible Firmware Interface
Unified Extensible Firmware Interface (UEFI) provides many necessary features for mitigating evil maid attacks. For example, it offers a framework for secure boot, authenticated variables at boot-time, and TPM initialization security. Despite these available security measures, platform manufacturers are not obligated to use them. Thus, security issues may arise when these unused features allow an attacker to exploit the device.
Full disk encryption systems
Many full disk encryption systems, such as TrueCrypt and PGP Whole Disk Encryption, are susceptible to evil maid attacks due to their inability to authenticate themselves to the user. An attacker can still modify disk contents despite the device being powered off and encrypted. The attacker can modify the encryption system's loader codes to steal passwords from the victim.
The ability to create a communication channel between the bootloader and the operating system to remotely steal the password for a disk protected by FileVault 2, is also explored. On a macOS system, this attack has additional implications due to “password forwarding” technology, in which a user's account password also serves as the FileVault password, enabling an additional attack surface through privilege escalation.
Thunderbolt
In 2019 a vulnerability named "Thunderclap" in Intel Thunderbolt ports found on many PCs was announced which could allow a rogue actor to gain access to the system via direct memory access (DMA). This is possible despite use of an input/output memory management unit (IOMMU). This vulnerability was largely patched by vendors. This was followed in 2020 by "Thunderspy" which is believed to be unpatchable and allows similar exploitation of DMA to gain total access to the system bypassing all security features.
Any unattended device
Any unattended device can be vulnerable to a network evil maid attack. If the attacker knows the victim's device well enough, they can replace the victim's device with an identical model with a password-stealing mechanism. Thus, when the victim inputs their password, the attacker will instantly be notified of it and be able to access the stolen device's information.
Mitigation
Detection
One approach is to detect that someone is close to, or handling the unattended device.
Proximity alarms, motion detector alarms, and wireless cameras, can be used to alert the victim when an attacker is nearby their device, thereby nullifying the surprise factor of an evil maid attack. The Haven Android app was created in 2017 by Edward Snowden to do such monitoring, and transmit the results to the user's smartphone.
In the absence of the above, tamper-evident technology of various kinds can be used to detect whether the device has been taken apart – including the low-cost solution of putting glitter nail polish over the screw holes.
After an attack has been suspected, the victim can have their device checked to see if any malware was installed, but this is challenging. Suggested approaches are checking the hashes of selected disk sectors and partitions.
Prevention
If the device is under surveillance at all times, an attacker cannot perform an evil maid attack. If left unattended, the device may also be placed inside a lockbox so that an attacker will not have physical access to it. However, there will be situations, such as a device being taken away temporarily by airport or law enforcement personnel where this is not practical.
Basic security measures such as having the latest up-to-date firmware and shutting down the device before leaving it unattended prevent an attack from exploiting vulnerabilities in legacy architecture and allowing external devices into open ports, respectively.
CPU-based disk encryption systems, such as TRESOR and Loop-Amnesia, prevent data from being vulnerable to a DMA attack by ensuring it does not leak into system memory.
TPM-based secure boot has been shown to mitigate evil maid attacks by authenticating the device to the user. It does this by unlocking itself only if the correct password is given by the user and if it measures that no unauthorized code has been executed on the device. These measurements are done by root of trust systems, such as Microsoft's BitLocker and Intel's TXT technology. The Anti Evil Maid program builds upon TPM-based secure boot and further attempts to authenticate the device to the user.
See also
Cold boot attack
References
Computer security exploits
Spyware
Cyberwarfare
Security breaches |
8420991 | https://en.wikipedia.org/wiki/Tomato%20%28firmware%29 | Tomato (firmware) | Tomato is a family of community-developed, custom firmware for consumer-grade computer networking routers and gateways powered by Broadcom chipsets. The firmware has been continually forked and modded by multiple individuals and organizations, with the most up-to-date fork provided by the FreshTomato project.
History
Tomato was originally released by Jonathan Zarate in 2006, using the Linux kernel and drawing extensively on the code of HyperWRT. It was targeted at many popular routers of the time, most notably the older Linksys WRT54G series, Buffalo AirStation, Asus routers and Netgear WNR3500L. His final release of the original Tomato firmware came in June 2010, by which point its popularity had grown large enough that development and support continued through the user community, resulting in a series of releases (dubbed "mods") by individual users or teams of them that continues to the present day.
Fedor Kozhevnikov created a notable early mod he called TomatoUSB, which ceased development in November 2010. It was then forked by other developers and remains the nearest common ancestor to all of the forks with any recent activity. The project saw a boost in recognition when Tomato was chosen by Asus as the base used to build the firmware currently preinstalled on their entire line of home routers, ASUSWRT.
Currently, FreshTomato appears to be the only project that has seen active development and new releases.
Features
Several notable features have been part of Tomato long enough to be common to all forks, among them are:
The graphical user interface (accessed via web browser), including:
Access to almost the entirety of the features provided by the hardware (manufacturers typically omit many of these from their firmware to prevent misuse and reduce support costs)
Extensive use of Ajax to display only the settings that are germane to the device's current setup, reducing confusion and keeping related options near each other using fewer pages/tabs
A CSS-based custom interface theming
SVG-based graphical bandwidth monitoring, showing total network inbound/outbound activity and that of each connected device through pie charts and line graphs that update in real-time
A personal web server (Nginx) that uses the device's "always on, always connected" design to allow users to host their own websites from home for free
Access and bandwidth restriction configurable for each device or the network as a whole, providing control over the speed and amount of traffic available at any time to any device
Unrestricted access to the internal system logs and the ability to store them for easier troubleshooting and security audits
CLI access (BusyBox) via the web-based interface, as well as via Telnet or SSH (using Dropbear)
Wake-on-LAN
Advanced QoS: 10 unique QoS classes defined, real-time graphs display prioritized traffic with traffic class details
Client bandwidth control via QoS classes
The Dnsmasq software built-in, which provides:
DHCP server (with static allocation of IP addresses)
Local DNS server (usually forwarding requests to the DNS provider of choice)
Wireless modes:
Access point (AP)
Wireless client station (STA)
Wireless Ethernet (WET) bridge
Wireless distribution system (WDS also known as wireless bridging)
Simultaneous AP and WDS (also known as wireless repeating)
Dynamic DNS service with ezUpdate and services extended for more providers
SES button control
JFFS2
SMB client
Wireless LAN Adjustment of radio transmit power, antenna selection, and 14 wireless channels
'Boot wait' protection (increase the time slot for uploading firmware via the boot loader)
Advanced port forwarding, redirection, and triggering with UPnP and NAT-PMP
Init, shutdown, firewall, and WAN Up scripts
Uptime, load average, and free memory status
Minimal reboots - Very few configuration changes require a reboot
Wireless survey page to view other networks in your neighborhood
More comprehensive dashboard than stock firmware: displays signal strengths of wireless client devices, reveals UPnP mappings
Configuration persistence during a firmware upgrade
Feature comparison
Feature comparison (cont.)
Supported routers
The Tomato by Shibby, AdvancedTomato and FreshTomato projects offer lists of supported devices on their respective websites.
See also
List of wireless router firmware projects
References
External links
Virtual Tomato RAF (Victek mod)
Tomato Phoenix (Mod supports MTK chips,such as mt7620 mt7621 mt7628 mt7688)
Tomato by Shibby
AdvancedTomato V2
FreshTomato-ARM/FreshTomato-MIPS
FreshTomato Hardware compatibility list
TomatoAnon (Up-to-date statistics of active Tomato devices by fork/version)
Custom firmware
Free system software
Gateway/routing/firewall distribution
Routing software |
26676783 | https://en.wikipedia.org/wiki/Salesforce%20Marketing%20Cloud | Salesforce Marketing Cloud | Salesforce Marketing Cloud is a provider of digital marketing automation and analytics software and services. It was founded in 2000 under the name ExactTarget. The company filed for an IPO in 2007, but withdrew its filing two years later and raised $145 million in funding. It acquired CoTweet, Pardot, iGoDigital and Keymail Marketing. In 2012, it raised $161.5 million in an initial public offering, before being acquired by Salesforce for $2.5 billion in 2013. ExactTarget was renamed to Salesforce Marketing Cloud in 2014 after the acquisition by Salesforce.
Corporate history
Salesforce Marketing Cloud was founded under the name ExactTarget in late 2000 by Scott Dorsey, Chris Baggott, and Peter McCormick with $200,000 in financing. Joanna Milliken joined ExactTarget as the first employee in 2001. It raised $10.5 million in funding from Insight Venture Partners in 2004. The firm grew from $11.5 million in its second year of operations to $41.1 million in 2006, which was its first profitable year. In December 2007, ExactTarget filed an intent for an initial public offering with the Securities Exchange Commission, but withdrew its filing in May 2009. Instead, it announced that $70 million in venture funding had been raised for international expansion, which was followed by another $75 million round later that year. An office was established in London with the acquisition of a UK-based ExactTarget reseller, Keymail Marketing, in September 2009. The company hired 200 additional employees. In 2010, ExactTarget acquired CoTweet, a company founded in 2008 that develops and markets software for managing multiple Twitter accounts.
ExactTarget went public in March 2012 and raised $161.5 million in funding on the New York Stock Exchange. In late 2012, it acquired a marketing automation vendor, Pardot, for $96 million, and the developers of a product recommendation engine, iGoDigital, for $21 million. In 2012, its revenues grew 40 percent over the preceding year. The following June, ExactTarget was acquired by salesforce.com for $2.5 billion. A few months later, salesforce.com said it was laying off 200 staff due to overlaps after the ExactTarget acquisition. That September at the ExactTarget Connections conference, salesforce.com said it was integrating ExactTarget into a new division called Salesforce ExactTarget Marketing Cloud.
In May 2014, Scott Dorsey stepped down as CEO of ExactTarget and was replaced by Scott McCorkle. The company was renamed in October 2014 to "Salesforce Marketing Cloud", removing "ExactTarget" from its name, as part of its integration with Salesforce.
In 2019, Salesforce moved its Marketing Cloud to Microsoft Azure.
Software and services
Salesforce Marketing Cloud develops marketing automation and analytics software for email, mobile, social and online marketing. It also offers consulting and implementation services. The software is sold primarily on a multi-year subscription basis. The price of the subscription is based on what features are enabled, number of users and level of customer service.
The software's Interactive Marketing Hub was released in 2010, when the software's user interface was re-done. It serves as the software's primary user interface for managing communications and content through different media. The Salesforce Marketing Cloud software is offered in a hosted, online subscription model. The company owns the CoTweet, Pardot, and iGoDigital tools. Its mobile features, as well as many of its workflow and collaboration tools, were released in July 2013.
Salesforce Marketing Cloud was founded as an email marketing vendor. Its email management software maintains mailing lists and schedules and modifies email messages based on what recipients read, click-on or forward.
In September 2014 the company introduced the Journey Builder for Apps, which is intended to create customer lifecycle maps of mobile app users. That month, at the September 2014 ExactTarget Connections conference, they announced numerous updates to their software. This included integration with software products owned by Salesforce.com, such as Buddy Media and Social Studio, as well as improvements to workflow and content management tools.
In November 2014 the company released a new version of Social Studio. This release expanded Social Studio beyond Salesforce's Marketing Cloud, where it started, integrating it with the Service Cloud and the Sales Cloud. This enabled sending leads over to the Sales Cloud — the salesperson can see the full context of the company's social media interactions with the lead.
Operations
As of December 2012, about two thirds of ExactTarget's 1,500 employees were located in Indianapolis.
The company hosts an annual user conference called Salesforce Connections, previously the ExactTarget Connections Event. The first Connections event in 2007 attracted 500 attendees, and it has since grown into one of the largest conferences on digital marketing. The event was located in Indianapolis from 2007 until 2014, New York City in 2015, and Atlanta in 2016. It did not occur in 2017 as it was merged with world tours, and was brought back in Chicago in 2018. As of April 28, 2016 the conference was renamed Salesforce Connections. It merged with Salesforce World Tour in 2017.
References
External links
Official website
Salesforce Marketing Cloud
Salesforce
Companies formerly listed on the New York Stock Exchange
Software companies based in Indiana
Software companies established in 2000
2000 establishments in Indiana
Companies based in Indianapolis
Email marketing software
2012 initial public offerings
2013 mergers and acquisitions
Software companies of the United States |
42611943 | https://en.wikipedia.org/wiki/Michael%20Kerrisk | Michael Kerrisk | Michael Kerrisk is a technical author, programmer and, since 2004, maintainer of the Linux man-pages project, succeeding Andries Brouwer. He was born in 1961 in New Zealand and lives in Munich, Germany.
Kerrisk has worked for Digital Equipment, Google, The Linux Foundation and, as an editor and writer, for LWN.net. Currently, he works as a freelance consultant and trainer.
He is best known for his book The Linux Programming Interface, published by No Starch Press in 2010. This book is widely regarded as the definitive work on Linux system programming and has been translated into several languages.
As the maintainer of the Linux man-pages project, Kerrisk has authored or co-authored about a third of the man pages and worked on improving the project's infrastructure. For his contributions he received a Special Award of the 2016 New Zealand Open Source Awards.
References
Free software programmers
Living people
Linux people
21st-century New Zealand writers
New Zealand computer programmers
1961 births |
39451 | https://en.wikipedia.org/wiki/Microware | Microware | Microware was a US corporation based in Clive, Iowa that produced the OS-9 real-time operating system.
Microware Systems Corporation existed as a separate entity from 1977 until September 2001, when it was bought by RadiSys Corp., and became a division of that company. The rights to Microware OS-9 and related software were purchased by a group of distributors on 1 March 2013. The new owner was Microware LP. Microware initially produced a version of BASIC and a real-time kernel for the Motorola 6800 processor, and was asked by Motorola to develop what turned into BASIC09 for the then-new Motorola 6809 processor. Having written BASIC09, they decided it needed an operating system underlying it, and they created the first version of OS-9.
OS-9 was ported to the 68000 family of processors and, after being rewritten mostly in C, to the Intel 80x86, PowerPC, ARM, MIPS, and some of the Hitachi SuperH (SH) series processors. Initially, in the days of the SS-50 bus and SS-50C bus systems such as SWTPC, Gimix, and Smoke Signal Broadcasting, OS-9 was used more as a general purpose microcomputer operating system and had a large, active hobbyist-user population. OS-9 was also popular with industrial and embedded-system users. This was especially true when OS-9 was available for popular 6809-based computers such as the FM-7, FM-77, and the Tandy TRS-80 Color Computer and its near-clone, the Dragon. Over time, Microware concentrated on industrial customers and neglected the hobbyist base that was porting a great many Unix packages and utilities to OS-9.
Microware products
RT68 – the original product for the 6800
OS-9 and OS-9000 – real-time operating systems for a wide range of embedded CPU architectures.
CD-RTOS – the operating system used in the Philips CD-i players, which was a special version of OS-9/68K v2.4.
DAVID – the Digital Audio Video Interactive Decoder platform for digital TV.
Ariel – a micro OS based on an OS Microware acquired (MTOS-UX by IPI).
Color Computer 3 BASIC ROM extensions to support 80-column text and new graphics modes not in the CoCo 1 and 2's Extended Color BASIC ROM
External links
Official site
Real-time operating systems
Embedded operating systems
TRS-80 Color Computer
Unix variants
ARM operating systems
X86 operating systems |
4764218 | https://en.wikipedia.org/wiki/Network%20socket | Network socket | A network socket is a software structure within a network node of a computer network that serves as an endpoint for sending and receiving data across the network. The structure and properties of a socket are defined by an application programming interface (API) for the networking architecture. Sockets are created only during the lifetime of a process of an application running in the node.
Because of the standardization of the TCP/IP protocols in the development of the Internet, the term network socket is most commonly used in the context of the Internet protocol suite, and is therefore often also referred to as Internet socket. In this context, a socket is externally identified to other hosts by its socket address, which is the triad of transport protocol, IP address, and port number.
The term socket is also used for the software endpoint of node-internal inter-process communication (IPC), which often uses the same API as a network socket.
Use
The use of the term socket in software is analogous to the function of an electrical female connector, a device in hardware for communication between nodes interconnected with an electrical cable. Similarly, the term port is used for external physical endpoints at a node or device.
The application programming interface (API) for the network protocol stack creates a handle for each socket created by an application, commonly referred to as a socket descriptor. In Unix-like operating systems, this descriptor is a type of file descriptor. It is stored by the application process for use with every read and write operation on the communication channel.
At the time of creation with the API, a network socket is bound to the combination of a type of network protocol to be used for transmissions, a network address of the host, and a port number. Ports are numbered resources that represent another type of software structure of the node. They are used as service types, and, once created by a process, serve as an externally (from the network) addressable location component, so that other hosts may establish connections.
Network sockets may be dedicated for persistent connections for communication between two nodes, or they may participate in connectionless and multicast communications.
In practice, due to the proliferation of the TCP/IP protocols in use on the Internet, the term network socket usually refers to use with the Internet Protocol (IP). It is therefore often also called Internet socket.
Socket addresses
An application can communicate with a remote process by exchanging data with TCP/IP by knowing the combination of protocol type, IP address, and port number. This combination is often known as a socket address. It is the network-facing access handle to the network socket. The remote process establishes a network socket in its own instance of the protocol stack, and uses the networking API to connect to the application, presenting its own socket address for use by the application.
Implementation
A protocol stack, usually provided by the operating system (rather than as a separate library, for instance), is a set of services that allow processes to communicate over a network using the protocols that the stack implements. The operating system forwards the payload of incoming IP packets to the corresponding application by extracting the socket address information from the IP and transport protocol headers and stripping the headers from the application data.
The application programming interface (API) that programs use to communicate with the protocol stack, using network sockets, is called a socket API. Development of application programs that utilize this API is called socket programming or network programming. Internet socket APIs are usually based on the Berkeley sockets standard. In the Berkeley sockets standard, sockets are a form of file descriptor, due to the Unix philosophy that "everything is a file", and the analogies between sockets and files. Both have functions to read, write, open, and close. In practice the differences strain the analogy, and different interfaces (send and receive) are used on a socket. In inter-process communication, each end generally has its own socket.
In the standard Internet protocols TCP and UDP, a socket address is the combination of an IP address and a port number, much like one end of a telephone connection is the combination of a phone number and a particular extension. Sockets need not have a source address, for example, for only sending data, but if a program binds a socket to a source address, the socket can be used to receive data sent to that address. Based on this address, Internet sockets deliver incoming data packets to the appropriate application process.
Socket often refers specifically to an internet socket or TCP socket. An internet socket is minimally characterized by the following:
local socket address, consisting of the local IP address and (for TCP and UDP, but not IP) a port number
protocol: A transport protocol, e.g., TCP, UDP, raw IP. This means that (local or remote) endpoints with TCP port 53 and UDP port 53 are distinct sockets, while IP does not have ports.
A socket that has been connected to another socket, e.g., during the establishment of a TCP connection, also has a remote socket address.
Definition
The distinctions between a socket (internal representation), socket descriptor (abstract identifier), and socket address (public address) are subtle, and these are not always distinguished in everyday usage. Further, specific definitions of a socket differ between authors. In IETF Request for Comments, Internet Standards, in many textbooks, as well as in this article, the term socket refers to an entity that is uniquely identified by the socket number. In other textbooks, the term socket refers to a local socket address, i.e. a "combination of an IP address and a port number". In the original definition of socket given in RFC 147, as it was related to the ARPA network in 1971, "the socket is specified as a 32 bit number with even sockets identifying receiving sockets and odd sockets identifying sending sockets." Today, however, socket communications are bidirectional.
Within the operating system and the application that created a socket, a socket is referred to by a unique integer value called a socket descriptor.
Tools
On Unix-like operating systems and Microsoft Windows, the command-line tools netstat or ss are used to list established sockets and related information.
Example
This example, modeled according to the Berkeley socket interface, sends the string "Hello, world!" via TCP to port 80 of the host with address 1.2.3.4. It illustrates the creation of a socket (getSocket), connecting it to the remote host, sending the string, and finally closing the socket:
Socket mysocket = getSocket(type = "TCP")
connect(mysocket, address = "1.2.3.4", port = "80")
send(mysocket, "Hello, world!")
close(mysocket)
Types
Several types of Internet socket are available:
Datagram sockets
Connectionless sockets, which use User Datagram Protocol (UDP). Each packet sent or received on a datagram socket is individually addressed and routed. Order and reliability are not guaranteed with datagram sockets, so multiple packets sent from one machine or process to another may arrive in any order or might not arrive at all. Special configuration may be required to send broadcasts on a datagram socket. In order to receive broadcast packets, a datagram socket should not be bound to a specific address, though in some implementations, broadcast packets may also be received when a datagram socket is bound to a specific address.
Stream sockets
Connection-oriented sockets, which use Transmission Control Protocol (TCP), Stream Control Transmission Protocol (SCTP) or Datagram Congestion Control Protocol (DCCP). A stream socket provides a sequenced and unique flow of error-free data without record boundaries, with well-defined mechanisms for creating and destroying connections and reporting errors. A stream socket transmits data reliably, in order, and with out-of-band capabilities. On the Internet, stream sockets are typically implemented using TCP so that applications can run across any networks using TCP/IP protocol.
Raw sockets
Allow direct sending and receiving of IP packets without any protocol-specific transport layer formatting. With other types of sockets, the payload is automatically encapsulated according to the chosen transport layer protocol (e.g. TCP, UDP), and the socket user is unaware of the existence of protocol headers that are broadcast with the payload. When reading from a raw socket, the headers are usually included. When transmitting packets from a raw socket, the automatic addition of a header is optional.
Most socket application programming interfaces (APIs), for example, those based on Berkeley sockets, support raw sockets. Windows XP was released in 2001 with raw socket support implemented in the Winsock interface, but three years later, Microsoft limited Winsock's raw socket support because of security concerns.
Raw sockets are used in security-related applications like Nmap. One use case for raw sockets is the implementation of new transport-layer protocols in user space. Raw sockets are typically available in network equipment, and used for routing protocols such as the Internet Group Management Protocol (IGMP) and Open Shortest Path First (OSPF), and in the Internet Control Message Protocol (ICMP) used, among other things, by the ping utility.
Other socket types are implemented over other transport protocols, such as Systems Network Architecture and Unix domain sockets for internal inter-process communication.
Socket states in the client-server model
Computer processes that provide application services are referred to as servers, and create sockets on startup that are in the listening state. These sockets are waiting for initiatives from client programs.
A TCP server may serve several clients concurrently by creating a unique dedicated socket for each client connection in a new child process or processing thread for each client. These are in the established state when a socket-to-socket virtual connection or virtual circuit (VC), also known as a TCP session, is established with the remote socket, providing a duplex byte stream.
A server may create several concurrently established TCP sockets with the same local port number and local IP address, each mapped to its own server-child process, serving its own client process. They are treated as different sockets by the operating system since the remote socket address (the client IP address or port number) is different; i.e. since they have different socket pair tuples.
UDP sockets do not have an established state, because the protocol is connectionless. A UDP server process handles incoming datagrams from all remote clients sequentially through the same socket. UDP sockets are not identified by the remote address, but only by the local address, although each message has an associated remote address that can be retrieved from each datagram with the networking application programming interface (API).
Socket pairs
Communicating local and remote sockets are called socket pairs. Each socket pair is described by a unique 4-tuple consisting of source and destination IP addresses and port numbers, i.e. of local and remote socket addresses.books.google.com - Designing BSD Rootkits: An Introduction to Kernel Hacking As discussed above, in the TCP case, a socket pair is associated on each end of the connection with a unique 4-tuple.
History
The term socket'' dates to the publication of RFC 147 in 1971, when it was used in the ARPANET. Most modern implementations of sockets are based on Berkeley sockets (1983), and other stacks such as Winsock (1991). The Berkeley sockets API in the Berkeley Software Distribution (BSD), originated with the 4.2BSD Unix operating system as an API. Only in 1989, however, could UC Berkeley release versions of its operating system and networking library free from the licensing constraints of AT&T's copyright-protected Unix.
In c. 1987, AT&T introduced the STREAMS-based Transport Layer Interface (TLI) in UNIX System V Release 3 (SRV3). and continued into Release 4 (SVR4).
Other early implementations were written for TOPS-20, MVS, VM, IBM-DOS (PCIP).
Sockets in network equipment
The socket is primarily a concept used in the transport layer of the Internet protocol suite or session layer of the OSI model. Networking equipment such as routers, which operate at the internet layer, and switches, which operate at the link layer, do not require implementations of the transport layer. However, stateful network firewalls, network address translators, and proxy servers keep track of active socket pairs. In multilayer switches and quality of service (QoS) support in routers, packet flows may be identified by extracting information about the socket pairs.
Raw sockets are typically available in network equipment and are used for routing protocols such as IGRP and OSPF, and for Internet Control Message Protocol (ICMP).
See also
List of TCP and UDP port numbers
Promiscuous traffic
WebSocket
References
Further reading
External links
How sockets work - IBM information center
Server Programming with TCP/IP Sockets
Beej's Guide to Network Programming
Java Tutorials: Networking basics
Net::RawIP; module for Perl applications. Created by Sergey Kolychev.
SOCK_RAW Demystified: article describing inner workings of Raw Sockets
C language examples of Linux raw sockets for IPv4 and IPv6 - David Buchan's C language examples of IPv4 and IPv6 raw sockets for Linux. |
21122630 | https://en.wikipedia.org/wiki/1941%20Oregon%20State%20Beavers%20football%20team | 1941 Oregon State Beavers football team | The 1941 Oregon State Beavers football team represented Oregon State College in the 1941 college football season. The Beavers ended this season with eight wins and two losses. They were the Pacific Coast Conference champions and won the 1942 Rose Bowl over Duke. Because of the Japanese attack on Pearl Harbor, the Rose Bowl was held in Durham, North Carolina. Oregon State thus became the only team to win a Rose Bowl outside Pasadena, California.
The team captains were Martin Chaves, Stan Czech, Bob Dethman, Quentin Greenough, Lew Hammers, George Peters, and Norm Peters.
The Beavers scored 143 points and allowed 49 points. The team was led by head coach Lon Stiner.
Schedule
The Beavers finished the season with an 8–2 record, 7–2 in the Pacific Coast Conference. Rankings are based on the time the game was played.
Game summaries
Before the season
In 1940, Oregon State finished third behind Stanford and Washington. The Indians became the first major college team to implement the "T" formation and subsequently went a perfect 10-0, winning the Poling National Championship. Billingsly and Helms each also subsequently awarded Stanford the National Championship. The Beavers' third-place finish in 1940 was Oregon State's third consecutive third-place finish in the Pacific Coast Conference. Nevertheless, the Beavers lost 11 lettermen and were almost unanimously picked to finish in the lower half of the Pacific Coast Conference. California, Stanford, and Washington were picked to finish at the top of the Pacific Coast Conference.
Oregon State's returning lettermen Bud English and Bob Rambo each enlisted in the off-season. It was reported that English probably would have been all-conference had he not enlisted. Frank Chase had a summer job at a defense plant. He was told that he probably would be drafted, if he left, so he stayed at his job rather than attempting to rejoin the team in 1941. Galen Thomas, similarly was told that he would likely be drafted, if he attempted to rejoin the team in 1941, so he enlisted in a civilian pilot program in 1941. Gene Gray was drafted but sought and was awarded a deferment, allowing him to play the 1941 season. One of the other late additions to the team was Ken Wilson. Wilson was suspended the previous season by the Pacific Coast Conference but was reinstated before the season began. Oregon State's starting quarterback, Frank Parker, returned in 1941. However, Lon Stiner moved Parker to guard.
Leland Gustafson injured his knee shortly before the season began and was out until the Stanford game.
The first three games on Oregon State's schedule in 1941 were a road game at Southern California, versus Washington in Portland, Oregon, and a home game against Stanford. On the Beavers' front-loaded schedule, one columnist wrote that "It would be a miracle if Oregon State wins one of its first three games."
Southern California
Southern California's head coach from 1925-1940 was Howard Jones. Jones unexpectedly died of a heart attack on July 27, 1941 at the age of 55, so J.M. "Sam" Barry, Southern California's basketball and baseball coach, took over the team in 1941. The Trojans were two years removed from winning consecutive Rose Bowls against teams that were previously unbeaten, untied, and unscored upon (Duke in 1939 and Tennessee in 1940). The Beavers were the first team to play the Trojans with Barry as head coach. Barry kept his practices secret, so the Beaver coaching staff went into the game without any information about what the Trojan offensive and defensive strategies.
Southern California's Bob Robertson fumbled a punt in the first quarter at the Trojan four. Oregon State's Joe Day fumbled on the subsequent drive. However, after a poor punt, the Beavers took over at the Trojan 27. Don Durdan threw a five-yard pass to Bob Dethman. Dethman immediately reciprocated, throwing a 22-yard pass to Durdan for a touchdown less than five minutes into the game. Warren Simas kicked the extra point for a 7-0 lead. Oregon State intercepted a Robertson pass inside the Beaver five to preserve the 7-0 first quarter lead. In the second quarter, Southern California partially blocked an Oregon State punt. With less than five minutes left in the first half, Robertson threw a 22-yard touchdown pass to Doug Essick to tie the game at seven. Oregon State responded, driving down to the Trojan 15, but the Beavers' 32-yard field goal was blocked.
Southern California had the best drive of the third quarter but was stopped short on fourth down. In the fourth quarter, Oregon State twice drove deep into Trojan territory. On Oregon State's best second half drive, the Beavers drove down to Southern California's three before the Trojans stopped the Beavers on fourth-and-goal. Aided by a personal foul, the Trojans drove for a touchdown on a five-yard pass from Ray Woods to Essick a foot from the back of the end zone with 13 seconds left to go up 13-7. A Beaver lineman fumbled the following Trojan kickoff and a Southern Californian recovered the fumble to clinch a Trojan victory. In the loss, the Beavers had 21 first downs to the Trojans' 10, 194 passing yards to the Trojans' 86, 244 total yards to the Trojans' 230.
The game has been hailed as the "crowning glory" of Southern California's 1941 campaign. Robertson was selected seventh overall in the 1942 NFL Draft. Center Bob deLauer was selected 82nd overall.
Washington
Washington returned to Oregon to play Oregon State for the first time since 1923. The Huskies would not agree to play south of Portland until 1966, limiting the Beavers' homefield advantage. In 1940, the Huskies defeated the Beavers 19-0, Oregon State's largest road loss since 1936. The Beavers had not won a game against the Huskies in the State of Oregon in 20 years.
In the second quarter, Oregon State took the ball after a touchback. On the first play, the Beavers ran a reverse to Don Durdan. Durdan ran for 20 yards, juked four Husky defenders, and then ran the final 60 yards for a touchdown. Second-string quarterback, Warren Simas, kicked an extra point for a 7-0 lead with 12:15 left in the first half. At the time, the 80-yard Durdan run was the longest offensive play in Oregon State history. On the last play of the first half on fourth down at their own 33 yard-line, the Beavers opted to punt. Durdan kicked a 47-yard punt. Washington's Ernie Steele broke into the open field. On his way to the end zone, he slowed to allow blocking protection to form. Steele's change-of-pace allowed Oregon State's Joe Day time to drag down Steele from behind at the Beaver 27 to save a potential Husky touchdown.
Washington's first threat of the second half ended on downs in the third quarter inside Oregon State's 35. In the fourth, the Huskies took over at the Beaver 48. Washington drove 45 yards on eight plays. On 2nd-and-goal, the Huskies' Neil Brooks went over left guard. Durdan tackled him one foot short of the end zone. Durdan hit Brooks so hard that Brooks had to be carried off of the field. Durdan, however, was also hurt and had to come off, as well. On the next play, Bob Erickson dove into the end zone for a touchdown to cut the lead to one. On the extra point attempt, Chiaki "Jack" Yoshihara almost blocked the extra point. In attempting to kick around the hard-charging Yoshihara, Washington's kicker, Elmer Berg, pushed the kick wide, preserving Oregon State's 7-6 lead with 6:44 left in the game. On a subsequent Beaver drive, Choc Shelton filled in for the injured Durdan and took his only punt of the game, pinning the Huskies at their own three with 2:30 left in the game. Washington called a pass play, but Erickson's pass fell incomplete in the end zone for an automatic safety, cementing a 9-6 Oregon State victory. The Huskies had nine first downs to the Beavers' five, but Oregon State outgained Washington 210-173. Durdan was the leading ground-gainer for both teams, amassing 106 yards on 10 carries. Oregon State finished 2/7 on pass plays with an interception. Washington finished 3/8 on pass plays with two interceptions. Most of the Huskies' yards and all of the Huskies' completions came on their long drives in the third and fourth quarters.
Even with the loss, Washington would go on to be ranked as high as #20. Steele was selected 81st overall in the 1942 NFL Draft. Washington's guard Ray Frankowski was selected 24th, end Earl Younglove was selected 43rd, and back Jack Stackpool was selected 83rd.
Stanford
In 1940, Stanford hired Clark Shaughnessy. Shaughnessy implemented the "Model T" offense, a more-advanced version of the Chicago Bears' "Pro T" formation. The "Pro T" itself was rarely used at the time and never with Shaughnessy's modifications. The resulting Indian team was nicknamed the "Wow Boys." Stanford went a perfect 10-0, securing the national championship. The Indians beat the Beavers 28-14 in 1940, scoring more points on Oregon State's defense than any team in the past four years. Stanford's All-American quarterback, Frankie Albert, returned for his senior year and led the Pacific Coast Conference in passing and total yardage. The Indians fielded the best offense in the Pacific Coast Conference. Stanford entered on a 13-game winning streak, having defeated Oregon 19-15 and UCLA 33-0 to start the 1941 season. Don Durdan, who was injured in the Washington game, returned to play against the Indians. Leland Gustafson, who was injured before the season began, was cleared to play in his first game of the season. For the first time in 1941, the Beavers were at full strength. The game was a sellout, Oregon State sold 22,000 tickets for the 21,000-seat stadium. It was the highest-attended game ever in Corvallis. The game was played in a thunderstorm.
In the first quarter, Oregon State drove 58 yards with the big play being an 18-yard gain on a Don Durdan reverse. On fourth-and-five at the Stanford eight, Warren Simas kicked a 26-yard field goal to put Oregon State up 3-0 less than seven minutes into the game. The Indians breached the Beavers 25 yardline twice in the second, once in the third, and twice in the fourth quarters but failed to score each time. Stanford's first drive inside the 25 started at its own 18 at the end of the first quarter. The Indians drove to the Beaver 23 in the second quarter before a 15-yard penalty and a four-yard loss on a fumble pushed Stanford back. On 4th-and-25 at the Beaver 38, the Indians were forced to punt. With about a minute left in the half, Stanford's All-American quarterback Frankie Albert hit Fred Meyer on a 43-yard pass play to give Stanford a first down at Oregon State's 23. Albert appeared to complete another pass to Meyer at the one, but Meyer was out-of-bounds, which nullified the 22-yard gain. Albert's next pass was intercepted by Choc Shelton at the 10.
The Indians picked right up in the third quarter, driving 50 yards to the Beaver 20 before turning the ball over on downs. Later in the third quarter, Quentin Greenough set up an Oregon State drive by recovering a Stanford fumble at the Indian 14. Bob Dethman converted one fourth down on the short drive down to the Indian three. The three subsequent plays netted only one yard, but Dethman ran the remaining two for a touchdown on fourth-and-goal to put the Beavers up 10-0. In the fourth quarter, Oregon State intercepted an Albert pass and returned it to the Stanford nine. However, the Indians held at their own four. Stanford drove down to the Oregon State 18, but Dethman ended the threat with an interception at the Beaver eight. The Indians' final drive started inside the Beaver 30 after a fumble late in the game, but Stanford ran out of time, allowing Oregon State to escape with a 10-0 win. The game was hardfought. The Beavers' Greenough dislocated his fibula in the fourth quarter. The injury was so severe that he finished the game in the hospital. It was initially believed that it would take Greenough at least six weeks to recover. However, Greenough would rush back after missing only two games. George Zellick also was injured and would miss the next game, as well. Durdan injured his left hand and was not 100% until the UCLA game.
With Oregon State's win, the United Press named Lon Stiner the coach of the week.
The initial Associated Press rankings came out two days after the game, ranking the Beavers 16th, their highest ranking since starting 5-0 in 1939. The next week was a bye for Oregon State. The Beavers dropped two spots over the bye weekend. Stanford would be ranked as high as #6 on the season, even with the loss. Albert finished third in the Heisman balloting in 1941 and was selected 10th overall in the 1942 NFL Draft, 109 picks in front of Heisman Trophy winner, Bruce Smith. Meyer was selected 103rd. Stanford's halfback Pete Kmetovic was selected 3rd, and the Indians' center, Vic Lindskog was selected 13th.
Washington State
Quentin Greenough and George Zellick were injured and missed the game. The first quarter was played in a fog. Washington State's Billy Sewell led the nation in passing in 1940. However, unknown to Oregon State, Sewell had injured his throwing arm prior to the game. Without that information, the Beavers started the game with a five-man front to counter Sewell's passing threat. The Cougars won the coin toss and kicked. Oregon State's drive stalled, and Durdan punted out of bounds at the Washington State 14. The Cougars immediately drove 86 yards all on the ground for a touchdown and 7-0 lead on a four-yard run. In the second quarter, Washington State drove down to the eight, but George Peters ended the threat by intercepting a pass at the three-yard line. In the first five minutes of the fourth quarter, after an interception, the Beavers drove 30 yards down to the Cougar three, but Gene Gray was tackled short of the end zone on fourth down. Oregon State's final drive ended on a fourth down carry by Bob Dethman, which was stopped short of the line to gain.
The Cougars would win the next four to finish the season ranked #19. Sewell was selected 53rd overall in the 1942 NFL Draft.
Idaho
On Halloween night, there was a practice blackout in Corvallis in preparation for a potential invasion. Only emergency cars were allowed on the road past curfew. In the first quarter, Idaho stopped Oregon State at the Vandal 21. Later in the quarter after an Idaho punt, Oregon State put together two consecutive first downs for 22 yards down to the Vandal 37. From there, Joe Day went over left tackle and broke multiple tackles on a 37-yard touchdown run with four minutes left in the first quarter. Warren Simas kicked the extra point to put Oregon State up 7-0. Five minutes later, after Everett Smith pinned the Vandals at their own 13, Smith intercepted an Idaho pass at the Vandal 36 and returned it to the 28. Three plays netted two yards, but Gene Gray scored on a 26-yard run on a delayed fake reverse. Simas again kicked the extra point to put the Beavers up 14-0. Idaho racked up most of its yards on one 55-yard drive in the first half. The Vandals' drive ended on an incomplete fourth-and-seven pass at the Oregon State 11.
In the second half, all of the Beaver starters were substituted out. Backup Bill McInnis intercepted a Vandal pass at the Idaho 40 and returned it for a touchdown. Simas converted the extra point to put Oregon State up 21-0. Smith, who had started the second touchdown drive with an interception, scored the next touchdown. Simas missed his first extra point attempt of the season to leave the score 27-0. Jim Busch scored the Beavers' fifth touchdown for a 33-0 lead. Oregon State opted to try and pass for the extra point, but the pass fell incomplete. In the final minutes, the Vandals's Howard Manson threw a 40-yard pass to Jack Tewhey down to the Beaver two. Idaho received a timeout penalty, and the drive ended after an incomplete pass. Oregon State finished with 209 yards rushing to Idaho's 12. The Beavers finished with 255 yards, and the Vandals finished with 89 yards, the second-fewest yards that Oregon State had allowed up until that time (only behind the 1939 Beaver-Vandal game. Outside of the 55-yard first half drive and the 40-yard fourth quarter pass, the Beavers held the Vandals to -6 total yards. Idaho only recorded seven first downs, five through the air and two by penalty. The Vandals did not net a single rushing first down.
UCLA
Entering the game, Oregon State had never defeated UCLA in the State of Oregon. The game was homecoming for Oregon State. After the success of Stanford's "Model T" formation in 1940, the Bruins adopted the "Q-T" formation. Quentin Greenough returned to start his first game since the Stanford game. After the teams traded punts, Oregon State drove inside the UCLA 10 on a 25-yard Durdan run. Dethman subsequently fumbled, and Bob Waterfield recovered. The Beavers started their next drive on their 35 and drove 65 yards for a touchdown. On fourth down, Durdan threw a six-yard touchdown pass to Norm Peters with 3:20 left in the first quarter. Warren Simas' kicking woes continued with a second consecutive missed extra point. UCLA's Ted Forbes returned the kickoff 50 yards to the Oregon State 45. The Bruins put together three first downs down to the Beaver 12. Forbes ran for nine. Leo Cantor was stopped for no gain and then lost three. Waterfield's fourth-down pass fell incomplete for a turnover on downs. UCLA's defense held, but Forbes fumbled the punt, and Greenough, in his first game back in four weeks, recovered at the Oregon State 45. Durdan ran for 25 yards. Joe Day subsequently ran for 15 yards down to the Bruin two. On the subsequent set of downs, Day fumbled, but Durdan recovered the fumble for a touchdown. Simas missed his third consecutive extra point to keep the score 12-0 Beavers.
Early in the third quarter, Oregon State drove to the UCLA 15 but turned the ball over on downs. Two plays later, Durdan intercepted Waterfield's pass at the UCLA 23. Choc Shelton ran for a yard. On the next play, Durdan made a diving catch of a 22-yard Bob Dethman pass for a touchdown. Simas converted the extra point for a 19-0 Beaver lead. Soon afterward, the Bruins drove to the one-yard line. Al Solari was stopped short of the end zone, Waterfield's second-down pass fell incomplete, and two Cantor carries were also stopped short of the end zone for a turnover on downs. Oregon State had the best drive of the fourth quarter, but neither team dented the other team's 25 yard-line for the rest of the game. The Beavers had more than twice as many yards, outgaining the Bruins 385-190 yards. With the win, Oregon State jumped from eighth to third in the conference standings, remaining one game behind Stanford.
California
California's star was Bob Reinhard, primarily a tackle, who also played fullback and punted. In the second quarter, a roughing penalty gave Oregon State the ball at the California 33. The Beavers drove 32 yards, but Choc Shelton fumbled into the end zone, and the Bears recovered, ending both teams' best scoring threat in the first half. In the third quarter, California drove 53 yards to the Oregon State four. The Beaver defense held three times, and the Bears missed their field goal attempt. Later in the third quarter, Reinhard could only manage an 11-yard punt, giving the Beavers the ball at the Bear 35. Joe Day ran for a first down at the 11. Day then ran for nine. Everett Smith ran the final two for a touchdown. Warren Simas missed the extra point, but Oregon State held on to win 6-0.
That day, Washington State defeated Stanford 14-13. The Indians' Albert missed a third quarter extra point for the final margin. With the win and the Indian loss, the Beavers moved to the top of the conference race. Reinhard was selected 34th overall in the 1942 NFL Draft.
Montana
The game was the first, last, and only time that Montana and Oregon State played in Portland, Oregon. The Oregon State game was the final scheduled game of the year for the Grizzlies. 10,000 fans were expected but, due to rain, only 6,000 showed up to watch. With 11:30 left in the first quarter, Dethman threw a 16-yard pass to Durdan, who ran the remaining 55 yards for a 71-yard touchdown pass. Oregon State failed to convert the extra point to leave the score 6-0. The touchdown pass was Oregon State's longest of 1941 and was the longest Oregon State pass-play between 1929 and 1947. At the end of the first half, the Beavers drove 54 yards with 45 of those yards being gained by backups Bill McInnis, Choc Shelton, and Everett Smith. After Montana stopped three carries inside of the five, McInnis powered in a touchdown from the one-foot line with one minute left in the half. Warren Simas kicked the extra point to put the Beavers up 13-0.
In the third quarter, after a poor punt gave the Oregon State the ball at the Montana 36, Day, Dethman, and Durdan combined to drive 36 yards with Day going over right tackle for the touchdown. Dethman kicked the extra point to put the Beavers up 20-0 with eight minutes left in the third quarter. In the fourth quarter, Oregon State's backups drove 64 yards for a final touchdown, Bob Libbee carrying twice for 15 yards and then three yards for the touchdown. Busch kicked the extra point to put the Beavers up 27-0. After the touchdown, the Grizzlies began to drive, netting three of its four first downs in the game. Montana drove down to the seven with less than a minute left before Parker ended the final Montana threat with an interception. Oregon State had 17 first downs to Montana's 4. The Beavers out-gained the Grizzlies 312 yards to 95. The 95 yards that Oregon state allowed were the third-fewest yards allowed by the Beavers in team history and second fewest in 1941. Montana was 7/21 passing for 58 yards. Oregon State was 6/9 for 120 yards. The two teams combined for five interceptions. The Beavers also wound up out-punting the Grizzlies.
On the Tuesday after the game, the first boats that would compose the Kidō Butai that would attack Pearl Harbor began leaving Japanese territory bound for Oahu. The following day, the six carriers of the Kidō Butai began leaving the Kuril Islands bound for Oahu as well.
Oregon
In 1940, Oregon defeated Oregon State 20-0. The 20-point loss was the Beavers' largest in the series between 1916 and 1955 and would remain the largest in the series in Corvallis, Oregon, until 1958, the final year of the Pacific Coast Conference. Parker Stadium replaced Bell Field as Oregon State's home field during the 1953 season, so it remained the largest loss in the series at Bell Field after the 1916 game.
The game was homecoming for Oregon. Oregon's Governor, Charles A. Sprague; Secretary of State and future Governor, Earl Snell; State Treasurer and future Governor, Leslie M. Scott; State Superintendent of Public Instruction, Rex Putnam; and President of the Senate, Dean Walker, were in attendance, as were the Presidents of Oregon, Donald Milton Erb, and Oregon State, Francois Archibald Gilfillan. The largest Civil War train was assembled. 18 cars carrying more than 800 fans rolled down from Portland to Eugene to watch the game. The 800 fans guaranteed that overflow seating was required. 20,500 fans packed into 20,000-seat Hayward Field. The Webfoots' line outweighed the Beavers' line by an average of 16 pounds.
Dethman was named Oregon State's captain for the game. In the week before the game, Durdan had recovered from a bout with influenza. Glenn Byington, Boyd Clement, and George Peters had each spent three days in the infirmary.
Stiner finished his pregame speech by saying, "This one is frosting on the cake. If you win, you got it all." Someone on the outside of Oregon State's locker room said, "Two minutes, Mr. Stiner." Stiner jiggled the doorknob and indicated that the doors were locked. Stiner said, "They are not going to keep us in here!" He then proceeded to burst through the doors, knocking them off of their hinges.
The first half was played in a fog. With limited visibility, the first five drives ended in punts. Oregon's Bob Koch appeared to fumble at the Webfoot 31, but the play was blown dead. The drive ended in a punt, which Durdan returned to the Oregon State 35. Dethman almost scored a touchdown after hauling in a 23-yard pass from Durdan, but Dethman was tackled by the final Oregon defender at the Webfoot 37. After the drive petered out, Durdan pinned the Webfoots at the Oregon eight. The Webfoots lost five yards and punted out at the Oregon three. The Webfoots' punter, Curt "Curly" Mecham shanked the punt, which only traveled 21 yards. Day ran for nine yards on two plays. On third-and-one, Dethman ran for seven yards and a first down to the eight on a reverse. Day's first two carries netted five yards. Durdan ran inside the two. On fourth-and-goal, Dethman was stopped short of the end zone inside the Webfoot one. The next three drives ended on punts. Oregon State subsequently had first-and-ten at the Oregon 36, but Day fumbled. Four plays later, after the Webfoots converted their third and final first down, Simas became the first player all season to intercept a Jim Newquist pass, coming down with the ball at the Beaver 41. Oregon State would hold Oregon without a first down for the rest of the game. George Zellick came up with a circus catch of a Durdan pass to give Oregon State the ball inside of the Oregon 35, but Durdan fumbled on the next play, which ended both teams' last best opportunity of the first half.
A brisk south wind picked up in the second half, driving away the first half fog. Shelton returned the second half kickoff 16 yards for a first down at the Oregon State 19. On the first play from scrimmage, Durdan faked a pass to "sift off" the defensive end and then broke six tackles on a 35-yard run. However, the drive petered out at the Oregon 42. After exchanging punts, Dethman returned Mecham's punt 15 yards for a first down at the Webfoot 38. Durdan subsequently threw an 11-yard pass to Zellick for a first down at the Oregon 18. Shelton ran for no gain. Mecham, however, was flagged for roughing for throwing a punch, which gave the Beavers a first down at the three. Dethman and Durdan each ran for no gain, but Shelton ran for three yards off right guard for a touchdown to put Oregon State up 6-0 with 7:25 left in the third quarter in a hole that Shelton would later refer to as "Pasadena Avenue." Simas' extra point attempt was blown wide by the wind. The next three drives ended in punts. Durdan fumbled at the Beaver 20, and the Webfoots recovered at the Oregon State 13. Greenough forced a fumble on the first play, which Oregon recovered for a loss. The Webfoots wound up losing six on the drive and turned the ball over on downs after two incomplete passes at the Beaver 19. Oregon State's drive petered out, and the Beavers punted on the final play of the third quarter.
Oregon's first offensive play of the fourth quarter was a 53-yard Mecham touchdown run. Newquist kicked the extra point to put the Webfoots up 7-6 with 14:45 left in the game. Oregon State's defense did not allow Oregon's offense to move the ball beyond its own 33 for the remainder of the game. The teams traded punts. The Beavers started their next drive at their own 40. Durdan threw to Zellick inches short of a first down. After an incomplete pass on second down, Day ran for a first down just inside Webfoot territory. Durdan passed to George Peters for 13 yards. Dethman ran for nine more down to the 29 to bring up a second down with less than a yard to gain. Day then ran over right tackle and appeared to be stopped before jumping to the right and into the clear. Newquist dove at Day at the five, but Day shrugged him off and ran all 29 yards for a touchdown and a 12-7 Oregon State lead with 11:40 left. Simas' extra point attempt was blocked. En route to the game, Day's parents' car broke down. Day's parents, though, were able to make it into the game shortly before Day's 29-yard touchdown run. The Webfoots' final drive started at the Oregon 25. After Newquist's first down pass fell incomplete, the Webfoots ran a play that involved four separate laterals. Ray Segale fumbled a lateral from Arnold "Duke" Iverson, which Zellick recovered at the Oregon 27. On fourth-and-eight, Durdan ran for nine and a first down with a minute left. Shortly thereafter, the weather finally broke, and it began to rain. The Beavers drove down to the seven, where the game ended. Oregon State finished ahead in pretty much every statistical category: first downs, 12-3; rushing yards, 252-126; passing yards, 99-37; and total yards, 351-163. Mecham's 53-yard run accounted for more than 40% of Oregon's rushing offense.
With the 12-7 win, the Beavers won the first Pacific Coast Conference football championship in Oregon State history. Mecham was selected 22nd overall in the 1942 NFL Draft.
After the Civil War
On the night after the game, Oregon State received all 10 Pacific Coast Conference votes to represent the Conference at the Rose Bowl. After being voted to represent the Conference, Oregon State was responsible for selecting and inviting the opposing team. The Western Conference, forerunner of the Big Ten Conference, did not permit their teams to play in bowl games until the Pacific Coast Conference entered into its 1946 agreement with the Western Conference. #1 undefeated and untied Minnesota thus chose to decline Oregon State's offer to play in the Rose Bowl. Notre Dame similarly refused to accept all bowl invitations between 1925 and 1970. So, #3 undefeated Notre Dame also chose to decline Oregon State's offer to play in the Rose Bowl. The best team in the country that might accept was #2 undefeated and untied Duke. However, the Blue Devils' head coach, Wallace Wade, had rubbed a lot of Westerners the wrong way by failing to congratulate Southern California's quarterback, Doyle Nave, and then subsequently stating that he would never bring another team to the Rose Bowl ever again. Most of the West Coast media championed Missouri with Fordham as a suitable alternative. Stiner advocated for Missouri, his former rival at Nebraska. The players generally favored inviting Fordham. Unknown to Oregon State, however, both #6 Fordham and #7 Missouri each received take it or leave it offers to the Sugar Bowl at approximately 2:00 a.m. on November 30. Both accepted the Sugar Bowl's offer. #4 Texas and #9 Texas A&M were informed that they would be considered for an invite to the Rose Bowl but would have to cancel their game with Oregon and Washington State, respectively, to avoid the chance of an upset. The Aggies and Longhorns informed the Beavers that they would honor their contracts. Unable to invite any top-seven team other than Duke, the Beavers officially invited the Blue Devils shortly after Oregon State received information that Fordham and Missouri had accepted bids to the Sugar Bowl. Duke accepted the invitation the next day on December 1. On December 2, Admiral Yamamoto sent the six carriers of the Kidō Butai the transmission, "Climb Mount Niitaka," the final order to attack Pearl Harbor. On December 3, The state threw the Beavers a big banquet at Portland's Multnomah Hotel. Governor Charles Sprague was one of the speakers, as was Secretary of State and future governor, Earl Snell, and the Mayor of Portland and Oregon State graduate, Earl Riley.
Four days later, on December 7, 354 planes from the six carriers of the Kidō Butai took off and attacked Oahu for 90 minutes in two waves. Japan declared war later in the day. The United States of America declared war on Japan the following day. With the United States' entry into World War II, there was concern about a Japanese attack on the West Coast of the United States. Much discussion focused on the possibility of an attack where any crowds might gather. The Rose Parade and its estimated one million spectators, as well as the Rose Bowl with 90,000 spectators, were presumed to be ideal targets for the Japanese. On December 13, 1941, Lieutenant General John L. DeWitt, commander of the Western Defense Command, recommended that the Rose Parade and Rose Bowl festivities be canceled. By December 15, the Tournament of Roses committee decided to cancel the game. Soon afterward, the government banned all large gatherings on the West Coast. This ruled out Bell Field, Oregon State's on-campus venue, and Multnomah Stadium, the largest football stadium in Oregon at the time, as alternative venues for the game. In order to ensure that the game would not be played in Pasadena, DeWitt ordered some army engineers to bivouac at the Rose Bowl.
On December 15, 1941, Duke University invited the game and Oregon State to Duke's home stadium in Durham, North Carolina. Oregon State chose Durham over Atlanta, Georgia; Baton Rouge, Louisiana; Chicago, Illinois; Kansas City, Missouri; Memphis, Tennessee; Oklahoma City, Oklahoma; and Washington, D.C.
At the time, Duke Stadium was the second-largest in the South but still could only hold 35,000 people. In order to accommodate the larger crowd expected for the Rose Bowl, bleachers were brought in from the University of North Carolina at Chapel Hill's Kenan Stadium and North Carolina State University's Riddick Stadium to seat an additional 20,000 people. All 58,000 tickets sold out to the game in three days. Bing Crosby reportedly bought 271 tickets. It is unclear whether Crosby attended the game. Although Duke generally reserved a small segregated block of tickets for African-Americans, Duke initially decided to not allow African-Americans to attend. After an article in Durham's African-American newspaper, the Carolina Times, claimed that Duke would sell tickets to Japanese-Americans but not African-Americans, Duke reversed its decision and, despite the game already having officially sold out, released 140 tickets to African-American fans in a segregated section.
Oregon State practiced in the rain until 5:45 p.m. on December 19, 1941, before driving to Albany. The train left Albany with 34 players on December 19, 1941, just three days after Duke University invited Oregon State. The train left 40 minutes late, causing the Portland Rose, the train in Portland, Oregon to be delayed. Greenough was suffering from the flu and was taken on a stretcher from the first train to the Portland Rose. When the Oregon State players boarded the Portland Rose, the train was unofficially renamed the Beaver Express. As the train pulled away from Portland train depot, standing on the platform was Yoshihara. Yoshihara had immigrated to the United States of America at the age of three on the last ship allowed into the United States before the United States put a moratorium on Japanese immigration. By executive order, no Japanese-Americans were permitted to go more than from their homes. Multiple FBI agents informed Oregon State coach, Lon Stiner that no exception would be made for Yoshihara. Teammates, students, and President Gilfillan protested the decision. President Gilfillan attended a meeting with student body president and football player, Andy Landforce, and the campus ROTC commandant. The meeting ended with the commandant stating, "The United States of America is at war, and the president's executive order will be carried out." Yoshihara, the Beavers' 34th player, watched the train leave Portland from the platform without him on it. Yoshihara would listen to the 1942 Rose Bowl on his radio. The train had to wait 40 minutes to allow the Oregon State players to board. In Hood River, Bob Dethman's family and friends greeted Bob. Alfred Dethman boarded the train to say goodbye to his son, wish him luck, and leave two boxes of apples on the train. Marvin Markman's family and friends greeted the team in The Dalles. The next day, Choc Shelton, suffering from laryngitis, got up before dawn to say goodbye to his father in La Grande. In Baker, George Bain and Martin Chaves' families and friends said goodbye. In Boise, Idaho, Stiner had the team run sprints up and down the station platform to get some exercise. Later that day, as the train sped by Glenns Ferry, Idaho, the 11 seniors voted unanimously to name Chaves the team captain for the game. Chaves had been drafted and was supposed to report for service in the United States Army Air Corps on January 24. As such, he would not be returning to school in 1942. Chaves was the only non-senior to be named a captain in 1941. By the time the train reached Pocatello, Idaho, the train was two-and-a-half hours behind schedule.
The next day, Lon Stiner met his dad in Grand Island, Nebraska. In Omaha, Nebraska, members of the University of Nebraska's N Club, composed entirely of former varsity lettermen, gave Stiner a good luck horseshoe. On December 22, 1941 at 8:45 a.m., 63 hours after leaving Corvallis, the Beaver Express arrived in Chicago. The University of Chicago had stopped playing football in 1939, so Oregon State used Chicago's Stagg Field. The train with the Beavers' equipment and uniforms did not arrive by practice time, so Oregon State players wore maroon warmups borrowed from the University of Chicago during kicking and passing drills. The equipment and uniform train arrived just in time for Martin Chaves, Bob Dethman, Donald Durdan, and Joe Day to dress in full pads for press pictures.
The 1942 NFL Draft was held on December 22, 1941 in Chicago, Illinois. Duke's All-American fullback Steve Lach was selected 4th overall. Dethman was drafted 20th overall. Duke's quarterback, Tommy Prothro, was selected 58th overall. Bill Halverson and George Peters were selected 63rd and 66th overall. Duke's All-American center and team captain, Bob Barnett, was selected 118th.
Oregon State left Chicago at 4:00 p.m. on December 22, 1941, on the Capital Limited. The next day, Oregon State stopped in Washington, D.C., to view the Capitol, the Washington Monument, Arlington National Cemetery, and Mount Vernon and for practice at Griffith Stadium, home of the Washington Redskins and Senators. Stiner intended to hold a full scrimmage, but Bain injured his foot on broken glass that had not been cleaned up, so Stiner decided to hold a conditioning workout instead. The train left from Washington, D.C. around 10:40 p.m. The Beaver Express finally stopped in Durham at 8:15 a.m. on December 24, 1941, 110 1/2 hours after leaving Corvallis. 2,000 people were on hand to greet the Beavers. The Durham High School band played "Hail to Old O.S.C." Mayor W.F. Carr made Chaves an honorary mayor of Durham. Oregon State travelled to the Washington Duke Inn to eat a breakfast sponsored by the Chamber of Commerce. After the breakfast, the Beavers travelled to the Carolina Inn in Chapel Hill. Oregon State practiced at the University of North Carolina's Kenan Stadium. Durdan sprained his wrist in the first scrimmage. The Beavers were back in Durham for Christmas dinner. Each Oregon State player was given a walking stick, three cartons of cigarettes, a pack of tobacco, a sack of biscuit flour, ties, suspenders, shorts, a box of silk stockings, two pairs of silk socks, and pillowcases. On the 27th, the Beavers scrimmaged again. Bill Halverson was so ill that he was confined to his bed for the day. Norm Peters went out with a back injury and Orville Zielaskowski was hospitalized with a head injury. Stiner allowed Oregon State to go to Pinehurst on the 28th. At a polo game at Pinehurst, a polo player, Frank McCleur's horse spooked and threw him into a tree, killing him instantly in full view of the Beavers. Oregon State practiced for the last time at Kenan Stadium on the 30th.
To simulate Oregon State, Duke was practicing against what Brian Curtis of Sports Illustrated would call "the most talented scout team in the country." It included Duke graduate George McAfee of the Chicago Bears to simulate Oregon State's Donald Durdan, as well as Duke graduate Jap Davis, the older brother of Tommy Davis, and North Carolina State senior Dick Watts.
On January 1, 1942, in Pasadena, the Rose Bowl Court and Queen, all clad in regular street clothes, drove down a deserted Colorado Boulevard, and later to a reception at the Huntington Hotel.
Duke
Duke and Oregon State had never met in football. The Blue Devils were the nation's leader in total offense and second in the nation in scoring. Duke's defense was the seventh-best in the nation and had not allowed more than 14 points all year. Duke's All-American fullback, Steve Lach, was also the nation's second-best punter. The Blue Devils were averaging a 30-point victory every time they took the field. In each game, Duke won by at least 13 points. The Blue Devils were on an 11-game winning streak, having gone 24-3 (all three losses on the road), and .889 winning percentage, since their 1939 Rose Bowl defeat. Duke's last loss in Durham, North Carolina, was more than four years prior. The Blue Devils were expected to win by more than two touchdowns and went off as a 4-1 favorite. Some wondered why Oregon State would even make the trip. On the day of the game, the 38-page special edition of the Durham Morning Herald predicted that the Blue Devils would defeat the Beavers 34-6. Oregon State's offensive line outweighed Duke's offensive line by nine pounds.
Before the game, the NBC announcer that called the game, Bill Stern, asserted that the Blue Devils could beat the Beavers by throwing 11 helmets on the field. The comment was heard by members of the Oregon State team at the hotel. After the game, George Zellick told reporters that the team was "hopped up" to win the game based on Stern's comment. One of Oregon State's players, third-string halfback Andy Landforce, dressed for the game. However, Stern knew little about the Beavers and only one Far West writer made the trip, so Stern requested that someone from Oregon State work in the booth as a color commentator. Assistant coach Jim Dixon selected Landforce to represent the Beavers in the booth. So, Landforce dressed down and went to the booth to call the game. The weather seemed to favor the visitors. One Duke player claimed that there was more rain than he had ever seen. Another said that the weather could not be worse. The Beavers' Landforce described the weather as "a beautiful gray day." Gene Gray, looking up at the same sky, described the weather as "misty." The temperature was a hair over 40 degrees at kickoff. The precipitation stopped partway through the first period, but it had rained for the 10 hours prior.
After Oregon State boarded the bus, Stiner did not allow the driver to drive until after he expressed to the Beaver players his opinion that Duke would "smash" Oregon State. Partway between Chapel Hill and Durham, Stiner had the driver and police escort purposefully "get lost." Stiner then staged a shouting match between him and one member of the police escort. Even with Stiner's theatrics, the Beavers still arrived on time for the game. The referee that was supposed to handle the opening coin flip was Lee Eisan. Eisan was the second-string quarterback for the 1929 California Golden Bears, who lost the Rose Bowl 8-7 to Georgia Tech after Roy "Wrong Way" Riegels ran 69 yards the wrong direction to set up the game-winning Georgia Tech safety. Eisan made a less often talked about blunder. In the third quarter, trailing 8-0, California ran an end around pass on fourth down. The end around sucked all of the Georgia Tech defenders in. Eisan used the misdirection to get behind the defenders and might have scored a touchdown but lost his balance and failed to make the catch. Eisan could not find a silver dollar in North Carolina, so he borrowed a 50-cent piece from Oregon State's captain, Martin Chaves. The Blue Devils won the toss and elected to receive. Before kickoff, there was a moment of silence to honor those lost at Pearl Harbor 25 days before.
Oregon State's Norman Peters kicked the opening kickoff. Duke's Tommy Davis collected the ball at his own six-yard line. He was crushed by the Beavers' Lloyd Wickett and two other Beavers and fumbled at the Blue Devil 28. George Peters recovered at Duke's 29. Dethman passed to George Peters for three yards. Durdan's second down pass was incomplete. Durdan then broke multiple tackles on a six-yard run to set up a fourth-and-one at the Blue Devils' 20. Dethman passed to George Peters again for three yards and a first down. Day ran for two yards. Durdan again threw incomplete. On third-and-eight, Durdan ran for a yard down to Duke's 14. Prothro then batted down Oregon State's fourth-and-seven heave to the end zone for a turnover on downs. The teams traded possession most of the first quarter. After the rain stopped, the Beavers drove 33 yards to the Blue Devil 19. Durdan converted one fourth-and-one on the drive. Oregon State managed four yards on the first two plays. On third-and-six at the Blue Devil 15, Oregon State's Donald Durdan went back to pass. With no receiver open, he pump faked and then went off right tackle, walking into the end zone almost untouched. Warren Simas kicked the extra point to put the Beavers up 7-0 with 1:40 left in the first quarter.
With 11 minutes left in the half, Davis ran 29 yards. A few plays later, Lach ran 25 yards on a reverse. Lach almost ran for a touchdown but Gene Gray was able to drag down Lach from behind at the Oregon State nine. On third-and-goal at the four, Lach ran four yards on a reverse. Bob Gantt's extra point tied the game at seven. Oregon State's ensuing drive resulted in an interception at the 46, which was returned to the Beaver 27. On third-and-nine, the Blue Devils had a wide open receiver behind the Beaver defense, but the pass was just beyond the receiver's outstretched fingertips and fell incomplete. Duke ultimately turned the ball over on downs. The Blue Devils would threaten again late in the first half after an Oregon State fumble gave Duke a first down at the Beaver 32. Two plays later, though, the Oregon State defense forced a fumble after a sack, which was recovered by the Beavers. As the half was coming to a close, Duke drove to the Oregon State 42. Two passes were dropped by Blue Devil receivers. Duke's Bobby Rute caught the third at the Beaver 10 and advanced it to the Beaver 5. However, the Blue Devils were unable to get a play off before the halftime whistle sounded, and the teams jogged off the field tied 7-7.
Major Swede Larson, Navy's head coach spoke with sportswriter, Grantland Rice, at halftime and said, "Duke is being hit harder and keener than at any time during the season. Duke doesn't seem to be quite used to this." Stiner told his team, "Boys, we have this one. This is our game, and when...." At that point, he was interrupted by an inebriated fan looking to urinate in the Beaver locker room.
Oregon State took the second half kickoff. After a first down, the Beavers punted down to Duke's 30. On the Blue Devils' subsequent drive, Lach ran for 21 yards on a fake punt and Davis threw to Gantt for another 16 for a first down at the Oregon State 28. On first down, Duke ran a triple reverse and lost 12 yards. After an incomplete pass, the Beaver defense sacked Davis for a seven-yard loss, which ended the threat. Lach's punt rolled out of bounds at the 15. The Beavers drove 73 yards, 42 yards coming on one Dethman to Durdan pass to the Blue Devil 27. Day picked up 11. Oregon State gained four to the Duke 12 before getting pushed back to Blue Devil 15. Simas missed the subsequent 33-yard field goal attempt. The Beavers' defense pushed the Blue Devils back to their own nine. On third down, Duke quick kicked, and the Beavers started their next drive at their own 46. The defenses, which played brilliantly for most of the game let down for the subsequent three-drive stretch. Gray ran for 24 yards down to the Blue Devils' 30. With four minutes left in the third quarter, Dethman threw a 22-yard pass to Zellick. Zellick evaded multiple tacklers to run the remaining eight yards for a 30-yard touchdown pass. Simas kicked the extra point to put the Beavers up 14-7. Duke would respond on the very next drive, getting 48 yards on two Lach reverses and 15 yards for unnecessary roughness. On the next play, the Blue Devils scored on a one-yard run by Winston Siegfried with two minutes left in the third quarter. Tommy Prothro kicked the extra point to knot the game at 14. Duke's coach, Wallace Wade, who had won the 1926 Rose Bowl while at Alabama after a comeback against Washington, remarked to an assistant that, "It looks like 1926 all over again." 1942 would play out differently than 1926. In the following drive, Durdan returned the kickoff back to the Beaver 23. Day lost six but the Blue Devils were flagged for unnecessary roughness to the 32. With less than a minute left in the third quarter, Dethman found streaking reserve halfback, Gene Gray, on a 40-yard pass. Safety Tommy Davis just mistimed an interception. Gray faked inside and went outside, which confused Moffatt Storer, the Blue Devil cornerback, so badly that he fell down. The Duke safety on the far side of the field took a good angle, but Gray was simply too fast and outran the safety the final 28 yards into the end zone. The 68-yard pass play was the longest in Rose Bowl history and would remain the longest pass play for more than 20 years. The extra point would be blocked, leaving the door open for a Duke comeback. The 20 points that Oregon State scored were the most scored on the Blue Devils since 1930, the year before Wade became head football coach. It was the most points scored against a Wade-coached team since 1928.
The 14 points that Duke scored were the most that the Oregon State's defense had given up all year. The Beaver defense seemed resolved to make sure the 20-points the offense had put up would stand up. Duke's offense would cross into Beaver territory three times in the fourth-quarter, but the Beavers would not break, intercepting two passes and recovering a fumble. After a Duke punt went out of bounds at the Oregon State two, the Beavers opted to quick kick. However, Durden mishandled the snap. Rather than attempting the punt, Durden tried to advance the ball out of the end zone, but Mike Karmazin caught Durden before Durden was able to do so for a safety with less than 10 minutes left in the game. The Blue Devils ensuing drive ended on a fumble at the Beaver 29. What appeared to be a great Oregon State return of the fumble was nullified by an inadvertent whistle. With two minutes left, the Blue Devils started a drive at their own 33. Durdan picked off a 30-yard Davis pass and returned it to the Beaver 40. On first down, Day lost five yards. Durdan ran for three yards. Rather than attempt another play on third-and-12, Durdan punted 38 yards out of bounds at Duke's 26. With less than a minute left, Rute hit Jim Smith on 28-yard pass play to give the Blue Devils a first down at the Beaver 46. Duke hurled two passes toward the Beaver end zone. Day broke up the first. The second also fell incomplete. On the final play of the game, Wade called a Lach reverse. Prothro audibled and called for a Davis pass play. Dethman came up with a game-saving interception. The Beavers won 20-16.
Oregon State outgained Duke 302-295 with a 148-73 edge in the air. The Beavers also out-punted the Blue Devils. Even factoring in the 1942 Rose Bowl, Oregon State's defense was statistically the best Beaver defense in 15 years.
After the season
Donald Durdan ran for 54 yards and a touchdown, passed, punted, and collected one interception. He was named the game's most valuable player. Bob Dethman also distinguished himself by throwing for two touchdowns and coming up with the interception that ended the game. The 1942 Rose Bowl remains the only Beavers' Rose Bowl victory. It also remains the only time the two programs have played each other.
Although many others argue that Columbia's 1934 victory over Stanford was bigger, Sid Feder of the Associated Press labeled it the biggest upset in the Rose Bowl's early history.
Referee Lee Eisan, who borrowed a 50-cent piece from Oregon State's Martin Chaves to conduct the coin flip, made it back to Berkeley, California with Chaves' 50-cent piece in hand, upset that he had failed to return the coin.
The East–West Shrine Game has been played after every college football season since 1925. The game started in San Francisco, California and, prior to 2006, would be played in the Bay Area every year, except for two years. The first year outside of the Bay Area was 1942. As a result of the prohibition against playing football in West Coast stadiums, the East–West Shrine Game was moved to New Orleans, Louisiana. The West's coach was Washington State's Billy Sewell. A little more than two months prior, Sewell and the Cougars had dealt the Beavers the Beavers' largest loss of the year, a 7-0 decision in Pullman, Washington. Oregon State attended the postgame banquet with Duke and left Durham, North Carolina, at 12:40 a.m. on January 2, 1941, bound for New Orleans. The Beaver Express left Durham and stopped in New Orleans for the game on January 3, 1942. The game ended in a 6-6 tie. Many were concerned that the East–West Shrine Game would be the last football game "in a generation." Stiner left the team in New Orleans to visit his parents in Nebraska. On the way back to Corvallis, the Beaver Express stopped in Houston and San Antonio. In El Paso, some of the players purchased alcohol, in order to last them to Tucson, because New Mexico was a dry state. Oregon State was able to visit the Rose Bowl in Pasadena, California. After a stop in Sacramento on January 7, Durdan and Simas disembarked from the Beaver Express to visit family in Northern California. Both were honored at the Vance Hotel in Eureka, California. The Beaver Express arrived back in Albany on January 8, 1942 at 5:16 a.m. Over the previous 19 days, 11 hours, and 31 minutes, the assistant coaches and most of the members of the team traveled 7,384 miles, through 24 states.
Grantland Rice rode out of Durham, North Carolina with Oregon State. In his article after the game, Rice, in explaining why Oregon State had won, said that the Beavers had played a much harder schedule than the Blue Devils. Further, he said that Oregon State "had been used to hard battling – and could give it and take it. They had been hit hard all season, while Duke had been on a flock of picnics, largely in soft meadows."
Stiner returned to campus on January 16, 1942. 700 fans turned out to fete Stiner and the Oregon State players. Governor Sprague was one of the principal speakers, referring to the Beavers as the "Champions of America!"
The Beavers ended up receiving $81,267.22 as their share for the Durham Rose Bowl. This was more than the $50,000.00 that they expected to receive from the Pasadena Rose Bowl.
After the 1942 Allied victory in the Battle of Midway and the end of the Japanese offensives in the Pacific Theater during 1942, it was deemed that the West Coast was no longer vulnerable to attack, and the Rose Bowl game continued on in the Rose Bowl Stadium.
Team players drafted into the NFL
Awards and honors
Don Durdan, Rose Bowl Player Of The Game
References
Oregon State
Oregon State Beavers football seasons
Pac-12 Conference football champion seasons
Rose Bowl champion seasons
Oregon State Beavers football |
38289699 | https://en.wikipedia.org/wiki/Cyber-collection | Cyber-collection | Cyber-collection refers to the use of cyber-warfare techniques in order to conduct espionage. Cyber-collection activities typically rely on the insertion of malware into a targeted network or computer in order to scan for, collect and exfiltrate sensitive information.
Cyber-collection started as far back as 1996, when widespread deployment of Internet connectivity to government and corporate systems gained momentum. Since that time, there have been numerous cases of such activities.
In addition to the state sponsored examples, cyber-collection has also been used by organized crime for identity and e-banking theft and by corporate spies. Operation High Roller used cyber-collection agents in order to collect PC and smart-phone information that was used to electronically raid bank accounts. The Rocra, aka Red October, collection system is an "espionage for hire" operation by organized criminals who sell the collected information to the highest bidder.
Platforms and functionality
Cyber-collection tools have been developed by governments and private interests for nearly every computer and smart-phone operating system. Tools are known to exist for Microsoft, Apple, and Linux computers and iPhone, Android, Blackberry, and Windows phones. Major manufacturers of Commercial off-the-shelf (COTS) cyber collection technology include Gamma Group from the UK and Hacking Team from Italy. Bespoke cyber-collection tool companies, many offering COTS packages of zero-day exploits, include Endgame, Inc. and Netragard of the United States and Vupen from France. State intelligence agencies often have their own teams to develop cyber-collection tools, such as Stuxnet, but require a constant source of zero-day exploits in order to insert their tools into newly targeted systems. Specific technical details of these attack methods often sells for six figure sums.
Common functionality of cyber-collection systems include:
Data scan: local and network storage are scanned to find and copy files of interest, these are often documents, spreadsheets, design files such as Autocad files and system files such as the passwd file.
Capture location: GPS, WiFi, network information and other attached sensors are used to determine the location and movement of the infiltrated device
Bug: the device microphone can be activated in order to record audio. Likewise, audio streams intended for the local speakers can be intercepted at the device level and recorded.
Hidden Private Networks that bypass the corporate network security. A compute that is being spied upon can be plugged into a legitimate corporate network that is heavy monitored for malware activity and at same time belongs to a private wifi network outside of the company network that is leaking confidential information off of an employee's computer. A computer like this is easily set up by a double-agent working in the IT department by install a second Wireless card in a computer and special software to remotely monitor an employee's computer through this second interface card without them being aware of a side-band communication channel pulling information off of his computer.
Camera: the device cameras can be activated in order to covertly capture images or video.
Keylogger and Mouse Logger: the malware agent can capture each keystroke, mouse movement and click that the target user makes. Combined with screen grabs, this can be used to obtain passwords that are entered using a virtual on-screen keyboard.
Screen Grabber: the malware agent can take periodic screen capture images. In addition to showing sensitive information that may not be stored on the machine, such as e-banking balances and encrypted web mail, these can be used in combination with the key and mouse logger data to determine access credentials for other Internet resources.
Encryption: Collected data is usually encrypted at the time of capture and may be transmitted live or stored for later exfiltration. Likewise, it is common practice for each specific operation to use specific encryption and poly-morphic capabilities of the cyber-collection agent in order to ensure that detection in one location will not compromise others.
Bypass Encryption: Because the malware agent operates on the target system with all the access and rights of the user account of the target or system administrator, encryption is bypassed. For example, interception of audio using the microphone and audio output devices enables the malware to capture to both sides of an encrypted Skype call.
Exfiltration: Cyber-collection agents usually exfiltrate the captured data in a discrete manner, often waiting for high web traffic and disguising the transmission as secure web browsing. USB flash drives have been used to exfiltrate information from air gap protected systems. Exfiltration systems often involve the use of reverse proxy systems that anonymize the receiver of the data.
Replicate: Agents may replicate themselves onto other media or systems, for example an agent may infect files on a writable network share or install themselves onto USB drives in order to infect computers protected by an air gap or otherwise not on the same network.
Manipulate Files and File Maintenance: Malware can be used to erase traces of itself from log files. It can also download and install modules or updates as well as data files. This function may also be used to place "evidence" on the target system, e.g. to insert child pornography onto the computer of a politician or to manipulate votes on an electronic vote counting machine.
Combination Rules: Some agents are very complex and are able to combine the above features in order to provide very targeted intelligence collection capabilities. For example, the use of GPS bounding boxes and microphone activity can be used to turn a smart phone into a smart bug that intercepts conversations only within the office of a target.
Compromised cellphones. Since, modern cellphones are increasingly similar to general purpose computer, these cellphones are vulnerable to the same cyber-collect attacks as computer systems, and are vulnerable to leak extremely sensitive conversational and location information to an attackers. Leaking of cellphone GPS location and conversational information to an attacker has been reported in a number of recent cyber stalking cases where the attacker was able to use the victim's GPS location to call nearby businesses and police authorities to make false allegations against the victim depending on his location, this can range from telling the restaurant staff information to tease the victim, or making false witness against the victim. For instance if the victim were parked in large parking lot the attackers may call and state that they saw drug or violence activity going on with a description of the victim and directions to their GPS location.
Infiltration
There are several common ways to infect or access the target:
An Injection Proxy is a system that is placed upstream from the target individual or company, usually at the Internet service provider, that injects malware into the targets system. For example, an innocent download made by the user can be injected with the malware executable on the fly so that the target system then is accessible to the government agents.
Spear Phishing: A carefully crafted e-mail is sent to the target in order to entice them to install the malware via a Trojan document or a drive by attack hosted on a web server compromised or controlled by the malware owner.
Surreptitious Entry may be used to infect a system. In other words, the spies carefully break into the target's residence or office and install the malware on the target's system.
An Upstream monitor or sniffer is a device that can intercept and view the data transmitted by a target system. Usually this device is placed at the Internet service provider. The Carnivore system developed by the U.S. FBI is a famous example of this type of system. Based on the same logic as a telephone intercept, this type of system is of limited use today due to the widespread use of encryption during data transmission.
A wireless infiltration system can be used in proximity of the target when the target is using wireless technology. This is usually a laptop based system that impersonates a WiFi or 3G base station to capture the target systems and relay requests upstream to the Internet. Once the target systems are on the network, the system then functions as an Injection Proxy or as an Upstream Monitor in order to infiltrate or monitor the target system.
A USB Key preloaded with the malware infector may be given to or dropped at the target site.
Cyber-collection agents are usually installed by payload delivery software constructed using zero-day attacks and delivered via infected USB drives, e-mail attachments or malicious web sites. State sponsored cyber-collections efforts have used official operating system certificates in place of relying on security vulnerabilities. In the Flame operation, Microsoft states that the Microsoft certificate used to impersonate a Windows Update was forged; however, some experts believe that it may have been acquired through HUMINT efforts.
Examples of operations
Stuxnet
Flame
Duqu
Bundestrojaner
Rocra
Operation High Roller
See also
Cyberwarfare
Computer surveillance
Computer insecurity
Chinese intelligence operations in the United States
Cyber-security regulation
Industrial espionage
GhostNet
Proactive Cyber Defence
Surveillance
Chaos Computer Club
Global surveillance disclosures (2013–present)
Tailored Access Operations
References
Espionage
Hacking (computer security)
Cyberwarfare
Military intelligence collection
Cybercrime
Information sensitivity
Sabotage
Spyware
Mass intelligence-gathering systems
Security engineering
Social engineering (computer security)
National security
Computer security procedures
Computing terminology |
4733491 | https://en.wikipedia.org/wiki/Natalya%20Kaspersky | Natalya Kaspersky | Natalya Ivanovna Kasperskaya (; born 5 February 1966 in Moscow, Soviet Union)—who, in the West, uses as her surname the masculine form Kaspersky—is a Russian IT entrepreneur, President of the InfoWatch Group of companies and co-founder and former CEO of antivirus security software company Kaspersky Lab. In addition, she is one of the wealthiest women in Russia and one of the most influential figures in the Russian IT industry.
Biography
Early years
Natalya Kasperskaya (maiden name Stutser) was born on 5 February 1966 in Moscow into a family of engineers and Soviet defense research institute employees.
Natalya was elected as a member of her school pioneer council, and later as a member of the district pioneer headquarters, and was also a Komsomol member and organizer. Alongside her main education, Natalya also played basketball in the Children's and Youth Sports School and seriously intended to become a veterinarian until giving up on the dream because of difficulties with studying chemistry.
In the eighth year of her education, Natalya moved from an ordinary secondary school to a physics-mathematical school run by the Moscow Aviation Institute.
Education
After finishing this school, Natalya took the entrance exams for the Lomonosov Moscow State University but was not enrolled, missing out by half a point. However, her results were good enough to gain entry into the Moscow Institute of Electronic Machine Building (MIEM), where she studied applied mathematics (1984-1989), and the topic of her diploma was a mathematical model of a nuclear reactor cooling system. Later, she earned a bachelor's degree from the Open University in the UK. During her studies at the MIEM, she met her first husband Eugene Kaspersky, whom she married in 1986.
Career
After graduating from the institute, Natalya was assigned to the Central Scientific and Construction Bureau in Moscow, where she worked for half a year as a research scientist before going on maternity leave. Natalya started her career in IT at the age of 28, when she took on a job, in January 1994, as a salesperson for a computer accessories and software firm with a 50-dollar monthly salary. The job was based in a newly opened store in the KAMI Information Technologies Center created by a former professor of Natalya's ex-husband, Eugene Kaspersky, from a Higher School of the KGB during the Soviet epoch. She believes that all personal data, such as search history, geolocation, contacts, correspondence, photo and video materials, should belong to the State.
Kaspersky Lab
In September 1994, Natalya became head of a distribution department of AntiViral Toolkit Pro (AVP), which had been under development by Eugene Kaspersky's team since 1991. Over two or three years, Natalya successfully built distribution channels and a technical support network and entered international markets, with sales growing rapidly from an initial $100–200 per month in 1994, to more than $130,000 after a year, over $600,000 in 1996 and more than $1 million in 1997. Revenue was divided between the team and the mother company until 1997, when the future founders of 'Kaspersky Lab' decided to start their own business.
Natalya launched the Kaspersky Lab foundation in June 1997, was key to the naming of the new company, and worked as CEO for more than 10 years. Shares in 'Kaspersky Lab' were initially split between Eugene Kaspersky (50%), his two teammate programmers Alexey De-Monderik and Vadim Bogdanov (20% each), and Natalya Kasperskaya (10%). In 1997, Kaspersky Lab sales started to double yearly, with turnover reaching around $7 million in 2001 and exceeding $67 million in 2006.
In August 2007, Natalya was unseated and suspended from her key management functions by Eugene Kaspersky due to the couple's divorce and the deepening ideological divide between the two. Eventually, Natalya agreed to stay on as Chairperson of the newly established board of 'Kaspersky Lab', before finally breaking all ties with the previously family driven business in 2011, with Kaspersky Lab buying out Natalya's stake in the company in 2007 and 2011 (around 30% of shares in 2007).
Under Natalya's supervision, Kaspersky Lab turned into a leading antivirus corporation with a network of regional offices worldwide. At the moment of the power change in 2007, annual sales revenue had reached $126 million, while the company had an estimated capitalization of over $1.3 billion and yearly revenue of $700 million by 2011, when Natalya sold her remaining stake and departed. After the change in management, the company's rate of growth dropped visibly, with global revenue growing by 40% in 2009, 13.7% in 2011, 3% in 2012, and 6% in 2013.
InfoWatch
After 'Kaspersky Lab' had bought the antispam technology developed by 'Ashmanov and Partners', the head of the latter, Igor Ashmanov, gave the buyer an idea to use the antispam engine backwards for protection against data leaks. During 2001–2002, 'Kaspersky Lab' programmers developed a solution which later became known as InfoWatch Traffic Monitor Enterprise and which offers protection for corporate users against internal threats (a DLP system). In December 2013, a subsidiary called 'InfoWatch' was established to develop and distribute new software.
Natalya Kasperskaya has been CEO and majority owner of 'InfoWatch' since October 2007, with her stake in the company being linked to the business separation deal with her ex-husband. Natalya made her main investments in 'InfoWatch', 'Kribrum' and 'Nanosemantics' co-owned by her and Igor Ashmanov, and 'G Data Software' AG, a German antivirus company.
'InfoWatch' software had only vague prospects at the time of the spin-off and was an albatross around 'Kaspersky Lab's neck. Unlike 'Kaspersky Lab', the technological solutions and product line of the new company were initially targeted at large and medium enterprises, starting from 300 workstations, rather than small businesses and retailers.
This required a fundamentally different skill set and approach, with Natalya's previous experience in management turning out not to be particularly relevant. Nevertheless, in 2012 InfoWatch, which was previously unprofitable, recorded its first earnings and went on growing at an annual rate of 60—70%. According to 'Forbes', InfoWatch annual revenue reached around $12 million in 2015, with independent experts polled by Russian daily newspaper 'Kommersant' in spring 2015 estimating the business to be worth $40–50 million.
Today, InfoWatch is a group of companies working in two main business areas — corporate protection against internal threats and external targeted attacks — with the company holding almost a 50% share of the Russian confidential data protection market (DLP systems). Among longstanding clients are Russian governmental organizations, as well as 'Sberbank', 'Beeline', ;Lukoil', 'Tatneft', 'Surgutneftegas', 'Sukhoi', 'Magnitogorsk Iron and Steel Works', etc. In addition, InfoWatch is actively developing the German, Middle East, and South-East Asian markets.
Current InfoWatch shareholders are Natalya Kasperskaya and the company's Deputy CEO Rustem Khairetdinov.
Achievements
Private fortune
According to Forbes, Natalya Kasperskaya had a fortune of around $220 million in March 2013 – an estimate which increased to $230 million in 2014 and $270 million in 2015. In March 2015, Russian news portal 'Lenta.ru' agreed with Forbes’ 2014 estimation while, in July 2015, German magazine 'Der Spiegel' published an estimation of €207 million. Finally, in August of the same year, women's magazine 'Cosmopolitan' published an estimate of $270 million.
According to 'Der Spiegel', the majority of Natalya Kasperskaya's fortune is in the form of funds derived from asset sales. As for Kaspersky herself, in October 2015, in response to the question as to whether the 'Forbes' calculations are accurate, she emphasized that her company is non-public and thus has no need to reveal its level of capitalization, while adding that “it is nevertheless good to see that people seem to appreciate the value of 'InfoWatch'”.
Ratings and awards
Russian Business Leader of the Year 2012 award from 'Horasis' (Switzerland) — 2013;
Women in Technology Awards for Middle East and Africa 2014, nomination Best entrepreneur in IT — 2014;
Top 20 Women in Business in Northern Europe, according to 'Nordic Business Forum' — ranked #1 (2015).
Person of the Year 2016 in IT/telecom by 'Best in Russia' award - April 2017.
Public work
Natalya Kasperskaya is a member of the board of the Russian Union of Industrialists and Entrepreneurs and the Association of Software Developers 'Domestic Software'. She is also a member of the Expert Russian Software Council affiliated to the Ministry of Telecom and Mass Communications of Russia, the Grant Committee of Skolkovo Foundation, and the supervisory board of the Skolkovo Institute of Science and Technology (Skoltech). Furthermore, Natalya Kasperskaya is a member of the Russian Mechanical Engineering Union.
From April 2008 until March 2012, Natalya was a member of the board of the Russian-German chamber of commerce. In addition, from 2009 until 2011, she was head of the working party on information and computer technologies under the federal target program of the Ministry of Education and Science of Russia, referred to as “Research and inventions in priority scientific and technology development areas in Russia in 2014—2020”.
Personal life
Interests
Natalya Kasperskaya has enjoyed participating in social activities ever since being at school, where she remembers singing in a children's choir, taking part in school performances and concerts, and even leading a pioneer's team of agitators. In addition, she formed her own school placard newspaper, for which she wrote poetry, and was also interested in sports like basketball, skiing and swimming, as well as phaleristics, collecting stamps and Soviet coins.
As a student, Natalya was fascinated with Moscow theatre life and knew the repertoires of the main youth theatres of that time, such as Mossovet Theatre, Taganka Theatre, Sovremennik, etc., and sometimes queued overnight to buy tickets to popular performances. Furthermore, she also had a passion for the guitar and poetry and often sang and played guitar at parties.
Natalya's interest in trekking, skiing, travelling with friends and children, and reading professional literature came later and she considers Good to Great and Built to Last written by American business consultant Jim Collins to be her favorite books, saying that they have influenced her outlook. In addition, she also speaks English and German fluently.
Kasperskaya admits that she has little interest in cooking, although she had to cook for her family during maternity leave. Similarly, she also has no particular interest in fashion and clothing brands and does not waste much time on shopping, instead buying whatever clothes she finds suit her own style. In addition, Natalya is no fan of designer brands since she knows how such clothes are actually produced.
Natalya perceives gadgets and social networks somewhat negatively as she understands that they provide capabilities for increased surveillance. While she has to regularly use her work Sony Xperia phone, Natalya typically allows her PR team to manage her social network presence and uses such media only very rarely.
Family
Natalya met her first husband, Eugene Kaspersky, at a health resort in January 1987 when she was twenty, with the couple marrying just six months later. In 1989, in her fifth year at the institute, Natalya gave birth to her first son Maxim, with a second son, Ivan, following in 1991. The couple split up in 1997 and divorced in 1998, at Eugene's instigation. However, due to their joint and rapidly growing business, the divorce had to be covered up for a couple of years in order to not demotivate employees and panic the market.
Natalya met her second husband, Igor Ashmanov, in 1996 at the CeBIT computer expo in Hannover, where they were working at neighboring stands. A year later, Natalya and Igor renewed their acquaintance and started communicating with one another regularly on a professional basis. Natalya Kasperskaya remembers that they started dating two or three years later, after the divorce with Eugene, with the couple deciding to marry in 2001.
In 2005, Igor and Natalya had a daughter, Alexandra, who was followed by a second daughter, Maria, in 2009 and a third daughter, Varvara, in 2012. Natalya's sons from her first marriage both studied at Lomonosov Moscow State University, with Maxim graduating from the faculty of Geography and Ivan from the faculty of Computational Mathematics and Cybernetics.
In April 2011, Natalya's 20-year-old son Ivan was kidnapped in the Strogino district of Moscow on his way to work, with the perpetrators holding him in one of the villages in the Sergievo-Posadsky subregion of Moscow oblast (suburb) and demanding a ransom of €3 million from his parents. However, five days later Ivan was freed thanks to the actions of the Russian intelligence services, with the five kidnappers, including two repeat offenders, being sentenced to prison terms ranging from 4.5 to 11 years.
References
External links
Natalya Kaspersky on Facebook.
Group of companies official site.
Наталья Касперская tagged news on 'RIA Novosti' news agency.
Наталья Касперская tagged news on 'Roem.ru'.
Dean, S.; Vladimirskaya, L. Natalya Kaspersky: Russia’s Top Security Woman. — 'BRIC Magazine', No. 4, 2015 Quarter 1.
. — 'LifeTV', 1 May 2012.
Living people
1966 births
People from Moscow
Chief executives of computer security organizations
Russian women in business
People in information technology
Russian computer scientists
Russian women computer scientists
Russian chief executives
Technology company founders
20th-century Russian businesspeople
21st-century Russian businesspeople
20th-century businesswomen
21st-century businesswomen
20th-century Russian women
21st-century Russian women
Defenders of the White House (1991) |
75458 | https://en.wikipedia.org/wiki/Windows%20Me | Windows Me | Windows Millennium Edition, or Windows Me (marketed with the pronunciation of the pronoun "me"), is an operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. It is the successor to Windows 98, and was released to manufacturing on June 19, 2000, and then to retail on September 14, 2000. It was Microsoft's main operating system for home users until the introduction of its successor Windows XP in 2001.
Windows Me was targeted specifically at home PC users, and included Internet Explorer 5.5 (later default was Internet Explorer 6), Windows Media Player 7 (later default was Windows Media Player 9 Series) and the new Windows Movie Maker software, which provided basic video editing and was designed to be easy to use for consumers. Microsoft also incorporated features first introduced in Windows 2000, which had been released as a business-oriented operating system seven months earlier, into the graphical user interface, shell and Windows Explorer. Although Windows Me was still ultimately based around MS-DOS like its predecessors, access to real-mode DOS was restricted to decrease system boot time.
Windows Me was initially positively received, but it soon garnered a negative reception from users due to stability issues, and is now viewed by many as one of the worst operating systems Microsoft has ever produced. In October 2001, Windows XP was released to the public, having already been under development at the time of Windows Me's release, and popularized most of Windows Me's features, while being far more stable. After the introduction of Windows XP, mainstream support for Windows Me ended on December 31, 2003, followed by extended support on July 11, 2006.
Development
At the 1998 Windows Hardware Engineering Conference, Microsoft CEO Bill Gates stated that Windows 98 would be the last iteration of Windows to use the Windows 9x kernel, with the intention for the next consumer-focused version to be based on the NT kernel, unifying the two branches of Windows. However, it soon became apparent that the development work involved was too great to meet the aim of releasing before the end of 2000, particularly given the ongoing parallel work on the eventually-canceled Microsoft Neptune project. The Consumer Windows development team was therefore re-tasked with improving Windows 98 while porting some of the look-and-feel from Windows 2000. Microsoft President Steve Ballmer publicly announced these changes at the next Windows HEIC in 1999.
On July 23, 1999, the first alpha version of Windows Me was released to testers. Called Development Preview 1, it was very similar to Windows 98 SE, with a very early iteration of the new Help and Support feature as the only major change. Three more Development Previews were released over the subsequent two months.
The first beta version was released to testers and the industry press on September 24, 1999, with the second coming on November 24 that year. Beta 2 showed the first real changes from Windows 98, including importing much of the look-and-feel from Windows 2000, and the removal of real-mode DOS. Industry expert Paul Thurrott reviewed Beta 2 upon release and spoke positively of it in a review. By early 2000, Windows Me was reportedly behind schedule, and an interim build containing the new automatic update feature was released to allay concerns about a delayed-release.
Beta 3 was released on April 11, 2000, and this version marked the first appearance of its final startup and shutdown sounds derived from Windows 2000, as the previous betas used Windows 98's startup and shutdown sounds.
Although Microsoft signed off on the final build of Windows Me on June 28, 2000, after trialing three Release Candidate builds with testers, the final retail release was pushed back to September 14 for reasons that were not clear.
Shortly after Windows Me was released to manufacturing on June 19, 2000, Microsoft launched a marketing campaign to promote it in the U.S., which they dubbed the Meet Me Tour. A national partnered promotional program featured the new OS, OEMs and other partners in an interactive multimedia attraction in 25 cities.
Windows Me was released for retail sale on September 14, 2000. At launch time, Microsoft announced a time-limited promotion from September 2000 to January 2001 which entitled Windows 98 and Windows 98 SE users to upgrade to Windows Me for $59.95 instead of the regular retail upgrade price of $109. Non-upgrade versions cost $209, the same as Windows 98 on its release.
New and updated features
User interface
Windows Me featured the shell enhancements inherited from Windows 2000 such as personalized menus, customizable Windows Explorer toolbars, auto-complete in Windows Explorer address bar and Run box, Windows 2000 advanced file type association features, displaying comments in shortcuts as tooltips, extensible columns in Details view (IColumnProvider interface), icon overlays, integrated search pane in Windows Explorer, sort by name function for menus, Places bar in common dialogs for Open and Save, cascading Start menu special folders, some Plus! 95 and Plus! 98 themes, and updated graphics. The notification area in Windows Me and later supported 16-bit high color icons. The Multimedia control panel was also updated from Windows 98. Taskbar and Start Menu options allowed disabling of the drag and drop feature and could prevent moving or resizing the taskbar, which was easier for new users.
Hardware support improvements
Faster boot times: Windows Me features numerous improvements for improving cold boot time, pre and post-logon boot times and time required for resuming from hibernation. Processing of real mode configuration files, CONFIG.SYS and AUTOEXEC.BAT, is bypassed at startup and essential real mode drivers like HIMEM.SYS and SMARTDRV.EXE are embedded into IO.SYS. The registry is loaded only once; for efficient loading, the registry is split into three files instead of two (SYSTEM.DAT and USER.DAT), with the new file CLASSES.DAT containing the contents of the hive HKEY_CLASSES_ROOT required for boot loaded initially. Plug and Play device enumeration is more parallelized than in Windows 98. Boot time is not affected due to unavailability of a DHCP server or other network components. There are also optimizations to prevent boot slowdown due to BIOS POST operations.
USB Human Interface Device Class: Generic support for 5-button mice is also included as standard and installing IntelliPoint allows reassigning the programmable buttons.
Windows Image Acquisition: Windows Me introduced the Windows Image Acquisition API for a standardized method of allowing Windows applications to transparently and more easily communicate with image acquisition devices, such as digital cameras and scanners. WIA intended to improve the configuration and the user interface for interacting with scanners and such devices, (which were previously supported by the TWAIN standard) and simplify writing device drivers for developers. WIA also includes support for USB still image capture device classes such as scanners and cameras through the Picture Transfer Protocol.
Improved power management and suspend/resume operations: The OEM version of Windows Me supports OS-controlled ACPI S4 sleep state (hibernation) and other power management features without manufacturer-supplied drivers.
USB and FireWire support improvements: Windows Me is the only operating system in the Windows 9x series that includes generic drivers for USB mass storage devices and USB printers. Support for FireWire SBP-2 scanners and storage devices is also improved.
The , DirectSound, and DirectShow APIs support non-PCM formats such as AC-3 or WMA over S/PDIF.
Digital media
Windows Movie Maker: This utility is based on DirectShow and Windows Media technologies to provide Microsoft Windows computer systems with basic video capture and edit capabilities. It provides users with the ability to capture, edit, and re-encode media content into the Windows Media format, a tightly compressed format that requires a minimal amount of storage space on the computer's hard disk when compared to many other media formats.
Windows Media Player 7: The new version of the Windows multimedia player software introduces jukebox functionality featuring the Media Library, support for CD burning, an integrated media encoder, and the ability to transfer music directly to portable devices. Another new feature is its radio tuner that can be used to search for and connect to radio stations over the internet. Users can also customize the look and feel of the user interface through interactive skins.
Windows DVD Player: The software DVD player in Windows Me is a redesigned version of the one featured in Windows 98 which, unlike its predecessor, does not require a dedicated decoder card for DVD playback. Instead, it supports software decoding through a third-party decoder.
Networking technologies
Net Crawler: Windows Me introduced a net crawling feature which automatically searches out and creates shortcuts to network shares and printers in My Network Places. This can be controlled using the Automatically search for network folders and printers option. Shortcuts that are added by the net crawler but not detected again on the network in a reasonable time period are aged out and deleted.
New TCP/IP Stack: Windows Me includes the Windows 2000 networking stack and architecture.
The Home Networking Wizard is designed to help users to set up a computer that is running Windows Me for use on a small home network. This includes setting up Internet Connection Sharing (ICS) on a computer running Windows Me so the computer can share a connection to the Internet with other computers on the home network.
Dial-up Networking component was updated in Windows Me and provides several enhancements while maintaining the desired features of prior releases of the operating system. The user interface had been reworked to provide all configurable parameters in one convenient location. The user interface now included three new tabs: Networking, Security and Dialing. To improve dial-up networking, Windows Me includes built-in support for the Connection Manager dial-up client. Using the Connection Manager Administration Kit (an optional networking component in Windows 2000 Server), network administrators can pre-configure and deploy dial-up networking connections, by means of a Connection Manager service profile, to Windows Me–based client machines.
Network Driver Interface Specification (NDIS) version 5.0 for Windows Me was enhanced to provide programming interface parity with NDIS version 5.0 in Windows 2000. This means that the programming interfaces that the author of a network device driver uses are the same for both of these Windows platforms.
Universal Plug and Play: Windows Me introduced support for Universal Plug and Play (UPnP). Universal Plug and Play and NAT traversal APIs can also be installed on Windows 98 and Windows 98 SE by installing the Windows XP Network Setup Wizard.
System utilities
System Restore: Windows Me introduced the "System Restore" logging and reversion system, which was meant to simplify troubleshooting and solve problems. It was intended to work as a rollback and recovery feature so that if the installation of an application or a driver adversely affected the system, the user could undo the installation and return the system to a previously working state. It does this by monitoring changes to Windows system files and the registry. System Restore protects only the operating system files, not documents, and therefore is not a substitute for a backup program.
System File Protection: First introduced with Windows 2000 (as Windows File Protection), and expanding on the capabilities introduced with System File Checker in Windows 98, System File Protection aimed to protect system files from modification and corruption silently and automatically. When the file protection is in effect, replacing or deleting a system file causes Windows Me to silently restore the original copy. The original is taken from a hard drive backup folder (%WinDir%\Options\Install) or from the Windows Me installation CD, if the cached copy of files on the hard disk has been deleted. If no installation CD is in the drive, a dialog box alerts the user about the problem and requests that the CD be inserted. System File Protection is a different technology from System Restore and should not be confused with the latter. System Restore maintains a broad set of changed files including added applications and user configuration data stored repeatedly at specific points in time restored by the user, whereas System File Protection protects operating system files with no user input.
System Configuration Utility allows users to manually extract and restore individual system files from the Windows Me setup files. It has also been updated with three new tabs called "Static VxDs", "Environment" and "International". The Static VxDs tab allows users to enable or disable static virtual device drivers to be loaded at startup, the Environment tab allows users to enable or disable environment variables, and the International tab allows users to set international language keyboard layout settings that were formerly set via the real mode MS-DOS configuration files. A Cleanup button on the Startup tab allows cleaning up invalid or deleted startup entries.
System Monitor has been updated with a Dial-Up Adapter section. Users can now monitor items such as Connection Speeds, Bytes Received or Transmitted / Second.
SCANDISK runs from within Windows upon an improper shutdown before the Windows Shell loads.
Automatic Updates: The Automatic Updates utility automatically downloads and installs critical updates from the Windows Update Web site with little user interaction. It is set up to check Windows Update once every 24 hours by default. Users can choose to download which update they want, although high-priority updates must be downloaded and installed.
Compressed Folders: Windows Me includes native support for ZIP files through the 'Compressed Folders' Explorer extension. This extension was originally introduced in the Plus! 98 collection for Windows 98, but is included in the base operating system in Windows Me.
A new Help and Support program has also been added, replacing the HTML Help-based documentation in Windows 2000 and Windows 98. The Help and Support Center is entirely HTML-based and takes advantage of a technology called Support Automation Framework (SAF), that can show support information from the internet, allows collecting data for troubleshooting via WMI and scripting and for third parties to plug into Windows Help and Support. Several other support tools also shipped with Windows Me.
Windows Me also includes Internet Explorer 5.5, which supports a new Print Preview feature. It also shipped with the MSN Messenger Service.
Accessibility features
On-Screen Keyboard: Originally introduced with Windows 2000, On-Screen Keyboard makes it possible to input characters using the mouse instead of the keyboard.
The Mouse Control Panel incorporates IntelliPoint features, namely ClickLock (selecting or dragging without continuously holding down the mouse button), hiding the pointer while typing, and showing it by pressing Ctrl.
The cursor (system caret) can be set to a thicker width.
Increased Active Accessibility support in utilities such as Calculator and Magnifier.
Removed features
Real mode DOS
Windows Me restricted support for real mode MS-DOS. As a result, IO.SYS in Windows Me disregards CONFIG.SYS, COMMAND.COM and WIN.COM and directly executes VMM32.VXD. In its default configuration the system would neither boot into an MS-DOS command prompt nor exit to DOS from Windows; real mode drivers such as ANSI.SYS could not be loaded and older applications that require real mode could not be run. Microsoft argued that the change improved the speed and reliability of the boot process.
In Windows Me, the CONFIG.SYS and AUTOEXEC.BAT files are used only to set global environment variables. The two files (if present) are scanned for settings relating to the environment variables, and any other commands present are moved into a Windows registry key (see below). The two files thus contain only settings and preferences which configure the "global environment" for the computer during the boot phase or when starting a new virtual DOS machine (VDM).
To specify or edit other startup values (which, in Windows 98, would be present in the AUTOEXEC.BAT file) the user must edit the following Windows registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SessionManager\Environment
For troubleshooting and crash recovery, both the Windows Me CD-ROM and the Windows Me startup disk (a user-creatable floppy disk, known as the Emergency Boot Disk (EBD)) allowed booting into real mode MS-DOS.
It is possible to restore real mode DOS functionality through various unofficial means. Additionally, a registry setting exists that re-enables the "Restart in MS-DOS mode" option in the shutdown dialog box; however, unless patched unofficially with third-party software, Windows Me cannot be booted to MS-DOS real mode.
Other components
Unlike past versions of Windows 9x, Windows Me was entirely aimed at home users, and thus had certain enterprise-oriented features removed. Several features of its predecessors did not work or were officially unsupported by Microsoft on Windows Me, including Automated Installation, Active Directory client services, System Policy Editor, Personal Web Server and ASP. These features were supported on its predecessors, Windows 98 and Windows 95. A Resource Kit publication, targeted towards system administrators, was never published for Windows Me.
Other features that were removed or never updated to work with Windows Me included Microsoft Fax, QuickView and DriveSpace, as well as the GUI FAT32 conversion tool. Several Windows Explorer commands were also modified in Windows Me, matching the menu structure in Windows 2000. While some were simply moved to a different location, certain functionality of the Go menu, as well as the Find command on the Tools menu, are no longer available. For the latter change Microsoft recommends using a variety of similar functionality labeled Search.
Upgradeability
Windows Me could have its components upgraded or have new components installed up to the latest versions:
Internet Explorer 6 SP1 and Outlook Express 6 SP1
Windows Media Format Runtime and Windows Media Player 9 Series (including Windows Media Encoder 7.1 and the Windows Media 8 Decoding Utility)
MSN Messenger 7.0
Windows Installer 2.0
DirectX 9.0c (the latest compatible runtime is from October 2007.)
Microsoft .NET Framework up to and including version 2.0 (2.0 SP1 and higher versions are not supported.)
Microsoft Visual C++ 2005 runtime
Text Services Framework
Several other components such as MSXML 3.0 SP7, Microsoft Agent 2.0, NetMeeting 3.01, MSAA 2.0, ActiveSync 3.8, WSH 5.6, Microsoft Data Access Components 2.81 SP1, WMI 1.5 and Speech API 4.0.
Office XP was the last version of Microsoft Office to be compatible with Windows Me.
The Microsoft Layer for Unicode can be installed to allow certain Unicode applications to run on the operating system.
System requirements
Windows Me is only designed to handle up to 512 MB of RAM by default. Systems with larger RAM pools may lose stability; however, depending on the hardware and software configuration, it is sometimes possible to manually tweak the installation to continue working with somewhat larger amounts of RAM as well. Systems with 1.5 GB of RAM or more may reboot continuously during startup. The /nm setup switch can be used at the DOS command line to bypass the minimum requirements, allowing for installation on a CPU as low as the 16 MHz 80486SX.
Support lifecycle
Compared with other releases of Windows, Windows Me had a short shelf-life of just over a year. Windows 2000 and Windows Me were eventually succeeded by newer Microsoft operating systems: Windows Me by Windows XP Home Edition, and Windows 2000 Professional by Windows XP Professional. Windows XP is noteworthy that the first preview build of Windows XP (then codenamed "Whistler") was released to developers on July 13, 2000, two months before Me's general availability date.
Microsoft planned to end support for Windows Me on December 31, 2004. However, in order to give customers more time to migrate to newer Windows versions, particularly in developing or emerging markets, Microsoft decided to extend support until July 11, 2006. Microsoft ended support for Windows Me because the company considered Windows Me to be obsolete and prone to security risks, and recommended customers upgrade to Windows XP for the latest security improvements. Windows Me is no longer available in any form due to the terms of Java-related settlements Microsoft made with Sun Microsystems.
The Windows Update website continued to be available after Windows ME's end of support date, however, during 2011, Microsoft retired the Windows Update v4 website and removed the updates for Windows ME from its servers.
Microsoft announced in July 2019 that the Microsoft Internet Games services on Windows Me (and XP) would end on July 31, 2019.
Reception
Windows Me initially received generally positive reviews, with reviewers citing the operating system's integrity protection (branded as "PC Health") and the new System Restore feature as steps forward for home users. However, users' real-world experience did not bear this out, with industry publications receiving myriad reports of issues with the "PC Health" systems, PCs refusing to shut down cleanly, and general stability problems.
As time went on, the reception became more negative, to the point where it was heavily panned by users, mainly due to stability issues. Retrospectively, Windows Me is viewed as one of the worst operating systems Microsoft has ever produced, being unfavorably compared to its immediate predecessor and successor. Due to its many bugs and glitches, Windows Me is considered one of the worst operating systems of all time. A PC World article dubbed Windows Me the "Mistake Edition" and placed it 4th in their "Worst Tech Products of All Time" feature in 2006. The article states: "Shortly after Me appeared in late 2000, users reported problems installing it, getting it to run, getting it to work with other hardware or software, and getting it to stop running." Consequently, most home users remained with Windows 98, while some moved to Windows 2000 despite the latter being enterprise-orientated.
System Restore suffered from a bug in the date-stamping functionality that could cause System Restore to date-stamp snapshots that were taken after September 8, 2001, incorrectly. This could prevent System Restore from locating these snapshots and cause the system restore process to fail. Microsoft released an update to fix this problem.
Byron Hinson and Julien Jay, writing for ActiveWin, took an appreciative look on the operating system. On the removal of real mode DOS, they had noted "The removal of DOS has clearly made a difference in Windows Me in terms of stability (far less Blue screen of death are seen now) and booting speed has greatly increased." In a recommendation of the operating system upgrade for users of Windows 95 and 98, they had stated "If Windows Me isn't a revolutionary OS it's clear that Microsoft has focused its efforts to make it more user-friendly, stable and packed full of multimedia options. The result is great and the enhancements added are really worth the wait." The new features that Windows Me introduced were also praised and have since remained part of subsequent Windows generations.
Along with Windows 2000 from the NT family, Windows Me was the last version of Windows that lacked product activation.
References
External links
GUIdebook – Graphical User Interface gallery
Interview with Nicolas Coudière, Chief Product Manager: Microsoft Windows Millennium Edition
Windows Me home page: The official Windows Me home page from Wayback Machine
Windows 9x Member Projects
ME
DOS variants
2000 software
Products and services discontinued in 2006
Turn of the third millennium
IA-32 operating systems |
415946 | https://en.wikipedia.org/wiki/USS%20Pueblo%20%28AGER-2%29 | USS Pueblo (AGER-2) | USS Pueblo (AGER-2) is a , attached to Navy intelligence as a spy ship, which was attacked and captured by North Korean forces on 23 January 1968, in what was later known as the "Pueblo incident" or alternatively, as the "Pueblo crisis'''".
The seizure of the U.S. Navy ship and her 83 crew members, one of whom was killed in the attack, came less than a week after President Lyndon B. Johnson's State of the Union address to the United States Congress, a week before the start of the Tet Offensive in South Vietnam during the Vietnam War and three days after 31 men of North Korea's KPA Unit 124 had crossed the Korean Demilitarized Zone (DMZ) and killed 26 South Koreans in an attempt to attack the South Korean Blue House (executive mansion) in the capital Seoul. The taking of Pueblo and the abuse and torture of her crew during the subsequent eleven months became a major Cold War incident, raising tensions between western and eastern powers.
North Korea stated that Pueblo deliberately entered their territorial waters away from Ryo Island, and that the logbook shows that they intruded several times. However, the United States maintains that the vessel was in international waters at the time of the incident and that any purported evidence supplied by North Korea to support its statements was fabricated. Pueblo, still held by North Korea today, officially remains a commissioned vessel of the United States Navy. Since early 2013, the ship has been moored along the Pothonggang Canal in Pyongyang and used there as a museum ship at the Victorious War Museum. Pueblo is the only ship of the U.S. Navy still on the commissioned roster currently being held captive.
Initial operations
The ship was launched at the Kewaunee Shipbuilding and Engineering Company in Kewaunee, Wisconsin, on 16 April 1944, as the United States Army Freight and Passenger (FP) FP-344. The Army later redesignated the FP vessels as Freight and Supply changing the designation to FS-344. The ship, commissioned at New Orleans on 7 April 1945, served as a Coast Guard–manned Army vessel used for training civilians for the Army. Her first commanding officer was Lt. J. R. Choate, USCGR, succeeded by Lt. J.G. Marvin B. Barker, USCGR, on 12 September 1945. FS-344 was placed out of service in 1954.
In 1964 the Department of Defense became interested in having smaller, less expensive, more flexible and responsive signals intelligence collection vessels than the existing AGTR and T-AG vessels. The mothballed light cargo ships were the most suitable existing DOD ships, and one was converted to in 1964 and began operations in 1965. Banner's mission was to surveil high-frequency electronic emissions with line-of-sight propagation requiring operating closer to shore than previous intelligence gathering missions. Banner was unarmed, but the crew were issued five M1911 pistols and three M1 Garand rifles. Banner was confronted by Soviet Navy ships while operating off the Pacific coast of the Soviet Union. These ships would sometimes display international signal flags meaning: "Heave to or I will fire," but Banner kept steaming with scrupulous attention to International Regulations for Preventing Collisions at Sea. Soviet recognition of possible American reciprocity against Soviet ships on similar missions discouraged attacks.FS-344 was transferred to the United States Navy on 12 April 1966 and was renamed USS Pueblo (AKL-44) after Pueblo and Pueblo County, Colorado on 18 June. Initially, she was classified as a light cargo ship for basic refitting at Puget Sound Naval Shipyard during 1966. As Pueblo was prepared under a non-secret cover as a light cargo ship, the general crew staffing and training was on this basis, with 44% having never been to sea when first assigned. Installation of signals intelligence equipment, at a cost of $1.5 million, was delayed to 1967 for budgetary reasons, resuming service as what is colloquially known as a "spy ship" and redesignated AGER-2 on 13 May 1967. The limited budget for conversion caused disapproval of several improvements requested by the prospective commanding officer, Lloyd Bucher. Requested engine overhaul was denied despite Banner's experience of drifting for two days unable to communicate following failure of both engines on patrol. A requested emergency scuttling system was denied, and Bucher was subsequently unable to obtain explosives for demolition charges. Replacement of burn barrels with a fuel-fed incinerator to allow speedy destruction of classified documents was denied. After Bucher's subsequent request to reduce the ship's library of classified publications was similarly denied, he was able to purchase a less capable incinerator using some discretionary funds intended for crew comfort. Following the USS Liberty incident on 8 June, Vice Chief of Naval Operations (VCNO) Horacio Rivero Jr. ordered that no Navy ship would operate without adequate means of defending itself. VCNO staff directed the shipyard to install a 3-inch/50-caliber gun on Pueblo's main deck with provisions for ammunition storage, but Bucher successfully argued against such installation because of reduced ship stability by addition of weight above the main deck. After testing and deficiency rework Pueblo sailed from the shipyard on 11 September 1967 to San Diego for shake-down training.
When the unarmed Pueblo reached the U.S. Navy base at Yokosuka, Japan, the commander of United States Naval Forces Japan directed the ship to take two M2 Browning .50 caliber machine guns as a substitute for the missing deck gun. In the limited time available for training, ten of the ship's crew fired five rounds each. Bucher opted to mount these guns in exposed positions on the bow and stern to keep them as far as possible from his position on the bridge. These positions eliminated possible use of the ship's superstructure to protect the gunners and conceal the guns and ammunition service lockers. The exposed guns, with no nearby ammunition supply, were disguised under canvas covers which became rigid with frozen spray.
Pueblo incident
On 5 January 1968, Pueblo left Yokosuka in transit to the U.S. naval base at Sasebo, Japan; from there she left on 11 January 1968, headed northward through the Tsushima Strait into the Sea of Japan. She left with specific orders to intercept and conduct surveillance of Soviet Navy activity in the Tsushima Strait and to gather signal and electronic intelligence from North Korea. Mission planners failed to recognize that the absence of similar North Korean missions around the United States would free North Korea from the possibility of retribution in kind which had restrained Soviet response. The declassified SIGAD for the National Security Agency (NSA) Direct Support Unit (DSU) from the Naval Security Group (NSG) on Pueblo during the patrol involved in the incident was USN-467Y. AGER (Auxiliary General Environmental Research) denoted a joint Naval and National Security Agency (NSA) program. Aboard were the ship's crew of five officers and 38 enlisted men, one officer and 37 enlisted men of the NSG, and two civilian oceanographers to provide a cover story.
On 16 January 1968, Pueblo arrived at the 42°N parallel in preparation for the patrol, which was to transit down the North Korean coast from 41°N to 39°N, and then back, without getting closer than from the North Korean coast, at night moving out to a distance of . This was challenging as only two sailors had good navigational experience, with the captain later reporting, "I did not have a highly professional group of seamen to do my navigational chores for me."
At 17:30 on 20 January 1968, a North Korean modified SO-1 class Soviet style submarine chaser passed within of Pueblo, which was about southeast of Mayang-do at a position 39°47'N and 128°28.5'E.
In the afternoon of 22 January 1968, the two North Korean fishing trawlers Rice Paddy 1 and Rice Paddy 2 passed within of Pueblo. That day, a North Korean KPA Special Operations Force unit made an assassination attempt at the Blue House executive mansion against South Korean president Park Chung-hee, but the crew of Pueblo was not informed.
According to the American account, the following day, 23 January, Pueblo was approached by a submarine chaser and her nationality was challenged; Pueblo responded by raising the U.S. flag and directing the civilian oceanographers to commence water sampling procedures with their deck winch. The North Korean vessel then ordered Pueblo to stand down or be fired upon. Pueblo attempted to maneuver away, but was considerably slower than the submarine chaser. Several warning shots were fired. Additionally, three torpedo boats appeared on the horizon and then joined in the chase and subsequent attack.
The attackers were soon joined by two Korean People's Air Force MiG-21 fighters. A fourth torpedo boat and a second submarine chaser appeared on the horizon a short time later. The ammunition on Pueblo was stored below decks, and her machine guns were wrapped in cold-weather tarpaulins. The machine guns were unmanned, and no attempt was made to man them. An NSA report quotes the sailing order:
and notes:
U.S. Navy authorities and the crew of Pueblo insist that before the capture, Pueblo was miles outside North Korean territorial waters. North Korea claims that the vessel was well within North Korean territory. The Pueblos mission statement allowed her to approach within a nautical mile (1,852 m) of that limit. However, North Korea describes a sea boundary even though international standards were at the time.
The North Korean vessels attempted to board Pueblo, but she was maneuvered to prevent this for over two hours. The submarine chaser then opened fire with a 57 mm cannon and the smaller vessels fired machine guns, injuring Signalman Leach in his left calf and upper right side. Captain Bucher, too, received slight shrapnel wounds, but they were not incapacitating. The crew of Pueblo then began destroying sensitive material. The volume of material on board was so great that it was impossible to destroy it all. An NSA report quotes Lieutenant Steve Harris, the officer in charge of Pueblos Naval Security Group Command detachment:
and concludes:
Radio contact between Pueblo and the Naval Security Group in Kamiseya, Japan had been ongoing during the incident. As a result, Seventh Fleet command was fully aware of Pueblos situation. Air cover was promised but never arrived. The Fifth Air Force had no aircraft on strip alert, and estimated a two-to-three-hour delay in launching aircraft. was located south of Pueblo, yet her four F-4B aircraft on alert were not equipped for an air-to-surface engagement. Enterprises captain estimated that 1.5 hours (90 minutes) were required to get the converted aircraft into the air.
Eventually the shelling forced Pueblo to stop, signal compliance and follow the North Korean vessels as ordered. Pueblo stopped again immediately outside North Korean waters in an attempt to obtain more time for destroying sensitive material, but was immediately fired upon by the submarine chaser, and a sailor, fireman Duane Hodges, was killed, after which Pueblo resumed following the North Korean vessels. The ship was finally boarded at 05:55 UTC (2:55 pm local) by men from a torpedo boat and the submarine chaser. Crew members had their hands tied and were blindfolded, beaten, and prodded with bayonets. Once Pueblo was in North Korean territorial waters, she was boarded again, this time by high-ranking North Korean officials.
The first official confirmation that the ship was in North Korean hands came five days later, 28 January 1968. Two days earlier, a flight by a CIA A-12 Oxcart aircraft from the Project Black Shield squadron at Kadena, Okinawa, flown by pilot Jack Weeks, made three high-altitude, high-speed flights over North Korea. When the aircraft's films were processed in the United States, they showed Pueblo to be in the Wonsan harbor area surrounded by two North Korean vessels.
There was dissent among government officials in the United States regarding the nation's response to the situation. Congressman Mendel Rivers suggested that President Johnson issue an ultimatum for the return of Pueblo under penalty of nuclear attack, while Senator Gale McGee said that the United States should wait for more information and not make "spasmodic response[s] to aggravating incidents." According to Horace Busby, Special Assistant to President Johnson, the president's "reaction to the hostage taking was to work very hard here to keep down any demands for retaliation or any other attacks upon North Koreans", worried that rhetoric might result in the hostages being killed.
On Wednesday, 24 January 1968, the day following the incident, after extensive cabinet meetings Washington decided that its initial response should be to:
Deploy air and naval forces to the immediate area.
Make reconnaissance flights over the location of the Pueblo.
Call up military reserves and extend terms of military service.
Protest the incident within the framework of the United Nations.
Have President Johnson personally cable Soviet premier Alexei Kosygin.
The Johnson Administration also considered a blockade of North Korean ports, air strikes on military targets and an attack across the Demilitarized Zone separating the two Koreas.
Although American officials at the time assumed that the seizure of Pueblo had been directed by the Soviet Union, declassified Soviet archives later showed that the Soviet leadership was caught by surprise, and became fearful of the possibility of war on the Korean peninsula. Eastern Bloc ambassadors actively cautioned North Korea to exercise caution in the aftermath of the incident. Several documents suggest that the aggressive action may have been an attempt by North Korea to signal a tilt towards the Chinese Communist Party in the aftermath of the Sino-Soviet split in 1966.
AftermathPueblo was taken into port at Wonsan and the crew was moved twice to prisoner-of-war (POW) camps. The crew members reported upon release that they were starved and regularly tortured while in North Korean custody. This treatment turned worse when the North Koreans realized that crewmen were secretly giving them "the finger" in staged propaganda photos.
Commander Lloyd M. Bucher was psychologically tortured, including being put through a mock firing squad in an effort to make him confess. Eventually the North Koreans threatened to execute his men in front of him, and Bucher relented and agreed to "confess to his and the crew's transgression." Bucher wrote the confession since a "confession" by definition needed to be written by the confessor himself. They verified the meaning of what he wrote, but failed to catch the pun when he said "We paean the DPRK [North Korea]. We paean their great leader Kim Il Sung". (Bucher pronounced "paean" as "pee on.")
Negotiations for the release of the crew took place at Panmunjom. At the same time, U.S. officials were concerned with conciliating the South Koreans, who expressed discontent about being left out of the negotiations. Richard A. Ericson, a political counselor for the American embassy in Seoul and operating officer for the Pueblo negotiations, notes in his oral history:
The South Koreans were absolutely furious and suspicious of what we might do. They anticipated that the North Koreans would try to exploit the situation to the ROK's disadvantage in every way possible, and they were rapidly growing distrustful of us and losing faith in their great ally. Of course, we had this other problem of how to ensure that the ROK would not retaliate for the Blue House Raid and to ease their growing feelings of insecurity. They began to realize that the DMZ was porous and they wanted more equipment and aid. So, we were juggling a number of problems.
He also noted how the meetings at Panmunjom were usually unproductive because of the particular negotiating style of the North Koreans:
As one example, we would go up with a proposal of some sort on the release of the crew and they would be sitting there with a card catalog ... If the answer to the particular proposal we presented wasn't in the cards, they would say something that was totally unresponsive and then go off and come back to the next meeting with an answer that was directed to the question. But there was rarely an immediate answer. That happened all through the negotiations. Their negotiators obviously were never empowered to act or speak on the basis of personal judgment or general instructions. They always had to defer a reply and presumably they went over it up in Pyongyang and passed it around and then decided on it. Sometimes we would get totally nonsensical responses if they didn't have something in the card file that corresponded to the proposal at hand.
Ericson and George Newman, the Deputy Chief of Mission in Seoul, wrote a telegram for the State Department in February 1968, predicting how the negotiations would play out:
What we said in effect was this: If you are going to do this thing at Panmunjom, and if your sole objective is to get the crew back, you will be playing into North Korea's hands and the negotiations will follow a clear and inevitable path. You are going to be asked to sign a document that the North Koreans will have drafted. They will brook no changes. It will set forth their point of view and require you to confess to everything they accuse you of ... If you allow them to, they will take as much time as they feel they need to squeeze every damn thing they can get out of this situation in terms of their propaganda goals, and they will try to exploit this situation to drive a wedge between the U.S. and the ROK. Then when they feel they have accomplished all they can, and when we have agreed to sign their document of confession and apology, they will return the crew. They will not return the ship. This is the way it is going to be because this is the way it has always been.
Following an apology, a written admission by the U.S. that Pueblo had been spying, and an assurance that the U.S. would not spy in the future, the North Korean government decided to release the 82 remaining crew members, although the written apology was preceded by an oral statement that it was done only to secure the release. On 23 December 1968, the crew was taken by buses to the Korean Demilitarized Zone (DMZ) border with South Korea and crossing at the "Bridge of No Return", carrying with them the body of Fireman Duane D. Hodges, who was killed during the capture. Exactly 11 months after being taken prisoner, the captain led the long line of crewmen, followed at the end by the executive officer, Lieutenant Ed Murphy, the last man across the bridge.
Bucher and all of the officers and crew subsequently appeared before a Navy Court of Inquiry. A court-martial was recommended for Bucher and the officer in charge of the research department, Lieutenant Steve Harris, for surrendering without a fight and for failing to destroy classified material, but Secretary of the Navy John Chafee, rejected the recommendation, stating, "They have suffered enough." Commander Bucher was never found guilty of any indiscretions and continued his Navy career until retirement.
In 1970, Bucher published an autobiographical account of the USS Pueblo incident entitled Bucher: My Story. Bucher died in San Diego on 28 January 2004, at the age of 76. James Kell, a former sailor under his command, suggested that the injuries that Bucher suffered during his time in North Korea contributed to his death.
Along with the Battle of Khe Sanh and the Tet Offensive, the Pueblo incident was a key factor in turning U.S. public opinion against the Vietnam War and influencing Lyndon B. Johnson into withdrawing from the 1968 presidential election.
USS Pueblo is still held by North Korea. In October 1999, she was towed from Wonsan on the east coast, around the Korean Peninsula, to the port of Nampo on the west coast. This required moving the vessel through international waters, and was undertaken just before the visit of U.S. presidential envoy James Kelly to Pyongyang. After the stop at the Nampo shipyard, Pueblo was relocated to Pyongyang and moored on the Taedong River near the spot where the General Sherman incident is believed to have taken place. In late 2012, Pueblo was moved again to the Pothonggang Canal in Pyongyang, next to a new addition to the Fatherland Liberation War Museum.
Today, Pueblo remains the second-oldest commissioned ship in the U.S. Navy, behind ("Old Ironsides"). Pueblo is one of only a few American ships to have been captured since the First Barbary War.
Breach of U.S. communications security
Reverse engineering of communications devices on Pueblo allowed the North Koreans to share knowledge with the Soviet Union that led to the replication of those communications devices. This allowed the two nations access to the US Navy's communication systems until the US Navy revised those systems. The seizure of Pueblo followed soon after US Navy warrant officer John Anthony Walker introduced himself to Soviet authorities, setting up the Walker spy ring. It has been argued that the seizure of Pueblo was executed specifically to capture the encryption devices aboard.
Without them, it was difficult for the Soviets to make full use of Walker's information.Heath, Laura J. Analysis of the Systemic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967–1974, as Exploited by CWO John Walker (PDF) U.S. Army Command and General Staff College Master's Thesis. 2005. Mitchell Lerner and Jong-Dae Shin argue that Soviet-bloc Romanian dossiers demonstrate that the Soviets had no knowledge of the capture of the ship and were taken by surprise when it happened.
After debriefing the released crew, the U.S. prepared a "Cryptographic Damage Assessment" that was declassified in late 2006. The report concluded that, while the crew made a diligent effort to destroy sensitive material, most of them were not familiar with cryptographic equipment and publications, had not received training in their proper destruction, and that their efforts were not sufficient to prevent the North Koreans from recovering most of the sensitive material. The crew itself thought the North Koreans would be able to rebuild much of the equipment.
Cryptographic equipment on board at the time of capture included "one KL-47 for off-line encryption, two KW-7s for on-line encryption, three KWR-37s for receiving the Navy Operational Intelligence Broadcast, and four KG-14s which are used in conjunction with the KW-37 for receiving the Fleet Broadcasts." Additional tactical systems and one-time pads were captured, but they were considered of little significance since most messages sent using them would be of value for only a short time.
The ship's cryptographic personnel were subject to intense interrogation by what they felt were highly knowledgeable electronics experts. When crew members attempted to withhold details, they were later confronted with pages from captured manuals and told to correct their earlier accounts. The report concluded that the information gained from the interrogations saved the North Koreans three to six months of effort, but that they would have eventually understood everything from the captured equipment and accompanying technical manuals alone. The crew members were also asked about many U.S. cryptographic systems that were not on board the Pueblo, but only supplied superficial information.
The Pueblo carried key lists for January, February and March 1968, but immediately after the Pueblo was captured, instructions were sent to other holders of those keys not to use them, so damage was limited. However it was discovered in the debriefing that the Pueblo had onboard superseded key lists for November and December 1967 which should have been destroyed by January 15, well before the Pueblo arrived on station, according to standing orders. The report considered the capture of the superseded keys for November and December the most damaging cryptographic loss. The capture of these keys likely allowed North Korea and its allies to read more than 117,000 classified messages sent during those months. The North Koreans would also have gained a thorough knowledge of the workings of the captured systems but that would only have been of use if additional key material was compromised in the future. The existence of the Walker spy ring was, of course, not known at the time of the report.
The report noted that "the North Koreans did not display any of the captured cryptographic material to the crew, except for some equipment diagrams, or otherwise publicize the material for propaganda purposes. When contrasted with the international publicity given to the capture of other highly classified Special Intelligence documents, the fact that this material was not displayed or publicized would indicate that they thoroughly understood its significance and the importance of concealing from the United States the details of the information they had acquired."
In the communist camp
Documents released from National Archives of Romania suggest it was the Chinese rather than the Soviets who actively encouraged the reopening of hostilities in Korea during 1968, promising North Korea vast material support should hostilities in Korea resume. Together with Blue House Raid, the Pueblo incident turned out to be part of an increasing divergence between the Soviet leadership and North Korea. Fostering a resumption of hostilities in Korea, allegedly, was seen in Beijing as a way to mend relations between North Korea and China, and pull North Korea back in the Chinese sphere of influence in the context of the Sino-Soviet split. After the (then secret) diplomatic efforts of the Soviets to have the American crew released fell on deaf ears in Pyongyang, Leonid Brezhnev publicly denounced North Korea's actions at the 8th plenary session of the 23rd Congress of the Communist Party of the Soviet Union. In contrast, the Chinese (state controlled) press published declarations supportive of North Korea's actions in the Pueblo incident.
Furthermore, Soviet archives reveal that the Soviet leadership was particularly displeased that North Korean leader Kim Il-sung had contradicted the assurances he previously gave Moscow that he would avoid a military escalation in Korea. Previously secret documents suggest the Soviets were surprised by the Pueblo incident, first learning of it in the press. The same documents reveal that the North Koreans also kept the Soviets completely in the dark regarding ongoing negotiations with the Americans for the crew's release, which was another bone of contention. The Soviet reluctance at a reopening of hostilities in Korea was partly motivated by the fact that they had a 1961 treaty with North Korea that obliged them to intervene in case the latter got attacked. Brezhnev however had made it clear in 1966 that just as in the case of the similar treaty they had with China, the Soviets were prepared to ignore it rather than go to all-out war with the United States.
Given that Chinese and North Korean archives surrounding the incident remain secret, Kim Il-sung's intentions cannot be known with certainty. The Soviets revealed however that Kim Il-sung sent a letter to Alexei Kosygin on 31 January 1968 demanding further military and economic aid, which was interpreted by the Soviets as the price they would have to pay to restrain Kim Il-sung's bellicosity. Consequently, Kim Il-sung was invited to Moscow, but he refused to go in person owing to "increased defense preparations" he had to attend to, sending instead his defense minister, Kim Chang-bong, who arrived on 26 February 1968. During a long meeting with Brezhnev, the Soviet leader made it clear that they were not willing to go to war with the United States, but agreed to an increase in subsidies for North Korea, which did happen in subsequent years.
Timeline of negotiations
With Major General Pak Chung-kuk representing North Korea (DPRK) and U.S. Navy Rear Admiral John Victor Smith representing the United States until April 1968, at which point he is replaced by U.S. Army Major General Gilbert H. Woodward. Timeline and quotations are taken from Matter of Accountability by Trevor Armbrister.
{| class="wikitable"
|-
! Date !! Chief Negotiator !! Event / Position of respective government
|- style="background:lightgrey"
| 23 January 1968 (around noon local time)
|
| Pueblo is intercepted by North Korean forces close to the North Korean port city of Wonsan.
|- style="background:lightgrey"
| rowspan="4" | 24 January 1968 (11am local time)
| rowspan="2" | Admiral Smith
| Protests the "heinous" Blue House raid and subsequently plays a tape of a captured North Korean soldier's "confession" ...
|- style="background:#6699CC"
| I want to tell you, Pak, that the evidence against you North Korean Communists is overwhelming ... I now have one more subject to raise which is also of an extremely serious nature. It concerns the criminal boarding and seizure of ... Pueblo in international waters. It is necessary that your regime do the following: one, return the vessel and crew immediately; two, apologize to the Government of the United States for this illegal action. You are advised that the United States reserves the right to ask for compensation under international law.|- style="background:lightgrey"
| rowspan = "2" | General Pak
| style="background:#FE6F5E" | Our saying goes, 'A mad dog barks at the moon', ... At the two hundred and sixtieth meeting of this commission held four days ago, I again registered a strong protest with your side against having infiltrated into our coastal waters a number of armed spy boats ... and demanded you immediately stop such criminal acts ... this most overt act of the U.S. imperialist aggressor forces was designed to aggravate tension in Korea and precipitate another war of aggression ... |- style="background:#F88379"
| The United States must admit that Pueblo entered North Korean waters, must apologize for this intrusion, and must assure the Democratic People's Republic of Korea that such intrusions will never happen again. Admit, Apologize and Assure (the "Three As").
|- style="background:lightgrey"
| 4 March 1968
|
| Names of dead and wounded prisoners are provided by the DPRK.
|- style="background:lightgrey"
| late April 1968
|
| Admiral Smith is replaced by U.S. Army Major General Gilbert H. Woodward as chief negotiator.
|- style="background:lightgrey"
| 8 May 1968
|
| General Pak presents General Woodward with the document by which the United States would admit that Pueblo had entered the DPRK's waters, would apologize for the intrusion and assure the DPRK that such an intrusion would never happen again. It cited the Three As the only basis for a settlement and went on to denounce the United States for a whole host of other "crimes".
|- style="background:lightgrey"
| rowspan = "3" | 29 August 1968
| rowspan = "2" | General Woodward
| A proposal drafted by U.S. Under Secretary of State Nicholas Katzenbach [the "overwrite" strategy] is presented.
|- style="background:#6699CC"
| If I acknowledge receipt of the crew on a document satisfactory to you as well as to us, would you then be prepared to release all of the crew?|- style="background:lightgrey"
| General Pak
| style="background:#FE6F5E" | Well, we have already told you what you must sign ... |- style="background:lightgrey"
| 17 September 1968
| General Pak
| style="background:#FE6F5E" | If you will sign our document, something might be worked out ... |- style="background:lightgrey"
| rowspan = "2" | 30 September 1968
| General Pak
| style="background:#FE6F5E" | If you will sign the document, we will at the same time turn over the men.|- style="background:lightgrey"
| General Woodward
| style="background:#6699CC" | We do not feel it is just to sign a paper saying we have done something we haven't done. However, in the interest of reuniting the crew with their families, we might consider an 'acknowledge receipt
|- style="background:lightgrey"
| rowspan = "3" | 10 October 1968
| rowspan = "2" | General Woodward
| (demonstrating to General Pak the nature of the 'signing')
|- style="background:#6699CC"
| I will write here that I hereby acknowledge receipt of eighty-two men and one corpse ... |- style="background:lightgrey"
| General Pak
| style="background:#FE6F5E" | You are employing sophistries and petty stratagems to escape responsibility for the crimes which your side committed ... |- style="background:lightgrey"
| 23 October 1968
|
| The "overwrite" proposal is again set out by General Woodward and General Pak again denounces it as a "petty strategem".
|- style="background:lightgrey"
| rowspan = "2" | 31 October 1968
| General Woodward
| style="background:#6699CC" | If I acknowledge receipt of the crew on a document satisfactory to you as well as to us, would you then be prepared to release all of the crew?|- style="background:lightgrey"
| General Pak
| style="background:#F88379" | The United States must admit that Pueblo had entered North Korean waters, must apologize for this intrusion, and must assure the Democratic People's Republic of Korea that this will never happen again.|- style="background:lightgrey"
| rowspan = "3" | 17 December 1968
| General Woodward
| Explains a proposal by State Department Korea chief James Leonard: the "prior refutation" scheme. The United States would agree to sign the document but General Woodward would then verbally denounce it once the prisoners had been released.
|- style="background:lightgrey"
| rowspan = "2" | General Pak
| [following a 50min recess]
|- style="background:#FE6F5E"
| I note that you will sign my document ... we have reached agreement.|- style="background:lightgrey"
| 23 December 1968
|
| General Woodward on behalf of the United States signs the Three As document and the DPRK at the same time allows Pueblo's prisoners to return to U.S. custody.
|}
Tourist attractionPueblo is a tourist attraction in Pyongyang, North Korea, since being moved to the Taedong River. Pueblo used to be anchored at the spot where it is believed the General Sherman incident took place in 1866. In late November 2012 Pueblo was moved from the Taedong river dock to a casement on the Pothong river next to the new Fatherland War of Liberation Museum. The ship was renovated and made open to tourists with an accompanying video of the North Korean perspective in late July 2013. To commemorate the anniversary of the Korean War, the ship had a new layer of paint added. Visitors are allowed to board the ship and see its secret code room and crew artifacts.
Offer to repatriate
During an August 2005 diplomatic session in North Korea, former U.S. Ambassador to South Korea Donald Gregg received verbal indications from high-ranking North Korean officials that the state would be willing to repatriate Pueblo to United States authorities, on the condition that a prominent U.S. government official, such as the Secretary of State, come to Pyongyang for high level talks. While the U.S. government has publicly stated on several occasions that the return of the still commissioned Navy vessel is a priority, there has been no indication that the matter was brought up by U.S. Secretary of State Mike Pompeo on his April 2018 visit.
Lawsuits
Former Pueblo crew members William Thomas Massie, Dunnie Richard Tuck, Donald Raymond McClarren, and Lloyd Bucher sued the North Korean government for the abuse they suffered at its hands during their captivity. North Korea did not respond to the suit. In December 2008, U.S. District Judge Henry H. Kennedy, Jr., in Washington, D.C., awarded the plaintiffs $65 million in damages, describing their ill treatment by North Korea as "extensive and shocking." The plaintiffs, as of October 2009, were attempting to collect the judgement from North Korean assets frozen by the U.S. government.
In February 2021 a US court awarded the survivors and their families $2.3 billion. It is uncertain if they will be able to collect the money from North Korea.
AwardsPueblo has earned the following awards –
As for the crew members, they did not receive full recognition for their involvement in the incident until decades later. In 1988, the military announced it would award Prisoner of War medals to those captured in the nation's conflicts. While thousands of American prisoners of war were awarded medals, the crew members of Pueblo did not receive them. Instead, they were classified as "detainees". It was not until Congress passed a law overturning this decision that the medals were awarded; the crew finally received the medals at San Diego in May 1990.
Representation in popular culture
The 1968 Star Trek episode "The Enterprise Incident" was very loosely based upon the Pueblo incident. In the episode written by D. C. Fontana, Captain Kirk takes the Federation starship USS Enterprise, apparently without authorization, into enemy Romulan space.
The Pueblo incident was dramatically depicted in the 1973 ABC Theater televised production Pueblo. Hal Holbrook starred as Captain Lloyd Bucher. The two-hour drama was nominated for three Emmy Awards, winning two.
See also
1969 EC-121 shootdown incident
Korean DMZ Conflict (1966–1969)
List of museums in North Korea
Other conflicts:
Gulf of Tonkin incident
Hainan Island incident
Mayaguez incident
USS Liberty incident
General:
Technical research ship
List of hostage crises
References
Sources
NKIDP: Crisis and Confrontation on the Korean Peninsula: 1968–1969, A Critical Oral History
USS Pueblo Today usspueblo.org
Further reading
Armbrister, Trevor. A Matter of Accountability: The True Story of the Pueblo Affair. Guilford, Conn: Lyon's Press, 2004.
Brandt, Ed. The Last Voyage of USS Pueblo. New York: Norton, 1969.
Bucher, Lloyd M., and Mark Rascovich. Pueblo and Bucher. London: M. Joseph, 1971.
Cheevers, Jack. Act of War: Lyndon Johnson, North Korea, and the Capture of the Spy Ship Pueblo. New York : NAL Caliber, 2013.
Crawford, Don. Pueblo Intrigue; A Journey of Faith. Wheaton, Ill: Tyndale House Publishers, 1969.
Gallery, Daniel V. The Pueblo Incident. Garden City, N.Y.: Doubleday, 1970.
Harris, Stephen R., and James C. Hefley. My Anchor Held. Old Tappan, N.J.: F.H. Revell Co, 1970.
Hyland, John L., and John T. Mason. Reminiscences of Admiral John L. Hyland, USN (Ret.). Annapolis, MD: U.S. Naval Institute, 1989.
Lerner, Mitchell B. The Pueblo Incident: A Spy Ship and the Failure of American Foreign Policy. Lawrence, Kan: University Press of Kansas, 2002.
Liston, Robert A. The Pueblo Surrender: A Covert Action by the National Security Agency. New York: M. Evans, 1988.
Michishita, Narushige. North Korea's Military-Diplomatic Campaigns, 1966–2008. London: Routledge, 2010.
Mobley, Richard A. Flash Point North Korea: The Pueblo and EC-121 Crises. Annapolis, Md: Naval Institute Press, 2003.
Murphy, Edward R., and Curt Gentry. Second in Command; The Uncensored Account of the Capture of the Spy Ship Pueblo. New York: Holt, Rinehart and Winston, 1971.
Newton, Robert E. The Capture of the USS Pueblo and Its Effect on SIGINT Operations. [Fort George G. Meade, Md.]: Center for Cryptologic History, National Security Agency, 1992.
External links
"The Pueblo Incident" briefing and analysis by the US Navy (1968)
YouTube video taken of and aboard the USS Pueblo in Korea
Official website by former USS Pueblo crew members
Complaint and court judgment from crew members' lawsuit against North Korea
Puebloon Google Maps satellite image
Naval Vessel Register listing
– a 1973 TV movie about the Pueblo incident
North Korean International Documentation Project
A North Korean video on the issue
A Navy and Marine Corps report of investigation of the "USS Pueblo'' seizure" conducted pursuant to chapter II of the Manual of the Judge Advocate General (JAGMAN) published as six PDF files: 1 2 3 4 5 6
Pueblo Court of Inquiry Scrapbook, 1969-1976, MS 237 held by Special Collection & Archives, Nimitz Library at the United States Naval Academy
"USS Pueblo Crisis," Wilson Center Digital Archive
Reactions to Pueblo Incident (1968), Texas Archive of the Moving Image
1944 ships
1968 in North Korea
1968 in the United States
Cold War auxiliary ships of the United States
USS Pueblo
Conflicts in 1968
Ships of the United States Army
Design 381 coastal freighters
Espionage scandals and incidents
International maritime incidents
Maritime incidents in 1968
Military history of North Korea
United States Navy in the 20th century
1960s in the United States
1970s in the United States
Museum ships in North Korea
North Korea–United States relations
Ships built in Kewaunee, Wisconsin
United States Navy Colorado-related ships
Vessels captured from the United States Navy
Tourist attractions in Pyongyang
History of cryptography
National Security Agency
Signals intelligence
1968 in military history
Banner-class environmental research ships |
22036024 | https://en.wikipedia.org/wiki/Compendium%20%28software%29 | Compendium (software) | Compendium is a computer program and social science tool that facilitates the mapping and management of ideas and arguments. The software provides a visual environment that allows people to structure and record collaboration as they discuss and work through "wicked problems".
The software was released by the not-for-profit Compendium Institute. The current version operationalises the issue-based information system (IBIS), an argumentation mapping structure first developed by Horst Rittel in the 1970s. Compendium adds hypertext functionality and database interoperability to the issue-based notation derived from IBIS.
Compendium source code was fully released under LGPL licence on 13 January 2009. Compendium can still be downloaded, but is no longer actively maintained.
Applications
Compendium visually represents thoughts and illustrates the various interconnections between different issues (or questions), ideas (or answers), and arguments. It can be used for applications as varied as: issue mapping in meetings, design rationales and requirements analysis, meeting management (agendas and minutes), action item and issue tracking, requirements management, classification, management templates, and reference databases (such as personal knowledge bases).
The creation of issue maps graphically represents the relations between issues and ideas, and facilitates the understanding of interconnected topics through diagrammatic representation.
The software can be used by a group of people in a collaborative manner to convey ideas to each other using visual diagrams. A group facilitation method called dialogue mapping is especially suited for use with Compendium.
Compendium templates for critical thinking can be used to create argument maps using the argumentation schemes developed by argumentation theory scholars such as Douglas N. Walton, Chris Reed, and Fabrizio Macagno. Argumentation schemes are pre-defined patterns of reasoning for analysing and constructing arguments; each scheme is accompanied by a list of critical questions that can be used to evaluate whether a particular argument is good or fallacious. By using these argumentation schemes, users of Compendium can examine claims in more detail to uncover their implicit logical substructure and improve the rigor and depth of discussions.
Features
Ideas are represented as icons called nodes. There are ten types of node: question, answer, list view, map view, pro, con, note, decision, reference, argument. There are three types of relationship between nodes: associative, transclusive, categorical. Images can be placed directly into a view, assigned to a node, or assigned to the background picture.
Drag and drop documents and websites onto a map
Complete freedom to arrange icons
Keyword tagging
Map and label the connections between concepts to illustrate links
Create dialogue maps to display links between everyone's ideas in group projects
Create argument maps collaboratively, editing each other's writing
Create issue/problem templates
Share learning pathways
Organise large amounts of information
Place resources in sequence to develop a learning path
Users can choose to use Compendium with either the Apache Derby (internal) or MySQL (external) relational database management system.
The software is networked and supports concurrency and different views when using MySQL.
History
Compendium is the result of fifteen years of development in collaborative modeling, initiated in the mid-1990s by Al Selvin and Maarten Sierhuis at NYNEX Science & Technology; the theory behind the software hails from the 1970s, when IBIS (issue-based information system) was first conceptualised by Horst Rittel. Selvin and Sierhuis built on Jeff Conklin's earlier hypertext issue mapping software: gIBIS and QuestMap.
Many associations have thence contributed ideas to the development of Compendium. These institutions include Blue Oxen Associates, Center for Creative Leadership, Open University's Knowledge Media Institute, Verizon, CogNexus Institute, and Agent iSolutions. In 2012 the Compendium community established CompendiumNG to further advance and develop the software.
See also
Argument map
Concept map
Graph database
Issue tree
Knowledge base
List of concept- and mind-mapping software
References
Further reading
External links
Argument mapping
Collaborative software
Java platform software
Mind-mapping software
Note-taking software
Free QDA software
Free software programmed in Java (programming language)
Concept- and mind-mapping software programmed in Java |
3451937 | https://en.wikipedia.org/wiki/Java%20Media%20Framework | Java Media Framework | The Java Media Framework (JMF) is a Java library that enables audio, video and other time-based media to be added to Java applications and applets. This optional package, which can capture, play, stream, and transcode multiple media formats, extends the Java Platform, Standard Edition (Java SE) and allows development of cross-platform multimedia applications.
Versions and licensing
An initial, playback-only version of JMF was developed by Sun Microsystems, Silicon Graphics, and Intel, and released as JMF 1.0 in 1997. JMF 2.0, developed by Sun and IBM, came out in 1999 and added capture, streaming, pluggable codecs, and transcoding. JMF is branded as part of Sun's "Desktop" technology of J2SE opposed to the Java server-side and client-side application frameworks. The notable exceptions are Java applets and Java Web Start, which have access to the full JMF in the web browser's or appletviewer's underlying JRE.
JMF 2.0 originally shipped with an MP3 decoder and encoder. This was removed in 2002, and a new MP3 playback-only plug-in was posted in 2004.
JMF binaries are available under a custom license, and the source is available under the SCSL.
The current version ships with four JAR files, and shell scripts to launch four JMF-based applications:
JMStudio - A simple player GUI
JMFRegistry - A GUI for managing the JMF "registry," which manages preferences, plug-ins, etc.
JMFCustomizer - Used for creating a JAR file that contains only the classes needed by a specific JMF application, which allows developers to ship a smaller application.
JMFInit
JMF is available in an all-Java version and as platform-specific "performance packs", which can contain native-code players for the platform, and/or hooks into a multimedia engine specific to that platform. JMF 2.0 offers performance packs for Linux, Solaris (on SPARC) and Windows.
In January 2011, Tudor Holton of Bentokit Project released a Debian package for the JMF to alleviate difficulties that had arisen over time when installing the JMF on Debian and Ubuntu Linux. This package does not contain the JMF, but presents the user with the JMF License, retrieves it from the Oracle website, and then installs it. A similar Debian package installer for the JMF MP3 Plugin was also built in February 2011.
Design concepts
JMF abstracts the media it works with into DataSources (for media being read into JMF) and DataSinks (for data being exported out). It does not afford the developer significant access to the particulars of any given format; rather, media is represented as sources (themselves obtained from URL's) that can be read in and played, processed, and exported (though not all codecs support processing and transcoding).
A Manager class offers static methods that are the primary point-of-contact with JMF for applications.
Criticism and alternatives
Many JMF developers have complained that the JMF implementation supplied in up-to-date JRE's supports relatively few up-to-date codecs and formats. Its all-Java version, for example, cannot play MPEG-2, MPEG-4, Windows Media, RealMedia, most QuickTime movies, Flash content newer than Flash 2, and needs a plug-in to play the ubiquitous MP3 format. While the performance packs offer the ability to use the native platform's media library, they're only offered for Linux, Solaris and Windows. In particular, MS Windows-based JMF developers new to JMF often expect support for some newer formats on all platforms when such formats are only, in fact, supported on MS Windows.
While JMF is considered a very useful framework, the freely available implementation provided by Oracle is suffering from a lack of updates and maintenance. JMF does not get much maintenance effort from Oracle; the API has not been enhanced since 1999, and the last news item on JMF's home page was posted in September 2008. While JMF is built for extensibility, there are few such third-party extensions. Furthermore, content editing functionality in JMF is effectively non-existent. You can do simple recording and playback for audio and video, but the implementation provided by Oracle can do little else.
Platforms beyond those that Oracle provides support to are left to their corresponding JRE vendors. While Sun still provides a forum for discussion of its implementation, there have been several efforts to implement open-source alternatives.
Alternatives
Depending on a developer's needs, several other libraries may be more suitable than JMF. These include:
Freedom for Media in Java (FMJ) An API-compatible with JMF open source alternative
QuickTime for Java
IBM Toolkit for MPEG-4
Jffmpeg
vlcj
gstreamer-java
Cortado, a complete player for Ogg Vorbis and Theora in a Java applet
Directshow <> Java Wrapper
JLayer MP3 library
Video4Linux4Java
Code example
The following example shows an AWT file-selection dialog, and attempts to load and play the media file selected by the user.
import javax.media.*;
import java.io.File;
import java.awt.*;
public class TrivialJMFPlayer extends Frame {
public static void main (String[] args) {
try {
Frame f = new TrivialJMFPlayer();
f.pack();
f.setVisible (true);
} catch (Exception e) {
e.printStackTrace();
}
}
public TrivialJMFPlayer()
throws java.io.IOException,
java.net.MalformedURLException,
javax.media.MediaException {
FileDialog fd = new FileDialog
(this, "TrivialJMFPlayer", FileDialog.LOAD);
fd.setVisible(true);
File f = new File(fd.getDirectory(), fd.getFile());
Player p = Manager.createRealizedPlayer
(f.toURI().toURL());
Component c = p.getVisualComponent();
add(c);
p.start();
}
}
Much of the example is involved with the building of the AWT GUI. Only two lines touch JMF. Manager.createRealizedPlayer() implicitly creates a DataSource from a URL representation of the file, creates a Player, and realizes it, meaning that all resources necessary for playback are allocated and initialized. The getVisualComponent() asks the Player for an AWT Component suitable for use in a GUI. If a control component were desired, it would be obtained with getControlPanelComponent() and added to the GUI separately. Note that the developer is not concerned with the format of the media - this code works equally well for any media format that JMF can import and read.
References
Java APIs
Multimedia frameworks |
58100028 | https://en.wikipedia.org/wiki/RFPIO | RFPIO | RFPIO (RFPIO, Inc.) is a privately owned developer of cloud-based software that automates and streamlines the process of responding to a request for proposal (RFP) based in Beaverton, Oregon. The company also maintains an office in Coimbatore, India. Founded in 2015, the company has expanded rapidly and now has more than 150,000 users worldwide after tripling its user base in 2019 and sustaining growth during the global pandemic. RFPIO software has supported more than $20 billion in RFP responses.
History
The company was founded in 2015 by Ganesh Shankar, AJ Sunder, and Sankar Lagudu to streamline RFP processes for mid-to-large enterprises. RFPIO was formed in response to the problems Shankar and his colleagues experienced gathering information and compiling responses for RFPs and being unable to find a suitable automation solution. By developing a cloud-based proposal management system, Shankar aimed to simplify and automate the RFP process and make it easier for cross-functional teams to collaborate.
The company experienced rapid growth from the outset and reported having 50 employees in Oregon and India at the end of 2018.
On 2 October 2018, the company obtained its first patent involving the conversion and presentation of proposal documents in a user-friendly format.
In February 2019, Express Scripts selected the RFPIO response management platform as part of a long-term business transformation initiative. RFPIO reported over 250% growth and more than 125 employees by the end of 2019.
In January 2020, RFPIO expanded its executive team with the additions of Angela Earl, vice president of global marketing and Mohan Natraj, vice president of customer success. Konnor Martin was also promoted to regional vice president of sales for North America. In July 2020, the company reported a 150% increase in usage of RFPIO services, continuing the firm’s growth despite the COVID-19 pandemic.
In April 2021, Microsoft reported saving an estimated $2.4M with RFPIO's Response Management Software. 18 months after implementation, the Microsoft team gave nearly 7,000 users access to 36,200 ready-to-go RFx responses from RFPIO's AI-enabled Answer Library, translating into 12,000 total hours saved.
In August 2021, RFPIO acquired RFP360, a Kansas-based RFP software competitor, bringing RFPIO's employee count to 300.
Financing
RFPIO’s first round of funding was secured in 2016 through Portland-based investment firm Elevate Capital and from the angel investment group TiE Oregon. In October 2016, RFPIO received $100,000 at the Bend Venture Conference for the company’s performance in the Growth Stage competition. In December 2016, Stephen Marsh, founder of Smarsh, whose company was an early customer of RFPIO, invested $500,000 in the company through his investment vehicle Archivist Capital.
In July 2018, the company secured a $25 million funding round from private equity firm K1 Investment Management to accelerate growth and cashed out some of its early investors. This resulted in an early exit for Elevate Capital and produced significant returns.
Services
RFPIO’s cloud-based software incorporates artificial intelligence, project management and collaboration capabilities and integrates with common sales management applications to help companies respond to RFPs. The platform also allows salespeople to create personalized, proactive selling documents and has built in e-signature functionality. Companies using RFPIO include ADP, Adobe, Britannica Digital Learning, Broadcom, DTI Global, Express Scripts, Google Cloud, Facebook, LinkedIn, Microsoft, Salesforce, Smarsh, Zoom and others from across multiple industry segments
Awards and recognition
In 2020, RFPIO was ranked 14th in a list of the top 100 software products for 2020 out of the more than 57,000 software companies listed on G2 Crowd, a crowd-sourced software review service. The company also received a Silver Stevie Award for Customer Service Department of the year, was named a top 10 tech startup in Oregon by The Tech Tribune, and listed 7th on a list of fastest-growing companies in Portland, Ore. by Growjo. The company received the award for Best Project Management Cloud Service in the 2019-20 Cloud Awards. CEO Ganesh Shankar won the EY Entrepreneur Of The Year 2020 Pacific Northwest Region Award and was listed 5th in Comparably’s list of top CEOs for diversity. RFPIO was also named to Comparably lists for Top 50 Best Companies for Work-Life Balance, Top 50 Happiest Employees, and Top 50 Best Perks & Benefits.
See also
List of companies based in Oregon
References
Software companies established in 2015
Privately held companies based in Oregon
2015 establishments in Oregon
Companies based in Beaverton, Oregon
American companies established in 2015 |
12161725 | https://en.wikipedia.org/wiki/Association%20of%20Software%20Professionals | Association of Software Professionals | The Association of Software Professionals (ASP), formerly Association of Shareware Professionals, was a professional association for authors and developers of freeware, commercial, and shareware computer software. It was formed in April 1987, and for a time, it was considered as the most popular trade organization for independent software developers and vendors.
The ASP developed and maintain the Portable Application Description (PAD) format used to allow software authors to provide product descriptions and specifications to online sources in a standard way. As of 2021, the PAD file specification was utilized by over 40,000 software publishers and a 1000+ PAD supported software catalog websites. The PAD system is popular because web sites can pull updated data from a single file stored on the software author's site. The final release of the PAD specification, v4.0 was released to the public domain as of January 2022.
The ASP also played a role in making FILE_ID.DIZ files a de facto standard.
In 2011, the ASP purchased the rights to the Software Industry Conference from the Software Industry Awards Foundation. The conference was renamed ISVCon.
After a 34-year run, the ASP ceased operations on December 31, 2021, following a membership decision to dissolve the organization.
References
External links
Businesspeople in software
Technology trade associations |
27801066 | https://en.wikipedia.org/wiki/Parallel%20Redundancy%20Protocol | Parallel Redundancy Protocol | Parallel Redundancy Protocol (PRP) is a network protocol standard for Ethernet that provides seamless failover against failure of any network component. This redundancy is invisible to the application.
PRP nodes have two ports and are attached to two separated networks of similar topology. PRP can be implemented entirely in software, i.e. integrated in the network driver. Nodes with single attachment can be attached to one network only. This is in contrast to the companion standard HSR (IEC 62439-3 Clause 5), with which PRP shares the operating principle.
PRP and HSR are independent of the application-protocol and can be used by most Industrial Ethernet protocols in the IEC 61784 suite. PRP and HSR are standardized by the IEC 62439-3:2016). They have been adopted for substation automation in the framework of IEC 61850.
PRP and HSR are suited for applications that request high availability and short switchover time, such as: protection for electrical substation, synchronized drives, for instance in printing machines or high power inverters. For such applications, the recovery time of commonly used protocols such as the Rapid Spanning Tree Protocol (RSTP) is too long.
The cost of PRP is a duplication of all network elements that require it. Cost impact is low since it makes little difference if the spares lie on the shelf or are actually working in the plant. The maintenance interval is shortened since more components can fail in use, but such outage will remain invisible to the application.
PRP does not cover end node failures, but redundant nodes may be connected via a PRP network.
Topology
Each PRP network node (DANP) has two Ethernet ports attached to two separate local area networks of arbitrary, but similar topology. The two LANs have no links connecting them and are assumed to be fail-independent, to avoid common mode failures.
Nodes with single attachment (such as a printer) are either attached to one network only (and therefore can communicate only with other nodes attached to the same network), or are attached through a RedBox, a device that behaves like a doubly attached node.
Since HSR and PRP use the same duplicate identification mechanism, PRP and HSR networks can be connected without single point of failure and the same nodes can be built to be used in both PRP and HSR networks.
Operation
A source node (DANP) sends simultaneously two copies of a frame, one over each port. The two frames travel through their respective LANs until they reach a destination node (DANP) with a certain time skew. The destination node accepts the first frame of a pair and discards the second (if it arrives). Therefore, as long as one LAN is operational, the destination application always receives one frame. PRP provides zero-time recovery and allows to check the redundancy continuously to detect lurking failures.
Frame format
To simplify the detection of duplicates, the frames are identified by their source address and a sequence number that is incremented for each frame sent according to the PRP protocol. The sequence number, the frame size, the path identifier and an Ethertype are appended just before the Ethernet checksum in a 6-octet PRP trailer. This trailer is ignored (considered as padding) by all nodes that are unaware of the PRP protocol, and therefore these singly attached nodes (SAN) can operate in the same network.
NOTE: all legacy devices should accept Ethernet frames up to 1528 octets, this is below the theoretical limit of 1535 octets.
Implementation
The two Ethernet interfaces of a node use the same MAC address. This is allowed since the two LANs have no connection. Therefore, PRP is a layer 2 redundancy, which allows higher layer network protocols to operate without modification. A PRP node needs only one IP address. Especially, the ARP protocol will correctly relate the MAC to the IP address.
Clock synchronization
IEC 62439-3 Annex C specifies the Precision Time Protocol Industry Profile that support a clock synchronization over PRP with an accuracy of 1 μs after 15 network elements, as profile of IEEE Std 1588 precision time protocol.
Clocks can be doubly attached according to PRP, but since the correction is different according to the path, the duplicate discard method of PRP is not applicable. Also, delay measurement messages (Pdelay_Req & Pdelay_Resp) are not duplicated since they are link-local.
About every second, a master clock sends two copies of a Sync message, but not at exactly the same time since the ports are separate, therefore the original Syncs have already different time stamps.
A slave receives the two Sync messages at different times and applies the Best Master Clock Algorithm (BMCA), and when the two Sync come from the same grandmaster, the clock quality is used as a tie-breaker. A slave will normally listen to one port and supervise the other, rather than switching back and forth or using both Syncs.
This method works for several options in 1588, with Layer 2 / Layer 3 operation, and with peer-to-peer / end-to-end delay measurement. IEC 62439-3 defines these two profiles as:
L3E2E (Layer 3, end-to-end) that addresses the requirements of ODVA
L2P2P (Layer 2, peer-to-peer) that addresses the requirements of power utility in IEC 61850 and has been adopted by IEEE in IEC&IEEE 61850-9-3.
Legacy versions
The original standard IEC 62439:2010 incremented the sequence number of the Redundancy Control Trailer (RCT) in the PRP frames on a per-connection basis. This gave a good error detection coverage but difficulted the transition from PRP to the High-availability Seamless Redundancy (HSR) protocol, which uses a ring topology instead of parallel networks.
The revised standard IEC 62439-3:2012 aligned PRP with HSR using the same duplicate discard algorithm. This allowed building transparent PRP-HSR connection bridges and nodes that can operate both as PRP (DANP) and HSR (DANH).
The old IEC 62439:2010 standard is sometimes referred to as PRP-0 as it is still used in some control systems, and PRP 2012 as "PRP".
Applications
An interesting application of PRP was found in the area of wireless communication as "Timing Combiner" [], yielding significant improvement in packet loss and timing behaviour over parallel redundant wireless links.
See also
High-availability Seamless Redundancy
Media Redundancy Protocol
IEC/IEEE 61850-9-3
References
External links
ZHAW Tutorial on Parallel Redundancy Protocol (PRP)
PRP in the Wireshark Wiki
Tutorial on Parallel Redundancy Protocol (PRP)
Tutorial on High-availability Seamless Redundancy (HSR)
Tutorial on Precision Time Protocol with seamless redundancy in PRP and HSR
Commercial implementation for Microsoft Windows by Siemens SIMATIC
Networking standards
Network protocols |
54679407 | https://en.wikipedia.org/wiki/Bitcoin%20Cash | Bitcoin Cash | Bitcoin Cash is a cryptocurrency that is a fork of Bitcoin. Bitcoin Cash is a spin-off or altcoin that was created in 2017.
In November 2018, Bitcoin Cash split further into two cryptocurrencies: Bitcoin Cash and Bitcoin SV.
History
Since its inception, Bitcoin users had maintained a common set of rules for the cryptocurrency. On 21 July 2017, bitcoin miners locked-in a software upgrade referred to as Bitcoin Improvement Proposal (BIP) 91, which meant that the Segregated Witness upgrade would activate at block 477,120. Segwit controversially would enable second layer solutions on bitcoin such as the Lightning Network. A key difference of opinion between Bitcoin users was over the running of nodes. Bitcoin supporters wanted to keep blocks small so that nodes could be operated with less resources, while some large block supporters find it acceptable that (due to large block sizes), nodes might only be run by universities, private companies and nonprofits.
A group of bitcoin activists, developers, and China-based miners were unhappy with Bitcoin's proposed SegWit improvement plans meant to increase bitcoin's capacity and pushed forward alternative plans which would increase the block size limit to eight megabytes through a hard fork. Supporters of a block size increase were more committed to an on-chain medium of exchange function.
In June 2017, hardware manufacturer Bitmain, described the would-be hard fork with the increased block size as a "contingency plan", should the bitcoin community decide to fork implementing SegWit. The first implementation of the software was proposed under the name Bitcoin ABC at a conference that month. In July 2017, mining pool ViaBTC proposed the name Bitcoin Cash. In July 2017 Roger Ver and others stated they felt that adopting BIP 91 (that would later activate SegWit) favored people who wanted to treat bitcoin as a digital investment rather than as a transactional currency. The fork that created Bitcoin Cash took effect on 1 August 2017. In relation to Bitcoin it is characterized variously as a spin-off, a strand, a product of a hard fork, an offshoot, a clone, a second version or an altcoin.
A Hong Kong newspaper likened this to a new version of word processing software saying:
At the time of the fork anyone owning bitcoin came into possession of the same number of Bitcoin Cash units. The technical difference between Bitcoin Cash and Bitcoin is that Bitcoin Cash allows larger blocks in its blockchain than Bitcoin which, in theory, allows it to process more transactions per second. Bitcoin Cash was the first of the Bitcoin forks, in which software-development teams modified the original Bitcoin computer code and released coins with “Bitcoin" in their names, with "the goal of creating money out of thin air". On 1 August 2017 Bitcoin Cash began trading at about $240, while bitcoin traded at about $2,700. On 20 December 2017 it reached an intraday high of $4,355.62 and then fell 88% to $519.12 on 23 August 2018.
In 2018 Bitcoin Core developer Cory Fields found a bug in the Bitcoin ABC software that would have allowed an attacker to create a block causing a chain split. Fields notified the development team about it, and the bug was fixed.
In November 2020, there was a second contested hard fork where the leading node implementation, BitcoinABC, created BCHA.
Controversy
In 2017 there were two factions of Bitcoin supporters: those that supported large blocks and those who preferred small blocks. The Bitcoin Cash faction favors the use of its currency as a medium of exchange for commerce, while the Bitcoin-supporting faction view Bitcoin's primary use as that of a store of value. Bitcoin Cash is sometimes also referred to as Bcash. Bitcoin Cash detractors call the cryptocurrency "Bcash", "Btrash", or "a scam", while its supporters maintain that "it is the pure form of Bitcoin".
Bryan Kelly, a stock analyst likened it to a software upgrade:
Samson Mow of Blockstream pointed to Bitcoin Cash's use of the "Bitcoin" name as a source of animosity between the Bitcoin and Bitcoin Cash camps. Emin Gün Sirer, a professor at Cornell stated that Bitcoin Cash was focused on use and Bitcoin was "enormously" focused on store of value.
Trading and usage
Bitcoin Cash trades on digital currency exchanges using the Bitcoin Cash name and the BCH currency code for the cryptocurrency. On 26 March 2018, OKEx removed all Bitcoin Cash trading pairs except for BCH/BTC, BCH/ETH and BCH/USDT due to "inadequate liquidity". , daily transaction numbers for Bitcoin Cash are about one-tenth of those of bitcoin. Coinbase listed Bitcoin Cash on 19 December 2017 and the coinbase platform experienced price abnormalities that led to an insider trading investigation. As of August 2018, Bitcoin Cash payments are supported by payment service providers such as BitPay, Coinify and GoCoin.
Difficulty adjustment algorithm
Both Bitcoin, as well as Bitcoin Cash, use a proof-of-work algorithm to timestamp every new block. The proof of work algorithm used is the same in both cases. It can be described as a partial inversion of a hash function. Additionally, both Bitcoin and Bitcoin Cash target a new block to be generated every ten minutes on average. The time needed to calculate a new block is influenced by a parameter called the mining difficulty. If the total amount of mining power increases, an increase of the mining difficulty can keep the block time roughly constant. Vice versa, if the mining power decreases, a decrease of the mining difficulty can keep the block time roughly constant.
To keep the block generation time equal to ten minutes on average, both Bitcoin and Bitcoin Cash use an algorithm adjusting the mining difficulty parameter. This algorithm is called the difficulty adjustment algorithm (DAA). Originally, both Bitcoin and Bitcoin Cash used the same difficulty adjustment algorithm, adjusting the mining difficulty parameter every 2016 blocks. Since 1 August 2017, Bitcoin Cash also used an addition to the DAA, called an Emergency Difficulty Adjustment (EDA) algorithm. EDA was used alongside the original DAA and it was designed to decrease the mining difficulty of Bitcoin Cash by 20%, if the time difference between 6 successive blocks was greater than 12 hours.
EDA adjustments caused instabilities in mining difficulty of the Bitcoin Cash system, resulting in Bitcoin Cash being thousands of blocks ahead of Bitcoin. To address the problem with stability, a change of the Bitcoin Cash DAA was implemented and the EDA canceled. The change took effect on 13 November 2017. After the change, the Bitcoin Cash DAA adjusts the mining difficulty after each block. To calculate the difficulty for a new block, the Bitcoin Cash DAA uses a moving window of last 144 blocks.
A group of researchers demonstrated that, as of June 2019, Bitcoin DAA fails to generate new blocks at a constant rate as long as the hash supply is elastic. In contrast to that, the group demonstrated that Bitcoin Cash DAA is stable even when the cryptocurrency price is volatile and the supply of hash power is highly elastic.
2018 split to create Bitcoin SV
On 15 November 2018, a hard fork chain split of Bitcoin Cash occurred between two rival factions called Bitcoin Cash and Bitcoin SV. On 15 November 2018 Bitcoin Cash traded at about $289, and Bitcoin SV traded at about $96.50, down from $425.01 on 14 November for the un-split Bitcoin Cash.
The split originated from what was described as a "civil war" in two competing bitcoin cash camps. The first camp, supported by entrepreneur Roger Ver and Jihan Wu of Bitmain, promoted the software entitled Bitcoin ABC (short for Adjustable Blocksize Cap), which would maintain the block size at 32 MB. The second camp led by Craig Steven Wright and billionaire Calvin Ayre put forth a competing software version Bitcoin SV, short for "Bitcoin Satoshi Vision", which would increase the block size limit to 128 MB.
The Bitcoin SV blockchain is the largest of all Bitcoin forks, exceeding 2.5 terabytes in size.
See also
Bitcoin scalability problem
List of bitcoin forks
List of cryptocurrencies
Notes
References
External links
2017 establishments
Bitcoin clients
Cryptocurrency projects |
2294442 | https://en.wikipedia.org/wiki/KDE%20Software%20Compilation%204 | KDE Software Compilation 4 | KDE Software Compilation 4 (KDE SC 4) was the only series of the so-called KDE Software Compilation (short: KDE SC), first released in January 2008 and the last release being 4.14.3 released in November 2014. It was the follow-up to K Desktop Environment 3. Following KDE SC 4, the compilation was broken up into basic framework libraries, desktop environment and applications, which are termed KDE Frameworks 5, KDE Plasma 5 and KDE Applications, respectively.
Major releases (4.x) were released every six months, while minor bugfix releases (4.x.y) were released monthly.
The series included updates to several of the KDE Platform’s core components, notably a port to Qt 4. It contained a new multimedia API, called Phonon, a device integration framework called Solid and a new style guide and default icon set called Oxygen. It also included a new, unified desktop and panel user interface called Plasma, which supported desktop widgets, replacing K Desktop Environment 3’s separate components.
One of the overall goals of KDE Platform 4 was to make it easy for KDE applications to be portable to different operating systems. This was made possible by the port to Qt 4, which facilitated support for non-X11-based platforms, including Microsoft Windows and Mac OS X. Versions 4.0 to 4.3 of KDE Software Compilation were known simply as KDE 4 – the name change was a component of the KDE project’s re-branding to reflect KDE’s increased scope.
Major updates
This is a short overview of major changes in KDE Software Compilation 4.
General
The port to the Qt 4 series was expected to enable KDE 4 to use less memory and be noticeably faster than KDE 3. The KDE libraries themselves have also been made more efficient. However, tests reveal that KDE 4.4 has the highest memory utilization on default Ubuntu installations when compared to GNOME 2.29, Xfce 4.6, and LXDE 0.5. Qt 4 is available under the LGPL for Mac OS X and Windows, which allows KDE 4 to run on those platforms. The ports to both platforms are in an early state. , KDE Software compilation 4 on Mac OS X is considered beta, while on Windows it is not in the final state, so applications can be unsuitable for day to day use yet. Both ports are trying to use as little divergent code as possible to make the applications function almost identically on all platforms. During Summer of Code 2007 an icon cache was created to decrease application start-up times for use in KDE 4. Improvements were varied – Kfind, an application which used several hundred icons, started up in about a quarter of the time it took previously. Other applications and a full KDE session started up a little over a second faster.
Many applications in the Extragear and KOffice modules have received numerous improvements with the new features of KDE 4 and Qt 4. But since they follow their own release schedule, they were not all available at the time of the first KDE 4 release – these include Amarok, K3b, digiKam, KWord, and Krita.
Visual
The most noticeable changes for users are the new icons, theme and sounds provided by the Oxygen Project. These represent a break from previous KDE icons and graphics, which had a cartoonish look. Instead Oxygen icons opt for a more photorealistic style. The Oxygen Project builds on the freedesktop.org Icon Naming Specification and Icon Theme Specification, allowing consistency across applications. The Oxygen team uses community help for better visuals in KDE 4, with both alternate icon sets and the winners of a wallpaper contest held by the Oxygen project being included in KDE 4. There is also a new set of human interface guidelines for a more standardized layout.
Plasma provides the main desktop user interface and is a rewrite of several core KDE applications, like the desktop drawing and most notably the widget engine. Plasma allows a more customisable desktop and more versatile widgets.
KWin, the KDE Window Manager, now provides its own compositing effects, similar to Compiz.
Development
Phonon is the name of the multimedia API in KDE 4. Phonon is a different approach to multimedia backends than in previous versions of KDE. This is because Phonon only functions as a wrapper, abstracting the various multimedia frameworks available for Unix-like operating systems into runtime switchable backends that can be accessed through a single API. This was done to provide a stable API for KDE 4 and to prevent it from depending on a single multimedia framework. Applications that use the Phonon API can be switched between multimedia frameworks seamlessly by simply changing the backend used in System Settings. Nokia adopted Phonon for multimedia use in Qt 4.4 and are developing backends for Gstreamer, Windows and OS X in the KDE SVN repository under the LGPL.
Solid is the hardware API in KDE 4. It functions similarly to Phonon as it does not manage hardware on its own but makes existing solutions accessible through a single API. The current solution uses HAL, NetworkManager and BlueZ (the official Linux bluetooth stack), but any and all parts can be replaced without breaking the application, making applications using Solid extremely flexible and portable.
ThreadWeaver is a programming library to help applications take advantage of multicore processors and is included with kdelibs.
Kross is the new scripting framework for KDE 4. Kross itself is not a scripting language, but makes it easier for developers to add support for other scripting languages. Once an application adds support for Kross, any language Kross supports can be used by developers. New scripting languages can be added by creating a plugin for Kross, which benefits all applications using it.
Decibel is a Telepathy-based communication framework, which was expected to be fully used by Kopete by KDE 4.2, but which is reported to be postponed indefinitely.
Strigi is the default search tool for KDE 4, chosen for its speed and few dependencies. In concert with other software like Soprano, an RDF storage framework, and the NEPOMUK specification, Strigi will provide the beginnings of a semantic desktop in KDE 4. Users can tag files with additional information through Dolphin, which Strigi can index for more accurate searches.
KDE 4 uses CMake for its build system. Since previous versions of KDE were only on Unix systems, autotools were used, but a new build system was needed for builds on operating systems like Windows. CMake also dramatically simplified the build process. The autotools build system had become so complicated by KDE 3 that few developers understood it, requiring hours of work for simple changes. In early 2007 CMake was shown to compile KDE 4 version of KDElibs 40 % faster than the autotools compiled KDE 3 version.
DXS, previously known as GHNS (Get Hot New Stuff) and now adopted by freedesktop.org, is a web service that lets applications download and install data from the Internet with one click. It was used in the KDE 3 series but has been extended for use throughout KDE 4. One example was Kstars, that can use Astronomical data that is free for personal use but cannot be redistributed. DXS allows that data to be easily downloaded and installed from within the application instead of manually downloading it.
Akonadi is a new PIM framework for KDE 4. Akonadi is a unification of previously separate KDE PIM components. In the past each application would have its own method for storing information and handling data. Akonadi itself functions as a server that provides data and search functions to PIM applications. It is also able to update the status of contacts. So if one application changes information about a contact, all other applications are immediately informed of the change.
Released versions
KDE 4.0
The majority of development went into implementing most of the new technologies and frameworks of KDE 4. Plasma and the Oxygen style were two of the biggest user-facing changes.
Dolphin replaces Konqueror as the default file manager in KDE 4.0. This was done to address complaints of Konqueror being too complicated for a simple file manager. However Dolphin and Konqueror will share as much code as possible, and Dolphin can be embedded in Konqueror to allow Konqueror to still be used as a file manager.
Okular replaces several document viewers used in KDE 3, like KPDF, KGhostView and KDVI. Okular makes use of software libraries and can be extended to view almost any kind of document. Like Konqueror and KPDF in KDE 3, Okular can be embedded in other applications.
Pre-releases
On 11 May 2007, KDE 4.0 Alpha 1 was released marking the end of the addition of large features to KDE base libraries and shifting the focus onto integrating the new technologies into applications and the basic desktop. Alpha 1 included new frameworks to build applications with, providing improved hardware and multimedia integration through Solid and Phonon. Dolphin and Okular were integrated and a new visual appearance was provided through Oxygen icons.
On 4 July 2007, Alpha 2 was released. The release focused on integrating the Plasma desktop, improving functionality and stabilizing KDE.
On 2 August 2007, Beta 1 was released. Major features included a pixmap cache – speeding up icon loading, KDE PIM improvements, improved KWin effects and configuration, better interaction between Konqueror and Dolphin and Metalink support added to KGet for improved downloads.
On 6 September 2007, Beta 2 was released with improved BSD and Solaris support. The release included the addition of the Blitz graphic library – allowing for developers to use high performance graphical tricks like icon animation – and an overhaul of KRDC (K Remote Desktop Client) for Google’s Summer of Code. Plasma was also integrated with Amarok to provide Amarok’s central context view.
On 16 October 2007, Beta 3 was released. The beta 3 release was focused on stabilizing and finishing the design of libraries for the release of KDE Development Platform. Plasma received many new features including an applet browser. The educational software received many improvements in Marble and Parley (formerly known as KVoctrain) with bugfixes in other applications. A program called Step, an interactive physics simulator, was produced as part of the Google Summer of Code.
On 30 October 2007, Beta 4 was released. A list of release blockers was compiled, listing issues that need to be resolved before KDE will start with the release candidate cycle for the desktop. The goals were to focus on stabilization and fixing the release blockers.
At the same time, the first release candidate of KDE 4.0 Development Platform was released. The development platform contains all the base libraries to develop KDE applications, including "high-level widget libraries, a network abstraction layer and various libraries for multimedia integration, hardware integration and transparent access to resources on the network."
On 20 November 2007, Release Candidate (RC) 1 was released. This release was called a "Release Candidate" despite Plasma requiring further work and not being ready for release. On 11 December 2007, RC2 was released. The codebase was declared feature-complete. Some work was still required to fix bugs, finish off artwork and smooth out the user experience.
Release
KDE 4 was released on 11 January 2008. Despite being labelled as a stable release, it was intended for early adopters.
Continuing to use KDE 3.5 was suggested for users wanting a more stable, "feature complete" desktop.
Reception
The release of KDE 4.0 was met with a mixed reception. While early adopters were tolerant of the lack of finish for some of its new features, the release was widely criticized because of a lack of stability and its "beta" quality. Computerworld reporter Steven Vaughan-Nichols criticised KDE 4.0 and KDE 4.1 and called for a fork of KDE 3.5 by rebuilding it on top of Qt 4. The same reporter later praised KDE 4.3 and welcomed the KDE 3.5 continuation project Trinity. Although Linus Torvalds switched from GNOME to KDE on December 2005, he switched back to GNOME after Fedora replaced KDE 3.5 with 4.0. In an interview with Computerworld, he described KDE 4.0 as a "break everything" model and "half-baked" release, claiming that he expected it to be an upgrade of KDE 3.5, when the reality was that there were significant cases of features being regressed due to its extensive changes. (Torvalds did point out, however, that he understood why the developers in charge of the KDE project had chosen to make such drastic changes to the desktop environment in KDE 4.0 and the reason for its premature release, and that his criticism was more on the way KDE 4.0 was pushed out to the public.) Despite the criticism, reviewers such as Ars Technica’s Ryan Paul noted that the visual style "is very attractive and easy on the eyes" and "exhibits a relatively high level of polish" and that "the underlying technologies still have a lot of very serious potential".
KDE 4.1
KDE 4.1 was released on 29 July 2008. KDE 4.1 includes a shared emoticon theming system which is used in PIM and Kopete, and DXS, a service that lets applications download and install data from the Internet with one click. Also introduced are GStreamer, QuickTime 7, and DirectShow 9 Phonon backends. Plasma improvements include support for Qt 4 widgets and WebKit integration – allowing many Apple Dashboard widgets to be displayed. There will also be ports of some applications to Windows and Mac OS X.
New applications include:
Dragon Player multimedia player (formerly Codeine)
Kontact – with some Akonadi functionality
Skanlite scanner application
Step physics simulator
Games – Kdiamond (a Bejeweled clone), Kollision, Kubrick, KsirK, KBreakout
KDE 4.2
KDE 4.2 was released on 27 January 2009. The release is considered a significant improvement beyond KDE 4.1 in nearly all aspects, and a suitable replacement for KDE 3.5 for most users.
KDE Workspace improvements
The 4.2 release includes thousands of bug fixes and has implemented many features that were present in KDE 3.5 but had been missing in KDE 4.0 and 4.1.
These include grouping and multiple row layout in the task bar, icon hiding in the system tray, panel autohiding, window previews and tooltips are back in the panel and task bar, notifications and job tracking by Plasma, and the ability to have icons on the desktop again by using a Folder View as the desktop background where icons now remain where they are placed.
New Plasma applets include applets for leaving messages on a locked screen, previewing files, switching desktop Activity, monitoring news feeds, and utilities like the pastebin applet, the calendar, timer, special character selector, a QuickLaunch widget, and a system monitor, among many others. The Plasma workspace can now load Google Gadgets. Plasma widgets can be written in Ruby and Python. Support for applets written in JavaScript and Mac OS X dashboard widgets has been further improved. Theming improvements in the Task Bar, Application Launcher, System Tray and most other Plasma components streamline the look and feel and increase consistency. A new System Settings module, Desktop Theme Details, gives the user control over each element of various Plasma themes. Wallpapers are now provided plugins, so developers can easily write custom wallpaper systems in KDE 4.2. Available wallpaper plugins in KDE 4.2 will be slideshows, Mandelbrot fractals, and regular static images.
New desktop effects have been added such as the Magic Lamp, Minimize effect and the Cube and Sphere desktop switchers. Others, such as the desktop grid, have been improved. The user interface for choosing effects has been reworked for easy selection of the most commonly used effects. Compositing desktop effects have been enabled by default where hardware and drivers support them. Automatic checks confirm that compositing works before enabling it on the workspace.
KRunner – the "Run command…" dialog – has extended functionality through several new plugins, including spellchecking, Konqueror browser history, power management control through PowerDevil, KDE Places, Recent Documents, and the ability to start specific sessions of the Kate editor, Konqueror and Konsole. The converter plugin now also supports quickly converting between units of speed, mass and distances.
Multi-screen support has been improved through the Kephal library, fixing many bugs when running KDE on more than one monitor.
New and improved applications
New applications include PowerDevil, a power management system for controlling various aspects of mobile devices. A new printing configuration system brings back a number of features users have been missing in KDE 4.0 and 4.1. The components "printer-applet" and "system-config-printer-kde" are shipped with the kdeadmin and kdeutils module. Killbots is a new game shipped with the kdegames module.
All applications have seen bugfixes, feature additions and user interface improvements. Dolphin now supports previews of files in toolbars and has gained a slider to zoom in and out on file item views. It can now also show the full path in the breadcrumb bar. Konqueror offers increased loading speed by prefetching domain name data in KHTML. A find-as-you-type bar improves navigation in webpages. KMail has a new message header list, and reworked attachment view. The KWrite and Kate text editors can now operate in Vi input mode, accommodating those used to the traditional UNIX editor. Ark, the archiving tool has gained support for password-protected archives and is accessible via a context menu from the file managers now. KRDC, the remote desktop client improves support for Microsoft’s Active Directory through LDAP. Kontact has gained a new planner summary and support for drag and drop in the free/busy view. KSnapshot now uses the window title when saving screenshots, making it easier to index them using search engines.
Reception
The KDE 4.2 release "marks the end of the testing phase by being the first release ready for everyone – instead of just developers and enthusiasts" according to Thom Holwerda, a member of OSNews.
KDE 4.3
KDE 4.3 was released on 4 August 2009. Polishing KDE 4 was a focus of 4.3, with this release being described as incremental and lacking in major new features. KDE 4.3 fixed over 10,000 bugs and implemented almost 2,000 feature requests. Integration with other technologies, such as PolicyKit, NetworkManager & Geolocation services, was another focus of this release. KRunner’s interface has been overhauled. A much more flexible system tray has been developed. Many new Plasmoids have been added, including the openDesktop.org Plasmoid – an initial take on the Social Desktop. Plasma also receives more keyboard shortcuts.
KDE SC 4.4
KDE SC 4.4 was released on 9 February 2010 and is based on version 4.6 of the Qt 4 toolkit. As such, KDE SC 4.4 carries Qt’s performance improvements as well as Qt 4.6's new features, such as the new animation framework Kinetic.
KAddressBook Is replaced by a completely new application with the same name – previously tentatively called KContactManager. Key features of the new KAddressBook are Akonadi integration and a streamlined user interface.
Another major new feature is an additional new Plasma interface, targeted towards netbooks.
Kopete is released as version 1.0.
KAuth, a cross-platform authentication API, made its début in KDE SC 4.4. Initially only PolicyKit is supported as back-end.
KDE SC 4.5
KDE SC 4.5 was released on 10 August 2010. New features include the integration of the WebKit library, an open-source web browser engine, which is used in major browsers such as Apple Safari and Google Chrome. KDE's own KHTML engine will continue to be developed.
KPackage has been deprecated. KPackageKit was suggested to replace it but it didn't make it to replace it.
KDE SC 4.6
KDE SC 4.6 was released on 26 January 2011 and has better OpenGL compositing along with the usual myriad of fixes and features.
KDE SC 4.7
KDE SC 4.7 was released on 28 July 2011. This version updated KWin in order to be compatible with OpenGL ES 2.0, which will enhance its portability to mobile and tablet platforms. Other optimizations, such as the use of Qt Quick, were made in order to enhance this portability. This version also brought updates and enhancements to Plasma Desktop such as better network management and updates to certain widgets (like the Kickoff menu) as well as activities.
Aside from the desktop environment, version 4.7 updates many applications within the Software Compilation. Dolphin file manager has been updated to include a cleaner user interface. Marble, the virtual globe software, now supports voice navigation, a map creation wizard, as well as many new plugins. Gwenview image viewer now allows users to compare two or more photos side by side. The Kontact database has also been ported to Akonadi which allows the database to be easily accessible from other applications. Furthermore, the KMail database has also been ported to Akonadi. DigiKam has been updated to support face detection, image versioning, and image tagging. Other applications such as Kate, Kalzium, KAlgebra, KStars, and KDevelop have also been updated in this release. Moreover, version 4.7 fixed over 12,000 bugs.
KDE SC 4.8
Release 4.8 was made available on 25 January 2012.
Plasma Workspaces
KWin’s rendering performance was increased by optimizing effect rendering. Window resizing was improved as well.
Other KWin features are: QML based Window switcher (Tabbox), AnimationEffect class and initial Wayland support.
Applications
A new major version of Dolphin shipped with KDE Applications 4.8. It has improved performance, better file name display, animated transitions, and many other new and improved features.
Cantor shipped with additional back-ends based on Scilab and Qalculate.
KDE SC 4.9
KDE SC 4.9 was made available on 1 August 2012. The release featured several improvements to the Dolphin file manager, including the reintroduction of in-line file renaming, back and forward mouse buttons, improvement of the places panel and better usage of file metadata. Additionally, there were several improvements to KWin and Konsole. Activities were better integrated with the workspace. Several applications were updated, including Okular, Kopete, Kontact, and educational applications.
KDE SC 4.10
KDE SC 4.10 was released on 6 February 2013. Many of the default Plasma widgets were rewritten in QML, and Nepomuk, Kontact and Okular received significant speed improvements.
KDE SC 4.11
4.11 was released on 14 August 2013. Kontact and Nepomuk received many optimizations. The first generation Plasma Workspaces entered maintenance-only development mode.
KDE SC 4.12
KDE SC 4.12 was released on 18 December 2013. Kontact received substantial improvements.
KDE SC 4.13
KDE SC 4.13 was released on 16 April 2014. Nepomuk semantic desktop search was replaced with KDE's in house Baloo. KDE SC 4.13 was released in 53 different translations.
KDE SC 4.14
KDE SC 4.14 was released on 20 August 2014. The release primarily focused on stability, with numerous bugs fixed and few new features added. This was the final KDE SC 4 release.
Release schedule
References
Further reading
External links
The KDE website
KDE Documentation
KDE Localization
KDE Bug Tracking System
KDE-Apps, KDE and Qt software repository
KDE-Look
KDE on Windows Initiative
KDE on Mac OS X
2008 software
KDE Software Compilation |
18287478 | https://en.wikipedia.org/wiki/Rsyslog | Rsyslog | Rsyslog is an open-source software utility used on UNIX and Unix-like computer systems for forwarding log messages in an IP network. It implements the basic syslog protocol, extends it with content-based filtering, rich filtering capabilities, queued operations to handle offline outputs,
support for different module outputs, flexible configuration options and adds features such as using TCP for transport.
The official RSYSLOG website defines the utility as "the rocket-fast system for log processing".
Protocol
Rsyslog uses the standard BSD syslog protocol, specified in RFC 3164. As the text of RFC 3164 is an informational description and not a standard, various incompatible extensions of it emerged. Rsyslog supports many of these extensions. The format of relayed messages can be customized.
The most important extensions of the original protocol supported by rsyslog are:
ISO 8601 timestamp with millisecond granularity and time zone information
the addition of the name of relays in the host fields to make it possible to track the path a given message has traversed
reliable transport using TCP
support GSS-API and TLS
logging directly into various database engines.
support for RFC 5424, RFC 5425, RFC 5426
support for RELP
support for buffered operation modes where messages are buffered locally if the receiver is not ready
complete input/output support for systemd journal
History
The rsyslog project began in 2004, when Rainer Gerhards, the primary author of rsyslog, decided to write a new strong syslog daemon to compete with syslog-ng, because, according to the author, "A new major player will prevent monocultures and provide a rich freedom of choice."
Rainer Gerhards worked on rsyslog inside his own company, Adiscon GmbH.
Systems where Rsyslog works
rsyslog works on a number of Unix-like systems and Linux distributions, among others:
Red Hat Enterprise Linux (from RHEL 5; March 2007)
Fedora (In November 2007, rsyslog has become the default syslogd for the Fedora project) Fedora was the first major distribution to adopt this software; however, since Fedora 20 "Heisenbug" (released on December 17, 2013) the default syslog has been replaced by journald.
Debian (As of Debian 5.0, rsyslog has become the default syslog; February 2009)
Ubuntu
openSUSE (default since 11.2; November 2009)
SUSE Linux Enterprise Server (from SLES 11 SP 2; February 2012)
GNU Hurd
Solaris
FreeBSD
Gentoo
Arch Linux
NetBSD
Related RFCs and working groups
RFC 3164 - The BSD syslog Protocol (obsoleted by RFC 5424)
RFC 5424 - The Syslog Protocol (obsoletes RFC 3164)
RFC 5425 - Transport Layer Security Mapping for Syslog
RFC 5426 - Transmission of Syslog Messages over UDP
See also
NXLog
fluentd
logstash
journald – incorporates syslog-like functionality
syslog-ng
References
External links
Internet protocols
Internet Standards
System administration
Network management
Free network-related software |
42282225 | https://en.wikipedia.org/wiki/2014%E2%80%9315%20USC%20Trojans%20men%27s%20basketball%20team | 2014–15 USC Trojans men's basketball team | The 2014–15 USC Trojans men's basketball team represented the University of Southern California during the 2014–15 NCAA Division I men's basketball season. They were led by second-year head coach Andy Enfield. They played their home games at the Galen Center and were members of the Pac-12 Conference. They finished the season 12–20, 3–15 in Pac-12 play to finish in last place. They advanced to the quarterfinals of the Pac-12 Tournament where they lost to UCLA.
Previous season
The 2013–14 USC Trojans finished the season with an overall record of 11–21, and 2–16 in the Pac-12 regular season. In the 2014 Pac-12 Tournament, the team was defeated by Colorado, 56–59 in the first round.
Off Season
Departures
2014 Recruiting Class
Roster
Schedule
|-
!colspan=12 style="background:#990000; color:#FFCC00;"| Exhibition
|-
!colspan=12 style="background:#990000; color:#FFCC00;"| Non-conference regular season
|-
!colspan=12 style="background:#990000;"| Pac-12 regular season
|-
!colspan=12 style="background:#990000;"| Pac-12 Tournament
References
USC
USC Trojans men's basketball seasons
USC Trojans
USC Trojans |
3343966 | https://en.wikipedia.org/wiki/Amateur%20radio%20station | Amateur radio station | An amateur radio station is a radio station designed to provide radiocommunications in the amateur radio service for an amateur radio operator. Radio amateurs build and operate several types of amateur radio stations, including fixed ground stations, mobile stations, space stations, and temporary field stations. A slang term often used for an amateur station's location is the shack, named after the small enclosures added to the upperworks of naval ships to hold early radio equipment and batteries.
See also
Types of stations
Fixed stations
An amateur radio station established in a permanent structure with equipment that is not intended for portable operation is referred to as a fixed station. This is the most common form of amateur radio station, and can be found in homes, schools, and some public buildings. A typical fixed station is equipped with a transceiver and one or more antennas. For voice communications, the station will be equipped with a microphone; for communications using Morse code, a telegraph key is common; and for communications over digital modes such as RTTY and PSK31, a station will be equipped with a specialized interface to connect the transceiver to a computer sound card. While not a requirement for radiocommunications, most fixed amateur radio stations are equipped with one or more computers, which serve tasks ranging from logging of contacts with other stations to various levels of station hardware control. Fixed stations might also be equipped with amplifiers, antenna rotators, SWR meters, antenna tuners, and other station accessories.
Fixed stations are generally powered from the AC mains electrical supply available in the building. Some equipment in fixed stations may run off low voltage DC instead of AC, and require a separate power supply. Some fixed stations are equipped with auxiliary sources of power, such as electrical generators or batteries for use in emergencies.
Mobile stations
An amateur radio station installed in a vehicle is referred to as a mobile station. A typical mobile station is equipped with a transceiver, one or more antennas, and a microphone. The transceiver may be specially designed for installation in vehicles. It may be much smaller than transceivers designed for fixed station use, to facilitate installation under a seat or in a trunk, and it may feature a detachable control head that can be mounted in a separate location from the rest of the radio. Antennas designed for mobile stations must accommodate the unique physical constraints of the vehicle and travel lanes which it occupies, allowing for clearance under overpasses and bridges, and safe passage by vehicles in adjacent lanes. Most antennas used in mobile stations are omnidirectional. Few mobile stations are equipped to communicate with Morse code or digital modes. Most mobile stations are designed to be operated by the vehicle operator while driving.
Most transceivers installed in vehicles are designed to run on 12-16 VDC, and are generally powered by the starting battery in the vehicle. Because of the power demands placed on the vehicle battery, most mobile stations either do not include external amplifiers or include amplifiers with power outputs that are more modest than those commonly found in fixed stations.
A specialized form of mobile station used for competition in a VHF amateur radio contest in North America is called a rover station. A rover station is often designed to be operated by a passenger in the vehicle rather than the driver, and may include multiple transceivers, transverters, directional antennas, and a laptop computer to log contacts made.
While it may not be a regulatory requirement, many mobile stations will append a /M to end of their call sign (pronounced as "slash mobile" on phone) while operating to identify themselves to other stations as a mobile station. Rover station operating in a VHF contest will append a /R to the end of their call sign (pronounced "slash rover").
Maritime mobile stations are mobile stations installed in a watercraft, usually an ocean-going vessel. When in international waters, these stations are operated under the regulatory authority of the flag under which the vessel is registered. In addition to the regulatory requirements of amateur radio, operation of maritime mobile stations also requires the permission of the captain of the vessel. Maritime mobile stations append a /MM to end of their call sign (pronounced as "slash maritime mobile").
Aeronautical mobile stations are mobile stations installed in an aircraft. In addition to the regulatory requirements of amateur radio, operation of aeronautical mobile stations also requires the permission of the pilot of the aircraft. Aeronautical mobile stations append a /AM to end of their call sign (pronounced as "slash aeronautical mobile").
Portable stations
An amateur radio station set up in a temporary location is referred to as a portable station. A portable station might be established to provide emergency communications in a disaster area, to provide public service communications during a large organized event such as a charity bicycle ride, to provide communications during an expedition, or for the recreational enjoyment of operating outdoors. Portable stations include the same basic equipment as fixed and mobile stations, although transportation of the transceiver, antennas, power supplies or batteries and necessary accessories often influences the particular selection. Equipment that does not weigh very much, or that can be broken down for shipment or transportation in luggage is especially popular with amateur radio operators travelling on DX-peditions.
Most portable stations rely upon generator or battery power. Because this form of power might be of limited supply, portable stations often operate at lower transmitter power output to conserve energy.
Some portable stations append a /P to end of their call sign (pronounced as "slash portable") to indicate their status as a portable operation. In some countries, this is a regulatory requirement, whereas in others it is done at the option of the operator.
Space stations
An amateur radio station that is located in a satellite, the Space Shuttle, or on the International Space Station is referred to as a space station. Some countries, including the United States, have additional or different regulations regarding the operation of space stations than other amateur radio stations. Most space stations are located on satellites that orbit the earth. These stations are frequently either transponders or repeaters that operate under automatic control and can be used by ground stations (any station that is not a space station) to relay their signal to other ground stations.
Handheld stations
Handheld radios contain all the necessary equipment for radiocommunications with another station. A typical radio used as a handheld station integrates a transceiver with an antenna and a battery in one handheld package. Most handheld transceivers used in amateur radio are designed for operation on the VHF or UHF amateur radio bands and most often are capable of only FM voice communications transmissions. To conserve battery power, they have limited transmitter power, often below 1W, to cover a local range of typically a few km or miles.
Repeater stations
An amateur radio repeater is a specialty amateur radio station that extends the range of communications for other stations. A repeater uses a receiver tuned to one radio frequency and a transmitter tuned to another radio frequency. Other stations using a repeater station transmit on one frequency but listen for signals on the other frequency. If a repeater station is in a favorable location, such as on a tall tower, the top of a tall building, or on a mountaintop, stations that otherwise would not be able to communicate with each other can each use the repeater and establish two-way communications.
Repeater stations generally operate under automatic control. The control equipment is responsible for transmitting the repeater station's call sign at regular intervals. This identification is often done in Morse code. Some US repeater stations append a /R to end of their call sign or not (used to be required in the 80s and early 90s but no longer). Some may still have a vanity "WR#xxx" repeater license where #=0 thru 9 and xxx is any 3 letter combo but these callsigns won't be renewed and will be forced to change when their current license expires.
Computer-control software
Some modern amateur transceivers have embedded computers with firmware which is executed to provide the functions and features of the transceiver. This software must be provided by the original manufacturer of the equipment. Another type of software is that required to control a receiver (or transceiver) without a front panel provided. Examples of this are the Kenwood TS-B2000 and the Ten-Tec Pegasus; both transceivers are sold with PC software to provide the human interface for operation. Most transceivers with front control panels (and many receivers popular among shortwave listeners) have a computer interface such as a serial port, USB or Ethernet port. These ports are useful for satellite-tracking frequency control (Doppler tuning), station logging, digital operation, internet and special-needs accessibility. In many cases, the software adds improved or extra functions and features beyond that provided by the original design. For this reason, some operators purchase radio-control software for non-computerized operation even if their radio has a front control panel.
Station identification
During transmissions, an amateur radio station must identify itself with a call sign issued by the authorized regulatory authority of the country in which the station is located.
Most regulatory agencies worldwide issue amateur radio call signs to the operator licensee, and not to the station: In effect, any radio transmitter a licensed operator touches the controls of, becomes the radio station on that amateur's license. An amateur radio station may be operated under the call sign of the owner of the station (if she or he is nearby the controls), or the call sign of the person operating the station as a guest.
In some countries, special call signs might be made available for clubs, and are frequently used at a club station established for use of the club's members. Other special call-signs similar to club stations are sometimes temporarily assigned for "event stations" on special occasions, such as public events or radio-amateur expeditions to transmit from distant locations (DX-peditions). Like a club station, all the operators present for the event use the event call sign rather than their own.
Gallery
References
General references
Australia
Wireless Institute of Australia (2005). The Foundation License Manual: Your Entry into Amateur Radio. Wireless Institute of Australia, November, 2005.
Canada
Cleveland-Iliffe, John, and Smith, Geoffrey Read (1995). The Canadian Amateur Study Guide for the Basic Qualification. Fifth Edition, Second Printing. Ottawa, Ontario, Canada: Radio Amateurs of Canada.
India
Amateur radio licensing in India. Retrieved Aug. 13, 2007.
United Kingdom
Betts, Allen (2001). Foundation Licence - Now!. London, United Kingdom: Radio Society of Great Britain, December, 2001.
United States
Straw, R. Dean, Reed, Dana G., Carman, R. Jan, and Wolfgang, Larry D. (ed.) (2003). Now You're Talking!. Fifth Edition. Newington, Connecticut, U.S.: American Radio Relay League, May, 2003.
American Radio Relay League (2003). The ARRL FCC Rule Book: Complete Guide to the FCC Regulations. 13th Edition. Newington, Connecticut, U.S.: American Radio Relay League, August, 2003.
Silver, H. Ward (2004). Ham Radio For Dummies. John Wiley and Sons, Ltd., April, 2004.
Station
Radio stations and systems ITU |
6094799 | https://en.wikipedia.org/wiki/Wellfleet%20Communications | Wellfleet Communications | Wellfleet Communications was an Internet router company founded in 1986 by Paul Severino, Bill Seifert, Steven Willis and David Rowe based in Bedford, Massachusetts, and later Billerica, Massachusetts. In an attempt to more effectively compete with Cisco Systems, its chief rival, it merged in October, 1994 with SynOptics Communications of Santa Clara, California to form Bay Networks in a deal worth US$ 2.7B. Bay Networks would in turn be acquired by Nortel in June, 1998 for US$ 9.1B.
Wellfleet was ranked the fastest-growing company in the United States by Fortune Magazine in both 1992 and 1993. Wellfleet sold routers.
Wellfleet also emphasized on support of the up-and-coming Internet Protocol. In 1991, Cisco led the global multi-protocol router market with a 51% share, whereas Wellfleet was third with only 9% market share. By 1993, Wellfleet had grown to a 14% market share, second only to Cisco's 50%. Wellfleet concluded the best way to gain strategic positioning over Cisco would be to merge with hub manufacturer SynOptics. By combining these technologies, the joined companies could provide their customers with common product interfaces and network management tools.
The resulting merged company, Bay Networks (named as such because Wellfleet was based in Boston, Massachusetts and SynOptics in San Francisco, California, two classic bay cities).
References
Further reading
External links
Wellfleet co-founder Seifert now driving new business at Avaya
Hot shots from the past: Paul Severino and the go-go years
Defunct networking companies
Networking companies of the United States
Nortel
Companies based in Billerica, Massachusetts
Defunct companies based in Massachusetts
Companies based in Bedford, Massachusetts |
19190688 | https://en.wikipedia.org/wiki/Ehud%20Tenenbaum | Ehud Tenenbaum | Ehud "Udi" Tenenbaum (, born August 29, 1979), also known as The Analyzer, is an Israeli hacker.
Biography
Tenenbaum was born in Hod HaSharon in 1979. He became famous in 1998 when he was arrested for hacking computers belonging to NASA, The Pentagon, the U.S. Air Force, the U.S. Navy, the Knesset, MIT, among other high-profile organizations. He also hacked into the computers of Palestinian groups and claimed to have destroyed the website of Hamas. To do this, Tenenbaum installed packet analyzer and trojan horse software on some of the hacked servers.
The then-US Deputy Defense Secretary John Hamre stated that the attack was "the most organized and systematic attack to date" on US military systems. The military had thought that they were witnessing sophisticated Iraqi 'information warfare'. In an effort to stop the attack, the United States government assembled agents from the FBI, the Air Force Office of Special Investigations, NASA, the US Department of Justice, the Defense Information Systems Agency, the NSA, and the CIA. The government was so worried that the warning and briefings went all the way up to the President of the United States. The investigation, code-named "Solar Sunrise," eventually snared two California teenagers. After their arrest, a subsequent probe led US investigators to Tenenbaum, who was arrested after Israeli police were given evidence of Tenenbaum's activities. Later, the FBI sent agents to Israel to question Tenenbaum.
Before he was sentenced, Tenenbaum served briefly in the Israel Defense Forces, but was released soon thereafter after he was involved in a traffic collision.
In 2001, Tenenbaum pleaded guilty, while stating that he was not attempting to infiltrate the computer systems to get a hold of secrets but rather to prove that the systems were flawed. Tenenbaum was sentenced to a year and a half in prison, of which he served only 8 months following the "Deri Law". After the attack, the FBI made a short 18 minutes training video called, Solar Sunrise: Dawn of a New Threat that was sold as part of a hacker defense course that was discontinued in September 2004.
In 2003, after being freed from prison, Tenenbaum founded his own Information security company called "2XS".
In September 2008, following an investigation by Canadian police and the US Secret Service, Tenenbaum and three accomplices were arrested in Montreal. Tenenbaum was charged with six counts of credit card fraud, in the sum of approx. US$1.5 million. U.S. investigators suspected Tenenbaum of being part of a scam, in which the hackers penetrated financial institutions around the world to steal credit card numbers. They then sold these numbers to other people, who used them to perpetrate massive credit card fraud. He was later extradited to the United States to stand trial, and was in the custody of the US Marshals for more than a year. In August 2010, he was released on bond after agreeing to plead guilty.
In July 2012, after Tenenbaum accepted a plea bargain which may have involved cooperation in the investigation, New York district judge Edward Korman sentenced Tenenbaum to the time already served in prison. Tenenbaum was also ordered to pay $503,000 and was given three years' probation.
References
External links
BBC radio show about Solar Sunrise
Youtube showing of the FBI movie, Solar Sunrise
‘The Analyzer’ Pleads Guilty in $10 Million Bank-Hacking Case - published in Wired on August 25, 2009
1979 births
Living people
Computer programmers
People associated with computer security
People from Hod HaSharon
Israeli computer criminals |
52593283 | https://en.wikipedia.org/wiki/Asif%20Ghafoor | Asif Ghafoor | Asif Ghafoor (born 2 December 1971) is a lieutenant general in the Pakistan Army. Currently serving as inspector general for Communication & Information Technology, he was previously appointed as director-general for Inter-Services Public Relations in 2016 until he was succeeded by Babar Iftikhar in 2020 as 21st director-general.
Education
Ghafoor is the graduate of Command & Staff College Quetta, Command & Staff College Bandung (Indonesia) and National Defence University, Islamabad. He holds a master's degree in Strategic Studies.
Military life
He was commissioned on 9 September 1988 in 87 SP Medium Regiment Artillery after four years of training (1984-1988) as Cadet at JCB & PMA Kakul (1986–88). He had participated in the Kargil War as a Major, operations against terrorists in tribal areas of FATA and Swat during 2008-10 as a Lieutenant Colonel and has commanded a Division at Swat, Malakand during 2016 as a Major General. General has also served as Director Military Operations at Army Headquarters GHQ as a Brigadier commanded Divisional Artillery deployed along the Line of Control and infantry brigade along eastern border. He has been on faculty of Command and Staff College Quetta.
The General has served on various staff, instructional and command assignments including Brigade Major Infantry Brigade, Assistant Military Secretary MS Branch, GSO-I Military Operations Directorate, GHQ, Director Military Operations in Military Operations Directorate, GHQ. He has been on the faculty of Command and Staff College, Quetta. He has commanded his parent unit in Operation al-Mizan, Artillery Brigade on Line of Control, Infantry Brigade on Eastern Border and a Division at Swat, Malakand. General is recipient of COAS Commendation Card for operations in Bajaur during 2008 and Hilal-i-Imtiaz (Military).
In December 2016, Ghafoor was appointed as the Director-General of the Inter-Services Public Relations.
In January 2020, Ghafoor was appointed as the General Officer Commanding 40 Division in Okara. On 25 November 2020, he was promoted to the rank of Lieutenant General and appointed as Inspector General Communications and Information Technology.
Commands Held
21 Artillery Division, Swat (Now at Pannu Aqil)
January 2016 - December 2016
Preceded By: Maj Gen
Succeeded By: Maj Gen (Now Lt Gen) Ali Aamir Awan
Director-General Inter-Services Public Relations
December 2016 - January 2020
Preceded By: Lt Gen Asim Bajwa
Succeeded By: Maj Gen Babar Iftikhar
40 Infantry Division, Okara
January 2020 - December 2020
Preceded By: Maj Gen Azhar Waqas
Succeeded By: Maj Gen Asad Ur Rehman
Inspector General Communication and Information Technology
December 2020 - current
Preceded By: Lt Gen Ali Aamir Awan
Succeeded By: -
References
External links
|-
Living people
Pakistani generals
Directors-General of the Inter-Services Public Relations
Recipients of Hilal-i-Imtiaz
Graduates of the Staff College, Quetta
National Defence University, Pakistan alumni
Pakistani expatriates in Indonesia
1971 births |
322850 | https://en.wikipedia.org/wiki/Monterrey%20Institute%20of%20Technology%20and%20Higher%20Education | Monterrey Institute of Technology and Higher Education | Instituto Tecnológico y de Estudios Superiores de Monterrey (ITESM) (), also known as Tecnológico de Monterrey or just Tec, is a secular and coeducational private university based in Monterrey, Mexico, which has grown to include 35 campuses throughout the country. One of only 45 universities in the World to be ranked with 5 QS Stars, it is widely recognized as one of the most prestigious universities in Latin America.
Founded in 1943 by Eugenio Garza Sada, a prominent, MIT-educated industrialist, the university has always had close links with the Mexican business elite; as of 2019, it is the 15th university in the world with the highest number of billionaire alumni according to the Times Higher Education and the only university in Latin America to appear in the ranking. ITESM is also known as being the first university to be connected to the Internet in Ibero-America, having the top-ranked business school in the region according to the Economist, and being one of the leaders in patent applications among Mexican universities. The medical school offers the only MD-PhD program available in Mexico, in partnership with the Houston Methodist Hospital.
History
Early years
The institute was founded on September 6, 1943, by a group of local businessmen led by Eugenio Garza Sada, a moneyed heir of a brewing conglomerate who was interested in creating an institution that could provide highly skilled personnel — both university graduates and technicians— to the booming Monterrey corporations of the 1940s. The group was structured into a non-profit organization called Enseñanza e Investigación Superior A.C. (EISAC) and recruited several academicians led by León Ávalos y Vez, an MIT alumnus and then director-general of the School of Electrical and Mechanical Engineering of the National Polytechnic Institute, who designed its first academic programs and served as its first director-general.
In its early years the Institute operated at Abasolo 858 Oriente in a large, two-story house located a block and a half away from Zaragoza Square, behind the city's Metropolitan Cathedral. As these facilities soon proved to be insufficient, it started renting out adjacent buildings and by 1945 it became apparent that a university campus was necessary. For that reason, a master plan was commissioned to Enrique de la Mora and on February 3, 1947, what would later be known as its Monterrey Campus was inaugurated by Mexican President Miguel Alemán Valdés.
Because the operations of the local companies were highly reliant on U.S. markets, investments, and technology; internationalization became one of its earliest priorities. In 1950 it became the first foreign university in history to be accredited by the Southern Association of Colleges and Schools (SACS), one of the six regional accreditation agencies recognized by the United States Department of Education. Its foreign accreditation would end up being a decisive influence in its development, as it was forced to submit itself to external evaluation earlier than most Mexican universities (1967) and unlocked additional sources of revenue, such as tuition funds from foreign students interested in taking summer courses in Mexico for full-academic credit.
Expansion
Its growth outside the city of Monterrey began in the late-1960s, when both its rector and head of academics lobbied for expansion. A first attempt, funded a few years earlier by several businessmen from Mexicali, Baja California, was staffed and organized by the Institute but faced opposition from the Board of Trustees once the federal government refused any additional subsidy and members of the Board cast doubt on its ability to get funds as an out-of-state university. At the end the project was renamed Centro de Enseñanza Técnica y Superior (CETYS) and grew into a fully independent institution.
Aside from the CETYS experiment and the 150 hectares bought in 1951 for the agricultural program's experimental facilities in nearby Apodaca, Nuevo León, no other expansion outside Monterrey was attempted until 1967, when a school of maritime studies was built in the port of Guaymas, Sonora. Shortly thereafter, premises were built in Obregón and courses began to be offered in Mexico City. Those premises and the ones that followed, then called external units, were fully dependent on the Monterrey Campus until 1984, when they were restructured as semi-independent campuses and reorganized in regional rectorates (see Organization).
In 1987, when the Southern Association of Colleges and Schools demanded faculty members with master's degrees to lecture 100% of its undergraduate courses, the Institute invested considerably in both distance learning and computer network technologies and training, effectively becoming, on February 1, 1989, the first university ever connected to the Internet in both Latin America and the Spanish-speaking world. Such efforts contributed to the creation of its former Virtual University a few years later and allowed it to become the first country-code top level domain registry in Mexico; first by itself from 1989 to 1995, and then as a major shareholder of NIC Mexico, the current national registry.
Campuses
There are thirty-one campuses of the Institute distributed in twenty-five Mexican cities. Each campus is relatively independent but shares a national academic curriculum (see Academics). The flagship campus is located in Monterrey, where the national, system-wide rectorate is located. Most of them deliver both high school and undergraduate education, some offer postgraduate programs and only eight (Cumbres, Eugenio Garza Sada, Eugenio Garza Lagüera, Santa Catarina, Metepec, Santa Anita, Esmeralda and Valle Alto) deliver high school courses exclusively. Nevertheless, curricular and extension courses and seminars are usually available at most facilities.
Campuses by region
As of June 2019, campuses were divided into the following Mexican regions:
North: Monterrey, PrepaTec Cumbres, PrepaTec Eugenio Garza Lagüera, PrepaTec Eugenio Garza Sada, Prepa Tec Santa Catarina, PrepaTec Valle Alto, Aguascalientes, Chihuahua, Ciudad Juárez, Laguna, Saltillo, Tampico and Zacatecas.
Mexico City: Mexico City, Santa Fe, State of Mexico, PrepaTec Esmeralda,
South: Chiapas, Cuernavaca, Hidalgo, PrepaTec Metepec, Puebla and Toluca
West: Colima, Guadalajara, Irapuato, León, Morelia, PrepaTec Navojoa, Northern Sonora, Obregón, Querétaro, San Luis Potosí, PrepaTec Santa Anita and Sinaloa.
Former campuses include Celaya (Prepa Tec, closed in 2020), Veracruz (closed in 2021), Guaymas (transferred to TecMilenio University in the early 2000s) and Mazatlán (transferred to TecMilenio University in 2009).
Other infrastructure
In addition to the campuses, the Institute manages:
The Ignacio A. Santos Medical School, the Hospital San José and the Zambrano-Hellion Medical Center.
Eight international sites in Argentina (Buenos Aires), Colombia (Bogotá, Medellín), Ecuador (Guayaquil and Quito), Panama (Panama City), Peru (Lima) and the United States (Miami) offering extension courses, research and international consulting.
Fifteen liaison offices in charge of forging international partnerships and negotiating professional internships and academic exchanges with local universities, companies and civil institutions. Current liaison offices are located in Belgium (Brussels), Canada (Montreal and Vancouver), China (Beijing, Guangzhou and Shanghai), France (Nice and Paris), Italy (Florence, Macerata and Verona), Switzerland (Fribourg), Spain (Barcelona and Madrid) and the United States (Boston, Dallas and Washington, D.C.)
Organization
All campuses are sponsored by non-profit organizations composed primarily of local businesspeople. The Monterrey Campus is sponsored by Enseñanza e Investigación Superior, A.C. (EISAC), which co-sponsored the system as a whole until a newly built organization, Instituto Tecnológico y de Estudios Superiores de Monterrey, A.C. (ITESM AC) overtook those responsibilities. Such organizations (effectively serving as boards of trustees) are responsible for electing the rectors or directors of a particular campus. Since February 2012, the president of ITESMAC is José Antonio Fernández, a class of 1976 alumnus and current chairman and CEO of FEMSA. Former presidents include the founder, Eugenio Garza Sada (1943–73) and his son, Eugenio Garza Lagüera (1973–97), and Lorenzo Zambrano (1997–2012), a class of 1966 alumnus and until his passing.
Former heads of the Institute include:
León Ávalos y Vez (1943–1947) first director-general.
Roberto Guajardo Suárez (1947–1951) second director-general.
Víctor Bravo Ahuja (1951–1958) third director-general, and from April 11, 1955, first rector.
Fernando García Roel (1959–1984) second rector.
Rafael Rangel Sostmann (1985–2011) third rector.
Salvador Alva (2011–2019) fourth rector and Executive President.
Since 2020, The Tecnológico de Monterrey Rector and Executive President is David Garza Salazar.
High schools
Following the historical trend of Mexico's largest universities, the Institute sponsors several high schools that share one or more national curricula: bicultural, multicultural and/or International Baccalaureate, which is administered from Geneva, Switzerland. The bicultural focuses on better understanding of the English language, the multicultural program requires studying a third language and to have an exchange program abroad. Finally, the IB is an academically challenging program where students can obtain the IB Diploma when they graduate. Additionally, students can receive college credits both at the TEC and universities abroad. Multicultural students are able to take IB courses if they wish with the focus on obtaining IB Subject Certificates. , over 26,000 students in several campuses were registered as high school students within the system.
Academics
Academically, the university is organized into several departments and divisions —as opposed to the traditional faculty school scheme used by most Mexican public universities— and it was the first Mexican university in history to divide the academic year in semesters. Current academic calendar for both high school and undergraduate students is composed of two semesters running from August to December and from January to May (each lasting 16 weeks) and an optional summer session from June to July, where at most two courses can be taken in an intensive basis.
, the institute offers 57 undergraduate degrees, of which 37 are taught in English and are generally awarded after nine semesters of study (except for Medicine and Architecture); 33 master's degrees, generally lasting three to five semesters (and can also be structured in three-months terms), and 11 doctorate degrees varying in length according to their academic field.
Admissions
Since 1969 the Institute requires every college applicant to achieve a minimum pass mark at an academic aptitude test which is 900 out of 1600. (Prueba de Aptitud Académica, PAA) delivered by The College Board, a not-for-profit examination board in the United States. However, each campus is free to request additional requirements; such as a grade average of 80 or 90 in high school (on a 100-point scale) for those willing to transfer or apply to the Monterrey Campus. As for the graduate schools, the requirements may vary according to the discipline, such as a grade average of 80/100 and 550-points in both the GMAT and the TOEFL for some programs at its Graduate Business School (EGADE).
Accreditations
Studies at the Tech are officially accredited by the Secretariat of Public Education of Mexico (Secretaría de Educación Pública, SEP) and by the Southern Association of Colleges and Schools (SACS) of the United States. In November 2008, its graduate business school (EGADE) became one of the 34 business schools in the world to hold simultaneous accreditation of its programs by the AACSB of the United States, the Association of MBAs of the United Kingdom and the European Quality Improvement System (EQUIS) while the Institute became the first Latin American university in history to receive full-accreditation on some of its engineering programs by ABET (as opposed to the traditional substantially-equivalent designation given to most schools outside the United States).
The quality of its programs is also audited by the Institute of Food Technologists, the Association for Public Policy Analysis and Management and by the national accrediting councils of Mexico, such as the Council for Higher Education Accreditation (Consejo para la Acreditación de la Educación Superior, COPAES) and the Inter-Institutional Committees for Higher Education Evaluation (Comités Interinstitucionales de Evaluación de la Educación Superior, CIEES).
, 169 undergraduate degrees were accredited by national accrediting councils and 36 were accredited by international accrediting agencies. As for graduate degrees, 11 were accredited by international accrediting agencies and 58 were listed in the National Census of High-Quality Postgraduate Studies (Padrón Nacional de Posgrados de Calidad, PNPC) by the National Council for Science and Technology (CONACYT).
Academic memberships
The institute is the only Latin American institution at the European Consortium of Innovative Universities (ECIU) —an organization committed to innovations in both teaching and learning— and at Universitas 21; an international network of research-intensive universities established as an "international reference point and resource for strategic thinking on issues of global significance." It is also the only Mexican university, along the National Autonomous University of Mexico, to be enrolled at the Association of Pacific Rim Universities, an international consortium of leading research universities including Stanford University, University of California, Berkeley and Caltech. The institute was also the first private university to become a member of the National Association of Universities and Institutions of Higher Education of Mexico (ANUIES) back when it was composed entirely by public universities (1958) and is a full member of the Mexican Federation of Private Institutions of Higher Education (Federación de Instituciones Mexicanas Particulares de Educación Superior, FIMPES). The university recently became a partner of Washington University of St. Louis through the McDonnell International Scholars Academy.
Faculty
The institute has over 10,000 professors at high school, undergraduate and postgraduate levels: 2,207 tenured and 7,900 associated professors, and all of them have the appropriate academic credentials to lecture at their corresponding academic level according to the Southern Association of Colleges and Schools. some 470 professors taught courses, worked in international projects or attended seminars or congresses at foreign universities while some 590 foreign professors taught courses at the Tech. As for their academic development, its faculty training program was bestowed with the 2004 Andrew Heiskell Award for Innovation in International Education by the Institute of International Education.
Libraries
The institute has at least thirty-three libraries in twenty-five Mexican cities holding over 2.4 million books, publications, and 46 types of electronic databases with at least 51,000 specialized magazines and academic journals and over 9000 e-books. Its Cervantean Library, named after Miguel de Cervantes and located in the current rectorate, holds one of the largest collections of Don Quixote incunabula, an original edition of L'Encyclopédie, and the Mario Pani Archives, and other bibliographical treasures while the main library of the Monterrey Campus holds the personal collections of archaeologist Ignacio Bernal.
Rankings
Overall, the institute is the only Mexican university besides the National Autonomous University of Mexico to be ranked at the 2010 QS World University Rankings, in which it was classified #65 worldwide at its Employer's Review, #269 in Engineering and Information Technology, #232 in Social Sciences and #387 at its overall ranking. In the 2010 International Professional Ranking of World Universities, developed by the École nationale supérieure des mines de Paris, it ranked 224 out of 390 worldwide.
Among its graduate schools, EGADE has been ranked 7th among the best business schools outside the United States according to the Wall Street Journal (2006), 4th in the world in business ethics and social-responsibility programs according to BusinessWeek magazine (2005), among the 100 best graduate business schools in the world by the Economist Intelligence Unit (2009) and its OneMBA program, delivered in partnership with four different institutions (see Joint programs and international partnerships below) was ranked 27 worldwide by the Financial Times in its 2009 Executive Master in Business Administration rankings.
Joint programs and international partnerships
Some of its academic programs are offered as joint degrees or in partnership with foreign universities:
Its Master of Science in Information Technology is offered as a joint degree with Carnegie-Mellon University, which is ranked 4th for graduate studies in computer science in 2008 according to US News and World Report and 7th in Engineering/Technology and Computer Sciences among Shanghai Jiao Tong University's world's top 100 universities.
The OneMBA degree is offered through a partnership with the University of North Carolina at Chapel Hill, the Rotterdam School of Management of the Netherlands, the Chinese University of Hong Kong and the Getulio Vargas Foundation of Brazil and is ranked 27 worldwide among executive MBAs by the Financial Times.
The B.A. Finance and Accounting is offered as a joint degree with the University of Texas at Austin, Master in Professional Accounting, ranked #1 Graduate Accounting School in the U.S. by U.S. News & World Report since 2007.
The Bachelor of Science in Industrial Engineering is offered in partnership with the Université de Technologie de Troyes in France and with the Université Laval in Quebec, Canada.
The Global MBA for Latin American Managers is offered in partnership with the Thunderbird School of Global Management, which has been ranked consistently by US News & World Report as the #1 school in International Management since 1995.
The medical degree is offered as a dual Ph.D. program with the Graduate School of Biomedical Sciences of the Texas A&M Health Science Center.
An International MBA program is offered as a joint degree with the University of San Diego.
The institute has a strategic partnership with Johns Hopkins Hospital through Johns Hopkins Medicine International.
The Master of Business Administration with a concentration in Global Business and Strategy (MBA-GBS) is a double degree MBA program jointly offered by the Graduate School of Business Administration and Leadership (EGADE) at the Tecnológico de Monterrey, Campus Monterrey, and the Belk College of Business (Belk College) at the University of North Carolina at Charlotte.
The bachelor's degrees in Chemical Engineering are offered as joint degrees with the Reutlingen University of Germany.
Several ITESM high schools offer the International Baccalaureate Diploma Programme, which is administered by the Geneva-based International Baccalaureate.
The school partners with New York City-based Trilogy Education Services to host a tech training program on ITESM's Mexico campus.
Medical school
The Ignacio A. Santos School of Medicine (Escuela de Medicina Ignacio A. Santos, aka: EMIS) is the medical school division of the Monterrey Institute of Technology and Higher Education (ITESM). Established in 1978 in Monterrey, Mexico.
The School of Medicine was founded to satisfy the country's need for high quality medical training and innovation in biomedical research. Currently, there are approximately 500 students enrolled in the M.D. program and about 105 postgraduate students. Aside from the medical doctor program, the School of Medicine also offers a joint M.D.-Ph.D. program with Houston Methodist Hospital, MD Anderson Cancer Center, Texas A&M Health Science Center, and other Bachelors in Biosciences, Nutrition Sciences and Biomedical Engineering. The graduate medical education department offers several medical residency and fellowship programs. The general director of the TecSalud organization is Guillermo Torre M.D. PhD, a cardiologist who trained under Michael E. DeBakey MD at Baylor College of Medicine.
Research
Although some of the founding members of its faculty were prominent researchers (first rector León Ávalos y Vez had formed a National Commission on Science and served as director-general of the School of Electrical and Mechanical Engineering of the National Polytechnic Institute) formal research activities at the Tech did not start until 1951, when its Institute of Industrial Research was founded in close collaboration with the Southwest Research Institute of San Antonio, Texas —one of the oldest and largest independent, nonprofit, applied research and development organizations in the United States.
Notwithstanding some reputable achievements, throughout most of the 20th century its research activities —normally financed independently or under private sponsorship— were rather scarce in comparison to public universities such as the National Autonomous University of Mexico or the National Polytechnic Institute, whose budgets make up to 30% of the federal spending in higher education and, as such, are heavily financed by the government through the federal budget.
Despite its inherent difficulties to secure research funds in a developing country where private sponsorship barely accounts for 1.1% of the national spending on science, a new institutional mission in 2005 made social and scientific research in Mexico's strategic areas one of its top priorities for the next decade. As a result, new corporate endowments and funds were committed, new research programs were created (including the first research program financed by Google in Latin America) and important labs and infrastructure have been built, such as the Femsa Biotechnology Center, the Water Center for Latin America and the Caribbean (financed by the Inter-American Development Bank and the Femsa Foundation), the Motorola Research and Development Center on Home & Networks Mobility, its Center for Advanced Design at the Guadalajara Campus and, in association with the Mainz Institute of Microtechnology of Germany (IMM), the first center of chemical micro process engineering in Latin America.
Additionally, the Institute developed a researcher-friendly patent scheme that aims to attract talented researchers and reduce the national brain drain. The scheme, in which the researcher may receive up to 30% of the patent licensing income, works in combination with its internal Rómulo Garza Prize and its national Luis Elizondo Prize and has allowed it to become the leading patent applicant among Mexican universities since 2006.
Student life
Student life, traditions and activities vary among campuses. Generally speaking, student involvement is encouraged by the local campus through an office of student affairs and the Department of Leadership and Student Formation (LiFE), which supervises most of the student groups, sports teams, regional associations and its student federation (FETEC).
The Institute goes great lengths to provide scholarships to those in need, awarding partial financial assistance to 49% of its student population. However, with tuition fees exceeding per academic year (among the highest in Latin America according to Forbes magazine) most of its student community comes from upper and upper-middle class and the overall atmosphere is arguably politically and socially conservative. For example, opposite-sex visits are forbidden in dormitories unless it is in common areas and some high school staff in the Mexico City Campus has publicly admonished students for questioning conservative politicians during school visits (although no disciplinary action was ever taken).
The number of international students vary notably among campuses. , 4,714 foreign students were studying in one of its campuses while 10,618 Tech students were taking courses in a foreign university.
Athletics
Tec has a good record in college athletics, picking up over 18% of the medals at the 2007 national collegiate competition (Universiada) and one of its campuses won every American Football Collegiate Championship in Mexico (ONEFA) from 1998 to 2008. Such accomplishments were possible through the institute's investments in sports facilities and personnel and a well-funded and comprehensive athletic scholarships program, which attracted a significant number of promising athletes but prompted allegations of talent drain by some of its rivals. Before the 2009 season the Institute decided to part ways with the organization and create a new league; however, the league didn't materialize after other breakaway universities decided to remain in the ONEFA. The Institute asked to return to the organization, but the ONEFA Board decided that the request should be formally presented in its next ordinary meeting, after the 2009 season, which its four teams ended up playing between themselves in a Tech-only championship. For the 2010 season, the Institute decided not to participate in the ONEFA championship and, instead, asked the CONADEIP, a national athletic association of private educational institutions, to create an American football championship.
Although there are local adaptations, since 1945 the system-wide sports mascot is the ram (borrego salvaje), traditionally embodied in a male bighorn sheep. A somewhat popular urban legend states that the mascot was chosen by the American football team on its way to a match, after spotting a male sheep on the road. According to the official sources, however, the mascot was chosen during an official contest held by students in the mid-1940s.
Notable people
From December 2006 to January 2009 both the U.S. Secretary of Commerce and the Mexican Secretary of Economy (former Kelloggs' CEO Carlos Gutiérrez and Gerardo Ruiz Mateos) were Tech alumni. Other businesspeople include Cemex' CEO Lorenzo Zambrano, FEMSA's CEO José Antonio Fernández, Grupo Salinas' CEO Ricardo Salinas Pliego Max Appedole film producer, activist and Casa Cuervo's CEO Juan Beckman.
In science and technology, Alexander Balankin, former lecturer at the Mexico City Campus, has received the 2005 UNESCO Science Prize for his works on Fractal Mechanics; Ernesto Enkerlin received UNESCO's 2005 Sultan Qaboos Prize for Environmental Preservation for his involvement in sustainability and two alumni have been members of the United States President's Information Technology Advisory Committee: Pedro Celis (Distinguished Engineer at Microsoft) and Héctor García Molina, former Director of Stanford University's Computer Science Department, 1999 ACM SIGMOD Innovations Award and highest h-index in Computer Science.
At least two late presidential candidates and democracy activists, Luis Donaldo Colosio and Manuel Clouthier, were former graduates. Over a dozen Mexican governors and cabinet members have attended classes at the Tech, including former Secretary of Commerce and North American Free Trade Agreement (NAFTA) negotiator Herminio Blanco. In cultural affairs, Gabriel Zaid has distinguished himself as one of the leading Mexican intellectuals of the 20th century and in sports Fernando Platas and Víctor Estrada have both won Olympics medals, while former coach of Mexico's national football team, Miguel Mejía Barón, is in charge of the Football Department at Puebla.
As for staff and faculty, at least two rectors or directors of different universities have been lecturers or members of the staff at the Tech. Luis Ernesto Derbez, a former Foreign Minister, is currently the Rector of the University of the Americas, Puebla. Enrique Cabrero Mendoza is the current head of The National Council for Science and Technology and a former rector of CIDE. In addition, the Ex-Rector Rafael Rangel Sostmann is member of the External Advisory Council of the World Bank Institute.
See also
List of Monterrey Institute of Technology and Higher Education faculty
List of Monterrey Institute of Technology and Higher Education alumni
Notes
References
External links
Universities and colleges accredited by the Southern Association of Colleges and Schools
Educational institutions established in 1943
Articles containing video clips
1943 establishments in Mexico |
52618775 | https://en.wikipedia.org/wiki/Mohamed%20Ashmalee | Mohamed Ashmalee | Mohamed Ashmalee ( Maldivian: މުހައްމަދު އަޝްމަލީ ) is a Maldivian politician who is a former Minister for State for Finance and Treasury & former Chairman of DHIRAAGU. Prior to this appointment, he served as the Deputy Minister for Finance and Treasury.
He was arrested in July 2021 in Colombo for a "Child sex" trafficking case where he was a main offender.
Early career and family life
Born to Maldivian parents, Mohamed Ashmalee was raised in Male' City. He has one elder brother.
Before pursuing a career in politics, Mohamed Ashmalee held posts from Operations Manager to Managing Director in various public and private sector companies in various fields such as Construction, Tourism, Management, Finance, Information Technology and Medical Management.
Qualifications and Experience
Mohamed Ashmalee is pursuing his Doctorate Programe in Business Administration and has successfully completed his master's degree in Business Administration specializing in Digital Marketing from Bedfordshire University, U.K. He did his bachelor's degree from Warnborough College in Canterbury, England. Furthermore, he has strong bridging qualifications in the fields of Accounting, Marketing, Financing and Computing.
Mohamed Ashmalee has served as the former State Minister for Finance & Treasury. He has also been the Chairman of DHIRAAGU and national tender board. In addition he headed the National Bureau of Statistics (NBS)[6] under the same ministry. He is also a member of Association of Business Executives U.K. (MABE).
He has a multitude of tasks include supervising the policy and daily operations of Department of National Registration (DNR),[7] National Archives of the Maldives (NAM), National Centre for Information Technology (NCIT) and National Statistics Division (NDS) all of which are under the management of National Bureau of Statistics.
Mohamed Ashmalee has over a decade of experience serving in multifarious operational and managerial capacities, both in public and private sector. In 1994, he began his public service at the Maldives Monetary Authority. After a year, he switched to the private sector until 2013 when he resumed his public service as the Deputy Minister of Transport & Communications. Moreover, he was tasked to superintend the National Centre for Information Technology. In the year 2014, a re-structuring of the government took place which got him appointed as the Deputy Minister of Finance & Treasury. He was also the former Chairman of the National Tender Board.
Political career
Mohamed Ashmalee is the former Minister of State for Finance & Treasury as well as the Executive Head of the National Bureau of Statistics (NBS) under the same ministry.
He has tasks including supervising the policy and daily operations of Department of National Registration (DNR), National Archives of the Maldives (NAM), National Centre for Information Technology (NCIT) and National Statistics Division (NDS) all of which are under the management of National Bureau of Statistics.
Mohamed Ashmalee is also the Chairperson and Independent/Non-Executive of Dhiraagu Plc, the largest telecommunications operator in the Maldives.
Corruption
A special audit of the National Center for Information Technology has revealed corrupt bidding practices in three projects worth over MVR90 million (US$5.8 million).
The NCIT violated public finance regulations in the three projects carried out between 2016 and 2018, according to the audit report published this week.
All three projects were awarded to Maxcom Technologies. The audit implicated former state minister for finance Mohamed Ashmalee in awarding one of the projects without a competitive bidding process.
Ashmalee, a senior member of the former ruling party, was in charge of NCIT during the previous administration.
The audit was carried out at the request of Science, Communication and Technology Minister Mohamed Maleeh Jamal. The findings are now being reviewed by the Anti-Corruption Commission, the watchdog’s spokesman told the Maldives Independent.
According to the audit, an MVR3 million project to buy an uninterrupted power supply system for the national data center was awarded without a bidding process in November 2017. It was awarded through an emergency procurement process with the approval of the finance ministry, which was carried out solely by a state minister in charge of NCIT without any input from NCIT’s procurement department, the audit revealed.
The company was paid half of the project’s cost in advance. But public finance regulations only allows 15 percent as advance payments unless in exceptional circumstances concerning emergencies or national security. The reason for early payment was not explained, the audit noted.
The rest of the payment was made after the UPS systems were supplied but before the company installed them. Payment cheques were signed by the state minister but he did not have the authority to authorise payments on behalf of NCIT, the audit found.
An MVR89 million project to supply and implement Microsoft software licenses and provide training was awarded to the same company in July 2016.
But officials from both the company and its Sri Lankan software supplier were allowed to sit in pre-bid meetings held in February 2016. They took part to “discuss and plan how to carry out the project,” the report stated.
The involvement of a potential bidder in designing the bid was contrary to “competitive tendering processes,” leads to creating the bid in a manner that favours the interests of the company, and offers the company an unfair advantage, the audit said.
Other issues flagged with the project included the lack of a clear schedule for finishing all components despite having a five-year payment schedule. Annual payments were to be made for supplying 20 percent of licenses every year and carrying out training. But there were no details on payment for the third component of the project, which was designing a plan to implement software licenses.
Some 8,305 different software licenses were supplied as of 2018 but only half of these were used. The auditors advised to decide on how to use the licenses before they expired.
As of 2018, MVR50 million of the total MVR89 million was disbursed to the company.
The report also noted complaints by the Sri lankan software supplier over delays in payment from Maxcom. In December 2018, the supplier threatened to revoke the Microsoft reseller status and blacklist the company. The supplier informed the ministry that the payments were finally made in February 2019.
A third project to provide hardware worth MVR4.4 million was awarded to the same company in 2018. Maxcom was the only company to bid for the project but the bid was not announced again as required by public finance regulations in cases where there was a sole bidder.
The same company worked as a consultant to formulate hardware specifications. The audit flagged a conflict of interest as the company bidding for the project had also designed the requirements of the project.
The company took 85 days to complete despite being required to finish in 45 days. The audit noted that the NCIT failed to exact fines of MVR658,101 for the delay.
Sex scandal and arrest in Colombo
On mid-July 2021, Ashmalee was arrested as he and 4 others were positively identified by a victim of child sex abuse. An additional 41 suspects were arrested by authorities over the Mount Lavinia Child Sex Scandal in early July 2021. During the investigation, it was found that there were more sex trafficking pages advertising minors in the same way.
References
Government ministers of the Maldives
Maldivian politicians |
365264 | https://en.wikipedia.org/wiki/Systems%20programming | Systems programming | Systems programming, or system programming, is the activity of programming computer system software. The primary distinguishing characteristic of systems programming when compared to application programming is that application programming aims to produce software which provides services to the user directly (e.g. word processor), whereas systems programming aims to produce software and software platforms which provide services to other software, are performance constrained, or both (e.g. operating systems, computational science applications, game engines, industrial automation, and software as a service applications).
Systems programming requires a great degree of hardware awareness. Its goal is to achieve efficient use of available resources, either because the software itself is performance critical or because even small efficiency improvements directly transform into significant savings of time or money.
Overview
The following attributes characterize systems programming:
The programmer can make assumptions about the hardware and other properties of the system that the program runs on, and will often exploit those properties, for example by using an algorithm that is known to be efficient when used with specific hardware.
Usually a low-level programming language or programming language dialect is used so that:
Programs can operate in resource-constrained environments
Programs can be efficient with little runtime overhead, possibly having either a small runtime library or none at all
Programs may use direct and "raw" control over memory access and control flow
The programmer may write parts of the program directly in assembly language
Often systems programs cannot be run in a debugger. Running the program in a simulated environment can sometimes be used to reduce this problem.
Systems programming is sufficiently different from application programming that programmers tend to specialize in one or the other.
In systems programming, often limited programming facilities are available. The use of automatic garbage collection is not common and debugging is sometimes hard to do. The runtime library, if available at all, is usually far less powerful, and does less error checking. Because of those limitations, monitoring and logging are often used; operating systems may have extremely elaborate logging subsystems.
Implementing certain parts in operating systems and networking requires systems programming, for example implementing paging (virtual memory) or a device driver for an operating system.
History
Originally systems programmers invariably wrote in assembly language. Experiments with hardware support in high level languages in the late 1960s led to such languages as PL/S, BLISS, BCPL, and extended ALGOL for Burroughs large systems. Forth also has applications as a systems language.
In the 1970s, C became widespread, aided by the growth of Unix.
More recently a subset of C++ called Embedded C++ has seen some use, for instance it is used in the I/O Kit drivers of macOS.
Alternative Meaning
For historical reasons, some organizations use the term systems programmer to describe a job function which would be more accurately termed systems administrator. This is particularly true in organizations whose computer resources have historically been dominated by mainframes, although the term is even used to describe job functions which do not involve mainframes. This usage arose because administration of IBM mainframes often involved the writing of custom assembler code (IBM's Basic Assembly Language (BAL)), which integrated with the operating system such as OS/MVS, DOS/VSE or VM/CMS. Indeed, some IBM software products had substantial code contributions from customer programming staff. This type of programming is progressively less common, but the term systems programmer is still the de facto job title for staff directly administering IBM mainframes.
See also
Ousterhout's dichotomy
System programming language
Scripting language
Interrupt handler
References
Further reading
Systems Programming by John J. Donovan
Computer programming
System software |
3825563 | https://en.wikipedia.org/wiki/Rob%20Northen%20copylock | Rob Northen copylock | Rob Northen Copylock (also known simply as Copylock) is a copy-protection system designed to prevent disk duplication with standard floppy disk drives on the Amiga, Atari ST and MS-DOS platforms. It was created by British programmer Rob Northen after founding his own company Copylock Software. It was used mainly to prevent games from being copied by regular users.
History
In 1984, Rob Northen was hired by Acornsoft to write copy protection routines for their published software, such as the original Elite for the BBC Micro. Northen left the company six months later and started his own company Copylock Software, while still working part-time for Acornsoft to write copy protection routines, file systems and disk utilities.
Northen's first copy-protected software under the Copylock name came in 1987 on the Atari ST. The first version of the Copylock software was used to protect those early Commodore Amiga and Atari ST games that had no multi-load, hence had to reside on a single floppy disk. Initially, publishers would send the unprotected master disk to Northen, who would then replace the loader program with his own encrypted loader and ship the protected master disk out for duplication.
Following requests from game developers, such as The Bitmap Brothers, who were keen to implement more complex protection checks, Northen wrote subroutines that developers could implement to their own liking. In 1990, he purchased a disk duplicator and used it to create floppies with Copylock serial numbers embedded in them, which he would then send to developers in lieu of the protected master disks, along with the Copylock routines for them to include in their games. This Copylock series could accommodate more recent games with multi-load or spanning across multiple floppies. It also allowed for protection checks to be included at arbitrary points in the game code: one example of this was the Hook computer game by Ocean Software, which included an in-game protection check that if failed would cause a key item, namely a mug, to disappear from the game.
In 1990, Copylock was also ported to MS-DOS-based systems. By the end of its run in 1996, around 500 commercial Amiga games had reportedly been protected with Copylock.
Technical details
A Copylock-protected floppy disk contains one long track, known as the Copylock Serial Track, which can be read on a standard floppy drive but is impossible to write without a sophisticated disk duplication machine. The disk contains a special loader which is heavily encrypted and can read and decode the Copylock Serial Track. The encrypted code verifies that the disk has the correct Copylock Serial Key, which is uniquely generated for each game.
On the machine language level, Copylock works by using the Motorola 68000 trace mode, which causes the processor to execute a specific trace vector before each instruction in the main program. The trace vector decodes the machine language code just-in-time before it is executed and re-encrypts it after execution, so that no more than one or two instructions are stored unencrypted into physical memory at any given time. This is called a trace vector decoder and was originally implemented on the Atari ST platform and afterwards copied to early Amiga models, both based on the 68000 architecture.
First series
There were two types of Copylock routine of the earlier series.
In the internal type, the Copylock Serial Key for that particular software is passed in hardware register D0 and stored at memory address $24. Inventive programmers could use this serial key for specific purposes to force the would-be cracker to have to remove the additional checks in the game. However, on many early titles, programmers typically just performed a check for the serial key, which was easy to find in a program and therefore to disable.
In the wrapper type, the code to start the game, or boot routine, is encrypted and then included with the Copylock code. All disk validity checking is performed by the Copylock code: if successful, the trace vector decoding extends to the encrypted boot routine or file; the data are then moved to the location expected by the game code and the routine is executed. This type of Series 1 Copylock was often used for games that loaded in one hit and did not need to access the disk drive again. However, this meant that the copy protection was rendered useless once the game was decrypted, as then the game could be 'single-filed', i.e. dumped entirely from memory, saved to disk and then made to work independently of the Copylock routines.
Second series
Series 2 was an evolution of the internal Series 1 routines, which again made early versions easy to circumvent, since many programmers only implemented a simple protection check that read the serial key from the Copylock Serial Track and checked that it was correct. Crackers often did not even need to inspect the encoded Copylock routines, because the check for disk authenticity was implemented in such as way that they could clearly see what the serial key was from the code that checked for it. Therefore, whilst many people understood how Copylock worked, very few had taken the time to work out how to actually decode one. By now, however, Copylock had evolved to allow parameters to be passed to it before execution, which meant that Copylock could now write not only the serial key, but also specific game-related values into the contents of registers passed to Copylock, or simply write values to a list of predefined addresses, which would make the game operate correctly.
The typical, generally incorrect way of cracking a Copylocked game was to get the serial key, modify the header of the Copylock to put the correct serial key into register D0, and then bypass all the reading and decoding process. This would mean the "special case" code in the Copylock would never be executed, which would mean the game would not work by using the serial key alone.
PC version
It was possible to port Copylock to the PC because the x86 microprocessor supports the trace vector the same as the 68000 processor does, through a single-step interrupt or INT 1. It manifested itself in a slightly different way in that the game's executable code was encrypted and "wrapped" by the Copylock loader. At runtime this loader would read 4 sectors from the floppy, and generate checksums from them. These in turn would be used as the keys to decrypt the game code. Once the decryption was done, the loader transferred control to the game program. The PC version was easy to circumvent, as the original game executable code was just stored inside the loader. Once you got past the disk checks, and encryption code, dumping the unencrypted executable was just a matter of performing 2 disk writes. The first would dump the unmodified "MZ" header, and the 2nd write would finish the job by saving the actual game code. Fabulous Furlough of The Humble Guys wrote a tool that did just that, and could "crack" a game in less than a minute.
References
External links
Interview with Rob Northen about his copy-protection systems
Rob Northen on MobyGames
Example of a Series 1 Copylock 'Wrapper' type: Barbarian II for Atari ST (also available on this read-only mirror)
Example of a Series 1 Copylock 'Internal' type: Xenon II for Atari ST (also available on this read-only mirror)
Source program that analyzes and removes Rob Northen Copylock protections on Atari ST
Digital rights management systems
Software cracking |
919926 | https://en.wikipedia.org/wiki/University%20of%20Macau | University of Macau | The University of Macau (UM, Portuguese: Universidade de Macau, Chinese: 澳門大學) is the only public research university in Macau. The UM campus is located in the east of Hengqin Island, Guangdong province in Mainland China, on a piece of land leased to the Macau SAR government, and is under the jurisdiction of Macau.
UM is ranked in the 201–250 bracket in the Times Higher Education (THE) World University Rankings 2022, with a global ranking of No. 5 in International Outlook, No. 38 in the THE Asia University Rankings, No 60 in the THE Asia-Pacific University Rankings, and No 26 in the THE Young University Rankings. In the Quacquarelli Symonds (QS) World University Rankings 2022, it is ranked No. 322. The university ranks first in the Portuguese-speaking world.
With the approval of the Ministry of Science and Technology of China, UM has established three state key laboratories, namely State Key Laboratory of Analog and Mixed-Signal VLSI, State Key Laboratory of Quality Research in Chinese Medicine, and State Key Laboratory of Internet of Things for Smart City.
History
The predecessor of the University of Macau (UM) is the University of East Asia (UEA), a private university founded in March 1981. In the beginning, the majority of the students came from Hong Kong. In 1988, the Portuguese Macao government acquired UEA through the Macao Foundation and renamed it the University of Macau in 1991. It was located in Taipa.
In 1999, the sovereignty over Macao was returned to China. With the mission of nurturing professionals much needed by the transitional period accomplished, UM entered a new era. The new Judicial Regime of the University of Macau and the new Charter of the University of Macau were officially passed at the Legislative Assembly of the Macau SAR and came into effect in September 2006.
In 2009, the National People's Congress Standing Committee of China officially adopted a decision that authorised the Macao SAR to exercise jurisdiction over the new UM campus located on Hengqin Island, Guangdong province. On 20 December 2009, then Chinese President and General Secretary of the Communist Party Hu Jintao officiated at the groundbreaking ceremony for the new campus. In early 2013 the Macau Legislative Assembly passed Law 3/2013 providing for the application of Macau Law in the campus effective on opening day. On 5 November, then Vice-Premier of the State Council Wang Yang officiated at the new campus inauguration ceremony. In the 2014/2015 academic year, UM began to conduct all classes on the new and modern campus.
Mission
UM undertakes as its prime mission the advancement of scholarship and education in the realms of humanities, social sciences, business, law, natural sciences, engineering, health sciences, education and other areas.
Providing higher education in accordance with the University Motto (Humanity, Integrity, Propriety, Wisdom and Sincerity).
Promoting academic research and disseminating knowledge.
Advancing culture, science and technology and promoting Macau's growth.
Cultivating responsible citizens and leaders of high calibre who possess the sound moral judgment and independent thinking ability necessary to meet the needs of the development of Macau and the region.
Identification
Emblem
The emblem of the University of Macau (UM) features a five-towered crest encircled by golden rings and the name of the university in Chinese and Portuguese.
Logo
The logo of the UM consists of two parts: the emblem and the university's name in Chinese (澳門大學), Portuguese (Universidade de Macau) and English (University of Macau) with assigned colours.
Motto
Humanity, Integrity, Propriety, Wisdom, Sincerity.
Reputation and rankings
UM is ranked #201–250 in 2022 Times Higher Education World University Rankings, No 38. in the THE Asia University Rankings, No. 60 in the THE Asia-Pacific University Rankings and No. 26 in the THE Young University Rankings. It is ranked #322 in 2022 QS World University Rankings.
In the QS World University Rankings by Subject, UM’s rankings are as follows: 251-300 in Linguistics and Education, 301-320 in Law and Engineering – Electrical & Electronic, 351-400 in Computer Science & Information Systems, 351-400 in Mathematics, 451-500 in Social Sciences & Management, 501-550 in Business & Management Studies, and 551-600 in Medicine.
In the THE World University Rankings by subject, UM’s rankings are as follows: 101-125 in Engineering and Technology; 126-150 in Education, and Life Sciences; 151-175 in Computer Science, and Psychology; 176-200 in Law; 201-250 in Arts & Humanities; 251-300 in Clinical & Health, Social Sciences, and Physical Sciences; and 301-400 in Business & Economics.
In the Essential Sciences Indicators (ESI) rankings, it is among the top 1 per cent in ten subjects, namely Engineering, Computer Science, Chemistry, Materials Science, Pharmacology & Toxicology, Psychiatry/Psychology, Biology & Biochemistry, Clinical Medicine, Social Sciences, General, and Agricultural Sciences.
Academic organisations
The university has seven faculties in the fields of Arts and Humanities, Business Administration, Education, Health Sciences, Law, Science and Technology, and Social Sciences. The university also administrates Honors College, Graduate School, the Institute of Chinese Medical Sciences, the Institute of Applied Physics and Materials Engineering, the Institute of Microelectronics, the Institute of Collaborative Innovation, the Centre for Macau Studies, the Asia-Pacific Academy of Economics and Management and the Centre for Continuing Education. They offer postgraduate and undergraduate programmes with more than 700 academic staff members involved in teaching and research. Many subjects are also taught in English.
The Academic Staff Association of the University of Macau (in Portuguese: Associação dos Professores da Universidade de Macau, in Chinese: 澳門大學教師協會) is an association composed of full-time academic staff members of the University of Macau.
Faculty of Arts and Humanities
The Faculty of Arts and Humanities (FAH) comprises the Department of Chinese Language and Literature, the Department of English, the Department of Portuguese, the Centre for Japanese Studies, the English Language Centre, the English Writing and Communication Centre, and it hosts programmes in Translation Studies, Philosophy and Religious Studies, French, Spanish, German, and Korean.
The faculty has various facilities devoted to student development, including Language Labs where students practice simultaneous translation and machine-aided translation or perfect their skills in Portuguese, Spanish, German, Japanese, or French. A black box theatre hosts various drama productions within the faculty.
The Department of Portuguese Studies used to be the Institute of Portuguese Studies but was downgraded during the 1999 handover due to the anticipation that interest would decline. In 2001 UM began offering a bachelor's degree programme for Portuguese students. Enrollment grew from nine students in 2001 to about 240 students in 2011. In 2011 the Portuguese department had eight part-time employees and 30 permanent employees, with about three-quarters of the permanent ones having PhDs. Michael Taylor of the South China Morning Post wrote that year that the downgrading of the Portuguese department was perceived as a mistake in retrospect.
Faculty of Business Administration
The Faculty of Business Administration is the largest faculty in the university. The medium of instruction for courses offered in the faculty is English. It offers several business programmes through its four departments: the Department of Accounting and Information Management, the Department of Finance and Business Economics, the Department of Management and Marketing, and the Department of Integrated Resort and Tourism Management. The faculty is AACSB and AMBA accredited.
Faculty of Education
The Faculty of Education offers bachelor's, master's and doctoral programmes. The faculty provides degree programmes of Secondary Education in Chinese, English and Mathematics, Primary Education and Pre-Primary Education, Educational Administration, Educational Psychology, School Counselling, Curriculum and Instruction, Physical Education and Sports Studies, etc.
Faculty of Health Sciences
The Faculty of Health Sciences (FHS) has thrived since its establishment in 2013. FHS now offers two undergraduate programmes, one master programme and one PhD programme. The research of FHS focuses on eight major themes: (i) cancer research, (ii) cancer precision medicine (iii) stem cell and development (iv) ageing, neural and metabolism disorders, (v) drug development, (vi) data science, (vii) bioimaging and (vii) structural biology. To support these research activities, FHS has established a state-of-the-art infrastructure that includes 35 research laboratories, four research centres and four core facilities.
Faculty of Law
The Faculty of Law offers bachelor's, master's, doctoral and postgraduate certificate programmes in the Chinese, Portuguese and English languages. The bachelor's programmes are to prepare jurists who are familiar with Macau SAR legal system; the master's and doctoral programmes purport to educate knowledgeable and qualified legal professional jurists who are competent to conduct theoretical research and teaching in Macau Law, Comparative Law, European Law, International Law, and International Business Law. The teaching system of the faculty generally follows the Roman-German regime with strict standards in teaching style, student recruitment, and examination. The faculty members consist of legal experts from Macau, Mainland China, Portugal, Austria, Italy, Brazil, Belgium, India, and other countries.
Classes in law are taught in Portuguese since Macau's legal code is in Portuguese.
Faculty of Science and Technology
The Faculty of Science and Technology was founded in 1989. Four-year undergraduate degree programmes in the following departments have been developed: the Department of Civil and Environmental Engineering, the Department of Computer and Information Science, the Department of Electrical and Computer Engineering, the Department of Electromechanical Engineering, the Institute of Applied Physics and Materials Engineering, and the Department of Mathematics. Increasing numbers of students have been accepted in big firms worldwide, adding to the rising recognition of the University of Macau.
Graduate degree programmes in the faculty have been developed since 1993, in the fields of Civil Engineering, Computer Science & Information Engineering, E-Commerce, Electrical and Computer Engineering, Electromechanical Engineering, and Mathematics.
There are various kinds of enriched laboratories for teaching and research purposes in various science and engineering fields.
Faculty of Social Sciences
The Faculty of Social Sciences consists of the Department of Communication, the Department of Economics, the Department of Government and Public Administration, the Department of Psychology, and the Department of Sociology. The faculty provides a number of courses every semester, including Economics, Statistics, Econometrics, Political Science, Public Administration, Contemporary China Studies, Sociology, Communications, Journalism and Public Communication, Psychology, and Historical and Cultural Relations between the East and the West. The faculty also offers a variety of master's and doctoral programmes. They also have a Russian Centre.
Honours College
The Honours College selectively recruits high-calibre undergraduates to nurture them into future leaders. They have access to the best research activities at UM and can study abroad at a world-renowned university to gain an international perspective on their disciplines.
Graduate School
Professor Wei Ge is the interim Dean of the Graduate School.
Institute of Chinese Medical Sciences
The Institute of Chinese Medical Sciences (ICMS) was established as the first research-oriented institute in Macau in 2002.
ICMS offers the PhD degree programme in Biomedical Sciences, and Master of Science degree programmes in Chinese Medicinal Science and Medicinal Administration, respectively.
Institute of Applied Physics and Materials Engineering
IAPME offers a PhD programme in Applied Physics and Materials Engineering.
Institute of Microelectronics
IME offers programmes in the area of microelectronics.
Institute of Collaborative Innovation
ICI encourages multidisciplinary academic cooperation within universities. Currently, it hosts the Centre for Cognitive and Brain Sciences, the Centre for Artificial Intelligence, the Centre for Data Science and the Centre for Innovation and Entrepreneurship.
Center for Macau Studies
Asia-Pacific Academy of Economics and Management
Departments and programmes
Residential colleges
UM is the only university in Macao to implement a residential college system. In fact, its RC system is the largest in Asia. There are currently ten RCs at UM, namely Chao Kuang Piu College, Cheng Yu Tung College, Cheong Kun Lun College, Choi Kai Yau College, Henry Fok Pearl Jubilee College, Lui Che Woo College, Ma Man Kei and Lo Pak Sam College, Moon Chun Memorial College, Shiu Pong College, and Stanley Ho East Asia College. As a complement to the faculty-based system, the RCs serve as a vehicle for whole-person education through systematic planning of experiential programmes. RCs aim to nurture students into compassionate and socially responsible individuals with the ability for self-reflection amid a culturally diverse and intellectually stimulating environment, with the aim of nurturing students who are successful in their studies and of high moral character. The RCs strive to enhance students’ seven competencies: civic responsibility, global competitiveness, knowledge integration, teamwork, service and leadership, cultural engagement, and healthy living.
Campus
The UM campus is separated from Taipa by a river, with the Hengqin Hill serving as a backdrop with trees. It covers 1.09 km2, with an area of 820,000m2 and more than 60 buildings. Faculty students and Macau residents can enter and exit the campus through an underwater tunnel.
The campus was designed by He Jingtang, an architect and member of the Chinese Academy of Engineering.
The campus is divided into four parts – east, south, west and north. The library, Central Teaching Building, facilities and Student Activity Centre are in the east. The Postgraduate Houses and Staff Quarters are in the south. The residential colleges are in the west, while the research buildings, Administration Building, sports facilities and University Hall are in the north.
Due to the COVID-19 pandemic, the campus was closed at the start of 2020. The university has security guards checking people's temperatures at entrances, and people must show their health certificates on their phones. They also must show proof of vaccination and/or nucleic acid-free.
Notable alumni
Cheong Weng Chon
Francisco D'Souza
Hean Tat Keh (BBA Hons 1989), Professor of Marketing at Monash University.
See also
Education in Macau
List of universities and colleges in Macau
St. Paul's College, Macau
References
Further reading
External links
University of Macau
Taipa
Universities in Macau
Educational institutions established in 1981
1981 establishments in Macau |
41961 | https://en.wikipedia.org/wiki/Data%20processing | Data processing | Data processing is, generally, "the collection and manipulation of items of data to produce meaningful information."
In this sense it can be considered a subset of information processing, "the change (processing) of information in any manner detectable by an observer."
The term Data Processing (DP) has also been used to refer to a department within an organization responsible for the operation of data processing applications.
Data processing functions
Data processing may involve various processes, including:
Validation – Ensuring that supplied data is correct and relevant.
Sorting – "arranging items in some sequence and/or in different sets."
Summarization(statistical) or (automatic) – reducing detailed data to its main points.
Aggregation – combining multiple pieces of data.
Analysis – the "collection, organization, analysis, interpretation and presentation of data."
Reporting – list detail or summary data or computed information.
Classification – separation of data into various categories.
History
The United States Census Bureau history illustrates the evolution of data processing from manual through electronic procedures.
Manual data processing
Although widespread use of the term data processing dates only from the 1950's, data processing functions have been performed manually for millennia. For example, bookkeeping involves functions such as posting transactions and producing reports like the balance sheet and the cash flow statement. Completely manual methods were augmented by the application of mechanical or electronic calculators. A person whose job was to perform calculations manually or using a calculator was called a "computer."
The 1890 United States Census schedule was the first to gather data by individual rather than household. A number of questions could be answered by making a check in the appropriate box on the form. From 1850 to 1880 the Census Bureau employed "a system of tallying, which, by reason of the increasing number of combinations of classifications required, became increasingly complex. Only a limited number of combinations could be recorded in one tally, so it was necessary to handle the schedules 5 or 6 times, for as many independent tallies." "It took over 7 years to publish the results of the 1880 census" using manual processing methods.
Automatic data processing
The term automatic data processing was applied to operations performed by means of unit record equipment, such as Herman Hollerith's application of punched card equipment for the 1890 United States Census. "Using Hollerith's punchcard equipment, the Census Office was able to complete tabulating most of the 1890 census data in 2 to 3 years, compared with 7 to 8 years for the 1880 census. It is estimated that using Hollerith's system saved some $5 million in processing costs" in 1890 dollars even though there were twice as many questions as in 1880.
Electronic data processing
Computerized data processing, or Electronic data processing represents a later development, with a computer used instead of several independent pieces of equipment. The Census Bureau first made limited use of electronic computers for the 1950 United States Census, using a UNIVAC I system, delivered in 1952.
Other developments
The term data processing has mostly been subsumed by the more general term information technology (IT). The older term "data processing" is suggestive of older technologies. For example, in 1996 the Data Processing Management Association (DPMA) changed its name to the Association of Information Technology Professionals." Nevertheless, the terms are approximately synonymous.
Applications
Commercial data processing
Commercial data processing involves a large volume of input data, relatively few computational operations, and a large volume of output. For example, an insurance company needs to keep records on tens or hundreds of thousands of policies, print and mail bills, and receive and post payments.
Data analysis
In science and engineering, the terms data processing and information systems are considered too broad, and the term data processing is typically used for the initial stage followed by a data analysis in the second stage of the overall data handling.
Data analysis uses specialized algorithms and statistical calculations that are less often observed in a typical general business environment. For data analysis, software suites like SPSS or SAS, or their free counterparts such as DAP, gretl or PSPP are often used.
See also
Data processing system
Big data
Computation
Decision-making software
Information and communications technology
Information technology
Computer science
Notes
External links
References
Further reading
Bourque, Linda B.; Clark, Virginia A. (1992) Processing Data: The Survey Example. (Quantitative Applications in the Social Sciences, no. 07-085). Sage Publications.
Levy, Joseph (1967) Punched Card Data Processing''. McGraw-Hill Book Company.
Computer data |
474908 | https://en.wikipedia.org/wiki/Structural%20alignment | Structural alignment | Structural alignment attempts to establish homology between two or more polymer structures based on their shape and three-dimensional conformation. This process is usually applied to protein tertiary structures but can also be used for large RNA molecules. In contrast to simple structural superposition, where at least some equivalent residues of the two structures are known, structural alignment requires no a priori knowledge of equivalent positions. Structural alignment is a valuable tool for the comparison of proteins with low sequence similarity, where evolutionary relationships between proteins cannot be easily detected by standard sequence alignment techniques. Structural alignment can therefore be used to imply evolutionary relationships between proteins that share very little common sequence. However, caution should be used in using the results as evidence for shared evolutionary ancestry because of the possible confounding effects of convergent evolution by which multiple unrelated amino acid sequences converge on a common tertiary structure.
Structural alignments can compare two sequences or multiple sequences. Because these alignments rely on information about all the query sequences' three-dimensional conformations, the method can only be used on sequences where these structures are known. These are usually found by X-ray crystallography or NMR spectroscopy. It is possible to perform a structural alignment on structures produced by structure prediction methods. Indeed, evaluating such predictions often requires a structural alignment between the model and the true known structure to assess the model's quality. Structural alignments are especially useful in analyzing data from structural genomics and proteomics efforts, and they can be used as comparison points to evaluate alignments produced by purely sequence-based bioinformatics methods.
The outputs of a structural alignment are a superposition of the atomic coordinate sets and a minimal root mean square deviation (RMSD) between the structures. The RMSD of two aligned structures indicates their divergence from one another. Structural alignment can be complicated by the existence of multiple protein domains within one or more of the input structures, because changes in relative orientation of the domains between two structures to be aligned can artificially inflate the RMSD.
Data produced by structural alignment
The minimum information produced from a successful structural alignment is a set of residues that are considered equivalent between the structures. This set of equivalences is then typically used to superpose the three-dimensional coordinates for each input structure. (Note that one input element may be fixed as a reference and therefore its superposed coordinates do not change.) The fitted structures can be used to calculate mutual RMSD values, as well as other more sophisticated measures of structural similarity such as the global distance test (GDT, the metric used in CASP). The structural alignment also implies a corresponding one-dimensional sequence alignment from which a sequence identity, or the percentage of residues that are identical between the input structures, can be calculated as a measure of how closely the two sequences are related.
Types of comparisons
Because protein structures are composed of amino acids whose side chains are linked by a common protein backbone, a number of different possible subsets of the atoms that make up a protein macromolecule can be used in producing a structural alignment and calculating the corresponding RMSD values. When aligning structures with very different sequences, the side chain atoms generally are not taken into account because their identities differ between many aligned residues. For this reason it is common for structural alignment methods to use by default only the backbone atoms included in the peptide bond. For simplicity and efficiency, often only the alpha carbon positions are considered, since the peptide bond has a minimally variant planar conformation. Only when the structures to be aligned are highly similar or even identical is it meaningful to align side-chain atom positions, in which case the RMSD reflects not only the conformation of the protein backbone but also the rotameric states of the side chains. Other comparison criteria that reduce noise and bolster positive matches include secondary structure assignment, native contact maps or residue interaction patterns, measures of side chain packing, and measures of hydrogen bond retention.
Structural superposition
The most basic possible comparison between protein structures makes no attempt to align the input structures and requires a precalculated alignment as input to determine which of the residues in the sequence are intended to be considered in the RMSD calculation. Structural superposition is commonly used to compare multiple conformations of the same protein (in which case no alignment is necessary, since the sequences are the same) and to evaluate the quality of alignments produced using only sequence information between two or more sequences whose structures are known. This method traditionally uses a simple least-squares fitting algorithm, in which the optimal rotations and translations are found by minimizing the sum of the squared distances among all structures in the superposition. More recently, maximum likelihood and Bayesian methods have greatly increased the accuracy of the estimated rotations, translations, and covariance matrices for the superposition.
Algorithms based on multidimensional rotations and modified quaternions have been developed to identify topological relationships between protein structures without the need for a predetermined alignment. Such algorithms have successfully identified canonical folds such as the four-helix bundle. The SuperPose method is sufficiently extensible to correct for relative domain rotations and other structural pitfalls.
Evaluating similarity
Often the purpose of seeking a structural superposition is not so much the superposition itself, but an evaluation of the similarity of two structures or a confidence in a remote alignment. A subtle but important distinction from maximal structural superposition is the conversion of an alignment to a meaningful similarity score. Most methods output some sort of "score" indicating the quality of the superposition. However, what one actually wants is not merely an estimated "Z-score" or an estimated E-value of seeing the observed superposition by chance but instead one desires that the estimated E-value is tightly correlation to the true E-value. Critically, even if a method's estimated E-value is precisely correct on average, if it lacks a low standard deviation on its estimated value generation process, then the rank ordering of the relative similarities of a query protein to a comparison set will rarely agree with the "true" ordering.
Different methods will superimpose different numbers of residues because they use different quality assurances and different definitions of "overlap"; some only include residues meeting multiple local and global superposition criteria and others are more greedy, flexible, and promiscuous. A greater number of atoms superposed can mean more similarity but it may not always produce the best E-value quantifying the unlikeliness of the superposition and thus not as useful for assessing similarity, especially in remote homologs.
Algorithmic complexity
Optimal solution
The optimal "threading" of a protein sequence onto a known structure and the production of an optimal multiple sequence alignment have been shown to be NP-complete. However, this does not imply that the structural alignment problem is NP-complete. Strictly speaking, an optimal solution to the protein structure alignment problem is only known for certain protein structure similarity measures, such as the measures used in protein structure prediction experiments, GDT_TS and MaxSub. These measures can be rigorously optimized using an algorithm capable of maximizing the number of atoms in two proteins that can be superimposed under a predefined distance cutoff. Unfortunately, the algorithm for optimal solution is not practical, since its running time depends not only on the lengths but also on the intrinsic geometry of input proteins.
Approximate solution
Approximate polynomial-time algorithms for structural alignment that produce a family of "optimal" solutions within an approximation parameter for a given scoring function have been developed. Although these algorithms theoretically classify the approximate protein structure alignment problem as "tractable", they are still computationally too expensive for large-scale protein structure analysis. As a consequence, practical algorithms that converge to the global solutions of the alignment, given a scoring function, do not exist. Most algorithms are, therefore, heuristic, but algorithms that guarantee the convergence to at least local maximizers of the scoring functions, and are practical, have been developed.
Representation of structures
Protein structures have to be represented in some coordinate-independent space to make them comparable. This is typically achieved by constructing a sequence-to-sequence matrix or series of matrices that encompass comparative metrics: rather than absolute distances relative to a fixed coordinate space. An intuitive representation is the distance matrix, which is a two-dimensional matrix containing all pairwise distances between some subset of the atoms in each structure (such as the alpha carbons). The matrix increases in dimensionality as the number of structures to be simultaneously aligned increases. Reducing the protein to a coarse metric such as secondary structure elements (SSEs) or structural fragments can also produce sensible alignments, despite the loss of information from discarding distances, as noise is also discarded. Choosing a representation to facilitate computation is critical to developing an efficient alignment mechanism.
Methods
Structural alignment techniques have been used in comparing individual structures or sets of structures as well as in the production of "all-to-all" comparison databases that measure the divergence between every pair of structures present in the Protein Data Bank (PDB). Such databases are used to classify proteins by their fold.
DALI
A common and popular structural alignment method is the DALI, or Distance-matrix ALIgnment method, which breaks the input structures into hexapeptide fragments and calculates a distance matrix by evaluating the contact patterns between successive fragments. Secondary structure features that involve residues that are contiguous in sequence appear on the matrix's main diagonal; other diagonals in the matrix reflect spatial contacts between residues that are not near each other in the sequence. When these diagonals are parallel to the main diagonal, the features they represent are parallel; when they are perpendicular, their features are antiparallel. This representation is memory-intensive because the features in the square matrix are symmetrical (and thus redundant) about the main diagonal.
When two proteins' distance matrices share the same or similar features in approximately the same positions, they can be said to have similar folds with similar-length loops connecting their secondary structure elements. DALI's actual alignment process requires a similarity search after the two proteins' distance matrices are built; this is normally conducted via a series of overlapping submatrices of size 6x6. Submatrix matches are then reassembled into a final alignment via a standard score-maximization algorithm — the original version of DALI used a Monte Carlo simulation to maximize a structural similarity score that is a function of the distances between putative corresponding atoms. In particular, more distant atoms within corresponding features are exponentially downweighted to reduce the effects of noise introduced by loop mobility, helix torsions, and other minor structural variations. Because DALI relies on an all-to-all distance matrix, it can account for the possibility that structurally aligned features might appear in different orders within the two sequences being compared.
The DALI method has also been used to construct a database known as FSSP (Fold classification based on Structure-Structure alignment of Proteins, or Families of Structurally Similar Proteins) in which all known protein structures are aligned with each other to determine their structural neighbors and fold classification. There is an searchable database based on DALI as well as a downloadable program and web search based on a standalone version known as DaliLite.
Combinatorial extension
The combinatorial extension (CE) method is similar to DALI in that it too breaks each structure in the query set into a series of fragments that it then attempts to reassemble into a complete alignment. A series of pairwise combinations of fragments called aligned fragment pairs, or AFPs, are used to define a similarity matrix through which an optimal path is generated to identify the final alignment. Only AFPs that meet given criteria for local similarity are included in the matrix as a means of reducing the necessary search space and thereby increasing efficiency. A number of similarity metrics are possible; the original definition of the CE method included only structural superpositions and inter-residue distances but has since been expanded to include local environmental properties such as secondary structure, solvent exposure, hydrogen-bonding patterns, and dihedral angles.
An alignment path is calculated as the optimal path through the similarity matrix by linearly progressing through the sequences and extending the alignment with the next possible high-scoring AFP pair. The initial AFP pair that nucleates the alignment can occur at any point in the sequence matrix. Extensions then proceed with the next AFP that meets given distance criteria restricting the alignment to low gap sizes. The size of each AFP and the maximum gap size are required input parameters but are usually set to empirically determined values of 8 and 30 respectively. Like DALI and SSAP, CE has been used to construct an all-to-all fold classification database from the known protein structures in the PDB.
The RCSB PDB has recently released an updated version of CE, Mammoth, and FATCAT as part of the RCSB PDB Protein Comparison Tool. It provides a new variation of CE that can detect circular permutations in protein structures.
Mammoth
MAMMOTH approaches the alignment problem from a different objective than almost all other methods. Rather than trying to find an alignment that maximally superimposes the largest number of residues, it seeks the subset of the structural alignment least likely to occur by chance. To do this it marks a local motif alignment with flags to indicate which residues simultaneously satisfy more stringent criteria: 1) Local structure overlap 2) regular secondary structure 3) 3D-superposition 4) same ordering in primary sequence. It converts the statistics of the number of residues with high-confidence matches and the size of the protein to compute an Expectation value for the outcome by chance. It excels at matching remote homologs, particularly structures generated by ab initio structure prediction to structure families such as SCOP, because it emphasizes extracting a statistically reliable sub alignment and not in achieving the maximal sequence alignment or maximal 3D superposition.
For every overlapping window of 7 consecutive residues it computes the set of displacement direction unit vectors between adjacent C-alpha residues. All-against-all local motifs are compared based on the URMS score. These values becomes the pair alignment score entries for dynamic programming which produces a seed pair-wise residue alignment. The second phase uses a modified MaxSub algorithm: a single 7 reside aligned pair in each proteins is used to orient the two full length protein structures to maximally superimpose these just these 7 C-alpha, then in this orientation it scans for any additional aligned pairs that are close in 3D. It re-orients the structures to superimpose this expanded set and iterates till no more pairs coincide in 3D. This process is restarted for every 7 residue window in the seed alignment. The output is the maximal number of atoms found from any of these initial seeds. This statistic is converted to a calibrated E-value for the similarity of the proteins.
Mammoth makes no attempt to re-iterate the initial alignment or extend the high quality sub-subset. Therefore, the seed alignment it displays can't be fairly compared to DALI or TM align as its was formed simply as a heuristic to prune the search space. (It can be used if one wants an alignment based solely on local structure-motif similarity agnostic of long range rigid body atomic alignment.) Because of that same parsimony, it is well over ten times faster than DALI, CE and TM-align. It is often used in conjunction with these slower tools to pre-screen large data bases to extract the just the best E-value related structures for more exhaustive superposition or expensive calculations.
It has been particularly successful at analyzing "decoy" structures from ab initio structure prediction. These decoys are notorious for getting local fragment motif structure correct, and forming some kernels of correct 3D tertiary structure but getting the full length tertiary structure wrong. In this twilight remote homology regime, Mammoth's e-values for the CASP protein structure prediction evaluation have been show to be significantly more correlated with human ranking than SSAP or DALI. Mammoths ability to extract the multi-criteria partial overlaps with proteins of known structure and rank these with proper E-values, combined with its speed facilitates scanning vast numbers of decoy models against the PDB data base for identifying the most likely correct decoys based on their remote homology to known proteins.
SSAP
The SSAP (Sequential Structure Alignment Program) method uses double dynamic programming to produce a structural alignment based on atom-to-atom vectors in structure space. Instead of the alpha carbons typically used in structural alignment, SSAP constructs its vectors from the beta carbons for all residues except glycine, a method which thus takes into account the rotameric state of each residue as well as its location along the backbone. SSAP works by first constructing a series of inter-residue distance vectors between each residue and its nearest non-contiguous neighbors on each protein. A series of matrices are then constructed containing the vector differences between neighbors for each pair of residues for which vectors were constructed. Dynamic programming applied to each resulting matrix determines a series of optimal local alignments which are then summed into a "summary" matrix to which dynamic programming is applied again to determine the overall structural alignment.
SSAP originally produced only pairwise alignments but has since been extended to multiple alignments as well. It has been applied in an all-to-all fashion to produce a hierarchical fold classification scheme known as CATH (Class, Architecture, Topology, Homology), which has been used to construct the CATH Protein Structure Classification database.
Recent developments
Improvements in structural alignment methods constitute an active area of research, and new or modified methods are often proposed that are claimed to offer advantages over the older and more widely distributed techniques. A recent example, TM-align, uses a novel method for weighting its distance matrix, to which standard dynamic programming is then applied. The weighting is proposed to accelerate the convergence of dynamic programming and correct for effects arising from alignment lengths. In a benchmarking study, TM-align has been reported to improve in both speed and accuracy over DALI and CE.
Other promising methods of structural alignment are local structural alignment methods. These provide comparison of pre-selected parts of proteins (e.g. binding sites, user-defined structural motifs) against binding sites or whole-protein structural databases. The MultiBind and MAPPIS servers allow the identification of common spatial arrangements of physicochemical properties such as H-bond donor, acceptor, aliphatic, aromatic or hydrophobic in a set of user provided protein binding sites defined by interactions with small molecules (MultiBind) or in a set of user-provided protein–protein interfaces (MAPPIS). Others provide comparison of entire protein structures against a number of user submitted structures or against a large database of protein structures in reasonable time (ProBiS). Unlike global alignment approaches, local structural alignment approaches are suited to detection of locally conserved patterns of functional groups, which often appear in binding sites and have significant involvement in ligand binding. As an example, comparing G-Losa, a local structure alignment tool, with TM-align, a global structure alignment based method. While G-Losa predicts drug-like ligands’ positions in single-chain protein targets more precisely than TM-align, the overall success rate of TM-align is better.
However, as algorithmic improvements and computer performance have erased purely technical deficiencies in older approaches, it has become clear that there is no one universal criterion for the 'optimal' structural alignment. TM-align, for instance, is particularly robust in quantifying comparisons between sets of proteins with great disparities in sequence lengths, but it only indirectly captures hydrogen bonding or secondary structure order conservation which might be better metrics for alignment of evolutionarily related proteins. Thus recent developments have focused on optimizing particular attributes such as speed, quantification of scores, correlation to alternative gold standards, or tolerance of imperfection in structural data or ab initio structural models. An alternative methodology that is gaining popularity is to use the consensus of various methods to ascertain proteins structural similarities.
RNA structural alignment
Structural alignment techniques have traditionally been applied exclusively to proteins, as the primary biological macromolecules that assume characteristic three-dimensional structures. However, large RNA molecules also form characteristic tertiary structures, which are mediated primarily by hydrogen bonds formed between base pairs as well as base stacking. Functionally similar noncoding RNA molecules can be especially difficult to extract from genomics data because structure is more strongly conserved than sequence in RNA as well as in proteins, and the more limited alphabet of RNA decreases the information content of any given nucleotide at any given position.
However, because of the increasing interest in RNA structures and because of the growth of the number of experimentally determined 3D RNA structures, few RNA structure similarity methods have been developed recently. One of those methods is, e.g., SETTER which decomposes each RNA structure into smaller parts called general secondary structure units (GSSUs). GSSUs are subsequently aligned and these partial alignments are merged into the final RNA structure alignment and scored. The method has been implemented into the SETTER webserver.
A recent method for pairwise structural alignment of RNA sequences with low sequence identity has been published and implemented in the program FOLDALIGN. However, this method is not truly analogous to protein structural alignment techniques because it computationally predicts the structures of the RNA input sequences rather than requiring experimentally determined structures as input. Although computational prediction of the protein folding process has not been particularly successful to date, RNA structures without pseudoknots can often be sensibly predicted using free energy-based scoring methods that account for base pairing and stacking.
Software
Choosing a software tool for structural alignment can be a challenge due to the large variety of available packages that differ significantly in methodology and reliability. A partial solution to this problem was presented in and made publicly accessible through the ProCKSI webserver. A more complete list of currently available and freely distributed structural alignment software can be found in structural alignment software.
Properties of some structural alignment servers and software packages are summarized and tested with examples at Structural Alignment Tools in Proteopedia.Org.
See also
Multiple sequence alignment
List of sequence alignment software
Structural Classification of Proteins
SuperPose
Protein superfamily
References
Further reading
Bourne PE, Shindyalov IN. (2003): Structure Comparison and Alignment. In: Bourne, P.E., Weissig, H. (Eds): Structural Bioinformatics. Hoboken NJ: Wiley-Liss.
Yuan X, Bystroff C. (2004) "Non-sequential Structure-based Alignments Reveal Topology-independent Core Packing Arrangements in Proteins", Bioinformatics. Nov 5, 2004
Protein methods |
57769211 | https://en.wikipedia.org/wiki/%2823958%29%201998%20VD30 | (23958) 1998 VD30 | , provisional designation: , is a Jupiter trojan from the Greek camp, approximately in diameter. It was discovered on 10 November 1998, by astronomers with the LINEAR survey at the Lincoln Laboratory's Experimental Test Site near Socorro, New Mexico, in the United States. The dark Jovian asteroid belongs to the 110 largest Jupiter trojans and shows an exceptionally slow rotation of 562 hours. It has not been named since its numbering in April 2001.
Orbit and classification
is a dark Jupiter trojan in a 1:1 orbital resonance with Jupiter. It is located in the leading Greek camp at the Gas Giant's Lagrangian point, 60° ahead of its orbit . It is also a non-family asteroid in the Jovian background population. It orbits the Sun at a distance of 4.7–5.7 AU once every 12 years (4,370 days; semi-major axis of 5.23 AU). Its orbit has an eccentricity of 0.10 and an inclination of 25° with respect to the ecliptic. The body's observation arc begins with its first observation as at the Kiso Observatory in November 1986, or 12 years prior to its official discovery observation at Socorro.
Numbering and naming
This minor planet was numbered by the Minor Planet Center on 8 April 2001 (). , it has not been named.
Physical characteristics
is an assumed, carbonaceous C-type asteroid. Most Jupiter trojans are D-types, with the reminder being mostly C and P-type asteroids. It has a typical V–I color index of 0.99 and a BR-color of 1.15.
Rotation period
With a rotation period of 562 hours, this slow rotator belongs to the Top 100 slowest rotators known to exist. It is also the third-slowest rotator among the larger Jupiter trojans after 4902 Thessandrus (738 hours) and (7352) 1994 CO (648 hours).
In August 2015, a rotational lightcurve of was obtained from photometric observations by the Kepler space observatory during its K2 mission. Lightcurve analysis gave an exceptionally long period of hours with a brightness amplitude of 0.45 magnitude, somewhat indicative of a non-spherical shape (). A second, lower-rated lightcurve from Kepler gave an alternative, even longer period of hours ().
These results supersede a poor period determination made at the Sierra Nevada Observatory in 2007, which gave a period 12.080 hours ().
Diameter and albedo
According to the survey carried out by the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer and the Japanese Akari satellite, measures 46.00 and 47.91 kilometers in diameter and its surface has an albedo between 0.076 and 0.084, respectively. The Collaborative Asteroid Lightcurve Link assumes a standard albedo for a carbonaceous asteroid of 0.057 and calculates a larger diameter of 50.77 kilometers based on an absolute magnitude of 10.2.
References
External links
Asteroid Lightcurve Database (LCDB), query form (info )
Discovery Circumstances: Numbered Minor Planets (20001)-(25000) – Minor Planet Center
Asteroid (23958) 1998 VD30 at the Small Bodies Data Ferret
023958
023958
023958
19981110 |
5936445 | https://en.wikipedia.org/wiki/EVO%20Smart%20Console | EVO Smart Console | EVO Smart Console (originally called Evo: Phase One) is a media PC and video game console marketed in the seventh generation era of video games, and was produced by Envizions. The beta, called EVO: Phase One, was released on October 20, 2006, and the final product was released on November 20, 2008.
The system uses Linux software, which is built using the Fedora operating system. The system came bundled with three games: SuperTux, Kobo Deluxe, and Kid Destiny. The console also features high definition (HD), Internet access, and allows running Windows games. It also has a built-in 120 GB hard drive and 2 GB RAM.
Final version
The final name of the system was EVO Smart Console, and was released to developers on November 20, 2008 and it cost $250. The latest version had Amiga-based games, an Akimbo-based video on demand service. It also had a larger, 250 GB hard drive, 1080p resolution, and its own Fedora-based Linux operating system, Mirrors Evolution. There are open source codes for developers to make Linux games.
Specifications
Processors
Central processing unit
AMD Athlon 64x2 5600+ (2.90 GHz)
Graphics processing unit
ATI HD 3200
Memory, Storage
120 GB Hard Drive, Cloud storage
2 GB DDR2
Digital media
DVD-ROM Drive (Compatible with DVD-video, DVD-ROM, DVD-R/RW, DVD+R/RW, CD-ROM, CD-RW)
Input/output
One HDMI port, One DVI port
One SD card port
Two USB 2.0 ports, Two Ethernet ports
Three audio ports
Software
Linux Fedora
Proprietary firmware
General features
Internet access, VoIP
Runs Windows games, Amiga-based games
Allows multiple players from one master hub
Biometric security system that supports facial, voice and fingerprint scans, and Biometric linked game saves
Standard-definition and high-definition video support
Remote access
Internet Television, Streaming content, Akimbo-based video on demand (VOD), DVR
Online cloud storage
The voice-enabled Media Center Communicator allows playing music, video conferencing, VoIP and other media functions
Successors
EVO 2
The EVO 2 is a cancelled game console project first mentioned on an Envizions press release on January 9, 2011 under the name GameBox, it was unveiled on May 25, 2011, with specs, images, and a new name. The sources stated it was supposed to be released in fall 2011. Their website had previously stated that the console would ship in 2012.
Specifications
CPU: 1 GHz ARM Cortex-A8 core, Samsung S5PV210. Frequency up to 1.2 GHz, 512MB memory, built-in 2G memory space.
GPU: Nvidia Tegra
512 MB Internal flash memory.
Expandable via SD/SDHC memory cards.
SD memory card slot (supports SDHC cards)
5 USB 2.0 ports
"AV Multi Out" port, supporting composite video, S-Video (NTSC consoles only)
HDMI out port, supporting six-channel PCM linear output through HDMI
1080p, 1080i, 720p, 480p, or 480i, standard 4:3 and 16:9 anamorphic widescreen.
On November 28, 2012, Envizions CEO Derrick Samuels announced a new Android console, Oton, from his new startup called 'EnGeniux', effectively ending EVO 2's development.
EVO 2 DX
Despite the cancellation of the EVO 2, Envizions developed the EVO 2 DX, a gaming PC running an operating system that is a hybrid of Windows and Android. It has motion capabilities using a standard webcam.
Specifications
CPU: An undisclosed "quad-core Opteron & Phenom" CPU
GPU: Integrated ATI Radeon HD 4200 (DirectX 10.1)
Chipset: AMD 785G chipset + SB750 chipset
VGA, DVI-D, HDMI 1.3 outputs
4 x SATA II 3Gbit/s AMD RAIDXpert RAID 0,1,5,10
Integrated ALC662 6-CH HD audio
Realtek PCI-Express gigabit Ethernet
1 x 32-bit PCI, 1 x mini-PCI Express, 2 x eSATA
References
External links
Personal computers
Computer-related introductions in 2006 |
14321708 | https://en.wikipedia.org/wiki/VisionArt | VisionArt | VisionArt Design & Animation was a motion picture and television visual effects company, founded in the 1980s by David Rose and Todd Hess. Though originally a small Orange County company working primarily on cable TV advertisements and flying logos, VisionArt moved to Santa Monica in 1992, winning its first major effects work with "Star Trek: Deep Space Nine." The studio originated in Santa Ana, California, later moved to Santa Monica, California, and closed its doors in 2000. (VisionArt is sometimes incorrectly cited as Vision Art or Vision Arts.)
Star Trek (1993–1999)
Star Trek: The Next Generation – 3D Shuttle (1993)
The first CGI ship ever used in the Star Trek franchise was created by Dennis Blakey and Dorene Haver. It was 3D computer model of the "Runabout" shuttle for Star Trek: The Next Generation. Previously, Star Trek had exclusively used physical models, which at the time were composited by Adam Howard and Steve Scott at Digital Magic. VisionArt's 3D model of the Runabout was primarily used for the stretching effect when it jumped to warp.
Star Trek: Deep Space Nine – Odo Morphs (1993–1999)
Dennis Blakey, who headed the initial development and effects work for the shape-shifting character Odo, brought VisionArt its first prime-time Emmy Award for the pilot and initial episodes. Beginning with season 1, episode 11 "Vortex," Odo morphs were animated by Ted Fay, with Blakey generating the intermediate blobular "goo" state of the shape-shifting character, and Dorene Haver providing the compositing. After Blakey's departure, Odo's "goo" was primarily animated by Carl Hooper and Daniel Kramer, with later Odo morphs animated by Richard Cook.
Star Trek: Deep Space Nine – 3D Starships (1993–1997)
The USS Defiant was the first full-fledged starship in the Star Trek franchise to have a CGI model used in regular production. It was first built and animated by Daniel Kramer and Carl Hooper. The CGI Defiant was featured heavily in the Season 4 episode "Starship Down", where it battled a CGI Jem'Hadar ship, designed by Robert Tom and built by Hooper, in a CGI gas giant's atmosphere. The probe in Starship Down was built by Vinh Le, with Ben Hawkins also providing animation. The gas giant atmosphere was created by Rob Bredow and Pete Shinners using Sparky, a proprietary particle system developed by VisionArt. A further contribution came in season five, with the addition of 3D model of the Jem'Hadar battle cruiser built by Tony Sansalone.
Star Trek: Voyager (1995)
VisionArt won another Emmy Award for Best Individual Achievement in Effects for their work on "Caretaker," the pilot episode of Star Trek: Voyager. Barry Safley created 3D animation for the episode's alien creature, which was revealed to have been hiding in the form of a young girl. The reveal was animated by Ted Fay, with compositing by Bethany Berndt-Shackelford.
Star Trek: First Contact (1996)
VisionArt created a 3D Vulcan starship for Star Trek: First Contact. The craft was and animated built by a team led by Daniel Kramer and Carl Hooper, with textures by Robert Tom, and composting by Bethany Berndt-Shackelford. The team also included Todd Boyce, Rick Cook, Celine Jackson, Jeff Pierce and others.
Lois & Clark (1993)
VisionArt pioneered the use of full-body human 3D animation for pilot of Lois & Clark: The New Adventures of Superman for which Rob Bredow, Ted Fay, Carl Hooper, Daniel Kramer, and Pete Shinners, demonstrated the seamless morphing between a human actor and a photorealistic CGI model of the actor.
Northern Exposure (1993/1994)
In 1993, Ted Fay created the first photorealistic talking dog for Northern Exposure, a technology that was further advanced for the film version of Dr. Dolittle. The talking dog was created for season 5, episode 12 entitled "Mr. Sandman", which aired January 10, 1994. "The CBS hit series is known for its offbeat scripts and quirky guests, and next week's episode is no exception," observed E! News Daily's Bianca Ferrare, adding "The dog talking here in fluent French-Canadian is a figment of the character's imagination, but the process of giving the dog life is the brainstorm of animators at VisionArt" "Talking animals are nothing new, by 'Mr. Ed' this isn't," added Ferrare. "With 'Mr. Ed' you have the horse that you fed the peanut butter," noted animator Ted Fay, "which they did actually with the dog, but it wasn't at all convincing." "Recent CGI attempts, on the other hand, have offered the believability of being able to sync the mouth positions with dialogue, but at the expense of the photorealism." VisionArt had developed a reputation for "pushing the envelope" with CGI and morphing techniques, and the produces of Northern Exposure were "ecstatic" with the results. The 2D animation approach used a specially customized version of Elastic Reality, a morphing software which VisionArt had agreed to co-develop with ASDG in exchange for not developing their own system in-house, and having a site-license in perpetuity, with a six-month exclusive on features contributed by VisionArt. Paul Miller, the lead developer for the Silicon Graphics version of Elastic Reality, provided Fay with new features on the afternoon that he requested them, allowing for rapid innovation of a first-of-a-kind approach on an episodic television schedule. Elastic Reality was later sold to Avid Technology.
Independence Day (1996)
VisionArt's claim to fame on the big screen was arguably its creation of the majority of the dogfight sequences for Independence Day, which won the Academy Award for Best Visual Effects. Sparky, a dynamics/simulation software developed by Rob Bredow, director of research and development, along with Pete Shinners, was heavily expanded to provide for near-real-time animation of large groups of F-18 jet fighters, alien attackers, missiles, smoke trailers, shields, etc. While previous shots of similar complexity animated by other means had taken about one month each, Sparky was also able to render the frames in hardware anti-aliased at film resolution at just one minute per frame, allowing the delivery of two shots per day. While traditional animation was effective when a handful of aircraft were involved, digital effects supervisor Tricia Ashford noted that the technique would be "too laborious for the frenetic dogfight that concludes Independence Day." "The final air battle takes place around a fifteen-mile-wide destroyer," remarked Ashford, "and Roland wanted to see hundreds of F-18's and attackers duking it out with missiles, light balls, and tracer fire. It was really an enormous challenge; and the only way it could be accomplished was through an advanced procedural system that could automatically calculate and render the interaction between all these different elements." VisionArt demonstrated just such a system to Roland Emmerich and his team, and they loved it. "VisionArt had a tremendous system to begin with," stated Ashford, "and then they were able to adapt it to meet the needs of our show." In a 1996 interview for SIGGRAPH, writer Dean Devlin stated "When we were shown the software that was developed at VIsionArt, where we could literally just slide a little bar and add more F-18's and more alien attackers... the ease in which were able to create these shots, and the flexibility – I don't think that we could have done these sequences without it." Rob Bredow modified Sparky "to simulate the behavioral characteristics of an aerial dogfight involving hundreds of planes and attackers." Initially, the US Navy was open to providing data on the flight characteristics of the F-18, but the Pentagon wanted Emmerich to strike all reference to Area 51 from the film. Given the centrality of Area 51 to UFO folklore, Emmerich refused. Fortunately, the Royal Australian Air Force had no qualms to references to Area 51, and happily provided the needed data. Director Roland Emmerich and writer Dean Devlin then provided the equivalent fictional characteristics for the alien attackers. "Once the capabilities of the planes and alien attackers were established, Bredow and software engineers Randi Stern and Brian Hall developed a range of prioritized objectives for each. an F-18, for example, might have the objective of attacking the destroyer, unless an alien attacker entered a zone that triggered evasive action." Rules were also established so that planes and attackers would bank away from and keep clear of the 3D space that would be occupied by the destroyer once it was composited into the shot. In the end, the Independence Day shattered box office records, grossing over US$817 million worldwide, and won the 1996 Academy Award for Best Visual Effects.
Godzilla (1998)
VisionArt's sister company FutureLight, headed by Rob Bredow (who later became the head of Industrial Light & Magic), created the first real-time tetherless optical motion capture (mocap) system in the industry. FutureLight's mocap was used by VisionArt to allow director Roland Emerich to conceptualize the hero CG character for 1998's Godzilla. It was also used in conjunction with Sparky for a number of key "Babyzilla" shot, including 885 babies. "With those kinds of numbers, key frame animation was impossible, so VisionArt's Rob Bredow, Brian Hall and Pete Shinners developed sophisticated flocking software that the babies a kind of artificial intelligence. With their flocking software, the babies had a set of animations to choose from, knew their environment, and knew parameters for moving." The visual effects for Godzilla were particularly notable in that it was the first major feature film to employ CG animation integrated into a large volume of handheld camera footage, accounting for roughly 80% of the film's 400 visual effects shots. VisionArt employed a Zeiss Rec Elta RL-S reflectorless laser survey head (SN 702706-0000.720 217012) to obtain precise on-set 3-D measurements for the large scale street scenes such as those filmed in Manhattan, then coupled that data with custom developed 2D to 3D camera tracking software which allowed CG characters and debris to be seamlessly integrated into the erratic hand-held camera shots. VisionArt completed 135 of the film's visual effects shots in-house, nearly one-third of the total, and provided the camera tracking to Centropolis Effects, Sony Pictures Imageworks, Digiscope and Pixel Liberation Front, which created the remainder of the shots.
Dr. Dolittle (1998)
VisionArt created 80 talking animal shorts for the 1998's Dr. Dolittle, most of which involved blending 3D elements integrated with 2D animation of the live-action animal, involving everything from muzzle replacement to full head replacement on a given animal actor. VisionArt believed that key to creating successful talking animals was keeping a real animal's eyes, even when much of the animal's face was CG: "The eyes are so much of what brings them to life," said Josh Rose, executive vice president of VisionArt, adding "On many of the close-up shots of Rodney the guinea pig, we ended up doing muzzle replacements; almost two-thirds of his head was 3-D, but we kept his real eyes. For the cat, the real eyes were also kept — the computer graphics feathered off about half an inch all the way around the mouth. The only animals we did CG eyes for were the sheep, because they were chewing so much and their entire bodies moved. We had to replace large enough portions of them so you wouldn't see our CG animation sliding over their real bodies." "I had reservations about getting into 3-D because I'd never seen it done successfully with living characters," recalls Jon Farhat, the film's vfx supervisor, "We didn't want overanimation. we wanted very subtle, precise movements – like our animals were impeccably trained." VisionArt's Ted Fay had come up with an approach that included developing a process to turn 3D wireframe animation into animated 2D Elastic Reality shapes, so that the 3D mouth area could be seamlessly blended into the animals live-action face, while also allowing for additional animation and enhancement of the animal's eyebrow expressions. One of VisionArt's most challenging creations was a Spanish-speaking orangutan. Rose recalls, "Jon Farhat tended to find out what Betty and the producers were most excited about at the time, and then just embellish it. They were loving the orangutan, so Jon came in and grilled us really hard on that. Betty really wanted to see the sensitivity and the specularity and the rolloff of the light on those big, wet lips. The orangutan's whole muzzle area and the meaty part of his mouth were all 3-D. Stirling Duguid, our 3-D animation supervisor, built in all of these really insane little details — the crevices and wrinkles in the skin — and then added really big, sweeping meaty lips and a big tongue. He got a lot of articulation in there. There was a desire to give the orangutan a stoned, Cheech and Chong-style appearance, so Ted Fay, our 2-D supervisor, created that heavy-lidded look by warping his expressive eyes using Avid's Elastic Reality. In the end, it came out looking great." Other artists involved were Jon-Marc Kortsch, Chad Carlberg, Todd Boyce, Bethany Berndt-Shackelford, Kristen Branan, Mike Bray, Richard Cook, Shellaine Corwel, Robert D. Crotty, John Campuzano, Archie Donato, Christina Drahos, Chris Greenberg, Dorene Haver, Hillary Hoggard (Covey), Jimmy Jewell, Anne Putnam Kolbe, Daniel Kramer, John Lafauce, Toan-Vinh Le, Jim 'Big Dog' McLean, Daniel Naulin, Jeremy Nelligan, John Peel, Joshua D. Rose, Barry Safley, and Jeremy Squires.
"Transparent" visual effects
In addition to being known for science fiction work like Independence Day, Star Trek, and Godzilla, VisionArt specialized in "transparent" effects: removing, replacing, or modifying a wide range of objects in a scene to help tell the story, fix a mistake, or recreate worlds that no longer exist or never did.
Closure
VisionArt closed their doors in 2000, selling most of their assets to Digital Art Media. Many of the key staff are now at Sony Pictures Imageworks, Industrial Light & Magic, Digital Domain, and other VFX facilities.
VisionArt selected filmography
Star Trek: Deep Space Nine (1993)
Star Trek: The Next Generation (1993)
Lois & Clark: The New Adventures of Superman (1993)
Northern Exposure (1993)
Galaxy Beat (1994)
Attack of the 5 Ft. 2 In. Women (1994)
M.A.N.T.I.S. (1994)
The Paper (1994)
Goldilocks and the Three Bears (1995)
Star Trek: Voyager (1995)
Virtuosity (1995)
Executive Decision (1995)
Independence Day (1996)
Alaska (1996)
Jingle All the Way (1996)
Star Trek: First Contact (1996)
Jingle All the Way (1996)
Daylight (1996)
Men in Black (1997)
McHale's Navy (1997)
Stargate SG-1 (1997)
Godzilla (1998)
Doctor Dolittle (1998)
Virus (1999)
The General's Daughter (1999)
Mystery Men (1999)
Baby Geniuses (1999)
Deep Blue Sea (1999)
The Omega Code (1999)
House on Haunted Hill (1999)
Anna and the King (1999)
Nutty Professor II: The Klumps (2000)
Little Nicky (2000)
References
Visual effects companies
American animation studios |
6292563 | https://en.wikipedia.org/wiki/Marine%20Air%20Control%20Group%2048 | Marine Air Control Group 48 | Marine Air Control Group 48 (MACG-48) is a United States Marine Corps aviation command and control unit based at Naval Station Great Lakes that is currently composed of 4 squadrons that provide the 4th Marine Aircraft Wing and Marine Forces Reserve with a tactical headquarters, positive and procedural control of aircraft, air defense and aviation command and control.
Mission
Coordinate all aspects of air command and control and air defense within the Marine aircraft wing. Provide the command and staff functions for the MACG commander when deployed as part of the aviation combat element (ACE) of the Marine Air Ground Task Force.
Subordinate units
Marine Air Control Squadron 24
Marine Air Support Squadron 6
Marine Tactical Air Command Squadron 48
Marine Wing Communications Squadron 48
History
Marine Air Control Group 48 was activated on September 1, 1967, at Glenview, Illinois, and assigned to 4th Marine Aircraft Wing. From the late 1960s through the 1970s and 1980s, MACG-48 participated in many training exercises, honing its combat skills and refining its tactics, techniques and procedures in order to keep abreast of the ever-changing C3 community. In April 1980, members of MWCS-48 were on call for 'Operation EagleClaw' in Iran. The mission was aborted.
From August 1990 to April 1991, MACG-48 marines deployed in support of Operation Desert Shield and Operation Desert Storm augmenting the active duty component. Upon the unit's return to Illinois, the control group continued its support of numerous exercises across the globe. The group focused its training on the tactics, techniques and procedures critical for success in the Southwest Asia region, using lessons learned during combat.
In August 1995, MACG-48 relocated to Fort Sheridan in Highwood, Illinois. After five years in Highwood, the group headquarters moved again to its current location aboard Naval Station Great Lakes near Chicago, Illinois.
While at Great Lakes, MACG-48 mobilized marines twice in support of Operation Enduring Freedom and Operation Iraqi Freedom. From August 2002 to November 2003 and again from August 2004 to February 2005, over 1400 marines from MACG-48 were activated in support of the Global War on Terror. During December 2004, marines activated to augment units in support of Combined Joint Task Force – Horn of Africa in Djibouti.
In August 2005, Hurricane Katrina ravaged the Gulf Coast of the United States. Once again, marines from MACG-48 were called upon to provide command and control expertise and long-haul communication support in support of disaster relief efforts. From September to October 2005, one hundred marines augmented Joint Task Force Katrina in New Orleans, Louisiana.
See also
List of United States Marine Corps aircraft groups
List of United States Marine Corps aircraft squadrons
References
External links
MACG-48's official website
Military units and formations in Illinois
4th Marine Aircraft Wing
United States Marine Corps air control groups |
36253055 | https://en.wikipedia.org/wiki/Brackets%20%28text%20editor%29 | Brackets (text editor) | Brackets is a source code editor with a primary focus on web development. Created by Adobe Inc., it is free and open-source software licensed under the MIT License, and is currently maintained on GitHub by open-source developers. It is written in JavaScript, HTML and CSS. Brackets is cross-platform, available for macOS, Windows, and most Linux distributions. The main purpose of Brackets is its live HTML, CSS and JavaScript editing functionality.
On November 4, 2014, Adobe announced the first (1.0) release of Brackets. The update introduced new features such as custom shortcut key combinations and more accurate JavaScript hinting. Brackets has a major focus on development in JavaScript-enabled, CSS and HTML. With release of version 1.0, Adobe announced a feature that extracts design information from a PSD file for convenience of coding in CSS. As of June 28, 2016, the feature is officially discontinued, due to low usage. However, Extract is still available via Photoshop and Dreamweaver, both of which are part of their paid service, Adobe Creative Cloud. In March 2021, Adobe announced it would end their support for Brackets on September 1, 2021.
The Brackets editor project is now 100% community-owned and driven. The latest version release of Brackets is 2.0.1.
History
Adobe first started development of a text editor for web development on Edge Code, which was discontinued as of November 2014. This effort was later transformed into Adobe Brackets. With the release of Brackets 1.0, Adobe announced that the development of an open source application for web development was ready and was not an experimental project any more. Brackets contains contributions by more than 282 community contributors and has more than 400 requests for bug fixes and new features. Every version of Brackets had more than 100,000 downloads, and it was the 16th most popular project on GitHub as of January 16, 2015.
The Brackets repository on GitHub (Bracket repository) currently has 152 branches, 110 releases and 17,700 commits as of 30 Aug 2018. The source code is freely available under the MIT license. A developer can alter features on Brackets and personalize it for one's own convenience by forking the software code.
Features
Brackets provides several features including:
Quick Edit
Quick Docs
Live Preview
JSLint
LESS support
Open source
Extensibility
Quick edit
Quick edit enables inline editing of CSS, Color Property, and JavaScript elements for developers. This built-in feature can be applied to multiple functions or properties simultaneously and all updates are applied directly to the file associated with the changed elements.
Live preview
When one clicks the respective code snippet in CSS/HTML the web browser immediately shows the output relating to that code snippet in web browser. This feature is termed as Live Preview, this feature also pushes code edits instantly to the browser to present an updated webpage as the developers modify the code. Brackets contains a Node.js backend that predicts what the code does as the developer types the code.
Two scenarios to live preview
Functionality
HTML & CSS real time updates (without reloading)
Element Highlighting: Elements selected in HTML and CSS files are highlighted within the browser.
Live preview limitations
Currently only works with desktop Google Chrome (not open-source Chromium), as the target browser.
Opening developer tools in Google Chrome will close all live development connections.
All files to be viewed must be inside a currently open folder in Brackets.
Only one HTML file can be previewed at a time.
Real time updates are paused when syntactically invalid HTML is encountered. Brackets will resume pushing changes to the browser when the syntax is corrected.
Split view
This feature splits the main view into two parts. Users can split the view either vertically or horizontally according to their own convenience, thus allowing users to work on two files at same time. A developer can simultaneously work on two different files of two different types, two files of the same type, or even two different parts of the same file at the same time. Features such as Live Preview and Quick Edit work in both views.
Multiple file format support
Brackets supports codes from multiple file types from C++, C, VBScript to Java, JavaScript, HTML, Python, Perl and Ruby. The complete list comprises more than 38 file types. This gives the user flexibility to work on various files of a project simultaneously.
Brackets supports a feature called "PSD lens" that helps to smoothly extract each of pictures, logos and design styles from PSD file without opening Photoshop to check for them. By calling this feature a preview Adobe conveys that there is much work ahead before this feature can be perfected. This feature brought in positive reviews from developers, but many issues were reported during the initial stages of the feature release. The problem was later solved using an extension.
Theseus integration
Brackets integrates Theseus, an open-source JavaScript debugger that enables developers to set break points, step through code, and inspect the value of variables in real time. Theseus can be used to debug any extension in Brackets and is easily installed using the built-in extension manager. Theseus also works in conjunction with Live Preview through a proxy server that records a function and its associated values every time the function is called.
Extensions
Being built with HTML, CSS, and JavaScript, developers can provide additional functionality to Brackets by creating extensions. These extensions can be found and installed using the built-in extension manager. Extensions can also be found online via Brackets Extension Registry.
See also
Chromium Embedded Framework (CEF)
List of text editors
Comparison of HTML editors
Atom
References
External links
2014 software
Adobe software
Automated WYSIWYG editors
Cross-platform free software
Free HTML editors
Free text editors
MacOS text editors
Portable software
Software using the MIT license
Web development software
Text editors |
46734304 | https://en.wikipedia.org/wiki/Telstra%20Business%20Awards | Telstra Business Awards | The Telstra Business Awards is an Australian awards programme started in 1992. The Telstra Business Awards is an independent Awards programme designed to recognise and promote excellence, best practice and innovation in the business community.
The Telstra Business Awards Winners
2005
National Awardees
Telstra Australian Business of the Year – Whitech Software Solutions (NSW)
Telstra Australian Medium Business Award – Whitech Software Solutions (NSW)
Telstra Australian Small Business Award – Ripe Maternity Wear (VIC)
Telstra Australian Micro-Business Award – Research One Pty. Ltd. (ACT)
Telstra Australian Regional Business Award – Trailers 2000 Pty. Ltd. (QLD)
Telstra Australian Innovation Award – SRK Consulting (WA)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Research One Pty. Ltd.
New South Wales Business of the Year – Whitech Software Solutions
Queensland Business of the Year – Daintree Discovery Centre
Western Australian Business of the Year – Agmaster
South Australian Business of the Year – Tonkin Consulting
Victorian Business of the Year – Production Parts Pty. Ltd.
Northern Territory Business of the Year – Air & Gas Systems Pty. Ltd.
Tasmanian Business of the Year – Impact Solutions International Pty. Ltd.
Small Business Award – State Winners
Australian Capital Territory Small Business Award – THE hairdressing
New South Wales Small Business Award – Provecta Process Automation Pty. Ltd.
Queensland Small Business Award – Daintree Discovery Centre
Western Australian Small Business Award – Agmaster
South Australian Small Business Award – Site Academy
Victorian Small Business Award – Ripe Maternity Wear
Northern Territory Small Business – Award Air & Gas Systems Pty. Ltd.
Tasmanian Small Business Award – Keith Ives Logistics Pty. Ltd.
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Achieve, Corp
New South Wales Medium Business Award – Whitech Software Solutions
Queensland Medium Business Award – Trailers 2000 Pty. Ltd.
Western Australian Medium Business Award – Commtech Wireless Pty. Ltd.
South Australian Medium Business Award – REDARC Electronics Pty. Ltd.
Victorian Medium Business Award – N/A
Northern Territory Medium Business Award – Northpharm Pty. Ltd.
Tasmanian Medium Business Award – Aus-Tech Composites Pty. Ltd.
Micro-Business Award – State Winners
Australian Capital Territory Medium Business Award – Research One Pty. Ltd.
New South Wales Micro-Business Award – The Pharmaceutical Locum Company P/L
Queensland Micro-Business Award – Freeman Productions (Australia) Pty. Ltd.
Western Australian Micro-Business Award – Flying Flowers
South Australian Micro-Business Award – Nicknack Creative Pty Ltd
Victorian Micro-Business Award – Sync International Pty. Ltd.
Northern Territory Micro-Business Award – BHE Pty Ltd T/As Basil Hall Editions
Tasmanian Micro-Business Award – Impact Solutions International Pty. Ltd.
Innovation Award – State Winners
Australian Capital Territory Innovation Award – ZOO
New South Wales Innovation Award – InfoComp Pty Ltd
Queensland Innovation Award – GroundProbe Pty. Ltd.
Western Australian Innovation Award – SRK Consulting
South Australian Innovation Award – Tonkin Consulting
Victorian Innovation Award – Country Life Bakery
Northern Territory Innovation Award – Colemans Printing
Tasmanian Innovation Award – N/A
2006
The Westpac Business Owner of the Year and Hudson Business Award National were presented in 2006 for the first and last times in the Telstra Business Awards to date.
National Awardees
Telstra Australian Business of the Year – Safetech Pty. Ltd. (VIC)
Telstra Australian Medium Business Award – NA (not awarded)
Telstra Australian Small Business Award – NA (not awarded)
Telstra Australian Micro-Business Award – Rent-a-home.com.au (NSW)
Telstra Australian Regional Business Award – Perry Trade Services (SA)
Telstra Australian Innovation Award – Microskin International Pty. Ltd. (QLD)
Telstra Australian Private and Corporate Sector Award – Imagination Entertainment (SA)
Westpac Business Owner of the Year – Stepping Stones Children's Services (NSW)
Hudson Business Award National – Lifestyle Villages (WA)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – CRE8IVE
New South Wales Business of the Year – the white agency
Queensland Business of the Year – Wesley Corporate Health
Western Australian Business of the Year – National Lifestyle Villages
South Australian Business of the Year – CQR Consulting
Victorian Business of the Year – Safetech Pty. Ltd.
Northern Territory Business of the Year – Avant Pty. Ltd.
Tasmanian Business of the Year – Stepping Stones Children's Services
Small Business Award – State Winners
Australian Capital Territory Small Business Award – CRE8IVE
New South Wales Small Business Award – The Purist Company Pty. Ltd. / the white agency
Queensland Small Business Award – Medimobile Pty Ltd / Wesley Corporate Health
Western Australian Small Business Award – Simulus
South Australian Small Business Award – CQR Consulting
Victorian Small Business Award – Clyne Foods
Northern Territory Small Business Award – Avant Pty. Ltd.
Tasmanian Small Business Award – Winemaking Tasmania Pty Ltd
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Brindabella Airlines
New South Wales Medium Business Award – N/A
Queensland Medium Business Award – N/A
Western Australian Medium Business Award – Bell Fire Equipment Company Pty. Ltd.
South Australian Medium Business Award – Perry Trade Services
Victorian Medium Business Award – AWMA Pty. Ltd.
Northern Territory Medium Business Award – N/A
Tasmanian Medium Business Award – N/A
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Power Initiatives
New South Wales Micro-Business Award – Rent-A-Home.com.au
Queensland Micro-Business Award – Entitled Clothing Company
Western Australian Micro-Business Award – MatchPoint Consulting
South Australian Micro-Business Award – Getaways Reservation Service
Victorian Micro-Business Award – The Coaching Institute
Northern Territory Micro-Business Award – Boyanton Advertising
Tasmanian Micro-Business Award – Grindelwald Kennels & Cattery
Innovation Award – State Winners
Australian Capital Territory Innovation Award – Brindabella Airlines
New South Wales Innovation Award – North Coast Breast Centre Pty. Ltd.
Queensland Innovation Award – Microskin International Pty. Ltd.
Western Australian Innovation Award – Simulus
South Australian Innovation Award – Imagination Entertainment
Victorian Innovation Award – Safetech Pty. Ltd.
Northern Territory Innovation Award – N/A
Tasmanian Innovation Award – Tamar River Cruises
Private and Corporate Sector Award – State Winners
New South Wales Private and Corporate Sector Award – SmartSalary Pty. Ltd.
South Australian Private and Corporate Sector Award – Imagination Entertainment
Tasmanian Private and Corporate Sector Award – Matthews Constructions Pty. Ltd.
2007
The Telstra Australian Private and Corporate Sector Award was presented in 2007 for the first and last time in the Telstra Business Awards to date.
National Awardees
Telstra Australian Business of the Year – Brookfarm (NSW) / SRA Information Technology Pty Ltd (NT)
Telstra Australian Medium Business Award – AVKO Mining (WA) / Platinum Electrical Contractors (NSW)
Telstra Australian Small Business Award – SRA Information Technology Pty. Ltd. (NT)
Telstra Australian Micro-Business Award – propertybuyer (NSW)
Telstra Australian Regional Business Award – AVKO Mining (WA)
Telstra Australian Innovation Award – SRA Information Technology Pty. Ltd. (NT)
Telstra Australian Private and Corporate Sector Award – Danley Construction Products Pty. Ltd. (QLD)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Vogue Pergolas Pty Ltd
New South Wales Business of the Year – Brookfarm
Queensland Business of the Year – vending solutions
Western Australian Business of the Year – AVKO Mining Pty. Ltd.
South Australian Business of the Year – Adelaide Clutch Services
Victorian Business of the Year – WBP Property Group
Northern Territory Business of the Year – SRA Information Technology Pty. Ltd.
Tasmanian Business of the Year – Irrigation Tasmania Pty. Ltd.
Small Business Award – State Winners
Australian Capital Territory Small Business Award – stratsec
New South Wales Small Business Award – Brookfarm / Unistraw International Limited
Queensland Small Business Award – Advanced Metal Turning Pty. Ltd.
Western Australian Small Business Award – Market Creations Pty. Ltd.
South Australian Small Business Award – Adelaide Clutch Services
Victorian Small Business Award – Gorman Industries Pty Ltd / No Fuss Events Pty Ltd
Northern Territory Small Business Award – Northern Stainless Pty. Ltd. / SRA Information Technology Pty. Ltd.
Tasmanian Small Business Award – Blue Skies Dining
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Instyle Indoor Plant Hire
New South Wales Medium Business Award – Platinum Electrical Contractors
Queensland Medium Business Award – N/A
Western Australian Medium Business Award – Australian Pressure Testing Services / AVKO Mining Pty. Ltd.
South Australian Medium Business Award – Bradford College Pty. Ltd.
Victorian Medium Business Award – WBP Property Group
Northern Territory Medium Business Award – N TESS Fire Consultants
Tasmanian Medium Business Award – N/A
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Vogue Pergolas Pty. Ltd.
New South Wales Micro-Business Award – propertybuyer
Queensland Micro-Business Award – J2 ideas & events
Western Australian Micro-Business Award – Ebiz Solutions
South Australian Micro-Business Award – Eye-Catcher Innovations
Victorian Micro-Business Award – Ripple Products Pty. Ltd.
Northern Territory Micro-Business Award – Alice Springs Physiotherapy & Sports Injury Clinic
Tasmanian Micro-Business Award – Creative One Studio / Irrigation Tasmania Pty. Ltd.
Innovation Award – State Winners
Australian Capital Territory Innovation Award – Instyle Indoor Plant Hire
New South Wales Innovation Award – Unistraw International Limited
Queensland Innovation Award – Building Solutions Pty. Ltd.
Western Australian Innovation Award – Imaging the South
South Australian Innovation Award – Eye-Catcher Innovations
Victorian Innovation Award – Inzenius
Northern Territory Innovation Award – SRA Information Technology Pty. Ltd.
Tasmanian Innovation Award – Autech Software & Design
Private and Corporate Sector Award – State Winners
Australian Capital Territory Private and Corporate Sector Award – Aspen Medical
New South Wales Private and Corporate Sector Award – ScenicWorld Blue Mountains
Queensland Private and Corporate Sector Award – Danley Construction Products Pty. Ltd. / vending solutions
South Australian Private and Corporate Sector Award – Toop & Toop Real Estate
2008
The Telstra Social Responsibility Award was inaugurated in 2008.
National Awardees
Telstra Australian Business of the Year – Machinery Automation & Robotics (NSW)
Telstra Australian Medium Business Award – Atlantic Group (v) (VIC) / Centor Architectural (QLD)
Telstra Australian Small Business Award – Bruny Island Charters and Tasman Island Cruises (TAS)
Telstra Australian Micro-Business Award – Find a babysitter.com.au (VIC)
Telstra Australian Regional Business Award – Clearmake (QLD)
Telstra Australian Social Responsibility Award – Bruny Island Charters and Tasman Island Cruises (TAS)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – eWAY
New South Wales Business of the Year – Machinery Automation & Robotics
Queensland Business of the Year – Centor Architectural
Western Australian Business of the Year – TraxOn Industries Pty. Ltd.
South Australian Business of the Year – Coopers Brewery
Victorian Business of the Year – Wild Action Productions
Northern Territory Business of the Year – N/A
Tasmanian Business of the Year – Bruny Island Charters and Tasman Island Cruises
Small Business Award – State Winners
Australian Capital Territory Small Business Award – eWAY
New South Wales Small Business Award – GoGet CarShare
Queensland Small Business Award – Clearmake
Western Australian Small Business Award – TraxOn Industries Pty. Ltd.
South Australian Small Business Award – Port Adelaide Brewing Company Pty. Ltd. t/a Port Dock Brewery Hotel
Victorian Small Business Award – Wild Action Productions
Northern Territory Small Business Award – NT Technology Pty. Ltd.
Tasmanian Small Business Award – Bruny Island Charters and Tasman Island Cruises
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Stratsec
New South Wales Medium Business Award – NA (not awarded)
Queensland Medium Business Award – Centor Architectural
Western Australian Medium Business Award – Carr Civil Contracting Pty. Ltd.
South Australian Medium Business Award – Coopers Brewery
Victorian Medium Business Award – Atlantic Group (v)
Northern Territory Medium Business Award – Security & Technology Services (NT) Pty. Ltd.
Tasmanian Medium Business Award – Penguin Composites
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Hamperesque
New South Wales Micro-Business Award – LaRoo
Queensland Micro-Business Award – momentum
Western Australian Micro-Business Award – Elliott's Small Engines
South Australian Micro-Business Award – Stress Free Marine Pty. Ltd.
Victorian Micro-Business Award – Find a Babysitter.com.au
Northern Territory Micro-Business Award – Advanced Body Image
Tasmanian Micro-Business Award – The Maria Island Walk
Innovation Award – State Winners
Australian Capital Territory Innovation Award – Codarra Advanced Systems
New South Wales Innovation Award – Machinery Automation & Robotics
Queensland Innovation Award – Centor Architectural
Western Australian Innovation Award – Smart Burn Pty. Ltd.
South Australian Innovation Award – EVRsafe Marine Technologies
Victorian Innovation Award – Roma Food Products
Northern Territory Innovation Award – N/A
Tasmanian Innovation Award – N/A
Social Responsibility Award – State Winners
Australian Capital Territory Social Responsibility Award – All Things Chocolate
New South Wales Social Responsibility Award – Bholu Pty. Ltd.
Queensland Social Responsibility Award – Thomson Adsett Architects
Western Australian Social Responsibility Award – South West Audiology and Hearing Services
South Australian Social Responsibility Award – Marion Physiotherapy
Victorian Social Responsibility Award – Etiko Fair Trade
Northern Territory Social Responsibility Award – Jape Furnishing Superstore
Tasmanian Social Responsibility Award – Bruny Island Charters and Tasman Island Cruises
2009
National Awardees
Telstra Australian Business of the Year – The COACH Program (VIC)
Telstra Australian Medium Business Award – Point Project Management (ACT)
Telstra Australian Small Business Award – Edible Blooms (SA)
Telstra Australian Micro-Business Award – The COACH Program (VIC)
Telstra Australian Regional Business Award – N/A
Telstra Australian Innovation Award – Vaxine Pty. Ltd. (SA)
Telstra Australian Social Responsibility Award – R Radford and Son Pty. Ltd.
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Point Project Management
New South Wales Business of the Year – Publisher Textiles
Queensland Business of the Year – Tourstogo.com
Western Australian Business of the Year – Yahava KoffeeWorks
South Australian Business of the Year – Edible Blooms
Victorian Business of the Year – The COACH Program
Northern Territory Business of the Year – Gove Pharmacy
Tasmanian Business of the Year – Muir Engineering Pty. Ltd.
Small Business Award – State Winners
Australian Capital Territory Small Business Award – PSI Asia Pacific
New South Wales Small Business Award – Unimail Pty. Ltd.
Queensland Small Business Award – Aspire Retire Financial Services
Western Australian Small Business Award – Yahava KoffeeWorks
South Australian Small Business Award – Edible Blooms
Victorian Small Business Award – LIVE IN australia.com
Northern Territory Small Business Award – Gove Pharmacy
Tasmanian Small Business Award – The Maria Island Walk
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Point Project Management
New South Wales Medium Business Award – Kimberley Kampers Pty. Ltd.
Queensland Medium Business Award – Trilby Misso Lawyers Limited
Western Australian Medium Business Award – Lavan Legal
South Australian Medium Business Award – Solar Shop Australia
Victorian Medium Business Award – Revolution IT
Northern Territory Medium Business Award – N/A
Tasmanian Medium Business Award – Muir Engineering Pty. Ltd.
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Succeed Personal Development
New South Wales Micro-Business Award – Publisher Textiles
Queensland Micro-Business Award – Tourstogo.com
Western Australian Micro-Business Award – Loose Goose Chalets
South Australian Micro-Business Award – The Trademan
Victorian Micro-Business Award – The COACH Program
Northern Territory Micro-Business Award – N/A
Tasmanian Micro-Business Award – Brighton Hardware
Innovation Award – State Winners
Australian Capital Territory Innovation Award – N/A
New South Wales Innovation Award – Kimberley Kampers Pty. Ltd.
Queensland Innovation Award – Australian Innovative Systems Pty. Ltd.
Western Australian Innovation Award – Sea To Summit
South Australian Innovation Award – Vaxine Pty. Ltd.
Victorian Innovation Award – The COACH Program
Northern Territory Innovation Award – Crowne Plaza Alice Springs
Tasmanian Innovation Award – HealthCare Software Pty. Ltd.
Social Responsibility Award – State Winners
Australian Capital Territory Social Responsibility Award – Point Project Management
New South Wales Social Responsibility Award – Financial Management Solution
Queensland Social Responsibility Award – Natural Resource Assessments Pty. Ltd. (Trading as NRA Environmental Consultants)
Western Australian Social Responsibility Award – Addwealth Pty. Ltd.
South Australian Social Responsibility Award – Clarke and Associates Veterinary Practice
Victorian Social Responsibility Award – R Radford & Son Pty. Ltd.
Northern Territory Social Responsibility Award – N/A
Tasmanian Social Responsibility Award – braaap Pty. ltd.
2010
National Awardees
Telstra Australian Business of the Year – stratsec (ACT)
Telstra Australian Medium Business Award – stratsec (ACT)
Telstra Australian Small Business Award – City Ceramics (NT)
Telstra Australian Micro-Business Award – teachers.on.net (SA)
Telstra Australian Regional Business Award – Kelly Engineering (SA)
Telstra Australian Innovation Award – Soprano Design (NSW)
Telstra Social Responsibility Award – Northern Project Contracting (QLD)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – stratsec
New South Wales Business of the Year – Intact Group Pty. Ltd.
Queensland Business of the Year – Abacus ALS
Western Australian Business of the Year – KAPP Engineering
South Australian Business of the Year – Kelly Engineering
Victorian Business of the Year – Melbourne Medical Deputising Service
Northern Territory Business of the Year – City Ceramics
Tasmanian Business of the Year – Maintenance Systems Solutions
Small Business Award – State Winners
Australian Capital Territory Small Business Award – Today's Homes & Lifestyle Pty. Ltd.
New South Wales Small Business Award – Intact Group Pty. Ltd.
Queensland Small Business Award – Aqualogical Pty. Ltd.
Western Australian Small Business Award – Electro Medical Group
South Australian Small Business Award – Kelly Engineering
Victorian Small Business Award – International Medical Recruitment Pty. Ltd.
Northern Territory Small Business Award – City Ceramics
Tasmanian Small Business Award – InSPArations day spa
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – stratsec
New South Wales Medium Business Award – Ezypay Pty. Ltd.
Queensland Medium Business Award – Abacus ALS
Western Australian Medium Business Award – Handley Surveys
South Australian Medium Business Award – N/A
Victorian Medium Business Award – N/A
Northern Territory Medium Business Award – Jape Furnishing Superstore
Tasmanian Medium Business Award – Maintenance Systems Solutions
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Makin Trax Australia
New South Wales Micro-Business Award – Sydney Writers' Centre
Queensland Micro-Business Award – Calamvale Veterinary Clinic
Western Australian Micro-Business Award – KAPP Engineering
South Australian Micro-Business Award – teachers.on.net
Victorian Micro-Business Award – ATS Australian Educational Group Pty. Ltd.
Northern Territory Micro-Business Award – Penny's Fancy Dress
Tasmanian Micro-Business Award – Catnip Cattery
Innovation Award – State Winners
Australian Capital Territory Innovation Award – Viridis E3
New South Wales Innovation Award – Soprano Design
Queensland Innovation Award – Signmanager Pty Ltd
Western Australian Innovation Award – Quicklock Partitions
South Australian Innovation Award – Neutrog Australia Pty. Ltd.
Victorian Innovation Award – SIDRA Solutions
Northern Territory Innovation Award – HG Fitness
Tasmanian Innovation Award – Insight4
Social Responsibility Award – State Winners
Australian Capital Territory Social Responsibility Award – Richard Luton Properties
New South Wales Social Responsibility Award – ChewYings Lawn & Horticulture
Queensland Social Responsibility Award – Northern Project Contracting
Western Australian Social Responsibility Award – The Bodhi Tree
South Australian Social Responsibility Award – Neutrog Australia Pty. Ltd.
Victorian Social Responsibility Award – Melbourne Medical Deputising Service
Northern Territory Social Responsibility Award – Greenies Real Food
Tasmanian Social Responsibility Award – Park Homes
2011
This was the last year in which the Telstra Australian Innovation Award was presented at the Telstra Business Awards.
National Awardees
Telstra Australian Business of the Year – Australian Pressure Testing Services (APTS) (WA)
Telstra Australian Medium Business Award – Australian Pressure Testing Services (APTS) (WA) / Janison (NSW)
Telstra Australian Small Business Award – Flash Fotos (QLD)
Telstra Australian Micro-Business Award – Darwin Day Surgery (NT)
Telstra Australian Regional Business Award – N/A
Telstra Australian Innovation Award – Colmax Glass Pty. Ltd. (NSW)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Luton Properties
New South Wales Business of the Year –
Queensland Business of the Year – Stream Group Aust Pty. Ltd.
Western Australian Business of the Year – Australian Pressure Testing Services (APTS)
South Australian Business of the Year – Beerenberg Farm
Victorian Business of the Year – easyweddings.com.au
Northern Territory Business of the Year – Abode New Homes Pty. Ltd.
Tasmanian Business of the Year – Plants Management Australia Pty. Ltd.
Small Business Award – State Winners
Australian Capital Territory Small Business Award – Interaction Consulting Group
New South Wales Small Business Award – Ecoline Pty. Ltd.
Queensland Small Business Award – Flash Fotos
Western Australian Small Business Award – Gnarabar
South Australian Small Business Award – Health and Life
Victorian Small Business Award – easyweddings.com.au
Northern Territory Small Business Award – Abode New Homes Pty. Ltd.
Tasmanian Small Business Award – Tas Petroleum
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Luton Properties
New South Wales Medium Business Award – Janison
Queensland Medium Business Award – Stream Group Aust Pty. Ltd.
Western Australian Medium Business Award – Australian Pressure Testing Services (APTS)
South Australian Medium Business Award – Beerenberg Farm
Victorian Medium Business Award – PRESHAFOOD LTD
Northern Territory Medium Business Award – Area9 IT Solutions
Tasmanian Medium Business Award – N/A
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Learning Options
New South Wales Micro-Business Award – Motivate You Fitness & Personal Training
Queensland Micro-Business Award – JADE Corporate & Community Development
Western Australian Micro-Business Award – Veritas Engineering Pty. Ltd.
South Australian Micro-Business Award – Brazcom Imports
Victorian Micro-Business Award – The Wall Sticker Company
Northern Territory Micro-Business Award – Darwin Day Surgery
Tasmanian Micro-Business Award – N/A
Innovation Award – State Winners
Australian Capital Territory Innovation Award – Lucy Media
New South Wales Innovation Award – Colmax Glass Pty. Ltd.
Queensland Innovation Award – Zehnder Gluten Free
Western Australian Innovation Award – RePipe Pty. Ltd.
South Australian Innovation Award – SCF Group
Victorian Innovation Award – BikeExchange.com.au
Northern Territory Innovation Award – Darwin Day Surgery
Tasmanian Innovation Award – Plants Management Australia Pty. Ltd.
Social Responsibility Award – State Winners
Australian Capital Territory Social Responsibility Award – PCA People Pty. Ltd.
New South Wales Social Responsibility Award – N/A
Queensland Social Responsibility Award – Samies Girl Seafoods
Western Australian Social Responsibility Award – RePipe Pty. Ltd.
South Australian Social Responsibility Award – N/A
Victorian Social Responsibility Award – m.a.d.woman - making a difference
Northern Territory Social Responsibility Award – Area9 IT Solutions
Tasmanian Social Responsibility Award – N/A
Regional Business Award – State Winners
Australian Capital Territory Regional Business Award – N/A
New South Wales Regional Business Award – N/A
Queensland Regional Business Award – Flash Fotos
Western Australian Regional Business Award – Gnarabar
South Australian Regional Business Award – Cowell Electric Supply Pty. Ltd.
Victorian Regional Business Award – Blackmore Holdings Pty. Ltd.
Northern Territory Regional Business Award – Eldorado Motor Inn Golden Chain
Tasmanian Regional Business Award – M & J Baker Farms Pty. Ltd.
2012
The Telstra Australian Start Up Award was inaugurated in 2012.
National Awardees
Telstra Australian Business of the Year – BikeExchange.com.au (VIC)
Telstra Australian Medium Business Award – UON Pty. Ltd. (WA)
Telstra Australian Small Business Award – BikeExchange.com.au (VIC)
Telstra Australian Micro-Business Award – Shima Wasabi (TAS)
Telstra Australian Regional Business Award – John Nitschke Drilling Pty. Ltd. (SA)
Telstra Australian Start Up Award – Sitemed (SA)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Point Project Management
New South Wales Business of the Year – Laservision Pty. Ltd.
Queensland Business of the Year – Winangali Pty Ltd
Western Australian Business of the Year – N/A
South Australian Business of the Year – John Nitschke Drilling Pty Ltd
Victorian Business of the Year – BikeExchange.com.au
Northern Territory Business of the Year – Security & Technology Services
Tasmanian Business of the Year – TasIVF Pty. Ltd.
Small Business Award – State Winners
Australian Capital Territory Small Business Award – Provincial Plants and Landscapes
New South Wales Small Business Award – Laservision Pty. Ltd.
Queensland Small Business Award – A&L Laurent Pty. Ltd.
Western Australian Small Business Award – Emission Assessments Pty. Ltd.
South Australian Small Business Award – E-Cycle Recovery Pty. Ltd.
Victorian Small Business Award – BikeExchange.com.au
Northern Territory Small Business Award – Saffrron Restaurant
Tasmanian Small Business Award – TasIVF Pty. Ltd.
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Point Project Management
New South Wales Medium Business Award – Red Lantern
Queensland Medium Business Award – Paronella Park
Western Australian Medium Business Award – UON Pty. Ltd.
South Australian Medium Business Award – John Nitschke Drilling Pty. Ltd.
Victorian Medium Business Award – Kiandra IT
Northern Territory Medium Business Award – Security & Technology Services
Tasmanian Medium Business Award – Novaris Pty. Ltd.
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Transformed Pty. Ltd.
New South Wales Micro-Business Award – Stoneset Permeable Paving
Queensland Micro-Business Award – Winangali Pty. Ltd.
Western Australian Micro-Business Award – LushTV
South Australian Micro-Business Award – Tour Barossa
Victorian Micro-Business Award – Firestarter Pty. Ltd.
Northern Territory Micro-Business Award – Alice Pool and Spa Centre
Tasmanian Micro-Business Award – Shima Wasabi
Regional Business Award – State Winners
Australian Capital Territory Regional Business Award – N/A
New South Wales Regional Business Award – Hume Building Society
Queensland Regional Business Award – Paronella Park
Western Australian Regional Business Award – Skydive Jurien Bay
South Australian Regional Business Award – John Nitschke Drilling Pty. Ltd.
Victorian Regional Business Award – Mobius Institute Pty. Ltd.
Northern Territory Regional Business Award – Coomalie Air Maintenance Pty. Ltd.
Tasmanian Regional Business Award – Shima Wasabi
Start Up Award – State Winners
Australian Capital Territory Start Up Award – Swish Education
New South Wales Start Up Award – Evolve Orthodontics
Queensland Start Up Award – The Vet Lounge
Western Australian Start Up Award – Mosmans Restaurant
South Australian Start Up Award – Sitemed
Victorian Start Up Award – KeepCup Pty. Ltd.
Northern Territory Start Up Award – The Chiropractic Place
Tasmanian Start Up Award – MacTavish West Pty. Ltd.
2013
National Awardees
Telstra Australian Business of the Year – Bruny Island Cheese Co. (TAS)
Telstra Australia Medium Business Award – Becker Helicopter Services Pty. Ltd. (QLD)
Telstra Australian Small Business Award – Bruny Island Cheese Co. (TAS)
Telstra Australian Micro-Business Award – ENIQUEST (QLD)
Telstra Australian Regional Business Award – iKOU (NSW)
Telstra Australian Start Up Award – health.com.au (VIC)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Rudds Consulting Engineers
New South Wales Business of the Year – Fifth Quadrant
Queensland Business of the Year – Burleigh Brewing Company
Western Australian Business of the Year – ADAMS Group
South Australian Business of the Year – Suntrix Pty. Ltd.
Victorian Business of the Year – braaap
Northern Territory Business of the Year – Top End Pest Control
Tasmanian Business of the Year – Bruny Island Cheese Co.
Small Business Award – State Winners
Australian Capital Territory Small Business Award – Residential Reports
New South Wales Small Business Award – Marketing Mechanics
Queensland Small Business Award – Burleigh Brewing Company
Western Australian Small Business Award – Muway Constructions
South Australian Small Business Award – BRS
Victorian Small Business Award – braaap
Northern Territory Small Business Award – Top End Pest Control
Tasmanian Small Business Award – Bruny Island Cheese Co.
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Rudds Consulting Engineers
New South Wales Medium Business Award – Fifth Quadrant
Queensland Medium Business Award – Becker Helicopter Services Pty. Ltd.
Western Australian Medium Business Award – ADAMS Group
South Australian Medium Business Award – Suntrix Pty. Ltd.
Victorian Medium Business Award – Connective
Northern Territory Medium Business Award – Cairns Industries Pty. Ltd.
Tasmanian Medium Business Award – Collins SBA Complete Wealth Specialist
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Canberra Furnished Accommodation
New South Wales Micro-Business Award – Wicked Berries Pty. Ltd.
Queensland Micro-Business Award – ENIQUEST
Western Australian Micro-Business Award – StepBeyond Business Advisors
South Australian Micro-Business Award – Synotronics Pty. Ltd.
Victorian Micro-Business Award – Great Ocean Road Surf Tours
Northern Territory Micro-Business Award – italklibrary
Tasmanian Micro-Business Award – Jump Tours
Regional Business Award – State Winners
Australian Capital Territory Regional Business Award – N/A
New South Wales Regional Business Award – iKOU
Queensland Regional Business Award – General Trade Industries (GTI)
Western Australian Regional Business Award – Muway Constructions
South Australian Regional Business Award – Richard Gunner's Fine Meats
Victorian Regional Business Award – Boundary Bend Olives
Northern Territory Regional Business Award – Cairns Industries Pty Ltd
Tasmanian Regional Business Award – Bruny Island Cheese Co.
Start Up Award – State Winners
Australian Capital Territory Start Up Award – Shop Handmade Canberra
New South Wales Start Up Award – WiTH Collective
Queensland Start Up Award – Bli Bli House
Western Australian Start Up Award – NPB Security
South Australian Start Up Award – Off-Grid Energy Australia
Victorian Start Up Award – health.com.au
Northern Territory Start Up Award – N/A
Tasmanian Start Up Award – Tasmanian Air Adventures
2014
National Awardees
Telstra Australian Business of the Year – REDARC (SA)
Telstra Australia Medium Business Award – REDARC (SA)
Telstra Australian Small Business Award – Lark Distillery (TAS)
Telstra Australian Micro-Business Award – Urban Escape (VIC)
Telstra Australian Regional Business Award – Stone & Wood Brewing Co. (NSW)
Telstra Australian Start Up Award – Country Wellness Pharmacy (NT)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Intelledox
New South Wales Business of the Year – Elevate Education Pty. Ltd.
Queensland Business of the Year – Carbon Media
Western Australian Business of the Year – Monford Group Pty. Ltd.
South Australian Business of the Year – REDARC
Victorian Business of the Year – Smile Solutions
Northern Territory Business of the Year – ServiceM8
Tasmanian Business of the Year – Lark Distillery
Small Business Award – State Winners
Australian Capital Territory Small Business Award – Today's Homes
New South Wales Small Business Award – Elevate Education Pty. Ltd.
Queensland Small Business Award – Carbon Media
Western Australian Small Business Award – TWD
South Australian Small Business Award – Clare Valley Motel
Victorian Small Business Award – NSR Australia
Northern Territory Small Business Award – Lark Distillery
Tasmanian Small Business Award – UB COOL PTY LTD
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Intelledox
New South Wales Medium Business Award – Booktopia
Queensland Medium Business Award – Trailers 2000 Pty. Ltd.
Western Australian Medium Business Award – Monford Group Pty. Ltd.
South Australian Medium Business Award – REDARC
Victorian Medium Business Award – Smile Solutions
Northern Territory Medium Business Award – Killarney Homes
Tasmanian Medium Business Award – Stornoway
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Solace Creations
New South Wales Micro-Business Award – Bondi Chai
Queensland Micro-Business Award – Glitter and Dance Fabric Specialists
Western Australian Micro-Business Award – Armed For Life
South Australian Micro-Business Award – Virtual Ad Agency
Victorian Micro-Business Award – Urban Escape
Northern Territory Micro-Business Award – ServiceM8
Tasmanian Micro-Business Award – Handbuilt Creative
Regional Business Award – State Winners
Australian Capital Territory Regional Business Award – N/A
New South Wales Regional Business Award – Stone & Wood Brewing Company
Queensland Regional Business Award – Trailers 2000 Pty. Ltd.
Western Australian Regional Business Award – Mandurah Cruises & Gift Shop
South Australian Regional Business Award – Bowhill Engineering
Victorian Regional Business Award – The Enchanted Adventure Garden
Northern Territory Regional Business Award – Power Projects NT
Tasmanian Regional Business Award – Stornoway
Start Up Award – State Winners
Australian Capital Territory Start Up Award – Cogito Group
New South Wales Start Up Award – Paws for Life
Queensland Start Up Award – Cornerstone Recruitment
Western Australian Start Up Award – Rawsome
South Australian Start Up Award – Eire Café
Victorian Start Up Award – Crisp Creative Salad
Northern Territory Start Up Award – Country Wellness Pharmacy
Tasmanian Start Up Award – Your Path to Health
2015
National Awardees
Telstra Australian Business of the Year – Executive Risk Solutions (WA)
Telstra Australia Medium Business Award – Executive Risk Solutions (WA)
Telstra Australian Small Business Award – Cargo Crew (VIC)
Telstra Australian Micro-Business Award – Nexba Beverages (NSW)
Telstra Australian Regional Business Award – Southern Cotton Pty. Ltd. (NSW)
Telstra Australian Start Up Award – First Electrical (VIC)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – Red Robot
New South Wales Business of the Year – Amazonia
Queensland Business of the Year – Beginning Boutique
Western Australian Business of the Year – Executive Risk Solutions
South Australian Business of the Year – HEGS Australia
Victorian Business of the Year – Furst Electrical
Northern Territory Business of the Year – Country Solar NT
Tasmanian Business of the Year – Francesca Collections
Small Business Award – State Winners
Australian Capital Territory Small Business Award – Red Robot
New South Wales Small Business Award – Amazonia
Queensland Small Business Award – Beginning Boutique
Western Australian Small Business Award – injuryConnect
South Australian Small Business Award – Kalleske Wines
Victorian Small Business Award – Cargo Crew
Northern Territory Small Business Award – Northtech Solutions
Tasmanian Small Business Award – Francesca Collections
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Synergy Group
New South Wales Medium Business Award – Ezypay
Queensland Medium Business Award – Tú Projects
Western Australian Medium Business Award – Executive Risk Solutions
South Australian Medium Business Award – Princess Royal Station
Victorian Medium Business Award – Setec
Northern Territory Medium Business Award – Country Solar NT
Tasmanian Medium Business Award – N/A
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – Barmco Mana Partnership
New South Wales Micro-Business Award – Nexba Beverages
Queensland Micro-Business Award – Styling You with Nikki Parkinson
Western Australian Micro-Business Award – Fordham & Roast
South Australian Micro-Business Award – Posture Podiatry
Victorian Micro-Business Award – Elite Executive Services Pty Ltd
Northern Territory Micro-Business Award – Stepping Stones In Life Therapy Service
Tasmanian Micro-Business Award – Shift Property Styling
Regional Business Award – State Winners
Australian Capital Territory Regional Business Award – N/A
New South Wales Regional Business Award – Southern Cotton Pty Ltd
Queensland Regional Business Award – Cape York Camping Punsand Bay
Western Australian Regional Business Award – Great Southern Distilling Company
South Australian Regional Business Award – Princess Royal Station
Victorian Regional Business Award – Skin Smart Australia
Northern Territory Regional Business Award – N/A
Tasmanian Regional Business Award – Bridestowe Estate
Start Up Award – State Winners
Australian Capital Territory Start Up Award – Alliance Leasing
New South Wales Start Up Award – Flow Athletic
Queensland Start Up Award – Ecoriginals
Western Australian Start Up Award – KBSS Engineering
South Australian Start Up Award – HEGS Australia
Victorian Start Up Award – Furst Electrical
Northern Territory Start Up Award – Plumbing NT Pty Ltd
Tasmanian Start Up Award – Montacute Boutique Bunkhouse
2016
The Telstra Australian Regional Business Award was not awarded in 2016, while the Telstra Australian Start Up Award became the 'New Business' Award, and the Telstra Australian Charity Award was inaugurated.
National Awardees
Telstra Australian Business of the Year – Spell and the Gypsy Collective (NSW)
Telstra Australia Medium Business Award – Jewel Fine Foods (NSW)
Telstra Australian Small Business Award – Spell and the Gypsy Collective (NSW)
Telstra Australian Micro-Business Award – iSimulate (ACT)
Telstra Australian New Business Award – Tow.com.au (QLD)
Telstra Australian Charity Award – Snowdome Foundation (VIC)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year –
New South Wales Business of the Year – Spell and The Gypsy Collective
Queensland Business of the Year – QUIK CORP
Western Australian Business of the Year – PeopleSense
South Australian Business of the Year – Adelaide Green Clean
Victorian Business of the Year – Vinomofo
Northern Territory Business of the Year – HPA "Helping People Achieve"
Tasmanian Business of the Year – Bridestowe Estate
Small Business Award – State Winners
Australian Capital Territory Small Business Award – The Rehabilitation Specialists
New South Wales Small Business Award – Spell and The Gypsy Collective
Queensland Small Business Award – In Safe Hands Educators In Safety
Western Australian Small Business Award – PeopleSense
South Australian Small Business Award – Positive Lending Solutions
Victorian Small Business Award – b.box for kids
Northern Territory Small Business Award – Top End Medical Centre
Tasmanian Small Business Award – Bridestowe Estate
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – Capital Airport Group
New South Wales Medium Business Award – Jewel Fine Foods
Queensland Medium Business Award – QUIK CORP
Western Australian Medium Business Award – ADAMS
South Australian Medium Business Award – Barossa Fine Foods
Victorian Medium Business Award – Vinomofo
Northern Territory Medium Business Award –
Tasmanian Medium Business Award –
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – iSimulate
New South Wales Micro-Business Award – Rufus & Coco Pty Ltd
Queensland Micro-Business Award – Lingua Franca
Western Australian Micro-Business Award – Health Safety Works
South Australian Micro-Business Award – Nature's Quest
Victorian Micro-Business Award – Little Innoscents
Northern Territory Micro-Business Award – Champagne Dance Fitness Studio
Tasmanian Micro-Business Award – Mode Electrical
New Business Award – State Winners
Australian Capital Territory New Business Award – Relken Engineering Pty Ltd
New South Wales New Business Award – Sendle
Queensland New Business Award – Tow.com.au
Western Australian New Business Award – Proactiv Payroll
South Australian New Business Award – Adelaide Green Clean
Victorian New Business Award – Artlivemedia
Northern Territory New Business Award – Territory Logistic Solutions Pty Ltd
Tasmanian New Business Award – Cataract on Paterson
Charity Award – State Winners
Australian Capital Territory Charity Award – Ronald McDonald House Canberra
New South Wales Charity Award – Butterfly Foundation
Queensland Charity Award – World Wellness Group
Western Australian Charity Award –
South Australian Charity Award – Barkuma
Victorian Charity Award – Snowdome Foundation
Northern Territory Charity Award – HPA "Helping People Achieve"
Tasmanian Charity Award – Hobart City Mission
2017
National Awardees
Telstra Australian Business of the Year – GenWise Health (SA)
Telstra Australia Medium Business Award – ELK (VIC)
Telstra Australian Small Business Award – Love to Dream (NSW)
Telstra Australian Micro-Business Award – GenWise Health (SA)
Telstra Australian New Business Award – Over the Moo (NSW)
Telstra Australian Charity Award – MS Research Australia (NSW)
Business of the Year Award – State Winners
Australian Capital Territory Business of the Year – ABS Façade
New South Wales Business of the Year – MS Research Australia
Queensland Business of the Year – Family Doctors Plus
Western Australian Business of the Year – Great Southern Distilling Company
South Australian Business of the Year – GenWise Health
Victorian Business of the Year – Hivint
Northern Territory Business of the Year – HiQA Geotechnical
Tasmanian Business of the Year – BIG hART
Small Business Award – State Winners
Australian Capital Territory Small Business Award – Capital Chemist Wanniassa
New South Wales Small Business Award – Love To Dream
Queensland Small Business Award – Agri Labour Australia
Western Australian Small Business Award – Great Southern Distilling Company
South Australian Small Business Award – Kid Sense Child Development
Victorian Small Business Award – TM Insight
Northern Territory Small Business Award – Northern Territory Veterinary Services
Tasmanian Small Business Award – Salamanca Dental
Medium Business Award – State Winners
Australian Capital Territory Medium Business Award – ABS Façade
New South Wales Medium Business Award – Prospa
Queensland Medium Business Award – NIOA
Western Australian Medium Business Award – ENDURACLAD INTERNATIONAL
South Australian Medium Business Award – L.V. DOHNT & CO. Pty Ltd
Victorian Medium Business Award – ELK
Northern Territory Medium Business Award – HiQA Geotechnical
Tasmanian Medium Business Award – N/A
Micro-Business Award – State Winners
Australian Capital Territory Micro-Business Award – N/A
New South Wales Micro-Business Award – gemaker
Queensland Micro-Business Award – Mountain Bikes Direct
Western Australian Micro-Business Award – Hancock Creative
South Australian Micro-Business Award – GenWise Health
Victorian Micro-Business Award – Showkidz Management
Northern Territory Micro-Business Award – Nth Degree Engineering Services
Tasmanian Micro-Business Award – House of Dance Tasmania
New Business Award – State Winners
Australian Capital Territory New Business Award – Dex
New South Wales New Business Award – Over The Moo
Queensland New Business Award – Family Doctors Plus
Western Australian New Business Award – Red Dirt Transport Services
South Australian New Business Award – Myriota
Victorian New Business Award – Hivint
Northern Territory New Business Award – Tutor Me (NT)
Tasmanian New Business Award – Ankalia Textiles
Charity Award – State Winners
Australian Capital Territory Charity Award – N/A
New South Wales Charity Award – MS Research Australia
Queensland Charity Award – Youngcare
Western Australian Charity Award – Shalom House
South Australian Charity Award – N/A
Victorian Charity Award – sleepbus
Northern Territory Charity Award – Riding for the Disabled in the Top End
Tasmanian Charity Award – BIG hART
Telstra Business Women's Awards
2015 Women's Awardees
Captain Mona Shindy – Government and Academia Award and Telstra Business Women of the Year
Jessica May – Start Up Award
Marie Piccone- Australian Entrepreneur Award
Kate Thiele – South Australian Business Woman of the Year & South Australian For Purpose and Social Enterprise Award and Australian for Purpose and Social Enterprise Award
Katarina Carroll – Queensland Government and Academia Award and Australian Government and Academia Award
Kim Tran – Young Business Women Award
Belinda Brosnan – Queensland Start Up Award
Marie Piccone – Queensland Entrepreneur Award
Fiona Jose – Queensland for Purpose and Social Enterprise Award
Dr Catherine Ball – Queensland Corporate and Private Award, Queensland Business Women of Year and Australian Corporate and Private Award
Susie Upton – Queensland Young Business Women's Award
Brigid Beilby – Northern Territory Start Up Award
Mary Linnell – Northern Territory Entrepreneur Award
Deborah Bampton – Northern Territory and Social Enterprise Award
Deborah Hall – Northern Territory Government and Academia Award
Brigid Beilby – Northern Territory Young Business Women's Award
Mary Linnell – Northern Territory Business Woman of the Year
April Armstrong – Western Australian Start-up Award
Phyllis Narula – Western Australian Entrepreneur Award
Angie Paskeviciu – Western Australian For Purpose and Social Enterprise Award
Joanne Abbiss – Western Australian Government and Academia Award
Jessica Barber – Western Australian Corporate and Private Award
Kim Tran – Western Australian Young Business Women's Award
Angie Paskevicius – Western Australian Business Woman of the Year
Kate Thiele – South Australian Business Woman of the Year & South Australian For Purpose and Social Enterprise Award
Sarah Bartholomeusz – South Australian Start-up Award
Marissa Schulze – South Australian Entrepreneur Award
Professor Pascale Quester – South Australian Government and Academia Award
Michaela Webster – South Australian Corporate and Private Award
Ashleigh Stiling – South Australian Young Business Women's Award
References
External links
Telstra
Australian awards
Business and industry awards
1992 establishments in Australia
Awards established in 1992 |
55866557 | https://en.wikipedia.org/wiki/Root%20Cause%20%28Person%20of%20Interest%29 | Root Cause (Person of Interest) | "Root Cause" is the thirteenth episode of the first season of the American television drama series Person of Interest. It is the 13th overall episode of the series and is written by Erik Mountain and directed by Richard J. Lewis. It aired on CBS in the United States and on CTV in Canada on February 2, 2012.
Plot
Reese (Jim Caviezel) and Finch (Michael Emerson) are alerted to Scott Powell (Myk Watford), a dedicated family man and city construction project manager, who was laid off in the face of budget cuts advocated by Congressman Michael Delancey (Victor Slezak). They find out that he has secretly applied for a weapon permit and is sending death threats to Delancey; they conclude that Powell is planning to assassinate the Congressman. However, as Reese tries to intercept Powell, Finch realizes that the evidence against him has been planted, and they are unable to stop the real assassin from killing Delancey.
Powell is arrested by the FBI in the face of overwhelming evidence, forcing Reese to help him escape. With the help of Zoe Morgan (Paige Turco) (last seen in "The Fix"), Finch identifies Peter Matheson (Damian Young), Delancey's business partner and chief of staff, as the man who hired the assassin and a hacker to kill Delancey and frame Powell, thereby covering up Matheson's corruption. Finch acquires a recording of a conversation between Matheson and the hacker, exonerating Powell. After Matheson is found dead, the hacker, identifying herself as "Root", admits to Finch that she had him killed to tie up loose ends. Root acknowledges Finch, by name, as a worthy adversary.
Reception
Viewers
In its original American broadcast, "Root Cause" was seen by an estimated 15.10 million household viewers and gained a 3.3/9 ratings share among adults aged 18–49, according to Nielsen Media Research. This was a 4% increase in viewership from the previous episode, which was watched by 14.40 million viewers with a 3.2/8 in the 18-49 demographics. With these ratings, Person of Interest was the second most watched show on CBS for the night beating The Mentalist and !Rob!, but behind The Big Bang Theory, second on its timeslot and fourth for the night in the 18-49 demographics, behind Grey's Anatomy, The Big Bang Theory, and American Idol.
Critical reviews
"Root Cause" received generally positive reviews from critics. Keysha Couzens of TV Overmind wrote "Last night, Person of Interest was back to being the kind of show that makes it required viewing. In fact, the team behind POI delivered one of the better episodes of the season by telling the story of a family man down on his luck set up to be a patsy in a political assassination."
Luke Gelineau of TV Equals wrote "Person of Interest returned this week with 'Root Cause', another solid episode that was mildly entertaining, but failed to really push the overarching story forward in any real way."
Sean McKenna of TV Fanatic gave the episode a 4.8 star rating out of 5 and wrote "Person of Interest has really found its groove, combining pure fun action with a well-paced and suspenseful plot. It makes for a fantastic ride that has me looking forward to next week to see both Finch and Reese in action, simply saving the world, one POI at a time."
References
External links
"Root Cause" at CBS
"Root Cause" at TV Guide
Person of Interest (TV series) episodes
2012 American television episodes |
18938075 | https://en.wikipedia.org/wiki/Screenshot | Screenshot | A screenshot, also known as screen capture or screen grab, is a digital image that shows the contents of a computer display. A screenshot is created by the operating system or software running on the device powering the display. Additionally, screenshots can be captured by an external camera, using photography to capture contents on the screen.
Screenshot techniques
Digital techniques
The first screenshots were created with the first interactive computers around 1960. Through the 1980s, computer operating systems did not universally have built-in functionality for capturing screenshots. Sometimes text-only screens could be dumped to a text file, but the result would only capture the content of the screen, not the appearance, nor were graphics screens preservable this way. Some systems had a BSAVE command that could be used to capture the area of memory where screen data was stored, but this required access to a BASIC prompt. Systems with composite video output could be connected to a VCR, and entire screencasts preserved this way.
Most screenshots are raster images, but some vector-based GUI environments like Cairo are capable of generating vector screenshots.
Photographic techniques
Screenshot kits were available for standard (film) cameras that included a long antireflective hood to attach between the screen and camera lens, as well as a closeup lens for the camera. Polaroid film was popular for capturing screenshots, because of the instant results and close-focusing capability of Polaroid cameras. In 1988, Polaroid introduced Spectra film with a 9.2 × 7.3 image size more suited to the 4:3 aspect ratio of CRT screens.
Built-in screenshot functionality
Android
Screenshot support was added to Android in version 4.0. In older versions, some devices supported screenshot functionality with one of the following combinations:
Press and hold the
Press and hold
Press and hold and double tap the .
Screenshots can be taken by pressing , and are saved in the "Screenshot" folder in the gallery after a short sound and visual effect.
On certain devices that use modified Android; the button combination and the storage location can vary.
Also, when a keyboard is connected via USB-OTG, pressing the print screen button will take the screenshot.
There is no direct way to take screenshots programmatically in non-system apps. However, on most devices, apps may use the system screenshot functionality without special permissions.
Amazon Kindle
On Amazon Kindle devices, one can take a screenshot by:
Kindle Paperwhite - touch and hold on the top-left and bottom-right corners of the screen (or top-right and bottom-left corners). The screen will flash and the image will be saved in the root folder of Kindle storage.
Kindle or Kindle Touch – Simply press and hold the and then tap anywhere on the screen.
Kindle Keyboard (Kindle 3 and Kindle DX) – Press
Kindle Fire 2 and Kindle Fire HD (with volume button) – Press and hold the at the same time. Open the Photos app to access the screenshot(s).
Kindle Fire (no volume buttons) – One needs to connect their Kindle Fire to a computer with the Kindle SDK installed and take a screenshot through the development environment.
Chrome OS
On Chromebook and related devices with the Chrome OS keyboard layout, pressing the equivalent of on a standard keyboard will capture the entire screen, and the equivalent of will turn the mouse into a rectangle select tool for capturing a custom portion of the screen.
HP WebOS
Screenshots of the HP webOS can be taken. For webOS phones, simultaneously press . For the HP Touchpad, press . In either case, screenshots will be saved to the "Screen captures" folder in the "Photos" app.
Linux
On KDE or GNOME, key behavior is quite similar to Windows. (See § Microsoft Windows.) In addition, the following screenshooting utilities are bundled with Linux distributions:
GIMP: A raster graphics editor that can take screenshots too
gnome-screenshot: The default screen grabbing utility in GNOME
ImageMagick: Has an command-line tool that captures screenshots in a variety of formats. Type to capture the entire screen to your home directory.
Spectacle: The default screen grabbing utility in KDE
Shutter: Screenshot utility written in Perl
scrot: Allows selecting arbitrary areas of the X screen and windows.
xwd: The screen capture utility of the X Window System
Apple iOS
A screenshot can be taken on iOS by simultaneously pressing the Home button and the Lock button, however on the newer iPhones X, XR, XS, 11, 12, and 13, it is achieved by pressing the Volume up and Lock button. The screen will flash and the picture will be stored in PNG format in the "Camera Roll" if the device has a camera, or in "Saved Photos" if the device does not. From the iOS 11 update, a little preview will pop up in the bottom left corner, which can be swiped left to save or clicked to open up an editor where the screenshot can be cropped or doodled on before being saved or shared. The screenshot feature is available with iOS 2.0 and later. The same shortcut for Mac OS is used in iOS to take a screenshot, with bringing the screenshot directly in iOS' editing window in iOS 11 and later. Third-party Bluetooth keyboards often have a key or function key command devoted to taking a screenshot.
Apple macOS
On macOS, a user can take a screenshot of an entire screen by pressing , or of a chosen area of the screen by . This screenshot is saved to the user's desktop, with one PNG file per attached monitor. If the user holds down while doing either then the screenshot will be copied to the clipboard instead.
Beginning with Mac OS X Panther, it is possible to make a screenshot of an active application window. By following , with pressing the , the cross-hair cursor turns into a small camera icon. The current window under the cursor is highlighted, and a click on the mouse or trackpad will capture a screenshot of the entire highlighted element (including the parts offscreen or covered by other windows).
A provided application called Grab will capture a chosen area, a whole window, the whole screen, or the whole screen after 10 seconds and pops the screenshot up in a window ready for copying to the clipboard or saving as a TIFF. The Preview application, also provided, has the same capture options as Grab but opens the captured image immediately in a new window.
Since macOS 10.14 Mojave, Apple brought to users a revamped screenshot utility, called Screenshot app. A utility toolbar will show up when users press . This toolbar allows users to choose capture modes and options to take screenshots. Users can change the default location of saved screenshots from the Options menu in Screenshot app. Besides, this application supports recording Mac screen in full-sized or chosen portion.
A shell utility called "screencapture" (located in /usr/sbin/screencapture) can be used from the Terminal application or in shell scripts to capture screenshots and save them to files. Various options are available to choose the file format of the screenshot, how the screenshot is captured, if sounds are played, etc. This utility might only be available when the macOS developer tools are installed. A user cannot capture the screen while DVD Player is running.
Maemo 5
On Maemo 5 a screenshot can be taken by pressing simultaneously. Screenshots will be saved as "Screenshot-YYYYMMDD-HHMMSS.png" in "Images/Screenshots" on the internal storage.
Windows
On Windows, pressing captures a screenshot of the entire desktop, while captures only the active window. Captured screenshots do not include the mouse pointer. Windows places these captured screenshots in the clipboard, meaning that an additional program needs to retrieve them from the clipboard. Starting with Windows 8, however, or instantly saves a screenshot to the "Screenshots" folder in "Pictures" library. All screenshots are saved as PNG files. Note: On some notebooks you have to hold and then press instead.
Windows Vista and later include a utility called Snipping Tool, first introduced in Windows XP Tablet PC Edition. It is a screen-capture tool that allows taking screenshots ("snips") of a window, rectangular area, or free-form area. Starting with Windows 10, Snipping Tool gained time delay functionality, useful for capturing context menus. Snips can then be annotated, saved as an image file or as an HTML page, or emailed. However, it does not work with non-tablet XP versions but represents an XP compatible equivalent. Windows 7 and later also include Problem Step Recorder as part of their troubleshooting platforms that once started, automatically captures a screenshot at mouse clicks.
There are exceptions to what can be captured by this method. For example, contents in hardware overlay are not captured. This includes video images that Windows Media Player 10 or earlier play. As such, special software may be required to capture the screens of video games.
Windows Phone
In Windows Phone 8, screenshots can be taken by simultaneously pressing and holding the phone's Power button and the Start button. The screenshots are saved in the phone's native screen resolution under "screenshots" in the Photos hub. The screenshot functionality is only available for Windows Phone 8 or later.
The screenshot combination for Windows Phone 8.1 and later is the phone's Power button and the Volume Up button.
Xbox One
As of March 2015, an Xbox One can take a screenshot by double-pressing the Nexus button. Pressing the Y button will then save it. The equivalent voice command for this action is "Xbox, take a screenshot".
External tools
Notable external tools include:
Bandicam
Camtasia
CamStudio
CloudApp
Greenshot
Gyazo
IrfanView
Jing
KSnapshot
Lightscreen
Microsoft Snipping Tool
Monosnap
PrintKey 2000
scrot
ShareX
Shotty
Snagit
Snapz Pro X
Softario Captus
VVCap
Window Clippings
Xfire
XnView
Xwd
PicPick
Some web browsers, for example Firefox and Microsoft Edge, have a screenshot tool which can be used to capture a whole web page or part of it.
Common technical issues
Hardware overlays
On Windows systems, screenshots of games and media players sometimes fail, resulting in a blank rectangle. The reason for this is that the graphics are bypassing the normal screen and going to a high-speed graphics processor on the graphics card by using a method called hardware overlay. Generally, there is no way to extract a computed image back out of the graphics card, though software may exist for special cases or specific video cards.
One way these images can be captured is to turn off the hardware overlay. Because many computers have no hardware overlay, most programs are built to work without it, just a little slower. In Windows XP, this is disabled by opening the Display Properties menu, clicking on the "Settings" tab, clicking, "Advanced", "Troubleshoot", and moving the Hardware Acceleration Slider to "None."
Free software media players may also use the overlay but often have a setting to avoid it or have dedicated screenshot functions.
Screen recording
The screen recording capability of some screen capture programs is a time-saving way to create instructions and presentations, but the resulting files are often large.
A common problem with video recordings is the action jumps, instead of flowing smoothly, due to low frame rate. Though getting faster all the time, ordinary PCs are not yet fast enough to play videos and simultaneously capture them at professional frame rates, i.e. 30 frame/s. For many cases, high frame rates are needed for a pleasant experience.
Copyright issues
Some companies believe the use of screenshots is an infringement of copyright on their program, as it is a derivative work of the widgets and other art created for the software. Regardless of copyright, screenshots may still be legally used under the principle of fair use in the U.S. or fair dealing and similar laws in other countries.
See also
Comparison of screencasting software
Codeless test automation
Print screen
Screencast
Thumbshot
Video capture
References
External links
Print Screen for Microsoft
Graphical user interfaces |
331137 | https://en.wikipedia.org/wiki/Live%20CD | Live CD | A live CD (also live DVD, live disc, or live operating system) is a complete bootable computer installation including operating system which runs directly from a CD-ROM or similar storage device into a computer's memory, rather than loading from a hard disk drive. A live CD allows users to run an operating system for any purpose without installing it or making any changes to the computer's configuration. Live CDs can run on a computer without secondary storage, such as a hard disk drive, or with a corrupted hard disk drive or file system, allowing data recovery.
As CD and DVD drives have been steadily phased-out, live CDs have become less popular, being replaced by live USBs, which are equivalent systems written onto USB flash drives, which have the added benefit of having writeable storage. The functionality of a live CD is also available with an external hard disk drive connected by USB. Many live CDs offer the option of persistence by writing files to a hard drive or USB flash drive.
Many Linux distributions make ISO images available for burning to CD or DVD. While open source operating systems can be used for free, some commercial software, such as Windows To Go requires a license to use. Many live CDs are used for data recovery, computer forensics, disk imaging, system recovery and malware removal. The Tails operating system is aimed at preserving privacy and anonymity of its users, allowing them to work with sensitive documents without leaving a record on a computer's hard drive.
History
All computers except the earliest digital computers are built with some form of minimal built-in loader, which loads a program or succession of programs from a storage medium, which then operate the computer. Initially a read-only medium such as punched tape or punched cards was used for initial program load. With the introduction of inexpensive read-write storage, read-write floppy disks and hard disks were used as boot media.
After the introduction of the audio compact disc, it was adapted for use as a medium for storing and distributing large amounts of computer data. This data may also include application and operating-system software, sometimes packaged and archived in compressed formats. Later, it was seen to be convenient and useful to boot the computer directly from compact disc, often with a minimal working system to install a full system onto a hard drive. While there are read-write optical discs, either mass-produced read-only discs or write-once discs were used for this purpose.
The first Compact Disc drives on personal computers were generally much too slow to run complex operating systems; computers were not designed to boot from an optical disc. When operating systems came to be distributed on compact discs, either a boot floppy or the CD itself would boot specifically, and only, to install onto a hard drive. The world's first and oldest non-Linux live CD was the FM Towns OS first released in 1989, before the release of Macintosh System 7 in 1991 and Yggdrasil Linux in 1992.
Linux
Although early developers and users of distributions built on top of the Linux kernel could take advantage of cheap optical disks and rapidly declining prices of CD drives for personal computers, the Linux distribution CDs or "distros" were generally treated as a collection of installation packages that would first need to be permanently installed to hard disks on the target machine.
However, in the case of these distributions built on top of the Linux kernel, the free operating system was meeting resistance in the consumer market because of the perceived difficulty, effort, and risk involved in installing an additional partition on the hard disk, in parallel with an existing operating system installation.
The term "live CD" was coined because, after typical PC RAM was large enough and 52x speed CD drives and CD burners were widespread among PC owners, it finally became convenient and practical to boot the kernel and run X11, a window manager and GUI applications directly from a CD without disturbing the OS on the hard disk.
This was a new and different situation for Linux than other operating systems, because the updates/upgrades were being released so quickly, different distributions and versions were being offered online, and especially because users were burning their own CDs.
The first Linux-based 'Live CD' was Yggdrasil Linux first released in beta form 1992~1993 (ceased production in 1995), though in practice its functionality was hampered due to the low throughput of contemporary CD-ROM drives. DemoLinux, released in 1998, was the first Linux distribution specially designed as a live CD. The Linuxcare bootable business card, first released in 1999, was the first Live CD to focus on system administration, and the first to be distributed in the bootable business card form factor. , Finnix (first released in 2000) is the oldest Live CD still in production. Knoppix, a Debian-derived Linux distribution, was released in 2003, and found popularity as both a rescue disk system and as a primary distribution in its own right.
Since 2003, the popularity of live CDs has increased substantially, partly due to Linux Live scripts and remastersys, which made it very easy to build customized live systems. Most of the popular Linux distributions now include a live CD variant, which in some cases is also the preferred installation medium.
Uses
Live CDs are made for many different uses. Some are designed to demonstrate or "test drive" a particular operating system (usually Linux or another free or open source operating system). Software can be tested, or run for a particular single use, without interfering with system setup. Data on a system which is not functioning normally due to operating system and software issues can be made available; for example, data can be recovered from a machine with an active virus infection without the virus process being active and causing more damage, and the virus can be removed with its defences against removal bypassed.
Although some live CDs can load into memory to free the optical drive for other uses, loading the data from a CD-ROM is still slower than a typical hard drive boot, so this is rarely the default with large live CD images, but for smaller live CD images loading the filesystem directly into RAM can provide a significant performance boost, as RAM is much faster than a hard drive, and uses less power. Experienced users of the operating system may also use a live CD to determine whether and to what extent a particular operating system or version is compatible with a particular hardware configuration and certain peripherals, or as a way to know beforehand which computer or peripheral will work before buying. A live CD can be used to troubleshoot hardware, especially when a hard drive fails, and more generally as a recovery disc in case of problems. Some live CDs can save user-created files in a Windows partition, a USB drive, a network drive, or other accessible media. Live backup CDs can create an image of drives, and back up files, without problems due to open files and inconsistent sets.
A few additional uses include:
installing a Linux distribution to a hard drive
computer forensics
Virus scanning and Malware removal
system repair and restoration
testing new versions of software
listing & testing hardware
Internet kiosks and public computers, which can be brought back to their original state by a reboot
high security/non-invasive environment for a guest
cracking, stealing, and changing passwords
network security testing
being the primary or backup operating system for any computer
quick and simple clustering of computers
playing video games or running applications that require a different operating system
providing a secure server platform where crucial files cannot be permanently altered
providing a secure, reliable platform for the performance of high-vulnerability tasks such as internet banking;
Bypassing parental controls and other restrictions
Several live CDs are dedicated to specific type of applications according to the requirements of thematic user communities. These CDs are tailored to the needs of the applications in subject including general knowledge, tutorial, specifications and trial data too.
Some of these topics covers sub topics, e.g. IT administration breaks down to firewall, rescue, security, etc. type of live CDs. In some cases a particular Live DVD covers more than one topic.
Software appliances
Packaging a software appliance as an installable live CD, or live ISO, can often be beneficial as a single image can run on both real hardware and on most types of virtual machines.
This allows developers to avoid the complexities involved in supporting multiple incompatible virtual machine images formats and
focus on the lowest common denominator instead.
Typically after booting the machine from the live CD, the appliance either runs in non-persistent demo mode or installs itself, at the user's request, to an available storage device.
Mounting without burning
The files on a live CD ISO image can be accessed in Microsoft Windows with a disk image emulator such as Daemon Tools, or in Unix variants by mounting a loop device. Later versions of Windows (i.e. Windows 8 and later), and software available for earlier versions, allow an ISO to be mounted as a volume.
After mounting the live CD's filesystem, software on the live CD can be run directly, without booting it, by chrooting into the mounted filesystem.
A live CD ISO image can also be mounted by Virtual Machine software such as VirtualBox and VMware Workstation or can be converted to a Live USB using SYSLINUX. Special tools can automate this process.
Features
During live CD initialization, a user typically may resort to using one or more boot codes to change the booting behavior. These vary from distribution to distribution but can most often be accessed upon first boot screen by one of the function keys.
Some live CDs come with an installation utility launchable from a desktop icon that can optionally install the system on a hard drive or USB flash drive. Most live CDs can access the information on internal and/or external hard drives, diskettes and USB flash drives.
Live CDs are usually distributed on read-only media, requiring either copying to rewriteable media (i.e. a hard drive or CD writer) or complete remastering to install additional software; however, there are exceptions. If Puppy Linux is recorded to an open multisession medium, changes made during use (such as files created, programs installed, and preferences customised) are written in a new session to the boot medium persisting through subsequent boots.
The term "Live CD" came to be used for any CD containing operating system and software which could be run without installation on the host computer. Operating systems which can be used live include AmigaOS 4, Amithlon, AROS, FreeBSD, FreeDOS, classic Mac OS, macOS, Microsoft Windows installation and repair discs, OS/2, ReactOS, NetBSD, OpenBSD, MINIX 3, Plan 9 from Bell Labs, MorphOS, OpenSolaris, BeleniX and others based on Solaris. There are maintenance versions of Microsoft Windows bootable from CD such as BartPE, Windows PE, and Microsoft Diagnostics and Recovery Toolset (DaRT), previously known as Emergency Repair Disk Commander (ERD Commander).
The first personal computer operating system on a CD to support "live" operations might have been the AmigaOS, which could be booted from CD on an Amiga CDTV in 1990.. Earlier examples of live OS are of course the operating systems used from floppy, and most widely spread is DOS.
Unlike previous operating systems on optical media, though, Linux and OS/2 "live CDs" were specifically designed to run without installation onto other media like a hard disk drive. The live CD concept was meant to promote Linux and showcase the abilities of the free, open source operating system on conventional personal computers with Microsoft Windows already installed.
On a PC, a bootable Compact Disc generally conforms to the El Torito specification, introduced in 1994. Many Linux based live CDs use a compressed filesystem image, often with the cloop compressed loopback driver, or squashfs compressed filesystem, generally doubling effective storage capacity, although slowing application start up.
The resulting environment can be quite rich: typical Knoppix systems include around 1,200 separate software packages. Live CDs have a reputation for supporting advanced auto-configuration and plug-and-play functionality. This came out of necessity to avoid requiring the user to configure the system each time it boots and to make it easily usable by those who are new to the operating system.
Creation
A read-only file system, such as on a CD-ROM has the drawback of being unable to save any current working data. For this reason, a read-only file system is often merged with a temporary writable file system in the form of a RAM disk. Often the default Linux directories "/home" (containing users' personal files and configuration files) and "/var" (containing variable data) are kept in ramdisk, because the system updates them frequently. Puppy Linux and some other live CDs allow a configuration and added files to be written and used in later sessions.
In modern live CDs, a read-only file system is merged with a RAM drive using transparent techniques such as UnionFS, AuFS or EWF. Boot loaders like syslinux can boot ISO files from USB memory devices.
Live CDs have to be able to detect and use a wide variety of hardware (including network cards, graphic cards etc.) in realtime, often using facilities such as udev, hotplug, hal, udisk etc.. which are a common part of all distributions based on Linux kernel 2.6.
See also
Boot disk
Comparison of Linux distributions#Live media
GIS Live DVD
List of live CDs
List of remastering software
Live USB
Self-booting diskette
Software appliance
Windows To Go
References
External links
Bootable CDROM HowTo
Linux Live scripts
Pondering Live CDs - A BSD perspective on the concept of Live CDs
Software appliances |
48234546 | https://en.wikipedia.org/wiki/S21Sec | S21Sec | S21sec was founded as the first iberian cybersecurity company in 2000. During these years, cybercrime has evolved at a breathtaking pace into an organised, sophisticated, criminal front that affects individuals and organizations globally. In late 2014, Portugal-based Sonae bought S21sec. In 2008 S21sec created the eCrime & Counter Threat Intelligence Department. SONAE IM acquired Nextel S.A. in 2018 and merged it with S21sec, creating the biggest Iberian company of Cybersecurity Services.
The company offers the complete breed of services that are needed to go alongside the digital transformation processes that are reshaping businesses, adapting and evolving their service portfolio to cover the complete NIST framework (National Institute of Standards and Technology of the United States) globally used as a reference on how enterprises should manage their cybersecurity. Therefore, S21sec covers the phases of identification, protection, detection, response, and recover.
See also
References
External links
Computer security software companies
Computer security companies
Basque companies
Software companies of Spain
Technology companies established in 2002
Spanish brands |
4550155 | https://en.wikipedia.org/wiki/1881%20in%20baseball | 1881 in baseball |
Champions
National League: Chicago White Stockings
Eastern Championship Association: New York Metropolitans
Inter-league playoff: New York Mets (ECA) def. Chicago (NL), 2 games to 1.
National League final standings
Statistical leaders
Notable seasons
Events
January
January 11 – The first of a series of baseball games played on ice is played in Chicago. This will become a regular event in the Chicago area.
February
February 7 – The Providence Grays sign Charley Radbourn. Radbourn played for the Buffalo Bisons in 1880, but only played the field in 6 games and did not pitch at all due to an arm injury.
February 22 – George Wright signs a contract to play for the Boston Red Caps after sitting out the 1880 season. Wright will only play part-time in order to devote more time to his sporting goods business.
February 25 – Jim O'Rourke signs a contract with the Buffalo Bisons after spending most of his career playing for the Boston Red Caps.
March
March 8 – The National League agrees on an 84-game schedule for the upcoming season. The owners are polled and pick the Chicago White Stockings as the pre-season favorite to win the pennant.
March 9 – The National League releases a list of 23 umpires approved to call league games.
April
April 11 – The Eastern Association is formed and includes the New York Metropolitans, The Washington Nationals and Brooklyn Atlantics, all teams that have regularly played competitively against National League teams.
April 27 – With pitcher George Bradley already out with pneumonia, the Detroit Wolverines lose their other hurler Bill Sweeney to a pulmonary hemorrhage. Neither pitcher will ever play a single game for the Wolverines.
May
May 14 – Charley Jones wins a judgement against the Boston Red Caps for his unpaid salary due from 1880 in an Ohio court. Cleveland law enforcement will take the money from the Red Caps share of gate receipts when Boston plays in Cleveland.
May 20 – Mike "King" Kelly scores the go-ahead run by cutting short the distance rounding the bases. Kelly doesn't come close to touching third while the umpire is looking a different direction. Kelly then pulls off the hidden ball trick in the 9th inning to preserve the win for the Chicago White Stockings.
May 28 – A man is arrested for trying to bribe John Clapp of the Cleveland Blues to throw a game. Clapp will acquire the nickname "Honest John" because he went to the police after the bribe offer was made.
June
June 1 – Tommy Bond is released by the Boston Red Caps after starting the season 0–3. After averaging nearly 500 innings pitched per season over the last 7 years, Bond's arm is no longer what it once was. Bond will never regain his once-dominating form.
June 18 – The Washington Nationals of the Eastern League disband, citing lack of interest after being rejected to join the National League.
June 20 – A new team is formed in Cincinnati after the demise of the previous Cincinnati Reds team. This new club will succeed and become the modern-day Cincinnati Reds.
June 25 – George Gore of the Chicago White Stockings sets a major league record by stealing 7 bases in one game. Billy Hamilton will tie this record in 1894.
July
July 2 – The Boston Red Caps lose to the Buffalo Bisons to drop to last place in the National League. It is the first time in club history that they have occupied the cellar.
July 4 – Mickey Welch of the Troy Trojans beats the Buffalo Bisons in both games of a double-header, giving him 16 straight wins against the Bisons.
July 20 – The Buffalo Bisons finish off a sweep of the first-place Chicago White Stockings to pull within 3½ games of Chicago.
July 21 – The Cleveland Blues lose 4–0 in an exhibition game to Akron in a game that only takes 1 hour and 18 minutes to play.
August
August 21 – The Eclipse club refuses to play against the Chicago Whites in Louisville because of a black player named Fleet Walker on the Chicago team.SOURCE NEEDED Walker will go on to play for the Toledo Blue Stockings in the American Association in 1884 and is generally regarded as the first black player in major league baseball.
August 27 – Tony Mullane makes his major league debut for the Detroit Wolverines and beats the first place Chicago White Stockings 9–1. Despite the win, Mullane will be released within a month by the Wolverines. He will go on to post 284 career wins.
September
September 3 – Lip Pike of the Worcester Ruby Legs makes 3 errors in the 9th inning which gives the Boston Red Caps 2 runs and a 3–2 victory. Worcester accuses Pike of throwing the game and immediately suspends him. Pike will only play in 1 more game in his career, in 1887.
September 10 – With the Troy Trojans trailing 7–4, the bases loaded and two out in the bottom of the 9th, Roger Connor hits the first grand slam in National League history for an 8–7 victory.
September 12 – Chub Sullivan, who was captain of the Worcester Ruby Legs before falling ill in the spring, dies in Boston at the age of 25.
September 15 – Davy Force of the Buffalo Bisons turns 2 unassisted double plays, participates in 2 other double plays and starts a triple play for the Bisons. Despite his feat, Buffalo loses in 12 innings, 7–6 to the Worcester Ruby Legs.
September 16 – The Chicago White Stockings win their 2nd straight pennant with a 4–0 win over the Boston Red Caps.
September 25 – The National League announces that all 8 teams will return for the 1882 season. This is the first time that the major leagues have had the same teams in 2 consecutive seasons.
September 27 – The Troy Trojans lose to the champion Chicago White Stockings 10–8 in a heavy rain storm in front of 12 spectators, setting a record for the least attended game.
September 29 – The National League issues a list of 10 blacklisted players who will require unanimous league approval for reinstatement. The reason given for the blacklisting is "confirmed dissipation and general insubordination."
October
October 8 – Chris von der Ahe takes control of the St. Louis Browns. The Browns join the soon to be formed American Association, become a dominant team and eventually join the National League and still exist today as the St. Louis Cardinals.
October 10 – Initiated by backers of the new Cincinnati Red Stockings club, the first meetings are held in Pittsburgh of what would become the American Association.
October 15 – Denny McKnight organizes the Allegheny Baseball Club of Pittsburgh in anticipation of playing in the new American Association. The team, still in existence today, will become known as the Pittsburgh Pirates.
October 16 – The Mystics win the California League championship by defeating Oakland 12–10.
November
November 2 – The American Association, the first competing Major League, is officially founded with the motto Liberty to All. The six Clubs members are the Brooklyn Atlantics, Cincinnati Red Stockings, Eclipse of Louisville, Philadelphia Athletics, Pittsburgh Alleghenys and St. Louis Brown Stockings. The Brooklyn club will be replaced by the Baltimore Orioles before the start of the first season in 1882.
November 3 – The American Association elects Denny McKnight as president. The new league will have no reserve clause and will allow Sunday games, liquor sales and 25¢ tickets, all in opposition to National League policies, in an effort to take the established major league head-on.
December
December 22 – Longtime Boston Red Stockings/Boston Red Caps manager Harry Wright signs a contract to manage the Providence Grays for the 1882 season.
Births
January–April
January 21 – Arch McCarthy
January 22 – Ira Thomas
February 2 – Orval Overall
February 27 – Walter Moser
February 28 – Terry Turner
March 1 – Al Shaw
March 23 – Gavvy Cravath
April 12 – Harry Ostdiek
April 22 – Neal Ball
May–August
May 14 – Ed Walsh
May 28 – King Brady
June 5 – Beany Jacobson
June 17 – Claude Rossman
July 6 – Walter Carlisle
July 6 – Roy Hartzell
July 18 – Larry McLean
July 21 – Johnny Evers
July 31 – Bob Unglaub
August 22 – Howie Camnitz
August 28 – Dode Paskert
September–December
September 9 – Harry Cross
September 10 – Tony Tonneman
October 18 – Hans Lobert
November 10 – Jack Hoey
December 20 – Branch Rickey
Deaths
February 6 – Ham Allen, 34, batted .273 for the 1872 Middletown Mansfields.
March 1 – Hugh Campbell, 34?, pitcher for the 1873 Elizabeth Resolutes.
April 11 – John McMullin, 32?, outfielder in the National Association from 1871–1875 who batted .346 for the 1874 Philadelphia Athletics.
April 21 – Josh Snyder, 37, left fielder for the 1872 Brooklyn Eckfords.
April 21 – James Sumner, 29, umpire in National league from 1876 to 1878.
May 10 – Fraley Rogers, 30?, outfielder for the Boston Red Stockings from 1872–1873.
May 13 – Mort Rogers, ?, umpire in the National Association from 1871 to 1872.
July 11 – Steve Dignan, 22, played in 11 games for two teams in 1880.
September 7 – Red Woodhead, 30, third baseman for the 1879 Syracuse Stars.
September 12 – Chub Sullivan, 25, first baseman who played from 1877–1880.
October 7 – Mike Brannock, 29, played parts of two seasons with Chicago White Stockings in the 1870s.
November 11 – Clipper Flynn, 32, hit .338 in his only full season in 1871.
External links
1881 season at baseball-reference.com
Charlton's Baseball Chronology at BaseballLibrary.com
Year by Year History at Baseball-Almanac.com
Retrosheet.org |
14339293 | https://en.wikipedia.org/wiki/Acer%20TravelMate | Acer TravelMate | TravelMate is a line of business-oriented laptop computers manufactured by Acer. Of the various notebook series Acer has offered, the TravelMate is designated as a lightweight business and professional computer built to withstand day-to-day activities. Travelmate laptops are well received by reviewers, often, however, they are faulted for a lack of visual appeal. The TravelMate name was previously used by Texas Instruments, which sold its mobile computing division to Acer in 1997. The TravelMate mainly competes against computers such as Dell's Latitude, HP's EliteBook and ProBook, Lenovo's ThinkPad and Toshiba's Portégé.
Overview
Hardware
Depending on the model, the TravelMate series' standard features may include a full specter of actual ports, include an Ethernet adapter, and one or more PC Card slots. They may also include a docking port, an optical drive, and one VGA port. The version with soldered memory is uncommon. The more hi-end models come with professional graphics cards. The TPM chip is also a common option.
As with other laptops, earlier models used CFL backlit LCD screens, later transitioning to LED backlit screens. The classic models may have a pointing stick option, a docking port, fingerprint reader, and other hi-end business features. The curved keyboard layout was only a TravelMate family feature.
Software
The operating system included with the Travelmate has, at various times, been Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1 and Windows 10. Several proprietary utilities from Acer are usually provided, which interface with the operating system. These programs include Acer ePower Management for changing the computer's mobile power options, Acer eRecovery Management for flexible data backup, and Acer Launch Manager for configuring the computer's launch keys, which launch user-defined applications. Others utilities manage passwords, file encryption, memory optimization, and network connections. Many models organize these together into an interface called 'Empowering Technology' - with the aim of allow safer, more comfortable and practical use of the notebook.
History
Texas Instruments TravelMate models
TravelMate 3000 (1991)
TravelMate 4000m (1995)
Acer models
TravelMate series
TravelMate 2420
The TravelMate 2420 was a Centrino based laptop computer, featuring either a Celeron M or a Pentium M processor at 1.7 GHz, depending on the region where it was to be distributed. As of April 2007, this model was discontinued by Acer Corp in the USA and Mexico.
In Latin America it included one 256 MB DDR2 SO-DIMM, though in other countries it included one single SO-DIMM module of 512 MB. The Latin American version also included a 40 GB @ 4200 rpm Hard Disk. In other countries the Hard Disk was 80 GB.
As it was based on the Centrino platform, it included a 10/100 Mbit/s Ethernet adapter, a Wireless Ethernet adapter, a Bluetooth adapter and one PC Card slot. It also included three USB 2.0 ports, one VGA port, and a CD-RW/DVD-ROM as optical media drive.
TravelMate 5760
The TravelMate 5760 was manufactured in 2011 becoming a rather popular laptop in 2012. It featured the Intel Core i3-2310M dual-core processor at 2.10 GHz. The device came with a hard drive of 250 GB, 320 GB, 500 GB, 640 GB or 750 GB and a 4 GB 1066 MHz DDR3 SDRAM. It was however, able to support up to 8 GB of RAM. It came with the Windows 7 Professional operating system and also featured an HDMI port, three USB 2.0 ports, one VGA port, and one RJ-45 ethernet port.
Travelmate 6292
The Travelmate 6292 was manufactured from 2007-2009. It featured an Intel Centrino duo chip set consisting of 802.11a/g/draft-n, Bluetooth 2.0+edr and an Intel Core 2 Duo processor at 2.0 or 2.2 GHz. The unit came with 2GB of 667 MHz DDR2 SO-DIMM RAM, a 160GB HDD, and Intel GMA X3100 graphics accelerator. The laptop has been praised for its ruggedness, but faulted for its poor visual appeal. This laptop has been a popular choice for making a "Hackintosh" computer, as it had nearly identical hardware to the 2006 clamshell polycarbonate MacBook.
Travelmate P6
Released in 2020 model has a 14" screen and was equipped with 8 ports: 2 USB, 1 USB-C port, HDMI, charging port, 3.5 audio jack, SD reader and Ethernet. This model was described as a solid business machine, but keyboard typing was less comfortable that a typing on a ThinkPad X1 keyboard.
TravelMate TimelineX series
The TimelineX are ranges of laptops focused on ultra-long battery life on the order of 8 hours. In addition to the Travelmate, 'Timeline' has also been available with Acer Aspire.
Acer TravelMate 8172
Acer TravelMate 8371
Acer TravelMate 8331
Acer TravelMate 8372
Acer TravelMate 8471
Acer TravelMate 8431
Acer TravelMate 8472
Acer TravelMate 8473
Acer TravelMate 8481
Acer TravelMate 8552
Acer TravelMate 8571
Acer TravelMate 8531
Acer TravelMate 8572
TravelMate Spin B1
TravelMate Spin B3
References
External links
of Acer TravelMate Notebooks
TravelMate
Consumer electronics brands
Computer-related introductions in 1990
Products introduced in 1990 |
7109569 | https://en.wikipedia.org/wiki/Engine%20%28disambiguation%29 | Engine (disambiguation) | An engine is a device that converts one form of energy into mechanical energy.
Engine may also refer to:
Thermodynamics
Heat engine, a physical or theoretical device that converts thermal energy to mechanical output
Reciprocating engine, a heat engine that uses one or more pistons
Internal combustion engine, an engine in which the combustion of fuel and an oxidizer occurs in a confined space
Diesel engine
Wankel engine, a type of internal combustion engine
Pulse jet engine, an internal combustion engine wherein the combustion occurs in pulses
External combustion engine, an engine where an internal fluid is heated through the engine wall or a heat exchanger
Steam engine, an external combustion engine that converts steam expansion into mechanical work
Carnot heat engine, a hypothetical engine that operates on the reversible Carnot cycle
Stirling engine, a closed-cycle regenerative hot-air engine
Rail transport
Locomotive, the car of a train that carries the actual engine(s) and pulls/pushes the rest of the train
Electric locomotive, a locomotive which carries the electric motors of a train
Computing
Software engines
Software engine, a core component of a complex software system
Browser engine, component of a web browser that renders web pages on a screen
Chess engine, software that analyzes a chess game and makes decisions
Database engine, software that manipulates database contents internally
Game engine, the core software component of a video game
JavaScript engine, component of a web browser that executes the page's JavaScript code
Polymorphic engine or mutation engine, a common component of malware
Search engine, an Internet service that provides information and links to relevant websites
Other
Engine (computer science), a construct providing timed preemption
Analytical Engine, a concept for a computer, designed by Charles Babbage
Difference engine, a mechanical calculator designed to tabulate polynomial functions
Literature
The Engine, a fictional device described in Gulliver's Travels
Engines (book), a 1959 science book for children by L. Sprague de Camp
Music
Engine (British band), a British boogie-rock band, active between 1979 and 1997
Engine (American band), an American metal band fronted by Ray Alder
Engine (Engine album), the band's 1999 debut album
Engine (American Music Club album), 1987
Engine (Jinn album), 2010
Engine (Loudness album), 1999
Television
Engine (TV series), a Japanese television drama starring Takuya Kimura
Engines (Engine Sentai Go-onger), fictional machines in the TV series Engine Sentai Go-onger
Other uses
Engine (organization), an American nonprofit organization encouraging high-tech entrepreneurship
Fire engine, a vehicle used by firefighters
Siege engine, an anti-fortification machine or structure
See also
Motor (disambiguation), a device which converts electrical or hydraulic energy into motion
Fire apparatus, a vehicle used to assist in fighting fires
ingen (disambiguation)
NGEN (disambiguation)
Template engine (disambiguation) |
57941653 | https://en.wikipedia.org/wiki/Manolis%20Kellis | Manolis Kellis | Manolis Kellis (; born 1977) is a professor of Computer Science at the Massachusetts Institute of Technology (MIT) in the area of Computational Biology and a member of the Broad Institute of MIT and Harvard. He is the head of the Computational Biology Group at MIT and is a Principal Investigator in the Computer Science and Artificial Intelligence Lab (CSAIL) at MIT.
Kellis is known for his contributions to genomics, human genetics, epigenomics, gene regulation, and genome evolution. He co-led the NIH Roadmap Epigenomics Project effort to create a comprehensive map of the human epigenome, the comparative analysis of 29 mammals to create a comprehensive map of conserved elements in the human genome, the ENCODE, GENCODE, and modENCODE projects to characterize the genes, non-coding elements, and circuits of the human genome and model organisms. A major focus of his work is understanding the effects of genetic variations on human disease, with contributions to obesity, diabetes, Alzheimer's disease, schizophrenia, and cancer.
Education and early career
Kellis was born in Greece, moved with his family to France when he was 12, and came to the U.S. in 1993. He obtained his PhD from MIT, where he worked with Eric Lander, founding director of the Broad Institute, and Bonnie Berger, professor at MIT and received the Sprowls award for the best doctorate thesis in Computer Science, and the first Paris Kanellakis graduate fellowship. Prior to computational biology, he worked on artificial intelligence, sketch and image recognition, robotics, and computational geometry, at MIT and at the Xerox Palo Alto Research Center.
Research and career
As of July 2018, Manolis Kellis has authored 187 journal publications that have been cited 68,380 times. He has helped direct several large-scale genomics projects, including the Roadmap Epigenomics project, the Encyclopedia of DNA Elements (ENCODE) project, the Genotype Tissue-Expression (GTEx) project.
Comparative genomics
Kellis started comparing the genomes of yeast species as an MIT graduate student. As part of this work, which was published in Nature in 2003, he developed computational methods to pinpoint patterns of similarity and difference between closely related genomes. The goal was to develop methods for understanding genomes with a view to apply them to the human genome.
He turned from yeast to flies and ultimately to mammals, comparing multiple species to explore genes, their control elements, and their deregulation in human disease. Kellis led several comparative genomics projects in human, mammals, flies, and yeast.
Epigenomics
Kellis co-led the NIH government-funded project to catalogue the human epigenome. He said during an interview with MIT Technology Review “If the genome is the book of life, the epigenome is the complete set of annotations and bookmarks.” His lab now uses this map to further the understanding of fundamental processes and disease in humans.
Obesity
Kellis and colleagues used epigenomic data to investigate the mechanistic basis of the strongest genetic association with obesity. They showed that this mechanism operates in the fat cells of both humans and mice and detailed how changes within the relevant genomic regions cause a shift from dissipating energy as heat (thermogenesis) to storing energy as fat. A full understanding of the phenomenon may lead to treatments for people whose 'slow metabolism' cause them to gain excessive weight.
Alzheimer's disease
Kellis, Li-Huei Tsai, and others at MIT used epigenomic markings in human and mouse brains to study the mechanisms leading to Alzheimer’s disease. They showed that immune cell activation and inflammation, which have long been associated with the condition, are not simply the result of neurodegeneration, as some researchers have argued. Rather, in mice engineered to develop Alzheimer’s-like symptoms, they found that immune cells start to change even before neural changes are observed
Genotype-Tissue Expression (GTEx)
Kellis is a member of the Genotype-Tissue Expression (GTEx) project that seeks to elucidate the basis of disease predisposition. It is an NIH-sponsored project that seeks to characterize genetic variation in human tissues with roles in diabetes, heart disease, and cancer.
To date, his lab has developed specific domain expertise in obesity, diabetes, Alzheimer's disease, schizophrenia, and cancer.
Teaching
In addition to his research, Kellis co-taught for several years MIT's required undergraduate introductory algorithm courses 6.006: Introduction to Algorithms and 6.046: Design and Analysis of Algorithms with Profs. Ron Rivest, Erik Demaine, Piotr Indyk, Srinivas Devadas and others.
He is also teaching a computational biology course at MIT, titled "Computational Biology: Genomes, Networks, Evolution." The course (6.047/6.878) is geared towards advanced undergraduate and early graduate students, seeking to learn the algorithmic and machine learning foundations of computational biology, and also be exposed to current frontiers of research in order to become active practitioners of the field. He started 6.881: Computational Personal Genomics: Making sense of complete genomes. This course is aimed at exploring the computational challenges associated with interpreting how sequence differences between individuals lead to phenotypic differences such as gene expression, disease predisposition, or response to treatment.
Awards and honors
Kellis received the US Presidential Early Career Award for Scientists and Engineers (PECASE), the National Science Foundation CAREER award, a Sloan Research Fellowship, the Gregor Mendel medal for Outstanding Achievements in Science by the Mendel Lectures committee, the Athens Information Technology (AIT) Niki Award for Science and Engineering, the Ruth and Joel Spira Teaching award, and the George M. Sprowls Award for the best Ph.D. thesis in Computer Science at MIT. He was named as one of Technology Review's Top 35 Innovators Under 35 for his research in comparative genomics
Media appearances
Decoding A Genomic Revolution, TEDx Cambridge, 2013 "MIT Computational Biologist Manolis Kellis gives us a glimpse of the doctor’s office visit of the future, and uses his own genetic mutations to show itus how a revolution in genomics is unlocking treatments that could transform medicine as we know it"
Regulatory Genomics and Epigenomics of Complex Disease, Welcome Trust, 2014 "Manolis Kellis, Massachusetts Institute of Technology, USA, gives one of the keynote lectures at Epigenomics of Common Diseases, (28-31 October 2014), organised by the Wellcome Genome Campus Advanced Courses and Scientific Conferences team at Churchill College, Cambridge
Manolis Kellis Reddit Ask Me Anything (AMA), Reddit Science AMA Series: "I’m Manolis Kellis, a professor of computer science at MIT studying the human genome to learn about what causes obesity, Alzheimer’s, cancer and other conditions. AMA about comp-bio and epigenomics, and how they impact human health".
References
Greek expatriates in France
Genetic epidemiologists
Living people
1977 births
Greek emigrants to the United States
Greek computer scientists
Human Genome Project scientists
Massachusetts Institute of Technology faculty
Massachusetts Institute of Technology alumni
Biotechnologists
21st-century American biologists |
10956960 | https://en.wikipedia.org/wiki/Information%20and%20media%20literacy | Information and media literacy | Information and media literacy (IML) enables people to show and make informed judgments as users of information and media, as well as to become skillful creators and producers of information and media messages in their own right. Renee Hobbs suggests that “few people verify the information they find online ― both adults and children tend to uncritically trust information they find, from whatever source.” People need to gauge the credibility of information and can do so by answering three questions:
Who is the author?
What is the purpose of this message?
How was this message constructed?
Prior to the 1990s, the primary focus of information literacy was research skills. Media literacy, a study that emerged around the 1970s, traditionally focuses on the analysis and the delivery of information through various forms of media. Nowadays, the study of information literacy has been extended to include the study of media literacy in many countries like the UK, Australia and New Zealand. The term "information and media literacy" is used by UNESCO to differentiate the combined study from the existing study of information literacy. It is also referred to as information and communication technologies (ICT) in the United States. Educators such as Gregory Ulmer have also defined the field as electracy.
IML is a combination of information literacy and media literacy. The transformative nature of IML includes creative works and creating new knowledge; to publish and collaborate responsibly requires ethical, cultural and social understanding.
Information and Media Literacy In the Digital Age
The modern digital age has led to the proliferation of information spread across the Internet. Individuals must be able to recognize whether information is true or false and better yet know how to locate, evaluate, use, and communicate information in various formats; this is called information literacy.
21st-century students
The IML learning capacities prepare students to be 21st century literate. According to Jeff Wilhelm (2000), "technology has everything to do with literacy. And being able to use the latest electronic technologies has everything to do with being literate." He supports his argument with J. David Bolter's statement that "if our students are not reading and composing with various electronic technologies, then they are illiterate. They are not just unprepared for the future; they are illiterate right now, in our current time and context".
Wilhelm's statement is supported by the 2005 Wired World Phase II (YCWW II) survey conducted by the Media Awareness Network of Canada on 5000 Grade 4 – 11 students. The key findings of the survey were:
62% of Grade 4 students prefer the Internet.
38% of Grade 4 students prefer the library.
91% of Grade 11 students prefer the Internet.
9% of Grade 11 students prefer the library.
Marc Prensky (2001) uses the term "digital native" to describe people who have been brought up in a digital world. The Internet has been a pervasive element of young people's home lives. 94% of kids reported that they had Internet access at home, and a significant majority (61%) had a high-speed connection.
By the time kids reach Grade 11, half of them (51 percent) have their own Internet-connected computer, separate and apart from the family computer. The survey also showed that young Canadians are now among the most wired in the world. Contrary to the earlier stereotype of the isolated and awkward computer nerd, today's wired kid is a social kid.
In general, many students are better networked through the use of technology than most teachers and parents, who may not understand the abilities of technology. Students are no longer limited to desktop computera. They may use mobile technologies to graph mathematical problems, research a question for social studies, text message an expert for information, or send homework to a drop box. Students are accessing information by using MSN, personal Web pages, Weblogs and social networking sites.
Teaching and learning in the 21st century
Many teachers continue the tradition of teaching of the past 50 years. Traditionally teachers have been the experts sharing their knowledge with children. Technology, and the learning tools it provides access to, forces us to change to being facilitators of learning. We have to change the stereotype of teacher as the expert who delivers information, and students as consumers of information, in order to meet the needs of digital students. Teachers not only need to learn to speak digital, but also to embrace the language of digital natives.
Language is generally defined as a system used to communicate in which symbols convey information. Digital natives can communicate fluently with digital devices and convey information in a way that was impossible without digital devices. People born prior to 1988 are sometimes referred to as "digital immigrants." They experience difficulty programming simple devices like a VCR. Digital immigrants do not start pushing buttons to make things work.
Learning a language is best done early in a child's development.
In acquiring a second language, Hyltenstam (1992) found that around the age of 6 and 7 seemed to be a cut-off point for bilinguals to achieve native-like proficiency. After that age, second language learners could get near-native-like-ness but their language would, while consisting of very few actual errors, have enough errors that would set them apart from the first language group. Although more recent research suggests this impact still exists up to 10 years of age.
Kindergarten and grades 1 and 2 are critical to student success as digital natives because not all students have a "digital"-rich childhood. Students learning technological skills before Grade 3 can become equivalently bilingual. "Language-minority students who cannot read and write proficiently in English cannot participate fully in American schools, workplaces, or society. They face limited job opportunities and earning power." Speaking "digital" is as important as being literate in order to participate fully in North American society and opportunities.
Students' struggle
Many students are considered illiterate in media and information for various reasons. They may not see the value of media and information literacy in the 21st-century classroom. Others are not aware of the emergence of the new form of information. Educators need to introduce IML to these students to help them become media and information literate. Very little changes will be made if the educators are not supporting information and media literacy in their own classrooms.
Performance standards, the foundation to support them, and tools to implement them are readily available. Success will come when there is full implementation and equitable access are established. Shared vision and goals that focus on strategic actions with measurable results are also necessary.
When the staff and community, working together, identify and clarify their values, beliefs, assumptions, and perceptions about what they want children to know and be able to do, an important next step will be to discover which of these values and expectations will be achieved. Using the capacity tools to assess IML will allow students, staff and the community to reflect on how well students are meeting learning needs as related to technology.
The IML Performance standards allow data collection and analysis to evidence that student-learning needs are being met. After assessing student IML, three questions can be asked:
What does each student need to learn?
How does one know whether students have met the capacities?
How does one respond when students have difficulty in learning?
Teachers can use classroom assessment for learning to identify areas that might need increased focus and support. Students can use classroom assessment to set learning goals for themselves.
In the curriculum
This integration of technology across the curriculum is a positive shift from computers being viewed as boxes to be learned to computers being used as technical communication tools. In addition, recent learning pedagogy recognizes the inclusion for students to be creators of knowledge through technology. International Society for Technology in Education (ISTE) has been developing a standard IML curriculum for the US and other countries by implementing the National Educational Technology Standards.
United Kingdom
In the UK, IML has been promoted among educators through an information literacy website developed by several organizations that have been involved in the field.
United States
IML is included in the Partnership for the 21st Century program sponsored by the US Department of Education. Special mandates have been provided to Arizona, Iowa, Kansas, Maine, New Jersey, Massachusetts, North Carolina, South Dakota, West Virginia and Wisconsin. Individual school districts, such as the Clarkstown Central School District, have also developed their own information literacy curriculum. ISTE has also produced the National Educational Technology Standards for Students, Teachers and Administrators.
Canada
In British Columbia, Canada, the Ministry of Education has de-listed the Information Technology K to 7 IRP as a stand-alone course. It is still expected that all the prescribed learning outcomes continue to be integrated.
This integration of technology across the curriculum is a positive shift from computers being viewed as boxes to be learned to computers being used as technical communication tools. In addition, recent learning pedagogy recognizes the inclusion for students to be creators of knowledge through technology. Unfortunately, there has been no clear direction to implement IML.
The BC Ministry of Education published the Information and Communications Technology Integration Performance Standards, Grades 5 to 10 ICTI in 2005. These standards provide performance standards expectations for Grade 5 to 10; however, they do not provide guidance for other grades, and the expectation for a Grade 5 and Grade 10 student are the same.
Arab World
In the Arab region, media and information literacy was largely ignored up until 2011, when the Media Studies Program at the American University of Beirut, the Open Society Foundations and the Arab-US Association for Communication Educators (AUSACE) launched a regional conference themed "New Directions: Digital and Media Literacy". The conference attracted significant attention from Arab universities and scholars, who discussed obstacles and needs to advance media literacy in the Arab region, including developing curricula in Arabic, training faculty and promoting the field.
Following up on that recommendation, the Media Studies Program at AUB and the Open Society Foundations in collaboration with the Salzburg Academy on Media and Global Change launched in 2013 the first regional initiative to develop, vitalize, and advance media literacy education in the Arab region. The Media and Digital Literacy Academy of Beirut (MDLAB) offered an annual two-week summer training program in addition to working year-round to develop media literacy curricula and programs. The academy is conducted in Arabic and English and brings pioneering international instructors and professionals to teach advanced digital and media literacy concepts to young Arab academics and graduate students from various fields. MDLAB hopes that the participating Arab academics will carry what they learned to their countries and institutions and offers free curricular material in Arabic and English, including media literacy syllabi, lectures, exercises, lesson plans, and multi-media material, to assist and encourage the integration of digital and media literacy into Arab university and school curricula.
In recognition of MDLAB's accomplishments in advancing media literacy education in the Arab region, the founder of MDLAB received the 2015 UNESCO-UNAOC International Media and Information Literacy Award.
Prior to 2013, only two Arab universities offered media literacy courses: the American University of Beirut (AUB) and the American University of Sharjah (AUS). Three years after the launch of MDLAB, over two dozen Arab universities incorporated media literacy education into their curricula, both as stand-alone courses or as modules injected into their existing media courses. Among the universities who have full-fledged media literacy courses (as of 2015) are Lebanese American University (Lebanon), Birzeit University (Palestine), University of Balamand (Lebanon), Damascus University (Syria), Rafik Hariri University (Lebanon), Notre Dame University (Lebanon), Ahram Canadian University (Egypt), American University of Beirut (Lebanon), American University of Sharjah (UAE), and Al Azm University (Lebanon). The first Arab school to adopt media literacy as part of its strategic plan is the International College (IC) in Lebanon. Efforts to introduce media literacy to the region's other universities and schools continues with the help of other international organizations, such as UNESCO, UNAOC, AREACORE, DAAD, and OSF.
Asia
In Singapore and Hong Kong, information literacy or information technology was listed as a formal curriculum.
Barriers
One barrier to learning to read is the lack of books, while a barrier to learning IML is the lack of technology access. Highlighting the value of IML helps to identify existing barriers within school infrastructure, staff development, and support systems. While there is a continued need to work on the foundations to provide a sustainable and equitable access, the biggest obstacle is school climate.
Marc Prensky identifies one barrier as teachers viewing digital devices as distractions: "Let's admit the real reason that we ban cell phones is that, given the opportunity to use them, students would vote with their attention, just as adults would 'vote with their feet' by leaving the room when a presentation is not compelling."
The mindset of banning new technology, and fearing the bad things that can happen, can affect educational decisions. The decision to ban digital devices impacts students for the rest of their lives.
Any tool that is used poorly or incorrectly can be unsafe. Safety lessons are mandatory in industrial technology and science. Yet safety or ethical lessons are not mandatory to use technology.
Not all decisions in schools are measured by common ground beliefs. One school district in Ontario banned digital devices from their schools. Local schools have been looking at doing the same. These kinds of reactions are often about immediate actions and not about teaching, learning or creating solutions. Many barriers to IML exist.
See also
Multiliteracy
Critical literacy
Numeracy
Visual literacy
Digital literacy
Notes
References
August, Diane. (2006). Developing Literacy in Second-Language Learners: Report of the National Literacy Panel on Language-Minority Children and Youth. 1. Retrieved March 24, 2007 from
BC Ministry of Education. (2006). Information and Communication Technology Integration. Retrieved December 1, 2006, from http://www.bced.gov.bc.ca/perf_stands/icti/.
BC Ministry of Education. (2005). Science K to 7: Integrated Resource Package 2005. 32. Retrieved December 1, 2006, from https://web.archive.org/web/20061007172614/http://www.bced.gov.bc.ca/irp/scik7.pdf
BC Ministry of Education. (1996). Information Technology K to 7: Integrated Resource Package. Retrieved December 1, 2006, from http://www.bced.gov.bc.ca/irp/resdocs/itk7.pdf
DuFour, R., Burnette, B. (2002) Pull out negativity by its roots. [electronic version] Journal of Staff Development. 23 (2), para. 23.
Fedorov, A. (2008). On Media Education. Moscow: ICOS UNESCO 'Information for All'.
International Society of Technology Educators. (2004). National Education Testing Standards – Students. Retrieved November 15, 2006
Lambert, L. (1998). Building Leadership Capacity. ASCD. Alexandria, Virginia 6, 23.
Media Awareness Network. (2003). Young Canadians in a wired world; The Students' View. Retrieved on May 11, 2007 from
Media Awareness Network. (2005a). Young Canadians in a wired world Phase II: Trends and Recommendations. Valerie Steeves. Retrieved on March 19, 2007
upload/YCWWII_trends_recomm.pdf. Media Awareness Network. (2005b). Young Canadians in a wired world phase ii. ERIN Research Inc. 6. Retrieved on March 19, 2007
Prensky, M. (2001). Digital Natives, Digital Immigrants. [electronic version] On the Horizon. 9 (5), 1.
Prensky, M. (2006). Listen to the Natives. [electronic version] Educational Leadership. 63 (4) 8 -13.
Surrey School District No. 36 (Surrey). (2005) Vision 2010 Strategic Plan. 1 – 4. Retrieved May 8, 2007
Surrey School District No. 36 (Surrey). (2007) Quick Facts. 1. Retrieved May 10, 2007
Wilhelm, J. (2000). Literacy by Design. Voices from the middle, A publication of the national council of teachers of English. 7 (3). 4 – 14. Retrieved May 11, 2007
Language
Literacy
Information science |
60595691 | https://en.wikipedia.org/wiki/Digital%20cloning | Digital cloning | Digital cloning is an emerging technology, that involves deep-learning algorithms, which allows one to manipulate currently existing audio, photos, and videos that are hyper-realistic. One of the impacts of such technology is that hyper-realistic videos and photos makes it difficult for the human eye to distinguish what is real and what is fake. Furthermore, with various companies making such technologies available to the public, they can bring various benefits as well as potential legal and ethical concerns.
Digital cloning can be categorized into audio-visual (AV), memory, personality, and consumer behaviour cloning. In AV cloning, the creation of a cloned digital version of the digital or non-digital original can be used, for example, to create a fake image, an avatar, or a fake video or audio of a person that cannot be easily differentiated from the real person it is purported to represent. A memory and personality clone like a mindclone is essentially a digital copy of a person’s mind. A consumer behavior clone is a profile or cluster of customers based on demographics.
Truby and Brown coined the term “digital thought clone” to refer to the evolution of digital cloning into a more advanced personalized digital clone that consists of “a replica of all known data and behavior on a specific living person, recording in real-time their choices, preferences, behavioral trends, and decision making processes.”
Digital cloning first became popular in the entertainment industry. The idea of digital clones originated from movie companies creating virtual actors of actors who have died. When actors pass away during a movie production, a digital clone of the actor can be synthesized using past footage, photos, and voice recordings to mimic the real person in order to continue the movie production.
Modern artificial intelligence, has allowed for the creation of deepfakes. This involves manipulation of a video to the point where the person depicted in the video is saying or performing actions he or she may not have consented to. In April 2018, BuzzFeed released a deepfake video of Jordan Peele, which was manipulated to depict former President, Barack Obama, making statements he has previously not made in public to warn the public against the potential dangers of deepfakes.
In addition to deepfakes, companies such as Intellitar now allows one to easily create a digital clone of themselves by feeding a series of images and voice recordings. This essentially creates digital immortality, allowing loved ones to interact with those who died. Digital cloning not only allows one to digitally memorialize their loved ones, but they can also be used to create avatars of historical figures and be used in an educational setting.
With the development of various technology, as mentioned above, there are numerous concerns that arises, including identity theft, data breaches, and other ethical concerns. One of the issues with digital cloning is that there are little to no legislations to protect potential victims against these possible problems.
Technology
Intelligent Avatar Platforms (IAP)
Intelligent Avatar Platform (IAP) can be defined as an online platform supported by artificial intelligence that allows one to create a clone of themselves. The individual must train his or her clone to act and speak like themselves by feeding the algorithm numerous voice recordings and videos of themselves. Essentially, this platform becomes a place where one lives eternally, as they are able to interact with other avatars on the same platform. IAP is becoming a platform for one to attain digital immortality, along with maintaining a family tree and legacy for generations following to see.
Some examples of IAP include Intellitar and Eterni.me. Although most of these companies are still in its developing stages, they all are trying to achieve the same goal of allowing the user to create an exact duplicate of themselves to store every memory they have in their mind into the cyberspace. Some include a free version, which only allows the user to choose their avatar from a given set of images and audio. However, with the premium setting, these companies will ask the user to upload photos, videos, and audio recordings of one to form a realistic version of themselves. Additionally, to ensure that the clone is as close to the original person, companies also encourage interacting with their own clone by chatting and answering questions for them. This allows the algorithm to learn the cognition of the original person and apply that to the clone. Intellitar closed down in 2012 because of intellectual property battles over the technology it used
Potential concerns with IAP includes the potential data breaches and not getting consent of the deceased. IAP must have a strong foundation and responsibility against data breaches and hacking in order to protect personal information of the dead, which can include voice recording, photos, and messages. In addition to the risk of personal privacy being compromised, there is also the risk of violating the privacy of the deceased. Although one can give consent to creating a digital clone of themselves before his or her physical death, they are unable to give consent to the actions the digital clone may take.
Deepfakes
As described earlier, deepfakes is a form of video manipulation where one can change the people present by feeding various images of a specific person they want. Furthermore, one can also change the voice and words the person in the video says by simply submitting series of voice recordings of the new person lasting about one or two minutes long. In 2018, a new app called FakeApp was released, allowing the public to easily access this technology to create videos. This app was also used to create the Buzzfeed video of former President Barack Obama. With deepfakes, industries can cut the cost of hiring actors or models for films and advertisements by creating videos and film efficiently at a low cost just by collecting a series of photos and audio recordings with the consent of the individual.
Potential concerns with deepfakes is that access is given to virtually anyone who downloads the different apps that offer the same service. With anyone being able to access this tool, some may maliciously use the app to create revenge porn and manipulative videos of public officials making statements they will never say in real life. This not only invades the privacy of the individual in the video but also brings up various ethical concerns.
Voice cloning
Voice cloning is a deep-learning algorithm that takes in voice recordings of an individual and is able to synthesize such a voice into one that is very similar to the original voice. Similar to deepfakes, there are numerous apps, such as Resemble AI, iSpeech, and CereVoice Me, that gives the public access to such technology. The algorithm simply needs at most a couple of minutes of audio recordings in order to produce a voice that is similar and it will also take in any text and will read it out loud. Although this application is still in the developmental stage, it is rapidly developing as big technology corporations, such as Google and Amazon are investing huge amounts of money for the development.
Some of the positive uses of voice cloning include the ability to synthesize millions of audiobooks without the use of human labor. Another include those who may have lost their voice can gain back a sense of individuality by creating their own voice clone by inputting recordings of them speaking before they lost their voices. On the other hand, voice cloning is also susceptible to misuse. An example of this is voices of celebrities and public officials being cloned and the voice may say something to provoke conflict despite the actual person has no association to what their voice said.
In recognition of the threat that voice cloning poses to privacy, civility, and democratic processes, the Institutions including the Federal Trade Commission, U.S. Department of Justice and Defense Advanced Research Projects Agency (DARPA) have weighed in on various deepfake audio use cases and methods that might be used to combat them.
Constructive uses
Education
Digital cloning can be useful in an educational setting to create a more immersive experience for students. Some students may learn better through a more interactive experience and creating deepfakes can enhance the learning ability of students. One example of this includes creating a digital clone of historical figures, such as Abraham Lincoln, to show what problems he faced during his life and how he was able to overcome them. Another example of using digital clones in an educational setting is having speakers create a digital clone of themselves. Various advocacy groups may have trouble with schedules as they are touring various schools during the year. However, by creating digital clones of themselves, their clones can present the topic at places where the group could not physically make it. These educational benefits can bring students a new way of learning as well as giving access to those who previously were not able to access resources due to environmental conditions.
Arts
Although digital cloning has already been in the entertainment and arts industry for a while, artificial intelligence can greatly expand the uses of these technology in the industry. The movie-industry can create even more hyper-realistic actors and actresses who have passed away. Additionally, movie-industry can also create digital clones in movie scenes that may require extras, which can help cut the cost of production immensely. However, digital cloning and other technology can be beneficial for non-commercial purposes. For example, artists can be more expressive if they are looking to synthesize avatars to be part of their video production. They can also create digital avatars to draft up their work and help formulate their ideas before moving on working on the final work.
Digital immortality
Although digital immortality has existed for a while as social media accounts of the deceased continue to remain in cyberspace, creating a virtual clone that is immortal takes on a new meaning. With the creation of a digital clone, one can not only capture the visual presence of themselves but also their mannerism, including personality and cognition. With digital immortality, one can continue to interact with their loved ones after they pass away, which can possibly end the barrier of physical death. Furthermore, families can connect with multiple generations, forming a family tree, in a sense, to pass on the family legacy to future generations, providing a way for history to be passed down.
Concerns
Fake news
With a lack of regulations for deepfakes, there are several concerns that have arisen. Some concerning deepfake videos that can bring potential harm includes depiction of political officials displaying inappropriate behavior, police officers shown as shooting unarmed black men, and soldiers murdering innocent civilians may begin to appear although it may have never occurred in real life. With such hyper-realistic videos being released on the Internet, it becomes very easy for the public to be misinformed, which could lead people to take actions, thus contributing to this vicious cycle of unnecessary harm. Additionally, with the rise in fake news in recent news, there is also the possibility of combining deepfakes and fake news. This will bring further difficulty to distinguishing what is real and what is fake. Visual information can be very convincing to the human eyes, therefore, the combination of deepfakes and fake news can have a detrimental effect on society. Strict regulations should be made by social media companies and other platforms for news.
Personal use
Another reason deepfakes can be used maliciously is for one to sabotage another on a personal level. With the increased accessibility of technologies to create deepfakes, blackmailers and thieves are able to easily extract personal information for financial gains and other reasons by creating videos of loved ones of the victim asking for help. Furthermore, voice cloning can be used maliciously for criminals to make fake phone calls to victims. The phone calls will have the exact voice and mannerism as the individual, which can trick the victim into giving private information to the criminal without knowing. Alternatively, a bad actor could, for example, create a deepfake of a person superimposed onto a video to extract blackmail payment and/or as an act of revenge porn.
Creating deepfakes and voice clones for personal use can be extremely difficult under the law because there is no commercial harm. Rather, they often come in the form of psychological and emotional damage, making it difficult for the court to provide a remedy for.
Ethical implications
Although there are numerous legal problems that arises with the development of such technology, there are also ethical problems that may not be protected under the current legislations. One of the biggest problems that comes with the use of deepfakes and voice cloning is the potential of identity theft. However, identity theft in terms of deepfakes are difficult to prosecute because there are currently no laws that are specific to deepfakes. Furthermore, the damages that malicious use of deepfakes can bring is more of a psychological and emotional one rather than a financial one, which makes it more difficult to provide a remedy for. Allen argues that the way one’s privacy should be treated is similar to Kant’s categorical imperative.
Another ethical implication is the use of private and personal information one must give up to use the technology. Because digital cloning, deepfakes, and voice cloning all use a deep-learning algorithm, the more information the algorithm receives, the better the results are. However, every platform has a risk of data breach, which could potentially lead to very personal information being accessed by groups that users never consented to. Furthermore, post-mortem privacy comes into question when family members of a loved one tries to gather as much information as possible to create a digital clone of the deceased without the permission of how much information they are willing to give up.
Existing laws in the United States
Copyright laws
In the United States, copyright laws require some type of originality and creativity in order to protect the author’s individuality. However, creating a digital clone simply means taking personal data, such as photos, voice recordings, and other information in order to create a virtual person that is as close to the actual person. In the decision of Supreme Court case Feist Publications Inc. v. Rural Television Services Company, Inc., Justice O’Connor emphasized the importance of originality and some degree of creativity. However, the extent of originality and creativity is not clearly defined, creating a gray area for copyright laws. Creating digital clones require not only the data of the person but also the creator’s input of how the digital clone should act or move. In Meshwerks v. Toyota, this question was raised and the court stated that the same copyright laws created for photography should be applied to digital clones.
Right of publicity
With the current lack of legislations to protect individuals against potential malicious use of digital cloning, the right of publicity may be the best way to protect one in a legal setting. The right of publicity, also referred to as personality rights, gives autonomy to the individual when it comes to controlling their own voice, appearance, and other aspects that essentially makes up their personality in a commercial setting. If a deepfake video or digital clone of one arises without their consent, depicting the individual taking actions or making statements that are out of their personality, they can take legal actions by claiming that it is violating their right to publicity. Although the right to publicity specifically states that it is meant to protect the image of an individual in a commercial setting, which requires some type of profit, some state that the legislation may be updated to protect virtually anyone's image and personality. Another important note is that the right of publicity is only implemented in specific states, so some states may have different interpretations of the right compared to other states.
Preventative measures
Regulation
Digital and digital thought clones raise legal issues relating to data privacy, informed consent, anti-discrimination, copyright, and right of publicity. More jurisdictions urgently need to enact legislation similar to the General Data Protection Regulation in Europe to protect people against unscrupulous and harmful uses of their data and the unauthorised development and use of digital thought clones.
Technology
One way to prevent being a victim to any of the technology mentioned above is to develop artificial intelligence against these algorithms. There are already several companies that have developed artificial intelligence that can detect manipulated images by looking at the patterns in each pixel. By applying a similar logic, they are trying to create a software that takes each frame of a given video and analyze it pixel by pixel in order to find the pattern of the original video and determine whether or not it has been manipulated.
In addition to developing new technology that can detect any video manipulations, many researchers are raising the importance for private corporations creating stricter guidelines to protect individual privacy. With the development of artificial intelligence, it is necessary to ask how this impacts society today as it begins to appear in virtually every aspect of society, including medicine, education, politics, and the economy. Furthermore, artificial intelligence will begin to appear in various aspects of society, which makes it important to have laws that protect humans rights as technology takes over. As the private sector gains more digital power over the public, it is important to set strict regulations and laws to prevent private corporations from using personal data maliciously. Additionally, the past history of various data breaches and violations of privacy policy should also be a warning for how personal information can be accessed and used without the person’s consent.
Digital literacy
Another way to prevent being harmed by these technology is by educating people on the pros and cons of digital cloning. By doing so, it empowers each individual to make a rational decision based on their own circumstances. Furthermore, it is also important to educate people on how to protect the information they put out on the Internet. By increasing the digital literacy of the public, people have a greater chance of determining whether a given video has been manipulated as they can be more skeptical of the information they find online.
See also
Deepfake
Deep learning
Virtual actor
Artificial intelligence
Digital media
Post-mortem privacy
References
Artificial intelligence applications
Computer graphics
Deep learning
Identity theft
Special effects |
81944 | https://en.wikipedia.org/wiki/Laodamia | Laodamia | In Greek mythology, the name Laodamia (Ancient Greek: Λαοδάμεια Laodámeia) referred to:
Laodamia (or Hippodamia), a Lycian princess as the daughter of Bellerophon and Philonoe, daughter of King Iobates. Her mother was also known Alkimedousa, Anticleia, Pasandra or Cassandra. Laodamia's brothers were Hippolochus and Isander, and by Zeus, she became the mother of Sarpedon. She was shot by Artemis (that is, died a sudden, instant death) one day when she was weaving. Diodorus Siculus called her Deidamia, the wife of Evander, who was a son of Sarpedon the elder and by her father of Sarpedon the younger. Xanthus was also called the father of Sarpedon according to one account.
Laodamia, daughter of Acastus and Astydameia and the wife of Protesilaus. When her husband fell in the Trojan War, Laodamia committed suicide rather than be without him.
Laodamia or Leaneira, an Arcadian queen as the wife of King Arcas by whom she became the mother of Elatus, Apheidas and Triphylus. Laodamia was the daughter of King Amyclas of Sparta and Diomede, daughter of Lapithes. Through this parentage, she was considered the sister of Argalus, Cynortes, Hyacinthus, Polyboea, Hegesandra and, in other versions, of Daphne.
Laodamia, daughter of Alcmaeon, wife of Peleus and mother by him of Polydora. But see Antigone.
Laodamia, wife of Anticlus. Her husband was one of the men who were hiding in the Trojan Horse.
Laodamia or Laodice, alternate name for Iphthime, daughter of Icarius of Sparta and Asterodia, daughter of Eurypylus. She was the sister of Amasichus, Phalereus, Thoon, Pheremmelias and Perilaos.
Laodamia or Arsinoe, nurse of Orestes. She saved his life by sending him to Strophius after the murder of Agamemnon, whereas Aegisthus killed her own son, taking him for Orestes.
Laodamia, alternate name for Hippodamia (wife of Pirithous) occurring in a red-figure vase painting.
Notes
References
Apollodorus, The Library with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes, Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1921. ISBN 0-674-99135-4. Online version at the Perseus Digital Library. Greek text available from the same website.
Dictys Cretensis, from The Trojan War. The Chronicles of Dictys of Crete and Dares the Phrygian translated by Richard McIlwaine Frazer, Jr. (1931-). Indiana University Press. 1966. Online version at the Topos Text Project.
Diodorus Siculus, The Library of History translated by Charles Henry Oldfather. Twelve volumes. Loeb Classical Library. Cambridge, Massachusetts: Harvard University Press; London: William Heinemann, Ltd. 1989. Vol. 3. Books 4.59–8. Online version at Bill Thayer's Web Site
Diodorus Siculus, Bibliotheca Historica. Vol 1-2. Immanel Bekker. Ludwig Dindorf. Friedrich Vogel. in aedibus B. G. Teubneri. Leipzig. 1888–1890. Greek text available at the Perseus Digital Library.
Gaius Julius Hyginus, Fabulae from The Myths of Hyginus translated and edited by Mary Grant. University of Kansas Publications in Humanistic Studies. Online version at the Topos Text Project.
Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. Online version at the Perseus Digital Library.
Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. Greek text available at the Perseus Digital Library.
Parthenius, Love Romances translated by Sir Stephen Gaselee (1882-1943), S. Loeb Classical Library Volume 69. Cambridge, MA. Harvard University Press. 1916. Online version at the Topos Text Project.
Parthenius, Erotici Scriptores Graeci, Vol. 1. Rudolf Hercher. in aedibus B. G. Teubneri. Leipzig. 1858. Greek text available at the Perseus Digital Library.
Pausanias, Description of Greece with an English Translation by W.H.S. Jones, Litt.D., and H.A. Ormerod, M.A., in 4 Volumes. Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1918. . Online version at the Perseus Digital Library
Pausanias, Graeciae Descriptio. 3 vols. Leipzig, Teubner. 1903. Greek text available at the Perseus Digital Library.
Pindar, Odes translated by Diane Arnson Svarlien. 1990. Online version at the Perseus Digital Library.
Pindar, The Odes of Pindar including the Principal Fragments with an Introduction and an English Translation by Sir John Sandys, Litt.D., FBA. Cambridge, MA., Harvard University Press; London, William Heinemann Ltd. 1937. Greek text available at the Perseus Digital Library.
Pseudo-Clement, Recognitions from Ante-Nicene Library Volume 8, translated by Smith, Rev. Thomas. T. & T. Clark, Edinburgh. 1867. Online version at theio.com
Publius Ovidius Naso, The Epistles of Ovid. London. J. Nunn, Great-Queen-Street; R. Priestly, 143, High-Holborn; R. Lea, Greek-Street, Soho; and J. Rodwell, New-Bond-Street. 1813. Online version at the Perseus Digital Library.
Tryphiodorus, Capture of Troy translated by Mair, A. W. Loeb Classical Library Volume 219. London: William Heinemann Ltd, 1928. Online version at theoi.com
Tryphiodorus, Capture of Troy with an English Translation by A.W. Mair. London, William Heinemann, Ltd.; New York: G.P. Putnam's Sons. 1928. Greek text available at the Perseus Digital Library.
Set indices on Greek mythology
Princesses in Greek mythology
Mortal women of Zeus
Lycians
Women in Greek mythology
Laconian characters in Greek mythology
Characters in Greek mythology
Arcadian mythology
Lycia |
5658692 | https://en.wikipedia.org/wiki/GeeXboX | GeeXboX | GeeXboX (stylized as GEExBox) is a free Linux distribution providing a media center software suite for personal computers. GeeXboX 2.0 and later uses XBMC for media playback and is implemented as Live USB and Live CD options. As such, the system does not need to be permanently installed to a hard drive, as most modern operating systems would. Instead, the computer can be booted with the GeeXboX CD when media playback is desired. It is based on the Debian distribution of Linux.
This is a reasonable approach for those who do not need media playback services while performing other tasks with the same computer, for users who wish to repurpose older computers as media centers, and for those seeking a free alternative to Windows XP Media Center Edition.
An unofficial port of GeeXboX 1.x also runs on the Wii.
History
See also
List of free television software
XBMC Media Center, the cross-platform open source media player software that GeeXboX 2.0 and later uses as a front end GUI.
References
External links
ARM operating systems
Embedded Linux distributions
Free media players
Linux distributions used in appliances
Linux-based devices
Linux distributions |
290962 | https://en.wikipedia.org/wiki/Keynote%20%28presentation%20software%29 | Keynote (presentation software) | Keynote is a presentation software application developed as a part of the iWork productivity suite by Apple Inc. Version 10 of Keynote for Mac, the latest major update, was released in March 2020. On January 27, 2010, Apple announced a new version of Keynote for iPad with an all-new touch interface. It is now also available for the iPhone to download from the App Store (iOS/iPadOS).
History
Keynote began as a computer program for Apple CEO Steve Jobs to use in creating the presentations for Macworld Conference and Expo and other Apple keynote events. Prior to using Keynote, Jobs had used Concurrence, from Lighthouse Design, a similar product which ran on the NeXTSTEP and OPENSTEP platforms.
The program was first sold publicly as Keynote 1.0 in 2003, competing against existing presentation software, most notably Microsoft PowerPoint.
In 2005, Apple began selling Keynote 2.0 in conjunction with Pages, a new word processing and page layout application, in a software package called iWork. At the Macworld Conference & Expo 2006, Apple released iWork '06 with updated versions of Keynote 3.0 and Pages 2.0. In addition to official HD compatibility, Keynote 3 added new features, including group scaling, 3D charts, multi-column text boxes, auto bullets in any text field, image adjustments, and free-form masking tools. In addition, Keynote features three-dimensional transitions, such as a rotating cube or a simple flip of the slide.
In the fall of 2007, Apple released Keynote 4.0 in iWork '08, along with Pages 3.0 and the new Numbers spreadsheet application.
On October 23, 2013, Apple redesigned Keynote with version 6.0, and made it free for anyone with a new iOS device or a recently purchased Mac.
Features
Themes that allow the user to keep consistency in colors and fonts throughout the presentation, including charts, graphs and tables.
OpenGL-powered 3D slide transitions and builds that resemble rolling cubes or flipping pages, or dissolving transitions that fade one slide into the next.
Dual monitor support: the presenter can show the presentation on a screen and still see the desktop or notes from his laptop or presenter screen.
Exports to PDF, QuickTime, JPEG, TIFF, PNG, HTML (with JPEG images) and PowerPoint. Keynote also uses .key (presentation files) and .kth (theme files) bundles based on XML.
Supports all QuickTime video formats (including MPEG-2 and DV) in slideshows.
Version 3 brings export to iDVD with clickability.
Compatibility with Apple Remote and the Keynote remote application for iPhone, iPad and iPod Touch.
Keynote Remote
Keynote Remote was an iOS application that controlled Keynote presentations from an iPhone, iPod Touch or iPad over a Wi-Fi network or Bluetooth connection, and was released through the App Store. With the release of Keynote for iOS, the app was integrated into the new Keynote application, and the stand-alone app was withdrawn.
Version history
See also
Presentation program
Slideshow
Google Slides
Microsoft PowerPoint
OpenOffice.org Impress
Pages
Numbers
iWork
Office Open XML software
Prezi
Stevenote
References
External links
– official site
Keynote free resources at iWork Community
Keynote templates, shapes, and elements, free resource at KeynoteTemplate.com
Keynote templates, free resource at Wisset.com
MacOS-only software made by Apple Inc.
IOS-based software made by Apple Inc.
Presentation software
Technical communication tools
2003 software
Computer-related introductions in 2003 |
13914 | https://en.wikipedia.org/wiki/History%20of%20the%20graphical%20user%20interface | History of the graphical user interface | The history of the graphical user interface, understood as the use of graphic icons and a pointing device to control a computer, covers a five-decade span of incremental refinements, built on some constant core principles. Several vendors have created their own windowing systems based on independent code, but with basic elements in common that define the WIMP "window, icon, menu and pointing device" paradigm.
There have been important technological achievements, and enhancements to the general interaction in small steps over previous systems. There have been a few significant breakthroughs in terms of use, but the same organizational metaphors and interaction idioms are still in use. Desktop computers are often controlled by computer mice and/or keyboards while laptops often have a pointing stick or touchpad, and smartphones and tablet computers have a touchscreen. The influence of game computers and joystick operation has been omitted.
Early research and developments
Early dynamic information devices such as radar displays, where input devices were used for direct control of computer-created data, set the basis for later improvements of graphical interfaces. Some early cathode-ray-tube (CRT) screens used a light pen, rather than a mouse, as the pointing device.
The concept of a multi-panel windowing system was introduced by the first real-time graphic display systems for computers: the SAGE Project and Ivan Sutherland's Sketchpad.
Augmentation of Human Intellect (NLS)
In the 1960s, Douglas Engelbart's Augmentation of Human Intellect project at the Augmentation Research Center at SRI International in Menlo Park, California developed the oN-Line System (NLS). This computer incorporated a mouse-driven cursor and multiple windows used to work on hypertext. Engelbart had been inspired, in part, by the memex desk-based information machine suggested by Vannevar Bush in 1945.
Much of the early research was based on how young children learn. So, the design was based on the childlike primitives of eye-hand coordination, rather than use of command languages, user-defined macro procedures, or automated transformation of data as later used by adult professionals.
Given at the Association for Computing Machinery / Institute of Electrical and Electronics Engineers (ACM/IEEE)—Computer Society's Fall Joint Computer Conference in San Francisco, which was presented on December 9, 1968. It was so-called The Mother of All Demos.
Xerox PARC
led to the advances at Xerox PARC. Several people went from SRI to Xerox PARC in the early 1970s.
In 1973, Xerox PARC developed the Alto personal computer. It had a bitmapped screen, and was the first computer to demonstrate the desktop metaphor and graphical user interface (GUI). It was not a commercial product, but several thousand units were built and were heavily used at PARC, as well as other XEROX offices, and at several universities for many years. The Alto greatly influenced the design of personal computers during the late 1970s and early 1980s, notably the Three Rivers PERQ, the Apple Lisa and Macintosh, and the first Sun workstations.
The GUI was first developed at Xerox PARC by Alan Kay, Larry Tesler, Dan Ingalls, David Smith, Clarence Ellis and a number of other researchers. It used windows, icons, and menus (including the first fixed drop-down menu) to support commands such as opening files, deleting files, moving files, etc. In 1974, work began at PARC on Gypsy, the first bitmap What-You-See-Is-What-You-Get (WYSIWYG) cut & paste editor. In 1975, Xerox engineers demonstrated a Graphical User Interface "including icons and the first use of pop-up menus".
In 1981 Xerox introduced a pioneering product, Star, a workstation incorporating many of PARC's innovations. Although not commercially successful, Star greatly influenced future developments, for example at Apple, Microsoft and Sun Microsystems.
Quantel Paintbox
Released by digital imaging company Quantel in 1981, the Paintbox was a color graphical workstation with supporting of mouse input, but more oriented for graphics tablets; this model also was notable as one of the first systems with implementation of pop-up menus.
Blit
The Blit, a graphics terminal, was developed at Bell Labs in 1983.
Lisp machines, Symbolics
Lisp machines originally developed at MIT and later commercialized by Symbolics and other manufacturers, were early high-end single user computer workstations with advanced graphical user interfaces, windowing, and mouse as an input device. First workstations from Symbolics came to market in 1981, with more advanced designs in the subsequent years.
Apple Lisa and Macintosh (and later, the Apple IIgs)
Beginning in 1979, started by Steve Jobs and led by Jef Raskin, the Apple Lisa and Macintosh teams at Apple Computer (which included former members of the Xerox PARC group) continued to develop such ideas. The Lisa, released in 1983, featured a high-resolution stationery-based (document-centric) graphical interface atop an advanced hard disk based OS that featured such things as preemptive multitasking and graphically oriented inter-process communication. The comparatively simplified Macintosh, released in 1984 and designed to be lower in cost, was the first commercially successful product to use a multi-panel window interface. A desktop metaphor was used, in which files looked like pieces of paper, file directories looked like file folders, there were a set of desk accessories like a calculator, notepad, and alarm clock that the user could place around the screen as desired, and the user could delete files and folders by dragging them to a trash-can icon on the screen. The Macintosh, in contrast to the Lisa, used a program-centric rather than document-centric design. Apple revisited the document-centric design, in a limited manner, much later with OpenDoc.
There is still some controversy over the amount of influence that Xerox's PARC work, as opposed to previous academic research, had on the GUIs of the Apple Lisa and Macintosh, but it is clear that the influence was extensive, because first versions of Lisa GUIs even lacked icons. These prototype GUIs are at least mouse-driven, but completely ignored the WIMP ( "window, icon, menu, pointing device") concept. Screenshots of first GUIs of Apple Lisa prototypes show the early designs. Apple engineers visited the PARC facilities (Apple secured the rights for the visit by compensating Xerox with a pre-IPO purchase of Apple stock) and a number of PARC employees subsequently moved to Apple to work on the Lisa and Macintosh GUI. However, the Apple work extended PARC's considerably, adding manipulatable icons, and drag and drop manipulation of objects in the file system (see Macintosh Finder) for example. A list of the improvements made by Apple, beyond the PARC interface, can be read at Folklore.org. Jef Raskin warns that many of the reported facts in the history of the PARC and Macintosh development are inaccurate, distorted or even fabricated, due to the lack of usage by historians of direct primary sources.
In 1984, Apple released a television commercial which introduced the Apple Macintosh during the telecast of Super Bowl XVIII by CBS, with allusions to George Orwell's noted novel, Nineteen Eighty-Four. The commercial was aimed at making people think about computers, identifying the user-friendly interface as a personal computer which departed from previous business-oriented systems, and becoming a signature representation of Apple products.
In 1986, the Apple IIgs was launched. The IIgs was a very advanced model of the successful Apple II series, based on 16-bit technology (in fact, virtually two machines into one). It came with a new operating system, the Apple GS/OS, which features a Finder-like GUI, very similar to that of the Macintosh series, able to deal with the advanced graphic abilities of its Video Graphics Chip (VGC).
Agat
Released in 1983, the Soviet Union Agat PC featured a graphical interface and a mouse device.
SGI 1000 series and MEX
Founded 1982, SGI introduced the IRIS 1000 Series in 1983. The first graphical terminals (IRIS 1000) shipped in late 1983, and the corresponding workstation model (IRIS 1400) was released in mid-1984. The machines used an early version of the MEX windowing system on top of the GL2 Release 1 operating environment. Examples of the MEX user interface can be seen in a 1988 article in the journal "Computer Graphics", while earlier screenshots can not be found. The first commercial GUI-based systems, these did not find widespread use as to their (discounted) academic list price of $22,500 and $35,700 for the IRIS 1000 and IRIS 1400, respectively. However, these systems were commercially successful enough to start SGI's business as one of the main graphical workstation vendors. In later revisions of graphical workstations, SGI switched to the X window system, which had been developed starting at MIT since 1984 and which became the standard for UNIX workstations.
Visi On
VisiCorp's Visi On was a GUI designed to run on DOS for IBM PCs. It was released in December 1983. Visi On had many features of a modern GUI, and included a few that did not become common until many years later. It was fully mouse-driven, used a bit-mapped display for both text and graphics, included on-line help, and allowed the user to open a number of programs at once, each in its own window, and switch between them to multitask. Visi On did not, however, include a graphical file manager. Visi On also demanded a hard drive in order to implement its virtual memory system used for "fast switching", at a time when hard drives were very expensive.
GEM (Graphics Environment Manager)
Digital Research (DRI) created GEM as an add-on program for personal computers. GEM was developed to work with existing CP/M and DOS operating systems on business computers such as IBM PC compatibles. It was developed from DRI software, known as GSX, designed by a former PARC employee. Its similarity to the Macintosh desktop led to a copyright lawsuit from Apple Computer, and a settlement which involved some changes to GEM. This was to be the first of a series of "look and feel" lawsuits related to GUI design in the 1980s.
GEM received widespread use in the consumer market from 1985, when it was made the default user interface built into the Atari TOS operating system of the Atari ST line of personal computers. It was also bundled by other computer manufacturers and distributors, such as Amstrad. Later, it was distributed with the best-sold Digital Research version of DOS for IBM PC compatibles, the DR-DOS 6.0. The GEM desktop faded from the market with the withdrawal of the Atari ST line in 1992 and with the popularity of the Microsoft Windows 3.0 in the PC front around the same period of time. The Falcon030, released in 1993 was the last computer from Atari to use GEM.
DeskMate
Tandy's DeskMate appeared in the early 1980s on its TRS-80 machines and was ported to its Tandy 1000 range in 1984. Like most PC GUIs of the time, it depended on a disk operating system such as TRSDOS or MS-DOS. The application was popular at the time and included a number of programs like Draw, Text and Calendar, as well as attracting outside investment such as Lotus 1-2-3 for DeskMate.
MSX-View
MSX-View was developed for MSX computers by ASCII Corporation and HAL Laboratory. MSX-View contains software such as Page Edit, Page View, Page Link, VShell, VTed, VPaint and VDraw. An external version of the built-in MSX View of the Panasonic FS-A1GT was released as an add-on for the Panasonic FS-A1ST on disk instead of 512 KB ROM DISK.
Amiga Intuition and the Workbench
The Amiga computer was launched by Commodore in 1985 with a GUI called Workbench. Workbench was based on an internal engine developed mostly by RJ Mical, called Intuition, which drove all the input events. The first versions used a blue/orange/white/black default palette, which was selected for high contrast on televisions and composite monitors. Workbench presented directories as drawers to fit in with the "workbench" theme. Intuition was the widget and graphics library that made the GUI work. It was driven by user events through the mouse, keyboard, and other input devices.
Due to a mistake made by the Commodore sales department, the first floppies of AmigaOS (released with the Amiga1000) named the whole OS "Workbench". Since then, users and CBM itself referred to "Workbench" as the nickname for the whole AmigaOS (including Amiga DOS, Extras, etc.). This common consent ended with release of version 2.0 of AmigaOS, which re-introduced proper names to the installation floppies of AmigaDOS, Workbench, Extras, etc.
Starting with Workbench 1.0, AmigaOS treated the Workbench as a backdrop, borderless window sitting atop a blank screen. With the introduction of AmigaOS 2.0, however, the user was free to select whether the main Workbench window appeared as a normally layered window, complete with a border and scrollbars, through a menu item.
Amiga users were able to boot their computer into a command-line interface (also known as the CLI or Amiga Shell). This was a keyboard-based environment without the Workbench GUI. Later they could invoke it with the CLI/SHELL command "LoadWB" which loaded Workbench GUI.
One major difference between other OS's of the time (and for some time after) was the Amiga's fully multi-tasking operating system, a powerful built-in animation system using a hardware blitter and copper and 4 channels of 26 kHz 8-bit sampled sound. This made the Amiga the first multi-media computer years before other OS's.
Like most GUIs of the day, Amiga's Intuition followed Xerox's, and sometimes Apple's, lead. But a CLI was included which dramatically extended the functionality of the platform. However, the CLI/Shell of Amiga is not just a simple text-based interface like in MS-DOS, but another graphic process driven by Intuition, and with the same gadgets included in Amiga's graphics.library. The CLI/Shell interface integrates itself with the Workbench, sharing privileges with the GUI.
The Amiga Workbench evolved over the 1990s, even after Commodore's 1994 bankruptcy.
Acorn BBC Master Compact
Acorn's 8-bit BBC Master Compact shipped with Acorn's first public GUI interface in 1986. Little commercial software, beyond that included on the Welcome disk, was ever made available for the system, despite the claim by Acorn at the time that "the major software houses have worked with Acorn to make over 100 titles available on compilation discs at launch". The most avid supporter of the Master Compact appeared to be Superior Software, who produced and specifically labelled their games as 'Master Compact' compatible.
Arthur / RISC OS
RISC OS is a series of graphical user interface-based computer operating systems (OSes) designed for ARM architecture systems. It takes its name from the RISC (Reduced Instruction Set Computing) architecture supported. The OS was originally developed by Acorn Computers for use with their 1987 range of Archimedes personal computers using the Acorn RISC Machine (ARM) processors. It comprises a command-line interface and desktop environment with a windowing system.
Originally branded as the Arthur 1.20 the subsequent Arthur 2 release was shipped under the name RISC OS 2.
Desktop
The WIMP interface incorporates three mouse buttons (named Select, Menu and Adjust), context-sensitive menus, window order control (i.e. send to back) and dynamic window focus (a window can have input focus at any position on the stack). The Icon bar (Dock) holds icons which represent mounted disc drives, RAM discs, running applications, system utilities and docked: Files, Directories or inactive Applications. These icons have context-sensitive menus and support drag-and-drop behaviour. They represent the running application as a whole, irrespective of whether it has open windows.
The GUI is centred around the concept of files. The Filer displays the contents of a disc. Applications are run from the Filer view and files can be dragged to the Filer view from applications to perform saves. Application directories are used to store applications. The OS differentiates them from normal directories through the use of a pling (exclamation mark, also called shriek) prefix. Double-clicking on such a directory launches the application rather than opening the directory. The application's executable files and resources are contained within the directory, but normally they remain hidden from the user. Because applications are self-contained, this allows drag-and-drop installation and removal.
The Style Guide encourages a consistent look and feel across applications. This was introduced in and specifies application appearance and behaviour. Acorn's own main bundled applications were not updated to comply with the guide until 's Select release in 2001.
Font manager
The outline fonts manager provides spatial anti-aliasing of fonts, the OS being the first operating system to include such a feature, having included it since before January 1989. Since 1994, in RISC OS 3.5, it has been possible to use an outline anti-aliased font in the WindowManager for UI elements, rather than the bitmap system font from previous versions.
MS-DOS file managers and utility suites
Because most of the very early IBM PC and compatibles lacked any common true graphical capability (they used the 80-column basic text mode compatible with the original MDA display adapter), a series of file managers arose, including Microsoft's DOS Shell, which features typical GUI elements as menus, push buttons, lists with scrollbars and mouse pointer. The name text-based user interface was later invented to name this kind of interface. Many MS-DOS text mode applications, like the default text editor for MS-DOS 5.0 (and related tools, like QBasic), also used the same philosophy. The IBM DOS Shell included with IBM DOS 5.0 (circa 1992) supported both text display modes and actual graphics display modes, making it both a TUI and a GUI, depending on the chosen mode.
Advanced file managers for MS-DOS were able to redefine character shapes with EGA and better display adapters, giving some basic low resolution icons and graphical interface elements, including an arrow (instead of a coloured cell block) for the mouse pointer. When the display adapter lacks the ability to change the character's shapes, they default to the CP437 character set found in the adapter's ROM. Some popular utility suites for MS-DOS, as Norton Utilities (pictured) and PC Tools used these techniques as well.
DESQview was a text mode multitasking program introduced in July 1985. Running on top of MS-DOS, it allowed users to run multiple DOS programs concurrently in windows. It was the first program to bring multitasking and windowing capabilities to a DOS environment in which existing DOS programs could be used. DESQview was not a true GUI but offered certain components of one, such as resizable, overlapping windows and mouse pointing.
Applications under MS-DOS with proprietary GUIs
Before the MS-Windows age, and with the lack of a true common GUI under MS-DOS, most graphical applications which worked with EGA, VGA and better graphic cards had proprietary built-in GUIs. One of the best known such graphical applications was Deluxe Paint, a popular painting software with a typical WIMP interface.
The original Adobe Acrobat Reader executable file for MS-DOS was able to run on both the standard Windows 3.x GUI and the standard DOS command prompt. When it was launched from the command prompt, on a machine with a VGA graphics card, it provided its own GUI.
Microsoft Windows (16-bit versions)
Windows 1.0, a GUI for the MS-DOS operating system was released in 1985. The market's response was less than stellar. Windows 2.0 followed, but it wasn't until the 1990 launch of Windows 3.0, based on Common User Access that its popularity truly exploded. The GUI has seen minor redesigns since, mainly the networking enabled Windows 3.11 and its Win32s 32-bit patch. The 16-bit line of MS Windows were discontinued with the introduction of Windows 95 and Windows NT 32-bit based architecture in the 1990s. See the next section.
The main window of a given application can occupy the full screen in maximized status. The users must then to switch between maximized applications using the Alt+Tab keyboard shortcut; no alternative with the mouse except for de-maximize. When none of the running application windows are maximized, switching can be done by clicking on a partially visible window, as is the common way in other GUIs.
In 1988, Apple sued Microsoft for copyright infringement of the Lisa and Apple Macintosh GUI. The court case lasted 4 years before almost all of Apple's claims were denied on a contractual technicality. Subsequent appeals by Apple were also denied. Microsoft and Apple apparently entered a final, private settlement of the matter in 1997.
GEOS
GEOS was launched in 1986. Originally written for the 8-bit home computer Commodore 64 and shortly after, the Apple II series. The name was later used by the company as PC/Geos for IBM PC systems, then Geoworks Ensemble. It came with several application programs like a calendar and word processor, and a cut-down version served as the basis for America Online's DOS client. Compared to the competing Windows 3.0 GUI it could run reasonably well on simpler hardware, but its developer had a restrictive policy towards third-party developers that prevented it from becoming a serious competitor. And it was targeted at 8-bit machines and the 16-bit computer age was dawning.
The X Window System
The standard windowing system in the Unix world is the X Window System (commonly X11 or X), first released in the mid-1980s. The W Window System (1983) was the precursor to X; X was developed at MIT as Project Athena. Its original purpose was to allow users of the newly emerging graphic terminals to access remote graphics workstations without regard to the workstation's operating system or the hardware. Due largely to the availability of the source code used to write X, it has become the standard layer for management of graphical and input/output devices and for the building of both local and remote graphical interfaces on virtually all Unix, Linux and other Unix-like operating systems, with the notable exceptions of macOS and Android.
X allows a graphical terminal user to make use of remote resources on the network as if they were all located locally to the user by running a single module of software called the X server. The software running on the remote machine is called the client application. X's network transparency protocols allow the display and input portions of any application to be separated from the remainder of the application and 'served up' to any of a large number of remote users. X is available today as free software.
NeWS
The PostScript-based NeWS (Network extensible Window System) was developed by Sun Microsystems in the mid-1980s. For several years SunOS included a window system combining NeWS and the X Window System. Although NeWS was considered technically elegant by some commentators, Sun eventually dropped the product. Unlike X, NeWS was always proprietary software.
The 1990s: Mainstream usage of the desktop
The widespread adoption of the PC platform in homes and small businesses popularized computers among people with no formal training. This created a fast-growing market, opening an opportunity for commercial exploitation and of easy-to-use interfaces and making economically viable the incremental refinement of the existing GUIs for home systems.
Also, the spreading of high-color and true-color capabilities of display adapters providing thousands and millions of colors, along with faster CPUs and accelerated graphic cards, cheaper RAM, storage devices orders of magnitude larger (from megabytes to gigabytes) and larger bandwidth for telecom networking at lower cost helped to create an environment in which the common user was able to run complicated GUIs which began to favor aesthetics.
Windows 95 and "a computer in every home"
After Windows 3.11, Microsoft began to develop a new consumer-oriented version of the operating system. Windows 95 was intended to integrate Microsoft's formerly separate MS-DOS and Windows products and included an enhanced version of DOS, often referred to as MS-DOS 7.0. It also featured a significant redesign of the GUI, dubbed "Cairo". While Cairo never really materialized, parts of Cairo found their way into subsequent versions of the operating system starting with Windows 95. Both Win95 and WinNT could run 32-bit applications, and could exploit the abilities of the Intel 80386 CPU, as the preemptive multitasking and up to 4 GiB of linear address memory space. Windows 95 was touted as a 32-bit based operating system but it was actually based on a hybrid kernel (VWIN32.VXD) with the 16-bit user interface (USER.EXE) and graphic device interface (GDI.EXE) of Windows for Workgroups (3.11), which had 16-bit kernel components with a 32-bit subsystem (USER32.DLL and GDI32.DLL) that allowed it to run native 16-bit applications as well as 32-bit applications. In the marketplace, Windows 95 was an unqualified success, promoting a general upgrade to 32-bit technology, and within a year or two of its release had become the most successful operating system ever produced.
Accompanied by an extensive marketing campaign, Windows 95 was a major success in the marketplace at launch and shortly became the most popular desktop operating system.
Windows 95 saw the beginning of the browser wars, when the World Wide Web began receiving a great deal of attention in popular culture and mass media. Microsoft at first did not see potential in the Web, and Windows 95 was shipped with Microsoft's own online service called The Microsoft Network, which was dial-up only and was used primarily for its own content, not internet access. As versions of Netscape Navigator and Internet Explorer were released at a rapid pace over the following few years, Microsoft used its desktop dominance to push its browser and shape the ecology of the web mainly as a monoculture.
Windows 95 evolved through the years into Windows 98 and Windows ME. Windows ME was the last in the line of the Windows 3.x-based operating systems from Microsoft. Windows underwent a parallel 32-bit evolutionary path, where Windows NT 3.1 was released in 1993. Windows NT (for New Technology) was a native 32-bit operating system with a new driver model, was unicode-based, and provided for true separation between applications. Windows NT also supported 16-bit applications in an NTVDM, but it did not support VxD based drivers. Windows 95 was supposed to be released before 1993 as the predecessor to Windows NT. The idea was to promote the development of 32-bit applications with backward compatibility – leading the way for more successful NT release. After multiple delays, Windows 95 was released without unicode and used the VxD driver model. Windows NT 3.1 evolved to Windows NT 3.5, 3.51 and then 4.0 when it finally shared a similar interface with its Windows 9x desktop counterpart and included a Start button. The evolution continued with Windows 2000, Windows XP, Windows Vista, then Windows 7. Windows XP and higher were also made available in 64-bit modes. Windows server products branched off with the introduction of Windows Server 2003 (available in 32-bit and 64-bit IA64 or x64), then Windows Server 2008 and then Windows Server 2008 R2. Windows 2000 and XP shared the same basic GUI although XP introduced Visual Styles. With Windows 98, the Active Desktop theme was introduced, allowing an HTML approach for the desktop, but this feature was coldly received by customers, who frequently disabled it. At the end, Windows Vista definitively discontinued it, but put a new SideBar on the desktop.
Mac OS
The Macintosh's GUI has been revised multiple times since 1984, with major updates including System 7 and Mac OS 8. It underwent its largest revision to date with the introduction of the "Aqua" interface in 2001's Mac OS X. It was a new operating system built primarily on technology from NeXTSTEP with UI elements of the original Mac OS grafted on. macOS uses a technology known as Quartz, for graphics rendering and drawing on-screen. Some interface features of macOS are inherited from NeXTSTEP (such as the Dock, the automatic wait cursor, or double-buffered windows giving a solid appearance and flicker-free window redraws), while others are inherited from the old Mac OS operating system (the single system-wide menu-bar). Mac OS X 10.3 introduced features to improve usability including Exposé, which is designed to make finding open windows easier.
With Mac OS X 10.4 released in April 2005, new features were added, including Dashboard (a virtual alternate desktop for mini specific-purpose applications) and a search tool called Spotlight, which provides users with an option for searching through files instead of browsing through folders.
With Mac OS X 10.7 released in July 2011, included support for full screen apps and Mac OS X 10.11 (El Capitan) released in September 2015 support creating a full screen split view by pressing the green button on left upper corner of the window or Control+Cmd+F keyboard shortcut.
GUIs built on the X Window System
of X Window development, Sun Microsystems and AT&T attempted to push for a GUI standard called OPEN LOOK in competition with Motif. OPEN LOOK was developed from scratch in conjunction with Xerox, while Motif was a collective effort. Motif eventually gained prominence and became the basis for Hewlett-Packard's Visual User Environment (VUE), which later became the Common Desktop Environment (CDE).
In the late 1990s, there was significant growth in the Unix world, especially among the free software community. New graphical desktop movements grew up around Linux and similar operating systems, based on the X Window System. A new emphasis on providing an integrated and uniform interface to the user brought about new desktop environments, such as KDE Plasma 5, GNOME and Xfce which have supplanted CDE in popularity on both Unix and Unix-like operating systems. The Xfce, KDE and GNOME look and feel each tend to undergo more rapid change and less codification than the earlier OPEN LOOK and Motif environments.
Amiga
Later releases added improvements over the original Workbench, like support for high-color Workbench screens, context menus, and embossed 2D icons with pseudo-3D aspect. Some Amiga users preferred alternative interfaces to standard Workbench, such as Directory Opus Magellan.
The use of improved, third-party GUI engines became common amongst users who preferred more attractive interfaces – such as Magic User Interface (MUI), and ReAction. These object-oriented graphic engines driven by user interface classes and methods were then standardized into the Amiga environment and changed Amiga Workbench to a complete and modern guided interface, with new standard gadgets, animated buttons, true 24-bit-color icons, increased use of wallpapers for screens and windows, alpha channel, transparencies and shadows as any modern GUI provides.
Modern derivatives of Workbench are Ambient for MorphOS, Scalos, Workbench for AmigaOS 4 and Wanderer for AROS.
There is a brief article on Ambient and descriptions of MUI icons, menus and gadgets at aps.fr and images of Zune stay at main AROS site.
Use of object oriented graphic engines dramatically changes the look and feel of a GUI to match actual styleguides.
OS/2
Originally collaboratively developed by Microsoft and IBM to replace DOS, OS/2 version 1.0 (released in 1987) had no GUI at all. Version 1.1 (released 1988) included Presentation Manager (PM), an implementation of IBM Common User Access, which looked a lot like the later Windows 3.1 UI. After the split with Microsoft, IBM developed the Workplace Shell (WPS) for version 2.0 (released in 1992), a quite radical, object-oriented approach to GUIs. Microsoft later imitated much of this look in Windows 95.
NeXTSTEP
The NeXTSTEP user interface was used in the NeXT line of computers. NeXTSTEP's first major version was released in 1989. It used Display PostScript for its graphical underpinning. The NeXTSTEP interface's most significant feature was the Dock, carried with some modification into Mac OS X, and had other minor interface details that some found made it easier and more intuitive to use than previous GUIs. NeXTSTEP's GUI was the first to feature opaque dragging of windows in its user interface, on a comparatively weak machine by today's standards, ideally aided by high performance graphics hardware.
BeOS
BeOS was developed on custom AT&T Hobbit-based computers before switching to PowerPC hardware by a team led by former Apple executive Jean-Louis Gassée as an alternative to Mac OS. BeOS was later ported to Intel hardware. It used an object-oriented kernel written by Be, and did not use the X Window System, but a different GUI written from scratch. Much effort was spent by the developers to make it an efficient platform for multimedia applications. Be Inc. was acquired by PalmSource, Inc. (Palm Inc. at the time) in 2001. The BeOS GUI still lives in Haiku, an open-source software reimplementation of the BeOS.
Current trends
Mobile devices
General Magic is the apparent parent of all modern smartphone GUI, i.e. touch-screen based including the iPhone et al. In 2007, with the iPhone and later in 2010 with the introduction of the iPad, Apple popularized the post-WIMP style of interaction for multi-touch screens, with those devices considered to be milestones in the development of mobile devices.
Other portable devices such as MP3 players and cell phones have been a burgeoning area of deployment for GUIs in recent years. Since the mid-2000s, a vast majority of portable devices have advanced to having high-screen resolutions and sizes. (The Galaxy Note 4's 2,560 × 1,440 pixel display is an example). Because of this, these devices have their own famed user interfaces and operating systems that have large homebrew communities dedicated to creating their own visual elements, such as icons, menus, wallpapers, and more. Post-WIMP interfaces are often used in these mobile devices, where the traditional pointing devices required by the desktop metaphor are not practical.
As high-powered graphics hardware draws considerable power and generates significant heat, many of the 3D effects developed between 2000 and 2010 are not practical on this class of device. This has led to the development of simpler interfaces making a design feature of two dimensionality such as exhibited by the Metro (Modern) UI first used in Windows 8 and the 2012 Gmail redesign.
3D user interface
In the first decade of the 21st century, the rapid development of GPUs led to a trend for the inclusion of 3D effects in window management. It is based in experimental research in User Interface Design trying to expand the expressive power of the existing toolkits in order to enhance the physical cues that allow for direct manipulation. New effects common to several projects are scale resizing and zooming, several windows transformations and animations (wobbly windows, smooth minimization to system tray...), composition of images (used for window drop shadows and transparency) and enhancing the global organization of open windows (zooming to virtual desktops, desktop cube, Exposé, etc.) The proof-of-concept BumpTop desktop combines a physical representation of documents with tools for document classification possible only in the simulated environment, like instant reordering and automated grouping of related documents.
These effects are popularized thanks to the widespread use of 3D video cards (mainly due to gaming) which allow for complex visual processing with low CPU use, using the 3D acceleration in most modern graphics cards to render the application clients in a 3D scene. The application window is drawn off-screen in a pixel buffer, and the graphics card renders it into the 3D scene.
This can have the advantage of moving some of the window rendering to the GPU on the graphics card and thus reducing the load on the main CPU, but the facilities that allow this must be available on the graphics card to be able to take advantage of this.
Examples of 3D user-interface software include Xgl and Compiz from Novell, and AIGLX bundled with Red Hat Fedora. Quartz Extreme for macOS and Windows 7 and Vista's Aero interface use 3D rendering for shading and transparency effects as well as Exposé and Windows Flip and Flip 3D, respectively. Windows Vista uses Direct3D to accomplish this, whereas the other interfaces use OpenGL.
Notebook interface
The notebook interface is widely used in data science and other areas of research. Notebooks allow users to mix text, calculations, and graphs in the same interface which was previously impossible with a command-line interface.
Virtual reality and presence
Virtual reality devices such as the Oculus Rift and Sony's PlayStation VR (formerly Project Morpheus) aim to provide users with presence, a perception of full immersion into a virtual environment.
See also
Windowing system
Bill Atkinson
The Blit (graphics terminal by Rob Pike, 1982)
Direct manipulation interface
Douglas Engelbart's On-Line System
Graphical user interface
Text-based user interface
History of computing hardware
History of computer icons
Ivan Sutherland's Sketchpad
Jef Raskin
Office of the future
ETH Oberon
Xgl
AIGLX
DirectFB
Tiling window manager
Macro command language
Texting
Skeuomorph
Apple v. Microsoft
IBM Common User Access
References
External links
Raj Lal "User Interface evolution in last 50 years", Digital Design and Innovation Summit, San Francisco, Sept 20, 2013
Jeremy Reimer. "A History of the GUI" Ars Technica. May 5, 2005.
"User Interface Timeline" George Mason University
Nathan Lineback. "The Graphical User Interface Gallery". Nathan's Toasty Technology Page.
Oral history interview with Marvin L. Minsky, Charles Babbage Institute, University of Minnesota. Minsky describes artificial intelligence (AI) research at the Massachusetts Institute of Technology (MIT), including research in the areas of graphics, word processing, and time-sharing.
Oral history interview with Ivan Sutherland, Charles Babbage Institute, University of Minnesota. Sutherland describes his tenure as head of ARPA's Information Processing Techniques Office (IPTO) from 1963 to 1965, including new projects in graphics and networking.
Oral history interview with Charles A. Csuri, Charles Babbage Institute, University of Minnesota. Csuri recounts his art education and explains his transition to computer graphics in the mid-1960s, after receiving a National Science Foundation grant for research in graphics.
GUIdebook: Graphical User Interface gallery
VisiOn history – The first GUI for the PC
mprove: Historical Overview of Graphical User Interfaces
Anecdotes about the development of the Macintosh Hardware & GUI
History of human–computer interaction
History of computing |
12939 | https://en.wikipedia.org/wiki/Geometric%20algebra | Geometric algebra | In mathematics, the geometric algebra (GA) of a vector space is an algebra over a field, noted for its multiplication operation called the geometric product on a space of elements called multivectors, which contains both the scalars and the vector space .
Mathematically, a geometric algebra may be defined as the Clifford algebra of a vector space with a quadratic form. Clifford's contribution was to define a new product, the geometric product, that unified the Grassmann algebra and Hamilton's quaternion algebra into a single structure. Adding the dual of the Grassmann exterior product (the "meet") allows the use of the Grassmann–Cayley algebra, and a conformal version of the latter together with a conformal Clifford algebra yields a conformal geometric algebra (CGA) providing a framework for classical geometries. In practice, these and several derived operations allow a correspondence of elements, subspaces and operations of the algebra with geometric interpretations.
The scalars and vectors have their usual interpretation, and make up distinct subspaces of a GA. Bivectors provide a more natural representation of the pseudovector quantities in vector algebra such as oriented area, oriented angle of rotation, torque, angular momentum, electromagnetic field and the Poynting vector. A trivector can represent an oriented volume, and so on. An element called a blade may be used to represent a subspace of and orthogonal projections onto that subspace. Rotations and reflections are represented as elements. Unlike vector algebra, a GA naturally accommodates any number of dimensions and any quadratic form such as in relativity.
Examples of geometric algebras applied in physics include the spacetime algebra (and the less common algebra of physical space) and the conformal geometric algebra. Geometric calculus, an extension of GA that incorporates differentiation and integration, can be used to formulate other theories such as complex analysis and differential geometry, e.g. by using the Clifford algebra instead of differential forms. Geometric algebra has been advocated, most notably by David Hestenes and Chris Doran, as the preferred mathematical framework for physics. Proponents claim that it provides compact and intuitive descriptions in many areas including classical and quantum mechanics, electromagnetic theory and relativity. GA has also found use as a computational tool in computer graphics and robotics.
The geometric product was first briefly mentioned by Hermann Grassmann, who was chiefly interested in developing the closely related exterior algebra. In 1878, William Kingdon Clifford greatly expanded on Grassmann's work to form what are now usually called Clifford algebras in his honor (although Clifford himself chose to call them "geometric algebras"). For several decades, geometric algebras went somewhat ignored, greatly eclipsed by the vector calculus then newly developed to describe electromagnetism. The term "geometric algebra" was repopularized in the 1960s by Hestenes, who advocated its importance to relativistic physics.
Definition and notation
There are a number of different ways to define a geometric algebra. Hestenes's original approach was axiomatic, "full of geometric significance" and equivalent to the universal Clifford algebra.
Given a finite-dimensional quadratic space over a field with a symmetric bilinear form (the inner product, e.g. the Euclidean or Lorentzian metric) , the geometric algebra for this quadratic space is the Clifford algebra . As usual in this domain, for the remainder of this article, only the real case, , will be considered. The notation (respectively ) will be used to denote a geometric algebra for which the bilinear form has the signature (respectively ).
The essential product in the algebra is called the geometric product, and the product in the contained exterior algebra is called the exterior product (frequently called the wedge product and less often the outer product). It is standard to denote these respectively by juxtaposition (i.e., suppressing any explicit multiplication symbol) and the symbol . The above definition of the geometric algebra is abstract, so we summarize the properties of the geometric product by the following set of axioms. The geometric product has the following properties, for :
(closure)
, where is the identity element (existence of an identity element)
(associativity)
and (distributivity)
, where is any element of the subspace of the algebra.
The exterior product has the same properties, except that the last property above is replaced by for .
Note that in the last property above, the real number need not be nonnegative if is not positive-definite. An important property of the geometric product is the existence of elements having a multiplicative inverse. For a vector , if then exists and is equal to . A nonzero element of the algebra does not necessarily have a multiplicative inverse. For example, if is a vector in such that , the element is both a nontrivial idempotent element and a nonzero zero divisor, and thus has no inverse.
It is usual to identify and with their images under the natural embeddings and . In this article, this identification is assumed. Throughout, the terms scalar and vector refer to elements of and respectively (and of their images under this embedding).
The geometric product
For vectors and , we may write the geometric product of any two vectors and as the sum of a symmetric product and an antisymmetric product:
Thus we can define the inner product of vectors as
so that the symmetric product can be written as
Conversely, is completely determined by the algebra. The antisymmetric part is the exterior product of the two vectors, the product of the contained exterior algebra:
Then by simple addition:
the ungeneralized or vector form of the geometric product.
The inner and exterior products are associated with familiar concepts from standard vector algebra. Geometrically, and are parallel if their geometric product is equal to their inner product, whereas and are perpendicular if their geometric product is equal to their exterior product. In a geometric algebra for which the square of any nonzero vector is positive, the inner product of two vectors can be identified with the dot product of standard vector algebra. The exterior product of two vectors can be identified with the signed area enclosed by a parallelogram the sides of which are the vectors. The cross product of two vectors in dimensions with positive-definite quadratic form is closely related to their exterior product.
Most instances of geometric algebras of interest have a nondegenerate quadratic form. If the quadratic form is fully degenerate, the inner product of any two vectors is always zero, and the geometric algebra is then simply an exterior algebra. Unless otherwise stated, this article will treat only nondegenerate geometric algebras.
The exterior product is naturally extended as an associative bilinear binary operator between any two elements of the algebra, satisfying the identities
where the sum is over all permutations of the indices, with the sign of the permutation, and are vectors (not general elements of the algebra). Since every element of the algebra can be expressed as the sum of products of this form, this defines the exterior product for every pair of elements of the algebra. It follows from the definition that the exterior product forms an alternating algebra.
Blades, grades, and canonical basis
A multivector that is the exterior product of linearly independent vectors is called a blade, and is said to be of grade . A multivector that is the sum of blades of grade is called a (homogeneous) multivector of grade . From the axioms, with closure, every multivector of the geometric algebra is a sum of blades.
Consider a set of linearly independent vectors spanning an -dimensional subspace of the vector space. With these, we can define a real symmetric matrix (in the same way as a Gramian matrix)
By the spectral theorem, can be diagonalized to diagonal matrix by an orthogonal matrix via
Define a new set of vectors , known as orthogonal basis vectors, to be those transformed by the orthogonal matrix:
Since orthogonal transformations preserve inner products, it follows that and thus the are perpendicular. In other words, the geometric product of two distinct vectors is completely specified by their exterior product, or more generally
Therefore, every blade of grade can be written as a geometric product of vectors. More generally, if a degenerate geometric algebra is allowed, then the orthogonal matrix is replaced by a block matrix that is orthogonal in the nondegenerate block, and the diagonal matrix has zero-valued entries along the degenerate dimensions. If the new vectors of the nondegenerate subspace are normalized according to
then these normalized vectors must square to or . By Sylvester's law of inertia, the total number of s and the total number of s along the diagonal matrix is invariant. By extension, the total number of these vectors that square to and the total number that square to is invariant. (The total number of basis vectors that square to zero is also invariant, and may be nonzero if the degenerate case is allowed.) We denote this algebra . For example, models three-dimensional Euclidean space, relativistic spacetime and a conformal geometric algebra of a three-dimensional space.
The set of all possible products of orthogonal basis vectors with indices in increasing order, including as the empty product, forms a basis for the entire geometric algebra (an analogue of the PBW theorem). For example, the following is a basis for the geometric algebra :
A basis formed this way is called a canonical basis for the geometric algebra, and any other orthogonal basis for will produce another canonical basis. Each canonical basis consists of elements. Every multivector of the geometric algebra can be expressed as a linear combination of the canonical basis elements. If the canonical basis elements are with being an index set, then the geometric product of any two multivectors is
The terminology "-vector" is often encountered to describe multivectors containing elements of only one grade. In higher dimensional space, some such multivectors are not blades (cannot be factored into the exterior product of vectors). By way of example, in cannot be factored; typically, however, such elements of the algebra do not yield to geometric interpretation as objects, although they may represent geometric quantities such as rotations. Only and -vectors are always blades in -space.
Grade projection
Using an orthogonal basis, a graded vector space structure can be established. Elements of the geometric algebra that are scalar multiples of are grade- blades and are called scalars. Multivectors that are in the span of are grade- blades and are the ordinary vectors. Multivectors in the span of are grade- blades and are the bivectors. This terminology continues through to the last grade of -vectors. Alternatively, grade- blades are called pseudoscalars, grade- blades pseudovectors, etc. Many of the elements of the algebra are not graded by this scheme since they are sums of elements of differing grade. Such elements are said to be of mixed grade. The grading of multivectors is independent of the basis chosen originally.
This is a grading as a vector space, but not as an algebra. Because the product of an -blade and an -blade is contained in the span of through -blades, the geometric algebra is a filtered algebra.
A multivector may be decomposed with the grade-projection operator , which outputs the grade- portion of . As a result:
As an example, the geometric product of two vectors since and and , for other than and .
The decomposition of a multivector may also be split into those components that are even and those that are odd:
This is the result of forgetting structure from a -graded vector space to -graded vector space. The geometric product respects this coarser grading. Thus in addition to being a -graded vector space, the geometric algebra is a -graded algebra or superalgebra.
Restricting to the even part, the product of two even elements is also even. This means that the even multivectors defines an even subalgebra. The even subalgebra of an -dimensional geometric algebra is isomorphic (without preserving either filtration or grading) to a full geometric algebra of dimensions. Examples include and .
Representation of subspaces
Geometric algebra represents subspaces of as blades, and so they coexist in the same algebra with vectors from . A -dimensional subspace of is represented by taking an orthogonal basis and using the geometric product to form the blade . There are multiple blades representing ; all those representing are scalar multiples of . These blades can be separated into two sets: positive multiples of and negative multiples of . The positive multiples of are said to have the same orientation as , and the negative multiples the opposite orientation.
Blades are important since geometric operations such as projections, rotations and reflections depend on the factorability via the exterior product that (the restricted class of) -blades provide but that (the generalized class of) grade- multivectors do not when .
Unit pseudoscalars
Unit pseudoscalars are blades that play important roles in GA. A unit pseudoscalar for a non-degenerate subspace of is a blade that is the product of the members of an orthonormal basis for . It can be shown that if and are both unit pseudoscalars for , then and . If one doesn't choose an orthonormal basis for , then the Plücker embedding gives a vector in the exterior algebra but only up to scaling. Using the vector space isomorphism between the geometric algebra and exterior algebra, this gives the equivalence class of for all . Orthonormality gets rid of this ambiguity except for the signs above.
Suppose the geometric algebra with the familiar positive definite inner product on is formed. Given a plane (two-dimensional subspace) of , one can find an orthonormal basis spanning the plane, and thus find a unit pseudoscalar representing this plane. The geometric product of any two vectors in the span of and lies in , that is, it is the sum of a -vector and a -vector.
By the properties of the geometric product, . The resemblance to the imaginary unit is not incidental: the subspace is -algebra isomorphic to the complex numbers. In this way, a copy of the complex numbers is embedded in the geometric algebra for each two-dimensional subspace of on which the quadratic form is definite.
It is sometimes possible to identify the presence of an imaginary unit in a physical equation. Such units arise from one of the many quantities in the real algebra that square to , and these have geometric significance because of the properties of the algebra and the interaction of its various subspaces.
In , a further familiar case occurs. Given a canonical basis consisting of orthonormal vectors of , the set of all -vectors is spanned by
Labelling these , and (momentarily deviating from our uppercase convention), the subspace generated by -vectors and -vectors is exactly . This set is seen to be the even subalgebra of , and furthermore is isomorphic as an -algebra to the quaternions, another important algebraic system.
Dual basis
Let be a basis of , i.e. a set of linearly independent vectors that span the -dimensional vector space . The basis that is dual to is the set of elements of the dual vector space that forms a biorthogonal system with this basis, thus being the elements denoted satisfying
where is the Kronecker delta.
Given a nondegenerate quadratic form on , becomes naturally identified with , and the dual basis may be regarded as elements of , but are not in general the same set as the original basis.
Given further a GA of , let
be the pseudoscalar (which does not necessarily square to ) formed from the basis . The dual basis vectors may be constructed as
where the denotes that the th basis vector is omitted from the product.
Extensions of the inner and exterior products
It is common practice to extend the exterior product on vectors to the entire algebra. This may be done through the use of the above mentioned grade projection operator:
(the exterior product)
This generalization is consistent with the above definition involving antisymmetrization. Another generalization related to the exterior product is the commutator product:
(the commutator product)
The regressive product (usually referred to as the "meet") is the dual of the exterior product (or "join" in this context). The dual specification of elements permits, for blades and , the intersection (or meet) where the duality is to be taken relative to the smallest grade blade containing both and (the join).
with the unit pseudoscalar of the algebra. The regressive product, like the exterior product, is associative.
The inner product on vectors can also be generalized, but in more than one non-equivalent way. The paper gives a full treatment of several different inner products developed for geometric algebras and their interrelationships, and the notation is taken from there. Many authors use the same symbol as for the inner product of vectors for their chosen extension (e.g. Hestenes and Perwass). No consistent notation has emerged.
Among these several different generalizations of the inner product on vectors are:
(the left contraction)
(the right contraction)
(the scalar product)
(the "(fat) dot" product)
makes an argument for the use of contractions in preference to Hestenes's inner product; they are algebraically more regular and have cleaner geometric interpretations.
A number of identities incorporating the contractions are valid without restriction of their inputs.
For example,
Benefits of using the left contraction as an extension of the inner product on vectors include that the identity is extended to for any vector and multivector , and that the projection operation is extended to for any blade and any multivector (with a minor modification to accommodate null , given below).
Linear functions
Although a versor is easier to work with because it can be directly represented in the algebra as a multivector, versors are a subgroup of linear functions on multivectors, which can still be used when necessary. The geometric algebra of an -dimensional vector space is spanned by a basis of elements. If a multivector is represented by a real column matrix of coefficients of a basis of the algebra, then all linear transformations of the multivector can be expressed as the matrix multiplication by a real matrix. However, such a general linear transformation allows arbitrary exchanges among grades, such as a "rotation" of a scalar into a vector, which has no evident geometric interpretation.
A general linear transformation from vectors to vectors is of interest. With the natural restriction to preserving the induced exterior algebra, the outermorphism of the linear transformation is the unique extension of the versor. If is a linear function that maps vectors to vectors, then its outermorphism is the function that obeys the rule
for a blade, extended to the whole algebra through linearity.
Modeling geometries
Although a lot of attention has been placed on CGA, it is to be noted that GA is not just one algebra, it is one of a family of algebras with the same essential structure.
Vector space model
may be considered as an extension or completion of vector algebra. From Vectors to Geometric Algebra covers basic analytic geometry and gives an introduction to stereographic projection.
The even subalgebra of is isomorphic to the complex numbers, as may be seen by writing a vector in terms of its components in an orthonormal basis and left multiplying by the basis vector , yielding
where we identify since
Similarly, the even subalgebra of with basis is isomorphic to the quaternions as may be seen by identifying , and .
Every associative algebra has a matrix representation; replacing the three Cartesian basis vectors by the Pauli matrices gives a representation of :
Dotting the "Pauli vector" (a dyad):
with arbitrary vectors and and multiplying through gives:
(Equivalently, by inspection, )
Spacetime model
In physics, the main applications are the geometric algebra of Minkowski 3+1 spacetime, , called spacetime algebra (STA), or less commonly, , interpreted the algebra of physical space (APS).
While in STA points of spacetime are represented simply by vectors, in APS, points of -dimensional spacetime are instead represented by paravectors: a three-dimensional vector (space) plus a one-dimensional scalar (time).
In spacetime algebra the electromagnetic field tensor has a bivector representation . Here, the is the unit pseudoscalar (or four-dimensional volume element), is the unit vector in time direction, and and are the classic electric and magnetic field vectors (with a zero time component). Using the four-current , Maxwell's equations then become
{|class="wikitable" style="text-align: center;"
|-
! scope="column" style="width:160px;"|Formulation
!| Homogeneous equations
!| Non-homogeneous equations
|-
! rowspan="2" |Fields
| colspan="2" |
|-
|
|
|-
!Potentials (any gauge)
||
||
|-
!Potentials (Lorenz gauge)
||
||
|}
In geometric calculus, juxtapositioning of vectors such as in indicate the geometric product and can be decomposed into parts as . Here is the covector derivative in any spacetime and reduces to in flat spacetime. Where plays a role in Minkowski -spacetime which is synonymous to the role of in Euclidean -space and is related to the d'Alembertian by . Indeed, given an observer represented by a future pointing timelike vector we have
Boosts in this Lorentzian metric space have the same expression as rotation in Euclidean space, where is the bivector generated by the time and the space directions involved, whereas in the Euclidean case it is the bivector generated by the two space directions, strengthening the "analogy" to almost identity.
The Dirac matrices are a representation of , showing the equivalence with matrix representations used by physicists.
Homogeneous model
The first model here is , the GA version of homogeneous coordinates used in projective geometry. Here a vector represents a point and an outer product of vectors an oriented length yet we may work with the algebra in just the same way as in . However, a useful inner product cannot be defined in the space and so there is no geometric product either leaving only outer product and non-metric uses of duality such as meet and join.
Nevertheless, there has been investigation of four-dimensional alternatives to the full five-dimensional CGA for limited geometries such as rigid body movements. A selection of these can be found in Part IV of Guide to Geometric Algebra in Practice. Note that the algebra appears as a subalgebra of CGA by selecting just one null basis vector and dropping the other and further that the "motor algebra" (isomorphic to dual quaternions) is the even subalgebra of .
Conformal model
A compact description of the current state of the art is provided by , which also includes further references, in particular to . Other useful references are and .
Working within GA, Euclidean space (along with a conformal point at infinity) is embedded projectively in the CGA via the identification of Euclidean points with 1D subspaces in the 4D null cone of the 5D CGA vector subspace. This allows all conformal transformations to be done as rotations and reflections and is covariant, extending incidence relations of projective geometry to circles and spheres.
Specifically, we add orthogonal basis vectors and such that and to the basis of the vector space that generates and identify null vectors
as a conformal point at infinity (see Compactification) and
as the point at the origin, giving
.
This procedure has some similarities to the procedure for working with homogeneous coordinates in projective geometry and in this case allows the modeling of Euclidean transformations of as orthogonal transformations of a subset of .
A fast changing and fluid area of GA, CGA is also being investigated for applications to relativistic physics.
Models for projective transformation
Two potential candidates are currently under investigation as the foundation for affine and projective geometry in three dimensions and which includes representations for shears and non-uniform scaling, as well as quadric surfaces and conic sections.
A new research model, Quadric Conformal Geometric Algebra (QCGA) is an extension of CGA, dedicated to quadric surfaces. The idea is to represent the objects in low dimensional subspaces of the algebra. QCGA is capable of constructing quadric surfaces either using control points or implicit equations. Moreover, QCGA can compute the intersection of quadric surfaces, as well as, the surface tangent and normal vectors at a point that lies in the quadric surface.
Geometric interpretation
Projection and rejection
For any vector and any invertible vector ,
where the projection of onto (or the parallel part) is
and the rejection of from (or the orthogonal part) is
Using the concept of a -blade as representing a subspace of and every multivector ultimately being expressed in terms of vectors, this generalizes to projection of a general multivector onto any invertible -blade as
with the rejection being defined as
The projection and rejection generalize to null blades by replacing the inverse with the pseudoinverse with respect to the contractive product. The outcome of the projection coincides in both cases for non-null blades. For null blades , the definition of the projection given here with the first contraction rather than the second being onto the pseudoinverse should be used, as only then is the result necessarily in the subspace represented by .
The projection generalizes through linearity to general multivectors . The projection is not linear in and does not generalize to objects that are not blades.
Reflection
Simple reflections in a hyperplane are readily expressed in the algebra through conjugation with a single vector. These serve to generate the group of general rotoreflections and rotations.
The reflection of a vector along a vector , or equivalently in the hyperplane orthogonal to , is the same as negating the component of a vector parallel to . The result of the reflection will be
This is not the most general operation that may be regarded as a reflection when the dimension . A general reflection may be expressed as the composite of any odd number of single-axis reflections. Thus, a general reflection of a vector may be written
where
and
If we define the reflection along a non-null vector of the product of vectors as the reflection of every vector in the product along the same vector, we get for any product of an odd number of vectors that, by way of example,
and for the product of an even number of vectors that
Using the concept of every multivector ultimately being expressed in terms of vectors, the reflection of a general multivector using any reflection versor may be written
where is the automorphism of reflection through the origin of the vector space () extended through linearity to the whole algebra.
Rotations
If we have a product of vectors then we denote the reverse as
As an example, assume that we get
Scaling so that then
so leaves the length of unchanged. We can also show that
so the transformation preserves both length and angle. It therefore can be identified as a rotation or rotoreflection; is called a rotor if it is a proper rotation (as it is if it can be expressed as a product of an even number of vectors) and is an instance of what is known in GA as a versor.
There is a general method for rotating a vector involving the formation of a multivector of the form that produces a rotation in the plane and with the orientation defined by a -blade .
Rotors are a generalization of quaternions to -dimensional spaces.
Versor
A -versor is a multivector that can be expressed as the geometric product of invertible vectors. Unit quaternions (originally called versors by Hamilton) may be identified with rotors in 3D space in much the same way as real 2D rotors subsume complex numbers; for the details refer to Dorst.
Some authors use the term “versor product” to refer to the frequently occurring case where an operand is "sandwiched" between operators. The descriptions for rotations and reflections, including their outermorphisms, are examples of such sandwiching. These outermorphisms have a particularly simple algebraic form. Specifically, a mapping of vectors of the form
extends to the outermorphism
Since both operators and operand are versors there is potential for alternative examples such as rotating a rotor or reflecting a spinor always provided that some geometrical or physical significance can be attached to such operations.
By the Cartan–Dieudonné theorem we have that every isometry can be given as reflections in hyperplanes and since composed reflections provide rotations then we have that orthogonal transformations are versors.
In group terms, for a real, non-degenerate , having identified the group as the group of all invertible elements of , Lundholm gives a proof that the "versor group" (the set of invertible versors) is equal to the Lipschitz group ( Clifford group, although Lundholm deprecates this usage).
Subgroups of
Lundholm defines the , , and subgroups, generated by unit vectors, and in the case of and , only an even number of such vector factors can be present.
Spinors are defined as elements of the even subalgebra of a real GA; an analysis of the GA approach to spinors is given by Francis and Kosowsky.
Examples and applications
Hypervolume of a parallelotope spanned by vectors
For vectors and spanning a parallelogram we have
with the result that is linear in the product of the "altitude" and the "base" of the parallelogram, that is, its area.
Similar interpretations are true for any number of vectors spanning an -dimensional parallelotope; the exterior product of vectors , that is , has a magnitude equal to the volume of the -parallelotope. An -vector does not necessarily have a shape of a parallelotope – this is a convenient visualization. It could be any shape, although the volume equals that of the parallelotope.
Intersection of a line and a plane
We may define the line parametrically by where and are position vectors for points P and T and is the direction vector for the line.
Then
and
so
and
Rotating systems
The mathematical description of rotational forces such as torque and angular momentum often makes use of the cross product of vector calculus in three dimensions with a convention of orientation (handedness).
The cross product can be viewed in terms of the exterior product allowing a more natural geometric interpretation of the cross product as a bivector using the dual relationship
For example, torque is generally defined as the magnitude of the perpendicular force component times distance, or work per unit angle.
Suppose a circular path in an arbitrary plane containing orthonormal vectors and is parameterized by angle.
By designating the unit bivector of this plane as the imaginary number
this path vector can be conveniently written in complex exponential form
and the derivative with respect to angle is
So the torque, the rate of change of work , due to a force , is
Unlike the cross product description of torque, , the geometric algebra description does not introduce a vector in the normal direction; a vector that does not exist in two and that is not unique in greater than three dimensions. The unit bivector describes the plane and the orientation of the rotation, and the sense of the rotation is relative to the angle between the vectors and .
Geometric calculus
Geometric calculus extends the formalism to include differentiation and integration including differential geometry and differential forms.
Essentially, the vector derivative is defined so that the GA version of Green's theorem is true,
and then one can write
as a geometric product, effectively generalizing Stokes' theorem (including the differential form version of it).
In when is a curve with endpoints and , then
reduces to
or the fundamental theorem of integral calculus.
Also developed are the concept of vector manifold and geometric integration theory (which generalizes differential forms).
History
Before the 20th century
Although the connection of geometry with algebra dates as far back at least to Euclid's Elements in the third century B.C. (see Greek geometric algebra), GA in the sense used in this article was not developed until 1844, when it was used in a systematic way to describe the geometrical properties and transformations of a space. In that year, Hermann Grassmann introduced the idea of a geometrical algebra in full generality as a certain calculus (analogous to the propositional calculus) that encoded all of the geometrical information of a space. Grassmann's algebraic system could be applied to a number of different kinds of spaces, the chief among them being Euclidean space, affine space, and projective space. Following Grassmann, in 1878 William Kingdon Clifford examined Grassmann's algebraic system alongside the quaternions of William Rowan Hamilton in . From his point of view, the quaternions described certain transformations (which he called rotors), whereas Grassmann's algebra described certain properties (or Strecken such as length, area, and volume). His contribution was to define a new product — the geometric product – on an existing Grassmann algebra, which realized the quaternions as living within that algebra. Subsequently, Rudolf Lipschitz in 1886 generalized Clifford's interpretation of the quaternions and applied them to the geometry of rotations in dimensions. Later these developments would lead other 20th-century mathematicians to formalize and explore the properties of the Clifford algebra.
Nevertheless, another revolutionary development of the 19th-century would completely overshadow the geometric algebras: that of vector analysis, developed independently by Josiah Willard Gibbs and Oliver Heaviside. Vector analysis was motivated by James Clerk Maxwell's studies of electromagnetism, and specifically the need to express and manipulate conveniently certain differential equations. Vector analysis had a certain intuitive appeal compared to the rigors of the new algebras. Physicists and mathematicians alike readily adopted it as their geometrical toolkit of choice, particularly following the influential 1901 textbook Vector Analysis by Edwin Bidwell Wilson, following lectures of Gibbs.
In more detail, there have been three approaches to geometric algebra: quaternionic analysis, initiated by Hamilton in 1843 and geometrized as rotors by Clifford in 1878; geometric algebra, initiated by Grassmann in 1844; and vector analysis, developed out of quaternionic analysis in the late 19th century by Gibbs and Heaviside. The legacy of quaternionic analysis in vector analysis can be seen in the use of , , to indicate the basis vectors of : it is being thought of as the purely imaginary quaternions. From the perspective of geometric algebra, the even subalgebra of the Space Time Algebra is isomorphic to the GA of 3D Euclidean space and quaternions are isomorphic to the even subalgebra of the GA of 3D Euclidean space, which unifies the three approaches.
20th century and present
Progress on the study of Clifford algebras quietly advanced through the twentieth century, although largely due to the work of abstract algebraists such as Hermann Weyl and Claude Chevalley. The geometrical approach to geometric algebras has seen a number of 20th-century revivals. In mathematics, Emil Artin's Geometric Algebra discusses the algebra associated with each of a number of geometries, including affine geometry, projective geometry, symplectic geometry, and orthogonal geometry. In physics, geometric algebras have been revived as a "new" way to do classical mechanics and electromagnetism, together with more advanced topics such as quantum mechanics and gauge theory. David Hestenes reinterpreted the Pauli and Dirac matrices as vectors in ordinary space and spacetime, respectively, and has been a primary contemporary advocate for the use of geometric algebra.
In computer graphics and robotics, geometric algebras have been revived in order to efficiently represent rotations and other transformations. For applications of GA in robotics (screw theory, kinematics and dynamics using versors), computer vision, control and neural computing (geometric learning) see Bayro (2010).
Conferences and Journals
The main conferences in this subject include the International Conference on Clifford Algebras and their Applications in Mathematical Physics (ICCA) and Applications of Geometric Algebra in Computer Science and Engineering (AGACSE) series. A main publication outlet is the Springer journal Advances in Applied Clifford Algebras.
Software
GA is a very application-oriented subject. There is a reasonably steep initial learning curve associated with it, but this can be eased somewhat by the use of applicable software. The following is a list of freely available software that does not require ownership of commercial software or purchase of any commercial products for this purpose:
Actively developed open source projects
clifford - Numeric Geometric Algebra Module for Python.
galgebra - Symbolic Geometric Algebra Module for Python by Alan Bromborsky (uses sympy).
GATL - A template C++ library that uses the lazy evaluation strategy to automatically execute low-level algebraic manipulations in compile time in order to produce more efficient programs.
ganja.js - Geometric Algebra for Javascript (with operator overloading and algebraic literals).
klein - Production-oriented SSE-optimized C++ library, specializing in the dual 3D Projective Geometric Algebra .
Versor, A lightweight templated C++ Library with an OpenGL interface for efficient geometric algebra programming in arbitrary metrics, including conformal.
Grassmann.jl - Conformal geometric product algebra based on static dual multivectors with graded-blade indexing (written in Julia language).
Terathon Math Library - Production-quality C++ library by Eric Lengyel that includes the direct 3D Projective Geometric Algebra .
Other projects
GA Viewer Fontijne, Dorst, Bouma & Mann
GAwxM GitHub - GA using wxMaxima, Open Source software using a free Computer Algebra System, includes readme files for motivation and setup.
clifford GitHub - Clifford algebra and geometric calculus in Maxima based on indicial representation.
CLUViz Perwass
Software allowing script creation and including sample visualizations, manual and GA introduction.
Gaigen Fontijne
For programmers, this is a code generator with support for C, C++, C# and Java.
Cinderella Visualizations Hitzer and Dorst.
Gaalop Standalone GUI-Application that uses the Open-Source Computer Algebra Software Maxima to break down CLUViz code into C/C++ or Java code.
Gaalop Precompiler Precompiler based on Gaalop integrated with CMake.
Gaalet, C++ Expression Template Library Seybold.
Clifford Algebra with Mathematica clifford.m
Clifford Algebra with GiNaC built-in classes
Benchmark project
ga-benchmark - A benchmark for C/C++ Geometric Algebra libraries and library generators. The latest results of the ga-benchmark can be found here.
See also
Comparison of vector algebra and geometric algebra
Clifford algebra
Grassmann–Cayley algebra
Spacetime algebra
Spinor
Quaternion
Algebra of physical space
Universal geometric algebra
Notes
Citations
References and further reading
Arranged chronologically
. Chapter 1 as PDF
Extract online at http://geocalc.clas.asu.edu/html/UAFCG.html #5 New Tools for Computational Geometry and rejuvenation of Screw Theory
External links
A Survey of Geometric Algebra and Geometric Calculus Alan Macdonald, Luther College, Iowa.
Imaginary Numbers are not Real – the Geometric Algebra of Spacetime. Introduction (Cambridge GA group).
Geometric Algebra 2015, Masters Course in Scientific Computing, from Dr. Chris Doran (Cambridge).
Maths for (Games) Programmers: 5 – Multivector methods. Comprehensive introduction and reference for programmers, from Ian Bell.
IMPA Summer School 2010 Fernandes Oliveira Intro and Slides.
University of Fukui E.S.M. Hitzer and Japan GA publications.
Google Group for GA
Geometric Algebra Primer Introduction to GA, Jaap Suter.
Geometric Algebra Resources curated wiki, Pablo Bleyer.
Applied Geometric Algebras in Computer Science and Engineering 2018 Early Proceedings
GAME2020 Geometric Algebra Mini Event
AGACSE 2021 Videos
English translations of early books and papers
G. Combebiac, "calculus of tri-quaternions" (Doctoral dissertation)
M. Markic, "Transformants: A new mathematical vehicle. A synthesis of Combebiac's tri-quaternions and Grassmann's geometric system. The calculus of quadri-quaternions"
C. Burali-Forti, "The Grassmann method in projective geometry" A compilation of three notes on the application of exterior algebra to projective geometry
C. Burali-Forti, "Introduction to Differential Geometry, following the method of H. Grassmann" Early book on the application of Grassmann algebra
H. Grassmann, "Mechanics, according to the principles of the theory of extension" One of his papers on the applications of exterior algebra.
Research groups
Geometric Calculus International. Links to Research groups, Software, and Conferences, worldwide.
Cambridge Geometric Algebra group. Full-text online publications, and other material.
University of Amsterdam group
Geometric Calculus research & development (Arizona State University).
GA-Net blog and newsletter archive. Geometric Algebra/Clifford Algebra development news.
Geometric Algebra for Perception Action Systems. Geometric Cybernetics Group (CINVESTAV, Campus Guadalajara, Mexico). |
29409644 | https://en.wikipedia.org/wiki/Elixir%20%28Fourplay%20album%29 | Elixir (Fourplay album) | Elixir is the third studio album by Fourplay, released in 1995. Among the guest vocalists on this album are Phil Collins, Patti Austin, and Peabo Bryson.
Track listing
Personnel
Fourplay
Bob James – Yamaha C7 MIDI grand piano, keyboards, synthesizers, programming, synthesizer orchestrations arrangements (4, 8)
Lee Ritenour – electric guitars, classical guitar, guitar synthesizer, additional synthesizer and computer programming, arrangements (3)
Nathan East – 5 and 6-string bass guitars, fretless bass, vocals (5, 9), vocal arrangements (8), arrangements (8), scat (9)
Harvey Mason – drums, percussion, bongos, marimba, Jew's harp, arrangements (8)
Additional Musicians
Harvey Mason, Jr. – synthesizer and computer programming, vocal arrangements (11)
Ken Freeman – additional synthesizer and computer programming
Phil Collins – vocals (4)
Patti Austin – vocals (8)
Peabo Bryson – vocals (8)
Vern Arnold – backing vocals (11)
Cisco – backing vocals (11)
Heather Mason – backing vocals (11)
Production
Fourplay – producers
Bob James – executive producer
Nathan East – vocal producer (8)
Don Murray – recording, mixing
Thom Kidd – additional recording
Harvey Mason, Jr. – additional recording
Lee Ritenour – additional recording
Mike Kloster – assistant engineer
Kevin Lively – assistant engineer
Robert Vosgien – digital editing
Wally Traugott – mastering
Linda Cobb – art direction, design
James Minchin – photography
Studios
Recorded at Sunset Sound (Hollywood, CA); Masong Studios (Los Angeles, CA); Starlight Studios (Malibu, CA); DARP Studios (Atlanta, GA); Remidi Studios (Ardsley-On-Hudson, NY).
Edited at CMS Digital (Pasadena, CA).
Mastered at Capitol Mastering (Hollywood, CA).
Reception
References
1994 albums
Fourplay albums
Warner Records albums |
64333437 | https://en.wikipedia.org/wiki/Mac%20transition%20to%20Apple%20silicon | Mac transition to Apple silicon | The Mac transition to Apple silicon is the process of changing the central processing units (CPUs) of Apple Inc.'s line of Mac computers from Intel's x86-64 processors to Apple-designed systems on a chip that use the ARM64 architecture. CEO Tim Cook announced a "two-year transition plan" in his WWDC keynote address on June 22, 2020, and the first Macs with Apple-designed systems on a chip were released that November.
This is the third time Apple has switched the Macintosh to a new instruction set architecture. The first was from the Motorola 68000 series to PowerPC chips in 1994 and the second from PowerPC to Intel processors using the x86 architecture in 2005–2006.
Background
The Macintosh was initially based on the Motorola 68000 architecture, switching, after evaluating several possibilities, to the PowerPC family Apple co-developed with IBM, and Motorola, in the early 1990s. With its third architecture switch, starting in 2005, to Intel x86, and later to AMD-x64, with macOS Catalina dropping support for the 32-bit x86 architecture, in 2019.
Apple's ATG had spotted Acorn's ARM architecture, in 1985, and considered it as a possible replacement for either the MOS 6502 of the Apple II range, the 68000 of the original Macintosh, or use in a tablet device, under Paul Gavarini and Tom Pittard, in a project labelled Möbius. A partnership was established with Acorn Computers, and VLSI in 1990, and the later option taken up, with an ARM SoC appearing in the 1993 Newton personal digital assistant, followed by the iPod in 2001 and the iPhone in 2007. Apple has designed its own custom ARM chips since 2009, which it has officially deployed since 2010 in its iPhone, iPad, iPod, Apple TV and Apple Watch product lines, as well as AirPods, Beats and HomePod. Between October 2016 and August 2020, Intel-based Macs with Apple-designed ARM co-processors were released.
In the 2010s, media reports documented Apple's frustrations and challenges with the pace and quality of Intel's technology development. Apple reportedly had trouble with Intel modems for iPhones in 2017 due to technical issues and missed deadlines. Meanwhile, a 2018 report suggested that Intel chip issues prompted a redesign of the MacBook. In 2019, Apple blamed Intel processor shortages for a decline in Mac sales. In June 2020, former Intel principal engineer François Piednoël said Intel's "abnormally bad" quality assurance in its Skylake processors, making Apple "the number one filer of problems in the architecture", helped Apple decide to migrate. Intel CTO Mike Mayberry countered that quality assurance problems may arise at large scale from any CPU vendor.
History
Early involvement with ARM
In 1983, Acorn Computers started working on a project to design its own CPU architecture and instructions set, called the Acorn RISC Machine (ARM). In 1985, Apple's Advanced Technology Group worked with Acorn to create an experimental prototype, code-named Mobius, to replace the Apple II, using a modified ARM processor. The project was cancelled but Apple again partnered with Acorn when it needed a low-power, efficient processor for its future Newton PDA. In 1990, a new joint-venture was created between Acorn, Apple and VLSI Technology with the goal of pursuing the development of the ARM processor. The company was named Advanced RISC Machines Ltd, becoming the new meaning of the ARM acronym. One of the first designs of the new company would be the ARM610 SoC, initially for Apple, that allowed the Endianness to be swapped, increased the address space from 26 bit (64 MB) to 32 bit (4 GB), and modified the memory management unit. Apple held a 43% stake in the company, which was reduced to 14.8% in 1999.
Transition from PowerPC to Intel
Since Apple's 2005–2006 transition to Intel processors, all Macintosh computers, until the transition to Apple silicon, have used Intel's x86 CPU architecture. During his 2005 WWDC keynote address, Steve Jobs noted that Intel-based processors outperformed IBM's PowerPC processors in terms of energy consumption, and that if Apple continued to rely on PowerPC technology, it would be unable to build the future Macs it envisioned, including higher-performance workstation computers and advanced laptops for a rapidly growing laptop market: "As we look ahead, we can envision some amazing products we want to build ... And we don't know how to build them with the future PowerPC roadmap."
By June 2006, only Apple's high-end desktop computer and server product were still using PowerPC processors. The hardware transition was completed when Intel-based Mac Pros and Xserve computers were announced in August 2006 and shipped by the end of the year.
Apple ceased support for booting on PowerPC as of Mac OS X 10.6 "Snow Leopard" in August 2009, three years after the transition was complete. Support for PowerPC applications via Rosetta was dropped from macOS in 10.7 "Lion" in July 2011, five years after the transition was complete.
Processor development
In 2008, Apple bought processor company P.A. Semi for million. At the time, it was reported that Apple bought P.A. Semi for its intellectual property and engineering talent. CEO Steve Jobs later claimed that P.A. Semi would develop system-on-chips for Apple's iPods and iPhones. Following the acquisition, Apple signed a rare "Architecture licence" with ARM, allowing the company to design its own core, using the ARM instruction set. The first Apple-designed chip was the A4, released in 2010, which debuted in the first-generation iPad, then in the iPhone 4. Apple subsequently released a number of products with its own processors.
Rumors of Apple shifting Macintosh to custom-designed ARM processors began circulating in 2011, when SemiAccurate predicted it would happen by mid-2013. In 2014, MacRumors reported that Apple was testing an ARM-based Mac prototype with a large Magic Trackpad. In 2018, Bloomberg reported that Apple was planning to use its own chips based on the ARM architecture beginning in 2020.
The Apple A12X processor used in the 2018 iPad Pro reportedly roughly matches the performance of Intel's Core i7 processor used in the MacBook Pro at the time.
In the months and weeks leading up to Apple's 2020 WWDC, multiple media reports anticipated an official announcement of the transition during the event.
Transition process
2020
Apple announced its plans to shift the Macintosh platform to Apple silicon in a series of WWDC presentations in June 2020. The entire transition of the Macintosh product line is expected to take "about two years", with the first ARM-based Macs released by the end of 2020. Similar language was used during Apple's 2005–2006 transition to Intel, which actually took about one year.
All Apple apps included with macOS Big Sur release are compatible with x86-64 and ARM architectures. Many third-party apps are similarly being made dual-platform, including prominent software packages such as Adobe Photoshop, Final Cut Pro, and Microsoft Word.
To enable x86-native software to run on new ARM-based Macs, Rosetta 2 dynamic binary translation software is transparently embedded in macOS Big Sur. Universal binary 2 enables application developers to support both x86-64 and ARM64.
To allow developers to prepare their software for a smooth user experience on ARM-based Macs, they were given the option to sign up for a one year membership to the Universal App Quick Start Program which provided a couple of benefits. One of which was a license to use a Developer Transition Kit (DTK), temporarily made available by Apple. This Developer Transition Kit uses the A12Z chip, originally used in the iPad Pro (4th generation), housed inside a Mac Mini case. In an interview shortly after the announcement of the transition, Apple senior vice president of Software Engineering Craig Federighi praised the performance of the DTK Apple's prototype ARM-based Mac.
On November 10, 2020, Apple announced the Apple M1, its first ARM-based system on a chip to be used in Macs, alongside updated models of the Mac Mini, MacBook Air and 13-inch MacBook Pro based on it.
2021
In April 2021, the iMac and iPad Pro were refreshed to include the M1.
In October 2021, Apple announced two professional systems on a chip, the M1 Pro and M1 Max, and updated 14-inch and 16-inch MacBook Pro models based on them. The M1 Pro and M1 Max use integrated Apple-designed GPUs, replacing the integrated and discrete GPUs supplied by Intel and AMD, and do not support external GPUs. Apple discontinued all of their Intel-based laptops following the announcement.
Impact
In June 2020, tech analyst Daniel Newman estimated that Apple accounted for $1.5 billion to $3.0 billion (about 2% to 4%) of Intel's annual revenue, and only 6.9% to 12% of the PC market in the United States and 7% globally. Some speculated that Apple's move away from Intel chips could prompt other customers to do the same. CNET speculated that the transition might reduce Apple's component costs.
Users and developers
Apps created for the iOS platform are able to run natively on ARM-powered Macs.
The transition could severely restrict or even eliminate hobbyist "Hackintosh" computers, in which macOS runs on commodity PC hardware in violation of license restrictions.
The Boot Camp software, which enables Intel-based Macs to natively run Microsoft Windows in an Apple-supported dual booting environment, will not be implemented on Apple silicon-based Macs. , Apple stated it has "no plans to direct boot into Windows" on ARM-based Macintosh computers. Apple's senior vice president of Software Engineering Craig Federighi suggested that virtualization technology is a viable alternative: "Purely virtualization is the route... Hypervisors can be very efficient, so the need to direct boot shouldn't really be the concern." Microsoft had not commented on whether it would extend its ARM-based Windows license beyond OEM preinstallations.
Reception
Prior to the release of M1 Macs, Wired expressed skepticism that Apple's designers can elevate smartphone-related processors to the performance of a Mac Pro, and questioned the true duration of support for Intel binaries on ARM-based Macs and when the first version of the macOS that will not support Intel Macs will be released under Apple's vague commitment to do so "for years to come". On a positive note, Lauren Giret remarked that Apple might "succeed where Microsoft has failed" due to Apple's "tight integration" of hardware and software, and a vast collection of applications that can already run on the new platform.
When systems containing M1 processors were released, they received near-universal acclaim for their high speed and low-energy consumption.
See also
Mac transition to Intel processors
Apple silicon
Fat binary
References
Macintosh platform
ARM architecture |
24525405 | https://en.wikipedia.org/wiki/Change%20impact%20analysis | Change impact analysis | Change impact analysis (IA) or impact analysis is the analysis of changes within a deployed product or application and their potential consequences.
Change impact analysis is defined by Bohnner and Arnold as "identifying the potential consequences of a change, or estimating what needs to be modified to accomplish a change", and they focus on IA in terms of scoping changes within the details of a design. In contrast, Pfleeger and Atlee focus on the risks associated with changes and state that IA is: "the evaluation of the many risks associated with the change, including estimates of the effects on resources, effort, and schedule". Both the design details and risks associated with modifications are critical to performing IA within the change management processes. A technical colloquial term is also mentioned sometimes in this context, dependency hell.
Types of impact analysis techniques
IA techniques can be classified into three types:
Trace
Dependency
Experiential
Bohner and Arnold identify two classes of IA, traceability and dependency IA. In traceability IA, links between requirements, specifications, design elements, and tests are captured, and these relationships can be analysed to determine the scope of an initiating change. In dependency IA, linkages between parts, variables, logic, modules etc. are assessed to determine the consequences of an initiating change. Dependency IA occurs at a more detailed level than traceability IA. Within software design, static and dynamic algorithms can be run on code to perform dependency IA. Static methods focus on the program structure, while dynamic algorithms gather information about program behaviour at run-time.
Literature and engineering practice also suggest a third type of IA, experiential IA, in that the impact of changes is often determined using expert design knowledge. Review meeting protocols, informal team discussions, and individual engineering judgement can all be used to determine the consequences of a modification.
Package management and dependency IA
Software is often delivered in packages, which contain dependencies to other software packages necessary that the one deployed runs. Following these dependencies in reverse order is a convenient way to identify the impact of changing the contents of a software package. Examples for software helpful to do this:
scripts like whatrequires for RPM, and debian package formats
Source code and dependency IA
Dependencies are also declared in source code. Metadata can be used to understand the dependencies via static analysis. Amongst the tools supporting to show such dependencies are:
Integrated development environment
FindBugs
JRipples
AppDynamics
Crosscode Panoptics
Visual Expert
There are as well tools applying full-text search over source code stored in various repositories. If the source code is web-browsable, then classical search engines can be used. If the source is only available in the runtime environment, it gets more complicated and specialized tools may be of help.
Learning techniques can be used to automatically identify impact dependencies.
Requirements, and traceability to source code
Recent tools use often stable links to trace dependencies. This can be done on all levels, amongst them specification, blueprint, bugs, commits. Despite this, the use of backlink checkers known from search engine optimization is not common. Research in this area is done as well, just to name use case maps.
Commercial tools in this area include Telelogic DOORS, and IBM Rational.
See also
Change management (engineering)
Change control
References
Further reading
Ambler, S. (2002). Agile Modeling: Effective Practices for Extreme Programming and the Unified Process. New York, New York, USA, John Wiley & Sons.
Bohner, S.A. and R.S. Arnold, Eds. (1996). Software Change Impact Analysis. Los Alamitos, California, USA, IEEE Computer Society Press.
Eisner, H. (2002). Essentials of Project and Systems Engineering Management. New York, New York, USA, John Wiley & Sons.
Endres, A. and D. Rombach (2003). A Handbook of Software and Systems Engineering: Empirical Observations, Laws and Theories. New York, New York, USA, Addison-Wesley.
Kilpinen, M.S. (2008). The Emergence of Change at the Systems Engineering and Software Design Interface: An Investigation of Impact Analysis. PhD Thesis. University of Cambridge. Cambridge, UK.
Pfleeger, S.L. and J.M. Atlee (2006). Software Engineering: Theory and Practice. Upper Saddle River, New Jersey, USA, Prentice Hall.
Rajlich, V. (2000). "A Model and a Tool for Change Propagation in Software." ACM SIGSOFT Software Engineering Notes 25(1):72.
Ren, X., F. Shah, et al. (2005). Chianti: A Tool for Change Impact Analysis of Java Programs. International Conference on Software Engineering (ICSE 2005), St Louis, Missouri, USA.
Change management |
43100713 | https://en.wikipedia.org/wiki/Embedded%20controller | Embedded controller | An embedded controller (EC) is a microcontroller in computers that handles various system tasks.
Tasks
An embedded controller can have the following tasks:
Receiving and processing signals from the keyboard and the touchpad (including touchpad disable)
other buttons and switches (e.g., power button, laptop lid switch (received from hall sensor))
Controlling access to the A20 line
Thermal measurement (CPU, GPU, Motherboard) and response including fan control, CPU and GPU throttling, and emergency shutdown in response to rising temperatures
Controlling indicator LEDs (e.g. caps lock, scroll lock, num lock, battery, ac, power, wireless LAN, sleep)
Managing the battery charger and the battery
Allowing remote diagnostics and remediation over the network
Performing software-requested CPU reset
Controlling the watchdog timer
System Management Interrupt (entry to System Management Mode)
Bluetooth toggle
Display backlight toggle
Can act as a bridge between BIOS chip and chipset
USB OC (overcurrent) (USB disable)
whether AC is present
Display power toggle
Controls RGB lighting
eSATA toggle
Wake-on-LAN
Debug Card Interface (Enables repair centers to monitor the boot process with a special device in an attempt to fix problems (only few several hundred codes))
SCI from the Embedded Controller to inform the ACPI driver (in the ) of an ACPI Event
As a core system component, the embedded controller is always on when power is supplied to the mainboard. To communicate with the main computer system, several forms of communication can be used, including ACPI, SMBus, or shared memory.
The embedded controller has its own RAM, independent of that used by the main computer system, and often its own flash ROM on which the controller's software is stored. Many BIOS updates also include upgrades for the embedded controller firmware.
An embedded controller is sometimes known as a "Keyboard Controller BIOS", which comes from the fact that the embedded controller evolved from the keyboard controller and often still is used as a keyboard controller. Even today, an ACPI embedded controller communicates with the CPU by using the same I/O ports that keyboard controllers used in the past.
Ergonomics
Although the embedded controller is very "deep" in the system, it is important to the user because it performs functions such as fan control and thermal management. Computer systems such as laptops often produce large amounts of heat which must be dissipated. This is typically done by activating a fan to blow air over the components that are producing heat; the fan is not simply turned on or off, but is driven at high speed by the embedded controller for a short time and then left running at low speed until the temperature has decreased sufficiently. Such a control scheme can be uncomfortable from an ergonomic point of view, as the change in fan speed is noticeable to the user, especially if this occurs regularly and if the fan is clearly audible.
To prevent this, some embedded controllers are designed to run the fans at a constant speed over a larger range of temperatures and will only increase fan speed when the system is close to overheating. In this case, the ergonomics of the system are improved because the fan is quieter, as it is controlled to rotate at a lower speed and does not change speed as often. However, when the temperature does cross the controller's threshold, it will take much longer to reduce the temperature to safe levels.
To change the fan control policy, updates to the embedded controller's firmware are usually necessary.
See also
Super I/O
Low Pin Count (LPC)
References
External links
Matthew Garrett: The ACPI Embedded Controller
coreboot: List of embedded controllers as they are used in laptops
Microcontrollers
Motherboard |
47373414 | https://en.wikipedia.org/wiki/Alex%20Szalay | Alex Szalay | Alex Szalay is a Bloomberg Distinguished Professor of physics and astronomy and computer science at the Johns Hopkins University School of Arts and Sciences and Whiting School of Engineering. Szalay is an international leader in astronomy, cosmology, the science of big data, and data‐intensive computing.
Biography
Alexander Sándor Szalay, Jr. was born in Hungary. His father is Sándor Szalay, who is considered “the father of nuclear physics in Hungary” for his discovery of a natural enrichment mechanism of uranium and neutrinos. Szalay graduated with a Bachelor of Science degree in Physics in 1969 from Kossuth University, now University of Debrecen, in Hungary. He then received a Master of Science in Theoretical Physics 1972 and a Ph.D in Astrophysics in 1975 from the Eötvös Loránd University in Budapest. During this period, from 1974 to 1982, Szalay also played guitar in the Hungarian rock band Panta Rhei (band). After graduation Szalay spent postdoctoral periods at the University of California, Berkeley, University of Chicago, and Fermilab, before accepting an assistant professorship at Eötvös Loránd University in 1982. After rising to the rank of full professor at Eötvös, he joined Johns Hopkins University in 1989. Subsequently, he was named the Alumni Centennial Chair in 1998 and earned a secondary appointment in the Department of Computer Science in 2001. In 2008, he became Doctor Honoris Causa of the Eötvös Loránd University.
In March 2015, Szalay was named a Bloomberg Distinguished Professor at Johns Hopkins University for his accomplishments as an interdisciplinary researcher and excellence in teaching. The Bloomberg Distinguished Professorship program was established in 2013 by a gift from Michael Bloomberg. Szalay holds joint appointments in the Johns Hopkins University Zanvyl Krieger School of Arts and Sciences’s Department of Physics and Astronomy and the Whiting School of Engineering’s Department of Computer Science. Through the Bloomberg Distinguished Professorship, Szalay also will be teaching a new undergraduate class in data science, using a synthesis of statistics, computer science, and basic sciences that he thinks “will become the fundamental language used by the next generation of scientists.”
Since 2009, Szalay has been the founding director of the Institute for Data Intensive Engineering and Science (IDIES) at Johns Hopkins, an interdisciplinary institute fostering “education and research in applying data-intensive technologies to problems of national interest in physical and biological sciences and engineering.” At the time of its founding, IDIES was the “first interdisciplinary big data center of its type […] and has since inspired similar efforts at other universities.” IDIES is supported by the National Science Foundation, NASA, Intel, Microsoft, Nokia, Nvidia, the Gordon and Betty Moore Foundation, and the W. M. Keck Foundation.
Awards and distinctions
In 1990, Szalay was elected to the Hungarian Academy of Sciences as a Corresponding Member and awarded the E.W. Fullam Prize of the Dudley Observatory. The following year, he received Hungary's Széchenyi Prize, which recognizes “those who have made an outstanding contribution to academic life in Hungary.” Szalay was recognized in particular for his “discovery of the large scale (400 million light years) distribution pattern of galaxies.” In 2003, he was elected as a Fellow of the American Academy of Arts and Sciences. In 2004, he received an Alexander Von Humboldt Research Award in Physical Sciences. In 2007, Szalay received the Jim Gray eScience Award in recognition for his “foundational contributions to interdisciplinary advances in the field of astronomy and groundbreaking work with Jim Gray.” The IEEE Computer Society awarded Szalay with the 2015 Sidney Fernbach Award for "his outstanding contributions to the development of data-intensive computing systems and on the application of such systems in many scientific areas including astrophysics, turbulence, and genomics.”
Research
Szalay is an astrophysicist who has made significant contribution to our understanding of the structure formation and on the nature of the dark matter in the universe. Distinguished in the area of the cosmology, he works on the statistical measures of the spatial distribution of galaxies and galaxy formation. He has contributed much to the field of theoretical astrophysics and large scale structure. Szalay has developed several novel statistical techniques about optimal estimators for galaxy correlations, power spectra, photometric redshifts for galaxies, optimal co-adding of multicolor images, PCA-based spectral classification of galaxies and Bayesian techniques applied to spatial cross-matching of different astronomical catalogs. He has also led the development of data-intensive computer architectures covering all aspects of this process from design to implementation.
Particular accomplishments include:
Biased galaxy formation in a cold dark matter dominated universe
Structure formation in a neutrino-dominated universe
Computing the power spectrum in hot, cold and warm dark matter dominated universes (Szalay also defined the terms hot/cold/warm dark matter)
Various measurements of the large scale galaxy power spectrum
Sloan Digital Sky Survey
Professor Szalay is the Architect for the Science Archive and Chair of the Science Council of the Sloan Digital Sky Survey, the most used astronomy facility in the world today. He collaborated with Jim Gray to design an efficient system to perform data mining on the SDSS Terabyte sized archive, based on innovative spatial indexing techniques, that represented a “thousand-fold increase in the total amount of data that astronomers have collected to date.” The SDSS Science Archive has attracted an unprecedented number of users, and is considered to be an example for online archives of the future. Currently, he is on the Science Advisory Council of the Large Synoptic Survey Telescope.
A minor planet discovered by the Sloan Digital Sky Survey at Apache Point Observatory was named 170010 Szalay in his honor.
Virtual observatory and cosmological simulations
Szalay is a leader in the grass-roots standardization effort to bring the next generation petascale databases in astronomy to a common basis, so that they will be interoperable. In support of this goal, Szalay was Project Director of the National Virtual Observatory. In 2001, Jim Gray and Szalay wrote up a viewpoint article on the national virtual observatory project for Science, entitled "The World-Wide Telescope." He was also one of the founders of the International Virtual Observatory Alliance and part of the core team to build the Galaxy Zoo, one of the most visible citizen science projects today.
Szalay collaborated with Simon White and Gerard Lemson to build a database similar to the SkyServer out of the Millennium Simulation, which became the reference cosmology simulation used by astronomers all over the world. In collaboration with Piero Madau, he is building the 1.2PB database, known as The Milky Way Laboratory, for the Silver River cosmology simulation, currently running at Oak Ridge National Laboratory.
Data-intensive computing
Szalay was involved in the early projects related to the Computational Grid, in particular the GriPhyN and iVDGL projects, creating testbed applications for high energy physics and astrophysics. He has collaborated on high-speed data analytics for more than a decade, and has been part of the TeraFlow project since 2004 and the Open Science Grid. He was also heavily involved in the Data Conservancy, researching the long-term curation and preservation of scientific data.
He has coauthored several papers with Gordon Bell, one of the world's premier computer designers, arguing how Amdahl's law can be used to revisit data-intensive computing architectures from first principles. Applying these ideas, he built a low power system, GrayWulf, using Atom processors with extremely good IO performance per unit power (factor of 15 better than a typical rack server). GrayWulf was named in homage to and builds on the work of Szalay's collaborator legendary Microsoft computer scientist Jim Gray and Beowulf, the “original computer cluster developed at NASA using ‘off-the-shelf’ computer hardware.” Szalay led the team that won the Supercomputing Data Challenge in SC-08 - the International Conference for High Performance Computing, Networking, Storage and Analysis - with their entry "Storage Challenge GrayWulf: Scalable Clustered Architecture for Data-Intensive Computing." In 2010, Szalay began developing the Data-Scope, a 6.5PB system with 500Gbytes/s sequential throughput, utilizing a uniquely balanced system built out of hard disks, SSDs and GPUs, for maximal data flow across the system. The Data-Scope went online in 2013 and read “data 30 times faster than GrayWulf, making it the fastest data-processing system at any university in the world.”
Szalay has more recently branched out in other scientific areas focusing on data-intensive computing. In collaboration with Randal Burns, Charles Meneveau, and Greg Eyink, he has built the 350TB turbulence database (JHTDB) providing immersive access to a large computational fluid dynamics simulation, where users can launch virtual sensors into the simulation that report back their velocity. A landmark paper using these resources appeared in Nature.
With Andreas Terzis and Katalin Szlavecz, he has built an end-to‐end wireless sensor system for in-situ monitoring of environmental parameters, including , and measuring the impact of the soil on the global carbon cycle. With sensors around Baltimore, Brazil, Ecuador and the Atacama Desert in Chile, the system has more than 200,000 sensor days of data and several hundred million data points.
Szalay has also become heavily involved in applying modern data-intensive computational techniques to genomics, in collaboration with Steven Salzberg, Ben Langmead, Sarah Wheelan, and Richard Wilton. The collaboration has built a new alignment system for genomics, which is substantially faster than any other system today.
Awards
1967 First Prize International Physics Olympiad, Warsaw, Poland
1991 Szechenyi Prize of the Hungarian Republic
2003 Fellow of the American Academy of Arts and Sciences
2004 Alexander Von Humboldt Award in Physical Sciences
2007 Jim Gray Award, Microsoft
2015 Sidney Fernbach Award
2015 Highly Cited Researcher, Thomson Reuters
2016 Outstanding Collaborator Award, Microsoft Research
2020 Viktor Ambartsumian International Science Prize
2021 ACM SIGMOD Systems Award (part of the SDSS team)
2021 One of 10 winners of Falling Walls Science Summit, Life Sciences (with Janis Taube)
Publications
He has written over 575 papers in various scientific journals, covering areas from theoretical cosmology to observational astronomy, spatial statistics and computer science, and more recently turbulence, environmental science and genomics. Szalay has more than 63,805 citations in Google Scholar and an h-index of 96.
He was among the top 1% most cited in the world for subject field and year of publication in the 2001 and 2014 Thomson Reuters Highly Cited Researchers reports.
Books
1998, Large Scale Structures of the Universe (International Astronomical Union Symposia). with co-editors Jean Audouze & Marie-Christine Pelletan, Springer.
Highly Cited Articles (more than 1300 citations)
2009, with KN Abazajian, JK Adelman-McCarthy, MA Agüeros, SS Allam, and CA Prieto, The seventh data release of the Sloan Digital Sky Survey, in: The Astrophysical Journal Supplement Series. Vol. 182, nº 2, 543.
2007, with JK Adelman-McCarthy, MA Agüeros, SS Allam, KSJ Anderson et al., The fifth data release of the Sloan Digital Sky Survey, in: The Astrophysical Journal Supplement Series. Vol. 172, nº 2; 634.
2006, with M Tegmark, DJ Eisenstein, MA Strauss, DH Weinberg, MR Blanton, et al. Cosmological constraints from the SDSS luminous red galaxies, in: Physical Review D. Vol. 74, nº 12; 123507.
2005, with DJ Eisenstein, I Zehavi, DW Hogg, R Scoccimarro, and MR Blanton, Detection of the baryon acoustic peak in the large-scale correlation function of SDSS luminous red galaxies, in: The Astrophysical Journal. Vol. 633, nº 2; 560.
2004, with M Tegmark, MA Strauss, MR Blanton, K Abazajian, S Dodelson, et el. Cosmological parameters from SDSS and WMAP, in: Physical Review D. Vol. 69, nº 10.
2002, with C Stoughton, RH Lupton, M Bernardi, MR Blanton, S Burles, FJ Castander, et al., Sloan digital sky survey: early data release, in: The Astronomical Journal. Vol. 123, nº 1; 485.
2002, with MA Strauss, DH Weinberg, RH Lupton, VK Narayanan, J Annis, et al. Spectroscopic target selection in the Sloan Digital Sky Survey: the main galaxy sample, in: The Astronomical Journal. Vol. 124, nº 3; 1810.
2000, with DG York, J Adelman, JE Anderson Jr, SF Anderson, J Annis, NA Bahcall, et al., The sloan digital sky survey: Technical summary, in: The Astronomical Journal. Vol. 120, nº 3; 1579.
1993, with Stephen D Landy, Bias and variance of angular correlation functions, in: The Astrophysical Journal. Vol. 412; 64–71.
1986, with JM Bardeen, JR Bond, and N Kaiser, The statistics of peaks of Gaussian random fields, in: The Astrophysical Journal. Vol. 304; 15–61.
See also
Messier 81
Meanings of minor planet names: 170,001–180,000
References
External links
Institute for Data Intensive Engineering and Science
Webpage at Johns Hopkins University Krieger School of Arts & Sciences
Johns Hopkins University faculty
Living people
American astronomers
Fellows of the American Academy of Arts and Sciences
1949 births |
2132353 | https://en.wikipedia.org/wiki/Alvy%20Ray%20Smith | Alvy Ray Smith | Alvy Ray Smith III (born September 8, 1943) is an American computer scientist who co-founded Lucasfilm's Computer Division and Pixar, participating in the 1980s and 1990s expansion of computer animation into feature film.
Education
In 1965, Alvy Smith received his bachelor's degree in electrical engineering from New Mexico State University (NMSU). He created his first computer graphic in 1965 at NMSU. In 1970, he received a Ph.D. in computer science from Stanford University, with a dissertation on cellular automata theory jointly supervised by Michael A. Arbib, Edward J. McCluskey, and Bernard Widrow.
Career
His first art show was at the Stanford Coffeehouse. From 1969 to 1973 he was an associate professor of Electrical Engineering and Computer Science at New York University, under chairman Herbert Freeman, one of the earliest computer graphics researchers. He taught briefly at the University of California, Berkeley in 1974.
While at Xerox PARC in 1974, Smith worked with Richard Shoup on SuperPaint, one of the first computer raster graphics editor, or 'paint', programs. Smith's major contribution to this software was the creation of the HSV color space, also known as HSB. He created his first computer animations on the SuperPaint system.
In 1975, Smith joined the new Computer Graphics Laboratory at New York Institute of Technology (NYIT), where he was given the job title "Information Quanta". There, working alongside a traditional cel animation studio, he met Ed Catmull and several core personnel of Pixar. Smith worked on a series of newer paint programs, including Paint3, the first true-color raster graphics editor. As part of this work, he co-invented the concept of the alpha channel. He was also the programmer and collaborator on Ed Emshwiller's animation Sunstone, included in the collection of the Museum of Modern Art in New York. Smith worked at NYIT until 1979, and then briefly at the Jet Propulsion Laboratory with Jim Blinn on the Carl Sagan Cosmos: A Personal Voyage television series.
With Ed Catmull, Smith was a founding member of the Lucasfilm Computer Division, which developed computer graphics software, including early renderer technology. As director of the Computer Graphics Project, Smith created and directed the "Genesis Demo" in Star Trek II: The Wrath of Khan, and conceived and directed the short animated film The Adventures of André & Wally B., animated by John Lasseter. At some point in the 1980s, a designer suggested naming a new digital compositing computer the "Picture Maker". Smith thought that the laser-based device have a catchier name, and came up with "Pixer", which after a meeting was changed to "Pixar".
Smith and Catmull co-founded Pixar in 1986 with financing from Steve Jobs. After the spinout from Lucasfilm of Pixar, he served on the board of directors and was executive vice president. According to the Steve Jobs biography iCon by Jeffrey S. Young and William L. Simon, Alvy Ray quit Pixar after a heated argument with Jobs over the use of a whiteboard. It was an unwritten rule that no one other than Jobs was allowed to use it, a rule Smith decided to break in front of everyone after Jobs went "total street bully" on him and they ended up screaming into each other's face "in full bull rage". Despite being the co-founder of Pixar, Young and Simon claim that the company has largely overlooked his part in company history since his departure. For example, there is no mention of Smith on the Pixar website.
He was for four years (1988–1992) a member of the board of regents of the National Library of Medicine in Bethesda, Maryland, where he was instrumental in inaugurating the Visible Human Project.
In 1991, Smith left Pixar to cofound Altamira Software, with Eric Lyons and Nicholas Clay. Altamira was acquired by Microsoft in 1994. Smith became the first Graphics Fellow at Microsoft in 1994. Pixar would go on to release Toy Story the following year and go public, helping to put Steve Jobs back at Apple.
Smith retired from Microsoft in 1999 and is currently giving many talks, making digital photographs, doing scholarly genealogy, and researching technical history. He lives in Seattle, Washington. In 2010 Smith married Alison Gopnik, author and Professor of Psychology at the University of California, Berkeley.
Awards
With his collaborators, Smith has twice been recognized by the Academy of Motion Picture Arts and Sciences for his scientific and engineering contributions, to digital image compositing (1996 award) and digital paint systems (1998 award).
In 1990, Smith and Richard Shoup received the ACM SIGGRAPH Computer Graphics Achievement Award for their development of paint programs. Smith presented the Forsythe Lecture in 1997 at Stanford University, where he received his PhD in 1970. His undergraduate alma mater New Mexico State University awarded him an honorary doctorate in December 1999. He was inducted into the CRN Industry Hall of Fame at the Computer History Museum in Mountain View, CA in 2004. In 2006, Smith was elected a member of the National Academy of Engineering. In 2010, Smith was elected a Fellow of the American Society of Genealogists and presented the Washington Award in Chicago for advancing "the welfare of humankind". In 2011, Smith was awarded the Special Award at Mundos Digitales in La Coruna, Spain, for lifetime achievement in computer graphics. In 2012, Smith was awarded the Digital Media Symposium Lifetime Achievement Award in Boulder, Colorado, and was awarded a plaque in the Circle of Honor at New Mexico State University. In 2013, Smith was elected a fellow of the American Association for the Advancement of Science. Smith has been the recipient of several grants from the National Science Foundation and the National Endowment for the Arts during his career.
See also
HWB color model
References
Sources
Michael Rubin, Droidmaker: George Lucas and the Digital Revolution (2005)
Elio Quiroga, "La Materia de los Sueños", Fundación DMR Consulting, Ediciones Deusto (Spain, 2004)
Simon, William L. and Young, Jeffrey S. "iCon: The Greatest Second Act in the History of Business." (2005)
David A. Price, "The Pixar Touch: The Making of a Company" (2008)
Walter Isaacson, "Steve Jobs" (2011)
External links
Alvy Ray Smith's web site
Interviewed by Alan Macfarlane 20th June 2017 (video)
Living people
American experimental filmmakers
American genealogists
Computer graphics professionals
Computer graphics researchers
Cellular automatists
New Mexico State University alumni
Stanford University alumni
New York University faculty
Place of birth missing (living people)
Members of the United States National Academy of Engineering
Fellows of the American Association for the Advancement of Science
Pixar people
New York Institute of Technology faculty
Fellows of the American Society of Genealogists
Scientists at PARC (company)
Lucasfilm people
Pixar
Academy Award for Technical Achievement winners
People from Clovis, New Mexico
1943 births |
22180096 | https://en.wikipedia.org/wiki/Euchalcia | Euchalcia | Euchalcia is a genus of moths of the family Noctuidae.
Species
Euchalcia albavitta (Ottolengui, 1902)
Euchalcia altaica Dufay, 1968
Euchalcia annemaria de Freina & Hacker, 1985
Euchalcia armeniae Dufay, 1965
Euchalcia augusta (Staudinger, 1891)
Euchalcia aureolineata Gyulai & Ronkay, 1997
Euchalcia bactrianae Dufay, 1968
Euchalcia bea Hreblay & Ronkay, 1998
Euchalcia bellieri (Kirby, 1900)
Euchalcia biezankoi (Alberti, 1965)
Euchalcia borealis Lafontain & Poole, 1991
Euchalcia caeletissima Hreblay & Ronkay, 1998
Euchalcia cashmirensis Moore, 1881
Euchalcia chalcophanes Dufay, 1963
Euchalcia chlorocharis (Dufay, 1961)
Euchalcia consona (Fabricius, 1787)
Euchalcia cuprescens Dufay, 1965
Euchalcia defreinai Hacker, 1986
Euchalcia dorsiflava (Standfuss, 1892)
Euchalcia emichi (Rogenhofer, 1873)
Euchalcia exornata Ronkay, 1987
Euchalcia gerda (Püngeler, 1907)
Euchalcia hedeia Dufay, 1978
Euchalcia herrichi (Staudinger, 1861)
Euchalcia hissarica Klyucho, 1983
Euchalcia hyrcaniae Dufay, 1963
Euchalcia italica (Staudinger, 1882)
Euchalcia kautti Hacker & Ronkay, 1992
Euchalcia kitchingi Hacker & Ronkay, 1992
Euchalcia kondarensis Klyucho, 1989
Euchalcia maria (Staudinger, 1891)
Euchalcia modestoides Poole, 1989
Euchalcia nepalina Hreblay & Plante, 1995
Euchalcia orophasma (Boursin, 1960)
Euchalcia paulina (Staudinger, 1891)
Euchalcia renardi (Eversmann, 1844)
Euchalcia sergia (Oberthür, 1884)
Euchalcia serraticornis Dufay, 1965
Euchalcia siderifera (Eversmann, 1856)
Euchalcia stilpna Dufay, 1969
Euchalcia taurica (Osthelder, 1933)
Euchalcia variabilis – purple-shaded gem (Piller & Mitterpacher, 1783)
Euchalcia viridis (Staudinger, 1901)
Euchalcia xanthoides Dufay, 1968
References
Euchalcia at Markku Savela's Lepidoptera and Some Other Life Forms
Natural History Museum Lepidoptera genus database
Biodiversity Heritage Library: Bibliography
Plusiinae |
23040043 | https://en.wikipedia.org/wiki/LTIB | LTIB | Linux Target Image Builder (LTIB) is an open-source project based on RPM, menuconfig and Perl. LTIB is similar in concept to Buildroot and other Linux file system builders. LTIB can develop and deploy board support packages (BSP) for various target platforms. One can develop a Linux image for his or her specific target. The project was initially sponsored by Freescale Semiconductor and later moved to Savannah.
See also
Yocto Project
Buildroot
uClinux-dist
OpenEmbedded
OpenWRT
References
External links
PTXdist
Denx ELDK
Embedded Linux |
29678323 | https://en.wikipedia.org/wiki/ProjectManager.com | ProjectManager.com | ProjectManager.com is an online project management software which is a scalable software as a service (SaaS) for business managers and teams. The software is developed by ProjectManager.com, Inc. in Austin, TX.
ProjectManager.com (sometimes referred to as "ProjectManager") provides a customizable online dashboard for keeping track of projects, team collaboration, as well as a task manager for creating project plans.
The company was founded in New Zealand in 2008 by CEO Jason Westland. In 2014, Westland moved to the United States and opened a small office in Austin, TX. Then in 2018, ProjectManager.com announced that they had officially moved their headquarters to Austin, with most of their staff working in the newly expanded Austin office while development teams continue to work in New Zealand.
It was documented that the company's success was helped by their push on Social Media, and was discussed in Forbes magazine.
ProjectManager.com won a Project Management Institute (PMI) award in July 2009. The company was also awarded with two awards from Deloitte, the fast 50 award and also the 2013 Asia Pacific Fast 500 award. In 2019, ProjectManager.com's rapid growth landed the company on the Inc. 5000 list of fastest growing companies in the United States, as well as the Fast50 list of fastest growing companies in Austin, TX.
ProjectManager.com's clients include the United Nations, the US military, Boeing, NASA and Volvo
ProjectManager.com has been reviewed in several publications including;
Computerworld Magazine
CRN Magazine
PM Network Magazine
Projects at Work
Unlimited Magazine
References
Collaborative software
Project management software
Software companies of New Zealand
Software companies established in 2008
Projects established in 2008 |
30262310 | https://en.wikipedia.org/wiki/January%202011%20in%20sports | January 2011 in sports |
Deaths in January
8: Thorbjørn Svenssen
15: Nat Lofthouse
20: Miesque
Current sporting seasons
American football 2011
National Football League
Playoffs
NCAA Division I FBS
NCAA Division I FCS
Basketball 2011
NBA
NCAA Division I men
NCAA Division I women
Euroleague
EuroLeague Women
Eurocup
EuroChallenge
France
Germany
Greece
Israel
Italy
Philippines
Philippine Cup
Russia
Spain
Turkey
Football (soccer) 2011
National teams competitions
UEFA Euro 2012 qualifying
2012 Africa Cup of Nations qualification
International clubs competitions
UEFA (Europe) Champions League
UEFA Europa League
UEFA Women's Champions League
CONCACAF (North & Central America) Champions League
OFC (Oceania) Champions League
Domestic (national) competitions
Australia
England
France
Germany
Iran
Italy
Scotland
Spain
Golf 2011
PGA Tour
European Tour
Champions Tour
Ice hockey 2011
National Hockey League
Kontinental Hockey League
Czech Extraliga
Elitserien
Canadian Hockey League:
OHL, QMJHL, WHL
NCAA Division I men
NCAA Division I women
Rugby union 2011
Heineken Cup
European Challenge Cup
English Premiership
Celtic League
LV Cup
Top 14
Sevens World Series
Snooker 2011
Players Tour Championship
Volleyball 2011
International clubs competitions
Men's CEV Champions League
Women's CEV Champions League
Domestic (national) competitions
Iranian Men's Super League
Winter sports
Alpine Skiing World Cup
Biathlon World Cup
Bobsleigh World Cup
Cross-Country Skiing World Cup
Freestyle Skiing World Cup
Luge World Cup
Nordic Combined World Cup
Short Track Speed Skating World Cup
Skeleton World Cup
Ski Jumping World Cup
Snowboard World Cup
Speed Skating World Cup
Days of the month
January 31, 2011 (Monday)
Alpine skiing
Women's World Cup in Sestriere, Italy:
Super combined: Cancelled due to heavy snow.
Cricket
West Indies in Sri Lanka:
1st ODI in Colombo: 245/5 (50 overs; Adrian Barath 113); . No result; 3-match series tied 0–0.
Football (soccer)
South American Youth Championship in Peru:
Final Group:
1–0
0–1
1–5
January 30, 2011 (Sunday)
Alpine skiing
Men's World Cup in Chamonix, France:
Super combined: Ivica Kostelić 2:57.12 (2:02.47 / 54.65) Natko Zrnčić-Dim 2:57.63 (2:01.04 / 56.59) Aksel Lund Svindal 2:57.65 (2:00.05 / 57.60)
Combined standings (after 3 of 4 races): (1) Kostelić 300 points (2) Silvan Zurbriggen 143 (3) Kjetil Jansrud 132
Kostelić wins his first combined title.
Overall standings (after 25 of 38 races): (1) Kostelić 1178 points (2) Zurbriggen 703 (3) Didier Cuche 673
Women's World Cup in Sestriere, Italy:
Downhill: Cancelled due to heavy snow.
American football
Pro Bowl in Honolulu, Hawaii:
NFC 55, AFC 41
Auto racing
Sports cars endurance racing:
24 Hours of Daytona in Daytona Beach, Florida, United States:
(1) Joey Hand , Scott Pruett , Graham Rahal and Memo Rojas (Chip Ganassi Racing Riley Mk. XI-BMW) 721 laps
(2) Scott Dixon , Dario Franchitti , Jamie McMurray and Juan Pablo Montoya (Chip Ganassi Racing Riley Mk. XI-BMW) 721 laps
(3) João Barbosa , Terry Borcheller , Christian Fittipaldi , J. C. France and Max Papis (Action Express Racing Riley Mk. XI-Porsche) 721 laps
Badminton
BWF Super Series:
Korea Open Super Series Premier in Seoul:
Men's singles: Lin Dan def. Lee Chong Wei 21–19, 14–21, 21–16
Women's singles: Wang Yihan def. Wang Shixian 21–14, 21–18
Men's doubles: Jung Jae-sung /Lee Yong-dae def. Mathias Boe /Carsten Mogensen 21–6, 21–13
Women's doubles: Wang Xiaoli /Yu Yang def. Tian Qing /Zhao Yunlei 21–18, 19–21, 21–4
Mixed doubles: Zhang Nan /Zhao Yunlei def. Tao Jiaming/Tian Qing 21–17, 13–21, 21–19
Basketball
PBA Philippine Cup Finals (best-of-7 series):
Game 4 in Quezon City: San Miguel Beermen 91, Talk 'N Text Tropang Texters 87. Series tied 2–2.
Bobsleigh
World Cup in St. Moritz, Switzerland:
Four-man: Edgars Maskalāns/Daumants Dreiškens/Ugis Zalims/Intars Dambis 2:09.34 (1:05.11 / 1:04.23) Beat Hefti/Roman Handschin/Thomas Lamparter/Manuel Lüthi 2:09.36 (1:04.93 / 1:04.43) Manuel Machata/Richard Adjei/Andreas Bredau/Christian Poser 2:09.50 (1:05.04 / 1:04.46)
Standings (after 7 of 8 races): (1) Machata 1461 points (2) Steve Holcomb 1346 (3) Karl Angerer 1266
Cricket
England in Australia:
5th ODI in Brisbane: 249 (49.3 overs; Chris Woakes 6/45); 198 (45.3 overs). Australia win by 51 runs; lead 7-match series 4–1.
Equestrianism
Show jumping:
FEI World Cup Western European League:
9th competition in Zurich (CSI 5*-W): Marcus Ehning on Küchengirl Ben Maher on Robin Hood W Edwina Alexander on Itot du Château
Standings (after 9 of 13 competitions): (1) Kevin Staut 87 points (2) Meredith Michaels-Beerbaum 62 (3) Rolf-Göran Bengtsson 58
Extreme sport
Winter X Games XV in Aspen, United States:
Men's:
Skier X: John Teller 1:21.167 Christopher Del Bosco 1:21.197 Casey Puckett 1:21.979
SnoCross Adaptive: Mike Schultz 5:11.704 Jeff Tweet 5:53.741 Jim Wazny 5:55.078
SnoCross: Tucker Hibbert Ross Martin Robbie Malinoski
Snowboard Slopestyle: Sebastien Toutant 93.00 points Mark McMorris 90.00 Tyler Flanagan 82.66
Mono Skier X: Josh Dueck 1:59.656 Brandon Adam 2:10.471 Sean Rose 2:18.684
Snowmobile Best Trick: Daniel Bodin 96.00 points Caleb Moore 90.33 Heath Frisby 86.00
Snowboard SuperPipe: Shaun White 97.33 points Scotty Lago 92.00 Louie Vito 87.33
White wins the gold for the fourth successive year, and the sixth time overall.
Women's:
Snowboard Slopestyle: Enni Rukajärvi 92.66 points Jenny Jones 89.33 Jamie Anderson 86.00
Skier X: Kelsey Serwa 1:28.830 Ophélie David 1:29.162 Fanny Smith 1:29.367
David fails to win the event for the first time since 2006.
Golf
PGA Tour:
Farmers Insurance Open in La Jolla, California:
Winner: Bubba Watson 272 (−16)
Watson wins his second PGA Tour title.
European Tour:
Volvo Golf Champions in Bahrain:
Winner: Paul Casey 268 (−20)
Casey wins his eleventh European Tour title.
Handball
World Men's Championship in Sweden:
Third place match: 23–24
Final: 37–35 (ET)
France defend their title, and win the championship for a record-equalling fourth time. They also qualify for the 2012 Olympic tournament.
Ice hockey
NHL All-Star Game in Raleigh, North Carolina:
Team Lidström 11, Team Staal 10
Luge
FIL World Natural Track Championships in Umhausen, Austria:
Men's singles: Gerald Kammerlander 3:37.61 (1:12.46 / 1:12.48 / 1:12.67) Robert Batkowski 3:37.65 (1:12.97 / 1:12.12 / 1:12.56) Patrick Pigneter 3:37.95 (1:12.72 / 1:11.99 / 1:13.24)
Kammerlander wins his first world title.
Women's singles: Renate Gietl 3:40.43 (1:13.48 / 1:13.61 / 1:13.34) Yekaterina Lavrentyeva 3:40.67 (1:13.43 / 1:13.90 / 1:13.34) Melanie Schwarz 3:43.31 (1:14.50 / 1:14.62 / 1:14.19)
Gietl wins her second consecutive world title.
FIL World Championships in Cesana, Italy:
Men's doubles: Andreas Linger/Wolfgang Linger 1:33.280 (46.668 / 46.612) Christian Oberstolz/Patrick Gruber 1:33.512 (46.752 / 46.760) Andris Šics/Juris Šics 1:33.728 (46.909 / 46.719)
The Lingers win their second world title.
Mixed team relay: Cancelled due to technical difficulties.
Ski jumping
World Cup in Willingen, Germany:
HS 145: Severin Freund 289.1 points Martin Koch 286.9 Simon Ammann 284.5
Standings (after 19 of 26 events): (1) Thomas Morgenstern 1434 points (2) Ammann 1013 (3) Andreas Kofler 930
Snooker
Shoot-Out in Blackpool, England:
Final: Nigel Bond 58–24 Robert Milkins
Bond wins his fifth professional title.
Speed skating
World Cup 6 in Moscow, Russia:
Men's:
1000m: Stefan Groothuis 1:08.82 Denny Morrison 1:09.57 Mikael Flygind Larsen 1:09.65
Standings (after 7 of 8 races): (1) Groothuis 430 points (2) Lee Kyou-hyuk 402 (3) Shani Davis 380
Team Pursuit: 3:43.71 3:46.68 3:47.15
Final standings: (1) Norway 270 points (2) Russia 250 (3) 232
Women's:
1000m: Christine Nesbitt 1:15.59 Ireen Wüst 1:15.94 Heather Richardson 1:16.18
Standings (after 7 of 8 races): (1) Richardson 560 points (2) Nesbitt 500 (3) Nao Kodaira 339
Team Pursuit: 3:01.13 3:03.02 3:04.11
Final standings: (1) Netherlands 300 points (2) Germany & Norway 250
Tennis
Australian Open in Melbourne, Australia, day 14:
Men's Singles – Final: Novak Djokovic [3] vs. Andy Murray [5] 6–4, 6–2, 6–3
Djokovic wins his second Australian Open and Grand Slam singles title.
Mixed Doubles – Final: Katarina Srebotnik /Daniel Nestor def. Chan Yung-jan /Paul Hanley 6–3, 3–6, [10–7]
Srebotnik and Nestor win their first Grand Slam title together. Srebotnik wins her first Australian Open, and her fifth Grand Slam mixed doubles title. Nestor wins his second Australian Open and Grand Slam mixed doubles title.
January 29, 2011 (Saturday)
Alpine skiing
Men's World Cup in Chamonix, France:
Downhill: Didier Cuche 1:58.91 Dominik Paris 1:59.58 Klaus Kröll 1:59.79
Downhill standings (after 6 of 9 races): (1) Cuche 379 points (2) Michael Walchhofer 314 (3) Silvan Zurbriggen 285
Overall standings (after 24 of 38 races): (1) Ivica Kostelić 1078 points (2) Cuche 673 (3) Zurbriggen 658
Women's World Cup in Sestriere, Italy:
Downhill: Cancelled due to fog.
Bobsleigh
World Cup in St. Moritz, Switzerland:
Two-man: Manuel Machata/Andreas Bredau 2:12.27 (1:06.36 / 1:05.91) Beat Hefti/Thomas Lamparter 2:12.30 (1:06.42 / 1:05.88) Thomas Florschütz/Kevin Kuske 2:12.66 (1:06.58 / 1:06.08)
Standings (after 7 of 8 races): (1) Alexandr Zubkov 1430 points (2) Machata 1412 (3) Simone Bertazzo 1251
Two-women: Sandra Kiriasis/Berit Wiacker 2:14.89 (1:07.57 / 1:07.32) Anja Schneiderheinze-Stöckel/Christin Senkel 2:15.17 (1:07.76 / 1:07.41) Cathleen Martini/Romy Logsch 2:15.54 (1:07.71 / 1:07.83)
Standings (after 7 of 8 races): (1) Kiriasis 1511 points (2) Martini 1387 (3) Kaillie Humphries 1216
Cricket
Pakistan in New Zealand:
3rd ODI in Christchurch: 293/7 (50 overs; Mohammad Hafeez 115); 250/9 (50 overs). Pakistan win by 43 runs; 6-match series tied 1–1.
Extreme sport
Winter X Games XV in Aspen, United States:
Men's:
Snowboarder-X: Nick Baumgartner 1:29.700 Kevin Hill 1:29.856 Nate Holland 1:30.026
Holland fails to win the event for the first time since 2005.
Slopestyle skiing: Sammy Carlson 93.33 points Russ Henshaw 90.66 Andreas Håtveit 90.00
Snowboard Street: Nic Sauve 85 points Louis-Felix Paradis 68 Simon Chamberlain 64
Skiing Big Air: Alex Schlopy 92 points Bobby Brown 89 Sammy Carlson 87
Schlopy wins the event for the second successive year.
Women's:
Snowboarder-X: Lindsey Jacobellis 1:38.943 Callan Chythlook-Sifsof 1:39.681 Déborah Anthonioz 1:40.026
Jacobellis wins for the fourth consecutive year, and the seventh time in nine years.
Snowboard SuperPipe: Kelly Clark 92.33 points Kaitlyn Farrington 85.66 Elena Hight 80.00
Clark wins the event for the second time.
Figure skating
European Championships in Bern, Switzerland:
Ladies: Sarah Meier 170.60 points Carolina Kostner 168.54 Kiira Korpi 166.40
Meier becomes the first Swiss woman to win the championship since Denise Biellmann in 1981.
Men: Florent Amodio 226.86 points Brian Joubert 223.01 Tomáš Verner 222.60
Amodio wins the title for the first time. He and Joubert become the first French pair since Alain Giletti and Alain Calmat in 1961 to finish in the top two places.
Football (soccer)
AFC Asian Cup in Qatar:
Final: 0–1 (a.e.t.)
Japan win the Cup for a record fourth time.
Freestyle skiing
World Cup in Grasgehren, Germany:
Men's Ski Cross: Andreas Matt Patrick Koller Armin Niederer
Ski Cross standings (after 6 of 11 events): (1) Matt 419 points (2) Christopher Del Bosco 225 (3) Alex Fiva 199
Women's Ski Cross: Anna Holmlund Heidi Zacher Katrin Müller
Ski Cross standings (after 6 of 11 events): (1) Zacher 376 points (2) Holmlund 332 (3) Kelsey Serwa 329
World Cup in Calgary, Canada:
Men's Moguls: Mikaël Kingsbury 24.25 points Alexandre Bilodeau 24.16 Alexandr Smyshlyaev 23.53
Moguls standings (after 7 of 11 events): (1) Guilbaut Colas 536 points (2) Kingsbury 455 (3) Bilodeau 379
Women's Moguls: Hannah Kearney 24.43 points Audrey Robichaud 22.71 Ekaterina Stolyarova 22.59
Moguls standings (after 7 of 11 events): (1) Kearney 609 points (2) Jennifer Heil 412 (3) Robichaud 300
Men's Aerials: Warren Shouldice 244.90 points Renato Ulrich 243.01 Scotty Bahrke 229.57
Aerials standings (after 5 of 8 events): (1) Qi Guangpu 361 points (2) Jia Zongyang 238 (3) Ulrich 231
Overall standings: (1) Guilbaut Colas 77 points (2) Qi 72 (3) Andreas Matt 70
Women's Aerials: Cheng Shuang 187.23 points Xu Mengtao 186.65 Olha Volkova 175.40
Aerials standings (after 5 of 8 events): (1) Xu 420 points (2) Cheng 316 (3) Volkova 213
Overall standings: (1) Hannah Kearney 87 points (2) Xu 84 (3) Cheng & Heidi Zacher 63
Luge
FIL World Natural Track Championships in Umhausen, Austria:
Men's doubles: Pavel Porzhnev/Ivan Lazarev 2:33.24 (1:16.71 / 1:16.53) Patrick Pigneter/Florian Clara 2:33.90 (1:17.56 / 1:16.34) Andrzej Laszczak/Damian Waniczek 2:35.26 (1:17.99 / 1:17.27)
Porzhnev and Lazarev win their third world title.
FIL World Championships in Cesana, Italy:
Men's singles: Armin Zöggeler 1:43.538 (51.568 / 51.970) Felix Loch 1:43.559 (51.511 / 52.048) Andi Langenhan 1:44.013 (51.827 / 52.186)
Zöggeler wins his sixth world title.
Women's singles: Tatjana Hüfner 1:33.969 (46.976 / 46.993) Natalie Geisenberger 1:34.243 (47.027 / 47.216) Alex Gough 1:34.413 (47.051 / 47.362)
Hüfner wins her third world title. Gough wins the first ever world championship medal for women from Canada.
Mixed martial arts
Strikeforce: Diaz vs. Cyborg in San Jose, California, United States:
Light Heavyweight bout: Roger Gracie def. Trevor Prangley by submission (rear naked choke)
Heavyweight bout: Herschel Walker def. Scott Carson by TKO (strikes)
Middleweight Championship bout: Ronaldo Souza (c) def. Robbie Lawler by submission (rear naked choke)
Welterweight Championship bout: Nick Diaz (c) def. Evangelista Santos by submission (armbar)
Ski jumping
World Cup in Willingen, Germany:
HS 145 Team: (Gregor Schlierenzauer, Martin Koch, Andreas Kofler, Thomas Morgenstern) 1071.8 points (Michael Uhrmann, Martin Schmitt, Michael Neumayer, Severin Freund) 1025.1 (Kamil Stoch, Piotr Żyła, Stefan Hula, Adam Małysz) 1015.7
Speed skating
World Cup 6 in Moscow, Russia:
Men's:
500m: Jan Smeekens 34.93 Akio Ota 35.02 Tucker Fredricks 35.06
Standings (after 10 of 12 races): (1) Joji Kato 615 points (2) Lee Kang-seok 590 (3) Fredricks 540
5000m: Bob de Jong 6:19.43 Ivan Skobrev 6:21.16 Håvard Bøkko 6:22.79
Standings (after 4 of 6 races): (1) de Jong 360 points (2) Skobrev 280 (3) Bøkko 236
Women's:
500m: Jenny Wolf 38.01 Margot Boer 38.49 Heather Richardson 38.53(3)
Standings (after 10 of 12 races): (1) Wolf 920 points (2) Lee Sang-hwa 650 (3) Boer 570
1500m: Christine Nesbitt 1:56.80 Ireen Wüst 1:56.93 Martina Sáblíková 1:57.50
Standings (after 4 of 6 races): (1) Nesbitt 400 points (2) Marrit Leenstra 246 (3) Wüst 230
Tennis
Australian Open in Melbourne, Australia, day 13:
Women's Singles – Final: Kim Clijsters def. Li Na 3–6, 6–3, 6–3
Clijsters wins her first Australian Open title, and her fourth Grand Slam singles title.
Men's Doubles – Final: Bob Bryan / Mike Bryan def. Mahesh Bhupathi / Leander Paes 6–3, 6–4
The Bryans win the Australian Open men's doubles title for the third consecutive time and fifth time in six years, and their 10th Grand Slam men's doubles title.
Boys' Singles – Final: Jiří Veselý def. Luke Saville 6–0, 6–3
Girls' Singles – Final: An-Sophie Mestach def. Monica Puig 6–4, 6–2
Wheelchair Men's Singles – Final: Shingo Kunieda def. Stéphane Houdet 6–0, 6–3
Kuneida wins his fifth successive Australian Open title, the seventh successive Grand Slam title and the 12th Grand Slam title overall.
Wheelchair Women's Singles – Final: Esther Vergeer def. Daniela di Toro 6–0, 6–0
Vergeer maintains her unbeaten record in Grand Slam singles tournaments, as she wins her eighth Australian Open title and 17th Grand Slam title.
Wheelchair Quad Singles – Final: David Wagner def. Peter Norfolk 6–2, 6–3
January 28, 2011 (Friday)
Basketball
PBA Philippine Cup Finals (best-of-7 series):
Game 3 in Quezon City: San Miguel Beermen 103, Talk 'N Text Tropang Texters 82. Talk 'N Text lead series 2–1.
Extreme sport
Winter X Games XV in Aspen, United States:
Men's SuperPipe skiing: Kevin Rolland 93.66 points Torin Yater-Wallace 92.66 Simon Dumont 90.33
Rolland wins the event for the second successive year.
Men's Snowboard best method: Scotty Lago Ross Powers Chas Guldemond
Men's Snowmobile Speed & Style: Joe Parsons 93.59 points Heath Frisby 89.66 Cory Davis 100.48
Men's Snowboard big air: Torstein Horgmo 80 points Sebastien Toutant 79 Sage Kotsenburg 77
Figure skating
European Championships in Bern, Switzerland:
Ladies short program: (1) Kiira Korpi 63.50 points (2) Ksenia Makarova 60.35 (3) Sarah Meier 58.56
Ice dancing: Nathalie Péchalat/Fabian Bourzat 167.40 points Ekaterina Bobrova/Dmitri Soloviev 161.14 Sinead Kerr/John Kerr 157.49
Péchalat/Bourzat become the first ice dancing champions since Jayne Torvill and Christopher Dean in 1981 who didn't win any medal at previous championships.
Football (soccer)
AFC Asian Cup in Qatar:
Third place match: 2–3
South American Youth Championship in Peru:
Group B: (teams in bold advance to second round)
3–1
3–3
Final standings: 10 points, Ecuador 7, Colombia 5, Paraguay 4, Bolivia 1.
Handball
World Men's Championship in Sweden:
7th place match: 31–28
5th place match: 33–34
Semifinals:
29–26
28–24
Luge
FIL World Natural Track Championships in Umhausen, Austria:
Mixed team: I (Renate Gietl, Anton Blasbichler, Patrick Pigneter/Florian Clara) 79 points I (Melanie Batkowski, Gerald Kammerlander, Christian Schatz/Gerhard Mühlbacher) 72 I (Yekaterina Lavrentyeva, Juri Talikh, Pavel Porzhnev/Ivan Lazarev) 71
Skeleton
World Cup in St. Moritz, Switzerland:
Men: Martins Dukurs 2:16.54 (1:08.63 / 1:07.91) Frank Rommel 2:16.89 (1:08.58 / 1:08.31) Ben Sandford 2:17.34 (1:08.66 / 1:08.68)
Standings (after 7 of 8 events): (1) Dukurs 1494 points (2) Sandro Stielicke 1266 (3) Rommel 1218
Dukurs secures the title for the second successive year with his fourth win of the season.
Women: Shelley Rudman 2:19.17 (1:09.76 / 1:09.41) Mellisa Hollingsworth 2:19.41 (1:09.85 / 1:09.56) Anja Huber 2:19.43 (1:10.00 / 1:09.43)
Standings (after 7 of 8 events): (1) Huber 1485 points (2) Rudman 1474 (3) Hollingsworth 1364
Speed skating
World Cup 6 in Moscow, Russia:
Men's:
500m: Pekka Koskela 35.15 Jamie Gregg 35.23 Jacques de Koning 35.24
Standings (after 9 of 12 races): (1) Joji Kato 615 points (2) Lee Kang-seok 590 (3) Keiichiro Nagashima 488
1500m: Ivan Skobrev 1:45.49 Denny Morrison 1:46.25 Mark Tuitert 1:46.59
Standings (after 4 of 6 races): (1) Simon Kuipers 245 points (2) Håvard Bøkko 232 (3) Stefan Groothuis 222
Women's:
500m: Jenny Wolf 37.90 Margot Boer 38.56 Heather Richardson 38.57
Standings (after 9 of 12 races): (1) Wolf 820 points (2) Lee Sang-hwa 650 (3) Boer 490
3000m: Martina Sáblíková 4:04.03 Ireen Wüst 4:05.41 Brittany Schussler 4:10.45
Standings (after 4 of 6 races): (1) Stephanie Beckert 275 points (2) Sáblíková 260 (3) Jilleanne Rookard 236
Tennis
Australian Open in Melbourne, Australia, day 12:
Men's Singles – Semifinal: Andy Murray def. David Ferrer 4–6, 7–6(2), 6–1, 7–6(2)
Murray reaches the final for the second successive year, and a Grand Slam final for the third time.
Women's Doubles – Final: Gisela Dulko / Flavia Pennetta def. Victoria Azarenka / Maria Kirilenko 2–6, 7–5, 6–1
Dulko and Pennetta both win their first Grand Slam title.
Boys' Doubles – Final: Filip Horanský / Jiří Veselý def. Ben Wagland / Andrew Whittington 6–4, 6–4
Girls' Doubles – Final: An-Sophie Mestach / Demi Schuurs def. Eri Hozumi / Miyu Kato 6–2, 6–3
Wheelchair Men's Doubles – Final: Maikel Scheffers / Shingo Kunieda def. Stéphane Houdet / Nicolas Peifer 6–3, 6–3
Wheelchair Women's Doubles – Final: Esther Vergeer / Sharon Walraven def. Aniek van Koot / Jiske Griffioen 6–0, 6–2
January 27, 2011 (Thursday)
American football
NFL news: The Tennessee Titans and their head coach Jeff Fisher, the longest-tenured coach in the league, part ways. He had been in the post since 1994, when the franchise was known as the Houston Oilers.
Basketball
Euroleague Top 16, matchday 2:
Group E: Panathinaikos Athens 82–56 Unicaja Málaga
Standings (after 2 games): Panathinaikos Athens 2–0; Lietuvos Rytas, Caja Laboral 1–1; Unicaja Málaga 0–2.
Group F:
Maccabi Tel Aviv 99–58 Virtus Roma
Union Olimpija Ljubljana 67–68 Regal FC Barcelona
Standings (after 2 games): Regal FC Barcelona 2–0; Maccabi Tel Aviv, Union Olimpija Ljubljana 1–1; Virtus Roma 0–2.
Group H: Fenerbahçe Ülker 75–73 Power Electronics Valencia
Standings (after 2 games): Fenerbahçe Ülker 2–0; Power Electronics Valencia, Olympiacos Piraeus 1–1; Žalgiris Kaunas 0–2.
Extreme sport
Winter X Games XV in Aspen, United States:
Women's Slopestyle skiing: Kaya Turski 93.66 points Keri Herman 93.33 Grete Eliassen 93.00
Turski wins the gold for the second successive year.
Men's Snowmobile freestyle: Daniel Bodin 91.33 points Justin Hoyer 91.00 Caleb Moore 90.00
Women's SuperPipe skiing: Sarah Burke 91.33 points Brita Sigourney 86.00 Rosalind Groenewoud 84.00
Burke wins her fourth SuperPipe gold in five years.
Figure skating
European Championships in Bern, Switzerland:
Men short program: (1) Florent Amodio 78.11 points (2) Michal Březina 76.13 (3) Artur Gachinski 73.76
Pairs: Aliona Savchenko/Robin Szolkowy 206.20 points Yuko Kavaguti/Alexander Smirnov 203.61 Vera Bazarova/Yuri Larionov 188.24
Savchenko and Szolkowy win their fourth title in five years.
Football (soccer)
South American Youth Championship in Peru: (teams in bold advance to second round)
Group A:
3–1
2–0
Final standings: 10 points, Chile 6, Uruguay, Peru 4, Venezuela 3.
Copa Libertadores First Stage, first leg:
Cerro Porteño 1–0 Deportivo Petare
Bolívar 0–1 Unión Española
Handball
World Men's Championship in Sweden:
11th place match: 40–35 (ET)
9th place match: 32–31 (ET)
Snooker
Championship League Group 4:
Final: Mark Allen 1–3 Ali Carter
Carter advances to the winners group.
Tennis
Australian Open in Melbourne, Australia, day 11:
Men's Singles – Semifinal: Novak Djokovic [3] def. Roger Federer [2] 7–6(3), 7–5, 6–4
Djokovic reaches the Australian Open final for the second time, and a Grand Slam final for the fourth time.
Women's Singles – Semifinals:
Li Na [9] def. Caroline Wozniacki [1] 3–6, 7–5, 6–3
Li becomes the first Chinese player to reach a Grand Slam singles final.
Kim Clijsters [3] def. Vera Zvonareva [2] 6–3, 6–3
Clijsters reaches the Australian Open final for the second time, and a Grand Slam final for the eighth time.
Wheelchair Quad Doubles – Final: Andrew Lapthorne / Peter Norfolk def. Nicholas Taylor / David Wagner 6–3, 6–3
January 26, 2011 (Wednesday)
Basketball
Euroleague Top 16, matchday 2:
Group E: Caja Laboral 86–89 Lietuvos Rytas
Standings: Panathinaikos Athens 1–0; Lietuvos Rytas, Caja Laboral 1–1; Unicaja Málaga 0–1.
Group G:
Partizan Belgrade 76–79 Efes Pilsen Istanbul
Montepaschi Siena 68–78 Real Madrid
Standings (after 2 games): Real Madrid, Efes Pilsen 2–0; Montepaschi Siena, Partizan Belgrade 0–2.
Group H: Žalgiris Kaunas 64–71 Olympiacos Piraeus
Standings: Fenerbahçe Ülker, Power Electronics Valencia 1–0; Olympiacos Piraeus 1–1; Žalgiris Kaunas 0–2.
PBA Philippine Cup Finals (best-of-7 series):
Game 2 in Pasay: Talk 'N Text Tropang Texters 110, San Miguel Beermen 102. Talk 'N Text lead series 2–0.
Cricket
England in Australia:
4th ODI in Adelaide: 299/8 (50 overs; Jonathan Trott 102); 278/7 (50 overs). England win by 21 runs; Australia lead 7-match series 3–1.
Pakistan in New Zealand:
2nd ODI in Queenstown: 31/0 (4.2 overs); . Match abandoned; New Zealand lead 6-match series 1–0.
Figure skating
European Championships in Bern, Switzerland:
Short dance: (1) Nathalie Péchalat/Fabian Bourzat 66.91 points (2) Ekaterina Bobrova/Dmitri Soloviev 65.46 (3) Sinead Kerr/John Kerr 62.87
Pairs short program: (1) Aliona Savchenko/Robin Szolkowy 72.31 points (2) Yuko Kavaguti/Alexander Smirnov 69.49 (3) Vera Bazarova/Yuri Larionov 62.89
Football (soccer)
Copa Libertadores First Stage, first leg:
Corinthians 0–0 Deportes Tolima
Liverpool 2–2 Grêmio
Alianza Lima 0–2 Jaguares
Snowboarding
World Cup in Denver, United States:
Big Air: Rocco van Straten 27.9 points Zachary Stone 26.5 Michael Macho 20.7
Big Air standings (after 3 of 4 events): (1) Sebastien Toutant 1220 points (2) van Straten 1165 (3) Ståle Sandbech 1090
Overall Freestyle standings: (1) Toutant 1220 points (2) van Straten 1185 (3) Seppe Smits 1180
Tennis
Australian Open in Melbourne, Australia, day 10:
Men's Singles – Quarterfinals:
David Ferrer [7] def. Rafael Nadal [1] 6–4, 6–2, 6–3
Andy Murray [5] def. Alexandr Dolgopolov 7–5, 6–3, 6–7(3), 6–3
Women's Singles – Quarterfinals:
Vera Zvonareva [2] def. Petra Kvitová [25] 6–2, 6–4
Kim Clijsters [3] def. Agnieszka Radwańska [12] 6–3, 7–6(4)
News: Former World Number 1 player Justine Henin announces her second retirement from the sport, citing a lingering injury to her right elbow.
January 25, 2011 (Tuesday)
Alpine skiing
Men's World Cup in Schladming, Austria:
Slalom: Jean-Baptiste Grange 1:46.54 (54.62 / 51.92) André Myhrer 1:46.58 (53.77 / 52.81) Mattias Hargin 1:47.14 (54.22 / 52.92)
Slalom standings (after 7 of 10 races): (1) Ivica Kostelić 478 points (2) Grange 382 (3) Myhrer 333
Overall standings (after 23 of 38 races): (1) Kostelić 1075 points (2) Silvan Zurbriggen 643 (3) Aksel Lund Svindal 585
Football (soccer)
AFC Asian Cup in Qatar:
Semifinals:
2–2 (3–0 pen.)
0–6
South American Youth Championship in Peru: (teams in bold advance to second round)
Group B:
2–1
0–1
Standings: Brazil 10 points (4 matches), Ecuador, Colombia 4 (3), 3 (3), Bolivia 1 (3).
Copa Libertadores First Stage, first leg:
Independiente 2–0 Deportivo Quito
Handball
World Men's Championship in Sweden: (teams in bold advance to the semifinals)
Group I:
25–35
30–24
34–28
Final standings: France, Spain 9 points, Iceland, Hungary 4, Norway, Germany 2.
Group II:
28–25
26–25
27–24
Final standings: Denmark 10 points, Sweden 6, Croatia 5, Poland 4, Serbia 3, Argentina 2.
Snooker
Championship League Group 3:
Final: Mark King 2–3 Shaun Murphy
Murphy advances to the winners group.
Tennis
Australian Open in Melbourne, Australia, day 9:
Men's Singles – Quarterfinals:
Roger Federer [2] def. Stanislas Wawrinka [19] 6–1, 6–3, 6–3
Novak Djokovic [3] def. Tomáš Berdych [6] 6–1, 7–6(5), 6–1
Women's Singles – Quarterfinals:
Caroline Wozniacki [1] def. Francesca Schiavone [6] 3–6, 6–3, 6–3
Li Na [9] def. Andrea Petkovic [30] 6–2, 6–4
January 24, 2011 (Monday)
Football (soccer)
South American Youth Championship in Peru: (teams in bold advance to second round)
Group A:
1–3
1–1
Standings: Argentina 10 points (4 matches), 4 (3), Venezuela, Chile 3 (3), Peru 1 (3).
Handball
World Men's Championship in Sweden:
Group I: (teams in bold advance to the semifinals)
24–32
27–25
26–31
Standings (after 4 matches): France, Spain 7 points, Iceland, Hungary 4, Germany 2, Norway 0.
15th place match: 24–29
13th place match: 23–26
Tennis
Australian Open in Melbourne, Australia, day 8:
Men's Singles – 4th Round:
Rafael Nadal [1] def. Marin Čilić [15] 6–2, 6–4, 6–3
Alexandr Dolgopolov def. Robin Söderling [4] 1–6, 6–3, 6–1, 4–6, 6–2
Andy Murray [5] def. Jürgen Melzer [11] 6–3, 6–1, 6–1
David Ferrer [7] def. Milos Raonic 4–6, 6–2, 6–3, 6–4
Women's Singles – 4th Round:
Vera Zvonareva [2] def. Iveta Benešová 6–4, 6–1
Kim Clijsters [3] def. Ekaterina Makarova 7–6(3), 6–2
Agnieszka Radwańska [12] def. Peng Shuai 7–5, 3–6, 7–5
Petra Kvitová [25] def. Flavia Pennetta [22] 3–6, 6–3, 6–3
January 23, 2011 (Sunday)
Alpine skiing
Men's World Cup in Kitzbühel, Austria:
Slalom: Jean-Baptiste Grange 1:40.93 (52.60 / 48.33) Ivica Kostelić 1:41.21 (52.20 / 49.01) Giuliano Razzoli 1:41.62 (52.79 / 48.83)
Slalom standings (after 6 of 10 races): (1) Kostelić 433 points (2) Marcel Hirscher 326 (3) Grange 282
Combined: Kostelić 3:40.84 (1:59.63 / 52.20 / 49.01) Silvan Zurbriggen 3:42.77 (1:59.89 / 52.96 / 49.92) Romed Baumann 3:47.51 (1:59.54 / 55.93 / 52.04)
Combined standings (after 2 of 4 races): (1) Kostelić 200 points (2) Carlo Janka 112 (3) Zurbriggen 98
Overall standings (after 22 of 38 races): (1) Kostelić 1030 points (2) Zurbriggen 629 (3) Aksel Lund Svindal 585
Women's World Cup in Cortina, Italy:
Super-G: Lindsey Vonn 1:22.64 Maria Riesch 1:22.69 Lara Gut 1:23.52
Super G standings (after 4 of 7 races): (1) Vonn 380 points (2) Riesch 229 (3) Gut 205
Overall standings (after 21 of 38 races): (1) Riesch 1232 points (2) Vonn 1087 (3) Elisabeth Görgl 628
American football
NFL playoffs – Conference Championships:
NFC: Green Bay Packers 21, Chicago Bears 14
The Packers win the NFC Championship Game for the third time.
AFC: Pittsburgh Steelers 24, New York Jets 19
The Steelers win the AFC Championship Game for the second time in three years, and a record-extending eighth time overall.
Badminton
BWF Super Series:
Malaysia Super Series in Kuala Lumpur:
Men's singles: Lee Chong Wei def. Taufik Hidayat 21–8, 21–17
Women's singles: Wang Shixian def. Wang Yihan 21–18, 21–14
Men's doubles: Chai Biao /Guo Zhendong def. Mads-Conrads Petersen /Jonas Rasmussen 21–16, 21–14
Women's doubles: Tian Qing /Zhao Yunlei def. Wang Xiaoli /Yu Yang 21–12, 6–21, 21–17
Mixed doubles: He Hanbin /Ma Jin def. Tao Jiaming /Tian Qing 21–13, 13–21, 21–16
Biathlon
World Cup 6 in Antholz, Italy:
Women's 12.5 km Mass Start: Tora Berger 33:56.3 (0+1+0+1) Marie-Laure Brunet 33:56.9 (0+0+0+1) Darya Domracheva 34:02.1 (0+0+0+0)
Mass start standings (after 2 of 5 races): (1) Brunet 97 points (2) Berger 90 (3) Helena Ekholm 85
Overall standings (after 14 of 26 races): (1) Kaisa Mäkäräinen 574 points (2) Ekholm 546 (3) Andrea Henkel 523
Men's 4 x 7.5 km Relay: (Christoph Stephan, Daniel Böhm, Arnd Peiffer, Michael Greis) 1:10:17.2 (0+7) (Christian de Lorenzi, Rene Laurent Vuillermoz, Lukas Hofer, Markus Windisch) 1:10:35.8 (0+9) (Emil Hegle Svendsen, Ole Einar Bjørndalen, Alexander Os, Tarjei Bø) 1:10:45.4 (0+8)
Standings (after 3 of 4 races): (1) Germany 163 points (2) Norway 156 (3) & 122
Bobsleigh
World Cup and FIBT European Championships in Winterberg, Germany:
Four-man: Manuel Machata/Richard Adjei/Andreas Bredau/Florian Becke 1:50.15 (55.29 / 54.86) Thomas Florschütz/Ronny Listner/Kevin Kuske/Andreas Barucha 1:50.28 (55.10 / 55.18) Alexandr Zubkov/Filipp Yegorov/Dmitry Trunenkov/Nikolay Hrenkov 1:50.28 (55.27 / 55.01)
Machata, Adjei, Bredau and Becke all win their first European title.
Standings (after 6 of 8 races): (1) Machata 1261 points (2) Steve Holcomb 1186 (3) Karl Angerer 1090
Bowls
World Indoor Championships in Hopton-on-Sea, England:
Final: Paul Foster def. Alex Marshall 11–5, 8–8
Foster wins his fourth world title.
Cricket
England in Australia:
3rd ODI in Sydney: 214 (48 overs); 215/6 (46 overs). Australia win by 4 wickets; lead 7-match series 3–0.
India in South Africa:
5th ODI in Centurion: 250/9 (46/46 overs; Hashim Amla 116*); 234 (40.2 overs; Yusuf Pathan 105). South Africa win by 33 runs (D/L); win 5-match series 3–2.
Cross-country skiing
World Cup in Otepää, Estonia:
Men's Classic Sprint: Eirik Brandsdal 3:25.5 Ola Vigen Hattestad 3:25.5 Nikita Kriukov 3:25.8
Sprint standings (after 7 of 11 races): (1) Emil Jönsson 330 points (2) Hattestad 264 (3) Jesper Modin 220
Overall standings (after 21 of 31 races): (1) Dario Cologna 1197 points (2) Petter Northug 774 (3) Lukáš Bauer 698
Women's Classic Sprint: Petra Majdič 3:07.2 Hanna Brodin 3:07.9 Maiken Caspersen Falla 3:09.2
Sprint standings (after 7 of 11 races): (1) Majdič 354 points (2) Kikkan Randall 291 (3) Arianna Follis 288
Overall standings (after 21 of 31 races): (1) Justyna Kowalczyk 1401 points (2) Marit Bjørgen 922 (3) Follis 880
Cycling
UCI World Tour:
Tour Down Under in Australia:
Stage 6, Adelaide to Adelaide, : Ben Swift () 1h 53' 47" Greg Henderson () s.t. Matthew Goss () s.t.
Final overall standings: (1) Cameron Meyer () 17h 54' 27" (2) Goss + 2" (3) Swift + 8"
Football (soccer)
Central American Cup in Panama:
Third place match: 0–0 (4–5 pen.)
Final: 2–1
Honduras win the championship for the third time.
South American Youth Championship in Peru: (teams in bold advance to final group)
Group B:
1–0
1–1
Standings: Brazil 7 points (3 matches), Ecuador 4 (2), Paraguay 3 (3), Bolivia, 1 (2).
Commonwealth of Independent States Cup in Saint Petersburg, Russia:
Final: Inter Baku 0–0 (6–5 pen.) Shakhtyor Soligorsk
Baku win the title for the first time.
Freestyle skiing
World Cup in Lake Placid, United States:
Moguls men: Guilbaut Colas 25.70 points Mikaël Kingsbury 25.59 Pierre-Alexandre Rousseau 25.16
Moguls standings (after 6 of 11 events): (1) Colas 500 points (2) Kingsbury 355 (3) Alexandre Bilodeau 299
Overall standings: (1) Colas 83 points (2) Andreas Matt 64 (3) Qi Guangpu 63
Moguls women: Hannah Kearney 26.12 points Chloé Dufour-Lapointe 24.85 Kristi Richards 24.57
Moguls standings (after 6 of 11 events): (1) Kearney 509 points (2) Jennifer Heil 390 (3) Richards 286
Overall standings: (1) Kearney 85 points (2) Xu Mengtao 68 (3) Kelsey Serwa 66
Golf
PGA Tour:
Bob Hope Classic in Palm Desert and La Quinta, California:
Winner: Jhonattan Vegas 333 (−27)PO
In his fifth PGA Tour event, Vegas wins his maiden title, and also the first PGA Tour title by a Venezuelan, defeating defending champion Bill Haas and Gary Woodland in a playoff.
European Tour:
Abu Dhabi HSBC Golf Championship in Abu Dhabi, United Arab Emirates:
Winner: Martin Kaymer 264 (−24)
Kaymer wins the tournament for the third time in four years, and wins his ninth European Tour title.
Champions Tour:
Mitsubishi Electric Championship at Hualalai in Kaūpūlehu, Hawaii:
Winner: John Cook 194 (−22)
Cook wins his sixth Champions Tour title.
Handball
World Men's Championship in Sweden:
Group II: (teams in bold advance to semifinals)
29–25
24–31
27–26
Standings (after 4 matches): Denmark 8 points, Sweden 6, Poland 4, Croatia 3, Argentina 2, Serbia 1.
23rd place match: 23–33
21st place match: 18–28
19th place match: 29–30
17th place match: 35–39
Luge
World Cup in Altenberg, Germany:
Men's singles: Felix Loch 1:50.725 (55.090 / 55.635) Armin Zöggeler 1:50.866 (55.321 / 55.545) Albert Demtschenko 1:50.915 (55.356 / 55.559)
Standings (after 7 of 9 events): (1) Zöggeler 610 points (2) Loch 545 (3) David Möller 440
Team relay: (Tatjana Hüfner, Felix Loch, Tobias Wendl/Tobias Arlt) 2:25.216 (47.434 / 48.724 / 49.058) (Tatiana Ivanova, Albert Demtschenko, Vladislav Yuzhakov/Vladimir Makhnutin) 2:25.746 (47.912 / 48.685 / 49.149) (Nina Reithmayer, Daniel Pfister, Georg Fischler/Peter Penz) 2:25.941 (47.823 / 49.161 / 48.957)
Standings (after 5 of 6 events): (1) Germany 500 points (2) 355 (3) Austria & Russia 326
Germany win their fifth consecutive title.
Nordic combined
World Cup in Chaux-Neuve, France:
HS 117 / 10 km: Jason Lamy-Chappuis 22:00.3 Felix Gottwald 22:07.5 Mikko Kokslien 22:07.7
Standings (after 11 of 13 races): (1) Lamy-Chappuis 789 points (2) Kokslien 609 (3) Gottwald 556
Rugby union
Heineken Cup pool stage, matchday 6 (teams in bold advance to the Heineken Cup knockout stages, team in italics advances to the Amlin Challenge Cup knockout stages):
Pool 5:
Leicester Tigers 62–15 Benetton Treviso
Perpignan 37–5 Scarlets
Final standings: Perpignan 22 points (6–3 in head-to head competition points), Leicester Tigers 22 (3–6), Scarlets 15, Benetton Treviso 1.
Pool 6:
Newport Gwent Dragons 16–23 Glasgow Warriors
London Wasps 21–16 Toulouse
Final standings: Toulouse 22 points, London Wasps 19, Glasgow Warriors 12, Newport Gwent Dragons 2.
Quarterfinal matchups:
Northampton Saints vs. Ulster
Leinster vs. Leicester Tigers
Perpignan vs. Toulon
Biarritz vs. Toulouse
Amlin Challenge Cup pool stage, matchday 6 (teams in bold advance to the knockout stages):
Pool 3: Bourgoin – Newcastle Falcons — postponed due to a frozen pitch, and will not be played.
Final standings: Montpellier 21 points (6 matches), Exeter Chiefs 16 (6), Newcastle Falcons 9 (5), Bourgoin 6 (5).
Pool 4:
Crociati Parma 17–34 Stade Français
Leeds Carnegie 26–6 București Oaks
Final standings: Stade Français 29 points, Leeds Carnegie 19, București Oaks, Crociati Parma 5.
Quarterfinal matchups:
Stade Français vs. Montpellier
Brive vs. Munster
La Rochelle vs. Clermont
Harlequins vs. London Wasps
Skeleton
World Cup and FIBT European Championships in Winterberg, Germany:
Men: Martins Dukurs 1:55.41 (57.48 / 57.93) Sergey Chudinov 1:55.61 (57.55 / 58.06) Aleksandr Tretyakov 1:55.71 (57.78 / 57.93)
Dukurs wins his second consecutive European title.
Standings (after 6 of 8 events): (1) Dukurs 1269 points (2) Tretyakov 1155 (3) Chudinov 1109
Ski jumping
World Cup in Zakopane, Poland:
HS 134: Kamil Stoch 254.0 points Tom Hilde 249.5 Michael Uhrmann 246.8
Standings (after 18 of 26 events): (1) Thomas Morgenstern 1384 points (2) Simon Ammann 953 (3) Andreas Kofler 915
Speed skating
World Sprint Championships in Heerenveen, Netherlands:
Men: Lee Kyou-hyuk 139.255 points Mo Tae-bum 139.365 Shani Davis 139.600
Lee wins his fourth world title in five years.
Women: Christine Nesbitt 152.220 points Annette Gerritsen 154.015 Margot Boer 154.025
Nesbitt wins her first world title.
Tennis
Australian Open in Melbourne, Australia, day 7:
Men's Singles – 4th Round:
Roger Federer [2] def. Tommy Robredo 6–3, 3–6, 6–3, 6–2
Novak Djokovic [3] def. Nicolás Almagro [14] 6–3, 6–4, 6–0
Tomáš Berdych [6] def. Fernando Verdasco [9] 6–4, 6–2, 6–3
Stanislas Wawrinka [19] def. Andy Roddick [8] 6–3, 6–4, 6–4
Women's Singles – 4th Round:
Caroline Wozniacki [1] def. Anastasija Sevastova 6–3, 6–4
Francesca Schiavone [6] def. Svetlana Kuznetsova [23] 6–4, 1–6, 16–14
This was the longest women's match by time in a Grand Slam event in the open era, lasting 4 hours, 44 minutes.
Li Na [9] def. Victoria Azarenka [8] 6–3, 6–3
Andrea Petkovic [30] def. Maria Sharapova [14] 6–2, 6–3
January 22, 2011 (Saturday)
Alpine skiing
Men's World Cup in Kitzbühel, Austria:
Downhill: Didier Cuche 1:57.72 Bode Miller 1:58.70 Adrien Théaux 1:58.90
Cuche becomes the oldest winner of a men's World Cup race, at the age of .
Downhill standings (after 5 of 9 races): (1) Cuche 279 points (2) Silvan Zurbriggen 270 (3) Michael Walchhofer 269
Overall standings (after 20 of 38 races): (1) Ivica Kostelić 850 points (2) Aksel Lund Svindal 585 (3) Cuche 573
Women's World Cup in Cortina, Italy:
Downhill: Maria Riesch 1:39.30 Julia Mancuso 1:40.21 Lindsey Vonn 1:40.30
Downhill standings (after 5 of 9 races): (1) Vonn 420 points (2) Riesch 357 (3) Mancuso 217
Overall standings (after 20 of 38 races): (1) Riesch 1152 points (2) Vonn 987 (3) Elisabeth Görgl 592
Basketball
PBA Philippine Cup Finals (best-of-7 series):
Game 1 in Victorias: Talk 'N Text Tropang Texters 91, San Miguel Beermen 82. Talk 'N Text lead the series 1–0.
Biathlon
World Cup 6 in Antholz, Italy:
Women's 4 x 6 km Relay: (Svetlana Sleptsova, Anna Bogaliy-Titovets, Natalia Guseva, Olga Zaitseva) 1:11:14.7 (0+6) (Jenny Jonsson, Anna Carin Olofsson-Zidek, Anna Maria Nilsson, Helena Ekholm) 1:12:11.8 (0+7) (Sabrina Buchholz, Kathrin Hitzer, Miriam Gössner, Andrea Henkel) 1:13:34.8 (4+13)
Standings (after 3 of 4 races): (1) Sweden 152 points (2) Germany 146 (3) Russia 143
Men's 15 km Mass Start: Martin Fourcade 35:33.4 (0+0+1+0) Björn Ferry 35:50.6 (0+0+1+1) Anton Shipulin 35:51.0 (1+1+0+0)
Mass start standings (after 2 of 5 races): (1) Fourcade 103 points (2) Tarjei Bø & Emil Hegle Svendsen 86
Overall standings (after 14 of 26 races): (1) Bø 598 points (2) Svendsen 592 (3) Michael Greis 485
Bobsleigh
World Cup and FIBT European Championships in Winterberg, Germany:
Two-man: Alexandr Zubkov/Alexey Voyevoda 1:52.21 (56.20 / 56.01) Thomas Florschütz/Kevin Kuske 1:52.35 (56.16 / 56.19) Karl Angerer/Alex Mann 1:52.44 (56.37 / 56.07)
Standings (after 6 of 8 races): (1) Zubkov 1238 points (2) Manuel Machata 1187 (3) Simone Bertazzo 1107
Cricket
Pakistan in New Zealand:
1st ODI in Wellington: 124 (37.3 overs; Tim Southee 5/33); 125/1 (17.2 overs). New Zealand win by 9 wickets; lead 6-match series 1–0.
Cross-country skiing
World Cup in Otepää, Estonia:
Men's 15 km Classic: Eldar Rønning 37:27.2 Daniel Rickardsson 37:42.3 Maxim Vylegzhanin 37:44.8
Distance standings (after 12 of 17 races): (1) Dario Cologna 481 points (2) Alexander Legkov 406 (3) Lukáš Bauer 400
Overall standings (after 20 of 31 races): (1) Cologna 1197 points (2) Petter Northug 738 (3) Bauer 698
Women's 10 km Classic: Marit Bjørgen 27:02.1 Justyna Kowalczyk 27:34.1 Therese Johaug 27:43.7
Distance standings (after 12 of 17 races): (1) Kowalczyk 672 points (2) Bjørgen 510 (3) Johaug 430
Overall standings (after 20 of 31 races): (1) Kowalczyk 1351 points (2) Bjørgen 896 (3) Arianna Follis 880
Cycling
UCI World Tour:
Tour Down Under in Australia:
Stage 5, McLaren Vale to Willunga, : Francisco Ventoso () 3h 06' 10" Michael Matthews () s.t. Matthew Goss () s.t.
Overall standings: (1) Cameron Meyer () 16h 00' 40" (2) Goss + 8" (3) Laurens ten Dam () + 10"
Equestrianism
Dressage:
FEI World Cup Western European League:
7th competition in Amsterdam (CDI-W): Adelinde Cornelissen on Parzival Isabell Werth on Warum nicht FRH Patrik Kittel on Watermill Scandic H.B.C.
Standings (after 7 of 10 competitions): (1) Ulla Salzgeber & Werth 74 points (3) Cornelissen 63
Football (soccer)
AFC Asian Cup in Qatar:
Quarterfinals:
1–0 (a.e.t.)
0–1 (a.e.t.)
South American Youth Championship in Peru: (teams in bold advance to the second stage)
Group A:
1–1
0–4
Standings: Argentina 7 points (3 matches), Uruguay 4 (3), Chile 3 (2), Venezuela 2 (2), 0 (2).
African Under-17 Championship in Rwanda:
Final: 2–1
Burkina Faso win the championship for the first time. Both teams qualify for the FIFA U-17 World Cup.
Freestyle skiing
World Cup in Lake Placid, United States:
Moguls men: Guilbaut Colas 25.81 points Alexandre Bilodeau 25.59 Jeremy Cota 25.31
Moguls standings (after 5 of 11 events): (1) Colas 400 points (2) Bilodeau & Mikaël Kingsbury 275
Overall standings: (1) Colas 80 points (2) Andreas Matt 64 (3) Qi Guangpu 63
Moguls women: Hannah Kearney 25.45 points Jennifer Heil 24.72 Audrey Robichaud 24.41
Moguls standings (after 5 of 11 events): (1) Kearney 409 points (2) Heil 340 (3) Justine Dufour-Lapointe 227
Overall standings: (1) Kearney 82 points (2) Heil & Xu Mengtao 68
Handball
World Men's Championship in Sweden: (teams in strike are eliminated)
Group I:
32–27
27–24
37–24
Standings (after 3 matches): France, Spain 5 points, Iceland 4, Germany, Hungary 2, Norway 0.
Group II:
36–18
24–28
28–27
Standings (after 3 matches): Denmark 6 points, Sweden 4, Croatia 3, Poland, Argentina 2, Serbia 1.
Presidents Cup:
34–28
25–26
21–29
24–29 (OT)
33–38
30–37
Korfball
Europa Cup in Budapest, Hungary:
7th place match: CC Oeiras 19–15 CK Vacarisses
5th place match: Szentendre KK 23–12 KV Adler Rauxel
Third place match: České Budějovice 19–18 Trojans KC
Final: R Scaldis SC 23–33 Koog Zaandijk
Koog Zaandijk win the tournament for the second time.
Luge
World Cup in Altenberg, Germany:
Women's singles: Tatjana Hüfner 1:45.626 (53.015 / 52.611) Natalie Geisenberger 1:45.648 (52.861 / 52.787) Anke Wischnewski 1:46.270 (53.253 / 53.017)
Hüfner wins her sixth race of the season.
Standings (after 7 of 9 events): (1) Hüfner 685 points (2) Geisenberger 560 (3) Wischnewski 485
Doubles: Andreas Linger/Wolfgang Linger 1:24.076 (42.062 / 42.014) Tobias Wendl/Tobias Arlt 1:24.352 (42.184 / 42.168) Toni Eggert/Sascha Benecken 1:24.514 (42.294 / 42.220)
Standings (after 7 of 9 events): (1) Wendl/Arlt 615 points (2) Christian Oberstolz/Patrick Gruber 540 (3) Linger/Linger 492
Mixed martial arts
UFC: Fight For The Troops 2 in Kileen, Texas, United States:
Lightweight bout: Matt Wiman def. Cole Miller by unanimous decision (29–28, 30–27, 30–27)
Heavyweight bout: Pat Barry def. Joey Beltran by unanimous decision (30–27, 29–28, 29–28)
Featherweight bout: Mark Hominick def. George Roop by TKO (punches)
Heavyweight bout: Matt Mitrione def. Tim Hague by TKO (punches)
Lightweight bout: Melvin Guillard def. Evan Dunham by TKO (strikes)
Nordic combined
World Cup in Chaux-Neuve, France:
HS 117 / 10 km: David Kreiner 21:59.2 Mikko Kokslien 21:59.8 Felix Gottwald 22:00.7
Standings (after 10 of 13 races): (1) Jason Lamy-Chappuis 689 points (2) Kokslien 549 (3) Gottwald 476
Rugby union
Heineken Cup pool stage, matchday 6 (teams in bold advance to the Heineken Cup knockout stages, team in italics advances to the Amlin Challenge Cup knockout stages):
Pool 1:
Castres 12–23 Northampton Saints
Edinburgh 14–21 Cardiff Blues
Final standings: Northampton Saints 25 points, Cardiff Blues 14, Castres 11, Edinburgh 8.
Pool 3:
Munster 28–14 London Irish
Ospreys 29–17 Toulon
Final standings: Toulon 17 points, Munster 16, Ospreys 14, London Irish 9.
Pool 4:
Aironi 6–43 Ulster
Biarritz 26–19 Bath
Final standings: Biarritz 22 points (6–4 in head-to head competition points), Ulster 22 (4–6), Bath 14, Aironi 4.
Amlin Challenge Cup pool stage, matchday 6 (teams in bold advance to the knockout stages):
Pool 1:
Connacht 83–7 Cavalieri Prato
Harlequins 39–17 Bayonne
Final standings: Harlequins 24 points, Connacht 15 (8–1 in head-to head competition points), Bayonne 15 (1–8), Cavalieri Prato 4.
Pool 2:
El Salvador 5–50 Sale Sharks
Petrarca Padova 20–24 Brive
Final standings: Brive 27 points, Sale Sharks 21, Petrarca Padova 6, El Salvador 4.
Pool 3:
Bourgoin – Newcastle Falcons — postponed to January 23 due to a frozen pitch
Montpellier 32–30 Exeter Chiefs
Standings: Montpellier 21 points (6 matches), Exeter Chiefs 16 (6), Newcastle Falcons 9 (5), Bourgoin 6 (5).
Skeleton
World Cup and FIBT European Championships in Winterberg, Germany:
Women: Shelley Rudman 1:57.77 (58.75 / 59.02) Anja Huber 1:57.99 (58.90 / 59.09) Amy Gough 1:58.52 (59.21 / 59.31)
Rudman wins her second European title in three years.
Standings (after 6 of 8 events): (1) Huber 1285 points (2) Rudman 1249 (3) Mellisa Hollingsworth 1154
Ski jumping
World Cup in Zakopane, Poland:
HS 134: Simon Ammann 276.3 points Thomas Morgenstern 268.9 Tom Hilde 267.1
Standings (after 17 of 26 events): (1) Morgenstern 1348 points (2) Ammann 903 (3) Andreas Kofler 901
Snowboarding
World Championships in La Molina, Spain:
Parallel Slalom men: Benjamin Karl Simon Schoch Rok Marguč
Karl wins his second world title of the championships.
Parallel Slalom women: Hilde-Katrine Engeli Nicolien Sauerbreij Claudia Riegler
Engeli wins her first world title.
Slopestyle men: Seppe Smits 28.7 points Niklas Mattson 28.1 Ville Paumola 26.2
Smits wins his first world title.
Slopestyle women: Enni Rukajärvi 28.2 points Šárka Pančochová 25.2 Shelly Gotlieb 21.6
Rukajärvi wins her first world title.
Tennis
Australian Open in Melbourne, Australia, day 6:
Men's Singles – 3rd Round:
Rafael Nadal [1] def. Bernard Tomic 6–2, 7–5, 6–3
Robin Söderling [4] def. Jan Hernych 6–3, 6–1, 6–4
Andy Murray [5] def. Guillermo García-López [32] 6–1, 6–1, 6–2
David Ferrer [7] def. Ričardas Berankis 6–2, 6–2, 6–1
Milos Raonic def. Mikhail Youzhny [10] 6–4, 7–5, 4–6, 6–4
Women's Singles – 3rd Round:
Vera Zvonareva [2] def. Lucie Šafářová [31] 6–3, 7–6(9)
Kim Clijsters [3] def. Alizé Cornet 7–6(3), 6–3
Petra Kvitová [25] def. Samantha Stosur [5] 7–6(5), 6–3
Flavia Pennetta [22] def. Shahar Pe'er [10] 3–6, 7–6(3), 6–4
January 21, 2011 (Friday)
Alpine skiing
Men's World Cup in Kitzbühel, Austria:
Super-G: Ivica Kostelić 1:17.33 Georg Streitberger 1:17.56 Aksel Lund Svindal 1:17.61
Super G standings (after 4 of 7 races): (1) Streitberger 227 points (2) Didier Cuche 179 (3) Romed Baumann 163
Overall standings (after 19 of 38 races): (1) Kostelić 826 points (2) Svindal 571 (3) Silvan Zurbriggen 509
Women's World Cup in Cortina, Italy:
Super-G: Lindsey Vonn 1:11.66 Anja Pärson 1:12.09 Anna Fenninger 1:12.13
Super G standings (after 3 of 7 races): (1) Vonn 280 points (2) Maria Riesch 149 (3) Lara Gut 145
Overall standings (after 19 of 38 races): (1) Riesch 1052 points (2) Vonn 927 (3) Tanja Poutiainen 580
Biathlon
World Cup 6 in Antholz, Italy:
Women's 7.5 km Sprint: Tora Berger 20:08.1 (0+0) Anastasiya Kuzmina 20:37.2 (0+1) Olga Zaitseva 20:44.5 (0+1)
Sprint standings (after 6 of 10 races): (1) Kaisa Mäkäräinen 249 points (2) Kuzmina 237 (3) Andrea Henkel 216
Overall standings (after 13 of 26 races): (1) Mäkäräinen 560 points (2) Helena Ekholm 521 (3) Henkel 497
Bobsleigh
World Cup and FIBT European Championships in Winterberg, Germany:
Two-women: Sandra Kiriasis/Berit Wiacker 1:55.06 (57.66 / 57.40) Anja Schneiderheinze-Stöckel/Christin Senkel 1:55.55 (57.92 / 57.63) Shauna Rohbock/Valerie Fleming 1:55.66 (57.97 / 57.69)
Kiriasis wins her fifth European title in six years, and Wiacker wins her fourth in six years.
Standings (after 6 of 8 races): (1) Kiriasis 1286 points (2) Cathleen Martini 1187 (3) Kaillie Humphries 1024
Cricket
England in Australia:
2nd ODI in Hobart: 230 (48.3 overs; Shaun Marsh 110); 184 (45 overs). Australia win by 46 runs; lead 7-match series 2–0.
India in South Africa:
4th ODI in Port Elizabeth: 265/7 (50 overs); 142/6 (32.5/46 overs). South Africa win by 48 runs (D/L); 5-match series tied 2–2.
Cycling
UCI World Tour:
Tour Down Under in Australia:
Stage 4, Norwood to Strathalbyn, : Cameron Meyer () 2h 57' 55" Thomas De Gendt () s.t. Laurens ten Dam () + 3"
Overall standings: (1) Meyer 12h 54' 30" (2) ten Dam + 10" (3) Matthew Goss () + 12"
Football (soccer)
AFC Asian Cup in Qatar:
Quarterfinals:
3–2
2–1
Central American Cup in Panama:
Fifth place match: 1–2
Guatemala qualify for the CONCACAF Gold Cup.
Semifinals:
2–0
1–1 (2–4 pen.)
African Under-17 Championship in Kigali, Rwanda:
Third place match: 2–1
Both teams qualify for the FIFA U-17 World Cup.
Freestyle skiing
World Cup in Kreischberg, Austria:
Half Pipe men: Xavier Bertoni 43.8 points Benoit Valentin 42.7 Nils Lauper 39.0
Half Pipe women: Rosalind Groenewoud 43.5 points Virginie Faivre 43.3 Katrien Aerts 41.8
World Cup in Lake Placid, United States:
Aerials men: Qi Guangpu 250.70 points Ryan St. Onge 246.21 Anton Kushnir 241.42
Aerials standings (after 4 of 8 events): (1) Qi 316 points (2) Jia Zongyang 238 (3) Anton Kushnir 228
Overall standings: (1) Andreas Matt 64 points (2) Qi 63 (3) Guilbaut Colas 60
Aerials women: Ashley Caldwell 187.65 points Alla Tsuper 186.42 Xu Mengtao 183.82
Aerials standings (after 4 of 8 events): (1) Xu 340 points (2) Cheng Shuang 216 (3) Zhang Xin 177
Overall standings: (1) Xu 68 points (2) Kelsey Serwa 66 points (3) Hannah Kearney 62
Korfball
Europa Cup in Budapest, Hungary:
Group A:
CC Oeiras 15–19 České Budějovice
Szentendre KK 6–26 R Scaldis SC
Standings: Scaldis 9 points, České Budějovice 6, Szentendre 3, CC Oeiras 0.
Group B:
Koog Zaandijk 31–10 Trojans KC
CK Vacarisses 19–22 KV Adler Rauxel
Standings: Koog Zaandijk 9 points, Trojans 6, Adler Rauxel 3, Vacarisses 0.
Rugby union
Heineken Cup pool stage, matchday 6 (team in bold advances to the knockout stages):
Pool 2:
Racing Métro 11–36 Leinster
Saracens 14–24 Clermont
Final standings: Leinster 24 points, Clermont 19, Racing Métro 9, Saracens 6.
Clermont have also secured at least a place in the Amlin Challenge Cup knockout stages. They still have a mathematical chance of a Heineken Cup quarterfinal place.
Ski jumping
World Cup in Zakopane, Poland:
HS 134: Adam Małysz 269.9 points Andreas Kofler 264.5 Severin Freund 264.0
Standings (after 16 of 26 events): (1) Thomas Morgenstern 1268 points (2) Kofler 851 (3) Simon Ammann 803
Snowboarding
World Championships in La Molina, Spain:
Both men's and women's parallel slalom events were postponed to January 22 due to high winds.
Tennis
Australian Open in Melbourne, Australia, day 5:
Men's Singles – 3rd Round:
Roger Federer [2] def. Xavier Malisse 6–3, 6–3, 6–1
Novak Djokovic [3] def. Viktor Troicki 6–2 retired
Tomáš Berdych [6] def. Richard Gasquet 6–2, 7–6(3), 6–2
Andy Roddick [8] def. Robin Haase 2–6, 7–6(2), 6–2, 6–2
Fernando Verdasco [9] def. Kei Nishikori 6–2, 6–4, 6–3
Women's Singles – 3rd Round:
Caroline Wozniacki [1] def. Dominika Cibulková 6–4, 6–3
Andrea Petkovic def. Venus Williams [4] 1–0 retired
Francesca Schiavone [6] def. Monica Niculescu 6–0, 7–6(2)
Victoria Azarenka [8] def. Chanelle Scheepers 6–3, 6–3
Li Na [9] def. Barbora Záhlavová-Strýcová 6–2, 6–1
January 20, 2011 (Thursday)
Basketball
Euroleague Top 16, matchday 1:
Group E: Unicaja Málaga 71–76 Caja Laboral
Group F:
Regal FC Barcelona 81–71 Maccabi Tel Aviv
Virtus Roma 63–64 Union Olimpija Ljubljana
Group H: Olympiacos Piraeus 70–84 Fenerbahçe Ülker
Biathlon
World Cup 6 in Antholz, Italy:
Men's 10 km Sprint: Anton Shipulin 23:36.2 (0+0) Michael Greis 23:46.2 (0+0) Lars Berger 23:56.7 (0+1)
Sprint standings (after 6 of 10 races): (1) Tarjei Bø 254 points (2) Emil Hegle Svendsen 231 (3) Greis 222
Overall standings (after 13 of 26 races): (1) Bø 572 points (2) Svendsen 560 (3) Greis 447
Cycling
UCI World Tour:
Tour Down Under in Australia:
Stage 3, Unley to Stirling, : Michael Matthews () 3h 11' 47" André Greipel () s.t. Matthew Goss () s.t.
Overall standings: (1) Goss 9h 56' 25" (2) Greipel + 2" (3) Robbie McEwen () + 4"
Football (soccer)
South American Youth Championship in Peru:
Group B:
0–1
1–3
Standings: Brazil 6 points (2 matches), Paraguay 3 (2), 1 (1), Colombia 1 (2), Bolivia 0 (1).
Handball
World Men's Championship in Sweden: (teams in bold advance to the main round)
Group A:
26–27
36–26
28–28
Final standings: France, Spain 9 points, Germany 6, Tunisia, Egypt, Bahrain 2.
Group B:
32–33
29–22
30–32
Final standings: Iceland 10 points, Hungary 8, Norway 6, Japan 4, Austria 2, Brazil 0.
Group C:
27–18
29–34
28–38
Final standings: Denmark 10 points, Croatia 7, Serbia 5, Algeria, Romania 4, Australia 0.
Group D:
31–26
35–25
21–24
Final standings: Sweden, Poland 8 points, Argentina 7, South Korea 5, Slovakia, Chile 1.
Korfball
Europa Cup in Budapest, Hungary:
Group A:
R Scaldis SC 22–6 CC Oeiras
Szentendre KK 12–18 České Budějovice
Standings (after 2 matches): Scaldis 6 points, České Budějovice, Szentendre 3, CC Oeiras 0.
Group B:
Trojans KC 26–21 KV Adler Rauxel
Koog Zaandijk 36–9 CK Vacarisses
Standings (after 2 matches): Koog Zaandijk, Trojans 6 points, Vacarisses, Adler Rauxel 0.
Rugby union
Amlin Challenge Cup pool stage, matchday 6 (team in bold advances to the knockout stages):
Pool 5:
Gloucester 60–7 Agen
La Rochelle 71–17 Rovigo
Final standings: La Rochelle 24 points, Gloucester 21, Agen 15, Rovigo 0.
Snowboarding
World Championships in La Molina, Spain:
Men's halfpipe: Nathan Johnstone 26.8 points Yuri Podladchikov 26.2 Markus Malin 24.3
Johnstone wins his first world title.
Women's halfpipe: Holly Crawford 26.7 points Ursina Haller 23.4 Liu Jiayu 22.5
Crawford wins her first world title.
Tennis
Australian Open in Melbourne, Australia, day 4:
Men's Singles – 2nd Round:
Rafael Nadal [1] def. Ryan Sweeting 6–2, 6–1, 6–1
Robin Söderling [4] def. Gilles Müller 6–3, 7–6(1), 6–1
Andy Murray [5] def. Illya Marchenko 6–1, 6–3, 6–3
David Ferrer [7] def. Michael Russell 6–0, 6–1, 7–5
Mikhail Youzhny [10] def. Blaž Kavčič 6–3, 6–1, 5–7, 4–6, 6–1
Women's Singles – 2nd Round:
Vera Zvonareva [2] def. Bojana Jovanovski 2–6, 6–3, 6–1
Kim Clijsters [3] def. Carla Suárez Navarro 6–1, 6–3
Samantha Stosur [5] def. Vera Dushevina 6–3, 6–2
Peng Shuai def. Jelena Janković [7] 7–6(3), 6–3
Shahar Pe'er [10] def. Sorana Cîrstea 6–3, 6–2
January 19, 2011 (Wednesday)
Basketball
Euroleague Top 16, matchday 1:
Group E: Lietuvos Rytas 59–80 Panathinaikos Athens
Group G:
Efes Pilsen Istanbul 60–58 Montepaschi Siena
Real Madrid 78–58 Partizan Belgrade
Group H: Power Electronics Valencia 73–59 Žalgiris Kaunas
Cricket
Pakistan in New Zealand:
2nd Test in Wellington, day 5: 356 & 293; 376 & 226/5 (92 overs). Match drawn; Pakistan win 2-match series 1–0.
Cycling
UCI World Tour:
Tour Down Under in Australia:
Stage 2, Tailem Bend to Mannum, : Ben Swift () 3h 27' 44" Robbie McEwen () s.t. Graeme Brown () s.t.
Overall standings: (1) McEwen 6h 44' 42" (2) Matthew Goss () + 0" (3) Swift + 0"
Football (soccer)
AFC Asian Cup in Qatar: (teams in bold advance to the quarterfinals)
Group D:
1–0
0–3
Final standings: Iran 9 points, Iraq 6, North Korea, United Arab Emirates 1.
South American Youth Championship in Peru:
Group A:
1–2
1–1
Standings: Argentina 6 points (2 matches), 3 (1), Venezuela 1 (1), Uruguay 1 (2), Peru 0 (2).
OFC U-17 Championship in Albany, North Shore City, New Zealand:
3rd place: 0–2
Final: 2–0
New Zealand win the tournament for the third successive time and fourth time overall, and qualifies for the FIFA U-17 World Cup.
Handball
World Men's Championship in Sweden: (teams in bold advance to the main round)
Group A:
21–28
23–30
31–18
Standings (after 4 games): France, Spain 8 points, Germany 4, Tunisia, Egypt 2, Bahrain 0.
Group C:
24–24
26–19
14–29
Standings (after 4 games): Denmark 8 points, Croatia 7, Serbia 5, Romania, Algeria 2, Australia 0.
Korfball
Europa Cup in Budapest, Hungary:
Group A:
Szentendre KK 16–14 CC Oeiras
R Scaldis SC 37–17 České Budějovice
Group B:
Koog Zaandijk 27–13 KV Adler Rauxel
CK Vacarisses 17–19 Trojans KC
Snowboarding
World Championships in La Molina, Spain:
Parallel Giant Slalom men: Benjamin Karl Rok Marguč Roland Fischnaller
Karl wins his first world title.
Parallel Giant Slalom women: Alena Zavarzina Claudia Riegler Doris Günther
Zavarzina wins her first world title.
Tennis
Australian Open in Melbourne, Australia, day 3:
Men's Singles – 2nd Round:
Roger Federer [2] def. Gilles Simon 6–2, 6–3, 4–6, 4–6, 6–3
Novak Djokovic [3] def. Ivan Dodig 7–5, 6–7(8), 6–0, 6–2
Tomáš Berdych [6] def. Philipp Kohlschreiber 4–6, 6–2, 6–3, 6–4
Andy Roddick [8] def. Igor Kunitsyn 7–6(7), 6–2, 6–3
Fernando Verdasco [9] def. Janko Tipsarević 2–6, 4–6, 6–4, 7–6(0), 6–0
Women's Singles – 2nd Round:
Caroline Wozniacki [1] def. Vania King 6–1, 6–0
Venus Williams [4] def. Sandra Záhlavová 6–7(6), 6–0, 6–4
Francesca Schiavone [6] def. Rebecca Marino 6–3, 5–7, 9–7
Victoria Azarenka [8] def. Andrea Hlaváčková 6–4, 6–4
Li Na [9] def. Evgeniya Rodina 6–3, 6–2
January 18, 2011 (Tuesday)
Cricket
Pakistan in New Zealand:
2nd Test in Wellington, day 4: 356 & 293 (90.5 overs); 376. New Zealand lead by 273 runs.
India in South Africa:
3rd ODI in Cape Town: 220 (49.2 overs); 223/8 (48.2 overs). India win by 2 wickets; lead 5-match series 2–1.
Cycling
UCI World Tour:
Tour Down Under in Australia:
Stage 1, Mawson Lakes to Angaston, : Matthew Goss () 3h 17' 08" André Greipel () s.t. Robbie McEwen () s.t.
Overall standings: (1) Goss 3h 16' 58" (2) Greipel + 4" (3) McEwen + 6"
Football (soccer)
AFC Asian Cup in Qatar: (teams in bold advance to the quarterfinals)
Group C:
4–1
1–0
Final standings: Australia, South Korea 7 points, Bahrain 3, India 0.
Central American Cup in Panama: (teams in bold advance to the semifinals and qualify for CONCACAF Gold Cup)
Group A:
1–1
2–0
Final standings: Panama 9 points, El Salvador 6, Nicaragua, Belize 1.
Group B: 3–1
Final standings: Honduras, 4 points, Guatemala 0.
Handball
World Men's Championship in Sweden: (teams in bold advance to main round)
Group B:
24–28
26–25
23–26
Standings (after 4 games): Iceland 8 points, Hungary, Norway 6, Austria, Japan 2, Brazil 0.
Group D:
29–29
20–25
22–27
Standings (after 4 games): Poland 8 points, Sweden 6, Argentina 5, South Korea 3, Slovakia, Chile 1.
Snowboarding
World Championships in La Molina, Spain:
Men's snowboard cross: Alex Pullin Seth Wescott Nate Holland
Pullin becomes the first Australian world champion.
Women's snowboard cross: Lindsey Jacobellis Nelly Moenne Loccoz Dominique Maltais
Jacobellis wins the title for the third time.
Tennis
Australian Open in Melbourne, Australia, day 2:
Men's Singles – 1st Round:
Rafael Nadal [1] def. Marcos Daniel 6–0, 5–0 retired
Robin Söderling [4] def. Potito Starace 6–4, 6–2, 6–2
Andy Murray [5] def. Karol Beck 6–3, 6–1, 4–2 retired
David Ferrer [7] def. Jarkko Nieminen 6–4, 6–3, 1–6, 6–2
Mikhail Youzhny [10] def. Marsel İlhan 6–2, 6–3, 7–6(5)
Women's Singles – 1st Round:
Vera Zvonareva [2] def. Sybille Bammer 6–2, 6–1
Kim Clijsters [3] def. Dinara Safina 6–0, 6–0
Samantha Stosur [5] def. Lauren Davis 6–1, 6–1
Jelena Janković [7] def. Alla Kudryavtseva 6–0, 7–6(5)
Shahar Pe'er [10] def. Mathilde Johansson 6–1, 6–1
January 17, 2011 (Monday)
Cricket
Pakistan in New Zealand:
2nd Test in Wellington, day 3: 356 & 9/0 (5 overs); 376 (133 overs). New Zealand trail by 11 runs with 10 wickets remaining.
Football (soccer)
AFC Asian Cup in Qatar: (teams in bold advance to the quarterfinals)
Group B:
0–5
2–1
Final standings: Japan, Jordan 7 points, Syria 3, Saudi Arabia 0.
South American Youth Championship in Peru:
Group B:
1–1
4–2
Handball
World Men's Championship in Sweden: (teams in bold advance to the main round)
Group A:
26–24
41–17
23–27
Standings (after 3 games): France, Spain 6 points, Germany 4, Egypt 2, Tunisia, Bahrain 0.
Group B:
36–24
33–27
36–22
Standings (after 3 games): Iceland 6 points, Norway, Hungary 4, Japan, Austria 2, Brazil 0.
Group C:
42–15
14–15
35–27
Standings (after 3 games): Denmark, Croatia 6 points, Serbia 4, Algeria 2, Romania, Australia 0.
Group D:
18–23
38–23
30–24
Standings (after 3 games): Sweden, Poland 6 points, South Korea, Argentina 3, Slovakia, Chile 0.
Tennis
Australian Open in Melbourne, Australia, day 1:
Men's Singles – 1st Round:
Roger Federer [2] def. Lukáš Lacko 6–1, 6–1, 6–3
Novak Djokovic [3] def. Marcel Granollers 6–1, 6–3, 6–1
Tomáš Berdych [6] def. Marco Crugnola 6–4, 6–0, 6–2
Andy Roddick [8] def. Jan Hájek 6–1, 6–2, 6–2
Fernando Verdasco [9] def. Rainer Schüttler 6–1, 6–3, 6–2
Women's Singles – 1st Round:
Caroline Wozniacki [1] def. Gisela Dulko 6–3, 6–4
Venus Williams [4] def. Sara Errani 6–3, 6–2
Francesca Schiavone [6] def. Arantxa Parra Santonja 6–7(4), 6–2, 6–4
Victoria Azarenka [8] def. Kathrin Wörle 6–0, 6–2
Li Na [9] def. Sofia Arvidsson 6–1, 7–5
January 16, 2011 (Sunday)
Alpine skiing
Men's World Cup in Wengen, Switzerland:
Slalom: Ivica Kostelić 1:45.28 (52.46 / 52.82) Marcel Hirscher 1:46.21 (52.37/ 53.84) Jean-Baptiste Grange 1:46.27 (52.49 / 53.78)
Slalom standings (after 5 of 10 races): (1) Kostelić 353 points (2) Hirscher 276 (3) André Myhrer 213
Overall standings (after 18 of 38 races): (1) Kostelić 726 points (2) Aksel Lund Svindal 511 (3) Silvan Zurbriggen 469
Women's World Cup in Maribor, Slovenia:
Slalom: Cancelled due to warm weather.
American football
NFL playoffs – Divisional Playoffs:
NFC: Chicago Bears 35, Seattle Seahawks 24
AFC: New York Jets 28, New England Patriots 21
Auto racing
Dakar Rally in Argentina and Chile:
Motorcycles: Marc Coma (KTM) 51h 25' 00" Cyril Despres (KTM) 51h 40' 04" Hélder Rodrigues (Yamaha) 53h 05' 20"
Coma wins the event for the third time.
Cars: Nasser Al-Attiyah /Timo Gottschalk (Volkswagen) 45h 16' 16" Giniel de Villiers /Dirk Von Zitzewitz (Volkswagen) 46h 05' 57" Carlos Sainz /Lucas Cruz (Volkswagen) 46h 36' 54"
Al-Attiyah wins the event for the first time.
Trucks: Vladimir Chagin /Sergey Savostin /Ildar Shaysultanov (KamAZ) 48h 28' 54" Firdaus Kabirov /Aydar Belyaev /Andrey Mokeev (KamAZ) 48h 58' 58" Eduard Nikolaev /Viatcheslav Mizyukaev /Vladimir Rybakov (KamAZ) 51h 49' 11"
Chagin wins the event for a record seventh time.
All-terrain vehicles: Alejandro Patronelli (Yamaha) 63h 49' 47" Sebastian Halpern (Yamaha) 64h 49' 40" Łukasz Łaskawiec (Yamaha) 70h 07' 25"
Patronelli wins the event for the first time, matching brother Marcos' feat from 2010.
Basketball
BBL Cup Final in Birmingham, England:
Mersey Tigers 66–93 Sheffield Sharks
Sheffield win the Cup for the second successive season, and third time overall.
Biathlon
World Cup 5 in Ruhpolding, Germany:
Men's 12.5 km Pursuit: Björn Ferry 31:56.6 (0+0+0+0) Martin Fourcade 32:01.5 (0+1+1+0) Michael Greis 32:03.5 (0+0+0+0)
Pursuit standings (after 3 of 7 races): (1) Tarjei Bø 146 points (2) Emil Hegle Svendsen 130 (3) Fourcade 122
Overall standings (after 12 of 26 races): (1) Bø 572 points (2) Svendsen 533 (3) Fourcade 397
Women's 10 km Pursuit: Tora Berger 28:50.9 (0+0+0+1) Andrea Henkel 29:28.6 (0+0+1+1) Kaisa Mäkäräinen 29:50.2 (2+0+0+0)
Pursuit standings (after 3 of 7 races): (1) Mäkäräinen 162 points (2) Helena Ekholm 146 (3) Anna Carin Olofsson-Zidek 126
Overall standings (after 12 of 26 races): (1) Mäkäräinen 541 points (2) Ekholm 499 (3) Henkel 454
Bobsleigh
World Cup in Igls, Austria:
Four-man: Manuel Machata/Richard Adjei/Andreas Bredau/Christian Poser 1:42.92 (51.47 / 51.45) Thomas Florschütz/Ronny Listner/Kevin Kuske/Andreas Barucha 1:42.97 (51.52 / 51.45) Steve Holcomb/Justin Olsen/Steven Langton/Curtis Tomasevicz 1:43.02 (51.47 / 51.55)
Standings (after 5 of 8 races): (1) Machata 1036 points (2) Holcomb 1010 (3) Karl Angerer 922
Cricket
Pakistan in New Zealand:
2nd Test in Wellington, day 2: 356 (127.1 overs; Daniel Vettori 110); 134/2 (49.5 overs). Pakistan trail by 222 runs with 8 wickets remaining in the 1st innings.
England in Australia:
1st ODI in Melbourne: 294 (49.4 overs); 297/4 (49.1 overs; Shane Watson 161*). Australia win by 6 wickets; lead 7-match series 1–0.
Cross-country skiing
World Cup in Liberec, Czech Republic:
Men's Team Sprint Classic: I (Johan Kjølstad, Ola Vigen Hattestad) 21:47.1 I (Jesper Modin, Mats Larsson) 21:51.5 II (Eirik Brandsdal, John Kristian Dahl) 21:55.2
Women's Team Sprint Classic: I (Maiken Caspersen Falla, Marit Bjørgen) 19:30.8 I (Magda Genuin, Marianna Longa) 20:01.3 II (Kari Vikhagen Gjeitnes, Celine Brun-Lie) 20:14.4
Football (soccer)
AFC Asian Cup in Qatar: (teams in bold advance to the quarterfinals)
Group A:
3–0
2–2
Final standings: Uzbekistan 7 points, Qatar 6, China 4, Kuwait 0.
Central American Cup in Panama: (teams in bold advance to the semifinals and qualify for CONCACAF Gold Cup)
Group A:
2–5
2–0
Standings (after 2 matches): El Salvador, Panama 6 points, Nicaragua, Belize 0.
Group B: 0–2
Standings: Costa Rica 4 points (2 matches), 1 (1), Guatemala 0 (1).
South American Youth Championship in Peru:
Group A:
2–1
0–2
Freestyle skiing
World Cup in Les Contamines-Montjoie, France:
Ski Cross men: Christopher Del Bosco Andreas Matt Egor Korotkov
Ski Cross standings (after 5 of 11 events): (1) Matt 319 points (2) Del Bosco 225 (3) Alex Fiva 199
Ski Cross women: Ophélie David Kelsey Serwa Anna Holmlund
Ski Cross standings (after 5 of 11 events): (1) Serwa 329 points (2) Heidi Zacher 296 (3) Fanny Smith 255
World Cup in Mont Gabriel, Canada:
Aerials men: Anton Kushnir 247.60 points Qi Guangpu 240.97 Stanislav Kravchuk 234.60
Aerials standings (after 3 of 8 events): (1) Jia Zongyang 220 points (2) Qi 216 (3) Kushnir 168
Overall standings: (1) Andreas Matt 64 points (2) Guilbaut Colas 60 (3) Mikaël Kingsbury 55
Aerials women: Xu Mengtao 192.28 points Alla Tsuper 187.00 Cheng Shuang 186.99
Aerials standings (after 3 of 8 events): (1) Xu 280 points (2) Cheng 200 (3) Zhang Xin 162
Overall standings: (1) Kelsey Serwa 66 points (2) Hannah Kearney 62 (3) Heidi Zacher 59
Golf
PGA Tour:
Sony Open in Hawaii in Honolulu, Hawaii:
Winner: Mark Wilson 264 (−16)
Wilson wins his third PGA Tour title.
European Tour:
Joburg Open in Johannesburg, South Africa:
Winner: Charl Schwartzel 265 (−19)
Schwartzel defends his title, and wins his sixth European Tour title.
Handball
World Men's Championship in Sweden:
Group A:
18–38
18–21
19–28
Standings (after 2 games): Germany, France, Spain 4 points, Egypt, Tunisia, Bahrain 0.
Group C:
18–35
15–26
30–39
Standings (after 2 games): Denmark, Serbia, Croatia 4 points, Algeria, Romania, Australia 0.
Luge
World Cup in Oberhof, Germany:
Women: Tatjana Hüfner 1:26.366 (43.239 / 43.127) Natalie Geisenberger 1:26.775 (43.491 / 43.284) Anke Wischnewski 1:27.298 (43.677 / 43.621)
Standings (after 6 of 9 events): (1) Hüfner 585 points (2) Geisenberger 475 (3) Wischnewski 415
Hüfner wins her fifth race of the season.
Team relay: (Tatjana Hüfner/Felix Loch/Tobias Wendl/Tobias Arlt) 2:27.306 (47.906 / 49.468 / 49.932) (Tatiana Ivanova/Viktor Kneib/Vladislav Yuzhakov/Vladimir Makhnutin) 2:28.714 (48.785 / 49.837 / 50.092) (Sandra Gasparini/David Mair/Christian Oberstolz/Patrick Gruber) 2:29.047 (49.153 / 49.962 / 49.932)
Standings (after 4 of 6 events): (1) Germany 400 points (2) Italy 295 (3) 256
Nordic combined
World Cup in Seefeld, Austria:
HS 106 / 10 km: Magnus Moan 24:36.8 Jason Lamy-Chappuis 24:38.4 David Kreiner 24:39.4
Standings (after 9 of 13 races): (1) Lamy-Chappuis 639 points (2) Mikko Kokslien 469 (3) Mario Stecher 466
Rugby union
Heineken Cup pool stage, matchday 5 (teams in bold advance to the knockout stage):
Pool 3:
London Irish 24–12 Ospreys
Toulon 32–16 Munster
Standings (after 5 matches): Toulon 17 points, Munster 11, Ospreys 10, London Irish 9.
Munster fail to reach the quarter-final stage of the competition for the first time since 1997–98.
Pool 6: Glasgow Warriors 20–10 London Wasps
Standings (after 5 matches): Toulouse 21 points, London Wasps 15, Glasgow Warriors 8, Newport Gwent Dragons 1.
Amlin Challenge Cup pool stage, matchday 5 (team in bold advances to the knockout stage):
Pool 4: Stade Français 39–10 Leeds Carnegie
Standings (after 5 matches): Stade Français 24 points, Leeds Carnegie 14, București Oaks, Crociati Parma 5.
Short track speed skating
European Championships in Heerenveen, Netherlands:
Men: Thibaut Fauconnet 136 points Haralds Silovs 50 Sjinkie Knegt 47
Fauconnet wins the title for the first time, and becomes the first French champion in 10 years.
Women: Arianna Fontana 115 points Bernadett Heidum 42 Martina Valcepina 39
Fontana wins her third title in four years.
Men's 5000 m relay: 6:54.608 6:54.726 6:56.025
Women's 3000 m relay: 4:19.253 4:19.284 4:20.473
Ski jumping
World Cup in Sapporo, Japan:
HS 134: Andreas Kofler 232.9 points Severin Freund 224.7 Thomas Morgenstern 222.4
Standings (after 15 of 26 events): (1) Morgenstern 1223 points (2) Kofler 771 (3) Simon Ammann 753
Snooker
Masters in London, England
Final: Ding Junhui [9] 10–4 Marco Fu [16]
Ding wins his seventh professional title.
This is the first All-Asian final.
January 15, 2011 (Saturday)
Alpine skiing
Men's World Cup in Wengen, Switzerland:
Downhill: Klaus Kröll 2:31.28 Didier Cuche 2:31.42 Carlo Janka 2:31.67
Downhill standings (after 4 of 9 races): (1) Michael Walchhofer 269 points (2) Silvan Zurbriggen 250 (3) Kröll 190
Overall standings (after 17 of 38 races): (1) Ivica Kostelić 626 points (2) Aksel Lund Svindal 511 (3) Zurbriggen 459
Women's World Cup in Maribor, Slovenia:
Giant slalom: Cancelled during 1st run due to warm weather.
American football
NFL playoffs – Divisional Playoffs:
AFC: Pittsburgh Steelers 31, Baltimore Ravens 24
NFC: Green Bay Packers 48, Atlanta Falcons 21
Biathlon
World Cup 5 in Ruhpolding, Germany:
Women's 7.5 km Sprint: Tora Berger 20:33.3 (0+0) Andrea Henkel 20:34.4 (0+0) Magdalena Neuner 20:49.1 (0+1)
Standings (after 5 of 10 races): (1) Kaisa Mäkäräinen 230 points (2) Neuner 198 (3) Darya Domracheva 192
Overall standings (after 11 of 26 races): (1) Mäkäräinen 493 points (2) Helena Ekholm 461 (3) Henkel 400
Bobsleigh
World Cup in Igls, Austria:
Two-man: Beat Hefti/Thomas Lamparter 1:44.31 (52.21 / 52.10) Alexandr Zubkov/Alexey Voyevoda 1:44.54 (52.30 / 52.24) Simone Bertazzo/Matteo Torchio 1:44.97 (52.56 / 52.41)
Standings (after 5 of 8 races): (1) Zubkov 1013 points (2) Manuel Machata 1003 (3) Bertazzo 947
Team: (John Fairbairn, Helen Upperton/Diane Kelly, Darla Deschamps, Lyndon Rush/Cody Sorensen) 3:37.09 (54.23 / 54.61 / 55.29 / 52.96) (Matthias Guggenberger, Christina Hengster/Anna Feichtner, Janine Flock, Jürgen Loacker/Johannes Wipplinger) 3:37.13 (53.94 / 54.35 / 55.83 / 53.01) (Aleksandr Tretyakov, Olga Fyodorova/Yulia Timofeeva, Olga Potelicina, Alexander Kasjanov/Alexander Shilkin) 3:37.56 (53.92 / 54.65 / 55.51 / 53.48)
Cricket
Pakistan in New Zealand:
2nd Test in Wellington, day 1: 246/6 (90 overs); .
India in South Africa:
2nd ODI in Johannesburg: 190 (47.2 overs); 189 (43 overs). India win by 1 run; 5-match series tied 1–1.
Cross-country skiing
World Cup in Liberec, Czech Republic:
Men's Sprint Freestyle: Ola Vigen Hattestad 2:55.3 Federico Pellegrino 2:56.3 Dušan Kožíšek 2:58.3
Sprint standings (after 6 of 11 races): (1) Emil Jönsson 280 points (2) Hattestad 184 (3) Jesper Modin & Fulvio Scola 180
Overall standings (after 19 of 31 races): (1) Dario Cologna 1197 points (2) Petter Northug 706 (3) Lukáš Bauer 698
Women's Sprint Freestyle: Kikkan Randall 2:37.6 Hanna Falk 2:38.1 Celine Brun-Lie 2:38.2
Sprint standings (after 6 of 11 races): (1) Randall 291 points (2) Arianna Follis 288 (3) Petra Majdič 254
Overall standings (after 19 of 31 races): (1) Justyna Kowalczyk 1271 points (2) Follis 880 (3) Marit Bjørgen 796
Football (soccer)
AFC Asian Cup in Qatar: (teams in bold advance to the quarterfinals)
Group D:
1–0
0–1
Standings (after 2 matches): Iran 6 points, Iraq 3, United Arab Emirates, North Korea 1.
OFC Champions League Group stage, matchday 3:
Group A: Lautoka 0–0 PRK Hekari United
Standings (after 3 matches): Lautoka 7 points, Amicale 6, PRK Hekari United 4, Koloale 0.
Freestyle skiing
World Cup in Mont Gabriel, Canada:
Dual Moguls men: Alexandre Bilodeau 21.00 points Mikaël Kingsbury 14.00 Guilbaut Colas 21.00
Moguls standings (after 4 of 11 events): (1) Colas 300 points (2) Kingsbury 275 (3) Patrick Deneen 247
Overall standings: (1) Colas 60 points (2) Kingsbury 55 (3) Deneen 49
Dual Moguls women: Justine Dufour-Lapointe 22.00 Anastassia Gunchenko 13.00 Jennifer Heil 21.00
Moguls standings (after 4 of 11 events): (1) Hannah Kearney 309 points (2) Heil 260 (3) Dufour-Lapointe 205
Overall standings: (1) Kearney 62 points (2) Heil & Heidi Zacher 52
Handball
World Men's Championship in Sweden:
Group B:
26–23
33–30
26–34
Standings (after 2 games): Iceland 4 points, Austria, Norway, Japan, Hungary 2, Brazil 0.
Group D:
22–37
22–38
23–24
Standings (after 2 games): Sweden, Poland 4 points, South Korea 3, Argentina 1, Slovakia, Chile 0.
Luge
World Cup in Oberhof, Germany:
Doubles: Tobias Wendl/Tobias Arlt 1:26.794 (43.386 / 43.408) Christian Oberstolz/Patrick Gruber 1:26.833 (43.355 / 43.478) Toni Eggert/Sascha Benecken 1:26.988 (43.624 / 43.364)
Standings (after 6 of 9 events): (1) Wendl/Arlt 530 points (2) Oberstolz/Gruber 485 (3) Andreas Linger/Wolfgang Linger 392
Wendl/Arlt win their fourth race of the season.
Men's singles: Felix Loch 1:30.883 (45.543 / 45.340) Andi Langenhan 1:31.115 (45.523 / 45.592) David Möller 1:31.326 (45.821 / 45.505)
Standings (after 6 of 9 events): (1) Armin Zöggeler 525 points (2) Loch 445 (3) Möller 394
Nordic combined
World Cup in Seefeld, Austria:
HS 106 / 10 km: Jason Lamy-Chappuis 25:33.2 Magnus Moan 26:02.5 Mikko Kokslien 26:06.1
Standings (after 8 of 13 races): (1) Lamy-Chappuis 559 points (2) Mario Stecher 466 (3) Kokslien 447
Rugby union
Heineken Cup pool stage, matchday 5 (team in bold advances to the knockout stages, teams in strike are eliminated):
Pool 2: Leinster 43–20 Saracens
Standings (after 5 matches): Leinster 19 points, Clermont 14, Racing Métro 9, Saracens 6.
Pool 4:
Bath 55–16 Aironi
Ulster 9–6 Biarritz
Standings (after 5 matches): Biarritz 17 points (6–4 in head-to head competition points), Ulster 17 (4–6), Bath 13, Aironi 4.
Pool 5:
Benetton Treviso 9–44 Perpignan
Scarlets 18–32 Leicester Tigers
Standings (after 5 matches): Perpignan 17 points (6–3 in head-to head competition points), Leicester Tigers 17 (3–6), Scarlets 15, Benetton Treviso 1.
Pool 6: Toulouse 17–3 Newport Gwent Dragons
Standings: Toulouse 21 points (5 matches), London Wasps 15 (4), Glasgow Warriors 4 (4), Newport Gwent Dragons 1 (5).
Amlin Challenge Cup pool stage, matchday 5: (teams in strike are eliminated)
Pool 1:
Cavalieri Prato 16–48 Harlequins
Bayonne 21–35 Connacht
Standings (after 5 matches): Harlequins 19 points, Bayonne 15, Connacht 10, Cavalieri Prato 4.
Pool 3: Exeter Chiefs 17–6 Bourgoin
Standings (after 5 matches): Montpellier 17 points, Exeter Chiefs 15, Newcastle Falcons 9, Bourgoin 6.
Pool 4: Crociati Parma 16–12 București Oaks
Standings: Stade Français 19 points (4 matches), Leeds Carnegie 14 (4), București Oaks, Crociati Parma 5 (5).
Pool 5: Rovigo 7–55 Gloucester
Standings (after 5 matches): La Rochelle 19 points, Gloucester 16, Agen 15, Rovigo 0.
Skeleton
World Cup in Igls, Austria:
Men: Martins Dukurs 1:45.95 (52.95 / 53.00) Sergey Chudinov 1:46.75 (53.41 / 53.34) Aleksandr Tretyakov 1:46.89 (53.55 / 53.34)
Standings (after 5 of 8 events): (1) Dukurs 1044 points (2) Tretyakov 955 (3) Sandro Stielicke 906
Team: (John Fairbairn, Helen Upperton/Diane Kelly, Darla Deschamps, Lyndon Rush/Cody Sorensen) 3:37.09 (54.23 / 54.61 / 55.29 / 52.96) (Matthias Guggenberger, Christina Hengster/Anna Feichtner, Janine Flock, Jürgen Loacker/Johannes Wipplinger) 3:37.13 (53.94 / 54.35 / 55.83 / 53.01) (Aleksandr Tretyakov, Olga Fyodorova/Yulia Timofeeva, Olga Potelicina, Alexander Kasjanov/Alexander Shilkin) 3:37.56 (53.92 / 54.65 / 55.51 / 53.48)
Ski jumping
World Cup in Sapporo, Japan:
HS 134: Severin Freund 249.6 points Thomas Morgenstern 248.2 Adam Małysz 240.5
Standings (after 14 of 26 events): (1) Morgenstern 1163 points (2) Simon Ammann 721 (3) Andreas Kofler 671
Snooker
Masters in London, England, Semi-finals:
Marco Fu [16] 6–4 Mark Allen [12]
Jamie Cope [14] 3–6 Ding Junhui [9]
Snowboarding
World Championships in Barcelona, Spain:
Men's big air: Petja Piiroinen 51.7 points Zachary Stone 48.9 Seppe Smits 48.9
Tennis
ATP World Tour:
Medibank International Sydney:
Final: Gilles Simon def. Viktor Troicki 7–5, 7–6(4)
Simon wins the eighth title of his career.
Heineken Open in Auckland, New Zealand:
Final: David Ferrer def. David Nalbandian 6–3, 6–2
Ferrer wins the tenth title of his career.
WTA Tour:
Moorilla Hobart International:
Final: Jarmila Groth def. Bethanie Mattek-Sands 6–4, 6–3
Groth wins the second title of her career.
Exhibition tournament:
AAMI Classic in Melbourne, Australia:
Final: Lleyton Hewitt def. Gaël Monfils 7–5, 6–3
Hewitt wins the event for the first time.
January 14, 2011 (Friday)
Alpine skiing
Men's World Cup in Wengen, Switzerland:
Super combined: Ivica Kostelić 2:40.44 Carlo Janka 2:41.02 Aksel Lund Svindal 2:41.78
Overall standings (after 16 of 38 races): (1) Kostelić 604 points (2) Svindal 495 (3) Silvan Zurbriggen 439
Biathlon
World Cup 5 in Ruhpolding, Germany:
Men's 10 km Sprint: Lars Berger 23:55.1 (0+0) Martin Fourcade 24:16.8 (0+0) Ivan Tcherezov 24:18.9 (0+0)
Sprint standings (after 5 of 10 races): (1) Tarjei Bø 254 points (2) Emil Hegle Svendsen 204 (3) Michael Greis 168
Overall standings (after 11 of 26 races): (1) Bø 529 points (2) Svendsen 497 (3) Ole Einar Bjørndalen 362
Bobsleigh
World Cup in Igls, Austria:
Women: Shauna Rohbock/Valerie Fleming 1:48.50 (54.45 / 54.05) Anja Schneiderheinze-Stöckel/Christin Senkel 1:48.59 (54.43 / 54.16) Fabienne Meyer/Hanne Schenk 1:48.70 (54.36 / 54.34)
Standings (after 5 of 8 races): (1) Sandra Kiriasis 1061 points (2) Cathleen Martini 1003 (3) Meyer 896
Cricket
England in Australia:
2nd T20I in Melbourne: 147/7 (20 overs); 143/6 (20 overs). Australia win by 4 runs; 2-match series drawn 1–1.
Football (soccer)
AFC Asian Cup in Qatar: (teams in strike are eliminated)
Group C:
1–1
5–2
Standings (after 2 matches): Australia, South Korea 4 points, Bahrain 3, India 0.
Central American Cup in Panama:
Group A:
2–0
2–0
Group B: 1–1
Handball
World Men's Championship in Sweden:
Group A:
32–19
30–25
33–22
Group B:
32–26
35–29
34–24
Group C:
27–21
47–12
25–24
Group D:
25–25
35–33
Nordic combined
World Cup in Seefeld, Austria:
HS 106 / 4 x 5 km: (Magnus Moan, Håvard Klemetsen, Jan Schmid, Mikko Kokslien) 47:31.2 (Felix Gottwald, Wilhelm Denifl, David Kreiner, Bernhard Gruber) 47:43.1 (François Braud, Maxime Laheurte, Sébastien Lacroix, Jason Lamy-Chappuis) 48:19.1
Rugby union
Heineken Cup pool stage, matchday 5 (team in bold advances to the knockout stage):
Pool 1:
Cardiff Blues 14–9 Castres
Northampton Saints 37–0 Edinburgh
Standings (after 5 matches): Northampton Saints 21 points, Castres 11, Cardiff Blues 10, Edinburgh 7.
Pool 2: Clermont 28–17 Racing Métro
Standings: Leinster 14 points (4 matches), Clermont 14 (5), Racing Métro 9 (5), Saracens 6 (4).
Amlin Challenge Cup pool stage, matchday 5 (team in bold advances to the knockout stage; teams in strike are eliminated):
Pool 2:
Brive 52–3 El Salvador
Sale Sharks 54–0 Petrarca Padova
Standings (after 5 matches): Brive 23 points, Sale Sharks 16, Petrarca Padova 5, El Salvador 4.
Pool 3: Newcastle Falcons 0–6 Montpellier
Standings: Montpellier 17 points (5 matches), Exeter Chiefs 11 (4), Newcastle Falcons 9 (5), Bourgoin 6 (4).
Skeleton
World Cup in Igls, Austria:
Women: Anja Huber 1:51.10 (55.34 / 55.76) Shelley Rudman 1:51.27 (55.69 / 55.58) Mellisa Hollingsworth 1:51.45 (55.70 / 55.75)
Standings (after 5 of 8 events): (1) Huber 1075 points (2) Rudman 1024 (3) Hollingsworth 978
Snooker
Masters in London, England, Quarter-finals:
Mark Allen [12] 6–4 Neil Robertson [2]
Peter Ebdon [13] 0–6 Marco Fu [16]
Tennis
WTA Tour:
Medibank International Sydney in Sydney, Australia:
Final: Li Na def. Kim Clijsters 7–6(3), 6–3
Li wins the 4th title of her career.
January 13, 2011 (Thursday)
Biathlon
World Cup 5 in Ruhpolding, Germany:
Women's 15 km Individual: Olga Zaitseva 41:46.1 (0+0+0+0) Andrea Henkel 42:00.6 (0+0+0+0) Helena Ekholm 42:23.5 (0+0+0+0)
Individual standings (after 3 of 4 races): (1) Zaitseva 138 points (2) Marie-Laure Brunet 132 (3) Valj Semerenko 129
Overall standings (after 10 of 26 races): (1) Kaisa Mäkäräinen 459 points (2) Ekholm 429 (3) Brunet 354
Football (soccer)
AFC Asian Cup in Qatar: (teams in strike are eliminated)
Group B:
1–0
1–2
Standings (after 2 matches): Japan, Jordan 4 points, Syria 3, Saudi Arabia 0.
Handball
World Men's Championship in Sweden:
Group D: 28–18
Rugby union
Amlin Challenge Cup pool stage, matchday 5: (teams in strike are eliminated)
Pool 5: Agen 17–28 La Rochelle
Standings: La Rochelle 19 points (5 matches), Agen 15 (5), Gloucester 11 (4), Rovigo 0 (4).
Snooker
Masters in London, England, Quarter-finals:
Ding Junhui [9] 6–2 Graeme Dott [11]
Mark King [15] 1–6 Jamie Cope [14]
January 12, 2011 (Wednesday)
Biathlon
World Cup 5 in Ruhpolding, Germany:
Men's 20 km Individual: Emil Hegle Svendsen 50:39.4 (0+0+0+1) Martin Fourcade 50:46.8 (0+0+0+1) Dominik Landertinger 51:03.1 (0+0+0+1)
Individual standings (after 3 of 4 races): (1) Svendsen 145 points (2) Tarjei Bø 112 (3) Daniel Mesotitsch 109
Overall standings (after 10 of 26 races): (1) Bø 489 points (2) Svendsen 454 (3) Ole Einar Bjørndalen 338
Cricket
India in South Africa:
1st ODI in Durban: 289/9 (50 overs); 154 (35.4 overs). South Africa win by 135 runs; lead 5-match series 1–0.
England in Australia:
1st T20I in Adelaide: 157/4 (20 overs); 158/9 (20 overs). England win by 1 wicket; lead 2-match series 1–0.
England produce a record eighth win in a row in Twenty20 Internationals.
Football (soccer)
AFC Asian Cup in Qatar:
Group A:
2–1
0–2
Standings (after 2 matches): Uzbekistan 6 points, China, Qatar 3, Kuwait 0.
Freestyle skiing
World Cup in Alpe d'Huez, France:
Ski Cross men: Daniel Bohnacker Andreas Matt Patrick Koller
Ski Cross standings (after 4 of 11 races): (1) Matt 239 points (2) Nick Zoricic 194 (3) John Teller 170
Overall standings: (1) Guilbaut Colas & Matt 48 points (3) Patrick Deneen 40
Ski Cross women: Kelsey Serwa Fanny Smith Ashleigh McIvor
Ski Cross standings (after 4 of 11 races): (1) Heidi Zacher 260 points (2) Serwa 249 (3) Smith 247
Overall standings: (1) Hannah Kearney 56 points (2) Zacher 52 (3) Serwa 50
Snooker
Masters in London, England, Last 16:
Neil Robertson [2] 6–3 Stephen Hendry [10]
Shaun Murphy [8] 3–6 Jamie Cope [14]
January 11, 2011 (Tuesday)
Alpine skiing
Women's World Cup in Flachau, Austria:
Slalom: Maria Riesch & Tanja Poutiainen 1:42.52 Nastasia Noens 1:43.04
Slalom standings (after 6 of 10 races): (1) Riesch 420 points (2) Marlies Schild & Poutiainen 400
Overall standings (after 18 of 38 races): (1) Riesch 1023 points (2) Lindsey Vonn 827 (3) Poutiainen 580
Football (soccer)
AFC Asian Cup in Qatar:
Group D:
0–0
1–2
Snooker
Masters in London, England, Last 16:
Ronnie O'Sullivan [7] 4–6 Mark Allen [12]
Stephen Maguire [6] 4–6 Marco Fu [16]
January 10, 2011 (Monday)
American football
NCAA bowl games – Bowl Championship Series:
BCS National Championship Game in Glendale, Arizona: Auburn 22, Oregon 19
Wes Byrum's 19-yard field goal as time expires gives the Tigers their first undisputed national championship.
A SEC school wins the championship for the fifth consecutive year.
Football (soccer)
AFC Asian Cup in Qatar:
Group C:
0–4
2–1
FIFA Ballon d'Or:
Lionel Messi of FC Barcelona is named player of the year, ahead of his two teammates Andrés Iniesta and Xavi.
Marta of FC Gold Pride (now defunct) and Santos is named women's world player of the year for the fifth consecutive time.
José Mourinho (Internazionale and Real Madrid) and Silvia Neid (Germany) are named men's and women's coaches of the year respectively.
Snooker
Masters in London, England, Last 16:
Mark Williams [5] 4–6 Ding Junhui [9]
John Higgins [4] 4–6 Graeme Dott [11]
January 9, 2011 (Sunday)
Alpine skiing
Men's World Cup in Adelboden, Switzerland:
Slalom: Ivica Kostelić 1:50.90 Marcel Hirscher 1:51.16 Reinfried Herbst 1:52.19
Slalom standings (after 4 of 10 races): (1) Kostelić 253 points (2) André Myhrer 204 (3) Hirscher 196
Overall standings (after 15 of 38 races): (1) Kostelić 504 points (2) Aksel Lund Svindal 435 (3) Silvan Zurbriggen 421
Women's World Cup in Zauchensee, Austria:
Super-G: Lara Gut 1:12.82 Lindsey Vonn 1:13.35 Dominique Gisin 1:13.54
Super G standings (after 2 of 7 races): (1) Vonn 180 points (2) Maria Riesch 120 (3) Gut 100
Overall standings (after 17 of 38 races): (1) Riesch 923 points (2) Vonn 827 (3) Elisabeth Görgl 565
American football
NFL playoffs – Wild Card Weekend:
AFC: Baltimore Ravens 30, Kansas City Chiefs 7
NFC: Green Bay Packers 21, Philadelphia Eagles 16
NCAA bowl games:
Kraft Fight Hunger Bowl in San Francisco: Nevada 20, Boston College 13
Badminton
BWF Super Series:
BWF Super Series Masters Finals in Taipei:
Men's singles: Lee Chong Wei def. Peter Gade 21–9, 21–14
Women's singles: Wang Shixian def. Bae Yeon-ju 21–13, 21–15
Men's doubles: Carsten Mogensen /Mathias Boe def. Jung Jae-sung /Lee Yong-dae 21–17, 21–15
Women's doubles: Wang Xiaoli /Yu Yang def. Cheng Shu /Zhao Yunlei 21–7, 21–17
Mixed doubles: Zhang Nan /Zhao Yunlei def. Sudket Prapakamol /Saralee Thungthongkam 21–17, 21–12
Biathlon
World Cup 4 in Oberhof, Germany:
Men's 15 km Mass start: Tarjei Bø 39:51.3 (0+1+0+1) Emil Hegle Svendsen 39:53.7 (1+0+2+0) Ivan Tcherezov 39:55.4 (0+0+1+1)
Overall standings (after 9 of 26 races): (1) Bø 449 points (2) Svendsen 394 (3) Ole Einar Bjørndalen 304
Women's 12.5 km Mass Start: Helena Ekholm 39:22.9 (0+0+0+0) Andrea Henkel 39:24.5 (0+1+1+0) Svetlana Sleptsova 39:28.1 (0+0+0+0)
Overall standings (after 9 of 26 races): (1) Kaisa Mäkäräinen 425 points (2) Ekholm 381 (3) Marie-Laure Brunet 324
Cricket
Pakistan in New Zealand:
1st Test in Hamilton, day 3: 275 & 110 (38.3 overs); 367 (122.1 overs) & 21/0 (3.4 overs). Pakistan win by 10 wickets; lead 2-match series 1–0.
India in South Africa:
Only T20I in Durban: 168/6 (20 overs); 147/9 (20 overs). India win by 21 runs.
Cross-country skiing
Tour de Ski:
Stage 8 in Val di Fiemme, Italy:
Men's 9 km freestyle: Lukáš Bauer 30:28.3 Roland Clara 31:00.7 Curdin Perl 31:02.1
Final Tour de Ski standings: (1) Dario Cologna 4:28:02.0 (2) Petter Northug 4:28:29.3 (3) Bauer 4:29:46.1
Cologna wins his second Tour de Ski in three years.
World Cup Distance standings (after 11 of 17 races): (1) Cologna 481 points (2) Alexander Legkov 406 (3) Bauer 400
World Cup Overall standings (after 18 of 31 races): (1) Cologna 1197 points (2) Northug 706 (3) Bauer 698
Women's 9 km freestyle: Therese Johaug 33:14.4 Marte Elden 34:14.8 Marthe Kristoffersen 35:08.3
Final Tour de Ski standings: (1) Justyna Kowalczyk 2:47:31.0 (2) Johaug 2:48:52.5 (3) Marianna Longa 2:50:11.7
Kowalczyk wins her second consecutive Tour de Ski.
World Cup Distance standings (after 11 of 17 races): (1) Kowalczyk 592 points (2) Marit Bjørgen 410 (3) Charlotte Kalla 371
World Cup Overall standings (after 18 of 31 races): (1) Kowalczyk 1271 points (2) Arianna Follis 864 (3) Bjørgen 760
Darts
BDO World Championship in Frimley Green, England:
Men's final: Martin Adams 7–5 Dean Winstanley
Adams wins the title for the third time, and becomes the third player to successfully defend his title, after Eric Bristow and Raymond van Barneveld .
Football (soccer)
AFC Asian Cup in Qatar:
Group B:
1–1
1–2
Golf
PGA Tour:
Hyundai Tournament of Champions in Kapalua, Hawaii:
Winner: Jonathan Byrd 268 (−24)PO
In the tour's season opener, Byrd defeats Robert Garrigus on the second playoff hole to claim his fifth PGA Tour title.
European Tour:
Africa Open in Port Alfred, Eastern Cape, South Africa:
Winner: Louis Oosthuizen 276 (−16)PO
Oosthuizen defeats Chris Wood and Manuel Quirós on the first playoff hole to win his third European Tour title.
Other events:
Royal Trophy in Cha-am/Hua Hin, Thailand:
Team Europe 9–7 Team Asia
Team Europe collects its second consecutive win in this event, and fourth in the five editions to date.
Nordic combined
World Cup in Schonach, Germany:
HS 106 / 4 x 5 km: Cancelled due to bad weather.
Ski jumping
World Cup in Harrachov, Czech Republic:
HS 205 (Ski flying): Thomas Morgenstern 414.5 points Simon Ammann 404.4 Roman Koudelka 401.2
Ski Flying standings (after 2 of 7 events): (1) Morgenstern 180 points (2) Martin Koch 129 (3) Ammann 120
World Cup standings (after 13 of 26 events): (1) Morgenstern 1083 points (2) Ammann 681 (3) Andreas Kofler 621
Snooker
Masters in London, England, Last 16:
Mark Selby [1] 4–6 Mark King [15]
Ali Carter [3] 5–6 Peter Ebdon [13]
Snowboarding
World Cup in Bad Gastein, Austria:
Men's Parallel Slalom: Benjamin Karl Aaron March Simon Schoch
Parallel Slalom standings (after 5 of 10 races): (1) Karl 2910 points (2) Andreas Prommegger 2900 (3) Roland Fischnaller 2760
Overall standings: (1) Karl 2910 points (2) Prommegger 2900 (3) Fischnaller 2760
Women's Parallel Slalom: Yekaterina Tudegesheva Marion Kreiner Claudia Riegler
Parallel Slalom standings (after 5 of 10 races): (1) Tudegesheva 3890 points (2) Fränzi Mägert-Kohli 3110 (3) Alena Zavarzina 2168
Overall standings: (1) Tudegesheva 3890 points (2) Mägert-Kohli 3110 (3) Dominique Maltais 3000
Speed skating
European Championships in Collalbo, Italy:
Men: Ivan Skobrev 154.167 Jan Blokhuijsen 154.273 Koen Verweij 154.688
Skobrev wins the title for the first time.
Women: Martina Sáblíková 165.104 Ireen Wüst 166.463 Marrit Leenstra 168.045
Sáblíková wins the title for the third time.
Tennis
ATP World Tour:
Brisbane International:
Final: Robin Söderling def. Andy Roddick 6–3, 7–5
Soderling wins the 7th title of his career.
Aircel Chennai Open:
Final: Stanislas Wawrinka def. Xavier Malisse 7–5, 4–6, 6–1
Wawrinka wins the 3rd title of his career.
January 8, 2011 (Saturday)
Alpine skiing
Men's World Cup in Adelboden, Switzerland:
Giant slalom: Cyprien Richard 2:25.28 Aksel Lund Svindal 2:25.28 Thomas Fanara 2:25.48
Giant slalom standings (after 4 of 7 races): (1) Ted Ligety 303 points (2) Svindal 265 (3) Richard 242
Overall standings (after 14 of 38 races): (1) Svindal 435 points (2) Michael Walchhofer 409 (3) Ivica Kostelić 404
Women's World Cup in Zauchensee, Austria:
Downhill: Lindsey Vonn 1:46.39 Anja Pärson 1:46.82 Anna Fenninger 1:47.37
Downhill standings (after 4 of 9 races): (1) Vonn 360 points (2) Maria Riesch 257 (3) Elisabeth Görgl 187
Overall standings (after 16 of 38 races): (1) Riesch 883 points (2) Vonn 747 (3) Görgl 515
American football
NFL playoffs – Wild Card Weekend:
NFC: Seattle Seahawks 41, New Orleans Saints 36
The Saints become the first reigning Super Bowl champions since the St. Louis Rams in the 2000–01 playoffs to lose in the Wild Card round, thus a new champion will be crowned for the sixth straight year (the New England Patriots remain the last repeat Super Bowl champions).
The Seahawks become the first team with a losing record to win a playoff game.
AFC: New York Jets 17, Indianapolis Colts 16
NCAA bowl games:
BBVA Compass Bowl in Birmingham, Alabama: Pittsburgh 27, Kentucky 10
Biathlon
World Cup 4 in Oberhof, Germany:
Women's 7.5 km Sprint: Ann Kristin Flatland 23:29.5 (1+0) Magdalena Neuner 23:35.2 (1+1) Andrea Henkel 23:44.7 (0+1)
Standings (after 4 of 10 events): (1) Kaisa Mäkäräinen 196 points (2) Darya Domracheva 165 (3) Neuner 150
Overall standings (after 8 of 26 events): (1) Mäkäräinen 394 points (2) Helena Ekholm 321 (3) Anna Carin Zidek 291
Cricket
Pakistan in New Zealand:
1st Test in Hamilton, day 2: 275 (97.5 overs); 235/4 (80 overs). Pakistan trail by 40 runs with 6 wickets remaining in the 1st innings.
Cross-country skiing
Tour de Ski:
Stage 7 in Val di Fiemme, Italy:
Men's 20 km classical: Petter Northug 57:17.2 Dario Cologna 57:19.0 Devon Kershaw 57:19.4
Tour de Ski standings (after 7 of 8 races): (1) Cologna 3:56:03.9 (2) Northug 3:57:22.0 (3) Martin Jakš 3:58:50.4
World Cup Distance standings (after 10 of 17 races): (1) Cologna 468 points (2) Alexander Legkov 406 (3) Lukáš Bauer 350
World Cup Overall standings (after 16 of 31 races): (1) Cologna 784 points (2) Legkov 651 (3) Marcus Hellner 513
Women's 10 km classical: Justyna Kowalczyk 30:27.6 Therese Johaug 30:33.9 Marianna Longa 31:23.3
Tour de Ski standings (after 7 of 8 races): (1) Kowalczyk 2:12:17.3 (2) Longa 2:14:25.6 (3) Arianna Follis 2:14:50.3
World Cup Distance standings (after 10 of 17 races): (1) Kowalczyk 552 points (2) Marit Bjørgen 410 (3) Charlotte Kalla 349
World Cup Overall standings (after 16 of 31 races): (1) Kowalczyk 831 points (2) Bjørgen 760 (3) Follis 640
Football (soccer)
AFC Asian Cup in Qatar:
Group A: 0–2
Ice hockey
World Women's U18 Championship in Stockholm, Sweden:
Relegation round (best-of-3 series):
Game 3: 5–1 . Switzerland win the series 2–1 and send Japan to Division I in 2012.
Bronze medal game: 0–3
Final: 5–2
The United States win the championship for the third time.
MLP Nations Cup in Kreuzlingen, Switzerland:
5th Place Game: 2–3 (SO)
Bronze Medal Game: 2–7
Final: 0–6
Canada win the Cup for the 8th time in 9 years.
Nordic combined
World Cup in Schonach, Germany:
HS 106 / 10 km: Felix Gottwald 24:38.4 Mario Stecher 24:54.0 Bernhard Gruber 24:54.6
Overall standings (after 7 of 13 races): (1) Stecher 466 points (2) Jason Lamy-Chappuis 459 (3) Mikko Kokslien 387
Ski jumping
World Cup in Harrachov, Czech Republic:
HS 205 (Ski flying): Martin Koch 425.2 points Thomas Morgenstern 421.9 Adam Małysz 416.6
World Cup standings (after 12 of 26 events): (1) Morgenstern 983 points (2) Andreas Kofler 621 (3) Simon Ammann 601
Tennis
ATP World Tour:
Qatar ExxonMobil Open:
Final: Roger Federer def. Nikolay Davydenko 6–3, 6–4
Federer wins the tournament for the third time and the 67th title of his career.
WTA Tour:
Brisbane International:
Final: Petra Kvitová def. Andrea Petkovic 6–1, 6–3
Kvitová wins the second title of her career.
ASB Classic:
Final: Gréta Arn def. Yanina Wickmayer 6–3, 6–3
Arn wins the second title of her career.
Hopman Cup:
Final: United States 2–1
Justine Henin def. Bethanie Mattek-Sands 7–6(6), 6–3
John Isner def. Ruben Bemelmans 6–3, 6–4
Mattek-Sands/Isner def. Henin/Bemelmans 6–1, 6–3
The United States win the Cup for a record sixth time.
Hong Kong Tennis Classic in Hong Kong:
Gold Group Final: Team Russia 3–1 Team Europe
Russia win the title for the second straight time.
January 7, 2011 (Friday)
American football
NFL news:
The San Francisco 49ers name Jim Harbaugh their new head coach, signing the former Stanford coach to a 5-year, $25 million contract.
NCAA bowl games:
Cotton Bowl in Arlington, Texas: LSU 41, Texas A&M 24
Division I FCS:
NCAA Division I Football Championship Game in Frisco, Texas (seeds in parentheses): (5) Eastern Washington 20, (3) Delaware 19
The Eagles win the Championship for the first time.
Biathlon
World Cup 4 in Oberhof, Germany:
Men's 10 km Sprint: Tarjei Bø 25:49.7 (0+1) Arnd Peiffer 26:06.4 (0+1) Michal Šlesingr 26:10.4 (0+0)
Sprint standings (after 4 of 10 races): (1) Bø 214 points (2) Emil Hegle Svendsen 161 (3) Ole Einar Bjørndalen & Lukas Hofer 134
Overall standings (after 8 of 26 races): (1) Bø 389 points (2) Svendsen 340 (3) Bjørndalen 284
Cricket
England in Australia:
Ashes series:
Fifth Test in Sydney, day 5: 280 & 281 (84.4 overs); 644. England win by an innings & 83 runs; win 5-match series 3–1.
Pakistan in New Zealand:
1st Test in Hamilton, day 1: 260/7 (90 overs); .
Darts
BDO World Championship in Frimley Green, England:
Women's final: Trina Gulliver 2–0 Rhian Edwards
Gulliver repeats her 2010 final victory over Edwards, and wins her ninth world title.
Football (soccer)
AFC Asian Cup in Qatar:
Group A: 0–2
Freestyle skiing
World Cup in St. Johann in Tirol, Austria:
Men's Ski Cross: John Teller Nick Zoricic Thomas Zangerl
Ski Cross standings (after 3 of 11 races): (1) Teller 170 points (2) Zoricic 162 (3) Andreas Matt 159
Overall standings: (1) Guilbaut Colas 48 points (2) Patrick Deneen 40 (3) Mikaël Kingsbury 39
Women's Ski Cross: Heidi Zacher Hedda Berntsen Anna Wörner
Ski Cross standings (after 3 of 11 races): (1) Zacher 210 points (2) Fanny Smith 167 (3) Anna Holmlund 150
Overall standings: (1) Hannah Kearney 56 points (2) Zacher 42 (3) Jennifer Heil 40
Ice hockey
World Women's U18 Championship in Stockholm, Sweden:
Relegation round (best-of-3 series):
Game 2: 5–1 . Series tied 1–1.
5th place game: 0–2
Semifinals:
6–1
14–1
MLP Nations Cup in Kreuzlingen, Switzerland:
Semifinals:
9–0
3–1
January 6, 2011 (Thursday)
Alpine skiing
Men's World Cup in Zagreb, Croatia:
Slalom: André Myhrer 1:52.74 Ivica Kostelić 1:52.84 Mattias Hargin 1:53.10
Slalom standings (after 3 of 10 races): (1) Myhrer 189 points (2) Kostelić 153 (3) Jean-Baptiste Grange 122
Overall standings (after 13 of 38 races): (1) Michael Walchhofer 409 points (2) Silvan Zurbriggen 396 (3) Ted Ligety 376
American football
NCAA bowl games:
GoDaddy.com Bowl in Mobile, Alabama: Miami (OH) 35, Middle Tennessee 21
The RedHawks, 1–11 last season, become the first team in FBS history to follow a 10-loss season with a 10-win season.
Biathlon
World Cup 4 in Oberhof, Germany:
Women's 4 x 6 km Relay: (Jenny Jonsson/Anna Carin Olofsson-Zidek/Anna Maria Nilsson/Helena Ekholm) 1:17:53.1 (1+8) (Anais Bescond/Marie Dorin/Pauline Macabies/Marie-Laure Brunet) 1:18:45.4 (3+9) (Nadezhda Skardino/Darya Domracheva/Nadzeya Pisareva/Liudmila Kalinchik) 1:19:24.5 (1+13)
Standings (after 2 of 4 events): (1) & Sweden 98 points (3) 97
Cricket
England in Australia:
Ashes series:
Fifth Test in Sydney, day 4: 280 & 213/7 (67 overs); 644 (178 overs; Matt Prior 118). Australia trail by 151 runs with 3 wickets remaining.
India in South Africa:
3rd Test in Cape Town, day 5: 362 & 341; 364 & 166/3 (82 overs). Match drawn; 3-match series drawn 1–1.
Cross-country skiing
Tour de Ski:
Stage 6: Cortina d'Ampezzo–Toblach, Italy:
Men's 35 km freestyle pursuit: Dario Cologna 1:20:06.9 Marcus Hellner 1:21:13.2 Petter Northug 1:21:46.8
Tour de Ski standings (after 6 of 8 races): (1) Cologna 2:59:44.9 (2) Hellner 3:00:56.2 (3) Northug 3:01:34.8
World Cup Distance standings (after 9 of 17 races): (1) Cologna 422 points (2) Alexander Legkov 406 (3) Lukáš Bauer 330
World Cup Overall standings (after 15 of 31 races): (1) Cologna 738 points (2) Legkov 651 (3) Hellner 505
Women's 16 km freestyle pursuit: Justyna Kowalczyk 37:41.7 Arianna Follis 38:03.9 Marianna Longa 38:04.3
Tour de Ski standings (after 6 of 8 races): (1) Kowalczyk 1:42:34.7 (2) Follis 1:43:01.9 (3) Longa 1:43:07.3
World Cup Distance standings (after 9 of 17 races): (1) Kowalczyk 502 points (2) Marit Bjørgen 410 (3) Charlotte Kalla 333
World Cup Overall standings (after 15 of 31 races): (1) Kowalczyk 781 points (2) Bjørgen 760 (3) Follis 606
Ice hockey
MLP Nations Cup in Kreuzlingen, Switzerland: (teams in bold advance to the semifinals)
Group A: 6–2
Final standings: Sweden 4 points, Russia 3, 2.
Group B: 0–9
Final standings: Canada 6 points, Germany 2, 1.
Luge
World Cup in Königssee, Germany:
Men's singles: Armin Zöggeler 1:41.259 (50.494 / 50.765) Albert Demtschenko 1:41.616 (50.848 / 50.768) Reinhold Rainer 1:41.668 (50.718 / 50.950)
Standings (after 5 of 9 events): (1) Zöggeler 470 points (2) Felix Loch 345 (3) David Möller 324
Zöggeler wins his fourth successive race.
Team relay: (Natalie Geisenberger/Jan-Armin Eichhorn/Tobias Arlt/Tobias Wendl) 2:45.971 (53.646 / 56.147 / 56.178) (Nina Reithmayer/Daniel Pfister/Andreas Linger/Wolfgang Linger) 2:46.179 (54.100 / 56.109 / 55.970) (Sandra Gasparini/Armin Zöggeler/Christian Oberstolz/Patrick Gruber) 2:46.520 (54.604 / 55.882 / 56.034)
Standings (after 3 of 6 events): (1) Germany 300 points (2) Italy 225 (3) Austria 201
Ski jumping
Four Hills Tournament:
Stage 4 in Bischofshofen, Austria:
HS 140: Tom Hilde 278.7 points Thomas Morgenstern 277.1 Andreas Kofler 275.3
Final tournament standings: (1) Morgenstern 958.8 points (2) Simon Ammann 928.4 (3) Hilde 895.0
World Cup standings (after 11 of 26 events): (1) Morgenstern 903 points (2) Kofler 621 (3) Ammann 561
Morgenstern wins the tournament for the first time.
Snooker
Championship League Group 2:
Final: Mark Williams 3–2 Ronnie O'Sullivan
Williams advances to the winners group.
January 5, 2011 (Wednesday)
Baseball
Major League Baseball news:
Roberto Alomar and Bert Blyleven are elected to the Hall of Fame by the Baseball Writers' Association of America. They will be inducted on July 24, alongside Pat Gillick, who was elected in Veterans Committee balloting in December 2010.
Biathlon
World Cup 4 in Oberhof, Germany:
Men's 4 x 7.5 km Relay: (Christoph Stephan, Alexander Wolf, Arnd Peiffer, Michael Greis) 1:23:53.0 (2+16) (Zdeněk Vítek, Jaroslav Soukup, Ondřej Moravec, Michal Šlesingr) 1:26:15.8 (3+14) (Alexander Os, Lars Berger, Rune Brattsveen, Ole Einar Bjørndalen) 1:26:17.0 (6+14)
Standings (after 2 of 4 events): (1) Norway 108 points (2) Germany 103 (3) Czech Republic 90
Cricket
England in Australia:
Ashes series:
Fifth Test in Sydney, day 3: 280; 488/7 (141 overs; Alastair Cook 189, Ian Bell 115). England lead by 208 runs with 3 wickets remaining in the 1st innings.
India in South Africa:
3rd Test in Cape Town, day 4: 362 & 341 (102 overs; Jacques Kallis 109*, Harbhajan Singh 7/120); 364. South Africa lead by 339 runs.
Cross-country skiing
Tour de Ski:
Stage 5 in Toblach, Italy:
Men's sprint freestyle: Devon Kershaw 2:58.0 Dario Cologna 2:58.1 Petter Northug 2:59.2
Tour de Ski standings (after 5 of 8 races): (1) Cologna 1:39:53.0 (2) Kershaw 1:40:35.8 (3) Marcus Hellner 1:41:07.1
World Cup Sprint standings (after 5 of 11 races): (1) Emil Jönsson 280 points (2) Alexei Petukhov 173 (3) Fulvio Scola 162
World Cup Overall standings (after 14 of 31 races): (1) Cologna 688 points (2) Alexander Legkov 651 (3) Hellner 459
Women's sprint freestyle: Petra Majdič 3:17.5 Arianna Follis 3:17.6 Magda Genuin 3:18.0
Tour de Ski standings (after 5 of 8 races): (1) Justyna Kowalczyk 1:05:08.0 (2) Majdič 1:05:47.1 (3) Charlotte Kalla 1:06:16.8
World Cup Sprint standings (after 5 of 11 races): (1) Follis 272 points (2) Majdič 204 (3) Kikkan Randall 191
World Cup Overall standings (after 14 of 31 races): (1) Marit Bjørgen 760 points (2) Kowalczyk 731 (3) Follis 560
Football (soccer)
News: Kristine Lilly, whose 352 appearances with the US women's national team make her the most-capped player in the sport's history, announces her retirement after an international career of over 20 years.
Ice hockey
World Junior Championships in Buffalo, United States:
Bronze medal game: 2–4
Final: 5–3
Russia overturn a three-goal deficit in the third period, to win the Championships for the fourth time.
World Women's U18 Championship in Stockholm, Sweden:
Relegation round (best-of-3 series):
Game 1: 4–0 . Switzerland lead series 1–0.
Quarterfinals:
1–3
2–3 (OT)
MLP Nations Cup in Kreuzlingen, Switzerland: (teams in bold advance to the semifinals)
Group A: 2–0
Standings: Russia 3 points (1 game), Finland 2 (2), 1 (1).
Group B: 4–5 (OT)
Standings: 3 points (1 game), Germany 2 (1), Switzerland 1 (2).
Luge
World Cup in Königssee, Germany:
Doubles: Tobias Wendl/Tobias Arlt 1:41.362 (50.678 / 50.684) Christian Oberstolz/Patrick Gruber 1:41.448 (50.720 / 50.728) Andreas Linger/Wolfgang Linger 1:41.607 (50.863 / 50.744)
Standings (after 5 of 9 events): (1) Wendl 430 points (2) Oberstolz 400 (3) Linger 346
Women's singles: Natalie Geisenberger 1:41.756 (50.896 / 50.860) Tatjana Hüfner 1:41.776 (50.978 / 50.798) Alex Gough 1:42.215 (51.065 / 51.150)
Standings (after 5 of 9 events): (1) Hüfner 485 points (2) Geisenberger 390 (3) Anke Wischnewski 345
January 4, 2011 (Tuesday)
Alpine skiing
Women's World Cup in Zagreb, Croatia:
Slalom: Marlies Schild 2:01.80 Maria Riesch 2:02.55 Manuela Mölgg 2:02.88
Slalom standings (after 5 of 10 races): (1) Schild 400 points (2) Riesch 320 (3) Tanja Poutiainen 300
Overall standings (after 15 of 38 races): (1) Riesch 833 points (2) Lindsey Vonn 647 (3) Elisabeth Görgl 483
American football
NFL news:
The Oakland Raiders announce that they will not renew the contract of head coach Tom Cable for next season.
NCAA bowl games – Bowl Championship Series:
Sugar Bowl in New Orleans: Ohio State 31, Arkansas 26
Cricket
England in Australia:
Ashes series:
Fifth Test in Sydney, day 2: 280 (106.1 overs); 167/3 (48 overs). England trail by 113 runs with 7 wickets remaining in the 1st innings.
India in South Africa:
3rd Test in Cape Town, day 3: 362 & 52/2 (16 overs); 364 (117.4 overs; Sachin Tendulkar 146, Dale Steyn 5/75). South Africa lead by 50 runs with 8 wickets remaining.
Ice hockey
World Junior Championships in the United States:
Relegation round in Lewiston: (teams in strike are relegated to Division I in 2012)
1–3
2–5
Final standings: Czech Republic 9 points, Slovakia 5, Norway 3, Germany 1.
5th place playoff in Buffalo: 2–3 (SO)
World Women's U18 Championship in Stockholm, Sweden: (teams in bold advance to the semifinals, team in italic advance to the quarterfinals)
Group A:
1–4
8–1
Final standings: Canada 9 points, Germany 6, Finland 3, Switzerland 0.
Group B:
4–1
9–0
Final standings: United States 9 points, Sweden 6, Czech Republic 3, Japan 0.
MLP Nations Cup in Kreuzlingen, Switzerland:
Group A: 4–3 (SO)
Group B: 5–0
Snooker
Championship League Group 1:
Final: Mark Selby 3–2 Ali Carter
Selby advances to the winners group.
January 3, 2011 (Monday)
American football
NFL news:
The Cleveland Browns fire head coach Eric Mangini after the franchise's second successive 5–11 season.
NCAA bowl games – Bowl Championship Series:
Orange Bowl in Miami Gardens, Florida: Stanford 40, Virginia Tech 12
Cricket
England in Australia:
Ashes series:
Fifth Test in Sydney, day 1: 134/4 (59 overs); .
India in South Africa:
3rd Test in Cape Town, day 2: 362 (112.5 overs; Jacques Kallis 161, Sreesanth 5/114); 142/2 (50 overs). India trail by 220 runs with 8 wickets remaining in the 1st innings.
Cross-country skiing
Tour de Ski:
Stage 4 in Oberstdorf, Germany:
Men's 10+10 km pursuit: Matti Heikkinen 49:20.1 Dario Cologna 49:21.1 Martin Jakš 49:25.0
Tour de Ski standings (after 4 of 8 races): (1) Cologna 1:37:51.0 (2) Devon Kershaw 1:38:36.9 (3) Marcus Hellner 1:38:57.1
World Cup Distance standings (after 8 of 17 races): (1) Alexander Legkov 406 points (2) Cologna 372 (3) Lukáš Bauer 310
World Cup Overall standings (after 13 of 31 races): (1) Cologna 642 points (2) Legkov 640 (3) Hellner 419
Women's 5+5 km pursuit: Anna Haag 26:59.8 Charlotte Kalla 27:00.4 Marthe Kristoffersen 27:07.0
Tour de Ski standings (after 4 of 8 races): (1) Justyna Kowalczyk 1:01:52.3 (2) Kalla 1:03:12.1 (3) Marianna Longa 1:03:14.4
World Cup Distance standings (after 8 of 17 races): (1) Kowalczyk 452 points (2) Marit Bjørgen 410 (3) Kalla 293
World Cup Overall standings (after 13 of 31 races): (1) Bjørgen 760 points (2) Kowalczyk 722 (3) Arianna Follis 514
Darts
PDC World Championship in London:
Final: Adrian Lewis 7–5 Gary Anderson
Lewis becomes the fifth player to win the PDC world title and the first player to hit a nine-dart finish in the final of a World Championship, recording the perfect leg in the third leg of the first set.
Ice hockey
World Junior Championships in Buffalo, United States:
Semi-finals:
3–4 (SO)
1–4
For the first time since the format change in 2003 both bye teams are eliminated in the semifinals.
Canada qualifies for its 10th consecutive final.
Ski jumping
Four Hills Tournament:
Stage 3 in Innsbruck, Austria:
HS 130: Thomas Morgenstern 266.5 points Adam Małysz 257.5 Tom Hilde 255.2
Tournament standings (after 3 of 4 events): (1) Morgenstern 681.7 points (2) Simon Ammann 654.4 (3) Małysz 638.8
World Cup standings (after 10 of 26 events): (1) Morgenstern 823 points (2) Andreas Kofler 561 (3) Ammann 511
Morgenstern gets his second win of the tournament and the sixth of the season.
January 2, 2011 (Sunday)
Alpine skiing
Men's World Cup in Munich, Germany:
Parallel slalom: Ivica Kostelić Julien Lizeroux Bode Miller
Overall standings (after 12 of 38 races): (1) Michael Walchhofer 409 points (2) Silvan Zurbriggen 395 (3) Ted Ligety 336
Women's World Cup in Munich, Germany:
Parallel slalom: Maria Pietilä Holmner Tina Maze Elisabeth Görgl
Overall standings (after 14 of 38 races): (1) Maria Riesch 753 points (2) Lindsey Vonn 647 (3) Görgl 483
American football
NFL Week 17 (division champions in bold; wild cards in italics):
Atlanta Falcons 31, Carolina Panthers 10
As well as sealing the NFC South, the Falcons clinch the #1 seeding for the NFC playoffs.
Pittsburgh Steelers 41, Cleveland Browns 9
Detroit Lions 20, Minnesota Vikings 13
Oakland Raiders 31, Kansas City Chiefs 10
New England Patriots 38, Miami Dolphins 7
Tampa Bay Buccaneers 23, New Orleans Saints 13
New York Jets 38, Buffalo Bills 7
Baltimore Ravens 13, Cincinnati Bengals 7
Houston Texans 34, Jacksonville Jaguars 17
New York Giants 17, Washington Redskins 14
Dallas Cowboys 14, Philadelphia Eagles 13
San Francisco 49ers 38, Arizona Cardinals 7
Green Bay Packers 10, Chicago Bears 3
Indianapolis Colts 23, Tennessee Titans 20
San Diego Chargers 33, Denver Broncos 28
Sunday Night Football: Seattle Seahawks 16, St. Louis Rams 6
The Seahawks win the NFC West title, and become the first team to win its division with a losing record.
Cricket
India in South Africa:
3rd Test in Cape Town, day 1: 232/4 (74 overs); .
Cross-country skiing
Tour de Ski:
Stage 3 in Oberstdorf, Germany:
Men's Sprint Classic: Emil Jönsson Devon Kershaw Dario Cologna
Tour de Ski standings (after 3 of 8 races): (1) Cologna 49:09.9 (2) Kershaw 49:13.6 (3) Alexander Legkov 49:33.0
World Cup Sprint standings (after 4 of 11 races): (1) Jönsson 280 points (2) Alexei Petukhov 173 (3) Fulvio Scola 153
World Cup Overall standings (after 12 of 31 races): (1) Legkov 610 points (2) Cologna 596 (3) Marcus Hellner 393
Women's Sprint Classic: Petra Majdič Justyna Kowalczyk Astrid Uhrenholdt Jacobsen
Tour de Ski standings (after 3 of 8 races): (1) Kowalczyk 35:13.8 (2) Majdič 35:58.2 (3) Aino-Kaisa Saarinen 36:14.1
World Cup Sprint standings (after 4 of 11 races): (1) Arianna Follis 226 points (2) Majdič & Kikkan Randall 154
World Cup Overall standings (after 12 of 31 races): (1) Marit Bjørgen 760 points (2) Kowalczyk 685 (3) Follis 474
Ice hockey
World Junior Championships in the United States:
Relegation round in Lewiston: (teams in strike are relegated to Division I in 2012)
5–0
3–2
Standings (after 2 games): Czech Republic 6 points, Slovakia 5, Germany 1, Norway 0.
Quarter-finals in Buffalo:
4–1
3–4 (OT)
World Women's U18 Championship in Stockholm, Sweden: (teams in italic advance to the final round)
Group A:
4–2
0–6
Standings (after 2 games): Canada, Germany 6 points, Finland, Switzerland 0.
Group B:
1–7
3–2
Standings (after 2 games): United States, Sweden 6 points, Japan, Czech Republic 0.
January 1, 2011 (Saturday)
American football
NCAA bowl games:
Bowl Championship Series:
Rose Bowl in Pasadena, California: TCU 21, Wisconsin 19
Fiesta Bowl in Glendale, Arizona: Oklahoma 48, Connecticut 20
Other games:
TicketCity Bowl in Dallas: Texas Tech 45, Northwestern 38
Capital One Bowl in Orlando, Florida: Alabama 49, Michigan State 7
Gator Bowl in Jacksonville, Florida: Mississippi State 52, Michigan 14
Outback Bowl in Tampa, Florida: Florida 37, Penn State 24
Cross-country skiing
Tour de Ski:
Stage 2 in Oberhof, Germany:
Men's 15 km Classic Pursuit: Dario Cologna 47:48.1 Devon Kershaw 47:48.6 Alexander Legkov 47:48.9
Tour de Ski standings (after 2 of 8 races): (1) Cologna 47:33.1 (2) Kershaw 47:38.6 (3) Legkov 47:43.9
World Cup Distance standings (after 7 of 17 races): (1) Legkov 376 points (2) Cologna 326 (3) Lukáš Bauer 273
World Cup Overall standings (after 11 of 31 races): (1) Legkov 576 points (2) Cologna 553 (3) Marcus Hellner 363
Women's 10 km Classic Pursuit: Justyna Kowalczyk 33:32.5 Krista Lähteenmäki 34:00.0 Marianna Longa 34:03.0
Tour de Ski standings (after 2 of 8 races): (1) Kowalczyk 33:17.5 (2) Lähteenmäki 33:50.0 (3) Longa 33:58.0
World Cup Distance standings (after 7 of 17 races): (1) Kowalczyk 415 points (2) Marit Bjørgen 410 (3) Charlotte Kalla 247
World Cup Overall standings (after 11 of 31 races): (1) Bjørgen 760 points (2) Kowalczyk 639 (3) Arianna Follis 458
Football (soccer)
Emperor's Cup Final in Tokyo:
Kashima Antlers 2–1 Shimizu S-Pulse
Kashima Antlers win the Cup for the fourth time.
Ice hockey
World Women's U18 Championship in Stockholm, Sweden:
Group A:
9–1
1–0
Group B:
11–0
2–1
NHL Winter Classic in Pittsburgh: Washington Capitals 3, Pittsburgh Penguins 1
Mixed martial arts
UFC 125 in Las Vegas, United States:
Lightweight bout: Clay Guida def. Takanori Gomi by submission (guillotine choke)
Welterweight bout: Dong Hyun Kim def. Nate Diaz by unanimous decision (29–28, 29–28, 29–28)
Light Heavyweight bout: Thiago Silva def. Brandon Vera by unanimous decision (30–26, 30–27, 30–27)
Middleweight bout: Brian Stann def. Chris Leben by TKO (strikes)
Lightweight Championship bout: Frankie Edgar (c) and Gray Maynard fought to a split draw (48–46, 46–48, 47–47).
Ski jumping
Four Hills Tournament:
Stage 2 in Garmisch-Partenkirchen, Germany:
HS 140: Simon Ammann 142.1 points Pavel Karelin 138.3 Adam Małysz 138.0
Tournament standings (after 2 of 4 events): (1) Thomas Morgenstern 415.2 points (2) Ammann 401.7 (3) Matti Hautamäki 388.7
World Cup standings (after 9 of 26 events): (1) Morgenstern 723 points (2) Andreas Kofler 525 (3) Ammann 461
Tennis
Mubadala World Tennis Championship:
Final: Rafael Nadal def. Roger Federer 7–6(4), 7–6(3)
Nadal wins the tournament for the second successive year.
References
1 |
53079391 | https://en.wikipedia.org/wiki/CrossCode | CrossCode | CrossCode is an action role-playing game developed by Radical Fish Games and published by Deck13. The game's development began in 2012, and was later introduced as a crowdfunded project on Indiegogo. Following a three-year long early access beta phase, CrossCode was released for Linux, macOS, and Windows in September 20th, 2018, for PlayStation 4, Xbox One, and Nintendo Switch in July 2020, for Xbox Series X/S as one of its launch titles in November 2020, and for PlayStation 5 in June 2021. Later on it received a DLC by the name of “A New Home” released February 26th, 2021. It received mostly positive reviews from critics.
Synopsis
CrossCode is a retro-inspired 2D action role-playing video game set in the distant future, combining 16-bit Super NES-style graphics with a fast-paced combat system and puzzle mechanics. Players control a mute character named Lea as she plays a fictional MMORPG known as CrossWorlds.
Plot
The game begins with a young woman called Shizuka Sakai fighting her way to rescue her brother, but once she finds him, he dies in her arms. Some time later, a girl called Lea awakens inside a cargo ship with no memories of her past and is informed by a man called Sergey Asimov that she must play the MMORPG "CrossWorlds" in order to regain her memories. Shortly after, Lea is assaulted by mysterious man known as the Blue Avatar, and is forced to escape into the game area. Once reaching the game area, she befriends another player called Emilie and the two explore the game together, eventually joining the "First Scholars" guild.
During a raid with the First Scholars, Lea is dragged away by the Blue Avatar and trapped into an off-limits area called the Vermillion Wasteland. She is confronted by Shizuka, who reveals that Lea is not human but an artificial intelligence called an "Evotar," based on the memories of Shizuka. After escaping back to the cargo ship, she also learns that Sergey used to work on the creation of CrossWorlds in the Instatainment Company along his friends Gautham Ranganathan, Shizuka and her brother Satoshi. These friends also took part in the Evotar Project, which was denied by Instatainment, until disappearing years before the events of the game. Once Sergey discovered Lea, he decided to help her recover her memories in an attempt to look for them.
Back in the game area, Lea reunites with her friends and locates Satoshi and Shizuka's hideout. She learns that they, along with Gautham, were forced by a man called Benedict Sidwell, a black market financer who funded the Evotar Project, to participate in a scheme to create Evotars based on CrossWorlds' players and extract valuable information for him. Satoshi had secretly hidden Lea in CrossWorld code for Sergey to find, allowing him to locate his former colleagues. She also learns that the real Satoshi is already dead but left behind an Evotar based on himself. With help from her friends, Lea storms Vermillion Wasteland where the server containing all Evotars is located in order to stop Sidwell's operation. The Blue Avatar, revealed to be Gautham's player avatar, intervenes on both ends to deliver Lea the "ultimate experience": one final challenge in the form of a dungeon and a final boss duel. After she defeats him, he gives her access to the server, before committing suicide in atonement for cooperating with Sidwell. With his plans foiled, Sidwell accepts defeat and flees.
Having secured the Evotars' data, Lea spends some time with her friends before she is also logged out from the game while Sergey attempts to convince the executives of Instatainment to allow the Evotars to keep existing inside CrossWorlds. The game then ends with two possible outcomes:
In the normal ending, Lea's friends are informed by Sergey that Instatainment refused his proposal and confiscated all Evotar data, thus they will never see Lea again.
In the true ending, achieved after Lea befriends an Instatainment stockholder in the game right before the Vermillion Wasteland raid, Sergey's proposal is accepted by Instatainment and will allow Lea and other Evotars to eventually return to the game.
A New Home
Seven months after Lea and the other Evotars are allowed to live in CrossWorlds, Lea reunites with her friends and moves to a new house in Homestedt, a residential area created just for the Evotars, just in time for the release of the latest update that includes the game's final dungeon. Before Lea challenges the dungeon, she is informed by Sergey that one of her friends, C'tron was actually an Evotar based on Sidwell sent to spy on her. She confronts C'tron, who reveals that he lost most of his recent memories and declares his intention to atone by cooperating with their efforts to bring Sidwell to justice.
After clearing the final dungeon, Lea returns to Vermillion Wasteland one last time to help C'tron recover his memories and discover that he was one of many Evotars created by Sidwell and sent to gather information for him, just to be later deleted once they discovered the truth about their origin. To escape this fate, C'tron made a copy of himself to the main Evotar server. Back to Homestedt, C'tron reveals all he knows to the others and Lea is given the right to pass judgement on him, deciding if he can live in Homestedt with the other Evotars or not. Some time later, all other Evotars move to Homestedt and erect a statue in Lea's honor.
Development and release
Development of the game began in 2012. In February 2015 it was introduced as an Indiegogo project, seeking €80 000 in crowdfunding alongside a web-based demo version. The game was released for Linux, macOS, and Windows in early access on Steam later that year. It was officially released out of early access on September 20, 2018.
Initially announced as one of the stretch goals of the crowdfunding campaign, the Wii U version could have been possible thanks to the system's web development toolset, but was later put on hold to prioritize the Steam Early Access version. It was eventually released for Wii U's successor, Nintendo Switch, alongside PlayStation 4 and Xbox One consoles, on July 9, 2020. The game was included in the launch lineup for Amazon's Luna cloud gaming service on October 20, 2020. An updated version featuring high frame rate options was released on November 10, 2020 for Xbox Series S and Xbox Series X, supporting 4K resolution on the latter, and is available free of charge to existing Xbox One players. Another updated version was also released on June 29, 2021 for PlayStation 5, and is available free of charge to existing PlayStation 4 players.
The game's official soundtrack was composed by Deniz Akbulut, and was released by video game music label Materia Collective on September 6, 2018. A 2-disc vinyl edition by Materia Collective was announced on June 26, 2020.
An expansion pack for the game, "A New Home", was released in February 26, 2021. It includes a new area, a new dungeon, and finishes plot elements from the main game.
Reception
CrossCode received "generally favorable reviews", according to review aggregator Metacritic. The game won the award for "Most Fulfilling Community-Funded Game" at the SXSW Gaming Awards. The game has "Overwelmingly Positive Reviews" on Steam.
References
External links
2018 video games
Action role-playing video games
Deck13 games
Early access video games
Indie video games
Linux games
MacOS games
Nintendo Switch games
PlayStation 4 games
PlayStation 5 games
Single-player video games
Video games developed in Germany
Windows games
Xbox Cloud Gaming games
Xbox One games
Xbox Series X and Series S games |
12136159 | https://en.wikipedia.org/wiki/CBL%20Index | CBL Index | The CBL Index is a ratio between the number of IP addresses in a given IP subnet (Subnetwork) to
the number of CBL (Composite Blocking List) listings in the subnet. It may
be used to measure how "clean" (of compromised computers) a given subnet is.
The higher the number is, the "cleaner" the subnet.
The CBL index may be represented in Decibels (dB) or as CIDR suffix (*/xx).
Note: other spam researchers prefer to use a percentage of IPs that are
listed in a subnet. Using percentages is better suited for "unclean" subnets
because "clean" nets have significantly less than 1% of addresses listed.
Rationale
The CBL DNSBL (Composite Blocking List) lists IP addresses that are compromised by a virus or spam sending infection (computer worm, computer virus, or spamware).
The CBL's full zone (data) is available publicly via rsync for download.
The CBL Index is a reasonably good tool for getting estimates of subnet "outgoing spam reputation". It should be treated with caution - subnets often contain IPs with radically different purposes. Assuming all IPs within a subnet represent the same risk/reputation is potentially dangerous.
The CBL Index may be used for estimation of overall anti-spam performance of ISP or AS operator.
Example
In CBL zone dated 2007-07-07T21:03+00:00 there was 166_086 IP addresses listed from 83.0.0.0/11 network.
The CBL Index for the net was:
2_097_152/166_086 = 12.6 (*/28.3 ; 11.0 dB)
2_097_152 - number of IP addresses in */11 network (2**(32-11))
Literature
External links
References
Computer security procedures
Spamming |
12544818 | https://en.wikipedia.org/wiki/List%20of%20quantum%20chemistry%20and%20solid-state%20physics%20software | List of quantum chemistry and solid-state physics software | Quantum chemistry computer programs are used in computational chemistry to implement the methods of quantum chemistry. Most include the Hartree–Fock (HF) and some post-Hartree–Fock methods. They may also include density functional theory (DFT), molecular mechanics or semi-empirical quantum chemistry methods. The programs include both open source and commercial software. Most of them are large, often containing several separate programs, and have been developed over many years.
Overview
The following tables illustrates some of the main capabilities of notable packages:
Numerical details
Quantum chemistry and solid-state physics characteristics
Post processing packages in quantum chemistry and solid-state physics
See also
Footnotes
† "Academic": academic (no cost) license possible upon request; "Commercial": commercially distributed.
‡ Support for periodic systems (3d-crystals, 2d-slabs, 1d-rods and isolated molecules): 3d-periodic codes always allow simulating systems with lower dimensionality within a supercell. Specified here is the ability for simulating within lower periodicity.
2 QuanPol is a full spectrum and seamless (HF, MCSCF, GVB, MP2, DFT, TDDFT, CHARMM, AMBER, OPLSAA) QM/MM package integrated in GAMESS-US.
10 Through CRYSCOR program.
References
Further reading
Density functional theory software
Computational chemistry software
Molecular modelling software
Physics software
Lists of software |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.