id
stringlengths
3
8
url
stringlengths
32
207
title
stringlengths
1
114
text
stringlengths
93
492k
920818
https://en.wikipedia.org/wiki/Barbara%20Simons
Barbara Simons
Barbara Bluestein Simons (born January 26, 1941) is an American computer scientist and the former president of the Association for Computing Machinery (ACM). She is a Ph.D. graduate of the University of California, Berkeley and spent her early career working as an IBM researcher. She is the founder and former co-chair of USACM, the ACM U.S. Public Policy Council. Her main areas of research are compiler optimization, scheduling theory and algorithm analysis and design. Simons has worked for technology regulation since 2002, where she advocates for the end of electronic voting. She subsequently serves as the chairperson of the Verified Voting Foundation and coauthored a book on the flaws of electronic voting entitled Broken Ballots, with Douglas W. Jones. Early life Simons was born in Boston, Massachusetts and grew up in Cincinnati, Ohio. In high school, she developed an interest for math and science while taking A.P. Math classes. She attended Wellesley College for a year, before moving to Berkeley, California in 1959 to resume her undergraduate education at the University of California, Berkeley. There, she married James Harris Simons. At the beginning of her junior year she gave birth to a daughter, Liz, and dropped out of Berkeley shortly thereafter to become a mother and a housewife. In this time she decided to pursue a profession in Computer Programming, and began taking computer science classes part-time, before enrolling in graduate school at Stony Brook University. After a year of graduate school there, James Harris Simons and she divorced in 1974. Simons transferred back to University of California, Berkeley for the remainder of graduate school, where she concentrated on studying scheduling theory and helped co-found the Women in Computer Science and Engineering club (WiCSE). In 1981, she received her Ph.D. in Computer Science. She received a Distinguished Engineering Alumni Award from the UC Berkeley College of Engineering. Career 1981-1998: IBM After leaving the University of California, Berkeley in 1981, Simons began her career at Research Division of IBM in their Research Division in San Jose. There, she worked on compiler optimization, algorithm analysis, and clock synchronization, which she won an IBM Research Division Award for. In 1992, she began working as a senior programmer in IBM's Applications Development Technology Institute and subsequently as a senior technology adviser for IBM Global Services. Over the course of her career at IBM, her interests shifted from research to the policy and regulation of technology. She took early retirement from IBM in 1998 after spending 17 years with the company. 1993-2002: ACM After leaving IBM in 1998, Simons served as president of the Association for Computing Machinery (ACM), the largest computing society in the world, until 2000. She joined ACM when her career focus shifted from computing research to the politics of technology legislation. Prior to becoming the ACM president, Simons founded ACM's US Public Policy Committee (USACM) in 1993. She co-chaired this committee along with the ACM Committee for Scientific Freedom and Human Rights for 9 years. As president, she co-chaired the ACM study of statewide databases of voters in 1999 under President Clinton, called Voter Registration Databases 2000–2002. In 1999 she was elected secretary of the Council of Scientific Society Presidents (CSSP) as ACM President. In 2001 after her time as president, she received ACM's Outstanding Contribution Award. She is still a Fellow of ACM and the American Association for the Advancement of Science. 2008–Present: The Verified Voting Foundation Since 2008, Simons has served on the board of directors of the Verified Voting Foundation, a non-partisan and non-profit organization that advocates for legislation to promote the safest and most transparent voting. The group's goals are to ensure that states and municipalities across America adopt voting technology best practices. Other work Simons helped found the Reentry Program for Women and Minorities at U.C. Berkeley in the Computer Science Department. She also serves on the boards of the Coalition to Diversify Computing (CDC) and the Berkeley Foundation for Opportunities in Information Technology (BFOIT), both which promote minorities to learn and work in computing. In 2005 Simons became the first woman ever to receive the Distinguished Engineering Alumni Award from the U.C. Berkeley's College of Engineering. She is a member of the board of directors at the U.C. Berkeley Engineering Fund, the Electronic Privacy Information Center, and sits on the Advisory Boards of the Oxford Internet Institute. Simons has also served as a professor at Stanford University. Voting technology policy After leaving IBM and serving as ACM president, Simons began working to reverse the dangers of using unverifiable technology in voting. In 2001 she participated in the National Workshop on Internet Voting under President Clinton, where she helped produce a report on Internet voting. She subsequently served on the President's Export Council's Subcommittee on Encryption, as well as on the Information Technology-Sector of the President's Council on the Year 2000 Conversion. Barbara held one of her first public outcries of unverifiable voting technology in 2003 because election officials in Silicon Valley wanted to switch to paperless machines. Now, Barbara serves as a board chair at Verified Voting. She also co-chaired the ACM study of statewide databases of registered voters alongside Paula Hawthorn. She participated on the Security Peer Review Group for the US Department of Defense’s Internet voting project (SERVE) and co-authored the report that led to the cancellation of SERVE because of security concerns 2004. In addition to serving on the Board of Directors of the Verified Voting Foundation, Simons has worked for legislation to remove paperless voting machines and published various work about it. She played a key role in changing the League of Women Voters support and use of paperless voting. Initially the League had seen electronic voting as better for disabled people, then endorsed voting machines that are "recountable" after Simons. In 2008 she was appointed by Senator Harry Reid to the U.S Election Assistance Commission Board of Advisors, where she contributed to "Help America Vote Act" (HAVA). In 2009 she co-authored the League of Women Voters report on election auditing. With fellow computer scientist Douglas Jones, she co-authored a book about electronic voting machines in 2012, titled “Broken Ballots: Will Your Vote Count?”. Following this, in July 2015 she published another report about electronic voting for the U.S. Vote Foundation entitled The Future of Voting: End-to-End Verifiable Internet Voting. Awards and honors CPSR Norbert Wiener Award for Professional and Social Responsibility in Computing (1992) Featured by Science in a special edition on women in science (1992) ACM Fellow (1993) American Association for the Advancement of Science Fellow (1993) Named by Open Computing as one of the top 100 women in computing Selected by CNET as one of 26 Internet "Visionaries" (1995) Electronic Frontier Foundation Pioneer Award (1998) U.C. Berkeley Computer Science Department Distinguished Alumnus Award in Computer Science and Engineering (2000) ACM Outstanding Contribution Award (2002) Computing Research Association Distinguished Service Award (2004) University of California, Berkeley College of Engineering Distinguished Engineering Alumni Award (2005) U.C. Berkeley Lifetime Achievement Award (2005) U.S. Election Assistance Commission Board of Advisors (2008) WITI@UC Anthea Award (2019) ACM Policy Award (2019) References External links Fellows of the Association for Computing Machinery Presidents of the Association for Computing Machinery American women computer scientists American computer scientists UC Berkeley College of Engineering alumni 1941 births Living people Election technology people 21st-century American women
59255339
https://en.wikipedia.org/wiki/Serge%20Belongie
Serge Belongie
Serge Belongie is a professor of Computer Science at the University of Copenhagen, where he also serves as the head of the Danish Pioneer Centre for Artificial Intelligence. Previously, he was the Andrew H. and Ann R. Tisch Professor of Computer Science at Cornell Tech, where he also served as Associate Dean. He has also been a member of the Visiting Faculty program at Google. He is known for his contributions to the fields of computer vision and machine learning, specifically object recognition and image segmentation, with his scientific research in these areas cited over 50,000 times according to Google Scholar. Along with Jitendra Malik, Belongie proposed the concept of Shape context, a widely used feature descriptor in object recognition. He has co-founded several startups in the areas of computer vision and object recognition. Career Belongie received a PhD in Electrical Engineering and Computer Sciences from University of California, Berkeley in 2000, where he was advised by computer scientist Jitendra Malik. While an undergraduate student at California Institute of Technology, Belongie co-founded Digital Persona, Inc., which created what has been called "the world's first mass-market fingerprint identification device". Digital Persona was acquired by biometric identification company Crossmatch, Inc in 2014. He has also been the co-founder of image recognition startup Anchovi Labs (acquired by Dropbox, Inc. in 2012), and computer vision/video analysis company Orpix, Inc. He is also an Expert in Residence at LDV Capital. Belongie is the creator, along with Pietro Perona, of Visipedia, an image recognition platform that promises to combine computer and human capabilities to allow users to identify and annotate images. Belongie was a professor of Computer Science at University of California, San Diego between 2001 and 2013, where he was the director of the SO(3) Computer Vision Group. He joined Cornell Tech as a professor in 2014. At Cornell, he is the director of the SE(3) Computer Vision Group, and a member of the Connected Experiences Laboratory. In 2021, he moved to Europe to become the director of the Danish Pioneer Centre for Artificial Intelligence, and professor in the Department of Computer Science at the University of Copenhagen. Awards The MIT Technology Review named Belongie to their list of Innovators under 35 for 2004. In 2007, Belongie and his co-authors received a Marr Prize Honorable mention for a paper presented at International Conference on Computer Vision. In 2015, he was the recipient of the ICCV Helmholtz Prize, awarded to authors of papers that have made fundamental contributions to the field of computer vision. Belongie also received an NSF Career Award and a Sloan Research Fellowship to support his research. References Living people Computer scientists Computer vision researchers Cornell University faculty Cornell Tech faculty UC Berkeley College of Engineering alumni California Institute of Technology alumni Year of birth missing (living people)
36810432
https://en.wikipedia.org/wiki/Mining%20software%20repositories
Mining software repositories
The mining software repositories (MSR) field analyzes the rich data available in software repositories, such as version control repositories, mailing list archives, bug tracking systems, issue tracking systems, etc. to uncover interesting and actionable information about software systems, projects and software engineering. Definition Herzig and Zeller define ”mining software archives” as a process to ”obtain lots of initial evidence” by extracting data from software repositories. Further they define ”data sources” as product-based artifacts like source code, requirement artefacts or version archives and claim that these sources are unbiased, but noisy and incomplete. Techniques Coupled Change Analysis The idea in coupled change analysis is that developers change code entities (e.g. files) together frequently for fixing defects or introducing new features. These couplings between the entities are often not made explicit in the code or other documents. Especially developers new on the project do not know which entities need to be changed together. Coupled change analysis aims to extract the coupling out of the version control system for a project. By the commits and the timing of changes, we might be able to identify which entities frequently change together. This information could then be presented to developers about to change one of the entities to support them in their further changes. Commit Analysis There are many different kinds of commits in version control systems, e.g. bug fix commits, new feature commits, documentation commits, etc. To take data-driven decisions based on past commits, one needs to select subsets of commits that meet a given criterion. That can be done based on the commit message, or based on the commit content. Documentation generation It is possible to generate useful documentation from mining software repositories. For instance, Jadeite computes usage statistics and helps newcomers to quickly identify commonly used classes. When one focuses on certain kinds of structured documentation such as subclassing directives, more advanced techniques can synthesize full sentences. Data & Tools The primary mining data comes from version control systems. Early mining experiments were done on CVS repositories. Then, researchers have extensively analyzed SVN repositories. Now, Git repositories are dominant, but special care must be given to handle branches and forks. Tools: ModelMine is a web application to mine open source repositories LibVCS4j is a Java library that allows existing tools to analyse the evolution of software systems by providing a common API for different version control systems and issue trackers. Pydriller is a Python Framework to analyse Git repositories. Repositorch is a Git repository analysis engine written in C#. Coming is a Java tool to search for patterns in past commits. CVSAnalY extracts information out of source code repository logs and stores it into a database. See also Software evolution Software analytics Software maintenance Software archaeology References Software engineering
412660
https://en.wikipedia.org/wiki/Errno.h
Errno.h
errno.h is a header file in the standard library of the C programming language. It defines macros for reporting and retrieving error conditions using the symbol errno (short for "error number"). errno acts like an integer variable. A value (the error number) is stored in errno by certain library functions when they detect errors. At program startup, the value stored is zero. Library functions store only values greater than zero. Any library function can alter the value stored before return, whether or not they detect errors. Most functions indicate that they detected an error by returning a special value, typically NULL for functions that return pointers, and -1 for functions that return integers. A few functions require the caller to preset errno to zero and test it afterwards to see if an error was detected. The errno macro expands to an lvalue with type int, sometimes with the extern and/or volatile type specifiers depending upon the platform. Originally this was a static memory location, but macros are almost always used today to allow for multi-threading, so that each thread will see its own thread-local error number. The header file also defines macros that expand to integer constants that represent the error codes. The C standard library only requires three to be defined: EDOM Results from a parameter outside a function's domain, e.g. ERANGE Results from a result outside a function's range, e.g. on systems with a 32-bit wide long EILSEQ (Required since 1994 Amendment 1 to C89 standard) Results from an illegal byte sequence, e.g. on systems that use UTF-8. POSIX compliant operating systems like AIX, Linux or Solaris include many other error values, many of which are used much more often than the above ones, such as EACCES for when a file cannot be opened for reading. C++11 additionally defines many of the same values found within the POSIX specification. Traditionally, the first page of Unix system manuals, named intro(2), lists all errno.h macros, but this is not the case with Linux, where these macros are instead listed in the errno(3). An can be translated to a descriptive string using strerror (defined in string.h) or a BSD extension called . The translation can be printed directly to the standard error stream using perror (defined in stdio.h). As in many Unix-like systems is not thread-safe, a thread-safe version is used, but conflicting definitions from POSIX and GNU makes it even less portable than the table. See also perror strerror References Bibliography External links GNU C library manual: Error codes Lists of errno values on Linux, both numeric and symbolic C standard library headers
5926911
https://en.wikipedia.org/wiki/Harrison%20Audio%20Consoles
Harrison Audio Consoles
Harrison Audio Consoles is an international company based in Nashville, Tennessee that manufactures mixing consoles, Digital Audio Workstations (DAW), audio plugins, and other audio technologies for the post-production, video production, broadcast, sound reinforcement and music recording industries. The company is renowned as an industry innovation for its "in-line" mixing console design that has subsequently become the standard for nearly every large-format music console. Over 1,500 Harrison consoles have been installed worldwide, presenting a significant percentage of the overall world market share for high-end audio consoles. The company founder, Dave Harrison, was inducted as a Fellow in the Audio Engineering Society for this technical contribution of the recording industry and in particular the first 32-bus "in-line" console. History Harrison came to the recording industry after working for 5 years in recording equipment retail. In the early 1970s he acquired a dealership for Music Center Incorporated, then a manufacturer of tape recorder and record electronics equipment. In 1972 he approached company CEO Jeep Harned with a concept for an in-line mixing console that simplified the incorporation of multitrack recorders into a console signal path. The Harrison-designed MCI JH400 series console was the world's first commercially available in-line console. Realising the importance of his innovation to multitrack production in both the recording and film industries, Harrison established the manufacturing company, Harrison Consoles. During the first decade of its existence, Harrison Consoles produced a series of popular consoles for the film, music, broadcast TV markets. In 1975 the company introduced its first product, the Harrison 3232, and the first 32 series product. This was followed by the PP-1 film console, the MR-2, MR-3, and MR-4 music recording consoles, the TV-3, TV-4 broadcast consoles, the HM-5 live console, the Raven music recording console, and the Air-7/Pro-7 broadcast and production consoles. These fully analog console designs continued into the 1990s, while the digital revolution was taking place. During this period of rapid digital development, Harrison still continued to produce analog consoles (often with some digital elements) such as the AIR 790/PRO 790 broadcast and production consoles, AP-100 on-air production console, the MR-20 music console, the industry workhorse TV-950 and Pro-950 production consoles, and finally the TV5.1 surround-capable broadcast console. In 1985 Harrison introduced its SeriesTen, the world's first digitally controlled analog mixer with console automation. The SeriesTen used only 3 knobs above each channel strip to "page" between various functions of the console. By separating the knob from the actual audio signal, it was possible to instantly save and recall the settings of the console, without mechanically turning the knobs on the surface. At the time this was unheard of, but it has now become a ubiquitous feature of every digital console on the market. Perhaps proving that the SeriesTen was ahead of its time, many SeriesTen console were still in use in 2009. ABBA produced all their hits on their Harrison console at Polar Studios. The a capella introduction to Kansas' Carry On Wayward Son was recorded from Harrison console preamps directly to tape. Throughout the 1980s, seminal music works were mixed on Harrison consoles: Michael Jackson's Thriller and Bad albums were both mixed on a Harrison console by Bruce Swedien. Janet Jackson's Rhythm Nation was mixed on a Harrison SeriesTen, And Sade's album Promise and her prior hit song Smooth Operator were recorded and mixed on a Harrison console. In 1989 Harrison Systems was acquired by GLW Incorporated. GLW's first product introduction was the release of the SeriesTenB, an updated version of the SeriesTen utilizing a powerful Mac-based automation system coupled with new video interactive graphics for display of console information and the control of console functions through the use of an interactive video screen. The company's technological advances accelerated in the 1990s as additional resources were dedicated to research and development. The first fruits of these efforts was the introduction in 1992 of the fully automated Harrison MPC (Motion Picture Console) followed shortly thereafter by the debut of its sister console, the fully automated Harrison SeriesTwelve. The Series10 technology was advanced in a follow-up product for film, the MPC. The MPC was a control surface that remotely controlled the audio processing racks. This separation of the control surface from the audio racks allowed the audio processing racks to be placed in the machine rooms, thus allowing for sleeker, cooler, and more acoustic-friendly control surface designs tailored to fit the needs and applications of each individual user. Additional technologies such as automated, motorized joysticks and advanced monitoring features were also incorporated into the MPC. The Harrison SeriesTenB with its new automation system and interactive video graphics was recipient in 1991 of the coveted Mix Foundation Technical Achievements Award for Console Technology, the TEC Award. Shortly thereafter, the first MPC was installed at Sony Pictures in Hollywood in 1992, the first truly fully automated large format film re-recording console. The MPC was designed in a tight collaboration with Jeff Taylor, chief engineer at Sony Pictures, and many film and post-production mixers. The ongoing relationship between Harrison and Sony Pictures Post Production Facilities in Hollywood has resulted in the purchase of thirteen massive, fully automated MPC consoles by Sony. During the late 1990s there was a clear demand for a digital processing engine which could satisfy the need for increased channel counts that were becoming possible with new digital production techniques. Harrison developed the digital. engine, a powerful DSP mixing and routing engine that could provide 768 fully resourced channels and thousands of input and output signals. The digital. engine was designed to retrofit existing analog MPC or Series12 consoles with a new digital backend. Many Harrison customer upgraded their existing consoles to the new engine because it was cost effective and did not incur the "down time" of replacing an entire console. Harrison continued its technological advancements and was awarded another TEC Award in 1999, this time for Outstanding Technical Achievement in Sound Reinforcement Console Technology. This award was granted to the Harrison LPC (Live Performance Console). The LPC console was co-developed with touring sound company Showco to create a no-compromise sound reinforcement console. Taking advantage of Harrison's digitally controlled-analog technology, and a newly developed IKIS automation engine, the LPC was designed with motorized potentiometers for every console parameter. Similar to Harrison's motorized joysticks, the motorized potentiometers allowed the user of the console to work in an intuitive way, while providing all the benefits of digital surfaces such as instant recall. In 2000, Harrison was awarded a patent for their use of automated, motorized panning joysticks. This technology has been licensed to other console manufacturers. During the early 2000s, increasingly complicated audio productions drove the adoption of TFT screens into the meter bridges of digital consoles. Harrison developed linux-based TFT screens that simultaneously show EQ curves, panning, auxes, metering, bus assignments and dynamics. In addition, a new PreView waveform technology was developed for the screens. This technology allows users to see cues before and after they happen, much like the waveform views on a workstation. This feature was incorporated into the MPC4-D. The MPC4-D has been adopted by premiere film dubbing stages around the world, such as Universal Studios (Hollywood), CinePostproduction (Munich), MosFilm (Moscow), Shree Balaji (Mumbai), and Deluxe (Toronto). Many international blockbuster films have been mixed on Harrison Consoles: Transformers 1 and 2, Spider-Man 1 through 3, Jurassic Park, Pearl Harbor, Harry Potter, The Passion of the Christ and Amélie are some examples. Television shows The Simpsons, 24, and CSI are mixed on a Harrison console. In 2004, a new cost-effective version of the Series12 multi-purpose console surface was developed: the Trion. The Trion uses Universal Serial Bus (USB) connectivity and other non-proprietary hardware. The Air24 was also developed using the same technology for on-air radio broadcast. The new smaller surfaces needed a smaller processing engine, so the Xrange native processing system was developed for use in all Harrison products. The Xrange uses Linux and off-the-shelf computers instead of the proprietary systems common to previous-generation consoles. A Harrison console system is made up by the combination of an application-specific console surface (MPC, Trion or Air24), along with a processing engine (Xrange), and an automation computer (IKIS). Each of the three pieces (surface, processing, and automation) are updated regularly by Harrison to accommodate new technologies. Harrison has adopted Linux as the underlying technology for all of their products. The automation system, console surfaces, DSP processing, and audio routing all incorporate Linux at some level. Harrison has also collaborated with open-source developers on their Xdubber and Harrison Mixbus products which is based on the Ardour open-source workstation. Selected users Music Westlake Audio Studios - Michael Jackson "Thriller" and "Bad" Polar Studios (Stockholm) - ABBA, Led Zeppelin, Genesis, Ramones Musicland Studios (Munich) - Queen, David Bowie, Deep Purple, Rolling Stones, Giorgio Moroder, ELO, Iggy Pop, Rainbow, Iron Maiden Rusk studios - The Runaways, Village People, Donna Summer, Laura Brannigan, Elton John Flyte Tyme - Janet Jackson 'Rhythm Nation', Mariah Carey, Usher Morgan Studios - The Cure, Gary Moore, Thin Lizzy, Motorhead Power Plant - Sade, Fine Young Cannibals TheEndStudios (Lund Sweden) - Billy Cobham, Big Elf, The Knife, Hoffmaestro, Thåstöm, Bob Hund, Bergman Rock, Calle Real EastSide Sound - Les Paul, Lou Reed, Lee Ranaldo, Sevendust Utility Muffin Research Kitchen - Frank Zappa United Western Recorders - Blondie Smart Studios - Smashing Pumpkins, Garbage, Killdozer, Nirvana Soundworks Studio - Steely Dan Redwood Studios - Neil Young The Automatt studio - Herbie Hancock Film & Post Sony Pictures Entertainment - Pearl Harbor, Spider-Man series, Transformers series, The Simpsons Universal Studios - U-571, Law & Order, The Revenant MosFilm (Moscow) ARRI (Munich) CinePostproduction (Munich) Shree Balaji Studio (Mumbai) Deluxe Toronto (Toronto) Company timeline 1971: Company founder Dave Harrison creates the "in-line" audio console commercialized by MCI 1975: Harrison Systems established 1975: 3232, the world's first 32-bus, in-line recording console introduced 1979: The PP-1 film console introduced 1981: MR-2 music recording console introduced 1982: MR-3 music recording/TV-3 broadcast console introduced 1983: MR-43 music recording/TV-4 introduced 1983: HM-5/ live performance SM-5 house monitor and stage monitor introduced 1983: Raven music recording console introduced 1984: Air-7/Pro-7 on air radio broadcast and production consoles introduced 1984: HM-4/SM-4 live performance house monitor and stage monitor consoles introduced 1985: SeriesTen, the world's first totally automated console introduced. 1986: AIR 790/PRO 790 on air radio broadcast and production consoles introduced 1986: "Real time" interactive graphics offered as an option for the SeriesTenB 1987: AP-100 on air micro processor controlled radio broadcast console introduced 1987: MR-20 music recording introduced 1989: Harrison is acquired by GLW Incorporated 1989: SeriesTenB with new Mac based automation 1990: VIC – "real time" interactive video graphic display/control introduced for SeriesTenB 1991: Harrison implements remote, digitally controlled audio 1992: MPC, Motion Picture Console introduced 1994: SeriesTwelve multi format introduced 1995: TV-950 broadcast console introduced 1995: Pro-950 production console introduced 1996: TV950 honored at NAB as Editors’ Pick of Show for new product introductions 1996: Automated, motorized joystick introduced (now patented by Harrison) 1998: TV 5.1 TV broadcast console with surround capability introduced 1998: LPC, Live Performance Console introduced 1998: digital.engine introduced, supporting 512 channels and 160 buss mixing at 40 bit 1998: digital.engine MADI router introduced, allowing up to 2240x2240 audio routing 2000: Harrison is awarded the patent for automated motorized joystick innovation 2001: TVD, Digital Broadcast Console introduced 2001: LPC, Digital, Live Performance Console introduced 2001: MPC2, Motion Picture Console introduced and honored with nomination for TEC Award 2002: TVD-SL, Introduction of the Digital Broadcast Console featuring heads-up displays 2002: Pro950EX Production console introduced 2002: IKIS, Introduction of the Harrison IKIS Digital Automation Platform 2002: MPC3-D, Digital Motion Picture Console upgrade to the IKIS Automation Platform 2004: MPC4-D, Introduction of the Digital Motion Picture Console with heads-up displays 2004: PreView displays introduced, displaying live audio waveforms from any source (patent pending) 2004: DTC Introduction of the Digital Tools Card with Film specific plug-ins 2005: Trion introduced, a Digital Audio Console with an analog feel and heads-up displays 2005: IKISdirect, DAW controller introduced for Pro Tools and Pyramix 2005: Serial Supervisor, redundant control system introduced 2006: Xrange, Stand-alone, Native, 64-bit Digital Processing Engine introduced 2006: Air 24/7, Small format On-Air console introduced 2006: Xdubber, destructive stem recorder for Film introduced 2007: IKIS automation on Linux, and Xtools film-specific native processing tools introduced. 2008: Trion for Film introduced. 2009: Bricasti remote control added to IKISdirect. 2009: Mixbus Digital Audio Workstation for Music introduced. (nominated for TEC award) 2011: 950m Analog Music Console introduced 2013: 950mx Analog Music Console introduced 2016: Mixbus32C – a higher-tier version of the Mixbus workstation 2018: AVA Plugins (cross-platform compatible AAX/VST/VST3/AU) References External links Company Website Manufacturing companies based in Nashville, Tennessee Audio mixing console manufacturers Audio equipment manufacturers of the United States
14996749
https://en.wikipedia.org/wiki/3709%20Polypoites
3709 Polypoites
3709 Polypoites is a large Jupiter trojan from the Greek camp, approximately in diameter. The Trojan asteroid was discovered on 14 October 1985, by American astronomer Carolyn Shoemaker at the Palomar Observatory in California, United States, and named after Polypoites from Greek mythology. The dark D-type asteroid belongs to the 50 largest Jupiter trojans. It has a rotation period of 10 hours and possibly a spherical shape. Orbit and classification Polypoites is a dark Jovian asteroid orbiting in the leading Greek camp at Jupiter's Lagrangian point, 60° ahead of the Gas Giant's orbit in a 1:1 resonance (see Trojans in astronomy). It is also a non-family asteroid in the Jovian background population. It orbits the Sun at a distance of 4.9–5.6 AU once every 12.00 years (4,381 days; semi-major axis of 5.24 AU). Its orbit has an eccentricity of 0.06 and an inclination of 20° with respect to the ecliptic. The asteroid was first observed as at Crimea–Nauchnij in July 1971. The body's observation arc begins at Palomar on 21 September 1985, just three weeks prior to its official discovery observation. Physical characteristics In both the Tholen- and SMASS-like taxonomy of the Small Solar System Objects Spectroscopic Survey (S3OS2), Polypoites is a D-type asteroid. It is also a generically assumed C-type asteroid. Rotation period Between 2010 and 2017, several rotational lightcurves have been obtained from photometric observations by Robert Stevens at the Center for Solar System Studies in California. Analysis of the best-rated lightcurve from April 2016 gave a period of 10.039 hours with a brightness variation of 0.12 magnitude (). A low brightness amplitude between 0.12 and 0.18 is also indicative of a rather spherical shape. These results supersede a period of 43 hours () measured at the Calvin–Rehoboth and Calvin College observatories in 2007. Diameter and albedo Results from space-based surveys diverge significantly: according to the surveys carried out by the Infrared Astronomical Satellite IRAS, the Japanese Akari satellite and the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer, Polypoites measures between 65.30 and 99.09 kilometers in diameter and its surface has an albedo between 0.0452 and 0.087. The Collaborative Asteroid Lightcurve Link agrees with the results obtained by IRAS (11 observations) and derives a diameter of 99.01 kilometers with an albedo of 0.0413 based on an absolute magnitude of 9.1. Naming This minor planet was named from Greek mythology after the Greek hero Polypoites, who fought during the Trojan War. In a competition among the Greek warriors, he was able to throw an iron meteorite the farthest and won the game against Leonteus, after whom the minor planet 3793 Leonteus is named. On landing, the meteorite formed an impact crater. The asteroid's name was suggested by Dorothy and Jerome Preston, with the remark, that, had the Shoemakers been present, they would have examined the event closely. The official naming citation was published by the Minor Planet Center on 2 April 1988 (). Notes References External links Asteroid Lightcurve Database (LCDB), query form (info ) Dictionary of Minor Planet Names, Google books Discovery Circumstances: Numbered Minor Planets (1)-(5000) – Minor Planet Center 003709 Discoveries by Carolyn S. Shoemaker Minor planets named from Greek mythology Named minor planets 19851014
1033226
https://en.wikipedia.org/wiki/R%C3%A9my%20Card
Rémy Card
Rémy Card is a French software developer who is credited as one of the primary developers of the Extended file system (ext) and Second Extended file system (ext2) for Linux. References Bibliography Card, Rémy. (1997) Programmation Linux 2.0. Gestion 2000. . Card, Rémy; Dumas, Éric; & Mével, Franck. (1998). The Linux Kernel Book. John Wiley & Sons. . External links Design and Implementation of the Second Extended Filesystem - written by Rémy Card, Theodore Ts'o and Stephen Tweedie, published at the First Dutch International Symposium on Linux (December 1994) Rémy Card Interview - in French (April 1998) French computer programmers Free software programmers Linux kernel programmers Year of birth missing (living people) Living people Versailles Saint-Quentin-en-Yvelines University faculty
5718793
https://en.wikipedia.org/wiki/ORiNOCO
ORiNOCO
ORiNOCO was the brand name for a family of wireless networking technology by Proxim Wireless (previously Lucent). These integrated circuits (codenamed Hermes) provide wireless connectivity for 802.11-compliant Wireless LANs. Variants Lucent offered several variants of the PC Card, referred to by different color-based monikers: White/Bronze: WaveLAN IEEE Standard 2 Mbit/s PC Cards with 802.11 support. Silver: WaveLAN IEEE Turbo 11 Mbit/s PC Cards with 802.11b and 64-bit WEP support. Gold: WaveLAN IEEE Turbo 11 Mbit/s PC Cards with 802.11b and 128-bit WEP support. Later models dropped the 'Turbo' moniker due to 802.11b 11 Mbit/s becoming widespread. Proxim, after taking over Lucent's wireless division, rebranded all their wireless cards to ORiNOCO - even cards not based on Lucent/Agere's Hermes chipset. Proxim still offers ORiNOCO-based cards under the 'Classic' brand. Rebranded products The WaveLAN chipsets that power ORiNOCO-branded cards were commonly used to power other wireless networking devices, and are compatible with a number of other access points, routers and wireless cards. The following brand and models utilise the chipset, or are rebrands of an ORiNOCO product: 3Com AirConnect Apple Airport and Airmac cards (original only, non extreme). Modified to remove the antenna stub. AVAYA World Card Cabletron RoamAbout 802.11 DS Compaq WL100 11 Mbit/s Wireless Adapter D-Link DWL-650 ELSA AirLancer MC-11 Enterasys RoamAbout Ericsson WLAN Card C11 Farallon SkyLINE Fujitsu RoomWave HyperLink Wireless PC Card 11Mbit/s Intel PRO/Wireless 2011 Lucent Technologies Wavelan/IEEE Orinoco Melco WLI-PCM-L11 Microsoft Wireless Notebook Adapter MN-520 NCR WaveLAN/IEEE Adapter Proxim LAN PC CARD HARMONY 80211B Samsung 11Mbit/s WLAN Card Symbol LA4111 Spectrum24 Wireless LAN PC Card Toshiba Wireless Lan Mini PCI Card Preferred wireless chipset for wardriving The ORiNOCO (and their derivatives) is preferred by wardrivers, due to their high sensitivity and the ability to report the level of noise (something that other chips do not report). The pre-Proxim (or 'Classic') ORiNOCO cards have a jack for attaching an external antenna. Linux drivers A Linux Orinoco Driver supports the IEEE 802.11b Hermes/ORiNOCO family of chips. It was included in the Linux kernel since version 2.4.3. External links MPL/GPL drivers Proxim Website for ORiNOCO ORiNOCO AP-8100 References Wireless networking hardware
6624928
https://en.wikipedia.org/wiki/Wireless%20ad%20hoc%20network
Wireless ad hoc network
A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use. In the Windows operating system, ad hoc is a communication mode (setting) that allows computers to directly communicate with each other without a router. Wireless mobile ad hoc networks are self-configuring, dynamic networks in which nodes are free to move. Such wireless networks lack the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly". Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. This becomes harder as the scale of the MANET increases due to 1) the desire to route packets to/through every other node, 2) the percentage of overhead traffic needed to maintain real-time routing status, 3) each node has its own goodput to route independent and unaware of others needs, and 4) all must share limited communication bandwidth, such as a slice of radio spectrum. Such networks may operate by themselves or may be connected to the larger Internet. They may contain one or multiple and different transceivers between nodes. This results in a highly dynamic, autonomous topology. MANETs usually have a routable networking environment on top of a link layer ad hoc network. History on packet radio The earliest wireless data network was called PRNET, the packet radio network, and was sponsored by Defense Advanced Research Projects Agency (DARPA) in the early 1970s. Bolt, Beranek and Newman Inc. (BBN) and SRI International designed, built, and experimented with these earliest systems. Experimenters included Robert Kahn, Jerry Burchfiel, and Ray Tomlinson. Similar experiments took place in the amateur radio community with the x25 protocol. These early packet radio systems predated the Internet, and indeed were part of the motivation of the original Internet Protocol suite. Later DARPA experiments included the Survivable Radio Network (SURAN) project, which took place in the 1980s. A successor to these systems was fielded in the mid-1990s for the US Army, and later other nations, as the Near-term digital radio. Another third wave of academic and research activity started in the mid-1990s with the advent of inexpensive 802.11 radio cards for personal computers. Current wireless ad hoc networks are designed primarily for military utility. Problems with packet radios are: (1) bulky elements, (2) slow data rate, (3) unable to maintain links if mobility is high. The project did not proceed much further until the early 1990s when wireless ad hoc networks were born. Early work on MANET The growth of laptops and 802.11/Wi-Fi wireless networking have made MANETs a popular research topic since the mid-1990s. Many academic papers evaluate protocols and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other. Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale, etc. In the early 1990s, Charles Perkins from SUN Microsystems USA, and Chai Keong Toh from Cambridge University separately started to work on a different Internet, that of a wireless ad hoc network. Perkins was working on the dynamic addressing issues. Toh worked on a new routing protocol, which was known as ABR – associativity-based routing. Perkins eventually proposed DSDV – Destination Sequence Distance Vector routing, which was based on distributed distance vector routing. Toh's proposal was an on-demand based routing, i.e. routes are discovered on-the-fly in real-time as and when needed. ABR was submitted to IETF as RFCs. ABR was implemented successfully into Linux OS on Lucent WaveLAN 802.11a enabled laptops and a practical ad hoc mobile network was therefore proven to be possible in 1999. Another routing protocol known as AODV was subsequently introduced and later proven and implemented in 2005. In 2007, David Johnson and Dave Maltz proposed DSR – Dynamic Source Routing. Applications The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes can't be relied on and may improve the scalability of networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such networks have been identified. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural disasters or military conflicts. The presence of dynamic and adaptive routing protocols enables ad hoc networks to be formed quickly. Wireless ad hoc networks can be further classified by their applications: Mobile ad hoc networks (MANETs) A mobile ad hoc network (MANET) is a continuously self-configuring, self-organizing, infrastructure-less network of mobile devices connected without wires. It is sometimes known as "on-the-fly" networks or "spontaneous networks". Vehicular ad hoc networks (VANETs) VANETs are used for communication between vehicles and roadside equipment. Intelligent vehicular ad hoc networks (InVANETs) are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents. Vehicles are using radio waves to communicate with each other, creating communication networks instantly on-the-fly while vehicles move along roads. VANET needs to be secured with lightweight protocols. Smartphone ad hoc networks (SPANs) A SPAN leverages existing hardware (primarily Wi-Fi and Bluetooth) and software (protocols) in commercially available smartphones to create peer-to-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. SPANs differ from traditional hub and spoke networks, such as Wi-Fi Direct, in that they support multi-hop relays and there is no notion of a group leader so peers can join and leave at will without destroying the network. Most recently, Apple's iPhone with version 8.4 iOS and higher have been enabled with multi-peer ad hoc mesh networking capability, in iPhones, allowing millions of smart phones to create ad hoc networks without relying on cellular communications. It has been claimed that this is going to "change the world". Wireless mesh networks Mesh networks take their name from the topology of the resultant network. In a fully connected mesh, each node is connected to every other node, forming a "mesh". A partial mesh, by contrast, has a topology in which some nodes are not connected to others, although this term is seldom in use. Wireless ad hoc networks can take the form of a mesh networks or others. A wireless ad hoc network does not have fixed topology, and its connectivity among nodes is totally dependent on the behavior of the devices, their mobility patterns, distance with each other, etc. Hence, wireless mesh networks are a particular type of wireless ad hoc networks, with special emphasis on the resultant network topology. While some wireless mesh networks (particularly those within a home) have relatively infrequent mobility and thus infrequent link breaks, other more mobile mesh networks require frequent routing adjustments to account for lost links. Army tactical MANETs Military or tactical MANETs are used by military units with emphasis on data rate, real-time requirement, fast re-routing during mobility, data security, radio range, and integration with existing systems. Common radio waveforms include the US Army's JTRS SRW, Persistent System's WaveRelay and the Domo Tactical Communications (DTC) MeshUltra Tactical Waveform. Ad hoc mobile communications come in well to fulfill this need, especially its infrastructureless nature, fast deployment and operation. Military MANETs are used by military units with emphasis on rapid deployment, infrastructureless, all-wireless networks (no fixed radio towers), robustness (link breaks are no problem), security, range, and instant operation. Air Force UAV Ad hoc networks Flying ad hoc networks (FANETs) are composed of unmanned aerial vehicles, allowing great mobility and providing connectivity to remote areas. Unmanned aerial vehicle, is an aircraft with no pilot on board. UAVs can be remotely controlled (i.e., flown by a pilot at a ground control station) or can fly autonomously based on pre-programmed flight plans. Civilian usage of UAV include modeling 3D terrains, package delivery (Logistics), etc. UAVs have also been used by US Air Force for data collection and situation sensing, without risking the pilot in a foreign unfriendly environment. With wireless ad hoc network technology embedded into the UAVs, multiple UAVs can communicate with each other and work as a team, collaboratively to complete a task and mission. If a UAV is destroyed by an enemy, its data can be quickly offloaded wirelessly to other neighboring UAVs. The UAV ad hoc communication network is also sometimes referred to UAV instant sky network. More generally, aerial MANET in UAVs are now (as of 2021) successfully implemented and operational as mini tactical reconnaissance ISR UAVs like the BRAMOR C4EYE from Slovenia. Navy ad hoc networks Navy ships traditionally use satellite communications and other maritime radios to communicate with each other or with ground station back on land. However, such communications are restricted by delays and limited bandwidth. Wireless ad hoc networks enable ship-area-networks to be formed while at sea, enabling high speed wireless communications among ships, enhancing their sharing of imaging and multimedia data, and better co-ordination in battlefield operations. Some defense companies (such as Rockwell Collins and Rohde & Schwartz) have produced products that enhance ship-to-ship and ship-to-shore communications. Wireless sensor networks Sensors are useful devices that collect information related to a specific parameter, such as noise, temperature, humidity, pressure, etc. Sensors are increasingly connected via wireless to allow large scale collection of sensor data. With a large sample of sensor data, analytics processing can be used to make sense out of these data. The connectivity of wireless sensor networks rely on the principles behind wireless ad hoc networks, since sensors can now be deploy without any fixed radio towers, and they can now form networks on-the-fly. "Smart Dust" was one of the early projects done at U C Berkeley, where tiny radios were used to interconnect smart dust. More recently, mobile wireless sensor networks (MWSNs) have also become an area of academic interest. Ad hoc network of robots Robots are mechanical systems that drive automation and perform chores that would seem difficult for humans. Efforts have been made to co-ordinate and control a group of robots to undertake collaborative work to complete a task. Centralized control is often based on a "star" approach, where robots take turns to talk to the controller station. However, with wireless ad hoc networks, robots can form a communication network on-the-fly, i.e., robots can now "talk" to each other and collaborate in a distributed fashion. With a network of robots, the robots can communicate among themselves, share local information, and distributively decide how to resolve a task in the most effective and efficient way. Disaster rescue ad hoc network Another civilian use of wireless ad hoc network is public safety. At times of disasters (floods, storms, earthquakes, fires, etc.), a quick and instant wireless communication network is necessary. Especially at times of earthquakes when radio towers had collapsed or were destroyed, wireless ad hoc networks can be formed independently. Firemen and rescue workers can use ad hoc networks to communicate and rescue those injured. Commercial radios with such capability are available on the market. Hospital ad hoc network Wireless ad hoc networks allow sensors, videos, instruments, and other devices to be deployed and interconnected wirelessly for clinic and hospital patient monitoring, doctor and nurses alert notification, and also making senses of such data quickly at fusion points, so that lives can be saved. Data monitoring and mining MANETS can be used for facilitating the collection of sensor data for data mining for a variety of applications such as air pollution monitoring and different types of architectures can be used for such applications. A key characteristic of such applications is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms as well as more efficient routing strategies. Also, researchers have developed performance models for MANET to apply queueing theory. Adaptive video streaming in ad hoc networks The use of an adaptive strategy when transmitting video can help to reduce network congestion and packet loss. By using SVC, the video source is able to adjust bit rate according to available bandwidth. Challenges Several books and works have revealed the technical and research challenges facing wireless ad hoc networks or MANETs. The advantages for users, the technical difficulties in implementation, and the side effect on radio spectrum pollution can be briefly summarized below: Advantages for users The obvious appeal of MANETs is that the network is decentralised and nodes/devices are mobile, that is to say there is no fixed infrastructure which provides the possibility for numerous applications in different areas such as environmental monitoring [1], [2], disaster relief [3]–[5] and military communications [3]. Since the early 2000s interest in MANETs has greatly increased which, in part, is due to the fact mobility can improve network capacity, shown by Grossglauser and Tse along with the introduction of new technologies. One main advantage to a decentralised network is that they are typically more robust than centralised networks due to the multi-hop fashion in which information is relayed. For example, in the cellular network setting, a drop in coverage occurs if a base station stops working, however the chance of a single point of failure in a MANET is reduced significantly since the data can take multiple paths. Since the MANET architecture evolves with time it has the potential to resolve issues such as isolation/disconnection from the network. Further advantages of MANETS over networks with a fixed topology include flexibility (an ad hoc network can be created anywhere with mobile devices), scalability (you can easily add more nodes to the network) and lower administration costs (no need to build an infrastructure first). In summary: Highly performing network. No expensive infrastructure must be installed Quick distribution of information around sender No single point of failure. multi hop scalability Implementation difficulties With a time evolving network it is clear we should expect variations in network performance due to no fixed architecture (no fixed connections). Furthermore, since network topology determines interference and thus connectivity, the mobility pattern of devices within the network will impact on network performance, possibly resulting in data having to be resent a lot of times (increased delay) and finally allocation of network resources such as power remains unclear. Finally, finding a model that accurately represents human mobility whilst remaining mathematically tractable remains an open problem due to the large range of factors that influence it. Some typical models used include the random walk, random waypoint and levy flight models. In summary: All network entities may be mobile, so a very dynamic topology is needed. Network functions must have a high degree of adaptability. There are no central entities, so operations must be managed in a completely distributed manner. Battery constraints Side effects Use of unlicensed frequency spectrum, contributing to radio spectrum pollution. Radios and Modulation Wireless ad hoc networks can operate over different types of radios. All radios use modulation to move information over a certain bandwidth of radio frequencies. Given the need to move large amounts of information quickly over long distances, a MANET radio channel ideally has large bandwidth (e.g. amount of radio spectrum), lower frequencies, and higher power. Given the desire to communicate with many other nodes ideally simultaneously, many channels are needed. Given radio spectrum is shared and regulated, there is less bandwidth available at lower frequencies. Processing many radio channels requires many resources. Given the need for mobility, small size and lower power consumption are very important. Picking a MANET radio and modulation has many trade-offs; many start with the specific frequency and bandwidth they are allowed to use. Radios can be UHF (300 – 3000 MHz), SHF (3 – 30 GHz), and EHF (30 – 300 GHz). Wi-Fi ad hoc uses the unlicensed ISM 2.4 GHz radios. They can also be used on 5.8 GHz radios. The higher the frequency, such as those of 300 GHz, absorption of the signal will be more predominant. Army tactical radios usually employ a variety of UHF and SHF radios, including those of VHF to provide a variety of communication modes. At the 800, 900, 1200, 1800 MHz range, cellular radios are predominant. Some cellular radios use ad hoc communications to extend cellular range to areas and devices not reachable by the cellular base station. Next generation Wi-Fi known as 802.11ax provides low delay, high capacity (up to 10Gbit/s) and low packet loss rate, offering 12 streams – 8 streams at 5 GHz and 4 streams at 2.4 GHz. IEEE 802.11ax uses 8x8 MU-MIMO, OFDMA, and 80 MHz channels. Hence, 802.11ax has the ability to form high capacity Wi-Fi ad hoc networks. At 60 GHz, there is another form of Wi-Fi known as WiGi – wireless gigabit. This has the ability to offer up to 7Gbit/s throughput. Currently, WiGi is targeted to work with 5G cellular networks. Circa 2020, the general consensus finds the 'best' modulation for moving information over higher frequency waves to be Orthogonal frequency-division multiplexing, as used in 4G LTE, 5G, and Wi-Fi. Protocol stack The challenges affecting MANETs span from various layers of the OSI protocol stack. The media access layer (MAC) has to be improved to resolve collisions and hidden terminal problems. The network layer routing protocol has to be improved to resolve dynamically changing network topologies and broken routes. The transport layer protocol has to be improved to handle lost or broken connections. The session layer protocol has to deal with discovery of servers and services. A major limitation with mobile nodes is that they have high mobility, causing links to be frequently broken and reestablished. Moreover, the bandwidth of a wireless channel is also limited, and nodes operate on limited battery power, which will eventually be exhausted. These factors make the design of a mobile ad hoc network challenging. The cross-layer design deviates from the traditional network design approach in which each layer of the stack would be made to operate independently. The modified transmission power will help that node to dynamically vary its propagation range at the physical layer. This is because the propagation distance is always directly proportional to transmission power. This information is passed from the physical layer to the network layer so that it can take optimal decisions in routing protocols. A major advantage of this protocol is that it allows access of information between physical layer and top layers (MAC and network layer). Some elements of the software stack were developed to allow code updates in situ, i.e., with the nodes embedded in their physical environment and without needing to bring the nodes back into the lab facility. Such software updating relied on epidemic mode of dissemination of information and had to be done both efficiently (few network transmissions) and fast. Routing Routing in wireless ad hoc networks or MANETs generally falls into three categories, namely: (a) proactive routing, (b) reacting routing, and (c) hybrid routing. Proactive routing This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are: Respective amount of data for maintenance. Slow reaction on restructuring and failures. Example: Optimized Link State Routing Protocol (OLSR) Distance vector routing As in a fix net nodes maintain routing tables. Distance-vector protocols are based on calculating the direction and distance to any link in a network. "Direction" usually means the next hop address and the exit interface. "Distance" is a measure of the cost to reach a certain node. The least cost route between any two nodes is the route with minimum distance. Each node maintains a vector (table) of minimum distance to every node. The cost of reaching a destination is calculated using various route metrics. RIP uses the hop count of the destination whereas IGRP takes into account other information such as node delay and available bandwidth. Reactive routing This type of protocol finds a route based on user and traffic demand by flooding the network with Route Request or Discovery packets. The main disadvantages of such algorithms are: High latency time in route finding. Excessive flooding can lead to network clogging. However, clustering can be used to limit flooding. The latency incurred during route discovery is not significant compared to periodic route update exchanges by all nodes in the network. Example: Ad hoc On-Demand Distance Vector Routing (AODV) Flooding Is a simple routing algorithm in which every incoming packet is sent through every outgoing link except the one it arrived on. Flooding is used in bridging and in systems such as Usenet and peer-to-peer file sharing and as part of some routing protocols, including OSPF, DVMRP, and those used in wireless ad hoc networks. Hybrid routing This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are: Advantage depends on number of other nodes activated. Reaction to traffic demand depends on gradient of traffic volume. Example: Zone Routing Protocol (ZRP) Position-based routing Position-based routing methods use information on the exact locations of the nodes. This information is obtained for example via a GPS receiver. Based on the exact location the best path between source and destination nodes can be determined. Example: "Location-Aided Routing in mobile ad hoc networks" (LAR) Technical requirements for implementation An ad hoc network is made up of multiple "nodes" connected by "links." Links are influenced by the node's resources (e.g., transmitter power, computing power and memory) and behavioral properties (e.g., reliability), as well as link properties (e.g. length-of-link and signal loss, interference and noise). Since links can be connected or disconnected at any time, a functioning network must be able to cope with this dynamic restructuring, preferably in a way that is timely, efficient, reliable, robust, and scalable. The network must allow any two nodes to communicate by relaying the information via other nodes. A "path" is a series of links that connects two nodes. Various routing methods use one or two paths between any two nodes; flooding methods use all or most of the available paths. Medium-access control In most wireless ad hoc networks, the nodes compete for access to shared wireless medium, often resulting in collisions (interference). Collisions can be handled using centralized scheduling or distributed contention access protocols. Using cooperative wireless communications improves immunity to interference by having the destination node combine self-interference and other-node interference to improve decoding of the desired signals. Simulation One key problem in wireless ad hoc networks is foreseeing the variety of possible situations that can occur. As a result, modeling and simulation (M&S) using extensive parameter sweeping and what-if analysis becomes an extremely important paradigm for use in ad hoc networks. One solution is the use of simulation tools like OPNET, NetSim or ns2. A comparative study of various simulators for VANETs reveal that factors such as constrained road topology, multi-path fading and roadside obstacles, traffic flow models, trip models, varying vehicular speed and mobility, traffic lights, traffic congestion, drivers' behavior, etc., have to be taken into consideration in the simulation process to reflect realistic conditions. Emulation testbed In 2009, the U.S. Army Research Laboratory (ARL) and Naval Research Laboratory (NRL) developed a Mobile Ad-Hoc Network emulation testbed, where algorithms and applications were subjected to representative wireless network conditions. The testbed was based on a version of the "MANE" (Mobile Ad hoc Network Emulator) software originally developed by NRL. Mathematical models The traditional model is the random geometric graph. Early work included simulating ad hoc mobile networks on sparse and densely connected topologies. Nodes are firstly scattered in a constrained physical space randomly. Each node then has a predefined fixed cell size (radio range). A node is said to be connected to another node if this neighbor is within its radio range. Nodes are then moved (migrated away) based on a random model, using random walk or brownian motion. Different mobility and number of nodes present yield different route length and hence different number of multi-hops. These are graphs consisting of a set of nodes placed according to a point process in some usually bounded subset of the n-dimensional plane, mutually coupled according to a boolean probability mass function of their spatial separation (see e.g. unit disk graphs). The connections between nodes may have different weights to model the difference in channel attenuations. One can then study network observables (such as connectivity, centrality or the degree distribution) from a graph-theoretic perspective. One can further study network protocols and algorithms to improve network throughput and fairness. Security Most wireless ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets. To thwart or prevent such attacks, it was necessary to employ authentication mechanisms that ensure that only authorized nodes can inject traffic into the network. Even with authentication, these networks are vulnerable to packet dropping or delaying attacks, whereby an intermediate node drops the packet or delays it, rather than promptly sending it to the next hop. In a multicast and dynamic environment, establishing temporary 1:1 secure 'sessions' using PKI with every other node is not feasible (like is done with HTTPS, most VPNs, etc. at the transport layer). Instead, a common solution is to use pre-shared keys for symmetric, authenticated encryption at the link layer, for example MACsec using AES-256-GCM. With this method, every properly formatted packet received is authenticated then passed along for decryption or dropped. It also means the key(s) in each node must be changed more often and simultaneously (e.g. to avoid reusing an IV). Trust management Trust establishment and management in MANETs face challenges due to resource constraints and the complex interdependency of networks. Managing trust in a MANET needs to consider the interactions between the composite cognitive, social, information and communication networks, and take into account the resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions). Researchers of trust management in MANET suggested that such complex interactions require a composite trust metric that captures aspects of communications and social networks, and corresponding trust measurement, trust distribution, and trust management schemes. Continuous monitoring of every node within a MANET is necessary for trust and reliability but difficult because it by definition is dis-continuous, 2) it requires input from the node itself and 3) from its 'nearby' peers. See also Delay-tolerant networking Independent basic service set (IBSS) List of ad hoc routing protocols Mobile wireless sensor network Personal area network (PAN) Smart meter Wi-Fi Direct Wireless community network Wireless mesh network Wireless sensor networks References Further reading External links IETF MANET group Wireless networking
18841364
https://en.wikipedia.org/wiki/IP%20in%20IP
IP in IP
IP in IP is an IP tunneling protocol that encapsulates one IP packet in another IP packet. To encapsulate an IP packet in another IP packet, an outer header is added with Source IP, the entry point of the tunnel, and Destination IP, the exit point of the tunnel. While doing this, the inner packet is unmodified (except the TTL field, which is decremented). The Don't Fragment and the Type Of Service fields should be copied to the outer packet. If the packet size, including the outer header, is greater than the Path MTU, the encapsulator fragments the packet. The decapsulator will reassemble the packet. IP packet encapsulated in IP packet Outer IP header has the following fields: Version: 4 bitsThis field is the Protocol version number. It is always 4 as IP in IP is supported for IPv4 Header Length: 4 bits This field is the length of outer IP header Type of Service (TOS): 8 bits This field is copied from the inner IP header Total Length: 16 bits This field is the length of the encapsulated IP packet (including Outer IP Header, Inner IP Header, IP Payload) Identification: 16 bits This field is used to identify the fragments of a datagram which will be helpful while reassembling the datagram as the encapsulator might fragment the datagram. For the Outer IP Header, a new number is generated. Flags: 3 bits R: 1 bit This bit is reserved and should be 0. DF: 1 bit This field specifies whether the datagram can be fragmented or not. If this bit is set to 1 in the inner header, then the outer header also have this bit set to 1 saying that this datagram cannot be fragmented. If this bit is set to 0 in the inner header, then the outer header may set to 0/1. MF: 1 bit This field is required when the datagram is fragmented saying whether the datagram contains some more fragments. This field is not copied from inner header. Fragment Offset: 13 bits This field is used while reassembling the fragments. Time to live (TTL): 8 bits This field is used to track the lifetime of the datagram. The inner header TTL is decremented before encapsulation and is not changed in decapsulator. The outer header TTL is set to value such that the datagram is delivered to tunnel end point. Protocol: 8 bits This field indicates the protocol of the datagram following this header. The value is set to 4 for IP in IP. Header Checksum: 16 bits This field is the IP checksum of outer header. Source IP Address: 32 bits This field is the IP address of the encapsulator Destination IP Address: 32 bits This field is the IP address of the decapsulator Options: Variable length This field in general is NOT copied from the inner IP header. New options can be added. Padding. Variable length. This field is used to fill the datagram so that IP Payload starts on a 32 bit boundary. See also Internet Control Message Protocol 6in4 4in6 References RFC 1853 - IP in IP Tunneling RFC 2003 - IP Encapsulation within IP Internet Protocol Tunneling protocols
10502486
https://en.wikipedia.org/wiki/Internet%20police
Internet police
Internet police is a generic term for police and government agencies, departments and other organizations in charge of policing Internet in a number of countries. The major purposes of Internet police, depending on the state, are fighting cybercrime, as well as censorship and propaganda. Canada Several attempts have been made to introduce tools that would allow law enforcement and security agencies to eavesdrop online communications without a warrant, the latest of which was bill C-30, tabled in February 2012 which was abandoned because of strong public opposition. Estonia The Computer Emergency Response Team of Estonia (CERT Estonia), established in 2006, is an organization responsible for the management of security incidents in .ee computer networks. Its task is to assist Estonian Internet users in the implementation of preventive measures in order to reduce possible damage from security incidents and to help them in responding to security threats. CERT Estonia deals with security incidents that occur in Estonian networks, are started there, or have been notified of by citizens or institutions either in Estonia or abroad. India Cyber Crime Investigation Cell is a wing of Mumbai Police, India, to deal with computer crimes, and to enforce provisions of India's Information Technology Law, namely, The Information Technology Act, 2000, and various cyber crime related provisions of criminal laws, including the Indian Penal Code, and the Companies Act of India subsection on IT-Sector responsibilities of corporate measures to protect cybersecurity. Cyber Crime Investigation Cell is a part of Crime Branch, Criminal Investigation Department of the Mumbai Police. Andhra Pradesh Cyber Crime Investigation Cell is a wing of Hyderabad Police, India, to deal with Cyber crimes. Indian Computer Emergency Response Team (CERT-In) also deals with Cyber Security. "Cyber Police", the Hi-Tech Crime Enquire Cell of the Kerala Police. Netherlands Dutch police were reported to have set up an Internet Brigade to fight cybercrime. It will be allowed to infiltrate Internet newsgroups and discussion forums for intelligence gathering, to make pseudo-purchase and to provide services. People's Republic of China It has been reported that in 2005, departments of provincial and municipal governments in mainland China began creating teams of Internet commentators from propaganda and police departments and offering them classes in Marxism, propaganda techniques, and the Internet. They are reported to guide discussion on public bulletin boards away from politically sensitive topics by posting opinions anonymously or under false names. Chinese Internet police also erase anti-communist comments and posts pro-government messages. Chinese Communist Party leader Hu Jintao has declared the party's intent to strengthen administration of the online environment and maintain the initiative in online opinion. Thailand After the 2006 coup in Thailand, the Thai police has been active in monitoring and silencing dissidents online. Censorship of the Internet is carried out by the Ministry of Information and Communications Technology of Thailand and the Royal Thai Police, in collaboration with the Communications Authority of Thailand and the Telecommunication Authority of Thailand. On 29 April 2010, Wipas Raksakulthai was arrested on charges of lèse majesté following a post to his Facebook account criticizing King Bhumibol. In May 2011, Amnesty International named him a prisoner of conscience." United Kingdom The Internet Watch Foundation (IWF) is the only recognised organisation in the United Kingdom operating an Internet 'Hotline' for the public and IT professionals to report their exposure to potentially illegal content online. It works in partnership with the police, Government, the public, Internet service providers and the wider online industry. United States See also Internet surveillance Internet service provider Use of social network websites in investigations References External links Cybercrime.gov US Department of Justice CCIPS Cybercellmumbai.com Indian Cyber Crime Investigation Cell US CERT United States Computer Emergency Readiness Team (US-CERT) US Secret Service Computer Fraud On Guard OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. RCMP Computer Crime Prevention Royal Canadian Mounted Police CERT Estonia The Computer Emergency Response Team of Estonia Tallahassee Internet Police Computer security organizations Internet censorship
61959752
https://en.wikipedia.org/wiki/Netdata
Netdata
Netdata is an open source tool designed to collect real-time metrics, such as CPU usage, disk activity, bandwidth usage, website visits, etc., and then display them in live, easy-to-interpret charts. The tool is designed to visualize activity in the greatest possible detail, allowing the user to obtain an overview of what is happening and what has just happened in their system or application. Overview Netdata consists of a daemon that, when executed, is responsible for collecting and displaying information in real-time. It is a lightweight tool, mostly written in C, Python, and JavaScript, which uses minimal resources: about 2% on a single-CPU system. It can be run in any Linux system to monitor any system or application, and is capable of running on PCs, servers, and embedded Linux devices. Features Netdata is designed to be installed on a system without interrupting any of the applications running on it. It operates according to the memory requirements specified by the user, using only idle CPU cycles. Once the application begins, it will not perform disk I/O beyond logging. The tool saves to disk at the end of its execution and reloads at startup. By default it contains certain plugins that collect key system metrics, but its behavior is extensible by using its plugin API. Netdata can be run on virtually anything utilizing a Linux kernel and its graphics can be embedded into web pages. It has an interface with customizable themes and can be manually configured by the user, through simple HTML. There are no dependencies, as it operates as its own web server, with static web files. Starting with v1.12, Netdata collects anonymous usage information by default and sends it to Google Analytics, a feature which can be disabled via manual configuration. Operation When executing the daemon on Linux using the netdata command, threads are generated that collect information from each resource, using internal and/or external plugins. In turn, it keeps a record of the values collected in memory (without doing any Disk I/O). It operates as a stand-alone web server for its own static files, necessary for the representation of its dashboards. It provides a REST API so that the browser can access the information. Each installation of the application works autonomously. Although different running instances of the application can be saved to one dashboard, every Netdata instance is independent. Only the browser can connect all installations of different systems, unifying graphics from different sources as if they came from the same server. Development Netdata is currently maintained by nearly 400 contributors, all helping (at various levels) to serve the thousands of individual users and businesses who utilize this tool. The user with the most contributions is currently Costa Tsaousis, the CEO and Founder of Netdata, with over 600,000 additions to the code. The second most-active user is Ilya Mashchenko. The all-time most popular addition to Netdata appears to be adding support for data collection from Vnstat, a pull request by Noah Troy with nearly 200 individual comments (more than any other pull request). The all-time most popular feature request appears to be adding support for running multiple freeipmi jobs from the same Netdata. See also Comparison of dashboard software Comparison of network monitoring systems References External links Free and open-source software System monitors
44801986
https://en.wikipedia.org/wiki/Mr.%20Robot
Mr. Robot
Mr. Robot is an American drama thriller television series created by Sam Esmail for USA Network. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker with social anxiety disorder and clinical depression. Elliot is recruited by an insurrectionary anarchist known as "Mr. Robot", played by Christian Slater, to join a group of hacktivists called "fsociety". The group aims to destroy all debt records by encrypting the financial data of E Corp, the largest conglomerate in the world. The pilot premiered via online and video on demand services on May 27, 2015. The series stars an ensemble cast featuring Rami Malek, Carly Chaikin, Portia Doubleday, Martin Wallström, Christian Slater, Michael Cristofer, Stephanie Corneliussen, Grace Gummer, BD Wong, Bobby Cannavale, Ashlie Atkinson, and Elliot Villar. The first season debuted on USA Network on June 24, 2015, while the second season premiered on July 13, 2016, and the third season premiered on October 11, 2017. The fourth and final season premiered on October 6, 2019, and concluded on December 22, 2019. Mr. Robot has received critical acclaim, particularly for the performances of Malek and Slater, its story and visual presentation, and Mac Quayle's musical score. Esmail has received praise for his direction of the series, having directed three episodes in the first season before serving as the sole director for the remainder of the show. The show received numerous accolades, including two Golden Globe Awards, three Primetime Emmy Awards, and a Peabody Award. Premise The series follows Elliot Alderson, a young man living in New York City, who works at the cybersecurity company Allsafe as a cybersecurity engineer. Constantly struggling with social anxiety, dissociative identity disorder, clinical depression and drug abuse, Elliot's thought process seems heavily influenced by paranoia and delusion. He connects to people by hacking them, which often leads him to act as a cyber-vigilante. He is recruited by a mysterious insurrectionary anarchist known as Mr. Robot and joins his team of hacktivists known as fsociety. One of their missions is to cancel all consumer debt by encrypting all the data of one of the largest corporations in the world, E Corp (which Elliot perceives as Evil Corp), which also happens to be Allsafe's biggest client. Cast and characters Main Rami Malek as Elliot Alderson, a senior cybersecurity engineer at Allsafe Cybersecurity and a vigilante hacker. He has dissociative identity disorder and deals with other mental illnesses such as clinical depression and severe anxiety, which are partly responsible for his antisocial behavior and drug use. Elliot is portrayed as a child by Aidan Liebman (seasons 1–2), Alex Bento (season 3), and Evan Whitten (season 4). Carly Chaikin as Darlene Alderson, Elliot's younger sister, a malware coder and one of the fsociety hackers. Portia Doubleday as Angela Moss, Elliot's childhood friend and a fellow employee at Allsafe, later PR Manager for E Corp. Mabel Tyler portrays a young Angela. Martin Wallström as Tyrell Wellick, originally the ambitious Senior Vice President of Technology at E Corp and later part of fsociety. Christian Slater as Mr. Robot, an insurrectionary anarchist who recruits Elliot into an underground hacker group called fsociety; and Edward Alderson, Elliot's father. Michael Cristofer as Phillip Price, the CEO of E Corp (seasons 2–4; recurring season 1). Stephanie Corneliussen as Joanna Wellick, Tyrell's wife (seasons 2–3; recurring season 1). Grace Gummer as Dominique "Dom" DiPierro, an FBI field agent investigating the E Corp hack (seasons 2–4). BD Wong as Whiterose, a trans woman, cyber-terrorist and head of the Dark Army. Whiterose also operates as Zhi Zhang, China's Minister of State Security (seasons 3–4; recurring seasons 1–2). A younger Whiterose was portrayed by Ross Kurt Le (season 4). Bobby Cannavale as Irving, a used car salesman who is a Dark Army fixer (season 3; guest season 4). Elliot Villar as Fernando Vera, Shayla's drug supplier and Elliot's only supply of suboxone who has a unique dangerous philosophy and is obsessed with Shayla and later Elliot (season 4; recurring season 1; guest season 3). Ashlie Atkinson as Janice, a chatty taxidermist and Dark Army fixer with a peculiar sense of humor (season 4). Recurring Gloria Reuben as Krista Gordon, Elliot's psychiatrist. Michel Gill as Gideon Goddard, CEO of Allsafe Security (seasons 1–2; guest season 3). Ben Rappaport as Ollie Parker, Angela's boyfriend and an employee at Allsafe (season 1; guest seasons 2, 4). Aaron Takahashi as Lloyd Chong , Elliot's co-worker at Allsafe (season 1; guest seasons 2, 4). Frankie Shaw as Shayla Nico, Elliot's drug dealer and girlfriend (season 1). Ron Cephas Jones as Leslie Romero, a member of fsociety (season 1; guest season 2). Sunita Mani as Shama "Trenton" Biswas, a member of fsociety (seasons 1–3). Azhar Khan as Sunil "Mobley" Markesh, a member of fsociety and Bank of E employee (seasons 1–3). Bruce Altman as Terry Colby, the former CTO of E Corp who is framed by fsociety for a hack attack (season 1; guest seasons 2–3). Armand Schultz as Lenny Shannon, Krista's ex-lover, and one of Elliot's early hacking targets (season 1; guest seasons 2–3). Michael Drayer as Francis "Cisco" Shaw, Darlene's ex-boyfriend who was the U.S. liaison to the Chinese hacker group Dark Army (seasons 1–2; guest season 3). Brian Stokes Mitchell as Scott Knowles, the CTO of E Corp following Colby's arrest (seasons 1–2). Jeremy Holm as Donald "Mr. Sutherland" Hoffman, a fixer under Tyrell and Joanna Wellick (seasons 1–2; guest season 3). Sakina Jaffrey as Antara Nayar, Angela's lawyer (seasons 1–2; guest season 3). Don Sparks as Donald Moss, Angela's adopted father (season 1; guest season 2). Michele Hicks as Sharon Knowles, Scott's wife (season 1; guest season 2). Vaishnavi Sharma as Magda Alderson, Elliot's abusive mother (seasons 1–2, 4). Rick Gonzalez as Isaac Vera, Fernando Vera's brother (season 1). Nadia Gan as Elizabeth, Tyrell's assistant (season 1; guest season 4). Stephen Lin as Hamburger Man, Elliot's contact with the Dark Army (season 3; guest seasons 1–2, 4). Joey Badass as Leon, a new close friend of Elliot and an inmate obsessed with sitcoms, as well as an agent for the Dark Army responsible for Elliot's safety (seasons 2–4). Bernadette Quigley as a chaplain who hosts a prayer group attended by Elliot (season 2). Sandrine Holt as Susan Jacobs, an E Corp General Counsel, known as Madame Executioner (season 2). Anthony Jennings as Vincent, an fsociety member given orders by Darlene (season 2). Erik Jensen as Frank Cody, a conspiracy theorist and talk show host (seasons 2–3). Chris Conroy as Derek, Joanna's secret lover who works as a bartender and a DJ (season 2; guest season 3). Craig Robinson as Ray Heyworth, a prison warden who secretly runs a Tor routed website involving human trafficking, drugs and weapons (season 2). Michael Maize as "Lone Star" Lockwood, a Texas native and an off-balanced prison guard and associate of Ray (season 2). Omar Metwally as Ernesto Santiago, Dom's superior at the FBI who also works for the Dark Army to protect Tyrell Wellick (seasons 2–3). Grant Chang as Grant, Whiterose's assistant and lover (seasons 2–3). Luke Robertson as RT, Ray's former system admin (season 2). Rizwan Manji as Norm Gill, Dom's new partner working with her to investigate the 5/9 hack (season 3). Ramy Youssef as Samar Swailem, Elliot's co-worker at E Corp (season 3). Christine M. Campbell as Janet Robinson, a high-level manager at E Corp (season 3). Kathryn Danielle as Bobbi, the HR manager at E Corp (season 3). Josh Mostel as Bo, Elliot's landlord (season 3). Jing Xu as Wang Shu, Whiterose's assistant (season 4). Dominik García as Olivia Cortez, employee for Cyprus National Bank (season 4). Young M.A as Peanuts, Vera's loyal henchman (season 4). Production Conception and development Sam Esmail, the show's creator and showrunner, is the credited writer on the vast majority of the episodes. In an interview, Sam Esmail shared that he is fascinated by hacker culture and wanted to make a film about it for around 15 years. In the production, Esmail consulted experts to give a realistic picture of hacking activities. Another inspiration for Esmail, who is of Egyptian descent, was the Arab Spring, where young people who were angry at society used social media to bring about a change. He has said that Elliot is a "thinly-veiled version" of himself. Esmail had originally intended Mr. Robot to be a feature film, with the end of the first act being someone finding out that he had a mental disorder while enacting a greater scheme. However, midway through writing the first act, he found that the script had expanded considerably, and that it had become better-suited for a television show. He removed 20 of around 89 pages of the script then written, and used it as the pilot for the series, and what was to have been the end of the first act became the finale of the first season. Esmail took the script to film and television production company Anonymous Content to see if it could be developed into a television series, which was then picked up by USA Network. USA gave a pilot order to Mr. Robot in July 2014. After an exhaustive search to cast the lead role, it was announced in September 2014 that Rami Malek had been cast as Elliot; the remainder of the roles in the pilot were cast later in September and October. USA picked it up to series with a 10-episode order in December 2014. Production began in New York on April 13, 2015. The pilot premiered on multiple online and video on demand services on May 27, 2015, and the series was renewed for a second season before the first season premiered on USA on June 24, 2015. In December 2015, it was announced that Esmail would direct all episodes in the second season. In June 2016, it was announced that the second season's episode order was increased from 10 to 12 episodes. The 12-episode second season premiered on July 13, 2016. On August 16, 2016, USA renewed Mr. Robot for a third season to air in 2017. The third season debuted in October 2017 and consisted of 10 episodes. All episodes were directed by Esmail, just as in the second season. On December 13, 2017, USA renewed Mr. Robot for a fourth season. In August 2018, it was confirmed that the fourth season would be the final season. Originally, the show planned to dress Elliot in a worn sweatshirt and colorful backpack; however, Malek suggested a black backpack and wore his own B:Scott black hoodie to set. The outfit became the signature look for the character, and the costume designer ordered 20 more of them, despite the item having been discontinued years earlier. To portray the unusual, often confused worldview of lead character Elliot Alderson, Franklin Peterson, who edited three Mr. Robot episodes in the first season and six in the second season, used creative editing styles that included jump cuts, varied lengths of takes and shuffling scenes around within an episode and sometimes even between episodes. Esmail encouraged the experimentation as Peterson and his team explored the personality of each character in the editing suite, finding creative ways to tell their stories and maintain their humanity. Visual effects FuseFX was hired to provide the visual effects for episode "eps3.4_runtime-error.r00" of season 3, in which they took 40 shots and stitched them together to appear as one seamless shot for the entire episode. Technical accuracy Mr. Robot has been widely praised for its technical accuracy by numerous cybersecurity firms and services such as Avast, Panda Security, Avira, Kaspersky, ProtonMail, and bloggers who analyzed and dissected the technical aspects of the show after episodes containing hacking scenes. Aside from the pilot episode, Esmail hired Kor Adana (former network security analyst and forensics manager for Toyota Motor Sales), Michael Bazzell (security consultant and former FBI Cyber Crimes Task Force agent and investigator) and James Plouffe (lead solutions architect at MobileIron) as his advisors to oversee the technical accuracy of the show. By the second season, Adana assembled a team of hackers and cybersecurity experts including Jeff Moss (founder and director of Black Hat and DEF CON computer security conferences), Marc Rogers (principal security researcher for Cloudflare and head of security for DEF CON), Ryan Kazanciyan (chief security architect for Tanium) and Andre McGregor (director of security for Tanium and former FBI Cyber Special agent) to assist him with the authenticity of the hacks and the technology being used. Hacking scenes were performed by members of the technical team in real life, recorded and rebuilt using Flash animation. Animation process is carried out by animator Adam Brustein under the direct supervision of Adana himself. Kali Linux and its tools were used in multiple episodes. The show has also attempted to accurately represent Elliot's mental health issues. In an interview with Terry Gross for the radio show Fresh Air, Malek recounted contacting a psychologist to learn about schizophrenia, dissociative identity disorder, and social anxiety. When in meetings with Esmail, Malek's knowledge on the topics led Esmail to bring the psychologist on as a consultant for the show. Subsequently, the show has been widely praised by critics, viewers and psychiatrists as being one of the most accurate representations of mental health issues ever portrayed on TV or film, especially for its depictions of dissociative identity disorder, social anxiety, panic disorders and chronic depression. Malek and Chaikin's performances have been further singled out for their "raw and authentic depictions of mental illness [which] makes it more relatable to those who haven’t experienced it firsthand" while also representing a "kindred spirit" to viewers who do have mental health issues. Inverse described Mr. Robot as "setting a new standard for depictions of mental illness [in media] ... without ending up exploitative." Influences Sam Esmail has acknowledged several major influences on the show, such as American Psycho, Taxi Driver, A Clockwork Orange, and The Matrix. In particular, Esmail credited Fight Club as the inspiration for a main character who has dissociative identity disorder creating a new manifestation of his deceased father in the form of a hacker, as well as for the anti-consumerist, anti-establishment, and anti-capitalist spirit of its characters. Commentators have also noted the parallel in its plot on the erasing of consumer debt records to the film. Even so, Lauren Lawson for GQ remarked, "Mr. Robot elevates the Fight Club formula: the show's mindfuckery lubes us up to think about society (Elliot's and ours) in a discerning way, but it's not the main event. You can see Fight Club once and pretty much get the picture, but it will take years of scholarly binge-watching to answer the questions Mr. Robot raises." In an interview, Esmail explains how playing the song that David Fincher used to underscore the climax of Fight Club ("Where Is My Mind?") when Elliot initiates the hack in episode nine is intended as a message to the audience that he is aware of the inspiration they took from the film. The narration by the protagonist was influenced by Taxi Driver, and other influences mentioned included Risky Business for its music score, Blade Runner for the character development, and the television series Breaking Bad for the story arc. Filming locations The series was filmed in New York. Filming locations include Silvercup Studios and Coney Island, which serves as the exterior of the base of operations for the hacking group fsociety. As the production crew was unable to shut down Times Square for filming, the scenes at Times Square in the first-season finale were shot late at night just before July 4 holiday weekend to catch the area at its emptiest while other shots were done on sets. Production on the second season began on March 7, 2016, resuming filming in New York City. Aftershows In June 2016, USA Network announced Hacking Robot, a live aftershow hosted by Andy Greenwald to air during the second season. Hacking Robot debuted after the second-season premiere and aired again following the tenth episode. In addition, a weekly web-only aftershow titled Mr. Robot Digital After Show premiered on The Verge and USA Network's websites after the third episode, and continued through the third season. Reception Critical response Season 1 The first season of Mr. Robot received critical acclaim. On Rotten Tomatoes, it has a rating of 98%, based on 60 reviews, with an average rating of 8.36/10. The site's consensus reads, "Mr. Robot is a suspenseful cyber-thriller with timely stories and an intriguing, provocative premise." It set a record on Rotten Tomatoes as the only show to earn perfect episode scores for an entire season since the site began tracking television episodes. On Metacritic, the first season scored 79 out of 100, based on 24 critics, indicating "generally favorable reviews". Merrill Barr of Forbes gave it a very positive review, writing, "Mr. Robot has one of the best kick-offs to any series in a while" and that it "could be the series that finally, after years of ignorance, puts a deserving network among the likes of HBO, AMC and FX in terms of acclaim." In The New York Times, Alessandra Stanley noted that "Occupy Wall Street, the protest movement that erupted in 2011, didn't do much to curb the financial industry. It didn't die out, though. It went Hollywood", before finding Mr. Robot to be, "an intriguing new series ... a cyber-age thriller infused with a dark, almost nihilistic pessimism about the Internet, capitalism and income inequality. And that makes it kind of fun". The UK The Daily Telegraph reviewer Michael Hogan gave the show five stars, finding it to be "The Matrix meets Fight Club meets Robin Hood", noting that, "bafflingly, it took months for a UK broadcaster to snap up the rights". Although Hogan found too much attention was devoted to Elliot's social anxiety, he eventually decided that "this alienated anti-hero was a brilliant, boldly complex character." Overall, Hogan concluded that the show deserved to find an audience in the UK. Mr. Robot made several critics' list for the best TV shows of 2015. Three critics, Jeff Jensen of Entertainment Weekly, Rob Sheffield of Rolling Stone, and the staff of TV Guide, named it the best show of the year. The series was also placed second on the list from three other critics, and was named among the best of the year from four other critics. Season 2 The second season also received critical acclaim. On Rotten Tomatoes, it has a score of 89%, based on 39 reviews, with an average rating of 7.8/10. The site's consensus reads: "Unique storytelling, a darker tone, and challenging opportunities for its tight cast push Mr. Robot even further into uncharted television territory." On Metacritic, it has a score of 81 out of 100, based on 28 critics, indicating "universal acclaim". Sonia Saraiya of Variety praised Rami Malek's performance and wrote, "It's Malek's soulful eyes and silent pathos that give Mr. Robot its unexpected warmth, as the viewer is lured into Elliot's chaos and confusion." Tim Goodman of The Hollywood Reporter lauded Sam Esmail's direction, writing "Esmail's camerawork—characters tucked into corners of the frame, among other nontraditional compositions—continues to give the sense of disorientation and never feels tired" and "there are some flourishes in the first two hours that are brilliantly conceived and [...] contribute to what is one of the most visually remarkable hours on television." Season 3 The third season also received critical acclaim. On Rotten Tomatoes, it has a score of 92%, based on 20 reviews, with an average rating of 8.26/10. The site's critical consensus reads, "Mr. Robots striking visuals and bold narrative fuel its seductive blend of reality and fantasy." On Metacritic, it has a score of 82 out of 100, based on 9 critics, indicating "universal acclaim". Based on six episodes for review, Darren Franich of Entertainment Weekly gave it an "A" grade, calling it a "noir masterpiece", and overall, wrote that "Season 3 of Mr. Robot is a masterpiece, ballasting the global ambitions of season 2 while sharpening back to the meticulous build of season 1." Season 4 As with previous seasons, the fourth and final season has been met with near-universal acclaim. On Rotten Tomatoes, it has a score of 97% with an average rating of 8.92/10, based on 19 reviews. The site's critical consensus reads, "Mr. Robot returns with a thrilling final season that is sure to surprise and satisfy its audience." On Metacritic, it has a score of 81 out of 100, based on 5 critics, indicating "universal acclaim". The episode "407 Proxy Authentication Required" specifically gained exceptional acclaim by Decider, who called it "among the best individual TV episodes of 2019, and possibly one of the best of all time." Variety listed it as the 22nd best show of the 2010s, and Emily VanDerWerff of Vox named it among "shows that help explain the decade". Emma Garland of Vice described the show as defining the 2010s and post-Occupy world as one of vast inequality: "Even if you don't buy into its earnestness, you can't argue with its bittersweet irony." Ratings Awards and nominations Critics' top ten lists In other media Mr. Robot has spawned a variety of video games. Its mobile game, titled: Mr. Robot:1.51exfiltrati0n.apk is set during the first season of the series and was published by Telltale Games. Users play as a fictional character who has stumbled upon the phone of an important member of fsociety and it is up to the player to assist them in bringing down E Corp. The Mr. Robot Virtual Reality Experience, written and directed by Sam Esmail, is a 13-minute video viewable using virtual reality headsets that explores Elliot's past. Mr. Robot also features several Easter eggs, including websites related to the show or IP addresses used within the series that redirect to real websites. A book tie-in, Mr. Robot: Red Wheelbarrow (eps1.91_redwheelbarr0w.txt) written by Esmail and Courtney Looney, was released on November 1, 2016. Release Broadcast Mr. Robot premiered in the United States on USA Network on June 24, 2015, and in Canada on Showcase on September 4, 2015. Amazon.com secured international broadcasting rights in the United Kingdom, with the first season added on Amazon Prime on October 16, 2015, and second-season episodes to be released immediately after initial broadcast in the United States. In Australia, the series premiered on Presto on August 14, 2015. After Presto shut down, the series moved to Fox Showcase for its third season and to Foxtel On Demand for the fourth season. The show aired in the Republic of Ireland on TG4. Home media Universal Pictures Home Entertainment released all four seasons on DVD and Blu-ray. The first season was released on January 12, 2016. It contains all 10 episodes, plus deleted scenes, gag reel, making-of featurette, and UltraViolet digital copies of the episodes. The second season was released on January 10, 2017. The third season was released on March 27, 2018 in the United States. The fourth season as well as a complete series collection was released on March 31, 2020. In September 2015, Amazon.com acquired exclusive streaming VOD rights to Mr. Robot in several countries. The first season became available to stream in June 2016 for U.S. Amazon Prime subscribers. References External links 2010s American LGBT-related drama television series 2010s American drama television series 2015 American television series debuts 2019 American television series endings American prison television series American thriller television series Best Drama Series Golden Globe winners Cybernetted society in fiction Cyberpunk television series Dissociative identity disorder in television English-language television shows Fiction with unreliable narrators Malware in fiction Television about mental health Peabody Award-winning television programs Postcyberpunk Primetime Emmy Award-winning television series Serial drama television series Surrealist television series Techno-thrillers Television series about computing Television series by Anonymous Content Television series by Universal Content Productions Television series set in 2015 Television shows about drugs Television shows featuring audio description Television shows filmed in New York (state) Television shows set in New York City Transgender-related television shows USA Network original programming Vigilante television series Works about computer hacking
64275988
https://en.wikipedia.org/wiki/Fresh%20Kill
Fresh Kill
Fresh Kill is a 1994 experimental film directed by Shu Lea Cheang and written by Jessica Hagedorn. It stars Sarita Choudhury and Erin McMurtry as Shareen Lightfoot and Claire Mayakovsky, two lesbian parents who are drawn into a corporate conspiracy involving the Fresh Kills Landfill. Fresh Kill was an official selection at the 1994 Berlin International Film Festival and the Toronto International Film Festival and is noted for its influence on hacker subculture, with an article about the film for the now-defunct hacker publication InfoNation containing one of the first uses of the term "hacktivism". Synopsis Shareen Lightfoot and Claire Mayakovsky raise their daughter Honey near the Fresh Kills Landfill on Staten Island in New York City. Shareen works as a salvager recovering refuse from the landfill, while Claire works as a waitress at a sushi restaurant. The city is heavily contaminated with pollution that adversely affects local animals and food; Claire brings home contaminated fish from the restaurant that is eaten by Honey, who begins glowing green and then vanishes. Shareen and Claire discover that the multinational GX Corporation is responsible for the pollution and Honey's disappearance, and become involved in an effort to hack and expose the company with sushi chef and hacker Jiannbin Lui, and poet and dishwasher Miguel Flores. Cast Sarita Choudhury as Shareen Lightfoot Erin McMurtry as Claire Mayakovsky Abraham Lim as Jiannbin Lui José Zúñiga as Miguel Flores Laurie Carlos as Mimi Mayakovsky Will Kempe as Stuart Sterling Nelini Stamp as Honey Rino Thunder as Clayton Lightfoot Production Fresh Kill was directed by Shu Lea Cheang and written by Jessica Hagedorn. The film bills itself as "eco cyber noia", the term "cyber noia" (or "cybernoia") having been coined by Cheang to describe "massive intrusions of networking technology into people's lives," and what she foresaw as "a future where multinational media empires clash with hackers." Cheang has stated that the film was motivated by a desire to depict the relationship between the media and environmental racism, drawing parallels between the dumping of industrial toxic waste in the Third World with "the dumping of garbage TV programs" into Third World countries. Hagedorn has stated that she wished to invert typical expectations and cliché stock characters, though sought not to "reverse things for their own sake," noting that Honey's parentage and the differing races of characters with direct biological relations are specifically never explained. Release The film premiered on April 23, 1994 at the USA Film Festival, and was an official selection at the 1994 Berlin International Film Festival and at the Toronto International Film Festival. It was released theatrically in the United States on January 12, 1996. Fresh Kill also screened at the Whitney Biennial in 1995, and at the Asian American International Film Festival in 2019. Critical response and legacy In a review for The Los Angeles Times, critic Kevin Thomas offered praise for Cheang's direction and Hagedorn's writing, noting that the film's "interaction of a deteriorating environment, burgeoning cyberspace and mounting urban paranoia [...] create a vividly contemporary background" for a "gentle lesbian love story." The Quad Cinema, where the film had its U.S. premiere, called Fresh Kill "an underseen radical feminist gem" and favorably compared it to Brazil and Born in Flames. Conversely, Janet Maslin of The New York Times offered praise for the film's soundtrack but described Fresh Kill as "aimless, arty self-indulgence carried to a remarkable extreme," while Nathan Rabin of The A.V. Club surmised that the film was "too confused and disjointed to be anything but a well-intentioned, intermittently interesting failure." The film is noted for its themes of solidarity by marginalized groups against racism and sexism; its condemnation of transnational capitalism; and its depiction of how "resistance circulates through networks originally designed to facilitate the exchange of labor, commodities, and capital." In her analysis of Fresh Kill, Gina Marchetti notes how the film depicts "the emancipatory potential of the digital," offering "hope for seizing the means of communication by reflecting on its own production and providing an image of radical media empowerment to inspire others." The film is noted for its influence on hacker subculture, with a 1995 article about the film for the now-defunct hacker publication InfoNation containing one of the first uses of the term "hacktivism". References External links 1994 films 1994 drama films 1994 independent films 1994 LGBT-related films American drama films 1990s science fiction drama films American films American independent films American LGBT-related films English-language films Lesbian-related films Works about computer hacking Films set in New York City Film4 Productions films American avant-garde and experimental films American feminist films Hacker culture
1979375
https://en.wikipedia.org/wiki/JMP%20%28statistical%20software%29
JMP (statistical software)
JMP (pronounced "jump") is a suite of computer programs for statistical analysis developed by the JMP business unit of SAS Institute. It was launched in 1989 to take advantage of the graphical user interface introduced by the Macintosh operating systems. It has since been significantly rewritten and made available also for the Windows operating system. JMP is used in applications such as Six Sigma, quality control, and engineering, design of experiments, as well as for research in science, engineering, and social sciences. The software can be purchased in any of five configurations: JMP, JMP Pro, JMP Clinical, JMP Genomics and JMP Live. It formerly included the Graph Builder iPad App. JMP can be automated with its proprietary scripting language, JSL. The software is focused on exploratory visual analytics, where users investigate and explore data. These explorations can also be verified by hypothesis testing, data mining, or other analytic methods. In addition, discoveries made through graphical exploration can lead to a designed experiment that can be both designed and analyzed with JMP. History JMP was developed in the mid- to late-1980s by John Sall and a team of developers to make use of the graphical user interface introduced by the Apple Macintosh. It originally stood for "John's Macintosh Project" and was first released in October 1989. It was used mostly by scientists and engineers for design of experiments (DOE), quality and productivity support (Six Sigma), and reliability modeling. Semiconductor manufacturers were also among JMP's early adopters. Interactive graphics and other features were added in 1991 with version 2.0. Version 2 was twice the size as the original, though it was still delivered on a floppy disk. It required 2 MB of memory and came with 700 pages of documentation. Support for Microsoft Windows was added with version 3.1 in 1994. Rewritten with Version 4 and released in 2002, JMP could import data from a wider variety of data sources and added support for surface plots. Version 4 also added time series forecasting and new smoothing models, such as the seasonal smoothing method, called Winter's Method, and ARIMA (Autoregressive Integrated Moving Average). It was also the first version to support JSL, JMP Scripting Language. In 2005, data mining tools like a decision tree and neural net were added with version 5 as well as Linux support, which was later withdrawn in JMP 9. Later in 2005, JMP 6 was introduced. JMP began integrating with SAS in version 7.0 in 2007 and has strengthened this integration ever since. Users can write SAS code in JMP, connect to SAS servers, and retrieve and use data from SAS. Support for bubble plots was added in version 7. JMP 7 also improved data visualization and diagnostics. JMP 8 was released in 2009 with new drag-and-drop features and a 64-bit version to take advantage of advances in the Mac operating system. It also added a new user interface for building graphs, tools for choice experiments and support for Life Distributions. According to Scientific Computing, the software had improvements in "graphics, QA, ease-of-use, SAS integration and data management areas." JMP 9 in 2010 added a new interface for using the R programming language from JMP and an add-in for Excel. The main screen was rebuilt and enhancements were made to simulations, graphics and a new Degradation platform. In March 2012, version 10 made improvements in data mining, predictive analytics, and automated model building. Version 11 was released in late 2014. It included new ease-of-use features, an Excel import wizard, and advanced features for design of experiments. Two years later, version 12.0 was introduced. According to Scientific Computing, it added a new "Modeling Utilities" submenu of tools, performance improvements and new technical features for statistical analysis. Version 13.0 was released in September 2016 and introduced various improvements to reporting, ease-of-use and its handling of large data sets in memory. JMP released new structural equation modeling software in the 2020s in version 15.2. In March 2021, JMP introduced version 16 of JMP software, which improved structural equation modeling and added features to help determine the best model to use for the data being analyzed. Software JMP consists of JMP, JMP Pro, JMP Clinical and JMP Genomics, and JMP Live. It formerly included the Graph Builder iPad App. JMP Clinical and JMP Genomics combine JMP with SAS software. JMP software is partly focused on exploratory data analysis and visualization. It is designed for users to investigate data to learn something unexpected, as opposed to confirming a hypothesis. JMP links statistical data to graphics representing them, so users can drill down or up to explore the data and various visual representations of it. Its primary applications are for designed experiments and analyzing statistical data from industrial processes. JMP can be used in conjunction with the R and Python open source programming languages to access features not available in JMP itself. JMP is a desktop application with a wizard-based user interface, while SAS can be installed on servers. It runs in-memory, instead of on disk storage. According to a review in Pharmaceutical Statistics, JMP is often used as a graphical front-end for a SAS system, which performs the statistical analysis and tabulations. JMP Genomics, used for analyzing and visualizing genomics data, requires a SAS component to operate and can access SAS/Genetics and SAS/STAT procedures or invoke SAS macros. JMP Clinical, used for analyzing clinical trial data, can package SAS code within the JSL scripting language and convert SAS code to JMP. JMP is also the name of the SAS Institute business unit that develops JMP. As of 2011 it had 180 employees and 250,000 users. JMP Scripting Language (JSL) The JMP Scripting Language (JSL) is an interpreted language for recreating analytic results and for automating or extending the functionality of JMP software. JSL was first introduced in JMP version 4 in 2000. JSL has a LISP-like syntax, structured as a series of expressions. All programming elements, including if-then statements and loops, are implemented as JSL functions. Data tables, display elements and analyses are represented by objects in JSL that are manipulated with named messages. Users may write JSL scripts to perform analyses and visualizations not available in the point-and-click interface or to automate a series of commands, such as weekly reports. SAS, Python, R, and Matlab code can also be executed using JSL. Notable applications In 2007, a wildlife monitoring organization, WildTrack, started using JMP with the Footprint Identification Technology (FIT) system to identify individual endangered animals by their footprints. In 2009, the Chicago Botanic Garden used JMP to analyze DNA data from tropical breadfruit. Researchers determined that the seedless, starchy fruit was created by the deliberate hybridization of two fruits, the breadnut and the dugdug. The Herzenberg Laboratory at Stanford has integrated JMP with the Fluorescence Activated Cell Sorter (FACS). The FACS system is used to study HIV, cancer, stem-cells and oceanography. See also Comparison of statistical packages Data mining Data processing Online analytical processing (OLAP) SAS (software) SQL References Further reading External links JMP website JMP Blog sasCommunity.org customer Wiki community JMP MediaWiki Data visualization software Data analysis software Time series software Numerical analysis software for MacOS Data-centric programming languages High-level programming languages
1096826
https://en.wikipedia.org/wiki/Berkeley%20Software%20Design
Berkeley Software Design
Berkeley Software Design Inc. (BSDI or, later, BSDi) was a corporation which developed, sold licenses for, and supported BSD/OS (originally known as BSD/386), a commercial and partially proprietary variant of the BSD Unix operating system for PC compatible (and later, other) computer systems. The name was chosen for its similarity to "Berkeley Software Distribution" the source of its primary product (specifically 4.3BSD Networking Release 2). BSDI was founded by Rick Adams and members of the Computer Systems Research Group (CSRG) at the University of California, Berkeley, including Keith Bostic, Kirk McKusick, Mike Karels, Bill Jolitz and Donn Seeley. Jolitz, Seeley and Trent Hein were working for Rick Adam's UUNET at the time and became BSDI's first employees when the company began operations in 1991. In December 1991, USENIX Secretary and Former Head of Software at Convex Computer, Rob Kolstad from University of Illinois, was hired and would take over company operations just two years later. BSD/386 was released in January 1992. The full system, including source code retailed at $995, which was more affordable than the equivalent source code license for the rival UNIX System V from AT&T (which cost more than $20,000 in the late 1980s.) Under Rob Kolstad's direction, the company decided to pursue internet infrastructure as their primary customer audience. In the mid 1990s the top-10 websites in the world were almost all using BSD/386 as their BSD source codebase. USL v. BSDi lawsuit In late 1991, AT&T's Unix System Laboratories (USL) brought a lawsuit against BSDI, alleging that BSD/386 contained their proprietary trade secrets and source code. When USL were acquired by Novell, a settlement was reached in January 1994. BSDI agreed to base future releases of the product, now called BSD/OS, on the CSRG's 4.4BSD-Lite release which was declared free of any USL intellectual property. Rob Kolstad (of the University of Illinois and Convex Computer Corporation) was president of BSDI during this period and headed the company until the close of the decade. Mergers and sale In 1999, the BSDI employees sought an initial public offering and installed a new president to reach this goal as soon as possible given the recent success of the Red Hat IPO in the Linux market. Unfortunately, this strategy was not successful and soon after Rob Kolstad had exited the company, it was facing bankruptcy. In 2000 the company merged with Walnut Creek CDROM, a distributor of freeware and open source software on CD-ROM and shortly after that acquired Telenet System Solutions, Inc., an Internet infrastructure server supplier. In 2001, under severe financial pressure from excessive leverage, BSDI (known as BSDi by that time) sold its software business unit (comprising BSD/OS and the former Walnut Creek FreeBSD and Slackware Linux open source offerings) to Wind River Systems and renamed the remainder iXsystems with a renewed focus on server hardware. Wind River dropped sponsorship of Slackware soon afterwards. and the FreeBSD unit was divested as a separate entity FreeBSD Mall, Inc. in 2002. Faced with competition from open-source BSD- and Linux-based operating systems, Wind River discontinued BSD/OS in December 2003. Many of its technologies live on in community-led BSD derivatives like FreeBSD. iXsystems In 2002, OffMyServer acquired the iXsystems hardware business and reverted to the iXsystems name in 2005. References See also BSD FreeBSD Wind River Systems iXsystems Software companies established in 1991 Software companies disestablished in 2002 American companies established in 1991 American companies disestablished in 2002 Defunct software companies of the United States Berkeley Software Distribution
26423028
https://en.wikipedia.org/wiki/North%20Carolina%20High%20School%20Athletic%20Association
North Carolina High School Athletic Association
The North Carolina High School Athletic Association (NCHSAA) is the governing organization of high school athletics in North Carolina, United States. The association maintains the official rule books and governs the officiating standards across the state. The NCHSAA organizes member schools into conferences and oversees the state championships for each of the sanctioned sports. The NCHSAA headquarters is located at 222 Finley Golf Course Road, in Chapel Hill, North Carolina. The mailing address for the NCHSAA is PO Box 3216, Chapel Hill, North Carolina 27515. History The NCHSAA was founded in 1913 by Dr. Louis Round Wilson, a professor at the University of North Carolina at Chapel Hill. The university served as the primary source of funding and leadership for the Association from 1913 through 1947, before the organization adopted its current model, which provides school administrators with direct influence through the presence of the NCHSAA Board of Directors. The NCHSAA remained affiliated with UNC until 2010, when it became an independent organization. The first state playoffs were held in the NCHSAA's inaugural year of 1913, in both football and track. Baseball (1914), basketball (1915), and tennis (1916) were added over the next three athletic seasons. The organization has sanctioned a variety of different sports throughout its history, including: soccer (1927), wrestling (1931), golf (1937), swimming (1950), cross country (1956), softball (1975), volleyball (1976), indoor track (1987), and lacrosse (2010). Women's sports were first sanctioned in 1968, with women's golf being the first sport having an NCHSAA championship. Classifications The high schools within the state have been organized (since 1929) into classifications based by the size of the student population. Prior to 1929 all schools played in a single "open" format and postseason play was decided within "east" and "west" regions by meetings of school administrators. The east versus west postseason approach continues to this day. In 1929 the NCHSAA first split schools into "Class A" and "Class B," generally by school size. In December of 1929, in the Piedmont and western foothills region of the state, 16 charter member high schools formed the Western North Carolina High School Activities Association (WNCHSAA). This association grew to as many as 42 high schools and four different conferences. The WNCHSAA schools merged into the NCHSAA in 1977. The NCHSAA, due to segregation, also did not include African American high schools. These historically black high schools competed in the North Carolina High School Athletics Conference (NCHSAC) and would start to merge into the NCHSAA in 1967. Several other changes occurred to NCHSAA classifications between 1929 and 1958, which eventually went to three classifications. In 1959 due to significant growth and consolidation of North Carolina high schools, member schools were split into four classifications, identified by 1A, 2A, 3A, & 4A. The states 4A class is made up of the largest high schools, and 1A the smallest. These four classes have remained as the different classification sizes of North Carolina high schools to the current day. Prior to 1993, a set minimum enrollment number delineated each school's classification. In 1993, schools were split so that approximately 25% of the schools were in each of the four classifications. A new approach was instituted in 2017, known as the 20-30-30-20 model, with the largest 20% in the 4A classification and the smallest 20% in the 1A classification. The middle 60% was split between 2A and 3A. This model received considerable criticism for the unbalanced classes, and the NCHSAA moved back to the 25-25-25-25 model in 2021. The classifications and conferences of each school are assessed every four years based on updated student population numbers. All NCHSAA sanctioned sports have a separate state championship competition and title for each of the 1A, 2A, 3A and 4A classifications. The only exceptions are sports in which the 1A and 2A classifications are combined (in some instances 1A, 2A, and 3A have been combined). In football, starting in 2002, each classification was separated into a single "A" and double "AA" classification, with the double "AA" classification being made up of larger schools than the single "A". Classes were 1A, 1AA, 2A, 2AA, 3A, 3AA, 4A and 4AA for football only. This single "A" and double "AA" format lasted until the fall of 2021, when the NCHSAA went back to football being only 1A, 2A, 3A, and 4A class sizes. There are a number of different high school conferences throughout the state for local play. Many conferences are grouped with high schools all being in the same classification, with some conferences consisting of schools from two different classifications. Sports The NCHSAA sanctions the following sports: Baseball, Basketball, Cross Country, Football, Golf, Track and Field, Lacrosse, Soccer, Softball, Swimming, Tennis, Cheerleading, Volleyball, and Wrestling. Many North Carolina schools, particularly in larger metropolitan areas, have programs in field hockey and gymnastics, but these sports are currently not sanctioned by the NCHSAA. Conferences These are the conference alignments starting with the 2021–2022 school year. With minor adjustments to accommodate new schools, these alignments will remain through the 2024–2025 school year. 4A CAP 6 All schools located in Raleigh, North Carolina Athens Drive High School, "Jaguars" Needham B. Broughton High School, "Capitals" Cardinal Gibbons High School, "Crusaders" William G. Enloe High School, "Eagles" Leesville Road High School, "Pride" Jesse O. Sanderson High School, "Spartans" Central Piedmont Schools located in Davie and Forsyth counties Davie County High School, "War Eagles" East Forsyth High School, "Eagles" Robert B. Glenn High School, "Bobcats" Mount Tabor High School, "Spartans" Parkland Magnet High School, "Mustangs" Ronald W. Reagan High School, "Raiders" Richard J. Reynolds High School, "Demons" West Forsyth High School, "Titans" DAC-VII Schools located in Durham, Orange, and Alamance Counties Chapel Hill High School, "Tigers" East Chapel Hill High School, "Wildcats" Hillside High School, "Hornets" Charles E. Jordan High School, "Falcons" Northern High School, "Knights" (men), "Ladies" (women) Riverside High School (Durham), "Pirates" Southern Alamance High School, "Patriots" Greater Neuse River Schools located southern Wake County and northern Johnston County Corinth Holders High School, "Pirates" Clayton High School, "Comets" Cleveland High School, "Rams" Fuquay-Varina High School, "Bengals" Garner Magnet High School, "Trojans" South Garner High School, "Titans" Southeast Raleigh High School, "Bulldogs" Willow Spring High School, "Storm" Greater Metro Schools located along the I-85 corridor north of Charlotte A. L. Brown High School, "Wonders" Cox Mill High School, "Chargers" Hickory Ridge High School, "Ragin' Bulls" Lake Norman High School, "Wildcats" Mooresville High School, "Blue Devils" South Iredell High School, "Vikings" West Cabarrus High School, "Wolverines" Metro Schools located in Guilford County Grimsley High School, "Whirlies" Northern Guilford High School, "Nighthawks" Northwest Guilford High School, "Vikings" Walter Hines Page Senior High School, "Pirates" Ragsdale High School, "Flying Tigers" Southeast Guilford High School, "Falcons" Southwest Guilford High School, "Cowboys" (men), "Cowgirls" (women) Western Guilford High School, "Hornets" Northern Athletic Schools located in northern Wake County Heritage High School, "Huskies" Knightdale High School, "Knights" Millbrook High School, "Wildcats" Rolesville High School, "Rams" Wake Forest High School, "Cougars" Wakefield High School, "Wolverines" South Meck Schools located in Mecklenburg County Ardrey Kell High School, "Knights" Phillip O. Berry Academy of Technology, "Cardinals" Harding University High School, "Rams" Myers Park High School, "Mustangs" Olympic High School, "Trojans" South Mecklenburg High School, "Sabres" Southern Carolina Schools located in Union County Cuthbertson High School, "Cavaliers" Marvin Ridge High School, "Mavericks" Piedmont High School, "Panthers" Porter Ridge High School, "Pirate" Sun Valley High School, "Spartans" Weddington High School, "Warriors" Southwest Wake Schools located in southwestern Wake County Apex High School, "Cougars" Apex Friendship High School, "Patriots" Cary High School, "Imps" Green Hope High School, "Falcons" Green Level High School, "Gators" Holly Springs High School, "Golden Hawks" Middle Creek High School, "Mustangs" Panther Creek High School, "Catamounts" Southwestern Schools located in Mecklenburg and Union counties David W. Butler High School, "Bulldogs" Charlotte Catholic High School, "Cougars" East Mecklenburg High School, "Eagles" Garinger High School, "Wildcats" Independence High School, "Patriots" Providence High School, "Panthers" Rocky River High School, "Ravens" 3A–4A All American Conference Schools are located in Cumberland and Harnett County Areas Overhills High School (4A), "Jaguars" Pine Forest High School (4A), "Trojans" E. E. Smith High School (3A), "Golden Bulls" Harnett Central High School (3A), "Trojans" Terry Sanford High School (3A), "Bulldogs" Triton High School (3A), "Hawks" Western Harnett High School (3A), "Eagles" Westover High School (3A), "Wolverines" Big East Schools located in the central-eastern portion of the state. D. H. Conley High School (4A), "Vikings" New Bern High School (4A), "Bears" Havelock High School (3A), "Rams" Jacksonville High School (4A), "Cardinals" Northside High School (Jacksonville) (3A), "Monarchs" Junius H. Rose High School (3A), "Rampants" South Central High School (3A), "Falcons" Mideastern Schools are located in the southeastern corner of the state. Eugene Ashley High School (4A), "Screaming Eagles" John T. Hoggard High School (4A), "Vikings" Emsley A. Laney High School (4A), "Buccaneers" New Hanover High School (4A), "Wildcats" Topsail High School (4A), "Pirates" North Brunswick High School (3A), "Scorpions" South Brunswick High School (3A), "Cougars" West Brunswick High School (3A), "Trojans" Mountain Schools located in Asheville and surrounding communities A. C. Reynolds High School (4A), "Rockets" Asheville High School (4A), "Cougars" McDowell High School (4A), "Titans" T. C. Roberson High School (4A), "Rams" Enka High School (3A), "Jets" Clyde A. Erwin High School (3A), "Warriors" North Buncombe High School (3A), "Black Hawks" Northwestern Schools are located in the foothills and high country areas of northwestern part of state. Alexander Central High School (4A), "Cougars" South Caldwell High School (4A), "Spartans" Watauga High School (4A), "Pioneers" Ashe County High School (3A), "Huskies" Freedom High School (3A), "Patriots" Hibriten High School (3A), "Panthers" Queen City Schools located in Charlotte Hopewell High School, "Titans" (4A) William A. Hough High School, "Huskies" (4A) Mallard Creek High School, "Mavericks" (4A) North Mecklenburg High School, "Vikings" (4A) Julius L. Chambers High School, "Cougars" (4A) West Charlotte High School, "Lions" (3A) West Mecklenburg High School, "Hawks" (3A) Sandhills Schools located in the Sandhills region of the state Hoke County High School (4A), "Bucks" Pinecrest High School (4A), "Patriots" Richmond Senior High School (4A), "Raiders" Lee County High School (3A), "Yellow Jackets" Scotland High School (3A), "Scots" Southern Lee High School (3A), "Cavaliers" Union Pines High School (3A), "Vikings" United 8 Schools located in the Fayetteville and surrounding areas Jack Britt High School (4A), "Buccaneers" Gray's Creek High School (4A), "Bears" Lumberton High School (4A), "Pirates" South View High School (4A), "Tigers" Purnell Swett High School (4A), "Rams" Douglas Byrd High School (3A), "Eagles" Cape Fear High School (3A), "Colts" Seventy-First High School (3A), "Falcons" 3A Big South Schools located in Cleveland and Gaston counties Ashbrook High School, "Green Wave" Crest High School, "Chargers" Forestview High School, "Jaguars" Hunter Huss High School, "Huskies" Kings Mountain High School, "Mountaineers" North Gaston High School, "Wildcats" Stuart W. Cramer High School, "Storm" South Point High School, "Red Raiders" Central Schools located in the north-central portion of the state Cedar Ridge High School, "Red Wolves" Eastern Alamance High School, "Eagles" Northwood High School, "Chargers" Orange High School, "Panthers" Person High School, "Rockets" Western Alamance High School, "Warriors" Walter M. Williams High School, "Bulldogs" Coastal Schools located along the Southeastern coast of North Carolina Croatan High School, "Cougars" Dixon High School, "Bulldogs" Richlands High School, "Wildcats" Swansboro High School, "Pirates" West Carteret High School, "Patriots" White Oak High School, "Vikings" Mountain 7 Schools located in the western North Carolina mountains East Henderson High School, "Eagles" Franklin High School, "Panthers" North Henderson High School, "Knights" Pisgah High School, "Black Bears" Smoky Mountain High School, "Mustangs" Tuscola High School, "Mountaineer" West Henderson High School, "Falcons" Mid-Piedmont Schools located in Davidson, Montgomery, and Randolph counties Asheboro High School, "Blue Comets" Central Davidson High School, "Spartans" Ledford Senior High School, "Panthers" Montgomery Central High School, "Wolverines" North Davidson High School, "Black Knights" Oak Grove High School, "Grizzlies" Mid-State Schools located in Guilford, Rockingham, andForsyth counties Simon G. Atkins Academic & Technology High School, "Camels" James B. Dudley High School, "Panthers" Eastern Guilford High School, "Wildcats" High Point Central High School, "Bison" Northeast Guilford High School, "Rams" Rockingham County High School, "Cougars" Ben L. Smith High School, "Golden Eagles" Southern Guilford High School, "Storm" Quad County Schools located in Johnston, Wake, Wayne and Wilson counties Charles B. Aycock High School, "Golden Falcons" East Wake High School, "Warriors" Ralph L. Fike High School, "Demons" James B. Hunt Jr. High School, "Warriors" Smithfield-Selma High School, "Spartans" South Johnston High School, "Trojans" Southern Wayne High School, "Saints" West Johnston High School, "Wildcats" South Piedmont Schools located in Mecklenburg, Cabarrus, and Rowan counties. Jesse C. Carson High School, "Cougars" Central Cabarrus High School, "Vikings" Concord High School, "Spiders" East Rowan High School, "Mustangs" Lake Norman Charter School, "Knights" Northwest Cabarrus High School, "Trojans" South Rowan High School, "Raiders" West Rowan High School, "Falcons" Western Foothills Schools located in Catawba, Iredell, and Lincoln counties East Lincoln High School, "Mustangs" Fred T. Foard High School, "Tigers" Hickory High School, "Red Tornadoes" North Iredell High School, "Raiders" North Lincoln High School, "Knights" St. Stephens High School, "Indians" Statesville High School, "Greyhounds" West Iredell High School, "Warriors" 2A–3A The Big East Schools located in Franklin and Nash counties Franklinton High School (3A), "Rams" Northern Nash High School (3A), "Knights" Rocky Mount High School (3A), "Gryphons" Southern Nash High School (3A), "Firebirds" Bunn High School (2A), "Wildcats" Louisburg High School (2A), "Warriors" Nash Central High School (2A), "Bulldogs" Roanoke Rapids High School (2A), "Yellow Jackets" Northeastern Coastal Schools located in the northeastern corner of North Carolina Camden County High School (3A), "Bruins" Currituck County High School (3A), "Knights" First Flight High School (3A), "Nighthawks" Hertford County High School (2A), "Bears" John A. Holmes High School (2A), "Aces" Manteo High School (2A), "Redskins" Northeastern High School (2A), "Eagles" Pasquotank County High School (2A), "Panthers" Northern Lakes Located in the north-central portion of the state Carrboro High School (3A), "Jaguars" Durham School of the Arts (3A), "Bulldogs" Southern High School (3A), "Spartans" Vance County High School (3A), (Vipers) Granville Central High School (2A), "Panthers" South Granville High School (2A), "Vikings" J.F. Webb High School (2A), "Warriors" Rocky River Schools in the south-central portion of the state Central Academy of Technology and Arts (3A), "Cougars" Parkwood High School (3A), "Rebels" Anson High School (2A), "Bearcats" Forest Hills High School (2A), "Yellow Jackets" Monroe High School (2A), "Redhawks" West Stanly High School (2A), "Colts" 2A Catawba Valley Athletic Schools located in Caldwell, Lincoln, and Burke counties Bandys High School, "Trojans" Bunker Hill High School, "Bears" East Burke High School, "Cavaliers" Lincolnton High School, "Wolves" Maiden High School, "Blue Devils" Newton-Conover High School, "Red Devils" West Caldwell High School, "Warriors" West Lincoln High School, "Rebels" East Central Schools located in Duplin, Lenoir, and Onslow counties East Duplin High School, "Panthers" James Kenan High School, "Tigers" Kinston High School, "Vikings" North Lenoir High School, "Hawks" South Lenoir High School, "Blue Devils" Southwest Onslow High School, "Stallions" Wallace-Rose Hill High School, "Bulldogs" Eastern Plains Schools located in the Pitt, Edgecomb, Greene, and Craven counties Ayden-Grifton High School, "Chargers" Farmville Central High School, "Jaguars" Greene Central High School, "Rams" North Pitt High School, "Panthers" Southwest Edgecombe High School, "Cougars" Washington High School, "Pam Pack" West Craven High School, "Eagles" Foothills Schools located in Surry and Wilkes counties East Surry High School, "Cardinals" Forbush High School, "Falcons" North Surry High School, "Greyhounds" North Wilkes High School, "Vikings" Surry Central High School, "Golden Eagles" West Wilkes High School, "Blackhawks" Wilkes Central High School, "Eagles" Mid-State Schools located in Stokes and Rockingham counties T. Wingate Andrews High School, "Red Raiders" Dalton L. McMichael High School, "Phoenix" John Motley Morehead High School, "Panthers" North Forsyth High School, "Vikings" Reidsville High School, "Rams" Walkertown High School, "Wolfpack" West Stokes High School, "Wildcats" Mountain Foothills 7 Schools located in the southwestern corner of the state Brevard High School, "Blue Devils" Chase High School, "Trojans" East Rutherford High School, "Cavaliers" Hendersonville High School, "Bearcats" R.L. Patton High School, "Panthers" Polk County High School, "Wolverines" R–S Central High School, "Hilltoppers" Neuse 6 Schools in Johnston, Wilson, and Wayne counties Beddingfield High School, "Bruins" Eastern Wayne High School, "Warriors" Goldsboro High School, "Cougars" North Johnston High School, "Panthers" Princeton High School, "Bulldogs" Spring Creek High School, "Gators" Southeastern Athletic Schools located in Sampson, Robeson, and Bladen counties Clinton High School, "Dark Horses" East Bladen High School, "Eagles" Fairmont High School, "Golden Tornadoes" Midway High School, "Raiders" Red Springs High School, "Red Devils" St. Pauls High School, "Bulldogs" West Bladen High School, "Knights" 1A–2A Catawba Shores Athletic Schools located in Davidson, Lincoln, Iredell, and Mecklenburg counties Community School of Davidson (2A), "Spartans" Lincoln Charter School (2A), "Eagles" Pine Lake Preparatory (2A), "Pride" Christ The King Catholic High School (1A), "Crusaders" Langtree Charter Academy (1A), "Lions" Mountain Island Charter School (1A), "Raptors" Coastal Plains Schools located along North Carolina's central coast East Carteret High School (2A), "Mariners" Jones Senior High School (1A), "Trojans" Northside High School (Pinetown) (1A), "Panthers" Lejeune High School (1A), "Devilpups" Pamlico County High School (1A), "Hurricanes" Southside High School (1A), "Seahawks" Central Carolina Schools located along the I-85 corridor East Davidson High School (2A), "Golden Eagles" Lexington Senior High School (2A), "Yellow Jackets" Salisbury High School (2A), "Hornets" West Davidson High School (2A), "Dragons" North Rowan High School (1A), "Cavaliers" South Davidson High School (1A), "Wildcats" Thomasville High School(1A) "Bulldogs" Mid-Carolina Schools located in Chatham and Moore counties Bartlett Yancey High School (2A), "Buccaneers" Hugh M. Cummings High School (2A), "Cavaliers" Graham High School (2A), "Red Devils" Jordan-Matthews High School (2A), "Jets" Seaforth High School (2A), "Hawks" Chatham Central High School (1A), "Bears" North Moore High School (1A), Mustangs" Piedmont Athletic Schools located in Randolph County Providence Grove High School (2A), "Patriots" Randleman High School (2A), "Tigers" Southwestern Randolph High School (2A), "Cougars" Trinity High School (2A), "Bulldogs" Wheatmore High School (2A), "Warriors" Eastern Randolph High School (1A), "Wildcats" Uwharrie Charter Academy (1A), "Eagles" Southern Piedmont Schools located in Cleveland and Gaston counties Burns High School (2A), "Bulldogs" East Gaston High School (2A), "Warriors" Shelby High School (2A), "Golden Lions" Bessemer City High School (1A), "Yellow Jackets" Cherryville High School (1A), "Ironmen" Highland School of Technology (1A), "Rams" Thomas Jefferson Academy (1A), "Gryphons" Super Six Schools located in the Triangle region Franklin Academy (2A), "Patriots" North Carolina School of Science and Mathematics (2A), "Unicorns" Raleigh Charter High School (2A), "Phoenix" Research Triangle High School (2A), "Raptors" East Wake Academy (1A), "Eagles" Falls Lake Academy (1A), "Firebirds" Waccamaw Schools located in the southeastern portion of the state South Columbus High School (2A), "Stallions" Heide Trask High School (2A), "Titans" Whiteville High School (2A), "Wolfpack" East Columbus High School (1A), "Gators" Pender High School (1A), "Patriots" West Columbus High School (1A), "Vikings" Western Highlands Schools located in the western North Carolina mountains Madison High School (2A), "Patriots" Charles D. Owen High School (2A), "Warhorses" Avery County High School (1A), "Vikings" Draughn High School (1A), "Wildcats" Mitchell High School (1A), "Mountaineers" Mountain Heritage High School (1A), "Cougars" Rosman High School (1A), "Tigers" Yadkin Valley Schools located along the Yadkin River in the northwest Jay M. Robinson High School (2A), "Bulldogs" Mount Pleasant High School (2A), "Tigers" North Stanly High School (2A), "Comets" Albemarle High School (1A), "Bulldogs" Gray Stone Day School (1A), "Knights" South Stanly High School (1A), "Rebels" Union Academy, "Cardinals" 1A Atlantic 5 Schools located in the Outer Banks region Bear Grass Charter School, "Bears" Cape Hatteras Secondary School, "Hurricanes" Columbia High School, "Wildcats" Mattamuskeet High School, "Lakers" Ocracoke High School, "Dolphins" Carolina Schools located in the east central part of the state Hobbton High School, "Wildcats" Lakewood High School, "Leopards" Neuse Charter School, "Cougars" North Duplin High School, "Rebels" Rosewood High School, "Eagles" Union High School, "Spartans" Central Tar Heel Schools located in the southern Triangle region Chatham Charter High School, "Knights" Clover Garden School, "Grizzlies" River Mill Academy, "Jaguars" Woods Charter School, "Wolves" Southern Wake Academy, "Lions" Triangle Math and Science Academy, "Tigers" Four Rivers Schools located in northeastern North Carolina Bertie High School, "Falcons" Gates County Senior High School, "Red Barons" North East Carolina Preparatory School, "Huskies" Perquimans County High School, "Pirates" Riverside High School (Williamston), "Knights" South Creek High School, "Cougars" Tarboro High School, "Vikings" Washington County High School, "Panthers" Metro 8 Schools located in the Metrolina region Apprentice Academy, "Wolfpack" Bradford Prep High School, "Bears" Cabarrus Charter Academy, "Huskies" Carolina International School, "Comets" Corvian Community School, "Cardinals" Piedmont Communuity Charter School, "Patriots" Queen's Grant High School, "Stallions" Sugar Creek Charter School, "Wildcats" Northwest Schools located in the northwestern corner of the state Alleghany High School, "Trojans" East Wilkes High School (1A), "Cardinals" Elkin High School (1A), "Elks" Mount Airy High School, "Granite Bears" North Stokes High School, "Vikings" South Stokes High School, "Sauras" Starmount High School, "Rams" Northwest Piedmont Schools located in the Triad region Bethany Community School, "Wolves" Bishop McGuinness High School, "Villains" Carver High School, "Yellowjackets" Cornerstone Charter Academy, "Cardinals" Millennium Charter Academy, "Lions" North Carolina Leadership Academy, "Falcons" Winston-Salem Preparatory Academy, "Phoenix" Tar Roanoke Schools along the Tar and Roanoke rivers KIPP Pride High School, "Panthers" North Edgecombe High School, "Warriors" Northampton County High School, "Jaguars" Northwest Halifax High School, "Vikings" Rocky Mount Prep, "Jaguars" Southeast Halifax High School, "Trojans" Warren County High School, "Eagles" Weldon High School, "Chargers" Wilson Preparatory Academy, "Tigers" Triangle North Schools located in the northern Triangle region Eno River Academy, "Bobcats" Henderson Collegiate School, "Lions" Oxford Preparatory School, "Griffins" Roxboro Community School, "Bulldogs" Vance Charter School, "Knights" Voyager Academy, "Vikings" Smoky Mountain Schools located in and around the Smoky Mountains Andrews High School, "Wildcats" Blue Ridge School, "Bobcats" Cherokee High School, "Braves" Hayesville High School, "Yellow Jackets" Highlands School, "Highlanders" Hiwassee Dam High School, "Eagles" Murphy High School, "Bulldogs" Nantahala School, "Hawks" Robbinsville High School, "Black Knights" Swain County High School, "Maroon Devils" Tri-County Early College, "Jaguars" Independent Ascend Leadership Academy, "Aviators" Eastern North Carolina School for the Deaf, "Hornets" North Carolina School for the Deaf, "Bears" Awards Commissioner’s Cup Awarded to NCHSAA teams and athletic programs that highlight community service. Teams identify a community need, host a service project, and host a service project to meet that need. NCHSAA Athlete of the Year The NCHSAA Athlete of the Year Award is awarded annually to a nominated male and female high school athlete in North Carolina, who have demonstrated success in multiple different sports. Winners of this award earn the Pat Best Memorial Trophy, named after the late Pat Best, who was a former principal at Goldsboro High School and president of the NCHSAA at the time of his death in 1988. Hall of Fame The North Carolina High School Sports Hall of Fame is the hall of fame for high school athletics in North Carolina. It is administered by the NCHSAA and includes athletes, coaches, officials, broadcasters and others who have supported high school athletics in the state. The hall was created in 1987 with Bob Jamieson of Greensboro, Leon Brogden of Wilmington, and Dave Harris of Charlotte as charter members. As of 2012, 125 members have been inducted. References External links High school sports associations in the United States Sports organizations established in 1912 1912 establishments in North Carolina
15667214
https://en.wikipedia.org/wiki/Bibliotheca%20historica
Bibliotheca historica
Bibliotheca historica (, "Historical Library") is a work of universal history by Diodorus Siculus. It consisted of forty books, which were divided into three sections. The first six books are geographical in theme, and describe the history and culture of Egypt (book I), of Mesopotamia, India, Scythia, and Arabia (II), of North Africa (III), and of Greece and Europe (IV–VI). In the next section (books VII–XVII), he recounts the history of the world starting with the Trojan War, down to the death of Alexander the Great. The last section (books XVII to the end) concern the historical events from the successors of Alexander down to either 60 BC or the beginning of Caesar's Gallic War in 59 BC. (The end has been lost, so it is unclear whether Diodorus reached the beginning of the Gallic War, as he promised at the beginning of his work, or, as evidence suggests, old and tired from his labors he stopped short at 60 BC.) He selected the name "Bibliotheca" in acknowledgement that he was assembling a composite work from many sources. Of the authors he drew from, some who have been identified include: Hecataeus of Abdera, Ctesias of Cnidus, Ephorus, Theopompus, Hieronymus of Cardia, Duris of Samos, Diyllus, Philistus, Timaeus, Polybius and Posidonius. Diodorus' immense work has not survived intact; only the first five books and books 11 through 20 remain. The rest exists only in fragments preserved in Photius and the Excerpta of Constantine Porphyrogenitus. Chronology [[File:Augustus Statue.JPG|thumb|upright|The Bibliotheca'''s history was completed sometime between 36 and 30 BC, during the period of the Second Triumvirate and Octavian's victory over Mark Antony and Cleopatra VII.|alt=]] The earliest date Diodorus mentions is his visit to Egypt in the 180th Olympiad (between 60 and 56 BC). This visit was marked by his witnessing an angry mob demand the death of a Roman citizen who had accidentally killed a cat, an animal sacred to the ancient Egyptians (Bibliotheca historica 1.41, 1.83). The latest event Diodorus mentions is Octavian's vengeance on the city of Tauromenium, whose refusal to help him led to Octavian's naval defeat nearby in 36 BC (16.7). Diodorus shows no knowledge that Egypt became a Roman province—which transpired in 30 BC—so presumably he published his completed work before that event. Diodorus asserts that he devoted thirty years to the composition of his history, and that he undertook a number of dangerous journeys through Europe and Asia in prosecution of his historical researches. Modern critics have called this claim into question, noting several surprising mistakes that an eye-witness would not be expected to have made. Structure In the Bibliotheca historica, Diodorus sets out to write a universal history, covering the entire world and all periods of time. Each book opens with a table of its contents and a preface discussing the relevance of history, issues in the writing of history or the significance of the events discussed in that book. These are now generally agreed to be entirely Diodorus' own work. The degree to which the text that follows is derived from earlier historical works is debated. The first five books describe the history and culture of different regions, without attempting to determine the relative chronology of events. Diodorus expresses serious doubts that such chronology is possible for barbarian lands and the distant past. The resulting books have affinities with the genre of geography. Books six to ten, which covered the transition from mythical times to the archaic period, are almost entirely lost. By book ten he had taken up an annalistic structure, narrating all the events throughout the world in each year before moving on to the next one. Books eleven to twenty, which are completely intact and cover events between 480 BC and 302 BC, maintain this annalistic structure. Books twenty-one to forty, which brought the work down to Diodorus' own lifetime, terminating around 60 BC, are mostly lost. Book I: Egypt Book one opens with a prologue on the work as a whole, arguing for the importance of history generally and universal history in particular. The rest of the book is devoted to Egypt and is divided into two halves. In the first half he covers the origin of the world and the development of civilisation in Egypt. A long discussion of the theories offered by different Greek scholars to explain the annual floods of the River Nile serves to showcase Diodorus' wide-reading. In the second half he presents the history of the country, its customs and religion, in a highly respectful tone. His main sources are believed to be Hecataeus of Abdera and Agatharchides of Cnidus. Book II: Asia This book has only a short prologue outlining its contents. The majority of the book is devoted to the history of the Assyrians, focussed on the mythical conquests of Ninus and Semiramis, the fall of the dynasty under the effeminate Sardanapallus, and the origins of the Medes who overthrew them. This section is explicitly derived from the account of Ctesias of Cnidus (chapters 1-34). The rest of the book is devoted to describing the various other peoples of Asia. He first describes India, drawing on Megasthenes (chapters 35-42), then the Scythians of the Eurasian steppe, including the Amazons and the Hyperboreans) (chapters 43-47) and Arabia Felix (chapters 48-54). He finishes the book with an account of the traveller Iambulus' journey to a group of islands in the Indian Ocean, which appears to be based on a Hellenistic utopian novel. Book III: Africa In this book, Diodorus describes the geography of North Africa including Ethiopia, the gold mines of Egypt, the Persian Gulf and Libya, where he sites mythical figures including the Gorgons, Amazons, Ammon and Atlas. Based on the writings on Agatharchides, Diodorus describes gold mining in Egypt, with horrible working conditions: Book IV: Greek mythology In this book, Diodorus describes the mythology of Greece. He narrates the myths of Dionysus, Priapus, the Muses, Herakles, the Argonauts, Medea, the hero Theseus and the Seven against Thebes. Book V: Europe In this book, Diodorus describes the geography of Europe. He covers the islands of Sicily, Malta, Corsica, Sardinia and the Balearic Islands. He then covers Britain, 'Basilea', Gaul, the Iberian peninsula, and the regions of Liguria and Tyrrhenia in the Italian peninsula. Finally he describes the islands of H|iera and Panchaea in the southern ocean, and the Greek islands. Books VI–X: Trojan War and Archaic Greece Books VI–X survive only in fragments, which cover events before and after the Trojan War including the stories of Bellerophon, Orpheus, Aeneas, and Romulus; some history from cities including Rome and Cyrene; tales of kings such as Croesus and Cyrus; and mentions of philosophers such as Pythagoras and Zeno. Book XI: 480-451 BC This book has no prologue, just a brief statement of its contents. The main focus of the book are events in mainland Greece, principally the Second Persian invasion of Greece under Xerxes (1-19, 27-39), Themistocles' construction of the Peiraeus and Long walls and his defection to Persia (41-50, 54-59) and the Pentecontaetia (60-65, 78–84, 88). Interweaved with this is an account of events in Sicily, focussing on Gelon of Syracuse's war with the Carthaginians (20-26), his successors' prosperity and fall (51, 53, 67-68), and the Syracusans' war with Ducetius (76, 78, 88-92). Diodorus' source for his account of mainland Greece in this book is generally agreed to be Ephorus of Cyme, but some scholars argue that he supplemented this using the accounts of Herodotus, Thucydides, and others. Book XII: 450-416 BC The book's prologue muses on the mutability of fortune. Diodorus notes that bad events can have positive outcomes, like the prosperity of Greece which (he says) resulted from the Persian Wars. Diodorus account mostly focuses on mainland Greece, covering the end of the Pentecontaetia (1-7, 22, 27-28), the first half of the Peloponnesian War (30, 31–34, 38–51, 55–63, 66-73), and conflicts during the Peace of Nicias (74-84). Most of the side narratives concern events in southern Italy, relating to the foundation of Thurii (9-21, 23, 35) and the secession of the Plebs at Rome (24-25). An account of the war between Leontini and Syracuse, culminating in the embassy of Gorgias to Athens (54-56), sets up the account of the Sicilian Expedition in book XIII. Diodorus is believed to have continued to use Ephorus, perhaps supplemented with other historians, as his source for Greek events in this book, while the source for the events in western Greece is usually identified as Timaeus of Tauromenium. Book XIII: 415-404 BC Diodorus explains that, given the amount of material to be covered, his prologue must be brief. This book opens with the account of the Sicilian Expedition, culminating in two very long speeches at Syracuse deliberating about how to treat the Athenian prisoners (1-33). After that the two areas again diverge, with the Greek narrative covering the Decelean War down to the battles of Arginusae and Aigospotami (35-42, 45–53, 64–74, 76-79). The Sicilian narrative recounts the beginning of the Second Carthaginian War, culminating in the rise of Dionysius the Elder to the tyranny (43-44, 54–63, 75, 80–96, 108-114). Ephorus is generally agreed to have continued to be the source of the Greek narrative and Timaeus of the Sicilian narrative. The source of the Sicilian expedition is disputed - both Ephorus and Timaeus have been put forward. Sacks argues that the two speeches at the end of that account are Diodorus' own work. Book XIV: 404-387 BC In the prologue, Diodorus identifies reproachful criticism (blasphemia) as the punishment for evil deeds which people take to heart the most and which the powerful are especially subject to. Powerful men, therefore, should avoid evil deeds in order to avoid receiving this reproach from posterity. Diodorus claims that the central subjects of the book are negative examples, who demonstrate the truth of these remarks. The book is again divided into Greek and Sicilian narratives. The Greek narrative covers the thirty tyrants of Athens (3-6, 32-33), the establishment and souring of the Spartan hegemony (10-13, 17, 34–36, 38), Cyrus the Younger's attempt to seize the Persian throne with the aid of the Ten Thousand (19-31), Agesilaus' invasion of Persian Asia Minor (79-80), the Boeotian War (81-86, 91–92, 94). The Sicilian narrative focusses on Dionysios the Elder's establishment of his tyranny in Sicily (7-9, 11–16, 18), his second war with the Carthaginians (41-78, 85–91, 95-96), and his invasion of southern Italy (100-108, 111-112). Fairly brief notes mention Roman affairs year by year, including the war with Veii (93), and the Gallic Sack (113-117). Ephorus and Timaeus are assumed to have still been Diodorus' sources. Book XV: 386-361 BC In the prologue of this book, Diodorus makes several statements that have been considered important for understanding the philosophy behind his entire work. Firstly, he announces the importance of parrhesia (free speech) for the overall moral goal of his work, insofar as he expects his frank praise of good people and criticism of bad ones will encourage his readers to behave morally. Secondly, he declares that the fall of the Spartan empire, which is described in this book, was caused by their cruel treatment of their subjects. Sacks considers this idea about the fall of empires to be a core theme of Diodorus' work, motivated by his own experience as a subject of Rome. This book covers the height of the Spartan rule in Greece, including the invasion of Persia, the Olynthian War, and the occupation of the Cadmeia (8-12, 18-23), but also the Spartan defeat in the Boeotian War which resulted in the rise of the Theban Hegemony (25-35, 37–40, 62‑69, 75, 82‑88). The main side narratives are Euagoras war with the Persians in Cyprus (2‑4, 8‑9), the wars of Dionysius I against the Illyrians, Etruscans and Carthaginians and his death (13-17, 73-74), Artaxerxes II's failed invasion of Egypt (41-43), the skytalismos in Argos (57-58), the career of Jason of Pherae (57, 60, 80, 95), and the Great Satraps' Revolt (90-93). Diodorus' main source is generally believed to have been Ephorus, but (through him?) he also seems to have drawn on other sources, like the Hellenica Oxyrhynchia. It is disputed whether he continued using Timaeus of Tauromenium for his description of Sicilian affairs in this book or if this too was based on Ephorus. Book XVI: 360‑336 BC The Prologue announces the importance of cohesion within narratives - a book or chapter should, if possible, narrate an entire story from start to finish. It then transitions into praise of Philip II, whose involvement in the Third Sacred War and resulting rise are the main subjects of the book. The principal side narratives are Dion of Syracuse's overthrow of Dionysius II (5-6, 9-15), the Social War (7, 21-22), Artaxerxes III's reconquest of Egypt (40-52), and the expedition of Timoleon (interleaved in 65-90). The initial sources for the main narrative was probably Ephorus, but his account came to an end in 356 BC, and Diodorus' sources after that point are disputed. Possibilities include Demophilus, Diyllus, Duris of Samos and Theopompus; contradictions in his account suggest that he was following multiple sources simultaneously and did not succeed in combining them perfectly. The Sicilian material probably draws on Timaeus and also cites . Book XVII: 335‑324 BC This book covers Alexander the Great from his accession, through his campaigns in Persia, to his death in Babylon. Despite a promise in the brief prologue to discuss other contemporary events, it does not contain any side-narratives, although, unlike other accounts of Alexander, it does mention Macedonian activities in Greece during his expedition. Owing to its length, the book is split into two halves, the first running down to the Battle of Gaugamela (1-63) and the second part continuing until his death (64-118). Diodorus' sources for the story of Alexander are much debated. Sources of information include Aristobulus of Cassandreia, Cleitarchus, Onesicritus and Nearchus, but it is not clear that he used these directly. Several scholars have argued that the unity of this account implies a single source, perhaps Cleitarchus. Book XVIII: 323-318 BC This book covers the years 323 BC-318 BC, describing the disputes which arose between Alexander's generals after his death and the beginning of the Wars of the Diadochoi. The account is largely based on Hieronymus of Cardia. There is no discussion of events outside the eastern Mediterranean, although cross-references at other points indicate that Diodorus intended to discuss Sicilian affairs. Book XIX: 317-311 BC This book opens with a prologue arguing that democracy is usually overthrown by the most powerful members of society, not the weakest, and advancing Agathocles of Syracuse as a demonstration of this proposition. The narrative of the book continues the account of the Diadochi, recounting the Second and Third Wars of the Diadochi; the Babylonian War is completely unmentioned. Interwoven in this narrative is the rise to power of Agathocles of Syracuse and the beginning of his war with Carthage. It is disputed whether this latter narrative strand is based on Callias of Syracuse, Timaeus of Tauromenium, or Duris of Samos. Book XX: 310-302 BC The prologue of this book discusses Greek historians' practice of inventing speeches for their characters to deliver. Diodorus criticises the practice as inappropriate to the genre, but acknowledges that in moderation such speeches can add variety and serve a didactic purpose. The book is devoted to two parallel narratives, one describing Agathocles' ultimately unsuccessful invasion of Carthage, and the other devoted to the continued wars of the Diadochi, which are dominated by Antigonus Monophthalmus and Demetrius Poliorcetes. The only significant side narrative is the account of Cleonymus of Sparta's wars in Italy (104-105). Books XXI–XL These books do not survive intact, but large sections were preserved by Byzantine compilers working under Constantine VII and by epitomators like Photius. They covered the history of the Hellenistic kingdoms from the Battle of Ipsus in 301 BC, through the wars between Rome and Carthage, down to either 60 BC or the beginning of Caesar's Gallic War in 59 BC. For books 21–32, Diodorus drew on the history of Polybius, which largely survives and can be compared against Diodorus' text, though he may also have used Philinus of Agrigentum and other lost historians. Books 32 to 38 or 39 probably had Poseidonius as their source. Book XXXII is notable the inclusion of the lives of Diophantus of Abae, Callon of Epidaurus, and others who transitioned between genders. The record of Callon's medical treatment is the first known account of gender affirmation surgery. Reception Ancient and medieval Diodorus is mentioned briefly in Pliny the Elder's Natural History as being singular among the Greek historians for the simple manner in which he named his work. Modern Diodorus' liberal use of earlier historians underlies the harsh opinion of the author of the 1911 Encyclopædia Britannica article on Bibliotheca historica: As damaging as this sounds, other more contemporary classical scholars are likely to go even further. Diodorus has become infamous particularly for adapting his tales ad maiorem Graecorum gloriam ("to the greater glory of the Greeks"), leading one prominent author to refer to him as one of the "two most accomplished liars of antiquity" (the other being Ctesias). Far more sympathetic is the estimate of C.H. Oldfather, who wrote in the introduction to his translation of Diodorus: Editorial history The earliest extant manuscript of Bibliotheca historica is from about 10th century. The editio princeps of Diodorus was a Latin translation of the first five books by Poggio Bracciolini at Bologna in 1472. The first printing of the Greek original (at Basel in 1535) contained only books 16–20, and was the work of Vincentius Opsopoeus. It was not until 1559 that all of the surviving books, and surviving fragments of books 21 to the end were published by Stephanus at Geneva. Footnotes References Editions and translations Vol. 2 (Books 2.35-4.58). Tr. C. H. Oldfather. LCL 303 (1935). . Online: Internet Archive PDF Vol. 3 (Books 4.59-8). Tr. C. H. Oldfather. LCL 340 (1939). . Vol. 4 (Books 9-12.40). Tr. C. H. Oldfather. LCL 375 (1946). . Online: Perseus Vol. 5 (Books 12.41-13). Tr. C. H. Oldfather. LCL 384 (1950). . Vol. 6 (Books 14–15.19). Tr. C. H. Oldfather. LCL 399 (1954). . Vol. 7 (Books 15.20-16.65). Tr. Charles L. Sherman. LCL 389 (1952). . Vol. 9 (Books 18–19.65). Tr. Russel M. Geer. LCL 377 (1947). . Vol. 10 (Books 19.66-20). Tr. Russel M. Geer. LCL 390 (1954). . Vol. 11 (Fragments of Books 21-32). Tr. Francis R. Walton. LCL 409 (1957). . Vol. 12 (Fragments of Books 33-40). Tr. Francis R. Walton. LCL 423 (1967). . Available from Internet Archive Further reading Sacks, Kenneth S. Diodorus Siculus and the First Century''. Princeton: Princeton University Press, 1990. . and External links Diodorus Siculus translated by C.H. Oldfather, English translation, Greek text, Books 9–17 (text) Diodorus Siculus translated by C.H. Oldfather, English translation, Book 4 (text) The manuscripts of Diodorus Siculus by Roger Pearse (list only) Bibliotheca Historica (books 1-32), Bill Thayer's Web Site Bibliotheca Historica (books 33-40), Attalus.org Ancient Greek works Books about civilizations 1st-century BC history books History of mining Gold mining Roman-era Greek historiography
528352
https://en.wikipedia.org/wiki/Translation%20lookaside%20buffer
Translation lookaside buffer
A translation lookaside buffer (TLB) is a memory cache that is used to reduce the time taken to access a user memory location. It is a part of the chip's memory-management unit (MMU). The TLB stores the recent translations of virtual memory to physical memory and can be called an address-translation cache. A TLB may reside between the CPU and the CPU cache, between CPU cache and the main memory or between the different levels of the multi-level cache. The majority of desktop, laptop, and server processors include one or more TLBs in the memory-management hardware, and it is nearly always present in any processor that utilizes paged or segmented virtual memory. The TLB is sometimes implemented as content-addressable memory (CAM). The CAM search key is the virtual address, and the search result is a physical address. If the requested address is present in the TLB, the CAM search yields a match quickly and the retrieved physical address can be used to access memory. This is called a TLB hit. If the requested address is not in the TLB, it is a miss, and the translation proceeds by looking up the page table in a process called a page walk. The page walk is time-consuming when compared to the processor speed, as it involves reading the contents of multiple memory locations and using them to compute the physical address. After the physical address is determined by the page walk, the virtual address to physical address mapping is entered into the TLB. The PowerPC 604, for example, has a two-way set-associative TLB for data loads and stores. Some processors have different instruction and data address TLBs. Overview A TLB has a fixed number of slots containing page-table entries and segment-table entries; page-table entries map virtual addresses to physical addresses and intermediate-table addresses, while segment-table entries map virtual addresses to segment addresses, intermediate-table addresses and page-table addresses. The virtual memory is the memory space as seen from a process; this space is often split into pages of a fixed size (in paged memory), or less commonly into segments of variable sizes (in segmented memory). The page table, generally stored in main memory, keeps track of where the virtual pages are stored in the physical memory. This method uses two memory accesses (one for the page-table entry, one for the byte) to access a byte. First, the page table is looked up for the frame number. Second, the frame number with the page offset gives the actual address. Thus any straightforward virtual memory scheme would have the effect of doubling the memory access time. Hence, the TLB is used to reduce the time taken to access the memory locations in the page-table method. The TLB is a cache of the page table, representing only a subset of the page-table contents. Referencing the physical memory addresses, a TLB may reside between the CPU and the CPU cache, between the CPU cache and primary storage memory, or between levels of a multi-level cache. The placement determines whether the cache uses physical or virtual addressing. If the cache is virtually addressed, requests are sent directly from the CPU to the cache, and the TLB is accessed only on a cache miss. If the cache is physically addressed, the CPU does a TLB lookup on every memory operation, and the resulting physical address is sent to the cache. In a Harvard architecture or modified Harvard architecture, a separate virtual address space or memory-access hardware may exist for instructions and data. This can lead to distinct TLBs for each access type, an instruction translation lookaside buffer (ITLB) and a data translation lookaside buffer (DTLB). Various benefits have been demonstrated with separate data and instruction TLBs. The TLB can be used as a fast lookup hardware cache. The figure shows the working of a TLB. Each entry in the TLB consists of two parts: a tag and a value. If the tag of the incoming virtual address matches the tag in the TLB, the corresponding value is returned. Since the TLB lookup is usually a part of the instruction pipeline, searches are fast and cause essentially no performance penalty. However, to be able to search within the instruction pipeline, the TLB has to be small. A common optimization for physically addressed caches is to perform the TLB lookup in parallel with the cache access. Upon each virtual-memory reference, the hardware checks the TLB to see whether the page number is held therein. If yes, it is a TLB hit, and the translation is made. The frame number is returned and is used to access the memory. If the page number is not in the TLB, the page table must be checked. Depending on the CPU, this can be done automatically using a hardware or using an interrupt to the operating system. When the frame number is obtained, it can be used to access the memory. In addition, we add the page number and frame number to the TLB, so that they will be found quickly on the next reference. If the TLB is already full, a suitable block must be selected for replacement. There are different replacement methods like least recently used (LRU), first in, first out (FIFO) etc.; see the address translation section in the cache article for more details about virtual addressing as it pertains to caches and TLBs. Performance implications The CPU has to access main memory for an instruction-cache miss, data-cache miss, or TLB miss. The third case (the simplest one) is where the desired information itself actually is in a cache, but the information for virtual-to-physical translation is not in a TLB. These are all slow, due to the need to access a slower level of the memory hierarchy, so a well-functioning TLB is important. Indeed, a TLB miss can be more expensive than an instruction or data cache miss, due to the need for not just a load from main memory, but a page walk, requiring several memory accesses. The flowchart provided explains the working of a TLB. If it is a TLB miss, then the CPU checks the page table for the page table entry. If the present bit is set, then the page is in main memory, and the processor can retrieve the frame number from the page-table entry to form the physical address. The processor also updates the TLB to include the new page-table entry. Finally, if the present bit is not set, then the desired page is not in the main memory, and a page fault is issued. Then a page-fault interrupt is called, which executes the page-fault handling routine. If the page working set does not fit into the TLB, then TLB thrashing occurs, where frequent TLB misses occur, with each newly cached page displacing one that will soon be used again, degrading performance in exactly the same way as thrashing of the instruction or data cache does. TLB thrashing can occur even if instruction-cache or data-cache thrashing are not occurring, because these are cached in different-size units. Instructions and data are cached in small blocks (cache lines), not entire pages, but address lookup is done at the page level. Thus even if the code and data working sets fit into cache, if the working sets are fragmented across many pages, the virtual-address working set may not fit into TLB, causing TLB thrashing. Appropriate sizing of the TLB thus requires considering not only the size of the corresponding instruction and data caches, but also how these are fragmented across multiple pages. Multiple TLBs Similar to caches, TLBs may have multiple levels. CPUs can be (and nowadays usually are) built with multiple TLBs, for example a small L1 TLB (potentially fully associative) that is extremely fast, and a larger L2 TLB that is somewhat slower. When instruction-TLB (ITLB) and data-TLB (DTLB) are used, a CPU can have three (ITLB1, DTLB1, TLB2) or four TLBs. For instance, Intel's Nehalem microarchitecture has a four-way set associative L1 DTLB with 64 entries for 4 KiB pages and 32 entries for 2/4 MiB pages, an L1 ITLB with 128 entries for 4 KiB pages using four-way associativity and 14 fully associative entries for 2/4 MiB pages (both parts of the ITLB divided statically between two threads) and a unified 512-entry L2 TLB for 4 KiB pages, both 4-way associative. Some TLBs may have separate sections for small pages and huge pages. TLB-miss handling Two schemes for handling TLB misses are commonly found in modern architectures: With hardware TLB management, the CPU automatically walks the page tables (using the CR3 register on x86, for instance) to see whether there is a valid page-table entry for the specified virtual address. If an entry exists, it is brought into the TLB, and the TLB access is retried: this time the access will hit, and the program can proceed normally. If the CPU finds no valid entry for the virtual address in the page tables, it raises a page fault exception, which the operating system must handle. Handling page faults usually involves bringing the requested data into physical memory, setting up a page table entry to map the faulting virtual address to the correct physical address, and resuming the program. With a hardware-managed TLB, the format of the TLB entries is not visible to software and can change from CPU to CPU without causing loss of compatibility for the programs. With software-managed TLBs, a TLB miss generates a TLB miss exception, and operating system code is responsible for walking the page tables and performing the translation in software. The operating system then loads the translation into the TLB and restarts the program from the instruction that caused the TLB miss. As with hardware TLB management, if the OS finds no valid translation in the page tables, a page fault has occurred, and the OS must handle it accordingly. Instruction sets of CPUs that have software-managed TLBs have instructions that allow loading entries into any slot in the TLB. The format of the TLB entry is defined as a part of the instruction set architecture (ISA). The MIPS architecture specifies a software-managed TLB; the SPARC V9 architecture allows an implementation of SPARC V9 to have no MMU, an MMU with a software-managed TLB, or an MMU with a hardware-managed TLB, and the UltraSPARC Architecture 2005 specifies a software-managed TLB. The Itanium architecture provides an option of using either software- or hardware-managed TLBs. The Alpha architecture's TLB is managed in PALcode, rather than in the operating system. As the PALcode for a processor can be processor-specific and operating-system-specific, this allows different versions of PALcode to implement different page-table formats for different operating systems, without requiring that the TLB format, and the instructions to control the TLB, to be specified by the architecture. Typical TLB These are typical performance levels of a TLB: Size: 12 bits – 4,096 entries Hit time: 0.5 – 1 clock cycle Miss penalty: 10 – 100 clock cycles Miss rate: 0.01 – 1% (20–40% for sparse/graph applications) The average effective memory cycle rate is defined as cycles, where is the number of cycles required for a memory read, is the miss rate, and is the hit time in cycles. If a TLB hit takes 1 clock cycle, a miss takes 30 clock cycles, a memory read takes 30 clock cycles, and the miss rate is 1%, the effective memory cycle rate is an average of (31.29 clock cycles per memory access). Address-space switch On an address-space switch, as occurs on a process switch but not on a thread switch, some TLB entries can become invalid, since the virtual-to-physical mapping is different. The simplest strategy to deal with this is to completely flush the TLB. This means that after a switch, the TLB is empty, and any memory reference will be a miss, so it will be some time before things are running back at full speed. Newer CPUs use more effective strategies marking which process an entry is for. This means that if a second process runs for only a short time and jumps back to a first process, the TLB may still have valid entries, saving the time to reload them. Other strategies avoid flushing the TLB on a context switch: (a) A single address space operating system uses the same virtual-to-physical mapping for all processes. (b) Some CPUs have a process ID register, and the hardware uses TLB entries only if they that match the current process ID. For example, in the Alpha 21264, each TLB entry is tagged with an address space number (ASN), and only TLB entries with an ASN matching the current task are considered valid. Another example in the Intel Pentium Pro, the page global enable (PGE) flag in the register CR4 and the global (G) flag of a page-directory or page-table entry can be used to prevent frequently used pages from being automatically invalidated in the TLBs on a task switch or a load of register CR3. Since the 2010 Westmere microarchitecture Intel 64 processors also support 12-bit process-context identifiers (PCIDs), which allow retaining TLB entries for multiple linear-address spaces, with only those that match the current PCID being used for address translation. While selective flushing of the TLB is an option in software-managed TLBs, the only option in some hardware TLBs (for example, the TLB in the Intel 80386) is the complete flushing of the TLB on an address-space switch. Other hardware TLBs (for example, the TLB in the Intel 80486 and later x86 processors, and the TLB in ARM processors) allow the flushing of individual entries from the TLB indexed by virtual address. Flushing of the TLB can be an important security mechanism for memory isolation between processes to ensure a process can't access data stored in memory pages of another process. Memory isolation is especially critical during switches between the privileged operating system kernel process and the user processes – as was highlighted by the Meltdown security vulnerability. Mitigation strategies such as kernel page-table isolation (KPTI) rely heavily on performance-impacting TLB flushes and benefit greatly from hardware-enabled selective TLB entry management such as PCID. Virtualization and x86 TLB With the advent of virtualization for server consolidation, a lot of effort has gone into making the x86 architecture easier to virtualize and to ensure better performance of virtual machines on x86 hardware. Normally, entries in the x86 TLBs are not associated with a particular address space; they implicitly refer to the current address space. Hence, every time there is a change in address space, such as a context switch, the entire TLB has to be flushed. Maintaining a tag that associates each TLB entry with an address space in software and comparing this tag during TLB lookup and TLB flush is very expensive, especially since the x86 TLB is designed to operate with very low latency and completely in hardware. In 2008, both Intel (Nehalem) and AMD (SVM) have introduced tags as part of the TLB entry and dedicated hardware that checks the tag during lookup. Even though these are not fully exploited, it is envisioned that in the future, these tags will identify the address space to which every TLB entry belongs. Thus a context switch will not result in the flushing of the TLB – but just changing the tag of the current address space to the tag of the address space of the new task. See also Memory management Paging Page Size Extension (PSE) Virtual address space References External links Virtual Translation Lookaside Buffer Virtual memory Computer memory Central processing unit Memory management
1260665
https://en.wikipedia.org/wiki/List%20of%20codecs
List of codecs
The following is a list of compression formats and related codecs. Audio compression formats Non-compression Linear pulse-code modulation (LPCM, generally only described as PCM) is the format for uncompressed audio in media files and it is also the standard for CD-DA; note that in computers, LPCM is usually stored in container formats such as WAV, AIFF, or AU, or as raw audio format, although not technically necessary. FFmpeg Pulse-density modulation (PDM) Direct Stream Digital (DSD) is standard for Super Audio CD foobar2000 Super Audio CD Decoder (based on MPEG-4 DST reference decoder) FFmpeg (based on dsd2pcm) Pulse-amplitude modulation (PAM) Lossless compression Actively used Most popular Free Lossless Audio Codec (FLAC) libFLAC FFmpeg Apple Lossless Audio Codec (ALAC) Apple QuickTime libalac FFmpeg Apple Music Monkey's Audio (APE) Monkey's Audio SDK FFmpeg (decoder only) OptimFROG (OFR) Tom's verlustfreier Audiokompressor (TAK) TAK SDK FFmpeg (decoder only) WavPack (WV) libwavpack FFmpeg True Audio (TTA) libtta FFmpeg Windows Media Audio Lossless (WMAL) Windows Media Encoder FFmpeg (decoder only) Other DTS-HD Master Audio, also known as DTS++ and DCA XLL libdca (decoder only) FFmpeg (decoder only) Dolby TrueHD Standard for DVD-Audio in Blu-ray (mathematically based on MLP) FFmpeg Meridian Lossless Packing (MLP), also known as Packed PCM (PPCM) Standard for DVD-Audio in DVD FFmpeg MPEG-4 Audio Lossless Coding (MPEG-4 ALS) SSC, DST, ALS and SLS reference software (ISO/IEC 14496-5:2001/Amd.10:2007) FFmpeg (decoding only) MPEG-4 Scalable Lossless Coding (MPEG-4 SLS) Parts of it are used in HD-AAC. SSC, DST, ALS and SLS reference software (ISO/IEC 14496-5:2001/Amd.10:2007) RealAudio Lossless RealPlayer FFmpeg (decoding only) BFDLAC (BFD Lossless Audio Compression). Ongoing development. FXpansion's BFD3 drum software. (2013-2017) Oddball ATRAC Advanced Lossless (AAL) Extremely unpopular FFmpeg (lossy decoder only) Direct Stream Transfer (DST) - Only used for Direct Stream Digital SSC, DST, ALS and SLS reference software (ISO/IEC 14496-5:2001/Amd.10:2007) FFmpeg (decoder only) Original Sound Quality (OSQ) - Only used in WaveLab Discontinued Lossless Audio (LA) – No update for 10+ years Shorten (SHN) – Officially discontinued. libshn FFmpeg (decoding only) Lossless Predictive Audio Compression (LPAC) – Predecessor of MPEG-4 ALS Lossless Transform Audio Compression (LTAC) – Predecessor of LPAC MPEG-1 Audio Layer III HD (mp3HD) – Officially discontinued RK Audio (RKAU) – Officially discontinued Bluetooth lossless aptX Lossless Lossy compression Discrete cosine transform (DCT) Modified discrete cosine transform (MDCT, used in most of the audio codecs listed below) General/Speech hybrid Unified Speech and Audio Coding (USAC, MPEG-D Part 3, ISO/IEC 23003-3) IETF standards: Opus (RFC 6716) based on SILK vocoder and CELT codec libopus FFmpeg (decoding and experimental encoding) IETF Internet Draft IPMR Speech Codec (used by SPIRIT DSP and many others) General Adaptive differential pulse-code modulation (ADPCM, also called adaptive delta pulse-code modulation) Adaptive Transform Acoustic Coding (ATRAC, used in MiniDisc devices) FFmpeg (decoder only) ATSC/ETSI standards: Dolby Digital (AC3, ATSC A/52, ETSI TS 102 366) FFmpeg liba52 (decoder only) Dolby Digital Plus (E-AC-3, ATSC A/52:2012 Annex E, ETSI TS 102 366 Annex E) FFmpeg DTS Coherent Acoustics (DTS, Digital Theatre System Coherent Acoustics, ETSI TS 102 114) FFmpeg libdca (decoder only) Dolby AC-4 (ETSI TS 103 190) Impala Blackbird audio codec ITU standards: G.719 G.722 FFmpeg G.722.1 (subset of Siren7) and G.722.1 Annex C (subset of Siren14) libg722_1 libsiren (part of libmsn and msn-pecan) G.722.2 3GPP TS 26.173 AMR-WB speech Codec (C-source code) reference implementation opencore-amr (decoder) VisualOn AMR-WB encoder FFmpeg (decoding only) EVS MPEG-1 Audio and MPEG-2 Audio layer I (MP1) (MPEG-1, MPEG-2 and non-ISO MPEG-2.5) FFmpeg (decoder only) layer II (MP2) (MPEG-1, MPEG-2 and non-ISO MPEG-2.5) FFmpeg tooLame (encoding only) twoLame (encoding only) layer III (MP3) (MPEG-1, MPEG-2 and non-ISO MPEG-2.5) FFmpeg (decoding only) LAME (encoding only) Advanced Audio Coding (AAC) (MPEG-2 Part 7) FAAC (encoder) and FAAD (decoder) FFmpeg iTunes Nero AAC Codec VisualOn AAC Encoder (a.k.a. libvo_aacenc) Fraunhofer FDK AAC libaacplus MPEG-4 Audio Advanced Audio Coding (AAC, MPEG-4 Part 3 subpart 4), HE-AAC and AAC-LD FAAC, FAAD2 FFmpeg iTunes Nero AAC Codec MPEG-4 AAC reference software (ISO/IEC 14496-5:2001) Harmonic and Individual Lines and Noise (HILN, MPEG-4 Parametric Audio Coding) MPEG-4 reference software (ISO/IEC 14496-5:2001) TwinVQ MPEG-4 reference software (ISO/IEC 14496-5:2001) FFmpeg (decoding only) BSAC (Bit-Sliced Arithmetic Coding) MPEG-4 reference software (ISO/IEC 14496-5:2001) MPEG-H MPEG-H 3D Audio Musepack (a.k.a. MPEGplus) Musepack SV8 Tools FFmpeg (decoding only) NICAM AT&T Perceptual Audio Coder Precision Adaptive Subband Coding (PASC; a variant of MP1; used in Digital Compact Cassette) QDesign (purchased by DTS) QDesign Music Codec used in Apple QuickTime FFmpeg (decoding only) PictureTel (purchased by Polycom) Siren 7 libg722_1 libsiren (part of libmsn and msn-pecan) FFmpeg (decoder only) Siren 14 libg722_1 vgmstream (decoder only) Siren 22 NTT TwinVQ FFmpeg (decoder only) NTT TwinVQ Encoder, NTT TwinVQ Player Voxware MetaSound (a variant of NTT TwinVQ) Windows Media Player (voxmsdec.ax) FFmpeg (decoder only) Vorbis aoTuV FFmpeg libvorbis Tremor (decoder only) Windows Media Audio (WMA) Windows Media Encoder FFmpeg AES3 SMPTE 302M FFmpeg (decoder only) Dolby E FFmpeg (decoder only) Bluetooth Bluetooth Special Interest Group Low Complexity Subband Coding (SBC) BlueZ's SBC library (libsbc) Fluoride Bluetooth stack (successor of BlueDroid) FFmpeg CVSD 8 kHz - used in Hands-Free Profile (HFP) modified SBC (mSBC) - used in Hands-Free Profile (HFP) BlueZ's SBC library (libsbc) Fluoride Bluetooth stack FFmpeg LC3 (Low Complexity Communication Codec) ETSI LC3plus (ETSI TS 103 634) Qualcomm Technologies International (formerly CSR) aptX (a.k.a. apt-X) Qualcomm libaptX FFmpeg aptX HD Qualcomm libaptXHD FFmpeg aptX Low Latency aptX Adaptive FastStream Sony LDAC libldac (encoder only) - used in Android Oreo HWA Alliance/Savitech LHDC HWA encoder/decoder LLAC HWA encoder/decoder HiBy Ultra Audio Transmission (UAT) Samsung Samsung HD/UHQ-BT codec Samsung Scalable codec Digital radio Hybrid Digital Coding - used in HD Radio (a.k.a. NRSC-5) NRSC-5 receiver for rtl-sdr (decoder only) Voice (low bit rate, optimized for speech) Linear predictive coding (LPC, used in most of the speech codecs listed below) Code-excited linear prediction (CELP) Algebraic code-excited linear prediction (ACELP) Xiph.Org Foundation Speex, patent free libspeex FFmpeg (decoder only) Dialogic ADPCM (VOX) FFmpeg (decoder only) ITU standards: G.711 (a-law and μ-law companding; 64kbit/s), also known as PCM of voice frequencies Sun Microsystems's public domain implementation FFmpeg (libavcodec) G.711.0 (G.711 LLC) G.711.1 (Wideband extension for G.711; 64/80/96kbit/s) G.711.1D (Super-wideband extension for G.711.1; 96/112/128kbit/s) G.718 (8/12/16/24/32kbit/s) G.718B (Super-wideband extension for G.718; 28–48kbit/s) G.719 G.721 (superseded by G.726; 32kbit/s) Sun Microsystems's public domain implementation G.722 (SB-ADPCM; 48/56/64kbit/s) FFmpeg G.722B (Super-wideband extension for G.722; 64/80/96kbit/s) G.722.2 (AMR-WB) 3GPP TS 26.173 AMR-WB speech Codec (C-source code) reference implementation opencore-amr (decoder) FFmpeg (decoder only) G.723 (24 and 40 kbit/s DPCM, extension to G.721, superseded by G.726) Sun Microsystems's public domain implementation G.723.1 (MPC-MLQ or ACELP; 5.3/6.3kbit/s) FFmpeg G.726 (ADPCM; 16/24/32/40kbit/s) Sun Microsystems's public domain implementation FFmpeg (libavcodec) G.727 Sun Microsystems's public domain implementation G.728 (LD-CELP; 16kbit/s) G.729 (CS-ACELP; 8kbit/s) FFmpeg (decoder only) G.729a G.729b G.729ab G.729d (6.4kbit/s) FFmpeg (decoder only) G.729e (11.8kbit/s) G.729.1 (G.729 Annex J; Wideband extension for G.711; 8–32kbit/s) G.729.1E (Super-wideband extension for G.729.1) Google internet Speech Audio Codec (iSAC) WebRTC Lyra (codec) - used in Google Duo Nellymoser Asao Codec FFmpeg (libavcodec) PictureTel PT716, PT716plus PictureTel PT724 RTAudio used by Microsoft Live Communication Server SVOPC used by Skype OpenLPC created by Future Dynamics HawkVoice (libHVDI) ANSI/SCTE ANSI/SCTE 24-21 2006 (BroadVoice16) BroadVoice Speech Codec Open Source C Code ANSI/SCTE 24-22 2013 (iLBCv2.0) ANSI/SCTE 24-23 2007 (BroadVoice32) BroadVoice Speech Codec Open Source C Code IETF RFCs: Internet Low Bit Rate Codec (iLBC, RFC 3951) developed by Global IP Solutions/Google WebRTC IETF Internet Draft SILK (used by Skype) CELT (developed by Xiph.Org Foundation) libcelt MPEG-4 Audio MPEG-4 CELP MPEG-4 HVXC Skyphone MPLP Inmarsat INMARSAT-M IMBE Inmarsat Mini-M AMBE Satin (used by Microsoft Teams) Microsoft DirectPlay Those codecs are used by many PC games which use voice chats via Microsoft DirectPlay API. Voxware MetaVoice Windows Media Player (voxmvdec.ax) Truespeech Windows Media Player (tssoft32.acm) FFmpeg (decoder only) MS GSM Windows Media Player (msgsm32.acm) libgsm FFmpeg (decoder only) MS-ADPCM Windows Media Player (msadp32.acm) FFmpeg Digital Voice Recorder International Voice Association (IVA) standards: Digital Speech Standard / Standard Play (DSS-SP) FFmpeg (decoding only) Digital Speech Standard / Quality Play (DSS-QP) Micronas Intermetall SC4 (MI-SC4) Sony LPEC Truespeech Triple Rate CODER (TRC) used in some pocket recorders Mobile phone Generation 2 European Telecommunications Standards Institute (ETSI) GSM Full Rate (GSM 06.10, RPE-LTP) libgsm FFmpeg (decoder only) Half Rate (GSM 06.20, VSELP 5.6kbit/s) Enhanced Full Rate (GSM 06.60, ACELP 12.20kbit/s, compatible with AMR mode AMR_12.20) Telecommunications Industry Association (TIA) IS-95 (a.k.a. cdmaOne) IS-96A (QCELP 8kbit/s) IS-127 (EVRC 8kbit/s) IS-733 (QCELP 13kbit/s) Telecommunications Industry Association (TIA) IS-54/IS-136 (a.k.a. Digital AMPS) IS-85 (VSELP 8kbit/s) IS-641 (ACELP 7.4kbit/s, compatible with AMR mode AMR_7.40) Association of Radio Industries and Businesses (ARIB) RCR STD-27 (PDC) PDC-HR (PSI-CELP 3.45kbit/s) PDC-FR (VSELP 11.2kbit/s) PDC-EFR CS-ACELP 8kbit/s (a.k.a. G.729) PDC-EFR ACELP 6.7kbit/s (compatible with AMR mode AMR_6.70) Generation 3/4 3rd Generation Partnership Project (3GPP) Adaptive Multi-Rate (AMR) AMR-NB 3GPP TS 26.073 AMR speech Codec (C-source code) reference implementation opencore-amr (one may compile ffmpeg with—enable-libopencore-amrnb to incorporate the OpenCORE lib) FFmpeg (by default decoder only, but see above the compiling options to incorporate the OpenCORE lib) AMR-WB 3GPP TS 26.173 AMR-WB speech Codec (C-source code) reference implementation opencore-amr (decoder), from OpenCORE (one may compile ffmpeg with—enable-libopencore-amrwb to incorporate the OpenCORE lib) vo-amrwbenc (encoder), from VisualOn, included in Android (one may compile ffmpeg with—enable-libvo-amrwbenc to incorporate the VisualOn lib) FFmpeg (by default decoder only, but see above the compiling options). AMR-WB+ 3GPP TS 26.273 AMR-WB+ speech Codec (C-source code) reference implementation Enhanced Voice Services (EVS) 3GPP TS.26.443 – Codec for Enhanced Voice Services (EVS) – ANSI C code (floating-point) 3rd Generation Partnership Project 2 (3GPP2) Enhanced Variable Rate Codec (EVRC, a.k.a. IS-127) based on RCELP FFmpeg (decoder only) Enhanced Variable Rate Codec B (EVRC-B) QCELP (Qualcomm Code Excited Linear Prediction) QCELP-8 (a.k.a. SmartRate or IS-96C) FFmpeg (decoder only) QCELP-13 (a.k.a. PureVoice or IS-733) FFmpeg (decoder only) Selectable Mode Vocoder (SMV) Variable Multi Rate – WideBand (VMR-WB) Professional mobile radio APCO Project 25 Phase 2 Enhanced Full-Rate (AMBE+2 4400bit/s with 2800bit/s FEC) Project 25 Phase 2 Half-Rate (AMBE+2 2450bit/s with 1150bit/s FEC) also used in NXDN and DMR mbelib (decoder only) Project 25 Phase 1 Full Rate (IMBE 7200bit/s) mbelib (decoder only) European Telecommunications Standards Institute (ETSI) ETS 300 395-2 (TETRA ACELP 4.6kbit/s) TETRAPOL RPCELP 6kbit/s D-STAR Digital Voice (AMBE 2400bit/s with 1200bit/s FEC) mbelib (decoder only) Professional Digital Trunking System Industry Association (PDT Alliance) standards: NVOC used in China Spirit DSP RALCWI DSPINI SPR Robust TWELP Robust Codec2 libcodec2 RL-CELP (used in Japanese railways) Military U.S. Department of Defense (DoD) Federal Standard: FS-1015 (a.k.a. LPC-10) HawkVoice (libHVDI) FS-1016 (CELP) HawkVoice (libHVDI) FS-1023 (CVSD 12kbit/s) United States Military Standard (MIL-STD) MIL-STD-188 113 (CVSD 16kbit/s and 32kbit/s) SoX (libsox) MIL-STD-3005 (a.k.a. MELP) Texas Instruments' 2.4 kbit/s MELP Proposed Federal Standard speech coder NATO STANAG 4198 (a.k.a. LPC-10e) STANAG-4591 (a.k.a. MELPe) BBN NRV developed in DARPA program Video games Bink Audio, Smacker Audio FFmpeg (decoder only) Actimagine (Nintendo European Research & Development) FastAudio MobiclipDecoder (decoder only) FFmpeg (decoder only) Nintendo GCADPCM (a.k.a. DSP ADPCM or THP ADPCM) - used in GameCube, Wii and Nintendo 3DS. vgmstream (decoder only) VGAudio FFmpeg (decoder only) Sony VAG (a.k.a. Sony PSX ADPCM) vgmstream (decoder only) FFmpeg (decoder only) Sony HEVAG - used in PS Vita. vgmstream (decoder only) Sony ATRAC9 - used in PS4 and PS Vita. VGAudio (decoder only) FFmpeg (decoder only) Microsoft XMA - WMA variants for Xbox 360 hardware decoding. FFmpeg (decoder only) Xbox ADPCM vgmstream (decoder only) CRI ADX ADPCM vgmstream (decoder only) VGAudio FFmpeg CRI HCA/HCA-MX - used in CRI ADX2 middleware. vgmstream (decoder only) VGAudio FFmpeg (decoder only) libcgss HCADecoder (decoder only) FMOD FADPCM vgmstream (decoder only) Text compression formats BiM Continuous Media Markup Language (CMML) MPEG-4 Part 17 (e.g. 3GPP Timed Text) ttyrec Video compression formats Non-compression RGB 4:4:4 (only linear, transfer-converted and bit-reduced also sort of compression up to about 3:1 for HDR) YUV 4:4:4/4:2:2/4:1:1/4:2:0 (all lower 4:4:4 is spatially compressed up to 2:1 for 4:2:0 with specific colour distortions). Intel IYUV 10-bit uncompressed video Composite digital signal - used by SMPTE D-2 and D-3 broadcast digital videocassettes Avid DNxUncompressed V210 Lossless video compression ITU-T/ISO/IEC standards: H.264 lossless x264 (encoder only) FFmpeg (decoder only, uses x264 for encoding) H.265 lossless x265 (encoder only) UHDcode (decoder only, uses x265 to read HEVC encoded files) FFmpeg (decoder only, uses x265 for encoding) Motion JPEG 2000 lossless libopenjpeg JPEG XS lossless FastTICO-XS IETF standards: FFV1 (RFC 9043) FFV1's compression factor is comparable to Motion JPEG 2000, but based on quicker algorithms (allows real-time capture). Written by Michael Niedermayer and published as part of FFmpeg under to GNU LGPL. FFmpeg SMPTE standards: VC-2 HQ lossless (a.k.a. Dirac Pro lossless) libdirac libschroedinger Alparysoft Lossless Video Codec (Alpary) Apple Animation (QuickTime RLE) QuickTime FFmpeg ArithYuv AV1 libaom AVIzlib LCL (VfW codec) MSZH and ZLIB FFmpeg Autodesk Animator Codec (AASC) FFmpeg (decoder only) CamStudio GZIP/LZO FFmpeg (decoder only) Chennai Codec (EVX-2) Dxtory FFmpeg (decoder only) FastCodec Flash Screen Video v1/v2 FFmpeg FM Screen Capture Codec FFmpeg (decoder only) Fraps codec (FPS1) FFmpeg (decoder only) Grass Valley Lossless Grass Valley Codec Option FFmpeg (decoder only) Huffyuv Huffyuv (or HuffYUV) was written by Ben Rudiak-Gould and published under the terms of the GNU GPL as free software, meant to replace uncompressed YCbCr as a video capture format. It uses very little cpu but takes a lot of disk space. See also ffvhuff which is an "FFmpeg" only version of it. FFmpeg IgCodec Intel RLE innoHeim/Rsupport Screen Capture Codec FFmpeg (decoder only) Lagarith A more up-to-date fork of Huffyuv is available as Lagarith Lagarith Codec (VfW codec) FFmpeg (decoder only) LOCO - based on JPEG-LS FFmpeg (decoder only) MagicYUV MagicYUV SDK FFmpeg (decoder only) Microsoft RLE MSU Lossless Video Codec MSU Screen Capture Lossless - based on PNG FFmpeg ScreenPresso (SPV1) FFmpeg (decoder only) ScreenPressor - a successor of MSU Screen Capture Lossless FFmpeg (decoder only) SheerVideo FFmpeg (decoder only) Snow lossless FFmpeg TechSmith Screen Capture Codec (TSCC) EnSharpen Video Codec for QuickTime FFmpeg (decoder only) Toponoky Ut Video Codec Suite libutvideo FFmpeg VBLE FFmpeg (decoder only) VMnc VMware screen codec - used by VMware Workstation FFmpeg (decoder only) VP9 by Google libvpx FFmpeg (decoder only) YULS ZeroCodec FFmpeg (decoder only) ZMBV (Zip Motion Block Video) Codec - used by DOSBox FFmpeg Lossless game codecs DXA ScummVM Tools (encoder only) FFmpeg (decoder only) Lossy compression Discrete cosine transform (DCT, used in Digital Betacam and most of the video codecs listed below) General ITU-T/ISO/IEC standards: H.120 H.261 (a.k.a. Px64) FFmpeg H.261 (libavcodec) Microsoft H.263 MPEG-1 Part 2 (MPEG-1 Video) Elecard MPEG-1 Decoder/Encoder FFmpeg MainConcept MPEG-1 TMPGEnc H.262/MPEG-2 Part 2 (MPEG-2 Video) Canopus ProCoder Cinema Craft Encoder Elecard MPEG-2 Video Decoder/Encoder FFmpeg InterVideo Video Decoder MainConcept MPEG-2 Microsoft H.263 TMPGEnc H.263 FFmpeg H.263 (libavcodec) MPEG-4 Part 2 (MPEG-4 Advanced Simple Profile) 3ivx DivX Elecard MPEG-4 Decoder/Encoder libavcodec HDX4 Nero Digital Xvid H.264/MPEG-4 AVC or MPEG-4 Part 10 (MPEG-4 Advanced Video Coding), approved for Blu-ray CoreAVC (decoder only; limited to below Hi10P profile) Elecard AVC Decoder/Encoder (baseline and main profile) MainConcept Nero Digital QuickTime H.264 Sorenson AVC Pro codec, Sorenson's new implementation OpenH264 (baseline profile only) x264 (encoder only; supports some of Hi422P and Hi444PP features) FFmpeg (decoder only) MPEG-4 AVC variants: MPEG-4 Web Video Coding or MPEG-4 Part 29 a subset of MPEG-4 AVC baseline profile XAVC HEVC (High Efficiency Video Coding, H.265, MPEG-H part 2) x265 (encoder only) Versatile Video Coding (H.266, VVC) VVC Test Model (VTM reference software for VVC; open source) Fraunhofer Versatile Video Decoder (open source; decoder only) Fraunhofer Versatile Video Encoder (open source; encoder only) Video Coding for Browsers (VCB)/VP8 (MPEG-4 Part 31, ISO/IEC 14496-31, RFC 6386) libvpx FFmpeg Internet Video Coding (ISO/IEC 14496-33, MPEG-4 IVC) Essential Video Coding (EVC; MPEG-5 Part 1; under-development) Low Complexity Enhancement Video Coding (LCEVC; MPEG-5 Part 2; under-development) IETF Internet Draft (NETVC) xvc Thor (forms the basis of AV1) SMPTE standards: VC-1 (SMPTE 421M, subset of Windows Media Video) FFmpeg (decoder only) Dirac (SMPTE 2042-1) Schrödinger dirac-research FFmpeg (decoder only) Alliance for Open Media AV1 (AOMedia Video 1) libaom SVT-AV1 rav1e (encoder only) dav1d (decoder only) libgav1 (decoder only) Xiph.Org Foundation Daala (under development, basis (alongside other formats) of AV1) Theora (based on VP3) FFmpeg (decoding only) libtheora Apple Video (Apple RPZA) QuickTime FFmpeg Blackbird FORscene video codec Firebird Original FORscene video codec Digital Video Interactive standards: RTV 2.1 (a.k.a. Indeo 2) FFmpeg (decoder only) PLV (Production Level Video) Indeo 3/4/5 Microsoft Video 1 (MSV1, MS-CRAM, based on MotiVE) Open Media Commons standards: OMS Video (based on H.261) On2 Technologies TrueMotion VP3/VP4, VP5, VP6, VP7; under the name The Duck Corporation: TrueMotion S, TrueMotion 2, TrueMotion RT 2.0 FFmpeg (decoder only) RealVideo 1, G2, 8, 9 and 10 FFmpeg RealMedia HD SDK RealVideo Fractal Codec (a.k.a. Iterated Systems ClearVideo) FFmpeg (decoder only) RealMedia HD (a.k.a. RealVideo 11) RealMedia HD SDK Snow Wavelet Codec Sorenson Video, Sorenson Spark FFmpeg VP9 by Google; VP10 was not released and instead was integrated into AV1 libvpx FFmpeg Windows Media Video (WMV) WAX (Part of the Windows Media Series) FFmpeg Guobiao standards (GB/T) Audio Video Standard (AVS) AVS1-P2 (GB/T 20090.2-2006) - used in China Blue High-definition Disc. FFmpeg (decoding only) AVS1-P7 (AVS-M; under-development) AVS2-P2 (GB/T 33475.2-2016, IEEE 1857.4 (draft)) uAVS2 Encoder xavs2 (encoder only) davs2 (libdavs2; decoder only) AVS3-P2 (draft, IEEE1857.10) uavs3e (encoder only) uavs3d (decoder only) Scalable VP8, VP9, AV1, and H.266/VVC support scalable modes by default. Scalable Video Coding (H.264/SVC; an extension of H.264/MPEG-4 AVC) Scalable High Efficiency Video Coding (SHVC; an extension of H.265/HEVC) Intra-frame-only Motion JPEG FFmpeg Morgan Multimedia M-JPEG Pegasus PICVideo M-JPEG MainConcept M-JPEG ISO/IEC standard Motion JPEG 2000 (ISO/IEC 15444-3, ITU-T T.802) libopenjpeg FFmpeg Morgan Multimedia M-JPEG2000 Morgan Multimedia dcpPlayer (decoder only) JPEG XS (ISO/IEC 21122) Lightweight Low latency video codec intoPIX fastTICO-XS DV (IEC 61834) FFmpeg MPEG-4 SStP (ISO/IEC 14496-2) FFmpeg Motion JPEG XR (ISO/IEC 29199-3, ITU-T T.833) Apple ProRes 422/4444 FFmpeg Apple Intermediate Codec FFmpeg (decoder only) Apple Pixlet FFmpeg (decoder only) AVC-Intra x264 (encoder only) FFmpeg (decoder only) AVC-Ultra a subset of MPEG-4 AVC Hi444PP profile XAVC-I CineForm HD CineForm-SDK developed by GoPro (open source) FFmpeg SMPTE standard VC-2 SMPTE standard (a.k.a. Dirac Pro. SMPTE ST 2042) Schrödinger dirac-research VC-2 Reference Encoder and Decoder developed by BBC (open source) FFmpeg (the encoder only supports VC-2 HQ profile) VC-3 SMPTE standard (SMPTE ST 2019) Avid DNxHD FFmpeg VC-5 SMPTE standard (SMPTE ST 2073; a superset of CineForm HD) Grass Valley HQ/HQA/HQX Grass Valley Codec Option FFmpeg (decoder only) NewTek NT25 NewTek SpeedHQ FFmpeg Stereoscopic 3D Multiview Video Coding Security and surveillance cameras Guobiao standards (GB/T) AVS-S-P2 (suspended) SVAC (GB/T 25724-2010) Infinity CCTV Codec (IMM4/IMM5/IMM6) FFmpeg (IMM4 and IMM5 decoder only) CD-ROM or CD-related video codecs CDXL codec FFmpeg (decoder only) Cinepak (a.k.a. Apple Compact Video) FFmpeg Photo CD codec FFmpeg (decoder only) MotionPixels - used in MovieCD FFmpeg (decoder only) CD+G (CD+Graphics) codec FFmpeg (decoder only) VLC (decoder only) CD+EG (CD+Extended Graphics) codec Network video codecs HEVC-SCC (Screen Content Coding Extensions) ZRLE (RFC 6143 7.7.6) - used by VNC Sun Microsystems's CellB video (RTP playload type 25) Xerox PARC's Network Video (nv; RTP playload type 28) CU-SeeMe video codec GoToMeeting codec FFmpeg (decoder only) Bayer video codecs CinemaDNG (created by Adobe; used in Blackmagic cameras) Redcode RAW (used in RED cameras) a modified version of JPEG 2000 libredcode ArriRaw (used in Arri cameras) Cineform RAW (used in Silicon Imaging cameras) CineForm-SDK Blackmagic RAW (used in Blackmagic cameras) Blackmagic RAW SDK Cintel RAW (used in Cintel Scanner) FFmpeg (decoder only) Apple ProRes RAW intoPIX TICO RAW intoPIX fastTICO-RAW SDK & TICO-RAW FPGA/ASIC libraries Video games Bink Video, Smacker video FFmpeg libavcodec Nintendo Mobiclip video codec FFmpeg (decoder only) CRI Sofdec codec - a MPEG variant with 11-bit DC and color space correction; used in Sofdec middleware CRI P256 - used in Sofdec middleware for Nintendo DS Indeo Video Interactive (aka Indeo 4/5) - used in PC games for Microsoft Windows FFmpeg (decoder only) Intel Indeo Video Real-time Hap/Hap Alpha/Hap Q VIDVOX hap codec FFmpeg DXV Codec Resolume DXV Codec FFmpeg (decoder only) NotchLC FFmpeg (decoder only) VESA Display Stream Compression (DSC) VESA Display Compression-M (VDC-M) See also Open source codecs and containers Comparison of video codecs Comparison of audio coding formats Comparison of container formats Comparison of graphics file formats Comparison of media players RTP audio video profile References External links Subjective codec comparison Audio formats comparison a look at six lossless formats and five lossy formats Video Codecs by FOURCC - fourcc.org, list of codec four digit codes (like DIV3, XVID, ...) Interactive blind listening tests of audio codecs over the internet MediaInfo of different audio codecs and meta-data by them Online Video Format Identification Tool designed primarily for CCTV video formats and codecs Codecs tr:Çözücü listesi
13704655
https://en.wikipedia.org/wiki/Br%C3%BCtal%20Legend
Brütal Legend
Brütal Legend is an action-adventure video game with real-time strategy game elements created by Double Fine and published by Electronic Arts for the PlayStation 3 and Xbox 360. The game was released during October 2009 in North America, Europe, and Australia. Though Brütal Legend was originally to be published by Vivendi Games prior to its merger with Activision, Activision dropped the game from its portfolio after the merger. It was later picked up by Electronic Arts, though Activision and Double Fine brought counter-lawsuits against each other over publishing issues. The issues were settled out of court. Later, Double Fine announced a port of the game for Microsoft Windows via Steam, which was released in February 2013. Mac OS X and Linux versions of the game were made available as part of the Humble Bundle in May 2013. A physical collector's edition for Windows, Mac OS X, and Linux was released by IndieBox in October 2014. Tim Schafer, the game's creative director, was inspired to create the game by his own past musical experiences. The game features the character of Eddie Riggs, voiced by and modeled after Jack Black, a roadie who is transported to a fantasy world inspired by the artwork of heavy metal album covers. Eddie becomes the world's savior, leading the down-trodden humans against a range of supernatural overlords using a battle axe, his Flying V guitar that can tap into the magical powers of the world, and a customizable hot rod. The game, a hybrid of the action-adventure and real-time strategy genres, includes Stage Battles in both the single-player and multiplayer mode, where the player must command troops to defeat their foes while defending their own stage. In addition to Black, the game features voices of heavy metal musicians including Lemmy Kilmister, Rob Halford, Ozzy Osbourne and Lita Ford and other celebrities such as Tim Curry, as well as more than one hundred metal songs selected by Schafer for inclusion in the game. Brütal Legend was generally well received by game reviewers, praising Schafer's vision and writing of the heavy metal-inspired world, and the performances of the voice cast, particularly Black and Osbourne. Some felt that the hybrid gameplay of action and real-time strategy games did not mix well, however, blaming console control limitations and missing features normally found in games of either genre. Gameplay Brütal Legend is a third person action-adventure game incorporating real time strategy elements. The game uses an open world that Tim Schafer has described as being approximately in area. The player controls the protagonist Eddie Riggs, a roadie who one day finds himself transported into a heavy metal-themed fantasy world. Eddie acquires three tools that are used for combat and transportation: a broad axe called "The Separator", his Flying V guitar "Clementine" from his own world which has the ability to cast magic spells in the heavy metal world, and a hot rod that Eddie builds called "The Druid Plow", a.k.a. "The Deuce". Spells, referred to as "Solos", from Clementine are performed by playing a minigame akin to the note-matching aspect of Guitar Hero or Rock Band over a brief guitar riff; however, Eddie cannot use the metal generated by Clementine constantly, as prolonged usage of the guitar will cause it to overheat, and the player will have to wait for a cool-off period before using the guitar's power again. Eddie may also find more solos hidden throughout the world, ranging from support to offensive spells. The player can spend in-game currency called "Fire Tributes", earned from completing missions, at the Motor Forge to gain new abilities and upgrades for each tool. These tools can be used in combination with each other to take out Eddie's foes; for example, the player can use his guitar Clementine to create pyrotechnics to launch a foe into the air and follow up by attack it with the Separator axe. In a case of a specific boss fight, the player must use the Deuce hot rod to lure the boss to a spiked gate held up by counterweights, and then play the "Earthshaker" move on Clementine to destroy the weights and sever the creature's head. Within the open world, the player can use a map and the Deuce's turn signals to guide them towards either story-advancing missions or side missions. Side missions include hot-rod races against a demon, defending Eddie's allies from a pending attack, or helping a cannon operator spot his targets. There are about 23 main missions in the story with 30 side missions that the player can optionally take. The player can also explore the game's world to find statues bound in leather or chains that can be freed to gain a health boost for Eddie or to reveal part of the game's backstory, and can look through special telescopes at vistas or complete certain jumps to earn additional Fire Tributes. The player can also find monuments they can raise that unlock an additional heavy metal song from the game's soundtrack that can be played on the Deuce's radio, "The Mouth of Metal"; the player can further customize its set list with songs they have been rewarded with or have collected. Several main story missions of the game are Stage Battles based on real time strategy elements. The player, while still in control of Eddie, is required to defend a giant stage where new allies will spawn, holding out until a specific objective is completed. The player creates an army for attacks by building merchandise booths on "fan geysers" through Clementine's magic. Once enough fans are collected, the player can summon different allies, each consuming a specific number of fans, or upgrade their stage to allow them to produce more powerful allies. A character known as Mangus acts as the "sound guy" to help in the construction of these units and stage upgrades, and also warns the player of enemy attacks. Once the player has gathered their army, they can then seek out and attack their opponents. Eddie is able to control the entire army to follow, attack, or defend a point, and can use specialized squads of specific units to perform certain tasks, such as having a group of headbangers use their headbanging to destroy statues. The player can also use Eddie directly in combat during these battles. Ultimately, Eddie transforms into a winged demon who can fly above the battlefields to issue orders or lay out attacks. Spells in Eddie's arsenal can help control the performance of his armies, such as temporarily boosting their attack skills or creating a rally flag which troops will gather at, while others hinder the performance of the enemy faction by removing enemy buffs or preventing the creation of enemy units for a short time. Each of the different units, including special allies that Eddie meets in the game, has a special co-op move they can perform with Eddie; for example, Eddie's first ally, Ophelia, can be tossed at foes by Eddie in the style of the Fastball Special. These co-op moves are also available outside of Stage Battle missions. The game has a multiplayer mode, described by Schafer as "your typical head-to-head, battle of the bands scenario. But with axes." The multiplayer modes are team-based and play in the same manner as the single-player Stage Battles, with team sizes from one-versus-one to four-versus-four. Each team selects from one of three factions which affect what resources and troops they can summon, and are tasked with defending their stage from attack by the other team. The three factions available are Ironheade, mostly human-based troops visually inspired by classic Heavy Metal led by Eddie Riggs; The Drowning Doom, with more Goth/Black Metal undead led by Drowned Ophelia; and The Tainted Coil, evil Industrial Metal BDSM/religion-themed demons controlled by Doviculus. Each player controls a single main avatar who has the same abilities as in the main game for combat and magic spells and can also fly about the map, but also is in control of troops that they may summon from the team's shared resources—fans as generated by fan geysers across the map. Different types of troops are available, costing various numbers of fans to summon, with the potential to upgrade to improved units through different routes. The number and types of troops that can be summoned is limited by a cap to prevent either team from becoming too overpowered. All of the troops can be engaged by the player to initiate various "Double Team" moves as with the single player game. The game can also be played by a single player with computer-controller opponents at one of five difficulty levels. Synopsis Characters Brütal Legend follows the story of Eddie Riggs (voiced by Jack Black), who is "the world's best roadie" for "the world's worst 'heavy metal' band", Kabbage Boy. Much of the game takes place in an unnamed world inspired by heavy metal music, created by, according to the game's mythology, Ormagöden, The Eternal Firebeast, Cremator of the Sky, and Destroyer of the Ancient World. In this alternate world, the human race is enslaved by a race of demons, led by Doviculus, Emperor of the Tainted Coil, (voiced by Tim Curry). Doviculus is assisted by his glam metal human minion, General Lionwhyte (voiced by Rob Halford and based on David Bowie with the name being an allusion to glammetal band White Lion) whose hair is so big "and luscious" that he uses it to fly, flapping it like a pair of broad wings. Leading the fight against Doviculus are a small band of human resistance fighters with whom Eddie joins forces: Lars Halford (voiced by Zach Hanks), his sister Lita (voiced by Kath Soucie), and Ophelia (voiced by Jennifer Hale), whom Eddie takes a romantic interest in. Their group is later joined by the stage manager Mangus (Alex Fernandez), the bass-playing healer Kill Master (voiced by, and patterned after Lemmy Kilmister), the motorcycle-riding Fire Baron (also voiced by Halford, as well as visually inspired by him too), and the Amazonian Rima (voiced by Lita Ford and based on KISS characters). Also supporting Eddie is the Guardian of Metal (voiced by Ozzy Osbourne, who also lent his appearance to the character) that assists in upgrading his equipment. Plot During a gig for Kabbage Boy, Eddie is crushed by falling scenery while trying to save a member of the band; his blood lands on his belt buckle, in reality an amulet for Ormagöden. The stage is transformed into Ormagöden, who kills the band and takes the unconscious Eddie to the heavy metal world. Awaking in the Temple of Ormagöden, Eddie meets with Ophelia while fighting Doviculus' forces, developing a crush on her. They discover writings left by the Titans that Eddie is able to comprehend, and build a hot-rod, the "Deuce", that they use to escape the Temple and travel to Bladehenge, the base for the small human resistance force led by Lars and Lita. When they meet Eddie and learn he can understand the Titans' messages, they see him as a prophetical "Chosen One", though a 'dispute about the translation' leaves them unsure if he will be the savior or destroyer of the world. Ophelia also becomes concerned when Eddie, in the heat of battle, transforms into a winged creature, an effect Eddie decides to use to his advantage at the time. Eddie helps Lars, Lita, and Ophelia create an army, named "Ironheade" to fight against General Lionwhyte. They successfully raid Lionwhyte's "Pleasure Tower" and defeat him. However, as they celebrate, Doviculus arrives, sending the group into hiding. Doviculus is aware of the presence of his spy "Succoria" by the smell of her blood as it was at the Temple; Eddie and his allies come to believe Ophelia is Doviculus' spy. Lars leaves his hiding spot to face Doviculus, but is quickly killed. As the Tainted Coil destroy the tower, Ironheade escapes into the nearby mountains; Eddie is forced to leave with Lita leaving Ophelia behind despite their shared love. Heartbroken, Ophelia is drawn toward the Sea of Black Tears, cursed waters that grant humans supernatural abilities at the cost of humanity. After leaping into the black waters, the Sea creates Drowned Ophelia, a dark doppelganger of Ophelia, who raises an army of other Black Tear-corrupted humans, the goth "Drowning Doom". After three months, she leads an attack on Ironheade's mountain camp. Though Ironheade defeats the assault, Eddie determines they must destroy the Sea to end her threat. As they travel through exotic lands and find more allies out of the pyromanical Fire Barons and the amazonian Zaulia tribe, they come across evidence of Eddie's father, the hero known as Riggnarok in this time. It tells that Riggnarok traveled to the future to attempt to learn the secrets of the Titans to bring back to the past in the humans' ongoing fight against the demons, but never returned. With their new allies, Ironheade manages to push the Drowning Doom back towards the Sea of Black Tears; defeated, Ophelia denies Eddie's belief that she is Doviculus' spy, again claiming that Eddie's the traitor. As they argue, Doviculus arrives and confirms that Succoria is not Ophelia, but Eddie's mother. In the past, Succoria, an even more vicious demon empress, also sought the Titans' secrets in the future. However, after discovering that humans eventually become the dominant species, Succoria fell into a deep despair. Riggnarok, who had followed Succoria through time to assassinate her, took pity on her in her misery, and the two fell in love and bore Eddie. Now in the past, Eddie's demon nature has borne out, and has also inadvertently revealed the Titans' secrets to Doviculus as well. Having no more use for Ophelia, Doviculus rips out her heart, taking her powers alongside his own and causing Ophelia to dissipate. While Ironheade battles Doviculus' forces, Eddie engages Doviculus in a one-on-one confrontation, which ends with the demon emperor's decapitation. As Eddie escapes the Sea, he recovers Ophelia's heart from Doviculus, containing his mother's necklace he gave her when they first met, and then proceeds to rescue the real Ophelia from the ocean floor. Ashore, they rekindle their love as Ironheade celebrates their victory over Doviculus and the Tainted Coil. Back at Bladehenge, a statue to Lars is erected, while Lita continues to lead the troops against the remaining demons. Eddie insists on maintaining his "roadie" presence, staying behind the scenes and making others look good. After he promises he is not leaving to his assembled friends, Eddie takes off to complete a few errands, with Ophelia watching as he drives off into the sunset, shedding a single black tear. Development Creator Tim Schafer has said that he has been a heavy metal music fan since high school, and roadies have long fascinated him. As Schafer said in 2007, "The name was one of the very first things I thought of, over fifteen years ago. I was riding a bus, thinking about a game that would be the complete opposite of what we were working on, The Secret of Monkey Island [a Lucasfilm Games title released in 1990]. And Brütal Legend leapt into my head. I've been hanging on to that name ever since." The title, which he describes as sounding "like the hardest core fantasy thing out there", makes use of the metal umlaut. The idea behind the game first came to Schafer about fifteen years prior to its release, but its core concepts did not completely come together until after the completion of Psychonauts (2005); when he presented his idea for the game to the team, they became excited at the concept and decided to make that their next title. Part of the game's inspiration came from the fantasy worlds that the lyrics and album covers of metal bands implied but rarely made it to music videos, thus allowing Brütal Legend to "fulfill the promise" of such lore. Schafer also credits a Megadeth roadie named Tony he once met as having given him the idea to make a game about a roadie, with the character of Eddie Riggs becoming a re-imagined version of him. Schafer had previously explored the idea of a roadie sent back in time with the character of Hoagie from Day of the Tentacle, but Brütal Legend represented an opportunity to expand on it further. The 2003 movie School of Rock also reminded Schafer of his idea for Brütal Legend, and made him more excited to publish it. Double Fine's philosophy on game development was also another reason for Brütal Legends creation, as Schafer has stated that his team attempts to make each game radically different from the company's previous release, contrasting Brütal Legend to Psychonauts. Schafer stated that the commercial tie-ins of Brütal Legend, such as "hot babes and Jack Black", is due to this philosophy and not due to market pressures. Schafer was not concerned about the commercial success of Brütal Legend, as despite poor sales of Psychonauts, "as long as you make a cool game, publishers want to talk to you". When Schafer was pitching the game before 2006, he received feedback about changing the game's style to hip hop or country. He credits Harmonix Music Systems for influencing the rhythm game market through the release of the widely successful Guitar Hero with a soundtrack that heavily emphasized metal music; with the popularity of Guitar Hero, the metal approach in Brütal Legend was readily accepted. Schafer has pointed out that there are music term inspired attacks, such as a "Face-Melting" guitar solo, which literally will melt the foe's faces off. The metal/motorcyclist lifestyles and Norse mythology also inspired the game's open-world environments, such as amps carved into the face of a mountain, a forest where tires replace leaves, giant axes and swords piercing the ground, spandex covered temples, and mining facilities where human slaves excavated car and motorcycle parts. However, Schafer noted that they attempted to make sure that non-metal fans would be able to get the jokes as well. Art design The art style for the game was based on the work of Frank Frazetta and inspired by heavy metal and rock album covers. The team only considered the addition of elements to the artwork if they felt it would be something that could be seen on such covers. The setting includes hot rod-like engines that grow from the earth like a "V8 Truffle Of Speed", with design inspired by the designs of Ed "Big Daddy" Roth. The art team wanted to avoid creating "another brown-gray game", and strove to use the wide color palettes that are associated with heavy metal art. Cutscenes in the game use the game's engine, though some pre-recorded scenes from the engine have also been prepared with the help of Tasha Harris, a former Pixar employee who helped to animate character's faces during cutscenes. The game features over 80 unique characters in addition to the main protagonist, Eddie Riggs. Initial designs for Riggs was modeled after Lemmy Kilmister, and though the model was changed, the signature vest, tour pass and cigarette of the character remained part of the character design. As the character continued to develop, they began to add more aspects of Black's character, an "enthusiastic fan" of music, from School of Rock. Ultimately, Riggs' design came to become half Jack Black and half Glenn Danzig. The art team was able to use videos of Black's performances to add additional features to the character, such as "all his crazy eyebrow stuff he does". General Lionwhyte, who has "fabulous hair", and his minions are based on the glam metal fad of the 1980s which displaced heavy metal to the disappointment of Schafer and other development team members, and became the opponents of the game. To help create a more mature game with concepts that could be used to pitch the game, the art team created several factions that represented different parts of the heavy metal experience. Each faction had their own "exaggerated, simplified shapes and strong silhouettes" as to help distinguish each faction while also reducing the development costs. Inspirations for such factions include Nordic imagery, goth metal, and the artwork of Hieronymus Bosch. Additional characters include headbangers, "gravediggers", and "battle nuns". As the game features over two hours of spoken dialog, the art team wants to make the characters' faces and performances stand out, creating "clean, easy-to-read faces". The team had to change from their initial cartoony textures into more detailed ones that stood out on high-definition displays while exaggerating other features of the characters. The user interface and menus were created by Joe Kowalski, who had previously worked on similar game elements for Guitar Hero, Guitar Hero II, and the Rock Band series. Much of the game's interface elements used a medieval woodcut art style, and were designed to contrast well against the world's graphics. The introductory menu is presented as an interactive movie created from live action clips of Jack Black manipulating a prop gatefold vinyl record album, using Adobe After Effects to provide the on-screen text, controls handling, and stitching of separate scenes into a seamless movie. Characters and voice acting Brütal Legend includes over 35,000 lines of spoken dialog, mostly written by Schafer. In addition to Black, Lemmy, Judas Priest's Rob Halford, The Runaways' Lita Ford, and Ozzy Osbourne provide character voices for these lines. Schafer's original vision for the game had not anticipated a celebrity cast. In particular, though Eddie came to resemble Black, the team had not planned on having Jack Black voice the character. After learning that Black was a fan of Schafer's previous game, Psychonauts, they met with the actor/musician and recognized he was an avid gamer and metal fan and understood all the choices the team made in the game, and subsequently signed on for the voice work. Black also performed live-action sequences as himself used for the in-game menu screens and additional promotional material. Once Black had signed up for the project, Schafer found that other artists and people involved in the heavy metal scene became very interested in participating through a domino effect and word of mouth, allowing Schafer to sign them on as voice talent or as part of the game's soundtrack. Lemmy was brought on board to play The Kill Master after Schafer and his team had developed the character's role in the story who assists Eddie by healing his allies through a giant bass harp on the back of a chopper. The original character, a man with a top hat and beard, was considered out of place by Schafer, leading him to consider famous bass guitar players and quickly recognizing the need to have Lemmy play that role. Halford plays two characters, General Lionwhyte and The Baron. Schafer had selected Lionwhyte to capture Halford's ability to scream, and found his abilities in the studio beyond what they expected. They created The Baron character specifically for Halford, as while Lionwhyte was considered a "heavy metal Stewie [from Family Guy]", that character was the complete opposite of Halford, while The Baron captures both Halford and Judas Priest's attitude. Lita Ford voices Rima, queen of a group of "Amazon-like jungle women"; Schafer considered the similarities between the lack of clothing that Rima was designed with and Ford's outfits from the 1980s, staying true to the development teams' memories of her. Osbourne plays The Guardian of Metal who helps the player upgrade their equipment; Schafer commented that both the character and Osbourne, while dark and brooding, are "really upbeat" and "optimistic". Though Ronnie James Dio of the band Dio had performed parts for the game, his role was replaced with voice work from Tim Curry. While the change was speculated to be due to tense issues between Osbourne and Dio, Schafer noted that as Dio's intended character, "Doviculus, Emperor of the Tainted Coil", grew, they found that Curry fit the role better for the part, citing Curry's role of the Lord of Darkness in the film Legend as a key factor; Schafer would also later state that Dio's part was cut due to a combination of "really complicated reasons" and other circumstances outside their control. Curry considered the role "perfect" for him when Schafer described Doviculus to him as "big and tough, but also has this kinky side who, when hit with an ax, might scream in pain or squeal with delight". Similar to their experience with bringing Black onto the project, obtaining the voicework of the metal artists were also unexpected but beneficial. This led to some confusion during voice recording sessions; both Lita Ford and Rob Halford had difficulties with lines involving a character named "Lita Halford". Furthermore, both Black and Osbourne frequently injected profanity into their scripted lines during recording sessions. Instead of rerecording these, the development left these in the game, but included the option for a profanity content filter to be enabled by the player to "bleep" out these words and mask such word on screen using the Parents Music Resource Center "Parental Advisory" label, an icon that Schafer considered to be part of the history of heavy metal. A similar filter exists for gore in the game, preventing any dismemberment and disabling blood in the game. Schafer stated the filters were added to the game in consideration of older players that may not wish to see such aspects, or for parents who opt to play the game with younger children. During development, Schafer stated that while he could not confirm what other musicians and bands would be in the game, there would be more than already stated, and that these musicians were "especially conducive to character creation" due to the amount of theatrics used in their concert shows. Kyle Gass, Black's collaborator with Tenacious D, voices and lends his facial likeness to a neurotic cannon operator in the game. Comedians David Cross, Steve Agee, Brian Posehn, and actor Wil Wheaton have also provided voice work for the game; Posehn had previously worked with Schafer on their high school newspaper. David Sobolov was also confirmed as a voice actor for other roles in the game; Sobolov noted that he recorded his lines separate from Black's despite his characters' having direct interaction with Riggs. Richard Horvitz, who voiced protagonist Raz in Schafer's previous game, Psychonauts, cameos as the lead guitarist of Kabbage Boy and as a car-lift operator that assigns Eddie certain side missions. Further voice acting work has been provided by veteran video game actors such as Zach Hanks, Kath Soucie, Dino Andrade and Jennifer Hale. Development history According to Schafer, Brütal Legend had been in development since 2007, prior to the completion of Psychonauts. Schafer noted that in Psychonauts, they attempted to bring together a lot of assets, including characters and environments, but were not able to successfully integrate them on their first attempt and had to start over on the development of some. In several cases for Psychonauts, changes made in gameplay required them to return and redesign levels to account for the new features. The company decided at the start to use the scrum development approach for Brütal Legend, which they found worked well with their company's culture, allowing them to quickly arrive at playable targets at every milestone. For example, the team was able to bring about their terrain engine, renderer, and a playable Eddie Riggs within a month of development, and by the third month, the ability for Eddie to drive about the terrain, running over hordes of enemies. Schafer stated that they began the development with the character of Eddie, and recognizing what he should be doing in the game—specifically, swinging around his axe, playing his guitar, and driving his hot rod. Once they found this combination of elements to work well in combat and general gameplay, they were able to expand out the rest of the game from there, as these elements provided a means of testing the game to make sure it remained enjoyable. The first major feature developed for the game was the multiplayer element, given that no previous game from Double Fine had included this feature, and was the highest risk element to the game. The multiplayer gameplay itself was inspired by older strategy games, in particular, 1989's Herzog Zwei; in this game, the player controlled a transforming aircraft mecha that would normally fly about the field to issue orders for constructing new units, airlifting units to other areas, and directing combat, but the player could opt to transform the craft into a giant robot and engage directly in combat. For Brütal Legend, Schafer kept the same concept of a split-mode RTS, but wanted more focus on the ground combat; instead of spending 90% of the time controlling units as in Zwei, the player would only spend about 30% in this fashion within Brütal Legend. This subsequently led to much of the action and combat-driven gameplay outside of the stage battles. In a 2015 interview, Schafer said that much of the gameplay outside of stage battles were to provide tutorials for the Stage Battles, and to make the game more of an action-adventure than an RTS to avoid the stigma that impacts sales of RTS games. This caused the production to expand considerably around the merger of Vivendi-Activision, and Double Fine had difficulties convincing the new publishers to fund the expanded game. The team used Unreal Engine 2.5 to build and test prototypes of the real-time strategy elements, allowing the designers and gameplay programmers to commence work while another team focused on creating a new game engine. Having completed the multiplayer stage battle portion of the game first, Double Fine found it easy to gradually introduce the player to its more advanced aspects during the single-player campaign. The game-world's large size and varied content necessitated a game engine with streaming capabilities, allowing the game to seamlessly load and unload content as needed — this was also something the team had no prior experience with. Double Fine developed several in-house tools to help streamline the content-creation process for the game's world: an automated testing bot, RoBert (so named after one of the test engineers), was created to put daily builds of the game through continuous and rigorous testing, automatically reporting any errors to developers, while the Multi-User-Editor allowed the game's artists to simultaneously work on the game-world without fear of overwriting each other's work. The team ran into content management issues late in the game's development as more of the game's assets neared completion. Within the span of a few months the combined asset size tripled, endangering the game's ability to fit on a DVD and causing performance problems throughout the company's development systems. With the help of the engineering team, they were eventually able to overcome the performance issues and re-optimize the content for space. With the popularity of the Guitar Hero and Rock Band franchises, many wondered if Brütal Legend would take advantage of these games' guitar-themed controllers. Schafer mentioned that while he had entertained the idea, he could not find an acceptable way for players to repeatedly switch between standard and guitar controllers, so he abandoned it. Players who preordered the game through GameStop were able to unlock a special promotional in-game guitar designed in conjunction with Jack Black's band Tenacious D, and includes voices provided by both Black and Kyle Gass. While Brütal Legends fate was unclear, Schafer was not able to talk about the project to avoid causing problems with any potential business deals, until EA Partners picked up the game in December 2008. However, even when the fate of the publication of the game was unsure, the team continued to work on its development. Schafer reflected that the time spent during development without a publisher was beneficial, allowing them to design the game without pressure from the publisher's goals. EA CEO John Riccitiello, when asked about EA picking up Brütal Legend for distribution prior to December 2008, commented that "Sometimes significant creative risks end up being some of the world’s best products". Other platforms When rumors of a possible Wii port arose in March 2009, Schafer stated that "We are making an Xbox 360 and a PS3 version of Brütal Legend." However, according to Ben Fritz at Variety, another studio has been engaged by Electronic Arts to bring the game to the Wii, albeit at a later date than the other console versions, suggesting that it may follow the same model as Dead Space: Extraction, a Wii title scheduled to be released about a year after Dead Space'''s first release. However, further industry rumors, which claimed that the Wii version was being done by Electronic Arts in-house, have stated that the effort to port the game to the Wii has been canceled due to quality and technical concerns. Initially after its release, Double Fine had not planned on a PC version of the game, as Schafer has stated that the game is primarily an action game and "meant to be on a console". However, in February 2013, Double Fine announced that a Windows version of the game will be released on February 26, 2013. The Windows port has been updated for higher resolutions of modern computers, and includes both DLC packs released for consoles. The multiplayer aspects of the PC version include a number of tweaks that Double Fine had tracked that they wanted to have made to the console version but could not do; while the full list of changes are not expected to be present in the initial PC release, Schafer has stated that if sales of the PC version are successful, they will look at adding new units, factions, and gameplay modes that they had originally scoped out for the console version. Mac and Linux ports were released in May 2013, premiering as part of the Humble Double Fine Bundle. Sequel Double Fine believed they were given the go-ahead to develop a sequel to Brütal Legend after the game's release, and had invested a great deal of development time towards this, but were later told by EA that it was cancelled. Schafer stated that the sequel would likely incorporate much of what they had to drop prior to the game's release. This game world would have been three times larger than what Brütal Legend contained. The sequel would have likely included a fourth faction that was cut from the original game which would have been the last major group the player would have to fight through, including a major boss character, before the final battles with Doviculus. Schafer further noted that at the end of the original game, Doviculus' head falls into the Sea of Black Tears, and implied that the same effect that the Sea had on Ophelia could happen to Doviculus. Schafer also had ideas for a plot using a character voiced by Ronnie James Dio, but will not likely be used due to Dio's death. The cancellation of the sequel nearly ruined Double Fine, as they had invested all current efforts toward the title. Instead of a sequel, Double Fine began work on four smaller projects, Costume Quest, Stacking, Iron Brigade (formerly titled Trenched) and Sesame Street: Once Upon a Monster, based on prototypes they had created from "Amnesia Fortnights" during the development period where they had lacked a publisher. In these two-weeks sessions, the Double Fine team was split into four groups and each tasked with creating a small prototype game to share with the rest of the company; all four mini-games were well received internally. Upon hearing of the cancellation of the sequel, Schafer and his team began to promote these games around, and were able to obtain publishing deals for all four titles. The games will be able to take advantage of the custom game world engine and other assets they had created for Brütal Legend. The titles were considered financial successes, allowing Double Fine to recover and pursue further game development though steering away from major AAA releases. As of 2013, Schafer is still interested in a sequel to Brütal Legend, but would require appropriate funding and resources to make it happen as an independent developer. Since then, Double Fine launched a successful crowd-funded drive for Psychonauts 2 in December 2015; Schafer said that if that game does well, there is a good chance that a sequel to Brütal Legend would be possible. Tim Schafer said June 13 during an appearance at E3 2017 that Brütal Legend will eventually get a sequel. Publishing issuesBrütal Legend was originally to be published by Vivendi Games' subsidiary Sierra Entertainment. In 2008, Activision merged with Vivendi's game division (which included Blizzard Entertainment) to become Activision Blizzard, gaining the rights to publication of Brütal Legend. Upon evaluation of their assets, Activision Blizzard chose to drop Brütal Legend along with several other games, leaving the project in limbo. Activision CEO Robert Kotick later claimed the reason for dropping the project was due to: the project running late; missing milestones; overspending the budget and not looking like a good game. Double Fine themselves were unaware that Activision had chosen to drop the game, having been informed through an Activision press release that omitted the game from their upcoming release schedule, according to studio producer Caroline Esmurdoc. Industry rumors suggested that Electronic Arts was interested in publishing the property, and it was confirmed in December 2008 that Electronic Arts would publish the game. During the period when Brütal Legends fate was unclear, Schafer was not able to talk about the project to avoid causing problems with any potential business deals. In February 2009, Activision Blizzard had asserted that the Electronic Arts deal was invalid, believing that they were still in negotiations with Double Fine to publish the game. It was believed that Activision was seeking monetary compensation in a similar manner as it received from Atari for Ghostbusters: The Video Game and The Chronicles of Riddick: Assault on Dark Athena, games that were dropped when Activision Blizzard re-evaluated their assets. On June 4, 2009, Activision filed suit to prevent publishing of the game, claiming that they had invested $15 million in the title and still had a valid contract to release the game. Activision's suit also contends that Double Fine had missed a deadline for the game last year, requesting more time and an additional $7 million in development fees. Activision's considers both the loss of the money they spent on the game as well as potential sales and Brütal Legend-related merchandise as part of the harm done in the lawsuit. In July 2009, Double Fine issued a countersuit against Activision, citing that the latter company had abandoned the project before, and was trying to harm Brütal Legend during its critical marketing phase, as well as trying to protect its Guitar Hero franchise. The countersuit stated that Activision had dropped the game after its merger with Vivendi and a failed attempt to convert the game into a Guitar Hero sequel. Schafer was infamously quoted as saying, in commenting on their actions, "Hey, if Activision liked it, then they should have put a ring on it. Oh great, now Beyonce is going to sue me too." In late July, the presiding judge, Los Angeles Superior Court Judge Craig Karlan, reported that a preliminary ruling that could have affected the game's release would have been given on August 6, 2009, with Karlan tentatively ready to deny Activision's motion to delay the game. However, prior to the ruling, the companies announced they had reached an out-of-court settlement on the lawsuits, though details were not available. Though most of the developers involved in the game were shielded from the effects of the lawsuit, Double Fine's Caroline Esmurdoc noted that it took a significant toll on Schafer and the other lead executives at the company. Activision's lawsuit had been filed at the time the game had reached the alpha release state, and would need to be concluded prior to the game's final release; this required the executives to dedicate their time towards information gathering, interviewing, and other legal matters "during the crunchiest, most critical time of development". As such, while they ultimately were able to settle the legal matter, Esmurdoc believed that the impact of the effort in settling the lawsuit impacted the quality of the final product. Schafer wrote more than 50% of the game's dialog in the few months following the completion of the lawsuit and prior to release, a "big crunch" for him. Downloadable content Schafer, prior to the game's release, stated that Double Fine had "something awesome" planned for downloadable content to further support the game after release. Two downloadable packs have since been released. The first, "Tears of the Hextadon", was released in early November 2009, containing two new multiplayer maps and a new single-player weapon. The pack was initially free on the PlayStation Network for the first two weeks of release. The second pack, "The Hammer of Infinite Fate", was released in mid-December 2009, and in addition to new multiplayer maps, expands the single-player experience by incorporating new weaponry for the Deuce, outfits for Eddie, a GPS system to track collectibles in the game's world, and other additional content, including figureheads of Razputin, the lead character from Psychonauts, and Schafer himself. MarketingBrütal Legend was announced in October 2007 through a feature article in Game Informer; gaming journalists had received a vinyl record from Activision that contained a backwards message alluding to the game's story. The game's release in October 2009 was promoted as "Rocktober" in official literature about the game from Electronic Arts. At the 2009 Download Festival in Donington Park in England, Electronic Arts arranged for 440 fans of Brütal Legend to help to break the Guinness World Record for the largest number of air guitar players, all simultaneously playing to "Ace of Spades" by Motörhead. A series of short online videos featuring Black (and Schafer in two instances), entitled "Brutal Thoughts with Jack Black", have been used to promote the game since May 2009. At the 2009 Video Music Awards, Black appeared in cosplay as Eddie to promote the game. A promotional concert for the game was held at the 2009 Comic-Con International Convention in July 2009, and featured the metal artists Gwar, 3 Inches of Blood, Unholy Pink, and Keith Morris. It has also been announced that Brutal Legend was the official sponsor of the 2009 Mastodon/Dethklok tour. Schafer appeared on Late Night with Jimmy Fallon on October 2, 2009 to promote the game. Black appeared on Jimmy Kimmel Live! on October 14, 2009, dressed as Eddie Riggs and staying in character during his interview. A demo version of the game was made available on the Xbox 360 Marketplace and PlayStation Network Store; it was available for a limited time on September 17, 2009 for North American users who had pre-ordered the product through GameStop. The demo became available to all Xbox Live Gold users on September 24, 2009, and to Xbox Live Silver users and all PlayStation 3 users the following week. The demo is based on the game's beginning, showing Eddie's arrival and his encounters up until the first boss character fight. SoundtrackBrütal Legend features 107 heavy metal tracks from 75 different bands, selected by Schafer and Music Director Emily Ridgway, each song being a "completely sincere choice" by Schafer and Ridgway, with the whole track list being "designed to be loved by Metal fans." Schafer sought to include songs from most main subgenres of metal, including classic heavy metal, industrial metal, black metal, and doom metal, with each faction in the game favoring a specific type. Though Schafer and others on the Double Fine team had vast knowledge of specific types of metal, Ridgway turned to a used-CD store owner named Allan from Aquarius Records who had "encyclopedic knowledge" of the entire genre, and who provided the team with sample CDs to help them discover some of the more obscure metal bands. Schafer had identified many of the more well-known songs on the list, while Ridgway was able to locate mission-appropriate, more obscure titles for inclusion; for example, one mission, given by the Killmaster (voiced by Lemmy Kilmister), involves rescuing female troops for Ironheade's army; Ridgway had been able to locate a cover of "Bomber", originally recorded by Motörhead (Kilmister's band) and performed by the all-female metal band Girlschool, recorded in their 1981 split EP St. Valentine's Day Massacre. Schafer also credits Black with some of the music selections for the game. Instead of relying on labels or bands to provide them with a list of possible songs to select from, the development team sought permission to use specific songs they wanted in the game. In some cases, obtaining appropriate licensing proved difficult, as for songs from bands that had long split up, Double Fine needed to contact each band member to gain permission. This proved to be valuable, as some original bands were excited about their music being used in the game; in one case, Lita Ford was able to provide the game with a song with slight modifications to the lyrics from a version that she was about to release. One song is from the in-game band "Kabbage Boy" for which Eddie is a roadie at the start of the game. Schafer had tried to get music from groups like Metallica and AC/DC, but their licensing fees were too high. He further tried to work with Iron Maiden, but the group was hesitant to participate after recognizing that the character name "Eddie Riggs" suggested an attachment with the band's mascot, named "Eddie" and designed by Derek Riggs; the band's marketing group pointed out that this could imply that Iron Maiden had endorsed the game. In addition to licensed music, the game includes over 70 minutes of original score by Tim Schafer's long-term collaborator Peter McConnell. McConnell composed pieces for orchestra and Metal band to tie in with the licensed music in the game. Also, the in-game soundtrack contains an instrumental drum track played by Slough Feg drummer Harry Cantwell, all other "real" drums (6 tracks) were played by Y&T drummer Mike Vanderhule and recorded by Jory Prum. The solos triggered by the player during the game were composed and recorded by Judas Priest guitarists Glenn Tipton (Eddie's solos) and K.K. Downing (Ophelia's and Doviculus' solos). While Schafer would like to have a soundtrack album for the game, he stated that there were already difficulties in securing the licenses for songs within the game and was not sure if it would be possible to extend them to a soundtrack. Schafer helped to select three songs—"We Are The Road Crew" by Motörhead, "The Metal" by Tenacious D, and "More Than Meets The Eye" by Testament—to appear in a pack of Rock Band downloadable songs that was made available the same day as Brütal Legends release. The full soundtrack remained intact for Brütal Legends addition to the Xbox One backwards comparability catalog in September 2018; Double Fine had assured all music licensing rights had remains in place for this release. ReceptionBrütal Legend received positive response from gaming journalists, with reviewers praising the story and characters of the game, and driven vocal performances of the voice actors, particularly Black and Osbourne. Daemon Hatfield of IGN felt Black was "completely committed" to the role of Riggs, while Giant Bomb's Ryan Davis found it relieving that Black reined in his typical "loud-talking heavy-metal goofball" act that he is known for and instead performed well, "bringing just the right amount of working-man's matter-of-fact-ness to the role". Osbourne's role was considered "amazing (and surprisingly coherent)" by GameSpot's Giancarlo Varanini and "played brilliantly" by Computer and Video Games' Andrew Kelly. The full cast was commended for their roles; the heavy metal musicians were effective at playing themselves in the game, while the other voice talent performed well and "[did] their part to balance out the star power" in the game. The strength of the characters was considered to be enhanced by the quality of writing of the story, and the use of facial animation. Eurogamer's Christian Donlan considered the characters of Brütal Legend to be the strongest aspect to the game, distancing the title from other video games due to "rounded, personable leads who are distinctly superior to the usual throngs of cybermen and super-vixens", and a facet of Schafer's signature work. Wired's Chris Kohler further attested the strength of the game's story to Schafer's skill, considering that "After Brütal Legend, he should be considered one of the best storytellers in gaming, period." 1UP.com's Justin Haywald noted that the game lacks the ability to review cutscenes, forcing the player to restart the story if they wanted to see these again. The heavy metal-inspired world of Brütal Legend was also well received, and considered to show a clear reverence for the genre. Gerald Villoria of GameSpy considered the game to be "dedicated to an unabashed love of metal" and "heavy metal fan-service to the highest degree". Davis believed that the juxtaposition of all the elements that made up the heavy metal fantasy world were the game's greatest strength, often being "both giddily ridiculous and fist-pumpingly badass" at the same time. Critics found that while the graphics for the game may not be the most sophisticated for the current console generation, the detailed art aspects of the world were impressive; Varanini considered that "no matter where you are in the world, there's always some cool object to look at", while Donlan considered the world to be a "constant unfolding delight". The incorporation of heavy metal music into the game also benefited the game. Both Kelly and Villoria considered the soundtrack essential to the game, and praised the moments where specific songs, such as Dragonforce's "Through the Fire and Flames" would be used as background music during specific game sequences. Kelly further praised the game for using the songs to define the action of the game instead of relegated to random background music. Villoria also considered the soundtrack to have "enormous breadth of sound and diversity", introducing the player to heavy metal genres they may not have known even existed. G4TV's Jake Gaskill considered listening to the soundtrack to be the equivalent of "taking a class in heavy metal appreciation." The actual gameplay was seen as Brütal Legend largest weakness. Many reviewers were critical of the incorporation of real-time strategy (RTS) elements into the game, a fact that was not well advertised prior to the game's release and does not become apparent to the player in the first hours of the game. Though Schafer had set out to make the console-based game like an RTS from the start, they were warned by both Vivendi and Electronic Arts that "RTS" was "a naughty word in the console space", and instead marketed it as an action game. Despite this, reviewers found that the game was still difficult to play on a console due to the selected controls that made it difficult to target objectives or troops, the lack of a mini-map to track friends and foes, and the frantic pace of battle. Critics did appreciate the slow introduction to the various aspects of the game as part of the single player game, but felt the game did not adequately introduce or explain all of the game's RTS features, such as the ability to mount a final stand on one's stage. Some also considered the single-player campaign Stage Battles to be too easy, winnable by brute force, and that more advanced tactics would only become apparent as one played in multiplayer games, including learning the abilities and advantages of the other units of the factions other than Ironheade. The mix of gaming genres between the RTS and third-person action was found particularly confusing; Kohler commented that the handling of the individual genres was accomplished well, leading to "an astoundingly complex design instead of a simple one" that diminished the enjoyment of the game, while Davis considered that "perhaps there wasn't enough confidence in any one piece to let it carry the whole game". However, some felt that the various genres helped to create "a variety of gameplay opportunities", and made for "rather elegant" Stage Battles. In retrospect, Schafer lamented that they did not include enough tutorials in the game to guide the player as to "naturally how to play the strategy part a bit better", as they had come to accept over the years of development, and tried to use the Double Fine blog to explain some of these aspects. Though some critics argued that stripping out the RTS elements and leaving an action combat game wrapped in the metal-themed world would have been a better game, Schafer countered that this would have not been true to the vision that he had from the start. Schafer would later jokingly refer to the RTS elements of Brütal Legend; during the fundraising for Broken Age, Schafer teasingly threatened to add RTS elements to the point-and-click if the funding had reached certain levels. Gameplay outside of the Stage Battles was also met with mixed impressions. Most considered the side missions highly repetitive, which included mission types that are generally disliked by gamers, such as escort missions. The lack of a mini-map, replaced by either following a glowing light from the sky illuminating the player's target or by navigating based on the Deuce's turn signals, was criticized for making it difficult to explore the game's world. The information about the world that players can access in the game's pause menu was also found to be lacking, neither showing the collectible elements of the game on the main map, nor easily identifying the alliance of the various troops in the in-game guidebook. Though Eddie gains the ability to fly during Stage Battles, the inability to use this or to make the character jump led to reviewers getting the character stuck on the landscape at times when exploring. Some reviewers found the number of progress checkpoints in the game to be lacking, requiring the player to repeat a long mission if they should die before reaching one. The single-player game was also considered to be short, lasting as little as four hours if one only completed the main story missions. In 2011, readers of Guinness World Records Gamer's Edition voted Eddie Riggs as the 48th-top video game character of all time. Sales According to the NPD Group, Brütal Legend sold approximately 215,000 copies in the United States in October 2009, with about 150,000 copies being for the Xbox 360 platform, making it the 12th-top-selling game in that month. These numbers were not considered to be strong, and were attributed to the difficult marketing of the game, which emphasized Jack Black's involvement and the heavy metal nature of the game, but did not assert what the gameplay would actually be like, with the possibility that the mention of the RTS elements of the game would have possibly driven more players away from the game. In an interview in February 2011, Schafer claimed that the game had sold over 1.4 million copies. According to data collected through Nielsen SoundScan, some songs contained within Brütal Legend's soundtrack saw digital sales increases of up to 700% following the game's release, similar to the effects of Guitar Hero and Rock Band, though impact on overall sales of these songs was rather small. Awards Black was given the Best Voice award at the Spike Video Game Awards 2009. Brütal Legend won the "Best Strategy/Simulation Game" and "Outstanding Achievement in Soundtrack" awards in the 13th-annual Interactive Achievement Awards from the Academy of Interactive Arts & Sciences, and was nominated for "Outstanding Character Performance" (for Eddie Riggs), "Outstanding Achievement in Original Story", and "Outstanding Achievement in Game Direction". The game was also nominated for the Game Developers Choice Awards for "Best Writing" and "Best Audio". See alsoFull Throttle'', an earlier Tim Schafer game featuring bikers and heavy metal music References External links Official website 2009 video games Action-adventure games Dark fantasy video games Black comedy video games Cancelled Wii games Double Fine games Electronic Arts games Heavy metal subculture Linux games Lua (programming language)-scripted video games Multiplayer and single-player video games Open-world video games MacOS games PlayStation 3 games Real-time strategy video games Video games developed in the United States Video games scored by Peter McConnell Windows games Xbox 360 games Portal fantasy
28327260
https://en.wikipedia.org/wiki/Persistent%20Close%20Air%20Support
Persistent Close Air Support
Persistent Close Air Support (PCAS) is a DARPA program that seeks to demonstrate dramatic improvements in close air support (CAS) capabilities by developing a system to allow continuous CAS availability and lethality to Joint Terminal Attack Controllers (JTACs). Overview The program will give JTACs the ability to visualize, select, and employ munitions at the time of their choosing from optionally manned or unmanned aerial attack platforms. PCAS was to demonstrate using an A-10 Thunderbolt II modified for optionally manned operation, however the program did not seek to remove pilots from the cockpit of A-10s or other manned military aircraft. Technologies developed under the program were to transition to both current manned aircraft and the MQ-X next-generation unmanned aircraft. With the cancellation of the MQ-X program, the PCAS program dropped the idea of using an optionally manned A-10, and refocused the effort to allow the JTAC controller to interface with "smart rail" electronics on a manned A-10. Background and design Currently pilots, forward air controllers, and JTACs must focus on one target at a time and rely on voice directions and paper maps to call in air support. This can take up to one hour to be arranged and have an aircraft arrive on station, which allows a target to relocate or attack first. PCAS is to digitally link aircraft with ground controllers to share real-time situational awareness, identify multiple targets simultaneously, jointly select the best precision-guided weapons for the situation, and reduce engagement time to as little as six minutes. Pilots and JTACs will have digital messaging capabilities networked through software programmable radio, which wirelessly transmits IP packets of voice, video, and data. By using Android tablets on the ground and in an aircraft's cockpit they can both view and exchange targeting information using icons, digital maps, and display screens; a JTAC can view a pilot's targeting pod picture in the air and permits a pilot to view target-grid coordinates and other displays from a JTAC's tablet on the ground. Using smart launcher electronics, consisting of a GPS/INS unit, weapons and engagement management systems, high-speed data transfer systems, software and radios, and an Ethernet switch, it integrates software programmable radio with a processor and tablet in the cockpit. Autonomous decision aids also use algorithms to recommend which weapon might be best suited to attack a given target. The first PCAS phase involved identifying relevant technologies, demonstrating concepts, and developing target-identification systems. The second phase was finalizing the system's design and ground system and clearing it for installation on multiple aircraft. DARPA field-tested parts of PCAS-Ground in Afghanistan from December 2012 to March 2013, deploying some 500 Android tablets equipped with PCAS-Ground situational awareness software, which dramatically improved units' ability to quickly and safely coordinate airstrikes. Raytheon won the $25 million, 18-month Phase 3 contract in February 2014 and began flight tests that October; the entire three-year program was funded at $82 million. Once flight testing of PCAS-Air's modular smart launcher electronics was completed on an A-10 and shown it can connect with a PCAS-Ground kit, the platform-agnostic PCAS system would be available for integration and testing with other fixed and rotary-wing aircraft. Operation To engage ground targets, PCAS-Ground comprises a smart power hub, customized Android tablet computer loaded with situational-awareness and mapping software, and a digital radio that altogether weigh only , plus a laser-targeting device that weighs another 5 lb. When a JTAC identifies a target for attack, they create the "nine-line" engagement plan on the tablet and transmit the plan to the aircraft, with the ability to "stack" multiple identified targets. PCAS-Air software then evaluates and auto-populates the plan with whatever sensor and weapons data is available, sharing the information with PCAS-Ground to confirm the attack. The JTAC gets a countdown to weapons release, and can see an impact line as well as weapon damage radius; both aircrew and JTAC can see video of the target on their tablets, eliminating the need for the larger, dedicated ROVER laptops currently used by JTACs to view airborne video. PCAS makes it easier to accurately deploy weapons with smaller warheads for less collateral damage and gives "Level 3" control to JTACs to remotely steer airborne sensors if needed. Testing DARPA conducted the first demonstration of the whole PCAS system with the U.S. Marine Corps on 27 March 2015 during the Talon Reach training exercise. The exercise was the first time the air component was integrated with the ground component in use operationally since 2013, dubbed Kinetic Integrated Low-cost SoftWare Integrated Tactical Combat Handheld (KILSWITCH), combining PCAS-Ground's better navigation, situational awareness, fire coordination, and communications with PCAS-Air's weapons management, ISR, and communications systems on a Smart Launcher Electronics (SLE) device. During the demonstration, ground forces used an Android tablet to identify a target and sent its position to an MV-22 Osprey, which fired an inert AGM-176 Griffin missile from and scored a direct hit. In a situation where air support would take 30 minutes or more if called using paper maps and voice instructions, DARPA's objective was to reduce it to six minutes, and the demonstration achieved a hit in only four minutes. In another part of the exercise, two groups of Marines coordinated a night attack using PCAS-Ground. One group launched an AeroVironment Switchblade UAV to provide surveillance and network relay capabilities, which synced to both groups' KILSWITCH tablets to give them the locations of friendly and enemy forces. PCAS-Air's modular design allows it to work with almost any aircraft. The first tests conducted with U.S. Air Force A-10s took place from April through June 2015. Flying 50 sorties, 10 involved live-fire engagements that were carried out within six minutes, where JTACs commanded airstrikes with as few as three clicks on a specially configured Android tablet. On 8 November 2015, Raytheon announced the flight test phase of the PCAS program, which took place in the first six months of 2015, had been successfully completed, concluding the four-and-a-half year, three phase program. As part of the program's conclusion, DARPA is focusing on transitioning technology to other platforms and working with the U.S. Army on other PCAS transition activity. See also Unmanned aircraft system Unmanned combat aerial vehicle References External links Darpa Plots Death From Above, On-Demand - Wired, July 12, 2010. DARPA DARPA projects
22996768
https://en.wikipedia.org/wiki/Post-Attack%20Command%20and%20Control%20System%20Facility%2C%20Hadley
Post-Attack Command and Control System Facility, Hadley
Post-Attack Command and Control System Facility, Hadley is a defunct Post-Attack Command and Control System facility that operated from June 2, 1958 until 1970. It is located on and under Bare Mountain in Hadley, Massachusetts. The facility was known by many different names: 8th Air Force Combat Operations Center (COC), "The Notch", and "Westover Communications Annex" since it was related to nearby Westover Air Force Base. The facility has been described as having two underground stories amounting to . It was designed to house 135 people. History In 1957, Strategic Air Command began construction for a hardened bunker to contain the command post for the 8th Air Force, which was located at nearby Westover Air Force Base, Chicopee, Massachusetts. The facility was located inside Bare Mountain, off Route 116, and was nicknamed "The Notch." The underground facility, built into the side of Bare Mountain, was hardened to protect it from the effects of a nearby nuclear blast and designed so that the senior military staff could facilitate further military operations. It was connected to ATT Blackstone, ATT Chesterfield, and ATT Peru via microwave transmissions during its operation. Reuse The facility was shut down in 1970, when the 8th Air Force was relocated to Guam. After the U.S. Air Force abandoned the site in 1970, the Federal Reserve took over and used it as a secure storage facility for their records. Allegedly they stored large sums of money there as well, to be used to restart the economy after a nuclear war. Today, the bunker is used as a library storage facility for the Five Colleges. The facility was used in the 2010 Mel Gibson movie Edge of Darkness. The front entrance of the facility stood in for the main entrance of the Northmoor Facility in the movie and the access road, Military Road, was used in the beginning of the pursuit scene where Gibson's character begins his chase of the facility director. Units based there 8th Air Force (1958–1970) 814th Combat Defense Squadron (1958–1968) 99th Security Police Squadron (1968–1970) See also Continuity of government Magic Mountain Post Attack Command and Control System List of military installations in Massachusetts References External links "The Notch" PACCS installation, with photos of the facility when it was active Westover Joint Air Reserve Base (JARB), GlobalSecurity.org "The Notch" - Westover Communications Annex - PACCS "Library Holdings Moving Underground", Smith College news 814th Combat Defense Squadron - Air Police squadron that guarded "The Notch" A 1990s era photo of the entrance Bare Mountain: Go inside Amherst College's bunker (Photos) Amherst College Buildings and structures in Hadley, Massachusetts Installations of the United States Air Force in Massachusetts Continuity of government in the United States Nuclear bunkers in the United States United States nuclear command and control 1958 establishments in Massachusetts 1970 disestablishments in Massachusetts
67160873
https://en.wikipedia.org/wiki/Tom%20Griffiths%20%28cognitive%20scientist%29
Tom Griffiths (cognitive scientist)
Thomas L. Griffiths is an Australian academic who is the Henry R. Luce Professor of Information Technology, Consciousness, and Culture at Princeton University. He studies human decision-making and its connection to problem-solving methods in computation. His book with Brian Christian, Algorithms to Live By: The Computer Science of Human Decisions, was named one of the "Best Books of 2016" by MIT Technology Review. Biography Griffiths was born in London but moved with his family when he was eight to Perth, Australia. Growing up, Griffiths enjoyed computer programming and online role-playing games. At twelve, he started fencing, which he says involves "interesting computational problems", becoming "an avid fencer". He developed a method to break down complex fencing moves into simpler ones that could be performed in sequence, but gave up on the theory after, he says, "I messed up the math and a longsword broke my right wrist." Griffiths received his undergraduate degree in psychology from the University of Western Australia. He applied to Stanford University for graduate school in psychology, hoping to work on mathematical models of human cognition with David Rumelhart or Roger Shepard, not realizing that both had just retired. Instead, Joshua Tenenbaum, who was working on Bayesian cognitive science, became his thesis advisor. His work with Tenenbaum used Bayesian statistics as well as principles from AI and machine learning and to explore topics in cognitive psychology, such as learning, memory, and categorization. When Tenenbaum left Stanford for MIT, Griffiths accompanied him, becoming an exchange student there. Griffiths earned master's degrees in both psychology and statistics from Stanford, as well as a Stanford Ph.D. in psychology in 2005. After teaching briefly at Brown University, he moved to Berkeley in 2006 as an assistant professor in the Department of Psychology and Cognitive Science Program. In 2010, he became an associate professor and the director of Berkeley's Institute of Cognitive and Brain Sciences. He became a full professor at Berkeley in 2015. In 2018, Griffiths was hired by Princeton, as a joint appointment by the Department of Computer Science and the Department of Psychology. At Princeton, he is the Henry R. Luce Professor of Information Technology, Consciousness, and Culture. On his Princeton webpage, Griffiths explains that his research explores the connection between human problem solving and related methods in computation and logic: "People solve challenging computational problems every day, making predictions about future events, learning new causal relationships, or discovering how objects should be divided into categories. My research investigates how this is possible, first identifying the nature of the underlying computational problems, and then examining whether we can explain aspects of human behavior as the result of approximating optimal solutions to those problems." Awards In 2011 the Association for Psychological Science awarded Griffiths its Janet Taylor Spence Award for Transformative Early Career Contributions, recognizing his work exploring "mathematical models of human cognition". In 2012 he won American Psychological Association's Award for Distinguished Scientific Early Career Contributions to Psychology "for bringing mathematical precision to the deepest questions in human learning, reasoning, and concept formation." In 2014, Griffiths received a Cognitive Science Society Award. At that time, he was "director of the Computational Cognitive Science Lab and the Institute of Cognitive and Brain Sciences at the University of California, Berkeley." In 2019, the National Academy of Sciences awarded Griffiths its $75,000 Troland Research Award "for his research into how people and machines make decisions." In 2017, while at Berkeley, Griffiths was awarded a John Simon Guggenheim Memorial Foundation fellowship, an award given "on the basis of prior achievement and exceptional promise." Berkeley described his work at that time as follows: "His research explores connections between human and machine learning, using ideas from statistics and artificial intelligence to understand how people solve the challenging computational problems they encounter in everyday life." Publications In 2016, Griffiths co-authored a book, Algorithms to Live By: The Computer Science of Human Decisions, with Brian Christian. Kirkus Reviews described it as "An entertaining, intelligently presented book for the numerate and computer literate." David DiSalvo, author of "What Makes Your Brain Happy and Why You Should Do the Opposite, called Algorithms to Live By a "surprisingly useful book that travels from computer science to human decision-making... a dense primer on the algorithms of decision-making and a tip-filled guide for making better decisions." In The Guardian, Oliver Burkeman wrote that he "wasn’t predisposed to love Algorithms To Live By" but by the end of the book was convinced that "computing algorithms could be a surprisingly useful way to embrace the messy compromises of real, non-Vulcan life." MIT Technology Review listed it as one of their "Best Books of 2016." References External links Princeton web page PhD thesis "Causes, coincidences, and theories" (2005) "How Should You Organize Your Closet? Exactly Like a Computer Organizes Its Memory" Excerpt from Algorithms to Live By: The Computer Science of Human Decisions by Brian Christian and Tom Griffiths, published in Wired Magazine (20 April 2016) Year of birth missing (living people) Living people Princeton University faculty Cognitive scientists Stanford University alumni
35290643
https://en.wikipedia.org/wiki/Reverse%20pharmacology
Reverse pharmacology
In the field of drug discovery, reverse pharmacology also known as target-based drug discovery (TDD), a hypothesis is first made that modulation of the activity of a specific protein target will have beneficial therapeutic effects. Screening of chemical libraries of small molecules is then used to identify compounds that bind with high affinity to the target. The hits from these screens are then used as starting points for drug discovery. This method became popular after the sequencing of the human genome which allowed rapid cloning and synthesis of large quantities of purified proteins. This method is the most widely used in drug discovery today. Differently than the classical (forward) pharmacology, with the reverse pharmacology approach in vivo efficacy of identified active (lead) compounds is usually performed in the final drug discovery stages. Reverse pharmacology or target-based pharmacology, is a process of drug development where identity of a molecular target (receptor, enzyme, protein, etc) drives compound screening. Classical pharmacology involves determining the functional activity of a compound through in vitro and in vivo models. Once the activity of compound is found, the compounds ligands are identified, purified, and synthesized and go through biological screening assays. The most selective and potent drug is then further screened for toxicity and efficacy. Classical pharmacology can be time consuming and expensive. Reverse pharmacology was first established in the 70's by Dir Ram Nath Chopra and Gannath Sen. Reverse pharmacology, in contrast, takes potential drug compounds, designed specifically to targets (receptors, enzyme, proteins, etc) involved in disorders or diseases. Binding assays are used to identify the molecular target. The compound then undergoes animal functional studies to show the desired effect. Compounds identified through reverse pharmacology are thought to increase efficacy. The goal of reverse pharmacology is to utilize disease pathology in order to identify specific and targetable elements that novel compounds can be modeled from. Reverse vaccinology A subcategory of reverse pharmacology, reverse vaccinology is a computational approach for discovery of vaccines through utilization of the genome. Traditionally vaccines have been developed through the isolation, inactivation, and re-injection of viruses. Conventional vaccinology is both time consuming and limited to antigens that are able to be purified for testing. Rino Rappuoli and the J. Craig Venter Institute used reverse vaccinology to develop a vaccine against Serogroup B meningococcus. Vaccines utilizing reverse vaccinology tend to have better selectivity; reducing side effects. These vaccines can increase immunity of multiple strains by incorporating multiple proteins. The reverse vaccinology approach uses the genome sequence of the pathogen itself. Researchers are able to determine the all of the protein antigens that a pathogen can express. Reverse vaccinology begins with the genomic sequence of the pathogen and computer prediction of candidates for vaccines. Scientists use computational analysis to obtain the genome of the virus which allows for the determination of proteins that are secreted during viral infection. Through the secreted proteins, scientists are then able to identify and purify the virus, allowing further research consisting of immunizing laboratory animals. The elicited immune response is studied and are used for identification of a vaccine. Conventional vaccinology differs from reverse vaccinology in that the proteins purified from a cultured pathogen are used as candidates for a vaccine. Applications of reverse vaccinology Diseases such as Malaria, Tuberculosis, and Syphilis have fully been sequences and lists of all possible genes can be accessed. Group B Menigococcus Group B Menigococcus is the first application of reverse vaccinology. The polysaccharide that was used to develop early vaccines was poorly immunogenic and caused autoimmunity. A vaccine needed to be made against the surface exposed proteins and were able to be folded within the outer membrane. Rino Rappuoli and the J. Craig Venter Institute were able to screen DNA fragments for genes that coded surface exposed and exported proteins. These proteins were purified and used to immunize mice. 25 of 85 surface proteins were shown to produce antibodies. These proteins were the basis of the vaccine against Group B Menigococcus. Limits to reverse vaccinology The goal of a vaccine is protective immunity against a pathogen. Vaccinology relies on the availability of databases that can predict whether the candidates can provide protective immunity against the pathogen. Lack of knowledge surrounding vaccine immunology and effects of mutations down the line, it is hard to predict protective immunity. Another limitation of reverse vaccinology is the identification antigens that are not proteins. Reverse vaccinology tools and applications More than 4000 viral genomes have been identified. Reverse vaccinology heavily uses bioinformatics to analyze and obtain vast viral genomes. NERVE New Enhanced Reverse Vaccinology Environment (NERVE) is a reverse vaccinology software that imports pathogen protein sequences and predicts biological sequences. This software predicts the sub-cellular localization, adhesion probability, topology, human sequence similarity, and conservation of these proteins. NERVE uses four criteria to predict potential vaccine candidates: proteins that do not lie in the cytoplasm, proteins with 2 or less transmembrane helices, a probability of adhesion >0.46 and proteins that have low similarity to human proteins. Vaxign Vaxign was the first vaccine design program for reverse vaccinology and vaccine development. It uses both external and internal tools and programs to predict vaccine targets. Users input amino acids from proteins are genomes and is able to predict subcellular localization, transmembrane domains, adhesion probability, protein conservation among genomes, exclusion of nonpathogenic strains, comparison of proteins and host, prediction of binding to MHC class I and II, and analysis of the protein function. Vaxign has two broad methods of vaccine design: "General" and "Specific" Methods. Within "General Methods" users can further choose to search under Vaxign Query or Dynamic Vaxign Analysis. Vaxign Query allows the users to search precomputed results for around 300 genomes. Users are able to choose genomes for vaccine targets based on desired parameters or protein sequences. The Dynamic Vaxign Analysis has users input protein sequences and set up parameters. This analytical tool uses the automatic Vaxign pipeline. This pipeline includes predictions for sublocation, adhesion, epitope binding to MCH class I and class II, and similarity to the host genome sequences. Under the "Specific Methods", users have the option of Vaxitop and Vaxign-ML. Vaxitop makes predictions on vaccine epitopes based on reverse vaccinology. Vaxitop specifically predicts the binding to MHC Class and II. Vaxitop allows users to perform a genome whide query for different MHC host species. Vaxign-ML uses machine learning to produce vaccine candidates. EpiVax and iVAX Toolkit EpiVax is a private company, based in Providence, RI, that uses in silico, in vitro, and in vivo applications to design new vaccines. EpiVax created the iVAX Toolkit, an in silico platform that allows users to identify and predict epitopes for vaccine development. iVAX is a computational vaccine design program that encompasses epitope mapping, antigen selection, and immunogen design. This toolkit uses immunoinformatics algorithms to identify candidate antigens and select for conserved T cell epitopes, eliminating epitopes from regulatory T cells. iVAX has a collection of tools such as Conservatrix, EpiMatrix, ClustiMer, and EpiAssembler. Vaccine design begins with searching for MHC class I and II ligands. EpiMatrix performs this initial search by parsing and evaluating each input sequence for binding efficacy. The program removes low quality binders to curate personalized predictions. These epitopes can be further analyzed for clusters using ClustiMer. Users can find cross-strain, conserved epitopes using Conservatrix. This toolkit integrates in silico and ex vivo/in vitro technology to allow vaccine developers to access toxicity, efficacy, and performance of vaccines. Reverse pharmacognosy Pharmacognosy is a multi disciplinary science that studies the applications of natural compounds. Pharmacognosy is derived from the Greek pharmakon, meaning drug or recipe, and gnosis, meaning knowledge. Pharmacognosy is not limited to the natural compound application in therapeutics, but can also include cosmetics, agricultures, and dyes. Conventional pharmacognosy utilizes traditional knowledge of living organisms to find new bioactive molecules. Conventional pharmacognosy begins with using ethopharmacological data to select plants. Once these plants are selected, extracts of these plants are made and tested in biological assays. If an extract is biologically active, the extracts are fractionated and retested multiple times to identify the molecules responsible for the activity. Reverse Pharmacognosy attempts to use the knowledge generated from pharmacognosy to introduce new therapeutic activities of natural products. Molecules are first selected based on criteria (eg. structure, chemical family, activity). Next, the selected compounds are used to identify potential targets. Compounds can have a variety of different targets in metabolic pathways. This information gives insight on potential off-target effects and synergetic applications. "Inverse screening" involves identifying new properties for the selected compounds. Predicted interaction partners can be validated using in vitro binding assays or virtual screenings. Summary Selection of Molecules The first step in reverse pharmacognosy is the selection of natural compounds. Criteria can be applied depending on the compound is proposed for: structural criteria, molecules from the same chemical family, compounds with drug-like properties, etc. Natural product databases can also be helpful for compound selection. Target Identification and Discovery of Activities The second step in reverse pharmacognosy is identifying the target which will bind to the selected compounds. There can be many targets that a ligand can interact with, these interactions can illicit either negative or favorable effects, so it is important to identify all possible interactions. Researchers at this step commonly use "inverse screening" where they screen proteins which will potentially bind their molecules. Predictions about selectivity and synergy can be calculated which cannot be achieved through classical docking. Biological Assays and Organism Associated Activities While virtual screening are fairly accurate at predicting the biological activities of compounds and their proteins, these interactions can only be confirmed through in vitro biological assays. in vivo models of biological activities are needed to confirm that there is the same biological properties from the in vitro experiments. Activity Optimization Derivatives of natural products may be more potent, less toxic, more accessible from the compounds that were originally probed. Database of active extracts and metabolites can assist with this optimization. Reverse pharmacognosy tools and applications Both chemoinformatics and inverse screening tools and target databases utilize reverse pharmacognosy. Greenpharma's reverse pharmacognosy platform Greenpharma is a French R&D company created in 2000 who supplies tailored products and services in the life sciences. They focus on natural substances and their platform consists of five components: analytical chemistry, lab scale extractions, chemoinformatics, organic/bio synthesis, and cosmetic formulations. Greenpharma offers three compound libraries for reverse pharmacognosy needs: Greenpharma Natural Compound Library (GPNCL), Greenpharma Ligand Library (LIGENDO), and Greenpharma Plant Extract Library (GPEL). The GPNCL is a collection of 150,000 natural compound structures for lead discovery. This library also has access to 30 million compounds from Ambinter. This library does not include amino acids, peptides, nucleic acids, or long fatty acid chains. They also have continuous stock of compounds at >90% purity. The GPNCL provides the physico-chemical properties and phytochemistry of each of their compounds for researchers. LIGENDO is a library source of natural, pure compounds for chemogenomics and biological pathway hopping. This library is composed of 400 human endogenous ligands. Compounds are given in microplates of 80 and data is supplied in the database with compound name, structure, implied metabolic pathway, physico-chemical properties, and protein partners. GPEL is a plant extract library that combines botany, pharmacology, and pharmacognosy to present a wide range of possible extracts. The library is suitable for a high throughput screening which 80 extracts on each microplate for 20 plants. Greenpharma provides 4 different polarity solvent fractions. Information on the plant family, genus, species, and organ data is also provided. Selnergy Selnergy is a virtual high throughput screening platform that allows users to explore interactions chemogenomics. It contains a database of 10,000 protein structures, sectioned by their biological properties. This platforms allows for in silico profiling of ligand and ligand-protein interactions. It allows the user to predict the selectivity and synergy between candidate compounds and their protein targets. Potential use in traditional systems of medicine Current drug discovery entails the identification of drug targets in disease pathology, large iterations of chemical compounds to discover drug candidates and performing biological assays to test for toxicity, potency, and efficacy. This traditional approach is often considered costly and time consuming. Much of the world relies on traditional systems of medicine (TSM): Ayurveda, traditional Chinese medicine (TCM), etc. While these therapies are popular in non-western countries, their evidence of therapeutic benefits are seen as incomplete in western societies. Reverse pharmacology began as a way to study Ayurvedic plants chemically and clinically. The issue with studying Ayurvedic plants is that there was no defined approach in quantifying its benefits. The study of their herbal therapies can be investigated using reverse pharmacology. Target identification and characterization Proteins that are thought to be critical in pathogenesis are identified. These protein structures and their predicted function can be analyzed through bioinformatics. This enables the identification of candidate ligands. Receptor/ ligand interactions are often identified through high throughput screenings. High throughput screening High throughput screening is method in drug discovery that allows scientists to conduct pharmacological tests. In regards to reverse pharmacology, this process is utilized for the identification of compounds involved in a pathophysiology pathway. Molecular docking Molecular docking is an in silico method used in drug discovery to identify novel compounds of interest. It has the ability to predict the binding conformation of small molecule ligands to their binding site. Docking was first introduced in the 1970s, and allows researchers the ability to predict interactions between the target and potential ligands. Molecular docking is currently used for the prediction of targets for compounds, prediction of adverse drug reactions, polypharmaoclogy, virtual screenings, and drug repositioning. Virtual screening using molecular docking utilizes large collections of synthesized and designed molecules to find macromolecule binding sites. Curated molecules are scored based on their binding energies and other parameters. Ligand-Based approaches are used to identify suitable protein conformations for the docking screenings. This approach can also be used to confirm the prediction from the docking screenings. Researchers can use the similarity between the predicted binding confirmation and the experimental conformation when the ligand is crystalized with the protein. Molecular dynamics (MD) and binding free energy estimations are both structure based approaches, often used in combination. Residue flexibility and conformational changes can be evaluated through molecular dynamics. It can be used to determine the stability of different protein conformations. The use of artificial intelligence and statistical methods are new in the molecular docking pipeline. These methods can utilize publicly available information on the structural, chemical and activity of compounds for better predictions. Molecular Docking Programs DOCK DOCK was the first docking software, created in the 1980's. DOCK uses an algorithm that searches potential binding modes. DOCK can superimpose the ligand onto the binding pocket and finds the lowest energy binding conformation. In the newer versions, the algorithm can perform both rigid and flexible docking. MORDOR MOlecular Recognition with a Driven dynamics OptimizeR (MORDOR) is a docking software designed for accurate docking predictions. In experimental observations, a ligand can affect the conformation of a receptor. MORDOR takes this into consideration and allows for induced fit; the simulation moves with the ligand. The ligand is also able to explore the different possible binding pockets. The software uses DOCK to perform rigid docking to reduce the size of the library. After curating a smaller library, MODOR is used. MORDOR uses a "dummy sphere" to move along the receptor to identify different binding pockets. The result is an energy map with all known binding pockets. AMBER Assisted Model Building with Energy Refinement (AMBER) was created in 2002 by developers at the University of California, San Francisco. AMBER refers to a set of "force fields" that simulate biomolecules and refers to the software package that simulated a family of force fields for molecular dynamics. "Force fields" are the parameters of the bonds, angles, dihedrals, and atom types within the system. The suite allows users to complete full molecular dynamics simulations with water or Born solvent models. Reverse docking Reverse docking, or inverse docking, is an in silico method to find proteins targets to a specific ligand. Much like regular docking methods, ligand-target conformations are scored and ranked based on preset parameters. Large and properly constructed databases need to be created with target structures. These databases also need to define the binding sites for each proteins. There are multiple reverse docking tools that use a variety of databases and can be used in identifying targets and potential off-target interactions. The problem with efficacy of reverse docking comes from high computational time and lack of databases for target structures. Reverse docking programs INVDOCK INVDOCK was the first reverse docking tool, created in 2001. This software aligns ligands to the binding site and binding conformations are analyzed using energy minimization. INVDOCK can be used to identify unknown and secondary targets of drugs, leads, etc. It can also predict the ADME of targets. One of the limitations of INVDOCK is the lack of optimization; users input a threshold binding energy and once the ligand is positioned successfully, within the binding energy threshold, the program moves on. There is no optimization for multiple low energy conformations. TarFisDock TarFisDock was first developed in 2006 and is a tool that ranks targets using an in-house database, Potential Drug Target Database (PDTD). This tool calculates the binding energy of targets and their ligands. Users input their small molecule to be tested and TarFisDock searches for proteins using docking techniques. Viable targets are usually contained in the top 2,5, or 10% of its rankings. idTarget idTarget is a web based docking tool that allows for multiple binding sites of a protein to be identified. This tool uses all the protein structures within the Protein Data Bank (PDB). This tool is also able to determine off targets of compounds. Challenges with molecular docking Molecular is a powerful took for visualization of ligand-target interactions. Molecular docking does not always correctly predict the binding modes due to the algorithms being estimations. Flexibility of binding sites and molecules can cause false binding sites that do not exist in experimental observation. Accurate prediction of binding is limited by size of both the ligand and receptor and knowledge surrounding the receptor. There are also problems with the scoring functions of virtual docking platforms. Commonly these scoring functions are based on binding affinity estimations. Entropy, atom randomization, binding flexibility are the most challenging issues related to predicting the binding affinity. Orphan receptors Orphan receptors are protein receptors that are activated by unknown ligands. Though the ligands for these receptors are unknown, their structures are often similar to already identified receptors. Orphan receptors generally are apart of two distinct receptor families: nuclear receptors and G protein coupled receptors (GPCR). Nuclear receptors are cytosolic proteins that act as transcription factors once activated. GPCRs are seven transmembrane receptors that activate G proteins which signal transduce down stream effector proteins.There are more than 700 genes that code for GPCRs. It is thought that of these 700 genes, around half code for sensory receptors and the remaining may have viability as potential drug targets. Currently, more than 200 ligands for these GPCRs have been identified, leaving around 150 receptors orphaned. It is important to develop a suitable assay to successfully identify ligands. Currently, receptor sequences can be cloned and their structural information determined. These structures can be compared to GPCRs with known ligands; receptor activity can be predicted if an orphan receptor has significant homology to a receptor with known ligands. Further functional identification is done using functional assays. Commonly, the cDNA of the GPCR of interest is expressed in relevant cell lines and used as bait to determine endogenous ligands. The first GPCRs to be deorphanized were the serotonin 1A receptor (5-HT1A) and the D2 dopamine receptors. It is thought that there are more GPCRs than known potential ligands; these receptors bind to characterized ligands. Orphan GPCRs are categorized into three classes: Class A, Class B (adhesion GPCRs) , and Class C. Class A orphans have preliminary evidence for an endogenous ligand that has been published and linked to a disease. Class G, or adhesion, GPCRs are identified based on their extracellular region. The N terminal shares similar homology with adhesive domains. Class C orphans do not have a known endogenous ligand. Functional assays for identifying orphaned GPCRs Bioluminescent energy transfer (BRET) Generation of assays are important for "deorphanizing" these receptors. β-arrestin has been used to deorphanize GPCRs. Measuring the recruitment of β-arrestin can provide insight into the internalization of GPCRs. Once the GPCR becomes activated and phosphorylated, β-arrestin is recruited to the cell surface. Researchers have created a chimeric β-arrestin attached to green fluorescent protein (GFP) so that it can be tracked throughout the cell. Activation of a GPCR is indicated by the chimeric β-arrestin being compartmentalized. This technique has been utilized for the deorphanization of Drosophila neuropeptide receptors. Adaption of pheromone receptor pathway This assays is useful in identifying the specificity of G protein coupling to the orphan receptor. Chimeric G protein are used to enable to Saccharomyces cerevisiae G-Protein, Gpa1, linked signaling through the MAPKinase cascade. This assay give low background due lack of endogenous GPCR background. Bead-based screening with Xenopus melanophores Peptide receptors are receptors that binds to multiple peptides or signaling proteins. Many of these receptors have been implicated in diseases. Using combinatorial chemistry, GPCRs that respond to peptide ligands may be able to be identified. Beads of potential ligand peptides are first pooled so that each pool would have the same first amino acid. "Lawns" containing melanophores are transfected with peptide multiple receptor sets. These were groups of both receptors with known ligands and receptors that were orphaned. The beads are spread on the "lawn" and GPCR activation is determined through pigment translocation, which is dependent on G protein signaling. The peptides on these beads can then be sequenced for further assays. Pharmacochaperone screening assay A pharmacochaperone is a drug that acts as a chaperone for a protein. These chaperones assist with the folding/ unfolding and assembly/disassembly of macromolecule structures. Pharmacochaperones correct the folding of misfolded and unfolded proteins, allowing them to be correctly routed in the cel's system. The pharmacochaperone screening assay exploits pharmacochaperones, small molecules that allow for the trafficking of receptors to the plasma membrane, to identify ligands. A point mutation is introduced which causes the receptor to be retained in the endoplasmic reticulum. As a result, molecules that act as chaperones will bring the receptor to the surface. These molecules are coupled with a beta-galactosidase reporter system for identification. Identification of orexin Orexins are neuropeptides, important for their role in energy homeostasis and regulate sleep/wakefulness. Takeshi Sakurai and their lab were able to identify orexin-A and orexin-B, two endogenous ligands for two orphan GPCRs. Their lab identified orexin peptides that were able to express orexin-1 receptor (OX1R). This receptor has high affinity for orexin-A. the second receptor, orexin-2 (OX2R) binds both orexin-A and B at the same affinity. They used 50 transfectant cell lines, expressing multiple orphan GPCR cDNA. Cells were challenged with high performance liquid chromatography (HPLC) fractions and monitored for signal transduction. See also Classical pharmacology References Drug discovery
44079024
https://en.wikipedia.org/wiki/Gliffy
Gliffy
Gliffy is software for diagramming via an HTML5 cloud-based app. It is used to create UML diagrams, floor plans, Venn diagrams, flowcharts and various other kinds of diagrams online. Gliffy diagrams can be shared with and edited by users in real time. The SaaS is supported in all modern web-browsers, including Google Chrome, Firefox, Safari and Internet Explorer 9+. Gliffy's developer, the self-funded company Gliffy, Inc., was acquired by Rogue Wave Software in October 2018, and Rogue Wave was subsequently acquired by Perforce Software in January 2019. History Gliffy was founded in 2005 by friends and former coworkers, Chris Kohlhardt and Clint Dickson. The two software engineers saw a need for an online diagramming tool and decided to leave their full-time jobs and start a company to develop it. Kohlhardt contacted Mike Cannon-Brookes, one of the founders of Atlassian, an Australian enterprise software company. With his encouragement, Kohlhardt and Dickson created a Gliffy plugin for Atlassian’s collaboration product Confluence, and business took off. In May 2006, Gliffy announced its public beta and by 2007 the beta was removed. In 2009, a new Gliffy plugin for Atlassian's JIRA product was unveiled and in 2010 Gliffy was added to the Google Apps marketplace. In early 2013, Gliffy moved to an all HTML5 platform, at the same time adding Visio support. Gliffy integrates with Google Apps, Google Drive, JIRA, and Confluence, and has over two million registered users. It was acquired by Rogue Wave Software in October 2018, which was then acquired by Perforce in January 2019. Timeline August 2006: Gliffy adds UML shapes November 2006: Gliffy Plugin for Atlassian Confluence unveiled February 2007: Beta removed January 2009: Gliffy Plugin for Atlassian Jira unveiled July 2010: Gliffy added to Google Apps marketplace January 2012: Gliffy reaches 1 million users October 2012: Gliffy moves to HTML5 Features Gliffy features a drag-and-drop interface and real-time online collaboration and sharing capabilities. It allows users to export their diagrams in multiple formats including: PDF, JPEG, PNG and SVG. It is supported in all modern web browsers, including Google Chrome, Firefox, Safari, and Internet Explorer 9+. Gliffy integrates with Google Apps, Google Drive, Jira, and Confluence. References External links Diagramming software 2005 software HTML5 Data visualization software
1626613
https://en.wikipedia.org/wiki/Intel%208253
Intel 8253
The Intel 8253 and 8254 are programmable interval timers (PITs), which perform timing and counting functions using three 16-bit counters. The 825x family was primarily designed for the Intel 8080/8085-processors, but were later used in x86 compatible systems. The 825x chips, or an equivalent circuit embedded in a larger chip, are found in all IBM PC compatibles and in soviet computers like the Vector-06C. In PC compatibles, Timer Channel 0 is assigned to IRQ-0 (the highest priority hardware interrupt). Timer Channel 1 is assigned to DRAM refresh (at least in early models before the 80386). Timer Channel 2 is assigned to the PC speaker. The Intel 82c54 (c for CMOS logic) variant handles up to 10 MHz clock signals. History The 8253 is described in the 1980 Intel "Component Data Catalog" publication. The 8254, described as a superset of the 8253 with higher clock speed ratings, has a "preliminary" data sheet in the 1982 Intel "Component Data Catalog". The 8254 is implemented in HMOS and has a "Read Back" command not available on the 8253, and permits reading and writing of the same counter to be interleaved. Modern PC compatibles, either when using SoC CPUs or southbridge typically implement full 8254 compatibility for backward compatibility and interoperability. The Read Back command being a vital I/O feature for interoperability with multicore CPUs and GPUs. Variants There is military version of Intel M8253 with the temperature range of -55°C to +125°C which it also have ±10% 5V power tolerance. The available 82C53 CMOS version was outsourced to Oki Electronic Industry Co., Ltd. Features The timer has three counters, numbered 0 to 2. Each channel can be programmed to operate in one of six modes. Once programmed, the channels operate independently. Each counter has two input pins – "CLK" (clock input) and "GATE" – and one pin, "OUT", for data output. The three counters are 16-bit down counters independent of each other, and can be easily read by the CPU. Data bus buffer contains the logic to buffer the data bus between the microprocessor and the internal registers. It has 8 input pins, usually labelled as D7..D0, where D7 is the MSB. Read/write logic has 5 pins, which are listed below. The "" denotes X is an active low signal. : read signal : write signal : chip select signal A0, A1: address lines Operation mode of the PIT is changed by setting the above hardware signals. For example, to write to the Control Word Register, one needs to set =0, =1, =0, A1=A0=1. The control word register contains the programmed information which will be sent (by the microprocessor) to the device. It defines how each channel of the PIT logically works. Each access to these ports takes about 1 µs. To initialize the counters, the microprocessor must write a control word (CW) in this register. This can be done by setting proper values for the pins of the Read/Write Logic block and then by sending the control word to the Data/Bus Buffer block. The control word register contains 8 bits, labeled D7..D0 (D7 is the MSB). The decoding is somewhat complex. Most values set the parameters for one of the three counters: The most significant two bits (if not 11) select the counter register the command applies to. The next two bits (if not 00) select the format that will be used for subsequent read/write access to the counter register. This is commonly set to a mode where accesses alternate between the least-significant and most-significant bytes. One difference between the 8253 and 8254 is that the former had one internal bit which affected both reads and writes, so if the format was set to 2-byte, a read of the lsbyte would cause a following write to be directed to the msbyte. The 8254 used separate bits for reads and writes. The next three bits select the mode that the counter will operate in. The least significant bit selects whether the counter will operate in binary or BCD. (BCD counting almost never used and may not be implemented properly in emulators or southbridges.) However, there are two other forms: Latch the count for a given timer. The next read will, rather than returning the counter value at the moment of the read, return the counter value at the moment of the latch command. After the read completes, later reads will return the current counter. When the latch command is used, the mode and BCD status are not changed. (8254 only) Latch the status and/or count for multiple timers. This allows multiple simultaneous latch commands using a bitmap. Also, the current channel configuration may be read back in addition to the count. When setting the PIT, the microprocessor first sends a control message, then a count message to the PIT. The counting process will start after the PIT has received these messages, and, in some cases, if it detects the rising edge from the GATE input signal. Status byte format. Bit 7 allows software to monitor the current state of the OUT pin. Bit 6 indicates when the count can be read; when this bit is 1, the counting element has not yet been loaded and cannot be read back by the processor. Bits 5 through 0 are the same as the last bits written to the control register. Operation modes The D3, D2, and D1 bits of the control word set the operating mode of the timer. There are 6 modes in total; for modes 2 and 3, the D3 bit is ignored, so the missing modes 6 and 7 are aliases for modes 2 and 3. All modes are sensitive to the GATE input, with GATE high causing normal operation, but the effects of GATE low depend on the mode: Modes 0 and 4: Counting is suspended while GATE is low, and resumed while GATE is high. Modes 1 and 5: The rising edge of GATE starts counting. GATE may go low without affecting counting, but another rising edge will restart the count from the beginning. Modes 2 and 3: GATE low forces OUT high immediately (without waiting for a clock pulse) and resets the counter (on the next clock falling edge). When GATE goes high again, counting restarts from the beginning. Mode 0 (000): Interrupt on terminal count Mode 0 is used for the generation of accurate time delay under software control. In this mode, the counter will start counting from the initial COUNT value loaded into it, down to 0. Counting rate is equal to the input clock frequency. The OUT pin is set low after the Control Word is written, and counting starts one clock cycle after the COUNT is programmed. OUT remains low until the counter reaches 0, at which point OUT will be set high until the counter is reloaded or the Control Word is written. The counter wraps around to 0xFFFF internally and continues counting, but the OUT pin never changes again. The Gate signal should remain active high for normal counting. If Gate goes low, counting is suspended, and resumes when it goes high again. The first byte of the new count when loaded in the count register, stops the previous count. Mode 1 (001): programmable one shot In this mode 8253 can be used as a Monostable multivibrator. GATE input is used as trigger input. OUT will be initially high. OUT will go low on the Clock pulse following a trigger to begin the one-shot pulse, and will remain low until the Counter reaches zero. OUT will then go high and remain high until the CLK pulse after the next trigger. After writing the Control Word and initial count, the Counter is armed. A trigger results in loading the Counter and setting OUT low on the next CLK pulse, thus starting the one-shot pulse. An initial count of N will result in a one-shot pulse N CLK cycles in duration. The one-shot is retriggerable, hence OUT will remain low for N CLK pulses after any trigger. The one-shot pulse can be repeated without rewriting the same count into the counter. GATE has no effect on OUT. If a new count is written to the Counter during a oneshot pulse, the current one-shot is not affected unless the counter is retriggered. In that case, the Counter is loaded with the new count and the oneshot pulse continues until the new count expires. Mode 2 (X10): rate generator In this mode, the device acts as a divide-by-n counter, which is commonly used to generate a real-time clock interrupt. Like other modes, the counting process will start the next clock cycle after COUNT is sent. OUT will then remain high until the counter reaches 1, and will go low for one clock pulse. The following cycle, the count is reloaded, OUT goes high again, and the whole process repeats itself. The time between the high pulses depends on the preset count in the counter's register, and is calculated using the following formula: Value to be loaded into counter = Note that the values in the COUNT register range from to 1; the register never reaches zero. Mode 3 (X11): square wave generator This mode is similar to mode 2. However, the duration of the high and low clock pulses of the output will be different from mode 2. Suppose is the number loaded into the counter (the COUNT message), the output will be high for counts, and low for counts. Thus, the period will be counts, and if is odd, the extra half-cycle is spent with OUT high. Mode 4 (100): Software Triggered Strobe After Control Word and COUNT is loaded, the output will remain high until the counter reaches zero. The counter will then generate a low pulse for 1 clock cycle (a strobe) – after that the output will become high again. GATE low suspends the count, which resumes when GATE goes high again. Mode 5 (101): Hardware Triggered Strobe This mode is similar to mode 4. However, the counting process is triggered by the GATE input. After receiving the Control Word and COUNT, the output will be set high. Once the device detects a rising edge on the GATE input, it will start counting. When the counter reaches 0, the output will go low for one clock cycle – after that it will become high again, to repeat the cycle on the next rising edge of GATE. IBM PC programming tips and hints The 8253 was used in IBM PC compatibles since their introduction in 1981. In modern times, this PIT is not included as a separate chip in an x86 PC. Rather, its functionality is included as part of the motherboard chipset's southbridge. In a modern chipset, this change may show up in the form of noticeably faster access to the PIT's registers in the x86 I/O address space. All PC compatibles operate the PIT at a clock rate of 105/88 = 1.193 MHz, the NTSC colorburst frequency. This frequency, divided by 216 (the largest divisor the 8253 is capable of) produces the ≈18.2 Hz timer interrupt used in MS-DOS and related operating systems. In the original IBM PCs, Counter 0 is used to generate a timekeeping interrupt. Counter 1 (A1=0, A0=1) is used to trigger the refresh of DRAM memory. The last counter (A1=1, A0=0) is used to generate tones via the PC speaker. Newer motherboards include additional counters through the Advanced Configuration and Power Interface (ACPI), a counter on the Local Advanced Programmable Interrupt Controller (Local APIC), and a High Precision Event Timer. The CPU itself also provides the Time Stamp Counter (TSC) facility. On PCs the address for timer0 (chip) is at port 40h..43h and the second timer1 (chip) is at 50h..53h. On x86 PCs, many video card BIOS and system BIOS will reprogram the second counter for their own use. Reprogramming typically happens during video mode changes, when the video BIOS may be executed, and during system management mode and power saving state changes, when the system BIOS may be executed. This prevents any serious alternative uses of the timer's second counter on many x86 systems. The timer that is used by the system on x86 PCs is Channel 0, and its clock ticks at a theoretical value of 1193181.8181... Hz, i.e. one third of the NTSC color subcarrier frequency, which comes from dividing the system clock (14.31818 MHz) by 12. This is a holdover of the very first CGA PCs – they derived all necessary frequencies from a single quartz crystal, and to make TV output possible, this oscillator had to run at a multiple of the NTSC color subcarrier frequency. As stated above, Channel 0 is implemented as a counter. Typically, the initial value of the counter is set by sending bytes to the Control, then Data I/O Port registers (the value 36h sent to port 43h, then the low byte to port 40h, and port 40h again for the high byte). The counter counts down to zero, then sends a hardware interrupt (IRQ 0, INT 8) to the CPU. The counter then resets to its initial value and begins to count down again. The fastest possible interrupt frequency is a little over a half of a megahertz. The slowest possible frequency, which is also the one normally used by computers running MS-DOS or compatible operating systems, is about 18.2 Hz. Under these real mode operating systems, the BIOS accumulates the number of INT 8 calls that it receives in real mode address 0040:006c, which can be read by a program. As a timer counts down, its value can also be read directly by reading its I/O port twice, first for the low byte, and then for the high byte. However, in free-running counter applications such as in the x86 PC, it is necessary to first write a latch command for the desired channel to the control register, so that both bytes read will belong to one and the same value. According to a 2002 Microsoft document, "because reads from and writes to this hardware [8254] require communication through an IO port, programming it takes several cycles, which is prohibitively expensive for the OS. Because of this, the aperiodic functionality is not used in practice." See also LAPIC provides a programmable timer HPET References Further reading External links 82C54 Datasheet Overview of the Intel 8253 PIT chip Intel 8253 complete datasheets 8254/82C54 Programmable Interval Timer FAQ Programmable Interval Timer - OSDev Wiki Intel chipsets IBM PC compatibles Input/output integrated circuits
36346048
https://en.wikipedia.org/wiki/Seed7
Seed7
Seed7 is an extensible general-purpose programming language designed by Thomas Mertes. It is syntactically similar to Pascal and Ada. Along with many other features, it provides an extension mechanism. Seed7 supports introducing new syntax elements and their semantics into the language, and allows new language constructs to be defined and written in Seed7. For example, programmers can introduce syntax and semantics of new statements and user defined operator symbols. The implementation of Seed7 differs significantly from that of languages with hard-coded syntax and semantics. Features Seed7 supports the programming paradigms: imperative, object-oriented (OO), and generic. It also supports features such as call by name, multiple dispatch, function overloading, operator overloading, exception handling and arbitrary-precision arithmetic. Major features include: User defined statements and operators Abstract data types Templates without special syntax Object-oriented with interfaces and multiple dispatch Static typing May be interpreted or compiled Source code portability Runs under BSD, Linux, Mac OS X, Unix, Windows Several programming language concepts are generalized: Type declarations (which assign a name to a type) and function definitions take the form of constant definitions. Compile-time expressions can execute user-defined functions. Overloading and object-orientation (with multiple dispatch) are seen as common concepts. They just happen at different times: compile time and run time, respectively. Type names and type descriptions can be used as parameter and function result. Functions, which are executed at compile time, can be used to define objects. Templates are written as compile time functions with type parameters. Arrays, hash maps and structs are not a hard-coded feature. Instead they are defined as abstract data type in libraries. Parser and interpreter are part of the runtime library. UTF-32 Unicode support. This avoids problems of variable-length encodings like UTF-8 and UTF-16. The Seed7 project includes both an interpreter and a compiler. The interpreter starts programs very quickly, supporting fast program development. The compiler uses the parser and reflection interfaces from the run-time library to generate a C program, which is subsequently compiled to machine code. Compiled Seed7 programs can have comparable performance to C programs. Libraries Seed7 has many libraries, covering areas including containers, numeric functions, lexical analysis, file manipulation, networking (sockets, Transport Layer Security (TLS/SSL), Hypertext Transfer Protocol (HTTP), HTTP Secure (HTTPS), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), etc.), graphics, pixmap and vector fonts, database independent API, Common Gateway Interface (CGI) support, data compression, archive files (tar, zip, cpio, ar, rpm), character encoding, time and date handling, XML processing, message digests and more. These libraries reduce the need to use unportable operating system features and third-party libraries (which might not always be present) directly. Seed7 libraries contain abstraction layers for hardware, operating system and third-party libraries, e.g. graphic and database libraries. In other words, no changes are needed to move Seed7 programs between different processors or operating systems. TLS library Seed7 has its own implementation of Transport Layer Security. The library includes AES and elliptic-curve cryptography. Database abstraction API Seed7 provides a library with a database independent API. Programs can connect to MySQL, MariaDB, SQLite, PostgreSQL, Oracle, Open Database Connectivity (ODBC), Firebird, InterBase, Db2 and SQL Server databases. Independent from the database prepared statements can be created, bind variables can be used, the statements can be executed and result sets can be fetched. History Seed7 is based on MASTER, an extensible programming language described in the diploma and doctoral theses of Thomas Mertes. Most of the original ideas of MASTER, such as user defined statements and operators, can be found in Seed7. A precompiler, to translate MASTER to Pascal, was proposed, but unimplemented, in the original project. In 1989, development began on an interpreter for MASTER, named HAL. In 2005, the MASTER and HAL projects were released as open source under the Seed7 project name. Since then new versions have been released every two or three weeks. As of version 2021-04-25 the Seed7 project contains more than 500,000 source lines of code and several hundred pages of documentation. Extension mechanism An extension includes two parts: a syntax definition, giving a template for the new syntactic form, and a standard Seed7 function, used to define the semantics. Syntax definition The syntax definition uses the Seed7 Structured Syntax Description (S7SSD). A S7SSD statement like $ syntax expr: .(). + .() is -> 7; specifies the syntax of the + operator. The right arrow -> describes the associativity: Binding of operands from left to right. With 7 the priority of the + operator is defined. The syntax pattern .(). + .() is introduced and delimited with dots (.). Without dots the pattern is () + (). The symbol () is a nonterminal symbol and + is a terminal symbol. The S7SSD does not distinguish between different nonterminal symbols. Instead it only knows one nonterminal symbol: (). Semantic extension The definition of the + operator for complex numbers is just a function definition: const func complex: (in complex: summand1) + (in complex: summand2) is func result var complex: sum is complex.value; begin sum.re := summand1.re + summand2.re; sum.im := summand1.im + summand2.im; end func; References External links - Homepage with FAQ, manual, screenshots, examples, library descriptions, benchmarks and a set of algorithms Seed7 at GitHub Download Seed7 from its main repository at SourceForge Seed7 at Rosetta Code - Contains many Seed7 examples The Quest for the Ultimate Cycle explores the 3n+C extension of the Collatz Conjecture with Seed7 programs Blog by Remo Laubacher: Statically linked Linux executables with GCJ, Seed7 and haXe (2011) Blog by David Gudeman The Seed7 Programming Language (2015) A FreeBSD port / see also here, maintained by Pietro Cerutti An OpenBSD port, provided by Brian Callahan A Seed7 package for openSUSE/Fedora, (see also here or here) A discussion where Seed7 is described as language where new syntax can actually be defined by language users Seed7 at "Fossies" - the Fresh Open Source Software Archive Multi-paradigm programming languages Statically typed programming languages Object-oriented programming languages Cross-platform software Extensible syntax programming languages Free software programmed in C Free compilers and interpreters Programming languages created in 2005 Software using the GPL license
6477918
https://en.wikipedia.org/wiki/Moore%20School%20Lectures
Moore School Lectures
Theory and Techniques for Design of Electronic Digital Computers (popularly called the "Moore School Lectures") was a course in the construction of electronic digital computers held at the University of Pennsylvania's Moore School of Electrical Engineering between July 8, 1946, and August 30, 1946, and was the first time any computer topics had ever been taught to an assemblage of people. The course disseminated the ideas developed for the EDVAC (then being built at the Moore School as the successor computer to the ENIAC) and initiated an explosion of computer construction activity in the United States and internationally, especially in the United Kingdom. Background The Moore School in Philadelphia, Pennsylvania was at the center of developments in high-speed electronic computing in 1946. On February 14 of that year it had publicly unveiled the ENIAC, the first general-purpose electronic digital computer, developed in secret beginning in 1943 for the Army's Ballistics Research Laboratory. Prior even to the ENIAC's completion, work had begun on a second-generation electronic digital computer, the EDVAC, which incorporated the stored program model. Work at the Moore School attracted researchers including John von Neumann, who served as a consultant to the EDVAC project, and Stan Frankel and Nicholas Metropolis of the Manhattan Project, who arrived to run one of the first major programs written for the ENIAC, a mathematical simulation for the hydrogen bomb project. World War II had spawned major national efforts in many forms of scientific research—continued in peacetime—that required computationally intensive analysis; the thirst for information about the new Moore School computing machines had not been slaked, but instead intensified, by the distribution of von Neumann's notes on the EDVAC's logical design. Rather than allow themselves to be inundated with requests for demonstrations or slow progress in computer research by withholding the benefits of the Moore School's expertise until papers could be published formally, the administration, including Dean Harold Pender, Prof. Carl Chambers, and Director of Research Irven Travis, respectively proposed, organized, and secured funding for what they envisioned as a lecture series for between 30 and 40 participants enrolled by select invitation. The 8-week course was conducted under the auspices of the U.S. Army's Ordnance Department and the U.S. Navy's Office of Naval Research, who promised (by verbal authorizations) the $3,000 requested to cover lecturer salaries and fees and $4,000 for travel, printing, and overhead. ($1,569 over this figure was ultimately claimed.) Even as the Moore School found itself in the computing spotlight, its computer design team was disintegrating into splinter groups who hoped to advance computing research commercially, or academically at more prestigious institutions. In the former group were ENIAC co-inventors J. Presper Eckert and John Mauchly, who the previous March had departed the Moore School amidst a patent rights dispute to found the first computer company, the Electronic Control Company (later renamed to Eckert–Mauchly Computer Corporation), and took many on the Moore School staff with them; in the latter group were Herman Goldstine (the Army's liaison to the Moore School who served as administrative overseer of the ENIAC's construction) and Arthur Burks (a Moore School professor on the ENIAC design team), lured to the Institute for Advanced Study by von Neumann. Despite the somewhat acrimonious fracturing of the ENIAC/EDVAC group, these figures gave the majority of the Moore School Lectures, with Eckert and Mauchly receiving the highest salaries ($1,200 each), while Goldstine and the others received only travel expenses and an honorarium ($50 per lecture). Lecturers and lectures Lectures were given 5 days a week on weekdays and were from 1 to 3 hours long with afternoons typically reserved for informal seminars. Many of the pioneers of early computer development, especially those involved with [ENIAC] contributed to the Moore School Lectures, most prolifically Pres Eckert, followed by John Mauchly and Herman Goldstine. The topics covered virtually all facets of electronic computing relevant to the construction and operation of digital computers, and included, by popular demand, an unscheduled presentation of the ENIAC during the latter half of the sixth week and the first half of the seventh week, with lectures by Mauchly, Sharpless, and Chu. Discussions of the ENIAC were resisted since its logical design had been obsoleted even before its completion by ongoing work on the EDVAC with its stored-program concept; nevertheless, it was the only electronic digital computer then in operation and the students petitioned to see demonstrations and learn of its design. From the Moore School team J. Presper Eckert of the Electronic Control Company: "A Preview of a Digital Computing Machine" (July 15, 1946) "Types of Circuits—General" (July 18, 1946) "Reliability of Parts" (July 23, 1946) "Adders" (July 26, 1946) (with Sheppard) "Multipliers" (July 29, 1946) "Tapetypers and Printing Mechanisms" (August 1, 1946) "Continuous Variable Input and Output Devices" (August 6, 1946) "Reliability and Checking" (August 7, 1946) "Electrical Delay Lines" (August 14, 1946) "A Parallel-Type EDVAC" (August 22, 1946) "A Parallel Channel Computing Machine" (August 26, 1946) John W. Mauchly of the Electronic Control Company: "Digital and Analogy Computing Machines" (July 8, 1946) "The Use of Function Tables with Computing Machines" (July 12, 1946) "Sorting and Collating" (July 25, 1946) "Conversion Between Binary and Decimal Number Systems" (July 29, 1946) "Code and Control II: Machine Design and Instruction Codes" (August 9, 1946) "Introduction to the ENIAC" (August 15, 1946) (unscheduled) "Block Diagrams of the ENIAC III" (August 20, 1946) (unscheduled) "Accumulation of Errors in Numerical Methods" (August 30, 1946) Herman Goldstine of the Institute for Advanced Study, Princeton, New Jersey: "Numerical Mathematical Methods I" (July 10, 1946) "Numerical Mathematical Methods II" (July 11, 1946) "Numerical Mathematical Methods III" (July 16, 1946) "Numerical Mathematical Methods V" (July 22, 1946) "Numerical Mathematical Methods VI" (July 30, 1946) "Numerical Mathematical Methods VII" (August 2, 1946) Arthur W. Burks of the Institute for Advanced Study, Princeton, New Jersey: "Digital Machine Functions" (July 12, 1946) "Numerical Mathematical Methods IV" (July 22, 1946) "Numerical Mathematical Methods VIII" (August 2, 1946) T. Kite Sharpless of the Moore School: "Switching and Coupling Circuits" (July 19, 1946) "Block Diagrams of the ENIAC I" (August 16, 1946) (unscheduled) "Block Diagrams of the ENIAC II" (August 19, 1946) (unscheduled) "Description of Serial Acoustic Binary EDVAC I" (August 28, 1946) "Description of Serial Acoustic Binary EDVAC II" (August 28, 1946) Jeffrey Chuan Chu of the Moore School: "Magnetic Recording" (July 31, 1946) "Block Diagrams of the ENIAC IV" (August 21, 1946) (unscheduled) C. Bradford Sheppard of the Moore School: "Elements of a Complete Computing System" (July 15, 1946) "Adders" (July 26, 1946) (with Eckert) "Memory Devices" (July 24, 1946) "Code and Control I" (August 8, 1946) (filling in for Eckert) "Code and Control III" (scheduled but not given) "A Four-Channel Coded-Decimal Electrostatic Machine" (August 27, 1946) Irven Travis of the Moore School: "The History of Computing Devices" (July 8, 1946) Sam B. Willams, consultant to the Moore School: "Reliability and Checking in Digital Computing Systems" (August 7, 1946) From the University of Pennsylvania Hans Rademacher: "On the Accumulation of Errors in Numerical Integration on the ENIAC" (July 22, 1946) From Harvard University Howard Aiken: "The Automatic Sequence Controlled Calculator" (July 16, 1946) "Electro-Mechanical Tables of the Elementary Functions" (July 17, 1946) From the U.S. Navy Office of Research and Inventions Perry Crawford, Jr.: "Applications of Digital Computation Involving Continuous Input and Output Variables" (August 5, 1946) From the National Bureau of Standards John H. Curtiss: "A Review of Government Requirements and Activities in the Field of Automatic Digital Computing Machinery" (August 1, 1946) From the University of California, Berkeley Derrick H. Lehmer: "Computing Machines for Pure Mathematics" (July 9, 1946) From the University of Manchester, England Douglas Hartree: "Some General Considerations in the Solutions of Problems in Applied Mathematics" (July 9, 1946) From RCA Jan Rajchman: "The Selectron" (August 23, 1946) From the Naval Ordnance Laboratory Calvin N. Mooers: "Code and Control IV: Examples of a Three-Address Code and the Use of 'Stop Order Tags'" (August 12, 1946) "Discussions of Ideas for the Naval Ordnance Laboratory Computing Machine" (August 26, 1946) From the Institute for Advanced Study John von Neumann: "New Problems and Approaches" (August 13, 1946) Independent consultant George Stibitz: "Introduction to the Course on Electronic Computers" (July 8, 1946) The initial plan for the lectures, outlined by Chambers in a June 28, 1946, memorandum, was for them to be grouped into four major headings, with the second and third being presented concurrently after the completion of the first: General Introduction to Computing, covering the history, types, and uses of computing devices; Machine Elements, focusing on hardware and, indeed, software, under the term "code and control"; Detailed Study of Mathematics of Problems, what today might constitute a course in programming, including the Goldstine/Burks lectures on numerical mathematical methods and Mauchly's lectures on sorting, decimal-binary conversion and error accumulation; and finally a series of lectures on overall machine design called Final Detailed Presentation of Three Machines, though it actually came to include six machines, including the ENIAC, which despite its fame had not been an intended focus of any of the lectures. The actual record of the lectures is incomplete. While many of the lectures were recorded on a wire recorder by Herman Lukoff and Dick Merwin, the recorder frequently broke down mid-lecture, and the recordings took several months to be transcribed and proofed by the lecturers. It wasn't until two years after the lectures, in 1948, that all of the material was assembled and published in four volumes edited by the Moore School's George W. Patterson, who was on the EDVAC staff. Some of the gaps have since been filled in with the notes of student Frank M. Verzuh. Students 28 students were invited to attend the Moore School Lectures, each a veteran engineer or mathematician: Sam N. Alexander, Edward W. Cannon, and Roger Curtis of the National Bureau of Standards Mark Breiter of the War Department's Office of the Chief of Ordnance Arthur B. Horton, Warren S. Loud, and Lou D. Wilson of MIT David R. Brown and Robert R. Everett of the MIT Servomechanisms Laboratory Frank M. Verzuh of MIT's Rockefeller Electronic Computer Project Howard L. Clark and G.W. Hobbs of General Electric Co. R.D. Elbourne of the Naval Ordnance Laboratory, who worked for John Vincent Atanasoff Herbert Galman and Joshua Rosenbloom of the Frankford Arsenal Orin P. Gard of Wright Field's Armament Laboratory Simon E. Gluck of the Moore School D.H. Gridley and Louis Suss of the Naval Research Laboratory Samuel Lubkin of Aberdeen Proving Ground's Ballistics Research Laboratory James T. Pendergrass of the OP-20-G CNO Navy Department David Rees of Manchester University, England Albert Sayre of the Army Security Agency Phillip A. Shaffer, Jr. of the Naval Ordnance Testing Station, Pasadena, California Claude E. Shannon of Bell Telephone Laboratories Albert E. Smith of the Navy Office of Research and Inventions Maurice V. Wilkes of Cambridge University, who joined the course only for its final two weeks after numerous problems with his travel H.I. Zagor of the Reeves Instrument Company Uninvited attendees saw at least some of the lectures: Cuthbert Hurd of Allegheny College Jay Forrester of MIT Unidentified representatives of the MIT Servomechanisms Laboratory who took the place of Brown and Everett on any given week Additionally, many of the lecturers attended a number of the lectures by others. The individuals and institutions represented at the Moore School Lectures went on to be involved with numerous successful computer construction projects in the late 1940s and early 1950s, including EDSAC, BINAC, UNIVAC, CALDIC, SEAC and SWAC, the IAS machine, and the Whirlwind. The success of the Moore School Lectures prompted Harvard University to host the first computer conference in January, 1947; that same year the Association for Computing Machinery was founded as a professional society to organize future conferences. References External links The 48 Moore School Lectures and a Digest of the Final Lectures by Brian Napper The Moore School Lectures and the British Lead in Stored Program Computer Development (1946 -1953) by John R. Harris Oral history interviews on Moore School, Charles Babbage Institute, University of Minnesota. Includes interviews with Carl Chambers, J. Presper Eckert, Irven A. Travis, S. Reid Warren, Arthur W. Burks, Alice Burks, James T. Pendergrass, and others. Frank M. Verzuh Moore School Lecture Notes 1946, Charles Babbage Institute, University of Minnesota. Personal lecture notes on the theory and techniques for the design of electronic digital computers, July 8-August 31, 1946 History of computing hardware University of Pennsylvania
16154672
https://en.wikipedia.org/wiki/5144%20Achates
5144 Achates
5144 Achates is a large Jupiter trojan from the Trojan camp, approximately in diameter. It was discovered on 2 December 1991, by American astronomer Carolyn Shoemaker at the Palomar Observatory in southern California, United States. The assumed C-type asteroid has a rotation period of 6 hours, a notably eccentric orbit of 0.27, and belongs to the 40 largest Jupiter trojans. It was named after Achates from Greco-Roman mythology. Orbit and classification Achates is a dark Jovian asteroid orbiting in the trailing Trojan camp at Jupiter's Lagrangian point, 60° behind its orbit in a 1:1 resonance (see Trojans in astronomy). This Jupiter trojan is also a non-family asteroid of the Jovian background population. It orbits the Sun at a distance of 3.8–6.6 AU once every 11 years and 10 months (4,331 days; semi-major axis of 5.2 AU). Its orbit has a high eccentricity of 0.27 and an inclination of 9° with respect to the ecliptic. Achates has the most eccentric orbit of all larger Jupiter trojans with an absolute magnitude brighter than 11. The asteroid was first observed as at Nice Observatory in August 1939. The body's observation arc begins with a precovery taken at the Goethe Link Observatory in May 1949, or more than 42 years prior to its official discovery observation at Palomar. Physical characteristics Achates is an assumed, carbonaceous C-type asteroid. Rotation period Several rotational lightcurve of Achates have been obtained from photometric observations by Robert Stephens, Stefano Mottola and Lawrence Molnar since 1992. The best-rated measurement made at the robotic Calvin–Rehoboth Observatory in February 2007, gave a rotation period of 5.958 hours with a brightness amplitude of 0.32 magnitude (). Diameter and albedo According to the surveys carried out by the Japanese Akari satellite, the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer, and the Infrared Astronomical Satellite IRAS, Achates measures between 80.96 and 91.91 kilometers in diameter and its surface has an albedo between 0.0576 and 0.074. The Collaborative Asteroid Lightcurve Link derives an albedo of 0.0526 and a diameter of 91.82 kilometers based on an absolute magnitude of 9.0. Naming This minor planet was named from Greco-Roman mythology after Achates ("fidus Achates"), a close friend and brother-in-arms of the Trojan hero Aeneas in Virgil's Aeneid. After the Trojan War, Achates commanded his own ship in the wandering fleet of Trojans as they sought to establish a new city. Together with Aeneas, he descended into the underworld to find Aeneas' father, Anchises. The official naming citation was published by the Minor Planet Center on 4 June 1993 (). Notes References External links Asteroid Lightcurve Database (LCDB), query form (info ) Dictionary of Minor Planet Names, Google books Discovery Circumstances: Numbered Minor Planets (5001)-(10000) – Minor Planet Center 005144 Discoveries by Carolyn S. Shoemaker Minor planets named from Greek mythology Named minor planets 19911202
7443037
https://en.wikipedia.org/wiki/List%20of%20neuroimaging%20software
List of neuroimaging software
Neuroimaging software is used to study the structure and function of the brain. To see an NIH Blueprint for Neuroscience Research funded clearinghouse of many of these software applications, as well as hardware, etc. go to the NITRC web site. 3D Slicer Extensible, free open source multi-purpose software for visualization and analysis. Amira 3D visualization and analysis software Analysis of Functional NeuroImages (AFNI) Analyze developed by the Biomedical Imaging Resource (BIR) at Mayo Clinic. Brain Image Analysis Package CamBA Caret Van Essen Lab, Washington University in St. Louis CONN (functional connectivity toolbox) Diffusion Imaging in Python (DIPY) EEGLAB FMRIB Software Library (FSL) FreeSurfer Imaris Imaris for Neuroscientists ISAS (Ictal-Interictal SPECT Analysis by SPM) LONI Pipeline, Laboratory of Neuro Imaging, USC Mango, Neurophysiological Biomarker Toolbox NITRC The Neuroimaging Informatics Tools and Resources Clearinghouse. An NIH funded database of neuroimaging tools Seed-based d mapping (previously signed differential mapping, SDM): a method for conducting meta-analyses of voxel-based neuroimaging studies. The Spinal Cord Toolbox (SCT) is the first comprehensive and open-source software for processing MR images of the spinal cord. Statistical parametric mapping (SPM) References Neuroimaging
3491886
https://en.wikipedia.org/wiki/Matt%20Grootegoed
Matt Grootegoed
Matthew Arthur Grootegoed (born May 6, 1982) is a former American college and professional football player who was a linebacker in the National Football League (NFL) and Canadian Football League (CFL). He played college football for the University of Southern California, and was recognized as an All-American. He was signed by the NFL's Detroit Lions as an undrafted free agent in 2005, and also played for the CFL's Calgary Stampeders in 2009. Early years Grootegoed was born in Huntington Beach, California. He attended Mater Dei High School in Santa Ana, California, with Matt Leinart. The Mater Dei Monarch Lions high school football team won three California Interscholastic Federation (CIF) championships while he was a member. As a junior in 1998, he rushed for more than 1,600 yards with twenty-one touchdowns on offense, and made 130 tackles, six forced fumbles and three interceptions on defense. In the CIF Division I championship game, which Mater Dei won, he earned Offensive and Defensive Player of the Game honors (he ran for 244 yards, with a 7.4 average, and two touchdowns). Following the season, he was selected as a Student Sports Junior All-American, Cal-Hi All-State first team, All-CIF Southern Section first team, All-CIF Division I Defensive Most Valuable Player (MVP), Los Angeles Times All-Orange County Back of the Year and Orange County Register All-Orange County Defensive MVP. During his 1999 senior season, he made 138 tackles, six interceptions (including two touchdown returns), seven tackles for losses and two forced fumbles as a free safety, and ran for 945 yards on 116 carries with fourteen touchdowns as a running back. He also played quarterback early in the season, completing 21 of 41 passes for 300-plus yards. Afterward, he was selected for the USA Today All-USA first team, Parade All-American, Super Prep All-American, Prep Star All-American, ESPN All-American, Cal-Hi Sports All-State first team, All-CIF Southern Section first team, and received the All-CIF Division I Defensive MVP Award, Los Angeles Times Glenn Davis Award, Los Angeles Times All-Orange County first team, Orange County Register All-Orange County Defensive MVP and All-Serra League MVP. College career Grootegoed received an athletic scholarship to attend the University of Southern California, where he was a four-year starter for coach Pete Carroll's USC Trojans football team from 2000 to 2004. After redshirting as a true freshman in 2000, he earned a spot in the Trojans' starting line-up. Carroll said of him "Things just happen when he's on the field. He knocks the ball down, knocks the ball loose, forces plays in the backfield and makes plays getting off blocks. You can't hold him down." While Grootegoed played for the Trojans, the team won three straight Pacific-10 Conference championships (2002, 2003, 2004) and two consecutive Associated Press (AP) national championships in 2003 and 2004. He was a second-team All-Pac-10 selection in 2003. Following his senior season in 2004, he was a finalist for the Butkus Award, and was recognized as a first-team All-Pac-10 selection and a consensus first-team All-American. Professional career National Football League On April 26, 2005, Grootegoed was signed as an undrafted free agent by the Tampa Bay Buccaneers following the 2005 NFL Draft, eventually released to their practice squad, and was later picked up by the Detroit Lions. Grootegoed played for the Lions in the final three games of their season. Canadian Football League Grootegoed played for the CFL's Calgary Stampeders from to , and was a member of the Stampeders' 2008 Grey Cup championship team. The Stampeders released Grootegoed on September 9, 2009. References Living people 1982 births American football linebackers American players of Canadian football Canadian football linebackers Calgary Stampeders players Detroit Lions players Tampa Bay Buccaneers players USC Trojans football players All-American college football players Sportspeople from Huntington Beach, California Players of American football from California
64316716
https://en.wikipedia.org/wiki/Chan-Jin%20Chung
Chan-Jin Chung
Chan-Jin Chung (정찬진) or popularly known as "CJ" Chung is a full professor of Computer Science at Lawrence Technological University(LTU) in Michigan, USA. He founded an international autonomous robotics competition called Robofest in the 1999–2000 academic year as well as numerous educational programs for youth by integrating STEM (Science, technology, engineering, and mathematics), arts, autonomous robotics, and computer science. He also served as the founding USA National Organizer of World Robot Olympiad (WRO) in 2014 and 2015. He also started the WISER (World conference on Integrated STEaM Education through Robotics) conference in 2014. His research areas include evolutionary computation, cultural algorithms, intelligent systems & autonomous mobile robotics, software engineering, machine learning & deep learning, computer science education, and educational robotics. Early life, education, and research & development projects Chung was born in Seoul, Korea and attended Hongik University in Seoul, where he earned a B.S. Computer Science degree in 1981. His first professional job was teaching middle school math as a part-time instructor at YMCA Academy in Seoul in 1979. He worked for Korea Electric Power Corporation to develop an online customer information system with COBOL and IMS Databases using IBM 3031 mainframe computer in 1981–1982. While he was working for Electronics and Telecommunications Research Institute (ETRI) as a research scientist from 1982 to 1992, he was involved in developing TDX switching systems that became later the base system for the first commercialized CDMA system in the world. Chung also worked as a visiting researcher to develop telecommunication software modules for L.M. Ericsson's AXE-10 in Stockholm, Sweden in 1983–1984. He received his Ph.D. in Computer Science from Wayne State University in 1997. His doctoral research was the development of a self-adaptive artificial intelligence system motivated by cultural evolution processes, which was then applied to solve nonlinear function optimization problems including training artificial neural networks. Wei-Wen Chang, his Master's student and Chung won the 1st place award in 3D design optimization competition sponsored by HONDA R&D Europe GmbH as a part of the IEEE World Congress in Computational Intelligence Conference in 2002. Achievements in STEaM, robotics, and computer science education fields A world-wide autonomous robot competition called Robofest was the brainchild of Prof. Chung. As of August 2019, over 28,000 students from 15 US States and 22 countries have participated in the competition since 1999. He launched numerous integrated educational programs in computer science and STEAM fields such as RoboParade a parade of autonomous vehicles in 2006, RoboFashion and Dance Show in 2007, Vision Centric robot Challenge (Vcc) in 2007, Robot Music Camp in 2013, Global Robotics Art Festival (GRAF) in 2013, WRO-USA in 2014, CS+PA^2: Learning Computer Science with Physical Activities and Animation in 2018, and Robofest eAcademy with Elmer Santos in 2019. He has been a faculty advisor of LTU's IGVC (Intelligent Ground Vehicle Competition) teams since 2003. His H2Bot team won 1st place design award in 2007. His team was also selected to represent the US to compete at RoboCup Four-legged robot soccer division in 2007. BigFoot II team won the Grand Award LESCOE Cup in 2016. As of June 2020, he leads ACTor (Autonomous Campus TranspORt) project using a drive-by-wire electric vehicle. The ACTor vehicle team won the Self-Drive Challenge competition at the IGVC in 2017, 2018, and 2019. In 2011, IEEE USA honored Dr. Chung with its citation of honor award for his leadership in STEM education. Honours, awards and distinctions Engineering Society of Detroit (ESD) GOLD Awards – Outstanding IEEE Member Award, March 11, 2015, at ESD Gold Award Banquet Citation of Honor Award, IEEE-USA, “for the leadership in founding the Robofest competition to inspire interest in engineering among pre-college students”, March 2011 MGA Achievement Award, IEEE Member Geographic Activities (MGA) Board, “for inspiring thousands of young students into the science and engineering career path through his Robofest and hands-on robotics workshops”, December, 2010 The Mary E. and Richard E. Marburger Distinguished Achievement Award – 2007 Champion for Institutional Excellence and Preeminence, Lawrence Technological University Excellent Research Award, Electronics and Telecommunications Research Institute (ETRI), December 31, 1986, Certificate No. 151 References and notes External links CJ Chung's Personal Homepage Robofest Homepage Robofest FaceBook page RoboParade CS+PA^2 World Robot Olympiad USA 2014 and 2015 1959 births Living people People from Seoul Computer scientists Computer science educators Hongik University alumni Wayne State University alumni
62445194
https://en.wikipedia.org/wiki/Joyce%20Yu-Jean%20Lee
Joyce Yu-Jean Lee
Joyce Yu-Jean Lee (b. 1979) is a visual artist working with video, photography, interactive installation and performance that combine social practice, institutional critique and activism together in an interdisciplinary practice. She is the founder of FIREWALL Internet Cafe social software consisting of a Google and Baidu dual-search engine that garnered backlash from Chinese state authorities in 2016. Background Lee was born in Richardson, Texas to Chinese-Taiwanese immigrants, James C. and Patty Lee. Her siblings are architect, Juliet Lee and Joshua Lee. Her cousin is jazz pianist, Helen Sung. She graduated with a Bachelor of Arts from the College of Arts & Sciences, University of Pennsylvania in 2002 with a major in Communication and double minors in Psychology and Fine Art. In 2010, Lee earned her Masters of Fine Arts from the Maryland Institute College of Art from the Mount Royal School of Art (interdisciplinary graduate program). Career Lee was awarded a Vermont Studio Center fellowship supported by the Joan Mitchell Foundation, as well as a Henry Walters Traveling Scholarship to the Netherlands and Germany by the Walters Museum in Baltimore, MD upon graduating with her MFA in 2010. In 2012, Lee held Passages, a solo exhibition at Hamiltonian Gallery, Washington D.C. In 2013, Lee was awarded the Maryland State Arts Council 2013 Individual Artist Award as well as the Franklin Furnace Fund Grant. The latter was instrumental in her creation of the social project FIREWALL. Lee was awarded the Asian Women Giving Circle grant in 2015 and in 2016, Lee launched the first popup exhibition of FIREWALL at Chinatown Soup in Chinatown, Manhattan. Lee completed her first permanent digital installation, Aqua Lumen, in Alexandria, VA. Aqua Lumen was commissioned by Gables Old Town North in 2019. Lee is currently Assistant Professor of Art & Digital Media at Marist College in Poughkeepsie, New York. FIREWALL Internet Cafe Joyce Yu-Jean Lee founded FIREWALL in 2016 as a not-for-profit socially engaged research and interactive art project about Internet censorship. The goal of FIREWALL is to investigate online censorship and foster public dialogue about Internet freedom. FIREWALL consists of a computer station with a dual-search engine that simultaneously shows image results of any queried term in both Google and Baidu, the primary search engine in China. The project website Firewallcafe.com contains an archive of search terms that participants have queried, image results of these searches, and user interaction to vote on whether these results are affected by censorship. FIREWALL has been exhibited at the following locations: Center for Community Cultural Development in Hong Kong (2019), University of Michigan Penny W. Stamps School of Art & Design (2019), Alice Tully Hall at Lincoln Center in New York City (2017), The Oslo Freedom Forum in Norway (2016 - 2017). References External links FIREWALL 1979 births Living people Artists from Texas University of Pennsylvania alumni Maryland Institute College of Art alumni Marist College faculty
28654575
https://en.wikipedia.org/wiki/Seattle%20FilmWorks
Seattle FilmWorks
Seattle FilmWorks, Inc., was a mail order photographic film processing company that sold re-spooled 35mm motion picture film. It was founded in 1976 as American Passage Marketing by Gilbert Scherer. At its peak in 1997, Seattle FilmWorks employed approximately 800 people and processed about 20 miles (32,000 metres) of film a day in a 65,000 sq ft (6,000 square metre) lab. In 1978, Seattle FilmWorks started selling motion picture film that is processed using Kodak's ECN-2 process. The film was loaded into 35mm film canisters for still photography use, and the company returned an unexposed roll with each order. In the 1980s, Seattle FilmWorks aggressively marketed its products and services and offered two rolls of Seattle FilmWorks film for US$2.00. It advertised in newspapers, magazines, and package inserts. Seattle FilmWorks was sold and renamed PhotoWorks in 1999. Its marketing practices led to a lawsuit against the company in 2000, which was settled a year later, and the company was later closed. Products and services Seattle FilmWorks sold movie film stock that cannot be developed at standard retail processing facilities because it must be processed in ECN-2 chemistry. Color movie film stock incorporates rem-jet, a black carbon backing on the film base that must be removed before the film is developed. ECN-2 also differs from C-41, the standard color negative stock for stills photography, because it uses a different color developing agent. Seattle FilmWorks designated the process as SFW-XL. In the mid '90s, Seattle FilmWorks began to re-package standard C-41 processed films while keeping the SFW-XL process designation—these films were able to be processed at all C-41 capable photo labs; however because of the SFW-XL designation many would not unless they were willing to inspect the film and verify that it did not have the ECN-2 rem-jet backing (which cannot be processed on C-41 equipment without damaging the entire batch of film in the machines). Seattle FilmWorks also offered "prints and slides from the same roll", using cinema print film to create slides from the original negatives. These slides fade quickly when not properly stored, and are generally of inferior quality when compared to standard E6 or K-14 processed slides. Seattle FilmWorks offered the option of digitizing images at the time of processing, the files being in proprietary file formats; a *.sfw format for pictures returned on floppy disk and *.pwp format if downloaded on the Internet. In January 2000, the company entered an agreement with AT&T WorldNet Services that allowed 1.8 million AT&T customers to access Seattle FilmWorks' website, called PhotoWorks. Customers could view personal photographs, send them by e-mail and add them to websites. AT&T WorldNet's customers were also offered free processing of their first roll of film and free archiving of digital images on the PhotoWorks' website when ordering prints. Other companies continue to offer full-service ECN-2 processing and positive services; some use ECN-2 chemistry, but others develop in C-41. Motion picture processing labs all use ECN-2 chemistry compatible with this film. The company was known for running their computer operations on a main frame computer system that utilized an Ultimate operating system (also known as PICK), an early computer system similar to typical SQL database server systems that operate today. As was the case with the Seattle First National Bank Capital Management Project (using the same operating system) during the mid to late 1980s, this computer system was known to be very unreliable, with hard drive crashes and various indexing problems during downtime (as a result of lengthy recovery procedures) that resulted in database management and I.T. management problems (see Oregon State University case study on the Seattle First National Bank Capital Management Project for details), but the company was more successful in its applications than Seafirst before the system was discontinued in 1999. Fate Seattle FilmWorks was renamed PhotoWorks.com. In 2000, six plaintiffs took legal action against PhotoWorks at King County Superior Court, Seattle. The action alleged that FilmWorks had engaged in deceptive practices as its film could only be developed by the company and that 'free' rolls of film were actually charged for. The company settled the claims out-of-court, and promised to give 900,000 free rolls of C-41 film to its customers within one year and 300,000 rolls to customers that did not qualify as part of the first group but who requested a roll in the following six months. PhotoWorks also agreed to stop claiming its film could only be developed by PhotoWorks. In 2001, PhotoWorks operated 35 retail outlets, but began closing them as it concentrated upon its mail order and internet business. By August 2003, only eight of these outlets remained when the company announced that these would be closed by the end of September 2003. PhotoWorks discontinued all film processing in 2010 after it was purchased by American Greetings. PhotoWorks ceased operations in all forms in early 2011 and sold its customer list to Shutterfly. See also Color photography Color motion picture film Film base Film stock List of motion picture film stocks History of the camera History of photography Color print film References External links Tour of Seattle FilmWorks Seattle Film Works film Photography companies of the United States Defunct companies based in Seattle Mass media companies established in 1976 Mass media companies disestablished in 2011
29012707
https://en.wikipedia.org/wiki/WebP
WebP
WebP is an image file format that Google has developed as a replacement for JPEG, PNG, and GIF file formats. WebP yields files that are smaller for the same quality, or of higher quality for the same size. It supports both lossy and lossless compression, as well as animation and alpha transparency. Google announced the WebP format in September 2010, and released the first version of its supporting library in April 2018. History WebP was first announced by Google on 30 September in 2010 as a new open format for lossy compressed true-color graphics on the web, producing files that were smaller than JPEG files for comparable image quality. It was based on technology that Google acquired with the purchase of On2 Technologies. As a derivative of the VP8 video format, it is a sister project to the WebM multimedia container format. WebP-related software is released under a BSD free software license. On 3 October 2011, Google added an "Extended File Format" allowing WebP support for animation, ICC profile, XMP and Exif metadata, and tiling (compositing very large images from maximum 16384×16384 tiles). Older animated GIF files can be converted to animated WebP. On 18 November 2011, Google announced a new lossless compression mode, and support for transparency (alpha channel) in both lossless and lossy modes; support was enabled by default in libwebp 0.2.0 (16 August 2012). According to Google's measurements in November 2011, a conversion from PNG to WebP resulted in a 45% reduction in file size when starting with PNGs found on the web, and a 28% reduction compared to PNGs that are recompressed with pngcrush and PNGOUT. In July 2016, Apple added WebP support to early beta versions of macOS Sierra and iOS 10, but support was later removed in the GM seed versions of iOS 10 and macOS Sierra released in September 2016. In September 2020, WebP support was added in Safari version 14. The supporting libwebp library reached version 1.0 in April 2018. As of November 2021, web browsers that support WebP had 96% market share. Technology WebP's lossy compression algorithm is based on the intra-frame coding of the VP8 video format and the Resource Interchange File Format (RIFF) as a container format. As such, it is a block-based transformation scheme with eight bits of color depth and a luminance–chrominance model with chroma subsampling by a ratio of 1:2 (YCbCr 4:2:0). Without further content, the mandatory RIFF container has an overhead of only twenty bytes, though it can also hold additional metadata. The side length of WebP images is limited to pixels. WebP is based on block prediction. Each block is predicted on the values from the three blocks above it and from one block to the left of it (block decoding is done in raster-scan order: left to right and top to bottom). There are four basic modes of block prediction: horizontal, vertical, DC (one color), and TrueMotion. Mispredicted data and non-predicted blocks are compressed in a 4×4 pixel sub-block with a discrete cosine transform or a Walsh–Hadamard transform. Both transforms are done with fixed-point arithmetic to avoid rounding errors. The output is compressed with entropy encoding. WebP also has explicit support for parallel decoding. The reference implementation consists of converter software in the form of a command-line program for Linux (cwebp) and a programming library for the decoding, the same as for WebM. The open source community quickly managed to port the converter to other platforms, such as Windows. WebP's lossless compression, a newer format unrelated to VP8, was designed by Google software engineer Jyrki Alakuijala. It uses advanced techniques such as dedicated entropy codes for different color channels, exploiting 2D locality of backward reference distances and a color cache of recently used colors. This complements basic techniques such as dictionary coding, Huffman coding and color indexing transform. This format uses a recursive definition: all of the control images, such as the local entropy code selection, are encoded the same way as the whole image itself. The WebP container (i.e., RIFF container for WebP) allows feature support over and above the basic use case of WebP (i.e., a file containing a single image encoded as a VP8 key frame). The WebP container provides additional support for: Lossless compression An image can be losslessly compressed, using the WebP Lossless Format. Metadata An image may have metadata stored in Exif or XMP formats. Transparency An image may have transparency, i.e., an alpha channel. Color profile An image may have an embedded ICC profile as described by the International Color Consortium. Animation An image may have multiple frames with pauses between them, making it an animation. Animation Google has proposed using WebP for animated images as an alternative to the popular GIF format, citing the advantages of 24-bit color with transparency, combining frames with lossy and lossless compression in the same animation, and support for seeking to specific frames. Google reports a 64% reduction in file size for images converted from animated GIFs to lossy WebP, however with a very noticeable visual impact, both at default settings, and optimised settings. When converting using lossless WebP, a 19% reduction is achieved as reported by Google, although real world performance is nearer to 10%. Support Web browsers Google actively promotes WebP, and Google Chrome and all Chromium-based browsers support the format. The proprietary PageSpeed Insights tool suggests that webmasters switch from JPEG and PNG to WebP in order to improve their website speed score. Microsoft Edge versions released after January 2020 are based on the Chromium browser, and have native WebP support. EdgeHTML-based versions of Microsoft Edge support WebP through a platform extension (installed by default) (unless running in the security-hardened "Application Guard" mode, which do not support platform extensions). Safari added support for WebP with iOS 14 and macOS Big Sur. Mozilla Firefox (and its forks Pale Moon and Waterfox) officially supports WebP since January 2019. It was initially considered for implementation in 2013. GNOME Web, Midori, and Falkon natively support WebP. WebP can also be displayed in all major browsers using the WebPJS JavaScript library, although support in Internet Explorer 6 and above is achieved using Flash. Graphics software Picasa (from version 3.9), PhotoLine, Pixelmator, ImageMagick, XnView, IrfanView, GDAL, Aseprite, Paint.NET (from version 4.2.5), GIMP (from version 2.10), gThumb (since September 2012), Xara Designer Pro (from version 18.0) and Adobe Photoshop (from version 23.2) all natively support WebP. In 2019, Google released a free plug-in that enables WebP support in earlier versions of Adobe Photoshop. Free Photoshop plug-ins had been released by Telegraphics and fnordware before that. Imagine supports WebP via a plugin. GIMP up to version 2.8 also supported WebP via a plugin; later, this plugin was shipped in GIMP 2.9 branch, and received multiple improvements. Google has also released a plug-in for Microsoft Windows that enables WebP support in Windows Photo Viewer, Microsoft Office 2010, FastPictureViewer, and any other application that uses Windows Imaging Component. Other programs FFmpeg linked with the VP8/VP9 reference codec library libvpx can extract VP8 key frames from WebM media and a script can then add the WebP RIFF header and the NUL pad byte for odd frame lengths. Meanwhile, FFmpeg supports libwebp directly. Gmail and Google Photos both support WebP. Support for WebP is also planned for Google App Engine. The Instant Previews feature of Google Search uses WebP internally to reduce disk space used by previews. Android 4.0 supports encoding and decoding WebP images (via bitmap and Skia). SDL_image supports the format since 1.2.11. Telegram Messenger uses WebP for their Stickers, claiming they are displayed 5 times faster compared to the other formats usually used in messaging apps. Signal uses WebP for their non-animated stickers. Content management systems (CMS) usually do not support WebP natively or by default. However, for most popular CMS, extensions are available for automated conversion from other image formats to WebP and delivering WebP images to compatible browsers. Since June 2021, WordPress supports WebP natively. Restrictions Like VP8 on which it is based, former lossy WebP supports only 8-bit YUV 4:2:0 format, which may cause color loss on images with thin contrast elements (such as in pixel art and computer graphics) and ghosting in anaglyph. To overcome this restriction, new lossless WebP supports VP8L encoding that works exclusively with 8-bit RGBA (red, green, blue, alpha) color space. Criticism In September 2010, Fiona Glaser, a developer of the x264 encoder, wrote a very early critique of WebP. Comparing different encodings (JPEG, x264, and WebP) of a reference image, she stated that the quality of the WebP-encoded result was the worst of the three, mostly because of blurriness on the image. Her main remark was that "libvpx, a much more powerful encoder than ffmpeg's jpeg encoder, loses because it tries too hard to optimize for PSNR" (peak signal-to-noise ratio), arguing instead that "good psycho-visual optimizations are more important than anything else for compression." In October 2013, Josh Aas from Mozilla Research published a comprehensive study of current lossy encoding techniques and was not able to conclude WebP outperformed mozjpeg by any significant margin. Metadata Although WebP supports storing Exif, XMP or ITPC metadata as RIFF container chunks as part of the Extended File Format, Google provides no tools for major platforms such as Windows, macOS, Android, or iOS to edit and view metadata in WebP image files, but provides tools to migrate existing metadata in JPEG files to WebP. WebP 2 Google has been developing the second version of WebP since June 2021. Its reference implementation is . The main goal of this new format is to reach similar compression ratios as AVIF while remaining faster to encode and decode. See also Comparison of graphics file formats AVIF, an image format based on the AV1 video format BPG, an image format intended to be a more compression-efficient replacement for the JPEG image format, based on the intra-frame encoding of the High Efficiency Video Coding (HEVC) video compression standard, introduced in 2014 FLIF, a discontinued lossless image format which claimed to outperform PNG, lossless WebP, lossless BPG and lossless JPEG2000 in terms of compression ratio, introduced in 2015. FLIF was superseded by JPEG XL. HEIF, another image format based on HEVC From the Joint Photographic Experts Group: JPEG-LS, an old but efficient lossless format, introduced in 1999 JPEG 2000, an improvement intended to replace the older JPEG by the JPEG committee, introduced in 2000 JPEG XR, an alternative to JPEG 2000 supporting HDR and wide gamut color spaces, introduced in 2009 JPEG XL, particularly optimised for responsive web environments, so that content renders well on a wide range of devices. Moreover, it includes several features that help transition from the legacy JPEG format. JPEG XL was introduced at the end of 2020. MNG and APNG, PNG-based animated image formats, supporting lossless 24-bit RGB color and 8-bit alpha channel References External links Computer-related introductions in 2010 Google Raster graphics file formats Image compression Open formats
711539
https://en.wikipedia.org/wiki/Files-11
Files-11
Files-11 is the file system used by Digital Equipment Corporation OpenVMS operating system, and also (in a simpler form) by the older RSX-11. It is a hierarchical file system, with support for access control lists, record-oriented I/O, remote network access, and file versioning. Files-11 is similar to, but significantly more advanced than, the file systems used in previous Digital Equipment Corporation operating systems such as TOPS-20 and RSTS/E. History The native OpenVMS file system is descended from older DEC operating systems and is similar in many ways, both having been designed by Dave Cutler. A major difference is the layout of directories. These file systems all provided some form of rudimentary non-hierarchical directory structure, typically based on assigning one directory per user account. Under RSTS/E, each user account was represented by two numbers, a [project,programmer] pair, and had one associated directory. Special system files, such as program executables and the OS itself, were stored in the directory of a reserved system account. While this was suitable for PDP-11 systems, which possessed limited permanent storage capacity, VAX systems with much larger hard drives required a more flexible method of file storage: hierarchical directory layout in particular, the most notable improvement in ODS-2. Overview "Files-11" is the general term for five separate file systems, known as on-disk structure (ODS) levels 1 through 5. ODS-1 is the flat file system used by the RSX-11 OS, supported by older VMS systems for RSX compatibility, but never used to support VMS itself; it has been largely superseded by ODS-2 and ODS-5. ODS-2 is the standard VMS file system, and remains the most common file system for system disks (the disk on which the operating system is installed). Although seldom referred to by their ODS level designations, ODS-3 and ODS-4 are the Files-11 support for the CD-ROM ISO 9660 and High Sierra Format file systems, respectively. ODS-5 is an extended version of ODS-2 available on Alpha and IA-64 platforms which adds support for case-preserving filenames with non-ASCII characters and improvements to the hierarchical directory support. It was originally intended for file serving to Microsoft Windows or other non-VMS systems as part of the NT affinity project, but is also used on user disks and Internet servers. Directory layout All files and directories in a Files-11 file system are contained inside one or more parent directories, and eventually under the root directory, the master file directory (see below). The file system is therefore organised in a directed acyclic graph (DAG) structure. In this example (see right), File 2 has a directory entry under both Dir 2 and Dir 3; it is "in" both directories simultaneously. Even if removed from one, it would still exist in the other directory until removed from there also. This is similar to the concept of hard links in UNIX, although care must be taken that the file is not actually deleted on disks that are not set up for hard links (only available on ODS-5 disks, and then only if the disk has hard links enabled). Disk organization and naming An operational VMS system has access to one or more online disks, each of which contains a complete, independent file system. These are either local storage or, in the case of a cluster, storage shared with remote systems. [[Image:OpenVMS disks example 1.svg|thumb|Figure 1: Sample OpenVMS cluster disk configuration]] In an OpenVMS cluster configuration, non-private disks are shared between all nodes in the cluster (see figure 1). In this configuration, the two system disks are accessible to both nodes via the network, but the private disk is not shared: it is mounted for use only by a particular user or process on that machine. Access to files across a cluster is managed by the OpenVMS Distributed Lock Manager, an integral part of the file system. Multiple disks can be combined to form a single large logical disk, or volume set. Disks can also be automatically replicated into shadow sets for data security or faster read performance. A disk is identified by either its physical name or (more often) by a user-defined logical name. For example, the boot device (system disk) may have the physical name $3$DKA100, but it is generally referred to by the logical name SYS$SYSDEVICE. File systems on each disk (with the exception of ODS-1) are hierarchical. A fully specified filename consists of a nodename, a username and password, a device name, directory, filename, file type, and a version number, in the format: NODE"accountname password"::device:[directory.subdirectory]filename.type;ver For example, [DIR1.DIR2.DIR3]FILE.EXT refers to the latest version of FILE.EXT, on the current default disk, in directory [DIR1.DIR2.DIR3]. DIR1 is a subdirectory of the master file directory (MFD), or root directory, and DIR2 is a subdirectory of DIR1. A disk's MFD is identified by [000000]. Most parts of the filename can be omitted, in which case they are taken from the current default file specification. The default file specification replaces the concept of "current directory" in other operating systems by providing a set of defaults for node, device name and directory. All processes have a default file specification which includes disk name and directory, and most VMS file system routines accept a default file specification which can also include the file type; the TYPE command, for example, defaults to ".LIS" as the file type, so the command TYPE F, with no extension, attempts to open the file F.LIS. Every file has a version number, which defaults to 1 if no other versions of the same filename are present (otherwise one higher than the greatest version). Every time a file is saved, rather than overwriting the existing version, a new file with the same name but an incremented version number is created. Old versions can be deleted explicitly, with the DELETE or the PURGE command, or optionally, older versions of a file can be deleted automatically when the file's version limit is reached (set by SET FILE/VERSION_LIMIT). Old versions are thus not overwritten, but are kept on disk and may be retrieved at any time. The architectural limit on version numbers is 32767. The versioning behavior is easily overridden if it is unwanted. In particular, files which are directly updated, such as databases, do not create new versions unless explicitly programmed. ODS-2 is limited to eight levels of subdirectories, and only uppercase, alphanumeric names (plus the underscore, dash, and dollar sign) up to 39.39 characters (39 for the filename and another 39 for the extension). ODS-5 expands the character set to lowercase letters and most other printable ASCII characters, as well as ISO Latin-1 and Unicode characters, increases the maximum filename length and allows unlimited levels of subdirectories. When constructing a pathname for an ODS-5 file which uses characters not allowed under ODS-2, a special "^" syntax is used to preserve backwards compatibility; the file "file.tar.gz;1" on an ODS-5 disk, for example, would be referred to as "file^.tar.gz"—the file's name is "file.tar", and the extension is ".gz". File security: protection and ACLs VMS file security is defined by two mechanisms, UIC-based access control and ACL-based access control. UIC access control is based on the owner of the file and the UIC, or user, accessing the file. Access is determined by four groups of permissions: System Owner Group World And four permission bits: Read Write Execute Delete The "system" access applies to any user whose UIC group code is less than or equal to the SYSGEN parameter MAXSYSGROUP (typically 8, or 10 octal) (for example the SYSTEM user); "owner" and "group" apply to the owner of the file and that user's user group, and "world" applies to any other user. There is also a fifth permission bit, "Control", which is used to determine access to change file metadata such as protection. This group cannot be set explicitly; it is always set for System and Owner, and never for Group or World. UIC-based access control is also affected by four system privileges, which allow users holding them to override access controls: BYPASS: user implicitly has RWED access to all files, regardless of file protection; READALL: user implicitly has R access to all files; SYSPRV: user may access files based on System protection; GRPPRV: user may access files based on System protection if their UIC group matches the file's group. ACLs allow additional privileges to be assigned on a user– or group–specific basis; for example, a web server's UIC could be granted read access to all files in a particular directory. ACLs can be marked as inherited, where a directory file's ACL applies to all files underneath it. ACLs are modified using the EDIT/ACL command, and take the form of identifier/access pairs. For example, the ACL entry (IDENTIFIER=HTTP$SERVER,ACCESS=READ+EXECUTE) would allow the user HTTP$SERVER to read and execute the file. Logical names A logical name is a system variable which may reference a disk, directory or file, or contain other program-specific information. For example, the logical SYS$SYSDEVICE contains the system's boot device. A logical name normally refers to a single directory or disk, e.g. SYS$LOGIN: which is the user's login (home) directory (or directories); these logicals cannot be used as true disk names—SYS$LOGIN:[DIR]FILE is not a valid file specification. However, concealed logical names, defined by DEFINE/TRANSLATION=CONCEALED, can be used in that way; these rooted directories are defined with a trailing "." on the directory specification, hence $ DEFINE/TRANS=CONCEAL HOME DISK$USERS:[username.] would allow HOME:[DIR]FILE to be used. More common are simple logicals which point to specific directories associated with some application software which may be located in on any disk or any directory. Hence logical ABC_EXE may point to a directory of executable programs for application ABC and ABC_TEMP may point to a directory of temporary files for that same application and this directory may be on the same disk and in the same directory tree as ABC_EXE or could be somewhere on another disk (and in a different directory tree). In a manner similar to Unix, VMS defines several standard input and output channels which are accessed through the logical names SYS$INPUT, SYS$OUTPUT, SYS$ERROR and SYS$COMMAND. Logical names do not have a close equivalent in POSIX operating systems. They resemble Unix environment variables, except they are expanded by the file system, instead of the command shell or application program. They must be defined before use, so it is common for many logical names to be defined in the system startup command file, as well as user login command files. In VMS, logical names may reference other logical names (up to a predefined nesting limit of 10), and may contain lists of names to search for an existing filename. Some frequently referenced logical names are: The closest non-DEC operating system to support the concept of logical names is AmigaOS, through the ASSIGN command. AmigaOS's disk operating system, AmigaDOS, which is a port of TRIPOS, bears some resemblance to DEC operating systems. For example, physical device names follow a pattern like DF0: for the first floppy disk, CDROM2: for the 3rd CD-ROM drive, etc. However, since the system can boot from any attached drive, the operating system creates the SYS: assignment to automatically reference the boot device used. Other assignments, LIBS:, PREFS:, C:, S:, et al. are also made, themselves referenced off SYS:. Users are, of course, allowed to create and destroy their own assignments too. Record-oriented I/O: Record Management Services Record Management Services is the structured I/O layer of the VMS operating system. RMS provides comprehensive program support for managing structured files, such as record-based and indexed database files. The VMS file system, in conjunction with RMS, extends files access past simple byte-streams and allows OS-level support for a variety of rich files types. Each file in the VMS file system may be thought of as a database, containing a series of records, each of which has one of more individual fields. A text file, for example, is a list of records (lines) separated by a newline character. RMS is an example of a record-oriented filesystem. There are four record formats defined by RMS: Fixed length - all records in the file have the same length. Variable length - records vary in length, and every record is prefixed by a count byte giving its length. Variable record length with fixed-length control - records vary in length, but are preceded by a fixed-length control block. Stream - record vary in length, and every record is separated from the next one by a termination character. A text file is an example of a stream-format file using line feed or carriage return to separate records. There are four record access methods, or methods to retrieve extant records from files: Sequential Access - starting with a particular records, subsequent records are retrieved in order until the end of the file. Relative Record Number Access - records are retrieved via a record number relative to the beginning of the file. Record File Address Access - records are retrieved directly by their location in the file (RFA, or Record File Address). Indexed Access - records are retrieved via a key, in a form of key-value mapping. Physical layout: the On-Disk Structure At the disk level, ODS represents the file system as an array of blocks, a block being 512 contiguous bytes on one physical disk (volume). Disk blocks are assigned in clusters (originally 3 contiguous blocks but later increased with larger disk sizes). A file on the disk will ideally be entirely contiguous, i.e. the blocks which contain the file will be sequential, but disk fragmentation will sometimes require the file to be located in discontiguous clusters in which case the fragments are called 'extents'. Disks may be combined with other disks to form a volume set and files stored anywhere across that set of disks, but larger disk sizes have reduced the use of volume sets because management of a single physical disk is simpler. Every file on a Files-11 disk (or volume set) has a unique file identification (FID), composed of three numbers: the file number (NUM), the file sequence number (SEQ), and the relative volume number (RVN). The NUM indicates where in the INDEXF.SYS file (see below) the metadata for the file is located; the SEQ is a generation number which incremented when the file is deleted and another file is created reusing the same INDEXF.SYS entry (so any dangling references to the old file do not accidentally point to the new one); and the RVN indicates the volume number on which the file is stored when using a volume set. Directories The structural support of an ODS volume is provided by a directory file—a special file containing a list of file names, file version numbers and their associated FIDs, similar to VSAM catalogs on MVS. At the root of the directory structure is the master file directory (MFD), the root directory which contains (directly or indirectly) every file on the volume. This diagram shows an example directory containing 3 files, and the way each filename is mapped to the INDEXF.SYS entry (each INDEXF entry contains more information; only the first few items are shown here). The Master File Directory At the top level of an ODS file system is the master file directory (MFD), which contains all top-level directory files (including itself), and several system files used to store file system information. On ODS-1 volumes, a two-level directory structure is used: each user identification code (UIC) has an associated user file directory (UFD), of the form [GROUP.USER]. On ODS-2 and later volumes, the layout of directories under the MFD is free-form, subject to a limit on the nesting of directories (8 levels on ODS-2 and unlimited on ODS-5). On multi-volume sets, the MFD is always stored on the first volume, and contains the subdirectories of all volumes. The following system files are present in the ODS MFD: INDEXF.SYS;1—Index file BITMAP.SYS;1—Storage bitmap file BADBLK.SYS;1—Bad block file 000000.DIR;1—The MFD directory file itself CORIMG.SYS;1—Core image file VOLSET.SYS;1—Volume set list file (ODS-2/5 only) CONTIN.SYS;1—Continuation file (ODS-2/5 only) BACKUP.SYS;1—Backup log file (ODS-2/5 only) BADLOG.SYS;1—Pending bad block (ODS-2/5 only) SECURITY.SYS;1—Volume security profile (ODS-2/5 only) QUOTA.SYS;1—Quota file (optional and available under ODS-2/5 only) GPT.SYS;1—GUID Partitioning Table (GPT) (OpenVMS I64 EFI boot structures, optional on OpenVMS Alpha) Note that the file system implementation itself does not refer to these files by name, but by their file IDs, which always have the same values. Thus, INDEXF.SYS is always the file with NUM = 1 and SEQ = 1. Index file: INDEXF.SYS The index file contains the most basic information about a Files-11 volume set. There are two organizations of INDEXF.SYS, the traditional organization and the organization used on disks with GPT.SYS; with the GUID Partition Table (GPT) structures. With the traditional organization, block 1 is the boot block, which contains the location of the primary bootstrap image, used to load the VMS operating system. This is always located at logical block 0 on the disk, so that the hardware firmware can read it. This block is always present, even on non-system (non-bootable) volumes. After the boot block is the primary home block. This contains the volume name, the location of the extents comprising the remainder of the index file, the volume owner's UIC, and the volume protection information. There are normally several additional copies of the home block, known as the secondary home blocks, to allow recovery of the volume if it is lost or damaged. On disks with GPT.SYS, GPT.SYS contains the equivalent of the boot block (known as the Master Boot Record (MBR)), and there is no primary home block. All home blocks present on a GPT-based disk are alternate home blocks. These structures are not included in INDEXF.SYS, and the blocks of the INDEXF.SYS file are unused. The rest of the index file is composed of file headers, which describe the extents allocated to the files residing on the volume, and file metadata such as the owner UIC, ACLs and protection information. Each file is described by one or more file headers—more than one can be required when a file has a large number of extents. The file header is a fixed-length block, but contains both fixed– and variable–length sections: The header contains the NUM and SEQ, the protection (security) information, and the location of the rest of the file header. The ident section contains the accounting metadata: the filename, creation and modification times, and the time of the last backup. The map describes which physical disk blocks (extents) map to each virtual block of the file. The access control list contains the ACL information for the file. The reserved area is space at the end of the file header which is not used by the operating system. This can be used by for customer- or vendor-specific information. The last two bytes of the header are a checksum of the previous 255 words, to verify the validity of the header. If possible, the map and ACL sections of the header are contained completely in the primary header. However, if the ACL is too long, or the file contains too many extents, there will not be enough space in the primary header to store them. In this case, an extension header is allocated to store the overflow information. Layout of the INDEXF.SYS header. The file header begins with 4 offsets (IDOFFSET, MPOFFSET, ACOFFSET and ROFFSET). Since the size of the areas after the fixed-length header may vary (such as the map and ACL areas), the offsets are required to locate these additional areas. Each offset is the number of 16-bit words from the beginning of the file header to the beginning of that area. If the file requires multiple headers, the extension segment number (SEGNUM) contains the sequence number of this header, beginning at 0 in the first entry in INDEXF.SYS. STRUCLEV contains the current structure level (in the high byte) and version (in the low byte) of the file system; ODS-2 being structure level 2. An increase in the version number indicates a backwards-compatible change that older software may ignore; changes in the structure level itself are incompatible. W_FID (containing three values: FID_NUM, FID_SEQ and FID_RVN, corresponding to the file, sequence, and relative volume number) contains the ID of this file; EXT_FID (again composed of three values) holds the location of the next extension header, if any. In both of these values, the RVN is specified as 0 to represent the "current" volume (0 is not normally a valid RVN). FILECHAR contains several flags which affect how the file is handled or organised: NOBACKUP causes this file to be ignored when a backup is run. WRITEBACK enables cached (delayed) writes to the file. READCHECK causes all reads of the file to be done twice, and compared to ensure data integrity. WRITCHECK results in all writes being verified by a subsequent read and compare. CONTIGB causes the OS to attempt to allocate storage for the file in as contiguous a manner as possible. LOCKED is set if the file is deaccess-locked. If set, this indicates that the file was not properly closed after its last use, and the contents may be inconsistent. CONTIG indicates that the file is stored contiguously on disk; that is, each virtual block is mapped to the logical (physical) block , for some constant . BADACL is set if the file has an invalid access control list. SPOOL is set if the file is a spool file, such as an intermediate file used during printing. DIRECTORY is set if the file is a directory. BADBLOCK is set if the file contains bad blocks. MARKDEL is set if the file has been marked for deletion, but is still in use; it will be deleted once closed by the last user. NOCHARGE, if set, causes space used by the file to not be taken from the owner's storage quota. ERASE causes the file's contents to be overwritten when it is deleted. ACCMODE describes the privilege level at which a process must be running in order to access the file. VMS defines four privilege levels: user, supervisor, exec, and kernel. Each type of access - read, write, execute and delete - is encoded as a 2-bit integer. FILEPROT contains the discretionary access control information for the file. It is divided into 4 groups of 4 bits each: system, owner, group and world. Bit 0 corresponds to read access, 1 to write, 2 to execute and 3 to delete. Setting a bit denies a particular access to a group; clearing it allows it. If the file header is an extension header, BACKLINK contains the file ID of the primary header; otherwise, it contains the file ID of the directory file containing the primary entry for the file. Other files Storage bitmap file: BITMAP.SYS The bitmap file is responsible for storing information regarding used and available space on a volume. It contains the storage control block (SCB), which includes summary information detailing ???, and the bitmap, an array of bits to indicate if a cluster of blocks on the disk is free or allocated. In early versions of VMS the cluster comprised 3 blocks but as disk sizes have increased, so has the cluster size. Bad block file: BADBLK.SYS The bad block file contains all of the known bad blocks on the physical volume. The purpose is to prevent the system from allocating them to files. This file was used more in the early days when disks were typically manufactured with more bad patches on the surface. Volume set list file: VOLSET.SYS The volume set list is located on volume 1 of a volume set, and contains a list of labels of all volumes in the set, and the set's volume name. Continuation file: CONTIN.SYS When a file on a multi-volume set crosses the boundary of two constituent volumes, the continuation file is used as its extension header and describes the volume where the rest of the file can be found. Quota file: QUOTA.SYS The quota file contains information of each UIC's disk space usage on a volume. It contains a record for each UIC with space allocated to it on a volume, along with information on how much space is being used by that UIC. NOTE: The DISK QUOTA feature is optional and the file will only exist if the feature was ever enabled.'' Volume security profile: SECURITY.SYS The volume security profile contains the volume's owner UIC, the volume protection mask, and its access control list. GUID Partitioning Table: GPT.SYS This file overlays and protects the MBR (Master Boot Record) and GPT (GUID Partitioning Table) disk structures utilized for and by the Extensible Firmware Interface-compliant firmware. This file is created by default during OpenVMS I64 disk initialization, and is optionally created (with INITIALIZE/GPT) on OpenVMS Alpha. See also Comparison of file systems NTFS - Has many structural and metadata similarities with Files-11 and is almost certainly conceptually derived from it. References Further reading External links Guide to OpenVMS File Applications VMS2Linux Disk file systems Network file systems OpenVMS PDP-11
45457902
https://en.wikipedia.org/wiki/Anthem%20medical%20data%20breach
Anthem medical data breach
The Anthem medical data breach was a medical data breach of information held by Anthem Inc. On February 4, 2015, Anthem, Inc. disclosed that criminal hackers had broken into its servers and had potentially stolen over 37.5 million records that contain personally identifiable information from its servers. On February 24, 2015 Anthem raised the number to 78.8 million people whose personal information had been affected. According to Anthem, Inc., the data breach extended into multiple brands Anthem, Inc. uses to market its healthcare plans, including, Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, and UniCare. Healthlink says that it was also a victim. Anthem says users' medical information and financial data were not compromised. Anthem has offered free credit monitoring in the wake of the breach. Michael Daniel, chief adviser on cybersecurity for President Barack Obama, said he would be changing his own password. According to The New York Times, about 80 million company records were hacked, and there is a fear that the stolen data will be used for identity theft. The compromised information contained names, birthdays, medical IDs, social security numbers, street addresses, e-mail addresses and employment information, including income data. Theft of the data The data was stolen over a period of weeks the month before the data breach was discovered. Anthem was not required by law to encrypt the data. However, Anthem faced several civil class-action lawsuits, which were settled in 2017 at a cost of $115 million. Anthem did not admit any wrongdoing in the settlement. Data from the attack is expected to be sold on the black market. Impact Persons whose data was stolen could have resulting problems about identity theft for the rest of their lives. Anthem had a million insurance policy for cyber problems from American International Group. One report suggested that all of this money could be consumed by the process of notifying customers of the breach. Responses Anthem hired Mandiant, a cybersecurity firm, to review their security systems and advised people whose data was stolen to monitor their accounts and remain vigilant. The theft of the data raised fears generally about the theft of medical information. A writer from Harvard Law School suggested that this data breach might spark reform of security practices and government data safety regulation. An investigation conducted by several state insurance commissioners blames the breach on an attacker whose identity was withheld, and claims that the breach was likely ordered by a foreign government whose name was withheld. It also concluded that Anthem had taken reasonable measures to protect its data before the breach and that its remediation plan was effective at shutting down the breach once it was discovered. It also marks the starting date of the breach as February 18, 2014. The lead investigator was the Indiana Department of Insurance (DOI) -- Anthem's principal regulator, because Anthem is headquartered in Indiana. The Indiana DOI hired independent auditors to conduct a security assessment at Anthem, which concluded, "While deficiencies within Anthem’s cybersecurity posture were noted by the Examination Team, these deficiencies were not, in our experience, uncommon to companies comparable to Anthem in size and scope. While the pre-breach deficiencies impacted Anthem’s ability to reduce the likelihood of and quickly detect the Data Breach, the controls implemented subsequent to the Data Breach should improve Anthem’s ability to detect future breaches and enable Anthem to respond more effectively to a future attack than was the case in this instance." Federal regulators also conducted an investigation of the Anthem data breach, resulting in a $16 million settlement between Anthem and the Department of Health and Human Services (HHS) -- by far the largest HHS data breach settlement. An HHS Director overseeing the investigation said, "The largest health data breach in U.S. history fully merits the largest HIPAA settlement in history. Unfortunately, Anthem failed to implement appropriate measures for detecting hackers who had gained access to their system to harvest passwords and steal people's private information." The HHS settlement also required Anthem to perform a risk assessment and correct any identified deficiencies in its cybersecurity, with HHS oversight of Anthem's progress. Approximately 100 private class action lawsuits were filed against Anthem over the data breach and consolidated in California federal court, in front of Judge Koh, a respected authority in data breach litigation. After contested briefing over who should lead the litigation efforts, Judge Koh appoints Eve Cervantez of Altshuler Berzon and Andy Friedman of Cohen Milstein as co-lead counsel, and appointed Eric Gibbs of Gibbs Law Group and Michael Sobel of Lieff Cabraser to head a Plaintiffs' Steering Committee. In 2017, Anthem agreed to settle the litigation for $115 million, the largest ever data breach settlement at the time. The attorneys requested $38 million in fees for their work on the case, but Judge Koh slashed the fee request, finding that only $31 million in fees were merited. References External links AnthemFacts, Anthem's own website for supporting its customers whose data had been breached Data Breach Litigation, Class Action Settlement Cyberwarfare in the United States Data breaches in the United States Health insurance in the United States Medical privacy Social problems in medicine Corruption in the United States
11200155
https://en.wikipedia.org/wiki/PC-8000%20series
PC-8000 series
The is a line of personal computers developed for the Japanese market by NEC. The PC-8001 model was also sold in the United States and Canada as the PC-8001A. Original models of the NEC PC-8001B (or sometimes the NEC PC-8000) were also sold in some European countries like in the UK, France, Spain, Italy and the Netherlands and in Australia and New Zealand as well. PC-8001 The first member of the PC-8000 series, the PC-8001 was first introduced on May 9, 1979, and went on sale in September 1979 for ¥168,000. Its design combines the keyboard and the mainboard into a single unit. At a time when most microcomputers were sold as "semi-kits" requiring end user assembly, the fully assembled PC-8001 was a rarity in the market. Peripherals included a printer, a cassette tape storage unit, and a CRT interface. Although it is often believed to be the first domestically produced personal computer for the Japanese market, it was preceded by both the Hitachi and the Sharp . The PC-8001A was released in the United States in August 1981, and was priced at (32 KB of RAM). It is modified to reduce electromagnetic interference to comply with FCC regulations. The Katakana glyphs in the character ROM are replaced by Greek alphabet. Specification The PC-8001 has an NEC μPD780C-1 (Z80 compatible processor) clocked at 4 MHz, 16 KB of RAM (expandable to 32 KB), CRT video output, cassette port, parallel port for a printer, serial port and an expansion bus. The built-in BASIC interpreter, called N-BASIC, fits in 24 KB of ROM. This is a variant of Microsoft Disk BASIC 4.51. Optional DISK BASIC allows disk I/O for an external floppy drive. The video output is provided by an NEC μPD3301 CRT controller and a μPD8257C (Intel 8257 clone) DMA controller. It has various text modes, and the maximum screen is 80×25 text with 8×8 pixel font. Each character has two attributes chosen from blinking, highlight, reverse, secret, vertical line, over line, under line and RGB colors, and up to 20 different attributes per line can be set. The attribution also supports semigraphics, and each characters have a 2×4 matrix. The PC-8011 Expansion Unit provides additional capabilities and interfaces, which has 32 KB RAM sockets for μPD416 DRAMs, 8 KB ROM sockets for 2716 PROMs, an interrupt controller, an interval timer, a serial port, a floppy drive controller, a parallel port and an IEEE-488 port. Original floppy disk drives for the PC-8001 are the dual-unit PC-8031 and the additional dual-unit PC-8032, which use 143 KB single-sided 5.25-inch format. They were followed by the single-unit PC-8031-1V, the dual-sided PC-8031-2W and PC-8032-2W. These units are attached to the PC-8001 through the PC-8011 or the PC-8033 adapter. Development In Japan, Nippon Electric's Microcomputer Sales Section in the Electronic Device Sales Division released the TK-80 in 1976, a single-board computer kit, and it became popular among hobbyists. American personal computers were expensive for personal use (Initial list price of the Apple II was 358,000 yen, Commodore PET was 298,000 yen, and the TRS-80 was 248,000 yen). In 1978, the Hitachi Basic Master and Sharp MZ-80K, both developed by consumer electronics companies, were released as personal computers targeted for hobbyists, not for business use. In the summer of 1978, the Microcomputer Sales Section started developing the PC-8001, codenamed "PCX-1". The development team consisted of 10 engineers including section manager and chief designer . They had already planned to release a version of the TK-80BS within a plastic case as a personal computer. It was released as the COMPO BS/80, but it failed in the market due to its poor built-in BASIC and slow clock speed. The PC-8001 was intended to be a high-performance and inexpensive computer for personal use. When Goto visited Silicon Valley to survey the application of microprocessors, he ran across Kazuhiko Nishi at a computer store. They only exchanged business cards, but Nishi introduced Microsoft to him after he returned to Japan. Goto thought of visiting Microsoft, but he worried that the trip wouldn't be accepted by his boss because Microsoft was a small company. Instead, he attended the fall 1978 West Coast Computer Faire during its first day. The next day, he met Bill Gates at the airport in Albuquerque. After lunch, they went to Microsoft's office, and then Gates told him the importance of having a de facto standard. Goto agreed. The team had already been developing a BASIC interpreter, but Watanabe decided to adopt Microsoft BASIC because it was widely used in the North American market. At that time, Microsoft and ASCII (the main Microsoft dealer in Japan) intended to expand OEM business in Japan, so N-BASIC was provided for NEC with a very low licence fee. It had been developed at Microsoft's office in Seattle, and NEC provided a wirewrapped prototype, known as the PC-8001g. The Electronic Device Group only had a small distribution network of electronic parts stores, and the Information Processing Group only had corporate customers who purchased expensive mainframe computers. Also, they didn't have the capability for mass production. They asked New Nippon Electric (NEC Home Electronics since 1983) to sell the personal computers through their consumer distribution network. The system unit, displays and storage devices were all developed by NEC, and manufactured by New Nippon Electric. Printers were provided from Tokyo Denki (Toshiba TEC) because NEC had only developed expensive printers for mainframes. Other NEC divisions didn't appreciate the project before the PC-8001 went on sale. Most people, even in NEC, didn't know about microcomputers, and they couldn't understand what the Microcomputer Sales Section aimed for. The TK-80 sold well for computer enthusiasts, but the computer division regarded it as a toy. Their projects were often criticized inside the company. Watanabe recalled that engineers of the computer division criticized microcomputers didn't have parity bit checking, and they assumed the microprocessors of the time were not suitable for computing due to their lack of performance and reliability. He believed microprocessors were more reliable than wirewrapped minicomputers. When he circulated the contract with Microsoft for approval, computer division's director criticized they planned to purchase the software from a small company. Inside the company, it was considered engineers were confident in their softwares and had to develop softwares themselves. He explained to the director, "It's profitable, so there is no problem. We are salesmen." Watanabe knew importance of the industrial standard and third party developers, but his perception was against company's practice. Watanabe's bosses, Electronic Device Sales Division manager and executive director , let him do what he wanted. When he suggested the TK-80 project, Sawanobori supported him in anticipation that it would expand the microprocessor market, and Ouchi trusted their decision. When he planned to develop the personal computer, Ouchi wavered. It would become a computer product involved in NEC's core business, and would influence their corporate image. Watanabe also hesitated to develop it in the device division instead of the computer division, but he saw the burgeoning personal computer market in America, and then he decided to continue the project. As the project progressed, Watanabe, Sawanobori and Ouchi discussed their thoughts about marketing, planned a method for mass production, and reached an agreement they devoted all their energies to the project. In January 1979, Goto submitted the first mass production request to New Nippon Electric. They were sure the product would sell, but planned to educate and increase dealers little by little. Success in Japan The PC-8001 was introduced on May 9, 1979, and its prototype went to the public at the held from May 16 to 19 at the Tokyo Ryūtsū Center. Soon after the exposition, NEC received thousands of orders. It took half a year to ship about 10,000 backorders after shipment began on September 20, 1979. By 1981, it dominated 40% of the Japanese personal computer market. About 250,000 units were shipped until production stopped in January 1983. NEC also succeeded in expanding their personal computer chain in Japan. The chain owned 7 stores in 1979, 15 stores in 1980, more than 100 stores in 1981, and reached 200 stores by 1983. The PC-8001 sold well in the educational market because NEC advertised that the PC-8001 used the industrial standard of Microsoft BASIC. Kanagawa Prefectural Chigasaki Nishihama High School was the first futsu-ka school (upper secondary schools with a focus on a common course) to purchase PC-8001 computers (buying 17 units) and started teaching programming as an elective subject in 1981. In April 1982, NHK Educational TV started the television program "" using the PC-8001. Its textbook "" sold 700,000 copies. PC-8001mkII A higher-performance, more graphically capable revision of the PC-8001, the Mark II debuted in March 1983 for a price of 123,000 yen. While its most obvious improvement was in its graphical capabilities, the Mark II also included an internal 5.25" floppy disk interface as well as two internal expansion slots, doing away with the need for an "expansion box" to permit upgrades. The internal BASIC was changed as well, from the 24KB N-BASIC to a 32KB "N80-BASIC" that added new conditional statements as well as graphics commands. While the price of the PC-8001mkII was comparable with other 8-bit computer offerings at the time, its graphics were notably worse than its competitors (most likely an attempt on NEC's part to avoid competing with their own, higher-powered PC-8800 series). This led to a relative dearth of software produced for it, particularly games. PC-8001mkIISR A games-oriented revision of the PC-8001mkII with significantly better graphics and sound, making its debut in January 1985 for 108,000 yen. The mkIISR increased the frame-buffer memory from 16KB to 48KB, allowing for 640×200-pixel graphics or 320×200-pixel double-buffered graphics modes. Additionally, the primitive PC speaker was replaced by an FM synthesis audio system. Its internal BASIC was also updated to allow usage of this new hardware, as well as providing mkII and PC-8001 compatibility modes (although a significant proportion of older software would not run properly under these modes). Other changes included the change of one general-purpose expansion slot to a Kanji character ROM expansion slot, a PC-8800 series keyboard connector, and an Atari-style joystick connector. Reception The Japanese personal computer magazine ASCII concluded in 1979 that "Although some problems remain, at present, we can guarantee it is the strongest machine for both software and hardware." Sawanobori recalled why the PC-8001 became a long seller that "The biggest factor is the price setting of 168,000 yen. The major opinion insisted 220,000 to 230,000 yen was appropriate for value of the product, but Kazuya Watanabe never withdrew 168,000 yen. After all, Watanabe's proposal was accepted by the executive director Ouchi's decision, but his stubbornness was admirable." Although handicapped by the lack of English documentation, BYTEs American reviewers concluded in January 1981 after evaluating a unit purchased in Japan that "the PC-8001 appears to be an attractive, well-planned, and well-made personal computer ... Most people who have seen our PC-8001 feel that, if it were sold in our country, it would provide strong competition for any of the color-based home computers currently being sold". References External links Available software at 2012 and picture of NEC PC-8001 PC-8001, Oldcomputer.com NEC personal computers Z80-based home computers Computer-related introductions in 1979
40172405
https://en.wikipedia.org/wiki/Jean-Baptiste%20Waldner
Jean-Baptiste Waldner
Jean-Baptiste Waldner (born 30 March 1959) is a French engineer, management consultant and author, known for his contributions in the fields of computer-integrated manufacturing, enterprise architecture, nanoelectronics, nanocomputers and swarm intelligence. Biography Waldner received his engineering degree in mechanical engineering from the Université de technologie de Belfort-Montbéliard in 1983, his Dr Engineer in Electronics in 1986 from the École Supérieure d'Électricité, and his doctoral engineering degree in nuclear science and engineering in 1986 from the Institut National des Sciences et Techniques Nucléaires. In 1986 Waldner started as consultant for the French Information Technology and Services company Bull, where he specialized in Computer Integrated Manufacturing. From 1990 to 1993 he was senior manager at Deloitte, senior partner at Computer Sciences Corporation from 1993 to 1996, Program Director for IT and Shared Services Centers at Carrefour from 1999 to 2001, and co-founded his own management consulting firm Waldner Consulting in 2004. Work Waldner's research interests ranges from Manufacturing Resource, Planning Computer Integrated Manufacturing and Enterprise Architecture, to Nanoelectronics and Nanocomputers. Manufacturing Resource Planning (MRP/MRP2) The Manufacturing Resource Planning concept has evolved over the past 30 years from a simple means of calculating materials requirements and components (which does not even take into account the production capacity of the company) - to integrated ERP MRP concepts and software to automated management of the entire company.. During the 1980s the increasing changes of sales forecasts, which resulted in continuous and manual adjustments of the production plan, has in led to the MRP (Material Requirement Planning) model, which was strictly limited to the supply of materials. Eventually this evolved in means for wider production resources management, MRP2 (Manufacturing Resources Planning). Waldner (1992) showed, that MRP and MRP2 are essential principles of Computer Integrated Manufacturing (CIM). In the planning process of the enterprise they are the essential link between General Planning and execution and control. Thereby MRP2 covers three phases (see image): Production programme Material requirements, Calculation of workload According to Oliveira (2003) the work of Waldner (1992) and others became "an important effort towards the goal of increasing the competitiveness of manufacturing companies through the introduction of automation and wider use of computers." Computer Integrated Manufacturing According to Waldner (1992) Computer Integrated Manufacturing is used to describe the complete automation of a manufacturing plant, with all processes running under computer control and digital information tying them together. There are three major challenges to development of a smoothly operating computer-integrated manufacturing system: Integration of components from different suppliers: When different machines, such as CNC, conveyors and robots, are using different communications protocols (In the case of AGVs, even differing lengths of time for charging the batteries) may cause problems. Data integrity: The higher the degree of automation, the more critical is the integrity of the data used to control the machines. While the computer integrated manufacturing system saves on labor of operating the machines, it requires extra human labor in ensuring that there are proper safeguards for the data signals that are used to control the machines. Process control: Computers may be used to assist the human operators of the manufacturing facility, but there must always be a competent engineer on hand to handle circumstances which could not be foreseen by the designers of the control software. Machado et al. (2000) explained that "control, monitoring and supervision of industrial processes are increasingly demanding a great investment in technological solutions each time more embedded and with real-time capabilities, especially devoted to the interconnect, in an intelligent way, of shop-floor equipment with operational information systems." This gave rise to a new type of so-called Control-based Information System, in which information in factory plants flow between the shopfloor and the upper Computer Integrated Manufacturing systems as Waldner (1992) stated. Nanocomputers and swarm intelligence The author forecasts a fundamental technological disruption in the computer world in the years 2020-25 by considering the physical limit of the miniaturization of the components to the silicon and the fatality of the Moore's law. This phenomenon, combined with the demand for mobility, will transform the landscape of conventional computing bringing about the breakthrough that will enable a vast and heterogeneous network of objects that impose a new vision of the software (i.e. distributed intelligence with lighter/simpler software code at the unit level but introducing much more numerous agents). Computing system will evolve from a centralized or distributed model to swarm intelligence, self-organized systems in which nodes will count in billions. The author notes that a human being interacts with 1000 to 5000 objects in a typical day At maturity, connected devices and Internet of things market could range from a few tens of billions to several trillion units. In 2007, as an early pioneer, Waldner strongly believed that the Internet of Things was poised to deeply transform the supply chain and the logistics industry. Waldner has a predominant interest in human–computer interaction (HCI) and considers that the evolution of computing machines and of the solutions they bring will rely fundamentally on the progress of these interfaces. Publications Waldner has authored several books and articles. Books: CIM, les nouvelles perspectives de la production, Dunod-Bordas, 1990 CIM: Principles of Computer-Integrated Manufacturing, John Wiley & Sons, 1992 . Nano-informatique – Inventer l’ordinateur du XXIème Siècle, Hermès Science, London, 2007 Nanocomputers & Swarm Intelligence, ISTE, London, 2007 References External links Jean-Baptiste Waldner at waldner-consulting.com 1959 births Living people French engineers Enterprise modelling experts
63770140
https://en.wikipedia.org/wiki/Jay%20Tufele
Jay Tufele
Jayleen Pea Tufele (born July 25, 1999) is an American football defensive tackle for the Jacksonville Jaguars of the National Football League (NFL). He played college football at USC Trojans. Early years Tufele attended Bingham High School in South Jordan, Utah. As a sophomore in 2014, Tufele started on the varsity team, making 63 tackles and six sacks, which earned him a spot on the MaxPreps Sophomore All-American first team. As a junior, Tufele anchored a defense that tallied eight shutouts, making 57 tackles and 10.5 sacks on his way to being named the Salt Lake Tribune’s high school football MVP. Tufele did not play his senior year due to a torn ligament in his foot. Tufele also played rugby in high school. Recruiting Tufele was a consensus top-40 recruit and received scholarship offers from over 20 schools, including Michigan, Notre Dame, Ohio State, Utah, and USC. Tufele announced his commitment to USC on National Signing Day and enrolled in June. College career Tufele redshirted the 2017 season. As a redshirt freshman in 2018, Tufele appeared in 12 games, starting five times. He made 23 tackles, 4.5 tackles for loss, and three sacks. In a week eight game against Utah, Tufele returned a fumble 48 yards for a touchdown, making him a nominee for the 2018 Piesman Trophy, which is awarded for the most impressive play made by a lineman. After the season, he was named to the All-Pac-12 second team, won USC’s Defensive Lineman of the Year award, and was a Pac-12 Freshman Defensive Player of the Year honorable mention. As a redshirt sophomore in 2019, Tufele started all 13 games and made 41 tackles, 6.5 tackles for loss, and 4.5 sacks, which was the second-most on the team. After the season, Tufele was named to the All-Pac-12 first team, an honorable mention on Phil Steele’s All-American team, and repeated as the Defensive Lineman of the Year for USC. Statistics Professional career Tufele was drafted by the Jacksonville Jaguars in the fourth round, 106th overall, of the 2021 NFL Draft. On May 21, 2021, he signed his four-year rookie contract with Jacksonville. He was placed on injured reserve on October 29, 2021. He was activated on December 4. Personal life Tufele is of Polynesian descent. His father Line also played football. Tufele has a sister and younger brother. References External links USC Trojans bio Living people Players of American football from Salt Lake City American football defensive linemen USC Trojans football players 1999 births Jacksonville Jaguars players
30718035
https://en.wikipedia.org/wiki/Exstream%20Software
Exstream Software
Exstream Software is a document management company based in Lexington, Kentucky founded by Davis Marksbury and Dan Kloiber in 1998. The company's principal product is the Exstream software platform, which enterprise clients use to create, manage and deliver both electronic and print deliverables to customers and clients. Overview In March 2008, Exstream Software was acquired by HP and was identified as HP Exstream. In June 2016, HP Exstream was acquired by OpenText, integrating Exstream with their own software suite StreamServe, and is now correctly identified as OpenText Exstream. Services The company provides different kinds of services (OpenText): consultations; information management; learning and education (Voyager Academy); cloud management; See also Customer communications management Document automation Document management system References External links Software companies based in Kentucky Software companies established in 1998 Document management systems 1998 establishments in Kentucky Companies based in Lexington, Kentucky American companies established in 1998 Hewlett-Packard acquisitions Software companies of the United States Companies established in 1998 1998 establishments in the United States
2109874
https://en.wikipedia.org/wiki/Virtual%20routing%20and%20forwarding
Virtual routing and forwarding
In IP-based computer networks, virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing table to co-exist within the same router at the same time. One or more logical or physical interfaces may have a VRF and these VRFs do not share routes therefore the packets are only forwarded between interfaces on the same VRF. VRFs are the TCP/IP layer 3 equivalent of a VLAN. Because the routing instances are independent, the same or overlapping IP addresses can be used without conflicting with each other. Network functionality is improved because network paths can be segmented without requiring multiple routers. Simple implementation The simplest form of VRF implementation is VRF-Lite. In this implementation, each router within the network participates in the virtual routing environment in a peer-based fashion. While simple to deploy and appropriate for small to medium enterprises and shared data centers, VRF Lite does not scale to the size required by global enterprises or large carriers, as there is the need to implement each VRF instance on every router, including intermediate routers. VRFs were initially introduced in combination with Multiprotocol Label Switching (MPLS), but VRF proved to be so useful that it eventually evolved to live independent of MPLS. This is the historical explanation of the term VRF Lite: usage of VRFs without MPLS. Full implementation The scaling limitations of VRF Lite are resolved by the implementation of IP VPNs. In this implementation, a core backbone network is responsible for the transmission of data across the wide area between VRF instances at each edge location. IP VPNs have been traditionally deployed by carriers to provide a shared wide-area backbone network for multiple customers. They are also appropriate in the large enterprise, multi-tenant and shared data center environments. In a typical deployment, customer edge (CE) routers handle local routing in a traditional fashion and disseminate routing information into the provider edge (PE) where the routing tables are virtualized. The PE router then encapsulates the traffic, marks it to identify the VRF instance, and transmits it across the provider backbone network to the destination PE router. The destination PE router then decapsulates the traffic and forwards it to the CE router at the destination. The backbone network is completely transparent to the customer equipment, allowing multiple customers or user communities to use the common backbone network while maintaining end-to-end traffic separation. Routes across the provider backbone network are maintained using an interior gateway protocol – typically iBGP. IBGP uses extended community attributes in a common routing table to differentiate the customers' routes with overlapping IP addresses. IP VPN is most commonly deployed across an MPLS backbone as the inherent labeling of packets in MPLS lends itself to the identification of the customer VRF. Some IP VPN implementations (notably Nortel's IP-VPN Lite) use a simpler IP-in-IP encapsulation over a pure IP backbone, eliminating the need to maintain and support an MPLS environment. See also Layer 2 Forwarding Protocol References External links VRFs with multicore packet processors VRF Route Leaking Juniper documentation on configuring VPNs and VRFs Nortel IPVPN and IPVPN Lite Configuration documentation Virtual Routing And Forwarding (VRF), Avi Networks MPLS networking de:VRF-Instanz
8853175
https://en.wikipedia.org/wiki/KiCad
KiCad
KiCad ( ) is a free software suite for electronic design automation (EDA). It facilitates the design and simulation of electronic hardware. It features an integrated environment for schematic capture, PCB layout, manufacturing file viewing, SPICE simulation, and engineering calculation. Tools exist within the package to create bill of materials, artwork, Gerber files, and 3D models of the PCB and its components. History Early history KiCad was created in 1992 by Jean-Pierre Charras while working at IUT de Grenoble. The name came from the first letters in the name of a company of Jean-Pierre's friend in combination with the term CAD. KiCad originally was a collection of electronics programs intended to be used in conjunction with each other. The main tools were EESchema, PCBnew, a gerber viewer, and calculator. 2010s to present With the price of professionally made printed circuit boards rapidly dropping in price, hobbyists electronic design became much more popular. As a result, KiCad started gaining significant traction and a larger developer base. In 2013 the CERN BE-CO-HT section started contributing resources towards KiCad to help foster open hardware development by helping improve KiCad to be on par with commercial EDA tools. From 2013 until approximately 2018 CERN provided two developers part time to help improve KiCad. Much of the work provided by CERN involved massive refactoring of the code base to give KiCad a better structure to grow and adapt. Help is also provided by organizing donations and fundraisers to help pay for additional contract developers for KiCad, along with sponsoring KiCad's web infrastructure. Well over 1400 hours of developer time has been provided by CERN. A major milestone was hit in December 2015 starting with KiCad 4.0.0, the first KiCad release adopting a point release versioning scheme. This was the also the first release featuring the more advanced tools implemented by CERN developers. KiCad joined the Linux Foundation in November of 2019. Additionally two lead developers formed a services corporation in 2019 to help provide additional paid development support for KiCad. Features KiCad uses an integrated environment for all of the stages of the design process: Schematic capture, PCB layout, Gerber file generation/visualization, and library editing. KiCad is a cross-platform program, written in C++ with wxWidgets to run on FreeBSD, Linux, Microsoft Windows and . Many component libraries are available, and users can add custom components. The custom components can be available on a per-project basis or installed for use in any project. There are also tools to help with importing components from other EDA applications, for instance EAGLE. There are also third party libraries available for KiCad, including SnapEDA, and the Digi-Key KiCad Library. Configuration files are in well documented plain text, which helps with interfacing version control systems, as well as with automated component generation scripts. Localisation Multiple languages are supported, such as Bulgarian, Catalan, Chinese, Czech, Dutch, English, Finnish, French, German, Greek, Hungarian, Italian, Japanese, Korean, Lithuanian, Polish, Portuguese, Russian, Slovak, Slovene, Spanish, and Swedish. Schematic editing The KiCad schematic editor has features including hierarchical schematic sheets, custom symbol creation, ERC (electrical rules check) and integrated ngspice circuit simulation . Schematic symbols are very loosely coupled to circuit board footprints to encourage reuse of footprints and symbols (e.g. a single 0805 footprint can be used for capacitors, resistors, inductors, etc). PCB editing Internally KiCad's PCB editor supports up to 32 copper layers and 32 technical layers. Dimensions are stored with nanometer precision in signed 32-bit integers making the theoretical maximum PCB dimension 231 nm, or approximately 2.14 meters. There are a variety of tools available while doing layout through both built in functions and external plugins. Some advanced built in functionality includes a push and shove router, differential and single ended trace length tuning, net hilighting and individual layer dimming, and a highly customizable DRC. A number of external tools have been developed following the addition of python scripting integration in to KiCad. A number of plugins exist such as a high quality silkscreen label generators, BOM and assembly viewers, panelization plugins, along with many other plugins. A 3D PCB viewing function is based on STEP and VRML models, and the board model can be exported for CAD integration. Community On 12 March 2015 Olimex Ltd, a provider of development tools and embedded device programmers, announced that they have switched from EAGLE to KiCad as their primary EDA tool. See also Comparison of EDA software List of free and open source software packages List of free electronics circuit simulators References External links Official documentation Getting started in KiCad Official KiCad libraries group 1992 software Electronic design automation software Electronic design automation software for Linux Free electronic design automation software Free software programmed in C++ Software that uses wxWidgets
54658416
https://en.wikipedia.org/wiki/Deepin
Deepin
Deepin (stylized as deepin; formerly known as Linux Deepin and Hiweed Linux) is a Linux distribution based on Debian's stable branch. It features DDE, the Deepin Desktop Environment, built on Qt and available for various distributions. As of version 15.10 it also uses dde-kwin, a set of patches for KDE Plasma's window manager. In 2019, Huawei started to ship Linux laptops pre-installed with Deepin. Deepin's userbase is predominately Chinese, though it is in most prominent Linux distributions' repositories as an alternative desktop environment. It is developed in Wuhan, China by Deepin Technology, as of 1 January 2020, a wholly owned subsidiary of UnionTech (). History The distribution began in 2004 as Hiweed Linux. In 2011, the development team behind Deepin established a company named Deepin Technology to support commercial development of the operating system. The company received business investments the same year it was founded. Deepin Technology joined the Linux Foundation in 2015. Overview Deepin ships a mix of open-source and proprietary programs such as Google Chrome, Spotify and Steam. It also includes a software suite of applications developed by Deepin Technology, as well as WPS Office, 360 Security Guard, CodeWeavers' CrossOver and many others. The development of Deepin is led by China-based Deepin Technology Co., Ltd. The company generates revenue through the sale of technical support and other services related to it. As of 1 January 2020, Deepin Technology is a wholly owned subsidiary of UnionTech (). The distribution is widely praised for its aesthetics in various reviews, while it has also been criticized for various perceived breaches in user privacy. Deepin Desktop Environment Deepin features its own desktop environment called Deepin DE or DDE for short. It is written in Qt. The distribution also maintains their own Window Manager dde-kwin. The desktop environment was described as "the single most beautiful desktop on the market" by Jack Wallen writing for TechRepublic. The DDE is also available in the software repositories of Fedora 30. UbuntuDDE and Manjaro Deepin are community-supported distributions, that feature the Deepin Desktop Environment and some of the deepin applications. It is also possible to install DDE (Deepin Desktop Environment) on Arch Linux. Deepin applications Deepin comes with a number of applications built via the DTK (Deepin Tool Kit), which is based on C++ and Qt. The following is a list of Deepin Applications created by the Deepin development team: Deepin Boot Maker Deepin Installer Deepin File Manager Deepin System Monitor Deepin Package Manager Deepin Font Installer Deepin Clone Deepin Picker Deepin Store Deepin Screen Recorder Deepin Voice Recorder Deepin Screenshot Deepin Terminal Deepin Image Viewer Deepin Movie Deepin Cloud Print Deepin OpenSymbol Deepin Music Deepin Calendar Deepin Remote Assistant Deepin Manual Deepin Emacs Deepin Presentation Assistant Deepin Calculator Graphics Driver Manager Deepin Repair Deepin Editor Deepin Installer Deepin comes with an installer named "Deepin Installer" that was created by Deepin Technology. The Installer was praised by Swapnil Bhartiya writing for linux.com as having "the simplest installation procedure" that was also "quite pleasant." Writing for Forbes, Jason Evangelho complained about the installer requiring the user to select their location from a world map, though concluded by saying, "Aside from my little time zone selection pet peeve, the installer is beautiful, brisk and very intuitive." Releases The release cycle has followed various schedules but currently aims at four releases per year. Releases are delayed if the work of development and testing has not been completed. Reception The distribution is generally praised for its aesthetics by users and reviewers alike, such as linux.com, Fossbytes and Techrepublic. CNZZ incident When Deepin was accused in 2018 of containing spyware through the use of statistics software within their App Store, the company made an official statement clarifying that it did not and would not collect private user information. According to Deepin, CNZZ is a website similar to Google Analytics that collects anonymous usage information such as the screen size, browser and other user agent information to "analyze how the Deepin store was being used, in order to improve it." On 20 July 2018, Deepin removed CNZZ statistics from the Deepin App Store website due to the backlash. Performance Deepin's reputation was that it had relatively high CPU and memory demands when it was still based on GTK and HTML technologies, even when the system was idle. After switching to the Qt-based desktop environment, performance improved, as was noted by Linux.com in its September 2018 review of Deepin 15.7. Western concerns about connections to China Radware's head of threat research has commented on concerns about analytics collected by Deepin, and whether these are sent to the Chinese government: while the CNZZ analytics service has been removed, analytics are still collected, now by "Umeng+". According to cybersecurity lawyer Steven T. Snyder, due to the sheer size of Deepin's codebase, it is impossible to really scrutinize all the code comprising it to be sure the Chinese government doesn't have backdoors. The project does remain fully open source allowing anyone to review, modify or change the code to meet their standards. References Chinese brands Chinese-language Linux distributions Companies based in Wuhan Debian-based distributions Free desktop environments Software companies of China X86-64 Linux distributions Unix windowing system-related software Linux distributions
15610641
https://en.wikipedia.org/wiki/Intel%20Rapid%20Storage%20Technology
Intel Rapid Storage Technology
Intel Rapid Storage Technology (RST), until 2010 called Matrix RAID, is a firmware-based RAID solution built into a wide range of Intel chipsets. As of 2020, it includes a RAID system capable of RAID levels 0, 1, 5, and 10, a block level SSD caching accelerator ("Smart Response Technology") with support for write-back and write-through modes for speed or data protection of any disk or RAID array, and support for intelligent caching, speedy recovery from certain issues, and for PCI Express based drives. Intel RST comes in two variants, RST for desktops, and RSTe (VROC is a part of Intel RSTe) for enterprise scenarios, although for many chipsets, the user can choose as both variants will operate correctly. Intel RST is provided by a combination of firmware, chipset and CPU capabilities, and software. As such, the chipset, the firmware included in the BIOS, and the software installed by the user, must be compatible versions. Online forums and communities exist which compare the benefits of different versions of these, advise as to best compatibility for specified hardware, and modify existing firmware and software to allow optimal combinations or updates beyond those provided by the hardware manufacturers. Like all RAID (Redundant Array of Independent Disks), Intel RST RAID employs two or more physical hard disks which the operating system will treat as a single disk, in order to increase redundancy which avoids data loss (except RAID 0), and/or to increase the speed at which data is written to and/or read from a disk. Intel RST RAID does not provide new RAID levels. It allows different areas (e.g. partitions or logical volumes) on the same disk to be assigned to different RAID devices, unlike some other RAID controllers. Intel recommends to put any critical applications and data on a RAID 1, 5, or 10 volume, with redundancy to protect against data loss. The RAID 0 volume in Matrix RAID provides fast access to large files where data loss is not a critical issue but speed is; examples include video editing, swap files, and files that are backed up. Intel Matrix RAID, Intel Rapid RAID, and Intel Smart Response Technology are together described as Intel Rapid Storage Technology. Operating system support "Rapid Storage Technology" (RST), including creation of RAID volumes, works under Windows 7 and newer versions of Microsoft Windows. The older "Intel Matrix RAID" is supported under Microsoft Windows XP. Linux supports Matrix RAID and Rapid Storage Technology (RST) through device mapper, with tool, for RAID 0, 1 and 10. And Linux MD RAID, with tool, for RAID 0, 1, 10, and 5. Set up of the RAID volumes must be done by using the ROM option in the Matrix Storage Manager, then further configuration can be done in DM-RAID or MD-RAID. FreeBSD and MidnightBSD support Intel Matrix RAID using the "ataraid" driver, managed through the atacontrol command. However, with older versions of FreeBSD there were critical reliability issues which include array device renaming when a disk in an array is replaced, an array being considered healthy if the machine reboot/crashes during an array rebuild, and kernel panics when a disk is lost or is removed from the bus. Some of these problems, when experienced in combination, could result in the loss of an entire array (even in the case of RAID 1). VMware ESXi 4 does not support any RAID function nor Intel Matrix RAID based on Intel ICHxR controllers. PGPDisk does not support Intel Matrix RAID based on Intel ICHxR, and does not support standalone drives if the "RAID" mode is enabled on the motherboard. Matrix Storage Manager option ROM The Intel Matrix Storage Manager (IMSM) option ROM is a part of Matrix RAID that has to be used in the BIOS to create new RAID arrays. Intel uses "Rapid Storage Technology" -"Option Rom"- on its new chipsets, dropping the "Matrix" name. An Intel document notes that Matrix RAID storage changed to RST (Rapid Storage Technology) beginning with version 9.5. There have been several driver versions: Since release 11.2.0.0000, TRIM commands can be read by Windows RAID drivers made for 7 series chipsets. There is no RAID mode TRIM support on drivers for older chipsets. Intel states that RST support was added for the X79 chipset in RST version 11.6.0.0000 and after. On some 6 series chipsets there is a modification for the ROM in the BIOS, which will allow TRIM support on the 6 series chipset. For the X79 chipset, certain motherboard manufacturers have added both RAID ROMs in the BIOS, the RST and RST-E ROM. X79 is the Enterprise version, called RST-E. With the RST ROM added to the BIOS, this allows TRIM function to pass through the controller and TRIM SSD drives when RAID is enabled. This workaround was needed before RST-E driver version 3.8 was shipped which passed through TRIM commands to a RAID array without modifications to the RST-E ROM. There is no support for TRIM in the RST-E version of the ROM when RAID is enabled and the RST-E driver version is less than 3.8. It is possible to add an RST ROM to the BIOS to enable TRIM passthrough in RAID mode by using the RST ROM and driver. The newest Option ROM version is a 13 series ROM, this ROM will not be used by motherboard manufacturers for the X79 chipset BIOS, and it can be injected into a BIOS to use on the X79 with modded code, for those MFG's who have added a ROM switch, this is where the MFG has added both RST and RSTe to the RAID option of a BIOS, but there needs to be a code added for TRIM commands to be sent, when you inject the RST and replace the RSTe with RST option ROM in X79 boards that do not contain the ROM switch, TRIM can be dysfunctional. There are modded RST 13 series Option ROMs (legacy) available at certain BIOS modding sites that have been made functional for use in the X79 chipsets. When booting in a BIOS environment (legacy) and some / EFI, the RST option ROM is used. When booting in a true UEFI environment the Option ROM is not used as a SataDriver with the RST version takes over. In BIOS mode the legacy/BIOS booting is under CSMCORE. In true UEFI mode the RST is controlled under SataDriver in BIOS. The Intel RAID ROM is the firmware in the motherboard BIOS that is used to create the RAID array. Note: The RST drivers can be used for RAID and also on a single drive as it contains an AHCI driver. There is a bug in the version 12.5.0.1066 RST driver, which cause TRIM commands not to pass through the RAID driver to the drives. TRIM is disabled using this driver. Rapid Storage Technology enterprise (Intel RSTe) Intel Rapid Storage Technology enterprise (Intel RSTe) provides performance and reliability for supported systems equipped with Serial ATA (SATA) devices, Serial Attached SCSI (SAS) devices, and/or solid state drives (SSDs) to enable an optimal enterprise storage solution. The main difference between RST and RSTe is that the RST is used for desktop systems and the RSTe is mostly used for server systems. RST supports regular SATA controllers from desktop systems. If the BIOS of the motherboard has RSTe feature then the user cannot install Intel Rapid Storage Technology software (error message: This platform is not supported). The user has to install RSTe software. There have been several Option ROM versions: In 2010, Intel announced that the RTSe branding would be replaced, with RSTe consolidated into Intel's VROC (Virtual RAID on CPU) product line. Intel VROC (Virtual RAID on CPU) Intel VROC is a part of Intel RSTe. This was mostly designed with NVMe SSD's in mind and it is directly attached to the Intel Xeon Scalable processors. For the full functionality it uses a newer Intel technology called Intel VMD (Intel Volume Management Device). Intel VMD is a technology from the Intel Xeon Scalable processors series and is used to provide hot-plug, surprise-removal, and LED management of NVMe SSD's for server usage. Intel VROC is targeted for Linux operating systems, Microsoft Windows Server, Microsoft Windows 7 and Microsoft Windows 10. For client PC's (with Intel Core, Pentium and Celeron processors) Intel RST is still the advised software package to use. See also Non-standard RAID levels mdadm References External links https://win-raid.com - forum specializing in Intel RST and similar soft raid, choice of driver/rom/orom, and modification of roms. RAID AT Attachment Matrix RAID Matrix RAID
43864268
https://en.wikipedia.org/wiki/SPEDAS
SPEDAS
SPEDAS (Space Physics Environment Data Analysis System) is an open-source data analysis tool intended for Space Physics users. It was developed using Interactive Data Language (IDL). Overview SPEDAS is free software that can download and manipulate data from scientific space missions. It contains both a GUI (Graphical User Interface) and a command line mode for advanced users. It offers various tools for performing calculations and transformations of the data and for visualizing the results. Software modules can be developed for SPEDAS, extending its capabilities. It also includes a tool for downloading data from NASA servers using CDAWeb. SPEDAS evolved from software developed for the THEMIS mission, which was called TDAS (THEMIS Data Analysis Software). In turn, TDAS used IDL code developed previously for earlier missions going back to the 1990s. SPEDAS was developed by scientists and programmers of the University of California, Berkeley's Space Sciences Laboratory, University of California, Los Angeles's IGPP and other contributors. Deployment Three different types of SPEDAS deployment are available: Source code. The full IDL code for SPEDAS is available as a zip file download. To use this, users must install and license IDL from Exelis. Save file. IDL save files can run in a free but restricted version of IDL, called IDL Virtual Machine (VM). Users have to download IDL VM from Exelis, install it and register with Exelis before they can use the SPEDAS save file. Executable file. This distribution contains executable files for Windows, Linux and Mac OS. In this case, users do not have to separately install and download anything else. Plugins One of the main goals of SPEDAS is to accommodate the needs of different NASA missions. Towards this goal, its architecture is modular. Users can develop plugins for loading data, for configuration and for specialized calculations or operations on the data. Version 3.1 of SPEDAS includes plugins for loading data from the following missions or data sets: THEMIS MMS GOES WIND ACE IUGONET ERG OMNI Geomagnetic/Solar indices Plugins for specialized calculations are: Generation of GOES overview plots Generation of THEMIS overview plots THEMIS particle distribution slices References External links SPEDAS wiki page SPEDAS blog page NASA software UC Berkeley, Space Sciences Lab Free software Cross-platform software Space science Space physics NASA
17370642
https://en.wikipedia.org/wiki/Dada%20Mail
Dada Mail
Dada Mail is a web-based electronic mailing list management system that can be used for announcement lists. It can also be used to create and manage discussion lists by the use of an included plug-in called Dada Bridge, which requires a cron task. Dada Mail is written in Perl. Features Dada Mail handles Closed-Loop Opt-in subscriptions and Closed-Loop Opt-out unsubscriptions, sending complex announce-only and/or discussion mailing list messages, archiving/viewing/searching/resending/syndicating (rss, atom) sent messages. Unlike more traditional electronic mailing list software, like Majordomo, there is no email interface to send commands to Dada Mail. Rather, almost all administration of the mailing list is done using a web-based control panel. Closed-Loop Opt-in subscriptions are done by sending a confirmation email message, but the actual mechanism is simply a unique confirmation URL. History Dada Mail was initially written in December 1999 and released as version 1.0 in January 2000, between Justin's first and second semester at the University of Colorado at Boulder. Its original name was Mojo Mail, a name that came to Justin after having a dream about making a successor to the Majordomo program, after struggling with that program's email-based interface for a non-profit client. The name of this specific program was changed on December 1, 2003, after Justin Simoni received a letter from a lawyer representing Mediaplex Inc. that the name was in violation of their trademark. The name was changed to, Dada Mail. Dada is a direct reference to the early 20th century cultural movement. Justin considers Dada Mail a conceptual work of art. See also List of mailing list software Electronic mailing list References External links Dada Mail homepage Dada Mail at GitHub Software using the GPL license Free mailing list software Mailing list software for Linux Free software programmed in Perl Free email software
28373508
https://en.wikipedia.org/wiki/ThinkPad%20E%20series
ThinkPad E series
The ThinkPad E Series (formerly ThinkPad Edge) is a notebook computer series introduced in 2010 by Lenovo. It is marketed to small and medium-sized businesses. Launch and reviews The Edge series of ThinkPad computers was introduced at the 2010 International CES in Las Vegas and became available for sale in April of the same year. For the Thinkpad Edge 13, a review on the Engadget web site said that even though, "it may not carry the premium features of [Lenovo Thinkpad] X301..., but for a budget ultraportable... [there is] little to complain about." Engadget also tested the battery life of the Edge 13 and discovered that "Lenovo's battery life prediction of seven hours is pretty on the mark." The Edge 13's battery lasted 5 hours and 12 minutes. Laptop Magazine reviewed the Thinkpad Edge 14 and found it was "the most compelling 14-inch small business notebook on the market today." NotebookReview reviewed the Thinkpad Edge 15 and said that its "build quality seems to be a step down from the 13 and 14 inch." The website also mentioned that the Edge series in general "feels under built...[and] the Edge 15 fares much worse". Reviews of the latest E220s and E420s have been more positive, citing better build quality than other models in the Edge line. Features The ThinkPad Edge series uses processors from both AMD and Intel. AMD processors offered include the Athlon II dual-core, the Turion II Dual-core, Phenom II Triple-core and Ryzen 2nd, 3rd, 4th and 5th Generation mobile Accelerated Processing Units (APUs). Intel processors used include the Core 2 Duo, Core i3, Core i5 and Core i7. Voice Over IP (VoIP) features including high resolution cameras and an HD LED screen are also included. All four models offer a glossy LED back-lit 16:9 display capable of playing 720p video. However the Edge 11 and 13 does not include an optical drive. The laptops came in three colors: Midnight Black (Smooth), Midnight Black (Gloss), and Heatwave Red (Gloss). Design Lenovo designed the laptops to "reflect a new progressive and strikingly clean appearance while retaining ThinkPad durability and reliability". For example, along with the new Island-style keyboard, the Edge series had some keyboard design changes: uniform black keys and the removal of the embedded number pad. The Function keys were re-designed so users could use one finger to access functions such as multimedia keys. Some keys which were rarely used like SysRq were removed. Models Gen 1 (2010) Edge 11 The ThinkPad Edge 11 laptop was not released in the United States, with the X100e serving as an 11-inch laptop solution in the US. The laptop was 1.1 inches thick and weighed 3.3 lbs. Like other laptops in the series, the Edge 11 was made available in glossy black, matte black and glossy red. Despite the low starting price, the Edge 11 laptop included some of the traditional ThinkPad durability features, including solid metal hinges. The battery life was better than both the IdeaPad U160 and the ThinkPad X100e laptops. Edge 11 (DER Special Edition) A special edition laptop was provided for Australian Year 9 students as part of the Digital Education Revolution (DER) program in 2011. Edge 13 The ThinkPad Edge 13 laptop was released on January 5, 2010. It was 1.2 inches thick, weighed 3.5 lbs (1.6 kg), and fit into a backpack. The Edge 13 laptop was capable of handling Windows 7 Pro with ease, with multiple applications like Firefox, Microsoft Word 2007, GIMP, TweetDeck, and iTunes at the same time. It did not feature Intel’s Arrandale platform on release, and was launched with an older generation CULV processor. The lack of processing speed, however, was compensated by a gain in battery life. The laptop delivered 6 hours and 58 minutes of battery life in MobileMark 2007 tests. Specifications: Processor: Intel Core2 Duo or Intel i3 380 or AMD Athlon Neo X2 Operating System: Microsoft Windows 7 Home Premium Display: 13.3" Glossy (1366×768) TN Graphics: Intel GMA 4500MHD Color: Midnight Black (Glossy, Matte), Heatwave Red (Glossy) RAM: up to 8GB DDR3 (1066 MHz) Storage: 250GB 5400RPM SATA HDD Networking: 10/100 Ethernet; Integrated Wireless 802.11abgn Battery: 4- or 6--Cell Li-Ion (swappable) Edge 14 and 15 The ThinkPad Edge 14 and 15 laptops were both launched on March 22, 2010. A web review noted build quality above average, yet not the same as professional grade ThinkPad laptops. One difference was smaller screen hinges which were plastic-faced instead of metal. While the Edge 14 laptop did not have a roll cage, it was still durable, with no flex on the palm rest, keyboard and touchpad. The Edge 15 laptop was noted for having the same features as the smaller laptops in the series, with lower build quality. The right side of the palm rest displayed flex under moderate pressure. The keyboard tray also displayed slight inward flexing at the optical drive area. Some positive features included a keyboard that was noted as being very easy to type on. The touchpad was also noticeably easy to use, with fast response time, no discernible lag, even without adjustments. But also at the Lenovo support forum, lots of keyboard failures were reported. The price was viewed favorably, with user experience and feature set receiving praise. Specifications: Processor: Intel Core i5-560M; i5-460M; i3-390M; Mobile Intel 5 Series Dicrete GFX Chipset Operating System: Microsoft Windows 7 Home Premium, or Professional (32 or 64-bit) Display: 14.0", 16:9 HD (1366×768), LED-backlight; 15.6", 16:9 HD (1366×768), LED-backlight Color: Midnight Black (Glossy, Matte), Heatwave Red (Glossy) RAM: up to 8GB DDR3 1066 MHz Storage: 320 (5400/7200rpm), 500GB (5400/7200rpm) SATA HDD Gen2 (2011) Edge E220s, E320, E325, E420, E420s The ThinkPad Edge E220s and E420s were released in Spring 2011, as an updated, "more premium" line of the ThinkPad Edge. These newer series are significantly thinner, and include more of the traditional ThinkPad line of features such as the integrated 720p web-cam. Also notable is the return to use of metallic hinges versus the less durable plastic seen on earlier Edge models. Both the E220s and E420s can be configured with up to an Intel Core i7 processor, which offers a higher level of performance than other notebooks of this size category. The surfaces have been accented with a chrome finish around the exterior, and the addition of the "infinity glass" screen, which features edge-to-edge glass paneling on the display. Many design aspects of the E220s line have been seen in the recently unveiled ThinkPad X1, including the keyboard and touchpad design. Edge E520, E525 Gen3 (2012) Edge 11" (E130, E135) Edge 14" (E430, E430c, E431, E435) The E430 is powered by second and third generation Intel Core processors with Intel HD Graphics or Nvidia Graphics. Battery life is increased with Nvidia's Optimus power management technology. Dedicated keys for controlling audio and video functions, Dolby Advanced Audio rated speakers, and an optional 720p camera were added to improve the experience for users of VOIP. The E430 makes use of USB 3.0 to improve data transfer speeds. Edge 15" (E530, E531, E535) Gen4 (2013) Likewise a parallel T-series models (T440/T540), Gen4 E-series don't have a touchpad\trackpoint physical buttons. Edge 11" (E145) Edge 14" (E440) The ThinkPad Edge E440 was released in 2013, as an update to the ThinkPad Edge 430. The new E440 includes new Intel 4th Gen Haswell Processors and 1920x1080 FHD Screen options. Edge 15" (E540, E545) The ThinkPad Edge E540 was released in 2013, as an update to the ThinkPad Edge 530. The new E540 includes new Intel 4th Gen Haswell Processors, 1920x1080 FHD Screen options, and Nvidia Graphics The ThinkPad Edge E545 was released in 2013, as an update to the ThinkPad Edge 535. The new E545 includes new AMD Richland Series APUs and AMD Graphics Gen5 (2014) 14" (E450, E455) The ThinkPad Edge E450 was released in 2015, as an update to the ThinkPad Edge 440. The new E450 includes new Intel 5th Gen Broadwell low power processors, 1920x1080 FHD Screen options, and new AMD R7 Mobile Dedicated Graphics. The ThinkPad Edge E455 was released in 2015, as a new 14" ThinkPad with AMD Mobile APU Processors. The new E455 includes new AMD Kaveri Processors, 1920x1080 FHD Screen options, and new AMD Graphics. 15.6" (E550, E555) The ThinkPad Edge E550 was released in 2015, as an update to the ThinkPad Edge 540. The new E550 includes new Intel 5th Gen Broadwell low power processors, 1920x1080 FHD Screen options, and new AMD R7 Mobile Dedicated Graphics. The ThinkPad Edge E555 was released in 2015, as an update to the ThinkPad Edge 545. The new E555 includes new AMD Kaveri Processors, 1920x1080 FHD Screen options, and new AMD Graphics. Gen6 (2015) 14" (E460, E465) The E460 and E465 have a 14-inch display and optionally come with a Windows 7 (Pro) or Windows 10 64-bit system. The E460 uses Intel Skylake (6th Generation) processors. The E465 is similar to the E460 but it uses an AMD processor. 15" (E560, E565) The E560 and E565 have a 15.6-inch display and optionally come with a Windows 7 (Pro) or Windows 10 64-bit system. The E560 uses Intel Skylake (6th Generation) processors. The E565 is similar to the E560 but it uses an AMD processor. Gen7 (2016) 14" (E470, E475) The E470 and E475 have a 14-inch display and optionally come with a Windows 10 64-bit system. The E470 uses Intel Kaby Lake (7th Generation) processors. The E475 is similar to the E470 but it uses an AMD processor. 15" (E570, E570c, E570p, E575) The E570 and E575 have a 15.6-inch display and optionally come with a Windows 10 64-bit system. The E570 uses the 7th Generation Intel Core processors. The E575 is similar to the E570 but it uses an AMD processor. The E570p was released in 2017 and has a high power CPU and mainstream GPU. Gen8 (2017) 14" (E480, E485) The E480 and E485 have a 14-inch display and optionally come with a Windows 10 64-bit system. USB type-C is used for charging for the first time in the ThinkPad E series. The USB-C port can also connect to most USB-C docks allowing 4K display output, additional USB ports, networking, and charging from a single cable. The E480 uses Intel Core processors (up to i7-8550U), and is equipped with the integrated intel UHD 620 graphics card or optionally the AMD RX550-2gb discrete graphics card. The E480 did not have adequate cooling system on the higher end models, especially those with the dedicated AMD RX 550 graphics card, leading to unit overheating. Lenovo released a firmware update that addressed the problem, but substantially limited the performance of the graphics card. The E485 is similar to the E480 but it uses an AMD Ryzen processor. The AMD Ryzen processors use Radeon Vega integrated graphics which outperforms similar intel integrated graphics. 15" (E580, E585) The E580 and E585 have a 15.6-inch display. The E580 uses Intel Core processors. The E585 is similar to the E580 but it uses an AMD Ryzen processor. Gen9 (2018) The Intel models were announced in 2018. The AMD ones in 2019. 14" (E490, E490s, E495) The E490, E490s and E495 have a 14-inch display and optionally come with a Windows 10 64-bit system. The E490 and E490s use 8th Generation Intel Core processors. The E495 is similar to the E490 but it uses 3rd gen AMD Ryzen processor. 15" (E590, E595) The E590 and E595 have a 15.6-inch display and optionally come with a Windows 10 64-bit system. The E590 uses 8th Generation Intel Core processors. The E595 is similar to the E590 but it uses an AMD Ryzen processor. Gen10 (2019) The Intel models were announced in October 2019. The AMD ones in May 2020. 14" (E14) The E14 has a 14.0-inch display and optionally come with a Windows 10 Home or Pro 64-bit operating system. It uses 10th Generation Intel Core or 3rd-gen Ryzen Mobile CPUs. 15" (E15) The E15 has a 15.6-inch display and optionally come with a Windows 10 Home or Pro 64-bit operating system. It uses 10th Generation Intel Core or 3rd-gen Ryzen Mobile CPUs. References External links Lenovo laptops E series Computer-related introductions in 2010
15566158
https://en.wikipedia.org/wiki/GTP%27
GTP'
GTP' (GTP prime) is an IP based protocol used within GSM and UMTS networks. It can be used with UDP or TCP. GTP' uses the same message structure as GTP (GTP-C, GTP-U), but it is largely a separate protocol. GTP' uses registered UDP/TCP port 3386. GTP' can be used for carrying charging data from the "Charging Data Function" (CDF) of the GSM or UMTS network to the "Charging Gateway Function" (CGF). In most cases, this should mean from many individual network elements such as the GGSNs to a centralised computer which then delivers the charging data more conveniently to the network operator's billing center. GTP' is used on the Ga interface within the 3GPP GPRS Core Network definition. GTP' reuses aspects of GTP, although to quote 3GPP TS 32.295, "only the signalling plane of GTP is partly reused". GTP' defines a different header, additional messages, field values, as well as a synchronisation protocol to avoid losing or duplicating CDRs on CGF or SGSN/GGSN failure. Transferred CDRs, if following 3GPP standards, are encoded in ASN.1. Header GTP' v1 and v2 headers contain the following fields Version The first header field in a GTP' packet is the 3-bit version field. For GTP' v2, this has a value of 2 (hence the name GTP' v2). Protocol Type (PT) a 1-bit value that differentiates GTP' (value 0) from GTP (value 1). Reserved a 3-bit reserved field (must be 1's). Header Length (Hdr len) a 1-bit value that for GTP' version 0 indicates if using a 20 byte header (value 0) (as per GTP) or this 6 byte header. This bit must be unset (value 0) for subsequent GTP' versions and in these does not indicate the header length as this must always be 6 bytes. Message Type An 8-bit field that states the message type. Possible values: Length A 16-bit field that states the length of the packet being encapsulated by GTP' (not including the GTP' header itself). Sequence Number A 16-bit field that uniquely identifies this packet and allows detection of loss or duplication Message Types GTP' uses the GTP Version Not Supported, Echo Request and Echo Response messages unchanged, but adds the following messages Node Alive Request Node Alive Response Redirection Request Redirection Response Data Record Transfer Request Data Record Transfer Response Node Alive Request / Response The Node Alive messages are used to advise other network components that a node has started service. The request is sent from the node starting and so provides a faster method to re-enable service than polling using Echo Request/Response does. This message can also be used to advise of other nodes coming back into service, and (in GTP' version 2) to advise of the IPv6 address of the CGF. Redirection Request/Response The Redirection messages are used to: divert the flow of CDRs from the CDFs (SGSN/GGSN) to another CGF when the sender is being removed from service (for maintenance/failure). advise that the CGF has lost its connection to a downstream system In either case the CDFs are given more information about an impending or immediate failure than would be the case if the CDF was polling using Echo Request messages. This message contains details about the cause, and optionally address(es) of an alternate CGF. Data Record Transfer Request/Response The Data Record Transfer messages are used to reliably transport CDRs from the point of generation (SGSN/GGSN) to non-volatile storage in the CGF. Data Record Transfer Request Each Data Record Transfer Request message can contain a message of one of four types: Send Data Record Packet - This message contains zero or more CDRs. CDRs may be encoded in ASN.1 using BER or, less commonly, PER. Send possibly duplicated Data Record Packet - This message contains one or more CDRs, and this message has previously been sent to another CGF. Cancel Data Record Packet - This message orders the CGF to remove one or more Data Record Packet from the CGF "possibly duplicated" pending queue. Release Data Record Packet - This message orders the CGF to write the contents of one or more Data Record Packets from the CGF "possibly duplicated" pending queue. There is a mechanism to attempt to avoid losing or writing any duplicate CDRs. This is described in some detail in 3GPP TS 32.295. The basic premise is that every packet is sequenced and if not individually acknowledged then it will be resent until it is acknowledged by any CGF. Normal Data Record packets are immediately written to non-volatile storage (e.g. disk), but resent packets are marked as "possibly duplicated" and enter a special queue that is not immediately written to non-volatile storage—a second confirmation from the CDF is required. The ability to send a Data Record Transfer Request containing zero CDRs is used as a test to detect the success or failure of the CGF to have already written records assigned to that sequence number and is an important part of the above mechanism. Data Record Transfer Response The Data Record Transfer Response acknowledges receipt of one or more Data Record Transfer messages; responses can be grouped for reasons of efficiency but must be sent more frequently than the sending CDFs timeout. The acknowledgement includes a cause and can be a rejection of the contained records. References External links Direct access to the numbered 3GPP specifications Open source Charging Gateway Function (CGF) Mobile telecommunications standards 3GPP standards Telecommunications infrastructure
537597
https://en.wikipedia.org/wiki/Alan%20Cooper
Alan Cooper
Alan Cooper (born June 3, 1952) is an American software designer and programmer. Widely recognized as the "Father of Visual Basic", Cooper is also known for his books About Face: The Essentials of Interaction Design and The Inmates Are Running the Asylum: Why High-Tech Products Drive Us Crazy and How to Restore the Sanity. As founder of Cooper, a leading interaction design consultancy, he created the Goal-Directed design methodology and pioneered the use of personas as practical interaction design tools to create high-tech products. On April 28, 2017, Alan was inducted into the Computer History Museum's Hall of Fellows "for his invention of the visual development environment in Visual BASIC, and for his pioneering work in establishing the field of interaction design and its fundamental tools." Biography Early life Alan Cooper grew up in Marin County, California, United States where he attended the College of Marin, studying architecture. He learned programming and took on contract programming jobs to pay for college. In 1975, soon after he left college and as the first microcomputers became available, Alan Cooper founded his first company, Structured Systems Group (SSG), in Oakland, California, which became one of the first microcomputer software companies. SSG's software accounting product, General Ledger, was sold through ads in popular magazines such as Byte and Interface Age. This software was, according to the historical account in Fire in the Valley (by Paul Freiberger and Michael Swaine), “probably the first serious business software for microcomputers.” It was both the start of Cooper's career as a software author and the beginning of the microcomputer software business. Ultimately, Cooper developed a dozen original products at Structured Systems Group before he sold his interest in the company in 1980. Early on, Cooper worked with Gordon Eubanks to develop, debug, document, and publish his business programming language, CBASIC, an early competitor to Bill Gates’ and Paul Allen’s Microsoft BASIC. Eubanks wrote CBASIC’s precursor, BASIC-E as a student project while at the Naval Postgraduate School in Monterey, California with professor Gary Kildall. When Eubanks left the Navy, he joined Kildall’s successful operating system company, Digital Research, Inc., in Monterey. Soon thereafter, Eubanks and Kildall invited Cooper to join them at Digital Research as one of four founders of their research and development department. After two-years at DRI, Cooper departed to develop desktop application software by himself. During the 1980s, Alan Cooper authored several business applications including Microphone II for Windows and an early, critical-path project management program called SuperProject. Cooper sold SuperProject to Computer Associates in 1984, where it achieved success in the business-to-business marketplace. Visual Basic In 1988, Alan Cooper created a visual programming language (code-named “Ruby”) that allowed Windows users to build “Finder”-like shells. He called it “a shell construction set." After he demonstrated Ruby to Bill Gates, Microsoft purchased it. At the time, Gates commented that the innovation would have a “profound effect” on their entire product line. Microsoft initially decided not to release the product as a shell for users, but rather to transform it into a professional development tool for their QuickBASIC programming language called Visual Basic, which was widely used for business application development for Windows computers. Cooper's dynamically installable control facility, which became famous as the “VBX” interface, was a well-known component of "Ruby". This innovation allowed any 3rd party developer to write a widget (control) as a DLL, put it in the Visual Basic directory, and Visual Basic would find it, communicate with it, and present it to the user as a seamless part of the program. The widget would appear in the tool palette and appropriate menus, and users could incorporate it into their Visual Basic applications. The invention of the “VBX” interface created an entire new marketplace for vendors of these “dynamically installable controls.” As a result of Cooper's work, many new software companies were able to deliver Windows software to market in the 1990s. The first book ever written about Visual Basic, The Waite Group’s Visual Basic How-To by Mitchell Waite, is dedicated to Alan Cooper. In his dedication, the author calls Cooper the “Father of Visual Basic.” This nickname has often served as Cooper's one-line resume. In 1994, Bill Gates presented Cooper with the first Windows Pioneer Award for his contributions to the software industry. During the presentation, Gates took particular note of Cooper's innovative work creating the VBX interface. In 1998, the SVForum honored Cooper with its Visionary Award. Interaction design and user experience Early in his career, Cooper began to critically consider the accepted approach to software construction. As he reports in his first book, he believed something important was missing—software authors were not asking, “How do users interact with this?” Cooper's early insights drove him to create a design process, focused not on what could be coded but on what could be designed to meet users’ needs. In 1992, in response to a rapidly consolidating software industry, Cooper began consulting with other companies, helping them design their applications to be more user friendly. Within a few years, Alan Cooper had begun to articulate some of his basic design principles. With his clients, he championed a design methodology that puts the users’ needs first. Cooper interviewed the users of his client's products and discovered the common threads that made these people happy. Born of this practice was the use of personas as design tools. Cooper preached his vision in two books. His ideas helped to drive the user experience movement and define the craft that would come to be called “interaction design.” Cooper's best-selling first book, About Face: The Essentials of User Interface Design, was first published in 1995. In it, Cooper introduces a comprehensive set of practical design principles, essentially a taxonomy for software design. By the second edition, as the industry and profession evolved, “interface design” had become the more precise “interaction design.” The basic message of this book was directed at programmers: Do the right thing. Think about your users. The book is now in its fourth edition, entitled About Face: The Essentials of Interaction Design, and is considered a foundation text for the professional interaction designer. Cooper introduced the ideas of software application posture such as a "sovereign posture" where an application uses most of the space and waits for user input or a "transient posture" for software that does not run or engage with the user all the time. With websites he discusses "informational" and "transactional" postures in About Face. In his 1998 book, The Inmates Are Running the Asylum: Why High-Tech Products Drive Us Crazy and How to Restore the Sanity, Alan Cooper outlined his methodology, called Goal-Directed design, based on the concept that software should speed the user towards his or her ultimate goal rather than ensnare him or her in computer minutiae. In the book, Cooper introduced a new concept that he called personas as a practical interaction design tool. Based on a brief discussion in the book, personas rapidly gained popularity in the software industry due to their unusual power and effectiveness. Today, the concepts of interaction design strategy and the use of personas have been broadly adopted across the industry. Cooper directs the message of his second book to the businessperson: know your users’ goals and how to satisfy them. You need interaction design to do the thing right. Cooper advocates for integrating design into business practice in order to meet customer needs and to build better products faster by doing it right the first time. Alan Cooper's current focus is on how to effectively integrate the advances of interaction design with the effectiveness of agile software development methods. Cooper regularly speaks and blogs about this on his company's website. Cooper Cooper is a user experience design and strategy consulting firm headquartered in San Francisco with an office in New York. Cooper is credited with inventing several widely used design concepts, including goal-directed design, personas, and pair design. It was founded by Sue Cooper and Alan Cooper in 1992 in Menlo Park, CA, under the name 'Cooper Software,' then changing the name to 'Cooper Interaction Design' in 1997. Cooper was the first consulting firm dedicated solely to interaction design. Its original clients were mainly Silicon Valley software and computer hardware companies. The company uses a human-centered methodology called “goal-directed design” that emphasizes the importance of understanding the user's desired end-state and their motivations for getting there. In 2002, Cooper began offering training classes to the public including topic as interaction design, service design, visual design, and design leadership. Cooper has served as the President of Cooper (formerly Cooper Interaction Design), a user experience and interaction design consultancy in San Francisco, California since its founding in 1992. Cooper helps their customers with interaction design challenges and offers training courses in software design and development topics, including their Goal-Directed design (under the CooperU brand). In 2017, Cooper became part of Designit, a strategic design arm of Wipro Digital. Cooper Professional Education continued to exist as a teaching and learning division of Designit until it closed its doors to business on May 29, 2020. Bibliography About Face: The Essentials of User Interface Design (), 1995 The Inmates Are Running the Asylum: Why High-Tech Products Drive Us Crazy and How to Restore the Sanity (), 1998 About Face 2.0: The Essentials of Interaction Design (with Robert Reimann) (), 2003 About Face 3: The Essentials of Interaction Design (with Robert Reimann and David Cronin) (), 2007 About Face: The Essentials of Interaction Design, 4th Edition (with Robert Reimann, David Cronin, and Christopher Noessel) (), 2014 See also Application posture Design methods Design thinking Interaction design User centered design User experience design Windows Pioneers References External links Profile at Cooper.com Article, Alexa, please kill me now: My thoughts on conversational UI Agile 2008 interview, “Similarities Between Interaction Designers and Agile Programmers” Interview, UX Podcast, Ranch Stories with Alan Cooper Interview, Alan Cooper Interview on .NET Rocks Interview, Conversation with Alan Cooper at Microsoft's Channel 9 Article, Alan Cooper on why he has been called "the Father of Visual Basic" Interview, SEOV: Visions of Alan Cooper (Video Interviews) Discussion, Alan Cooper on what companies must do to improve software products - mp3 format Article, Alan Cooper and the Goal Directed Design Process—Gain AIGA Journal of Design for the Network Economy, 2001 Software Development Forum's Software Visionary Award Interview, Triangulation 262: Alan Cooper Article, "Tech Republic" The Church of Usability, Alan K'necht Article, Dr. Dobbs Special Report 1997 (re. Gary Kildall), Michael Swaine Encyclopedia entry, Structured Systems Group (Britannica.com) Interview, Why People Yell at Their Computer Monitors and Hate Microsoft's Clippy American computer programmers Software engineers Human–computer interaction researchers Living people 1952 births
2135962
https://en.wikipedia.org/wiki/Snapshot%20%28computer%20storage%29
Snapshot (computer storage)
In computer systems, a snapshot is the state of a system at a particular point in time. The term was coined as an analogy to that in photography. It can refer to an actual copy of the state of a system or to a capability provided by certain systems. Rationale A full backup of a large data set may take a long time to complete. On multi-tasking or multi-user systems, there may be writes to that data while it is being backed up. This prevents the backup from being atomic and introduces a version skew that may result in data corruption. For example, if a user moves a file into a directory that has already been backed up, then that file would be completely missing on the backup media, since the backup operation had already taken place before the addition of the file. Version skew may also cause corruption with files which change their size or contents underfoot while being read. One approach to safely backing up live data is to temporarily disable write access to data during the backup, either by stopping the accessing applications or by using the locking API provided by the operating system to enforce exclusive read access. This is tolerable for low-availability systems (on desktop computers and small workgroup servers, on which regular downtime is acceptable). High-availability 24/7 systems, however, cannot bear service stoppages. To avoid downtime, high-availability systems may instead perform the backup on a snapshot—a read-only copy of the data set frozen at a point in time—and allow applications to continue writing to their data. Most snapshot implementations are efficient and can create snapshots in O(1). In other words, the time and I/O needed to create the snapshot does not increase with the size of the data set; by contrast, the time and I/O required for a direct backup is proportional to the size of the data set. In some systems once the initial snapshot is taken of a data set, subsequent snapshots copy the changed data only, and use a system of pointers to reference the initial snapshot. This method of pointer-based snapshots consumes less disk capacity than if the data set was repeatedly cloned. Implementations Volume managers Some Unix systems have snapshot-capable logical volume managers. These implement copy-on-write on entire block devices by copying changed blocksjust before they are to be overwritten within "parent" volumesto other storage, thus preserving a self-consistent past image of the block device. Filesystems on such snapshot images can later be mounted as if they were on a read-only media. Some volume managers also allow creation of writable snapshots, extending the copy-on-write approach by disassociating any blocks modified within the snapshot from their "parent" blocks in the original volume. Such a scheme could be also described as performing additional copy-on-write operations triggered by the writes to snapshots. On Linux, Logical Volume Manager (LVM) allows creation of both read-only and read-write snapshots. Writable snapshots were introduced with the LVM version 2 (LVM2). File systems Some file systems, such as WAFL, fossil for Plan 9 from Bell Labs, and ODS-5, internally track old versions of files and make snapshots available through a special namespace. Others, like UFS2, provide an operating system API for accessing file histories. In NTFS, access to snapshots is provided by the Volume Shadow-copying Service (VSS) in Windows XP and Windows Server 2003 and Shadow Copy in Windows Vista. Melio FS provides snapshots via the same VSS interface for shared storage. Snapshots have also been available in the NSS (Novell Storage Services) file system on NetWare since version 4.11, and more recently on Linux platforms in the Open Enterprise Server product. EMC's Isilon OneFS clustered storage platform implements a single scalable file system that supports read-only snapshots at the file or directory level. Any file or directory within the file system can be snapshotted and the system will implement a copy-on-write or point-in-time snapshot dynamically based on which method is determined to be optimal for the system. On Linux, the Btrfs and OCFS2 file systems support creating snapshots (cloning) of individual files. Additionally, Btrfs also supports the creation of snapshots of subvolumes. On AIX, JFS2 also support snapshots. Sun Microsystems ZFS has a hybrid implementation which tracks read-write snapshots at the block level, but makes branched file sets nameable to user applications as "clones". Time Machine, included in Apple's Mac OS X v10.5 operating system, is not a snapshotting scheme but a system-level incremental backup service: it merely watches mounted volumes for changes and copies changed files periodically to a specially-designated volume using hard links. This is because the HFS Plus file system does not have a snapshotting feature; Apple's new APFS file system introduces such a feature. See also Application checkpointing Logical Volume Manager (Linux) Persistence (computer science) Sandbox (computer security) Shadow Copy Storage Hypervisor System image Virtual machine Notes References External links Backup Fault-tolerant computer systems Persistence
39265072
https://en.wikipedia.org/wiki/Thomas%20E.%20Anderson
Thomas E. Anderson
Thomas E. Anderson (born August 28, 1961) is an American computer scientist noted for his research on distributed computing, networking and operating systems. Biography Anderson received a B.A. in Philosophy from Harvard University in 1983. He received a M.S. in computer science from University of Washington in 1989 and a Ph.D in computer science from University of Washington in 1991. He then joined the Department of Computer Science at the University of California, Berkeley as an assistant professor in 1991. While there he was promoted to associate professor in 1996. In 1997, he moved to the University of Washington as an associate professor. In 2001, he was promoted to professor, and in 2009 to the Robert E. Dinning Professor in Computer Science. He currently holds the Warren Francis and Wilma Kolm Bradley Endowed Chair. Awards His notable awards include: ACM SIGOPS Mark Weiser Award in 2005 ACM Fellow in 2005 IEEE Koji Kobayashi Computers and Communications Award, 2013 USENIX Lifetime Achievement Award, 2014 National Academy of Engineering, 2016, for “contributions to the design of resilient and efficient distributed computer systems.” Works References External links University of Washington web page: Thomas E. Anderson, Department of Computer Science American computer scientists University of Washington faculty UC Berkeley College of Engineering faculty ACM Living people Harvard College alumni University of Washington alumni 1961 births People from Orlando, Florida Scientists from Florida Members of the United States National Academy of Engineering
52635685
https://en.wikipedia.org/wiki/Charles%20Thacker
Charles Thacker
Charles Thacker may refer to: Charles M. Thacker (1866–1918), a Justice of the Oklahoma Supreme Court Charles P. Thacker (1943–2017), an American pioneer computer designer
7333367
https://en.wikipedia.org/wiki/Industrial%20control%20system
Industrial control system
Industrial control system (ICS) is a general term that encompasses several types of control systems and associated instrumentation used for industrial process control. Control systems can range in size from a few modular panel-mounted controllers to large interconnected and interactive distributed control systems (DCSs) with many thousands of field connections. Control systems receive data from remote sensors measuring process variables (PVs), compare the collected data with desired setpoints (SPs), and derive command functions that are used to control a process through the final control elements (FCEs), such as control valves. Larger systems are usually implemented by supervisory control and data acquisition (SCADA) systems, or DCSs, and programmable logic controllers (PLCs), though SCADA and PLC systems are scalable down to small systems with few control loops. Such systems are extensively used in industries such as chemical processing, pulp and paper manufacture, power generation, oil and gas processing, and telecommunications. Discrete controllers The simplest control systems are based around small discrete controllers with a single control loop each. These are usually panel mounted which allows direct viewing of the front panel and provides means of manual intervention by the operator, either to manually control the process or to change control setpoints. Originally these would be pneumatic controllers, a few of which are still in use, but nearly all are now electronic. Quite complex systems can be created with networks of these controllers communicating using industry-standard protocols. Networking allow the use of local or remote SCADA operator interfaces, and enables the cascading and interlocking of controllers. However, as the number of control loops increase for a system design there is a point where the use of a programmable logic controller (PLC) or distributed control system (DCS) is more manageable or cost-effective. Distributed control systems A distributed control system (DCS) is a digital process control system (PCS) for a process or plant, wherein controller functions and field connection modules are distributed throughout the system. As the number of control loops grows, DCS becomes more cost effective than discrete controllers. Additionally, a DCS provides supervisory viewing and management over large industrial processes. In a DCS, a hierarchy of controllers is connected by communication networks, allowing centralised control rooms and local on-plant monitoring and control. A DCS enables easy configuration of plant controls such as cascaded loops and interlocks, and easy interfacing with other computer systems such as production control. It also enables more sophisticated alarm handling, introduces automatic event logging, removes the need for physical records such as chart recorders and allows the control equipment to be networked and thereby located locally to the equipment being controlled to reduce cabling. A DCS typically uses custom-designed processors as controllers and uses either proprietary interconnections or standard protocols for communication. Input and output modules form the peripheral components of the system. The processors receive information from input modules, process the information and decide control actions to be performed by the output modules. The input modules receive information from sensing instruments in the process (or field) and the output modules transmit instructions to the final control elements, such as control valves. The field inputs and outputs can either be continuously changing analog signals e.g. current loop or 2 state signals that switch either on or off, such as relay contacts or a semiconductor switch. Distributed control systems can normally also support Foundation Fieldbus, PROFIBUS, HART, Modbus and other digital communication buses that carry not only input and output signals but also advanced messages such as error diagnostics and status signals. SCADA systems Supervisory control and data acquisition (SCADA) is a control system architecture that uses computers, networked data communications and graphical user interfaces for high-level process supervisory management. The operator interfaces which enable monitoring and the issuing of process commands, such as controller setpoint changes, are handled through the SCADA supervisory computer system. However, the real-time control logic or controller calculations are performed by networked modules which connect to other peripheral devices such as programmable logic controllers and discrete PID controllers which interface to the process plant or machinery. The SCADA concept was developed as a universal means of remote access to a variety of local control modules, which could be from different manufacturers allowing access through standard automation protocols. In practice, large SCADA systems have grown to become very similar to distributed control systems in function, but using multiple means of interfacing with the plant. They can control large-scale processes that can include multiple sites, and work over large distances. This is a commonly-used architecture industrial control systems, however there are concerns about SCADA systems being vulnerable to cyberwarfare or cyberterrorism attacks. The SCADA software operates on a supervisory level as control actions are performed automatically by RTUs or PLCs. SCADA control functions are usually restricted to basic overriding or supervisory level intervention. A feedback control loop is directly controlled by the RTU or PLC, but the SCADA software monitors the overall performance of the loop. For example, a PLC may control the flow of cooling water through part of an industrial process to a set point level, but the SCADA system software will allow operators to change the set points for the flow. The SCADA also enables alarm conditions, such as loss of flow or high temperature, to be displayed and recorded. Programmable logic controllers PLCs can range from small modular devices with tens of inputs and outputs (I/O) in a housing integral with the processor, to large rack-mounted modular devices with a count of thousands of I/O, and which are often networked to other PLC and SCADA systems. They can be designed for multiple arrangements of digital and analog inputs and outputs, extended temperature ranges, immunity to electrical noise, and resistance to vibration and impact. Programs to control machine operation are typically stored in battery-backed-up or non-volatile memory. History Process control of large industrial plants has evolved through many stages. Initially, control was from panels local to the process plant. However this required personnel to attend to these dispersed panels, and there was no overall view of the process. The next logical development was the transmission of all plant measurements to a permanently-manned central control room. Often the controllers were behind the control room panels, and all automatic and manual control outputs were individually transmitted back to plant in the form of pneumatic or electrical signals. Effectively this was the centralisation of all the localised panels, with the advantages of reduced manpower requirements and consolidated overview of the process. However, whilst providing a central control focus, this arrangement was inflexible as each control loop had its own controller hardware so system changes required reconfiguration of signals by re-piping or re-wiring. It also required continual operator movement within a large control room in order to monitor the whole process. With the coming of electronic processors, high-speed electronic signalling networks and electronic graphic displays it became possible to replace these discrete controllers with computer-based algorithms, hosted on a network of input/output racks with their own control processors. These could be distributed around the plant and would communicate with the graphic displays in the control room. The concept of distributed control was realised. The introduction of distributed control allowed flexible interconnection and re-configuration of plant controls such as cascaded loops and interlocks, and interfacing with other production computer systems. It enabled sophisticated alarm handling, introduced automatic event logging, removed the need for physical records such as chart recorders, allowed the control racks to be networked and thereby located locally to plant to reduce cabling runs, and provided high-level overviews of plant status and production levels. For large control systems, the general commercial name distributed control system (DCS) was coined to refer to proprietary modular systems from many manufacturers which integrated high-speed networking and a full suite of displays and control racks. While the DCS was tailored to meet the needs of large continuous industrial processes, in industries where combinatorial and sequential logic was the primary requirement, the PLC evolved out of a need to replace racks of relays and timers used for event-driven control. The old controls were difficult to re-configure and debug, and PLC control enabled networking of signals to a central control area with electronic displays. PLCs were first developed for the automotive industry on vehicle production lines, where sequential logic was becoming very complex. It was soon adopted in a large number of other event-driven applications as varied as printing presses and water treatment plants. SCADA's history is rooted in distribution applications, such as power, natural gas, and water pipelines, where there is a need to gather remote data through potentially unreliable or intermittent low-bandwidth and high-latency links. SCADA systems use open-loop control with sites that are widely separated geographically. A SCADA system uses remote terminal units (RTUs) to send supervisory data back to a control centre. Most RTU systems always had some capacity to handle local control while the master station is not available. However, over the years RTU systems have grown more and more capable of handling local control. The boundaries between DCS and SCADA/PLC systems are blurring as time goes on. The technical limits that drove the designs of these various systems are no longer as much of an issue. Many PLC platforms can now perform quite well as a small DCS, using remote I/O and are sufficiently reliable that some SCADA systems actually manage closed-loop control over long distances. With the increasing speed of today's processors, many DCS products have a full line of PLC-like subsystems that weren't offered when they were initially developed. In 1993, with the release of IEC-1131, later to become IEC-61131-3, the industry moved towards increased code standardization with reusable, hardware-independent control software. For the first time, object-oriented programming (OOP) became possible within industrial control systems. This led to the development of both programmable automation controllers (PAC) and industrial PCs (IPC). These are platforms programmed in the five standardized IEC languages: ladder logic, structured text, function block, instruction list and sequential function chart. They can also be programmed in modern high-level languages such as C or C++. Additionally, they accept models developed in analytical tools such as MATLAB and Simulink. Unlike traditional PLCs, which use proprietary operating systems, IPCs utilize Windows IoT. IPC's have the advantage of powerful multi-core processors with much lower hardware costs than traditional PLCs and fit well into multiple form factors such as DIN rail mount, combined with a touch-screen as a panel PC, or as an embedded PC. New hardware platforms and technology have contributed significantly to the evolution of DCS and SCADA systems, further blurring the boundaries and changing definitions. Security SCADA and PLCs are vulnerable to cyber attack. The U.S. Government Joint Capability Technology Demonstration (JCTD) known as MOSAICS (More Situational Awareness for Industrial Control Systems) is the initial demonstration of cybersecurity defensive capability for critical infrastructure control systems. MOSAICS addresses the Department of Defense (DOD) operational need for cyber defense capabilities to defend critical infrastructure control systems from cyber attack, such as power, water and wastewater, and safety controls, affect the physical environment. The MOSAICS JCTD prototype will be shared with commercial industry through Industry Days for further research and development, an approach intended to lead to an innovative, game-changing capabilities for cybersecurity for critical infrastructure control systems. See also Automation Industrial safety systems MTConnect OPC Foundation Safety instrumented system (SIS) Control system security Operational Technology References Further reading Guide to Industrial Control Systems (ICS) Security, SP800-82 Rev2, National Institute of Standards and Technology, May 2015. External links Proview, an open source process control system Telemetry Control system Control engineering
12835166
https://en.wikipedia.org/wiki/Cable%20television%20piracy
Cable television piracy
Cable television piracy is the act of obtaining unauthorized access to cable television services. It is a form of copyright infringement. In older analog cable systems, most cable channels were not encrypted and cable theft was often as easy as plugging a coaxial cable attached to the user's television into an apartment house cable distribution box (which often were unsecured (i.e. without locks) to prevent unauthorized access). In some rural areas nonsubscribers would even run long cables to distribution boxes on nearby utility poles. Set-top boxes were required with some systems, but these were generic, and often in an unknowing violation of contract, former customers would donate them to thrift stores for sale or retain them indefinitely in storage when they ended their subscription to the service rather than return them to the provider. Other ways of cable theft were using a cable tv converter box (also known as a descrambler or "black box") to steal only premium channels such as HBO and pay per view by decrypting all channels, whereas a normal converter would only decrypt the ones paid for by the customer. The cable companies could send an electronic signal, called a "bullet", that would render illegal descramblers inoperative, though some were bulletproof. The boxes also would often be ordered from overseas or given to customers by corrupt third-party installers of cable television. To prevent this, cable providers built stronger protection against theft into new digital cable systems which were deployed beginning in the mid-1990s as part of the changeover to the new digital HDTV standard, along with assessing a large fine for the entire cost of a set-top box if the customer didn't return it upon the termination of services. This has greatly reduced cable theft, although pirate decryption continued on some DVB-C systems which are based on the same compromised encryption schemes formerly used in satellite television broadcasting. Most cable companies have also issued new secured outside distribution boxes which require certain keys only given out to their installers to access, making theft via outside split line more difficult. Sometimes an advertisement advertising a free product or service only users illegally descrambling premium services could see would be sent out, which allowed law enforcement to catch the people who called about it. As of 2017, many cable providers have switched to digital-only systems which require mandatory use of either their approved set top boxes or an approved CableCARD device. In many cases, no analog channels are available, and if they are, are usually just the provider's paid programming, Emergency Alert System and barker channels, or merely a one-channel signal which lets a customer or installer know the signal is viewable on a television set. Channels and programming may also be available through digital media player devices such as the Roku or Apple TV (along with tablets and smartphones) via provider apps, which confirm subscriber eligibility through a private internal IP network and require an on-network connection to the provider (including disallowing connections to outside virtual private network services to emulate a home network connection elsewhere), making any piracy through that venue virtually impossible. Digital cable systems In most modern digital cable systems the signals are encrypted, so cases of people obtaining illegal service are less common. The subscriber requires a set-top box provided by the cable company to decrypt and receive the cable signal. Unlike the older analog set-top boxes, the digital set-top box will not function until the cable company activates it by sending it a unique activation key through the cable, which is sent only after the subscriber signs up. Each set-top box is individually addressable, so a given box can be deactivated by command from the company if the subscriber fails to pay his bill (this is sometimes colloquially referred to as a "bullet"). A box only decrypts the channel being watched, so each box can only be used with one television, requiring subscribers to lease additional boxes at greater expense for multiple televisions. One minor loophole is that the cable company has no way of knowing where a given set-top box is located, and once activated a box will function anywhere in the local cable system. Subscribers are often provided with several set-top boxes as part of their subscription, and can give or sell unneeded activated boxes to neighboring nonsubscribers who can use them in their own residences, though a provider using IP location using the cable modem within a set-top box featuring advanced two-way features can avert this situation. This system is dependent on the security of the encryption system chosen by the cable company in question. Old cable equipment used an analog signal that was scrambled by tuning the signal so the picture was unsteady, just as Macrovision does at an attempt to copy a video. The equipment would descramble the signal so that it can be viewed by the subscriber. It also is addressable, meaning that it can be remotely controlled by the company's technical staff. The first major case covered by the media was when 317 subscribers were caught in 1991 when the company they subscribed to sent a "bullet" (a video signal that turns off the equipment) to their cable boxes. The boxes were modified, but possibly belonged to the cable company. See also Broadcast encryption Pirate decryption Television encryption Theft of services Homer vs. Lisa and the 8th Commandment The Baby Shower (Seinfeld) References Copyright infringement Piracy
45487366
https://en.wikipedia.org/wiki/Construction%20of%20the%20Cheyenne%20Mountain%20Complex
Construction of the Cheyenne Mountain Complex
Construction of the Cheyenne Mountain Complex began with the excavation of Cheyenne Mountain in Colorado Springs, Colorado on May 18, 1961. It was made fully operational on February 6, 1967. It is a military installation and hardened nuclear bunker from which the North American Aerospace Defense Command was headquartered at the Cheyenne Mountain Complex. The United States Air Force has had a presence at the complex since the beginning, the facility is now the Cheyenne Mountain Air Force Station, which hosts other military units, including NORAD. Initial planning From the beginning of the Cold War, American defense experts and political leaders began planning and implementing a defensive air shield, which they believed was necessary to defend against a possible attack by long-range, manned Soviet bombers. The Air Defense Command was transferred to Colorado Springs' Ent Air Force Base on January 8, 1951. Starting September 1953, the base was the headquarters for the U.S. Army Anti-Aircraft Command. The North American Air Defense Command (NORAD) was established and activated at the Ent Air Force Base on September 12, 1957. In the late 1950s, a plan was developed to construct a command and control center in a hardened facility as a Cold War defensive strategy against long-range Soviet bombers, ballistic missiles, and a nuclear attack. The Operational Research Society published scientific articles at that time, relating to the planning of such a complex, like: Hankin, B. D. "Communication and Control of Military Forces." Journal of the Operational Research Society 4.4 (1953): 65-68. Rivett, Berwyn Hugh Patrick. "Underground communications." Journal of the Operational Research Society 4.4 (1953): 61-65. Eddison, R. T., and D. G. Owen. "Discharging iron ore." Journal of the Operational Research Society 4.3 (1953): 39-50. It is also interesting to note, that of the commissions charged with the task of investigating these concerns some were based around the Colorado Springs area, near the Broadmoor hotel. The leader of these inquests, members of the Rockefeller family, were also present at its inauguration. Psychological planning, (known as Aviation Medicine) went into the selection of candidates, which was also related to continuity of government defense programs such as Operation Looking Glass. This is also the same year the MKULTRA program was authorized. This planning occurred simultaneously with the rollout of Civil Defense programs in 1951, which resulted in the passage of the National Defense Education Act in 1958. Hardened bunkers were part of a national plan to ensure the continuation of the United States government in the event of nuclear attack. In the Washington, D.C. area alone, there are said to have been 96 hardened bunkers. Other command bunkers built in the 1950s and early 1960s, include Raven Rock Mountain Complex (1953), Mount Weather Emergency Operations Center (1959) in Virginia, and Project Greek Island (Greenbrier). The closest Russian counterpart to the facility is regarded to be Kosvinsky Mountain, finished in early 1996. Excavation The operations center was moved from an above-ground facility, vulnerable to attack, to the "granite shielded security" within Cheyenne Mountain during the Cold War. In terms of telecommunications capabilities, American Telephone and Telegraph (AT&T) had begun placing its switching stations in hardened underground bunkers during the 1950s. The mountain was excavated under the supervision of the Army Corps of Engineers for the construction of the NORAD Combat Operations Center. Excavation began for NORAD Command Operations Center (COC) in Cheyenne Mountain on May 18, 1961, by Utah Construction & Mining Company. Clifton W. Livingston of the Colorado School of Mines was hired by the Army Corps of Engineers to consult upon use of controlled blasting for smooth-wall blasting techniques. The official ground breaking ceremony was held June 16, 1961 at the construction site of the new NORAD Combat Operations Center. Generals Lee (ADC) and Laurence S. Kuter (NORAD) simultaneously set off symbolic dynamite charges. On December 20, 1961, with excavation 53% complete there were 200 workers that walked off on what Cecil Welton, Utah Construction Company project manager, called a wildcat strike after a worker was fired for disobeying safety rules. Workers returned three days later and the fired worker was returned to his position. Excavation was nearly complete in August 1962, but a geological fault in the ceiling of one of the intersections needed to be reinforced with a $2.7 million massive concrete dome. President John F. Kennedy visited NORAD at the Chidlaw Building on June 5, 1963, to obtain a briefing on the status of the Cheyenne Mountain Complex. Excavation was complete on May 1, 1964. On September 24, 1964, the Secretary of Defense approved the proposal for the underground Combat Operations Center construction and the Space Defense Center. The targeted date for turnover of the military-staffed facility to the Commander of NORAD was January 1, 1966. Construction The architectural design was primarily created by Parsons Brinckerhoff Company. Estimated cost of the combat operations center construction and equipment was $66 million. The complex was built in the mid-1960s. Continental Consolidated Construction was awarded a $6,969,000 contract on February 27, 1963, to build 11 buildings on giant springs, with a total of . Eight three-story buildings were built in the main chambers and three two-story buildings were constructed in the support area. Grafe-Wallace, Inc. and J. M. Foster Co. received a joint contract in April 1964 for $7,212,033 contract for blast-control equipment and utilities installation, including the original six 956-kilowatt diesel powered generators. Continental Consolidated also excavated water and fuel oil reservoirs within the interior of the Cheyenne Mountain facility. Continental Consolidated was paid an additional $106,000 for work on the reservoirs. Beginning in 1965, the NORAD Combat Operations Center was connected through several remote locations to the national telecommunications systems via Bell Laboratories' Close-in Automatic Route Restoral System (CARRS), a "Blast-resistant" communication system constructed hundreds of feet underneath solid granite. Having several remote locations, from 30 to 120 miles from the Cheyenne Mountain Complex, allowed for several different, automatically rerouted pathways to relay data, teletype, and voice communications. The Ballistic Missile Early Warning System (BMEWS) and Distant Early Warning Line (DEW) sites in North America, United Kingdom, and Greenland sent incoming information through the system to the Combat Operations Center. Systems installations Burroughs Corporation developed a command and control system for NORAD's Combat Operations Center for the underground facility and the Federal Building in downtown Colorado Springs. The electronics and communications system centralized and automated the instantaneous (one-millionth of a second) evaluation of aerospace surveillance data. The Air Defense Command's SPACETRACK Center and NORAD's Space Detection and Tracking System (SPADATS) Center merged to form the Space Defense Center. It was moved from Ent AFB to the newly completed Cheyenne Mountain Combat Operations Center and was activated on September 3, 1965. The Electronic Systems Division (ESD) turned the facility's Combat Operations Center over to NORAD on January 1, 1966. The Commander of NORAD transferred Combat Operations Center operations from Ent Air Force Base to Cheyenne Mountain and declared the 425L command and control system fully operational April 20, 1966. The Space Defense Command's 1st Aerospace Control Squadron moved from Ent AFB to Cheyenne Mountain in April 1966. On May 20, 1966, the NORAD Attack Warning System became operational. The Combat Operations Command was fully operational on July 1, 1966. The $5 million Delta I computer system, one of the largest computer program systems of the Electronic Systems Division, became operational on October 28, 1966. With 53 different programs, it was a defense against space systems by detecting and warning of space threats, which involved recording and monitoring every detected space system. By January 4, 1967, the National Civil Defense Warning Center was in the bunker. The Space Defense Center and the Combat Operations Center achieved Full Operational Capability on February 6, 1967. The total cost was $142.4 million or $1,075,017,676.65 in 2018 value. Notes See also Fortification Underground construction References External links United States Army Corps of Engineers Government buildings completed in 1965 Cheyenne Mountain Complex Military history of Colorado North American Aerospace Defense Command Nuclear bunkers in the United States Continuity of government in the United States Underground construction
29100596
https://en.wikipedia.org/wiki/Babak%20Pasdar
Babak Pasdar
Babak Pasdar is an Iranian-American innovator, cyber security expert, author, and entrepreneur best known for his contributions in the areas of cloud-based security innovations and as a whistle blower on government warrantless wiretapping. Pasdar has been credited for being one of the leading innovators of Cloud Delivered Security via two technology startups he founded. IGX Global in 1997 and Bat Blue Networks (Now OPAQ Networks) in 2007, in both cases serving as CEO and CTO. Pasdar exited Bat Blue Networks in 2016 with the sale of his company to OPAQ Networks. He is now serving as founder, CEO and CTO of Acreto IoT Security, focused on addressing emerging security challenges posed by highly distributed and mobile purpose-built internet of things (IoT) devices that have seeped into every day life. Pasdar was selected as one of New York's Top Ten Startup Founders in 2017. Early years Pasdar the eldest of three sons was born in Kermanshah, Iran. His father was Koocheck Pasdar, a General in the Iranian Army under the Shah of Iran. His mother Simin Fardsavar-Pasdar was a school teacher from Shiraz, Iran. Pasdar is also related to actor Adrian Pasdar. His family fled Iran to the United States in 1979 to escape the revolution. Arriving to the U.S. under a tourist visa, his family's requests for political asylum were denied, driving a long process for the family to establish themselves legally and financially in the United States. Professional career Pasdar was an early entrepreneur, starting his first business while still in high school. At a time when computer memory chips were in significant demand with high prices, Pasdar purchased used mainframe computers at auctions and extracted their memory chips using special techniques he developed. Throughout his career he has been credited for evolving ahead of a constantly commoditizing technology market-space moving from harvesting memory chips, to building PCs, networking, multi-platform integration, Internet communications and eventually cyber security. In 1992, Pasdar discovered the Internet and quickly moved to start his first Internet Services Company where he developed experience and expertise in Internet Communications technologies. In 1995 while experimenting with unorthodox Internet communications, Pasdar inadvertently compromised the Microsoft corporation. This highlighted to Pasdar the importance of cyber security and how challenged the industry's approach was. In 1997, Pasdar founded IGX Global, a cyber security company delivering fully operationalized Security as-a-Service. He developed a reputation for effective handling of large-scale and complex projects. This reputation drove Juniper Networks to engage Pasdar in the Verizon Wireless project which led to his whistleblowing on Verizon's warrant-less wiretapping. At IGX Global, Pasdar also invented the first Proxy in-the-Cloud technology called Security Anywhere. This Proxy in-the-Cloud approach became the foundations of many early cloud security technology companies. In 2007, Pasdar exited IGX Global and formed Bat Blue Networks with a focus on furthering his works around Cloud Delivered Security. At Bat Blue he developed and brought to market the Cloud/SEC platform. Cloud/SEC represented the first platform to deliver full-stack security supporting every port, protocol and application from-the-Cloud. The virtues of the platform were highlighted in Pasdar's 2016 book Unified Cloud Security: The CXO Guide to Building Effective, Agile and Sustainable Security. In 2016 Pasdar exited Bat Blue Networks with the sale of the company to OPAQ Networks. Warrant-less wiretapping whistleblower In 2003, Pasdar was engaged by Juniper Networks to re-architect and scale the network and security infrastructure for Verizon Wireless. During the roll-out process Pasdar was made aware of "The Quantico Circuit" that provided a third-party (believed to be the U.S. FBI) unfettered access to all data and voice communications of the carriers' customers. Pasdar's efforts to implement any type of control or logging for the communications to the third-party were met with resistance and subsequent threats from the carriers' management. Eventually Pasdar blew the Whistle on Verizon Wireless. His public testimony was used to file a $233 billion class-action lawsuit against Verizon Wireless and other carriers alleged to have participated in an illegal warrant-less wiretapping effort by the U.S. Government. Pasdar testified to Congressional Committees including the House Committee on Energy & Commerce, the Subcommittee on Telecommunications & the Internet and the Subcommittee on Oversight & Investigations. He also testified to the Senate Judiciary Committee. His testimony led to a Dear Colleague Letter from congressmen Dingell, Markey and Stupak. In light of the massive $233 billion lawsuit, the Telecommunications Industry lobbied Congress for retroactive immunity. The Immunity Bill H.R. 6304 was passed by the 110th Congress on July 9, 2008. Innovations and accomplishments Proxy-in-the-Cloud in 2001 Full-stack security from-the-Cloud in 2009 “Internet Wormholing” Accelerated Internet in 2011 Network Feature Virtualization (NFV) in 2013 – Patent US9197601 B2 Distributed Virtualized / Hybrid Data Center Architectures in 2014 (Patent Pending) New York's Top Ten Startup Founders Over 40 References American chief executives Living people Year of birth missing (living people)
14903929
https://en.wikipedia.org/wiki/Texas%20Instruments%20AR7
Texas Instruments AR7
The Texas Instruments AR7 or TI-AR7 is a fully integrated single-chip ADSL CPE access router solution. The AR7 combines a MIPS32 processor, a DSP-based digital transceiver, and an ADSL analog front end. Ownership history In 2007, TI sold its DSL business to Infineon. In 2009, Infineon Technologies spins off its wireline division to Lantiq. On November 6, 2009, Lantiq announced that it became a standalone company. Features Integrated high performance MIPS 4KEc 32-Bit RISC processor ADSL PHY subsystem based on TI C62x DSP, with integrated transceiver, codec, line driver, and line receiver Hardware accelerated ATM Segmentation and Reassembly (SAR) Integrated IEEE 802.3 PHY Two IEEE 802.3 MACs with integrated Media Independent Interface (MII) and Quality of Service (QoS) Integrated USB 1.1 compliant transceiver (slave only) Two VLYNQ interfaces for compatible high-speed expansion devices Two 16c550 compatible UARTs EJTAG, GPIO and "Flexible Serial Interface" (FSER) interfaces 4 KiB PROM (0xBFC00000) and 4KiB RAM (0x80000000) on the chip for boot purposes Physical package of a 324 BGA with 1.0-mm ball pitch Options AR7DB AR7RD AR7WRD (TNETD7300GDU) is an AR7 option with an interface for WiFi card. AR7VWI : DSL + VoIP + Wireless AR7VW AR7WI AR7V : DSL + VoIP The Adam2 bootloader The Pspboot bootloader Devices based on the Texas Instruments AR7 Actiontec GT701 Acorp W400G/W422G Asus AAM6010EV : TNETD7300GDU, 2Mb FLASH, 8Mb SDRAM AVM Fritz!Box Aztech DSL-600E: 2Mb FLASH, 8Mb SDRAM Aztech DSL600ER: 2Mb FLASH, 8Mb SDRAM, 88E6060 Switch Aztech DSL600EW: 4Mb FLASH, 16Mb SDRAM, 88E6060 Switch, TNETW1130 D-Link DSL-xxxT (like 300T) D-Link DVA-G3342SB (DSL board only) ECI B-FOCuS combo 352+, B-FOCuS Router 312+A devolo dsl+ 1100 duo, dsl+ 1100 LAN Efficient Networks, Inc / ENI SpeedStream 5100 Huawei WA1003A LevelOne FBR-1416A: 2Mb FLASH, 8Mb SDRAM, 88E6060 Switch Linksys ADSL2MUE 4MB Flash, 16MB ram, USB + 1 Ethernet only Linksys AG241 Linksys WAG200Gv1 Linksys WAG54Gv2 and v3 Linksys WAG354Gv1, v2, and v2.1 Linksys HG200 Netgear DG834(G) (Version 1, 2, and 3 have AR7 Chipset; version 4 has Broadcom chipset) Paradyne (Zhone Technologies) Hotwire 6210-A2, 6211-A2, and 6381-A2 (OEM Asus AAM6010EV) Pluscom AWR-7200 Safecom SWART2-54125 Shiro DSL805(E/EU/EW) Siemens SX541 uses real-time OS (SOHO.BIN) and BRN Boot Loader from the Broad Net Technology, Inc. Siemens SpeedStream 4100/4200/5620/SE567 Sitecom WL-108 Surecom 9410SX-g Solwise ADSL-SAR-600E/SAR600EW/SAR605EW Sphairon Turbolink JDR454WB WLAN ADSL Modem (2548 937939) T-Com Sinus 154 DSL SE T-Com Sinus 154 DSL Basic SE T-Com Sinus 154 DSL Basic 3 T-Com Speedport W501V T-Com Speedport W701V TRENDnet TEW-435BRM v1 Westell WireSpeed 2000 and ProLine 6100 ZyXEL Prestige 660 Series ADSL 2+ Modem/Router - Prestige 660M-67 (Arcor-DSL Speed-Modem 50Z) 3Com Officeconnect 3crwdr100x series 3Com 3rcwdr100x series ADSL firewall router Third-party firmware RouterTech has released open source firmware. OpenWrt has open source firmware in development, available for testing. DGTeam References External links www.lantiq.com – Lantiq XWAY™ AR7 linux-mips.org – AR7 wiki ar7.wikispaces.com – AR7 wiki wehavemorefun.de – Fritz!Box Wiki AR7 MIPS architecture
14458275
https://en.wikipedia.org/wiki/Hit-Medley
Hit-Medley
"Hit-Medley" is the twentieth single by Dutch girl group Luv', released in 1990 by the labels Dureco/High Fashion Music in the Benelux and RCA Records/BMG in Germany. It appears on their 1989 EP For You. This medley is composed from parts of Luv's greatest hits re-recorded by a new formation (Marga Scheide, the only original member and two other vocalists Michelle Gold and Diana van Berlo). Song history When Luv' was reformed in 1989 with a new line-up, the goal was to reach the peak of the original trio. The new version of the pop act recorded new material produced by Nigel Wright and musically inspired by the Stock Aitken Waterman productions. It only scored a Top 30 hit in the Netherlands and in Flanders (Belgium) with the Welcome to My Party single. The follow-up singles didn't top the charts at all. Then, a Dance Music medley (including five successful chart toppers from the original Luv's repertoire re-recorded by the 1989 formation) was released as a single. Once again, it failed to break into the hit lists. Track listings and formats 7" Vinyl Single "Hit-Medley" (Single Version) — 3:59 "You're the Greatest Lover"/"Trojan Horse"/"Ooh, Yes I Do"/"Casanova"/"U.O.Me (Theme from Waldolala)" "No Cure No Pay" — 3:39 CD Single and 12-inch single "Hit-Medley" (12-inch Version) — 7:14 Greatest Lover/Trojan Horse/Yes I Do/Casanova/U.O.Me "Hit-Medley" (Single Version) — 3:59 Greatest Lover/Trojan Horse/Yes I Do/Casanova/U.O.Me "No Cure No Pay" — 3:39 References 1990 singles 1989 songs Luv' songs Dance-pop songs Songs written by Hans van Hemert Songs written by Piet Souer Music medleys
25227665
https://en.wikipedia.org/wiki/PicoSpan
PicoSpan
Picospan was a popular computer conferencing tool written by Marcus D. Watts for the Altos 68000. It was written in 1983 for M-Net, which was owned and operated by Mike Myers. Sometime in 1984, Marcus's employer, an Ann Arbor company called Network Technologies International (NETI) purchased the rights for PicoSpan planning to develop it into a commercial product called E-Forum. History Computer conferencing was first pioneered in Michigan on CONFER, PicoSpan, E-Forum, Caucus and Participate. Functionality and impact PicoSpan tried to provide CONFER's functionality while using the least amount of resources, though many users found it hard to use. It formed the basis for many conferencing systems run by hobbyists. Picospan came with a toolbox of software customization utilities that could be used to make changes at the system and user level. It was tightly integrated with Unix and could provide transparent access to many external programs that formed a part of the Unix environment. Typing "unix" at the Pico prompt put the user in a shell and users could rapidly switch back and forth and move text from one to the other. Marcus had a direct effect on The WELL's culture: PicoSpan prevented censorship by preventing conference hosts (who are empowered to hide or delete any response posted in their forum) from influencing a discussion, by labeling such posts as being "<censored>". PicoSpan also permitted the linking of discussion threads into multiple conferences, at the same time, so that multiple groups could participate. On a big BBS with many users, not all conferences are followed, so it's advantageous if the more interesting discussions are cross linked. PicoSpan also displays responses as a single integrated thread rather than a collection of separately displayed responses. It relied on constrained choices: no one could start a new topic merely by responding to an old post, so discussions and topics didn't fragment. You couldn't respond to an individuals post and had to respond to the whole thread, forcing people to stay coherent and on-topic. However many people found it hard to use, because of its plain-text environment and steep learning curve. Users normally dialed into the BBS over slow and flaky telephone lines. After providing the system with a name and password, they invoked Pico and brought up a long list of conference names like "Theology", "Arts", "Singles", "Twilight", "Health" and various other computer topics which were in turn grouped into themes like "Entertainment" or "Computers". The user could then type a command with the conference name as an argument and enter the conference. Once inside, they would find a series of numbered topics or threads each created by a user and each representing an asynchronous conversation. They could then post his comments. References External links Marcus D. Watts, Home Page Bulletin board systems History of the Internet Social networking services Unix software
766938
https://en.wikipedia.org/wiki/Tom%20Kilburn
Tom Kilburn
Tom Kilburn (11 August 1921 – 17 January 2001) was an English mathematician and computer scientist. Over the course of a productive 30-year career, he was involved in the development of five computers of great historical significance. With Freddie Williams he worked on the Williams–Kilburn tube and the world's first electronic stored-program computer, the Manchester Baby, while working at the University of Manchester. His work propelled Manchester and Britain into the forefront of the emerging field of computer science. A graduate of Sidney Sussex College, Cambridge, Kilburn worked on radar at the Telecommunications Research Establishment (TRE) in Malvern under Frederic Calland Williams during the Second World War. After the war ended, he was recruited by Williams to work on the development of computers at the University of Manchester. He led the development of a succession of innovative Manchester computers that incorporated a host of ground-breaking innovations and developments, including the Ferranti Mark 1, the world's first commercial computer, and the Atlas, one of the first time-sharing multiprocessing computers that incorporated job scheduling, spooling, interrupts, instruction pipelining and paging. Early life and education Tom Kilburn was born in Dewsbury, Yorkshire, on 11 August 1921, the only son of John William Kilburn, a wool mill clerk who later became a company secretary, and his wife, Ivy Mortimer. From 1932 to 1940, he attended the Wheelwright Grammar School for Boys, where the headmaster encouraged his aptitude for mathematics. He also played sports, notably running. In 1940, Kilburn entered Sidney Sussex College, Cambridge, with a state scholarship, a county major scholarship, and a minor open scholarship, where he studied mathematics. Although many university dons were absent performing war work at places like Bletchley Park, the University of Cambridge maintained a vigorous mathematical community, and Kilburn became the Sidney Sussex College representative in the New Pythagoreans, a clique with the Cambridge University Mathematical Society that also numbered Gordon Welchman and Geoff Tootill among its members. Due to the outbreak of the Second World War, courses were compressed to two years, and he graduated in 1942 with First Class Honours in Part I of the Mathematical Tripos and preliminary examinations for Part II. Career and research On graduation, Kilburn was recruited by C.P. Snow. He was given a quick course in electronics, and was posted to the Telecommunications Research Establishment (TRE) in Malvern, where he worked on radar in Group 19 under Frederic Calland Williams. The group was responsible for designing and debugging electronic circuitry. Although Williams was initially disappointed at being given someone with so little practical experience, Kilburn became a valued member of the team. On 14 August 1943, he married Irene Marsden, a shop assistant. They went on to raise a son, John, and a daughter, Anne. Kilburn's wartime work inspired his enthusiasm for some form of electronic computer. The principal technical barrier to such a development at that time was the lack of any practical means of storage for data and instructions. In July 1946, Kilburn and Williams collaboratively developed a storage device based on a cathode ray tube (CRT) called the Williams–Kilburn tube. A patent was filed in 1946. Initially they used it to store a single bit. The CRT image soon faded, so they devised a scheme by which it was read and refreshed continually, effectively making the data storage permanent. By December 1947, they were able to store 2,048 bits on one diameter CRT. In December 1946, Williams took up the Edward Stocks Massey Chair of Electrotechnics at the University of Manchester, and recruited Kilburn on secondment from Malvern. The two developed their storage technology and, in 1948, Kilburn put it to a practical test in constructing the Manchester Baby, which became the first stored-program computer to run a program, on 21 June 1948. He received the degree of PhD in 1948 for his work at Manchester, writing his thesis on A storage system for use with binary digital computing machines under Williams's supervision. Manchester computers Kilburn anticipated a return to Malvern but Williams persuaded him to stay to work on the university's collaborative project developing the Ferranti Mark 1, the world's first commercial computer. Max Newman withdrew from the project, believing that the development of computers required engineers and not mathematicians at this point, but Williams preferred to return to electrotechnics, leaving Kilburn in charge. He was assisted by Alan Turing, who arrived at Manchester in 1948. The Mark I incorporated innovations such as index registers, and combined CRTs with magnetic drum storage. Nine Mark I computers were sold by between 1951 and 1957. Over the next three decades, Kilburn led the development of a succession of innovative Manchester computers. The first, commenced in 1951, was a development of the Mark I known as the megacycle machine or Meg, that replaced the vacuum tube diodes with solid state ones. This permitted an order of magnitude increase in the clock rate. To add further speed, Kilburn provided for 10-bit parallel CRT memory. It was also one of the first computers, if not the first, to have floating point arithmetic. Meg operated for the first time in 1954, and nineteen were sold by Ferranti under the name 'Mercury', six of them to customers overseas. While Kilburn led one design team working on Meg, he led another with Dick Grimsdale and Douglas Webb, on a research project examining what he believed would be the next step forward in computer design: the use of transistors. The 48-bit machine they completed in November 1953 was the world's first transistor computer, with 550 diodes and 92 transistors, and was manufactured by STC. An improved version completed in April 1955 had 1,300 diodes and 200 transistors, and was sold by Metropolitan-Vickers as the Metrovick 950. Kilburn's next project, known as Atlas, aimed to create a fast computer by making maximum use of existing and new technologies. The project was backed by Ferranti and a £300,000 grant from the National Research Development Corporation. It incorporated numerous technologies and techniques such as "multiprogramming, job scheduling, spooling, interrupts, pipelining, interleaved storage, autonomous transfer units, virtual storage and paging – though none of these techniques had been invented when the project started in 1956." Other innovations included read only memory and a compiler-compiler. The greatest innovation was virtual memory, which allowed the drum storage to be treated as if it were core. Three of them were built, and installed at Manchester University, the University of London and the Rutherford Laboratory. Kilburn became a professor of computing engineering in the Department of Electrical Engineering at Manchester in 1960. He was instrumental in forming the Department of Computer Science in 1964, becoming the first head of the department, and served as Dean of the Faculty of Science from 1970 to 1972, and pro-vice-chancellor of the university from 1976 to 1979. His final computer project was the MU5, which was designed to facilitate the running of programs in high-level programming languages. An analysis of code written for the Atlas gave an insight into the frequency of different operands and control structures. The project was assisted by a £630,000 Science Research Council (SRC) grant awarded over five-years. The design heavily influenced the successful ICL 2900 Series. Awards and honours Over the years, Kilburn received numerous awards and accolades. He was elected a Fellow of the Royal Society (FRS) in 1965, a Distinguished Fellow of the British Computer Society in 1974 and a fellow of the Computer History Museum "for his contributions to early computer design including random access digital storage, virtual memory and multiprogramming" in 2000. He was created a Commander of the Most Excellent Order of the British Empire (CBE) in 1973, and was awarded an honorary doctorate of science from the University of Bath in 1979. Kilburn received the IEEE Computer Society W. Wallace McDowell Award in 1971 "for his achievement in designing and building some of the first – as well as some of the most powerful – computers in the world", the British Computer Society IT Award in 1973, the Royal Medal of the Royal Society, in 1978, the IEEE Computer Society Computer Pioneer Award in 1982, the Eckert-Mauchly Award in 1983, and the Mountbatten Medal. 1997. A building at the University of Manchester, which houses the Department of Computer Science, is named "The Kilburn Building" in his honour. His nomination for the Royal Society reads: Personal life Kilburn habitually holidayed with his family in Blackpool but was always back in time for Manchester United F.C.'s first match of the football season. He claimed that watching Manchester United win the 1968 European Cup at Wembley stadium was the best day of his life. He took early retirement in 1981 to care for his ailing wife, who was suffering from chronic bronchitis, but she died on 3 August 1981, two weeks before his retirement. After his wife's death, Kilburn lived alone in the modest house they had shared in Manchester. He did not own a personal computer. In 1998 he unveiled a fully functional replica of "The Baby" at the Manchester Museum of Science and Industry. He died at Trafford General Hospital in Davyhulme of pneumonia following abdominal surgery on 17 January 2001. References 1921 births 2001 deaths Alumni of Sidney Sussex College, Cambridge Alumni of the Victoria University of Manchester British computer scientists Commanders of the Order of the British Empire English electrical engineers Fellows of the British Computer Society Fellows of the Royal Society History of computing in the United Kingdom People from Dewsbury Royal Medal winners People associated with the Department of Computer Science, University of Manchester
46879751
https://en.wikipedia.org/wiki/Ohio%20Southwest%20Region%20defunct%20athletic%20conferences
Ohio Southwest Region defunct athletic conferences
This is a list of former high school athletic conferences in the Southwest Region of Ohio, as designated by the OHSAA. If a conference had members that span multiple regions, the conference is placed in the article of the region most of its former members hail from. Because the names of localities and their corresponding high schools do not always match and because there is often a possibility of ambiguity with respect to either the name of a locality or the name of a high school, the following table gives both in every case, with the locality name first, in plain type, and the high school name second in boldface type. The school's team nickname is given last. Brown County League The BCL was one of the local small-school county leagues in Southwest Ohio. Consolidation reduced the number of teams to five by 1967, and in 1970 these five joined with the Adams and Highland county leagues to form the Southern Hills Athletic League. Aberdeen Pirates (1930s–53, consolidated into Ripley-Union-Lewis-Huntington) Decatur Buldogs (1930s–62, consolidated into Eastern Brown) Fayetteville-Perry Rockets (1930s–70, to Southern Hills) Georgetown G-Men (1930s–70, to Southern Hills) Hamersville Hornets (1930s–67, consolidated into Western Brown) Higginsport Wildcats (1930s–53, consolidated into Ripley-Union-Lewis-Huntington) Mount Orab Mounties (1930s–67, consolidated into Western Brown) Ripley-Union-Lewis-Huntington Bluejays (1930s–70, Ripley before 1953, to Southern Hills) Russellville Ramblers (1930s–62, consolidated into Eastern Brown) Sardinia Zephyrs (1930s–62, consolidated into Eastern Brown) Sardinia Eastern Brown Warriors (1962–70, to Southern Hills) Mount Orab Western Brown Broncos (1967–70, to Southern Hills) Butler County League Fairfield Indians (<1925-53, to Mid-Miami League)1 Darrtown Hanover Eagles (<1925-56, consolidated into Talawanda) Monroe Lemon-Monroe Hornets (<1925-51, to Little 6 League and Mid-Miami League)2 Wetherington Liberty Lions (<1925-59, consolidated into Liberty-Union) Oxford McGuffey Green Wave (<1925-56, consolidated into Talawanda) Okeana Morgan Township Mustangs (<1925-53, Okeana before 1942, consolidated into Ross) Reily Bluebirds (<1925-65, to Southwestern Ohio) Ross Rams (<1925-65, to SWOL)3, 4 'Seven Mile Panthers (<1925-65, to SWOL)3, 4 Shandon Spartans (<1925-42, consolidated into Morgan Township) Somerville Eagles (<1925-44, consolidated into Stewart) Oxford Stewart Tigers (<1925-56, consolidated into Talawanda) Trenton Trojans (<1925-65, to SWOL) West Chester Liberty-Union Thunderbirds (<1925-59, Union before 1959, to SWOL) Jacksonburg Wayne Warriors (<1925-58, consolidated into Seven Mile) New Miami Vikings (1954-65, to SWOL)5 Oxford Talawanda Braves (1956-59, to SWOL)3 Concurrent with MML 1951-53. Concurrent with Little 6 League 1939-51. Concurrent with Little Southwestern League 1956-59. Concurrent with SWOL 1959-65. Concurrent with SWOL 1960-65. Cincinnati Public League/Interscholastic Athletic Association of Cincinnati The Interscholastic Athletic Association was founded March 23, 1896, and continued for several years with both public and private high schools until 1931, when it rebranded itself as the Public High School League. Now encompassing solely the public high schools in Cincinnati, the league lasted until 1985, when reshuffling of city and suburban Cincinnati high schools took place, which led to the formation of the Cincinnati Hills League, Eastern Metro Conference, Metro County Conference, and Western Metro Conference. Cincinnati Courter Tech Cavaliers (1896–1973, was Cincinnati Tech until 1923, then Central Tech until 1960, school closed) Cincinnati Franklin Preparatory Falcons (1896–1926, school burned down and closed) Cincinnati Hughes Big Red (1896–1985, to Western Metro) Cincinnati Walnut Hills Eagles (1896–1985, to Metro County) Cincinnati Woodward Bulldogs (1896–85, to Western Metro) Covington (KY) Central Bulldogs (1898–1911, dropped Ohio competition) Cincinnati Ohio Military Cadets (1898–1910, to Independents, school closed 1951) Cincinnati St. Xavier Conquistadors (1898–1931, to Greater Catholic) Cincinnati Withrow Tigers (1919–85, to Eastern Metro) Cincinnati East Tech Engineers (1923–53, school closed) Cincinnati Western Hills Mustangs (1928–85, to Metro County) Cincinnati Aiken Falcons (1962–85, to Metro County) Cincinnati Taft Senators (1965–85, to Metro County) Cincinnati Academy of Physical Education (CAPE) Crusaders (1980–85, to Cincinnati Hills) Clinton County League This small-school county league is another that hosted members from outside their borders. In this case, Harveysburg from Warren County joined a few years before the conference ended, as the school would merge with three Clinton County schools to become Clinton-Massie. The school would actually be based in Harveysburg until a new school was built near Clarksville, in Clinton County. Blanchester was not included in the 1959–60 standings, due to growing to a AA-sized school by annexing Jefferson, but were allowed back into league play the following season. Blanchester and Clinton-Massie would concurrently play in the CCL and Fort Ancient Valley Conference for the 1964–65 school year, after which the other two CCL schools consolidated into East Clinton, who would join the FAVC nine years later. Ogden Adams Eagles (pre–1933–63, consolidated into Clinton Massie) Blanchester Wildcats (pre–1931–65, to Fort Ancient Valley Conference) Clarksville Indians (pre–1931–63, consolidated into Clinton-Massie) Midland Jefferson Blue Jays (pre–1931–59, consolidated into Blanchester) Kingman Bulldogs (pre–1931–63, consolidated into Clinton-Massie) Martinsville Rockets (pre–1931–63, consolidated into Wilmington) New Vienna Tigers (pre–1931–63, consolidated into New Kenton) Port William Bulldogs (pre–1931–63, consolidated into Wilmington) Sabina Golden Eagles (pre–1931–65, consolidated into East Clinton) Lees Creek Simon Kenton Tigers (was Wayne before 1953, pre–1931–63, consolidated into New Kenton) Harveysburg Tigers (from Warren County, 1960–63, consolidated into Clinton-Massie) Harveysburg/Clarksville Clinton-Massie Falcons (1963–65, to Fort Ancient Valley Conference) New Vienna New Kenton Tigers (1963–65, consolidated into East Clinton) Cross County Conference The conference was originally the Darke County League, begun in either the 1920s or early 1930s, and renamed itself after most of the Wayne Trace League merged with the DCL in 1978. The conference will end in 2021, as the schools will split into the Three Rivers Conference and the Western Ohio Athletic Conference. Ansonia Tigers (193?-2021 (Football, 1978-2021), to WOAC) Arcanum Trojans (193?-2021, to WOAC) Tipp City Bethel Bees (1978-2021, to TRC) Bradford Railroaders (193?-41, 42-2021 (Football, 1978-2021), to WOAC) Covington Buccaneers (1991-2021, to TRC) Arcanum Franklin Monroe Jets (no football) (1964-2021, to WOAC) Fort Loramie Redskins (Football only, 2017-2021) Casstown Miami East Vikings (2006-2021, to TRC) Union City Mississinawa Valley Blackhawks (1959-2021, to WOAC) New Paris National Trail Blazers (1978-2021, to WOAC) Pleasant Hill Newton Indians (no football) (1959-2021, to WOAC) Lewisburg Tri-County North Panthers (1978-2021, Twin Valley North before 1983, to WOAC) New Madison Tri-Village Patriots (1973-2021, to WOAC) West Alexandria Twin Valley South Panthers (1978-2021, to WOAC) Former members Union City Eastside Eagles (193?-59, consolidated into Mississinawa Valley) Painter Creek Franklin Township Falcons (193?-64, consolidated into Franklin Monroe) Gettysburg Cardinals (193?-73?, consolidated into Greenville) Hollansburg Hawks (193?-55, consolidated into Westmont) Hunchberger Corners Jackson Blue Jays (193?-59, consolidated into Mississinawa Valley) Pitsburg Monroe Township Pirates (193?-64, consolidated into Franklin Monroe) New Madison Mohawks (193?-73, consolidated into Tri-Village) Palestine Eagles (193?-55, consolidated into Westmont) Versailles Tigers (193?-41, 1951–73) Hollansburg Westmont Wildcats (1955–73, consolidated into Tri-Village) Camden Preble-Shawnee Arrows (1978–84) Anna Rockets (football only, 2001–05) Cross County League One of the short-lived conferences resulting from realignment in the Cincinnati area, the league merged into the Queen City Conference superconference in 1989. Batavia Amelia Barons (1985–89, to Queen City) Forest Park Chargers (1985–89, to Queen City) Cincinnati McNicholas Rockets (1985–89, to Queen City) Norwood Indians (1985–89, to Queen City) Cincinnati Northwest Indians (1985–89, to Queen City) Cincinnati Walnut Hills Eagles (1985–89, to Queen City) Darby Valley League The DVL was formed in 1956, as the Madison County League was reduced through consolidation from nine schools to four over a two-year period, forcing the schools to seek other schools to compete with. Growing from its five initial schools, the conference grew to 11 schools by 1963, but never achieved any sense of stability, as schools joined and left for other conferences throughout its existence. The conference folded in 1977, as five of its members left for other leagues at the same time. Ashville-Harrison Broncos1 (1956–62, consolidated into Teays Valley) Jamestown Greeneview Rams2 (1956–77, to Kenton Trace Conference) Newport Madison-South Lions3 (1956–73, consolidated into Madison-Plains) North Lewisburg Triad Cardinals4 (1956–74, to West Central Ohio League) West Jefferson Roughriders3 (1956–63, to Franklin County League) Plain City Jonathan Alder Pioneers6 (1957–77, to Central Buckeye League) Mount Sterling The Plains Blue Devils (1957–73, consolidated into Madison-Plains) Cedarville Indians (1961–77, to Kenton Trace Conference) West Liberty-Salem Tigers (1961–67, to Logan County League) Yellow Springs Bulldogs (1961–77) Ashville Teays Valley Vikings (1962–64, to South Suburban League) Mechanicsburg Indians (1963–74, to West Central Ohio League) South Charleston Southeastern Trojans (1963–77, to Kenton Trace Conference) Xenia Woodrow Wilson Cadets (1972–77) London Madison-Plains Golden Eagles5 (1974–77, to South Central Ohio League) Dayton Jefferson Broncos (1975–77) Concurrent with Pickaway County League 1956–61. Concurrent with Greene County League 1956–61. Concurrent with Madison County League 1956–57. Concurrent with Champaign County League 1956–61. Concurrent with South Central Ohio League 1974–75. Concurrent with Central Buckeye League 1976–77) Eastern Hills League This conference began as Milford and New Richmond, kicked out of the Clermont County League after becoming exempt schools, joined with neighbors from far eastern Hamilton County. The league ended in 1985, as major realignment took place in the Cincinnati area. Indian Hill Braves (1957–85, to Cincinnati Hills League) Loveland Tigers (1957–85, to Cincinnati Hills League) Madeira Mustangs (1957–85, to Cincinnati Hills League) Mariemont Warriors (1957–85, to Cincinnati Hills League) Milford Eagles (1957–85, to Eastern Metro Conference) New Richmond Lions (1957–69, to Clermont County League) Deer Park Wildcats (1963–85, to Cincinnati Hills League) Montgomery Sycamore Aviators (1965–85, to Eastern Metro Conference) Glen Este Trojans (1967–85, to Eastern Metro Conference) Eastern Metro Conference One of the short-lived conferences resulting from realignment in the Cincinnati area, the league merged into the Queen City Conference superconference in 1989. Cincinnati Anderson Redskins (1985–89, to Queen City) Cincinnati Glen Este Trojans (1985–89, to Queen City) Milford Eagles (1985–89, to Greater Miami) Cincinnati Sycamore Aviators (1985–89, to Greater Miami) Cincinnati Turpin Spartans (1985–89, to Queen City) Cincinnati Withrow Tigers (1985–89, to Queen City) Fort Ancient Valley Conference The FAVC started in 1964, as schools from the dwindling Clinton County League joined with the Warren County League, by 1999 the league became a superconference in the Southwest Region, as a large chunk of the Queen City Conference joined to help form two divisions. A later expansion took place in 2006, as the Mid-Miami League folded. However, this aggressive expansion also led to the conference's demise, as the schools decided to split into the Eastern Cincinnati Conference and Southwest Ohio Conference in 2012. Blanchester Wildcats (1964–1992, to Southern Buckeye Conference) Clarksville Clinton-Massie Falcons (1964–1977, to Kenton Trace Conference) Kings Mill Kings Knights (1964–2012, to Eastern Cincinnati Conference) Morrow Little Miami Panthers (1964–2012, to Southwest Ohio Conference) Mason Comets (1964–2007, to Greater Miami Conference) Springboro Panthers (1964–1998, to Mid-Miami League) Waynesville Spartans (1964–1977, to Kenton Trace Conference) Sabina East Clinton Astros (1974–1977, to Kenton Trace Conference) Lockland Panthers (1977–1980, to Hamilton County League) Hamilton Ross Rams (1977–2012, to Southwest Ohio Conference) Middletown Madison Mohawks (1979–1984, to Southwestern Buckeye Conference) Goshen Warriors (1986–2004, to Southern Buckeye Conference) Norwood Indians (1993–2012, to Southern Buckeye Conference) Wilmington Hurricanes (1992–2012, to South Central Ohio League) Lebanon Warriors (1997–2003, to Mid-Miami League) Loveland Tigers (1997–2012, Eastern Cincinnati Conference) Batavia Amelia Barons (1999–2010, to Southern Buckeye Conference) Cincinnati Anderson Redskins (1999–2012, to Eastern Cincinnati Conference) Cincinnati Glen Este Trojans (1999–2012, to Eastern Cincinnati Conference) Harrison Wildcats (1999–2012, to Southwest Ohio Conference) Cincinnati Northwest Knights (1999–2012, to Southwest Ohio Conference) Cincinnati Turpin Spartans (1999–2012, to Eastern Cincinnati Conference) Cincinnati Walnut Hills Eagles (2003–2012, to Eastern Cincinnati Conference) Cincinnati Winton Woods Warriors (1999–2012) Trenton Edgewood Cougars (2006–2012, to Southwest Ohio Conference) Cincinnati Mount Healthy Fighting Owls (2006–2012, to Southwest Ohio Conference) Oxford Talawanda Braves (2006–2012, to Southwest Ohio Conference) Milford Eagles (2007–2012, to Eastern Cincinnati Conference) Football divisions Girls Greater Catholic League Conference Website: http://ggcl.gclsports.com/ The Girls' Greater Catholic League merged with the Greater Catholic League under one banner in 2013. Cincinnati Marian Roadrunners (1969–1981, merged with Purcell and Regina High Schools) Cincinnati McAuley Mohawks (1969–2013) Cincinnati Mother of Mercy Bobcats (1969–2013) Cincinnati Mount Notre Dame Cougars (formerly Mountaineers) (1969–2013) Cincinnati Our Lady of Angels Angels (1969–1984, merged with Roger Bacon High School) Cincinnati Regina (1969–1978) Cincinnati Academy of the Sacred Heart (1969–1970) Cincinnati Seton Saints (1969–2013) Evendale St. Rita Lions (1969–?) Cincinnati St. Ursula Bulldogs (1969–2013) Cincinnati Summit Country Day Silver Knights (1969–1978) Cincinnati Ursuline Academy Lions (formerly Hornets) (1969–2013) Greater Miami Valley Conference The Greater Miami Valley Conference began operation during the 1982–83 school year but folded at the conclusion of the 2000–01 school year when the league merged with the Western Ohio League, forming the Greater Western Ohio Conference. The initial GMVC was formed with six schools from the Miami Central Conference - Vandalia-Butler, Northmont, Piqua, Sidney, Trotwood-Madison, and Tecumseh. They were joined by Greenville from the Southwestern Buckeye League and Troy, which withdrew from the Western Ohio League. Tecumseh left the league at the conclusion of the 1989–90 school year and was replaced with West Carrollton from the Mid-Miami League. West Carrollton eventually left the GMVC after the 1998–99 school year to re-join the Mid-Miami League, but was not replaced, leaving the league with seven schools. Troy Trojans (1982–2001) Vandalia Butler Aviators (1982–2001) Clayton Northmont Thunderbolts (1982–2001) Piqua Indians (1982–2001) Sidney Yellow Jackets (1982–2001) Greenville Green Wave (1982–2001) New Carlisle Tecumseh Arrows (1982–1990, to the Central Buckeye Conference) Trotwood-Madison Rams (1982–2001) West Carrollton Pirates (1990–99, to Mid-Miami League) Greene County League Beavercreek Beavers (192?–51, to Mid-Miami League) Bellbrook Golden Eagles (192?–61, to Dayton Suburban League 1964) Bowersville Bulldogs (192?–56, consolidated into Greeneview) Cedarville Indians (192?–61, to Darby Valley League) Xenia East Eagles (192?–58, consolidated into Xenia) Fairborn Flyers1 (192?–54, to Miami Valley League) Jamestown-Silvercreek Vikings (192?–56, consolidated into Greeneview) Grape Grove Ross (192?–56, consolidated into Greeneview) Spring Valley Spartans (192?–59, consolidated into Xenia) Yellow Springs Bulldogs (192?–61, to Darby Valley League) Jamestown Greeneview Rams2 (1956–61, to Darby Valley League) Concurrent with Little 6 League 1939–54. Concurrent with Darby Valley League 1956–61. Hamilton County League Colerain Cardinals (192?-85, to Metro County Conference) Deer Park Wildcats (192?-31, to Millcreek Valley Interscholastic League, 1974-85, to Cincinnati Hills League) Finneytown Wildcats (1961-85, to CHL) Forest Park Chargers (192?-85), to Western Metro Conference) Glendale Griffins (192?-54, consolidated into Princeton) Greenhills Pioneers (192?-42, to MVIL, 1965-85, to WMC) Harrison Wildcats (192?-85, to WMC) Indian Hill Braves (192?-57, to Eastern Hills League) Lockland Panthers (192?-41, to MVIL, 1965-84, to Miami Valley Conference) Madeira Mustangs (192?-57, to EHL) Mariemont Blue Devils (1938-49, Plainview before 1949, to MVIL) Mount Healthy Owls (192?-85, to MCC) North College Hill Trojans (192?-31, to MVIL, 1965-84, to MVC) Norwood Indians (192?-85, to EMC) Bridgetown Oak Hills Highlanders (192?-85, to MCC) Reading Blue Devils (192?-31, to MVIL, 1965-85, to CHL) St. Bernard-Elmwood Place Titans (192?-31, to MVIL, 1965-84, to MVC) Sharonville Engineers (192?-54, consolidated into Princeton) North Bend Taylor Yellowjackets (192?-85, to WMC) Terrace Park Bulldogs (192?-57, consolidated into Mariemont) Wyoming Cowboys (192?-31, to MVIL, 1965-85, to CHL) Forestville Anderson Redskins (1929-85, to EMC) Loveland Tigers (1936-57, to EHL) Lockland Wayne Tigers (1938-58, consolidated into Lincoln Heights) Glendale Princeton Vikings (1954-66, to Greater Miami Conference) Montgomery Sycamore Aviators (1955-65, to EHL) Lincoln Heights Tigers (1958-70, consolidated into Princeton) Pleasant Run Northwest Knights (1971-85, to WMC) Turpin Hills Turpin Spartans (1974-85, to EMC) The HCL operated in an East-West divisional format until 1969, when it went to American and National divisions. The table below shows the alignment the final school year of 1984-85 before the breakup of the league. Kenton Trace Conference Blanchester Wildcats (1995–2001, to Southern Buckeye Conference) Cedarville Indians (1977–2001, to Ohio Heritage Conference) Clarksville Clinton-Massie Falcons (1977–2001, to Southern Buckeye Conference) Sabina East Clinton Astros (1977–2001, to Southern Buckeye Conference) Jamestown Greeneview Rams (1977–2001, to Ohio Heritage Conference) London Madison-Plains Golden Eagles (1985–91, 1993–97 to Buckeye Athletic Conference) South Charleston Southeastern Trojans (1977–2001, to Ohio Heritage Conference) Waynesville Spartans (1977–2001, to Southern Buckeye Conference) Yellow Springs Bulldogs (1985–98, to Metro Buckeye Conference) Little Six League A secondary conference for schools that were larger than most of their county peers, yet too small to be competitive amongst city schools. Football was the primary sport contested, though the league crowned champions in other sports as well. The league folded when all schools had left their county leagues for conferences with similar demographics. Vandalia Butler Aviators (1939-54, to Southwestern Buckeye League)1 Fairborn Flyers (1939-54, to Miami Valley League)2 Franklin Wildcats (1939-54, to Mid-Miami League)3 Lebanon Warriors (1939-54, to MML)3 Monroe Lemon-Monroe Hornets (1939-54, to MML)4 Northridge Polar Bears (1939-54, to MML)5 Concurrent with Montgomery County League 1939-41 and 1945-51, and SWBL 1941-45 and 1951-54. Concurrent with Greene County League 1939-54. Concurrent with Warren County League 1939-51, and MML 1951-54. Concurrent with Butler County League 1939-51, and MML 1951-54. Concurrent with MCL 1939-51, and MML 1951-54. Mad River Valley League Originally the Clark County League, the MRVL gained its name in 1955, as the five remaining CCL members added Mechanicsburg, and later others from outside the original boundaries. The league's demise started in 1973, as four schools broke off to form the Three Rivers League in 1973, and folded the next year as three of the five remaining schools formed the Central Buckeye Conference. Catawba Panthers (192?–52, consolidated into Northeastern) Enon Greenon Knights (192?–74, Enon Tigers before 1955, to Central Buckeye Conference) Lawrenceville Bullskinners (192?–48, consolidated into Northwestern New Carlisle Knights (192?–51, consolidated into Tecumseh) New Moorefield Falcons (192?–52, consolidated into Northeastern) North Hampton Northwestern Warriors (192?–73, North Hampton before 1948, to Three Rivers Conference) Oak Grove Oaks (192?–49, consolidated into Enon) Olive Branch Spartans (192?–51, consolidated into Tecumseh Pitchin Panthers (192?–47, consolidated into South Charleston) Plattsburgh Pirates (192?–52, consolidated into Northeastern) Selma Spartans (192?–47, consolidated into South Charleston) South Charleston Southeastern Trojans (192?–63, South Charleston before 1951, to Darby Valley League) New Carlisle Tecumseh Arrows (1951–74, to Miami Central Conference 1975) Springfield Northeastern Jets (1952–73, to Central Buckeye Conference) Mechanicsburg Indians (1955–63, to Darby Valley League) St. Paris Graham Falcons (1959–73, to Three Rivers Conference) Springfield Shawnee Braves (1959–73, to Central Buckeye Conference) Covington Buccaneers (1964–73, to Three Rivers Conference) Casstown Miami East Vikings (1964–73, to Three Rivers Conference) Fairborn Park Hills Flyers (1973–74, to Miami Central Conference 1975) Metro County Conference A short-lived conference formed as a result of shifting Hamilton County schools in 1985, the league merged into the Queen City Conference in 1989. Cincinnati Aiken Falcons (1985–89, to Queen City) Cincinnati Colerain Cardinals (1985–89, to Queen City) Cincinnati Mount Healthy Fighting Owls (1985–89, to Queen City) Cincinnati Oak Hills Highlanders (1985–89, to Queen City) Cincinnati Western Hills Mustangs (1985–89, to Queen City) Cincinnati Woodward Bulldogs (1985–89, to Queen City) Miami Central Conference The Miami Central Conference began operation during the 1975–76 school year but folded at the conclusion of the 1981–82 school year. Vandalia-Butler, Northmont, Piqua, Sidney, Trotwood-Madison, and Tecumseh withdrew from the MCC to form the Greater Miami Valley Conference (GMVC) with Greenville from the Southwestern Buckeye League and Troy from the Western Ohio League. Fairborn Baker and Fairborn Park Hills merged to become Fairborn and joined the Western Ohio League, while Miamisburg and West Carrollton joined the Mid-Miami League at the start of the 1982–83 school year. Fairborn Baker Flyers (1975–82, consolidated into Fairborn) Vandalia Butler Aviators (1975–1982, to GMVC) Miamisburg Vikings (1975–82, to Mid-Miami League) Clayton Northmont Thunderbolts (1975–1982, to GMVC) Fairborn Park Hills Vikings (1975–82, consolidated into Fairborn) Piqua Indians (1975–1982, to GMVC) Sidney Yellow Jackets (1975–1982, to GMVC) New Carlisle Tecumseh Arrows (1975–82, to GMVC) Trotwood-Madison Rams (1975–1982, to GMVC) West Carrollton Pirates (1975–82, to Mid-Miami League) Miami County League Phoneton Bethel Bees (192?-59, to Logan County League 1961) Covington Buccaneers (192?-36, to Stillwater Valley League, 1950-59, to Mad River Valley League 1963) Grayson Elizabeth Township Eagles (192?-53, consolidated into Miami Central) Lena-Conover Red Devils (192?-59, consolidated into Miami East) Casstown Lostcreek Lions (192?-59, consolidated into Miami East) West Milton Milton-Union Bulldogs (192?-36, West Milton before 1936, to SVL) Pleasant Hill Newton Indians (192?-36, to SVL, 1951-59, to Darke County) Staunton Scotties (192?-36, to SVL, 1941-53, consolidated into Miami Central) Tipp City Tippecanoe Red Devils (192?-36, to SVL) Potsdam Union Township Panthers (192?-36, consolidated into Milton-Union) Staunton Miami Central Jets (1953-59, consolidated into Miami East) Miami Valley League The Miami Valley League began competition during the 1926–27 school year, when the MVL held its first league championship in track. Football and basketball began with the 1927–28 school year. The league operated through the 1974–75 school year, when the three long-time members of the league formed the Miami Central Conference with similar-sized schools. In 2019 the league resumed competition after 10 teams left the Greater Western Ohio Conference. The Miami Valley League was resurrected in 2019. Greenville Green Wave (1926–72, to Southwestern Buckeye League) Miamisburg Vikings (1926–66, to Greater Miami Conference, 1967–75, to Miami Central Conference) Piqua Indians (1926–75, to Miami Central Conference) Sidney Yellow Jackets (1926–75, to Miami Central Conference) Tipp City Tippecanoe Red Devils (1926–27, to Miami County League) Troy Trojans (1926–68, to Western Ohio League) Xenia Buccaneers (1926–64, to Western Ohio League) Dayton Fairview Bulldogs (1930–33, to Dayton City League) Kettering Fairmont West Dragons (1932–64, Fairmont before 1963, to Western Ohio League) Oakwood Lumberjacks (1948–53, to Southwestern Buckeye League) Fairborn Flyers (1954–64, to Western Ohio League) Lima Central Catholic T-Birds (1969–75) Bellefontaine Chieftains (1966–74, to Central Buckeye Conference) Urbana Hillclimbers (1966–74, to Central Buckeye Conference) Lima Shawnee Indians (1966–75) Springfield Catholic Central Fighting Irish (1970–75) Mid-Miami League Franklin Wildcats (1964–2006, to Southwestern Buckeye League-Southwest) Lebanon Warriors (1964–97, to FAVC, 2001–06, to GWOC-South) Lemon-Monroe Hornets (1964–2006, to Southwestern Buckeye League-Buckeye) Middletown Fenwick Falcons (1964–2006, to Greater Catholic League-North) Oxford Talawanda Braves (1964–2006, to Fort Ancient Valley Conference-Scarlet) West Chester Lakota Thunderbirds (1966–1980, to Greater Miami Conference) Middletown Madison Mohawks (1966–1980, to Fort Ancient Valley Conference) Trenton Edgewood (1971–2006, to FAVC-Scarlet) Miamisburg Vikings (1982–2006, to GWOC-South) West Carrollton Pirates (1982–87, to Western Ohio League, 1999–2006) Dayton Carroll Patriots (1987–2006, to Greater Catholic League-North) Riverside Stebbins Indians (1997–2006, to Central Buckeye Conference-Mad River) Springboro Panthers (1998–2006, to GWOC-South) Fairborn Skyhawks (2001–06, to GWOC-South) Greenville Green Wave (2005–06) Millcreek Valley Interscholastic League Deer Park Wildcats (1936-63, to Eastern Hills League) Greenhills Pioneers (1936-65, to Hamilton County League) Lockland Panthers (1936-65, to HCL) North College Hill Trojans (1936-65, to HCL) Reading Blue Devils (1936-65, to HCL) St. Bernard-Elmwood Place Titans (1936-65, to HCL) Wyoming Cowboys (1936-65, to HCL) Mariemont Warriors (1949-57, to EHL Paper Valley League Started in 1956 as Little Southwestern League when Little Miami of the Warren County League joined with Bishop Fenwick and three Butler County League teams, who remained in the BCL initially. Little Miami returned to the WCL and was replaced by Lakota in 1959, prompting a rebrand to become the Southwestern Ohio Conference. While temporarily staving off defections to the Mid-Miami League by absorbing the rest of the BCL and having members concurrently in the MML and SOC, the conference was down to four members by 1970. After changing the name to the PVL in 1972, the league only lasted three years, as New Miami and Ross joined the Wayne Trace League, while Edgewood and Madison retained their membership in the MML. Middletown Bishop Fenwick Falcons (1956–65, to Mid-Miami League) Morrow Little Miami Panthers (1956–59, rejoined Warren County League) Hamilton Ross Rams1 (1956–75, to Wayne Trace League) Seven Mile Panthers1 (1956–70, consolidated into Edgewood) Oxford Talawanda Braves1 (1956–65, to Mid-Miami League) West Chester Lakota Thunderbirds (1959–66, to Mid-Miami League) Middletown Madison Mohawks3 (1960–75, to Mid-Miami League) Hamilton New Miami Vikings2 (1960–75, to Wayne Trace League) Oxford Reily Bluebirds (1965–68, consolidated into Talawanda) Trenton Trojans (1965–70, consolidated into Edgewood) Trenton Edgewood Cougars4 (1970–75, to Mid-Miami League) Also played in Butler County League 1956–65. Also played in Butler County League 1960–65. Also played in Mid-Miami League 1966–75. Also played in Mid-Miami League 1971–75. Preble County League Camden Cubs (1919–56, consolidated into Preble Shawnee) College Corner Trojans1 (1919–74, consolidated into Union County (IN)) Five Points Dixon Dragons (1919–65, consolidated into Eaton) Gratis Trojans (1919–64, consolidated into Preble Shawnee) Campbellstown Jackson Redskins (1919–68, consolidated into National Trail) New Paris Jefferson Hornets (1919–68, consolidated into National Trail) Enterprise Lanier Hornets (1919–64, consolidated into Twin Valley) Lewisburg Lions (1919–69, consolidated into Twin Valley North) West Manchester Monroe Wildcats (1919–68, consolidated into National Trail) Verona Vikings (1919–69, consolidated into Twin Valley North) West Alexandria Bulldogs (1919–64, consolidated into Twin Valley) West Elkton Yellow Jackets (1919–56, consolidated into Preble-Shawnee) Camden Preble Shawnee Arrows 2, 5 (1956–74, to Southwestern Ohio League) West Alexandria Twin Valley South Panthers2, 5 (1964–74, to Southwestern Ohio League, was Twin Valley until 1969) New Paris National Trail Blazers3, 5 (1968–74, to Southwestern Ohio League) Lewisburg Twin Valley North Panthers4, 5 (1969–74, to Southwestern Ohio League) Played concurrently in the PCL and Indiana's Union County Conference 1920's-1940, and Whitewater Valley Conference 1940–1967. Played concurrently in the PCL and Dayton Suburban League 1964–72. Played concurrently in the PCL and Dayton Suburban League 1968–72. Played concurrently in the PCL and Dayton Suburban League 1969–72. Played concurrently in the PCL and Southwest Ohio League 1972–74. Queen City Conference (1989–2002) After the Cincinnati Hills League left the Queen City Conference Alliance in 1989, the Cross County League, Eastern Metro Conference, Metro County Conference, and Western Metro Conference all combined to form this super-conference. It survived intact with a three division alignment until 1999, when seven members left for the Fort Ancient Valley Conference. Further defections led to the remaining schools (almost all Cincinnati Public Schools) to combine with the Dayton City League to form the Southwest Ohio Public League. Cincinnati Aiken Falcons (1989–2002, to SWOPL) Batavia Amelia Barons (1989–99, to FAVC) Cincinnati Anderson Redskins (1989–99, to FAVC) Cincinnati Colerain Cardinals (1989–97, to Greater Miami Conference) Cincinnati Forest Park Chargers (1989–91, consolidated into Winton Woods) Cincinnati Glen Este Trojans (1989–99, to FAVC) Cincinnati Greenhills Pioneers (1989–91, consolidated into Winton Woods) Harrison Wildcats (1989–99, to FAVC) Cincinnati Hughes Center Big Red (1989–2002, to SWOPL) Cincinnati Mount Healthy Fighting Owls (1989–2002, to SWOPL) Cincinnati Northwest Knights (1989–99, to FAVC) Norwood Indians (1989–93, to FAVC) Cincinnati Oak Hills Highlanders (1989–99, to Greater Miami Conference 2000) Cincinnati Taft Senators (1989–2002, to SWOPL) Cincinnati Turpin Spartans (1989–99, to FAVC) Cincinnati Walnut Hills Eagles (1989–2002, to SWOPL) Cincinnati Western Hills Mustangs (1989–2002, to SWOPL) Cincinnati Withrow Tigers (1989–2002, to SWOPL) Cincinnati Woodward Bulldogs (1989–2002, to SWOPL) Cincinnati Winton Woods Warriors (1991–99, to FAVC) Cincinnati Jacobs Sharks (1999–2002, to SWOPL) Southwest Ohio Public League Football-Only League (2015-2018)American Division Dayton Dunbar Wolverines (2015-) Cincinnati Hughes Center Big Red (2015-) Dayton Meadowdale Lions (2015-) Cincinnati Shroder Paideia Academy Jaguars (2015-) Cincinnati Taft Senators (2015-) Dayton Thurgood Marshall Cougars (2015-) Cincinnati Western Hills Mustangs (2015-)National Division Cincinnati Aiken Falcons (2015-) Dayton Belmont Bison (2015-) Cincinnati Cincinnati College Prep Lions (2015-) Cincinnati Gamble Montessori Gators (2015-) Dayton Ponitz Career Technology Center Golden Panthers (2015-) Cincinnati Riverview East Academy Hawks (2015-16, 2017-) Cincinnati Woodward Bulldogs (2015-) 2002-07 LeagueAmerican Division Dayton Colonel White Cougars (2002–07, consolidated into Thurgood Marshall) Dayton Dunbar Wolverines (2002–07) Cincinnati Hughes Center Big Red (2002–07) Cincinnati Taft Senators (2002–07, played in National Division 2002-03, 2005–06) Cincinnati Western Hills Mustangs (2002–07) Cincinnati Withrow Tigers (2002–07)National Division Cincinnati Aiken Falcons (2002–07) Dayton Belmont Bison (2002-2007) Cincinnati Jacobs Paideia Academy Sharks (2002–07, school closed) Dayton Meadowdale Lions (2002–07) Cincinnati Shroder Paideia Academy Jaguars (2002–07) Dayton Stivers School for the Arts Tigers (no football) (2002–07) Cincinnati Woodward Bulldogs (2002-2007, played in American Division 2005-06)Former membersBoth teams played in the American Division while in SWOPL play. Both left for the Fort Ancient Valley Conference Cincinnati Mount Healthy Fighting Owls (2002–05) Cincinnati Walnut Hills Eagles (2002–03) Southwestern Rivers Conference Springfield Catholic Central Irish (1982–2001, to Ohio Heritage Conference) Covington Buccaners (1982–1991, to Cross County Conference) St. Paris Graham Falcons (1982–85, 1989–2001, to Central Buckeye Conference) Sidney Lehman Catholic Cavaliers (1982–2001, to Northwest Central 2013) Casstown Miami East Vikings (1982–2001, to Central Buckeye Conference) West Milton Milton-Union Bulldogs (1982–2001, to Southwestern Buckeye League) Tipp City Tippecanoe Red Devils (1982–2001, to Central Buckeye Conference) Versailles Tigers (1982–2001, to Midwest Athletic Conference) Riverside Stebbins Indians (1993–1997, to Mid-Miami League) Bellefontaine Benjamin Logan Raiders (1997–2001, to Central Buckeye Conference) Stillwater Valley League Bradford Railroaders (1936-50, to Darke County League)1 Covington Buccaneers (1936-50, to Miami County League) West Milton Milton-Union Bulldogs (1936-51, to Southwestern Buckeye League)2 Pleasant Hill Newton Indians (1936-51, to MCL) Staunton Scotties (1936-41, to MCL) Tipp City Tippecanoe Red Devils (1936-51, to SWBL)2 Versailles Tigers (1941-51, to DCL)2 Concurrent with DCL 1936-41 and 1942-50, and SWBL 1941-42. Concurrent with SWBL 1941-51. Warren County League Carlisle Indians (pre–1929–64, to Dayton Suburban League) Franklin Wildcats1 (pre–1929–51, to Mid-Miami League) Harveysburg Tigers (pre–1929–60, to Clinton County League) Kings Mills Kings Knights (pre–1929–64, to Fort Ancient Valley League) Lebanon Warriors1 (pre–1929–51, to Mid-Miami League) Mason William Mason Comets (pre–1929–64, to Fort Ancient Valley League) Morrow Little Miami Panthers (Morrow before 1956, pre–1929–56, 1959–64, to Fort Ancient Valley Conference) Springboro Panthers (pre–1929–64, to Fort Ancient Valley League) Waynesville Spartans (pre–1929–64, to Fort Ancient Valley League) Concurrent with Little 6 League 1939–51. Wayne Trace League The league began in 1922 as the Montgomery County League, then became the Dayton Suburban League in 1964 as the five remaining MCL schools branched out beyond the county. When the Southwestern Ohio Conference rebranded itself as the Paper Valley League in 1972, the DSL once again changed its name to the Southwestern Ohio League. Three years later, after a major shakeup where five schools left, and two Paper Valley League schools joined, leading to the WTL name. This only lasted three years, as most of the conference joined the Cross-County Conference in 1978. Brookville Blue Devils (1922–59, to Southwestern Buckeye League) Vandalia Butler Aces1 (1922–41, 1945–51, to Southwestern Buckeye League) Centerville Elks (1922–66, to Western Ohio League) New Lebanon Dixie Greyhounds (1922–75, to Southwestern Buckeye League) Kettering Fairmont Dragons (1922–33, left for Miami Valley League) Dayton Fairview Bulldogs (1922–31, left for Miami Valley League) Farmersville Wildcats (1922–68, consolidated into Valley View) Germantown Cardinals (1922–68, consolidated into Valley View) Miamisburg Vikings (1922–26, left for Miami Valley League) Trotwood-Madison Rams (1922–42, 1943–51, to Southwestern Buckeye League) West Carrollton Pirates (1922–46, to Southwestern Buckeye League) Dayton Jefferson Broncos (1923–75, to Darby Valley League) Moraine Mustangs (1923–45, consolidated into Fairmont) Northridge Polar Bears2 (1923–51, to Mid-Miami League) Oakwood Lumberjacks (1923–48, to Miami Valley League) Phillipsburg Panthers (1923–59, consolidated into Northmont) Englewood Randolph Township Bobcats (1923–54, to Southwestern Buckeye League) Huber Heights Wayne Warriors (1923–64, to Western Ohio League) Bellbrook Golden Eagles (1964–75, to Southwestern Buckeye League) Carlisle Trojans (1964–75, to Southwestern Buckeye League) Camden Preble-Shawnee Arrows3 (1964–78, to Cross-County Conference) West Alexandria Twin Valley South Panthers3 (1964–78, to Cross-County Conference) Xenia Woodrow Wilson Cadets (1967–72, to Darby Valley League) Germantown Valley View Spartans (1968–75, to Southwestern Buckeye League) Lewisburg Twin Valley North Panthers4 (1969–78, to Cross-County Conference) New Paris National Trail Blazers5 (1970–78, to Cross-County Conference) Eaton Eagles (1972–78) Hamilton New Miami Vikings (1975–78) Hamilton Ross Rams (1975–78, to Fort Ancient Valley Conference) Concurrent with Little 6 League 1939–41, and 1945–51. Concurrent with Little 6 League 1939–51. Concurrent with Preble County League 1964–74. Concurrent with Preble County League 1969–74. Concurrent with Preble County League 1970–74. West Central Ohio Conference (WCOC) The WCOC began in the 1930s as the Logan County League, rebranding itself as the WCOC in 1970, as the conference had long since grown past the Logan County borders. It lasted until 2001, when most of the schools split into the Northwest Central and Ohio Heritage conferences. Belle Center Eagles (1930s–74, consolidated into Benjamin Logan) DeGraff Pirates (1930s–61, consolidated into Riverside) Huntsville Hunters (1930s–60, consolidated into Indian Lake) Valley Hi Monroe Township Mustangs (1930s–51, consolidated into Zanesfield-Monroe) East Liberty Perry-Zane Jayhawks (1930s–1960, known as Perry until 1951, consolidated into Logan Hills) Quincy Trojans (1930s–61, consolidated into Riverside) Rushsylvania Rockets (1930s–60, consolidated into Buckeye Local) Lakeview Stokes Township Spartans (1930s–60, consolidated into Indian Lake) Rushsylvania Buckeye Local Bucks (1960–70, consolidated into Benjamin Logan) Lewistown Washington Local Eagles (1930s–60, consolidated into Indian Lake) West Liberty West Liberty-Salem Tigers (1930s–2001, known as West Liberty until 1960) West Mansfield Trojans (1930s–60, consolidated into Buckeye Local) Zanesfield-Monroe Indians (1930s–1960, known as Zanesfield until 1951, consolidated into Logan Hills) Middlefield Zane Township Middies (1930s–51, consolidated into Perry-Zane) Lewistown Indian Lake Lakers (1960–1974, to Three Rivers Conference, 1976-2001) Zanesfield Logan Hills Indians (1960–70, consolidated into Benjamin Logan) Waynesfield-Goshen Tigers (1960–2001) Milford Center Fairbanks Panthers (1961–2001) Degraff Riverside''' Pirates (1961–2001) Ridgeway Ridgemont Golden Gophers (1962–2001) Bellefontaine Benjamin Logan Raiders (1970–97) Mechanicsburg Indians (1974–2001) North Lewisburg Triad Cardinals (1974–2001) Western Metro Conference Cincinnati Greenhills Pioneers (1985–89, to Queen City) Harrison Wildcats (1985–89, to Queen City) Cincinnati Hughes Center Big Red (1985–89, to Queen City) North College Hill Trojans (1985–87, to Southern Buckeye) North Bend Taylor Yellow Jackets (1985–89, to Cincinnati Hills) Cincinnati Taft Senators (1985–89, to Queen City) Western Ohio League Founded as a conference for larger schools in the Dayton suburban area, the league merged with the Greater Miami Valley Conference to form the Greater Western Ohio Conference in 2001. Beavercreek Beavers (1964–2001, to GWOC) Fairborn Flyers (1964–68, split into Baker and Park Hills) Kettering Fairmont East Falcons (1964–83, consolidated into Fairmont) Kettering Fairmont West Dragons (1964–83, consolidated into Fairmont) Springfield North Panthers (1964–2001, to GWOC) Springfield South Wildcats (1975–2001, to GWOC) Riverside Stebbins Indians (1964–89, to Southwestern Rivers ) Huber Heights Wayne Warriors (1964–2001, to GWOC) Xenia Buccaneers (1964–2001, to GWOC) Centerville Elks (1968–2001, to GWOC) Fairborn Baker Flyers (1968–75, to Miami Central) Troy Trojans (1968–82, to Greater Miami Valley) Dayton Carroll Patriots (1982–87, to Mid-Miami) Fairborn Skyhawks (1983–2001, to Mid-Miami) Kettering Fairmont Firebirds (1983–2001, to GWOC) West Carrollton Pirates (1987–90, to GMVC) See also Ohio High School Athletic Association Ohio high school athletic conferences OHSAA Southwest Region athletic conferences Notes and references
16774966
https://en.wikipedia.org/wiki/Cincinnati%20Bearcats%20men%27s%20basketball
Cincinnati Bearcats men's basketball
The Cincinnati Bearcats men's basketball program represents the University of Cincinnati in Cincinnati, Ohio. The school's team competes in NCAA Division I as part of the American Athletic Conference though they will move to the Big 12 conference (Big XII) within the next few years. The Bearcats are currently coached by Wes Miller. With over 1800 all-time wins, the Bearcats are one of the 15 winningest basketball programs of all-time. The school's merits include 2 National Titles, 6 Final Fours, and 33 NCAA Division I Men's Basketball Tournament appearances. As of 2019, Cincinnati had an all-time tournament record of 46–32. There have also been 42 All-American honors issued to Bearcats as well, while 36 have gone on to play in the NBA. Cincinnati has been playing its home games since 1989 at Fifth Third Arena, which received an $87 million renovation for the 2018 season. The Bearcats played their 2017–18 season at BB&T Arena on the campus of Northern Kentucky University in Highland Heights, Kentucky while their home arena was renovated. Cincinnati joined the original Big East Conference in 2005, which was rebranded as the American Athletic Conference (AAC) in 2013. They recently accepted an invitation to join the Big 12 conference. By the numbers Statistics and NCAA all-time rankings (through the end of the 2017–18 season): Wins: 1835 (14th) Win percentage: .641 (23rd) National Titles: 2 (T-9th) Final Fours: 6 (T-10th) NCAA Tournament appearances: 33 (T-13th) NCAA Tournament games played: 77 (16th) NCAA Tournament wins: 46 (17th) Weeks in the AP Top 25: 434 (12th) Weeks in the AP Top 10: 210 (15th) Weeks at No. 1 in the AP Poll: 45 (7th) 14 consecutive NCAA Tournament appearances from 1992 to 2005 (T-11th longest streak all-time) 10 consecutive NCAA Tournament appearances from 2011–present (T-5th longest active streak) First-team Consensus All-American selections: 8 (T-22nd) Current players in the NBA: 2 (T-26th) First school to reach three consecutive National Title games (1961–63) First school to reach five consecutive Final Fours (1959–63) History 1901-1940s – The beginning Basketball formally debuted as a selected varsity team in 1901 and played nine games. Cincinnati, in its first season lost to Yale but later defeated a team from the University of Kentucky while compiling a 5–4 record, with the remaining games being against non-collegiate teams. Home games during this time were played in a gym in the basement of McMicken Hall. Pillars on the court gave UC a home court advantage. UC experienced moderate success in the early days, with the main highlights being them winning several conference championships in both the Buckeye Athletic Association and the Mid-American Conference. 1954–1958 – The start of something special Cincinnati opened its new on-campus arena, Armory Fieldhouse, with a 97–65 win over Indiana in 1954. One of the first of Cincinnati's long list of standouts was Jack Twyman, who earned All-America status in 1954–55. He went on to NBA stardom and is in the Basketball Hall of Fame. Oscar Robertson made his debut in 1957, and quickly emerged as one of the top college players in the country. "The Big O" is still widely recognized as one of the greatest to ever play the sport—college or professional. A unanimous three-time All-American, he was college basketball's all-time leading scorer at the close of his career. His 33.8 scoring average today ranks third on the NCAA career charts, and he has the NBA's third-most career assists. The Bearcats celebrated their entry into the Missouri Valley Conference by winning the league title. Cincinnati made its first NCAA tournament appearance in 1958, losing to Kansas State in overtime at the Midwest Regional. 1958–1964 – A run unlike any other Sparked by the exploits of Robertson, who became the first player to lead the nation in scoring in three consecutive seasons, Cincinnati advanced to the Final Four in 1958–59 and 1959–60, settling for third place both years. Then the Bearcats, with a rookie head coach (Ed Jucker) and without Robertson, won their first national title in 1960–61. Then to prove that its 1961 championship was no fluke, UC repeated as national champion in 1961–62. Cincinnati made a fifth-straight trip to the Final Four in 1962–63, and narrowly missed capturing a third-straight national crown when Loyola (Ill.) overcame a 15-point deficit and defeated the Bearcats by a basket, 60–58, in overtime. During those five seasons, UC recorded a 37-game win streak and posted a 161–16 ledger. The five straight Final Four appearances is a feat topped only by UCLA. Connie Dierking (1958), Ralph Davis (1960), Bob Wiesenhahn (1961), Paul Hogue (1961, 1962), Tom Thacker (1963), Tony Yates (1963), Ron Bonham (1963, 1964) and George Wilson (1963) were accorded All-American recognition with Wilson playing on the U.S. 1964 Olympic gold medal team. 1970s – Continued success The Bearcats during the 1970s compiled a 170–85 record (.667). The success was led by flashy-dressing head coach Gale Catlett, who led the Bearcats to the NCAA Tournament in the 1974–75 season returning Cincinnati to the Big Dance for the first time since the 1965–66 season. Cincinnati inaugurated the Metro Conference by winning the league's first two tournament championships and made four consecutive post-season appearances from 1974 to 1977, including a Sweet Sixteen appearance in 1975. Catlett was also a skilled recruiter, bringing Jim Ard (1970), Lloyd Batts (1973), Steve Collier (1976), Gary Yoder (1977), Bob Miller (1978) and Pat Cummings (1979) to Cincinnati who all earned All-American recognition. Cummings closed his career as UC's No. 2 leading scorer of all-time. After the 1977–78 campaign Catlett would leave to coach his alma mater West Virginia and Cincinnati hired Chicago Bulls head coach Ed Badger. Badger would have middling success with the Bearcats during his tenure, which was immediately challenged when a two-year NCAA postseason ban was handed down to the Bearcats due to violations by Catlett. 1980–1988 – Down in the dumps Cincinnati fell into exceptionally hard times during the 1980s, going 112–142 over the course of the decade. Tony Yates, a member of the national championship teams in the 1960s, was hired as head coach in 1983. In his first season in 1983–84, UC went 3–25 (0–14 in conference), the school's worst season (winning-percentage-wise) since going 1–9 in 1915. After several unremarkable campaigns thereafter, Yates was fired after the 1989 season. The Bearcats of the 1980s failed to make a single NCAA tournament, and only had one postseason appearance in the 1985 NIT. 1989–2005 – Back into the national spotlight Bob Huggins, the former head coach at the University of Akron, was named head coach at UC prior to the 1989–90 season. Taking over a team with a proud history but one that had not had any legitimate success in over a decade, Huggins quickly turned things around and rekindled the national championship expectations of the past. Posting winning records in each of his first two seasons, Huggins would soon prove that his team was for real and in only his third season at the helm he directed UC to the 1992 Final Four. The 1992 team that went on to lose to Michigan's "Fab Five" in the Final Four, would set a high standard of success that would last for years to come. The Bearcats advanced to the Elite Eight of the NCAA tournament three times, and reached the Sweet 16 four times while Huggins was coach. Cincinnati also won its conference season and/or tournament title in 12 years out of a 13-year span (1992–2004). UC was also one of the top ranked teams of this time, often being ranked in the top 10 if not number one in the country. Huggin's team merits include claiming eight league tournament titles and 10 regular season crowns in addition to appearing in 14 consecutive NCAA Tournaments (1992–2005). Fifteen Bearcats had garnered first team all-conference honors during this era with three of those, Danny Fortson, Kenyon Martin and Steve Logan, picking up a total of four C-USA Most Outstanding Player Awards. Fortson, Nick Van Exel, Ruben Patterson, Bobby Brannen, Melvin Levett, Logan, Martin and Pete Mickeal have joined Cincinnati's list of All-Americans. Fortson was a consensus first team All-American in 1996–97 after receiving second team recognition in 1995–96. Martin was college basketball's top player of the 1999–2000 season, making a clean sweep of the national player of the year awards. Logan was a consensus All-American in 2001–02 and a finalist for every national player of the year award. Several Bearcats were NBA Draft Picks, including Martin being the number one overall pick in 2000. Huggins was forced to resign by school president Nancy Zimpher in August 2005. Zimpher was angered by the lackluster academic performance of Huggins' teams (he routinely only graduated 30 percent of his players), and felt that Huggins didn't fit in with her plan to upgrade UC's academic reputation. Huggins hadn't helped his standing with Zimpher when he was arrested for DUI in 2004. This decision was met wide widespread criticism among virtually everyone connected to the program, creating a situation that would not bode well for the team in the near future. Looking to stay within the program, the school immediately promoted assistant coach Andy Kennedy as interim head coach for the 2005–06 season. 2006–2009 – Resurrecting a gutted program In the spring of 2006, Mick Cronin was hired as head coach, replacing interim coach Andy Kennedy after the dismissal of Bob Huggins. Cronin was tasked with picking up the pieces from a depleted program after Huggins was abruptly asked to resign three months before the 2005 season, and a temporary coach in Kennedy for the previous season. Due to the school having little-to-no recruiting going on for around a full calendar year, Cronin was forced to scrounge for players. He even had a couple players on the school's football team play, one being future NFL linebacker Connor Barwin. Although Cronin's teams struggled early in his UC career, he improved the school's win total each of his first five seasons. After two straight losing seasons, UC began to get back on track under Cronin in the 2008–09 season with an 18–14 record. This was then followed by an NIT appearance and a brief return to the Top 25 polls during the 2009–10 campaign. 2010–2019 – Return to winning ways Despite the surroundings, Cincinnati began the retooling process, becoming the only program from a major conference to improve its win total every season from 2007 to 2011, building from 11 wins in 2007 to 26 victories and a return to the NCAA Tournament in 2011. Now a fixture at the Big Dance, Cincinnati can include itself among an elite list of six programs appearing in eight consecutive NCAA Tournaments, along with Duke, Gonzaga, Kansas, Michigan State and North Carolina. This run of 9 consecutive NCAA Tournament appearances by Cincinnati would see UC advance to the Round of 32 five times and to the Sweet 16 once as of the 2018–19 season. During the 2014–15 season, Mick Cronin discovered he had an arterial dissection and sat out the rest of the season, last coaching December 17 against San Diego State. Assistant Coach, Larry Davis took the reigns and lead the team onto a respectable season and classic overtime victory over Purdue in the first round of the NCAA Tournament. In 2013–14 season and 2017–18 season Cincinnati were American Athletic Conference regular season champions and in 2017–18 and 2018–19 seasons Cincinnati won the American Athletic Conference Men's Basketball Tournament. During this time many notable players came to Cincinnati with several progressing to the NBA, such as Sean Kilpatrick, Troy Caupain, Jacob Evans, and Gary Clark. The Bearcats also featured consecutive AAC Player-of-the-Year (POY) winners in Gary Clark and Jarron Cumberland. 2020–present – Coaching shakeups On April 9, 2019, it was announced that Mick Cronin would be leaving Cincinnati to become the next head coach of the UCLA Bruins after UCLA had fired Coach Steve Alford earlier in the season (ironically, his firing was due in part to a blowout loss to the Bearcats). On April 14, 2019, it was announced that John Brannen was being hired as the new head coach. In his first year, Brannen would lead the 'Cats to a share of the regular season AAC championship before both the AAC Tournament and the NCAA Tournament were cancelled due to COVID-19. In Brannen's second season the team struggled to find its footing and dealt with 5 COVID related opt-outs and a 25 day program pause. The Bearcats would finish 12—11 before leading a surprising run in the 2021 AAC Tournament before losing in the final. On March 26, Athletic Director John Cunningham announced the university would begin investigating allegations against the program. Soon after on April 3, it was announced that head coach John Brannen was placed on indefinite leave. Finally, on April 9 the school announced Brannen had been relieved of his duties effective immediately along with assistants. On April 14 Cincinnati hired Wes Miller to become their next head coach, replacing Brannen. Notable seasons 1959–60 Oscar Robertson scored a school record 62 points in an early-February game vs. North Texas State and in the process became the NCAA's all-time leading career scorer. Robertson claimed national player of the year honors for the third straight year while Cincinnati won its third straight Missouri Valley title. The Bearcats made their second trip to the Final Four. California again turned back UC's title hopes as UC finished third. George Smith stepped down as head coach to become athletic director, capping a career in which he posted a 154–56 record in eight years. 1960–61 Largely an unknown team, without Robertson, and with a new head coach, Ed Jucker, in command, Cincinnati stumbled to a 5–3 start. The Bearcats then won their next 22 contests, garnering a league title, a third straight trip to the Final Four, and a national championship. In the first-ever championship game matchup of two teams from the same state, UC defeated Ohio State in overtime, 70–65. 1961–62 Cincinnati fashioned a 28–2 record, but the Bearcats had to defeat Bradley in a league playoff game to defend their national title. UC won the Midwest Regional to earn its fourth straight trip to the Final Four. After edging UCLA, 72–70, in the semifinals, Cincinnati became a repeat champion with a 71–59 win over Ohio State. Paul Hogue was the tournament's Most Outstanding Player. 1962–63 UC breezed to its fifth straight Missouri Valley Conference crown and, after winning the Midwest Regional, a fifth straight trip to the Final Four. An 80–46 win over Oregon State in the semifinals put the Bearcats in position to win a third straight national title. Cincinnati held a 15-point lead over Loyola (Ill.) in the second half of the championship game, only to have the Ramblers come back to win, 60–58, in overtime. Cincinnati led the nation in defense. 1991–92 The Bearcats opened play in the Great Midwest Conference and marked their debut in this new league by sharing the regular season title and winning the tournament crown. Cincinnati made its first appearance in two decades in the Top 20 rankings. The Bearcats were seeded fourth in the Midwest Regional. UC defeated its four regional foes by an average margin of 20.8 points to make its sixth appearance in the Final Four. Michigan's "Fab Five" edged UC, 76–72, in the semifinal. 1999–00 Cincinnati was the nation's top team and Kenyon Martin was college basketball's top player. UC was ranked No. 1 in the national polls for 12 of 18 weeks and Martin made a clean sweep of the national player of the year awards (Naismith, Wooden, Rupp, Robertson, NABC). The Bearcats tied a school record for victories with a 29–4 record and won their fifth straight Conference USA regular season title. UC seemed poised for a run for the national title until Martin suffered a broken leg in the Conference USA Tournament. Martin was a unanimous first team All-American with Pete Mickeal earning honorable mention honors. Cincinnati went from the #1 team in the country to a 2-seed in the NCAA Tournament, and fell to Tulsa in the 2nd round. 2001–02 Unranked in the major polls at the start of the season, the Bearcats posted a 31–4 record—setting a new standard for victories—won a seventh consecutive Conference USA regular season championship, captured the C-USA tournament crown and earned their first-ever No. 1 seed in the NCAA Tournament. Steve Logan earned his second straight Conference USA Player of the Year award, was a consensus All-American and a finalist for every national player of the year honor. The Bearcats were upset in the 2nd round to 8-seed UCLA in a double-overtime thriller. 2011–12 After starting the season 5–3 with bad losses and dealing with the aftermath and suspensions from the Crosstown Shootout brawl, UC's season was already on the brinks halfway through December. The Bearcats then went on a run against fantastic competition and wound up beating 8 ranked teams, the most ranked wins in any Cincinnati season in history. The biggest win came against the 31–1 and #2 Syracuse Orange in the Big East Tournament semifinals. The Bearcats went on to the Sweet 16 where they lost to Ohio State. The latter half of this season is considered by many to be a big turning point in Mick Cronin's coaching career. 2017–18 Cincinnati began the season with high hopes, featuring a team hallmarked by four "1000 point career scorers" (Gary Clark, Jacob Evans, Kyle Washington, and Cane Broome). They spent the entire season in the national polls, peaking at #5 - this was fueled by their defensive prowess which ranked second overall nationally. They earned their first outright American Athletic Conference regular season and tournament championships and tied the school record for wins, going 31–5. Their season ended with a second round NCAA tournament upset to Nevada who tied the record for the 2nd largest NCAA Tournament comeback- surmounting a 22-point deficit to win by 2. Notable games 01/09/1958 – Cincinnati 118, Seton Hall 54: 19-year-old sophomore Oscar Robertson ("The Big O") dropped 56 points, scoring more than all of Seton Hall, and caught the attention of New York City in a road win. His 56 points, at the time, was a Madison Square Garden record. 03/25/1961 – Cincinnati 70, Ohio State 65: The Buckeyes were the defending champs, 27–0 and No. 1 in the nation. They took on state rival No. 2 Cincinnati in the National Championship. A layup by Ohio State's Bobby Knight sent the game into overtime, tied at 61. Cincy, led by Paul Hogue and Bob Wiesenhahn, took it from there, winning, 70–65, giving the Bearcats their first basketball title in school history. 03/24/1962 – Cincinnati 71, Ohio State 59: Cincinnati and Ohio State, again ranked Nos. 1 and 2 at the end of the regular season, became the first teams to play each other in two consecutive NCAA championship games. Unlike the year before, this game was not close. Cincy led by eight at the half and won by 12 as Paul Hogue and Tom Thacker led the way with 22 and 21 points, respectively. When it was over, the Bearcats' second-year coach Ed Jucker had a pair of NCAA titles in two tries. 03/23/1963 – Loyola (Ill.) 60, Cincinnati 58: Despite its No. 3 ranking and a scoring average of 91.8, nobody expected Loyola of Chicago to beat Cincinnati, especially when the Ramblers fell behind by 15 in the second half. But Loyola rallied to send the game into OT and won the title on a last-second rebound and basket by Vic Rouse. 3/13/1976 – Notre Dame 79, Cincinnati 78: Facing No. 7 Notre Dame in the NCAA Tournament, the No. 15 Bearcats had led the entire game and were inbounding under the Irish basket with eight seconds left. The Bearcats were called for a five-second violation, in part for their signal for a timeout being missed by the official. Notre Dame would get the ball and score with two seconds remaining to escape with the victory. 12/21/1981 – Cincinnati 75, Bradley 73: This contest is still listed as the longest game of NCAA Division I history, reaching seven overtimes. Reserve forward Doug Schloemer hit the decisive shot, a left-wing 15-footer with one second remaining in the seventh overtime. If he had missed that jump shot, it would have gone to an eighth overtime. 12/12/1983 – Kentucky 24, Cincinnati 11: It what became known as the "stall game", first year coach Tony Yates had his players go into a four-corner spread and waste the clock. Trying to limit the pain from the No. 2 Wildcats, boos rang out for most of the game and Kentucky refused to reschedule a series with Cincinnati after the end of the contract. This game was a big factor that lead to the introduction of the shot clock for the 1985–86 season. 12/12/1984 – Cincinnati 69, UAB 67: No. 17 UAB had a one-point lead, but in the waning seconds, Tony Wilson, who was on a track scholarship, hit a 54-foot shot beyond half-court at the buzzer to give Cincinnati a 2-point win at Riverfront Coliseum. 11/25/1989 – Cincinnati 66, Minnesota 64: It was the school's first game under Bob Huggins, in their new arena, the Shoemaker Center. Walk-on Steve Sanders, who was also the school's football team's wide receiver for four years, hit the buzzer-beating three-pointer to give UC a 66–64 win over No. 20 Minnesota. 01/23/1993 – Cincinnati 40, UAB 38: The No. 9 Bearcats were heavily favored playing at home vs an 11–7 UAB team. It was an ugly, very low-scoring affair, where UAB led at halftime 15–11. In a tie game with seconds left, Corie Blount for UC had his shot blocked. It was kicked around and Nick Van Exel recovered it to put up a long two-pointer at the buzzer. Nothing but net. Cats won 40–38. 12/17/1994 – Cincinnati 81, Wyoming 80: UC trailed to Wyoming all game, but when down 2 in the final seconds, LaZelle Durden put up a 3-point attempt as the final horn sounded. He was fouled, but hit all three free throws with no time on the clock. UC won, 81–80, and Durden's 45 points were the most by a Bearcat in 34 years. 03/12/1995 – Cincinnati 67, St. Louis 65: LaZelle Durden fired in the game-winning three-pointer with 1.2 seconds to play in the conference championship game over Saint Louis, giving the Bearcats a 67–65 victory and clinching an NCAA Tournament berth. 02/11/1996 – Arizona, 79, Cincinnati 76: The Bearcats had the ball under their own hoop in a tie game vs Arizona with just a few seconds left. Miles Simon stripped the ball from Danny Fortson, and hit a three-quarter-court buzzer-beater to beat UC, 79–76. 02/06/1997 – Cincinnati 65, Tulane 64: The game was tied at 63 with 2 seconds left, and UC had the ball. Bobby Brannan threw the ball the length of the court. Danny Fortson made the catch near the hoop and laid it in with 0.2 seconds remaining. The majority of the Bearcats bench stormed the court in excitement, thinking the game was over. Cincinnati was given a technical foul for the incident, awarding Tulane two free throws and the ball. Honeycutt only made one of two free throws, and Tulane was unable to score with 0.2 seconds left. Cincinnati won by one. 02/19/1998 – Cincinnati 93, UAB 76: All-American Ruben Patterson was awoken at 6:00 in the morning by Bob Huggins. The coach broke the news to him that his mother had a heart attack overnight and died. Patterson played the game that night anyway, after spending all day crying. He scored a career-high 32 points in a 93–76 win over UAB. 03/15/1998 – West Virginia 75, Cincinnati 74: Cincinnati took a 2-point lead with 7.1 seconds remaining against West Virginia in the second round of the NCAA Tournament. Jarrod West of WV then banked in a 30-foot three-pointer with 0.8 seconds left, a shot that was tipped by Ruben Patterson. West Virginia advanced to the Sweet Sixteen with a 75–74 win. 11/29/1998 – Cincinnati 77, Duke 75: No. 14 Cincinnati took on No. 1 Duke in the Great Alaska Shootout championship. In a tie game with 3 seconds left, Cincinnati ran a "hook-and-ladder" type play, that had Kenyon Martin hit an open Melvin Levett sprinting towards the hoop. Levett dunked the ball with one second left, and the Bearcats won, 77–75. As of the 2019 season, it is their lone win vs a No. 1 team. 03/02/2000 – Cincinnati 66, DePaul 64: DePaul led the No. 2 Bearcats by 17, and by 10 with under 4 minutes remaining. The National POY Kenyon Martin took over, scoring 5 straight field goals for UC and had 2 key blocks down the stretch. With the game tied at 62, freshman DerMarr Johnson hit the game-winning jumper with 2.7 seconds left. 02/22/2002 – Cincinnati 63, Marquette 62: 9th-ranked Marquette led No. 4 Cincinnati by 4 with 30 seconds remaining. Steve Logan hit a three-pointer with 22 seconds left, then after a missed one-and-one free throw by Dwyane Wade, Donald Little hit a jumper with 3 seconds remaining. Cincinnati won 63–62 in their biggest win of the season. 03/08/2006 – Syracuse 74, Cincinnati 73: In the first round of the Big East Tournament, the Bearcats led by one with 8.3 seconds remaining. Devan Downey of UC was at the line shooting two free throws. After making the first, he missed the second. Trailing by 2, Gerry McNamara of Syracuse came down and hit a running one-handed three pointer with 0.5 seconds left, giving Syracuse a one-point win. Cincinnati, who was a bubble team, just barely missed the NCAA Tournament (even with a Joe Lunardi prediction of a 9 seed on the morning of Selection Sunday), snapping their streak of 14 straight appearances. 3/11/2010 – West Virginia 54, Cincinnati 51: The Bearcats needed a marquee win to shore up a borderline NCAA Tournament at-large profile and they would get the opportunity against #6 West Virginia and their former Coach Bob Huggins in the Big East Quarterfinals. With the score tied, the Bearcats were able to force WVU into a shot clock violation with 6.4 seconds left, giving them the final possession from under the opposing team's baseline. Captain Deonta Vaughn would inbounds to sophomore Dion Dixon, who the Mountaineers were able to overwhelm near halfcourt - causing him to dribble the ball off his leg and out of bounds. On the ensuing possession, tournament MVP Da'Sean Butler would receive the ball with 3.1 seconds left and unleash a highly contested 3 pointer which banked in and sent West Virginia to their eventual Big East tournament championship and the Bearcats to the NIT. 12/10/2011 – Xavier 76, Cincinnati 53: The 2011 rivalry game with Xavier ended in a bench-clearing brawl between the two teams, with the officials calling an end to the game with less than 10 seconds left. For more details, see 2011 Crosstown Shootout brawl. 03/09/2012 – Cincinnati 71, Syracuse 68: Unranked Cincinnati took on No. 2 Syracuse (31–1) in the Big East Tournament semifinals. The Bearcats were hot out of the gate, hitting 8 of their first 10 three-point attempts and jumping out to a 25–8 lead. Syracuse came roaring back in the game, getting it to a one-point game with a few seconds left. A Justin Jackson dunk with a second remaining capped the Bearcats 71–68 win, the school's highest-ranked victory since 1998. 03/19/2015 – Cincinnati 66, Purdue 65: 8-seeded Cincinnati and 9-seeded Purdue met for the first time in the NCAA Tournament in this round of 64 matchup. In a game that was close the majority of the way, Purdue began to pull away down the stretch. Down 7 with 48 seconds to go, the Bearcats hit a three pointer, forced a turnover, and made an and-one layup, all within 6 seconds to cut it to one. Down two with 7 seconds left, sophomore Troy Caupain drove to the hoop and hit a floater that dramatically spun around the rim, hung on the rim for a second, and fell in, as time expired. In overtime, UC prevailed 66–65, to advance to the round of 32 against an undefeated Kentucky team. 03/11/2016 – UConn 104, Cincinnati 97: In a 4-overtime thriller for the ages, Cincinnati and UConn faced off in the AAC Tournament. In the closing seconds of the 3rd overtime, in a tie game, UC guard Kevin Johnson drained a long 3-pointer with 0.8 seconds left to take a three-point lead. In a desperation heave, Jalen Adams of UConn banked in a 75-footer to extend the game. UConn outscored Cincinnati in the 4th overtime, 16–9, advancing in the conference tournament in which they would end up winning. 03/18/2016 – St. Joe's 78, Cincinnati 76: In the first round of the NCAA Tournament, 9-seeded Cincinnati took on 8-seeded St. Joe's. After the Cats clawed back from a second half deficit of 12 points, St. Joe's drained a 3-pointer with under 10 seconds left to take a two-point lead. Cincy guard Troy Caupain drove the length of the floor to the hoop, and got the ball to Octavius Ellis after being swarmed by a double-team. Ellis attempted to quickly slam it home, only to discover his dunk was 0.1 seconds too late. Time expired. St. Joe's advanced. 03/04/2018 – Cincinnati 62, Wichita State 61 : The 10th ranked Bearcats met the 11th ranked Shockers at their home arena on senior night - facing a team that regularly played six seniors - for a chance to win the American Athletic Conference Regular Season Championship outright. In a modern classic under the gaze of a hostile sellout crowd, both squads went back and forth throughout the matchup. Down 1 with 9.3 seconds left under their own basket, Wichita State whipped it around to senior three point ace: Conner Frankamp. UC anticipated the mismatch with sophomore Center Nysier Brooks on the perimeter. Frankamp's potential game-winner missed wide with State corralling the offensive rebound; however, fellow UC sophomore Jarron Cumberland laid down some suffocating defense under the basket, causing their putback to miss off the backside of the backboard as time expired. This gave UC its second regular season AAC title and first outright. 03/11/2018 – Cincinnati 56, Houston 55 : Cincinnati met the nationally ranked Houston Cougars for the third time this season, having split the regular season 1-1. The rubber match came in the finals of the American Athletic Conference Tournament, with both schools seeking their first ever AAC tournament title. Gary Clark and company were able to cut down the nets for the first time in their collegiate careers, as Houston's star Rob Gray turned the ball over on the game's final possession. 03/18/2018 – Nevada 75, Cincinnati 73: With the "South bracket" in the 2018 NCAA Division I Men's Basketball Tournament shaping up in Cincinnati's favor, the Bearcats seemed prime for continued March success as they led Nevada by 22 points with 11 minutes remaining. Nevada mounted a furious comeback, scoring 16 straight points over the next 3 minutes. The game continued to be touch and go for the remainder of the half, with an overwhelming amount of foul calls against the Bearcats. With 9 seconds left, Nevada took their first and only lead of the game at 75–73. The Bearcats dribbled the full length of the court but bobbled the ball and never got a clean look as time expired and Nevada tied the second largest comeback to-date in NCAA Tournament history. 03/17/2019 - Cincinnati 69, Houston 57: After being beaten twice by the Cougars in 2019 - the second an embarrassing 85–69 home loss on Senior Day a week earlier that cost them a share of the AAC regular season crown - the Bearcats got a third shot at the outright AAC regular season champs, but were thought to be heavy underdogs against the 31-2 Cougars. After defeating SMU (82-74) and Wichita State (66-63) in the AAC quarterfinals and semifinals respectively, the Bearcats scored a redemptive victory. AAC Player of the year Jarron Cumberland scored 33 points and was named tournament most outstanding player as the Bearcats successfully defended their AAC Tournament Crown and delivered Houston's only double digit loss of the 2018-2019 season. 03/07/2020 - Cincinnati 64, Temple 63: The Bearcats under new coach John Brannen endured an up and down season - epitomized by a Senior Day where they fell behind underdog Temple by as many as 14 points. Fueled by All-AAC players Jarron Cumberland and Trevon Scott, the Bearcats slowly mounted a comeback - tying the game at 54 with 2:03 left. After a hectic 2 minutes, Temple took the lead on a late 3 with 10 seconds remaining. Out of timeouts, Jarron Cumberland drove down the court but his layup ricocheted off the back iron; however, Trevon Scott heroically made a putback layup in the waning seconds to give the Bearcats a dramatic win. The win ultimately shored up the Bearcats' bubbly tournament resume, gave the Bearcats a share of the AAC regular season title, and (after the AAC conference tournament was cancelled due to COVID-19) would have earned them a 3rd consecutive AAC conference tournament title. Rivalries Xavier Cincinnati's main basketball rivalry is Xavier University. The two schools play annually in the Skyline Chili Crosstown Shootout. Cincinnati's record in the Shootout is 51–37. Louisville UC and Louisville were rivals, first playing in 1921, until the 2010–13 NCAA conference realignment put the contest on hiatus, as Louisville moved to the Atlantic Coast Conference on July 1, 2014. The rivalry has stretched over the span of four conferences from the Missouri Valley Conference, to the Metro Conference to Conference USA, and more recently in the Big East Conference, which in 2013 was renamed to the American Athletic Conference. The teams have faced off 99 times in series history, with Louisville leading the all-time series 53–43. Most notably, Louisville and Cincinnati faced each other twice over the course of the 2011-12 season. UC would upset then No. 17 ranked Louisville at home before facing off again in the 2012 Big East Men's Basketball Tournament championship game, where Louisville would prevail 50–44. Memphis First playing in 1968, Cincinnati and Memphis have been longtime conference rivals from the Missouri Valley Conference, to the Metro Conference, Great Midwest Conference, Conference USA, and currently in the American Athletic Conference though Cincinnati is scheduled to leave for the Big 12 Conference in 2023. The teams have faced off 82 times in basketball series history, with Cincinnati leading the all-time series 47–34. Famously, Cincinnati beat Penny Hardaway's Tigers four times in the 1991–92 season, including in the Elite Eight on the way to the program's sixth Final Four appearance. Other rivals UC and Dayton have faced off 91 times, with UC leading the all-time series 60–31. The teams first played in 1907 and would face off regularly, last playing each other in 2010. Cincinnati also has a longtime rivalry with Miami (OH) having played a total of 148 times since 1904, with UC leading the series 95–53. Similarly to Dayton, the series was played frequently until it came to a halt in 2011. However, for the 2021–22 season the Bearcats announced they would travel to Oxford to play Miami (OH), resuming the series for the first time in a decade, winning 59–58. Postseason history NCAA Tournament seeding history NCAA tournament results The Bearcats have appeared in the NCAA Tournament 32 times. Their combined record is 46–29. They have been to six Final Fours, including five in a row from 1959 to 1963, and are two time National Champions (1961, 1962). UC has been to 6 Sweet Sixteen's since 1967; with its last sweet sixteen appearance in 2012 NIT results The Bearcats have appeared in the NIT 10 times. Their combined record is 8–10, most notably placing 3rd in 1955. CBI results The Bearcats have appeared in the College Basketball Invitational once. Record vs. American Athletic Conference Opponents This table reflects the results of match-ups between Cincinnati and American Athletic Conference opponents. Updated through the end of the 2020-21 NCAA Division I men's basketball season. Source Awards Player of the Year Awards 1959, 1960 – Oscar Robertson, USBWA College Player of the Year 2000 – Kenyon Martin, Consensus National Player of the Year (USBWA, AP, Naismith, Wooden, Rupp) All-Americans Cincinnati has had 31 different players receive All-American honors while at UC. The award has been given to a Consensus 1st-Team All-American 8 times. Consensus 1st Team All-Americans 1958, 1959, 1960 – Oscar Robertson 1963 – Ron Bonham 1963 – Tom Thacker 1997 – Danny Fortson 2000 – Kenyon Martin 2002 – Steve Logan Consensus 2nd Team, 3rd Team, Freshmen and Honorable Mention All-Americans 1948, 1949, 1950 – Dick Dallmer 1955 – Jack Twyman 1958 – Connie Dierking 1960 – Ralph Davis 1961 – Bob Wiesenhahn 1961, 1962 – Paul Hogue 1962, 1963 – Tony Yates 1963 – George Wilson 1964 – Ron Bonham 1967 – Mike Rolf 1970 – Jim Ard 1973, 1974 – Lloyd Batts 1976 – Steve Collier 1977 – Gary Yoder 1978 – Bob Miller 1979 – Pat Cummings 1992 – Herb Jones 1993 – Nick Van Exel 1994 – Dontonio Wingfield 1995, 1996 – Danny Fortson 1998 – Bobby Brannen 1998 – Ruben Patterson 1999 – Melvin Levett 1999 – Kenyon Martin 2000 – DerMarr Johnson 2000 – Pete Mickeal 2001 – Steve Logan 2014 – Sean Kilpatrick 2018 – Gary Clark 2019 – Jarron Cumberland Conference Player of the Year Conference Tournament MVP Naismith Hall of Fame Members The following Cincinnati players have been enshrined in the Naismith Memorial Basketball Hall of Fame. Olympians The following Cincinnati players have represented their country in basketball in the Summer Olympic Games: McDonald's All-Americans The following were McDonald's All-Americans in high school that committed to, and played for, the University of Cincinnati. (**) Originally played collegiate basketball elsewhere, but transferred to Cincinnati. Mr. Basketball Winners The following were Mr. Basketball winners in high school that committed to, and played for, the University of Cincinnati. Retired jerseys 1,000-point scorers The Bearcats currently have 54 players in their 1,000-point club. Bearcats in the NBA The Bearcats have had 39 players play in the NBA, spanning seven decades, as of 2021. Bearcats in international leagues Sean Kilpatrick (born 1990), basketball player for Hapoel Jerusalem of the Israeli Basketball Super League Fifth Third Arena The Bearcats have played their home games in Fifth Third Arena since 1989. The arena is on-campus and has a capacity of 12,012 (with room for overflow). It is located in the Myrl H. Shoemaker Center, which was also the name of the arena until 2005, when it was named for Cincinnati-based Fifth Third Bank. It is still popularly known as "The Shoe". The Bearcats closed out Fifth Third Arena (pre-2018 renovation) with an all-time home record of 389–79 (), along with an active 26-game home winning streak. The Bearcats held a 42-game win streak from 1997 to 2000 as well. In the 1999–2000 season, every Bearcat home game was sold out. During the Bob Huggins era, it was known as one of the most hostile arenas in the nation due to the high decibel levels typical of his tenure. On December 15, 2015, The UC Board of Trustees approved an $87-million, privately funded renovation of Fifth Third Arena. Proposed improvements to the facility, include the creation of a 360-degree seating bowl, new HD scoreboard, ribbon boards, sound system, an LED lighting system which will allow for enhanced gameday presentation, new restroom and concession facilities, a new upper-level concourse with its own fan amenities, expanded food and beverage options and a new main entrance and plaza with centralized ticketing and guest services. The renovated arena also will feature upgraded locker room spaces, expanded premium seating options, including a courtside club, arena club and concourse club as well as enclosed suites, loge seating, a new Bearcats Lounge and super suites. During the meeting, trustee Rob Richardson Jr. said the upgraded facility would support the university's objective to join a power athletic conference and in student-athlete recruitment. Construction began in April 2017 and was completed in fall 2018. During the 2017–18 school year, men's basketball home games were moved to BB&T Arena at Northern Kentucky University in Highland Heights, Kentucky, while women's basketball and volleyball home games were moved to the campus of St. Ursula Academy. The Bearcats christened the newly renovated arena in a rare home game vs. Ohio State on November 7, 2018. Season-by-season record at Fifth Third Arena OVERALL: 427–89 () (**)(14–1 record at BB&T Arena) See also University of Cincinnati Cincinnati Bearcats Fifth Third Arena Wes Miller NCAA Men's Division I Final Four appearances by coaches References External links
6655
https://en.wikipedia.org/wiki/Coldcut
Coldcut
Coldcut are an English electronic music duo composed of Matt Black and Jonathan More. Credited as pioneers for pop sampling in the 1980s, Coldcut are also considered the first stars of UK electronic dance music due to their innovative style, which featured cut-up samples of hip-hop, soul, funk, spoken word and various other types of music, as well as video and multimedia. According to Spin, "in '87 Coldcut pioneered the British fad for 'DJ records'". Coldcut's records first introduced the public to pop artists Yazz and Lisa Stansfield, through which these artists achieved pop chart success. In addition, Coldcut has remixed and created productions on tracks by the likes of Eric B & Rakim, James Brown, Queen Latifah, Eurythmics, INXS, Steve Reich, Blondie, The Fall, Pierre Henry, Nina Simone, Fog, Red Snapper, and BBC Radiophonic Workshop. Beyond their work as a production duo, Coldcut are the founders of Ninja Tune, an independent record label in London, England (with a satellite office in Los Angeles & Berlin) with an overall emphasis on encouraging interactive technology and finding innovative uses of software. The label's first releases (the first four volumes of DJ Food - Jazz Brakes) were produced by Coldcut in the early 90s, and composed of instrumental hip-hop cuts that led the duo to help pioneer the trip hop genre, with artists such as Funki Porcini, The Herbaliser and DJ Vadim. History 1980s In 1986, computer programmer Matt Black and ex-art teacher Jonathan More were part-time DJs on the rare groove scene. More also DJed on pirate radio, hosting the Meltdown Show on Kiss FM and worked at the Reckless Records store on Berwick Street, London where Black visited as a customer. The first collaboration between the two artists was "Say Kids What Time Is It?" on a white label in January 1987, which mixed The Jungle Book's "King of the Swingers" with the break from James Brown's "Funky Drummer". The innovation of "Say Kids..." caused More and Black to be heralded by SPIN as "the first Brit artists to really get hip-hop's class-cutup aesthetic". It is regarded as the UK's first breaks record, the first UK record to be built entirely of samples and "the final link in the chain connecting European collage-experiment with the dance-remix-scratch edit". This was later sampled in "Pump Up the Volume" by MARRS, a single that reached #1 in the UK in October 1987. Though Black had joined Kiss FM with his own mix-based show, the pair eventually joined forces on its own show later in 1987 called Solid Steel. The eclectic show became a unifying force in underground experimental electronic music and is still running, celebrating 25 years in 2013. The duo adopted the name "Coldcut" and set up a record label called Ahead Of Our Time to release the single "Beats + Pieces" (one of the formats also included "That Greedy Beat") in 1987. All of these tracks were assembled using cassette pause button edits and later spliced tape edits that would sometimes run "all over the room". The duo used sampling from Led Zeppelin to James Brown. Electronic act The Chemical Brothers have described "Beats + Pieces" as the "first bigbeat record", a style which appeared in the mid-1990s. Coldcut's first mainstream success came when Julian Palmer from Island Records asked them to remix Eric B. & Rakim's "Paid in Full". Released in October 1987, the landmark remix is said to have "laid the groundwork for hip hop's entry into the UK mainstream", becoming a breakthrough hit for Eric B & Rakim outside the U.S., reaching No. 15 in the UK, and the top 20 in a number of European countries. It featured a prominent Ofra Haza sample and many other vocal cut ups as well as a looped rhythm which later, when sped up, proved popular in the Breakbeat genre. Off the back of its success in clubs, the Coldcut "Seven Minutes of Madness" remix ended up being promoted as the single in the UK. In 1988, More and Black formed Hex, a self-titled "multimedia pop group", with Mile Visman and Rob Pepperell. While working on videos for artists such as Kevin Saunderson, Queen Latifah and Spiritualized, Hex's collaborative work went on to incorporate 3D modelling, punk video art, and algorithmic visuals on desktop machines. The video for Coldcut's 'Christmas Break' in 1989 is arguably one of the first pop promos produced entirely on microcomputers. In 1988, Coldcut released Out To Lunch With Ahead Of Our Time, a double LP of Coldcut productions and re-cuts, and the various aliases under which the duo had recorded. This continued the duo's tradition of releasing limited available vinyl. The next Coldcut single, released in February 1988, moved towards a more house-influenced style. "Doctorin' the House", which debuted singer Yazz, became a top ten hit, and peaked at No. 6. In the same year, under the guise Yazz and the Plastic Population, they produced "The Only Way Is Up", a cover of a Northern soul song. The record reached No. 1 in the UK in August, and remained there for five weeks, becoming 1988's second biggest selling single. Producer Youth of Killing Joke also helped Coldcut with this record. The duo had another top hit in September with "Stop This Crazy Thing", which featured reggae vocalist Junior Reid and reached number 21 in the UK. The single "People Hold On" became another UK Top 20 hit. Released in March 1989, it helped launch the career of the then relatively unknown singer Lisa Stansfield. Coldcut and Mark Saunders produced her debut solo single "This Is the Right Time", which became another UK Top 20 hit in August as well as reaching No. 21 on the U.S. Billboard Hot 100 the following year. As the duo started to enjoy critical and commercial success, their debut album What's That Noise? was released in April 1989 on Ahead of Our Time and distributed by Big Life Records. The album gave "breaks the full length treatment", and showcased "their heady blend of hip-hop production aesthetics and proto-acid house grooves". It also rounded up a heap of unconventional guest features, quoted by SPIN as having "somehow found room at the same table for Queen Latifah and Mark E. Smith". The album's track "I'm in Deep" (featuring Smith) prefigured the indie-dance guitar-breaks crossover of such bands as the Stone Roses and Happy Mondays, utilizing Smith's freestyle raucous vocals over an acid house backing, and also including psych guitar samples from British rock band Deep Purple. What's That Noise? reached the Top 20 in the UK and was certified Silver. 1990s Coldcut's second album, Some Like It Cold, released in 1990 on Ahead Of Our Time, featured a collaboration with Queen Latifah on the single "Find a Way". Though "Find a Way" was a minor hit in the UK, no more singles were released from the album. The duo was given the BPI "Producer of the Year Award" in 1990. Hex - alongside some other London visual experimenters such as iE - produced a series of videos for a longform VHS version of the album. This continued Coldcut and Hex's pioneering of the use of microcomputers to synthesize electronic music visuals. After their success with Lisa Stansfield, Coldcut signed with her label, Arista. Conflicts arose with the major label, as Coldcut's "vision extended beyond the formulae of house and techno" and mainstream pop culture (CITATION: The Virgin Encyclopedia Of Nineties Music, 2000). Eventually, the duo's album Philosophy emerged in 1993. Singles "Dreamer" and "Autumn Leaves" (1994) sung by vocalist Janis Alexander were both minor hits but the album did not chart. "Autumn Leaves" had strings recorded at Abbey Road, with a 30-piece string section and an arrangement by film composer Ed Shearmur. The leader of the string section was Simon Jeffes of Penguin Cafe Orchestra. Coldcut's insistence on their friend Mixmaster Morris to remix "Autumn Leaves" led to one of Morris' most celebrated remixes, which became a minor legend in ambient music. It has appeared on numerous compilations. In 1990, whilst on their first tour in Japan (which also featured Norman Cook, who later became Fatboy Slim), Matt and Jon formed their second record label, Ninja Tune, as a self-titled "technocoloured escape pod", and a way to escape the creative control of major labels. The label enabled them to release music under different aliases (e.g. Bogus Order, DJ Food), which also helped them to avoid pigeonholing as producers. Ninja Tune's first release was Bogus Order's "Zen Brakes". The name Coldcut stayed with Arista so there were no official Coldcut releases for the next three years. During this time, Coldcut still produced for artists on their new label, releasing a flood of material under different names and continuing to work with young groups. They additionally kept on with Solid Steel on Kiss FM and running the night club Stealth (Club of the Year in the NME, The Face, and Mixmag in 1996). In 1991, Hex released their first video game, Top Banana, which was included on a Hex release for the Commodore CDTV machine in 1992, arguably the first complete purpose-designed multimedia system. Top Banana was innovative in that it used sampled graphics, contained an ecological theme and a female lead character (dubbed "KT"), and its music changed through random processes. Coldcut and Hex presented this multimedia project as an example of the forthcoming convergence of pop music and computer-game characters. In 1992, Hex's first single - "Global Chaos" / "Digital Love Opus 1" - combined rave visuals with techno and ambient interactive visuals. In November of that year, Hex released Global Chaos CDTV, which took advantage of the possibilities of the new CD-ROM medium. The Global Chaos CDTV disk (which contained the Top Banana game, interactive visuals and audio), was a forerunner of the "CD+" concept, uniting music, graphics, and video games into one. This multi-dimensional entertainment product received wide coverage in the national media, including features on Dance Energy, Kaleidoscope on BBC Radio 4, What's Up Doc? on ITV and Reportage on BBC Two. i-D Magazine was quoted as saying, "It's like your TV tripping". Coldcut videos were made for most songs, often by Hexstatic, and used a lot of stock and sampled footage. Their "Timber" video, which created an AV collage piece using analogous techniques to audio sample collage, was put on heavy rotation on MTV. Stuart Warren Hill of Hexstatic referred to this technique as: "What you see is what you hear". "Timber" (which appears on both Let Us Play, Coldcut's fourth album, and Let Us Replay, their fifth) won awards for its innovative use of repetitive video clips synced to the music, including being shortlisted at the Edinburgh Television and Film Festival in their top five music videos of the year in 1998. Coldcut began integrating video sampling into their live DJ gigs at the time, and incorporated multimedia content that caused press to credit the act as segueing "into the computer age". Throughout the 90s, Hex created visuals for Coldcut's live performances, and developed the CD-ROM portion of Coldcut's Let Us Play and Let Us Replay, in addition to software developed specifically for the album's world tour. Hex's inclusion of music videos and "playtools" (playful art/music software programs) on Coldcut's CD-Roms was completely ahead of the curve at that time, offering viewers/listeners a high level of interactivity. Playtools such as My Little Funkit and Playtime were the prototypes for Ninja Jamm, the app Coldcut designed and launched 16 years later. Playtime followed on from Coldcut and Hex's Synopticon installation, developing the auto-cutup algorhythm, and using other random processes to generate surprising combinations. Coldcut and Hex performed live using Playtime at the 1st Sonar Festival in 1994. Playtime was also used to generate the backing track for Coldcut's collaboration with Jello Biafra, "Every Home a Prison". In 1994 Coldcut and Hex contributed an installation to the Glasgow Gallery of Modern Art. The piece, called Generator was installed in the Fire Gallery. Generator was an interactive installation which allowed users to mix sound, video, text and graphics and make their own audio-visual mix, modelled on the techniques and technology used by Coldcut in clubs and live performance events. It consisted of two consoles: the left controlling how the sounds are played, the right controlling how the images are played. As part of the JAM exhibition of "Style, Music and Media" at the Barbican Art Gallery in 1996, Coldcut and Hex were commissioned to produce an interactive audiovisual piece called Synopticon. Conceived and designed by Robert Pepperell and Matt Black, the digital culture synthesiser allows users to "remix" sounds, images, text and music in a partially random, partially controlled way. The year 1996 also brought the Coldcut name back to More and Black, and the pair celebrated with 70 Minutes of Madness, a mix CD that became part of the Journeys by DJ series. The release was credited with "bringing to wider attention the sort of freestyle mixing the pair were always known for through their radio show on KISS FM, Solid Steel, and their steady club dates". It was voted "Best Compilation of All Time" by Jockey Slut in 1998. In February 1997, they released a double pack single "Atomic Moog 2000" / "Boot the System", the first Coldcut release on Ninja Tune. This was not eligible for the UK chart because time and format restrictions prevented the inclusion of the "Natural Rhythm" video on the CD. In August 1997, a reworking of the early track "More Beats + Pieces" gave them their first UK Top 40 hit since 1989. The album Let Us Play! followed in September and also made the Top 40. The fourth album by Coldcut, Let Us Play! paid homage to the greats that inspired them. Their first album to be released on Ninja Tune, it featured guest appearances by Grandmaster Flash, Steinski, Jello Biafra, Jimpster, The Herbaliser, Talvin Singh, Daniel Pemberton and Selena Saliva. Coldcut's cut 'n' paste method on the album was compared to that of Dadaism and William Burroughs. Hex collaborated with Coldcut to produce the multimedia CD-Rom for the album. Hex later evolved the software into the engine that was used on the Let Us Play! world tour. In 1997, Matt Black - alongside Cambridge based developers Camart - created real-time video manipulation software VJAMM. It allowed users to be a "digital video jockey", remixing and collaging sound and images and trigger audio and visual samples simultaneously, subsequently bringing futuristic technology to the audio-visual field. VJAMM rivalled some of the features of high-end and high cost tech at the time. The VJAMM technology, praised as being proof of how far computers changed the face of live music, became seminal in both Coldcut's live sets (which were called a "revelaton" by Melody Maker and DJ sets. Their CCTV live show was featured at major festivals including Glastonbury, Roskilde, Sónar, the Montreux Jazz Festival, and John Peel's Meltdown. The "beautifully simple and devastatingly effective" software was deemed revolutionary, and became recognized as a major factor in the evolution of clubs. It eventually earned a place in the American Museum of the Moving Image's permanent collection. As quoted by The Independent, Coldcut's rallying cry was "Don't hate the media, be the media'". NME was quoted as saying: "Veteran duo Coldcut are so cool they invented the remix - now they are doing the same for television." Also working with Camart, Black designed DJamm software in 1998, which Coldcut used on laptops for their live shows, providing the audio bed alongside VJAMM's audiovisual samples. Matt Black explained they designed DJamm so they "could perform electronic music in a different way – i.e., not just taking a session band out to reproduce what you put together in the studio using samples. It had a relationship to DJing, but was more interactive and more effective." Excitingly at that time, DJamm was pioneering in its ability to shuffle sliced loops into intricate sequences, enabling users to split loops into any number of parts. In 1999, Let Us Replay! was released, a double-disc remix album where Coldcut's classic tunes were remixed by the likes of Cornelius (which was heralded as a highlight of the album, Irresistible Force, Shut Up And Dance, Carl Craig and J Swinscoe. Let Us Replay! pieces together "short sharp shocks that put the mental in 'experimental' and still bring the breaks till the breakadawn". It also includes a few live tracks from the duo's innovative world tour. The CD-Rom of the album, which also contained a free demo disc of the VJamm software, was one of the earliest audiovisual CD- ROMs on the market, and Muzik claimed deserved to "have them canonized...it's like buying an entire mini studio for under $15". 2000s In 2000, the Solid Steel show moved to BBC London. Coldcut continued to forge interesting collaborations, including 2001's Re:volution as an EP in which Coldcut created their own political party (The Guilty Party). Featuring scratches and samples of Tony Blair and William Hague speeches, the 3-track EP included Nautilus' "Space Journey", which won an Intermusic contest in 2000. The video was widely played on MTV. With "Space Journey", Coldcut were arguably the first group to give fans access to the multitrack parts, or "stems" of their songs, building on the idea of interactivity and sharing from Let Us Play. In 2001, Coldcut produced tracks for the Sega music video game Rez. Rez replaced typical video-game sound effects with electronic music; the player created sounds and melodies, intended to simulate a form of synesthesia. The soundtrack also featured Adam Freeland and Oval. In 2002, while utilizing VJamm and Detraktor, Coldcut and Juxta remixed Herbie Hancock's classic "Rockit", creating both an audio and video remix. Working with Marcus Clements in 2002, Coldcut released the sample manipulation algorhythm from their DJamm software as a standalone VST plugin that could be used in other software, naming it the "Coldcutter". Also in 2002, Coldcut with UK VJs Headspace (now mainly performing as the VJamm Allstars developed Gridio, an interactive, immersive audio-visual installation for the Pompidou Centre as part of the ‘'Sonic Process exhibition. The Sonic Process exhibition was launched at the MACBA in Barcelona in conjunction with Sónar, featuring Gridio as its centerpiece. In 2003, a commission for Graz led to a specially built version of Gridio, in a cave inside the castle mountain in Austria. Gridio was later commissioned by O2 for two simultaneous customised installations at the O2 Wireless Festivals in Leeds and London in 2007. That same year, Gridio was featured as part of Optronica at the opening week of the new BFI Southbank development in London. In 2003, Black worked with Penny Rimbaud (ex Crass) on Crass Agenda's Savage Utopia project. Black performed the piece with Rimbaud, Eve Libertine and other players at London's Vortex Jazz Club. In 2004, Coldcut collaborated with American video mashup artist TV Sheriff to produce their cut-up entitled "Revolution USA". The tactical-media project (coordinated with Canadian art duo NomIg) followed on from the UK version and extended the premise "into an open access participatory project". Through the multimedia political art project, over 12 gigabytes of footage from the last 40 years of US politics were made accessible to download, allowing participants to create a cut-up over a Coldcut beat. Coldcut also collaborated with TV Sheriff and NomIg to produce two audiovisual pieces "World of Evil" (2004) and "Revolution '08" (2008), both composed of footage from the United States presidential elections of respective years. The music used was composed by Coldcut, with "Revolution '08" featuring a remix by the Qemists. Later that year, a collaboration with the British Antarctic Survey (BAS) led to the psychedelic art documentary Wavejammer. Coldcut was given access to the BAS archive in order to create sounds and visuals for the short film. 2004 also saw Coldcut produce a radio play in conjunction with renowned young author Hari Kunzru for BBC Radio 3 (incidentally called Sound Mirrors). Coldcut returned with the single "Everything Is Under Control" at the end of 2005, featuring Jon Spencer (of Jon Spencer Blues Explosion) and Mike Ladd. It was followed in 2006 by their fifth studio album Sound Mirrors, which was quoted as being "one of the most vital and imaginative records Jon Moore and Matt Black have ever made", and saw the duo "continue, impressively, to find new ways to present political statements through a gamut of pristine electronics and breakbeats" (CITATION: Future Music, 2007). The fascinating array of guest vocalists included Soweto Kinch, Annette Peacock, Ameri Baraka, and Saul Williams. The latter followed on from Coldcut's remix of Williams' "The Pledge" for a project with DJ Spooky. A 100-date audiovisual world tour commenced for Sound Mirrors, which was considered "no small feat in terms of technology or human effort". Coldcut was accompanied by scratch DJ Raj and AV artist Juxta, in addition to guest vocalists from the album, including UK rapper Juice Aleem, Roots Manuva, Mpho Skeef, Jon Spencer and house legend Robert Owens. Three further singles were released from the album including the Top 75 hit "True Skool" with Roots Manuva. The same track appeared on the soundtrack of the video game FIFA Street 2. Sponsored by the British Council, in 2005 Coldcut introduced AV mixing to India with the Union project, alongside collaborators Howie B and Aki Nawaz of Fun-Da-Mental. Coldcut created an A/V remix of the Bollywood hit movie Kal Ho Naa Ho. In 2006, Coldcut performed an A/V set based on "Music for 18 Musicians" as part of Steve Reich's 70th birthday gig at the Barbican Centre in London. This was originally written for the 1999 album Reich Remixed. Coldcut remixed another classic song in 2007: Nina Simone's "Save Me". This was part of a remix album called Nina Simone: Remixed & Re-imagined, featuring remixes from Tony Humphries, Francois K and Chris Coco. In February 2007, Coldcut and Mixmaster Morris created a psychedelic AV obituary/tribute Coldcut, Mixmaster Morris, Ken Campbell, Bill Drummond and Alan Moore (18 March 2007). Robert Anton Wilson tribute show. Queen Elizabeth Hall, London: Mixmaster Morris. (28 August 2009) to Robert Anton Wilson, the 60s author of Illuminatus! Trilogy. The tribute featured graphic novel writer Alan Moore and artist Bill Drummond and a performance by experimental theatre legend Ken Campbell. Coldcut and Morris' hour and a half performance resembled a documentary being remixed on the fly, cutting up nearly 15 hours' worth of Wilson's lectures. In 2008, an international group of party organisers, activists and artists including Coldcut received a grant from the Intelligent Energy Department of the European Union, to create a project that promoted intelligent energy and environmental awareness to the youth of Europe. The result was Energy Union, a piece of VJ cinema, political campaign, music tour, party, art exhibition and social media hub. Energy Union toured 12 EU countries throughout 2009 and 2010, completing 24 events in total. Coldcut created the Energy Union show for the tour, a one-hour Audio/Visual montage on the theme of Intelligent Energy. In presenting new ideas for climate, environmental and energy communication strategies, the Energy Union tour was well received, and reached a widespread audience in cities across the UK, Germany, Belgium, The Netherlands, Croatia, Slovenia, Austria, Hungary, Bulgaria, Spain and the Czech Republic. Also in 2008, Coldcut was asked to remix the theme song for British cult TV show Doctor Who for the program's 40th anniversary. In October 2008, Coldcut celebrated the legacy of the BBC Radiophonic Workshop (the place where the Doctor Who theme was created) with a live DJ mix at London's legendary Roundhouse. The live mix incorporated classic Radiophonic Workshop compositions with extended sampling of the original gear. Additionally in 2008, Coldcut remixed "Ourselves", a Japanese No. 1 hit from the single "&" by Ayumi Hamasaki. This mix was included on the album Ayu-mi-x 6: Gold. Starting in 2009, Matt Black, with musician/artist/coder Paul Miller (creator of the TX Modular Open Source synth), developed Granul8, a new type of visual fx/source Black termed a "granular video synthesiser". Granul8 allows the use of realtime VJ techniques including video feedback combined with VDMX VJ software. From 2009 onwards, Black has been collaborating with coder and psychedelic mathematician William Rood to create a forthcoming project called Liveloom, a social media AV mixer. Recent work In 2010, Coldcut celebrated 20 years of releasing music with its label, Ninja Tune. A book entitled Ninja Tune: 20 Years of Beats and Pieces was released on 12 August 2010, and an exhibition was held at Black Dog Publishing's Black Dog Space in London, showcasing artwork, design and photography from the label's 20-year history. A compilation album was released on 20 September in two formats: a regular version consisting of two 2-disc volumes, and a limited edition which contained six CDs, six 7" vinyl singles, a hardback copy of the book, a poster and additional items. Ninja Tune also incorporated a series of international parties. This repositioned Ninja as a continually compelling and influential label, being one of the "longest-running (and successful) UK indie labels to come out of the late-1980s/early-90s explosion in dance music and hip-hop" (Pitchfork, 28 September 2010). Pitchfork claimed it had a "right to show off a little". In July 2013, Coldcut produced a piece entitled "D'autre" based on the writings of French poet Arthur Rimbaud, for Forum Des Images in Paris. The following month, in August, Coldcut produced a new soundtrack for a section of André Sauvage's classic film Études sur Paris, which was shown as part of Noise of Art at the BFI in London, which celebrated 100 years of electronic music and silent cinema. Coldcut put new music to films from the Russolo era, incorporating original recordings of Russolo's proto-synths. In 2014 Coldcut did 3 soundtracks as part of the project New City, a series of animated skylines of the near future developed by Tomorrow's Thought Today's Liam Young, with accompanying writing from sci-fi authors Jeff Noon, Pat Cadigan and Tim Maughan. Most recently, Coldcut released Ninja Jamm, a music making app, for Android and iOS, in collaboration with London-based arts and technology firm Seeper. Geared toward both casual listeners and more experienced DJs and music producers, the freemium app allows users to download, remix and make music with samplepacks and tunepacks that feature pro quality sample libraries and also original tracks and mixes by Coldcut, as well as other Ninja artists, creating something new altogether. With the "intuitive yet deep" app, users can turn instruments on and off, swap between clips, add glitches and effects, trigger and pitch-bend stabs and one-off samples, and change the tempo of the track instantly. Users can additionally record as they mix and instantly upload to SoundCloud or save the mixes locally. Tunepack releases for Ninja Jamm are increasingly synchronised with Ninja Tune releases on conventional formats. To date over 30 tunepacks have been released, including Amon Tobin, Bonobo, Coldcut, DJ Food, Martyn, Lapalux, Machinedrum, Raffertie, Irresistible Force, FaltyDL, Shuttle, Starkey. Ninja Jamm was featured by Apple in the New and Noteworthy section of the App Store in the week of release and it received over 100,000 downloads in the first week. Coldcut are developing Ninja Jamm further after the Android release garnered acclaim from the Guardian, Independent, Gizmodo and many more reviewers. On 6 December 2017, BBC Radio 4 broadcast a play, Billie Homeless Dies at the End by Tom Kelly with electronic music by Coldcut. In 2020, Coldcut appeared on the global music/afrobeat album Keleketla! (with artists such as Tenderlonious, Tamar Osborn, Sibusile Xaba, Thabang Tabane and Tony Allen), which was released on their Ahead of Our Time Records label. Discography Albums What's That Noise? (April 1989) - UK No. 20 Some Like It Cold (1990) Zen Brakes [as Bogus Order] (September 1990) Philosophy (1993) Let Us Play! (September 1997) UK No. 33 Let Us Replay! (February 1999) Cold-Cut-Outs (2002) Sound Mirrors (2006) Only Heaven EP (2016) Outside The Echo Chamber [as Coldcut x On-U Sound] (May 2017) Singles Compilations and mix albums ColdKrushCuts — Mixed by Coldcut / DJ Food + DJ Krush (1996) Journeys by DJ — 70 minutes of Madness (1996) People Hold On — The Best of Coldcut (2 February 2004) Coldcut Selection Deal'' References External links Coldcut.net, official site Ninja Tune: Coldcut Interview with Matt Black on R4NT Magazine Interview by Iara Lee (Modulations) at Furious.com English electronic music duos British record production teams Record production duos Male musical duos Musical groups from London Ableton Live users Ninja Tune artists Tommy Boy Records artists Big Life artists
102510
https://en.wikipedia.org/wiki/Eglin%20Air%20Force%20Base
Eglin Air Force Base
Eglin Air Force Base (AFB) is a United States Air Force base in the western Florida Panhandle, located about southwest of Valparaiso in Okaloosa County. The host unit at Eglin is the 96th Test Wing (formerly the 96th Air Base Wing). The 96 TW is the test and evaluation center for Air Force air-delivered weapons, navigation and guidance systems, Command and Control systems, and Air Force Special Operations Command systems. Eglin AFB was established in 1935 as the Valparaiso Bombing and Gunnery Base. It is named in honor of Lt. Col. Frederick I. Eglin who was killed in a crash of his Northrop A-17 attack aircraft on a flight from Langley to Maxwell Field, Alabama. History Creation and World War II Much of the base was part of a National Forest until the outbreak of war in Europe when a proving ground for aircraft armament was established at Eglin. The U.S. Forest Service ceded over 340,000 acres of the Choctawhatchee National Forest to the War Department on 18 October 1940. Eglin Air Force Base evolved from the 1933 creation of the Valparaiso Airport, when an arrowhead-shaped parcel of was cleared for use as an airdrome. In 1931, personnel of the Air Corps Tactical School, newly relocated to Maxwell Field, Alabama, sought a location for a bombing and gunnery range. They saw the potential of the sparsely populated forested areas surrounding Valparaiso and the vast expanse of the adjacent Gulf of Mexico. From October 1941 to October 1945, an AAF Fixed Gunnery School operated at the base, supervised by the 75th Flying Training Wing. At its peak during World War II, the base employed more than 1,000 officers, 10,000 enlisted personnel and 4,000 civilians. Postwar After the war, Eglin became a pioneer in developing the techniques for missile launching and handling; and the development of drone or pilotless aircraft beginning with the Republic-Ford JB-2 Loon, an American copy of the V-1. The 1st Experimental Guided Missiles Group was activated at Eglin Field, Florida, on 6 February 1946, operating out of Auxiliary Field 3. By March 1950, the 550th Guided Missiles Wing, comprising the 1st and 2nd Guided Missile Squadrons, had replaced the 1st Experimental Guided Missiles Group. The 2nd Guided Missile Squadron, SSM, had 62 pilots manning 14 B-17s, three B-29s, and four F-80 Shooting Stars, yellow-tailed drone aircraft used in the role of testing guided missiles. In December 1955, the Air Munitions Development Laboratory was reassigned from the Wright Air Development Center at Wright-Patterson AFB, Ohio, to the Air Force Armament Center at Eglin by Headquarters Air Research and Development Command. The responsibility for development of guns, bombs, rockets, fuses, guided missile warheads and other related equipment in the armament field was transferred from the Dayton, Ohio facility at this time. Work on nuclear weapons was not included in this mission. 1960s The USAF Special Air Warfare Center was activated 27 April 1962, with the 1st Combat Applications Group (CAG) organized as a combat systems development and test agency under the SAWC. The 1st CAG concentrated on testing and evaluation of primarily short-term projects which might improve Air Force counter-insurgency (COIN) operations. The Special Air Warfare Center, located at Hurlburt Field, undertook to develop tactical air doctrine while training crews for special air warfare in places like Southeast Asia. By mid-1963, SAW groups were in Vietnam and Panama. The USAF Tactical Air Warfare Center was activated on 1 November 1963. It would be re-designated as the USAF Air Warfare Center on 1 October 1991. With the increasing U.S. involvement in Southeast Asia in the 1960s, the need for increased emphasis on conventional weapons development made Eglin's mission even more important. On 1 August 1968, the Air Proving Ground Center was redesignated the Armament Development and Test Center to centralize responsibility for research, development, test and evaluation, and initial acquisition of non-nuclear munitions for the Air Force. On 1 October 1979, the center was given division status. The Armament Division, redesignated Munitions Systems Division on 15 March 1989, placed into production the precision-guided munitions for the laser, television, and infrared guided bombs; two anti-armor weapon systems; and an improved hard target weapon, the GBU-28, used in Operation Desert Storm during the Persian Gulf War. The Division was also responsible for developing the Advanced Medium Range Air-to-Air Missile (AMRAAM), an Air Force-led joint project with the U.S. Navy. Late Cold War era The Air Force Armament Museum was founded on base in 1975. In 1981 the original building housing the museum was condemned and the facility closed until 1984. Selected on 27 April 1975, the installation served as one of four main U.S. Vietnamese Refugee Processing Centers operated by the Interagency Task Force for Indochina Refugees, where base personnel housed and processed more than 10,000 Southeast Asian refugees, the first 374 of which arrived on board a Northwest Orient Boeing 747 on 4 May 1975. In 1978, the USAF Tactical Air Warfare Center assumed responsibility for the USAF Air Ground Operations School. In the same year, the Electronic Warfare Evaluation Program became another one of the USAFTAWC's weapons system evaluation programs, and resulted in the activation of the 4487th Electronic Warfare Aggressor Squadron in 1990. Construction began in 1984 on the Bob Hope Village, the only retirement facility that caters to enlisted military, opening in February 1985. Residents pay below market value for the 256 independent apartments. Col. Bob Gates, Bob Hope's USO pilot, was key in getting the comedian's support for the undertaking, as well as lending his name to the project. He was named an honorary board member of the foundation in 1978 and held benefit concerts for nearly two decades. Post Cold War During a 1992 reorganization, the Air Force disestablished Eglin's parent major command, Air Force Systems Command (AFSC) and merged its functions with the former Air Force Logistics Command (AFLC). The newly created major command from this merger, Air Force Materiel Command (AFMC), remains Eglin's parent command to this day. The Development Test Center, Eglin's host unit, became part of AFMC on 30 June 1992. The 46th Test Wing replaced the 3246th Test Wing in October 1992. On 10 August 1994 construction began on the All Conflicts' Veterans War Memorial on the site of the old POW/MIA memorial on the western end of Eglin Boulevard. The memorial was dedicated on 15 August 1995.As part of the military drawdown in the 1990s, the Air Force inactivated the 33d Fighter Wing's 59th Fighter Squadron on 15 April 1999. The wing lost six aircraft and consolidated the remaining aircraft into the 58th and 60th Fighter Squadrons. Originally selected for inactivation in 1997, Air Force officials delayed the decision in recognition of the Nomads' connection with Khobar Towers. The 59th reactivated as the 59th Test and Evaluation Squadron on 3 December 2004, at Nellis Air Force Base, Nevada. The 59th falls under the 53rd Test Management Group at Eglin. In July 2012 the Air Armament Center (AAC) was inactivated. The center had planned, directed and conducted test and evaluation of U.S. and allied air armament, navigation and guidance systems, and commanded and controlled systems. It operated two Air Force installations, providing host support not only to Eglin, but also Kirtland AFB, New Mexico. It had included the Armament Product Directorate (Eglin AFB, FL), the 46th Test Wing (Eglin AFB, FL), the 96th Air Base Wing (Eglin AFB, FL), and the 377th Air Base Wing (Kirtland AFB, NM). The US Navy's VFA-101 "Grim Reapers" deactivated on 23 May 2019 after seven years of F-35C training. Base railroad Initial construction of a railroad line into the region had been discussed as early as 1927 as part of the Choctawhatchee and Northern Railroad, though military-use proposals didn't come forward until 1941. German POWs were used in clearing and grading the alignment during World War II. There was one commercial customer served by the line, a lumber pulp yard at Niceville which is now community athletic fields. The line was later abandoned in the late 1970s and the southern end, west of State Road 285, lifted by the mid-1980s. Role and operations Eglin is an Air Force Materiel Command (AFMC) base serving as the focal point for all Air Force armaments. Eglin is responsible for the development, acquisition, testing, deployment and sustainment of all air-delivered non-nuclear weapons. The base plans, directs, and conducts test and evaluation of U.S. and allied air armament, navigation and guidance systems, and command and control systems. Severe-weather testing of aircraft and other equipment is carried out here at the McKinley Climatic Laboratory. The residential portion of the base is a census-designated place; its population was 8,082 at the 2000 census. Eglin Air Force Base had 2,359 military family housing units. Unmarried junior enlisted members generally live in one of Eglin's seven dormitories located near the dining hall, chapel, base gym, enlisted club, and bus lines on base. Each individual unit generally handles dormitory assignments. Bachelor officer quarters are not available. Several units and one dormitory were being renovated in 2011. The base covers 463,128 acres (1,874.2 km / 723.6 sqm). Major units 96th Test Wing (96 TW) The 96 TW is the test and evaluation wing for Air Force air-delivered weapons, navigation and guidance systems, Command and Control (C2) systems, and Air Force Special Operations Command systems. The Eglin Gulf Test Range provides approximately of over water airspace. The 96 TW supports other tenant units on the installation with traditional military services as well as all the services of a small city, to include civil engineering, personnel, logistics, communications, computer, medical, security. The 96 TW reports to the Air Force Test Center at Edwards AFB. 33d Fighter Wing (33 FW) The 33d FW "Nomads" is the largest tenant unit at Eglin. The 33 FW is a joint graduate flying and maintenance training wing for the F-35 Lightning II, organized under Air Education and Training Command's 19th Air Force. First established as the 33d Pursuit Group, the wing's contribution to tactical airpower during its 50-year history has been significant with participation in campaigns around the world, while flying various fighter aircraft. Reactivated at Eglin on 1 April 1965 with F-4C Phantom IIs, the wing operated, successively, F-4D and E models into the 1970s before transitioning to the F-15 Eagle. As of 1 October 2009, the 33d FW transitioned to a training wing for the new F-35 Joint Strike Fighter (JSF). The final F-15s assigned to the 33d departed the base in September 2009. As the first of its kind in the Department of Defense, the joint wing is responsible for F-35 JSF pilot and maintainer training for the Air Force, Marine Corps and the Navy. The first of 59 F-35s arrived from Fort Worth, Texas on 14 July 2011. 58th Fighter Squadron The 58th FS "Mighty Gorillas" are authorized to operate 24 assigned F-35A aircraft, planning and executing a training curriculum in support of Air Force and international partner pilot training requirements. The F-35A is a conventional-takeoff-and-landing low-observable multi-role fighter aircraft, designed with 5th-generation sensors and weapons, and is able to perform air superiority, air interdiction and close air support missions. The F-35A made its first flight on 15 December 2006. 53d Wing (53 WG) The 53 WG is headquartered at Eglin and serves as the Air Force's focal point for operational test and evaluation of armament and avionics, aircrew training devices, chemical defense, aerial reconnaissance improvements, electronic warfare systems, and is responsible for the QF-4 Phantom II Full Scale Aerial Target (FSAT) program and subscale drone programs (located at Tyndall Air Force Base, Florida). The wing tests every fighter, bomber, unmanned aerial vehicle, and associated weapon system in the Air Force inventory. The wing reports to the USAF Air Warfare Center at Nellis Air Force Base, Nevada, a Direct Reporting Unit (DRU) to Headquarters, Air Combat Command (ACC). 49th Test and Evaluation Squadron Squadron attached to the 53d Wing but located at Barksdale Air Force Base, Louisiana. The squadron plans, executes and reports ACC's weapon system evaluation programs for bombers (B-52, B-1 and B-2) and nuclear-capable fighters (F-15E Strike Eagle and F-16). These evaluations include operational effectiveness and suitability, command and control, performance of aircraft hardware and software systems, employment tactics, and accuracy and reliability of associated precision weapons. These weapons include air-launched cruise missiles, standoff missiles, and gravity bombs. Results and conclusions support acquisition decisions and development of war plans. The unit also performs operational testing on new systems and tactics development for the B-52. Armament Directorate The Armament Directorate, located at Eglin Air Force Base, Fla., is responsible for management of air and ground dominance weapon system programs. Led by the Air Force Program Executive Officer for Weapons, the directorate concurrently reports to the Secretary of the Air Force for Acquisition, Washington, D.C. and the Air Force Life Cycle Management Center, Wright Patterson Air Force Base, Ohio. Air Force Research Laboratory Munitions Directorate (AFRL/RW) AFRL/RW develops, demonstrates, and transitions science and technology for air-launched munitions for defeating ground fixed, mobile/relocatable, air and space targets to assure pre-eminence of U.S. air and space forces. The directorate conducts basic research, exploratory development, and advanced development and demonstrations. It also participates in programs focused on technology transfer, dual-use technology and small business development. 7th Special Forces Group (7th SFG) In 2011, the United States Army's 7th Special Forces Group relocated to a newly constructed cantonment on the Eglin Air Force Base reservation from Fort Bragg, as part of the 2005 Base Realignment and Closure (BRAC) round realigning Fort Bragg. It is tasked with conducting special operations in Latin America. Tenant units Tenant units at an Air Force installation are units which have a mission that is significantly different than that of the host unit, and rely heavily upon the host unit for day-to-day operations (sewer, power, security, recreation). 6th Ranger Training Battalion (6th RTB) Eglin AFB Auxiliary Field No. 6 (Biancur Field) is the site of Camp James E. Rudder and the home of the U.S. Army's 6th Ranger Training Battalion. The 6th RTB conducts the final phase of the U.S. Army Ranger Course. The entire course is 61 days long and is divided into three phases. Each phase is conducted at different geographical and environmental locations. 20th Space Control Squadron (20 SPCS) The mission of the 20 SPCS is to detect, track, identify, and report near earth and deep space objects in earth's orbit, and provide space object identification data in support of United States Space Command's space control mission. A unit of the United States Space Force (USSF), the men and women of the 20th SPCS operate and maintain the AN/FPS-85 radar, the Space Force's only phased-array radar dedicated to tracking earth-orbiting objects. 323 Squadron RNLAF Royal Netherlands Air Force Operational Test and Evaluation squadron, operates 2 F-35A 486th Flight Test Squadron (486th FLTS) This unit, which is apparently not a test squadron at all, operates Boeing C-32Bs in discrete missions for the United States Department of State's Foreign Emergency Support Team. 919th Special Operations Wing (919 SOW) The 919 SOW, located about five miles (8 kilometers) south of Crestview and from Eglin main at Eglin AFB Auxiliary Field No. 3 (Duke Field) and is the only special operations wing in the Air Force Reserve Command (AFRC). In wartime or a contingency, the 919 SOW reports to Air Force Special Operations Command (AFSOC) at Hurlburt Field, Florida, its gaining major command. AFOTEC Det 2 The Air Force Operational Test and Evaluation Center stood up Detachment 2 at Eglin to provide realistic operational testing for new and modified weapon systems. Naval School of Explosive Ordnance Disposal (EOD) The Naval School of Explosive Ordnance Disposal (NAVSCOLEOD) is a Navy-managed command, jointly staffed by Army, Navy, Air Force, and Marine Corps personnel. NAVSCOLEOD opened its new consolidated training facility in April 1999. Joint Deployable Analysis Team (JDAT) Directorate of the Joint Staff, JDAT conducts field analysis of C2 information systems and procedures producing decision-quality data to improve Joint C2 integration and interoperability. Scheduled airline service Eglin is also one of the few military air bases in the U.S. to have scheduled passenger airline service as the Destin–Fort Walton Beach Airport (VPS) is co-located on the base property. Based units Flying and notable non-flying units based at Eglin Air Force Base. Units marked GSU are Geographically Separate Units, which although based at Eglin, are subordinate to a parent unit based at another location. For units permanently based at Eglin's auxiliary airfields, see the airfield's respective page (Biancur Field, Duke Field and Hurlburt Field). United States Air Force Air Force Materiel Command (AFMC) Air Force Test Center 96th Test Wing (Host wing) 96th Cyberspace Test Group 45th Test Squadron 46th Test Squadron 47th Cyberspace Test Squadron 96th Operations Group 40th Flight Test Squadron – A-10C Thunderbolt II, F-15C/D/E Eagle, F-16C/D Fighting Falcon 96th Maintenance Group 96th Mission Support Group 96th Range Group 96th Medical Group Air Force Life Cycle Management Center Armament Directorate Air Force Research Laboratory Munitions Directorate 486th Flight Test Squadron – C-32B Air Education and Training Command (AETC) Nineteenth Air Force 33rd Fighter Wing F-35 Academic Training Center 33rd Operations Group 33rd Operations Support Squadron 58th Fighter Squadron – F-35A Lightning II F-35 Intelligence Formal Training Unit 337th Air Control Squadron 33rd Maintenance Group 33rd Aircraft Maintenance Squadron 33rd Maintenance Operations Squadron 33rd Maintenance Squadron 82nd Training Wing 359th Training Squadron (GSU) Air Combat Command (ACC) US Air Force Warfare Center 53rd Wing 53rd Test and Evaluation Group 85th Test and Evaluation Squadron – F-15C/E Eagle, F-16C/D Fighting Falcon, QF-16C Fighting Falcon Air Force Reserve Command (AFRC) Tenth Air Force 926th Wing 926th Operation Group 84th Test and Evaluation Squadron (GSU) – F-15C/E Eagle, F-16C/D Fighting Falcon Direct Reporting Units (DRU) Air Force Operational Test and Evaluation Center Detachment 2 (GSU) United States Army Special Operations Command (Airborne) (USASOC) 1st Special Forces Command (Airborne) 7th Special Forces Group (Airborne) United States Navy United States Fleet Forces Command (USFF) Navy Expeditionary Combat Command Naval School Explosive Ordnance Disposal United States Space Force Space Operations Command Space Delta 2 20th Space Control Squadron (GSU) Department of Defense Joint Chiefs of Staff (JCS) J6 Directorate (Command, Control, Communications and Computers/Cyber) Joint Deployable Analysis Team Previous names Established as Valparaiso Bombing and Gunnery Base, 14 June 1935 (spelling changed on 1 February 1937 from "Valparaiso" to "Valpariso" and on 1 March 1937 back to "Valparaiso") Eglin Field, 4 August 1937 Eglin Field Military Reservation, 1 October 1940 Eglin Field, 28 December 1944 Eglin Air Force Base, 24 June 1948–present Major commands to which assigned Air Corps Training Center, 9 June 1935 – 27 August 1940 Southeast Air Corps Training Center, 27 August 1940 – 1 April 1942 Also assigned to Commanding General, Fourth Corps Area, United States Army, June 1941-1 April 1942 Chief of the Army Air Corps (Direct subordination), 19 May 1941 – 1 April 1942 AAF Proving Ground Command**, 1 April 1942 – 1 June 1945 AAF Center, 1 June 1945 Re-designated: AAF Proving Ground Command, 8 March 1946 Re-designated: Air Proving Ground Command, 10 July 1946 – 20 January 1948 Air Materiel Command, 20 January 1948 – 1 June 1948 Air Proving Ground, 1 June 1948 Re-designated: Air Proving Ground Command, 20 December 1951 – 1 December 1957 Air Research and Development Command, 1 December 1957 Re-designated: Air Force Systems Command, 1 April 1961 – 1 July 1992 Air Force Materiel Command, 1 July 1992–present ** Discontinued 8 March 1946. Not related to later AAF Proving Ground Command Major units assigned 84th Service Squadron (Detachment), 14 June 1935 Section V, Eglin Field Section, 13th Air Base Squadron, 1 September 1936 Det 13th Air Base Squadron, 1 August 1940 61st Air Base Group, 1 December 1940 – 17 February 1943 Air Corps Specialized Flying School, 1 December 1940 – 1 April 1944 Army Air Forces Proving Ground, 15 May 1941 – 30 June 1946 23d Composite Group Re-designated: 1st Proving Ground Group, 29 June 1941 Re-designated: 610th Army Air Forces Base Unit, 1 April 1944 – 30 June 1947 609th Army Air Forces Base Unit, 1 July 1947 – 1 July 1948 1st Experimental Guided Missiles Group, 6 February 1946 – 1 December 1950 3201st Air Base Group (later Wing), 1 July 1948 – 4 February 1958 3200th Proof Test Group, 1 July 1948 – 1 July 1953 Air Proving Ground Command Re-designated: Armament Division and Test Center Re-designated: Air Armament Center, 1 July 1948 – 18 July 2012 550th Guided Missiles Wing, 20 July 1949 – 11 December 1950 USAF Armament Center, 14 December 1949 – 4 February 1958 3205th Drone Group, 26 April 1950 – 1 February 1961 3200th Proof Test Wing, 1 April 1951 – 1 July 1952 3206th Support Wing, 1 July 1953 – 20 February 1964 3207th Armament testing Systems 17th Bombardment Wing, 1 April 1955 – 25 June 1958 4751st Air Defense Missile Squadron, 15 January 1958 – 30 September 1979 335th Tactical Fighter Squadron, May 1958 – November 1961 4135th Strategic Wing, 1 December 1958 – 1 February 1963 1st Combat Application Group, 17 April 1962 – 5 September 1968 USAF Special Air Warfare Center, 27 April 1962 – 1 July 1974 39th Bombardment Wing, 1 February 1963 – 25 February 1965 USAF Air Warfare Center, 1 November 1963 – 1 October 1995 4485th Test Wing, 16 March 1964 – 30 June 1965 33d Fighter Wing, 1 April 1965 – present 40th Fighter-Interceptor Squadron, 20 June 1965 – 15 October 1970 USAF Armament Laboratory, 1 March 1966 – 18 July 2012 USAF Special Operations School, 15 April 1967 – present 3246th Test Wing, 1 July 1970 – 1 October 1992 919th Special Operations Wing, 30 July 1971 – present 4443d Test and Evaluation Group, 1 July 1988 Re-designated: 79th Test and Evaluation Group, 1 December 1991 – 20 November 1998 46th Test Wing, 1 October 1992 – 18 July 2012 96th Test Wing, 15 March 1994 – present 53d Wing, 1 October 1995 – present 308th Armament Systems Wing, 27 January 2005 – 30 June 2010 Eglin Composite Squadron Civil Air Patrol Eglin auxiliary fields A number of auxiliary fields were constructed on the Eglin reservation during World War II, many of which are still in service in various roles, either in support of flight operations or special test activities. Auxiliary Field 1 (Wagner Field) Work on Auxiliary Field 1 began 27 November 1940. Auxiliary Field 1 is named Wagner Field for Maj. Walter J. Wagner, former commanding officer for the 1st Proving Ground, Eglin Field, who was killed 19 October 1943 in the crash of a Douglas XA-26B, s/n 41-19588, 9 miles east of Eglin Field, Valpariso, FL. Much of the Doolittle Raid and Operation Credible Sport training took place here. The U.S. Navy used the field as an auxiliary facility for pilot training out of Whiting Field for a time, dating from early 1960. A proposal by the National Aeronautics and Space Administration to build a multi-million dollar research installation for testing rocket fuels and components at Field 1 in early 1960 was dropped in mid-February, the chief reason for consideration being abandoned "was the possibility the military would have other uses for the field in the near future." It is also known as Site C-5. Range C-72 extends SE from Wagner Field. Auxiliary Field 2 (Pierce Field) Auxiliary Field 2 is named Pierce Field for Lt. Col. George E. Pierce, killed 19 October 1942 while piloting a North American B-25C-1 Mitchell which crashed into the Gulf of Mexico S of Destin, Florida. Joe Baugher cites date of 19 October 1942 for loss. It is also known as Site C-3. Between November 1966 and 1970, it was the site of the 560th Civil Engineering Squadron, also known as the Civil Engineering Field Activities Center, for the training of RED HORSE personnel. Auxiliary Field 3 (Duke Field) Auxiliary Field 3 is named Duke Field for 1st Lt Robert L. Duke, killed in the crash of a Curtiss A-25A-20-CS Shrike near Spencer, Tennessee, on 29 December 1943. He was assigned as Assistant A-3 of Eglin Field. Used as the set for the fictional 918th Bomb Group in the 1949 film Twelve O'Clock High. Field 3 was long-associated with drone operations of the 3200th and 3205th Drone Groups. Aircraft were "sanitized" (stripped of all identification) here for the failed Bay of Pigs Invasion of Cuba. Auxiliary Field 4 (Peel Field) Auxiliary Field 4 is named Peel Field for 2nd Lt. Garland O. Peel Jr., who died in the take-off crash of a Martin B-12AM of the 387th School Squadron, 2 January 1942, when he suffered engine failure. He was a gunnery school instructor at Eglin. Peel Field was utilized for the filming of scenes for the 1944 film Thirty Seconds Over Tokyo. Wartime temporary housing for NCOs located here was razed in the 1960s. In the early 1960s, while in a moribund state, one of the runways was used as an unofficial auto drag strip by local civilians. The ramp of the non-flight-rated facility now serves as a vehicle park for aircraft and armor after being expended as targets on the Eglin ranges. Auxiliary Field 5 (Piccolo Field) Auxiliary Field 5 is named Piccolo Field for Capt. Anthony D. Piccolo, who died in the crash of a North American AT-6A-NT Texan on 6 October 1942. Piccolo was the commanding officer of the 386th Single Engine Gunnery Training Squadron at Eglin. Today, the area is due north of Field Four and serves as a microwave station. A 60-foot radar antenna was installed here in April 1961. On most base maps, it is identified as Site C-4. Doolittle Raid training was conducted here. Auxiliary Field 6 (Biancur Field) Auxiliary Field 6 is named Biancur Field for 1st Lt. Andrew Biancur, a test pilot of the Medium Bombardment Section of the 1st Proving Ground Group, killed 8 January 1944 in the crash of a Northrop YP-61-NO Black Widow at Eglin Field. The U.S. Army Ranger facility Camp Rudder is located here. It is designated Site B-6. The X-43A-LS low-speed demonstrator underwent testing out of Auxiliary Field 6 in November 2003. Auxiliary Field 7 (Epler Field) Auxiliary Field 7 is named Epler Field for Col. Robin E. Epler, deputy commander (Technical) of the Air Proving Ground Command, Eglin Field, Florida, killed 28 January 1944 in the crash of a Douglas A-20G-10-DO Havoc NE of Crestview, Florida. It is designated Site B-12. Auxiliary Field 8 (Baldsiefen Field) Auxiliary Field 8 is named Baldsiefen Field for 2nd Lt. Richard Edward Baldsiefen, a gunnery instructor at Eglin, killed 4 March 1942 along with Lt. John W. Smith, in the crash of a North American AT-6A-NA Texan which came down at Auxiliary Field 4. It is designated Site C-52C. Auxiliary Field 9 (Hurlburt Field) Auxiliary Field 9 is named Hurlburt Field for Lt. Donald Wilson Hurlburt, killed 1 October 1943 when his Lockheed AT-18-LO Hudson gunnery trainer crashed during take-off at Eglin. After flying Boeing B-17 Flying Fortress combat missions from Great Britain and receiving the Distinguished Flying Cross (DFC), Hurlburt was assigned in mid-1943 to the First Proving Ground Electronics Test Unit at Eglin Field. Field 9 was named in his honor by base commander General Grandison Gardner. Hurlburt's nephew was Captain Craig D. Button (noted for his mysterious flight and crash of an A-10 Thunderbolt on 2 April 1997). An official history of Eglin AFB's early years cites 2 October 1943 as the date of this accident. Auxiliary Field 10 (Dillon Field) Auxiliary Field 10 is the westernmost of the wartime Eglin airfields, located in Santa Rosa County, and is named Dillon Field for Capt. Barclay H. Dillon, test pilot of the Fighter Section of the 1st Proving Ground Group, killed 2 October 1943 when his Lockheed P-38J-5-LO Lightning crashed W of Milton, Florida. Field 10 was later named Eglin Dillon Airdrome. Now used primarily for U.S. Navy basic flight training, the Navy refers to it as Naval Outlying Landing Field Choctaw (NOLF). It is also used for Unmanned Aerial Vehicle [UAV] training, and it is expected that F-35 Lightning IIs assigned to the 33d Fighter Wing at Eglin Air Force Base will utilize NOLF Choctaw for training. Auxiliary Field 11 is an unconfirmed name for a RED HORSE unsurfaced east–west airstrip that shows up on Google Earth in Walton County. The Santa Rosa Island Range Complex is part of the Eglin overwater range that provides 86,500 square miles of overwater airspace that is jointly used for a variety of test and evaluation activities and training exercises. Demographics Eglin employs more than 8,500 civilians and approximately 4,500 military, with an additional 2,200 jobs due to move to Eglin under the 2005 BRAC. As of the census of 2000, there were 8,082 people, 2,302 households, and 2,262 families residing on the base. The population density was 2,640.1 people per square mile (1,019.8/km). There were 2,320 housing units at an average density of 757.9/sq mi (292.7/km). The racial makeup of the base was 71.8% White, 14.8% Black or African American, 0.5% Native American, 3.0% Asian, 0.4% Pacific Islander, 4.2% from other races, and 5.3% from two or more races. Hispanic or Latino of any race were 11.2% of the population. There were 2,302 households, out of which 79.8% had children under the age of 18 living with them, 89.8% were married couples living together, 5.2% had a female householder with no husband present, and 1.7% were non-families. 1.6% of all households were made up of individuals, and 0.0% had someone living alone who was 65 years of age or older. The average household size was 3.50 and the average family size was 3.51. On the base the population was spread out, with 43.5% under the age of 18, 15.2% from 18 to 24, 39.6% from 25 to 44, 1.6% from 45 to 64, and 0.1% who were 65 years of age or older. The median age was 22 years. For every 100 females, there were 100.6 males. The median income for a household on the base was $31,951, and the median income for a family was $31,859. Males had a median income of $25,409 versus $19,176 for females. The per capita income for the base was $10,670. About 4.5% of families and 4.5% of the population were below the poverty line, including 4.5% of those under the age of 18 and none of those 65 and older. National historic status There are two U.S. National Historic Landmark Districts with connections to the base: Camp Pinchot and Eglin Field. On 6 October 1997, the McKinley Climatic Laboratory was added to the U.S. National Register of Historic Places. Notable residents Author Hunter S Thompson was stationed on Eglin from 1956 until 1958 during his enlistment with the Air Force. Infielder Jay Bell was born in the base hospital in 1965. NASCAR Cup Series driver Aric Almirola was born in Eglin in 1984. John Boyd, USAF officer and military strategist who developed the Energy–maneuverability theory while stationed at Eglin. Eglin AFB in pop culture Movies that have been filmed in part at Eglin Air Force Base or its outlying auxiliary airfields, Thirty Seconds Over Tokyo in 1944, Twelve O' Clock High in 1949, On the Threshold of Space in 1955 and Search for Paradise in 1956. Thirteen airmen assigned to the 48th Recovery Squadron played a part in the James Bond movie Thunderball. The airmen, all highly skilled paratroopers, assisted in a sky diving scene filmed in Miami Beach. They jumped out of an HC-97 in Biscayne Bay at an altitude of 1,500 feet. A quote from TSgt Lewis Roberts said, "We played the good guys and were helping James Bond destroy the villains who were about to blow up the East Coast." Several Tom Clancy novels refer to "raking the sand traps on the officers' golf course" at Eglin as a common activity for low-security prisoners at the associated Federal Prison Camp, Eglin, now closed. F-15 Eagles from Eglin's 33rd Fighter Wing, 59th Fighter Squadron, were used in the filming of the 1997 movie Air Force One. Eglin AFB appears as the default airport in the simulation software Prepar3D. Environment Flora and fauna The forests and shores of Eglin Air Force Base are at the center of one of the most biodiverse locations in North America. Over 50 species threatened in Florida are found on the base, including sea turtles that nest on its white-sand beaches and red-cockaded woodpeckers that thrive in its longleaf pine forests. The base has a natural resources management team that constantly monitors important species within the base with the goal of balancing their national defense mission with environmental stewardship. Longleaf pine forest, a forest type reduced to 5% of its former range in the last few centuries, covers of the base. Part of this forest, , is old growth, making the base home to one of the most extensive old-growth longleaf pine forests in the world. Climate Warm, subtropical weather lasts longer than the average summer. The annual precipitation ranges from . Year-round, the average temperatures run: January – March: 60–69 High and 42–51 LowApril – June: 76–88 High and 58–72 LowJuly – September: 86–98 High and 70–77 LowOctober – December: 63–79 High and 44–69 Low The area gets only 50 to 60 days of annual precipitation or more rainfall. There are few days without sunshine, which allows year-round outdoor activities. Noise In order to deal with the high noise levels of the Lockheed Martin F-35 Lightning II, officials from Santa Rosa, Okaloosa and Walton counties are studying which homes, businesses and public buildings will require additional noise protection. Civil rocketry Eglin Air Force Base was also a launch site for civil rockets of NASA. There are three launch pads: one at 29.6700 N, 85.3700 W at Cape San Blas; and two on Santa Rosa Island at 30.3800 N, 86.7400 W and 30.3800 N, 86.8170 W. Rockets launched here have included Arcas, Nike Cajun, Nike Apaches, and Nike Iroquois. This site was formerly operated by the 4751st ADMS with CIM-10 Bomarcs, which inactivated in 1979. In the 1940s, captured V-1 flying bombs and American copies, Republic-Ford JB-2 LOONs, were launched out over the Gulf of Mexico from these sites. Two concrete launch ramps were placed on the National Register of Historic Places in 1996. A rusting Loon launch ramp still exists at Auxiliary Field 1, Wagner Field. Eglin is known to have been used for 441 launches from 1959 to 1980, reaching up to 686 kilometers altitude. See also Air Force Armament Museum Camp Pinchot Historic District Choctawhatchee National Forest Destin–Fort Walton Beach Airport – co-located with Eglin AFB Federal Prison Camp, Eglin Florida World War II Army Airfields List of aircraft accidents at Eglin Air Force Base List of United States Air Force installations Rocket launch sites Notes References Angell, Joseph W., "History of the Army Air Forces Proving Ground Command – Part One – Historical Outline 1933–1944", The Historical Branch, Army Air Forces Proving Ground Command, Eglin Field, Florida, 1944, reprint by Office of History, Munitions Systems Division, Eglin AFB, Florida, 1989 Knaack, Marcelle Size (1978) Encyclopedia of US Air Force Aircraft and Missile Systems, Vol. 1, Post-World War Two Fighters, 1945–1973. Washington, DC: Office of Air Force History, 1978. Knaack, Marcelle Size (1988) Post-World War II Bombers, 1945–1973. Washington, DC: Office of Air Force History, 1988, Maurer, Maurer. Air Force Combat Units of World War II. Washington, DC: U.S. Government Printing Office 1961 (republished 1983, Office of Air Force History, ). Ravenstein, Charles A. Air Force Combat Wings Lineage and Honors Histories 1947–1977. Maxwell Air Force Base, Alabama: Office of Air Force History 1984. . Mueller, Robert, Air Force Bases Vol. I, Active Air Force Bases Within the United States of America on 17 September 1982, Office of Air Force History, 1989 Martin, Patrick, Tail Code: The Complete History of USAF Tactical Aircraft Tail Code Markings, 1994 USAAS-USAAC-USAAF-USAF Aircraft Serial Numbers—1908 to present Shaw, Frederick J. (2004), Locating Air Force Base Sites History's Legacy, Air Force History and Museums Program, United States Air Force, Washington DC, 2004. Manning, Thomas A. (2005), History of Air Education and Training Command, 1942–2002. Office of History and Research, Headquarters, AETC, Randolph AFB, Texas ASIN: B000NYX3PC Pfau, Richard A., and Greenhalgh Jr., William H., "The Air Force in Southeast Asia: The B-57G Tropic Moon III 1967–1972", Office of Air Force History, Headquarters USAF, 1978 * External links ElginLife.com – 96th Force Support Squadron The Library of Congress Prints and Photographs Division (Hangar No. 1) The Library of Congress Prints and Photographs Division (Storehouse & Company Administration) The Library of Congress Prints and Photographs Division (Motor Repair Shop) Eglin AFB 1935 establishments in Florida Buildings and structures in Okaloosa County, Florida Census-designated places in Okaloosa County, Florida Military installations in Florida Strategic Air Command military installations Initial United States Air Force installations Civilian Conservation Corps in Florida Census-designated places in Florida
67597955
https://en.wikipedia.org/wiki/Lycon%20%28mythology%29
Lycon (mythology)
In Greek mythology, Lycon (Ancient Greek: Λύκων or Λυκῶνα Lykon; gen.: Λύκωνος means 'wolf') or Lyco (; λύκοι); may refer to the following personages: Lycon, the "bold" satyr leader who joined the army of Dionysus in his campaign against India. Lycon, an Achaean warrior who participated in the Trojan War. He was slain by the Trojan prince Deiphobus, son of King Priam. The latter slew Lycon with a lance which pierced him close above the groin making his bowels gushed out. Lyco, a Trojan soldier who fought during the siege of Troy. He was killed by Peneleus, a Boeotian leader. The latter and Lyco rushed together with their spears but had missed the other and they rushed again together with their swords. Then, Lyco let drive upon the horn of the helm with horse-hair crest, and the sword was shattered at the hilt. The Boeotian smote him upon the neck beneath the ear, and all the blade sank in, so that nothing but the skin held fast, and the head hung to one side, and his limbs were loosed. Lycon, another Trojan warrior who defended the city of Ilium. He died at the hands of the Cretan leader, Meriones. Notes References Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. . Online version at the Perseus Digital Library. Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. . Greek text available at the Perseus Digital Library. Nonnus of Panopolis, Dionysiaca translated by William Henry Denham Rouse (1863-1950), from the Loeb Classical Library, Cambridge, MA, Harvard University Press, 1940. Online version at the Topos Text Project. Nonnus of Panopolis, Dionysiaca. 3 Vols. W.H.D. Rouse. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1940-1942. Greek text available at the Perseus Digital Library. Quintus Smyrnaeus, The Fall of Troy translated by Way. A. S. Loeb Classical Library Volume 19. London: William Heinemann, 1913. Online version at theio.com Quintus Smyrnaeus, The Fall of Troy. Arthur S. Way. London: William Heinemann; New York: G.P. Putnam's Sons. 1913. Greek text available at the Perseus Digital Library. Achaeans (Homer) Characters in Greek mythology
62280221
https://en.wikipedia.org/wiki/United%20States%20v.%20Kane
United States v. Kane
United States v. Kane, No 11-mj-00001 (D. Nev. filed Jan. 19, 2011), is a court case where a software bug in a video poker machine was exploited to win several hundred thousand dollars. Central to the case was whether a video poker machine constituted a protected computer and whether the exploitation of a software bug constituted exceeding authorized access under Title 18 U.S.C. § 1030(a)(4) of the Computer Fraud and Abuse Act (CFAA). Ultimately, the Court ruled that the government’s argument failed to sufficiently meet the “exceeding authorized access” requirement of Title 18 U.S.C. § 1030(a)(4) and granted the Defendants’ Motions to Dismiss. This case is noteworthy because it followed the precedent established by the Ninth Circuit’s decision in United States v. Nosal, 676 F.3d 854 (9th Cir.2012) (en banc), with the magistrate calling the government’s argument directly analogous to the government’s argument in Nosal, further asserting that the CFAA does not regulate the way individuals use the information they are otherwise authorized to access. Background In early April 2009, John Kane discovered a software bug in a video poker game which, following a “complex combination of game changes, bill insertions and cash outs”, would allow him to access previous winning hands and trigger a jackpot. Following this discovery, Kane then contacted Andre Nestor who flew out to meet Kane and joined him in exploiting this bug for profit. The two continued this for nearly five months, from April 2009 to September 2009. Suspicions were raised on July 3, 2009, when Kane won five jackpots, each with 820-1 odds, in under an hour at the Silverton Casino Lodge. Following this, two engineers from Nevada’s Gaming Control Board were called in to inspect the machine for foul play. Here, having analyzed the machine’s logic tray and EEPROM, the engineers discovered the previously unknown firmware bug which Kane had been exploiting to win the jackpot payouts. Subsequently, both Kane and Nestor were later arrested and charged with conspiracy to commit wire fraud and violating Title 18 U.S.C. § 1030(a)(4) of the CFAA on allegations that they exceeded authorized access to a protected computer in furtherance of fraud. Court findings Following their Indictment, the Defendants filed a Motion to Dismiss, moving the Court to dismiss the charges alleging violations under Title 18 U.S.C. § 1030(a)(4), arguing that “even accepting all of the Government’s factual allegations as true, the Government has failed to state a cognizable offense under the law.” The Court sided with this Motion to Dismiss, concluding that the Defendants had not violated Title 18 U.S.C. § 1030(a)(4), for a video poker game does not constitute a protected computer under 18 U.S.C. § 1030(e)(2)(B) nor did their actions exceed authorized access under 18 U.S.C. § 1030(e)(6). Protected computer Computer Addressing the Defendants claim that video poker machines are not “protected computers”, the Court first defined a computer to having the meaning given by 18 U.S.C. § 1030(e)(1) (the Computer Fraud and Abuse Act), which states a computer is an:“electronic, magnetic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device” Kane, in his reply, argued that due to their lack of keyboards, network connection, and ability to read or accept new information, video poker machines should thereby be excluded from this provision, highlighting 18 U.S.C. § 1030(e)(1) which continued to state that:“such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device.” However, whilst the Court acknowledged the exceptions listed in this provision, the Court argued that video poker machines are not “sufficiently similar” to an automated typewriter or typesetter or a portable hand held calculator to qualify for exclusion. Consequently, the Court held that the video poker machines perform functions that directly align it with what constitutes a computer under 18 U.S.C. § 1030(e)(1). Protected computer Having concluded that video poker machines are computers, the Court then sought to address the Defendants claim that such machines are not “protected computers”. To do this, the Court called upon 18 U.S.C. § 1030(e)(2)(B), which defined a protected computer as:“[a computer] which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States”The arguments were as follows: The Defendants, citing National City bank, N.A. v. Prime lending, Inc., argued that because the video poker machines lacked the ability to connect to the internet, they are not protected computers. However, the Government, citing U.S. v. Mitra, 405 F.3d 492 (7th Cir. 2005), reasoned that while internet connectivity is sufficient in establishing a computer as a protected computer, it is not required. Addressing this, Kane noted how critical to the Seventh Circuit’s holding in Mitra was the issue of having operated in a medium of interstate commerce that was within a federally regulated domain. Thus, he argued, Mitra is not applicable to this case, for video poker machines are not subject to federal regulation. [6] The Government refuted this claim, arguing that the Gambling Devices Act of 1962 (15 U.S.C. § 1171-78) subjugated these devices to federal regulation, therefore they operate within the same regulated domain. The Government argued that, due to the video poker machines “attracting customers from all over the country to Las Vegas” to play them, they thereby affect interstate commerce. In its ruling, the Court held the following: The Court sided with the Government in that internet access is not the only way to constitute a computer as a protected computer. The Court sided with the Defendant for, unlike the radio system in Mitra, a video poker machine has no such capability to transmit, receive, or otherwise communicate information across state lines. Additionally, the Court rejected the Government’s Gambling Devices Act applicability argument, declaring it invalid as this act functioned to merely regulated the shipping and transportation of these devices. Thus, “the machines themselves do not function within those channels as anything more than cargo”. The Court held that the Government’s argument of affecting interstate commerce through the attraction of customers fails for two reasons: This proposed effect only holds in the aggregate, as the Government cannot show an individual video poker machine to have such an effect on interstate commerce. The basis of this argument derives from having “divorce[d] the function of the device, i.e. logical, arithmetic, or storage functions, from its supposed effects in interstate commerce.” Emphasizing the need for a more “tangential relationship to interstate commerce”, the Court concluded that the video poker machines failed to constitute protected computers as doing so would “result in an unacceptably broad application of the term”. Exceeds authorized access Access To address the Defendant’s claim of not having exceeded authorized access the Court first held that the Defendants, due to them having physically "interacted with the video poker machines in the manner for which they were designed", had accessed the video poker machine. Exceeds authorized access Subsequently, the Court defined the term exceeds authorized access using 18 U.S.C. § 1030(e)(6) which defines the term as:“[accessing] a computer with authorization and to use such access to obtain or alter information in the computer that the accessor is not entitled so to obtain or alter”.With the Defendants actions allowing them to obtain previously played hands, the Government argued that they had subsequently “obtain[ed] or altered information” that they were not authorized to access, thereby exceeding their authorized access. However, with the Government having conceded that the Defendants were authorized to play video poker, the Court disagreed with the Government’s claim, as it effectively sought to criminalize the way the Defendants played the game. Citing the Ninth Circuit’s opinion in United States v. Nosal, 676 F.3d 854 (9th Cir. 2012), the Court ruled that the “CFAA does not regulate the way individuals use the information which they are otherwise authorized to access” as such an application of CFAA would “transform whole categories of otherwise innocuous behavior into federal crimes simply because a computer was involved”. Resultantly, the Court held that the Defendants did not exceed their authorized access. Ruling Having affirmed that the video poker machines failed to constitute protected computers and that the Defendants actions failed to constitute exceeding authorized access, the Court concluded that the Defendants’ Motion to Dismiss charges under Title 18 U.S.C. § 1030(a)(4) should be granted. See also Computer Fraud and Abuse Act United States v. Nosal References United States computer case law
11182913
https://en.wikipedia.org/wiki/William%20H.%20Turner%20Technical%20Arts%20High%20School
William H. Turner Technical Arts High School
William H. Turner Technical Arts High School, commonly referred to as Turner Tech, is a secondary technical school located at 10151 NW 19th Avenue in West Little River, unincorporated Miami-Dade County, Florida. Turner Tech is located behind Miami Central High School. According to US news (Best High Schools), William H. Turner Technical Arts High School is ranked #2574 in the National Rankings and earned a silver medal. As of July 21, 2017, Turner Tech's principal is Uwezo Frasier. The school is ranked as a "B" school and is part of the Miami Dade Public Schools magnet program. History Turner Tech was founded in 1993 and was named after William H. Turner, former chairperson of the Miami-Dade County School Board and a former member of the Florida State Legislature. Turner, along with Roger C. Cuevas (a former Miami-Dade County Public Schools Superintendent), had a dream to construct a school that would provide academic and technical skills to prepare youth for the 21st century. Turner Tech operates as a small high school, with approximately 1,800 students. Academies Turner Tech is a technical school that teaches students skills for their chosen program. Turner Tech is one of the first high schools to separate each job criteria in different branches. Students work in groups within each academy. The academies are: Academy of Criminal Justice (CJ) Academy of Entertainment Technology (AET) Academy of Business Finance (ABF) Academy of Information Technology (AOIT) Academy of Medical Science (AMS) Academy of Veterinary Science & Agricultural Technology (VSAT) Academy of Instructional Research (AIR) The academic course is integrated into the career major the student has chosen. Students chose a career academy during their freshman year. By successfully completing a sequence of technical courses, they gain certification(s) in one or more related careers. All students assemble an active career portfolio, which includes examples of their individual work. Under each academy, students participate in hands-on experiences in actual workplaces and school-based interests. For each academy there is a different shirt and different color. The corresponding colors are: Academy of Entertainment Technology: Black Academy of Medical Sciences: Navy Blue Academy of Veterinary Science and Agricultural Technology: Forest Green Academy of Information Technology and Entrepreneurship: Royal Blue Academy of Criminal Justice: Gray Academy of Business and Finance: Burgundy Demographics The student body makeup is 33% male and 67% female, and the total minority enrollment is 99%. Turner Technical Arts High School is 86% Black, 9% Hispanic, 2% White, and 3% other. AET The Academy of Entertainment Technology focuses on television broadcasting and production, and, most importantly, creativity. AET gets footage for films, edits films, makes news broadcasts, and creates a variety of independent movies to submit to competitions. AET is divided into two different sub-categories: Film and Television Production. AET's Skills USA is where students compete with what they've learned. The students compete with other schools on speed editing, broadcasting, and script making. AET used to include Diesel Technology, Turner Tech's only automotive program. Although Diesel Technology was the only AET program to win VICA competitions at the time it was cut from the school in the middle of the school year of 2003–2004. This prompted all the "Diesel Boys" to join other programs, which shared little to no relation. Most either stayed in AET or transferred to Agriscience. AMS The Academy of Medical Sciences at Turner Tech provides an excellent education for high school students who want to make a difference in the ever-advancing and demanding field of health care. The academy's programs provides several diverse career paths which prepares students for employment or advanced training in the health industry for a wide variety of medical professions with job-related training and a solid academic curriculum including National Industry certification. Students receive hands-on training in Turner Tech's well-equipped training labs and classrooms with pediatrics and human patient simulators. They serve as interns at healthcare sites, such as hospitals, laboratories, medical offices, pharmacies, and medical libraries. Students attending the Medical Academy can earn much more than grades and a high school diploma; they can also receive college credit and industry-recognized certification in more than one field. The Medical Academy offers students the opportunity to join national professional organizations, such as HOSA-Future Health Professionals. Turner Tech HOSA, the Career Technical Student Organization HOSA-Future Health Professionals chapter at Turner Tech, boasts one of the largest membership counts in the national organization. The organization gives its members the opportunities to compete in a myriad of competitions that span the breadth of the health occupations field, and provides its members the opportunity to lead the organization at regional, state, and national levels. The Academy of Medical Sciences provides its students with seven programs including the new Advanced Medical Sciences Program, which simulates the rigors and academic intensity of medical school and a top-level medical career. The program is highly selective and candidates must go through an application and interview process, in an effort to secure one of 25 seats. VSAT The Agriscience Academy, or Ag for short, encourages students to play a role in society that deals with agriculture such as livestock and horticulture. In the Animal Science and Services program, students handle livestock such as cattle, in order to better understand the meat industry as well as the veterinary field of large animals. Animals include pigs, sheep, steers and breeding cattle. Students also attend local fairs like the Miami-Dade County Fair and the State Fair in Tampa. In order for this to be possible, the students have to join FFA or Future Farmers of America. FFA allows students to learn leadership skills and parliament procedures. Tractor driving and Speech are also part of the FFA. Students spend about 3 to 10 months (including weekends, holidays, and no-school days) taking care of several SAE projects. The students exercise, bathe, and feed the animals. They also clean the animals' pens. After that, the students take the animals to local fairs. There, the students exhibit the animals to their potential using various equipment. Some competitions have included Showmanship, Fitting and Grooming, and Market. The FFA students compete with each other and other FFA or 4H students of other agricultural schools in Florida, depending on the location of the fair. As soon as the fairs are over, the students must leave their animals because they raised the animals for meat; the animals are then sent to slaughter. Here are more information about the animals the students nurture: Pigs: usually one of the first animals, along with lambs, that the students raise in their first year. Swine are very intelligent and very excited animals. They can range from 180 pounds to 250 pounds. The male pigs come castrated when the students purchase their hogs. The breed normally used are Yorkshire crosses and Hampshire crosses. Lambs: usually one of the first animals that students raise as their first SAE project. Lambs are the most vulnerable projects in the Ag. Academy. They are easily killed by dogs. Students learn to castrate male lambs, and learn to shear the sheep, taking the wool off the animal with a pair of clippers. Steers: a castrated bull calf that ranges from 8 months to 2 years old. These animals are usually given to the juniors and seniors of the program. Students can have up to two of these animals. Steers range from 850 pounds to 1250 pounds or higher. Students learn to "halterbreak" or having the animal accustom to a halter and the students themselves. Steers range in different personalities. Some like to ram and kick any student that comes near; others are either gentle or timid but easy to work with. The steers are the most costly animals. They usually cost between $500 to $1,000. Students receive their steers from Florida ranches. The academy also offers a veterinary assisting course, in which students raise poultry, goats, rabbits, and guinea pigs. Unlike the animal science animals, these animals are not sold for market, so the students that buy animals can keep them if they choose after the fair. The students compete every year at the Miami-Dade Fair in showmanship, breed i.d., fitting and grooming, and shows (where the animal may place, or get special awards like best of breed and best in show). CJ The Academy of Public Service is divided into two different divisions, Criminal Justice and Teachers Assistants. Both academic programs are joined in yearly competitions against other schools in the Florida Public Service Association (FPSA). Currently Day Dawning Rawls oversees the Criminal Justice Program for the high school students and helps advance their fields in the Criminal Justice program, as does Eric G. Clayton. The Criminal Justice Program offers many opportunities for high school seniors, from internships with the Miami-Dade Correctional Facility to becoming a City of Miami or a City of North Miami Beach police explorer. The Public Service is one of the best academies for students ready to take on the Criminal Justice or Teacher Assistant fields. AOIT The Academy of Information Technology (AOIT) is for students who wish to enter the job field with knowledge of current technology. Students learn basic skills necessary to qualify for entry-level positions in the job market. Eventually, they move to advanced programs such as the Adobe and Microsoft Suite. At the end of their freshman year, the students may choose to pursue a program of study in digital design, entrepreneurship, or web design. Once students become proficient, the academy provides them with opportunities to apply their skills and enables them to interact with business leaders within the community through job shadows, mentorships, internships, and on-the-job training. The AOIT Academy is certified by the National Career Academy Coalition and is also certified under the Career and Profession Education Act, offering students industry certification in Adobe Photoshop, Dreamweaver, Flash, and Microsoft Office Specialist. Entrepreneurship: This field teaches students how to run their own business and apply acquired business skills to real-life scenarios. Each year, the Entrepreneurship Business Expo tests students' ability to use their skills to create ideas and sell them in a simulated environment. Students plan and design their own business plans, then put their knowledge to use in marketing and selling their product or services as they garner a hands-on experience useful for preparing them for the real world challenges and risks of entrepreneurship. Digital Design: In this field students are taught how to create layouts, design their own banners, posters, covers, edit images with advanced tools, and acquire an artistic appreciation through technology. Students are introduced to graphic art and image editing through the use of specific software such as Adobe InDesign, Photoshop, and Illustrator. The course is dually productive; it teaches students to be proficient in editing through computers and to develop a perspective in art. Web Design: In this program of study, students learn to create web pages/sites that are interesting, informative, and visually appealing. They also develop the skills necessary to deal with a dynamic and fast-changing workplace. Web Design students learn to become knowledgeable with the Internet and Web software such as Adobe Dreamweaver and Flash. Students then have the opportunity to apply these skills as they design web pages for actual businesses within the community. ACAD The Academy of Civil Engineering and Architectural Design. An upcoming academy that's open for enrollment for incoming freshmen students. Success Turner Tech was recognized as one of America's top 10 New American High Schools in an awards course sponsored by Business Week and McGraw-Hill Educational and Professional Publishing Group in cooperation with the National Center for Research in Vocational Education and the Office of Vocations and Adult Education, U.S. Department of Education. The United States Department of Education with the Big Picture Company, funded by the School to Work Opportunities Act of 1994, identified Turner Tech as one of five urban high schools on the cutting edge of education reform. The American Federation of Teachers highlighted Turner Tech as one of five national models of school restructuring which focus on helping students reach high academic standards and prepare for good jobs. In 1999–2000, Turner Tech became one of the only 10 New Millennium High Schools in the state of Florida. In 2006, Steve Pierre helped Turner Tech be selected as one of the winners of the Got Milk? Healthiest Student Bodies Contest. Got Milk received nearly 1,500 contest entries from schools across the country and a panel of judges selected Turner Tech as one of the top 50 Healthiest Student Bodies in the nation. Turner Tech received a $1,000 grant to fund health, wellness, PE and fitness and nutrition programs. References https://www.usnews.com/education/best-high-schools/florida/districts/miami-dade-county-public-schools/william-h-turner-technical-arts-high-school-4862 External links William H. Turner Technical Arts High School High schools in Miami-Dade County, Florida Public high schools in Florida Miami-Dade County Public Schools Magnet schools in Florida
36670576
https://en.wikipedia.org/wiki/ProFTPD
ProFTPD
ProFTPD (short for Pro FTP daemon) is an FTP server. ProFTPD is Free and open-source software, compatible with Unix-like systems and Microsoft Windows (via Cygwin). Along with vsftpd and Pure-FTPd, ProFTPD is among the most popular FTP servers in Unix-like environments today. Compared to those, which focus e.g. on simplicity, speed or security, ProFTPD's primary design goal is to be a highly feature rich FTP server, exposing a large amount of configuration options to the user. Supported platforms AIX BSD/OS DG/UX Digital Unix FreeBSD HP/UX IRIX Linux for IBM S/390, zSeries Linux Mac OS X NetBSD OpenBSD SCO Solaris SunOS Windows (via Cygwin) Configuration and features ProFTPD includes a number of options that are not available with many other FTP daemons. The configuration of ProFTPD is performed in a single main configuration file called /etc/proftpd/proftpd.conf. Due to its similarities to the configuration file of Apache HTTP Server it is intuitively understandable to someone who uses this popular web server. Some of the most noticeable features are: Per directory ".ftpaccess" configuration similar to Apache's ".htaccess" Multiple virtual FTP servers and anonymous FTP services Runs either as a stand-alone server or from inetd/xinetd, depending on system load Anonymous FTP root directories do not require any specific directory structure, system binaries or other system files No SITE EXEC command, which in modern Internet environments represent a security issue Hidden directories and files, based on Unix-style permissions or user/group ownership Runs as a configurable non-privileged user in stand-alone mode in order to decrease chances of attacks which might exploit its "root" abilities Logging and utmp/wtmp support. Shadow password suite support, including support for expired accounts Modular design, allowing server to be extended easily with modules. Modules have been written for SQL databases, LDAP servers, SSL/TLS encryption, RADIUS support, etc. IPv6 support Graphical user interface ProFTPD comes with a command-line interface (CLI) only, but there are several third-party Graphical user interfaces (GUI) existing for ProFTP for users who prefer this to the CLI, or like to use a combination of both. Especially when it comes for example to real-time monitoring of current user actions and file transmissions, a GUI can be very helpful and superior to the CLI. Some existing GUIs for ProFTPD are (selection): GAdmin-ProFTPD, a GTK+ front end for GNOME and KDE, as a part of the GAdmintools collection ProFTPD Admin ProFTPD PHP/MySQL administration tool ProFTPD Administrator See also FTP server Comparison of FTP server software List of FTP server software List of SFTP server software References External links Official website An overview of existing GUIs for ProFTPD French tutorial for install ProFTPD with Debian Linux FTP server software Free server software Free file transfer software FTP server software for Linux Unix Internet software
5120647
https://en.wikipedia.org/wiki/Moonlight%20Maze
Moonlight Maze
Moonlight Maze was a 1999 US government investigation into a massive data breach of classified information. It started in 1996 and affected NASA, the Pentagon, military contractors, civilian academics, the DOE, and numerous other American government agencies. By the end of 1999, the Moonlight Maze task force was composed of forty specialists from law enforcement, military, and government. The investigators claimed that if all the information stolen was printed out and stacked, it would be three times the height of the Washington Monument, which is tall. The Russian government was blamed for the attacks, although there was initially little hard evidence to back up the US accusations besides a Russian IP address that was traced to the hack. Moonlight Maze represents one of the first widely known cyber espionage campaigns in world history. It was even classified as an Advanced Persistent Threat (a very serious designation for stealthy computer network threat actors, typically a nation state or state-sponsored group) after two years of constant assault. Although Moonlight Maze was regarded as an isolated attack for many years, unrelated investigations revealed that the threat actor involved in the attack continued to be active and employ similar methods until as recently as 2016. Methods of attack The hack began with the hackers building "back doors" through which they could re-enter the infiltrated systems at will and steal further data; they also left behind tools that reroute specific network traffic through Russia. Everything they exploited during the attacks came from publicly available resources, not their own creation. In most cases, the exploits were discovered by system administrators with the intention of informing others of the vulnerabilities present in their own systems, but were instead manipulated for malicious purposes. The hackers found success since software manufacturers and maintainers were not vigilant about making sure there were no flaws in their systems. They would leave known vulnerabilities unpatched for long periods of time, sometimes as long six months to a year, neglecting any security patch cycles. This was because prior to Moonlight Maze, no-one was aware of the damage that could be done through cyber attacks since the internet was still relatively new. As a result, they were extremely vulnerable and not very difficult to infiltrate, resulting in one of the largest data breaches of classified information in history. In order to conceal their location and throw off investigators, the hackers relayed their connection through various vulnerable institutions like universities, libraries, and more since the servers they hacked could only see the last location they routed through (called proxying). Outcome and impact Describing the attack in testimony before Congress, James Adams, CEO of Infrastructure Defense Inc, warned that "the information was shipped over the Internet to Moscow for sale to the highest bidder" and that "The value of this stolen information is in the tens of millions, perhaps hundreds of millions of dollars." Information recovered in the hack may have included classified naval codes and data on missile-guidance systems, as well as other highly valued military data. They also stole tens of thousands of files containing technical research, military maps, U.S. troop configurations, military hardware designs, encryption techniques, and unclassified but crucial data relating to the Pentagon's war-planning, all of which could be sold to enemies of the United States. These attacks had very serious implications regarding the US’ ability to defend itself. With the information acquired from the attack, the hackers might have been able to cripple US missile defense systems and cause an unimaginable amount of damage. Juan Andres Guerrero-Saade, Senior Security Researcher at Kaspersky Lab, stated "The analysis of the Moonlight Maze samples is not just a fascinating archaeological study; it is also a reminder that well-resourced adversaries aren’t going anywhere, it’s up to us to defend systems with skills to match." Connection to Turla Turla is a Russian-language threat actor known for its covert exfiltration tactics such as the use of hijacked satellite connections, waterholing of government websites, covert channel backdoors, rootkits, and deception tactics. The group's roots trace back to the once famous Agent.BTZ, a computer virus which had the ability to replicate itself as well as to scan for and steal data. The virus was used to briefly cripple the United States military, and was described as "the most significant breach of U.S. military computers ever" by a senior Pentagon official. This dates their rise to prominence around 2006–2007, a few years before Agent.BTZ, and almost 10 years after the events of Moonlight Maze. It was't until many years later, however, that information would come out linking Turla to Moonlight Maze. A group consisting of Kaspersky's Guerrero-Saade and Costin Raiu, and King's College London's Thomas Rid and Danny Moore was able to track down a retired IT administrator who was the owner of a 1998 server which had been used as a proxy for Moonlight Maze. This was a huge breakthrough considering the long period of presumed inactivity (almost 20 years). They then used the server to spy on the threat actor, and were able to retrieve a complete log of the attackers code, with which after almost a year of thorough analysis, they were able to find a connection between rare Linux samples used by both Turla and Moonlight Maze (the code they shared was related to a backdoor used on LOKI 2, an information tunneling program released in 1996). See also 2020 United States federal government data breach Cyberwarfare by Russia GhostNet Operation Aurora Titan Rain References 1999 in the United States Cyberattacks Data breaches in the United States Hacker groups
866782
https://en.wikipedia.org/wiki/Trusted%20Solaris
Trusted Solaris
Trusted Solaris is a discontinued security-evaluated operating system based on Solaris by Sun Microsystems, featuring a mandatory access control model. Features Accounting Role-Based Access Control Auditing Device allocation Mandatory access control (MAC) labeling Certification Trusted Solaris 8 is Common Criteria certified at Evaluation Assurance Level EAL4+ against the CAPP, RBACPP, and LSPP protection profiles. It is the basis for the DoDIIS Trusted Workstation program. Solaris Trusted Extensions Features that were previously only available in Trusted Solaris, such as fine-grained privileges, are now part of the standard Solaris release. In the Solaris 10 11/06 update a new component called Solaris Trusted Extensions was introduced, making it no longer necessary to have a different release with a modified kernel for labeled security environments. Solaris Trusted Extensions is an OpenSolaris project. Solaris Trusted Extensions, when enabled, enforces a mandatory access control policy on all aspects of the operating system, including device access, file, networking, print and window management services. This is achieved by adding sensitivity labels to objects, thereby establishing explicit relationships between these objects. Only appropriate (and explicit) authorization allows applications and users read and/or write access to the objects. The component also provides labeled security features in a desktop environment. Apart from extending support for the Common Desktop Environment from the Trusted Solaris 8 release, it delivered the first labeled environment based on GNOME. Solaris Trusted Extensions facilitates the access of data at multiple classification levels through a single desktop environment. Solaris Trusted Extensions also implements labeled device access and labeled network communication, through the Commercial Internet Protocol Security Option (CIPSO) standard. CIPSO is used to pass security information within and between labeled zones. Solaris Trusted Extensions complies with the Federal Information Processing Standards (FIPS). References External links Operating system security Sun Microsystems software Proprietary operating systems
39809523
https://en.wikipedia.org/wiki/Objective-C
Objective-C
Objective-C is a general-purpose, object-oriented programming language that adds Smalltalk-style messaging to the C programming language. Originally developed by Brad Cox and Tom Love in the early 1980s, it was selected by NeXT for its NeXTSTEP operating system. Objective-C was the standard programming language supported by Apple for developing macOS (which descended from NeXTSTEP) and iOS applications using their respective application programming interfaces (APIs), Cocoa and Cocoa Touch, until the introduction of Swift in 2014. Objective-C programs developed for non-Apple operating systems or that are not dependent on Apple's APIs may also be compiled for any platform supported by GNU GCC or LLVM/Clang. Objective-C source code 'messaging/implementation' program files usually have filename extensions, while Objective-C 'header/interface' files have extensions, the same as C header files. Objective-C++ files are denoted with a file extension. History Objective-C was created primarily by Brad Cox and Tom Love in the early 1980s at their company Productivity Products International (PPI). Leading up to the creation of their company, both had been introduced to Smalltalk while at ITT Corporation's Programming Technology Center in 1981. The earliest work on Objective-C traces back to around that time. Cox was intrigued by problems of true reusability in software design and programming. He realized that a language like Smalltalk would be invaluable in building development environments for system developers at ITT. However, he and Tom Love also recognized that backward compatibility with C was critically important in ITT's telecom engineering milieu. Cox began writing a pre-processor for C to add some of the abilities of Smalltalk. He soon had a working implementation of an object-oriented extension to the C language, which he called "OOPC" for Object-Oriented Pre-Compiler. Love was hired by Schlumberger Research in 1982 and had the opportunity to acquire the first commercial copy of Smalltalk-80, which further influenced the development of their brainchild. In order to demonstrate that real progress could be made, Cox showed that making interchangeable software components really needed only a few practical changes to existing tools. Specifically, they needed to support objects in a flexible manner, come supplied with a usable set of libraries, and allow for the code (and any resources needed by the code) to be bundled into one cross-platform format. Love and Cox eventually formed PPI to commercialize their product, which coupled an Objective-C compiler with class libraries. In 1986, Cox published the main description of Objective-C in its original form in the book Object-Oriented Programming, An Evolutionary Approach. Although he was careful to point out that there is more to the problem of reusability than just what Objective-C provides, the language often found itself compared feature for feature with other languages. Popularization through NeXT In 1988, NeXT licensed Objective-C from StepStone (the new name of PPI, the owner of the Objective-C trademark) and extended the GCC compiler to support Objective-C. NeXT developed the AppKit and Foundation Kit libraries on which the NeXTSTEP user interface and Interface Builder were based. While the NeXT workstations failed to make a great impact in the marketplace, the tools were widely lauded in the industry. This led NeXT to drop hardware production and focus on software tools, selling NeXTSTEP (and OPENSTEP) as a platform for custom programming. In order to circumvent the terms of the GPL, NeXT had originally intended to ship the Objective-C frontend separately, allowing the user to link it with GCC to produce the compiler executable. Though initially accepted by Richard M. Stallman, this plan was rejected after Stallman consulted with GNU's lawyers and NeXT agreed to make Objective-C part of GCC. The work to extend GCC was led by Steve Naroff, who joined NeXT from StepStone. The compiler changes were made available as per GPL license terms, but the runtime libraries were not, rendering the open source contribution unusable to the general public. This led to other parties developing such runtime libraries under open source license. Later, Steve Naroff was also principal contributor to work at Apple to build the Objective-C frontend to Clang. The GNU project started work on its free software implementation of Cocoa, named GNUstep, based on the OpenStep standard. Dennis Glatting wrote the first GNU Objective-C runtime in 1992. The GNU Objective-C runtime, which has been in use since 1993, is the one developed by Kresten Krab Thorup when he was a university student in Denmark. Thorup also worked at NeXT from 1993 to 1996. Apple development and Swift After acquiring NeXT in 1996, Apple Computer used OpenStep in its then-new operating system, Mac OS X. This included Objective-C, NeXT's Objective-C-based developer tool, Project Builder, and its interface design tool, Interface Builder. Both were later merged into one application, Xcode. Most of Apple's current Cocoa API is based on OpenStep interface objects and is the most significant Objective-C environment being used for active development. At WWDC 2014, Apple introduced a new language, Swift, which was characterized as "Objective-C without the C". Syntax Objective-C is a thin layer atop C and is a "strict superset" of C, meaning that it is possible to compile any C program with an Objective-C compiler and to freely include C language code within an Objective-C class. Objective-C derives its object syntax from Smalltalk. All of the syntax for non-object-oriented operations (including primitive variables, pre-processing, expressions, function declarations, and function calls) are identical to those of C, while the syntax for object-oriented features is an implementation of Smalltalk-style messaging. Messages The Objective-C model of object-oriented programming is based on message passing to object instances. In Objective-C one does not call a method; one sends a message. This is unlike the Simula-style programming model used by C++. The difference between these two concepts is in how the code referenced by the method or message name is executed. In a Simula-style language, the method name is in most cases bound to a section of code in the target class by the compiler. In Smalltalk and Objective-C, the target of a message is resolved at runtime, with the receiving object itself interpreting the message. A method is identified by a selector or — a unique identifier for each message name, often just a -terminated string representing its name — and resolved to a C method pointer implementing it: an . A consequence of this is that the message-passing system has no type checking. The object to which the message is directed — the receiver — is not guaranteed to respond to a message, and if it does not, it raises an exception. Sending the message to the object pointed to by the pointer would require the following code in C++: obj->method(argument); In Objective-C, this is written as follows: [obj method:argument]; The "method" call is translated by the compiler to the family of runtime functions. Different implementations handle modern additions like . In GNU families this function is named , but it has been deprecated in favor of a modern lookup system under . Both styles of programming have their strengths and weaknesses. Object-oriented programming in the Simula (C++) style allows multiple inheritance and faster execution by using compile-time binding whenever possible, but it does not support dynamic binding by default. It also forces all methods to have a corresponding implementation unless they are abstract. The Smalltalk-style programming as used in Objective-C allows messages to go unimplemented, with the method resolved to its implementation at runtime. For example, a message may be sent to a collection of objects, to which only some will be expected to respond, without fear of producing runtime errors. Message passing also does not require that an object be defined at compile time. An implementation is still required for the method to be called in the derived object. (See the dynamic typing section below for more advantages of dynamic (late) binding.) Interfaces and implementations Objective-C requires that the interface and implementation of a class be in separately declared code blocks. By convention, developers place the interface in a header file and the implementation in a code file. The header files, normally suffixed .h, are similar to C header files while the implementation (method) files, normally suffixed .m, can be very similar to C code files. Interface This is analogous to class declarations as used in other object-oriented languages, such as C++ or Python. The interface of a class is usually defined in a header file. A common convention is to name the header file after the name of the class, e.g. would contain the interface for the class . An interface declaration takes the form: @interface classname : superclassname { // instance variables } + classMethod1; + (return_type)classMethod2; + (return_type)classMethod3:(param1_type)param1_varName; - (return_type)instanceMethod1With1Parameter:(param1_type)param1_varName; - (return_type)instanceMethod2With2Parameters:(param1_type)param1_varName param2_callName:(param2_type)param2_varName; @end In the above, plus signs denote class methods, or methods that can be called on the class itself (not on an instance), and minus signs denote instance methods, which can only be called on a particular instance of the class. Class methods also have no access to instance variables. The code above is roughly equivalent to the following C++ interface: class classname : public superclassname { protected: // instance variables public: // Class (static) functions static void *classMethod1(); static return_type classMethod2(); static return_type classMethod3(param1_type param1_varName); // Instance (member) functions return_type instanceMethod1With1Parameter(param1_type param1_varName); return_type instanceMethod2With2Parameters(param1_type param1_varName, param2_type param2_varName = default); }; Note that demonstrates the interleaving of selector segments with argument expressions, for which there is no direct equivalent in C/C++. Return types can be any standard C type, a pointer to a generic Objective-C object, a pointer to a specific type of object such as NSArray *, NSImage *, or NSString *, or a pointer to the class to which the method belongs (instancetype). The default return type is the generic Objective-C type . Method arguments begin with a name labeling the argument that is part of the method name, followed by a colon followed by the expected argument type in parentheses and the argument name. The label can be omitted. - (void)setRangeStart:(int)start end:(int)end; - (void)importDocumentWithName:(NSString *)name withSpecifiedPreferences:(Preferences *)prefs beforePage:(int)insertPage; A derivative of the interface definition is the category, which allows one to add methods to existing classes. Implementation The interface only declares the class interface and not the methods themselves: the actual code is written in the implementation file. Implementation (method) files normally have the file extension .m, which originally signified "messages". @implementation classname + (return_type)classMethod { // implementation } - (return_type)instanceMethod { // implementation } @end Methods are written using their interface declarations. Comparing Objective-C and C: - (int)method:(int)i { return [self square_root:i]; } int function(int i) { return square_root(i); } The syntax allows pseudo-naming of arguments. - (void)changeColorToRed:(float)red green:(float)green blue:(float)blue { //... Implementation ... } // Called like so: [myColor changeColorToRed:5.0 green:2.0 blue:6.0]; Internal representations of a method vary between different implementations of Objective-C. If myColor is of the class , instance method might be internally labeled . The is to refer to an instance method, with the class and then method names appended and colons changed to underscores. As the order of parameters is part of the method name, it cannot be changed to suit coding style or expression as with true named parameters. However, internal names of the function are rarely used directly. Generally, messages are converted to function calls defined in the Objective-C runtime library. It is not necessarily known at link time which method will be called because the class of the receiver (the object being sent the message) need not be known until runtime. Instantiation Once an Objective-C class is written, it can be instantiated. This is done by first allocating an uninitialized instance of the class (an object) and then by initializing it. An object is not fully functional until both steps have been completed. These steps should be accomplished with one line of code so that there is never an allocated object that hasn't undergone initialization (and because it is unwise to keep the intermediate result since -init can return a different object than that on which it is called). Instantiation with the default, no-parameter initializer: MyObject *foo = [[MyObject alloc] init]; Instantiation with a custom initializer: MyObject *foo = [[MyObject alloc] initWithString:myString]; In the case where no custom initialization is being performed, the "new" method can often be used in place of the alloc-init messages: MyObject *foo = [MyObject new]; Also, some classes implement class method initializers. Like +new, they combine +alloc and -init, but unlike +new, they return an autoreleased instance. Some class method initializers take parameters: MyObject *foo = [MyObject object]; MyObject *bar = [MyObject objectWithString:@"Wikipedia :)"]; The alloc message allocates enough memory to hold all the instance variables for an object, sets all the instance variables to zero values, and turns the memory into an instance of the class; at no point during the initialization is the memory an instance of the superclass. The init message performs the set-up of the instance upon creation. The init method is often written as follows: - (id)init { self = [super init]; if (self) { // perform initialization of object here } return self; } In the above example, notice the id return type. This type stands for "pointer to any object" in Objective-C (See the Dynamic typing section). The initializer pattern is used to assure that the object is properly initialized by its superclass before the init method performs its initialization. It performs the following actions: self = [super init] Sends the superclass instance an init message and assigns the result to self (pointer to the current object). if (self) Checks if the returned object pointer is valid before performing any initialization. return self Returns the value of self to the caller. A non-valid object pointer has the value nil; conditional statements like "if" treat nil like a null pointer, so the initialization code will not be executed if [super init] returned nil. If there is an error in initialization the init method should perform any necessary cleanup, including sending a "release" message to self, and return nil to indicate that initialization failed. Any checking for such errors must only be performed after having called the superclass initialization to ensure that destroying the object will be done correctly. If a class has more than one initialization method, only one of them (the "designated initializer") needs to follow this pattern; others should call the designated initializer instead of the superclass initializer. Protocols In other programming languages, these are called "interfaces". Objective-C was extended at NeXT to introduce the concept of multiple inheritance of specification, but not implementation, through the introduction of protocols. This is a pattern achievable either as an abstract multiple inherited base class in C++, or as an "interface" (as in Java and C#). Objective-C makes use of ad hoc protocols called informal protocols and compiler-enforced protocols called formal protocols. An informal protocol is a list of methods that a class can opt to implement. It is specified in the documentation, since it has no presence in the language. Informal protocols are implemented as a category (see below) on NSObject and often include optional methods, which, if implemented, can change the behavior of a class. For example, a text field class might have a delegate that implements an informal protocol with an optional method for performing auto-completion of user-typed text. The text field discovers whether the delegate implements that method (via reflection) and, if so, calls the delegate's method to support the auto-complete feature. A formal protocol is similar to an interface in Java, C#, and Ada 2005. It is a list of methods that any class can declare itself to implement. Versions of Objective-C before 2.0 required that a class must implement all methods in a protocol it declares itself as adopting; the compiler will emit an error if the class does not implement every method from its declared protocols. Objective-C 2.0 added support for marking certain methods in a protocol optional, and the compiler will not enforce implementation of optional methods. A class must be declared to implement that protocol to be said to conform to it. This is detectable at runtime. Formal protocols cannot provide any implementations; they simply assure callers that classes that conform to the protocol will provide implementations. In the NeXT/Apple library, protocols are frequently used by the Distributed Objects system to represent the abilities of an object executing on a remote system. The syntax @protocol NSLocking - (void)lock; - (void)unlock; @end denotes that there is the abstract idea of locking. By stating in the class definition that the protocol is implemented, @interface NSLock : NSObject <NSLocking> // ... @end instances of NSLock claim that they will provide an implementation for the two instance methods. Dynamic typing Objective-C, like Smalltalk, can use dynamic typing: an object can be sent a message that is not specified in its interface. This can allow for increased flexibility, as it allows an object to "capture" a message and send the message to a different object that can respond to the message appropriately, or likewise send the message on to another object. This behavior is known as message forwarding or delegation (see below). Alternatively, an error handler can be used in case the message cannot be forwarded. If an object does not forward a message, respond to it, or handle an error, then the system will generate a runtime exception. If messages are sent to nil (the null object pointer), they will be silently ignored or raise a generic exception, depending on compiler options. Static typing information may also optionally be added to variables. This information is then checked at compile time. In the following four statements, increasingly specific type information is provided. The statements are equivalent at runtime, but the extra information allows the compiler to warn the programmer if the passed argument does not match the type specified. - (void)setMyValue:(id)foo; In the above statement, foo may be of any class. - (void)setMyValue:(id<NSCopying>)foo; In the above statement, foo may be an instance of any class that conforms to the NSCopying protocol. - (void)setMyValue:(NSNumber *)foo; In the above statement, foo must be an instance of the NSNumber class. - (void)setMyValue:(NSNumber<NSCopying> *)foo; In the above statement, foo must be an instance of the NSNumber class, and it must conform to the NSCopying protocol. In Objective-C, all objects are represented as pointers, and static initialization is not allowed. The simplest object is the type that () points to, which only has an isa pointer describing its class. Other types from C, like values and structs, are unchanged because they are not part of the object system. This decision differs from the C++ object model, where structs and classes are united. Forwarding Objective-C permits the sending of a message to an object that may not respond. Rather than responding or simply dropping the message, an object can forward the message to an object that can respond. Forwarding can be used to simplify implementation of certain design patterns, such as the observer pattern or the proxy pattern. The Objective-C runtime specifies a pair of methods in forwarding methods:- (retval_t)forward:(SEL)sel args:(arglist_t)args; // with GCC - (id)forward:(SEL)sel args:(marg_list)args; // with NeXT/Apple systems action methods:- (retval_t)performv:(SEL)sel args:(arglist_t)args; // with GCC - (id)performv:(SEL)sel args:(marg_list)args; // with NeXT/Apple systems An object wishing to implement forwarding needs only to override the forwarding method with a new method to define the forwarding behavior. The action method need not be overridden, as this method merely performs an action based on the selector and arguments. Notice the SEL type, which is the type of messages in Objective-C. Note: in OpenStep, Cocoa, and GNUstep, the commonly used frameworks of Objective-C, one does not use the class. The method of the class is used to do forwarding. Example Here is an example of a program that demonstrates the basics of forwarding. Forwarder.h #import <objc/Object.h> @interface Forwarder : Object { id recipient; // The object we want to forward the message to. } // Accessor methods. - (id)recipient; - (id)setRecipient:(id)_recipient; @end Forwarder.m #import "Forwarder.h" @implementation Forwarder - (retval_t)forward:(SEL)sel args:(arglist_t)args { /* * Check whether the recipient actually responds to the message. * This may or may not be desirable, for example, if a recipient * in turn does not respond to the message, it might do forwarding * itself. */ if ([recipient respondsToSelector:sel]) { return [recipient performv:sel args:args]; } else { return [self error:"Recipient does not respond"]; } } - (id)setRecipient:(id)_recipient { [recipient autorelease]; recipient = [_recipient retain]; return self; } - (id)recipient { return recipient; } @end Recipient.h #import <objc/Object.h> // A simple Recipient object. @interface Recipient : Object - (id)hello; @end Recipient.m #import "Recipient.h" @implementation Recipient - (id)hello { printf("Recipient says hello!\n"); return self; } @end main.m #import "Forwarder.h" #import "Recipient.h" int main(void) { Forwarder *forwarder = [Forwarder new]; Recipient *recipient = [Recipient new]; [forwarder setRecipient:recipient]; // Set the recipient. /* * Observe forwarder does not respond to a hello message! It will * be forwarded. All unrecognized methods will be forwarded to * the recipient * (if the recipient responds to them, as written in the Forwarder) */ [forwarder hello]; [recipient release]; [forwarder release]; return 0; } Notes When compiled using gcc, the compiler reports: $ gcc -x objective-c -Wno-import Forwarder.m Recipient.m main.m -lobjc main.m: In function `main': main.m:12: warning: `Forwarder' does not respond to `hello' $ The compiler is reporting the point made earlier, that does not respond to hello messages. In this circumstance, it is safe to ignore the warning since forwarding was implemented. Running the program produces this output: $ ./a.out Recipient says hello! Categories During the design of Objective-C, one of the main concerns was the maintainability of large code bases. Experience from the structured programming world had shown that one of the main ways to improve code was to break it down into smaller pieces. Objective-C borrowed and extended the concept of categories from Smalltalk implementations to help with this process. Furthermore, the methods within a category are added to a class at run-time. Thus, categories permit the programmer to add methods to an existing class - an open class - without the need to recompile that class or even have access to its source code. For example, if a system does not contain a spell checker in its String implementation, it could be added without modifying the String source code. Methods within categories become indistinguishable from the methods in a class when the program is run. A category has full access to all of the instance variables within the class, including private variables. If a category declares a method with the same method signature as an existing method in a class, the category's method is adopted. Thus categories can not only add methods to a class, but also replace existing methods. This feature can be used to fix bugs in other classes by rewriting their methods, or to cause a global change to a class's behavior within a program. If two categories have methods with the same name but different method signatures, it is undefined which category's method is adopted. Other languages have attempted to add this feature in a variety of ways. TOM took the Objective-C system a step further and allowed for the addition of variables also. Other languages have used prototype-based solutions instead, the most notable being Self. The C# and Visual Basic.NET languages implement superficially similar functionality in the form of extension methods, but these lack access to the private variables of the class. Ruby and several other dynamic programming languages refer to the technique as "monkey patching". Logtalk implements a concept of categories (as first-class entities) that subsumes Objective-C categories functionality (Logtalk categories can also be used as fine-grained units of composition when defining e.g. new classes or prototypes; in particular, a Logtalk category can be virtually imported by any number of classes and prototypes). Example use of categories This example builds up an class, by defining first a basic class with only accessor methods implemented, and adding two categories, and , which extend the basic class. While categories can access the base class's private data members, it is often good practice to access these private data members through the accessor methods, which helps keep categories more independent from the base class. Implementing such accessors is one typical use of categories. Another is to use categories to add methods to the base class. However, it is not regarded as good practice to use categories for subclass overriding, also known as monkey patching. Informal protocols are implemented as a category on the base class. By convention, files containing categories that extend base classes will take the name BaseClass+ExtensionClass.h. Integer.h #import <objc/Object.h> @interface Integer : Object { int integer; } - (int)integer; - (id)integer:(int)_integer; @end Integer.m #import "Integer.h" @implementation Integer - (int) integer { return integer; } - (id) integer: (int) _integer { integer = _integer; return self; } @end Integer+Arithmetic.h #import "Integer.h" @interface Integer (Arithmetic) - (id) add: (Integer *) addend; - (id) sub: (Integer *) subtrahend; @end Integer+Arithmetic.m # import "Integer+Arithmetic.h" @implementation Integer (Arithmetic) - (id) add: (Integer *) addend { return [self integer: [self integer] + [addend integer]]; } - (id) sub: (Integer *) subtrahend { return [self integer: [self integer] - [subtrahend integer]]; } @end Integer+Display.h #import "Integer.h" @interface Integer (Display) - (id) showstars; - (id) showint; @end Integer+Display.m # import "Integer+Display.h" @implementation Integer (Display) - (id) showstars { int i, x = [self integer]; for (i = 0; i < x; i++) { printf("*"); } printf("\n"); return self; } - (id) showint { printf("%d\n", [self integer]); return self; } @end main.m #import "Integer.h" #import "Integer+Arithmetic.h" #import "Integer+Display.h" int main(void) { Integer *num1 = [Integer new], *num2 = [Integer new]; int x; printf("Enter an integer: "); scanf("%d", &x); [num1 integer:x]; [num1 showstars]; printf("Enter an integer: "); scanf("%d", &x); [num2 integer:x]; [num2 showstars]; [num1 add:num2]; [num1 showint]; return 0; } Notes Compilation is performed, for example, by: gcc -x objective-c main.m Integer.m Integer+Arithmetic.m Integer+Display.m -lobjc One can experiment by leaving out the and lines and omitting in compilation. The program will still run. This means that it is possible to mix-and-match added categories if needed; if a category does not need to have some ability, it can simply not be compile in. Posing Objective-C permits a class to wholly replace another class within a program. The replacing class is said to "pose as" the target class. Class posing was declared deprecated with Mac OS X v10.5, and is unavailable in the 64-bit runtime. Similar functionality can be achieved by using method swizzling in categories, that swaps one method's implementation with another's that have the same signature. For the versions still supporting posing, all messages sent to the target class are instead received by the posing class. There are several restrictions: A class may only pose as one of its direct or indirect superclasses. The posing class must not define any new instance variables that are absent from the target class (though it may define or override methods). The target class may not have received any messages prior to the posing. Posing, similarly with categories, allows global augmentation of existing classes. Posing permits two features absent from categories: A posing class can call overridden methods through super, thus incorporating the implementation of the target class. A posing class can override methods defined in categories. For example, @interface CustomNSApplication : NSApplication @end @implementation CustomNSApplication - (void) setMainMenu: (NSMenu*) menu { // do something with menu } @end class_poseAs ([CustomNSApplication class], [NSApplication class]); This intercepts every invocation of setMainMenu to NSApplication. #import In the C language, the #include pre-compile directive always causes a file's contents to be inserted into the source at that point. Objective-C has the #import directive, equivalent except that each file is included only once per compilation unit, obviating the need for include guards. Linux gcc compilation // FILE: hello.m #import <Foundation/Foundation.h> int main (int argc, const char * argv[]) { /* my first program in Objective-C */ NSLog(@"Hello, World! \n"); return 0; } # Compile Command Line for gcc and MinGW Compiler: $ gcc \ $(gnustep-config --objc-flags) \ -o hello \ hello.m \ -L /GNUstep/System/Library/Libraries \ -lobjc \ -lgnustep-base $ ./hello Other features Objective-C's features often allow for flexible, and often easy, solutions to programming issues. Delegating methods to other objects and remote invocation can be easily implemented using categories and message forwarding. Swizzling of the isa pointer allows for classes to change at runtime. Typically used for debugging where freed objects are swizzled into zombie objects whose only purpose is to report an error when someone calls them. Swizzling was also used in Enterprise Objects Framework to create database faults. Swizzling is used today by Apple's Foundation Framework to implement Key-Value Observing. Language variants Objective-C++ Objective-C++ is a language variant accepted by the front-end to the GNU Compiler Collection and Clang, which can compile source files that use a combination of C++ and Objective-C syntax. Objective-C++ adds to C++ the extensions that Objective-C adds to C. As nothing is done to unify the semantics behind the various language features, certain restrictions apply: A C++ class cannot derive from an Objective-C class and vice versa. C++ namespaces cannot be declared inside an Objective-C declaration. Objective-C declarations may appear only in global scope, not inside a C++ namespace Objective-C classes cannot have instance variables of C++ classes that lack a default constructor or that have one or more virtual methods, but pointers to C++ objects can be used as instance variables without restriction (allocate them with new in the -init method). C++ "by value" semantics cannot be applied to Objective-C objects, which are only accessible through pointers. An Objective-C declaration cannot be within a C++ template declaration and vice versa. However, Objective-C types (e.g., ) can be used as C++ template parameters. Objective-C and C++ exception handling is distinct; the handlers of each cannot handle exceptions of the other type. As a result, object destructors are not run. This is mitigated in recent "Objective-C 2.0" runtimes as Objective-C exceptions are either replaced by C++ exceptions completely (Apple runtime), or partly when Objective-C++ library is linked (GNUstep libobjc2). Objective-C blocks and C++11 lambdas are distinct entities. However, a block is transparently generated on macOS when passing a lambda where a block is expected. Objective-C 2.0 At the 2006 Worldwide Developers Conference, Apple announced the release of "Objective-C 2.0," a revision of the Objective-C language to include "modern garbage collection, syntax enhancements, runtime performance improvements, and 64-bit support". Mac OS X v10.5, released in October 2007, included an Objective-C 2.0 compiler. GCC 4.6 supports many new Objective-C features, such as declared and synthesized properties, dot syntax, fast enumeration, optional protocol methods, method/protocol/class attributes, class extensions, and a new GNU Objective-C runtime API. The naming Objective-C 2.0 represents a break in the versioning system of the language, as the last Objective-C version for NeXT was "objc4". This project name was kept in the last release of legacy Objective-C runtime source code in Mac OS X Leopard (10.5). Garbage collection Objective-C 2.0 provided an optional conservative, generational garbage collector. When run in backwards-compatible mode, the runtime turned reference counting operations such as "retain" and "release" into no-ops. All objects were subject to garbage collection when garbage collection was enabled. Regular C pointers could be qualified with "__strong" to also trigger the underlying write-barrier compiler intercepts and thus participate in garbage collection. A zero-ing weak subsystem was also provided such that pointers marked as "__weak" are set to zero when the object (or more simply, GC memory) is collected. The garbage collector does not exist on the iOS implementation of Objective-C 2.0. Garbage collection in Objective-C runs on a low-priority background thread, and can halt on user events, with the intention of keeping the user experience responsive. Garbage collection was deprecated in Mac OS X v10.8 in favor of Automatic Reference Counting (ARC). Objective-C on iOS 7 running on ARM64 uses 19 bits out of a 64-bit word to store the reference count, as a form of tagged pointers. Properties Objective-C 2.0 introduces a new syntax to declare instance variables as properties, with optional attributes to configure the generation of accessor methods. Properties are, in a sense, public instance variables; that is, declaring an instance variable as a property provides external classes with access (possibly limited, e.g. read only) to that property. A property may be declared as "readonly", and may be provided with storage semantics such as assign, copy or retain. By default, properties are considered atomic, which results in a lock preventing multiple threads from accessing them at the same time. A property can be declared as nonatomic, which removes this lock. @interface Person : NSObject { @public NSString *name; @private int age; } @property(copy) NSString *name; @property(readonly) int age; - (id)initWithAge:(int)age; @end Properties are implemented by way of the @synthesize keyword, which generates getter (and setter, if not read-only) methods according to the property declaration. Alternatively, the getter and setter methods must be implemented explicitly, or the @dynamic keyword can be used to indicate that accessor methods will be provided by other means. When compiled using clang 3.1 or higher, all properties which are not explicitly declared with @dynamic, marked readonly or have complete user-implemented getter and setter will be automatically implicitly @synthesize'd. @implementation Person @synthesize name; - (id)initWithAge:(int)initAge { self = [super init]; if (self) { // NOTE: direct instance variable assignment, not property setter age = initAge; } return self; } - (int)age { return age; } @end Properties can be accessed using the traditional message passing syntax, dot notation, or, in Key-Value Coding, by name via the "valueForKey:"/"setValue:forKey:" methods. Person *aPerson = [[Person alloc] initWithAge:53]; aPerson.name = @"Steve"; // NOTE: dot notation, uses synthesized setter, // equivalent to [aPerson setName: @"Steve"]; NSLog(@"Access by message (%@), dot notation(%@), property name(% @) and " "direct instance variable access(% @) ", [aPerson name], aPerson.name, [aPerson valueForKey:@"name"], aPerson -> name); In order to use dot notation to invoke property accessors within an instance method, the "self" keyword should be used: - (void)introduceMyselfWithProperties:(BOOL)useGetter { NSLog(@"Hi, my name is %@.", (useGetter ? self.name : name)); // NOTE: getter vs. ivar access } A class or protocol's properties may be dynamically introspected. int i; int propertyCount = 0; objc_property_t *propertyList = class_copyPropertyList([aPerson class], &propertyCount); for (i = 0; i < propertyCount; i++) { objc_property_t *thisProperty = propertyList + i; const char *propertyName = property_getName(*thisProperty); NSLog(@"Person has a property: '%s'", propertyName); } Non-fragile instance variables Objective-C 2.0 provides non-fragile instance variables where supported by the runtime (i.e. when building code for 64-bit macOS, and all iOS). Under the modern runtime, an extra layer of indirection is added to instance variable access, allowing the dynamic linker to adjust instance layout at runtime. This feature allows for two important improvements to Objective-C code: It eliminates the fragile binary interface problem; superclasses can change sizes without affecting binary compatibility. It allows instance variables that provide the backing for properties to be synthesized at runtime without them being declared in the class's interface. Fast enumeration Instead of using an NSEnumerator object or indices to iterate through a collection, Objective-C 2.0 offers the fast enumeration syntax. In Objective-C 2.0, the following loops are functionally equivalent, but have different performance traits. // Using NSEnumerator NSEnumerator *enumerator = [thePeople objectEnumerator]; Person *p; while ((p = [enumerator nextObject]) != nil) { NSLog(@"%@ is %i years old.", [p name], [p age]); } // Using indexes for (int i = 0; i < [thePeople count]; i++) { Person *p = [thePeople objectAtIndex:i]; NSLog(@"%@ is %i years old.", [p name], [p age]); } // Using fast enumeration for (Person *p in thePeople) { NSLog(@"%@ is %i years old.", [p name], [p age]); } Fast enumeration generates more efficient code than standard enumeration because method calls to enumerate over objects are replaced by pointer arithmetic using the NSFastEnumeration protocol. Class extensions A class extension has the same syntax as a category declaration with no category name, and the methods and properties declared in it are added directly to the main class. It is mostly used as an alternative to a category to add methods to a class without advertising them in the public headers, with the advantage that for class extensions the compiler checks that all the privately declared methods are actually implemented. Implications for Cocoa development All Objective-C applications developed for macOS that make use of the above improvements for Objective-C 2.0 are incompatible with all operating systems prior to 10.5 (Leopard). Since fast enumeration does not generate exactly the same binaries as standard enumeration, its use will cause an application to crash on Mac OS X version 10.4 or earlier. Blocks Blocks is a nonstandard extension for Objective-C (and C and C++) that uses special syntax to create closures. Blocks are only supported in Mac OS X 10.6 "Snow Leopard" or later, iOS 4 or later, and GNUstep with libobjc2 1.7 and compiling with clang 3.1 or later. #include <stdio.h> #include <Block.h> typedef int (^IntBlock)(); IntBlock MakeCounter(int start, int increment) { __block int i = start; return Block_copy( ^ { int ret = i; i += increment; return ret; }); } int main(void) { IntBlock mycounter = MakeCounter(5, 2); printf("First call: %d\n", mycounter()); printf("Second call: %d\n", mycounter()); printf("Third call: %d\n", mycounter()); /* because it was copied, it must also be released */ Block_release(mycounter); return 0; } /* Output: First call: 5 Second call: 7 Third call: 9 */ Modern Objective-C Apple has added some additional features to Objective 2.0 over time. The additions only apply to the "Apple LLVM compiler", i.e. clang frontend of the language. Confusingly, the versioning used by Apple differs from that of the LLVM upstream; refer to for a translation to open-source LLVM version numbers. Automatic Reference Counting Automatic Reference Counting (ARC) is a compile-time feature that eliminates the need for programmers to manually manage retain counts using retain and release. Unlike garbage collection, which occurs at run time, ARC eliminates the overhead of a separate process managing retain counts. ARC and manual memory management are not mutually exclusive; programmers can continue to use non-ARC code in ARC-enabled projects by disabling ARC for individual code files. Xcode can also attempt to automatically upgrade a project to ARC. ARC was introduced in LLVM 3.0. This translates to Xcode 4.2 (2011), or Apple LLVM compiler 3.0. Literals NeXT and Apple Obj-C runtimes have long included a short-form way to create new strings, using the literal syntax @"a new string", or drop to CoreFoundation constants kCFBooleanTrue and kCFBooleanFalse for NSNumber with Boolean values. Using this format saves the programmer from having to use the longer initWithString or similar methods when doing certain operations. When using Apple LLVM compiler 4.0 (Xcode 4.4) or later, arrays, dictionaries, and numbers (NSArray, NSDictionary, NSNumber classes) can also be created using literal syntax instead of methods. (Apple LLVM compiler 4.0 translates to open source LLVM and Clang 3.1.) Example without literals: NSArray *myArray = [NSArray arrayWithObjects:object1,object2,object3,nil]; NSDictionary *myDictionary1 = [NSDictionary dictionaryWithObject:someObject forKey:@"key"]; NSDictionary *myDictionary2 = [NSDictionary dictionaryWithObjectsAndKeys:object1, key1, object2, key2, nil]; NSNumber *myNumber = [NSNumber numberWithInt:myInt]; NSNumber *mySumNumber= [NSNumber numberWithInt:(2 + 3)]; NSNumber *myBoolNumber = [NSNumber numberWithBool:YES]; Example with literals: NSArray *myArray = @[ object1, object2, object3 ]; NSDictionary *myDictionary1 = @{ @"key" : someObject }; NSDictionary *myDictionary2 = @{ key1: object1, key2: object2 }; NSNumber *myNumber = @(myInt); NSNumber *mySumNumber = @(2+3); NSNumber *myBoolNumber = @YES; NSNumber *myIntegerNumber = @8; However, different from string literals, which compile to constants in the executable, these literals compile to code equivalent to the above method calls. In particular, under manually reference-counted memory management, these objects are autoreleased, which requires added care when e.g., used with function-static variables or other kinds of globals. Subscripting When using Apple LLVM compiler 4.0 or later, arrays and dictionaries (NSArray and NSDictionary classes) can be manipulated using subscripting. Subscripting can be used to retrieve values from indexes (array) or keys (dictionary), and with mutable objects, can also be used to set objects to indexes or keys. In code, subscripting is represented using brackets [ ]. Example without subscripting: id object1 = [someArray objectAtIndex:0]; id object2 = [someDictionary objectForKey:@"key"]; [someMutableArray replaceObjectAtIndex:0 withObject:object3]; [someMutableDictionary setObject:object4 forKey:@"key"]; Example with subscripting: id object1 = someArray[0]; id object2 = someDictionary[@"key"]; someMutableArray[0] = object3; someMutableDictionary[@"key"] = object4; "Modern" Objective-C syntax (1997) After the purchase of NeXT by Apple, attempts were made to make the language more acceptable to programmers more familiar with Java than Smalltalk. One of these attempts was introducing what was dubbed "Modern Syntax" for Objective-C at the time (as opposed to the current, "classic" syntax). There was no change in behaviour, this was merely an alternative syntax. Instead of writing a method invocation like object = [[MyClass alloc] init]; [object firstLabel: param1 secondLabel: param2]; It was instead written as object = (MyClass.alloc).init; object.labels ( param1, param2 ); Similarly, declarations went from the form -(void) firstLabel: (int)param1 secondLabel: (int)param2; to -(void) labels ( int param1, int param2 ); This "modern" syntax is no longer supported in current dialects of the Objective-C language. mulle-objc The mulle-objc project is another re-implementation of Objective-C. It supports GCC or Clang/LLVM compilers as backends. It diverges from other runtimes in terms of syntax, semantics and ABI compatibility. It supports Linux, FreeBSD, and Windows. Portable Object Compiler Besides the GCC/NeXT/Apple implementation, which added several extensions to the original Stepstone implementation, another free, open-source Objective-C implementation called the Portable Object Compiler also exists. The set of extensions implemented by the Portable Object Compiler differs from the GCC/NeXT/Apple implementation; in particular, it includes Smalltalk-like blocks for Objective-C, while it lacks protocols and categories, two features used extensively in OpenStep and its derivatives and relatives. Overall, POC represents an older, pre-NeXT stage in the language's evolution, roughly conformant to Brad Cox's 1991 book. It also includes a runtime library called ObjectPak, which is based on Cox's original ICPak101 library (which in turn derives from the Smalltalk-80 class library), and is quite radically different from the OpenStep FoundationKit. GEOS Objective-C The PC GEOS system used a programming language known as GEOS Objective-C or goc; despite the name similarity, the two languages are similar only in overall concept and the use of keywords prefixed with an @ sign. Clang The Clang compiler suite, part of the LLVM project, implements Objective-C and other languages. After GCC 4.3 (2008) switched to GPLv3, Apple abandoned it in favor of clang, a compiler it has more legal power to modify. As a result, many of the modern Objective-C language features are supported only by Clang. Apple's versioning scheme for its clang-based "LLVM compiler" differs from the LLVM's open-source versioning. See for a translation GNU, GNUstep, and WinObjC The GNU project has, for a long time, been interested in a platform to port NeXT and Obj-C programs to. The ChangeLog for the directory in GCC suggests that it existed before 1998 (GCC 2.95), and its README further points at a rewrite in 1993 (GCC 2.4). The NeXT frontend source code was released since it was made as part of GCC, released GNU Public License which forces ones making derivative works to do so. Apple continued this tradition in releasing its fork of GCC up to 4.2.1, after which they abandoned the compiler. GCC maintainers took in the changes, but did not invest much in supporting newer features such as the Objective-C 2.0 language. The GNUstep developers, interested in the new language, forked the GCC to a project independent of GCC called in 2009. They also arranged for the runtime to be used with Clang to take advantage of the new language syntax. GCC moved slowly at the same time, but at GCC 4.6.0 (2011) they have moved on to Objective-C 2.0 in their libobjc as well. GNUstep documentation suggest that the GCC implementation still lacks support for blocks, non-fragile variables, and the newer ARC. Microsoft forked into a part of WinObjC, the iOS bridge for Universal Windows Platform, in 2015. Combined with its own implementation of Cocoa Touch and underlying APIs, the project allows the reuse of iOS Application code inside of UWP apps. On Windows, Objective-C Development tools are provided for download on GNUStep's website. The GNUStep Development System consists of the following packages: GNUstep MSYS System, GNUstep Core, GNUstep Devel, GNUstep Cairo, ProjectCenter IDE (Like Xcode, but not as complex), Gorm (Interface Builder Like Xcode NIB builder). These binary installers have not been updated since 2016, so it could be a better idea to just install by building under Cygwin or MSYS2 instead. Library use Objective-C today is often used in tandem with a fixed library of standard objects (often known as a "kit" or "framework"), such as Cocoa, GNUstep or ObjFW. These libraries often come with the operating system: the GNUstep libraries often come with Linux-based distributions and Cocoa comes with macOS. The programmer is not forced to inherit functionality from the existing base class (NSObject / OFObject). Objective-C allows for the declaration of new root classes that do not inherit any existing functionality. Originally, Objective-C-based programming environments typically offered an Object class as the base class from which almost all other classes inherited. With the introduction of OpenStep, NeXT created a new base class named NSObject, which offered additional features over Object (an emphasis on using object references and reference counting instead of raw pointers, for example). Almost all classes in Cocoa inherit from NSObject. Not only did the renaming serve to differentiate the new default behavior of classes within the OpenStep API, but it allowed code that used Object—the original base class used on NeXTSTEP (and, more or less, other Objective-C class libraries)—to co-exist in the same runtime with code that used NSObject (with some limitations). The introduction of the two letter prefix also became a simplistic form of namespaces, which Objective-C lacks. Using a prefix to create an informal packaging identifier became an informal coding standard in the Objective-C community, and continues to this day. More recently, package managers have started appearing, such as CocoaPods, which aims to be both a package manager and a repository of packages. A lot of open-source Objective-C code that was written in the last few years can now be installed using CocoaPods. Analysis of the language Objective-C implementations use a thin runtime system written in C, which adds little to the size of the application. In contrast, most object-oriented systems at the time that it was created used large virtual machine runtimes. Programs written in Objective-C tend to be not much larger than the size of their code and that of the libraries (which generally do not need to be included in the software distribution), in contrast to Smalltalk systems where a large amount of memory was used just to open a window. Objective-C applications tend to be larger than similar C or C++ applications because Objective-C dynamic typing does not allow methods to be stripped or inlined. Since the programmer has such freedom to delegate, forward calls, build selectors on the fly, and pass them to the runtime system, the Objective-C compiler cannot assume it is safe to remove unused methods or to inline calls. Likewise, the language can be implemented atop extant C compilers (in GCC, first as a preprocessor, then as a module) rather than as a new compiler. This allows Objective-C to leverage the huge existing collection of C code, libraries, tools, etc. Existing C libraries can be wrapped in Objective-C wrappers to provide an OO-style interface. In this aspect, it is similar to GObject library and Vala language, which are widely used in development of GTK applications. All of these practical changes lowered the barrier to entry, likely the biggest problem for the widespread acceptance of Smalltalk in the 1980s. A common criticism is that Objective-C does not have language support for namespaces. Instead, programmers are forced to add prefixes to their class names, which are traditionally shorter than namespace names and thus more prone to collisions. As of 2007, all macOS classes and functions in the Cocoa programming environment are prefixed with "NS" (e.g. NSObject, NSButton) to identify them as belonging to the macOS or iOS core; the "NS" derives from the names of the classes as defined during the development of NeXTSTEP. Since Objective-C is a strict superset of C, it does not treat C primitive types as first-class objects. Unlike C++, Objective-C does not support operator overloading. Also unlike C++, Objective-C allows an object to directly inherit only from one class (forbidding multiple inheritance). However, in most cases, categories and protocols may be used as alternative ways to achieve the same results. Because Objective-C uses dynamic runtime typing and because all method calls are function calls (or, in some cases, syscalls), many common performance optimizations cannot be applied to Objective-C methods (for example: inlining, constant propagation, interprocedural optimizations, and scalar replacement of aggregates). This limits the performance of Objective-C abstractions relative to similar abstractions in languages such as C++ where such optimizations are possible. Memory management The first versions of Objective-C did not support garbage collection. At the time this decision was a matter of some debate, and many people considered long "dead times" (when Smalltalk performed collection) to render the entire system unusable. Some 3rd party implementations have added this feature (most notably GNUstep using Boehm), and Apple has implemented it as of Mac OS X v10.5. However, in more recent versions of macOS and iOS, garbage collection has been deprecated in favor of Automatic Reference Counting (ARC), introduced in 2011. With ARC, the compiler inserts retain and release calls automatically into Objective-C code based on static code analysis. The automation relieves the programmer of having to write in memory management code. ARC also adds weak references to the Objective-C language. Philosophical differences between Objective-C and C++ The design and implementation of C++ and Objective-C represent fundamentally different approaches to extending C. In addition to C's style of procedural programming, C++ directly supports certain forms of object-oriented programming, generic programming, and metaprogramming. C++ also comes with a large standard library that includes several container classes. Similarly, Objective-C adds object-oriented programming, dynamic typing, and reflection to C. Objective-C does not provide a standard library per se, but in most places where Objective-C is used, it is used with an OpenStep-like library such as OPENSTEP, Cocoa, or GNUstep, which provides functionality similar to C++'s standard library. One notable difference is that Objective-C provides runtime support for reflective features, whereas C++ adds only a small amount of runtime support to C. In Objective-C, an object can be queried about its own properties, e.g., whether it will respond to a certain message. In C++, this is not possible without the use of external libraries. The use of reflection is part of the wider distinction between dynamic (run-time) features and static (compile-time) features of a language. Although Objective-C and C++ each employ a mix of both features, Objective-C is decidedly geared toward run-time decisions while C++ is geared toward compile-time decisions. The tension between dynamic and static programming involves many of the classic trade-offs in programming: dynamic features add flexibility, static features add speed and type checking. Generic programming and metaprogramming can be implemented in both languages using runtime polymorphism. In C++ this takes the form of virtual functions and runtime type identification, while Objective-C offers dynamic typing and reflection. Both Objective-C and C++ support compile-time polymorphism (generic functions), with Objective-C only adding this feature in 2015. See also C (programming language) C++ Comparison of programming languages Comparison with COM, GObject, SOM, Windows Runtime, XPCOM Swift (programming language) Xcode WinObjC (aka: Windows Bridge for iOS) References Further reading External links Programming with Objective-C, from Apple (2012-12-13) The Objective-C Programming Language, from Apple (2011-10-11) Objective-C Runtime Programming Guide, from Apple (2009-10-19) Objective-C GNUstep Base Programming Manual Objective-C by Brad Cox Objective-C FAQ C programming language family Class-based programming languages Dynamically typed programming languages GNUstep NeXT Object-oriented programming languages Programming languages created in 1986
70172591
https://en.wikipedia.org/wiki/Voicemeeter
Voicemeeter
Voicemeeter is a virtual mixing console and sound card running on the Windows operating system. It allows the processing of any audio signal - whether its source is physical (microphone) or virtual (application) - and its transmission to physical audio devices and/or applications. Voicemeeter offers many useful features for audio activities: VoIP users, video gamers, users of audio software such as VLC media player, Audacity, etc. Three versions of the software are available: Voicemeeter (or "Voicemeeter Standard") which offers two physical and one virtual inputs/outputs, Voicemeeter Pro (called "Banana") with three physical and two virtual inputs/outputs, an integrated recorder and additional audio processing, and Voicemeeter "Potato" offering five physical and three virtual inputs/outputs. Distributed according to the donationware model, the application can be downloaded for free. Features Virtual mixing console As a virtual mixing console, Voicemeeter makes it possible to interconnect and mix audio streams from many audio devices and applications thanks to the concept of physical inputs/outputs (for audio devices) and virtual inputs/outputs (for applications): USB microphone, DVD players, video games, iTunes, VoIP applications, Digital Audio Workstation (DAW), etc. Aggregation of audio devices and applications Voicemeeter makes it possible to mix multiple audio sources from different devices, such as a USB microphone or line input, with the sound of PC applications, such as a video player. Voicemeeter Standard offers two physical inputs and one virtual input. Voicemeeter Banana offers three physical inputs and two virtual ones. Voicemeeter Potato offers five physical inputs and three virtual ones. Mixing and real-time processing Just like a physical mixing console, Voicemeeter allows you to mix and process the different signals in real time with, in particular, equalizers, compressors and noise gates ("Audibility" button for Voicemeeter Standard), and gain controls materialized by vertical sliders. For the physical inputs, the Intellipan offers equalizers presented in the form of a two-dimensional panel allowing the rapid and almost instinctive correction of the intelligibility of the voice. In addition, Voicemeeter Banana has an advanced independent equalizer on each of the bus outputs. Multiple outputs The generated audio signals can then be sent separately to several physical (speakers, television, Bluetooth...) or virtual (Skype, Audacity, OBS, Twitch...) playback devices. Voicemeeter Standard has one physical output and one virtual output. Voicemeeter Banana has three physical outputs and two virtual outputs. Voicemeeter Potato has five physical outputs and three virtual outputs. Voicemeeter thus makes it easy, for example, to change your voice, add music and send all in a conversation via Skype or play 5.1 video games while conversing with your team. Built-in recording Voicemeeter Banana integrates an audio recorder, in the form of a cassette tape recorder from the 1980s, which allows recording bus inputs or outputs in WAV, AIFF, BWF and MP3 format. It is also an audio player supporting audio files in WAV, AIFF, MP3, M4A, MP4, MOV, AVI, WMA, WMV format,. Universal Audio Interface Voicemeeter can use Windows audio devices with WASAPI (WDM), Kernel Streaming or Multimedia Extensions interfaces and it can also manage an ASIO audio device (on output A1). It has one to three virtual inputs/outputs with all interfaces: WASAPI, KS, MME, WaveRT, DirectX as well as ASIO (to connect professional audio software to Voicemeeter). Voicemeeter Banana also offers a virtual ASIO insert driver to connect a VST host application (DAW) and process the various Voicemeeter inputs with software plug-in or any professional audio applications. Built-in audio device drivers Voicemeeter also comes with recording and playback audio drivers (giving the virtual inputs / outputs). Once these have been configured as default devices, they allow you to perform all previously mentioned tasks while avoiding conflicts between audio devices. Audio network The VBAN protocol makes it possible to send / receive uncompressed audio streams over a local area network and thus to interconnect computers without having to use audio cables. MIDI control The control of the main parameters by a MIDI control surface allows managing all the sound of the computer with a dedicated controller (Korg NanoKontrol for example). Programmable control and remote control Voicemeeter is installed with MacroButton, which allows you to create complex functions to act on one or more of the settings of Voicemeeter with a keyboard key (keyboard shortcut), a MIDI code, a threshold on an incoming signal (trigger) or an Xbox controller button (XInput). It is thus possible to change the Voicemeeter configuration with a single click and instantly adapt it to the different uses that one makes of it. VoicemeeterRemote API Voicemeeter can be considered as a system audio component that can be used by any application. An API called VoicemeeterRemote API allows read and write actions on Voicemeeter parameters and thus control Voicemeeter from a program to use it as an audio service or as a virtual sound card. A program can thus set up signal processing callbacks to process the sound in Voicemeeter. Any programming language can be used. Documentation Voicemeeter has a dedicated forum and a Discord server, managed by the development team and expert users. A detailed and regularly updated manual is also available for download on the publisher's website. In addition to the software's features, it presents the basic configuration to be carried out, proposes practical case studies and provides solutions to the most common problems. Video tutorials are also regularly posted on the Internet by Voicemeeter users. Distribution model Voicemeeter is distributed under the donationware model. The application can therefore be downloaded and used free of charge, without any limitation of functionalities. The user is then invited to make a donation to the developer, by selecting the amount of his contribution. See also Mixing console Audio mixing Signal processing References External links Official website Editor's website Voicemeeter Standard product page Voicemeeter Banana product page Voicemeeter Potato product page Voicemeeter Standard user guide Voicemeeter Banana user guide Voicemeeter Potato user guide User forum VoicemeeterRemote API Signal processing Digital audio Audio interfaces Audio network protocols Digital audio recording‎ Audio recording software Audio software‎ Free audio software‎ Audio mixing software‎ Voice over IP‎ Sound production technology Audio mixing Mixing consoles‎ Windows multimedia software
23292380
https://en.wikipedia.org/wiki/Information%20hiding
Information hiding
In computer science, information hiding is the principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed. The protection involves providing a stable interface which protects the remainder of the program from the implementation (whose details are likely to change). Written in another way, information hiding is the ability to prevent certain aspects of a class or software component from being accessible to its clients, using either programming language features (like private variables) or an explicit exporting policy. Overview The term encapsulation is often used interchangeably with information hiding. Not all agree on the distinctions between the two though; one may think of information hiding as being the principle and encapsulation being the technique. A software module hides information by encapsulating the information into a module or other construct which presents an interface. A common use of information hiding is to hide the physical storage layout for data so that if it is changed, the change is restricted to a small subset of the total program. For example, if a three-dimensional point (x,y,z) is represented in a program with three floating point scalar variables and later, the representation is changed to a single array variable of size three, a module designed with information hiding in mind would protect the remainder of the program from such a change. In object-oriented programming, information hiding (by way of nesting of types) reduces software development risk by shifting the code's dependency on an uncertain implementation (design decision) onto a well-defined interface. Clients of the interface perform operations purely through the interface, so, if the implementation changes, the clients do not have to change. Encapsulation In his book on object-oriented design, Grady Booch defined encapsulation as "the process of compartmentalizing the elements of an abstraction that constitute its structure and behavior; encapsulation serves to separate the contractual interface of an abstraction and its implementation." The purpose is to achieve the potential for change: the internal mechanisms of the component can be improved without impact on other components, or the component can be replaced with a different one that supports the same public interface. Encapsulation also protects the integrity of the component, by preventing users from setting the internal data of the component into an invalid or inconsistent state. Another benefit of encapsulation is that it reduces system complexity and thus increases robustness, by limiting the interdependencies between software components. In this sense, the idea of encapsulation is more general than how it is applied in object-oriented programming. For example, a relational database is encapsulated in the sense that its only public interface is a query language (such as SQL), which hides all the internal machinery and data structures of the database management system. As such, encapsulation is a core principle of good software architecture, at every level of granularity. Encapsulating software behind an interface allows the construction of objects that mimic the behavior and interactions of objects in the real world. For example, a simple digital alarm clock is a real-world object that a lay person can use and understand. They can understand what the alarm clock does, and how to use it through the provided interface (buttons and screen), without having to understand every part inside of the clock. Similarly, if the clock were replaced by a different model, the layperson could continue to use it in the same way, provided that the interface works the same. In the more concrete setting of an object-oriented programming language, the notion is used to mean either an information hiding mechanism, a bundling mechanism, or the combination of the two. (See Encapsulation (object-oriented programming) for details.) History The concept of information hiding was first described by David Parnas in . Before then, modularity was discussed by Richard Gauthier and Stephen Pont in their 1970 book Designing Systems Programs although modular programming itself had been used at many commercial sites for many years previously – especially in I/O sub-systems and software libraries – without acquiring the 'information hiding' tag – but for similar reasons, as well as the more obvious code reuse reason. Example Information hiding serves as an effective criterion for dividing any piece of equipment, software, or hardware, into modules of functionality. For instance, a car is a complex piece of equipment. In order to make the design, manufacturing, and maintenance of a car reasonable, the complex piece of equipment is divided into modules with particular interfaces hiding design decisions. By designing a car in this fashion, a car manufacturer can also offer various options while still having a vehicle that is economical to manufacture. For instance, a car manufacturer may have a luxury version of the car as well as a standard version. The luxury version comes with a more powerful engine than the standard version. The engineers designing the two different car engines, one for the luxury version and one for the standard version, provide the same interface for both engines. Both engines fit into the engine bay of the car which is the same between both versions. Both engines fit the same transmission, the same engine mounts, and the same controls. The differences in the engines are that the more powerful luxury version has a larger displacement with a fuel injection system that is programmed to provide the fuel-air mixture that the larger displacement engine requires. In addition to the more powerful engine, the luxury version may also offer other options such as a better radio with CD player, more comfortable seats, a better suspension system with wider tires, and different paint colors. With all of these changes, most of the car is the same between the standard version and the luxury version. The radio with CD player is a module that replaces the standard radio, also a module, in the luxury model. The more comfortable seats are installed into the same seat mounts as the standard types of seats. Whether the seats are leather or plastic, or offer lumbar support or not, doesn't matter. The engineers design the car by dividing the task up into pieces of work that are assigned to teams. Each team then designs their component to a particular standard or interface which allows the team flexibility in the design of the component while at the same time ensuring that all of the components will fit together. Motor vehicle manufacturers frequently use the same core structure for several different models, in part as a cost-control measure. Such a "platform" also provides an example of information hiding, since the floorplan can be built without knowing whether it is to be used in a sedan or a hatchback. As can be seen by this example, information hiding provides flexibility. This flexibility allows a programmer to modify the functionality of a computer program during normal evolution as the computer program is changed to better fit the needs of users. When a computer program is well designed, decomposing the source code solution into modules using the principle of information hiding, evolutionary changes are much easier because the changes typically are local rather than global changes. Cars provide another example of this in how they interface with drivers. They present a standard interface (pedals, wheel, shifter, signals, gauges, etc.) on which people are trained and licensed. Thus, people only have to learn to drive a car; they don't need to learn a completely different way of driving every time they drive a new model. (Granted, there are manual and automatic transmissions and other such differences, but on the whole, cars maintain a unified interface.) See also Implementation inheritance Inheritance semantics Modularity (programming) Opaque data type Virtual inheritance Transparency (human–computer interaction) Scope (programming) Compartmentalization (information security) Law of Demeter Notes References Object-oriented programming Programming principles
26255777
https://en.wikipedia.org/wiki/PALLAS
PALLAS
PALLAS stands for Parallel Applications, Libraries, Languages, Algorithms, and Systems. It is a research group in The Parallel Computing Laboratory of the Electrical Engineering and Computer Science Department at University of California, Berkeley, led by Professor Kurt Keutzer. The group believes that the productive development of applications for an emerging generation of highly parallel microprocessors is the preeminent programming challenge of our time. Its goal is to enable the productive development of efficient parallel applications by domain experts, not just parallel programming experts. The group conducts its research with the hypothesis that the key to the design of parallel programs is software architecture, and the key to their efficient implementation is frameworks. In its approach, the basis of both the software architecture and the corresponding frameworks is design patterns and a pattern language. Borrowed from civil architecture, the term design pattern means solutions to recurring design problems that domain experts learn. A pattern language is an organized way of navigating through a collection of design patterns to produce a design. The computational elements of Our Pattern Language(OPL) are built up from a series of computational patterns drawn largely from thirteen motifs . These are considered as the fundamental software building blocks that are then composed using the structural patterns of OPL drawn from common software architectural styles, such as pipe‐and‐filter. A software architecture is then the hierarchical composition of computational and structural patterns, which is subsequently refine using lower‐level design patterns. References PALLAS, the PALLAS website. Our Pattern Language, a set of patterns for parallel programming. Berkeley discusses progress in parallel programming, an EETimes article, 02/11/2010. Creating a Pattern Language for Parallel Programming: the evolving view from Berkeley, a report from the Intel Software Network, 12/08/2008. University of California, Berkeley Research institutes in the San Francisco Bay Area Parallel computing Software design patterns
49263118
https://en.wikipedia.org/wiki/Open%20Container%20Initiative
Open Container Initiative
The Open Container Initiative (OCI) is a Linux Foundation project, started in June 2015 by Docker, to design open standards for operating-system-level virtualization (software containers), most importantly Linux containers. Initiative There are currently two specifications in development and in use: Runtime Specification (runtime-spec) and the Image Specification (image-spec). OCI develops runc, a container runtime that implements their specification and serves as a basis for other higher-level tools. runC was first released in July 2015 as version 0.0.1. References External links Open Container Initiative website Open Container Initiative on GitHub Linux containerization Linux Foundation projects
80312
https://en.wikipedia.org/wiki/UAE%20%28emulator%29
UAE (emulator)
UAE is a computer emulator which emulates the hardware of Commodore International's Amiga range of computers. Released under the GNU General Public License, UAE is free software. History UAE was released in 1995 and was originally called the Unusable Amiga Emulator, due to its inability to boot. In its early stages, it was known as Unix Amiga Emulator and later with other names as well. Since none of the popular expansions fit any more, the abbreviation no longer stands for anything, and the software is simply known as UAE — this occasionally gets backronymed as Universal Amiga Emulator, Ultimate Amiga Emulator or Ubiquitous Amiga Emulator. Features UAE is almost a full-featured Amiga emulator. It emulates most of its functions: Original Chip Set (OCS), Enhanced Chip Set (ECS) and Advanced Graphics Architecture (AGA) I/O devices: (floppy disk drives, joystick, mouse and serial ports) Processor: Motorola 68000/010/020/040/060 CPU, optionally a 68881 FPU, and as of WinUAE 3.0.0 beta 15, an enhanced PowerPC JIT core using the QEMU CPU libraries. Memory: 2 MB Chip RAM and 8 MB Fast RAM, or 8 MB Chip RAM without Fast RAM. 64 MB Zorro III Fast RAM, independent of Chip RAM setting (68020+ only). 1 MB Slow RAM, for compatibility. Picasso 96 graphics with 8 MB of memory Serial port, and Simple parallel port is only sufficient for printing. Networking via bsdsocket.library emulation For software, UAE may use disk images made from original Amiga floppy disks. These images have the file extension of "ADF" (Amiga Disk File). Actual Amiga disks cannot be used, because of limitations in the floppy controllers used in other computers. Images of Amiga formatted hard drives can also be made. UAE also supports mapping host operating system's directories to Amiga hard drives. UAE does not include the original Amiga operating system ROM and files, which are required for running an Amiga system. These are included under license in packages like Amiga Forever. Original Kickstart 3.1 ROM images are also included with AmigaOS4 for PowerPC since version 4.1 Update 4. UAE also supports alternative system ROMs, such as those derived from the AROS project, however these do not provide the same degree of software compatibility as the original ROMs. Portability UAE has been ported to many host operating systems, including Linux, macOS, FreeBSD, DOS, Microsoft Windows, RISC OS, BeOS, Palm OS, Android, the Xbox console, the PSP, PSVita and GP2X handhelds, iOS, the Wii and Dreamcast consoles, and even to AmigaOS, MorphOS and AROS. Emulation speed There have been many threads in the past on Usenet and other public forums where people argued about the possibility of writing an Amiga emulator. Some considered UAE to be attempting the impossible; to be demanding that a system read, process and output 100 MB/s of data when the fastest PC was a 66 MHz 486, while keeping various emulated chips (the Amiga chipset) all in sync and appearing as they were supposed to appear to software. UAE was almost entirely unusable in its first releases, but slowly and step by step, it fleshed out its support of the Amiga chipset and by the end of 1997 was able to emulate an Amiga 500 at a quality and speed that were sufficient for productivity use and for many games. Since then, UAE has been usable, thanks partly to the effort taken to develop it and partly to the big improvements in technology that brought computers many times faster than those UAE was initially running on. Many Amiga games and applications can run smoothly on a Pentium II-era system. The realization that a useful Amiga emulator could be written contributed to an increase in enthusiasm about emulation, which started or sped-up efforts to write emulators for other and often less popular computer and electronic game architectures. A major improvement was made in 2000 by Bernd Meyer with the use of Just-in-time compilation, which significantly improved the emulation speed, to the extent that average PCs could now emulate some Amiga software faster than any real Amiga could run it. UAE can use as much of the host's power in native mode as possible, or balance it with other requirements of the host OS, or to accurately reflect the original speed, depending on a user's choice. UAE also provides an RTG-compatible "video card" for the Amiga side of the emulation which is tailored for display on the host hardware, so as not to be limited to the emulation of the original Amiga video hardware. Project development There are six main forks of the original program: WinUAE, designed to run on Windows PUAE, designed to run on Unix platforms (continuation of the abandoned E-UAE and also a port of WinUAE) FS-UAE, designed to run on Windows, macOS and Linux (a port of WinUAE with a focus on emulating games, featuring a new on-screen GUI and cross-platform online play) UAE4all, a stripped and optimized version, designed to emulate an OCS Amiga on low-end devices. UAE4all2 add AGA and hard disk support. Scripted Amiga Emulator (SAE), designed to run in a modern browser using JavaScript and HTML5. It is also based on WinUAE and was released on 1. September 2012 by Rupert Hausberger. SAE needs a very fast computer to run on. UAE4ARM, designed to run on ARM devices including the Raspberry Pi. It's the only fork supporting Just-In-Time on ARM devices. Others supported platforms are Pandora, Android and libretro. The most active fork is WinUAE; current versions of this still contain bugs and compatibility issues. Specific versions: See also Amiga Forever, Amiga emulator Basilisk II, Apple Macintosh emulator which uses UAE to emulate the 68k processor Hatari, Atari ST/STe/TT/Falcon computer series emulator which uses UAE for the core m68k emulation Previous, NeXT computer emulator, derived from Hatari Fellow, another Amiga emulator which was released not too long after the first usable versions of UAE, and generated competition beneficial to both projects. POSE, Palm OS emulator that is based on Copilot, which in turn was based on UAE's m68k emulation TiEmu, Texas Instruments calculator emulator, which uses UAE for the core m68k emulation References Announcement by Bernd Schmidt on Usenet, Message-ID: <[email protected]>. Announcement by Bernd Meyer of the Just In Time compiler on Usenet, Message-ID: <[email protected]>. External links UAE Website WinUAE Website PUAE - fork of E-UAE FS-UAE - A fork of WinUAE and E-UAE Scripted Amiga Emulator Gamebase Amiga - provides a single click ROM starting interface on top of WinUAE Amiga emulators AmigaOS 4 software Amiga emulation software Free emulation software GP2X emulation software MacOS emulation software MorphOS emulation software Linux emulation software Unix emulation software Windows emulation software 68k emulators 2005 software Cross-platform software
64681740
https://en.wikipedia.org/wiki/Workplace%20impact%20of%20artificial%20intelligence
Workplace impact of artificial intelligence
The impact of artificial intelligence on workers includes both applications to improve worker safety and health, and potential hazards that must be controlled. One potential application is using AI to eliminate hazards by removing humans from hazardous situations that involve risk of stress, overwork, or musculoskeletal injuries. Predictive analytics may also be used to identify conditions that may lead to hazards such as fatigue, repetitive strain injuries, or toxic substance exposure, leading to earlier interventions. Another is to streamline workplace safety and health workflows through automating repetitive tasks, enhancing safety training programs through virtual reality, or detecting and reporting near misses. When used in the workplace, AI also presents the possibility of new hazards. These may arise from machine learning techniques leading to unpredictable behavior and inscrutability in their decision-making, or from cybersecurity and information privacy issues. Many hazards of AI are psychosocial due to its potential to cause changes in work organization. These include changes in the skills required of workers, increased monitoring leading to micromanagement, algorithms unintentionally or intentionally mimicking undesirable human biases, and assigning blame for machine errors to the human operator instead. AI may also lead to physical hazards in the form of human–robot collisions, and ergonomic risks of control interfaces and human–machine interactions. Hazard controls include cybersecurity and information privacy measures, communication and transparency with workers about data usage, and limitations on collaborative robots. From a workplace safety and health perspective, only "weak" or "narrow" AI that is tailored to a specific task is relevant, as there are many examples that are currently in use or expected to come into use in the near future. "Strong" or "general" AI is not expected to be feasible in the near future, and discussion of its risks is within the purview of futurists and philosophers rather than industrial hygienists. Health and safety applications In order for any potential AI health and safety application to be adopted, it requires acceptance by both managers and workers. For example, worker acceptance may be diminished by concerns about information privacy, or from a lack of trust and acceptance of the new technology, which may arise from inadequate transparency or training. Alternatively, managers may emphasize increases in economic productivity rather than gains in worker safety and health when implementing AI-based systems. Eliminating hazardous tasks AI may increase the scope of work tasks where a worker can be removed from a situation that carries risk. In a sense, while traditional automation can replace the functions of a worker's body with a robot, AI effectively replaces the functions of their brain with a computer. Hazards that can be avoided include stress, overwork, musculoskeletal injuries, and boredom. This can expand the range of affected job sectors into white-collar and service sector jobs such as in medicine, finance, and information technology. As an example, call center workers face extensive health and safety risks due to its repetitive and demanding nature and its high rates of micro-surveillance. AI-enabled chatbots lower the need for humans to perform the most basic call center tasks. Analytics to reduce risk Machine learning is used for people analytics to make predictions about worker behavior to assist management decision-making, such as hiring and performance assessment. These could also be used to improve worker health. The analytics may be based on inputs such as online activities, monitoring of communications, location tracking, and voice analysis and body language analysis of filmed interviews. For example, sentiment analysis may be used to spot fatigue to prevent overwork. Decision support systems have a similar ability to be used to, for example, prevent industrial disasters or make disaster response more efficient. For manual material handling workers, predictive analytics and artificial intelligence may be used to reduce musculoskeletal injury. Traditional guidelines are based on statistical averages and are geared towards anthropometrically typical humans. The analysis of large amounts of data from wearable sensors may allow real-time, personalized calculation of ergonomic risk and fatigue management, as well as better analysis of the risk associated with specific job roles. Wearable sensors may also enable earlier intervention against exposure to toxic substances than is possible with area or breathing zone testing on a periodic basis. Furthermore, the large data sets generated could improve workplace health surveillance, risk assessment, and research. Streamlining safety and health workflows AI can also be used to make the workplace safety and health workflow more efficient. One example is coding of workers' compensation claims, which are submitted in a prose narrative form and must manually be assigned standardized codes. AI is being investigated to perform this task faster, more cheaply, and with fewer errors. AI‐enabled virtual reality systems may be useful for safety training for hazard recognition. Artificial intelligence may be used to more efficiently detect near misses. Reporting and analysis of near misses are important in reducing accident rates, but they are often underreported because they are not noticed by humans, or are not reported by workers due to social factors. Hazards There are several broad aspects of AI that may give rise to specific hazards. The risks depend on implementation rather than the mere presence of AI. Systems using sub-symbolic AI such as machine learning may behave unpredictably and are more prone to inscrutability in their decision-making. This is especially true if a situation is encountered that was not part of the AI's training dataset, and is exacerbated in environments that are less structured. Undesired behavior may also arise from flaws in the system's perception (arising either from within the software or from sensor degradation), knowledge representation and reasoning, or from software bugs. They may arise from improper training, such as a user applying the same algorithm to two problems that do not have the same requirements. Machine learning applied during the design phase may have different implications than that applied at runtime. Systems using symbolic AI are less prone to unpredictable behavior. The use of AI also increases cybersecurity risks relative to platforms that do not use AI, and information privacy concerns about collected data may pose a hazard to workers. Psychosocial Psychosocial hazards are those that arise from the way work is designed, organized, and managed, or its economic and social contexts, rather than arising from a physical substance or object. They cause not only psychiatric and psychological outcomes such as occupational burnout, anxiety disorders, and depression, but they can also cause physical injury or illness such as cardiovascular disease or musculoskeletal injury. Many hazards of AI are psychosocial in nature due to its potential to cause changes in work organization, in terms of increasing complexity and interaction between different organizational factors. However, psychosocial risks are often overlooked by designers of advanced manufacturing systems. Changes in work practices AI is expected to lead to changes in the skills required of workers, requiring training of existing workers, flexibility, and openness to change. The requirement for combining conventional expertise with computer skills may be challenging for existing workers. Over-reliance on AI tools may lead to deskilling of some professions. Increased monitoring may lead to micromanagement and thus to stress and anxiety. A perception of surveillance may also lead to stress. Controls for these include consultation with worker groups, extensive testing, and attention to introduced bias. Wearable sensors, activity trackers, and augmented reality may also lead to stress from micromanagement, both for assembly line workers and gig workers. Gig workers also lack the legal protections and rights of formal workers. There is also the risk of people being forced to work at a robot's pace, or to monitor robot performance at nonstandard hours. Bias Algorithms trained on past decisions may mimic undesirable human biases, for example, past discriminatory hiring and firing practices. Information asymmetry between management and workers may lead to stress, if workers do not have access to the data or algorithms that are the basis for decision-making. In addition to building a model with inadvertently discriminatory features, intentional discrimination may occur through designing metrics that covertly result in discrimination through correlated variables in a non-obvious way. In complex human‐machine interactions, some approaches to accident analysis may be biased to safeguard a technological system and its developers by assigning blame to the individual human operator instead. Physical Physical hazards in the form of human–robot collisions may arise from robots using AI, especially collaborative robots (cobots). Cobots are intended to operate in close proximity to humans, which makes impossible the common hazard control of isolating the robot using fences or other barriers, which is widely used for traditional industrial robots. Automated guided vehicles are a type of cobot that as of 2019 are in common use, often as forklifts or pallet jacks in warehouses or factories. For cobots, sensor malfunctions or unexpected work environment conditions can lead to unpredictable robot behavior and thus to human–robot collisions. Self-driving cars are another example of AI-enabled robots. In addition, the ergonomics of control interfaces and human–machine interactions may give rise to hazards. Hazard controls AI, in common with other computational technologies, requires cybersecurity measures to stop software breaches and intrusions, as well as information privacy measures. Communication and transparency with workers about data usage is a control for psychosocial hazards arising from security and privacy issues. Proposed best practices for employer‐sponsored worker monitoring programs include using only validated sensor technologies; ensuring voluntary worker participation; ceasing data collection outside the workplace; disclosing all data uses; and ensuring secure data storage. For industrial cobots equipped with AI‐enabled sensors, the International Organization for Standardization (ISO) recommended: (a) safety‐related monitored stopping controls; (b) human hand guiding of the cobot; (c) speed and separation monitoring controls; and (d) power and force limitations. Networked AI-enabled cobots may share safety improvements with each other. Human oversight is another general hazard control for AI. Risk management Both applications and hazards arising from AI can be considered as part of existing frameworks for occupational health and safety risk management. As with all hazards, risk identification is most effective and least costly when done in the design phase. Workplace health surveillance, the collection and analysis of health data on workers, is challenging for AI because labor data are often reported in aggregate and does not provide breakdowns between different types of work, and is focused on economic data such as wages and employment rates rather than skill content of jobs. Proxies for skill content include educational requirements and classifications of routine versus non-routine, and cognitive versus physical jobs. However, these may still not be specific enough to distinguish specific occupations that have distinct impacts from AI. The United States Department of Labor's Occupational Information Network is an example of a database with a detailed taxonomy of skills. Additionally, data are often reported on a national level, while there is much geographical variation, especially between urban and rural areas. Standards and regulation , ISO was developing a standard on the use of metrics and dashboards, information displays presenting company metrics for managers, in workplaces. The standard is planned to include guidelines for both gathering data and displaying it in a viewable and useful manner. In the European Union, the General Data Protection Regulation, while oriented towards consumer data, is also relevant for workplace data collection. Data subjects, including workers, have "the right not to be subject to a decision based solely on automated processing". Other relevant EU directives include the Machinery Directive (2006/42/EC), the Radio Equipment Directive (2014/53/EU), and the General Product Safety Directive (2001/95/EC). References Artificial intelligence Occupational safety and health
4251013
https://en.wikipedia.org/wiki/The%20Internet%20Adapter
The Internet Adapter
The Internet Adapter (TIA) was software created by Cyberspace Development in 1993 to allow SLIP connections over a shell account. PPP was added in 1995, by which time the software was marketed and sold by Intermind of Seattle. Shell accounts normally only allow the use of command line or text-based software, but by logging into a shell account and starting the TIA daemon, a user could then run any TCP/IP-based application, including standard GUI software such as the then-popular Netscape Navigator on their computer. This was especially useful at the time because simple shell accounts were much less expensive than full SLIP/PPP accounts. TIA was ported to a large number of unix or unix-like systems. Usage of TIA declined rapidly with the advent of inexpensive PPP-enabled consumer-level dial-up access. Also, competition from alternatives such as the free software Slirp cut its market share. Cyberspace Development later sold its domain name and its owners went on to other projects while Intermind moved on to Push Technology and automated data delivery. References Internet Protocol based network software 1993 software
42194234
https://en.wikipedia.org/wiki/Xor%E2%80%93encrypt%E2%80%93xor
Xor–encrypt–xor
The xor–encrypt–xor (XEX) is a (tweakable) mode of operation of a block cipher. XEX-based tweaked-codebook mode with ciphertext stealing (XTS mode) is one of the more popular modes of operation for whole-disk encryption. XEX is a common form of key whitening. XEX is part of some smart card proposals. History In 1984, to protect DES against exhaustive search attacks, Ron Rivest proposed DESX: XOR a prewhitening key to the plaintext, encrypt the result with DES using a secret key, and then XOR a postwhitening key to the encrypted result to produce the final ciphertext. In 1991, motivated by Rivest's DESX construction, Even and Mansour proposed a much simpler scheme (the "two-key Even–Mansour scheme"), which they suggested was perhaps the simplest possible block cipher: XOR the plaintext with a prewhitening key, apply a publicly known unkeyed permutation (in practice, a pseudorandom permutation) to the result, and then XOR a postwhitening key to the permuted result to produce the final ciphertext. Studying simple Even–Mansour style block ciphers gives insight into the security of Feistel ciphers (DES-like ciphers) and helps understand block cipher design in general. Orr Dunkelman, Nathan Keller, and Adi Shamir later proved it was possible to simplify the Even–Mansour scheme even further and still retain the same provable security, producing the "single-key Even–Mansour scheme": XOR the plaintext with the key, apply a publicly known unkeyed permutation to the result, and then XOR the same key to the permuted result to produce the final ciphertext. In 2004, Rogaway presented the XEX scheme. Rogaway used XEX to allow efficient processing of consecutive blocks (with respect to the cipher used) within one data unit (e.g., a disk sector) for whole-disk encryption. Many whole-disk encryption systems – BestCrypt, dm-crypt, FreeOTFE, TrueCrypt, DiskCryptor, FreeBSD's geli, OpenBSD softraid disk encryption software, and Mac OS X Lion's FileVault 2 – support XEX-based tweaked-codebook mode with ciphertext stealing (XTS mode). References Block cipher modes of operation Key management
24862960
https://en.wikipedia.org/wiki/Etherstack
Etherstack
Etherstack is a provider of wireless communications software to the Professional/Land Mobile Radio and defence industries in Europe, Asia and North America. Their products cover wireless protocol stacks, IP-based communication networks, cryptographic communication solutions, Software Defined Radio (SDR) and Software Communications Architecture (SCA) compatible waveforms. Etherstack provides these software technologies to defence organisations and commercial manufacturers, such as Icom, Inc.; the Swedish Defence Material Administration; and Raytheon JPS. History Etherstack originated in 1995 as a provider of hardware-independent protocol stacks, including MPT-1327, TETRA and APCO P25. In 2001, a software abstraction of the TETRA protocol stack developed by Etherstack was used by Racal (now part of Thales) in the development of a covert TETRA radio, designed for use by police and special forces. In 2006, Etherstack joined with Aeroflex to develop and market products for performing conformance tests against the TIA P25 protocol. On March 28, 2007, Icom, Inc. announced that they had signed a long-term MOU with Etherstack to work together on digital radio projects for various professional markets. Etherstack began work with the safety and security business unit of Cisco Systems in late 2007 on the development of a range of public safety radio network infrastructure products aimed at the first responder segment of North American markets. In 2008, Etherstack signed a second contract with the Swedish Defence Material Administration for the continued development and support of a TETRA-based mobile station using Etherstack's TETRA SCA waveform as part of the US Swedish JTRS co-operation project. The National Law Enforcement and Corrections Technology Center Communications Technologies Center of Excellence announced in January 2009 that it would launch a pilot of the APCO P25 radio network in Cape May County, New Jersey, that would integrating Etherstack's Land Mobile Radio network controller software. In March 2011, Etherstack and Alcatel-Lucent demonstrated a world first of integration of a native P25 PTT call over an LTE cellular network through to a traditional narrowband P25 network using the ISSI standard at the Bell Labs facility in New Jersey. Etherstack has been incorporated since 2006, with its corporate headquarters in London. The company operates research and development offices in New York, London, Barcelona, Yokohama, and Sydney. Products Etherstack produces SCA Software-defined radio (SDR) waveforms, Land Mobile Radio (LMR) protocol stacks, test platforms, and encryption solutions for the P25, TETRA, and MPT-1327 protocols. See also Software-defined radio Land Mobile Radio Software Communications Architecture References External links Communication software
731743
https://en.wikipedia.org/wiki/Charles%20Simonyi
Charles Simonyi
Charles Simonyi (; , ; born September 10, 1948) is a Hungarian-American software architect. He started and led Microsoft's applications group, where he built the first versions of Microsoft Office. He co-founded and led Intentional Software (acquired by Microsoft in 2017), with the aim of developing and marketing his concept of intentional programming. In April 2007, aboard Soyuz TMA-10, he became the fifth space tourist and the second Hungarian in space. In March 2009, aboard Soyuz TMA-14, he made a second trip to the International Space Station. Forbes magazine's 2021 list of The World's Billionaires estimated his net worth at US$5 billion. Biography Early life Simonyi was born in Budapest, Hungary. His father, Károly Simonyi, was a Kossuth Prize-winning professor of electrical engineering at the Technical University of Budapest, and created the first Hungarian nuclear particle accelerator. While in secondary school he worked part-time as a night watchman at a computer laboratory in the early 1960s, overseeing a large Soviet Ural II mainframe. He took an interest in computing and learned to program from one of the laboratory's engineers. By the time he left school, he had learned to develop compilers and sold one of these to a government department. He presented a demonstration of his compiler to the members of a Danish computer trade delegation. In 2006 he said when he was young his dream was, "to get out of Hungary, go to the West and be free." Career At the age of 17, Simonyi left Hungary on a short-term visa but did not return. He was hired by Denmark's A/S Regnecentralen in 1966 where he worked with Per Brinch Hansen and Peter Kraft on the RC 4000 minicomputer's Real-time Control System, and with Peter Naur on the GIER ALGOL compiler. He subsequently moved from Denmark to the United States in 1968 to attend the University of California, Berkeley, where he earned his B.S. in Engineering Mathematics & Statistics in 1972 under Butler Lampson. He has honorary doctorate degrees from the Juilliard School in New York and from the University of Pecs in Hungary. Simonyi was recruited to Xerox PARC by Butler Lampson during its most productive period, working alongside computer scientists Alan Kay, Butler Lampson, and Robert Metcalfe on the development of the Xerox Alto, one of the first personal computers. He and Lampson developed Bravo, the first WYSIWYG document preparation program, which became operational in 1974. During this time he received his Ph.D. in computer science from Stanford University in 1977 with a dissertation on a software project management technique he called meta-programming. This approach sought to defeat Brooks' law by scaling programming through a formalization of communication among programmers. In the 1992 book Accidental Empires (), Robert X. Cringely gave this description: Simonyi's dissertation was an attempt to describe a more efficient method of organizing programmers to write software... the metaprogrammer was the designer, decision maker, and communication controller in a software development group.... individual programmers were allowed to make no design decisions about the project. All they did was write the code as described by the metaprogrammer.... A programmer with a problem or a question would take it to the metaprogrammer, who could come up with an answer or transfer the question to another programmer... Simonyi remained at PARC until 1981. In 1997, Simonyi was elected a member of the National Academy of Engineering for developing widely used desktop productivity software. He also became a member of the American Academy of Arts and Sciences in 2008. Since 1998 Simonyi has served as member of the Board of Trustees of the Institute for Advanced Study in Princeton and was its Chairman in 2008. Simonyi received the Golden Plate Award of the American Academy of Achievement in 2000. Microsoft In 1981, at Metcalfe's suggestion, he visited Bill Gates at Microsoft who suggested Simonyi start an applications group at Microsoft with the first application being a WYSIWYG word processor. At Microsoft, Simonyi built the organization and applications of what became its most profitable products, Word and Excel, as well as Excel's predecessor Multiplan. For the applications, Simonyi pursued a strategy called the "revenue bomb", whereby the product ran on a virtual machine that was ported to each platform. The resulting applications were highly portable, although Microsoft's focus and IBM's standardization on MS-DOS eventually made portability less important. In a 2002 news item, The Age noted that Simonyi introduced the concept of metaprogramming at Microsoft, turning it into what people sometimes referred to as a software factory, but the metaprogramming concept "did not work out in practice." Simonyi introduced to Microsoft the techniques of object-oriented programming that he had learned at Xerox. He developed the Hungarian notation convention for naming variables. These standards were originally part of his doctoral thesis. The Hungarian notation has been widely used inside Microsoft. Intentional Software Simonyi remained at Microsoft during its rapid rise in the software industry, becoming one of its highest-ranking developers. He left Microsoft in 2002 to co-found, with business partner Gregor Kiczales, a company called Intentional Software. This company markets the intentional programming concepts Simonyi developed at Microsoft Research. In this approach to software, a programmer first builds a language environment specific to a given problem domain (such as life insurance). Domain experts, aided by the programmer, then describe the program's intended behavior in a What You See Is What You Get (WYSIWYG)-like manner. An automated system uses the program description and the language to generate the final program. Successive changes are only done at the WYSIWYG level. In 2004, Simonyi received the Wharton Infosys Business Transformation Award for the industry-wide impact of his innovative work in information technology. On April 18, 2017, Intentional Software was acquired by Microsoft. Patents Simonyi currently holds 11 patents: Philanthropy Simonyi has been an active philanthropist. He has funded the establishment of three professorships: In 1995, the Simonyi Professorship of the Public Understanding of Science at Oxford University, first held by Richard Dawkins (1995-2008), currently by Marcus du Sautoy A Simonyi Professorship for Innovation in Teaching endowed chair at Stanford University, held by Eric S. Roberts 1997-2002 In 2005, as part of $25 million donation, a Simonyi Professorship of Mathematical Physics at the Institute for Advanced Study in Princeton, New Jersey, held by Edward Witten 2005–present. In 2003 he founded the Charles and Lisa Simonyi Fund for Arts and Sciences, a nonprofit organization based in Seattle. The foundation provides grants to outstanding organization in art, sciences and education. Grant recipients have included the Seattle Symphony ($10 million), and the Seattle Public Library ($3 million), the Metropolitan Opera, the Juilliard School and the Vera C. Rubin Observatory, which will host the Simonyi Survey Telescope. The $100 million foundation closed in 2013. In January 2004, Simonyi created the Charles Simonyi Fund for Arts and Sciences, through which Simonyi supports Seattle-area arts, science, and educational programs. As of May 2012, the Fund size was $75 million. In February 2017, Simonyi and his wife Lisa gave the University of Washington Computer Science and Engineering (CSE) department $5 million towards the completion of a new building. Simonyi and his wife Lisa gave $52,700 to the 2016 presidential campaign of Donald Trump. They contributed $200,000 to Trump's 2020 re-election campaign. Personal life Simonyi is married to Lisa Persdotter, the daughter of a Swedish millionaire. She is 32 years his junior. They were engaged on 8 August 2008 and were married on 22 November 2008 in a private ceremony in Gothenburg, Sweden, attended by their closest friends, among them Bill Gates. Simonyi gained United States citizenship in 1982. Simonyi dated Martha Stewart for 15 years until 2008. Simonyi spends six months per year on his custom-built long super yacht named Skat. Simonyi's residence in Medina, Washington, "Villa Simonyi", is a modern house designed by architect Wendell Lovett, where Simonyi displays his collection of paintings by Roy Lichtenstein and Victor Vasarely. Spaceflights In early 2006, Simonyi expressed interest in becoming a space tourist and signed agreements with the space tourism company, Space Adventures, Ltd., for a ten-day mission to the International Space Station (ISS). In August 2006, he passed a pre-qualification medical exam by the Russian Federal Space Agency, called the State Medical Commission (GMK). He started training at Star City in September 2006. He launched on April 7, 2007 (GMT), on board Soyuz TMA-10. He shared a ride with two Russian cosmonauts to the International Space Station, and returned aboard Soyuz TMA-9, landing on April 21, 2007. Upon arrival to the ISS on April 9, 2007, Simonyi said, "It is amazing how it appears from the blackness of the sky. It was very, very dramatic. It was like a big stage set, a fantastic production of some incredible opera or modern play. That's what I was referring to when I said I was blown away." Simonyi's expected return on April 20, 2007, was delayed by one day due to 'boggy ground'. He returned to Earth on April 21, 2007 along with an American astronaut and a Russian cosmonaut. In October 2008, he booked for a second trip to the ISS through Space Adventures on board Soyuz TMA-14. On March 26, 2009 he returned to space aboard Soyuz TMA-14. He returned to Earth on board Soyuz TMA-13. Along with Soyuz Commander Yuri Lonchakov and Michael Fincke, Simonyi landed in Kazakhstan on April 8, 2009. Simonyi became the second Hungarian astronaut, the fifth space tourist, and the only one in history who went twice to space as a space tourist who paid his own way on spaceflights. Earlier, the Hungarians were the seventh nation to be represented in space, in 1980, by Bertalan Farkas's spaceflight, 27 years before Simonyi's first one, in 2007. The next Hungarian astronaut will follow Simonyi to the International Space Station by 2025. Radio communication while aboard ISS Charles Simonyi is a licensed amateur radio operator with the call sign KE7KDP, and planned to contact a number of schools while on his flight on the International Space Station using amateur radio for the communication with those schools. On April 11, 2007 the American Radio Relay League reported that Simonyi was already making ham radio contacts from space. One of the schools Simonyi contacted was Cedar Point Elementary in Bristow, Virginia. A telebridge conversation was held on Tuesday, April 17, 2007. On board with him were Oleg Kotov and Fyodor Yurchikhin. On March 30, 2009 he held a phone conversation with students at the Girls' Middle School in Mountain View, California, United States in which he said that one of the most surprising things about traveling to space was that upon returning to earth the air feels very thick, very heavy, like "breathing Pepto-Bismol." He also stated that talking with the students from the school "made his day." Simonyi used his Hungarian call sign HA5SIK when he contacted 25 radio amateurs from Hungary in a record attempt on April 12. He contacted former and current students of Tivadar Puskás Polytechnic, Budapest on April 13. Simonyi supports The Museum of Flight in Seattle, funding the Space Gallery housing the NASA Shuttle Trainer and many space artifacts. In popular culture Simonyi was portrayed by actor Brian Lester in the TV film Pirates of Silicon Valley. See also Hungarian notation References External links   Charles in Space Charles Simonyi, the benefactor of the Simonyi Professorship at the University of Oxford Charles Simonyi Fund for Arts and Sciences The Rosetta code: archaeology of the Gier-Algol compiler program (an Intentional Software presentation by Simonyi) Forbes interview, 23 December 2002   - An interview for the Computer History Museum by Grady Booch, 6 February 2008 1948 births Living people American astronauts American billionaires American computer programmers American computer scientists American philanthropists Hungarian astronauts Hungarian computer scientists Hungarian electrical engineers Hungarian emigrants to the United States Hungarian expatriates in Denmark Hungarian billionaires Members of the United States National Academy of Engineering Microsoft employees Engineers from Budapest Space tourists Stanford University School of Engineering alumni Trustees of the Institute for Advanced Study UC Berkeley College of Engineering alumni Scientists at PARC (company) People from Medina, Washington Amateur radio people
1325994
https://en.wikipedia.org/wiki/Softdisk
Softdisk
Softdisk was a software and Internet company based in Shreveport, Louisiana. Founded in 1981, its original products were disk magazines (which they termed "magazettes", for "magazine on diskette"). It was affiliated and partly owned by paper magazine Softalk at founding, but survived its demise. The company has been known by a variety of names, including Softdisk Magazette, Softdisk Publishing, Softdisk, Inc., Softdisk Internet Services, Softdisk, L.L.C., and Magazines On Disk. Softdisk is most well known for being the former workplace of several of the founders of id Software. Publications Publications included Softdisk for the Apple II; Loadstar for the Commodore 64; Big Blue Disk, The Gamer’s Edge, and PC Business Disk for the IBM PC; Diskworld (later Softdisk for Mac) and DTPublisher (specializing in desktop publishing) for the Apple Macintosh; Softdisk G-S for the Apple IIGS; Softdisk for Windows for the Windows platform, published from 1994-1999; and Shareware Spotlight, a short-lived publication featuring the best Shareware offerings for the PC. By the late 1990s, these publications were discontinued, although Loadstar had a continued life as an independent company catering to a cult following of Commodore buffs. Big Blue Disk Big Blue Disk was a monthly disk magazine that was published by Softdisk for IBM PC and compatibles that began publication in 1986. It required 256k of memory. Softdisk was sued by IBM for trademark infringement over the use of the name "Big Blue" in 1989. Standalone programs and Gamer's Edge Softdisk is most famous for being the former workplace of several of the founders of id Software, who worked on a short-lived game subscription product, Gamer's Edge. Gamer's Edge was a monthly PC game disk started in 1990 by John Romero. The disk's developers were John Carmack, John Romero, and Adrian Carmack. Tom Hall, then a programmer who worked in the Apple II department of Softdisk, would come in at night to help with the game design. Lane Roathe was the editor. These developers later left Softdisk to found id Software. To complete their contractual obligation to Softdisk, the developers built several more games for Softdisk, including Dangerous Dave in the Haunted Mansion, Rescue Rover, Hovertank 3D, Rescue Rover 2, Tiles of the Dragon, Catacomb 3D and Keen Dreams (the "lost" episode of the Commander Keen series). Softdisk later hired a new team to create new titles using the game engines of the earlier games, including the later founders of JAM Productions. This connection led to Softdisk being mentioned extensively in the earlier parts of the id chronicling book Masters of Doom. Also, some of the earliest employees of Origin Systems worked there before moving on: Greg Malone (Moebius, Windwalker), Dallas Snell (The Quest and Ring Quest), Joel Rea (The Quest and Ring Quest), and Alan Gardner (Windwalker, Ultima VI). Malone also later worked as a producer for 3D Realms. Softdisk continued to publish video games into the mid-1990s, most notably In Pursuit of Greed, based on an alpha version of the Doom engine derived from Shadowcaster, and Alien Rampage, based on the original Ravager side-scroller once being developed by Apogee. Current state Since 1995, Softdisk had been an Internet service provider, Web hosting service, and Internet developer as well, and this eventually became their primary area of business. They have offered local dialup service in the Shreveport area, and Web hosting and development services. As of 2006, their Web site redirected to that of Bayou Internet, which had taken over their Internet operations. The downloadstore.com site formerly owned and operated by Softdisk was later run by Flat Rock Software, which also published former Softdisk product Screen Saver Studio and most of the Gamer's Edge titles (as well as on GOG.com). The source code for Catacomb, Catacomb 3D and Hovertank 3D was released by Flat Rock in June 2014 under the GNU General Public License in a manner similar to those done by id and partners. References Further reading Kushner, David (2003). Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture, New York: Random House. . External links Softdisk Legacy Software Information (Official Site Archive) Licensed collection of the Apple versions: Softdisk Magazine; Softdisk G-S and UpTime (includes Mac) Softdisk at MobyGames Defunct software companies of the United States Internet service providers of the United States Companies based in Shreveport, Louisiana Software companies established in 1981 Software companies disestablished in 2014 Defunct companies based in Louisiana
17998874
https://en.wikipedia.org/wiki/India%E2%80%93Singapore%20relations
India–Singapore relations
India-Singapore relations (; ; ; ), also known as Indian-Singaporean relations or Indo-Singaporean relations, are the bilateral relations between India and Singapore. Relations between the two countries have traditionally been strong and friendly, with the two nations enjoying extensive cultural and commercial relations. India and Singapore have signed the Comprehensive Economic Cooperation Agreement (CECA) and strategic-relationship agreement in order to increase trade, investments and economic cooperation, and expanded bilateral cooperation on maritime security, training forces, joint naval exercises, developing military technology and fighting terrorism. According to a 2010 Gallup poll, 40% of Singaporeans approve of India's leadership, with 23% disapproving and 37% uncertain. Background India and Singapore share long-standing cultural, commercial and strategic relations, with Singapore being a part of the "Greater India" cultural and commercial region. More than 500,000 people of Indian origin live in Singapore. Following its independence in 1965, Singapore was concerned with China-backed communist threats as well as domination from Malaysia and Indonesia and sought a close strategic relationship with India, which it saw as a counterbalance to Chinese influence and a partner in achieving regional security. Singapore had always been an important strategic trading post, giving India trade access to the Far East. Although the rival positions of both nations over the Vietnam War and the Cold War caused consternation between India and Singapore, their relationship expanded significantly in the 1990s; Singapore was one of the first to respond to India's "Look East" Policy of expanding its economic, cultural and strategic ties in Southeast Asia to strengthen its standing as a regional power. Development of bilateral relations Diplomatic relations between India and Singapore were established on 24 August 1965, fifteen days after the latter became independent. Ever since Singapore's independence, both nations have maintained high-level contacts. Between 1966 and 1971 the Prime Minister of Singapore Lee Kuan Yew visited India three times (1966, 1970 and 1971). The then-Indian Prime Minister Indira Gandhi visited Singapore in 1968, as did Indian leader Morarji Desai. Singapore supported India's bid to become a permanent member of the U.N. Security Council and expand its role and influence in the Association of Southeast Asian Nations (ASEAN). Singapore also supported India in its war against Pakistan in 1965 and the Kashmir conflict. Military relations between the two nations had been limited due to foreign policy differences in the Cold War era, as Singapore was allied with Nato, whilst India established itself as a founding member of the Non-Aligned Movement, and as the only South Asian country to recognise the Democratic Republic of Afghanistan. In 2003, India and Singapore signed a bilateral agreement on expanding military cooperation, conducting joint military training, developing military technology and achieving maritime security. The Singaporean Navy and the Indian Navy have conducted joint naval exercises and training since 1993 such as SIMBEX and MILAN near India's Andaman and Nicobar Islands. India and Singapore have also expanded their cooperation in fighting terrorism. Over the last two decades, Singapore has positioned itself as the hub of India's economic, political and strategic relationships in Southeast Asia. When India announced its Look East policy in 1992, Singapore positioned itself as India's de facto regional sponsor. As Indian Defence Minister Pranab Mukherjee commented in 2006, Singapore has become “the hub of its political, economic and security strategy in the whole of East Asia.” After the death of Lee Kuan Yew in 2015, India followed with a weekend of national mourning in memory of the founding father of Singapore, and Prime Minister Narendra Modi visited Singapore in November 2015 reaffirming fifty years of bilateral relations. Commerce Singapore is the 8th largest source of investment in India and the largest amongst ASEAN member nations. It is also India's 9th biggest trading partner as of 2005–06. Its cumulative investment in India totals US$3 billion as of 2006 and is expected to rise to $5 billion by 2010 and $10 billion by 2015. India's economic liberalisation and its "Look East" policy have led to a major expansion in bilateral trade, which grew from US$2.2 billion in 2001 to $9 billion – 10 billion in 2006 – a 400% growth in the span of five years – and to $50 billion by 2010. Singapore accounts for 38% of India's trade with ASEAN member nations and 3.4% of its total foreign trade. India's main exports to Singapore in 2005 included petroleum, gemstones, jewellery, machinery and its imports from Singapore included electronic goods, organic chemicals and metals. More than half of Singapore's exports to India are "re-exports" – items that had been imported from India. In 2005, both nations signed the Comprehensive Economic Cooperation Agreement (CECA) and have organised the India-Singapore Parliamentary Forum and the Singapore-India Partnership foundation with active support from the Federation of Indian Chambers of Commerce and Industry (FICC), the Confederation of Indian Industry (CII) and the Singapore Business Federation to promote trade, economic development and partnerships. The CECA eliminated tariff barriers, double taxation, duplicate processes and regulations and provided unhindered access and collaboration between the financial institutions of Singapore and India. The CECA also enhanced bilateral collaboration related to education, science and technology, intellectual property, aviation and relaxed visa regulations for Indian professionals in information technology, medicine, engineering and financial fields to emigrate and work in Singapore. Singapore has invested in projects to upgrade India's ports, airports and developing information technology parks and a Special Economic Zone (SEZ). India has become Singapore's 4th biggest tourist destination and more than 650,000 Indians visited Singapore in 2006. Both nations have worked to collaborate on aviation, aerospace engineering, space programmes, information technology, biotechnology and energy. Singapore and India successfully concluded the second review of the India-Singapore Comprehensive Economic Cooperation Agreement (CECA) on 1 June 2018 in the presence of India Prime Minister Narendra Modi and Singapore Prime Minister Lee Hsien Loong. In September 2018, India and Singapore formally launched the third review of CECA which focuses on trade facilitation, e-commerce and customs. Military cooperation In 1994, India and Singapore began their annual naval combat exercise, now called "SIMBEX" Several warships from India and Singapore took part in this interoperable combat exercise. In 2003, India and Singapore signed a Defence Cooperation Agreement, allowing Singapore army and air force to conduct training on Indian soil. On 24 November 2015, India and Singapore signed the agreement for the "strategic relationship" across the board including defence and military, security and intelligence cooperation, political exchanges, enhancing trade and investment, improving financial linkages, improving air connectivity and cooperation in multilateral forums. On 29 November 2017, the two countries signed a naval cooperation agreement aimed at boosting maritime security, joint exercises and mutual logistics support. The agreement also permits ships of either navy to refuel, restock and, rearm at each other military bases. After signing the agreement, Singapore's Defence Minister Dr. Ng Eng Hen stated, "not only would we be more comfortable, we would encourage the Indian Navy to visit Changi Naval base more often". The Republic of Singapore Air Force (RSAF) and the Indian Air Force (IAF) regularly conduct joint military training exercises. India and Singapore also signed the revised Defence Cooperation Agreement to strengthen the existing defence relationship between Indian military and Singapore Armed Forces on 29 November 2017. In 2018, "India-Singapore Bilateral Agreement for Navy Cooperation" was signed which gave Indian Navy ships access to Singapore's Changi Naval Base near the disputed South China Sea, mutual logistical support and refuelling rights at the port. Impact of COVID-19 When the COVID-19 pandemic in Singapore was declared in 2019, India and Singapore unilaterally stopped issuing short-term tourist visas from 11 March and 24 March 2020 onwards respectively. Before Singapore stopped releasing individual case details in April 2020, more than 1,600 Indian nationals were diagnosed with COVID-19. In May 2020, India embarked on a repatriation scheme which would have brought back 1,250 Indian nationals from Singapore, while assisted Singapore in repatriating approximately 400 Singaporeans from India. Despite the pandemic, investment flows between the two countries had 'slowed down a little bit' with approximately US$2 billion worth of investments going into India. As India experienced its second wave of infections beginning March 2021, India faced an oxygen shortage nationwide to treat COVID-19 patients. Four cryogenic oxygen tanks donated by Tata Group, which were being used for transporting oxygen across the nation, were airlifted by the Indian Air Force from Singapore. The Republic of Singapore Air Force also sent two planeloads of oxygen supplies, and Temasek Holdings, one of the two Singaporean government investment companies, donated medical supplies such as ventilators and oxygen concentrators. Various ground-up initiatives had started as well in Singapore to raise funds and gather supplies for those affected in India. In May, Delhi Chief Minister Arvind Kejriwal claimed without evidence that a new COVID-19 variant from Singapore was extremely dangerous for children and could result in a third wave in India. Singapore's ministry of health had to clarify there was no Singapore variant nor any evidence of a Covid-19 variant extremely dangerous for kids. It became apparent that the increase in COVID cases came from the SARS-CoV-2 Delta variant originating in India. See also Indians in Singapore References Singapore Bilateral relations of Singapore
1174
https://en.wikipedia.org/wiki/Aphrodite
Aphrodite
Aphrodite ( ; ; , , ) is an ancient Greek goddess associated with love, lust, beauty, pleasure, passion and procreation. She was syncretized with the Roman goddess . Aphrodite's major symbols include myrtles, roses, doves, sparrows, and swans. The cult of Aphrodite was largely derived from that of the Phoenician goddess Astarte, a cognate of the East Semitic goddess Ishtar, whose cult was based on the Sumerian cult of Inanna. Aphrodite's main cult centers were Cythera, Cyprus, Corinth, and Athens. Her main festival was the Aphrodisia, which was celebrated annually in midsummer. In Laconia, Aphrodite was worshipped as a warrior goddess. She was also the patron goddess of prostitutes, an association which led early scholars to propose the concept of "sacred prostitution" in Greco-Roman culture, an idea which is now generally seen as erroneous. In Hesiod's Theogony, Aphrodite is born off the coast of Cythera from the foam (, ) produced by Uranus's genitals, which his son Cronus had severed and thrown into the sea. In Homer's Iliad, however, she is the daughter of Zeus and Dione. Plato, in his Symposium 180e, asserts that these two origins actually belong to separate entities: Aphrodite Ourania (a transcendent, "Heavenly" Aphrodite) and Aphrodite Pandemos (Aphrodite common to "all the people"). Aphrodite had many other epithets, each emphasizing a different aspect of the same goddess, or used by a different local cult. Thus she was also known as Cytherea (Lady of Cythera) and Cypris (Lady of Cyprus), because both locations claimed to be the place of her birth. In Greek mythology, Aphrodite was married to Hephaestus, the god of fire, blacksmiths and metalworking. Aphrodite was frequently unfaithful to him and had many lovers; in the Odyssey, she is caught in the act of adultery with Ares, the god of war. In the First Homeric Hymn to Aphrodite, she seduces the mortal shepherd Anchises. Aphrodite was also the surrogate mother and lover of the mortal shepherd Adonis, who was killed by a wild boar. Along with Athena and Hera, Aphrodite was one of the three goddesses whose feud resulted in the beginning of the Trojan War and she plays a major role throughout the Iliad. Aphrodite has been featured in Western art as a symbol of female beauty and has appeared in numerous works of Western literature. She is a major deity in modern Neopagan religions, including the Church of Aphrodite, Wicca, and Hellenismos. Etymology Hesiod derives Aphrodite from () "sea-foam", interpreting the name as "risen from the foam", but most modern scholars regard this as a spurious folk etymology. Early modern scholars of classical mythology attempted to argue that Aphrodite's name was of Greek or Indo-European origin, but these efforts have now been mostly abandoned. Aphrodite's name is generally accepted to be of non-Greek, probably Semitic, origin, but its exact derivation cannot be determined. Scholars in the late nineteenth and early twentieth centuries, accepting Hesiod's "foam" etymology as genuine, analyzed the second part of Aphrodite's name as *-odítē "wanderer" or *-dítē "bright". More recently, Michael Janda, also accepting Hesiod's etymology, has argued in favor of the latter of these interpretations and claims the story of a birth from the foam as an Indo-European mytheme. Similarly, Krzysztof Tomasz Witczak proposes an Indo-European compound "very" and "to shine", also referring to Eos, and Daniel Kölligan has interpreted her name as "shining up from the mist/foam". Other scholars have argued that these hypotheses are unlikely since Aphrodite's attributes are entirely different from those of both Eos and the Vedic deity Ushas. A number of improbable non-Greek etymologies have also been suggested. One Semitic etymology compares Aphrodite to the Assyrian barīrītu, the name of a female demon that appears in Middle Babylonian and Late Babylonian texts. Hammarström looks to Etruscan, comparing (e)prθni "lord", an Etruscan honorific loaned into Greek as πρύτανις. This would make the theonym in origin an honorific, "the lady". Most scholars reject this etymology as implausible, especially since Aphrodite actually appears in Etruscan in the borrowed form Apru (from Greek , clipped form of Aphrodite). The medieval Etymologicum Magnum (c. 1150) offers a highly contrived etymology, deriving Aphrodite from the compound habrodíaitos (), "she who lives delicately", from habrós and díaita. The alteration from b to ph is explained as a "familiar" characteristic of Greek "obvious from the Macedonians". Origins Near Eastern love goddess The cult of Aphrodite in Greece was imported from, or at least influenced by, the cult of Astarte in Phoenicia, which, in turn, was influenced by the cult of the Mesopotamian goddess known as "Ishtar" to the East Semitic peoples and as "Inanna" to the Sumerians. Pausanias states that the first to establish a cult of Aphrodite were the Assyrians, followed by the Paphians of Cyprus and then the Phoenicians at Ascalon. The Phoenicians, in turn, taught her worship to the people of Cythera. Aphrodite took on Inanna-Ishtar's associations with sexuality and procreation. Furthermore, she was known as Ourania (Οὐρανία), which means "heavenly", a title corresponding to Inanna's role as the Queen of Heaven. Early artistic and literary portrayals of Aphrodite are extremely similar on Inanna-Ishtar. Like Inanna-Ishtar, Aphrodite was also a warrior goddess; the second-century AD Greek geographer Pausanias records that, in Sparta, Aphrodite was worshipped as Aphrodite Areia, which means "warlike". He also mentions that Aphrodite's most ancient cult statues in Sparta and on Cythera showed her bearing arms. Modern scholars note that Aphrodite's warrior-goddess aspects appear in the oldest strata of her worship and see it as an indication of her Near Eastern origins. Nineteenth century classical scholars had a general aversion to the idea that ancient Greek religion was at all influenced by the cultures of the Near East, but, even Friedrich Gottlieb Welcker, who argued that Near Eastern influence on Greek culture was largely confined to material culture, admitted that Aphrodite was clearly of Phoenician origin. The significant influence of Near Eastern culture on early Greek religion in general, and on the cult of Aphrodite in particular, is now widely recognized as dating to a period of orientalization during the eighth century BC, when archaic Greece was on the fringes of the Neo-Assyrian Empire. Indo-European dawn goddess Some early comparative mythologists opposed to the idea of a Near Eastern origin argued that Aphrodite originated as an aspect of the Greek dawn goddess Eos and that she was therefore ultimately derived from the Proto-Indo-European dawn goddess *Haéusōs (properly Greek Eos, Latin Aurora, Sanskrit Ushas). Most modern scholars have now rejected the notion of a purely Indo-European Aphrodite, but it is possible that Aphrodite, originally a Semitic deity, may have been influenced by the Indo-European dawn goddess. Both Aphrodite and Eos were known for their erotic beauty and aggressive sexuality and both had relationships with mortal lovers. Both goddesses were associated with the colors red, white, and gold. Michael Janda etymologizes Aphrodite's name as an epithet of Eos meaning "she who rises from the foam [of the ocean]" and points to Hesiod's Theogony account of Aphrodite's birth as an archaic reflex of Indo-European myth. Aphrodite rising out of the waters after Cronus defeats Uranus as a mytheme would then be directly cognate to the Rigvedic myth of Indra defeating Vrtra, liberating Ushas. Another key similarity between Aphrodite and the Indo-European dawn goddess is her close kinship to the Greek sky deity, since both of the main claimants to her paternity (Zeus and Uranus) are sky deities. Forms and epithets Aphrodite's most common cultic epithet was Ourania, meaning "heavenly", but this epithet almost never occurs in literary texts, indicating a purely cultic significance. Another common name for Aphrodite was Pandemos ("For All the Folk"). In her role as Aphrodite Pandemos, Aphrodite was associated with Peithō (), meaning "persuasion", and could be prayed to for aid in seduction. The character of Pausanias in Plato's Symposium, takes differing cult-practices associated with different epithets of the goddess to claim that Ourania and Pandemos are, in fact, separate goddesses. He asserts that Aphrodite Ourania is the celestial Aphrodite, born from the sea foam after Cronus castrated Uranus, and the older of the two goddesses. According to the Symposium, Aphrodite Ourania is the inspiration of male homosexual desire, specifically the ephebic eros, and pederasty. Aphrodite Pandemos, by contrast, is the younger of the two goddesses: the common Aphrodite, born from the union of Zeus and Dione, and the inspiration of heterosexual desire and sexual promiscuity, the "lesser" of the two loves. Paphian (Παφία), was one of her epithets, after the Paphos in Cyprus where she had emerged from the sea at her birth. Among the Neoplatonists and, later, their Christian interpreters, Ourania is associated with spiritual love, and Pandemos with physical love (desire). A representation of Ourania with her foot resting on a tortoise came to be seen as emblematic of discretion in conjugal love; it was the subject of a chryselephantine sculpture by Phidias for Elis, known only from a parenthetical comment by the geographer Pausanias. One of Aphrodite's most common literary epithets is Philommeidḗs (), which means "smile-loving", but is sometimes mistranslated as "laughter-loving". This epithet occurs throughout both of the Homeric epics and the First Homeric Hymn to Aphrodite. Hesiod references it once in his Theogony in the context of Aphrodite's birth, but interprets it as "genital-loving" rather than "smile-loving". Monica Cyrino notes that the epithet may relate to the fact that, in many artistic depictions of Aphrodite, she is shown smiling. Other common literary epithets are Cypris and Cythereia, which derive from her associations with the islands of Cyprus and Cythera respectively. On Cyprus, Aphrodite was sometimes called Eleemon ("the merciful"). In Athens, she was known as Aphrodite en kopois ("Aphrodite of the Gardens"). At Cape Colias, a town along the Attic coast, she was venerated as Genetyllis "Mother". The Spartans worshipped her as Potnia "Mistress", Enoplios "Armed", Morpho "Shapely", Ambologera "She who Postpones Old Age". Across the Greek world, she was known under epithets such as Melainis "Black One", Skotia "Dark One", Androphonos "Killer of Men", Anosia "Unholy", and Tymborychos "Gravedigger", all of which indicate her darker, more violent nature. A male version of Aphrodite known as Aphroditus was worshipped in the city of Amathus on Cyprus. Aphroditus was depicted with the figure and dress of a woman, but had a beard, and was shown lifting his dress to reveal an erect phallus. This gesture was believed to be an apotropaic symbol, and was thought to convey good fortune upon the viewer. Eventually, the popularity of Aphroditus waned as the mainstream, fully feminine version of Aphrodite became more popular, but traces of his cult are preserved in the later legends of Hermaphroditus. Worship Classical period Aphrodite's main festival, the Aphrodisia, was celebrated across Greece, but particularly in Athens and Corinth. In Athens, the Aphrodisia was celebrated on the fourth day of the month of Hekatombaion in honor of Aphrodite's role in the unification of Attica. During this festival, the priests of Aphrodite would purify the temple of Aphrodite Pandemos on the southwestern slope of the Acropolis with the blood of a sacrificed dove. Next, the altars would be anointed and the cult statues of Aphrodite Pandemos and Peitho would be escorted in a majestic procession to a place where they would be ritually bathed. Aphrodite was also honored in Athens as part of the Arrhephoria festival. The fourth day of every month was sacred to Aphrodite. Pausanias records that, in Sparta, Aphrodite was worshipped as Aphrodite Areia, which means "warlike". This epithet stresses Aphrodite's connections to Ares, with whom she had extramarital relations. Pausanias also records that, in Sparta and on Cythera, a number of extremely ancient cult statues of Aphrodite portrayed her bearing arms. Other cult statues showed her bound in chains. Aphrodite was the patron goddess of prostitutes of all varieties, ranging from pornai (cheap street prostitutes typically owned as slaves by wealthy pimps) to hetairai (expensive, well-educated hired companions, who were usually self-employed and sometimes provided sex to their customers). The city of Corinth was renowned throughout the ancient world for its many hetairai, who had a widespread reputation for being among the most skilled, but also the most expensive, prostitutes in the Greek world. Corinth also had a major temple to Aphrodite located on the Acrocorinth and was one of the main centers of her cult. Records of numerous dedications to Aphrodite made by successful courtesans have survived in poems and in pottery inscriptions. References to Aphrodite in association with prostitution are found in Corinth as well as on the islands of Cyprus, Cythera, and Sicily. Aphrodite's Mesopotamian precursor Inanna-Ishtar was also closely associated with prostitution. Scholars in the nineteenth and twentieth centuries believed that the cult of Aphrodite may have involved ritual prostitution, an assumption based on ambiguous passages in certain ancient texts, particularly a fragment of a skolion by the Boeotian poet Pindar, which mentions prostitutes in Corinth in association with Aphrodite. Modern scholars now dismiss the notion of ritual prostitution in Greece as a "historiographic myth" with no factual basis. Hellenistic and Roman periods During the Hellenistic period, the Greeks identified Aphrodite with the ancient Egyptian goddesses Hathor and Isis. Aphrodite was the patron goddess of the Lagid queens and Queen Arsinoe II was identified as her mortal incarnation. Aphrodite was worshipped in Alexandria and had numerous temples in and around the city. Arsinoe II introduced the cult of Adonis to Alexandria and many of the women there partook in it. The Tessarakonteres, a gigantic catamaran galley designed by Archimedes for Ptolemy IV Philopator, had a circular temple to Aphrodite on it with a marble statue of the goddess herself. In the second century BC, Ptolemy VIII Physcon and his wives Cleopatra II and Cleopatra III dedicated a temple to Aphrodite Hathor at Philae. Statuettes of Aphrodite for personal devotion became common in Egypt starting in the early Ptolemaic times and extending until long after Egypt became a Roman province. The ancient Romans identified Aphrodite with their goddess Venus, who was originally a goddess of agricultural fertility, vegetation, and springtime. According to the Roman historian Livy, Aphrodite and Venus were officially identified in the third century BC when the cult of Venus Erycina was introduced to Rome from the Greek sanctuary of Aphrodite on Mount Eryx in Sicily. After this point, Romans adopted Aphrodite's iconography and myths and applied them to Venus. Because Aphrodite was the mother of the Trojan hero Aeneas in Greek mythology and Roman tradition claimed Aeneas as the founder of Rome, Venus became venerated as Venus Genetrix, the mother of the entire Roman nation. Julius Caesar claimed to be directly descended from Aeneas's son Iulus and became a strong proponent of the cult of Venus. This precedent was later followed by his nephew Augustus and the later emperors claiming succession from him. This syncretism greatly impacted Greek worship of Aphrodite. During the Roman era, the cults of Aphrodite in many Greek cities began to emphasize her relationship with Troy and Aeneas. They also began to adopt distinctively Roman elements, portraying Aphrodite as more maternal, more militaristic, and more concerned with administrative bureaucracy. She was claimed as a divine guardian by many political magistrates. Appearances of Aphrodite in Greek literature also vastly proliferated, usually showing Aphrodite in a characteristically Roman manner. Mythology Birth Aphrodite is usually said to have been born near her chief center of worship, Paphos, on the island of Cyprus, which is why she is sometimes called "Cyprian", especially in the poetic works of Sappho. The Sanctuary of Aphrodite Paphia, marking her birthplace, was a place of pilgrimage in the ancient world for centuries. Other versions of her myth have her born near the island of Cythera, hence another of her names, "Cytherea". Cythera was a stopping place for trade and culture between Crete and the Peloponesus, so these stories may preserve traces of the migration of Aphrodite's cult from the Middle East to mainland Greece. According to the version of her birth recounted by Hesiod in his Theogony, Cronus severed Uranus' genitals and threw them behind him into the sea. The foam from his genitals gave rise to Aphrodite (hence her name, which Hesiod interprets as "foam-arisen"), while the Giants, the Erinyes (furies), and the Meliae emerged from the drops of his blood. Hesiod states that the genitals "were carried over the sea a long time, and white foam arose from the immortal flesh; with it a girl grew." Hesiod's account of Aphrodite's birth following Uranus's castration is probably derived from The Song of Kumarbi, an ancient Hittite epic poem in which the god Kumarbi overthrows his father Anu, the god of the sky, and bites off his genitals, causing him to become pregnant and give birth to Anu's children, which include Ishtar and her brother Teshub, the Hittite storm god. In the Iliad, Aphrodite is described as the daughter of Zeus and Dione. Dione's name appears to be a feminine cognate to Dios and Dion, which are oblique forms of the name Zeus. Zeus and Dione shared a cult at Dodona in northwestern Greece. In Theogony, Hesiod describes Dione as an Oceanid. Marriage Aphrodite is consistently portrayed as a nubile, infinitely desirable adult, having had no childhood. She is often depicted nude. In the Iliad, Aphrodite is the apparently unmarried consort of Ares, the god of war, and the wife of Hephaestus is a different goddess named Charis. Likewise, in Hesiod's Theogony, Aphrodite is unmarried and the wife of Hephaestus is Aglaea, the youngest of the three Charites. In Book Eight of the Odyssey, however, the blind singer Demodocus describes Aphrodite as the wife of Hephaestus and tells how she committed adultery with Ares during the Trojan War. The sun-god Helios saw Aphrodite and Ares having sex in Hephaestus's bed and warned Hephaestus, who fashioned a net of gold. The next time Ares and Aphrodite had sex together, the net trapped them both. Hephaestus brought all the gods into the bedchamber to laugh at the captured adulterers, but Apollo, Hermes, and Poseidon had sympathy for Ares and Poseidon agreed to pay Hephaestus for Ares's release. Humiliated, Aphrodite returned to Cyprus, where she was attended by the Charites. This narrative probably originated as a Greek folk tale, originally independent of the Odyssey. Later stories were invented to explain Aphrodite's marriage to Hephaestus. In the most famous story, Zeus hastily married Aphrodite to Hephaestus in order to prevent the other gods from fighting over her. In another version of the myth, Hephaestus gave his mother Hera a golden throne, but when she sat on it, she became trapped and he refused to let her go until she agreed to give him Aphrodite's hand in marriage. Hephaestus was overjoyed to be married to the goddess of beauty, and forged her beautiful jewelry, including a strophion () known as the (), a saltire-shaped undergarment (usually translated as "girdle"), which accentuated her breasts and made her even more irresistible to men. Such strophia were commonly used in depictions of the Near Eastern goddesses Ishtar and Atargatis. Attendants Aphrodite is almost always accompanied by Eros, the god of lust and sexual desire. In his Theogony, Hesiod describes Eros as one of the four original primeval forces born at the beginning of time, but, after the birth of Aphrodite from the sea foam, he is joined by Himeros and, together, they become Aphrodite's constant companions. In early Greek art, Eros and Himeros are both shown as idealized handsome youths with wings. The Greek lyric poets regarded the power of Eros and Himeros as dangerous, compulsive, and impossible for anyone to resist. In modern times, Eros is often seen as Aphrodite's son, but this is actually a comparatively late innovation. A scholion on Theocritus's Idylls remarks that the sixth-century BC poet Sappho had described Eros as the son of Aphrodite and Uranus, but the first surviving reference to Eros as Aphrodite's son comes from Apollonius of Rhodes's Argonautica, written in the third century BC, which makes him the son of Aphrodite and Ares. Later, the Romans, who saw Venus as a mother goddess, seized on this idea of Eros as Aphrodite's son and popularized it, making it the predominant portrayal in works on mythology until the present day. Aphrodite's main attendants were the three Charites, whom Hesiod identifies as the daughters of Zeus and Eurynome and names as Aglaea ("Splendor"), Euphrosyne ("Good Cheer"), and Thalia ("Abundance"). The Charites had been worshipped as goddesses in Greece since the beginning of Greek history, long before Aphrodite was introduced to the pantheon. Aphrodite's other set of attendants was the three Horae (the "Hours"), whom Hesiod identifies as the daughters of Zeus and Themis and names as Eunomia (“Good Order”), Dike (“Justice”), and Eirene (“Peace”). Aphrodite was also sometimes accompanied by Harmonia, her daughter by Ares, and Hebe, the daughter of Zeus and Hera. The fertility god Priapus was usually considered to be Aphrodite's son by Dionysus, but he was sometimes also described as her son by Hermes, Adonis, or even Zeus. A scholion on Apollonius of Rhodes's Argonautica states that, while Aphrodite was pregnant with Priapus, Hera envied her and applied an evil potion to her belly while she was sleeping to ensure that the child would be hideous. In another version, Hera cursed Aphrodite's unborn son because he had been fathered by Zeus. When Aphrodite gave birth, she was horrified to see that the child had a massive, permanently erect penis, a potbelly, and a huge tongue. Aphrodite abandoned the infant to die in the wilderness, but a herdsman found him and raised him, later discovering that Priapus could use his massive penis to aid in the growth of plants. Anchises The First Homeric Hymn to Aphrodite (Hymn 5), which was probably composed sometime in the mid-seventh century BC, describes how Zeus once became annoyed with Aphrodite for causing deities to fall in love with mortals, so he caused her to fall in love with Anchises, a handsome mortal shepherd who lived in the foothills beneath Mount Ida near the city of Troy. Aphrodite appears to Anchises in the form of a tall, beautiful, mortal virgin while he is alone in his home. Anchises sees her dressed in bright clothing and gleaming jewelry, with her breasts shining with divine radiance. He asks her if she is Aphrodite and promises to build her an altar on top of the mountain if she will bless him and his family. Aphrodite lies and tells him that she is not a goddess, but the daughter of one of the noble families of Phrygia. She claims to be able to understand the Trojan language because she had a Trojan nurse as a child and says that she found herself on the mountainside after she was snatched up by Hermes while dancing in a celebration in honor of Artemis, the goddess of virginity. Aphrodite tells Anchises that she is still a virgin and begs him to take her to his parents. Anchises immediately becomes overcome with mad lust for Aphrodite and swears that he will have sex with her. Anchises takes Aphrodite, with her eyes cast downwards, to his bed, which is covered in the furs of lions and bears. He then strips her naked and makes love to her. After the lovemaking is complete, Aphrodite reveals her true divine form. Anchises is terrified, but Aphrodite consoles him and promises that she will bear him a son. She prophesies that their son will be the demigod Aeneas, who will be raised by the nymphs of the wilderness for five years before going to Troy to become a nobleman like his father. The story of Aeneas's conception is also mentioned in Hesiod's Theogony and in Book II of Homer's Iliad. Adonis The myth of Aphrodite and Adonis is probably derived from the ancient Sumerian legend of Inanna and Dumuzid. The Greek name (Adōnis, ) is derived from the Canaanite word ʼadōn, meaning "lord". The earliest known Greek reference to Adonis comes from a fragment of a poem by the Lesbian poet Sappho (c. 630 – c. 570 BC), in which a chorus of young girls asks Aphrodite what they can do to mourn Adonis's death. Aphrodite replies that they must beat their breasts and tear their tunics. Later references flesh out the story with more details. According to the retelling of the story found in the poem Metamorphoses by the Roman poet Ovid (43 BC – 17/18 AD), Adonis was the son of Myrrha, who was cursed by Aphrodite with insatiable lust for her own father, King Cinyras of Cyprus, after Myrrha's mother bragged that her daughter was more beautiful than the goddess. Driven out after becoming pregnant, Myrrha was changed into a myrrh tree, but still gave birth to Adonis. Aphrodite found the baby, and took him to the underworld to be fostered by Persephone. She returned for him once he was grown and discovered him to be strikingly handsome. Persephone wanted to keep Adonis, resulting in a custody battle between the two goddesses over whom should rightly possess Adonis. Zeus settled the dispute by decreeing that Adonis would spend one third of the year with Aphrodite, one third with Persephone, and one third with whomever he chose. Adonis chose to spend that time with Aphrodite. Then, one day, while Adonis was hunting, he was wounded by a wild boar and bled to death in Aphrodite's arms. In different versions of the story, the boar was either sent by Ares, who was jealous that Aphrodite was spending so much time with Adonis, or by Artemis, who wanted revenge against Aphrodite for having killed her devoted follower Hippolytus. The story also provides an etiology for Aphrodite's associations with certain flowers. Reportedly, as she mourned Adonis's death, she caused anemones to grow wherever his blood fell, and declared a festival on the anniversary of his death. In one version of the story, Aphrodite injured herself on a thorn from a rose bush and the rose, which had previously been white, was stained red by her blood. According to Lucian's On the Syrian Goddess, each year during the festival of Adonis, the Adonis River in Lebanon (now known as the Abraham River) ran red with blood. The myth of Adonis is associated with the festival of the Adonia, which was celebrated by Greek women every year in midsummer. The festival, which was evidently already celebrated in Lesbos by Sappho's time, seems to have first become popular in Athens in the mid-fifth century BC. At the start of the festival, the women would plant a "garden of Adonis", a small garden planted inside a small basket or a shallow piece of broken pottery containing a variety of quick-growing plants, such as lettuce and fennel, or even quick-sprouting grains such as wheat and barley. The women would then climb ladders to the roofs of their houses, where they would place the gardens out under the heat of the summer sun. The plants would sprout in the sunlight, but wither quickly in the heat. Then the women would mourn and lament loudly over the death of Adonis, tearing their clothes and beating their breasts in a public display of grief. Divine favoritism In Hesiod's Works and Days, Zeus orders Aphrodite to make Pandora, the first woman, physically beautiful and sexually attractive, so that she may become "an evil men will love to embrace". Aphrodite "spills grace" over Pandora's head and equips her with "painful desire and knee-weakening anguish", thus making her the perfect vessel for evil to enter the world. Aphrodite's attendants, Peitho, the Charites, and the Horae, adorn Pandora with gold and jewelry. According to one myth, Aphrodite aided Hippomenes, a noble youth who wished to marry Atalanta, a maiden who was renowned throughout the land for her beauty, but who refused to marry any man unless he could outrun her in a footrace. Atalanta was an exceedingly swift runner and she beheaded all of the men who lost to her. Aphrodite gave Hippomenes three golden apples from the Garden of the Hesperides and instructed him to toss them in front of Atalanta as he raced her. Hippomenes obeyed Aphrodite's order and Atalanta, seeing the beautiful, golden fruits, bent down to pick up each one, allowing Hippomenes to outrun her. In the version of the story from Ovid's Metamorphoses, Hippomenes forgets to repay Aphrodite for her aid, so she causes the couple to become inflamed with lust while they are staying at the temple of Cybele. The couple desecrate the temple by having sex in it, leading Cybele to turn them into lions as punishment. The myth of Pygmalion is first mentioned by the third-century BC Greek writer Philostephanus of Cyrene, but is first recounted in detail in Ovid's Metamorphoses. According to Ovid, Pygmalion was an exceedingly handsome sculptor from the island of Cyprus, who was so sickened by the immorality of women that he refused to marry. He fell madly and passionately in love with the ivory cult statue he was carving of Aphrodite and longed to marry it. Because Pygmalion was extremely pious and devoted to Aphrodite, the goddess brought the statue to life. Pygmalion married the girl the statue became and they had a son named Paphos, after whom the capital of Cyprus received its name. Pseudo-Apollodorus later mentions "Metharme, daughter of Pygmalion, king of Cyprus". Anger myths Aphrodite generously rewarded those who honored her, but also punished those who disrespected her, often quite brutally. A myth described in Apollonius of Rhodes's Argonautica and later summarized in the Bibliotheca of Pseudo-Apollodorus tells how, when the women of the island of Lemnos refused to sacrifice to Aphrodite, the goddess cursed them to stink horribly so that their husbands would never have sex with them. Instead, their husbands started having sex with their Thracian slave-girls. In anger, the women of Lemnos murdered the entire male population of the island, as well as all the Thracian slaves. When Jason and his crew of Argonauts arrived on Lemnos, they mated with the sex-starved women under Aphrodite's approval and repopulated the island. From then on, the women of Lemnos never disrespected Aphrodite again. In Euripides's tragedy Hippolytus, which was first performed at the City Dionysia in 428 BC, Theseus's son Hippolytus worships only Artemis, the goddess of virginity, and refuses to engage in any form of sexual contact. Aphrodite is infuriated by his prideful behavior and, in the prologue to the play, she declares that, by honoring only Artemis and refusing to venerate her, Hippolytus has directly challenged her authority. Aphrodite therefore causes Hippolytus's stepmother, Phaedra, to fall in love with him, knowing Hippolytus will reject her. After being rejected, Phaedra commits suicide and leaves a suicide note to Theseus telling him that she killed herself because Hippolytus attempted to rape her. Theseus prays to Poseidon to kill Hippolytus for his transgression. Poseidon sends a wild bull to scare Hippolytus's horses as he is riding by the sea in his chariot, causing the horses to bolt and smash the chariot against the cliffs, dragging Hippolytus to a bloody death across the rocky shoreline. The play concludes with Artemis vowing to kill Aphrodite's own mortal beloved (presumably Adonis) in revenge. Glaucus of Corinth angered Aphrodite by refusing to let his horses for chariot racing mate, since doing so would hinder their speed. During the chariot race at the funeral games of King Pelias, Aphrodite drove his horses mad and they tore him apart. Polyphonte was a young woman who chose a virginal life with Artemis instead of marriage and children, as favoured by Aphrodite. Aphrodite cursed her, causing her to have children by a bear. The resulting offspring, Agrius and Oreius, were wild cannibals who incurred the hatred of Zeus. Ultimately, he transformed all the members of the family into birds of ill omen. According to Pseudo-Apollodorus, a jealous Aphrodite cursed Eos, the goddess of dawn, to be perpetually in love and have insatiable sexual desire because Eos once had lain with Aphrodite's sweetheart Ares, the god of war. According to Ovid in his Metamorphoses (book 10.238 ff.), Propoetides who are the daughters of Propoetus from the city of Amathus on the island of Cyprus denied Aphrodite's divinity and failing to worship her properly. Therefore, Aphrodite turn them into the world's first prostitutes. According to Diodorous, Rhodian sea nymphe Halia's six sons by Poseidon arrogantly refused to let Aphrodite land upon their shore, the goddess cursed them with insanity. In their madness, they raped Halia. As punishment, Poseidon buried them in the island's sea-caverns. Bellerophon's descendant Xanthius had two children. Leucippus and an unnamed daughter. Through the wrath of Aphrodite (reasons unknown), Leucippus fell in love with his own sister. They started a secret relationship but the girl was already betrothed to another man and he went on to inform her father Xanthius, without telling him the name of the seducer. Xanthius went straight to his daughter's chamber, where she was together with Leucippus right at the moment. On hearing him enter, she tried to escape, but Xanthius hit her with a dagger, thinking that he was slaying the seducer, and killed her. Leucippus, failing to recognize his father at first, slew him. When the truth was revealed, he had to leave the country and took part in colonization of Crete and the lands in Asia Minor. Queen Cenchreis of Cyprus and wife of King Cinyras bragged her daughter Myrrha more beautiful than Aphrodite. Therefore, Myrrha was cursed by Aphrodite with insatiable lust for her own father, King Cinyras of Cyprus and he slept with her unknowingly in dark. she eventually transformed into the myrrh tree and gave birth to Adonis in this form. Cinyras has also three another daughters and their names Braesia, Laogora, Orsedice. These girls by reason of the wrath of Aphrodite (reasons unknown) cohabited with foreigners, and ended their life in Egypt. Mousa Clio derided the goddess' own love for Adonis. Therefore, Clio fell in love with Pierus, son of Magnes and bore Hyacinth. Aegialeia was a daughter of Adrastus and Amphithea and she was married to Diomedes. Because of anger of Aphrodite, whom Diomedes had wounded in the war against Troy, She had multiple lovers, including a certain Hippolytus. when Aegiale went so far as to threaten his life, he fled to Italy. In one of the versions of the legend, Pasiphae did not make offerings to the goddess Venus [Aphrodite]. Because of this Venus [Aphrodite] inspired in her an unnatural love for a bull or she cursed her because she was Helios's daughter who revealed her adultery to Hephaestus. Lysippe, mother of Tanais by Berossos. Her son only venerated Ares and was fully devoted to war, neglecting love and marriage. Aphrodite cursed him with falling in love with his own mother. Preferring to die rather than give up his chastity, he threw himself into the river Amazonius, which was subsequently renamed Tanais. According to Pseudo-Hyginus At the behest of Zeus, Orpheus's mother the Muse Calliope judged the dispute between the goddesses Aphrodite and Persephone over Adonis and she decided that each should possess him half of the year. But Venus [Aphrodite], angry because she had not been granted what she thought was her right. Therefore, Venus [Aphrodite] inspired love the women in Thrace for Orpheus and they eventually tore him limb from limb because each to seek Orpheus for herself. Judgment of Paris and Trojan War The myth of the Judgement of Paris is mentioned briefly in the Iliad, but is described in depth in an epitome of the Cypria, a lost poem of the Epic Cycle, which records that all the gods and goddesses as well as various mortals were invited to the marriage of Peleus and Thetis (the eventual parents of Achilles). Only Eris, goddess of discord, was not invited. She was annoyed at this, so she arrived with a golden apple inscribed with the word καλλίστῃ (kallistēi, "for the fairest"), which she threw among the goddesses. Aphrodite, Hera, and Athena all claimed to be the fairest, and thus the rightful owner of the apple. The goddesses chose to place the matter before Zeus, who, not wanting to favor one of the goddesses, put the choice into the hands of Paris, a Trojan prince. After bathing in the spring of Mount Ida where Troy was situated, the goddesses appeared before Paris for his decision. In the extant ancient depictions of the Judgement of Paris, Aphrodite is only occasionally represented nude, and Athena and Hera are always fully clothed. Since the Renaissance, however, Western paintings have typically portrayed all three goddesses as completely naked. All three goddesses were ideally beautiful and Paris could not decide between them, so they resorted to bribes. Hera tried to bribe Paris with power over all Asia and Europe, and Athena offered wisdom, fame and glory in battle, but Aphrodite promised Paris that, if he were to choose her as the fairest, she would let him marry the most beautiful woman on earth. This woman was Helen, who was already married to King Menelaus of Sparta. Paris selected Aphrodite and awarded her the apple. The other two goddesses were enraged and, as a direct result, sided with the Greeks in the Trojan War. Aphrodite plays an important and active role throughout the entirety of Homer's Iliad. In Book III, she rescues Paris from Menelaus after he foolishly challenges him to a one-on-one duel. She then appears to Helen in the form of an old woman and attempts to persuade her to have sex with Paris, reminding her of his physical beauty and athletic prowess. Helen immediately recognizes Aphrodite by her beautiful neck, perfect breasts, and flashing eyes and chides the goddess, addressing her as her equal. Aphrodite sharply rebukes Helen, reminding her that, if she vexes her, she will punish her just as much as she has favored her already. Helen demurely obeys Aphrodite's command. In Book V, Aphrodite charges into battle to rescue her son Aeneas from the Greek hero Diomedes. Diomedes recognizes Aphrodite as a "weakling" goddess and, thrusting his spear, nicks her wrist through her "ambrosial robe". Aphrodite borrows Ares's chariot to ride back to Mount Olympus. Zeus chides her for putting herself in danger, reminding her that "her specialty is love, not war." According to Walter Burkert, this scene directly parallels a scene from Tablet VI of the Epic of Gilgamesh in which Ishtar, Aphrodite's Akkadian precursor, cries to her mother Antu after the hero Gilgamesh rejects her sexual advances, but is mildly rebuked by her father Anu. In Book XIV of the Iliad, during the Dios Apate episode, Aphrodite lends her kestos himas to Hera for the purpose of seducing Zeus and distracting him from the combat while Poseidon aids the Greek forces on the beach. In the Theomachia in Book XXI, Aphrodite again enters the battlefield to carry Ares away after he is wounded. Offspring Sometimes poets and dramatists recounted ancient traditions, which varied, and sometimes they invented new details; later scholiasts might draw on either or simply guess. Thus while Aeneas and Phobos were regularly described as offspring of Aphrodite, others listed here such as Priapus and Eros were sometimes said to be children of Aphrodite but with varying fathers and sometimes given other mothers or none at all. Iconography Symbols Aphrodite's most prominent avian symbol was the dove, which was originally an important symbol of her Near Eastern precursor Inanna-Ishtar. (In fact, the ancient Greek word for "dove", peristerá, may be derived from a Semitic phrase peraḥ Ištar, meaning "bird of Ishtar".) Aphrodite frequently appears with doves in ancient Greek pottery and the temple of Aphrodite Pandemos on the southwest slope of the Athenian Acropolis was decorated with relief sculptures of doves with knotted fillets in their beaks. Votive offerings of small, white, marble doves were also discovered in the temple of Aphrodite at Daphni. In addition to her associations with doves, Aphrodite was also closely linked with sparrows and she is described riding in a chariot pulled by sparrows in Sappho's "Ode to Aphrodite". Because of her connections to the sea, Aphrodite was associated with a number of different types of water fowl, including swans, geese, and ducks. Aphrodite's other symbols included the sea, conch shells, and roses. The rose and myrtle flowers were both sacred to Aphrodite. Her most important fruit emblem was the apple, but she was also associated with pomegranates, possibly because the red seeds suggested sexuality or because Greek women sometimes used pomegranates as a method of birth control. In Greek art, Aphrodite is often also accompanied by dolphins and Nereids. In classical art A scene of Aphrodite rising from the sea appears on the back of the Ludovisi Throne ( 460 BC), which was probably originally part of a massive altar that was constructed as part of the Ionic temple to Aphrodite in the Greek polis of Locri Epizephyrii in Magna Graecia in southern Italy. The throne shows Aphrodite rising from the sea, clad in a diaphanous garment, which is drenched with seawater and clinging to her body, revealing her upturned breasts and the outline of her navel. Her hair hangs dripping as she reaches to two attendants standing barefoot on the rocky shore on either side of her, lifting her out of the water. Scenes with Aphrodite appear in works of classical Greek pottery, including a famous white-ground kylix by the Pistoxenos Painter dating the between 470 and 460 BC, showing her riding on a swan or goose. In BC, the Athenian sculptor Praxiteles carved the marble statue Aphrodite of Knidos, which Pliny the Elder later praised as the greatest sculpture ever made. The statue showed a nude Aphrodite modestly covering her pubic region while resting against a water pot with her robe draped over it for support. The Aphrodite of Knidos was the first full-sized statue to depict Aphrodite completely naked and one of the first sculptures that was intended to be viewed from all sides. The statue was purchased by the people of Knidos in around 350 BC and proved to be tremendously influential on later depictions of Aphrodite. The original sculpture has been lost, but written descriptions of it as well several depictions of it on coins are still extant and over sixty copies, small-scale models, and fragments of it have been identified. The Greek painter Apelles of Kos, a contemporary of Praxiteles, produced the panel painting Aphrodite Anadyomene (Aphrodite Rising from the Sea). According to Athenaeus, Apelles was inspired to paint the painting after watching the courtesan Phryne take off her clothes, untie her hair, and bathe naked in the sea at Eleusis. The painting was displayed in the Asclepeion on the island of Kos. The Aphrodite Anadyomene went unnoticed for centuries, but Pliny the Elder records that, in his own time, it was regarded as Apelles's most famous work. During the Hellenistic and Roman periods, statues depicting Aphrodite proliferated; many of these statues were modeled at least to some extent on Praxiteles's Aphrodite of Knidos. Some statues show Aphrodite crouching naked; others show her wringing water out of her hair as she rises from the sea. Another common type of statue is known as Aphrodite Kallipygos, the name of which is Greek for "Aphrodite of the Beautiful Buttocks"; this type of sculpture shows Aphrodite lifting her peplos to display her buttocks to the viewer while looking back at them from over her shoulder. The ancient Romans produced massive numbers of copies of Greek sculptures of Aphrodite and more sculptures of Aphrodite have survived from antiquity than of any other deity. Post-classical culture Middle Ages Early Christians frequently adapted pagan iconography to suit Christian purposes. In the Early Middle Ages, Christians adapted elements of Aphrodite/Venus's iconography and applied them to Eve and prostitutes, but also female saints and even the Virgin Mary. Christians in the east reinterpreted the story of Aphrodite's birth as a metaphor for baptism; in a Coptic stele from the sixth century AD, a female orant is shown wearing Aphrodite's conch shell as a sign that she is newly baptized. Throughout the Middle Ages, villages and communities across Europe still maintained folk tales and traditions about Aphrodite/Venus and travelers reported a wide variety of stories. Numerous Roman mosaics of Venus survived in Britain, preserving memory of the pagan past. In North Africa in the late fifth century AD, Fulgentius of Ruspe encountered mosaics of Aphrodite and reinterpreted her as a symbol of the sin of Lust, arguing that she was shown naked because "the sin of lust is never cloaked" and that she was often shown "swimming" because "all lust suffers shipwreck of its affairs." He also argued that she was associated with doves and conchs because these are symbols of copulation, and that she was associated with roses because "as the rose gives pleasure, but is swept away by the swift movement of the seasons, so lust is pleasant for a moment, but is swept away forever." While Fulgentius had appropriated Aphrodite as a symbol of Lust, Isidore of Seville ( 560–636) interpreted her as a symbol of marital procreative sex and declared that the moral of the story of Aphrodite's birth is that sex can only be holy in the presence of semen, blood, and heat, which he regarded as all being necessary for procreation. Meanwhile, Isidore denigrated Aphrodite/Venus's son Eros/Cupid as a "demon of fornication" (daemon fornicationis). Aphrodite/Venus was best known to Western European scholars through her appearances in Virgil's Aeneid and Ovid's Metamorphoses. Venus is mentioned in the Latin poem Pervigilium Veneris ("The Eve of Saint Venus"), written in the third or fourth century AD, and in Giovanni Boccaccio's Genealogia Deorum Gentilium. Since the Late Middle Ages. the myth of the Venusberg (German; French Mont de Vénus, "Mountain of Venus") – a subterranean realm ruled by Venus, hidden underneath Christian Europe – became a motif of European folklore rendered in various legends and epics. In German folklore of the 16th century, the narrative becomes associated with the minnesinger Tannhäuser, and in that form the myth was taken up in later literature and opera. Art Aphrodite is the central figure in Sandro Botticelli's painting Primavera, which has been described as "one of the most written about, and most controversial paintings in the world", and "one of the most popular paintings in Western art". The story of Aphrodite's birth from the foam was a popular subject matter for painters during the Italian Renaissance, who were attempting to consciously reconstruct Apelles of Kos's lost masterpiece Aphrodite Anadyomene based on the literary ekphrasis of it preserved by Cicero and Pliny the Elder. Artists also drew inspiration from Ovid's description of the birth of Venus in his Metamorphoses. Sandro Botticelli's The Birth of Venus ( 1485) was also partially inspired by a description by Poliziano of a relief on the subject. Later Italian renditions of the same scene include Titian's Venus Anadyomene ( 1525) and Raphael's painting in the Stufetta del cardinal Bibbiena (1516). Titian's biographer Giorgio Vasari identified all of Titian's paintings of naked women as paintings of "Venus", including an erotic painting from 1534, which he called the Venus of Urbino, even though the painting does not contain any of Aphrodite/Venus's traditional iconography and the woman in it is clearly shown in a contemporary setting, not a classical one. Jacques-Louis David's final work was his 1824 magnum opus, Mars Being Disarmed by Venus, which combines elements of classical, Renaissance, traditional French art, and contemporary artistic styles. While he was working on the painting, David described it, saying, "This is the last picture I want to paint, but I want to surpass myself in it. I will put the date of my seventy-five years on it and afterwards I will never again pick up my brush." The painting was exhibited first in Brussels and then in Paris, where over 10,000 people came to see it. Jean-Auguste-Dominique Ingres's painting Venus Anadyomene was one of his major works. Louis Geofroy described it as a "dream of youth realized with the power of maturity, a happiness that few obtain, artists or others." Théophile Gautier declared: "Nothing remains of the marvelous painting of the Greeks, but surely if anything could give the idea of antique painting as it was conceived following the statues of Phidias and the poems of Homer, it is M. Ingres's painting: the Venus Anadyomene of Apelles has been found." Other critics dismissed it as a piece of unimaginative, sentimental kitsch, but Ingres himself considered it to be among his greatest works and used the same figure as the model for his later 1856 painting La Source. Paintings of Venus were favorites of the late nineteenth-century Academic artists in France. In 1863, Alexandre Cabanel won widespread critical acclaim at the Paris Salon for his painting The Birth of Venus, which the French emperor Napoleon III immediately purchased for his own personal art collection. Édouard Manet's 1865 painting Olympia parodied the nude Venuses of the Academic painters, particularly Cabanel's Birth of Venus. In 1867, the English Academic painter Frederic Leighton displayed his Venus Disrobing for the Bath at the Academy. The art critic J. B. Atkinson praised it, declaring that "Mr Leighton, instead of adopting corrupt Roman notions regarding Venus such as Rubens embodied, has wisely reverted to the Greek idea of Aphrodite, a goddess worshipped, and by artists painted, as the perfection of female grace and beauty." A year later, the English painter Dante Gabriel Rossetti, a founding member of the Pre-Raphaelite Brotherhood, painted Venus Verticordia (Latin for "Aphrodite, the Changer of Hearts"), showing Aphrodite as a nude red-headed woman in a garden of roses. Though he was reproached for his outré subject matter, Rossetti refused to alter the painting and it was soon purchased by J. Mitchell of Bradford. In 1879, William Adolphe Bouguereau exhibited at the Paris Salon his own Birth of Venus, which imitated the classical tradition of contrapposto and was met with widespread critical acclaim, rivalling the popularity of Cabanel's version from nearly two decades prior. Literature William Shakespeare's erotic narrative poem Venus and Adonis (1593), a retelling of the courtship of Aphrodite and Adonis from Ovid's Metamorphoses, was the most popular of all his works published within his own lifetime. Six editions of it were published before Shakespeare's death (more than any of his other works) and it enjoyed particularly strong popularity among young adults. In 1605, Richard Barnfield lauded it, declaring that the poem had placed Shakespeare's name "in fames immortall Booke". Despite this, the poem has received mixed reception from modern critics; Samuel Taylor Coleridge defended it, but Samuel Butler complained that it bored him and C. S. Lewis described an attempted reading of it as "suffocating". Aphrodite appears in Richard Garnett's short story collection The Twilight of the Gods and Other Tales (1888), in which the gods' temples have been destroyed by Christians. Stories revolving around sculptures of Aphrodite were common in the late nineteenth and early twentieth centuries. Examples of such works of literature include the novel The Tinted Venus: A Farcical Romance (1885) by Thomas Anstey Guthrie and the short story The Venus of Ille (1887) by Prosper Mérimée, both of which are about statues of Aphrodite that come to life. Another noteworthy example is Aphrodite in Aulis by the Anglo-Irish writer George Moore, which revolves around an ancient Greek family who moves to Aulis. The French writer Pierre Louÿs titled his erotic historical novel Aphrodite: mœurs antiques (1896) after the Greek goddess. The novel enjoyed widespread commercial success, but scandalized French audiences due to its sensuality and its decadent portrayal of Greek society. In the early twentieth century, stories of Aphrodite were used by feminist poets, such as Amy Lowell and Alicia Ostriker. Many of these poems dealt with Aphrodite's legendary birth from the foam of the sea. Other feminist writers, including Claude Cahun, Thit Jensen, and Anaïs Nin also made use of the myth of Aphrodite in their writings. Ever since the publication of Isabel Allende's book Aphrodite: A Memoir of the Senses in 1998, the name "Aphrodite" has been used as a title for dozens of books dealing with all topics even superficially connected to her domain. Frequently these books do not even mention Aphrodite, or mention her only briefly, but make use of her name as a selling point. Modern worship In 1938, Gleb Botkin, a Russian immigrant to the United States, founded the Church of Aphrodite, a neopagan religion centered around the worship of a mother goddess, whom its practitioners identified as Aphrodite. The Church of Aphrodite's theology was laid out in the book In Search of Reality, published in 1969, two years before Botkin's death. The book portrayed Aphrodite in a drastically different light than the one in which the Greeks envisioned her, instead casting her as "the sole Goddess of a somewhat Neoplatonic Pagan monotheism". It claimed that the worship of Aphrodite had been brought to Greece by the mystic teacher Orpheus, but that the Greeks had misunderstood Orpheus's teachings and had not realized the importance of worshipping Aphrodite alone. Aphrodite is a major deity in Wicca, a contemporary nature-based syncretic Neopagan religion. Wiccans regard Aphrodite as one aspect of the Goddess and she is frequently invoked by name during enchantments dealing with love and romance. Wiccans regard Aphrodite as the ruler of human emotions, erotic spirituality, creativity, and art. As one of the twelve Olympians, Aphrodite is a major deity within Hellenismos (Hellenic Polytheistic Reconstructionism), a Neopagan religion which seeks to authentically revive and recreate the religion of ancient Greece in the modern world. Unlike Wiccans, Hellenists are usually strictly polytheistic or pantheistic. Hellenists venerate Aphrodite primarily as the goddess of romantic love, but also as a goddess of sexuality, the sea, and war. Her many epithets include "Sea Born", "Killer of Men", "She upon the Graves", "Fair Sailing", and "Ally in War". Genealogy See also Anchises Cupid Lakshmi, rose from the ocean like Aphrodite and has 8-pointed star like Ishtar Notes References Bibliography Homer, The Iliad with an English Translation by A.T. Murray, PhD in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. Online version at the Perseus Digital Library. Hesiod, Theogony, in The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White, Cambridge, MA., Harvard University Press; London, William Heinemann Ltd. 1914. Online version at the Perseus Digital Library. Evelyn-White, Hugh, The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White. Homeric Hymns. Cambridge, Massachusetts, Harvard University Press; London, William Heinemann Ltd. 1914. Pindar, Odes, Diane Arnson Svarlien. 1990. Online version at the Perseus Digital Library. Euripides, The Complete Greek Drama', edited by Whitney J. Oates and Eugene O'Neill, Jr. in two volumes. 2. The Phoenissae, translated by E. P. Coleridge. New York. Random House. 1938. Apollonius Rhodius, Argonautica translated by Robert Cooper Seaton (1853–1915), R. C. Loeb Classical Library Volume 001. London, William Heinemann Ltd, 1912. Online version at the Topos Text Project. Apollodorus, Apollodorus, The Library, with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes. Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1921. Online version at the Perseus Digital Library. Pausanias, Pausanias Description of Greece with an English Translation by W.H.S. Jones, Litt.D., and H.A. Ormerod, M.A., in 4 Volumes. Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1918. Online version at the Perseus Digital Library. Diodorus Siculus, Bibliotheca Historica. Vol 1-2. Immanel Bekker. Ludwig Dindorf. Friedrich Vogel. in aedibus B. G. Teubneri. Leipzig. 1888-1890. Greek text available at the Perseus Digital Library. Ovid, Metamorphoses. Translated by A. D. Melville; introduction and notes by E. J. Kenney. Oxford: Oxford University Press. 2008. . Hyginus, Gaius Julius, The Myths of Hyginus. Edited and translated by Mary A. Grant, Lawrence: University of Kansas Press, 1960. Gaius Julius Hyginus, Astronomica from The Myths of Hyginus translated and edited by Mary Grant. University of Kansas Publications in Humanistic Studies. Online version at the Topos Text Project. External links APHRODITE from The Theoi Project information from classical literature, Greek and Roman art The Glory which Was Greece from a Female Perspective Sappho's Hymn to Aphrodite, with a brief explanation Beauty goddesses Consorts of Hephaestus Deities in the Iliad Fertility goddesses Greek love and lust deities Love and lust goddesses Divine women of Zeus Homosexuality and bisexuality deities New religious movement deities Children of Zeus Prostitution Sexuality in ancient Greece Women of Ares Women of Hermes Women in Greek mythology Characters in Greek mythology Venusian deities
1265819
https://en.wikipedia.org/wiki/American%20Megatrends
American Megatrends
AMI (American Megatrends International LLC, formerly American Megatrends Inc.) is an international hardware and software company, specializing in PC hardware and firmware. The company was founded in 1985 by Pat Sarma and Subramonian Shankar. It is headquartered in Building 800 at 3095 Satellite Boulevard in unincorporated Gwinnett County, Georgia, United States, near the city of Duluth, and in the Atlanta metropolitan area. The company started as a manufacturer of complete motherboards, positioning itself in the high-end segment. Its first customer was PCs Limited, later known as Dell Computer. As hardware activity moved progressively to Taiwan-based original design manufacturers, AMI continued to develop BIOS firmware for major motherboard manufacturers. The company produced BIOS software for motherboards (1986), server motherboards (1992), storage controllers (1995) and remote-management cards (1998). In 1993, AMI produced MegaRAID, a storage controller card. AMI sold its RAID assets to LSI Corporation in 2001, with only one employee from the RAID-division remaining with the AMI core team. AMI continued to focus on OEM and ODM business and technology. Its product line includes AMIBIOS (a BIOS), Aptio (a successor to AMIBIOS8 based on the UEFI standard), diagnostic software, AMI EC (embedded controller firmware), MG-Series SGPIO backplane controllers (for SATA, SAS and NVMe storage devices), driver/firmware development, and MegaRAC (BMC firmware). Founding American Megatrends Inc. (AMI) was founded in 1985 by Subramonian Shankar and Pat Sarma with funds from a previous consulting venture, Access Methods Inc. (also AMI). Access Methods was a company run by Pat Sarma and his partner. After Access Methods successfully launched the AMIBIOS, there were legal issues among the owners of the company, resulting in Sarma buying out his partners. Access Methods still owned the rights to the AMIBIOS. Sarma had already started a company called Quintessential Consultants Inc. (QCI), and later set up an equal partnership with Shankar. By this time the AMIBIOS had become established and there was a need to keep the initials AMI. The partners renamed QCI as American Megatrends Inc., with the same initials as Access Methods Inc.; the renamed company then purchased AMIBIOS from Access Methods. Shankar became the president and Sarma the executive vice-president of this company. This partnership continued until 2001, when LSI Logic purchased the RAID Division of American Megatrends; American Megatrends then purchased all shares of the company owned by Sarma, making Shankar the majority owner. Products AMIBIOS AMIBIOS (also written as AMI BIOS) is the IBM PC-compatible BIOS developed and sold by American Megatrends since 1986. In 1994, the company claimed that 75% of PC clones used AMIBIOS. It is used on motherboards made by AMI and by other companies. American Megatrends has a strict OEM business model for AMIBIOS: it sells source code to motherboard manufacturers or customizes AMIBIOS for each OEM individually, whichever business model they require. AMI does not sell to end users, and itself produces no end-user documentation or technical support for its BIOS firmware, leaving that to licensees. However, the company published two books on its BIOS in 1993 and 1994, written by its engineers. During powerup, the BIOS firmware displays an ID string in the lower-left-hand corner of the screen. This ID string comprises various pieces of information about the firmware, including when it was compiled, what configuration options were selected, the OEM license code, and the targeted chipset and motherboard. There are 3 ID string formats, the first for older AMIBIOS, and the second and third for the newer AMI Hi-Flex ("high flexibility") BIOS. These latter are displayed when the Insert key is pressed during power-on self-test. The original AMI BIOS did not encrypt the machine startup password, which it stored in non-volatile RAM. Therefore, any utility capable of reading a PC's NVRAM was able to read and to alter the password. The AMI WinBIOS encrypts the stored password, using a simple substitution cipher. By pressing the Delete key during power-on self-test when a prompt is displayed, the BIOS setup utility program is invoked. Some earlier AMIBIOS versions also included a cut-down version of the AMIDIAG utility that AMI also sold separately, but most later AMI BIOSes do not include this program as the BIOS DMI already incorporates detailed diagnostics. AMIBIOS is only sold through distributors, not directly available from the manufacturer or from eSupport. AMI supplies both DOS and Windows firmware upgrade utilities for its own motherboards. eSupport only supplies a Windows upgrade utility. AMIDiag AMIDiag is a family of PC diagnostic utilities sold to OEMs only. The AMIDiag Suite was introduced in 1991 and made available for MS-DOS, Microsoft Windows and Unified Extensible Firmware Interface (UEFI) platforms. It includes both the Windows and DOS PC diagnostics programs. Later versions of AMIDiag support UEFI, which allows diagnostics to be performed directly on the hardware components, without having to use operating system drivers or facilities. Aptio AMI's UEFI firmware solutions, including older Aptio 4 and newer Aptio V. MegaRAC MegaRAC is a product line of Service Processors providing Out-of-band, or Lights-out remote management of computer systems. These service processors operate independently of the Operating System status or location, to manage and troubleshoot computers. Former products StorTrends/ManageTrends The StorTrends family of network-based backup and storage management software and hardware includes several NAS and iSCSI-based SAN servers with 4, 12, or 16 drive bays. AMI couples off-the-shelf hardware with the StorTrends iTX storage management firmware platform. StorTrends offers synchronous, asynchronous and snap-assisted replication, thin provisioning, high-availability grouping and advanced caching. Reliability and performance is the key for any storage server. StorTrends iTX 2.8 is designed to support Storage Bridge Bay specification that provide Auto-Failover capability to ensure that any interruption is handled without affecting data. It supports High-availability cluster, redundancy, scalability, replication, disaster recovery and multiple site backups. DuOS-M DuOS-M was commercial software developed by American Megatrends for Intel x86-based computers using the Microsoft Windows operating system to provide a "dual operating system" environment in which the user can simultaneously deploy the Android operating system in tandem with Microsoft Windows. Because DuOS-M has the capability to run both Windows and Android simultaneously, the user can switch between the two operating systems without having to dual boot or suspend operation of one operating system in order to utilize the other. DuOS-M supports key hardware peripherals in Windows including cameras, audio, microphone and sensors such as ambient light sensor, accelerometer, gyrometer, compass and orientation sensors. It also supports various screen sizes, resolutions, and screen orientation (portrait and landscape) along with 3D acceleration and HD video playback. The first version of DuOS-M was released in June 2014. The software is available for download for a free 30-day trial, and is available for purchase for a complete license. On March 7, 2018, American Megatrends officially announced that it ceased development of DuOS-M. No further updates were being released at this time, including bug fixes and security patches. Technical problems On November 13, 1993, a number of PCs that used the AMIBIOS firmware started at boot-up to play the tune to Happy Birthday repeatedly while halting the computer until a key was pressed. The problem was resolved with a Trojan-free firmware upgrade from most manufacturers. The AMI WinBIOS was a 1994 update to AMIBIOS, with a graphical user interface setup screen that mimicked the appearance of Windows 3.1 and supported mouse navigation, unusual at the time. WinBIOS was viewed favourably by Anand Lal Shimpi at AnandTech, but described by Thomas Pabst at Tom's Hardware as a "big disappointment", in part because of problems with distributing IRQ signals to every PCI and ISA expansion slot. In July 2008 Linux developers discovered issues with ACPI tables on certain AMIBIOS BIOSes supplied by Foxconn, ASUS, and MSI. The problem is related to the ACPI _OSI method, which is used by ACPI to determine the OS version (in case an ACPI patch only applies to one specific OS). In some cases, the OSI method caused problems on Linux systems, skipping code that was only executed on Windows systems. Foxconn and AMI worked together to develop a solution, which was included in later revisions of AMIBIOS. The issue affected motherboards with Intel Socket 775. Actual system behavior differed based on BIOS version, system hardware and Linux distribution. In October 2021 a supply chain issue was discovered where Baseboard Management Controllers were shipped with a license/royalty sticker that included a typo where the company name was written as "American Megatrands". It was determined to use the issue sticker as is and so many BMCs will continue to ship with this typo until further notice. Worldwide offices United States Headquarters: Gwinnett County, Georgia Field offices: San Jose, California; Austin, Texas Beijing, People's Republic of China Kunshan, Jiangsu, People's Republic of China Shenzhen, Guangdong, People's Republic of China Taipei, Taiwan Munich, Germany Chennai, Tamil Nadu, India Chiyoda, Tokyo, Japan Seoul, South Korea Formerly had an office in DuPont, Washington, United States See also BIOS features comparison Insyde Software Phoenix Technologies Award Software, now part of Phoenix List of companies of Taiwan References Further reading External links American Megatrends (USA) Company Profile Introduction to AMIBIOS8: Overview of key features in the latest AMIBIOS American Megatrends India Pvt Ltd. Companies based in Gwinnett County, Georgia Software companies based in Georgia (U.S. state) BIOS Software companies established in 1985 Software companies of the United States 1985 establishments in Georgia (U.S. state) Computer hardware companies
34195
https://en.wikipedia.org/wiki/XyWrite
XyWrite
XyWrite is a word processor for MS-DOS and Windows modeled on the mainframe-based ATEX typesetting system. Popular with writers and editors for its speed and degree of customization, XyWrite was in its heyday the house word processor in many editorial offices, including the New York Times from 1989 to 1993. XyWrite was developed by David Erickson and marketed by XyQuest from 1982 through 1992, after which it was acquired by The Technology Group. The final version for MS-DOS was 4.18 (1993); for Windows, 4.13. Features Its file format consists of plain text (IBM437, or so-called "extended ASCII") with markup (within guillemets: « »). This capability is useful for typesetters who need to convert to various formats, e.g., LaTeX. A plug-in for ANSI characters is available. XyWrite is written in assembly language, allowing it to run faster than word processors written in a higher level language. It has a flexible macro-programming language (XPL) that offers many advantages for quick search and replace, copy-editing and reformatting of raw text. Users continue to write and share macros extending XyWrite features (printing to USB devices, for example). Plain-text, editable configuration files allow easy customization of the keyboard—for remapping keystrokes and for execution of complex commands with individual keystrokes—as well as customization of what is loaded on launching the program. Commands can be typed in directly on a command line, without the use of a mouse. Commands are usually in simple English, such as "Save," "Print," and "Search," or their shorter versions, such as "Sa" for "Save" (commands are case-insensitive). Up to nine files can be opened for editing at one time in separate "windows" that allow quick copy-and-paste among several files. Two files may be opened on the same screen for easy comparison of changes; a XyWrite command will do the comparison automatically, putting the cursor on the location at which the two files first differ (from which the user can move to the next difference). Version 4 (or Signature) has full WYSIWYG graphical editing capabilities including on-screen display of bitmaps and Bitstream Speedo fonts. The Microsoft Windows version provided version 4 in a Windows environment, in WSIWYG, without losing its command line driven interface. It supported the standard Windows' True Type fonts along with Speedo fonts. History and current usage XyQuest was founded in June 1982 by former ATEX employees Dave Erickson and John Hild. Its most successful product was XyWrite III Plus, which attracted a devoted following among professional writers. Announced in September 1989, XyWrite IV promised a lot to users, it entered beta-test after a year in November 1990 hoping to release by year end. By February 1991 it still hadn't shipped. The turning point for XyWrite came in the form of a disastrous near-partnership with IBM, which was seeking a modern replacement for its venerable DisplayWrite word processor. Working under an agreement signed in June 1990, XyQuest devoted nearly all of its development resources to revising Erickson's XyWrite IV to IBM's specifications, including IBM Common User Access-style menus, mouse support and a graphical user interface. Publicized in early 1991, the agreement envisioned as a marriage between XyQuest technology and IBM marketing, the product was to be called Signature, and would ship for MS-DOS, Microsoft Windows and IBM OS/2. DisplayWrite would be discontinued at the same time in favor of the new software. But on the eve of Signature's release, IBM announced a strategic decision to withdraw completely from the desktop software market, shocking XyQuest and leaving Signature in limbo. When a prospective new alliance with Lotus did not materialize, XyQuest regained the marketing rights to the software and resticker the ready-to-ship Signature packages pasting over the IBM logo. Following mixed reviews and poor performance, it was later improved and renamed as XyWrite 4.0. However, the changes IBM had insisted on were a liability where the III Plus user base was concerned. Some key reviews (such as in The Wall Street Journal) were harsh, and there were complaints that 4.0 was buggy and slow. Moreover, in the years since the last major XyWrite release, WordPerfect had cemented its hold on the DOS word processor market. Already financially strained by the long development cycle for Signature, by the end of 1992 XyQuest was bleeding money. The sale to The Technology Group ensued. While there were a few maintenance releases of 4.0 after the acquisition, The Technology Group's major commitment was to developing XyWrite for Windows. But XyWrite remained a niche product, unable to compete for the business user against Word for Windows, WordPerfect for Windows, and Ami Pro, despite added versatility and customization potential. The Technology Group was dissolved in 2003. Several versions of XyWrite were also localized for use in European countries. For example, the programs were offered in Germany under the name "euroscript" by North American Software GmbH. Nota Bene A descendant of XyWrite called Nota Bene is still being actively developed. Nota Bene, which runs on the XyWrite engine, is popular among academics. As of January 2020, Nota Bene for Windows is at version 12. NotaBene is supported on native Windows, Mac and on Linux running WINE. Current usage In 2015, work started on using XyWrite within the vDos program shell in 32 and 64 bit windows. This was successful in October 2016, resulting in an x86 PC and DOS emulator for Windows based on Jos Schaars's vDos. Formerly known as vDos-lfn, vDosPlus allows XyWrite 4, XyWrite III+, and Nota Bene for DOS to run under the latest versions of Microsoft Windows (including 64-bit Windows). VdosPlus.org shows the various functions, and XyWWWeb shows usage. XyWrite does not have as many features as Word or OpenOffice.org. For example, XyWrite is unaware of Windows ANSI or Unicode character sets and Nota Bene does not support languages (such as Chinese) that require double-byte characters. Reception Byte in 1984 stated "the XyQuest people have done an admirable job porting the editing part of the Atex system" to the IBM PC. While criticizing the documentation, it called XyWrite "extremely fast, powerful, compact, and flexible". Version history MS-DOS XyWrite I XyWrite II XyWrite II Plus XyWrite III, - distributed on 5.25" HD floppy diskettes, and shipped with a 3-ring looseleaf manual in fabric-covered slipcase XyWrite III Plus Signature 1.0 - initially announced September 1989 as XyWrite 4.0. XyWrite 4.0 - Jan 1993 - distributed on seven 3.5" HD floppy diskettes, and shipped with five bound manuals: Installation & Learning Guide, Making the Transition, Customization Guide, Command Reference Guide, and LAN Administrator's Guide (together weighing nearly 4.5 pounds) Windows XyWrite for Windows See also Bitstream Speedo Fonts List of word processors References External links Nota Bene (corporate site) XyWrite.com A General XyWrite Resource by Brian Henderson 1984 software Windows word processors Word processors Assembly language software
630757
https://en.wikipedia.org/wiki/Internet%20Connection%20Sharing
Internet Connection Sharing
Internet Connection Sharing (ICS) is a Windows service that enables one Internet-connected computer to share its Internet connection with other computers on a local area network (LAN). The computer that shares its Internet connection serves as a gateway device, meaning that all traffic between other computers and the Internet go through this computer. ICS provides Dynamic Host Configuration Protocol (DHCP) and network address translation (NAT) services for the LAN computers. ICS was a feature of Windows 98 SE and all versions of Windows released for personal computers thereafter. Operation ICS routes TCP/IP packets from a small LAN to the Internet. ICS provides NAT services, mapping individual IP addresses of local computers to unused port numbers in the sharing computer. Because of the nature of the NAT, IP addresses on the local computer are not visible on the Internet. All packets leaving or entering the LAN are sent from or to the IP address of the external adapter on the ICS host computer. Typically, ICS can be used when there are several network interface cards installed on the host computer. In this case, ICS makes an Internet connection available on one network interface to be accessible to one other interface that is explicitly designated as the private network. ICS can also share dial-up (including PSTN, ISDN and ADSL connections), PPPoE and VPN connections. Starting with Windows XP, ICS is integrated with UPnP, allowing remote discovery and control of the ICS host. It also has a Quality of Service Packet Scheduler component. When an ICS client is on a relatively fast network and the ICS host is connected to the Internet through a slow link, Windows may incorrectly calculate the optimal TCP receive window size based on the speed of the link between the client and the ICS host, potentially affecting traffic from the sender adversely. The ICS QoS component sets the TCP receive window size to the same as it would be if the receiver were directly connected to the slow link. ICS also includes a local DNS resolver in Windows XP to provide name resolution for all network clients on the home network, including non-Windows-based network devices. When connected to a Windows domain, the computer can have a Group Policy to restrict the use of ICS, but when at home, ICS can be enabled. Limitations The service is not customizable in terms of which addresses are used for the internal subnet, and contains no provisions for bandwidth limiting or other features. ICS was initially designed to connect only to Windows computers: computers on other operating systems required different steps to utilize ICS. On Windows XP, the server, by default, gets the IP address 192.168.0.1. (This default can be changed within the interface settings of the network adapter or in the Windows Registry.) It provides NAT services to the entire 192.168.0.x subnet, even if the address on the client was set manually, not by the DHCP server. Since Windows 7, the 192.168.137.x subnet has been used by default. Alternatives Alternatives to ICS include hardware home routers and Wireless access points with integrated Internet access hardware, such as broadband over power lines, WiMAX or DSL modems. See also Proxy server SOCKS References External links Microsoft.com - Description of Internet Connection Sharing Microsoft.com - Setting Up Internet Connection Sharing With XP Microsoft.com - Setting Up Internet Connection Sharing With Vista Microsoft.com - Using ICS (Internet Connection Sharing) with Windows 7 Windows communication and services Routing software
1593766
https://en.wikipedia.org/wiki/THEOS
THEOS
THEOS, which translates from Greek as "God", is an operating system which started out as OASIS, a microcomputer operating system for small computers that use the Z80 processor. When the operating system was launched for the IBM Personal Computer/AT in 1982, the decision was taken to change the name from OASIS to THEOS, short for THE Operating System. History OASIS The OASIS operating system was originally developed and distributed in 1977 by Phase One Systems of Oakland, California (President Howard Sidorsky). OASIS was developed for the Z80 processor and was the first multi-user operating system for 8-bit microprocessor based computers (Z-80 from Zilog). "OASIS" was a backronym for "Online Application System Interactive Software". OASIS consisted of a multi-user operating system, a powerful Business Basic/Interpreter, C compiler and a powerful text editor. Timothy Williams developed OASIS and was employed at Phase One. The market asked for 16-bit systems but there was no real 16-bit multi-user OS for 16-bit systems. Every month Phase One announced OASIS-16 but it did not come. One day Timothy Williams claimed that he owned OASIS and started a court case against Phase One and claimed several million U.S. dollars. Sidorsky had no choice and claimed Chapter 11. The court case took two years and finally the ruling was that Timothy Williams was allowed to develop the 16-bit version of OASIS but he was not allowed to use the OASIS name anymore. David Shirley presented an alternative history at the Computer Information Centre, an OASIS distributor for the UK in the early 1980s. He said Timothy Williams developed the OASIS operating system and contracted with Phase One Systems to market and sell the product. Development of the 16-bit product was underway, but the product was prematurely announced by POS. This led to pressure to release OASIS early, when it was still not properly debugged or optimised. (OASIS 8-bit was quite well optimised by that point, with many parts hand-coded in Z80 assembler, but that meant then-new 16-bit systems performed nowhere near as well as their 8-bit counterparts). This situation led to Williams becoming dissatisfied with the Phase One company at the time, and forming his own company to market and support the 16-bit OASIS. The company was initially called Oasis Technologies, until Phase One took action to protect the name. Rather than fight a long and expensive court battle, the company and product was renamed "THEOS". Williams created a new company and product name: "THEOS" meaning "the OS" in the sense of "the one" ("Theos" is Greek for "God"). While Williams and Sidorsky where fighting in the court the manufacturers had no 16-bit multi-user OS. That led to the agreement between Microsoft and Santa Cruz Operation to make a new operating system based on Version 7 Unix from Bell Labs. Microsoft purchased a license for Version 7 UNIX from AT&T in 1978, and announced on August 25, 1980, that it would make it available for the 16-bit microcomputer market. Because Microsoft was not able to license the "UNIX" name itself, called Xenix. Microsoft would distribute the product via Larry Michels and his son Doug Michels (Santa Cruz Operation). Seiko also lost patience with THEOS and Williams, and decided to make their own OASIS 16-bit version and hired Dr. Jeffrey Bahr. When Xenix and THEOS became available Seiko did decide to leave this market. Jeffrey Bahr started CET which went on with the development of the 16-bit OASIS compatible software. CET software was complete compatible with OASIS/THEOS and allowed these users to go into the Unix and Microsoft world. Cet acquired the Phase one company. Also, Phase One Systems licenses a porting tool called CET Basic. CET Basic is compatible with THEOS BASIC, MultiUser BASIC, OASIS BASIC, and UX-BASIC. This means you can keep most of your existing source code, and using W/32 BASIC, recompile your THEOS, OASIS, or UX-BASIC programs to work under additional operating systems such as Microsoft Windows, Linux or SCO UNIX. THEOS THEOS operating systems have been distributed by THEOS Software Corporation in Walnut Creek, California, since 1983. As of 2003, Phase One Systems publishes software development tools for THEOS(R) systems. As well as porting tools, Phase One Systems distributed the Freedom query package and Control database package for THEOS systems, used to bring SQL-like data extraction tools to third-party software packages. THEOS was introduced in Europe by Fujitsu and other hardware manufacturers 30 years ago, and is distributed by a number of distributors in Great Britain, Spain, Portugal, Germany, Italy and more. The 'current' version is THEOS Corona Commercial Release 6, which was released in December 2008, and a number of updates have been released since that time. The current Windows Workstation Client (as of May 2009) is version 3.16 from July 2003. Features Originally written in the late 1970s by Timothy S. Williams as a low-cost alternative to the more expensive mini- and mainframe- computers that were popular in the day, OASIS provided time-sharing multiuser facilities to allow several users to utilise the resources of one computer. Similar in concept to MP/M or UNIX, THEOS uses external device drivers rather than a kernel, allowing it to be more portable to other environments, though support has been primarily directed towards industry-standard hardware (i.e. PC's). THEOS is specifically aimed at small business users, with a wide range of vertical-market applications packages being developed and supported by individuals and companies. The languages distributed with THEOS include THEOS Multi-User Basic and C. A powerful EXEC shell language can be used for task automation or to produce a turnkey system. A number of security features exist, including dynamic passwords (where the password includes part of the date or time, or client IP address, or other dynamic elements), allow/deny security, a comprehensive inbound and outbound firewall, and an option to require a certain level of encryption in the workstation connection. In addition, the object file format is proprietary, and the operating system uses Intel "protected mode" to further increase defence against buffer overrun attacks. Commands The following list of commands are supported by the THEOS/OASIS Command String Interpreter (CSI). ACCOUNT ARCHIVE ASSIGN ATTACH BACKUP BASIC BULKERA CACHE CADVERF CHANGE CLASS COMPARE COPYFILE CREATE CSI DEBUG EDIT ERASE ERRMSG EXEC FILELIST FILT8080 FORCE GETFILE HELP INITDISK INITTAPE KILL LIST LOGOFF LOGON MAILBOX MSG PEEK RECEIVE RENAME REPAIR RESTORE SCRIPT SEND SET SHOW SPOOLER START STOP SYSGEN TERMINAL Reception BYTE in 1985 stated that "the functionality of THEOS is somewhere between MS-DOS and UNIX". The magazine criticized the documentation's quality, and concluded that the price was too high compared to other multiuser operating systems for the PC such as Pick and Coherent. See also Multiuser DOS Federation References External links THEOS Software Corporation Historia de OASIS®/THEOS® Corona OASIS Users' Group Archive February 1981 through November 1985 Proprietary operating systems X86 operating systems 1977 software
691685
https://en.wikipedia.org/wiki/Digital%20sound%20revolution
Digital sound revolution
The digital sound revolution (or digital audio revolution) refers to the widespread adoption of digital audio technology in the computer industry beginning in the 1980s. Prior methods Software-based pulse-width modulation Some of the first computer music was created in 1961 by LaFarr Stuart, who wrote software to modulate the duration of and between pulses (pulse-width modulation or "PWM", via a process now often referred to as "bit banging") on a bus line that had been connected to an amplified speaker originally installed to monitor the functioning of Iowa State University's CYCLONE computer, a derivative of the Illiac. The entire computer was used to create simple, recognizable tunes using digital audio. The speakers in the IBM PC (released in 1981) and its successors may be used to create sounds and music using a similar mechanism. Programmable sound generators Programmable sound generators were the first specialized audio circuits in computers included simple analog oscillators that could be set to desired frequencies, generally approximating tones along the musical scale. An example of this is the 1978 Atari POKEY custom ASIC used in the Atari 800. FM synthesis The next development was to produce a base frequency, and then modulating it with another frequency to create desired effects; this process of audio waveform synthesis using frequency modulation is usually referred to as FM synthesis. This technology was introduced in the early 1980s by Yamaha, which began manufacturing FM synth boards for Japanese computers such as the NEC PC-8801 and PC-9801 in the early 1980s. This allowed personal computer game audio to have greater complexity than the simplistic beeps from internal speakers. These FM synth boards produced a "warm and pleasant sound" that musicians such as Yuzo Koshiro and Takeshi Abo utilized to produce video game music that is still highly regarded within the chiptune community. Early integrated circuit devices to incorporate FM synthesis methods include the Yamaha OPL2 chip set (YM3812 and external digital-to-analog converter) was included on the AdLib sound card (1987), on the Creative Technology Sound Blaster (1989), and on the Media Vision Pro AudioSpectrum (1991); these were replaced by the next generation Yamaha OPL3 chip set on the Pro AudioSpectrum 16 and Sound Blaster 16. Digital-to-analog converters As they became more cost-effective, digital-to-analog converter (often called "D-to-A"—abbreviated "D/A", or "DAC") integrated circuits augmented and ultimately replaced FM synthesis devices. These devices enabled computers to play digital audio using an encoding technique known as pulse-code modulation ("PCM"). Unlike pulse-width modulation ("PWM"), which turns a signal on and off, pulse-code modulation also allows the level of a signal to be set to several intermediate levels; in this regard, PWM is similar to black-and-white images, PCM is similar to grayscale images. Digital audio compact discs (using PCM) were introduced in 1982. Starting in 1985, the medium was adapted for the storage of computer data via the Yellow Book CD-ROM standard and the High Sierra Format (which evolved in ISO 9660). The Apple Macintosh (1984) and Atari ST (1985) could produce digital audio via software. Without dedicated audio hardware, digital audio on these machines were usually limited to title screens in games (at higher sampling rates) or games which did not feature heavy animation which left enough CPU time to play lower quality samples. The first computer to feature a digital sound processor was the Commodore Amiga released in 1985. The MOS Technology 8364 Paula chip featured four independent 8-bit D/A converters and was therefore capable of playing either four mono audio channels or two combined stereo channels. This meant for the first time a computer could play digital samples from memory with virtually no CPU usage, or any clever software tricks. In 1989, the Creative Technology Sound Blaster featured a processor and digital-to-analog converter, and incorporated the Yamaha OPL2 chip set FM synthesis devices for compatibility with the AdLib sound card. In 1991, Media Vision introduced the original Pro AudioSpectrum, which offered similar functionality but introduced stereo sound, an audio mixer and CD-ROM interface (SCSI and many variants); its 16-bit successor, the Pro AudioSpectrum 16, offered CD-quality sound via its 16-bit compressor-decompressor ("CODEC"). In 1997, Intel Corporation created its Audio CODEC standard AC'97, which was superseded in 2004 by Intel High Definition Audio (HD Audio). Compression High fidelity audio hardware became inexpensive faster than data storage media, driving the development of compression techniques. A popular early variant of pulse-code modulation ("PCM") was a compressed version called adaptive differential pulse-code modulation ("ADPCM"). Sound module files (originally Amiga .MOD files) enabled music to be created and shared via compact files and played back with high quality (using four channels, each at half the sampling rate of audio compact discs). Soon after the release of its Pro AudioSpectrum 16, Media Vision included with it a MOD file player and sample music files. In the late 1990s, the MP3 format emerged, allowing music to be stored in relatively small files by using high compressions rates through a predictive synthesis technique. Modern computer CD-ROM drives allowed the Red Book CD-DA data to be read in digital format (versus earlier drives that merely output analog audio), which allows entire volumes of music to be copied and encoded many times faster than normal playback speed. Non-moving storage After the year 2000, strong demand for small portable music players such as Apple's iPods drove competition in component sales, resulting in data storage devices becoming increasingly economical. Online music distribution The popularity of high-quality compressed music and the widespread availability of Internet access enabled widespread copyright infringement (most notably through Napster) followed by widespread legitimate sales of music online through the Apple iTunes Music Store, Amazon.com, Walmart.com and others. Tapeless recording Until the early 1990s, music was generally recorded and processed by recording studios with the use of analog tape machines, which were essential in recording, editing, mixing and finalizing audio productions. At the beginning of the 1980s, programmable synthesizers and music workstations like the New England Digital Synclavier and the Fairlight CMI appeared, which allowed for parts of a production to be stored digitally within the system's mainframe without the need for audio tape. However, a music production in itself which used such synthesizers usually still involved mixing and editing using analog tape machine equipment. The first computer applications to offer fully digital tapeless recording, mixing and editing were Cubase and Notator for the Atari ST platform around 1989. In the 1990s, these and similar systems began gaining more ground among recording studios, and as computer processing and storing capacity increased, analog tape equipment was gradually replaced by fully computerized recording, in which every step in the production chain is carried out using software and digital storage. See also Sound card Sound chip References Digital audio Revolutions by type
953487
https://en.wikipedia.org/wiki/YafaRay
YafaRay
YafaRay (formerly YafRay) is a free and open-source ray tracing program that uses an XML scene description language. There is a YafaRay addon for Blender 2.78. The ray tracer is licensed under the GNU Lesser General Public License (LGPL). History YafaRay's predecessor, YafRay ("Yet Another Free Raytracer"), was written by Alejandro Conty Estévez, and was first released in July 2002. The last version of that program was 0.0.9, which was released in 2006. Due to limitations of the original software design, the YafRay raytracer was completely rewritten by Mathias Wein. The first stable version of the new raytracer, given the name YafaRay 0.1.0, was released in October 2008. The latest stable version is 3.4.1 released in 2020. Features Rendering Global illumination YafaRay employs global illumination using Montecarlo-derived approximations to produce realistically lit renders of 3D scenes. Skydome illumination The illumination system is based mainly on light coming from an emitting sky (see skybox), taking into account soft-shadow calculations involved. The illumination can be obtained from a high-dynamic-range image (HDRI). Caustics YafaRay uses a form of photon mapping that allows for caustics (light distortion produced by reflection or refraction of a curved surface, such as through a burning glass). For simulating somewhat translucent materials, there is a subsurface scattering shader under development. Depth of field Depth of field effects can be produced by using settings for focal distance and aperture. With a fixed point in the scene in focus, objects closer and farther away will be out of focus. Blurry reflections If the material of a surface is not a perfect reflector, distortion arises in the reflected light. This distortion will grow bigger as the reflecting object is taken farther away. YafaRay can simulate this phenomenon of blurry reflections. Architecture Modular framework YafaRay features a modular structure: at the core is a kernel the rest of the render elements (scene loader, lights, and shaders) must connect to. This, together with the specification of an API, allows for the development of rendering plug-ins to enable the use of YafaRay from any program or 3D suite. YafaRay-supported software includes: Blender, Wings 3D, and Aztec. Cross-platform YafaRay was written in C++ for good portability, and there are precompiled binaries for the most common platforms: Linux, Windows and Mac OS X. YafaRay can be used as a stand-alone render engine, using its own scene description format. In this way, it can be used directly from the command line, it can be called by a script, etc. There are also provisions for parallel and/or distributed rendering. See also POV-Ray, another free raytracer that is quite popular and has a longer history LuxRender, a free unbiased rendering system Kerkythea, a freeware rendering program that supports raytracing V-ray, a commercial rendering engine External links Source code Material Library Material Search 3D rendering software for Linux Free 3D graphics software Free software programmed in C++ Global illumination software Rendering systems
46347394
https://en.wikipedia.org/wiki/Troy%20Trojans
Troy Trojans
The Troy Trojans are the sports teams of Troy University. They began playing in the NCAA's Division I-A in 2001, became a football only member of the Sun Belt Conference in 2004, and joined that conference for all other sports in 2005. Troy University's athletics nickname was the Red Wave until the early 1970s when the student body voted to change the name to Trojans. Prior to becoming a member of NCAA Division One athletics in 1993, Troy University was a member of the Gulf South Conference of the NCAA Division II ranks. At the time, Troy's primary rivals were Jacksonville State University, Livingston University (now the University of West Alabama), and the University of North Alabama. The rivalry between Troy and Jacksonville State was arguably the fiercest of those. However, since Troy University moved to Division I-A participation in football and because Troy and JSU no longer share the same conference affiliation, this once heated rivalry has cooled significantly. Troy has Sun Belt rivalries with all East Division schools (Appalachian State, Coastal Carolina, Georgia Southern, Georgia State, and South Alabama). Currently, the Trojans' most prominent rival in all sports is their main Sun Belt rival, South Alabama. Sports sponsored A member of the Sun Belt Conference, Troy sponsors teams in eight men's and nine women's NCAA sanctioned sports. Men Football Troy University has fielded a football team continuously since 1946. Troy has won national championships at the NAIA level in 1968 and at the NCAA Division II level in 1984 and 1987. Troy University football began playing in the NCAA's Division I-A in 2001, became a football only member of the Sun Belt Conference in 2004, and joined that conference for all other sports in 2005. In 2001, Troy defeated Mississippi State University in Starkville, Mississippi to notch the Trojans' first victory over a BCS level program. On September 9, 2004, the Trojans garnered the program's first win over a ranked opponent when they defeated then #17 ranked Missouri, 24-14, upsetting former Heisman-hopeful Brad Smith's Heisman Trophy chances. Three years later in 2007, the Trojans routed Oklahoma State at home by a score of 41-23. The Trojan football team made its first bowl game appearance in the Silicon Valley Football Classic against Northern Illinois University on December 30, 2004, but lost. The Trojans won their first bowl game on December 20, 2006 at the New Orleans Bowl against Rice University by a score of 41-17. The football program won five straight Sun Belt titles from 2006 to 2010, finishing their run in 2010 with a New Orleans Bowl win over Ohio by a score of 48-21. At the end of the 2014 season, longtime head coach Larry Blakeney retired from coaching. He finished his career at Troy with a 178-113-1 record, 8 conference championships, and 5 bowl appearances. He was inducted into the Alabama Sports Hall of Fame in 2009. Current head coach Neal Brown was hired following Blakeney's retirement. After starting his first season ever as a head coach in 2015, going 4-8, he led a monumental turnaround for the football program in the 2016 season, as the Trojan finished 10-3, including a 28-23 win over Ohio in the Dollar General Bowl. During that season, Troy cracked the AP Top 25 for the first time since the program joined the FBS in 2001. Troy was also the first football program in the Sun Belt Conference to ever receive a Top 25 ranking. The Trojans football team has won three national titles: 1968 (NAIA), 1984 (Div. II), and 1987 (Div. II). Basketball The Troy University men's basketball team is currently under the direction of head coach Phil Cunningham. Don Maestri is currently the winningest coach in Troy University history. The Trojans' last NCAA Tournament appearance was in the 2003 NCAA Men's Division I Basketball Tournament as a 14 seed after winning the 2003 Atlantic Sun Conference tournament. The Trojans' faced 3-seed Xavier in the first round, but the Trojans lost 71–59. They finished the 2003 season with a 26-6 overall record. In their most recent post-season appearance in 2010, the Trojans won the Sun Belt Conference regular-season title but lost in the conference tournament final. Because of this, Troy made its way back to the NIT for the second time since 2004, falling to Ole Miss in the first round. The Trojan basketball team is recognized in recent Division I Basketball history for leading the nation in three-pointers from 2004 to 2006, making 1068 three-pointers over the course of 89 games (11.66 per game) during those three seasons. Troy's most famous claim to fame, however, is their game against DeVry Institute of Atlanta on January 12, 1992 when the Trojans came out victorious by the NCAA-record score of 258–141. This is currently the highest scoring game in NCAA basketball history. Baseball The Troy University baseball team won two Division II national championships in 1986 and 1987 under the leadership of baseball coach, Chase Riddle. One of Troy's most significant victories in baseball came in April 1998 when the Trojans knocked off the #3 nationally ranked Alabama Crimson Tide by a score of 8-4 at Riddle-Pace Field on the Troy campus. In 2006, Sun Belt Conference Coach of the Year Bobby Pierce led the Trojans to a regular season conference title, conference tournament title, and an NCAA Regional appearance with an overall record of 47–16. The Men of Troy were the 2-seed in the Tuscaloosa Regional in 2006, defeating the Southern Miss Golden Eagles twice, but were eliminated by the Alabama Crimson Tide in the championship game. Following the season, Jared Keel, Mike Felix, and Tom King were selected in the MLB draft. Troy's highest rank of the season was #29 by the NCBWA. In 2007 the Trojans went 34–27, finishing in a tie for second in the Sun Belt Conference, and were selected as a number three seed in the Oxford Regional hosted by Ole Miss. The Trojans were defeated by Southern Miss and Sam Houston State in consecutive games and eliminated from the regional. In 2011, the Trojans struck again by winning the Sun Belt regular season title and earning a bid to the Nashville Regional as a 3-seed. The Trojans defeated 2-seed Oklahoma State in the first round, but fell to 1-seed Vanderbilt and Belmont consecutively. The Trojans ended the 2011 season with a 42-17 record. Troy's highest rank of the season was #18 in the Baseball America poll. Troy had also reached a ranking of #25 in the USA Today coaches poll and #22 in the College Baseball News poll. Troy once again won a regular season title in 2013, this time in a thrilling fashion. The Trojans played #18 South Alabama during the last series of the regular season. After losing the first game of the series, the Trojans went on to win the next two games and clinch a share of the Sun Belt title. They finished the regular season with a 39-16 record. Troy finished the 2013 regular season ranked #21 in the College Baseball News poll. Golf The Troy men's golf team has a deep history of winning championships. A three-time NCAA national champion, the Trojan men were one of the most dominant golf teams in Division II, making 19-straight appearances in the NCAA Division II Golf Championships from 1975 to 1993. In that span, they managed to win three national championships in 1976, 1977, and 1984. Tennis Troy's men's tennis team began to rise to prominence in the early 1990s, after finishing ranked #8 in the nation in the NCAA Division II ITA Rankings. Soon after moving to Division I, Troy still brought their successes with them, winning the Mid-Continent Conference championship. The team would also go on to win conference titles in 2010 and 2015 in the Sun Belt Conference. Track & Field Troy's track and field men's teams routinely feature some of the best athletes in the Sun Belt Conference, as well as the country. Multiple athletes have qualified for the NCAA Championships. The team won eight Gulf South Conference titles from 1977 to 1986, with head coaches John Anderson, Charles Oliver, and Rick Stetson all being named Coach of the Year a combined eight seasons. Cross Country The Trojans men's cross country program has been a dominant team for many years. Troy has won a total of 15 conference championships as a member of the Gulf South Conference, winning titles in 1971 and going on a streak of title runs from 1974 to 1988. Women Basketball In 1997, the Troy University women's basketball team, under the direction of head coach Jerry Hester, won the Mid Continent Conference (now the Summit League) tournament championship in Buffalo, New York, and received an automatic berth to the NCAA Tournament where the Trojans traveled to Charlottesville, Virginia, and fell in the first round to the Virginia by a score of 96–74. Under current head coach Chanda Rigby, Troy has been to the NCAA Tournament twice and has won two Sun Belt tournament titles. In 2020, the Trojans won the Sun Belt regular season conference championship for the first time in program history. Softball Upon Troy University's athletics moving all sports to the NCAA's Division I in 1993, the Troy softball program was started that same year and officially began their first season in 1994 under head coach Melanie Davis. Under Davis' leadership, the program immediately became a competitive softball program, finishing their first season in Division I with a 40-13 record, including a 4-3 win over an already prominent program in Georgia Tech. In just Troy's third season of playing softball (1996), the team managed to make history by winning their first ever conference title and receiving a bid to play in an NCAA Regional. The team finished the season with a 47-22-1 record, winning the Mid-Continent Conference regular season title and conference tournament title. The Lady Trojans would receive a bid to play in the NCAA Play-In Series versus Southeast Missouri State, where they would sweep the Redhawks by scores of 3-2 and 1-0. The ladies would then receive a bid to play in the NCAA West Regional as the #4 seed. In their first game against Arizona, the Trojans were outmatched, losing 0-8 to the Wildcats. The Trojans were knocked out of the tournament after dropping a heartbreaker against South Florida, 5-6. The Trojans are currently coached by Beth Mullins, who is in her 4th season. Volleyball The Troy women's volleyball team has won three conference tournament championships, one regular season championship, and two conference divisional championships in their history. In 2019, the Trojans advanced to the Second Round of the National Invitational Volleyball Championship, defeating North Carolina A&T in the first round, before falling to Georgia Tech in the second round. Tennis The Troy men's and women's tennis teams have a short but successful history in the sport. The women have won conference championships in the Atlantic Sun Conference and the Sun Belt Conference and received national rankings in various years. The men's team has won the 2010 and 2015 Sun Belt titles, finishing with rankings as high as #51 in the nation. Women's Golf Just like the men's golf team, the women's golf team has a deep of history winning as well. In the NCAA's Division II, the Troy State women's golf team was one of the strongest teams in the nation in the 1980s, winning three national championships in 1984, 1986, and 1989. Despite the shorter history of the women's team, they've established themselves as proven winners. The women have been extremely successful recently, capturing three Sun Belt Conference titles and also receiving an individual at-large NCAA Regional berth for player Fátima Fernández Cano in 2016. Cross Country The women's cross country team was dominant while a member of the Gulf South Conference, winning the conference title five-straight years from 1982 to 1986. Defunct Programs Rodeo Troy University had one of the top collegiate rodeo programs in the nation during its existence. In 2007, Troy calf roper Ben Mayworth won the calf roping national championship at the National Finals College Rodeo in Casper, Wyoming. The rodeo program's home facility was the Pike County Cattlemen's Arena in Troy where it hosted a three-day rodeo each October that featured college rodeo programs from throughout the southern region of the United States. The university discontinued its rodeo program at the end of the 2014 season. National Championships Troy has won 14 NCAA national championships across five different sports, as well as 2 NAIA national championships. Team Football 1968 NAIA National Champions 1984 NCAA Division II National Champions 1987 NCAA Division II National Champions Baseball 1986 NCAA Division II National Champions 1987 NCAA Division II National Champions Men's Basketball 1993 NCAA Division II National Finalists Men's Golf 1976 NCAA Division II National Champions 1977 NCAA Division II National Champions 1978 NCAA Division II National Finalists 1983 NCAA Division II National Finalists 1984 NCAA Division II National Champions 1992 NCAA Division II National Finalists Women's Golf 1984 NCAA Division II National Champions 1986 NCAA Division II National Champions 1989 NCAA Division II National Champions Individual Men's Golf 1980 NCAA Division II Individual National Champion - Paul Perini Men's Track & Field 1976 NAIA 400-meter dash National Champion - Charles Oliver Men's Rodeo 2007 College National Finals Rodeo National Champion (tie-down roping) - Ben Mayworth Facilities References External links
47047888
https://en.wikipedia.org/wiki/Low-level%20design
Low-level design
Low-level design (LLD) is a component-level design process that follows a step-by-step refinement process. This process can be used for designing data structures, required software architecture, source code and ultimately, performance algorithms. Overall, the data organization may be defined during requirement analysis and then refined during data design work. Post-build, each component is specified in detail. The LLD phase is the stage where the actual software components are designed. During the detailed phase the logical and functional design is done and the design of application structure is developed during the high-level design phase. Design phase A design is the order of a system that connects individual components. Often, it can interact with other systems. Design is important to achieve high reliability, low cost, and good maintain-ability. We can distinguish two types of program design phases: Architectural or high-level design Detailed or low-level design Structured flow charts and HIPO diagrams typify the class of software design tools and these provide a high-level overview of a program. The advantages of such a design tool is that it yields a design specification that is understandable to non-programmers and it provides a good pictorial display of the module dependencies. A disadvantage is that it may be difficult for software developers to go from graphic-oriented representation of software design to implementation. Therefore, it is necessary to provide little insight into the algorithmic structure describing procedural steps to facilitate the early stages of software development, generally using Program Design Languages (PDLs). Purpose The goal of LLD or a low-level design document (LLDD) is to give the internal logical design of the actual program code. Low-level design is created based on the high-level design. LLD describes the class diagrams with the methods and relations between classes and program specs. It describes the modules so that the programmer can directly code the program from the document. A good low-level design document makes the program easy to develop when proper analysis is utilized to create a low-level design document. The code can then be developed directly from the low-level design document with minimal debugging and testing. Other advantages include lower cost and easier maintenance. References Design Software design
11942763
https://en.wikipedia.org/wiki/Eastern%20University%20%28Bangladesh%29
Eastern University (Bangladesh)
Eastern University () or EU is a private university located in Road 6, Block B, Ashulia Model Town, Savar, Dhaka-1345.The Eastern University was established in 2003 under the Private University Act 1992, and later on approved under Private University Act of 2010. The university was set up by Eastern University Foundation - a non-profit, non-political and philanthropic organization. Its founders include academics, chartered accountants, engineers, industrialists and retired civil servants. The Foundation has 30 members. The governance of Eastern University is carried out as per the Private Universities Act of 2010 by several bodies: Board of Trustees, Syndicate, Academic Council, Curriculum Committee, Finance Committee, Teacher Selection Committee and Disciplinary Committee. Campus The university campus is located on Road 6, Block B, Ashulia Model Town, Savar, Dhaka-1345 Faculties and departments The university has four faculties: Faculty of Arts, Faculty of Business Administration, Faculty of Engineering and Technology, and Faculty of Law. The Faculty of Arts has two departments – the Department of English and the Department of Applied Linguistics and ELT (English Language Teaching). The Faculty of Business Administration has four major areas, namely, Accounting, Finance, Marketing, Management, and Human Resource. A few social science courses are also offered by the faculty. The Faculty of Engineering and Technology has two departments, namely the Department of Computer Science & Information Technology and the Department of Electrical and Electronic Engineering. Approval of the Department of Textile Engineering is under consideration by UGC. The Faculty of Law has an undergraduate and postgraduate program. List of vice-chancellors Prof. Dr. Shahid Akhtar Hossain ( present ) Academics Programmes Faculty of Business Administration BBA (Bachelor of Business Administration) Program MBA (Master of Business Administration) Program EMBA (Executive Master of Business Administration) Program Faculty of Engineering & Technology B.Sc. CSE (Computer Science and Engineering) B.Sc. EEE (Electrical and Electronic Engineering) M.Sc. CS (Computer Science) Approval for the B.Sc. in Textile Engineering is under consideration by UGC. Other programs to be launched include a B.Sc. in Civil Engineering, Bachelor of Architecture, B.Sc. in Pharmacy and Post-Graduate Diploma in Environment and Climate Change Faculty of fLaw Bachelor of Law (Hons.) Master of Laws (1-year program) Faculty of Arts Bachelor of Arts (Hons.) in English Master of Arts in English Language and literature Masters in English language teaching (ELT) (1-year program) Masters in English language teaching (ELT) (2-year program) Curriculum Eastern University follow the North American model of the curriculum in the fields of Business Administration, Computer Science and Electrical and Electronics Engineering; the UK model in Law and English. The academic program is pursued through a curriculum that includes splitting up of an academic year into three semesters: the Fall, the Spring and the Summer. Session The academic session of EU is a three-semester cycle: Spring, Summer and Fall. Faculty members The university has 231 full-time and part-time faculty members out of which 47 are Ph.D. including a visiting professor from the United States. Academic exchange/link programs The university has signed MOUs with universities abroad for credit transfer of students with financial support, student exchange, faculty exchange, research collaboration and assistance in setting up new programs. Following is a list of such universities and institutions: Franklin University, Ohio, USA AIS, St Helen, Auckland, New Zealand London Premier College affiliated with London University, UK University of Worcester, UK Tampere University of Applied Sciences, Finland University Malaysia Perlis (UniMAP), Malaysia Yunnan University of Finance and Economics (YUFE), China Management and Science University, Malaysia Yunnan Open University (YNOU), China Yunnan Normal University (YNNU), China Research and publications The university has a research center known as the Centre for Research and Development. In addition to facilitating research studies and consultancy projects, it organizes research, seminars and training on research methodology. The university publishes a biannual refereed journal - The Eastern University Journal. Co-curricular activities Leadership development programs. Sports, seminars, workshops, conferences, exhibitions, concerts, competitions. Research. Social awareness programs. National and International visits. Publications. Liaison with educational institutions, development organizations and other organizations at national and international levels in various events. Notable students Sabnam Faria, actress and model (main actress of supernatural thriller film Devi) Footnotes https://web.archive.org/web/20110725221118/http://www.easternuni.edu.bd/_euprofile.aspx https://web.archive.org/web/20110410153825/http://www.easternuni.edu.bd/linkages.aspx External links Private universities in Bangladesh Universities and colleges in Dhaka
60096806
https://en.wikipedia.org/wiki/Melaneus%20%28mythology%29
Melaneus (mythology)
In Greek mythology, Melaneus (/ˈmɛlənˌjuːs/; Ancient Greek: Μελανεύς) may refer to the following personages: Melaneus, son of Apollo and husband of Oechalia. Melaneus, counted among the Ethiopian chiefs and was in the court of Cepheus at the time of the fight between Perseus and Phineus, and was killed during the same fight. Melaneus, an Indian, whose shape Hera took to warn Astraeis, and Indian captain during Dionysus' Indian War. Melaneus, joined, along with his father and brothers, Deriades against Dionysus in the Indian War. He was son of Aretus and Laobie and thus brother of Lycus, Myrsus, Glaucus and Periphas. Melaneus, a centaur mentioned by Ovid among many others who fought in the battle between the Lapiths and the centaurs. Melaneus, father of Autonous, the father of Anthus, Erodius, Schoenous, Acanthus and Acanthis by Hippodamia. Melaneus, a Trojan warrior and brother of Alcidamas. He was killed by Neoptolemus, Achilles' son, during the Trojan War. Melaneus, father of Amphimedon, one of the suitors of Penelope. Melaneus, one of Actaeon's dogs. Notes References Antoninus Liberalis, The Metamorphoses of Antoninus Liberalis translated by Francis Celoria (Routledge 1992). Online version at the Topos Text Project. Gaius Julius Hyginus, Fabulae from The Myths of Hyginus translated and edited by Mary Grant. University of Kansas Publications in Humanistic Studies. Online version at the Topos Text Project. Homer, The Odyssey with an English Translation by A.T. Murray, PH.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1919. . Online version at the Perseus Digital Library. Greek text available from the same website. Nonnus of Panopolis, Dionysiaca translated by William Henry Denham Rouse (1863-1950), from the Loeb Classical Library, Cambridge, MA, Harvard University Press, 1940. Online version at the Topos Text Project. Nonnus of Panopolis, Dionysiaca. 3 Vols. W.H.D. Rouse. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1940–1942. Greek text available at the Perseus Digital Library. Publius Ovidius Naso, Metamorphoses translated by Brookes More (1859-1942). Boston, Cornhill Publishing Co. 1922. Online version at the Perseus Digital Library. Publius Ovidius Naso, Metamorphoses. Hugo Magnus. Gotha (Germany). Friedr. Andr. Perthes. 1892. Latin text available at the Perseus Digital Library. Quintus Smyrnaeus, The Fall of Troy translated by Way. A. S. Loeb Classical Library Volume 19. London: William Heinemann, 1913. Online version at theio.com Quintus Smyrnaeus, The Fall of Troy. Arthur S. Way. London: William Heinemann; New York: G.P. Putnam's Sons. 1913. Greek text available at the Perseus Digital Library. Centaurs Trojans Characters in Greek mythology Dionysus in mythology
2409211
https://en.wikipedia.org/wiki/Daz%20Studio
Daz Studio
Daz Studio is a software application developed and offered for free by Daz 3D. Daz Studio is a 3D scene creation and rendering application used to produce images as well as video. Renders can be done by leveraging either the 3Delight render engine, or the Iray render engine, both of which ship for free along with Daz Studio, or with a variety of purchasable add-on render engine plugins for Daz Studio from various vendors and companies. Daz Studio also supports the import and export of various file formats for 3D objects and animations to allow for the use of other 3D content within Daz Studio, as well as to get content out of Daz Studio for use in other 3D applications. Daz Studio is available for free, but registration is required. Version 1.0 was released in Fall 2005. Until version 1.7 its logo was stylized as "DAZ|Studio". On February 1, 2012, Daz 3D announced it would be giving away Daz Studio Pro for free. In 2017, Daz 3D also began duck offering Hexagon and Daz Studio together for free, thus adding 3D modeling capabilities to the Daz Studio offering. Genesis figure technology One of the main differences between Daz Studio and other software applications such as Poser is that Daz 3D has also included support for its various generations of the "Genesis" technology which is used as the basis for its human figures. Daz 3D has had many versions of its human figures and characters, but in 2011 they launched a significant change in the underlying technology. Instead of each figure being designed individually, Daz 3D moved to their Genesis platform, in which figures were derived as morphs from the base mesh. Two of the key differences that this technology created were: The ability for characters to be blended into a huge variety of shapes, and since these shapes were all derived from a common base, add-on content like clothing, hair, and additional morphs would not only work on all characters, but could actually change with the characters. The Genesis platform has gone through several versions since the launch in 2011: Genesis 2: One of the shortcomings of the Genesis platform was that although it allowed extremely flexibility in the shape of characters and clothing, it also toned down some of the elements of what made a male or female figure unique. Genesis 2 changed this by splitting the Genesis base figure into two separate base figures: Genesis 2 Male and Genesis 2 Female. Genesis 3: Up until Genesis 3, the Genesis figures had been using TriAx Weight Maps, where many other industry platforms were using Dual Quaternion. This changed in Genesis 3 to allow Daz 3D figures to be more compatible with other 3D software platforms as well as Game Development platforms. Genesis 8: The jump in version naming from Genesis 3 to Genesis 8 was in order to address confusion in naming conventions. Although Genesis had reached its fourth version, most of the Daz 3D flagship characters were now on their eight versions. In order to avoid the confusion of Victoria 8 or Michael 8 being Genesis 4 characters, Daz 3D shifted the versioning of Genesis to match with the character versions. Genesis 8 also includes significant changes in the figure's backward compatibility with previous generations and their content as well as Joint and muscle bends and flexing and facial expressions. History and overview Daz Studio is designed to allow users to manipulate relatively ready-to-use models and figures as well as other supporting 3D content. It is aimed at users who are interested in posing human and non-human figures for illustrations and animation. It was created as an alternative to Poser, the industry-leading software in use for character manipulation and rendering. Daz 3D began its business model selling 3D models of human beings (and a few non-humans), as well as giving away a few of the more popular base models for free from time to time, and clothing and props for the same, and all of these models were constructed to be used in Poser. Daz eventually created their own character-manipulation software, first for sale and later distributed for free (originally just the base edition, but eventually even the "pro" version). Initially, Daz Studio handled the same file formats that Poser did, but Daz eventually introduced Daz Studio-specific character and file formats (although they also introduced their DSON file importer to make it possible to import Daz Studio characters into Poser, while Daz Studio can still also import Poser object files). Daz 3D follows the "Razor and blades business model": Daz Studio is the "razor", a free-of-charge core program with the required features for the creation of imagery and animations, while relegating other features to the "blades", add-on plug-ins, usually commercial, which the user may add. Initially, it was possible to easily create new content in another Daz program, Carrara. Beginning in 2017, Daz 3D began offering another of their programs, Hexagon, and distributing that as a package with Daz Studio. In October 2017, Daz Studio added to the free offering the dForce physics engine, which Daz Studio uses for simulating the draping of cloth due to gravity, wind, and collision with other objects. See also List of 3D modeling software References 3D animation software MacOS graphics software Windows graphics-related software Anatomical simulation Video game development software 3D graphics software that uses Qt Proprietary software that uses Qt
6747569
https://en.wikipedia.org/wiki/VSTa
VSTa
Valencia's Simple Tasker (VSTa) is an operating system with a microkernel architecture, with all device drivers and file systems residing in userspace mode. It mostly complies with the Portable Operating System Interface (POSIX), except where such compliance interferes with extensibility and modularity. It is conceptually inspired by QNX and Plan 9 from Bell Labs. Written by Andy Valencia, and released under a GNU General Public License (GPL). As of 2020, the licensing for VSTa is Copyleft. It was originally written to run on Intel 80386 hardware, and then was ported to several different platforms, e.g., Motorola 68030 based Amigas. VSTa is no longer developed. A fork, named Flexible Microkernel Infrastructure/Operating System (FMI/OS), did not make a release. User interface The default graphical user interface provided as a tar-ball with the system was ManaGeR (MGR). References External links http://www.vsta.org/distro/ download site Free software operating systems Unix variants Discontinued operating systems Microkernel-based operating systems Microkernels
39110552
https://en.wikipedia.org/wiki/List%20of%20Regular%20Show%20characters
List of Regular Show characters
These characters appear in the American animated television series Regular Show, created by J. G. Quintel for Cartoon Network. The series revolves around the daily lives of two 23-year-old friends, Mordecai (a blue jay), and Rigby (a raccoon). They work as groundskeepers at a park, and spend their days trying to avoid work and entertain themselves by any means. This is much to the chagrin of their boss Benson (a gumball machine) and their coworker Skips (a yeti), but to the delight of park manager Pops (a man with a lollipop-shaped head). Their other coworkers include an overweight green male called Muscle Man, and a ghost called Hi-Five Ghost. Overview Main characters Mordecai Mordecai (voiced by J. G. Quintel) is a 23-year-old anthropomorphic blue jay who works as a groundskeeper at The Park. He has been best friends with Rigby ever since childhood. Mordecai is more conscientious, intelligent, responsible, mature, and moral about his actions than Rigby is, which sometimes leads to him opposing Rigby when he is the cause of some kind of chaotic problem. While Mordecai dislikes his job, he's often willing to put up with it begrudgingly as opposed to Rigby, who is more prone to avoid work as much as possible. However, Mordecai usually sides with his friend, occasionally going along with Rigby's attempts to get out of work and the two generally stick together through their adventures. Mordecai loves to play video games and is a better player than Rigby, he also demonstrates decent strength, such as carrying large boulders, fighting the death bear, never getting hurt by Rigby's punches, and able to punch Rigby across an entire room with ease. He can sometimes become caught up in his emotions, often letting them get the better of him. However, he is usually quick to apologize to others if he has hurt them and occasionally takes the lead in fixing a situation. He had a crush on Margaret Smith, a cardinal who worked as a waitress at a local coffee shop. Mordecai would often hang out with her, along with Rigby and Eileen Roberts, and made many attempts to try to start a relationship with her. The two finally begin to date in the fourth season until Margaret decides to leave for college, thus ending their relationship and causing Mordecai to go into a depression. Mordecai meets CJ shortly afterwards and they start dating. CJ and Mordecai's relationship is strained due to CJ seeing Mordecai and Margaret having fun together on several occasions. He eventually decides to take a break from dating in "Dumped at the Altar", after his relationship with CJ didn't work out. In the episode "Camping Can Be Cool", it is revealed that he attended art school before being employed at The Park; however, he did not finish school due to his bad portrait skills, which were revealed in the episode "Bad Portrait". He is shown to have an outgoing mom, who embarrasses him around his girlfriends and also made a highlight reel of Mordecai's most embarrassing moments, as seen in "Maxin' and Relaxin'". In the epilogue to "A Regular Epic Final Battle", Mordecai quits The Park, parts ways with Rigby, moves to New York City, and returns to making art. He opens a successful exhibition and meets a bat woman whom he eventually marries and starts a family. Mordecai's wife was not given a name in the show. Head writer Matt Price, on Reddit, gave her the name Stef when asked about it, and writer Owen Dennis stated on Tumblr that there had not been previous plans to give a name to the character. Rigby Rigby (voiced by William Salyers) is a 23-year-old anthropomorphic brown raccoon who works as a groundskeeper at The Park. He has been best friends with Mordecai since childhood and is more prone to slacking off than Mordecai is. Rigby is hyperactive and extremely mischievous, which sometimes puts him at odds with Mordecai. He mostly lives for simply having a good time and relaxing, which he sometimes achieves through selfish acts like lying or cheating. He has a bad habit of getting himself and others in trouble, often causing many of the chaotic and surreal problems that arise in The Park. Mordecai often punches him on the arm for this as a running gag. Nevertheless, he is shown to be a good person deep down and sticks closely to his friends. Like Mordecai, Rigby loves to play video games, but he is the worse of the two. He is also shown to be the weakest of The Park workers, although he has surprised them on a few occasions. Rigby's lack of strength was a major plot point in the episode "One Pull Up", in which Rigby had to pass a company physical and keep his job by performing one pull up. He has a younger brother named "Don", whose height and physique lead people to believe that he, not Rigby, is the older brother. Eileen Roberts, a female mole who works at a local coffee shop, previously alongside Margaret Smith, has strong feelings for Rigby and makes this very obvious. He originally did not reciprocate her feelings and harshly ignored her at some points, but he quickly begins to warm up to her and implies that he likes her, as well. In "Dumped at the Altar", Rigby reveals to Mordecai that he and Eileen have been dating for 3 months. Rigby is allergic to eggs, as evidenced in the episode "Eggscellent" when Rigby tried to eat a 12-egg omelet to win a trucker hat and went into a coma due to a severe allergic reaction. Rigby has also died four times and was resurrected in the series. He was killed by Skips in an arm wrestling match, he was killed by Snowballs the Ice Monster, he was killed by Mordecai who pushed him into the Space-Time Continuum, and fell into a fatal coma in "Eggscellent". As of Rigby's Graduation Day Special, Rigby has finally graduated from high school. In the epilogue to "A Regular Epic Final Battle", Rigby quits The Park and moves in with Eileen. They eventually get married and start a family, but it's unknown if Rigby is working or not as he is seen teaching his children how to play video games. It is hinted at in the episode "'Ello Gov'nor" that Rigby's last name may be Riggerson, however, this has neither been confirmed nor denied by J.G. Quintel. Benson Benson Dunwoody (voiced by Sam Marin) is a gumball machine who works as the manager of The Park. He is frequently infuriated with Mordecai and Rigby due to their constant slacking and mischief; he is sometimes infuriated with Muscle Man and Hi-Five Ghost as well. He is very hot-tempered and prone to fits of rage. He has a tendency of yelling at Mordecai and Rigby every time they slack off; starting in season 4, he may have a tendency of yelling at Muscle Man and Hi-Five Ghost if they slack off. Even so, they may instead have to face consequences whether it is their fault or not. Despite always being at odds with them, Benson is kind-natured at heart and is ultimately friends with Mordecai and Rigby after calming down a bit in the episode "Benson Be Gone" and the three gain more insight and trust with each other as the series progresses. He is skilled at stick hockey and has a strong love for music, proving to be an extremely skilled drummer in the episode "150 Piece Kit". Benson used to date Audrey, a human woman who lives across from him in his apartment complex. It is revealed that they broke up in "The Real Thomas", in which Benson starts to date an undercover Russian spy named Natalia, although she is later eaten by a whale. In the episode "Pam I Am ", Benson develops feelings for one of the dome scientists named Pam and they go on a 'date'. However, Dr. Langer witnesses the 'date' and makes a new rule that forbids the dome staff from dating anyone who works at the park. At the end of the episode, it is implied that Benson and Pam will date once the dome is gone. During the beginning of the episode "Fries Night", Benson contacts Pam back on earth, to which she revealed that having a "long distance" relationship with Benson because he is now in space is too difficult for her. She states that the reason for the break up is that she doesn't know when or if he will ever return to earth again. They both agree to become friends even though Benson later gets depressed from yet another break up with a woman he really cared for. In the epilogue to "A Regular Epic Final Battle", Benson becomes the owner of The Park and gets back together with Pam. They apparently adopt Applesauce as well as a variety of cats. "Pops" Maellard Pops (voiced by Sam Marin) is a cheerful, humble, quirky, idiotic, and gullible lollipop-shaped man who resides at the house in The Park and always talks in a whiny-like tone. His adoptive father, Mr. Maellard, is the owner of The Park. Pops tends to be very ecstatic about everything, often exclaiming "Good show!" or "Jolly good show!" when he is happy about something. When something bad happens, he will instead say "Bad show." He tends to dress and act like he is in the early 20th century and utilizes technology and slang from circa 1900–1910. He carries small butterscotch lollipops in his wallet, sincerely believing that they are real money, much to everyone's confusion. He is an upright gentleman who is very kind and well-mannered to everyone. He is also very sensitive, often becoming upset or crying if his feelings are hurt. He has strong interests in poetry, wrestling, music, nature, animals, and games. Despite being an elderly man, he is very childish and is often oblivious to serious things around him. Because of this, the group frequently looks after him, especially Benson. Pops has also been shown to have immense strength on several occasions, despite his slim build. In the episode "Prank Callers", it is shown that Pops was once a more serious and mature man back in the 1980s. However, when Mordecai and Rigby had been sent back to that time and accidentally hit him with a golf cart, he is shown to have turned into his zany self. Pops once owned a British doll named Percival, or Percy, who turned his back on him and tried to kill Pops in "Terror Tales of the Park". Pops is also one with nature, but lost it until he tries to find the answer to get it back, as shown in "Catching the Wave". In Season 8, Pops is revealed to be the universe's Chosen One due to being born with telekinetic abilities and ever since he is one with nature back in some previous season's episode, as well as having an evil version of himself with the ability to erase a person from existence. Pops' destiny is to kill Malum Kranus to prevent the destruction of the universe. In "A Regular Epic Final Battle", it is revealed that his real name is Mega Kranus. Pops also realizes that the best way to defeat Malum Kranus is with kindness. Pops gives Malum Kranus a hug and the two fly into the sun, killing them both in the process, and the universe is saved. In Heaven, Pops' voice is heard saying his catchphrase 'Jolly Good Show' as a video tape of the show, and the show itself, ends. Skips/Walks Skips (formerly Walks) Quippenger (voiced by Mark Hamill) is a talking yeti who works as a groundskeeper at The Park. He is the strongest and smartest of The Park workers and they almost always turn to him for help, as he usually knows how to solve the chaotic problems that arise, however, he isn't always right. Whenever he is asked for help, he generally says, "I've seen this before", and then presents a solution. As his name suggests, he is always skipping rather than walking or running. The cause for his skipping is discovered in the episode "Skips' Story," where it is learned that he had a girlfriend many years ago, prior to him becoming immortal. The two of them constantly skipped. When she died, he vowed to only skip to honor Mona, his dead girlfriend and the only person he ever loved. He is a diligent worker and is very skilled at his job; however, he suffers from a lack of knowledge of computers and other kinds of newer technology, which was seen in the episode "Skips vs. Technology" where Mordecai and Rigby jam a printer and crash the computer whilst printing a card for Skips thanking him for his efforts to save them from being fired by Benson for their antics. Aside from this, he is very experienced and knowledgeable, as he is immortal and has been alive for hundreds of years. In the episode "Free Cake", it is revealed that he must perform a ceremonial dance every year on his birthday in order to renew his immortality. He explains the story of how he received his immortality in the episode "Skips' Story." He chose to become immortal in order to fight Klorgbane, an immortal bully who inadvertently caused the death of his girlfriend, Mona, the only woman that Skips had ever loved during a fistfight. The Guardians of Eternal Youth provided Skips with his immortality, knowing that he was the only one capable of defeating Klorgbane with the Fists of Justice. Skips' birth name was Walks, but he changed it to Skips when he received his immortality because he and Mona would always skip when they were together. This is also the reason why he always skips instead of walking; he chose to do this in order to remember the times he and Mona shared for all his life. Skips is also a skilled bassist, which is demonstrated in several episodes. In the epilogue to "A Regular Epic Final Battle", Skips remains working at The Park while having a new part-time job as a mechanic, satisfied with his life. Muscle Man/Mitch Sorenstein Mitchell "Muscle Man" Sorenstein (voiced by Sam Marin) is an obese and green-skinned man who works as a groundskeeper at the Park. He is very erratic and immature, often pulling pranks and joking around. He enjoys telling "My mom!" jokes, botched attempts at "Yo mama" jokes, much to the annoyance of everyone except Hi-Five Ghost, his best friend. Although he can be rude due to his ego, he is ultimately shown to be polite and caring toward his friends. At times, he can burst out on a rampage if he is greatly angered. His father, Muscle Dad, enjoyed the same attitude for pranks and jokes, but died in the episode "Trucker Hall of Fame". His older brother, Muscle Bro (real name John), is also seen throughout the series. Muscle Man originally shared a rivalry with Mordecai and Rigby throughout the first two seasons, but the three began to get along and treat each other as friends from the third season onward. His girlfriend, Starla, shares a similar appearance to him and the couple constantly disgust other people when they publicly kiss and show affection to each other. His real name was revealed to be Mitch Sorenstein in the episode "Muscle Woman". He is revealed to be Jewish in "The Christmas Special" in where he reveals he celebrates Hanukkah. In "Power Tower", it is revealed that he gained the nickname "Muscle Man" from his early years of bodybuilding and actually being in excellent physical condition, but he found that life very boring and gave it up. In "The End of Muscle Man", he proposes to Starla and the two become engaged and they are now married in "Dumped at the Altar". In the epilogue to "A Regular Epic Final Battle", upon returning home Muscle Man discovers he has a three-year-old daughter. He and Starla live out their days in their trailer park home and have numerous children. It was revealed in "Trailer Trashed" that the trailer was his prize for winning a hot dog eating contest. Hi-Five Ghost Hi-Five Ghost (voiced by Jeff Bennett in season one, then by J. G. Quintel from seasons two to eight) is a ghost with a hand extending from the top of his head who works as a groundskeeper at The Park. Hi-Five Ghost is best friends with Muscle Man and frequently gives him high fives to accompany his jokes, as he genuinely finds most of Muscle Man's jokes amusing. Because of his name and appearance, he is frequently called by his nickname, "High Fives", and sometimes simply as "Fives". Hi-Five Ghost rarely speaks throughout the first three seasons of the series, but he is given more dialogue from season four onward. His father was introduced in the episode "See You There", as well as his older brother, Low-Five Ghost, who works as a police officer. In the episode "The Postcard", Hi-Five Ghost reunited with a human girl named Celia whom he had befriended at a cafe after waiting four years to receive a postcard from her in Prague. In the epilogue to "A Regular Epic Final Battle", Hi-Five Ghost and Celia become a married DJ duo and tour the world together. They have a child together. Eileen Eileen Roberts (voiced by Minty Lewis, a writer/storyboard artist for the series) is an anthropomorphic beaver who works at a local coffee shop, previously alongside Margaret. She has a crush on Rigby, but he initially found her annoying. She is notable for her intelligence and displays many skills and hobbies throughout the series including dancing, sewing, and astronomy. One of Eileen's odd personality quirks is her affinity for sea turtles, which is referenced in a few episodes. She's a recurring character in seasons 2–7, and becomes a main character in season 8. Eileen first appeared in the episode "Brain Eraser." She also appears in the episode "Do Me a Solid", in which Rigby learns of Eileen's crush on him (even though Rigby shows no interest in Eileen), though he goes along with it for a while. Since the episode "Camping Can Be Cool", Rigby has warmed up to Eileen. Rigby thought very highly of her and praised her actions throughout the episode. In the episode "Diary", Rigby admits that he finds Eileen to be attractive when she is not wearing her glasses, but it also reveals that she also can't see without them. In the episode "One Pull Up", Eileen helps Rigby train for his company physical and he shows his gratitude by hugging her (and crushing her due to his enlarged physique). In the episode "Eileen Flat Screen", it is revealed that Eileen and Rigby have been spending more time together. In "Dumped at the Altar", Rigby tells Mordecai that he and Eileen have been dating for three months. In "Rigby's Graduation Day Special", Eileen finally graduates from college at the same time Rigby finally gets his high school diploma. As she is cooking for a graduation party for her and Rigby when the guys press the button that sends them and the park into space, Eileen is stuck with the guys. In the epilogue to "A Regular Epic Final Battle", she and Rigby move in together and start a family. It is unknown if she has a job or not, but based on her husband's lazy personality, it is implied that she does. Recurring characters Thomas/Nikolai Nikolai (seasons 4–7) (voiced by Roger Craig Smith) is a young anthropomorphic goat who was trained by the KGB as a ruthless spy, and who later sent him to work for the Russian organization M.O.M.M. (Ministry of Meadow Management), a KGB agency that struggled to find out what made American parks up to date and wealthy. In order to fix Russia's outdated parks, M.O.M.M. sent out Nikolai on a covert operation to obtain the park and bring it back to Russia. During his undercover mission, he changed his identity to "Thomas" and presented himself as an intern for credits in college in "Exit 9B" (in which he made his debut), working as an unpaid intern who calls his "mom" on a regular basis and is often reproved by his coworkers, most notably by Muscle Man. He is usually reluctant to be involved in the surreal and chaotic adventures that arise in The Park, often asking if he has to be part of the situation, to which they insist that he must. There are times when Nikolai becomes personally invested in maintaining his cover, such as using a robot to pose as his "mom" in "The Thanksgiving Special", and wearing spy attire disguised as a Halloween costume (a slice of pizza, which he had to wear until Thanksgiving Day upon losing a bet in "Terror Tales of the Park III"). When the other Russian spies that were deployed with him carry out the final phase of the plan to bring The Park to Russia in "The Real Thomas", he finally reveals his true identity to the park crew and explains why he is really there. When Nikolai learns the plan is really to destroy the Park through a loophole in Russian/American relations, he turns on his fellow spies for being lied to (along with some persuasion by the park crew to remind him of the good times they had as friends, despite the constant poor treatment he received from them for being an intern), and returns the Park to American soil before going on the run from both sides. He makes several cameos after this, usually in some sort of disguise. Eventually, he returns in "Guys Night 2", revealing himself to be tired of his old life as a spy and wanting to move on to a new life. He feels his only option is to go into hiding forever, but first he enjoys one final hang with the park crew. He made non-speaking cameos in later episodes. In “Rigby's Graduation Special”, he makes a brief cameo by proposing a toast to the park dome taking off into space while in his submarine. Margaret Margaret Smith (voiced by Janie Haddad-Tompkins) is a female red anthropomorphic robin who works as a waitress at a local coffee shop. She was good friends with her co-worker, Eileen. Mordecai had a huge crush on Margaret and frequently found excuses to go to the coffee shop to see her. She has a cousin named John who has an artificial wooden leg. The rest of her family are all birds like her and Mordecai, except for her father Frank, a strong and stern human. Margaret returns Mordecai's feelings for her and the two begin to finally date in the fourth season. They broke up in the season finale when Margaret leaves for college. In the episode "Eileen Flat Screen", Margaret returns now as a news reporter, which no one notices. In "Merry Christmas Mordecai", Mordecai becomes nervous when he hears that Margaret will be there. After several awkward encounters (thanks to Mordecai), they finally manage to have a normal conversation with both acknowledging that they had some good times. This leads to a montage of memories, ending with a memory of a kiss on a roller coaster. Unfortunately, when the scene flashes to the present, they accidentally kiss on the lips and are shocked when they notice CJ watching them. CJ runs out of the house and leaves while Mordecai runs upstairs to find his phone; he notices that all of Margaret's stuff is there and Eileen tells him she is staying as an intern. Mordecai is frantic when he hears the news and didn't know what to say about Margaret staying with Eileen from now on. As of "Sad Sax", Mordecai and Margaret are still just friends, and Mordecai makes it up to CJ by telling her the truth. In "1000th Chopper Flight Party", Mordecai is still awkward with her presence and afraid to screw up, even to the point of letting Rigby constantly mess up the Party as a diversion just to keep her away from him. When he finally is declared as the lucky guest to ride Chopper 6 for its 1000th flight, he finds it hard to say no and joins. Margaret tries to talk to him, but Mordecai awkwardly resists until she scolds him for his attitude in desire for their friendship. Mordecai then lifts the tension with a joke and they finally start to have a fun chat. This however angers CJ, who misinterprets it as them rekindling their love, and she causes havoc with her storm cloud ability. Mordecai tries to save Margaret, but she calms CJ when she reveals that she is in a relationship with news anchor, Del Hanlon, which stuns Mordecai and surprises her parents. In "Not Great Double Date", Mordecai seemed upset that Margaret had a boyfriend, but still said that she seemed happy with Del and that he liked him. When she confessed that Del was not her boyfriend and that she was tired of feeling like a tourist around her friends because of the tension with CJ, he felt sad about it and was pretty interested to know that she still had feelings for him. In "Just Friends", Rigby and Eileen go to the presentation of martial arts Don, leading to Mordecai and Margaret spending a night that has romantic moments. A chef named Daisuke shows them their future using magical sauce. It is revealed that if, and when, Mordecai and Margaret get together, they will get married, have children, buy their own houseboat, and die peacefully after 50 happy years. Mordecai and Margaret agree that their future looks like it will be really great, but that they are still young and should take it easy on relationships. At the end of the episode, the two agree to remain just friends, with future Margaret looking down on them and inquiring how long they can be just friends, and future Mordecai stating that "only time will tell." In "Rigby's Graduation Special", she was very worried as she watched Mordecai and cried as the other park workers being shot into space, even saying his name in concern. However, in the epilogue to "A Regular Epic Final Battle", she is only seen greeting Eileen when she returns. She does not end up with Mordecai and is not seen with the group 25 years later, though she becomes a muse for Mordecai's art. Head writer Matt Price stated on Reddit that the idea was that Mordecai and Margaret would find their own paths in life. On Tumblr writer Owen Dennis stated that reality shows that many people who initially date one another early on end up with other people, contradicting narrative arcs of many Western entertainment media. Starla Starla "Muscle Woman" Gutsmandottir-Sorenstein (voiced by Courtenay Taylor) is an obese green woman similar in appearance to Muscle Man. She works at Icy & Hot Jewelry & Apparel. In the episode "Muscle Woman", she developed a crush on Mordecai and had previously dated two other people as indicated by a tattoo on her lower back. When Mordecai broke up with her, she became extremely angry, destroying everything in her path, including a helicopter. She got back together with Muscle Man after he expressed his feelings towards her at the end of the episode. Since then, Starla has appeared with Muscle Man in various episodes, including "Fancy Restaurant", "Pie Contest" and "Bald Spot". In the episode "The End of Muscle Man", Muscle Man proposes to Starla and the two become engaged. In the episode "Dumped at the Altar", she marries Muscle Man. In the epilogue to "A Regular Epic Final Battle", Starla is revealed to have had a daughter with him, during the crew's three-year absence. She and Muscle Man live happily in their home and had more children over the years. Starla is one of the few characters who refers to Muscle Man by his real name, Mitch. CJ Cloudy-Jane "CJ" (voiced by Linda Cardellini) is an anthropomorphic cloud. She had been Mordecai's girlfriend with reoccurring anger problems. She first appeared in the episode "Yes Dude Yes", in which Mordecai started dating her after thinking Margaret was engaged. After learning that Margaret was not getting married, he almost immediately forgets about CJ, leading to an ugly break up at the coffee shop in which she revealed that she can transform into a deadly storm when really angry and assumed this form in three episodes. After Margaret leaves town for college, CJ and Mordecai meet each other at the New Year's Eve dance in the episode "New Year's Kiss", unwittingly kissing each other at midnight. The following episode, "Dodge This", continues this story days after the kiss with CJ and Mordecai competing against each other in a dodgeball tournament. This leads to awkwardness between the two in the final round of the dodgeball tournament and they are forced to address their issues before the Intergalactic Dodgeball Council. They later agreed just to be friends. At the end of the episode "I Like You Hi", Mordecai asks CJ out and she agrees to go out with Mordecai. In the following episode, "Play Date", CJ and Mordecai plan to go out, but are interrupted by Death's 300-year-old son, Thomas. In the Season 5 finale "Real Date", Mordecai saves her life when the founder of Couple Corral McIntyre tries to get them to break up and they officially become a couple. In "Merry Christmas Mordecai", she sees Mordecai and Margaret accidentally kiss, and drives off very upset. In "Sad Sax", Mordecai tries to reconcile with her after receiving advice from "Sad Sax Guy", and they finally get back together. In the episode "1000th Chopper Flight Party", she screws up and ruins their relationship, and she and Mordecai break up in "Dumped at the Altar". In "Rigby's Graduation Day Special", CJ becomes a crossing guard at the School. She is not seen in the finale "A Regular Epic Final Battle", however she becomes a muse for Mordecai's art. Mr. Maellard Mr. Maellard (voiced by David Ogden Stiers) is an elderly lollipop man who owns The Park and is also Pops' adoptive father. He first appeared in the episode "Dizzy". Maellard is very impatient towards Benson (similar to Benson's impatience towards Mordecai and Rigby, and sometimes Muscle Man and Hi-Five Ghost) and Maellard blames Mordecai, Rigby, Muscle Man and Hi-Five Ghost's shenanigans on Benson (as he expects Benson to take responsibility for Mordecai, Rigby, Muscle Man and Hi-Five Ghost as park manager). He purposely mistakes Benson's name a lot in some of the episodes in which he appears (using "Ballbucket", "Beanbag", etc.). Maellard finally got Benson's name right (and started to respect him more as well) in the episode "Benson Be Gone" due to Benson's coming to his rescue when he was captured by Susan (a woman whom he had hired as the park manager after demoting Benson and is later revealed to be a demon) and also gave Benson his old job back. As the series progresses, he turns into quite an eccentric character. He sends the gang to space in the final season and in the episode "The Ice Tape", Pops and the gang find out that Maellard is not his real father but Maellard found him as baby and adopted him during an expedition and kept him safe until the time was right for Pops to fulfill his destiny but Maellard tells Pops that no matter what he always thought of him as his real son. In the series finale, when the park gang returns from space after a three-year absence, Mordecai notices Maellard staring up at the sky, shedding a tear for his son. At the 25th reunion of the Park, the gang erect a statue of him next to statue of Pops, indicating that he had since died. Audrey Audrey (voiced by Courtenay Taylor) is Benson's ex-girlfriend and neighbor who appears in "Weekend at Benson's", "Fortune Cookie", "The Christmas Special", and "Party Re-Pete". It is revealed in "The Real Thomas" that they broke up. Baby Ducks The Baby Ducks (voiced by J. G. Quintel, William Salyers, Sam Marin, Mark Hamill, and Roger Craig Smith) are a group of four ducks whom Mordecai and Rigby found in a fountain in the park in the episode "A Bunch of Baby Ducks". They have shown their ability to fuse together to form a giant, anthropomorphic, duck-like creature when they fist-pump simultaneously. They return in the episode "A Bunch of Full-Grown Geese" to help Mordecai and Rigby rid the park of the evil, titular geese who soon turn into a giant monster. The duo helped the baby ducks upgrade their giant form and succeeded in defeating the geese. They also appeared in "Exit 9B" where they helped fight the park worker's past villains in their giant form. Before their official debut, an unrelated group of baby ducks are some of the things sent to the moon by Rigby in the episode "The Power". In "Brilliant Century Duck Special", they again help the park gang fight the geese, who are now helping businessmen that are attempting to destroy the park. In the series finale, they help the Park gang fight Anti-Pops and Streaming. Guardians of Eternal Youth The Guardians of Eternal Youth (voiced by David Kaye, Robin Atkin Downes, Roger L. Jackson, J. G. Quintel, and Troy Baker) are a group of five infant-like beings for whom Skips must perform a ceremonial dance in order to maintain his immortality otherwise, he will be stripped of his eternal life. Skips also attended school with them before they granted him his immortality. They also designed and built Skips' Fists of Justice, which allowed him to defeat Klorgbane the Destroyer (their evil brother) in the episodes "Fists of Justice" and "Skips' Story" and they seem to like cake. Mordecai and Rigby found out about this and because they accidentally injured Skips, they took over and defeated Klorgbane (but not before he killed Archibald, one of the guardians), who vowed to return before he was sent flying away. They also appeared in "Exit 9B", where they help the park workers fight off their past villains. In the episode "Quips", the leader's name is revealed to be Reginald, and in "Skips' Story", the names of the other three guardians are revealed to be Oswald, Boswald, and Griswald. In Regular Show: The Movie, they participate in the fight against Mr. Ross and his timenado. In the final season finale, they help the park gang fight Anti-Pops and Streaming. Gary Gareth "Gary" (voiced by Robin Atkin Downes) is the King of Synthos who went to school with Skips and the Guardians of Eternal Youth. He works as a valet for the Guardians and also made an appearance in the episode "Cool Bikes" where he served as Mordecai and Rigby's lawyer. In "Gary's Synthesizer" it is revealed that he has an old synthesizer that keeps him alive, but if any of its cables come unplugged or are tampered with, he will disappear. Although king of his home planet Synthos, he left to travel the galaxy and his half-brother David took over. When Gary found out how strict David was as king of Synthos, he battled him in a music battle and won. David was destroyed in the sun and his disk was smashed by two Synthos people, Robert and Keith, who were nearly executed by David. Then Gary declared that from then on Synthos would have no ruler. In the final season finale, he helps the park gang fight Anti-Pops and Streaming. Death Death (voiced by Julian Holloway in a cockney accent) is a 6'5" grim reaper who, in several of his appearances, makes bets with park workers and declares that he would take their souls if they lose. For example, he tried to take the immortal life of Skips during his first appearance in the episode "Over The Top". He also tried to take Muscle Man's soul twice in the episodes "Dead at Eight" and "Last Meal" and even attempted to take everyone's souls in "Skips Strikes". Despite these evil intentions, he also helped the groundskeepers defeat the villains resurrected by GBF Jr. in the episode "Exit 9B". Death also has a son named Thomas, a 300-year-old demon (voiced by Michael Dorn) who can speak, although Death does not know this. He later helped them retrieve Mr. Maellard's guitar in "Guitar of Rock", and in "The End of Muscle Man" where the others think he's trying to take Muscle Man's soul, but was only there to deliver him a ring. He also makes an appearance in the episode "Cheer Up Pops" after the gang invites him to a party to help them cheer Pops up. In this episode, he said that they could count on him to help in the final battle. In the series finale, he helps the park gang fight Anti-Pops and Streaming. Don Donald "Don" (voiced by Julian Dean) is Rigby's younger brother. Introduced in the episode "Don", Don is better and more likeable than Rigby in most ways, though as a child he was trying to be as cool as Rigby, unknowingly causing Rigby to be extremely jealous. Don is also significantly taller than Rigby and loves to give hugs to other people. Don expresses this by asking his comrades for "sugar," which is customarily his catchphrase. At the end of the episode, the two reconcile as Rigby apologizes to Don on his jealousy towards him, while Don apologizes for not knowing of Rigby's annoyance towards him. Don returned in the episode "Bank Shot", where he helped Rigby practice for a bet he made with someone. Don makes a final appearance in the finale where he and his parents greet Rigby home after three years. Low Five Ghost Low Five Ghost (voiced by Roger Craig Smith) is a ghost who is Hi-Five Ghost's brother and works as a police officer. It was revealed that he once served a sentence in prison until his brother Hi-Five and Muscle Man bailed him out in "See You There". He also appeared in "The Postcard" to help his brother decipher the words from a busted up postcard in order to determine where Hi-Five promised to meet a girl named Celia many years ago. He later appeared to help Mordecai, Rigby, Hi-Five Ghost & Muscle Man get a car so they can get burritos with all kinds of meat. God of Basketball The God of Basketball (voiced by Carl Weathers) is a basketball/human hybrid who is also known as the Basketball Coach King. He apparently lives within the moon and rides in a custom designed white flying Cadillac Escalade. The God of Basketball then quickly befriends Mordecai and Rigby in "Slam Dunk" which leads him into offering them to learn how to play basketball well. When that does not go according to plan, he uses his powers to instantly grant both of them great basketball powers. The God of Basketball momentarily changes sides when he is forced to play with Muscle Man against the duo for computer rights for life. The God of Basketball also appeared when he helped Rigby to get back his hat, in the match of Rigby vs. a basketball net face-like weirdo in 'Bank Shot'. The God of Basketball later appears in "Exit 9B" as a protagonist Skips summons to help save The Park. Techmo Techmo (voiced by Steven Blum) was once a human named Sampson until he became a 6'6" technomancer cyborg. He first appeared in "Skips vs. Technology" to help Mordecai, Rigby, and Skips solve a computer error named Error 220 (little did Mordecai, Rigby and Skips know error 220 was a virus known as "Doom Ma Geddon"). Techmo eventually became possessed by Doom Ma Geddon, but the trio were able to defeat the virus and free Techmo by destroying the computer. In "Exit 9B", Techmo is among the characters that are summoned by Skips to help fight the resurrected villains. He also appears in "A Skips in Time", where he helps the past Skips return to his time in order to save the present Skips from dying. In Regular Show: The Movie, he participates in the fight against Mr. Ross and his timenado. He makes his final appearance in the finale to greet Skips. The Phone Guardians The Phone Guardians (voiced by Rich Fulcher and William Salyers) are five living objects (a fire in a wigwam, two tin cans connected by a string, an answering machine, a message in a bottle, and a chalkboard) who serve as protectors of phones and live in an empty universe. All members appear to lack the ability to understand emotion. They first appeared in "Butt Dial" where they threaten to erase Mordecai and Rigby from existence for hacking into Margaret's phone to erase an embarrassing message that Mordecai accidentally recorded, in which they chose to play it for Margaret at her request instead of erasing it for Mordecai. After listening to it, Margaret convinces them to release Mordecai and Rigby while saying that they've "learned their lesson." They also appeared in "I Like You Hi" where they help Mordecai admit his feelings to CJ. They are a reference of the C.O.P.S (Computer Obsolescence Prevention Society) from the Sam And Max series. Dr. Henry Dr. Henry (voiced by Armin Shimerman) is a lollipop man who serves as the park doctor. He first appeared in "Cool Cubed", where he told Mordecai and Rigby to go into Thomas' brain. Later in "Catching the Wave", he told Pops to try and stay away from surfing or else his big head would put too much strain on his neck. He later appears in "The End of Muscle Man" where he advises Muscle Man if he is in good condition to do his last activities as a bachelor. RGB2 RGB2 (voiced by Sam Marin) is a TV robot controlled by an old man from the inside. He first appeared in "That's My Television" where Mordecai and Rigby help him escape from the studio. He was the star of the sitcom, That's My Television. He is briefly seen in "The Thanksgiving Special" as a cook. His name was a reference to R2-D2, a famous character of the Star Wars cinematic franchise, mixed with the RGB color standard. The Sensei The Sensei (voiced by Sam Marin) is a red-haired, overachieving and obese man who used to teach Death-Kwon-Do. After Mordecai and Rigby stole his moves in "Death Punchies", he was forced to shut his dojo down. He re-appears in "Sandwich of Death" as the owner of Death-Kwon-Do Dojo Pizza and Subs and helps them retrieve the cure for Benson, who ate the Death Sandwich incorrectly. It is revealed that he had a falling out with his master, who tried to kill him when they tried to retrieve the cure. He returns in "Death Kwon Do-Livery" where Mordecai, Rigby, and his apprentice attempt to help him go through a surgery operation for his stomach as it had exploded due to his Death Kwon Do Sandwich of Health which is incredibly unhealthy but the apprentice turns on them due to how his master had treated him and that he had snuck in after working hours to eat it and thus he needs a replacement stomach. Despite his attempts to steal the stomach, the duo stop him and manage to save the sensei. Dr. Reuben Langer Dr. Reuben Langer (voiced by Troy Baker) was the new leader of the Dome project who first appeared in "The Button". After Mordecai, Rigby, and the gang froze the original leader Doctor Dome, the Space Tree sent Langer to continue the Dome project. He told the gang not to push the button yet because Langer and his crew are still working on the rockets. In the episode "Rigby's Graduation Day", he sent a fax to the gang to push the button to launch them into space for their mission: protect and train Pops against his long-lost evil brother, Anti-Pops. Chance Sureshot Chance Sureshot (voiced by Matthew Mercer) was one of Rawls' men working at the space station. Alongside Toothpick Sally and Recap Robot, he helps save the park from the Reaper Bots. His first appearance was in "Cool Bro Bots.” He was killed when he tried to stop Anti-Pops from killing Pops and the gang with a laser in “Space Escape.” He makes his final appearance in the finale where he helps the park gang fight Anti-Pops and Streaming. It is also revealed that Chance Sureshot has made multiple clones of himself whenever he dies in the finale. Toothpick Sally Toothpick Sally (voiced by Vanessa Marshall) is another one of Rawls' personnel, working alongside Chance Sureshot and Recap Robot. In the episode "The Space Race" Sally helps Mordecai and Rigby prepare for an annual race called the Interstation 5000 after the duo beat the high score for a spaceship simulator. She helps the gang fight Anti-Pops and Streaming in the finale. Recap Robot Recap Robot (voiced by Matthew Mercer) is a green robot usually seen with Sureshot and Sally, working at the Space Tree. He appears in the finale alongside Sureshot and Sally, participating in the battle against Anti-Pops and Streaming. Colonel Rawls Colonel Rawls (voiced by D. C. Douglas) is the leader of the Space Tree who first appeared in "Welcome to Space". After the Park gang was sent into space, Rawls ordered Sureshot and his Crew to find the gang. When the Gang arrived at the Space Tree, Rawls told them why Maellard and Langer sent them into space for a special mission. In the episode "Space Escape", Mordecai and Rigby told Rawls that Anti-Pops erased an employee from Comet Stop. Rawls ordered everyone to get out of the Space Tree and he managed to get Mordecai, Rigby, and the gang out of the hangar but he decided to stay at the Space Tree. Earl Regarding Earl (voiced by Feodor Chin) is the master of Pops who fist appeared in "The Ice Tape". After Maellard revealed to Pops that he wasn't his real father, he told Pops to find Earl since he's the one who can help Pops to fight his evil brother. After the tape melted, Earl revealed himself to the Gang. Later, in the episode "The Key to the Universe", Earl was testing Pops by making him do his chores. But when Pops had enough, Earl showed Pops a fragment from the previous Universe and also showed him the decision of Pops not fighting his Brother. Pops later ran away and hid from everyone but Mordecai and Rigby talked to him. After the gang talked to Pops, Earl threw a Lemon on Pops and he used his powers to squeeze the lemon, knowing that Pops used his powers, Earl knows that Pops was ready for his real training. During the episode "No Train No Gain", Earl senses that Anti-Pops erased a phone from existence and his powers were growing. Earl used a training montage with some of his favorite music to train Pops quickly. But when Mordecai and Rigby are tired with his music, They used their own music to speed up Pops's own training, but Earl told them that Pops goes to fast and goes out of control. The gang and Earl stopped Pops and Earl realized that Pops was ready to fight his brother. In "Kill'Em with Kindness", he is erased by Anti-Pops. In the final season finale, when both Pops and Anti-Pops died together and restoring everything in the universe that has been destroyed by their cause in balance, meaning that Earl is revived. The Seer The Seer (voiced by Yvette Nicole Brown) is the all-knowing person who first appeared in "Meet the Seer". She was mentioned by Earl in "Kill'em with Kindness", that she was the only one that will reveal the location of the final battle. She later meets the park gang in "Meet the Seer" and tells them that she knows all of their personalities before arriving on Planet Nielsen. After Reel to Reel and Black and White were killed by Streaming, she would later reveal the location of the final battle to Pops and the gang. She was killed when Planet Nielsen exploded. Father Time Father Time (voiced by Alan Sklar in "It's Time" and Fred Tatasciore in Regular Show: The Movie) is a large being made of clocks who wears a purple bowler's hat. He lives within an invisible house in the space-time continuum. In the episode "It's Time" Mordecai accidentally traveled to his dimension when he tried to destroy several clocks using a microwave oven out of jealousy due to Rigby's relationship with Margaret, unwittingly killing Rigby in the process. Father Time got upset with Mordecai because of his jealousy and attempting to destroy his clocks. Although Mordecai had to stay in his dimension as punishment, he instead sends him back in time on a "time pony" to restart the whole thing (as house guests annoy him) after accepting Mordecai's apology, but warns him that he'll be sorry if he ever does this again. He also appears in Regular Show: The Movie where he convinces Rigby to apologize to Mordecai for lying to him to restore their friendship. His body has also been falling apart due to Mr. Ross's time-nado, but after Mr. Ross's defeat, he is presumably returned to normal. Archie the Archivist/Laserdisc Guardian Archie (voiced by John Cygan) is a librarian and the protector of the remaining laserdisc player who can transform into the Laserdisc Guardian in the form of a golden crystal being. While in this form, he speaks in a language that only the Guardians of Obsolete Formats, DVD/HD-DVD, and Blu-Ray can understand. He first appears in "The Last Laserdisc Player". Mordecai, Rigby, Muscle Man, and Hi-Five Ghost came to his library to rent a laserdisc player, but he points out that they're all out and takes them to the basement to prove it. When they show him the laserdisc record that they found, he reveals that they are the Disc Masters and uses that record to open the door to a secret room where the last laserdisc player and the Guardians of Obsolete Format are in and entrusts the laserdisc player to them. During the fight against the Ancient Order of the VHS, he gets injured by the VC-Arbitrator and the Disc Masters transform him to his true form, who then defeats the VHS men and the VC-Arbitrator. He is then seen watching a movie on the laserdisc player with the Disc Masters and the Guardians. He also appears in "Format Wars II" where he again helps the Disc Masters find the universal remote, which reveals that Benson is the fifth Disc Master and joins the fight against his son, DVD and his creation: Internet. When he and DVD try to reconcile, Internet betrays DVD and kills Archie. He reappears as a ghost at the end of the episode, once again watching a movie with everyone else. DVD/HD-DVD DVD (voiced by Joel McHale as DVD and Trevor Devall as HD-DVD) is Archie's son who first appears in "Format Wars II". Like Archie, he can transform into a crystal being but unlike his father, his form's color is silver and his face is displayed, therefore allowing him to speak English in his crystal form. He creates a Wi-Fi Robot named Internet to seek revenge against his father. During the fight against the Guardians of Obsolete Formats, the Disc Masters (Mordecai, Rigby, Muscle Man, Hi-Five Ghost, and Benson), and Archie, they are able to kill Betamax, Ampex Quadruplex, and Floppy Disc, but when he and Archie try to reconcile, Internet betrays him and kills his father. DVD then decided to help the Disc Masters defeat Internet by providing them the universal remote's code to take out the Wi-Fi server tower that's powering him. Following the battle, he is seen watching a movie along with the Disc Masters, Reel-to-Reel, and Archie's ghost. He meets them again in "Meet the Seer" alongside his sister Blu-Ray where he is now upgraded to HD-DVD and helps them fight through Planet Nielsen against Streaming (who is Internet upgraded in a new form) and his minions to find the Seer and they escape before the planet's destruction. In "Cheer up Pops" they help the park gang record the memories of their past adventures so they can always remember them. In the eighth-season finale, they participate in the battle against Anti-Pops and Streaming. Blu-Ray Blu-Ray (voiced by Gillian Jacobs) is DVD/HD-DVD's sister who first appears in "Meet the Seer" where she and HD-DVD help the park gang fight through Planet Nielsen against Streaming (who is Internet upgraded into a new form) and his minions to find the Seer and they escape before the planet's destruction. Like Archie and DVD/HD-DVD, she can transform into a crystal being (which is colored blue) and like her brother, can speak English in this form as her face is displayed. In "Cheer up Pops" they help the park gang record the memories of their past adventures so they can always remember them. In the eighth-season finale, they participate in the battle against Anti-Pops and Streaming. Guardians of Obsolete Formats The Guardians of Obsolete Formats are seven giant beings with heads resembling outdated machines. Four of them first appeared in "The Last Laserdisc Player" where they are awakened by the Disc Masters (Mordecai, Rigby, Muscle Man, and Hi-Five Ghost) to protect the remaining laserdisc player. During the fight against the Ancient Order of the VHS, the guardian 8-Track is killed by the VC-Arbitrator. They (along with two others) return in "Format Wars II" where they help the Disc Masters find the universal remote (which also reveals that Benson is the fifth Disc Master) after finding out that the guardian Microfiche is killed by DVD. In the fight against DVD and Internet, Betamax, Floppy Disc, Ampex Quadruplex, ENIAC, and Archie are killed. The remaining two guardians: Reel-to Reel and Black and White meet them again in "Meet the Seer" where they help the park gang fight through Planet Nielsen until they are both killed by Streaming (who is Internet upgraded into a new form). Betamax Sony Betamax VCR (voiced by David Kaye) is one of the Guardians of Obsolete Formats whose head resembles a Sony Betamax VCR. He is killed by DVD. 8-Track Lear 8-Track Recorder (voiced by John Cygan) is one of the Guardians of Obsolete Formats whose head resembles a Lear 8-Track recorder. He is killed by the VC-Arbitrator. Floppy Disc IBM Floppy Disc Drive (voiced by Richard McGonagle) is one of the Guardians of Obsolete Formats whose head resembles an IBM floppy disc drive. He is killed by DVD. Reel-to-Reel CinemaScope Reel-to-Reel Projector (voiced by Richard McGonagle) is one of the Guardians of Obsolete Formats whose head resembles a CinemaScope reel-to-reel projector. He is killed by Streaming. Black and White Black and White TV (voiced by Fred Tatasciore) is one of the Guardians of Obsolete Formats whose head resembles a black and white TV. He is killed by Streaming. Ampex Quadruplex Ampex Quadruplex VTR (voiced by William Salyers) is one of the Guardians of Obsolete Formats whose head resembles an Ampex quadruplex VTR. He is killed by DVD. Microfiche NCR Microfiche Reader (voiced by David Kaye) is one of the Guardians of Obsolete Formats whose head resembles an NCR microfiche reader. He is killed by DVD. ENIAC ENIAC (voiced by David Kaye) is the first computer that was ever made and an ally of the Guardians of Obsolete Formats. He is accidentally killed before the fight against DVD and Internet. Microwave Microwave (voiced by Fred Tatasciore) is a doctor microwave oven who works on Planet Neilsen and is a close friend of the Guardians of Obsolete Formats. He sacrifices himself to help the park gang escape. White Elephant The White Elephant (voiced by Fred Tatasciore) is an anthropomorphic white elephant and guardian of the White Elephant Gift Exchange ceremony who appears in "White Elephant Gift Exchange". When the park gang attempts to pay Muscle Man back for his past pranks, they are teleported to the White Elephant's temple. He is unhappy with the park gang for wanting to get revenge on Muscle Man and violating the rules of the White Elephant Gift Exchange; which is to give gifts you don't like, not receive gifts you like, which makes it entertaining (since Muscle Man's pranks are his way of having a fun time). Because of this, they must stay in his temple for all eternity for going overboard with their revenge prank and are not allowed to open any of the gifts here. However, he does give them two options: go back and make amends, or open the gift box that he offers them. They choose to go back, but decide to carry out their revenge prank anyway when they find out that Muscle Man had pranked Rigby with what they thought was a new flatscreen T.V. but was actually a box of old Chinese food. At the end of the episode, the White Elephant watches through the snow globe in the gift box that he offered to the park gang earlier, who then winks at the audience and leaves. This implies that he may have been aware of Muscle Man's prank and orchestrated the whole thing to ensure that the park gang's payback prank succeeds. Buttonwillow McButtonwillow Buttonwillow McButtonwillow (voiced by Armin Shimerman) is an old man who appeared in "The Best VHS in the World". After he steals the tape that Mordecai and Rigby need to return, they follow him to his hideout. After some convincing, he agrees to help them return the tape in exchange for being allowed to rent it again. In the end, he receives his own rental card and uses it to rent the tape. Johnny Crasher Johnny Crasher (voiced by Bobcat Goldthwait) is a stuntman and teacher who appeared in "The Heart of a Stuntman". When Mordecai, Rigby, Muscle Man and Hi-Five Ghost went to the stunt class, they meet him. He teaches them how to stunt, then he challenges and completes the stunt challenge to go to Timmy's birthday. He appears in an online game "Daredevil Danger", as the master of the stunt class. Guardian of Lolliland The Guardian of Lolliland (voiced by Christine Baranski) is a giant living statue who appears in the eighth-season finale. She helps the park gang fight Anti-Pops and Streaming, even though she isn't supposed to take part in the battle. Carter and Briggs Carter (voiced by Steven Blum) and Briggs (voiced by Roger Craig Smith) are two movie stars who play as cops. In their first appearance, they arrange a donut contest and the winner will get to be on their next show. Mordecai and Rigby manage to win the contest after facing against two persistent competitors in a deadly void. They made cameo appearances in a few episodes. In "Brilliant Century Duck Special", they help the park gang and the Baby Ducks fight the geese, who are working for businessmen that are trying to tear down the park. In the eighth-season finale, they help the park gang fight Anti-Pops and Streaming. Pam Pam Dunwoody (voiced by Ali Hillis) is one of the dome workers that Benson falls in love with during the dome experiment. It didn't seem like she was interested but it is revealed she reciprocated this and they went out on a couple of dates. When the park got sent into space, she considered ending their relationship since she couldn't handle a long-distance relationship. After the park returns, they got back together and presumably got married in the years to come. Applesauce Applesauce (voiced by Jeff Bennett) is Benson's pet pig who appeared in "Benson's Pig". His real name is later revealed to be Leroy with a tattoo on it right arm, it is also revealed that he used to work with his partner Harry Roughauser, who also has tattoo on the left that forms a skull when they put their arms together. Leroy was the brain and Harry was the brawn of the team until he left him when he told him he was a loose canon but decided to come back to rescue his partner from jail after getting his partners call. When that escape plan was succeeded, Harry tried to convince Leroy to leave and commit crimes again but he refuses saying he wants to stay as Benson's pet pig and agrees. He later returns in the season eight finale where's he is the only character who greets Benson after three years. Del Hanlon Del Hanlon (voiced by Rich Sommer) is Margaret's fake boyfriend and Chopper 6 Weekend Sports TV Anchor who first appeared in "1000th Chopper Flight Party". Party Horse 42699 Party Horse 42699 (voiced by Adam Pally) is an extraterrestrial horse who lives to party. After escaping to Earth to avoid a test and befriending Mordecai and Rigby, he slacks off with them until his principal arrives and threatens to destroy the Earth if he doesn't pass the test; however, Party Horse instead tricks him into stopping Earth's destruction. He later returns to Earth to get the duo's help to get back with his girlfriend. In the eighth-season finale, he helps the park gang fight Anti-Pops and Streaming. Lemon Chef The Lemon Chef is a video game character with a lemon for a head. He appears in "Just Set Up the Chairs", where he is summoned by Mordecai, Rigby, and Skips to fight the Destroyer of Worlds. He returns in "Exit 9B" where he again fights the revived Destroyer of Worlds and wins. Guardian of the Friend Zone The Guardian of the Friend Zone (voiced by Wayne Knight) is a talking asteroid who appears in "Meteor Moves". He became like this in the first place because he lost his chances with his previous girlfriends. He traps Mordecai and Margaret in the Friend Zone because of Mordecai missing many opportunities to kiss Margaret due to him constantly doubting himself and did not want to see Mordecai end up the same way that he did. Afterwards, he helps convince Mordecai to finally kiss Margaret and he gives him another chance. Villains Anti-Pops/Malum Kranus Anti-Pops (voiced by Robert Englund) is an evil and powerful version of Pops with the ability to erase a person or anything from existence, including an armada of bounty hunters. He was first introduced the Season 8 episode "The Dream Warrior", where he sent a nightmare alien to go inside Pops' dream and question him about his location. In "The Ice Tape" it is revealed that he is in fact the evil twin brother of Pops and that he must kill him to ensure the destruction of the universe. In the episode "Kill 'Em with Kindness" Pops tries to settles things peacefully with Malum Kranus but fails as he shows no mercy towards Pops. After he follows them to Pops' home planet, and engages Pops in an epic battle while his henchmen fight the park gang. Pops attempts to ends thing peacefully, but with little success. Streaming (who still has a score to settle with the Disc Masters) also arrives to aid him in the fight against Pops and the park workers. In the end, the brothers are killed when Pops sacrifices himself by flying them both into the sun, with Malum Kranus showing some form of emotion before his destruction. Garrett Bobby Ferguson Garrett Bobby Ferguson Sr. (GBF Sr.) (voiced by Sam Marin) is a giant floating head from outer space who is based on the video gamer Billy Mitchell. He first appeared in the episode "High Score" and at one point was the universal record holder for an arcade game called "Broken Bonez" before exploded in a fit of rage when Mordecai and Rigby beat his high score. He is basically one of Mordecai and Rigby's most formidable enemies and really hates them. He is a very good liar, as seen in "High Score", saying that he devoted his life to the game "Broken Bonez" and that he played it too much his wife left him, but when Mordecai and Rigby intentionally lose the game so GBF can win, he says, "Thank you. Ha, ha, ha. Thank you for being so dumb", revealing that he didn't devote his whole life to the game, saying that it was just a hobby and he never had a wife. Mordecai and Rigby along with a crowd of people make him lose by chanting the words "broken bones", and he gives in. The game kept going and GBF desperately tried to sabotage them by trying to get them away from the game, but fails and has his fit of rage. His head blows up, with brain goo coming out. Contrary to his statement about not having a wife, it was revealed in the episode "Exit 9B" that he had a son who attempted to bring back his father along with other deceased villains to have their revenge, yet the park workers and their allies managed to send Garrett Bobby Ferguson and the other villains back into the afterlife, taking his son with him. GBF makes a cameo as a pixelated sprite in "Expert or Liar" after Rigby makes it to the final question in the game show Expert or Liar. When Rigby wins the show, he punches the show's host, Bert Coleman, into the GBF clone's mouth, which kills the host after the GBF clone explodes. GBF appears in the online game "Dimensional Drift", once again as the main villain. A lawsuit was filed by Billy Mitchell in 2015. Both Cartoon Network and Regular Show were named in the lawsuit, but it was ultimately thrown out. Gene Gene (voiced by Kurtwood Smith) is Benson's rival who appears to be a green vending machine. He is in charge of a nearby park named East Pines. Gene's first appearance is in the episode "Prankless", which details two separate prank wars to destroy Benson's park for reasons never explained, both of which were thwarted by Muscle Man. He makes a reappearance in the half-hour special "The Christmas Special", but as a protagonist, helping Benson out willingly due to his own love of the holiday of Christmas and it is also revealed that he has a family. He also makes a cameo appearance in the episode "Dodge This", in which he and his workers are a team and compete against Benson's dodgeball team ("Benson's Ballers"). He made another appearance in "Thomas Fights Back" where he steals the park's statue, but the park gang managed to take back the statue with Thomas' help. Gene makes additional appearances in the episodes "Park Managers Lunch", "The Parkie Awards", and "Chili Cook-Off". Susan Susan (voiced by April Stewart) was a park manager who appeared in "Benson Be Gone". She replaces Benson after being fired by Mr. Mallard, but is later revealed to be a demon. When she got angry at the employees, she turned into a giant and was killed by a hobo named Leon who was a former park manager. She returns in "Exit 9B" as one of the many villains that GBF Jr. revives, but only appears as her giant counterpart and fought against the baby ducks in their giant form. Susan is defeated by the duck giant in their encounter. Chong Chong (voiced by Sam Marin) is the antagonist in "Stick Hockey". He is Benson's nemesis since he chopped the head of Benson's apprentice, Dave, ten years ago. Whenever somebody lost to him, he would chop off their heads or other body parts. In the end, he lost to Benson. He later makes a cameo in "The Thanksgiving Special". Chong also appears in an online game "Fist Punch 2" as the boss. Capicola Gang The Capicola Gang is a trio of evil anthropomorphic animatronic animals from The Fun Fun Zone, a place that became corrupted after the Park workers won a pair of fuzzy dice (which, unknown to them, had uncut diamonds in them) for Pops' birthday in the episode "Fuzzy Dice". The Capicola gang attempted to escape with the dice after they took them from the park workers, which leads to a car chase to the harbor. After Louie exposes their crime (to the Leader Bear's annoyance), they attempted to kill them to take back the dice only for them to be destroyed by the FBI. It took a lot of firepower to bring them down. They reappear in the episode "Steak Me Amadeus", in which it is revealed that they survived the confrontation and plotted revenge on the park workers for foiling their evil crime and sold fake Amadeus Dollars to Pops, which Mordecai used to pay for a date with Margaret at the titular restaurant. They appear at the same restaurant and are confronted by the park gang and two FBI agents for selling the fake Amadeus Dollars, beginning a gun battle between them against the groundskeepers and the agents (which they temporarily stop to let a tearful Margaret pass through) until Amadeus Martinez, the restaurant's owner, shoots a Bazooka at them, finally destroying them for good. They share a resemblance to the characters from the popular game series Five Nights at Freddy's and the popular kids entertainment center Chuck E. Cheese. Capicola Gang Leader The Capicola Gang Leader (voiced by John Cygan) is an unnamed robot bear who is the leader of the Capicola Gang. He was severely damaged after the FBI shot him down after a lot of firepower. He was destroyed by Amadeus in "Steak Me Amadeus" with a bazooka after he insults college education. Louie Louie (voiced by Mark Hamill) is a robot beaver who is a member of the Capicola Gang, and is the only member to have a name. He was destroyed by Amadeus in "Steak Me Amadeus" with a bazooka. Duck The Duck (voiced by Dawnn Lewis) is an unnamed robot duck who is a member of the Capicola Gang. She was destroyed by Amadeus in "Steak Me Amadeus" with a bazooka. Klorgbane the Destroyer Klorgbane the Destroyer (voiced by Troy Baker) is Skips' main rival who has appeared in "Fists of Justice" and later "Skips' Story" in a memory of Skips which happened chronologically before "Fists of Justice". He went to school with Skips (under his name Walks) and was the Guardians of Eternal Youth's evil brother. When Walks decided to defeat him, the Guardians and Gary made the Fists of Justice, immortal gauntlets powerful enough to defeat Klorgbane. In their first fight, Klorgbane killed Mona, Walks' girlfriend. He returned in "Fists of Justice" and was defeated by Mordecai and Rigby because Skips was injured. During the fight, one of the guardians, Archibald, was killed. Klorgbane also appears as a boss and enemy of the online games "Cupcakes of Doom", "Dance of Doom" and "Fist Punch 2". Death Bear The Death Bear is a bear who wears a pickelhaube and a red cape around his neck. He is the villain in the episode "Death Bear." 15 to 20 years prior of the episode, he was a regular bear living in the Park Zoo. One day, he attacked and killed his trainer. The zoo was forced to close down, but Death Bear would not leave. He roamed around the zoo, growing more evil over the years, and surviving by breaking into people's homes and eating them and their food. After Mordecai, Rigby, Margaret, and Eileen encounter him, he chases them back to the house where they call Animal Control to help subdue him. Despite overwhelming the soldiers, he was eventually tranquilized by Mordecai and taken away at the end of the episode. Death Bear also appears in an online game "Fist Punch 2" as an enemy. Rich Steve Rich Steve (voiced by Travis Willingham) is a greedy, selfish, arrogant and wealthy evil businessman who wants everything he wants by taking them forcefully, and is the main villain of "Benson's Suit". He came to a tailor's suit shop for a deal of the combat suit they need in exchange of above $10. Apparently, Rich tricked the tailor because he didn't promised to pay the suit maker above $10, thus the tailor refused to give the suit until he had a money above $10. However, Rich forcefully takes the suit by sacrificing his own man to kill the tailor and commit suicide themselves, but only the suit lives and manage to escape from Rich. Sometime later, they found out that the suit is now worn by Benson and wants him to give up the suit. However, Benson refused because he had no heart to care for the suit. Even though he brought his army to kill Benson, Benson and the suit's bonds are too powerful and Rich ended up killing himself. Huge Head Huge Head (voiced by Robin Atkin Downes) is a lollipop man like Pops, except he is younger, has stubbly hair, and has a much bigger head. He is a villain who first appears in "Really Real Wrestling". On his way to the City Arena Center, Huge Head is run over by Pops's flying car, and then Pops unintentionally steals his place for a pro-wrestling bout. For doing so, Huge Head plans to steal Pops's identity as revenge. He eventually returned in the episode "Men in Uniform" where it is revealed that he has been stalking and plotting revenge against Pops for the last four years. However his "plotting" mostly consisted of him hiding in the bushes while saying "Wait! Not yet...". Eventually he would finally get his chance to attack Pops when an Ugly Hole was formed from some hideous uniforms merging. However, when he attacked Pops, he soon realized that he was being sucked into the hole as well for being so hideous, but planned to drag Pops along with him. Luckily, he was stopped by Muscle Man who was also being sucked into the hole, but instead hit Huge Head, which sent him into the Ugly Hole. However, his head was too big and ended up getting stuck between dimensions, leaving him as a large floating head floating in midair. Fortunately for Huge Head and the park, this proved to be quite beneficial for both of them as his freaky appearance drew in much attention to the park and to Huge Head as well, who was driven to joyful tears upon finally getting the fame and attention he so dearly desired. He is seen again in the episode "The Key to the Universe", but is already dead as his head is now a skeleton and is still floating in midair. Garrett Bobby Ferguson Jr. Garrett Bobby Ferguson Jr. (Voiced by Roger Craig Smith) is the main villain in "Exit 9B". He is the son of video gamer Garrett Bobby Ferguson, posing as a Contractor to turn the Park into a highway for the purpose of invoking a summon spell to bring his father and dozens of other villains, most of them killed by Mordecai and Rigby, back from the afterlife. He is first seen attacking the park gang (except Mordecai and Rigby, who both escaped through a time machine) with a stun gun that brainwashes its targets. Luckily, the groundskeepers all get their memory back and reunite thanks to Mordecai and Rigby. When his henchmen capture the park workers, GBF Jr. and the resurrected villains prepare to take revenge by killing them. However, Skips summons the Guardians of Eternal Youth and other friends, who free them, and a battle begins. With the help of their allies, the park workers are able to defeat their revived enemies. After the remaining villains are sent back through portal they emerge from, GBF Jr. self-destructs in the same way his father did after being shunned by him. Natalia Natalia "Natalie" (voiced by Laura Bailey) is the main antagonist of "The Real Thomas" and a Russian agent like Thomas (whom she calls by his real name, Nikolai). Under the alias of a preschool teacher named Natalie, she dates Benson when her group have begun the final phase of their plan. However, to Thomas' shock, Natalia reveals their goal to destroy the park and intended to have park gang killed. But Thomas helps his friends save the park while Natalia is assumed dead after being swallowed by a whale after being knocked from the helicopter to the ocean below. Jackie Carmichael Jackie Carmichael (voiced by Jennifer Hale) is a lady cyborg from the future (resembling a T-1000) who disguises as a sweet young lady. She first appeared in "1000th Chopper Flight Party" when she was trying to convince Frank (Margaret's father) to place her as his best person. She later appeared in "Local News Legend" as a news woman working in Frank's news company. Her true identity was eventually revealed to Margaret, battling to see who gets a free weekly statement. Although her physical body was destroyed by a bullet, her virus continued progressing at the end of the episode. Despite this, she is not seen again in later episodes. Internet/Streaming Internet (voiced by Roger Craig Smith as Internet and Keith David as Streaming) is a Wi-Fi computer robot created by DVD to seek revenge against his father. After they kill Betamax, Ampex Quadruplex, and Floppy Disc, Internet betrays DVD and kills his father when they try to reconcile, deeming both Laserdisc and DVD obsolete and declaring streaming, P.C.s, laptops, and tablets to be the future. Using the universal remote, the Disc Masters were able to defeat Internet by directing everyone on the battlefield to target the Wi-Fi server tower that's powering him, shutting him down. However, Internet survives and vows to return, planning to make streaming the future. When the park gang travel to Planet Nielsen to find the Seer, they discover it is under Internet's control (who is now upgraded to Streaming and now has a more powerful form) and they fight their way through Nielsen against Streaming and his stream box bots with the help from HD-DVD, Blu-Ray, Reel-to-Reel, and Black-and-White. Although the park gang, HD-DVD, and Blu-Ray manage to escape, Reel-to-Reel and Black-and-White are killed by Streaming. In the final season finale, he and the stream box bots assist Anti-Pops and his henchmen in the fight between Pops and the park gang and upgrades himself to a more powerful form with the help of his minions, but is defeated by the combined forces of the park gang, Guardians of Eternal Youth, Party Horse, HD-DVD, Blu-ray, Baby Ducks, Carter and Briggs, Gary, Death, and the Guardian of Lolliland. Stream Box Bots The Stream Box Bots are robots that resemble stream boxes and are Streaming's troops. In "Meet the Seer", when the park gang travel to Planet Neilson, they encounter some of the robot, who become hostile upon recognizing the Disc Masters. They continue to attack the park gang, Reel-to-Reel, Black-and-White, HD-DVD, and Blu-ray until Streaming joins the fight. They and Streaming join Anti-Pops in the fight between Pops and the park gang where they fuse with Streaming and upgrade him to a much stronger form. Ancient Order of the VHS The Ancient Order of the VHS is an evil organization whose goal is to destroy all laserdiscs and laserdisc players in the world to prevent them from interfering with their products. Following their reign of terror, only one laserdisc and laserdisc player survived. After discovering the remaining laserdisc, Mordecai, Rigby, Muscle Man, and Hi-Five Ghost (later revealed to be the four Disc Masters) encounter SP and LP, the leaders of the VHS and try to get them to watch VHS instead of laserdisc but are ignored. They later reveal themselves to the Disc Masters, Archie, and the Guardians of Obsolete Formats after the Disc Masters have obtained the last laserdisc player. A battle begins between the Disc Masters and the Guardians against the Order for the remaining laserdisc player, with the Guardians having the upper hand until the VC-Arbitrator arrives and overpowers them, killing the guardian 8-Track in the process. The Disc Masters transform Archie into the Laserdisc Guardian who takes out the Order and the VC-Arbitrator. SP and LP SP and LP (Voiced By Steve Blum and Richard Doyle) are the leaders of the Ancient Order of the VHS. They are killed by the Laserdisc Guardian. VC-Arbitrator The VC-Arbitrator (voiced by Steven Blum) is VHS player-headed robot created by the Ancient Order of the VHS to help destroy the last laserdisc player. After it kills 8-track, it is destroyed by the Laserdisc Guardian. David David (voiced by Troy Baker) is Gary's half brother who took over Synthos after Gary's disappearance and forbids anything challenging. After Mordecai and Rigby foolishly tamper with Gary's synthesizer, they and Skips are sent to Synthos to repair it. David, refusing to let them revive his half brother, attempts to rocket them into the sun, but they escape with the help of Gary's synthesizer. Skips holds off David long enough for Mordecai and Rigby to revive Gary, who challenges David to a battle that ends with David being flown into the sun, while his disc was destroyed by two people who hated him to prevent his reconstruction. Richard Buckner Richard Buckner (voiced by J. G. Quintel) is a parody of then-businessman and future U.S. President Donald Trump. Aside from being a rich businessman, he had a main purpose in life: to have Thanksgiving all by himself. In "The Thanksgiving Special", Richard wanted to win the prized turducken from the Thanksgiving Song Contest, so he entered the contest with a song he paid a lot of people to sing (although most of them weren't even musicians): "Chewing On Freedom". Just as he was about to win the turducken, to his dismay, Mordecai and Rigby came in with their own Thanksgiving song: "What Are You Thankful For?". Richard was so disappointed that their song was better than his own, so he decided to steal the turducken from them since Farmer Jimmy wouldn't let him buy it. When Mordecai and Rigby caught up to him, he revealed that he didn't want to win the turducken so he could eat it, he wanted the golden wishbone from inside it, due to the fact that it actually grants wishes. He hired thousands of people to help him with his business, but no-one ever thanked him in return because they spent time with their families. So he planned to use the golden wishbone to have Thanksgiving to himself, and receive the thanks that he always wanted. Mordecai and Rigby wouldn't let him get away with it, so there was a quarrel between the three (with help from their friends) on Richard's blimp until they are kicked out of the blimp by Richard, who didn't know they had swapped the wishbone with the spoons Rigby used for their performance. Richard realized he had been tricked, and he was killed when his blimp was destroyed after it crashed into a bridge. The duo then use the wishbone to return to the park safely. The F.E. (Chuck) Chuck "the F.E." (Iron Stomach) (voiced by Roger Craig Smith) was the main antagonist in "Weekend at Benson's". He is Audrey's ex-boyfriend and the creator of the Mississippi Queen, a spicy cocktail drink, which he made Benson drink. Geese The Geese (voiced by Fred Tatasciore and Steven Blum) are the villains in "A Bunch of Full Grown Geese". After Mordecai and Rigby unsuccessfully try to get rid of them, they call the baby ducks to help them and they fight in their giant forms. Mordecai, Rigby, and the baby ducks successfully defeat the geese, who swear revenge before their destruction. They return in "Brilliant Century Duck Special" (apparently revived somehow) where they are hired by businessmen to destroy the park for a toy company. The park gang and baby ducks engage them in a space battle. Despite help from their allies, the geese overpower them, but when they learn they are assigned to play as the bad guys (which they did not like), they turn on their bosses and help the park gang defeat the businessmen. Afterwards, the baby ducks and geese formed a truce. KILITDJ3000 KILITDJ3000 (voiced by Courtenay Taylor) is an evil supercomputer who controls the KILIT radio station and appears in "K.I.L.I.T. Radio". After being activated, it turns rogue and forces everyone out except Donny G, who is forced to work as a janitor. When Muscle Man tries to get the song he wrote for Starla on the radio, the computer wouldn't let him do so, as playing the tape will activate its self-destruct program. He, Mordecai, and Rigby are able to convince Donny G to help stop the computer, but it soon discovers what they are up to. Despite its attempts to stop them (wounding Donny G in the process), it is defeated when Donny G plays Muscle Man's tape and causing the radio station to explode while the trio escape (although Donny G had somehow survived it). Sacred Animals The Sacred Animals (voiced by Fred Tatasciore) are spirit animals who reside in a sacred ground in the mountains and appear in "Blind Trust". After Benson angers them, he, Mordecai, and Rigby are forced to run from them, relying on each other's trust until they are forced to make a risky jump from a high cliff to escape from the leader. Moose Moose (voiced by Fred Tatasciore) is the leader of the sacred animals. After Benson angers him and the other sacred animals, he attempts to kill them for trespassing. The trio manage to escape from him by trusting one other and jumping from a high cliff. Impressed by how much they trust each other, he decides to let them go if they manage to survive the fall (in which they do). Peeps Peeps (voiced by Richard McGonagle) is a giant floating eyeball who apparently runs the surveillance company that's named after him. Benson bought his products to keep Mordecai and Rigby from slacking off, but they manage to constantly evade him, causing Benson to accidentally summon him to the park to watch over everybody and as a result, he cannot leave until they die (due to the contract that Benson signed without even reading it). After spooking everyone with his gazes, Mordecai challenges him to a staring contest in which Peeps must leave if Mordecai wins, but if Peeps wins, he will harvest their eyes. However, Peeps cheats using numerous eyes but Rigby cheats back using a laser light that causes him to lose the staring contest, setting him on fire and crashing into the lake. He is blinded in the process, and is last seen taken to the hospital. Hot Dogs The Hot Dogs (voiced by Tim Curry, J. G. Quintel, Sam Marin, Mark Hamill, and William Salyers) are the main villains of "Meat your Maker". After Mordecai and Rigby ruin the hot dogs Benson bought for the barbecue, they encounter them in the freezer, who reveal their desire to be eaten but they soon reveal their true intentions, which is to eat the park gang and avenge their relatives. After trapping everyone but Rigby in a giant plastic bag with barbecue sauce, they try to do the same to Rigby, but he discovers that they can't resist eating one another when covered in mustard and uses this opportunity to defeat them. They are among the villains revived in "Exit 9B". The Hammer The Hammer (voiced by Sam Marin) is a video game boss and the villain in "Rage Against the TV". He comes to life when the park gang are about to witness Mordecai and Rigby beat him in the video game. They proved to be no match for him until Mordecai remembers that his weakness is furniture, which they then attack him with any household object they can find until the video game comes back on and Mordecai and Rigby succeed in defeating him in the game. He is one of the villains resurrected by GBF Jr. in "Exit 9B". Blonde Men The blonde men (leader is voiced by Mark Hamill, the rest are voiced by William Salyers and Roger Craig Smith) are a secret cult of identical men with blonde hair, some of which wear rings that fire lasers. They are the main villains in "Bet to Be Blonde". When Mordecai and Rigby are playing video games, they make a bet that whoever loses the next game has to wear his respective game character's haircut for a week. Rigby cheats to win, but later regrets it and feels ashamed when Mordecai (wearing a blonde wig) makes friends with blonde men and joins the group, who take Rigby hostage and force him to be turned into a blonde in the end. At that point, Rigby confesses to cheating on the bet to Mordecai, who frees him. Mordecai then reveals his wig to the blondes, which prompts them to attempt to kill the two. As Mordecai and Rigby escape, Mordecai sets his ring to self-destruct before the two evacuate the building, killing the blondes in the explosion. The blonde men were among the resurrected villains in "Exit 9B"; eventually, those who survived the battle were sent back to the portal. The blondes also appear in the online game "Fist Punch", where their leader serves as a boss. Destroyer of Worlds The Destroyer of Worlds (voiced by Mark Hamill) is a digital devil-head villain who appears in "Just Set Up the Chairs". He is released from a video game after Mordecai and Rigby defy Skips' warning and proceeds to wreak havoc until the trio summon the Lemon Chef to combat him, which ends with the Lemon Chef winning the battle. He is one of the villains revived in "Exit 9B", in which he fights the Lemon Chef for a second time, only to be destroyed again. He appears in the online games "Just a Regular Game" and "Fist Punch 2" as an enemy and boss. Zombies The Zombies made their first appearance in "Grave Sights". During a movie night in a cemetery hosted by the Park, when the movie tape is knocked out by accident, Rigby obliviously puts it in backwards, damaging the tape and somehow awakening the dead from the nearby graves, who attempt to attack the audience. Using Muscle Man's sports equipment, Mordecai, Rigby, Muscle Man, Hi-Five Ghost, and Skips stop the zombies. When a strong, muscular zombie named Howard "Hellion" Fightington is revived, Mordecai and Rigby kill him by driving the cart into him. Howard Fightington and the other zombies appear again in "Exit 9B", as one of the resurrected villains. They also re-appear in the online game "Nightmare-athon". Carlocks The Carlocks (voiced by Mark Hamill, Roger Craig Smith, William Salyers and J. G. Quintel) are the villains that appeared in "Journey to the Bottom of the Crash Pit". They are the first and the last of the mighty underground race. When Mordecai, Rigby, Muscle Man and Hi-Five Ghost travel to their cave in search for a video camera, they find it in possession of the Carlocks, who refuse to give it back, forcing them to steal it an escape in a worn-out car. The Carlocks give chase to try and get the camera back, but the four manage to escape the hole. Skips' truck then dumped dirt into the hole, killing them for good. The Carlocks are based on the Morlocks from H. G. Wells' novel, "The Time Machine". Their appearance is based on the Morlocks seen in the 1960 George Pal Film of the same name. The Carlocks also appear in the online game "Fist Punch 2" as enemies. Were-Skunk The Were Skunk (voiced by Paul F. Tompkins) is a mythical creature (parody of werewolf) and the villain in "Skunked", where he sprayed Rigby. As Rigby began a slow evolution into a Were-Skunk himself, he hunted down the skunk in exchange for learning how to stop the process. The skunk however, does not tell Rigby the truth, as he wants Rigby to suffer the same fate that he has. After a brief fight breaks out between the two, Mordecai, who has learned that tomato paste can stop the process, intervenes and blasts both Rigby and the skunk with a can of tomato paste, which turns them both back to normal. The skunk is revealed in his true form to be a normal man, who thanks Mordecai and Rigby for helping him return to normal, before passing out. Night Owl The Night Owl (voiced by Roger Craig Smith) is the villain in "Night Owl". He starts up a contest that Mordecai, Rigby, Muscle Man, and Hi-Five Ghost compete in with the desire to make a fortune. When the four are the only ones left in the contest, he turns them against on another and freezes them in ice until they thaw out in the future. Realizing what had happened, they use the prize car to escape while fighting Night Owl's henchmen, who attempt to get them back in their glass case. When attempting to escape to the past using a time machine, the Night Owl (who is now a head inside an owl robot which kept him alive for many years) tries to stop them but fails, allowing them to get to the past and stop him from starting the contest. The robot version of Night Owl returns in "Exit 9B" as one of the villains resurrected by GBF Jr., only to be sent back to the portal of afterlife. The human version later makes a cameo in "The Thanksgiving Special". In the online game "Fist Punch", and the robot is the final boss. He is also a boss in its sequel, "Fist Punch 2". The Urge The Urge (voiced by Roger Craig Smith) is the lead singer of a band and the main villain in "Trash Boat". He became famous by changing his name to "The Urge", inspiring Rigby to legally change his name to "Trash Boat". The Urge later travels back in time to kill Rigby for making him lose his fame after he changed his name. "Trash Boat" escapes with Mordecai and heads to the courthouse, where he officially changes his name back to "Rigby". When everything is back to normal, the Urge does not try to kill Rigby anymore. Just then, a portal opens up, revealing another rock star who kills the Urge for the same reason the Urge wanted to kill Rigby, followed by many others. The Urge appears again in "Exit 9B" as one of the resurrected villains. Zingos The Zingos (voiced by William Salyers, Sam Marin and Armin Shimerman) are the trio of giant two-legged hot chicken wing creatures who live in the Inferno, and are the villains in "Bachelor Party! Zingo!!". When Skips enters a hot wing eating contest, he nearly eats them all until there are only three wings left, and falls into a subconscious state. He finds himself in the Inferno when he opens his eyes, where he encounters the Zingos and defeats them. Skips then wakes up eating the final wing while being cooled by lemonade. Master Prank Caller The Master Prank Caller (voiced by Tim Curry and Sam Marin) is a giant living phone with arms and legs and the villain in "Prank Callers". When Mordecai and Rigby try to prank call him, they are transported to the past along with the rest of the park gang. Eventually, they come up with a plan to prank him back and shut him down, opening a portal that leads back to the present. He then reveals himself to be an old man in disguise who just wanted to be a brilliant prank caller and asks to go with them. He is last seen making a prank call to Benson with Mordecai and Rigby. He is one of the villains revived in "Exit 9B", despite that he later befriended Mordecai and Rigby and that he was never shown to have died. Huggstables The Huggstables (voiced by Amber Hood and J. G. Quintel) are the small pink creatures who love to give (almost fatal) hugs, which makes the people they hug explode into glitter. They are the villains in "Sleep Fighter". After being forced to watch eight seasons of Huggstable cartoons while babysitting Starla's sister's daughter, Muscle Man had nightmares about them that lead him to constantly attack his friends while sleeping. They come up with a plan to extract the creatures from his dream using a dream catcher, but because of the overwhelming number of huggstables, they are unwillingly brought into the real world. After defeating them all with dream catchers, the mother hugstable appears, but they manage to defeat it using a large dream catcher under Skips' van. Bodybuilder The Bodybuilder (voiced by Jeff Bennett) is the villain in "Rigby's Body". His body quit on him due to him over-stressing it and attempts to take Rigby's body for himself, forcing Rigby and the park gang to chase him down. While he and Rigby fight over Rigby's body, he manages to overpower Rigby only to accidentally make Mordecai crash into him, sending him flying into a slide. Doug McFarland Doug McFarland (voiced by Andrew Kishino) is the main villain in "World's Best Boss". When the park gang found the package was delivered, they meet Doug McFarland who refuses to give them the mug. He calls his staff crew and a battle ensues. Benson arrives and tells Doug to stop the fighting, to no avail. Benson then helps the park gang defeat the staff crew, and punches Doug, who falls inside the delivery truck, his head hitting the gas pedal, causing it to drive off of a hill and crash into a semi-truck, killing him for good. Warden of the Internet The Warden of the Internet (voiced by Mitzi McCall) is the villain in "Go Viral". She dislikes people making pop videos and imprisons them for all eternity in a digital prison. When Mordecai, Rigby, and Pops are brought to her dimension to be imprisoned, they evade her and free the prisoners while on the run from the warden. When they are about to escape, she manages to catch them but is stopped by Wedgie Ninja, who sacrifices himself to destroy her. Manslaughter and Bloodshed Manslaughter and Bloodshed (voiced by Julian Holloway and Sam Marin) are the punks and villains that appeared in "Cruisin'". Manslaughter and Bloodshed also appeared in "Fist Punch 2" as first enemies. Unicorns The Unicorns (voiced by Sam Marin, J. G. Quintel, Mark Hamill, and S. Scott Bullock) are the villains in "The Unicorns Have Got to Go". Mordecai and Rigby befriend them at Margaret's cafe, but end up causing trouble for them and the park gang. They and Skips set up a drag race (which unicorns never say no to), leading the Unicorns to drive off a ramp and being blown up by Benson. However, they re-appear in "House Rules", coming across Mordecai and Rigby again. The Unicorns also appear in the online game "Fist Punch 2" as enemies and boss. Matchmaker McIntyre Matchmaker McIntyre (voiced by William Salyers) is the CEO of Couple Corral.com and is the villain in "Real Date". After going bankrupt due to no one ever signing up for Couple Corral, he tried to get Mordecai to dump CJ. After many attempts to split them up, McIntyre confronts them near the docks in his submarine. After firing a bazooka at Mordecai (who jumped in the way to protect CJ), CJ turns into her storm cloud form and strikes McIntyre's car which was parked near the beach. McIntyre's horned hood ornament shoots at the blimp above McIntyre and plummets right into his sub, killing him. Unbeknownst to him, Mordecai survived the blast thanks to a gift box that he had. Bistro en le Parc Employees and the Maitre'd The entire staff at the park's esteemed restaurant Bistro en le Parc and are seen a couple of times in the show. The employees are voiced by several different actors, all in Italian accents. Their most significant appearance is in "Fancy Restaurant", when Muscle Man meets Starla's parents, Herb Herbert and Rose Guttsmandoittor. After learning that Muscle Man was faking being fancy, the Maitre'd (voiced by Roger Craig Smith) and the staff tried to kill Muscle Man, Rigby, Mordecai, and the Guttsmandoittors. Eventually their leader, the Maitre'd, is killed by Muscle Man, who trips him and causes him to fall out a window onto a car. They all re-appear as a stage in the online game "Fist Punch", where the staff serve as henchmen and the Maitre'd as a boss. Duck Collector The Duck Collector (voiced by Julian Holloway) is the antagonist in the episode "A Bunch Of Baby Ducks" who offers to buy the ducks from Mordecai and Rigby, only for them to turn down his offer on the account of him being too creepy. He eventually steals them and is pursued by the duo and the ducks' mother. After the mother duck is knocked unconscious during the fight, the Collector tries to kill Rigby using a military sword. Enraged, the Baby Ducks defend their surrogate father by turning into a Duck Man. They then chopped the Collector in two, killing him instantly. He is one of the numerous villains to be resurrected in "Exit 9B" but is once again chopped in half by the Ducks. He is the main villain in the online game "Winging It" in the game's story mode. No Rules Man The No Rules Man (voiced by Roger Craig Smith) is the main antagonist in "House Rules". After Mordecai and Rigby, who were searching for a place to hang out, meet him, he introduces them to the Land of No Rules, the type of place that Mordecai and Rigby have been looking for. At first they enjoy, but when they spot the unicorns from "The Unicorns Have Got to Go", they tell the No Rules Man to get rid of them. This angers him, causing him to order everyone to stop the two, but it fails, and prompts Mordecai and Rigby to leave. Later, when the No Rules Man is playing video games, a note reading "no video games" is dropped and lands on his lap. After reading it, he explodes. He is one of the villains revived in "Exit 9B", and is killed by the Baby Ducks in their giant form. Game Store Manager The Game Store Manager (voiced by Roger Craig Smith) is the main antagonist in "But I Have a Receipt". Mordecai and Rigby buy a role-playing game called "The Realm of Darthon" from his store, but return it after the park gang does not enjoy it. When the manager refuses to refund them even though Mordecai and Rigby have a receipt, the duo manages to sabotage his business until he does. The angry manager eventually traps them in the game and becomes the knight Darthon. When he almost defeats them, the duo realize that players control the game by using their imagination. They finally win when Mordecai stabs Darthon with an immunity sword, and the three re-appear in the real world, in which the manager was really impaled by a ruler. Although the duo enjoy the game and decline the refund, the manager gives their money back and drives away before Mordecai and Rigby could help him. He supposedly died, as his Darthon version was one of the revived villains in "Exit 9B". However, he later makes a cameo in "That's My Television". Ybgir Ybgir (voiced by William Salyers and later, vocal effects provided by Roger Craig Smith) is Rigby's majordomo and later negative counterpart who appears in "Dizzy" and "Jinx". When Pops enters his dream where he encounters some speech demons included Iacedrom, Mordecai's doppelganger and Ybgir, Rigby's majordomo and counterpart. After Pops gives Mordecai and Rigby his speech, they refuses saying "no speeches", he escapes from his dream, until they find a way out. Ybgir returns as a demon in "Jinx" after Rigby tries to break his jinx. When Rigby tries to follow Muscle Man's instructions to un-jinx himself on his own he releases Ybgir from a bathroom mirror. Rigby and Mordecai must then try to stop Ybgir from turning the entire city into zombies. They eventually un-jinx Ybgir, which sends him back to the mirror, defeating him until he returns. Mr. Ross Mr. Ross (voiced by Jason Mantzoukas) is the main antagonist of "Regular Show: The Movie". He was the volleyball coach and science teacher at Mordecai and Rigby's high school. When Rigby screws up the school's chance to win the state volleyball championship, Ross plans an elaborate revenge plot to make a time machine to win the championship, and get revenge on Rigby. It is revealed that the reason why Rigby messes up Mr. Ross' school volleyball team from winning the match, was originally meant to teach his bully, Jablonski a lesson, as Ross was not aware of Jablonski's bullying nature. When Rigby tells his younger-self not to repeat his past mistake for unintentionally turning Mr. Ross into a villain, even Mordecai changes sides in the future without telling his reason why he ruined Mr. Ross' game, the younger Mr. Ross is relieved to hear the younger Rigby's apologies and his reasons for this before being sent to jail, retconning the fate of Mr. Ross and Mordecai's future. He is seen in the same cell as Doug Shablowski when the park is suddenly sent to space. Halloween Villains Percy Percy (voiced by William Salyers) is the name of a Victorian Doll that Pops had owned ever since he was a child. He had the ability to talk and spoke with a deep voice, which is very strange, considering that his appearance is that of a cherubic, really young British boy. He was the most sophisticated doll of his day, with 250 phrases stored inside. Yet the only real phrases we heard him say had to do with an obsessive desire to draw on peoples' faces. Percy not only spoke of his obsession, but it was discovered that he was also an autonomous, "living doll" who actually carried out his intentions and threats of drawing on peoples' faces. He drew on Pops's face after Pops tried to throw him away, and when Pops tried playing teatime with him after Mordecai and Rigby threw him away, Percy became aggressive and wanted to draw on Pops's face even more. Mordecai and Rigby tried to rescue Pops, but Percy escaped and went into the basement. When Mordecai, Rigby, and Pops went after him, Percy knocked Mordecai and Rigby unconscious with a shovel. Percy demanded Pops to bring him a marker so he could draw on Mordecai and Rigby's faces, but then Pops stood up for himself and told Percy that it's not cool for a grown man like him to play with dolls and that Percy must go away. Percy then ran towards Pops to attack him, while Pops did the same. Pops kicked him into the furnace, where he started to melt. He then climbed back out of the furnace in one last attempt to draw on their faces, but instead ended up collapsing onto the floor. Skull Punch Skull Punch is the name of a supposedly British heavy metal band that had died and returned as ghosts, living in an old looking RV in The Park. After Muscle Man and Hi-Five Ghost decided to crash their RV into a crash pit they had made two weeks ago, the ghosts captured them and planned to leave them inside of the RV when it exploded in the crash pit. They are one of the only people that died twice on Regular Show. They performed a rock song while the RV was going into the crash pit, but failed to jump off before it went into the hole, and they died again. The names of each band member (as revealed during the credits) are Harold (lead singer and guitarist) (voiced by Robin Atkin Downes), Nigel (bassist) (voiced by Sam Marin), and Archie (drummer) (voiced by Julian Holloway). All three band members were only seen in "Terror Tales of the Park", being in one of the shorts: "Death Metal Crash Pit". The Skull Punch are revived by Garrett Bobby Ferguson Jr. in "Exit 9B", despite that they appeared only in a horror story that may not have happened. But they were eventually sent back to the portal. Halloween Wizard The Halloween Wizard (voiced by Mark Hamill) only appears in "Terror of the Park". He lives inside of a large, supposedly haunted mansion, which was egged by Rigby due to him turning off the light and not responding when being asked by Rigby to give him candy. This led him to seek revenge on Rigby. He later lurked around Pops's House and used his dark magic to turn Rigby into a nice-looking house. Later that night when it was dark, Muscle Man was on the porch and then saw him driving his car to the front of the house and comes out invisible. Muscle Man tells him to change Rigby back and to get out of there, as well as loading his shotgun telling him not to ask twice. The Halloween Wizard then teases him and asks Muscle Man if he has any clever jokes about his mom, Muscle Man tells him not to talk about his mom so he starts firing in random directions, to no avail. Everyone else watches him shooting the gun but Muscle Man gets knocked over. The wizard then drags him across the grass, yelling and holding his gun up in the air while being dragged and fires the gun a few more times before he goes into the woods. Mordecai, shocked, asks if they saw that. Then there is a knocking on the door, which opens and reveals Muscle Man, who has had his skin ripped off, showing only muscle (inferring that the Wizard had skinned him). Muscle Man says, "I told you I was ripped", then falls over and dies after that and scares the others then the phone rings. Hi-Five Ghost goes to answer it, after Skips tells him not to, and answers the phone saying, "Hello?". The wizard then says "Good-bye!" and sucks him into the phone and turns him into liquid that squirts onto Mordecai and Skips. Mordecai is then knocked unconscious when the wizard throws him against the bookshelf. Benson and Pops see this and they both scream and run into different rooms. Then the wizard breaks Skips' crossbow and the wizard throws Skips into the chimney and burns him. Then he goes to the bathroom and pulls back the curtains for the shower and finds Benson and says, "What's up Gumball?". Benson then screams and gets flushed down the toilet. Then, Pops is on the bed terrified and the wizard comes in and Pops fires a rock at the wizard with his slingshot but misses and the wizard picks him up, drags him on the ceiling, and puts him in the closet which falls over, then disappears. Rigby is scared and asks if anyone was there. Mordecai then wakes up and tells him that he won't let anything happen to him, but the wizard decapitates him. Then, Rigby finds out that Mordecai has died and he says sorry to the wizard. Then the wizard comes and gives Rigby his punishment by throwing eggs at him. Then Rigby becomes angry because the wizard turned him into a house and killed everyone so he can egg him. The wizard then drowns him in a giant raw egg. It is then revealed that it was just a story that Rigby told. Muscle Man then makes fun of his story saying that it was weak and that his story about wrecking cars in a pit was way better. But Rigby says that "that's not it" and turns out to be the wizard who disguised himself as Rigby. Everyone else is freaked out and screams as the wizard finishes the episode by saying, "Happy Halloween!" The Halloween Wizard also appears in an online game "Fist Punch 2" as an enemy and boss. Party Bus Driver The Party Bus Driver (voiced by Mark Hamill) is a mummy with purple sunglasses who appeared in "Terror Tales of the Park II" as the main antagonist of the short, "Party Bus". Mordecai, Rigby, Margaret, and Eileen agreed to take a ride in the party bus but after realizing that they get older while the bus moves forward, they attempt to escape. After being threatened by Mordecai to stop the bus, his bandages fly off, revealing him to be a skeleton and he makes the bus go faster, causing the gang to age quicker. He was pulled out of the driver's seat by Mordecai, causing him to fly backwards and break into pieces. Mordecai then puts the bus in reverse causing them to get younger. After the four escape the bus through a roof hatch, they, along with the driver and the bus, disintegrate and the story ends. Jan the Wallpaper Man Jan the Wallpaper Man (or simply known as Jan or The Wallpaper Man) (voiced by Andrew Daly) is the main antagonist in "Terror Tales of the Park II's Wallpaper Man story. At first glance, he is but a simple, middle-aged, worker for hire guy, but in reality, he uses his wallpapering skills as an opportunity to feed himself. His true form is a giant, evil, predator tarantula. He can spin silk that looks like red and black wallpaper. He cocooned Pops and the gang but they are saved by Mordecai and Rigby. He was killed at the end of the story by Muscle Man's grenades, taking the duo with him. Johnny Allenwrench Johnny Allenwrech (voiced by William Salyers) appeared in Terror Tales of the Park III as the main antagonist of the short "Killer Bed". He was the spirit of a serial killer that got trapped into a bed. Rigby buys a bed from a company called UMÄK, not realizing that Johnny's body is in the box. After talking to Mordecai in the kitchen he brings the bed into his bedroom to assemble together, Rigby tries to assemble the bed by himself, but fails through attempting for four hours, afterwards he gets Skips to help build the bed which was completed by seven hours. After assembling the bed, Rigby lays down on the bed and finds it very comfortable. He then turns on the television and eventually tunes in to a live news channel where the news reporter asks a question, "Did you buy a bed recently?" Rigby replies by saying "Yes", the news reporter says this may have been a fatal mistake, he then explains during a shootout with police at a UMÄK factory, Johnny Allenwrench, a potential murderer fell into a UMÄK machine where he was manufactured into a bed. The reporter then goes on to say due to a clearing error, the bed was shipped out to stores, and now the company is reclaiming the KILLÜRGEN beds back. Rigby then says that he feels sorry for "the loser who brought that bed", but after finding out his new bed was made by the same company, he claims he's also "one of those losers". Eventually, the news reporter receives the code for the bed that contains the murderer. He then reads the code out saying: "If you have this bed code number you are sleeping on a murderer, 623570406 the last number is smudged he grabs his glasses and says it is an 8". The bed then molds and captures Rigby within it. The bed then threatens Rigby with a hex key, however Benson tells him that he'll give him a job if he lets Rigby free. The next day, Johnny is shown watering some flowers when he suddenly attacked by the groundskeepers who cut him down into a few pieces of wood. The scene then opens out, to show Benson and Rigby, who were watching the whole thing. Benson congratulates Rigby on planning the ambush, whilst Rigby congratulates Benson on lying to Johnny's face. Scarecrow The Scarecrow (voiced by Mark Hamill) is a character who appears in "Terror Tales of the Park III" as the main antagonist in "Jacked-Up Jack-o-Lantern". When Mordecai, Rigby, Muscle Man, and Hi-Five Ghost destroy his pumpkin wife (after ignoring his warnings that say to leave them alone), he comes to life. He then proceeds to touch everybody, which turns them all into pumpkins before squishing them and eventually planting their seeds in the pumpkin patch so that their heads grow into pumpkins. By the end of the episode, he laughs while they all argue on who should go home with a mother and her son, knowing that he had avenged his wife. It is unknown why the female scarecrow wasn't able to come to life. Jebediah Townhouse Jebediah Townhouse (voiced by William Salyers) is a minor character in the show. He makes his debut in the episode "Terror Tales of the Park III". It is said that he lived in the house 200 years ago and was ahead of his time. More so than most others who are considered ahead of their time, since he acted and spoke like it was the 1980s. Since he behaved and talked oddly, the townsfolk thought that he was a wizard, and tried to murder him. Before they could, he put his soul into the house and exclaimed he would show them all and return in 200 years when everyone talked and acted like him, and he would be king of the world. When he realized everyone in his time would be long dead by then, he vowed to come back in the form of a murderous poltergeist to haunt and kill whomever is inside of the house, but before doing so, he signed his house over to Mr. Maellard. Unfortunately for Townhouse, his predicted time of return bypassed the eighties, when he would have been in style. Meaning now, instead of being far too ahead of his time, his mannerisms were considered old fashioned and out of touch. 200 years later on Halloween night, Benson told his fellow park workers the story of Jebediah as well as a scary story about him, which involved Mordecai, Rigby, Pops, Muscle Man, and Hi-Five Ghost trying to escape from him after taking on a dare to survive the whole night in the house but are one by one killed, afterwards proceeding to tell them that he was indeed a real person. Jebediah then finally manifested and scared off everyone in the house and proceeded to wish them a Happy Halloween. Ghost Mordecai and Ghost Rigby They are minor villains in "Terror Tales of the Park IV". After Mordecai and Rigby died, Skips warns Benson that they will keep haunting him until he fires them. After a battle between the ghosts, Benson successfully fired them but realizes that it was he who died, not the duo, who have been promoted. The Hole It is a minor villain in "Terror Tales of the Park IV". The park workers must sacrifice one another to prevent the hole from destroying the park. Hi-Five Ghost was the first to be sacrificed and Pops was to be the next victim. Fortunately, his head was too big for the hole to swallow so the park workers no longer needed to make any more sacrifices. John Wolfhard John Wolfhard is one of the villains from "Terror Tales of the Park V". He is on trial for eating a man and the people on jury were the park staff. He does a terrible job trying to defend himself as the evidence that were presented to him clearly proved that he ate someone. Before the park crew could vote him guilty, Pops decided to use the restroom first, which gave him the idea to ask the judge if he can use the restroom too, which the judge allowed him to do unsupervised. When inside the restroom, he first asked Pops for some toilet paper. He then turns into a werewolf and attacked him and then bit Pops to turn him into a werewolf so he can take his place. He tells Pops he's going to a place where his kind will be respected, London. After he left, Pops becomes a werewolf and everyone thinks he's Wolfhard. After Pops escapes to the airport as a werewolf and boards a plane to London, he runs into Wolfhard again. He apologizes to Pops for mauling and Pops is willing to let it go. He later invites Pops to have tea at the Royal Palace with him and his friends and will later try to eat the Queen, which Pops happily accepts. John Wolfhard also appears in an online game "Fist Punch 2" as an enemy and boss. Barber The Barber (voiced by John Cygan) is one of the villains from "Terror Tales of the Park IV". He not only cuts his victim's hair, but their heads too. School Girl Villain The School Girl Villain (voiced by Grey DeLisle) is one of the villains from "Terror Tales of the Park IV". If anyone tries to befriend her, she will swallow them whole. Racki the Wishmaker Racki the Wishmaker (voiced by Steven Blum) is an evil wishmaker machine who appears in "Terror Tales of the Park V". Benson rented him for the Halloween party in the park house and shows anyone what happens if their wishes comes true through visions but they usually have a cruel twist to it. He would make his eyes glow red and makes the person who's asking the wish eyes glow red, too. He showed his wish visions to Benson, Pops, and Hi-Five Ghost, but when he does Rigby, he has everyone see his vision. After finishing Rigby's vision, he robs the park staff and tries to escape with the other wishmakers. When he tries to use the catapult to escape, he's too heavy to be launched further and he ends up crashing a few feet from the catapult. While the park staff laughs at his misfortune, Racki laughs at Benson because now he can't get his $500 security deposit back, result in Benson screaming "No!". It turns out that the entire episode was a vision for Benson who is at a Halloween store and he asked Racki on wishing to throw the best Halloween party ever. When the Halloween store worker asked how he likes it, Benson said it's terrible and he refuses to rent Racki if he can't get his security deposit back so he went to the streamer store instead. The store worker scolds Racki for scaring away another customer but Racki responds by telling him that his boss should fire him which results in the store worker unplugging Racki. Racki also appears in the online game "High Flying Halloween". Mr. Bossman Mr. Bossman (voiced by Sam Marin) is a ventriloquist dummy and is one of the villains from "Terror Tales of the Park V". When Benson needed to motivate Mordecai and Rigby to work, he saw a commercial on TV about Mr. Bossman and that he would help motivate workers. While it does motivate Mordecai and Rigby, Mr. Bossman intends to take Benson's job away to support his family. Benson runs to the Park house to get help from Mordecai and Rigby but Mr. Bossman manages to catch up to him and he attacks Benson to prevent his escape. Mordecai and Rigby tell Benson to use the Salad Guillotine, which Mordecai and Rigby saw in a commercial and actually bought it, and Benson uses it to decapitate Mr. Bossman. Elevator Repairman The Elevator Repairman (voiced by Jeff Bennett) is one of the villains from "Terror Tales of the Park V". Hi-Five Ghost first meets him when he's going to meet Celia and asked if the elevator was fixed and he said it was and he let Hi-Five Ghost use the elevator. When the elevator stops working, Hi-Five Ghost calls him to fix it but he messes with Hi-Five Ghost by playing ominous music and making the elevator go up and down very fast. When Hi-Five Ghost finally meets Celia, she informs him that the elevator has been broken the entire time and the elevator repairman died 40 years ago. When Hi-Five Ghost and Celia hears the elevator door opening, they both look inside and see the repairman transform into a ghoul. He grabs Hi-Five Ghost and makes the elevator crash into the bottom which then explodes in flames. Chocolate Witch The Chocolate Witch (voiced by Courtenay Taylor) is one of the villains from "Terror Tales of the Park VI". She has the power to transform victims into chocolate statues. Sharks The Sharks are one of the villains from "Terror Tales of the Park VI". They serve as Benson's greatest fears on Fear Planet. Flying Disc Freestylers The Flying Disc Freestylers are one of the villains from "Terror Tales of the Park VI". They serve as Skips' greatest fear on Fear Planet. Amusement Park Mascots The Amusement Park Mascots are one of the villains from "Terror Tales of the Park VI". They are Rigby's greatest fears on Fear Planet. Vampires The Vampires are one of the villains from "Terror Tales of the Park VI". When Mordecai, Rigby, Muscle Man, Eileen and Skips arrive in their mansion, they are one by one captured and turned into vampires and join them into catching their next victims. Shannon Acidbutt Shannon Acidbutt (vocal effects provided by Roger Craig Smith) is the antagonist in "Alien Roommates" from "Terror Tales of the Park VI". In her first appearance, she appeared in an interview for a position as new roommate. She was accepted for her large amount of money, despite being creepy to them. She has shown to be very obnoxious and after a while, the park gang decide to kick her out, but she refuses to leave and continue watching TV. After Muscle Man turns off the TV she goes on a crazy rampage and they use the TV to get her out. They lead her to a space vacuum but uses her acid to melt the controls to release her in space. But Muscle Man grabs her in a robot suit and gets himself stuck in space forever with her. Musical Villains The following characters are villains who are also professional or small-time performers. CrewCrew The CrewCrew was a rap group who tried to insult Pops. They were later defeated by Pops with the help of Mordecai and Rigby in a rap battle. Led by Alpha-Dog (voiced by Donald Glover), members of the CrewCrew were Blitz Comet (voiced by Tyler, The Creator), Demel-Ishun (voiced by MC Lyte), François and V-Tron. Summertime Song The Summertime Song (voiced by Sean Szeles) is a living tape with the fictional band "Solid Bold" song Summertime Lovin''' on it. After coming to life and brutally annoying the park gang, Mordecai, Rigby, Skips, and the rest come up with an even catchier song and destroy the tape for good. The Summertime is revived in "Exit 9B", but is killed again, this time by Mordecai with a pole. Future Mordecai and Future Rigby Future Mordecai and Future Rigby are Mordecai and Rigby's future counterparts who appeared in "Mordecai and the Rigbys". They appear when soda was spilled on some record players, which summoned Mordecai and Rigby's future selves, who taught them how to be musicians. When Mordecai and Rigby perform on stage, they stop when they realize that the music was playing from a tape. After Mordecai criticizes how lip-synching is "not cool", the future counterparts disappear. They make a cameo in "Bad Kiss", seen when Mordecai and Rigby travel back in time. Coffee Bean and the Translator The Coffee Bean (voiced by S. Scott Bullock in the first appearance, Sam Marin in later appearances) is, as his name states, an anthrophomorphic coffee bean. He can only say the word, "coffee", which is why he is followed by a man known as the Translator (voiced by Mark Hamill), who resembles a Japanese businessman and translates his speech. They are first seen in "Caffeinated Concert Tickets", where they are in line to get tickets for the Fist Pump reunion concert. After over-hearing Mordecai and Rigby's plan to put more time in at work, the duo show up with a contract that Rigby immediately signs for both of them. After forgetting to buy Coffee Bean and the Translator's tickets, they are put under by chamomile tea, "the sleepiest of all teas", and awake to find that the duo have stolen their tickets. After reclaiming their tickets, Mordecai and Rigby enter the concert hall, ditching Coffee Bean and Translator. They are mentioned in "Cool Cubed". The Cool Cubed drink resembles an anthrophomorphic coffee bean. He can say the word "freeze", instead of "coffee", which is why he is followed by a man known as the Translator, who resembles a Siberian Yupik and translates his speech. When Mordecai and Rigby entering Thomas' brain, they found the Cool Cubed drink and the Translator who is going to freeze Thomas' brain core. Mordecai and Rigby must stop and melt them, killing them for good. They later make cameos in "Dodge This" and "I Like You Hi". The Coffee Bean also appears in an online game "Fist Punch 2" as an enemy and boss and the Translator appears an online game "Battle for the Behemoths" as the as the master of Snowballs. Reaper Bots The Reaper Bots are the main villains in "Cool Bro Bots" who call themselves "Bro Bots" to hide their identity. They come to the park dome and pretend to be nice in order to steal their environment to gain money for the black market. Mordecai and Rigby are suspicious of their antics, which causes a wedge between them and the rest of the park gang through a series of disbelief and causes Benson to send them away in anger. After Chance Sureshot, Toothpick Sally, and Recap Robot show up and reveal their scheme (which is backed up by the giant lumberjack and bull robots and thus, proving Mordecai and Rigby right), they blow their cover and attack the park gang and the trio but are eventually destroyed in the end. Grand Master of Death Kwon Do The Grand Master of Death Kwon Do (voiced by Steve Blum) is the cruel sensei and adopted father of the Sensei. In "Sandwich of Death", the Sensei takes Mordecai, Rigby and Benson to the Grand Master's dojo for the Sandwich of Life, the only known cure for Benson's potentially fatal illness as a result of him unknowingly eating the Sandwich of Death the wrong way. Because the Sensei could not request a meeting since his master holds a grudge against him, the four manage to sneak into the building, going through the obstacles and fighting past the guards. In the final chamber, they confront the Grand Master of Death Kwon Do, who is protecting the Sandwich of Life and the Double Death Sandwich. There, the Master Sensei reveals that he is angry at the Sensei for stealing his recipe of the Death Sandwich and mass-producing it without his permission. After Sensei apologizes and accepts full responsibility for his actions, the Master does not forgive him and orders his guards to kill him, Mordecai, Rigby and Benson. When he sends the Double Death Sandwich flying at Mordecai and Rigby, the Sensei quickly teaches them a move called the "Bicycle Kick of Death", which the duo uses to kick the sandwich into the mouth of the Grand Master, killing him. The Grand Master's death also resulted in the destruction of his dojo and mountain, although the gang manage to escape before the entire mountain collapses. The Grand Master of Death Kwon Do is the final boss in the video game "Fist Punch 2". Guardian of Secrets The Guardian of Secrets (voiced by Janie Haddad-Tompkins) is a giant being who resembles Margaret and the protector of Margaret's secrets who appears in "Diary". Rigby unleashes her after foolishly looking at Margaret's secrets while repairing Margaret's diary, and she attempts to destroy Mordecai, Rigby, and Skips for looking at Margaret's secrets. This forces the trio to each reveal a secret of their own to defeat her. Benson Slides The Benson slides (voiced by Sam Marin) are five living 2D slides of Benson who have the same behavior as the real Benson. They appear in "Bad Portrait" after Rigby damages a projector camera that brings them to life. They are unhappy with the duo for destroying a painting of Benson and recreating it in a bad way, leading them to attack the duo and try to destroy the deformed painting, but with the help of a hologram of Benny Harris, they defeat the slides using paint. British Taxi The British Taxi (voiced by Mark Hamill) is a murderous British taxi who appears in "Ello Gov'ner". After watching a horror movie about it, Rigby begins to have nightmares as well as seeing hallucinations of it. It later apparently becomes real and chases Rigby, Mordecai, and Pops until it corners Rigby, who overcomes his fear and attacks it, which soon reveals that it was all a dream and the taxi was actually a mascot in a costume. This whole episode and car could be a parody of The Car (1977) or Christine (1983). Limosaurus The Limosaurus is a fire-breathing dinosaur made of limos who first appears in "Limousine Lunchtime". He is the last challenge of the Limo Demolition Derby that Mordecai and Rigby must face to win the contest. Although it overwhelms them, they manage to defeat it with the help of a meatball sub and a missile from their limo. Sandwich Monster The Sandwich Monster (voiced by William Salyers) is a creature from an imaginary story told by Mordecai and Rigby in "Lunch Break". Stag Man The Stag Man (voiced by Robert Englund) is a part-stag, part-human creature and the main antagonist in "Camping Can Be Cool". He is angry with Mordecai, Rigby, Margaret, and Eileen for unawarely trespassing in his forest and intends to hunt them down, but plays fair and lets them get a head start. He proceeds to chase them down until he is hit by a truck and taken into custody by the forest rangers. The Stag Man later makes a cameo in "Bad Kiss", seen when Mordecai and Rigby travel back in time. He then re-appears in "Exit 9B", as one of the revived villains. His appearance is similar to that of the legendary creature known as the Wendigo or maybe the Pope Lick Monster. Mordecai and Rigby Holograms The Mordecai and Rigby Holograms (voiced by J. G. Quintel and William Salyers) are the villains in "The Best Burger in the World". Mordecai and Rigby create them to trick Benson long enough to get the burger they want, but they come to life and also want to get their hands on the burger, leading to a fight between the duo and their holograms (with Benson being caught in the middle of it), until the former defeat the latter with rocks. Country Club Leader The Country Club Leader (voiced by Mark Hamill) is the manager of a rich country club that has a history of confiscating objects from other people, including the groundskeepers, and turning them into toilets with a toilet-making machine. In "Country Club", his guards take the golf cart away from Mordecai and Rigby. The duo sneaks inside the main country club house to retrieve it, only to be captured. The manager tells them of his plans to not only turn the cart into a toilet, but to shoot it into outer space as well for the summer solstice event, with a rocket on a ramp. He then decides to turn Mordecai and Rigby into toilets and launch them into space as well. Just as he is about to do so, the rest of the park gang crash through the country club gate and free the two. As a battle between the park gang and the country club henchmen happens, Mordecai and Rigby climb into the cart and drive into the country club leader, pushing him in the toilet-making machine, where he was turned into a toilet and placed onto the rocket, launching him into space. Milk People The Milk People are white colored creatures who wear masks that cover their fangs and have the power to turn victims into one of them. They are the villains of "Guy's Night". After Pops nearly completes the milk drinking challenge, he is brought to their lair. When he and the other competitors realize that they've been keeping them here to prevent them from completing the challenge, they become hostile, forcing them to escape. Although Pops manages to escape with the other competitors, two of them are left behind. Mitsuru Shinehara and Announcer Bot Mitsuru Shinehara (voiced by Andrew Kishino) and Announcer Bot (voiced by Sam Marin) are the villains appeared in "Fool Me Twice". When Mordecai, Rigby and Benson entered the Fool Me Twice competition, They meets Mitsuru Shinehara and Announcer Bot who announces the Fool Me Twice competition is about to begin. The competition begins and the three completes all the challenges and gets his prize, killing them for good. Wickets The Wickets are a street gang who have an obsession for croquet and hatred of cell phones. They are the villains of "Picking Up Margaret". Mordecai obliviously walks into the turf while answering a phone call from Margaret, whom he planned to take to the airport. He is encountered by the Wickets, who strictly warn him about their prohibition of cell phones, and then arrives at the auto shop to pick up Benson's car, since the cart is unavailable for use. When Raymond the mechanic talks to Benson about an issue via Mordecai's cell phone, he and Mordecai are ambushed by the Wickets. While the mechanic distracts the Wickets with a flamethrower, Mordecai gets into Benson's car and drives off to pick up Margaret. On their way to the airport, the Wickets catch up with them in a truck and two motorcycles and attack the car. Mordecai drives into a ramp under construction and shakes them off, causing one of the motorcycles to crash into a box and the other to bump into a wall as its two drivers fall to their death. Mordecai then drives off the railing of an unfinished bridge. Unable to turn, the last three Wickets drive off the end of an unfinished bridge into a cell phone billboard, killing them. Barry Barry (voiced by Lex Lang) is a criminal from the 70s and the villain who appeared in "Every Meat Burritos", where he steals a bag of burritos from Mordecai, Rigby, Muscle Man and High five ghost while they were in his car and was arrested by them to the police. Broseph Chillaxton Broseph Chillaxton (voiced by Robin Atkin Downes) is an invisible man who is the judge of a galactic court and appears in "Cool Bikes", in which Mordecai and Rigby are arrested for being "too cool" and taken to "Intergalactic Cool Court". Benson, who kept denying that they were cool, finally admits that they are when he is brought as a witness, but helps them escape after the judge sentences them to death. As the three exit the court's ship, Mordecai and Rigby throw their bicycles into a satellite dish, which explodes and destroys the whole court. Broseph Chillaxton later makes a cameo in "Exit 9B" as among the revived villains. Hector Hector (voiced by Andres Salaff) is a fireworks dealer and the main villain in "Firework Run". He runs a secret firework and chile relleno-selling business called "South of the Line" and is an old friend of Muscle Man, who visits his warehouse to buy fireworks for the Park's Fourth of July event, accompanied by Mordecai, Rigby and Hi-Five Ghost. Rigby spies on a jumbo-sized firework called "El Diablo", which Hector reveals a prophecy that if it is lit, it would kill him. When Mordecai, Rigby, Muscle Man and Hi-Five Ghost stumble upon his secret for chile rellenos (gunpowder stuffed in jalapeños), Hector tries to kill them so his secret would not be shared. The four are captured and chained to a bench in his warehouse, and Hector lights an explosive made from his chili rellenos. However, the park workers walk up and as the bench is destroyed in the explosion. Rigby steals the El Diablo firework, and Muscle Man traps Hector and his henchmen inside the warehouse, which he then blows up using one of Hector's chili rellenos. After the groundskeepers return to the Park with the El Diablo, Hector suddenly appears, having survived the explosion and revealing himself as a cyborg. He shoots a firework at the park gang, but hits El Diablo instead, setting it off. A firework version of the "South of the Line" mascot appears and shoots him with fireworks, catapulting Hector into the billboard of his business, where he explodes, setting off the other fireworks in his nearby warehouse. Doug "The Doppelganger" Shablowski Douglas "The Doppelganger" Shablowski, or Doug for short (voiced by Roger Craig Smith) is the antagonist in the episode "Temp Check". He is an otter who is a serial scam artist whose strategy involves presenting himself as a drifter seeking work with the intention of taking over other people's lives, and is hired by Rigby as a temporary employee at the park to perform duties typically assigned to him by Benson. His relationship with Mordecai ends up making Rigby jealous. He eventually becomes a clone of Rigby and even sounds the same. After doing multiple tests with Rigby's favorite things, Mordecai tricks Doug into revealing himself by offering a hug and he accepts (which the real Rigby would never do). Upon realizing that his cover is blown, Doug attempts to flee but is quickly apprehended by Skips and placed in custody by the local authorities for his crimes. It is also revealed that he had been pulling the same scam all over the country. As he is being taken away, Doug, as a sign of good faith, tells Rigby that while he himself doesn't have much to be thankful for, Rigby has friends, a job and a home – something the raccoon shouldn't take for granted. He is last seen in the same cell with Mr. Ross when the park is sent into space. Vince and Tommy Vince and Tommy (voiced by Roger Craig Smith and Andrew Kishino respectively) are two businessmen who only appeared in "Party Re-Pete" and work for the mysterious company called "Party Starter" which are disguised to clone party throwing people such as Party Pete. They then attempt to turn Benson into a party machine too when he signs up for a job at their company. After the park gang rescue Benson, Party Pete, and other captured party throwers, the two try to stop them from escaping, but are defeated when Benson feeds the Party Pete a large galleon of soda, causing an explosion that destroys the building. They are then arrested by the police for their crimes. Cube Bros. The Cube Bros. (voiced by Roger Craig Smith) are the people that turning into robots and the villains in "Cube Bros". Park Avenue The Park Avenue (voiced by Troy Baker) is a living spray can who appears in "Under the Hood". His graffiti led to Muscle Man getting fired from his job, forcing Mordecai and Rigby to chase him down and expose his scheme to Benson to get Muscle Man rehired. After surviving his traps and graffiti monsters, they catch him in his invisible house and force him to admit the truth to Benson. When Benson attempts to call the police, he tries to escape but fails. Warlock The Warlock (voiced by James Hong) is the villain in "Fortune Cookie". He is first seen playing cards with Benson, who tries to win back his luck after a series of misfortunes that were prophesied from the fortune of a fortune cookie. However, he gambles away the Park to the warlock, who then opens his fanny pack that sucks everything it gets. When Rigby confesses that in reality he switched fortunes with Benson behind his back, they trade fortunes again. Afterwards, the warlock disappears and everything is back to normal. The Warlock appears in an online game "Battle for the Behemoths" as the boss. Cat Masterson Cat Masterson (voiced by Paul Scheer) is a director at Cat Masterson Studios and the villain in "Cat Videos". He tricks people to act like cats such as Benson wearing a suit when he entered his studio and turned him into Lil Benny, a cat version of himself. When Mordecai and Rigby entered his studio looking for Benson, he tricks them into wearing the same suits into cat versions of themselves and renamed them Stretch and Runty while also trying to turn them into real cats just like Benson. In the end, he is defeated when the duo rescue Benson and damage said his suit, revealing he is also cat and is last seen taken away to the vet. Carrey O'Key Carrey O'Key (voiced by Richard McGonagle) is the manager of Carrey O'Key's, a karaoke bar, and the main antagonist in "Karaoke Video", where the park gang visit his place for the night. When he releases Mordecai and Rigby's embarrassing promo tape without their permission, the duo manage to cut it after the first seconds of the video. As Carrey and his security guard Carl fight Mordecai and Rigby for the tape, the entire club gets involved in the massive brawl but Benson. When the tape gets into his hands, Carrey punches and yells at him for it. Benson then furiously smashes it into Carrey's face, knocking him unconscious and destroying the tape as well. Carrey O'Key and Carl are not seen again later on in the episode, but they make a cameo in "Return of Mordecai and the Rigbys". Underworld Playground Demons The Underworld Playground Demons are the group of creatures who lived in the underworld playground and the villains appeared in "Play Date". When Mordecai, CJ and Thomas entered the Underworld Playground, they encounter some Underground Playground Demons who invade our playground. They give chase to try and kill them, but the three manages to escape from the Underworld. Thomas uses his scare power to make an earthquake like a bridge, killing them for good. Frank Jones Frank Jones (voiced by John Cygan) is the main villain in "Trailer Trashed". Posing as a health inspector, he arrives at the Park. When he takes a look inside Muscle Man's trailer (which Muscle Man won in a hot dog eating contest), he initially plans to take it to the dump, but gives Muscle Man a chance to get it "up to code". However, when Frank shows up again, he gets two of his henchmen to destroy some parts of his trailer, claiming that it was still not "up to code". After Muscle Man refuses to let him take away his trailer, Frank warns that he will return with an army and drives off. Muscle Man then calls his brother Muscle Bro, who brings his truck, as a reinforcement and forms a strategy. As the park workers (except Hi-Five Ghost) are pursued by Frank and his henchmen, they are en route to the border, where there was a cliff at the end. After the park gang and Frank's minions are all defeated during the chase, Frank scuffles with Muscle Man in Muscle Bro's truck. When Muscle Man calls him the "most insane health inspector ever", Frank reveals that he is not a real health inspector: he was the runner-up at the hot dog eating contest that Muscle Man won, and he wanted to take the trailer for revenge. Muscle Man gets out of the truck, telling Frank to take it, but not before tying the truck's wheel up with his shirt and removing the brake petal. Frank Jones reaches the back of the truck where the trailer was to be stored, only to find a sign that it was a prank. He is killed when the truck drives off the edge of the cliff. Christmas Villains Quillgin Quillgin (voiced by Thomas Haden Church) is an evil elf who resembles a human being and only appears in the "Regular Show Christmas Special". He made a magical present that was so powerful that it can give people anything they want and only lava could destroy it. However, as he used dark magic as a key component, it also turns people evil and he got so angry that he tried to use it to end Christmas forever and kill Santa, but it fails when Santa reveals to be wearing a bulletproof vest and steals the present from Quillgin. After Santa, the park gang, and the rival park team up, Mordecai and Rigby attempt to destroy the present by throwing it into the East Pines lava pit. Quillgin fights Mordecai and Rigby for the present while falling in the volcano and was killed after landing into the lava pit with the magical present. The Christmas Special is a parody of the Lord of the Rings, so Quillgin is a parody of Sauron who was originally an elf before his transformation into the Dark Lord. Celsius Snow Monsters The Celsius Snow Monsters are one of the villains from "Regular Show: Christmas in Space". They are cute and harmless in the day but at night, they become large terrifying monsters. Rocker Caroler The Rocker Caroler (voiced by Roger Craig Smith) is one of the villains from "Regular Show: Christmas in Space". He is a magical caroler who madly desires cookies. After arriving at the park dome and constantly threatening the park gang with his magic, they manage to defeat him by feeding him cookies. Now satisfied with what he had mostly desired, he explodes into snow. Krampus The Krampus (voiced by Fred Tatasciore) is one of the villains from "Regular Show: Christmas in Space". Benson pranks Rigby by calling Krampus due to his misbehavior, but little does he realize that Krampus is real. Upon arriving at the park dome, he attempts to abduct Rigby and later the rest of the park gang when they try to protect Rigby. They eventually defeat him using hand-bells, freeing his trapped victims. Laundry Margaret Laundry Margaret (voiced by Janie Haddad-Tompkins) is the villain in "Laundry Woes". She is a pink hallucination of Margaret who tempts Mordecai into going to return Margaret's sweater after they broke up while ignoring the fact that he should move on. When he attempts to resist, she takes control of Mordecai's mind, making him crash into a statue in front of Margaret's college. She disappears afterwards. Ghosts The Ghosts (voiced by Mark Hamill, Roger Craig Smith, Fred Tatasciore and Ali Hillis) are the villains that appeared in "The Parkie Awards". Promise Pie The Promise Pie (voiced by J. G. Quintel) is the villain in "Pie Contest". He first appears inside a garbage can and lies to Mordecai and Rigby when they ask him to help judge the contest without hurting anyone's feelings (although Mordecai at first refuses his help, as he didn't trust him earlier), but he actually intended on eating everybody instead, making him grew to a gargantuan size and claiming that he was lowering the competition to make judging simpler for them. This forces the duo to tell the truth to everyone, shrinking him down to size. Mordecai ended up smashing him against a garbage truck, killing him for good. Cash Bankis Cash Bankis (voiced by Phil LaMarr) is the antagonist of "Bank Shot". Cash Bankis has a basketball backboard and net for a head and is wears a red hoodie and gray sweatpants. Cash is very good at the game of Bank Shot. Cash first appears when Rigby asks if there's anyone who would like to play Bank Shot against him, Cash requests to plays. The two agree on a wager; the loser pays for the winner's bill. When Cash wins the bet, he shows Rigby the bill – $12,000 for a night of eating gold plated chicken. As Rigby is unable to pay that much, he decides to take the bet up a notch (double or nothing). He bets Cash that he can make "the greatest bank shot of all time" off the wall. He accepts. but only if Rigby passes off his Eggscellent hat as a side deal. When Rigby's guts "fail" him, he steals the hat and demands Rigby to pay up $24,000. Rigby didn't have that kind of money on him, so he threatens his friends to pay the money. This forces Rigby to demand another rematch (triple-or-nothing). Cash gives Rigby until the following day to get prepared. He tells him not only will he pay him the money, but he and his friends will be forbidden to hang out at Wing Kingdom. When Rigby is fully prepared, the two meet up at Wing Kingdom again and begin the rematch. After Cash makes his first successful shot, Rigby makes his successful shot. They go at each other with amazing bank shots, until Cash fails one. Rigby makes another shot, and wins the triple-or-nothing bet. That meant Cash had to pay for his own bill, and Rigby asked for his hat back. Cash said he won the hat fair and square on the side deal. Then, the God of Basketball appeared and told Rigby his double or nothing bet was still in play. It's revealed that Rigby's ball continued to bank after going out the window. It returns to Wing Kingdom, and bounces the hat off Cash's head before going through the hoop. Which meant Rigby truly made the greatest bank shot of all time. Hurl, Merle and Burl Hurl Hurlbutt, Merle and Burl (voiced by Roger Craig Smith, Matthew Yang King and Troy Baker respectively) are a trio of brawny surfers and the main antagonists in "Catching the Wave". Pops first encounters them at a beach when he was learning how to surf, and is made fun of by them. The trio become more hostile toward him after he accidentally collides into them in an unsuccessful attempt to surf. Many scenes later, they appear again at the Park lake, where a wave machine was installed for Pops to practice surfing, turning violent on Pops. When the park gang fend off the surfers in a paddle boat, the trio call for reinforcements. While the groundskeepers defend him, Pops goes to ride the wave, but Hurl cranks the machine up to its highest level before the rest of the park gang stop him. After Pops successfully rides it, Hurl Hurlbutt and his friends are crushed by some dolphins from Pops's newfound bond with nature, seemingly killing them. Drumatron VI The Drumatron VI is a special machine and the main antagonist in "150 Piece Kit". It is Benson's replacement to the band Hair to the Throne. During the concert, Mordecai and Rigby tied the Drumatron to prevent him from performing the solo, but when Benson tries to prove to everyone that he can play the drum solo, the Drumatron's top detaches, and tries to stop Benson from finishing the solo. While close to finishing the solo, it tries one final attempt to stop Benson but he manages to overpower it and finish the solo. Snowballs the Ice Monster Snowballs is a giant snow monster can breathe fire (despite the fact that it is made of ice) who appears in "Appreciation Day". It is brought to life by Mordecai and Rigby after they foolishly write lies in the book of park records. The monster steals the book and rips out its pages while wreaking havoc in the park. Although the duo manage to collect all the pages, Snowballs still had the book's cover, which is needed to defeat the monster. Skips and Rigby both manage to retrieve the cover from Snowballs, allowing Mordecai to write an ending to make Snowballs disappear and everything go back to normal. Snowballs appears in an online game, "Battle for the Behemoths" as a boss. Stress Monster The stress monster is a five-headed monster who appears in "Skips Stress". It is formed after Skips rings an ancient stress bell to remove his, along with Benson, Pops, Mordecai, and Rigby's stress, with each head resembling the five. They prove to be no match for the monster until Skips points out that they must cut off all of its heads in order to kill it. They succeed in cutting off all but one head, in which Skips finishes it off by piercing it with a sharp flagpole. Party Pete Peter "Party Pete" Hermanverfal (voiced by Jeff Bennett) is the antagonist of the episode "Party Pete" and a dueter-protagonist in "Party Re-Pete". He is invited by Mordecai and Rigby to spice up their party. After learning Benson was returning to the park, Mordecai and Rigby tried to stop Party Pete, who was hopped up on Radi-Cola. Eventually, Mordecai and Rigby stuff him with so much cola that he explodes to death just before Benson arrives. It is revealed that Pete (actually named "Peter Hermanverfal") was one of the many people to be captured by Party Planners and be cloned for parties, meaning that the Party Pete that died was only a clone. The Party Pete Clone made an appearance as one of the resurrected villains in "Exit 9B". Hair to the Throne The Hair to the Throne (voiced by Roger Craig Smith, Mark Hamill, and William Salyers) are a hair metal band. Benson was formerly part of the band, but due to his "legendary drum solo" performance on their first album, he was fired, for if anyone knew of his role he would achieve the most fame out of the four members. His replacement is the machine known as the "Drumatron VI". In "150 Piece Kit", the Hair to the Throne are scheduled to perform a concert at the Park. Benson plans to perform the solo again at the concert, and takes his drum kit to the park, where it is destroyed by the Hair to the Throne but Mordecai and Rigby help him fix and set it up during the concert. During Benson's performance, the Drumatron VI and the other band members attempt to stop him, but he overpowers the Drumatron and finished the performance. Afterwards, the Hair to the Throne apologize to Benson for their past actions, and ask him to rejoin them, which he declines. Wall Buddy Wall Buddy is a wall product who appears in "Wall Buddy". Rigby buys it to separate the bedroom, but after he and Mordecai abuse it, it gets too confused and begins to spread across the park, but the duo manage to catch it and hit the reset button, turning it off and returning it to normal. Wall Buddy is not technically evil and its destructive nature is only caused by Mordecai and Rigby overstressing it. Bouncer The Bouncer (voiced by Mark Hamill) is the owner and the villain in "Guitar of Rock". Ladonna Ladonna (voiced by Natasha Leggero) is the owner of a dance club who first appears in "Access Denied". Mordecai and Rigby go to her club, but are kicked out after Mordecai criticizes them for their arrogance. Ladonna also makes a cameo in "The Thanksgiving Special" and "Return of Mordecai and the Rigbys". Moon Monster The Moon Monster is a hybrid monster who only appears in the episode "The Power" After Rigby sends several items to the moon, including "a bunch of baby ducks", and a soda machine that doesn't work using a magic keyboard called the Power. He also sends the Moon Monster there. After the park gang are accidentally sent to the moon, the monster proceeds to attack them, until Rigby uses "hamboning" to help them escape. The monster runs after the gang and unsuccessfully attempts to kill them as they use the Power to escape back home. Doom Ma Geddon Doom Ma Geddon, commonly known as Error 220 which was formerly called Error 219, is an evil computer virus who appears in the episode "Skips vs. Technology", having resided in Mordecai and Rigby's computer. As Techmo tries to eliminate him, Doom Ma Geddon takes over Techmo's body and tries to kill Mordecai, Rigby, and Skips. He can disintegrate anything his body touches by turning said objects into cubes. He is ultimately defeated when Mordecai and Rigby open up too many programs on the computer, slowing him down. This enables Skips to smash the computer with a sledgehammer, thus destroying the computer and Doom Ma Geddon at the same time and freeing Techmo from the virus's control. Other characters Muscle Bro John "Muscle Bro" Sorenstein (voiced by Steven Blum) is a truck driver who is also Muscle Man's brother. He's made appearances in "My Mom", "Trucker Hall of Fame" (once before his father's funeral, and once during a flashback sequence), "Trailer Trashed", "The End of Muscle Man", and in "Terror Tales of the Park IV". Muscle Dad Muscle Dad Sorenstein (voiced by Fred Tatasciore) is Muscle Man's deceased father who died after unloading a box on to a bear by accident. He always wanted to make Muscle Man proud of him and lied about being a forklift driver and told Muscle Man that he was a trucker ever since Muscle Man was a kid. He was a good prankster and a great dad. He made his ultimate prank by leaving Muscle Man a note after he passed, the note asked Muscle Man to spread his trucker hat ashes over the Trucker Hall of Fame and said that it was his last wish and final prank from beyond the grave. Muscle Man completes the task with the help of Mordecai and Rigby, and he comes back and saves them from the ghosts of famous truckers. He made post-death appearances in the episodes "Trucker Hall of Fame" and "The Thanksgiving Special". He also appears in "Power Tower". Quips Quintin Q. "Quips" Quippinger (voiced by Matt Price) is Skips's cousin who appeared in "Quips" and "Bachelor Party! Zingo!". He is also engaged. Quips is often found saying his catchphrase "Zingo!" When Quips is invited to game night by skips to hang out with the guys Quips annoys everyone with his childlike jokes. This gets so bad that after almost everyone gets offended Reggie throws a temper tantrum and almost destroys the seven layer dip. After this, Skips suggests that Quips does his routine at a kids show and it works out great. Quips makes his appearance in a few episodes and has inspired a fan base for his famous catchphrase, "Zingo!" The Cart Hecho En "the Alive Golf Cart" Mexico (voiced by Toby Jones), is the golf cart Mordecai and Rigby use as their way of transportation. His most distinctive appearance was when Mordecai and Rigby accidentally bring him to life (with soda spilled over his engine) while having to replace him. After doing many activities, Cart dives into sea with fireworks firing from his trunk as a final activity to do before going to the dump. After finding out he was going to stay (due to Benson being unable to afford the new cart thanks to an accounting error), Mordecai and Rigby fished him out, repaired him, and drove him back. After these events, Cart could no longer speak or move by himself. He mistakenly believes that his name is "Hecho En Mexico" because that's what is written on him ("Hecho en Mexico" means "Made in Mexico" in Spanish and is actually meant to indicate where the cart was manufactured). Johnny Skydiver Johnny Skydiver (voiced by Steve Blum) is an airplane pilot who flies the airplane and lives on an airfield and appeared in Rigby in the Sky with Burrito. Suit An outfit which is simply called Suit (voiced by Dean Cameron) is a suit-like cybernetic talking exo-suit that Benson wears in "Benson's Suit". He was created by his father, a tailor, to serve an evil boss like Rich Steve. His father refused to accept $10 since it was not enough, so Rich took the suit by force and killed his father along with Rich's guards. He later escaped from Rich after his father died, until Benson found him and wore it without knowing who the suit was. Thought it was an ordinary suit and quickly gets dirty when Benson stained it. The next day, the suit cleaned himself suddenly and appeared in front of Benson. He later revealed to Benson who he was and praised Benson as a worthy boss. He then claimed that he would help him to manage slackers like Mordecai and Rigby. When Rich Steve found him, the suit and Benson fought back and defeated Rich Steve. In the end, knowing so many evil bosses are still after him, he tells Benson to "wash" him in the washing machine in Inferno Mode to destroy him, but before he is "washed" for the greater good of peaceful kind, they admit that they will never forget their times together. Mona Desdamona, or Mona for short (voiced by Grey DeLisle), was Skips' girlfriend who knew him in the 19th century under his former name Walks. She appeared in "Diary", "Exit 9B", and had a major role in "Skips' Story". When Walks transferred to her school, she heard his plans of trying to defeat Klorgbane and tried to keep her distance from him. Eventually, the two become a couple, only for Klorgbane to accidentally kill her in a fight he was having with Walks. Muscle Mom Muscle Mom Sorenstein (voiced by Edie McClurg) is a character who is constantly referenced in many of Muscle Man's jokes. Her first appearance is in "Terror Tales of the Park IV" and her last appearance was in "Dumped At The Altar". John John (voiced by Roger Craig Smith) is Margaret's cousin who has a prosthetic leg. He appears in "Yes Dude Yes" and "Family BBQ". Hillary and Willam Hillary (voiced by Jennifer Hale in the first appearance, Katey Sagal in later appearances) and Willam (voiced by Alastair Duncan in the first appearance, Ed Begley Jr. in later appearances) are Mordecai's parents. They first appeared on The Thanksgiving Special. Barbara and Sherm Barbara (voiced by Courtenay Taylor in the first two appearances, Ali Hillis in later appearances) and Sherm (voiced by William Salyers in the first appearance, Eddie Pepitone in later appearances) are Rigby's parents. They first appeared on The Thanksgiving Special''. Not much is known about Rigby's parents, but they seem very proud of Rigby, even though he is lazy and rarely gets things done. When Rigby was in high school, he was expelled and his mother had to come pick him up. She was upset and tells him that "You're always making so much trouble for yourself". Whenever Sherm yells, makes fun of Rigby, or talks to Don, Barbara sometimes defends Rigby. In "Rigby Goes to the Prom" Rigby manages to maneuver Sherm's car to the bottom of a mountain after Sherm lost control while driving and nearly went over a cliff. Afterwards, he appeared to have more respect for Rigby. However, unknown to his parents, Rigby has more experiences involving a more dangerous situations he was in to survive than Don, until they finally acknowledged him, particularly on their older son's graduation speech about that situation he was in. As they were heading to the party, they saw the park going up into space and worriedly watch their older son go up. Stef Stef is a bat woman who appears in the finale. Mordecai met her while working in art school and they married and had kids. Andy Andy (voiced by Sean Szeles) is the older brother of the Baby Ducks. He first appears in "Brilliant Century Duck Crisis Special", where he joins the battle between his brothers and the Geese in combiners. He re-appears in "A Regular Epic Final Battle Part 2" where he tries to join the battle between Pops and Anti-Pops. Simon and Mikey Simon and Mikey (voiced by Roger Craig Smith) are two kids who appear in "High Score". They are experienced with the game "Broken Bonez", and disrespect Mordecai and Rigby until they beat their high score. They appear again in "Terror Tales of the Park III", when Benson encounters them after they egg Skips's house. One of the kids make a cameo in "Happy Birthday Song Contest". Although they are never called by their names in the show, their names appear on the credits of "High Score". Chad and Jeremy Jeremy and Chad (both voiced by Roger Craig Smith) are an ostrich and possum respectively who appear in "Replaced". Mordecai and Rigby attempt to sabotage them to ensure that Benson doesn't replace them, leading to massive brawl on the lake. Benson stops the fighting, quickly has Mordecai and Rigby fired and makes them leave before offering Chad and Jeremy the job. They turn it down due to what they had been through and leave, much to Benson's dismay. This also allows Mordecai and Rigby (who didn't actually leave the park) to keep their jobs. The duo may also both suffer with anger management issues, where they become very hostile to Mordecai and Rigby, using violence as their first resort against them when they begin to interfere in their job. They later make a cameo appearance in "Every Meat Burritos". Carl Putter Carl Putter (voiced by Christopher Mcdonald) is CJ's father who appeared in "Daddy Issues". Lake Monsters The Lake Monsters only appear in the episode "Replaced" where they help Mordecai and Rigby sabotage Chad and Jeremy's chores. One of the monsters later starts a fight between them. They also appear in the online game "All Nighter" (with their designs being slightly altered) where they serve as obstacles. Jack Farley Jack Farley (voiced by Mark Hamill) is a man who appears to be a businessman, who first appears in "High Score" when he respects Mordecai and Rigby after they beat him in "Broken Bonez". He also made a cameo in "That's My Television". Leon Leon (voiced by Steve Blum) is a homeless person and the park manager before Benson who appears in "Benson Be Gone". After Benson was fired by Susan, the new park manager, he met Leon. But when he is disgusted by Leon's careless lifestyle, he returns to the Park. Later, Leon sacrifices himself by driving into Susan in her giant form and ripping off the heels of her shoes, killing her too. The Eggscellent Knight The Eggscellent Knight (voiced by Jeff Bennett) is a character who first appeared in "Eggscellent", where he protected the Eggscellent Hat. He also appeared later in "Gamers Never Say Die", as the guardian of a golden game stamp. He once again appears in "Garage Door" as an employee of Hardware Emporium. He also made a cameo appearance in “Ace Balthazar Lives” when he tried to join the party was knocked out. He made his final appearance in “The Ice Tape” where he guards three tapes that would reveal Pops destiny. He is a parody of the knight from "Indiana Jones and the Last Crusade". Spacey McSpaceTree Spacey McSpaceTree (voiced by Steve Little) is a minor character in Regular Show. He made his debut in the Season Eight episodes "Spacey McSpaceTree" and "Space Escape". He is the mascot of the Space Tree Station and he was put into cryo-sleep for 30 years. Bird Greeter Bird Greeter (voiced by Dee Bradley Baker) is a minor character in Regular Show. He made his debut in the Season Eight episode "New Beds" He is the mascot of the UMÄK. He greeted the guys at the UMÄK store and resembles Big Bird from Sesame Street. References Cartoon Network Studios characters Regular Show Lists of characters in American television animation
12070394
https://en.wikipedia.org/wiki/Compucolor
Compucolor
Compucolor is a series of color microcomputers introduced by Compucolor Corporation of Norcross, Georgia. It was the first color home computer system with built-in color graphics and floppy-based data storage. It used the Intel 8080 CPU. The first model was an upgrade kit for the company's color computer terminal, turning the Intercolor 8001 into the Compucolor 8001 by adding more RAM and a number of optional storage systems. Released in 1976, the 8001 was soon replaced by the Compucolor II in 1977, although shipments did not start until the next year. The Compucolor II was smaller, less expensive, and used the newly introduced 5.25-inch floppy disks instead of the former 8-inch models. Compucolor opened its first retail computer store in Norcross, Georgia USA in 1979, aptly named the "Compucolor Computer Store." The store had limited success in the six months of operation, and the store concept was abandoned. By 1983, Compucolor was out of business. Products Compucolor, and its forerunner, Intercolor, produced three designs over the life of the parent company, Intelligent Systems Corporation. ISC formed in 1973 to produce color terminals. Intercolor 8001 Their first product was the Intercolor 8001, an intelligent terminal based on the Intel 8080. Released some time in early 1976 (or late 1975), it consisted of a $1,395 kit based around a 19-inch RCA delta-gun CRT and came with 4 kB of random-access memory (RAM). The monitor's three separate electron guns produced a bright and colorful picture, but had the disadvantage of requiring constant adjustment to keep the guns properly aligned. Compucolor 8001 In December 1976, the newly formed Compucolor subsidiary released the Compucolor 8001. This was another $1,295 kit that converted an Intercolor 8001 into a complete computer with BASIC on a built-in ROM. When initially booted, the machine starts in "terminal mode" an acts as a glass terminal for its RS-232 port. Pressing Escape-W launches the ROM-based BASIC interpreter, while Escape-P launched the machine code monitor program. It also included a program to aid in aligning the guns in the monitor. An optional "floppy tape" drive with two 8-track tape cartridges was available for storage, running at about 4,800 bps and storing up to 1 MB per tape. The tapes were physically identical to common 8-tracks, but had much less tape on them so they could loop around faster (8-track tapes cannot be rewound). The tape drive proved too slow to be practical, and after even relatively short periods of use the tape would stretch and be rendered useless. In 1977 they released a floppy disk controller based on the Western Digital FD1771 to support IBM 3740-style 8-inch drives, and in 1978, another supporting 8-inch drives from Shugart and Siemens. Compucolor II In 1977, ISC announced the Compucolor II, an all-in-one version of the 8001 system using a lower-cost General Electric 13-inch color television with the tuning section on the right removed and replaced by a 5.25-inch floppy disk mounted vertically. Three models were advertised, the 8 KB Model 3 for $1,495, the 16 KB Model 4 for $1,795, and the 32 KB Model 5 for $2,395. The company did not begin selling the systems until the middle of 1978, by which time the Apple II was widely available with similar specs at a lower price point. In February 1979, the prices were lowered to $1,695 for the Model 4, and $1,995 for the Model 5. Unlike the 8001, the II booted into BASIC when started. Pressing Escape-D dropped into the "File Control System" disk operating system, and pressing Escape-E returns to BASIC. System description The Compucolor II was based on the 8080 operating at 1.99 MHz clock rate and used a SMC CRT5027 video controller, a Japanese-produced version of the Texas Instruments TMS 9927, programmed to provide a screen format of 32 lines with 64 characters per line. Internal proprietary ROM firmware allowed a plot graphics array of 128 H by 128 V available in eight colors. Three available keyboards having 72 (standard), 101 (expanded), or 117 (deluxe) individual keys. which attached to the computer with a 25-pin ribbon cable. The keys were full-travel "Cherry brand" type having gold cross-bar contacts with excellent feel and reliability. Key tops were engraved with special legends to help manage computer functions. The Compucolor II used a custom designed 51.2KB 5.25" floppy disk drive, which was placed on the right side of the monitor cabinet. The design utilized a serial interface and was referred to as the "Compucolor Drive" or "CD". There were reliability issues with this design since any variance in motor spindle speed would cause difficulty reading or writing floppy media. Also there were a few electromagnetic issues within the cabinet space that interfered with the floppy recording and read process. The disk operating system known as "File Control System" or "FCS" was designed in-house. In FCS, when a file was deleted, the individual file would be removed from the file list volume and the remaining data would be moved to fill sequential empty space, using the 4 KB portion of display video RAM as a transfer buffer memory. In modern-day terms, files would be automatically defragmented to prevent cross-linked files. Software The original ROM-based BASIC 8001 was a clone of Microsoft BASIC for the 8080, differing only in the way it handled strings, requiring memory to be set aside for them using where X was a number of bytes, and having separate and to return the amount of general memory and string memory separately. After threats from Microsoft, ISC arranged a deal with the company to supply a licensed version of the language. Most legally available software for the Compucolor II was written by in-house software programmers. Over 20 software titles were officially released by Compucolor with custom 5-1/4" artwork title covers: Air Raid, Othello, Blackjack, Bounce, Chess, Cubic Tic Tac Toe, Lunar Lander, Maze Master, Sharks, Shoot, Solitaire, Star Trader, Star Trip, and Swarms. There was also a groundswell of hobbyists and user groups who created software for sale or "shareware" among its groups.The most important title for the Compucolor II was probably a game called Star Trip which mimicked the Star Trek genre. Another line of game software was also marketed widely and included titles such as, Lightning Command, Target Omega, Freebooter and Bomb Squad. References Citations Bibliography External links AtariArchives.org – Product profile Compucolor.org – Compucolor II tribute site, including javascript emulator Computer-related introductions in 1977 Z80-based home computers Home computers