id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
1559753 | https://en.wikipedia.org/wiki/Energy%20management%20system | Energy management system | An energy management system (EMS) is a system of computer-aided tools used by operators of electric utility grids to monitor, control, and optimize the performance of the generation or transmission system. Also, it can be used in small scale systems like microgrids. As electric vehicle (EV) charging becomes more popular smaller residential devices that manage when a EV can charge based on the total load vs total capacity of an electrical service are becoming popular.
Terminology
The computer technology is also referred to as SCADA/EMS or EMS/SCADA. In these respects, the terminology EMS then excludes the monitoring and control functions, but more specifically refers to the collective suite of power network applications and to the generation control and scheduling applications.
Manufacturers of EMS also commonly supply a corresponding dispatcher training simulator (DTS). This related technology makes use of components of SCADA and EMS as a training tool for control center operators.
Operating systems
Up to the early 1990s it was common to find EMS systems being delivered based on proprietary hardware and operating systems. Back then EMS suppliers such as Harris Controls (now GE), Hitachi, Cebyc, Control Data Corporation, Siemens and Toshiba manufactured their own proprietary hardware. EMS suppliers that did not manufacture their own hardware often relied on products developed by Digital Equipment, Gould Electronics and MODCOMP. The VAX 11/780 from Digital Equipment was a popular choice amongst some EMS suppliers. EMS systems now rely on a model based approach. Traditional planning models and EMS models were always independently maintained and seldom in synchronism with each other. Using EMS software allows planners and operators to share a common model reducing the mismatch between the two and cutting model maintenance by half. Having a common user interface also allows for easier transition of information from planning to operations.
As proprietary systems became uneconomical, EMS suppliers began to deliver solutions based on industry standard hardware platforms such as those from Digital Equipment (later Compaq (later HP)), IBM and Sun. The common operating system then was either DEC OpenVMS or Unix. By 2004, various EMS suppliers including Alstom, ABB and OSI had begun to offer Windows based solutions. By 2006 customers had a choice of UNIX, Linux or Windows-based systems. Some suppliers including ETAP, NARI, PSI-CNI and Siemens continue to offer UNIX-based solutions. It is now common for suppliers to integrate UNIX-based solutions on either the Sun Solaris or IBM platform. Newer EMS systems based on blade servers occupy a fraction of the space previously required. For instance, a blade rack of 20 servers occupy much the same space as that previously occupied by a single MicroVAX server.
Other meanings
Energy efficiency
In a slightly different context, EMS can also refer to a system designed to achieve energy efficiency through process optimization by reporting on granular energy use by individual pieces of equipment. Newer, cloud-based energy management systems provide the ability to remotely control HVAC and other energy-consuming equipment; gather detailed, real-time data for each piece of equipment; and generate intelligent, specific, real-time guidance on finding and capturing the most compelling savings opportunities.
Home energy management system
Home energy management (HEM) enables domestic consumers to take part in demand side activities. But, it confronts some problems resulted from the uncertainties of renewable energy resources and consumers' behaviour; while, the domestic consumers aim at the highest level of comfort that should be considered by minimizing the “response fatigue” phenomenon.
Automated control in buildings
The term Energy Management System can also refer to a computer system which is designed specifically for the automated control and monitoring of those electromechanical facilities in a building which yield significant energy consumption such as heating, ventilation and lighting installations. The scope may span from a single building to a group of buildings such as university campuses, office buildings, retail stores networks or factories. Most of these energy management systems also provide facilities for the reading of electricity, gas and water meters. The data obtained from these can then be used to perform self-diagnostic and optimization routines on a frequent basis and to produce trend analysis and annual consumption forecasts.
Energy management systems are also often commonly used by individual commercial entities to monitor, measure, and control their electrical building loads. Energy management systems can be used to centrally control devices like HVAC units and lighting systems across multiple locations, such as retail, grocery and restaurant sites. Energy management systems can also provide metering, submetering, and monitoring functions that allow facility and building managers to gather data and insight that allows them to make more informed decisions about energy activities across their sites.
See also
Energy accounting
Energy conservation measure
Energy management
Energy management software, software to monitor and optimize energy consumption in buildings or communities
Energy storage as a service (ESaaS)
Load management for balancing the supply of electricity on a distribution network.
References
Further reading
EPRI (2005) Advanced Control Room Energy Management System: Requirements and Implementation Guidance. Palo Alto, CA. EPRI report 1010076.
EEMUA 191 Alarm Systems – A Guide to Design, Management and Procurement (1999)
PAS – The Energy Management Handbook – Second Edition (2010)
SSM InfoTech Solutions Pvt. Ltd. – The Alarm Management Company Energy Management System
ASM Consortium (2009) – Effective Alarm Management Practices
ANSI/ISA–18.2–2009 – Management of Energy Systems for the Process Industries
IEC 62682 Management of Energy systems for the process industries
Electric power transmission systems
Management systems |
67063647 | https://en.wikipedia.org/wiki/Sky%20Global | Sky Global | Sky Global was a communications network and service provider based in Vancouver, Canada. Its most notable products were secure messaging application Sky ECC and secure phones. A significant share of users of its systems were international crime organizations involved in drug trafficking, and the company management was suspected of collusion.
In a series of raids against criminal organizations in several countries in early 2021, a part of Sky's infrastructure in Western Europe was dismantled, and US Department of Justice issued an arrest warrant against the company's CEO Jean-François Eap. On March 19, 2021, the company apparently shut down the operations after BlackBerry, Inc. cut it off from its services. Its website has been seized by the FBI.
Products
Sky ECC
Sky ECC was a subscription-based end-to-end encrypted messaging application. Originally developed for the BlackBerry platform, it uses elliptic-curve cryptography (ECC) for encryption. One of its features was "self-destruction" of messages after a user-defined expiration period.
Phones
The company modified Nokia, Google, Apple and BlackBerry phones, Phones supplied by the company had cameras, microphones and GPS disabled. Messages were encrypted and were automatically deleted after thirty seconds. If a phone was not contactable by the network, the message would be retained for up to 48 hours, then deleted.
The phones had a kill switch : If a user entered a "panic" password, the device would delete its contents. The company website offered a US$4 million (€3.2 million Euro) prize to anyone who could break the encryption within 90 days. They support Android, BlackBerry and iPhone apps.
Messages are stored using 521-bit elliptic-curve cryptography and network connections are protected by 2048 bit SSL.
171,000 SKY ECC devices are registered, mainly in Europe, North America, several central and South American countries – mainly Colombia – and the Middle East. A quarter of active users are in Belgium (6,000) and the Netherlands (12,000), and half of those were said to be in use around the port of Antwerp.
Raids
On 9 March 2021 around 1600 Belgian police carried out about 200 raids and arrested 48 people and seized €1.2 million in cash and 17 tonnes of cocaine. Those arrested included lawyers and members of the Hells Angels, serving police officers, an employee of the public prosecutor's office, civil servants, tax officials and hospital administrators suspected of providing information to the gangs, and people suspected of gang-related violence.
Belgian federal prosecutor said that "The operation was concentrated on taking down the Sky ECC infrastructure, dismantling the distribution network and seizing the criminal assets of the distributors" and "as many Sky ECC devices as possible" were seized from identified users. The federal prosecutor said about the encryption that "We succeeded. We will send Sky ECC the account number of the federal police".
Belgian and Dutch authorities were alleged to have been able to access the network from 15 February 2021 up to shortly before the raids. About a billion messages were intercepted, about half of which had been decrypted by April 2021—further avenues of inquiry were expected to open as decryption progressed. The Belgian police said the network they had broken into was so trusted by its criminal users that images of torture, execution orders, insider financial and operational information were freely sent.
Raids in the Netherlands were part of Operation Argus, the followup to the Lermont operation used to take down Encrochat.
Sky Global disputed claims that their servers and app had been compromised, claiming that they were aware of a fake "Sky ECC" app being available on unsecure phones.
Sky Global said they were "actively investigating and pursuing legal action against the offending individuals for impersonation, false lights, trademark infringement, injurious falsehood, defamation and fraud".
Indictment and shutdown
On March 12, 2021, US Department of Justice in San Diego, California, issued an indictment against Sky Global's CEO, Jean-Francois Eap, and a former distributor, Thomas Herdman. They were charged with a "conspiracy to violate the federal Racketeer Influenced and Corrupt Organizations Act (RICO)", and arrest warrants were issued. The indictment states that the Sky Global's devices are "specifically designed to prevent law enforcement from actively monitoring the communications between members of transnational criminal organizations involved in drug trafficking and money laundering. As part of its services, Sky Global guarantees that messages stored on its devices can and will be remotely deleted by the company if the device is seized by law enforcement or otherwise compromised."
In response, Eap has published a statement branding the allegations as false, saying that he and his company are being "targeted" because they "build tools to protect the fundamental right to privacy." "Sky Global's technology works for the good of all. It was not created to prevent the police from monitoring criminal organizations; it exists to prevent anyone from monitoring and spying on the global community. The indictment against me personally in the US is an example of the police and the government trying to vilify anyone who takes a stance against unwarranted surveillance."
On March 19, 2021, the company apparently shut down the operations after BlackBerry cut it off from its United Endpoint Manager services. Its website has been seized by the FBI.
Possible consequence
Joris van der Aa, a crime reporter for Gazet van Antwerpen, noted the importance of Operation Sky, saying, "It is a big blow because, in Belgium and a great part of the criminal underworld in the Netherlands, they really trusted Sky as a system. They were so full of confidence, and the police now have so much information on how the underworld was structured, bank accounts, all the corrupt contacts are being arrested. It takes years to build these networks ... In South America they will be thinking, 'Let's not do business with these Dutch and Belgian guys any more' ... Everyone is waiting for the storm and asking themselves what the police know."
References
Anonymity networks
Cyberspace
Dark web
Law enforcement operations
2008 establishments in British Columbia
2021 disestablishments in British Columbia |
872306 | https://en.wikipedia.org/wiki/Lahore%20University%20of%20Management%20Sciences | Lahore University of Management Sciences | Lahore University of Management Sciences (LUMS) () is a private research university, located in Lahore, Punjab, Pakistan.
In 1983, Syed Babar Ali, a renowned businessman in Pakistan, recognized the shortage of qualified managers in the country. He proposed to establish a world-class university that would attract and retain the highest caliber of students and faculty. He shared this idea with fellow businessman and close friend, Abdul Razak Dawood, who was in full support of the vision. The university has since then expanded, launching a liberal arts undergraduate school in 1994, an engineering school in 2008, a law school in 2004 and an education school in 2017. The university launched a National Outreach Programme (NOP) in 2001 to provide financial aid to students and in 2015, in partnership with Afghan government, launched a scholarship programme for Afghan students to diversify its student body.
As of 2021, the university has a student body of approximately 4,983 graduate and undergraduate students, a faculty of 300 out of which nearly three-quarters have doctoral degrees. Its campus, where more than half of its student population and faculty lives, spreads over 100 acres. Its business school is accredited by Association to Advance Collegiate Schools of Business. It is also one of two business schools in Pakistan to be certified by the South Asian Quality Assurance System and is ranked as one of the top business schools in the country. The university is also a member of Association of Commonwealth Universities.
LUMS is ranked as the top university in Pakistan in the QS University Rankings for the year 2016, 111th in Asia and among the top 700 in the world. It is also ranked by QS as among the top 250 universities globally for business and among the top 400 universities globally in mathematics. In 2020, LUMS was ranked 40 globally in "World's Best Small Universities" by Times Higher Education, being the only Pakistani university on the list. Following a liberal arts curriculum, LUMS is one of Pakistan's most expensive, selective and progressive universities. LUMS counts several prominent Pakistani intellectuals and public figures among its alumni and current and former faculty including Umar Saif, Hina Rabbani Khar, Adil Najam, Arif Zaman, Amer Iqbal, Ayesha Jalal, Asad Abidi, Osama Siddique and Pervez Hoodbhoy. It also counts several Fulbright, Chevening and Rhodes scholars among its alumni.
History
The university was granted a charter by the government of Pakistan in March 1985. The LUMS Board of Trustees comprises members of the domestic business community, academics and government representatives. The principal functions of the board are to set policy guidelines and to review the operations of the university. The Board of Governors, as the sponsor of LUMS, raises funds for the university's operation and maintenance. In 1986, a business school by the name of Lahore Business School was established for an MBA Programme. Later the school was renamed and is known as Suleman Dawood School of Business.
After the construction of the current campus, LUMS started undergraduate programmes in Economics and Computer Sciences in 1994. In 1996, the School of Arts and Science was introduced to oversee the undergraduate programmes. LUMS established the School of Humanities, Social Sciences and Law to oversee the Social Sciences, Economics and Law departments. The School of Sciences and Engineering, for the disciplines of Mathematics, Computer Science and other science subjects, was established in 2008. In 2016, the university charges Rs. 272,400 tuition fee per semester for undergraduate students. From 2020, the university changed the fee structure to a credit-based system. For the year 2021–2022, the per credit hour tuition fee was Rs. 23,760.
LUMS launched the National Outreach Programme (NOP) in 2011 to reach out to bright students from underprivileged areas of Pakistan. Under this initiative, induction of selected candidates into the academic programs will be facilitated by preparation for the university's admission criteria and then by a provision of full financial assistance to those who qualify. Many students are admitted to LUMS on the basis of NOP. There are very few number of scholarships that are offered on need/academic achievement basis. LUMS loan scheme covers 20%-100% of the tuition fee component of the student. LUMS loans are interest-free.
According to LUMS, it has disbursed PKR 3.2 Billion in financial assistance, with approximately 30% of the student body receiving some form of financial assistance each year. During the academic year 2015-16 alone, LUMS has disbursed more than PKR 500 Million as financial aid to its students. As of 2016, more than 800 scholars have benefited from the LUMS National Outreach Programme (NOP). In 2017, the Shahid Hussain Foundation established scholarships for international undergraduate students from South Asian Association for Regional Cooperation member countries. LUMS also offers a variety of scholarships to MBA students such as SAARC scholarship, MCB interest-free loans. It is the only institute in Pakistan offering the Asian Development Bank-Japan Scholarship Program (ADB-JSP)
Not-for-profit status
LUMS is a federally chartered university and is approved as a not-for-profit organisation under section 2(36) of Income Tax Ordinance, 2001 in terms of provisions of Clause 63 of Part IV of Second Schedule to the Ordinance. Any individual or organisation making donations to LUMS is entitled to a tax credit under section 61 of Income Tax Ordinance, 2001. Moreover, the university has been granted exemption from the levy of income tax under Section 159 of the Ordinance, thus, tax is not deductible on payments made to the university.
Campus
The oldest building at LUMS is the two-storeyed Academic Block designed by Habib Fida Ali which spreads over an area of 150,000 sq. ft. The Mushtaq Ahmad Gurmani School of Humanities and Social Sciences (MGSHSS) is based in this building. The five-storey Suleman Dawood School of Business (SDSB) building occupies an area of 160,000 sq. ft, and accommodates over 1300 students. The Syed Babar Ali School of Science and Engineering (SBASSE) is based in a 5-storey building which covers an area of 300,000 sq. ft; the building includes a 10MW electrical grid station and 20 research labs. The Shaikh Ahmad Hassan School of Law (SAHSOL) spreads over an area of 78,000 sq. ft and comprises auditoriums, discussion rooms, faculty offices, meeting rooms, the Centre for Chinese Legal Studies and a state of the art moot court which is a replica of the courtroom of the Chief Justice of the Lahore High Court.
More than half of the student body at LUMS lives on campus, which includes seven male and five female hostels. The Syed Maratab Ali Sports Complex includes a school gym and sports facilities for basketball, tennis, cricket and squash. The Pepsi Dining Centre (PDC) covers an area of 14,000 sq. ft, and was funded by PepsiCo. The Coca-Cola Aquatic Centre includes an Olympic-size swimming pool and is funded by a Rs. 22 million grant from the Coca-Cola Company.
The LUMS library provides services that include loans, online information searching, reference services, inter-library loan, document delivery, photocopying, viewing of audiovisual and microfilm materials, access to virtual collections and digital resources, CD-ROM and online searching. It has a collection of 350,000 volumes, 128,000 e-books and 35,000 e-Journals. The library has a multidisciplinary wing (the Khalid Ishaq Wing) dedicated to jurist and scholar Khalid M. Ishaq, who donated 92,957 books from his collection to the library.
Academics
The university consists of five schools which are divided into departments.
Suleman Dawood School of Business
The Suleman Dawood School of Business was the first school established at LUMS in 1986. The school's curriculum was designed in partnership with Harvard Business School and Ivey Business School. The school offers full-time MBA, a week-end Executive MBA, a course-based PhD Management and Bachelor's programmes in Accounting and Finance and Management Science. The school also offers minors in public management and computational finance. The school is led by Dr. Alnoor Bhimani, along with Dr. Zainab Riaz, Dr. Adeel Zaffar and Dr. Syed Aun R. Rizvi serving as Associate Deans' of Research, External Relations and Academics respectively.
The school has research linkages with many renowned universities including Harvard University, McGill University, Massachusetts Institute of Technology, University of Chicago, University of Essex, University of Sussex, National University of Singapore, and Management Development Institute.
Some prominent faculty members at the business school include Dr. Jawad Syed, Dr. Bushra Naqvi, Dr. Choudhry Tanveer Shehzad, Dr. Faiza Ali, Dr. Arif Nazir Butt, Dr. Ehsan Ul Haque, and Dr. Muhammad Shakeel Sadiq Jajja.
On 14th, November 2020, SBSD introduced hybrid class structure to balance safety and class-instruction quality during the coronavirus pandemic. In 2020, SBSD's Muhammad Abdullah scored the highest marks and was declared the global winner in ACCA's Strategic Business Reporting exam.
Mushtaq Ahmad Gurmani School of Humanities and Social Sciences
The School of Humanities and Social Sciences, named after Mushtaq Ahmed Gurmani, consists of the Department of Humanities and Social Sciences and the Department of Economics. DHSS offers undergraduate degrees in Anthropology/Sociology, History, English and Political Science, as well as a combined programme in Politics and Economics in conjunction with the Economics Department. The school also offers minors in political Science, Economics, History, English literature, Urdu literature, Religious studies, Sociology/Anthropology.
Started in 1999, the Department of Humanities and Social Science is home to disciplines in the Social Science and Humanities including Anthropology and Sociology, Literature, Philosophy, Political Science, Psychology and History. The Economics Department offers four-year undergraduate programmes in Economics (the first class graduated in 1997), economics and mathematics and a graduate programme in Economics (the first class graduated in 2002). Economics is one of the most popular majors at LUMS and a significant percentage of the student body at LUMS studies Economics as a major, as part of a joint degree programme or as a minor. The school is headed by Dr. Ali Khan.
Syed Babar Ali School of Science and Engineering
The School of Science and Engineering, named after Syed Babar Ali, is a school within LUMS modelled on MIT no boundaries approach. It offers undergraduate programs in Biology, Chemistry, Chemical Engineering, Computer Science, Electrical Engineering, Mathematics and Physics; and graduate programs in Computer Science, chemistry, physics, electrical engineering and Mathematics. A vast majority of BS graduates join leading graduate and Phd programs of some of the leading universities of the world such including ETH Zürich, MIT, Cornell, UC Berkeley, Stanford and Dartmouth college. The school is headed by Dr. Muhammad Sabieh Anwar.
Shaikh Ahmad Hassan School of Law
The groundbreaking ceremony of LUMS' fourth school, Shaikh Ahmad Hassan School of Law, took place on Saturday, 5 April 2014 on campus. The chief guest at the ceremony was the Chief Justice of Pakistan, Justice Tassaduq Hussain Jillani. The law school has been named after (late) Shaikh Ahmad Hassan. The establishment of SAHSOL has grown out of the LUMS Department of Law and Policy, which has been functioning since 2004, offers a 5-year joint BA-LL.B undergraduate programme, accredited by the Pakistan Bar Council. The school is led by Sadaf Aziz.
LUMS School of Education
On 6 January 2017, LUMS announced the establishment of its fifth school, the LUMS School of Education. The exploratory phase for the LUMS School of Education was initiated in October 2015 with funding from the Babar Ali Foundation. According to university sources, over the course of the project phase, the team established local, regional and international links through events such as the inaugural Education Roundtable at LUMS in March 2016.
The school will be home to the following programs, starting in Fall 2018.
MPhil Education Leadership and Management
A minor in education for undergraduate students at LUMS.
People
LUMS has more than 200 full-time faculty members. Some prominent former and current faculty/staff members include:
Amer Iqbal (PhD, MIT), theoretical physicist, known for his work on string theory and supersymmetric gauge theories.
Ismat Beg (PhD, Bucharest), mathematician, known for his work on Multiple-criteria decision analysis, and fixed point (mathematics).
Syed Sohail Hussain Naqvi, Vice chancellor
Arif Zaman (PhD, Stanford), a statistician and mathematician, known for his work on statistics and computer science.
Shahryar Khan, Adjunct Faculty, International Relations
S. Azmat Hassan, Adjunct Faculty, International Relations
Ayesha Jalal (PhD, Cambridge), Visiting Faculty, History
Rasul Baksh Rais (PhD, Santa Barbara), Professor of Political Science.
Irshad Hussain (PhD, University of Liverpool, UK), Professor at Department of Chemistry & Chemical Engineering.
Asad Abidi (PhD, Berkeley) holds the inaugural Abdus Salam Chair at LUMS.
Moeen Nizami
Tasneem Zehra Husain
Iqbal Ahmad Khan, ambassador to Iran
Vice-chancellors
1st Syed Zahoor Hassan
2nd Ahmad Jan Durrani
3rd Adil Najam
4th Syed Sohail Hussain Naqvi
5th Arshad Ahmad
Notable alumni
Hina Rabbani Khar - former Foreign Minister of Pakistan, currently member of the National Assembly of Pakistan
Aleema Khanum - Prime Minister Imran Khan's sister, MBA Class of 1989
Umar Saif - Former Chairman PITB Punjab
Bilal Khan - Singer
Ali Hamza - Singer, Noori musical band
Afia Nathaniel - Film Director
Bilal Lashari - Film director
Cyril Almeida - Rhodes Scholar and assistant editor of Dawn.
Momina Duraid - Pakistani producer and director. She has directed popular TV series such as Hamsafar and Zindgi Gulzar Ha
Gul Bukhari, Pakistani journalist
Haris Aziz, an artificial intelligence scientist who solved Fair cake problem in mathematics
Sana Naeem, Rhodes scholar 2018
Saman Tariq Malik, Rhodes scholar 2016
Aalene Mahum Aneeq, Ertegun Graduate Scholar, Oxford University
Research and reputation
The Office of Sponsored Programmes and Research (OSPR) of LUMS is responsible for promoting research at the university. The office is led by Shafay Shamail (PhD, Bath). Between 2010 and 2014, the university spend PKR 680 million (or about $6.5 million) in research. During this period about LUMS faculty published 1287 research papers and received 80 external grants.
The Suleman Dawood School of Business has produced more than 600 case studies and has published one of Asia's leading case research journals. Case studies written at LUMS are now used in universities across the world, including MBA programs in other Pakistani universities. In 2011, a case study written at LUMS by Shazib Shaikh and Zahoor Hassan won the Ruth Greene Memorial Award of the North American Case Research Association (NACRA) for the best case written outside North America.
The LUMS School of Science and Engineering has published in international journals in Chemistry, Biology, Mathematics, Physics, Computer Science and Electrical Engineering.
The biomechanics lab at LUMS is the sixth International Cricket Council (ICC)-accredited cricket lab in the world, following those in Brisbane, Chennai, Loughborough and Pretoria. The lab is able to perform bowling tests of international and domestic cricketers whose bowling actions are deemed illegal.
Technology for People Initiative
Technology for People Initiative (TPI) is technology and design nonprofit centre at the Lahore University of Management Sciences in Lahore, Pakistan. It is focused on solving governance problems in the public sector through design thinking, prototyping and iteration. TPI's past and ongoing projects include evidence based policing for Lahore Police, CourtBeat for judicial courts, mapping rural Pakistan and the Bahawalpur Service Delivery Unit. The centre was founded in April 2012 with a seed grant from Google.org.
Rausing Executive Development Centre, Lahore University of Management Sciences
REDC placed under the aegis of the Suleman Dawood School of Business at LUMS, Rausing Executive Development Centre has been pioneering executive education in Pakistan. It is housed in a purpose built facility. From three programmes in 1989, REDC now lists 21 programmes in its annual calendar for Open Programmes and conducts 70 programmes every year inclusive of customized programmes.
Other prominent research and development centres at the university include:
Centre for Water Informatics and Technology
Centre for Business and Society
National Incubation Centre Lahore
LUMS Energy Institute
The National Centre in Big Data and Cloud Computing
Centre for Islamic Finance
Mahbub ul Haq Research Centre
Centre for Chinese Legal Studies
LUMS Learning Institute
Centre for Continuing Education Studies
Gurmani Centre for Languages and Literature
Saida Waheed Gender Initiative
The university also houses the Pakistan office of the International Growth Centre.
University Advisory Board
The advisory board of the university consists of leading academics from around the world, current members of the board include:
Prof. Nicholas A. Robinson (Pace University School of Law)
Dr. Maria Yudkevich (Higher School of Economics)
Dr. David Wilkinson (McMaster University)
Ms. Leah Rosovsky (Harvard Business School)
Dr. Greg Moran (University of Western Ontario)
Dr. Mehmood Khan (Life Biosciences)
Prof. Denise Chalmers (University of Western Australia)
Dr. David Bloom (Harvard University)
Dr. Khalid Aziz (Stanford University)
Dr. Philip Altbach (Boston College)
Dr. Nancy J. Adler (McGill University)
Societies
Riayat LUMS Chapter
LUMS Arts Society
LUMS Entrepreneurial Society (LES)
LUMS Law & Politics Society
Sports Society at LUMS
LUMS Community Service Society (LCSS)
AIESEC
Institute of Electrical and Electronics Engineers (IEEE) - LUMS Student Chapter
LUMS Emergency Medical Services - The first ever student-managed EMS established in a university campus in Pakistan, with technical assistance from Rescue 1122 in 2008-09
LUMS Model United Nations
LUMS Society of Chemical Sciences & Engineering (LSCSE)
LUMS Finance Society - FINTRA
LUMS Media Arts Society - LMA
Society For Promotion and Development of Engineering and Sciences - SPADES
The Music Society of LUMS
Debates and Recitations at LUMS - DRUMS
LUMS Society of Professional Accountancy (LSPA)
FEMSOC (Feminist Society)
INDEX: The Design and Innovation Society
LUMS Women in Computing (LWiC)
LUMS Literary Society
LUMS Daily Student
LUMS Dramatics Society - Dramaline
See also
List of universities in Pakistan
List of engineering universities in Pakistan
Lahore School of Economics
Habib University
University of Agriculture Faisalabad
Aga Khan University
National University of Science and Technology, Pakistan
References
External links
LUMS official website
Private universities and colleges in Punjab, Pakistan
Management science
1984 establishments in Pakistan
Defence, Lahore
Educational institutions established in 1984
Universities and colleges in Lahore
Engineering universities and colleges in Pakistan
Ali family |
906830 | https://en.wikipedia.org/wiki/Stratus%20Technologies | Stratus Technologies | Stratus Technologies, Inc. is a major producer of fault tolerant computer servers and software. The company was founded in 1980 as Stratus Computer, Inc. in Natick, Massachusetts, and adopted its present name in 1999. The current CEO and president is Dave Laurello. Stratus Technologies, Inc. is a privately held company, owned solely by Siris Capital Group. The parent company, Stratus Technologies Bermuda Holdings, Ltd., is incorporated in Bermuda.
Stratus Computer was a Marlborough, Massachusetts, based producer of fault tolerant minicomputers. It competed with computers from Tandem Computers and to a lesser extent Digital Equipment Corporation's VAX.
Starting in 1983, its computers were resold worldwide by Olivetti under CPS/32 brand. Then, from 1985 to 1993, its computers were resold by IBM under the IBM System/88 brand. The company is now based in Maynard, Massachusetts.
History
Stratus shipped its first computer in February 1982, a short 21 months after its founding. The customer was the West Lynn Creamery, located in nearby Lynn, Massachusetts. This initial customer verified Stratus' strategy of competing against Tandem Computers, the company that pioneered the general purpose fault-tolerant industry. The West Lynn Creamery had planned on purchasing a Tandem but switched to Stratus after learning of their product.
The company's traditional markets have been financial services companies such as banks and stock exchanges. Beginning in the 1990s, the company moved into the telecommunications industry, particularly in the area of network management and custom services, with the result that its telecommunications revenues surpassed those from enterprise computing. This led to a buyout of the company by Ascend Communications in 1998 (later acquired by Lucent Technologies).
The enterprise server portion of the business was of little interest to Ascend and that portion was spun off in a management buyout in 1999, with funding from international investment firm, Investcorp. The company was named Stratus Technologies, Inc.
In the second quarter of 2002, Lucent sold the telecom product lines that originally came from Stratus to Platinum Equity, a buyout firm based in Los Angeles. That unit was eventually named Cemprus LLC. Stratus purchased Cemprus in 2003. It's now a wholly owned subsidiary of Stratus. This acquisition gave Stratus the SS7 signaling software for phone networks and intelligent gateway software so that traditional and IP voice equipment are able to communicate. This software can be used to support higher-level telephony applications such as calling-card and toll free phone number services.
In 2006, Stratus purchased Emergent Network Solutions of Allen, Texas. Stratus sold off Emergent in 2009, and Emergent is now known as Stratus Telecommunications. The two companies are now separate entities. One is not the parent of the other. On July 16, 2010, as a reverse merger between YMax and VocalTec - all of the Stratus Telecommunications technologies are owned by VocalTec.
In 2012, Stratus acquired the assets, products, services, and intellectual property of Marathon Technologies along with its customer base and channel-partner network.
Now privately held, Stratus Technologies, Inc. is owned by Siris Capital Group which acquired the company on April 28, 2014.
Products and customers
Its legacy product line was originally based on Motorola MC68000 processors (FT and XA series), and then migrated to Intel i860 processors (XA/R series), then to Hewlett-Packard's PA-RISC processors (Continuum series), and finally to Intel Xeon processors (V Series). That line runs the VOS operating system, which originally had many features inspired by or derived from Multics. Other operating systems supported on the legacy platforms (XA/R, Jetta / Continuum)—HP-UX and a home-grown UNIX product called FTX (Fault-Tolerant UNIX)—are supported but no longer actively sold.
In June 2002, Stratus introduced the ftServer line of Intel-based servers, running Microsoft Windows 2000 and higher. The Stratus ftServer line sold today supports Windows 2000, 2003 and 2008, as well as Red Hat Enterprise Linux. The company sells models of ftServer designated as entry-level, mid-range and enterprise-class fault tolerant servers. The mid-range and enterprise ftServer systems also run VMware vSphere virtualization software.
The company began offering Stratus Avance software in June 2008, a high availability product with virtualization built in. Avance runs on two general-purpose x86 servers and allows deployment of applications across high-availability virtual machines, freeing up existing x86 servers. The two servers comprising the Avance high-availability platform may be separated by up to three miles for purposes of disaster recovery and business continuity. Avance is intended to serve small-to-medium size businesses' need for affordable and simple high availability and virtualization.
Stratus has a large presence in Maynard, Massachusetts, its U.S. headquarters, and in Phoenix, Arizona, as well as several worldwide offices, in locations such as the UK, the Netherlands, South Africa, France, Germany, Italy, Spain, Australia, New Zealand, Singapore, Hong Kong, China and Japan.
The company has a vast customer base, but popular types of its customers include banks and credit unions, emergency response centers (such as 911 in the USA), police departments, fire departments, hospitals, clinics, governments, credit card companies, stock exchanges, telcos/phone companies and Internet providers.
References
External links
Stratus company homepage
Companies based in Maynard, Massachusetts
Computer companies of the United States
Unix variants
Fault-tolerant computer systems
Private equity portfolio companies |
3563175 | https://en.wikipedia.org/wiki/GopherVR | GopherVR | GopherVR is an enhanced Internet Gopher client that includes a 3D visualization tool for viewing resource collections as 3D scenes. It explored how people outside of formal research laboratories could use spatial metaphors to access information. The 3D view was intended to be similar to 3D games of the time, like Spectre. The authors were interested in how this spatial representation could address the "lost in hyperspace" feeling that people using conventional Gopher clients sometimes experienced.
In 1995, the Gopher developers at the University of Minnesota released GopherVR. Using Gopher+ protocol extensions, spatial positions for Gopher resources are specified, and GopherVR clients combine traditional Gopher hierarchy browsing with 3D scene navigation. It was primarily written by Mark P. McCahill, Paul Lindner and Neophytos Iacovou. This original version was available for Unix, using Motif and X11, and the classic Mac OS; although incomplete, they were offered as partially functional alpha versions for testing.
Godot was another GopherVR client. It used a Z39.50 interface to libraries, allowing you to navigate the contents of a library in 3D.
According to McCahill, GopherVR's goals included showing the potential of structures that "separate the organization from the content", so "you could display the organizational structure a bunch of different ways", which the Web did not have ways of handling at the time.
At the time GopherVR became available, the World Wide Web had recently been growing, and Gopher was already less commonly used.
Revival
The software packages for GopherVR were stored on the UMN Boombox FTP server, and (probably due to a defective backup and restore) virtually all Gopher software on this server over 96k in length had become corrupted, resulting in the loss of all publicly available copies of the source code until it was rediscovered and made available by Mark McCahill in June 2008.
In December 2009, GopherVR was re-released by Cameron Kaiser in an updated form for Mac OS X, Linux and other platforms, but is still considered incomplete.
References
External links
Floodgap GopherVR project gopherspace includes source code and Mac OS X binaries
Paper - A Preliminary Design for a 3-D Spatial User Interface for Internet Gopher
Paper - Announcing GopherVR
Rediscovered source code
GopherVR in Launchpad
Paper - Customizing Unix Servers For 3D
TurboGopherVR Client for Mac at Sunet
GopherVR Client for Irix at Sunet
Godot http://www.botik.ru/~znamensk/CTAN/tools/gopher/Unix/Godot/GODOT%20v0.1
Gopher (protocol) |
19116930 | https://en.wikipedia.org/wiki/Digital%20microscope | Digital microscope | A digital microscope is a variation of a traditional optical microscope that uses optics and a digital camera to output an image to a monitor, sometimes by means of software running on a computer. A digital microscope often has its own in-built LED light source, and differs from an optical microscope in that there is no provision to observe the sample directly through an eyepiece. Since the image is focused on the digital circuit, the entire system is designed for the monitor image. The optics for the human eye are omitted.
Digital microscopes range from, usually inexpensive, USB digital microscopes to advanced industrial digital microscopes costing tens of thousands of dollars. The low price commercial microscopes normally omit the optics for illumination (for example Köhler illumination and phase contrast illumination) and are more akin to webcams with a macro lens. An optical microscope can also be fitted with a digital camera.
History
An early digital microscope was made by a company in Tokyo, Japan in 1986, which is now known as Hirox Co. LTD. It included a control box and a lens connected to a computer. The original connection to the computer was analog through an S-video connection. Over time that connection was changed to Firewire 800 to handle a large amount of digital information coming from the digital camera. Around 2005 they introduced advanced all-in-one units that did not require a computer, but had the monitor and computer built-in. Then in late 2015 they released a system that once again had the computer separate, but connected to the computer by USB 3.0, taking advantage of the speed and longevity of the USB connection. This system also was much more compacted than previous models with a reduction in the number of cables and physical size of the unit itself.
The invention of the USB port resulted in a multitude of USB microscopes ranging in quality and magnification. They continue to fall in price, especially compared with traditional optical microscopes. They offer high-resolution images which are normally recorded directly to a computer, and which also use the computer power for their built-in LED light source. The resolution is directly related to the number of megapixels available on a specific model, from 1.3 MP, 2 MP, 5 MP and upwards.
Stereo and digital microscopes
A primary difference between a stereo microscope and a digital microscope is the magnification. With a stereo microscope, the magnification is determined by multiplying the eyepiece magnification times the objective magnification. Since the digital microscope does not have an eyepiece, the magnification cannot be found using this method. Instead the magnification for a digital microscope was originally determined by how many times larger the sample was reproduced on a 15” monitor. While monitor sizes have changed, the physical size of the camera chip used has not. As a result magnification numbers and field of view are still the same as that original definition, regardless of the size of the monitor used. The average difference in magnification between an optical microscope and a digital microscope is about 40%. Thus the magnification number of a stereomicroscope is usually 40% less than the magnification number of a digital microscope.
Since the digital microscope has the image projected directly on to the CCD camera, it is possible to have higher quality recorded images than with a stereo microscope. With the stereo microscope, the lenses are made for the optics of the eye. Attaching a CCD camera to a stereo microscope will result in an image that has compromises made for the eyepiece. Although the monitor image and recorded image may be of higher quality with the digital microscope, the application of the microscope may dictate which microscope is preferred.
Digital eyepiece for microscopes
Digital eyepiece for microscopes Software contain wide ranges of optional accessories provides multipurpose such as phase contrast observation, Bright and dark field observation, microphotography, image processing, particle size determination in µm, pathological report and patient manager, microphotograph, recording mobility video, drawing and labeling etc.
Resolution
With a typical 2 megapixel CCD, a 1600×1200 pixels image is generated. The resolution of the image depends on the field of view of the lens used with the camera. The approximate pixel resolution can be determined by dividing the horizontal field of view (FOV) by 1600.
Increased resolution can be accomplished by creating a sub-pixel image. The Pixel Shift Method uses an actuator to physically move the CCD in order to take multiple overlapping images. By combining the images within the microscope, sub-pixel resolution can be generated. This method provides sub-pixel information, averaging a standard image is also a proven method to provide sub-pixel information.
2D measurement
Most of the high-end digital microscope systems have the ability to measure samples in 2D. The measurements are done onscreen by measuring the distance from pixel to pixel. This allows for length, width, diagonal, and circle measurements as well as much more. Some systems are even capable of counting particles.
3D measurement
3D measurement is achieved with a digital microscope by image stacking. Using a step motor, the system takes images from the lowest focal plane in the field of view to the highest focal plane. Then it reconstructs these images into a 3D model based on contrast to give a 3D color image of the sample. From these 3D model measurements can be made, but their accuracy is based on the step motor and depth of field of the lens.
2D and 3D tiling
2D and 3D tiling, also known as stitching or creating a panoramic, can now be done with the more advanced digital microscope systems. In 2D tiling the image is automatically tiled together seamlessly in real-time by moving the XY stage. 3D tiling combines the XY stage movement of 2D tiling with the Z-axis movement of 3D measurement to create a 3D panoramic.
USB microscopes
Digital microscopes range from inexpensive units costing from perhaps US$20, which connect to a computer via USB connector, to units costing tens of thousands of dollars. These advanced digital microscope systems usually are self-contained and do not require a computer.
Some of the cheaper microscopes which connect via USB have no stand, or a simple stand with clampable joints. They are essentially very simple webcams with small lenses and sensors—and can be used to view subjects which are not very close to the lens— mechanically arranged to allow focus at very close distances. Magnification is typically claimed to be user-adjustable from 10× to 200-400×.
Devices which connect to a computer require software to operate. The basic operation includes viewing the microscope image and recording "snapshots". More advanced functionality, possible even with simpler devices, includes recording moving images, time-lapse photography, measurement, image enhancement, annotation, etc. Many of the simpler units which connect to a computer use standard operating system facilities, and do not require device-specific drivers. A consequence of this is that many different microscope software packages can be used interchangeably with different microscopes, although such software may not support features unique to the more advanced devices. Basic operation may be possible with software included as part of computer operating systems—in Windows XP, images from microscopes which do not require special drivers can be viewed and recorded from "Scanners and Cameras" in Control Panel.
The more advanced digital microscope units have stands that hold the microscope and allow it to be racked up and down, similarly to standard optical microscopes. Calibrated movement in all three dimensions are available through the use of a step motor and automated stage. The resolution, image quality, and dynamic range vary with price. Systems with a lower number of pixels have a higher frame rate (30fps to 100fps) and faster processing. The faster processing can be seen when using functions like HDR (high dynamic range). In addition to general-purpose microscopes, instruments specialized for specific applications are produced. These units can have a magnification range up to 0-10,000x, are either all-in-one systems (computer built-in) or connect to a desktop computer. They also differ from the cheaper USB microscopes in not only the quality of the image, but also in capability, and the quality of the system's construction giving these types of systems a longer lifetime.
See also
USB microscope
Digital image
Microscope
High dynamic range
Optical microscope
Hirox
Digital pathology
References
Microscopes |
346994 | https://en.wikipedia.org/wiki/Browser%20exploit | Browser exploit | A browser exploit is a form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the intent to breach browser security to alter a user's browser settings without their knowledge. Malicious code may exploit ActiveX, HTML, images, Java, JavaScript, and other Web technologies and cause the browser to run arbitrary code.
Symptoms
Users whose web browsers have fallen victim of a successful browser exploit may find their homepage, search page, and/or favorites have been changed. Other signs include Internet settings options within the browser being altered, access being blocked to specific functions, and the redirection of incorrectly typed URL prefixes.
Prevention
There are multiple ways users can protect their web browsers from falling victim to a browser exploit. Such things include installing firewall software, keeping software updated, being cautious when downloading files, and not opening email attachments from unknown sources.
Notable browser exploits
JailbreakMe is a series of browser based exploits used to jailbreak Apple's iOS mobile operating system. It uses an exploit in the browser's PDF parser to execute unauthorised code and gain access to the underlying operating system.
See also
Browser security
Comparison of web browser vulnerabilities
References
External links
Online Threats - Browser exploits | WOT Web of Trust
Web security exploits
Web browsers |
12393503 | https://en.wikipedia.org/wiki/Dentrix | Dentrix | Dentrix was the first dental practice management software for Microsoft Windows when it was launched in 1989 by Dentrix Dental Systems, a firm founded by Larry M. Gibson in 1985 and is based in American Fork, Utah. The Dentrix dental practice management system was designed to automate as many of the functions within the dental office as possible .
History
In 1997, Henry Schein, Inc. purchased Dentrix Dental Systems, which became Henry Schein Practice Solutions or HSPS and has continued to develop and release new versions and products. The firm at one point provided their own digital imaging software, Dentrix Image. In 2007, the Dentrix Image product was sold to DEXIS, LLC.
Product features
Dentrix products include practice management software for dental offices, imaging software, patient education software, computer-based training software, voice recognition software, and other products designed to enhance the dental office experience.
In 2012, the firm launched the Dentrix Developer Program (DDP), a program allowing third party vendors to access the Dentrix database through APIs. The program has steadily grown since then to include more than 250 vendors from all over the applications spectrum.
Dentrix vulnerabilities
When Dentrix G5 was released to the market, the client and server was vulnerable to packet sniffing. If someone finds the password to their site, then they would know the password to all sites. This was fixed in G5 PP1 HotFix 1. Now the password is randomly generated.
Dentrix G6 uses Data Camouflage. From US-CERT.GOV, "Faircom c-treeACE provides a weak obfuscation algorithm (CWE-327) that may be unobfuscated without knowledge of a key or password. The algorithm was formerly called Faircom Standard Encryption but is now called Data Camouflage."
Dentrix G6 uses Hard Coded Credentials.
Federal Trade Commission Fine
In 2016, The Federal Trade Commission reported that Henry Schein, the provider and distributor of Dentrix, will be forced to pay $250,000 to settle Federal Trade Commission charges it falsely advertised the level of encryption it provided to protect patient data in the software Dentrix G5.
See also
List of FLOSS healthcare programs
References
Capterra reviews for Dentrix: https://www.capterra.com/p/2329/Dentrix/#reviews
External links
Dental practice management software
1985 establishments in Utah
Healthcare software for Windows
Digital imaging |
8453893 | https://en.wikipedia.org/wiki/Claimed%20moons%20of%20Earth | Claimed moons of Earth | Claims of the existence of other moons of Earth—that is, of one or more natural satellites with relatively stable orbits of Earth, other than the Moon—have existed for some time. Several candidates have been proposed, but none has been confirmed. Since the 19th century, scientists have made genuine searches for more moons, but the possibility has also been the subject of a number of dubious non-scientific speculations as well as a number of likely hoaxes.
Although the Moon is Earth's only natural satellite, there are a number of near-Earth objects (NEOs) with orbits that are in resonance with Earth. These have been called "second" moons of Earth.
, an asteroid discovered on 27 April 2016, is possibly the most stable quasi-satellite of Earth. As it orbits the Sun, 469219 Kamoʻoalewa appears to circle around Earth as well. It is too distant to be a true satellite of Earth, but is the best and most stable example of a quasi-satellite, a type of near-Earth object. They appear to orbit a point other than Earth itself, such as the orbital path of the NEO asteroid 3753 Cruithne. Earth trojans, such as , are NEOs that orbit the Sun (not Earth) on the same orbital path as Earth, and appear to lead or follow Earth along the same orbital path.
Other small natural objects in orbit around the Sun may enter orbit around Earth for a short amount of time, becoming temporary natural satellites. , the only confirmed examples have been in Earth orbit during 2006 and 2007, and in Earth orbit between 2018 and 2020.
History
Petit's moon
The first major claim of another moon of Earth was made by French astronomer Frédéric Petit, director of the Toulouse Observatory, who in 1846 announced that he had discovered a second moon in an elliptical orbit around Earth. It was claimed to have also been reported by Lebon and Dassier at Toulouse, and by Larivière at Artenac Observatory, during the early evening of March 21, 1846.
Petit proposed that this second moon had an elliptical orbit, a period of 2 hours 44 minutes, with apogee and perigee. This claim was soon dismissed by his peers. The perigee is similar to the cruising altitude of most modern airliners, and within Earth's atmosphere. Petit published another paper on his 1846 observations in 1861, basing the second moon's existence on perturbations in movements of the actual Moon. This second moon hypothesis was not confirmed either.
Petit's proposed moon became a plot point in Jules Verne's 1870 science fiction novel Around the Moon.
Waltemath's moons
In 1898 Hamburg scientist Dr. Georg Waltemath announced that he had located a system of tiny moons orbiting Earth. He had begun his search for secondary moons based on the hypothesis that something was gravitationally affecting the Moon's orbit.
Waltemath described one of the proposed moons as being from Earth, with a diameter of , a 119-day orbital period, and a 177-day synodic period. He also said it did not reflect enough sunlight to be observed without a telescope, unless viewed at certain times, and made several predictions of its next appearances. "Sometimes, it shines at night like the sun but only for an hour or so."
E. Stone Wiggins, a Canadian weather expert, ascribed the cold spring of 1907 to the effect of a second moon, which he said he had first seen in 1882 and had publicized the find in 1884 in the New-York Tribune when he put it forward as probable cause of an anomalous solar eclipse of May of that year. He said it was also probably the "green crescent moon" seen in New Zealand and later in North America in 1886, for periods of less than a half-hour each time. He said this was the "second moon" seen by Waltemath in 1898. Wiggins hypothesized that the second moon had a high carbon atmosphere but could be seen occasionally by its reflected light.
The existence of these objects put forward by Waltemath (and Wiggins) was discredited after the absence of corroborating observation by other members of the scientific community. Especially problematic was a failed prediction that they would be seen in February 1898.
The August 1898 issue of Science mentioned that Waltemath had sent the journal "an announcement of a third moon", which he termed a wahrhafter Wetter und Magnet Mond ("real weather and magnet moon"). It was supposedly in diameter, and closer than the "second moon" that he had seen previously.
Other claims
In 1918, astrologer Walter Gornold, also known as Sepharial, claimed to have confirmed the existence of Waltemath's moon. He named it Lilith. Sepharial claimed that Lilith was a 'dark' moon invisible for most of the time, but he claimed to be the first person in history to view it as it crossed the Sun.
In 1926 the science journal Die Sterne published the findings of amateur German astronomer W. Spill, who claimed to have successfully viewed a second moon orbiting Earth.
In the late 1960s John Bagby claimed to have observed over ten small natural satellites of Earth, but this was not confirmed.
General surveys
William Henry Pickering (1858–1938) studied the possibility of a second moon and made a general search ruling out the possibility of many types of objects by 1903. His 1922 article "A Meteoritic Satellite" in Popular Astronomy resulted in increased searches for small natural satellites by amateur astronomers. Pickering had also proposed the Moon itself had broken off from Earth.
In early 1954 the United States Army's Office of Ordnance Research commissioned Clyde Tombaugh, discoverer of Pluto, to search for near-Earth asteroids. The Army issued a public statement to explain the rationale for this survey. Donald Keyhoe, who was later director of the National Investigations Committee on Aerial Phenomena (NICAP), a UFO research group, said that his Pentagon source had told him that the actual reason for the quickly-initiated search was that two near-Earth objects had been picked up on new long-range radar in mid-1953. In May 1954, Keyhoe asserted that the search had been successful, and either one or two objects had been found. At The Pentagon, a general who heard the news reportedly asked whether the satellites were natural or artificial. Tombaugh denied the alleged discovery in a letter to Willy Ley, and the October 1955 issue of Popular Mechanics magazine reported:
At a meteor conference in Los Angeles in 1957, Tombaugh reiterated that his four-year search for natural satellites had been unsuccessful. In 1959, he issued a final report stating that nothing had been found in his search.
Modern status
It was discovered that small bodies can be temporarily captured, as shown by , which was in Earth orbit in 2006–2007.
In 2010, the first known Earth trojan was discovered in data from Wide-field Infrared Survey Explorer (WISE), and is currently called .
In 2011, planetary scientists Erik Asphaug and Martin Jutzi proposed a model in which a second moon would have existed 4.5 billion years ago, and later impacted the Moon, as a part of the accretion process in the formation of the Moon.
In 2018, it was confirmed two dust clouds orbited Earth at the Moon's , known as the Kordylewski clouds. These were nicknamed "Earth's hidden moons".
The interpretation of some bodies has led to sometimes bold statements in the astronomy press, though often allowing for other interpretations:
Co-orbiting objects
Although no other moons of Earth have been found to date, there are various types of near-Earth objects in 1:1 resonance with it, they orbit at a similar distance as Earth the Sun, rather than the planet itself. Their orbits are unstable, and will fall into other resonances or be kicked into other orbits over thousands of years. The orbit of a satellite of Earth fundamentally depends on the gravity of the Earth–Moon system, whereas the orbit of a co-orbiting object would negligibly change if Earth and the Moon were suddenly removed because a quasi-satellite is orbiting the Sun on an Earth-like orbit in the vicinity of Earth.
Over time co-orbital objects can be close to or switch between being quasi-satellites. 3753 Cruithne was once nicknamed "Earth's second moon", after its discovery in 1986. Though it turned out that it actually orbits the Sun, being a case of a co-orbiting object with a horseshoe orbit relative to Earth.
Quasi-satellites
Some co-orbiting objects are called quasi-satellites because of their very close orbit and very similar orbital period with Earth, seemingly orbiting Earth. The known current quasi-satellites of Earth are particularly 469219 Kamoʻoalewa and , as well as , , and .
Earth trojans
Earth possesses two known trojans, and , which are small Solar System bodies also orbiting the Sun in a 1:1 resonance with Earth, rather than the Earth itself, but staying with the gravitationally-stable Earth-Sun leading Lagrange point.
Temporary satellites
Computer models by astrophysicists Mikael Granvik, Jeremie Vaubaillon, and Robert Jedicke suggest that these "temporary satellites" should be quite common; and that "At any given time, there should be at least one natural Earth satellite of 1 meter diameter orbiting the Earth." Such objects would remain in orbit for ten months on average, before returning to solar orbit once more, and so would make relatively easy targets for manned space exploration. "Mini-moons" were further examined in a study published in the journal Icarus.
It has been proposed that NASA search for temporary natural satellites, and use them for a sample return mission.
1913
The earliest known mention in the scientific literature of a temporarily-captured orbiter is by Clarence Chant about the Meteor procession of 9 February 1913:
Later, in 1916, William Frederick Denning surmised that:
2006
On 14 September 2006, an object estimated at 5 meters in diameter was discovered in near-polar orbit around Earth. Originally thought to be a third-stage Saturn S-IVB booster from Apollo 12, it was later determined to be an asteroid and designated as . The asteroid re-entered solar orbit after 13 months and is expected to return to Earth orbit after 21 years.
2015
In April 2015, an object was discovered orbiting Earth, and initially designated , but more detailed investigation quickly showed the object to be the Gaia spacecraft, and the object's discovery soon was retracted.
On 3 October 2015, a small object, temporarily designated WT1190F, was found to be orbiting Earth every ~23 days, and had been orbiting since at least late 2009. It impacted Earth on 13 November 2015 at 06:18:34.3 UTC (±1.3 seconds).
2016
On 8 February 2016 an object ~0.5 meter in diameter was discovered orbiting Earth with a period of 5 days and given the temporary designation XC83E0D, and most likely lost. The object was later identified as the lost artificial satellite SR-11A, or possibly its companion SR-11B, which were launched in 1976 and lost in 1979.
On 8 April 2016, an object, given the temporary designation S509356, was discovered with an orbital period of 3.58 days. Although it has the typical area-to-mass ratio (m2/kg) of satellites, it has a color typical of S-type asteroids. It was later identified as the Yuanzheng-1 stage from the launch of Chinese navigation satellites.
2017
On 8 December 2017, the object YX205B9 was discovered with an orbital period of 21 days, on an eccentric orbit taking it from slightly beyond the geocentric satellite ring to almost twice the distance of the Moon. It was later identified as the booster stage from the Chang'e 2 mission.
2018-2020
was discovered in 2020, and orbited around Earth from 2018 to May 2020.
List
Literature
The writer Jules Verne learned of Petit's 1861 proposal and made use of the idea in his 1870 novel, Around the Moon. This fictional moon was not, however, exactly based on the Toulouse observations or Petit's proposal at a technical level, and so the orbit suggested by Verne was mathematically incorrect. Petit died in 1865, and so was not alive to offer a response to Verne's fictional moon.
Seun Ayoade's science-fiction adventure Double Bill has a twin-mooned parallel Earth.
Eleanor Cameron's Mushroom Planet novels for children (starting with the 1954 The Wonderful Flight to the Mushroom Planet) are set on a tiny, habitable second moon called Basidium in an invisible orbit from Earth. There is an even smaller moon (a captured M-type asteroid) called Lepton orbiting at only .
The 1956 Tom Swift, Jr. juvenile novel, Tom Swift on the Phantom Satellite, features a new moon entering Earth orbit at altitude. A 1963 sequel, Tom Swift and the Asteroid Pirates, has the moon Nestria, also called Little Luna, which was originally an asteroid and was moved into Earth orbit at altitude. It was claimed for the United States and a research base was established there by Swift Enterprises.
Samuel R. Delany's 1975 novel Dhalgren features an Earth that mysteriously acquires a second moon named George.
In Haruki Murakami's 2011 novel 1Q84, a second moon, irregularly-shaped and green in color, is visible to some characters in the story.
See also
– second moon in astrology
References
Further reading
Research paper describing horseshoe orbits.
Willy Ley: "Watchers of the Skies", The Viking Press NY,1963,1966,1969
Carl Sagan, Ann Druyan: "Comet", Michael Joseph Ltd, 1985,
Tom van Flandern: "Dark Matter, Missing Planets & New Comets. Paradoxes resolved, origins illuminated", North Atlantic Books 1993,
Joseph Ashbrook: "The Many Moons of Dr Waltemath", Sky and Telescope, Vol 28, Oct 1964, p. 218, also on pp. 97–99 of "The Astronomical Scrapbook" by Joseph Ashbrook, Sky Publ. Corp. 1984,
Delphine Jay: "The Lilith Ephemeris", American Federation of Astrologers 1983,
William R. Corliss: "Mysterious Universe: A handbook of astronomical anomalies", Sourcebook Project 1979, , p 146–157 "Other moons of the Earth", pp. 500–526 "Enigmatic objects"
Clyde Tombaugh: Discoverer of Planet Pluto, David H. Levy, Sky Publishing Corporation, March 2006
Richard Baum & William Sheehan: "In Search of Planet Vulcan" Plenum Press, New York, 1997 , QB605.2.B38
External links
Earth’s Other Moon
The Earth's Second Moon, 1846–present
A detailed explanation of secondary moon theories
Have astronomers discovered Earth's second moon?
Near-Earth asteroid 3753 Cruithne --Earth's curious companion--
Hypothetical bodies of the Solar System
History of astronomy
Claimed of Earth
Claimed of Earth |
733853 | https://en.wikipedia.org/wiki/List%20of%20video%20games%20based%20on%20anime%20or%20manga | List of video games based on anime or manga | Also known as anime-based games, this is a list of computer and video games that are based on manga or anime properties. The list does not include games based on American cartoons, which are separately listed at List of video games based on cartoons.
#
7 Blades
A
Aah! Harimanada (Game Boy, Game Gear, Mega Drive)
Accel World: Ginyoku no Kakusei (PlayStation 3, PlayStation Portable, 2012)
Accel World: Kasoku no Chōten (PlayStation 3, PlayStation Portable, 2013)
Ace wo Nerae! (Super Famicom, Telenet Japan, December 24, 1993, ¥9400, Tennis)
Ah! My Goddess! (PC-FX, NEC, December 29, 1993, ¥8000, Adventure)
Quiz Ah! My Goddess!: Tatakau Tsubasa to Tomo ni (Arcade, Sega/Wow Entertainment Inc./Kodansha, May 2000, Adventure/Quiz)
Quiz Ah! My Goddess!: Tatakau Tsbasa to Tomo ni (Dreamcast, Sega/Wow Entertainment Inc./Kodansha, November 20, 2000, ¥5800/¥8800, Adventure)
Akazukin Chacha (Game Boy, Tomy, 1995)
Akazukin ChaCha (Super Famicom, Tomy, 1996, Role-playing)
Akazukin ChaCha: Osawagase! Panic Race! (PC-FX, NEC, October 25, 1996, ¥7800, Board)
Akira (Famito, ¥6800, Role-playing)
Akira (CD-32, AMI, Famicom)
Akira Psycho Ball (PlayStation 2, 2006)
Akuma-kun: Makai no Wana (Family Computer)
Angelic Layer (Game Boy Advance)
Amnesia (visual novel) (PlayStation Portable)
Ao no Exorcist: Genkoku no Labyrinth (PlayStation Portable, 2012, Visual novel)
Ao no Exorcist: Weekend Hero (PlayStation Portable)
Aoi Blink (PC Engine)
Appleseed EX (PlayStation 2)
Appleseed: Prometheus no Shintaku (Super Famicon)
Araiguma Rascal: Raccoon Rascal (Super Famicom)
Area 88 (Arcade, Capcom, August 1989, Shooting, titled U.N. Squadron in North America)
Area 88 (Super Famicom, Capcom, July 26, 1991, ¥8500, Shooting, titled U.N. Squadron in North America)
Armored Police Metal Jack (Game Boy, Super Famicom)
Armored Trooper Votoms (Various consoles)
Armored Trooper Votoms Gaiden: Blue Knight Berserga Story (PlayStation, Takara, October 30, 1997, ¥9800/¥5800, 3D fighting)
Armored Troopers Votoms: Woodo.Kummen (PlayStation, Takara, April 2, 1998, ¥9800/¥5800, 3D action)
Armored Trooper Votoms: Lightning Slash (PlayStation, Takara, March 18, 1999, ¥9800/¥5800, 3D action)
Armored Troopers Votoms: Steel Force (PlayStation, Takara, September 30, 1999, ¥6800, Strategy)
Ashita no Joe (Super Famicom, Kei Amuzement, November 27, 1992, ¥8900, Boxing)
Ashita no Joe no Densetsu (NeoGeo, Boxing)
Astro Boy (PlayStation 2)
Attack on Titan (PC, PlayStation 3, PlayStation 4, PlayStation Vita, Xbox One)
Attack on Titan: Humanity in Chains (Nintendo 3DS)
Attack on Titan Tribute Game (PC)
Attack on Titan 2 (PC)
Aura Battler Dunbine (MSX, PlayStation)
B
Bakemonogatari Portable (PlayStation Portable, 2012, Visual Novel)
Bakugan Battle Brawlers (video game) (PlayStation 2, Xbox 360, Wii, Nintendo DS, PlayStation Portable)
Bakuretsu Hunter (Sega Saturn, Aimax, April 26, 1996, ¥8800, Adventure)
Bakuretsu Hunter Mahjongg Special (PlayStation, Banpresto, October 25, 1996, ¥5800, Mahjongg)
Bakuretsu Hunter: Sorezore no Omoi...Nowānchatte (PlayStation, Banpresto, April 11, 1997, ¥5800, Adventure)
Bakuretsu Hunter R (Sega Saturn, King Records, August 8, 1997, ¥5800, Adventure)
Bastard! Ankoku no Hakaishin (Super Famicom, Cobra Team, 1994, 3D FIghting/Action)
Bastard! (PlayStation, Seta/Shueisha, December 27, 1996, ¥6800, Role-playing)
Battle B-Daman (Game Boy, Game Boy Advance, Nintendo 64, Super Famicom)
Battle Mages Free (Android Mobile)
Beck: The Game (PS2)
Berserk: Millennium Falcon Hen Seima Senki no Shō (PlayStation 2, Sega-Sammy, October 2004, 3D Action/Adventure)
Berserk and the Band of the Hawk (PlayStation 3, PlayStation 4, October 2016, Musou)
Berserk: Sword of the Berserk: Guts' Rage (Dreamcast, Yuke's/ASCII, December 1999, 3D Action/Adventure)
Beyblade
Bikkuriman World (PC Engine, Hudson, October 30, 1987, ¥4500, Action)
Bikkuriman Daijikai (PC Engine, Hudson, December 23, 1988, ¥4980, Quiz)
Bikkuriman World Gekitō Seisenshi (Famicom, Hudson, July 27, 1990, ¥6800, Role-playing)
Super Bikkuriman (Super Famicom, Interbec, January 29, 1993, ¥8190, Fighting/Action)
Bikkuriman 2000 Viva! Festiva! (Dreamcast, Sega Toys, May 2, 2000, ¥4800, Minigames)
Bikkuriman 2000 Viva! Pocket Festiva! (Neo Geo Pocket Color, Sega Toys, March 16, 2000, ¥3800, Minigame)
Bikkuriman 2000 Viva! Festiva! (Game Boy Color, Imagineer, June 10, 2000, ¥3980, Card)
Bikkuriman 2000 Viva! Festiva! (Dreamcast, Sega Toys, May 2, 2000, ¥4800, Boardgame)
Bishoujo Senshi Sailor Moon (PC Engine, Super Famicom, Mega Drive, Game Boy)
Black Cat (PlayStation 2)
Black Clover: Dream Knights (Android)
Black Clover: Quartet Knights (PlayStation 4, PC, 2018)
Black Rock Shooter: The Game (PlayStation Portable)
Bleach: The 3rd Phantom Nintendo DS}
Bleach: Blade Battlers (PlayStation 2)
Bleach: Blade Battlers 2nd (PlayStation 2)
Bleach: The Blade of Fate (Nintendo DS October 9, 2007; Europe February, 2008)
Bleach GC (Nintendo GameCube)
Bleach: Heat the Soul (PlayStation Portable)
Bleach: Heat the Soul 2 (PlayStation Portable)
Bleach: Heat the Soul 3 (PlayStation Portable)
Bleach: Heat the Soul 4 (PlayStation Portable)
Bleach: Heat the Soul 5 (PlayStation Portable)
Bleach: Heat the Soul 6 (PlayStation Portable)
Bleach: Heat the Soul 7 (PlayStation Portable)
Bleach: Shattered Blade (Wii, Release Date(s): JPN December 14, 2006; North America)
Bleach: Soul Carnival (PlayStation Portable)
Bleach: Soul Carnival 2 (PlayStation Portable)
Bleach: Soul Resurrección (PS3)
Blood+: The final piece (PlayStation Portable, 2006, Adventure RPG)
Blood The Last Vampire (PlayStation 2, 2006)
Blood+: One Night Kiss (PlayStation 2, 2006, Action Shooter)
Blood+: Sōyoku no Battle Rondo (PlayStation 2, 2006, Adventure Game)
Blue Seed: Kushinada-hime Hirokuden (Saturn, Sega, June 23, 1995, ¥5800, Role-playing)
Boboboubo Boubobo (PlayStation 2)
Boboboubo Boubobo: 9 Kiwame Senshi Gyagu Yuugou (Game Boy Advance)
Boboboubo Boubobo: Bakutou Hajike Taisen (Game Boy Advance)
Boboboubo Boubobo Dassutsu! Hajike Royale (Nintendo Gamecube)
Boboboubo Boubobo: Majide!!? Shinken Shoubu (Game Boy Advance)
Boboboubo Boubobo: Ougi 87.5 Bakuretsu Hanage Shinken (Game Boy Advance)
Boboboubo Boubobo: Shuumare! Taikan Boubobo: (PlayStation 2)
Boku no Hero Academia: Battle For All (Nintendo 3DS, 2016)
Boku no Hero Academia: One's Justice (PlayStation 4, Xbox One, Nintendo Switch, PC, 2018)
Bouken ou Beet: Darkness Century (PlayStation 2)
Boys Be... (PlayStation, PlayStation 2)
Brave Fencer Musashi (PlayStation)
Brave Story: New Traveler (PlayStation Portable, 2006, RPG)
Bravoman (Arcade, Namco, 1998)
Chōzetsu Rinjin Bravoman (PC Engine, Namco, ¥6800, 1998)
Bubblegum Crash! (PC Engine, Naxat, December 6, 1991, ¥7200, Adventure)
Busou Renkin: Welcome To Papillion Park (PlayStation 2)
C
Captain Tsubasa (Famicom, Super Famicom, Game Boy, Game Boy Advance, Sega-CD, PlayStation, PlayStation 2, Nintendo Gamecube, PlayStation Portable)
Cardcaptor Sakura (PlayStation, Game Boy Color, Sega Dreamcast, Game Boy Advance, Wonderswan)
Chibi Maruko-chan (Famicom, Super Famicom, Game Boy, Game Boy Color, Mega Drive, Neo Geo, Sega Saturn, PlayStation, Nintendo DS)
Chobits (Game Boy Advance. PlayStation 2)
Cobra (see List of Cobra video games)
Code Geass Hangyaku no Lelouch (Nintendo DS)
Code Geass - Hangyaku no Lelouch R2 - Banjou no Geass Gekijou (Nintendo DS)
Code Geass: Lost Colors (PlayStation Portable, PlayStation 2)
Cowboy Bebop (PlayStation)
Cowboy Bebop (PlayStation 2)
Crayon Shin-chan (Famicom, Super Famicom, Game Boy Advance, Nintendo DS, Wii)
Crusher Joe (PC-9801)
Cyborg 009 (Sega-CD, Super Famicom, PlayStation)
Cyborg Kuro-chan (Game Boy Color)
D
D.Gray-man: Kami no Shitotachi (Nintendo DS)
D.Gray-man Sōsha no Shikaku (PlayStation 2)
D.N. Angel: Crimson Wings (PlayStation 2)
Dengeki Bunko Fighting Climax (PlayStation 3, PlayStation Vita)
Dengeki Bunko Fighting Climax Ignition (PlayStation 3, PlayStation 4, PlayStation Vita)
Death Connection (PlayStation Portable)
Death Note Kira Game (Nintendo DS)
Death Note L o Tsugumono (Nintendo DS)
L the Prologue to Death Note -Rasen no Wana- (Nintendo DS)
Detective Conan (game list)
Detective Pikachu
Demon Beast Invasion (PC98)
Demon Slayer: Kimetsu no Yaiba – The Hinokami Chronicles (Microsoft Windows, PlayStation 4, PlayStation 5, Xbox One, Xbox Series X/S)
Detonator Orgun (Mega CD)
Devastator (Mega CD)
Devil Hunter Yoko (Mega Drive)
Devilman (PlayStation)
Di Gi Charat Fantasy (Dreamcast visual novel game based on Di Gi Charat)
Digimon (PlayStation, PlayStation Portable, PlayStation 2, Nintendo DS, Game Boy Advance, Gamecube, Sega Saturn, WonderSwan, WonderSwan Color, Xbox)
Dinosaur King (Nintendo DS)
Dirty Pair (Famicom Disk System)
Doraemon (PC Engine, Famicom, Super Famicom, Mega Drive, Game Boy Color)
Dragon Ball (see List of Dragon Ball video games)
Dragonia
Duel Masters (see the list of video games)
Durarara!! 3 Way Stand Off (PlayStation Portable game based on Durarara!!; Japan only)
Doki Doki! Pretty Cure Narikiri Life! (Nintendo 3DS)
E
El Hazard: Shinpi no Sekai (Sega Saturn)
Erementar Gerad (PlayStation 2)
Eureka Seven vol. 1: The New Wave (PlayStation 2)
Eureka Seven vol. 2: The New Vision (PlayStation 2)
Eyeshield 21: MAX Devil Power (Nintendo DS)
F
Fairy Tail: Portable Guild (PlayStation Portable)
Fairy Tail: Portable Guild 2 (PlayStation Portable)
Fairy Tail: Zeref Awakens (PlayStation Portable)
Fairy Tail: Fight! Wizard Battle (Nintendo DS)
Fairy Tail: Attack! Kardia Cathedral (Nintendo DS)
Fate/extra (PlayStation Portable)
Fate/unlimited codes (PlayStation Portable, PS2, arcade)
Final Approach (PlayStation 2)
Fist of the North Star (see List of Fist of the North Star video games)
Fullmetal Alchemist 2: Curse of the Crimson Elixir (PlayStation 2)
Fullmetal Alchemist 3: Kami o Tsugu Shōjo (PlayStation 2)
Fullmetal Alchemist and the Broken Angel (PlayStation 2)
Fullmetal Alchemist: Dual Sympathy (Nintendo DS)
Fullmetal Alchemist: Senaka wo Takuseshi Mono (PlayStation Portable)
Fullmetal Alchemist: Daughter of the Dusk (Wii)
Fullmetal Alchemist: Yakusoku no Hi e (PlayStation Portable)
Fushigi no Umi no Nadia (Family Computer, Mega Drive, PC Engine, FM Towns, PC-98, Sharp X68000, PlayStation 2)
Futari wa Precure (Game Boy Advance)
Future GPX Cyber Formula (Game Boy, Super Famicom, PlayStation, PC, PlayStation 2, GameCube, PlayStation Portable)
Fushigi Yugi (Nintendo DS, PlayStation 2, PlayStation Portable)
Futari wa Pretty Cure: Arienai! Yume no Sono wa Daimeikyu (Game Boy Advance)
Futari wa Pretty Cure (Sega Pico)
Futari wa Pretty Cure Max Heart - DANZEN! DS de Pretty Cure Chikara wo Awasete Dai Battle!! (Nintendo DS)
Futari Wa Pretty Cure Max Heart: Maji? Maji!? Fight de IN Janai (Game Boy Advance)
Futari Wa Pretty Cure Splash Star - Panpaka Game De Zekkouchou! (Nintendo DS)
Fresh Pretty Cure! Asobi Collection (Nintendo DS)
G
Game ni Natta yo! Dokuro-chan ~ Kenkou Shindan Daisakusen
Gantz: The Game (PlayStation 2)
Gate Keepers (PlayStation)
GD Leen (Super Famicom)
Get Backers: The Stolen City of Infinite (PlayStation 2)
Get Backers Dakkanoku: Dakkandayo! Zenin Shuugou!! (PlayStation 2)
Get Backers Dakkanoku: Ura Shinjuku Saikyou Battle (PlayStation 2)
Ghost in the Shell (based on Ghost in the Shell; PlayStation)
Ghost in the Shell: Stand Alone Complex (based on Stand Alone Complex; PlayStation 2, PlayStation Portable)
Ghost Sweeper Mikami (Super Famicom, PC Engine)
Gintama Dīesu Yorozuya Daisōdō! (Nintendo DS)
Gintama Gintama Kuesuto Gin-san ga Tenshoku-shitari Sekai o Sukuttari (Nintendo DS)
Gintama Gintoki vs Hijikata!? Kabuki-cho Gintama Daisōdatsusen!! (Nintendo DS)
GioGio's Bizarre Adventure (PS2)
Girlfriend of Steel (based on Neon Genesis Evangelion; Sega Saturn, PlayStation)
Girlfriend of Steel 2 (based on Neon Genesis Evangelion)
Girls und Panzer: Senshadō, Kiwamemasu! (PS Vita)
Goldfish Warning! (Game Boy, Super Famicom)
Golgo 13: Top Secret Episode (NES, Vic Tokai, 1988)
Golgo 13 II: The Mafat Conspiracy (NES, Vic Tokai, 1990)
Gon (Super Famicom)
Gon: Baku Baku Baku Baku Adventure (Nintendo 3DS)
Go! Princess Pretty Cure - Sugar Oukoku to Rokunin no Princess! (Nintendo 3DS)
Grand Chase (based on Grand Chase manga series)
Guilty Crown: Lost Christmas (PC)
Gundam:
Battle Assault 3 featuring Gundam Seed (PlayStation 2)
Dynasty Warriors: Gundam (PlayStation 3, Xbox 360)
Dynasty Warriors: Gundam 2 (PlayStation 3, Xbox 360)
Dynasty Warriors: Gundam 3 (PlayStation 3, Xbox 360)
Gundam 00 (Nintendo DS, PlayStation 2)
Gundam 0079 (PlayStation)
Gundam Battle Assault (PlayStation)
Gundam Battle Assault 2 (PlayStation)
Gundam Seed: Battle Assault (GBA)
Gundam vs. Gundam (PlayStation Portable)
Gundam vs. Gundam Next Plus (PlayStation Portable)
Mobile Suit Gundam: Char's Counterattack (PlayStation)
Mobile Suit Gundam: Encounters in Space (PlayStation 2)
Mobile Suit Gundam: Federation vs. Zeon (PlayStation 2)
Mobile Suit Gundam: Journey to Jaburo (PlayStation 2)
Mobile Suit Gundam Side Story 0079: Rise from the Ashes (Sega Dreamcast)
Mobile Suit Gundam: Zeonic Front (PlayStation 2)
Gungrave (PlayStation 2)
Gungrave: Overdose (2004, PlayStation 2, sequel to Gungrave)
H
Hagane no Renkinjutsushi (Game Boy Advance)
Haikyuu!! Cross Team Match! (Nintendo 3DS)
Haikyu!! Tsunage! Itadaki no Keshiki!! (Nintendo 3DS)
Hajime no Ippo: The Fighting! (1997, PlayStation)
Hajime no Ippo: Victorious Boxers (2000, PlayStation 2, Victorious Boxers: Ippo's Road to Glory)
Hajime no Ippo: Victorious Boxers Championship Version (2002, PlayStation 2)
Hajime no Ippo: The Fighting! (2002, Game Boy Advance)
Hajime no Ippo: The Fighting! - All Stars (2004, PlayStation 2, Victorious Boxers 2: Fighting Spirit)
Hajime no Ippo 2: Victorious Road (2004, PlayStation 2)
Hajime no Ippo: Revolution (2007, Wii, Victorious Boxers: Revolutions)
Hajime no Ippo: The Fighting! DS (2008, Nintendo DS)
Hajime no Ippo: THE FIGHTING! Portable Victorious Spirits (PlayStation Portable)
Hajime no Ippo: The Fighting (2014, PlayStation 3)
Hamtaro (Game Boy Advance)
Hana no Keiji: Kumo no Kanata ni (Super Famicom)
Haō Taikei Ryū Knight (Super Famicom)
Haunted Junction: Seitokai Batch o Oe! (PlayStation)
Hayate no Gotoku (Nintendo DS, PlayStation Portable)
Happiness Charge Pretty Cure! Kawarun☆Collection (Nintendo 3DS)
Heartcatch Pretty Cure! Oshare Collection (Nintendo DS)
Hello Kitty (Famicom, Game Boy Color)
Hetalia (Nintendo DS, PlayStation Portable)
Hi no Tori (Family Computer, MSX2)
Hidamari Sketch Dokodemo Sugoroku × 365 (Nintendo DS)
Higanjima (PlayStation Portable)
Highschool DXD: Erotic Battle Adventure Game (Nintendo 3DS)
Highschool! Kimen-gumi (Sega Mark III/Master System)
Himiko Den
Himouto! Umaru-chan: Umaru Training Plan (PS Vita)
Hokuto no Ken (see List of Fist of the North Star video games)
Honkai Impact 3rd (Android, iOS, PC)
Honō no Dōkyūji: Dodge Danpei
Hunter × Hunter: Ichi o Tsugomono (2000, WonderSwan)
Hunter × Hunter: Hunter no Keifu (2000, Game Boy Color)
Hunter × Hunter: Maraboroshi no Greed Island (2000, PlayStation)
Hunter × Hunter: Kidan no Hihou (2001, Game Boy Color)
Hunter × Hunter: Sorezore no Ketsui (2001, WonderSwan Color)
Hunter × Hunter: Ubawareta Aura Stone (2001, PlayStation)
Hunter × Hunter: Michibi Kareshi Mono (2001, WonderSwan Color)
Hunter × Hunter: Ryumyaku no Saidan (2001, PlayStation 2)
Hunter × Hunter: Minna Tomodachi Daisakusen (2003, Game Boy Advance)
Hunter × Hunter: Greed Island (2003, WonderSwan Color)
Hunter x Hunter (In Jump Super Stars) (2005, Nintendo DS)
Hunter x Hunter (In Jump Ultimate Stars) (2006, Nintendo DS)
Hunter x Hunter: Wonder Adventure (2012, PlayStation Portable)
Hunter x Hunter (In J-Stars Victory VS) (2014 PlayStation 3, PlayStation Vita)
I
Idol Janshi Suchie-Pai (based on Su Chi Pai series of hentai mahjong games)
Initial D Extreme Stage (PlayStation 3)
Initial D: Special Stage (PlayStation 2)
InuYasha: A Feudal Fairytale (PlayStation)
InuYasha: Feudal Combat (PlayStation 2)
Inuyasha: Secret of the Cursed Mask (PlayStation 2)
Inuyasha: Secret of the Divine Jewel (Nintendo DS)
Inazuma Eleven (Nintendo DS)
Inazuma Eleven Strikers (Wii)
Inazuma Eleven Strikers 2012 Xtreme (Wii)
Inazuma Eleven GO Strikers 2013 (Wii)
Initial D Arcade Stage
Ichigeki Sacchuu!! HoiHoi-San (Playstation 2)
Iria (Super Famicom)
J
J-Stars Victory Vs (PS3, PS Vita)
Jankenman (Game Boy)
Jump Super Stars (Nintendo DS)
Jump Ultimate Stars (Nintendo DS)
Jungle no Ōja Tar-chan: Sekai Manyū Dai Kakutō no Maki (Super Famicom)
JoJo's Bizarre Adventure (Super Famicom)
JoJo's Bizarre Adventure (Heritage for the Future) (Dreamcast, Playstation, Playstation 3, Xbox 360)
JoJo's Bizarre Adventure: All Star Battle (PlayStation 3)
JoJo's Bizarre Adventure: Eyes of Heaven (PlayStation 3, PlayStation 4)
JoJo's Bizarre Adventure: Phantom Blood (Playstation 2)
K
K-On! Houkago Live!! (PlayStation Portable)
Kachō Kōsaku Shima (Super Famicom, Nintendo DS)
Kaitou Saint Tail (Game Gear, Sega Saturn)
Kakutō Ryōri Densetsu Bistro Recipe: Gekitō Food & Battle Hen (Game Boy Color)
Kakutō Ryōri Densetsu Bistro Recipe: Kettō Bistogarumu Hen (Game Boy Color)
Kakutō Ryōri Densetsu Bistro Recipe: Wonder Battle Hen (WonderSwan Color)
Kanbutsu Himouto! Umaru-chan Daratto Puzzle (Nintendo 3DS)
Karakuri Kengō Den Musashi Lord (Game Boy, Family Computer)
Katte ni Shirokuma: Mori o Sukue no Maki! (Family Computer)
Kekko Kamen (PC-98)
Kimagure Orange Road (PC-98)
Kimi ni Todoke: Sodateru Omoi (Nintendo DS)
Kimi ni Todoke: Tsutaeru Kimochi (Nintendo DS)
Kishin Douji Zenki (Game Gear)
Kishin Douji Zenki - Battle Raiden (Super Famicom)
Kishin Douji Zenki - Den Ei Rai Bu (Super Famicom)
Kishin Douji Zenki - Tenchi Meidou (Super Famicom)
Kishin Douji Zenki FX - Vajura Fight (NEC PC-FX)
Kiteretsu Daihyakka (Family Computer, Game Boy, Super Famicom)
Konjiki no Gash Bell
Kōryū no Mimi (Super Famicom)
KOU-GA-SHA ~Space Odyssey~
Kujaku Ou (Mark III, Mega Drive, Famicom)
Kuroshitsuji: Phantom and Ghost (Nintendo DS)
Kyatto Ninden Teyandee (Famicom)
Kyo Kara Maoh! Oresama Quest (PC)
Kyo Kara Maoh! Shin Makoku no Kyuujitsu (PS2)
Kyo Kara Maoh! Hajimari no Tabi (PS2)
Koe De Asobou - HeartCatch Pretty Cure! (Nintendo DS)
L
La Blue Girl (NEC PC-9801, FM-Towns, Windows 95)
Laid-Back Camp - Virtual - Fumoto Campsite (Android, iOS, Windows, PlayStation 4, Nintendo Switch)
Laid-Back Camp - Virtual - Lake Motosu (Android, iOS, Windows, PlayStation 4, Nintendo Switch)
Last Game
Legend of Galactic Heroes (Famicom, Super Famicom, PC-98)
Love Hina Love Hina Gorgeous (PlayStation 2, Game Boy Advance)
Lovely Idol (PlayStation 2)
Little Nemo: The Dream Master (NES)
Little Witch Academia: VR Broom Racing (Oculus Quest, HTC Vive, Valve Index, PSVR, SteamVR)
Little Witch Parfait (series)
Lucky Star (series)
Lupin III: Treasure of the Sorcerer King (PlayStation 2)
Serial: Experiments Lain (PlayStation 1)
M
Magic Knight Rayearth (Sega Saturn, Game Gear, Game Boy, Super Famicom)
Magical Hat no Buttobi Tabo! Daibōken (Mega Drive)
Magical Taluluto (Game Boy, Family Computer, Mega Drive, Game Gear, Super Famicom)
Mahjong Hishō-den: Naki no Ryū (Sharp X68000, PC-9801, Super Famicom)
Mahōjin Guru Guru (Super Famicom, Game Boy, Game Boy Color)
Mahou no Princess Minky Momo (Famicom)
Mahou Tsukai Kurohime (Playstation 2)
Mahou Sensei Negima (Game Boy Advance, PlayStation 2, Nintendo DS, PlayStation Portable)
Maison Ikkoku (PC Engine)
Marmalade Boy (Super Famicom, Game Boy)
Martian Successor Nadesico: The Blank of Three Years (Sega Saturn)
Martian Successor Nadesico: The Mission (Dreamcast)
Mashin Eiyūden Wataru (PC Engine, Family Computer)
[)
Maya the Bee (Game Boy Advance)
Mazinger Z (Arcade, Super Famicom)
Medabots Megazone 23: Aoi Garland (PlayStation 3)
Meine Liebe Mermaid Melody Pichi Pichi Pitch (Game Boy Advance)
Miracle Girls (Super Famicom)
Mobile Battleship Nadesico (Sega Saturn)
Mobile Battleship Nadesico: Ruriruri Mahjong (Game Boy Color)
Monochrome Factor Cross Road (Japanese PS2s or PS3 only)
Mōryō Senki MADARA (Famicom)
Mōryō Senki MADARA 2 (Super Famicom)
MS Saga: A New Dawn (PlayStation 2; a crossover game that featured many mobile suits and was meant to bring in new fans)
Mugen Senshi Valis (an OVA called Genmu Senki Leda was made using the Valis games as a template, but the property itself is unrelated)
MysticLegendN
Nagagutsu o Haita Neko: Sekai Isshū 80 Nichi Dai Bōken (Family Computer)
Nakayoshi All-Stars: Mezase! Gakuen Idol! (Nintendo DS)
Nanatsu no Taizai: Knights of Britannia (PlayStation 4, 2018)
Nanatsu no Taizai: Unjust Sin (Nintendo 3DS, 2015)
Nana (PlayStation 2)
Nana: Everything Is Controlled By The Great Demon King!? (PlayStation Portable)
Nana: Live Staff Mass Recruiting! Beginners Welcome (Nintendo DS)
Nangoku Shōnen Papuwa-kun (Game Boy, Super Famicom)
Nari Kids Park: HUGtto! Pretty Cure (Nintendo Switch)
Naruto: The Broken Bond (Xbox 360)
Naruto: Clash of Ninja (Nintendo GameCube)
Naruto: Clash of Ninja 2 (Nintendo GameCube)
Naruto: Clash of Ninja Revolution (Wii)
Naruto: Clash of Ninja Revolution 2 (Wii)
Naruto: Gekitō Ninja Taisen!(Great Ninja Battle!) 3 (Nintendo GameCube)
Naruto: Gekitō Ninja Taisen!(Great Ninja Battle!) 4 (Nintendo GameCube)
Naruto: Konoha Ninpouchou (WonderSwan Color)
Naruto: Konoha Senki (Game Boy Advance)
Naruto: Ninja Council (Game Boy Advance)
Naruto: Ninja Council 2 (Game Boy Advance)
Naruto: Ninja Council 3 (Nintendo DS)
Naruto: Path of the Ninja (Naruto RPG: Uketsugareshi Hi no Ishi) (Nintendo DS)
Naruto: Path of the Ninja 2 (Naruto RPG 3: Reijū vs. Konoha Shōtai) (Nintendo DS)
Naruto: Rise of a Ninja (Xbox 360)
Naruto: Shinobi no Sato no Jintori Kassen (PlayStation)
Naruto: Ultimate Ninja (PlayStation 2, PlayStation portable)
Naruto: Ultimate Ninja 2 (PlayStation 2, PlayStation portable)
Naruto: Ultimate Ninja 3 (PlayStation 2, PlayStation portable)
Naruto: Ultimate Ninja Storm (PlayStation 3)
Naruto: Uzumaki Chronicles (PlayStation 2)
Naruto: Uzumaki Chronicles 2 (PlayStation 2)
Naruto Shippūden: Clash of Ninja Revolution 3 (Wii)
Naruto Shippūden: Gekitō Ninja Taisen! EX (Wii)
Naruto Shippūden: Gekitō Ninja Taisen! EX 2 (Wii)
Naruto Shippūden: Gekitō Ninja Taisen! EX 3 (Wii)
Naruto Shippūden: Gekitō Ninja Taisen! Special (Wii)
Naruto Shippūden: Legends: Akatsuki Rising (PlayStation Portable)
Naruto Shippuden: Naruto vs. Sasuke (Nintendo DS)
Naruto Shippūden: Ninja Council 4 (Nintendo DS)
Naruto Shippuden: Shinobi Rumble (Nintendo DS)
Naruto Shippūden: Ultimate Ninja 4 (Naruto Shippūden: Narutimate Accel) (PlayStation 2)
Naruto Shippūden: Ultimate Ninja 5 (Naruto Shippūden: Narutimate Accel 2) (PlayStation 2)
Naruto Shippuden: Ultimate Ninja Impact (PlayStation Portable)
Naruto Shippuden: Ultimate Ninja Storm 2 (PlayStation 3), (Xbox 360)
Naruto Shippuden: Ultimate Ninja Storm 3 (PlayStation 3), (Xbox 360), (PC)
Naruto Shippuden: Ultimate Ninja Storm 4 (Xbox One), (PlayStation 4), (PC)
Naruto Shippuden: Ultimate Ninja Storm Generations (PlayStation 3), (Xbox 360)
Naruto Shippuden: Ultimate Ninja Storm Revolution (PlayStation 3), (Xbox 360), (PC)
Natsuki Crisis Battle (Super Famicom)
Nee Pon? x Rai Pon! (PC)
Neon Genesis Evangelion: Neon Genesis Evangelion 64 (Nintendo 64, 1999)
Neon Genesis Evangelion: Ayanami Raising Project (PC, Dreamcast, PlayStation 2, Nintendo DS)
Neon Genesis Evangelion: Neon Genesis Evangelion 2 (PlayStation 2, 2004)
Neon Genesis Evangelion: Shinji Ikari Raising Project (Windows, 2004)
Neon Genesis Evangelion: The Secret of Evangelion (PlayStation 2, 2006)
Neon Genesis Evangelion: Meitantei Evangelion (PlayStation 2, 2007)
Neon Genesis Evangelion: Battle Orchestra (PlayStation 2, 2008)
Neon Genesis Evangelion: Evangelion: Jo (PlayStation 2, 2009)
New Mobile Report Gundam Wing: Endless Duel (Super Famicom)
Nichijou: Uchuujin (PlayStation Portable)
Nightwalker: The Midnight Detective (PC-9801, Windows 2000)
Ninja Hattori-kun (Family Computer)
Nintama Rantarō (Game Boy, Game Boy Color, Super Famicom, Windows, Playdia, Sega Pico, Nintendo 64, Nintendo DS)
Nostradamus ni Kiite Miro (PC)
OObake no Q-tarō: WanWan Panic (Family Computer)Oishinbo (Family Computer, Nintendo DS)One Piece (Game Boy Advance)One Piece: Gear Spirits (Nintendo DS)One Piece Grand Adventure (PlayStation 2, GameCube)One Piece Grand Battle! (PlayStation 2, PSone, GameCube)One Piece Grand Battle 3 (PlayStation 2, GameCube)One Piece: Pirate Warriors (PlayStation 3)One Piece: Pirates Carnival (PlayStation 2, GameCube)One Piece: Pirate Warriors 2 (PS3, PS Vita)One Piece Treasure Battle! (GameCube)One Piece: Unlimited Adventure (Wii)One Piece: Unlimited Cruise: The Treasure Beneath the Waves (Wii)One Piece: Unlimited Cruise 2: Awakening of a Hero (Wii)One Piece: Pirate Warriors 3One Piece: Unlimited World RedOne Piece: Burning BloodOne Piece: World SeekerOne Piece: Pirate Warriors 4Ookiku Furikabutte - Honto no Ace ni Nareru kamo (Nintendo DS)Ore no Imouto ga Konnani Kawaii Wake ga Nai. HappyenD (PlayStation 3)Ore no Imouto ga Konna ni Kawaii Wake ga Nai Portable (PlayStation Portable)Ore no Imouto ga Konnani Kawaii Wake ga Nai Portable ga Tsuzuku Wake ga Nai (PlayStation Portable)Ore no Imouto Maker EX (PlayStation Portable)Osomatsu-kun: Hachamecha Gekijō (Mega Drive)Osu!! Karate Bu (Super Famicom)Ouran Koukou Host Club (PlayStation 2; Japan only)Ouran Koukou Host Club DS (Nintendo DS; Japan only)
P
Parasol Henbee (Game Boy, Family Computer)
Patlabor (Famicom Disk System, Game Boy, Mega Drive, Turbo CD, PlayStation, PlayStation Portable)Perman (Famicom)Pokémon Puzzle League (Nintendo 64)Pokémon Yellow (Game Boy Color)Pokonyan! (Game Boy, Super Famicom)Pretty Cure All Stars Everyone Gather ☆ Let's Dance! (Wii)Pretty Cure Connection PuzzlunPretty Cure OnlinePretty Soldier Sailor Moon (Arcade)The Prince of Tennis - Driving Smash! Side Genius (Nintendo DS)The Prince of Tennis - Driving Smash! Side King (Nintendo DS)
Princess Princess: Hime-tachi no Abunai Hōkago (PlayStation 2)
Project Arms in Europe(Germany) only Arms (PlayStation 2)
Psychometrer Eiji (PlayStation game upon which a manga has been made)
Puella Magi Madoka Magica Portable (PlayStation Portable; Japan only)
Puella Magi Madoka Magica: The Battle Pentagram (PS Vita)
Puss 'n Boots: Pero's Great Adventure NESPuyo PuyoQ
The Quiz MasterR
R: Rock'n Riders (PlayStation)
Raki Suta Moe Doriru Ranma 1/2 (Super Famicom, PlayStation, Game Boy, PC 98, Mega CD)
Rave Master (GameCube)
Rave Master: Special Attack Force! (Game Boy Advance)
Really? Really! (PC, Nintendo DS)
Re:Zero − Starting Life in Another World: Death or Kiss (PS Vita, PlayStation 4)
Re:Zero − Starting Life in Another World: The Prophecy of the Throne (Windows, PlayStation 4, Nintendo Switch)
Rebuild of Evangelion Sound Impact (PlayStation Portable)
Ring ni Kakero (Super Famicom)
Ro-Kyu-Bu! Naisho no Shutter Chance (PS Vita)
Rokudenashi Blues (Family Computer, Super Famicom)
Rosario + Vampire Capu2: Koi to Yume no Rhapsodia (PlayStation 2)
Rosario + Vampire: Tanabata no Miss Yōkai Gakuen (Nintendo DS)
Rozen Maiden: ALiBAT (freeware game for PC)
Rozen Maiden: Duellwalzer (PlayStation 2)
Rozen Maiden: Gebetgarten (PlayStation 2)
Rurouni Kenshin: Enjō! Kyoto Rinne (PlayStation 2)
Rurouni Kenshin: Meiji Kenkaku Roman Tan Saisen (PlayStation Portable)
Rurouni Kenshin: Meiji Kenyaku Romantan (PlayStation)
RWBY: Grimm Eclipse (PlayStation 4, Xbox One Microsoft Windows, macOS)
RWBY: Crystal Match (Android, iOS)
RWBY: Amity Arena (Android)
RWBY Deckbuilding Game (Android, Microsoft Windows)
RWBY (mobile game) (iOS, Android, PC)
SSaikano (PlayStation 2)Sailor Moon (see List of Sailor Moon video games)Saint SeiyaSakigake!! Otokojuku (Game Boy, Family Computer, PlayStation, PlayStation 2)Samurai 7 (PlayStation 2)Samurai Champloo (PlayStation 2)Samurai Deeper Kyo (GBA)Scarlet Nexus (Windows, PlayStation 4, PlayStation 5, Xbox One, Xbox Series X, Xbox Series S; released alongside the anime series.)School Rumble: 2nd Semester – Summer Training Camp (of fear?)!! Ghost's Appearing in the Western-styled Building!? Fighting Over the Treasure!!! (PlayStation 2)School Rumble: Sis This is Serious! (PlayStation Portable)School Rumble: Sleep Helps a Girl Grow (PlayStation 2)Science Ninja Team Gatchaman (Atari ST, Amiga, Amstrad CPC, Commodore 64, ZX Spectrum, PC-98, PlayStation, PlayStation 2)Serial Experiments Lain (PlayStation)Shaman King Cho-Senjiryakketsu 2 (Game Boy Advance)Shaman King Cho-Senjiryakketsu 3 (Game Boy Advance)Shaman King Cho-Senjiryakketsu: Funbari Version (Game Boy Color)Shaman King Cho-Senjiryakketsu: Meramera Version (Game Boy Color)Shaman King: Funbari Spirits (PlayStation 2)Shaman King: Legacy of the Spirits - Soaring Hawk (Game Boy Advance)Shaman King: Legacy of the Spirits - Sprinting Wolf (Game Boy Advance)Shaman King: Master of Spirits (Game Boy Advance)Shaman King: Master of Spirits 2 (Game Boy Advance)Shaman King: Power of Spirit (PlayStation 2)Shaman King: Soul Fight (Nintendo GameCube)Shaman King: Spirit of Shamans (PlayStation)Shaman King: Will to the Future (WonderSwan Color)Shijou Saikyou no Deshi Kenichi (PlayStation 2)Shin Lucky Star Moe DrillShin Lucky Star Moe Drill TabidachiShogo: Mobile Armor Division (PC)Shojo Kakumei Utena (Sega Saturn)Shokuhoko no Soma - Yuujou to Kizuna no Hitosara (Nintendo 3DS)Shoukoushi Cedie (Family Computer)Shugo Chara! Three Eggs and the Joker in Love! (Nintendo DS)Shugo Chara! Amu's Rainbow-Colored Chara Change! (Nintendo DS)Shugo Chara! Norinori! Chara Formation-Rhythm (Nintendo DS)Skip Beat (PlayStation 2)Soar High! IsamiSonic X (Leapster)Sonic Soldier Borgman (Sega Mark III/Master System)Sora no Otoshimono Forte: Dreamy Season (Nintendo DS)Sotsugyo and Sotsugyou MSoul Eater: Battle Resonance (PlayStation 2, PlayStation Portable)Soul Eater: Monotone Princess (Wii)Soul Eater: Plot of Medusa (Nintendo DS)Spice and Wolf VR (Windows, PlayStation 4, Nintendo Switch, Oculus Go, Oculus Quest)Spice&Wolf VR2 (Windows, PlayStation 4, Nintendo Switch, Oculus Go, Oculus Quest)Spriggan: Lunar Verse (PlayStation)Sukisho! (PC, PlayStation 2)Super Bikkuriman (Super Famicom)Super GALS! Kotobuki Ran (Game Boy Color)Super GALS! Kotobuki Ran 2 ~Miracle -> Getting~ (Game Boy Color)Super GALS! Kotobuki Ran Special -> Coolmen Get you Gals Party -> (PlayStation)Sutobasu Yarō Shō (Super Famicom)Episode 1: Suki na Mono wa Suki Dakara Shouganai!! -FIRST LIMIT- (PC, PlayStation 2)Episode 2: Suki na Mono wa Suki Dakara Shouganai!! -TARGET NIGHTS- (PC, PlayStation 2)Episode 3: Suki na Mono wa Suki Dakara Shouganai!! -RAIN- (PC, PlayStation 2)Episode 4: Suki na Mono wa Suki Dakara Shouganai!! +White Flower+ (PC)Sword Art Online Alicization Rising Steel (Android, iOS)Sword Art Online: Fatal Bullet (Windows, Xbox One, PlayStation4, Nintendo Switch)Sword Art Online: Hollow Fragment (PS Vita, PS4)Sword Art Online: Infinity Moment (PlayStation Portable)Sword Art Online: Integral Factor (Android, iOS)Sword Art Online: Lost Song (PS3, PS Vita)SWORD ART ONLINE:Memory Defrag (Android, iOS)Sword of the Berserk: Guts' Rage (Sega Dreamcast)Smile Pretty Cure! Let's Go! Märchen World (Nintendo 3DS)Suite Pretty Cure: Melody Collection (Nintendo DS)
TTakahashi Meijin no Bug-tte Honey (Famicom, Hudson Soft, June 5, 1987)Teasing Master Takagi-san VR - 1st Semester (Oculus Quest, HTC Vive, Valve Index)Teasing Master Takagi-san VR - 2nd Semester (Oculus Quest, HTC Vive, Valve Index)Tekkaman Blade (Game Boy, Super Famicom, NEC PC-9801)Tekken Tag Tournament Two (Xbox 360, PlayStation 3)Tenchi Muyo! Game-Hen (Super Famicom)Tenchi Muyo! Toukou Muyou (PlayStation, Sega Saturn)Tengen Toppa Gurren LagannTennis no Oujisama 2005 Crystal Drive (Nintendo DS)Tennis no Oujisama: Boys Be Glorious (Nintendo DS)Tennis no Oujisama: Girls Be Gracious (Nintendo DS)Tennis no Oujisama: Smash Hits (PlayStation 2)Tennis no Oujisama: Smash Hits 2 (PlayStation 2)Tensai Bakabon (Sega Mark III/Master System)Terrorist Invasion (PlayStation 3, PlayStation 2)
Tetsuwan Atom (1988, Family Computer)Tick! Tack! (PC)Toaru Majutsu no Index (PlayStation Portable)To Love-Ru Darkness: Battle Ecstasy (PS Vita)Tokimeki Memorial Girl's Side 1st Love (Nintendo DS, PS2)Tokimeki Memorial Girl's Side: 2nd Kiss (Nintendo DS)Tokyo Mew Mew (Game Boy Advance, PlayStation)Top Striker (Family Computer)Toradora! Portable (PlayStation Portable)Tottemo! Luckyman: Everyone Loves Lucky Cookie!! (Game Boy)Tottemo! Luckyman: Lucky Cookie Roulette Assault!! (Super Famicom)Trigun: The Planet GunsmokeTsubasa Chronicle (Nintendo DS)
U
U.N. Squadron, see Area 88 Uchuu no Stellvia (PlayStation 2, Game Boy Advance)
Ultraman (Super Famicom, Mega Drive)
Ueki no Hōsoku (PlayStation 2, Game Boy Advance)
Urotsukidoji (PC98)
Urusei Yatsura (MSX2, Game Boy, Mega CD)
Ushio and Tora (Famicom, Super Famicom)
Utsurun Desu.: Kawauso Hawaii e Iku!!! (Family Computer)
VVampire Hunter D (PlayStation)Vampire Knight (DS)Venus Wars (Famicom)Victorious Boxers 2 - Fighting Spirit (PlayStation 2)Victorious Boxers - Ippo's Road to Glory (PlayStation 2)Victorious Boxers: Revolution (Wii)Violinist of Hameln (Super Famicom)
W
W Wish Wagamama Fairy Mirumo de Pon! (Game Boy Advance)
Wangan Midnight (Arcade, PS2, PS3)
Wedding Peach (Super Famicom, Game Boy, PC-98)
Wedding Peach: Doki Doki Oiro-naoshi Fashion Dai-sakusen (PlayStation)
World Trigger: Borderless Mission (PlayStation Vita)
X
X: Card of Fate (WonderSwan Color)
X: Unmei no Sentaku (PlayStation)
YYadamon (Super Famicom)Yes! Pretty Cure 5 (Nintendo DS)Yes! Pretty Cure 5 GoGo! - Zenin ShūGo! Dream Festival (Nintendo DS)Youchien Senki MADARA (Super Famicom)Yu-Gi-Oh! 5D's: Decade Duels (Xbox 360, PlayStation 3)Yu-Gi-Oh! 5D's: Master of the Cards (Wii)Yu-Gi-Oh! 5D's Mobile (i-mode, EZweb, Yahoo! Mobile)Yu-Gi-Oh! 5D's Stardust Accelerator: WORLD CHAMPIONSHIP 2009 (Nintendo DS)Yu-Gi-Oh! 5D's: Tag Force 4 (PlayStation Portable)Yu-Gi-Oh! 5D's: Tag Force 5 (PlayStation Portable)Yu-Gi-Oh! 5D's: Tag Force 6 (PlayStation Portable)Yu-Gi-Oh! 5D's: Wheelie Breakers (Wii)Yu-Gi-Oh! 5D's WORLD CHAMPIONSHIP 2010: Reverse of Arcadia (Nintendo DS)Yu-Gi-Oh! 5D's WORLD CHAMPIONSHIP 2011: Over the Nexus (Nintendo DS)Yu-Gi-Oh! Arc-V Tag Force Special (PlayStation Portable)Yu-Gi-Oh! Capsule Monsters Coliseum (PlayStation 2)Yu-Gi-Oh! The Dawn of Destiny (Xbox)Yu-Gi-Oh! Duel Arena (PC)Yu-Gi-Oh! Duel Monsters (Game Boy)Yu-Gi-Oh! Duel Monsters 4: Battle of the Powerful Duelists (Game Boy Color)Yu-Gi-Oh! Duel Monsters 5: Expert 1 (Game Boy Advance)Yu-Gi-Oh! Duel Monsters 6: Expert 2 (Game Boy Advance)Yu-Gi-Oh! Duel Monsters 7: The Duelcity Legend (Game Boy Advance)Yu-Gi-Oh! Duel Monsters 8: Great False God of Destruction (Game Boy Advance)Yu-Gi-Oh! Duel Monsters Expert 2006 (Game Boy Advance)Yu-Gi-Oh! Duel Monsters Expert 3 (Game Boy Advance)Yu-Gi-Oh! Duel Monsters GX: Aim to be Duel King! (Game Boy Advance)Yu-Gi-Oh! Duel Monsters GX: Card Almanac (Nintendo DS)Yu-Gi-Oh! Duel Monsters GX: Spirit Summoner (Nintendo DS)Yu-Gi-Oh! Duel Monsters GX: Tag Force (PlayStation Portable)Yu-Gi-Oh! Duel Monsters GX: Tag Force 2 (PlayStation Portable)Yu-Gi-Oh! Duel Monsters GX: Tag Force Evolution (PlayStation 2)Yu-Gi-Oh! Duel Monsters II: Dark Duel Stories (Game Boy Color)Yu-Gi-Oh! Duel Monsters III: Tri-Holy God Event (Game Boy Color)Yu-Gi-Oh! Duel Monsters International 2 (Game Boy Advance)Yu-Gi-Oh! Duel Monsters: Nightmare Troubadour (Nintendo DS)Yu-Gi-Oh! Duel Monsters WORLD CHAMPIONSHIP 2007 (Nintendo DS)Yu-Gi-Oh! Duel Monsters WORLD CHAMPIONSHIP 2008 (Nintendo DS)Yu-Gi-Oh! Dungeon Dice Monsters (Game Boy Advance)Yu-Gi-Oh! Falsebound Kingdom: The Confined Imaginary Kingdom (Nintendo GameCube)Yu-Gi-Oh! Millennium Duels (Xbox 360, PlayStation 3)Yu-Gi-Oh! Monster Capsule: Breed & Battle (PlayStation)Yu-Gi-Oh! Monster Capsule GB (Game Boy Color)Yu-Gi-Oh! ONLINE (PC)Yu-Gi-Oh! ONLINE DUEL ACCELERATOR (PC)Yu-Gi-Oh! ONLINE DUEL EVOLUTION (PC)Yu-Gi-Oh! Power of Chaos: Joey the Passion (PC)Yu-Gi-Oh! Power of Chaos: Kaiba the Revenge (PC)Yu-Gi-Oh! Power of Chaos: Yugi the Destiny (PC)Yu-Gi-Oh! Sugoroku's Board Game (Game Boy Advance)Yu-Gi-Oh! True Duel Monsters II: Inherited Memories (PlayStation 2)Yu-Gi-Oh! True Duel Monsters: Sealed Memories (PlayStation)Yu-Gi-Oh! Worldwide Edition: Stairway to the destined duel (Game Boy Advance)Yu-Gi-Oh! ZeXal: Clash! Duel Carnival! (Nintendo 3DS)The Battle of Yu Yu Hakusho: Shitō! Ankoku Bujutsu Kai (Arcade and PlayStation 2)Yu Yu Hakusho (Super Famicom, Game Boy, 3DO)Yu Yu Hakusho 2: Kakutou no Sho (Super Famicom)Yu Yu Hakusho: Bakutō Ankoku Bujutsu Kai (Famicom)Yu Yu Hakusho Dai-Ni-Dan: Ankoku Bujutsu Kai Hen (Game Boy)Yu Yu Hakusho Dai-San-Dan: Makai no Tobira (Game Boy)Yu Yu Hakusho Dai-Yon-Dan: Makai Tōitsu Hen (Game Boy)Yu Yu Hakusho: Dark Tournament (PlayStation 2)Yu Yu Hakusho DS: Ankoku Bujutsu Kai Hen (Nintendo DS)Yu Yu Hakusho Final (Super Famicom)Yu Yu Hakusho Forever (PlayStation 2)Yu Yu Hakusho Gaiden MD (Mega Drive)Yu Yu Hakusho: Horobishi Mono no Gyakushū (Game Gear)Yu Yu Hakusho II: Gekitou! Shichi Kyō no Tatakai (Game Gear)Yu Yu Hakusho: Makyō Tōitsusen (Mega Drive)Yu Yu Hakusho: Spirit Detective (Game Boy Advance)Yu Yu Hakusho: Tokubetsu Hen (Super Famicom)Yu Yu Hakusho: Tournament Tactics (Game Boy Advance)Yu Yu Hakusho: Yamishōbu! Ankoku Bujutsu Kai (PC Engine)
Z
Zatch Bell! series
Zatch Bell! Electric Arena (Game Boy Advance)
Zatch Bell! Mamodo Battles (Nintendo GameGube and PlayStation 2)
Zatch Bell! Mamodo Fury (Nintendo GameGube and PlayStation 2)
Zero no Tsukaima: Muma ga Tsumugu Yokaze no Nocturne (PlayStation 2)
Zillion'' (Master System)
Zoids (List of Zoids Video Games)
Zoids: Battle Legends (GameCube)
Release timeline
See also
List of anime based on video games
List of hentai computer games
List of video games based on comics
List of video games based on cartoons
References
Video games based on anime or manga, List of
List
List |
11777722 | https://en.wikipedia.org/wiki/PhilNITS | PhilNITS | The Philippine National Information Technology Standards Foundation, Inc., or PhilNITS, is a non-stock, non-profit, non-government organization that is implementing in the Philippines the Information Technology standards adopted from Japan, with the support of the Department of Trade and Industry (DTI) of the Philippines and the Ministry of Economy, Trade and Industry (METI) of Japan.
History
PhilNITS was initially known as the Japanese IT Standards Exams of the Philippines Foundation, Inc. (JITSE-Phil), and was registered as such with the Securities and Exchange Commission on April 10, 2002 and set up its office at the Penthouse of the Prince Bldg, in Rada Street, Legazpi Village, Makati,
A week after its incorporation, the Japan IT Engineers Examination Center (JITEC) represented by its President, Mr. Takao Tominaga, signed a mutual recognition agreement (MRA) with the JITSE-Phil Foundation, represented by its Founding President, Ms. Ma. Corazon M. Akol in ceremonies held at the Makati Shangri-La, Manila Hotel and witnessed by Ambassador Ara of Japan, Secretary Mar Roxas of the Department of Trade and Industry, Chairman Virgilio Pena of Information Technology and E-Commerce Council (now Commission on Information and Communications Technology), Mr. Yoshikai, Deputy Director General of the Ministry of Economy, Trade and Industry, and Mr. Sakai, Commercial Attache of Japan to the Philippines.
DTI started to support JITSE-Phil in 2003 by providing it with its office space at the Oppen Building in Makati, in 2005, at the WDC Building in Cebu City and in 2007, at the Mintrade Bldg. in Davao City.
With the MRA between JITEC and JITSE-Phil, it was able to receive technical support from Japan. JITEC has been providing guidance, training, necessary hardware/software programs, and the documentation required in implementing the Standards on the Fundamentals of IT (FE) and in Software Design and Development (SW).
On May 29, 2003, the Bureau of Product Standards (BPS) of the Department of Trade and Industry (DTI), after due consultation with the National Computer Center (NCC), accepted JITSE as the Phil. National Standard - PNS 2030:2003 Information Technology Engineers Skills Standards.
On May 30, 2003, after an evaluation of the results of the First Certification Exams conducted by JITSE-Phil on the Fundamentals of IT Engineers (FE), the Ministry of Justice of Japan recognized JITSE as the Philippine Nihon Joho Gijutsu Hyojun Shiken Zaidan. With this official recognition by the Ministry of Justice, the FE Certificate, more popularly called the JITSE Certificate, can be used as a valid document for processing the work visas of IT professionals bound for Japan.
With the Asia IT Initiative Program (AITI) of METI, JITSE-Phil was able to receive technical support from Japan through the Japan External Trade Organization (JETRO), the Association for Overseas Technical Scholarships (AOTS) and the Center of the International Cooperation on Computerization (CICC).
JETRO has provided JITSE-Phil since 2003, through the Japan Expert Service Abroad (JEXSA) Project, technical experts and the training facilities in its offices in Makati, Cebu, and Davao. AOTS has provided Training Courses in the Philippines (in the various offices of JITSE-Phil as well as in some schools in provinces where JITSE-Phil has no Training Center) and have awarded scholarships for training in Japan.
On August 31, 2004. JITSE-Phil changed its name to PhilNITS Foundation to correct the misconception that the standards being implemented only for the Japanese market but for Asia.
In the ITEE Conference held at the AOTS Yokohama Kenshu Center, JITEC and the 6 organizations with mutual recognition agreements (MRAs) with JITEC, decided to form the Information Technology Professional Examination Council or ITPEC. The members of ITPEC are: the Japan Information Technology Examination Center (JITEC) of Japan, the Multimedia Technology Enhancement & Operations Sendirian Berhad (METEOR) of Malaysia, the Myanmar Computer Federation (MCF) of Myanmar, the Japan-Mongolian Information Technology Association (JMITA) of Mongolia, (now replaced by the National IT Park, NITP), the Philippine National IT Standards Foundation (PhilNITS) of the Philippines, the National Electronics and Computer technology Center (NECTEC) of Thailand, and the Vietnam Information Technology Examination and Training Support Center (VITEC) of Vietnam. In this Agreement, the members decided to have a common exam, on the same agreed upon date and time, and to recognize each other’s Certificate. ITPEC members have been using the same logo to raise public recognition of the examination and have adopted a common marketing strategy. JITEC-IPA expects to establish multi-lateral mutual recognition agreements, and transform ITPEC into a fully Asia-wide organization.
Through Grants from AOTS, PhilNITS has trained 8,174 IT Professionals in the Philippines and has sent 197 scholars to Japan. CICC has provided several Training programs as well as an e Learning System consisting of the hardware (2 servers and 4 terminals), the software (that can accommodate a maximum of 2000 users) and contents consisting of 24 modules developed by JITEC and CICC and 1 module developed by the Thomson Learning Center, donated by Fujitsu to PhilNITS. All the modules are made available to the public, 24 hours a day, 7 days a week through a subscription fee of ₱500.00 per month.
Current Certifications
The ITPEC certification exams (known locally as PhilNITS certification exams) are administered as written below. Currently there are three levels of examination being administered by PhilNITS. Topics covered by the exams are those of technology, strategy and management. IT professionals who pass these certification examinations are certified for life. An IT professional may take directly the certification level he/she would want to take. There is no limit to the number of times you take the examinations until you pass the exams.
ITPEC Fundamentals of IT Passport Exam (IP Exam, Level 1)
Known locally as PhilNITS IP, the Information Technology Passport Exam is for individuals who have basic knowledge in IT that all business workers should commonly possess, and who are doing information technology related tasks or trying to utilize IT related technology in their tasks. The exam duration is 120 minutes or 2 hours (conducted during a morning schedule). It consists of 100 questions in multiple choice (one per four choices) broke down into two types: the short question type, one question per item, 88 questions; and medium question type, four questions per item, 12 questions (3 items).
The pilot examination was conducted last March 28, 2010. The first regular exam was conducted last October 24, 2010. This exam is conducted twice a year in last Sunday of April and last Sunday of October.
ITPEC Fundamentals of IT Engineers Exam (FE Exam, Level 2)
Known locally as PhilNITS FE, this exam is conducted twice a year in the last Sunday of April and last Sunday of October. The 300 minute (150 minutes in the morning and 150 minutes in the afternoon) multiple choice examination are administered in 10 exam centers in the Philippines: University of Baguio for the north Luzon area, Philippine Christian University in Manila, Ateneo de Naga University for the Bicol Region, University of San Carlos in Cebu and Holy Name University in Bohol, Lorma Colleges in La Union and Leyte Academic Center for the Visayas region, and for Mindanao: Capitol University in Cagayan de Oro, Ateneo de Zamboanga University in Zamboanga City and the University of the Immaculate Conception in Davao City.
The Fundamental IT Engineers Exam is for individuals who have basic fundamental knowledge and skills required to be an advance IT human resource, who possess practical utilization abilities. Those who fail either the morning or afternoon part of the exam are given another chance to take the removal exam after which they will have to take the entire test again. This means two chances to pass the exam.
ITPEC Applied Information Technology Exam (AP Exam, Level 3)
Known locally as PhilNITS AP is conducted once a year on the last Sunday of October. The multiple choice exam is for 300 minutes (150 minutes in the morning and 150 minutes in the afternoon). This examination is for individuals who have applied knowledge and skills required to be an advanced IT human resource, and who have established their own direction as an advanced IT human resource. It is ideally given to people who have at least two years work experience.
Other projects
Conducting free training courses on IP, FE & AP/SW for teachers and commercial trainers. Usually funded by grants from AOTS, CICC, IPA, METI, and JETRO.
Conducting free summer training of teachers, a joint undertaking with the Philippine Society of IT Educators (PSITE) and the Philippine Accrediting Association of Schools, Colleges and Universities (PAASCU). PAASCU is providing the venue and PhilNITS is providing the lecturers (from the PhilNITS Society).
Providing training using the e-learning system donated by Japan.
Guiding and helping in the development of the PhilNITS Society, an organization formed whose only criterion for membership is being PhilNITS-certified, in any exam category.
Conducting software and hardware training. Customized training and assessment also available.
Conducting Systems Development for Outsourced Projects. Work is done by Bridge Software Engineers who are Nihongo proficient.
Board
Officers of PhilNITS are:
Ms. Ma. Corazon M. Akol – President
Mr. Peter Que Jr. – VP for Operations
Mr. Shinichiro Kato – VP for Finance
Ms. Flora Capili – Secretary.
See also
ITPEC - East Asia
IPA - Japan
METEOR - Malaysia
NITP - Mongolia
MCF - Myanmar
NECTEC - Thailand
VITEC - Vietnam
References
External links
Information technology qualifications
Organizations based in Metro Manila
Science and technology in the Philippines |
14445558 | https://en.wikipedia.org/wiki/SigmaStat | SigmaStat | SigmaStat is a statistical software package, which was originally developed by Jandel Scientific Software in the 1980s. As of October 1996, Systat Software is now based in San Jose, California. SigmaStat can compare effects among groups, conduct survival analysis, analyze rates and proportions, perform regression and correlation analysis and calculate power and sample size. The program uses a wizard based interface which asks the user questions about the project and its data. After a test is run, the user receives a detailed report that interprets the results.
If installed with SigmaPlot, SigmaStat integrated with SigmaPlot and SigmaPlot gained advanced statistical analysis capabilities from version 11. SigmaStat is available both as a separate product or is available integrated with SigmaPlot.
On February 1, 2016 SigmaStat version 4 was relaunched as a separate Advisory Statistics Software by Systat Software Inc.
Version history
Version 1.0 : 1994
Version 2.0 : 1997
Version 3.0 : 2003
Version 3.1 : 2005
Version 3.5 : 2007 (integrated with SigmaPlot 10)
Version 4.0 : 2008 (integrated with SigmaPlot 11)
Version 4.00 : Relaunched as SigmaStat version 4.00 on February 1, 2016.
External links
Systat Webpage
SigmaPlot Webpage
Systat Software Webpage
Statistical software
Windows-only software |
22637703 | https://en.wikipedia.org/wiki/IXP1200 | IXP1200 | The IXP1200 is a network processor fabricated by Intel Corporation. The processor was originally a Digital Equipment Corporation (DEC) project that had been in development since late 1996. When parts of DEC's Digital Semiconductor business was acquired by Intel in 1998 as part of an out-of-court settlement to end lawsuits each company had launched at each other for patent infringement, the processor was transferred to Intel. The DEC design team was retained and the design was completed by them under Intel. Samples of the processor were available for Intel partners since 1999, with general sample availability in late 1999. The processor was introduced in early 2000 at 166 and 200 MHz. A 232 MHz version was introduced later. The processor was later succeeded by the IXP2000, an XScale-based family developed entirely by Intel.
The processor was intended to replace the general-purpose embedded microprocessors and specialized application-specific integrated circuit (ASIC) combinations used in network routers. The IXP1200 was designed for mid-range and high-end routers. For high-end models, the processor could be combined with others to increase the capability and performance of the router.
The IXP1200 integrates a StrongARM SA-1100-derived core and six microengines, which were RISC microprocessors with an instruction set optimized for network packet workloads. The StrongARM core performed non-real-time functions while the microengines manipulated network packets. The processor also integrates static random access memory (SRAM) and synchronous dynamic random access memory (SDRAM) controllers, a PCI interface and an IX bus interface.
The IXP1200 contains 6.5 million transistors and measures 126 mm2. It was fabricated in a 0.28 µm, complementary metal–oxide–semiconductor (CMOS) process with three levels of interconnect. It was packaged in a 432-ball enhanced ball grid array (EBGA). The IXP1200 was fabricated at DEC's former Hudson, Massachusetts plant.
Notes
References
Halfhill, Tom R. (13 September 1999). "Intel Network Processor Targets Routers". Microprocessor Report.
Matsumoto, Craig (25 August 2000). "Intel makes IXP its net processor cornerstone". EE Times.
Article has diagram of the Intel IXP1200 Architecture.
DEC hardware
Intel products
ARM architecture |
15168321 | https://en.wikipedia.org/wiki/Ternac | Ternac | TERNAC is an emulation written in FORTRAN of a ternary computer on another binary machine, a Burroughs B1700. It was implemented in 1973 at State University of New York, Buffalo (SUNY Buffalo). The implementation provided both fixed-point and floating-point capability; fixed-point words were 24 trits in length and the floating-point words had 42 trits for mantissa and 6 trits for exponent.
TERNAC was intended primarily to discover if the implementation of a nonbinary structure on a binary computer was feasible, and to ascertain the cost in memory storage and time for such an implementation. As a feasibility test, it was successful, and proved that both speed and price are comparable with that of binary computers.
See also
Setun (ternary computer constructed in USSR)
References
^ DSSP & Forth : Compare And Analysis
G. Frieder, A. Fong, and C. Y. Chao. A Balanced Ternary Computer. Department of Computer Science, State University of New York at Buffalo, pages 68–88, 1972
Ternary computers: part I: motivation for ternary computers G. Frieder, 1972; Proceeding MICRO 5 Conference
Ternary computers: part 2: emulation of a ternary computer G. Frieder, 1972; Proceeding MICRO 5 Conference
External links
Development of ternary computers at Moscow State University
Nikolai Brusentsov's Setun entry
Pioneers of Soviet Computing
Mainframe computers
Ternary computers
de:Setun
pl:Setun (komputer) |
9982154 | https://en.wikipedia.org/wiki/Eric%20Wright%20%28cornerback%2C%20born%201985%29 | Eric Wright (cornerback, born 1985) | Eric Andrew Wright (born July 24, 1985) is a former American football cornerback in the National Football League (NFL). He was drafted by the Cleveland Browns in the second round of the 2007 NFL Draft. He played college football at USC and UNLV.
Wright also played for the Detroit Lions, Tampa Bay Buccaneers, and San Francisco 49ers.
College career
USC Trojans
Wright attended USC for two years before attending UNLV. After being redshirted his first year, he was a starter his second year, and started in the 2005 Orange Bowl, where he recorded four tackles and an interception.
UNLV Rebels
Wright transferred to UNLV after being expelled by USC. Police found 136 tablets of Ecstasy and GHB in Wright's apartment while investigating a sexual assault allegation against Wright. Wright sat out the 2005 season due to NCAA transfer guidelines. Wright played one year at UNLV before deciding to declare for the NFL Draft. He was a university studies major.
Professional career
Cleveland Browns
Wright was drafted by the Cleveland Browns in the second round (53rd overall) of the 2007 NFL Draft. The Browns acquired the pick from the Dallas Cowboys to select Wright. While he was a projected first round pick, he fell to the second round due to his troubled college past.
In Wright's first season with the Browns, he started 13 of 16 games. He recorded his first career interception on October 14, 2007, against Miami Dolphins quarterback Cleo Lemon. He won his first Defensive Player of the Week award after his performance during week 6 of the 2008 NFL season against the New York Giants, where he had a 94-yard interception return for a touchdown.
Detroit Lions
On July 29, 2011, Wright signed with the Detroit Lions. During his one season for the Lions, he started all 16 games and recorded 74 tackles and four interceptions.
Tampa Bay Buccaneers
On March 14, 2012, Wright signed a five-year, $37.5 million contract with the Tampa Bay Buccaneers.
On July 19, 2013, Wright was traded from the Tampa Bay Buccaneers to the San Francisco 49ers for a conditional late-round 2014 draft pick . After he failed his team physical, the trade was voided causing his rights to revert to the Buccaneers who subsequently released him.
San Francisco 49ers
On August 8, 2013, Wright signed a one-year deal with the San Francisco 49ers. On August 27, 2013, he was placed on the reserve/non-football injury list.
On June 17, 2014, Wright announced his retirement from the NFL.
References
External links
Tampa Bay Buccaneers bio
UNLV Rebels bio
USC Trojans bio
1985 births
Living people
American football cornerbacks
Cleveland Browns players
Detroit Lions players
San Francisco 49ers players
Tampa Bay Buccaneers players
UNLV Rebels football players
USC Trojans football players
Players of American football from San Francisco |
28882765 | https://en.wikipedia.org/wiki/Praxeme | Praxeme | Praxeme is a methodology for enterprise architecture which provides a structured approach to the design and implementation of an enterprise information architecture.<ref>Pierre Bonnet, Jean-Michel Detavernier, Dominique Vauquier (2013) Resilient Information Systems: Progressive Recasting with SOA. Ch. 8.2 The Praxeme method. John Wiley & Sons, 1 mrt. 2013</ref>
Overview
Praxeme is an enterprise methodology which aims to embrace all aspects of the enterprise, from strategy to deployment. The name "Praxeme" is a contraction of "praxis" (action) and "semeion" (sense, meaning). The methodology contains design procedures for the information system and IT systems of the enterprise. It reconciles different modeling approaches. In particular, it proposes a semantic modeling technique which benefits from the object-oriented approach, to formalize the knowledge about the business fundamentals.
Praxeme follows in the footsteps of the methodological tradition:
It takes up the legacies from Merise, TACT, analyze-design methods, Zachman framework.
It updating them in light of recent advances (SOA, BPM, and ontology, terminology); and
It has synthesized these approaches and articulates them in accordance with the Model Driven Architecture
Using the standard Unified Modeling Language, Praxeme's modeling techniques enable the “Enterprise System” to be rigorously defined. That is to say that the enterprise, in an effort of rationality, perceives itself to be a system. The notion of “Enterprise System” applies to enterprises and organizations, as well as any action system – organized and striving to achieve an aim. Praxeme has been used in contexts as varied as the insurance sector, drone or weaponry systems, energy and distribution.
History
Praxeme is initiated in 2003 as open method to respond to the need for enterprises to share a reference method in order to successfully manage their transformation projects. The foundations of the Praxeme method is initially enabled by the Aeronautics & Defense department of the SAGEM company. In 2004 the French mutual insurance company SMABTP supported the design procedures required to overhaul its information system in Service Oriented Architecture (SOA). The method was further supported by the French Army, the Caisses d'Allocations Familiales (Family Allowance offices) and the AXA Group.
The French General Directorate for State Modernization (DGME) in its document "General Repository for Interoperability", recommends using the Praxeme method for designing IT systems in French public services.
Founded in 2006, the Praxeme Institute is a non-for-profit association pursuant to the French law of July 1, 1901. It is a depository for the Praxeme corpus and guarantor of its open nature (cf. the statutes of the association ). The Praxeme Institute maintains regular contact with the university and research communities. Its interdisciplinary approach aims at making contributions from the field of science more readily usable in the enterprise.
Praxeme building blocks
Philosophy
Praxeme plays on the double meaning of the word “enterprise”: human organization and action. In both cases, they are complex objects. In order to apprehend this complexity and master action, the method distinguishes several formally identified and defined aspects. This is the Merise “levels of abstraction” or the Anglo-Saxon “separation of concerns” principle.
The Enterprise System Topology defines nine aspects, through which the documentation, decisions and projects of the enterprise are structured. As these aspects follow different rhythms and evolve differently, their separation enables us to reduce complexity and to optimize transformation efforts. For example, the technology life cycle is far shorter than that of “business” concepts.
Enterprise System Topology
The Enterprise System Topology which represents the methodological framework, distinguishes nine aspects:
Political Aspect (also referred to as “teleonomic” or “scoping”): This aspect gathers together all formulations upstream of the models: values, objectives (strategic concerns, aims and objectives of the enterprise), requirements and vocabulary.
Semantic Aspect : This aspect isolates the business fundamentals, leaving to one side the organization and work habits. The semantic model describes the “business” objects from a threefold angle: information, action and transformation (state machines). These elements are represented by attributes and class operations as well as by state machines. The class is a category of representation that corresponds to both objects and concepts.
Pragmatic Aspect : This aspect concerns itself with the actors, their role, the organization and the distribution of responsibilities in the processes. Praxeme recommends describing the elementary work situations as use cases, this form of representation providing the link with the IT design.
Geographic Aspect : In this aspect, we concern ourselves with the localization of the means that the enterprise calls upon. We also look at issues like working from home, nomadic activities, service continuity, outsourcing... The geographic model decides on the choices that will enable the design and dimension of the infrastructure to be made (hardware aspect).
Hardware Aspect : This refers to the infrastructure and logistics required for the activities of the enterprise. Here the IT workers will find the machines and networks that influence some of the technical choices made. Other logistical means for both day-to-day activity and crisis situations are also found in this aspect. The hardware architecture is determined, to a large extent, by the geography of the enterprise (notion of site).
Logical Aspect : This is an intermediary aspect, bridging the gap between the “business” and IT views. As such, it ensures the decoupling between these two universes. Here the architect designs the optimal structure of the system, with relative independence regarding technical choices. Praxeme proposes derivation rules which, when applied to the semantic and pragmatic models, enable us to deduce the logical services (as defined in an SOA approach). For the urbanization of the information systems, the logical aspect also offers the stable and formal description required to manage this policy in the long term.
Technical Aspect : This aspect gathers the concerns the designers in charge of the realization of logical components may have, that is to say their translation into software. Technical architecture examines the possibilities and constraints linked to the state-of-the-art technologies available. Besides the technical choices, it establishes the rules of implementation and transposition of the logical model to the software. Praxeme attaches great importance to the “logical/technical negotiation” period and provides the means to reconcile these two very different, but equally necessary, expert opinions (those of the technical and logical architectures).
Software Aspect: This aspect is that of IT programs and software components. It is here that we can find the IT products, their documentation, test cases, configurations, etc. This aspect also deals with the issues arising from the integration of packages.
Physical Aspect : The culmination of the transformation chain, the physical architecture results from the projection of the software architecture on the hardware architecture. This is where the method deals with questions on deployment, synchronization, technical services (grid computing, databases, virtualization...).
The Enterprise System Topology articulates these aspects: it enables all the documentation to be sorted out and the rules of passage from one aspect to another to be defined. These rules are detailed in a metamodel.
Praxeme proposes procedures for each of these aspects.
Project development
Praxeme is the result of an open initiative, based on the mutualization of investments. All its components are published, and may be freely accessed, under the Creative Commons license. Its works are ongoing, with the aim of covering the field of the methodology, delimited by the Pro3 (Pro Cube) schema:
Products: something which is built or transformed (the enterprise, a process, software, a system of systems...);
Processes: how the people organize themselves collectively (governance, transformation process, development process, organization of competences...);
Procedures and methods: how people work (the procedures and methods at an individual level).
The first dimension is structured as presented in the Enterprise System Topology above. The second includes elements of approaches at both an enterprise and project level. As well as modeling procedures, a test method, database design, forms... are part of the third dimension.
In order to continue this work and to offer a complete method to the market, the Praxeme Institute is building partnerships with other organizations, seeking to federate available energies (CESAMES and the Ecole Polytechnique, SEMIC.eu, Société française de terminologie, etc.).
References
Further reading
Pierre Bonnet et al. (2007) Le système d'information durable: la refonte progressive du SI avec SOA
Pierre Bonnet et al. (2009) Sustainable IT Architecture: the progressive way of overhauling information systems with SOA Iste-Wiley 3/2009
Dominique Vauquier (1993) Développement orienté objet. Eyrolles
External links
Praxeme Institute's Wiki
CESAMES
SEMIC.eu : European Commission
CSDM talk (Complex Systems Design & Management 2010)
Method (computer programming)
Enterprise architecture frameworks |
942346 | https://en.wikipedia.org/wiki/Vampire%3A%20The%20Masquerade%20%E2%80%93%20Bloodlines | Vampire: The Masquerade – Bloodlines | Vampire: The Masquerade – Bloodlines is a 2004 action role-playing video game developed by Troika Games and published by Activision for Microsoft Windows. Set in White Wolf Publishing's World of Darkness, the game is based on White Wolf's role-playing game Vampire: The Masquerade and follows a human who is killed and revived as a fledgling vampire. The game depicts the fledgling's journey through the early 21st-century Los Angeles to uncover the truth behind a recently discovered relic that heralds the end of all vampires.
Bloodlines is presented from first- and third-person perspectives. The player assigns their character to one of several vampire clanseach with unique powers, customizes their combat and dialog abilities and progresses through Bloodlines using violent and nonviolent methods. The selection of clan affects how the player is perceived in the game world, and which powers and abilities they possess; this opens up different avenues of exploration and methods of interacting with or manipulating other characters. The player is able to complete side missions away from the primary storyline by moving freely between the available hubs: Santa Monica, Hollywood, downtown Los Angeles, and Chinatown.
Troika's 32-member team began development of Bloodlines in November 2001, as an indirect sequel to the previous year's Vampire: The Masquerade – Redemption. Troika used Valve's Source game engine, then in development, which was being used for Valve's own Half-Life 2. The game's production was turbulent, as the design's scope exceeded the available resources, and the team were left without a producer for nearly a year until Activision appointed David Mullich to the role, where he found designs and levels unfinished or abandoned. After three years in development with no end in sight and running over budget, Activision set a strict deadline for completion, and Bloodlines was released incomplete in November 2004.
Released in competition with Half-Life 2 and several other titles, Bloodlines sold fewer than 80,000 copies during its initial release, which was considered a poor performance. It divided critics at the time; although they praised the game's writing and scale of choice, they criticized its technical flaws. It was Troika Games' last production before its failure in early 2005, when it was unable to secure additional projects. The game has a cult following as a rarely replicated example of gameplay and narrative, and contemporary reception recognises it as a flawed masterpiece. Since its original release, Bloodlines received post-release support from fans, supplying unofficial fixes and re-adding unused content. A sequel, Vampire: The Masquerade – Bloodlines 2, is in development.
Gameplay
Bloodlines is an action role-playing video game optionally presented from the first- or third-person perspective. Before the game begins, players create a male or female vampire character by selecting a vampire clan and configuring available points in three areas—Attributes, Abilities and Disciplines (vampiric powers)—or by answering questions, which create a character for the player. The player can select one of seven vampire clans: the powerful Brujah, the decadent Toreador, the insane Malkavian, the aristocratic Ventrue, the monstrously-deformed Nosferatu, the blood-magic wielding Tremere, or the animalistic Gangrel.
The player builds their character by spending acquired points to increase their ratings in the three areas. The points spent on Attributes and Abilities combine to determine a player's success or effectiveness in performing tasks such as using firearms, brawling, and lock-picking; for example, determining how accurate or how far the player can shoot, or if they can hack a computer. Attributes are represented by physical (strength, dexterity, and stamina), social (charisma, manipulation, and appearance), and mental (perception, intelligence, and wits). Abilities are talents (such as brawling and dodging), skills (such as firearms and melee) and knowledges (such as computers and investigation). The player is initially assigned points to spend in the three areas, with the amount they can spend determined by clan; for example, the Brujah can spend the most points on physical and skill attributes. During character creation, each upgrade costs one point. The upgrade cost increases as the game progresses. Each ability can be raised from zero to five, and it is impossible to accrue enough experience points to complete every skill (allowing the player to specialize or balance their character). Experience points are gained by completing quests, finding items or unlocking secret paths, rather than killing enemies, and are used to increase or unlock the character's statistics and abilities. The game features a main story, and optional side quests that can be completed at any time; the player is able to move between the available areas at will to revisit locations, characters, or merchants.
The player's clan affects their skills and powers. Although the attractive Toreadors receive bonuses for seduction and persuasion, opening additional dialog options, they are physically weak; the Nosferatu are forced to travel in the shadows or through sewers to avoid alerting humans, but receive bonuses to their intelligence and computer skills, which enables access to more information. The Malkavians have separate dialog options, reflecting their inherent insanity. Upgrading some skills provides additional dialog options; attractive and charismatic characters seduce to get their way, aggressive characters threaten, and others persuade their targets to cooperate.
Firearms combat is first-person, with character points assigned to the firearms skill determining the shot's accuracy and how long it takes to target an opponent. Melee combat is third-person, with access to weapons such as katanas and sledgehammers for melee combat, or pistols, crossbows and flamethrowers for firearm combat. If a player sneaks up on an opponent, they can perform an instant kill; weapons provide unique instant kill animations. The player can block attacks manually or automatically, by leaving their character idle. They can use stealth in missions by sneaking past guards and security cameras, picking locks, and hacking computers to locate alternative routes.
Each clan has specific Disciplines, which can be used in combat and to create approaches to quests. Although some powers overlap clans, no two clans share the same three Disciplines. More physical vampires can enhance themselves to become fast and lethal killers or summon spirit allies to attack their foes; others can mentally dominate their targets to force their cooperation or render themselves invisible to hide from detection; and others can boil their opponent's blood from afar. The ability Blood Buff (which temporarily upgrades physical abilities), is common to all vampires. Several abilities can be active at the same time. Blood is a primary currency in Bloodlines, used to activate Disciplines and abilities. It is drained with each use, and can be replenished by drinking from rats, visiting blood banks, or drinking from humans by attacking or seducing them; the player can feed on enemies during combat. Drinking from innocents for too long can kill them, costing a character humanity points.
Players are penalized for using certain vampiric abilities in front of witnesses; exposing their existence loses masquerade points, although additional masquerade points can be earned from quests and other actions. Violating the masquerade five times draws the ire of vampire hunters and loses the game. The player has humanity points, representing the vampire's humanity. Some actions cost humanity points; a low humanity score alters available dialog options to become more aggressive, and increases the chance of entering a frenzied state and embarking on a killing spree, when the vampire's blood is low. This frenzy can also be triggered by a large amount of damage. Like masquerade points, losing all humanity points ends the game, with the vampire becoming a mindless beast. Some areas, known as Elysium, prevent the use of Disciplines or weapons. Players can recruit a ghoul, Heather, as a customizable servant who gives them blood, gifts, and money.
Synopsis
Setting
Vampire: The Masquerade – Bloodlines takes place in four areas of 21st-century Los Angeles: Santa Monica, Hollywood, Downtown Los Angeles, and Chinatown. Set in the World of Darkness, the game depicts a world in which vampires, werewolves, demons, and other creatures shape human history. The vampires are bound by a code to maintain their secrecy (forbidding the use of vampiric abilities in front of humans) and avoid unnecessary killing (to preserve the vampire's last shreds of humanity). The vampires are divided into seven clans of the Camarilla, the vampire government, with distinctive traits and abilities. The Toreadors are the closest to humanity, with a passion for culture; the Ventrue are noble, powerful leaders; the Brujah are idealists who excel at fighting; the Malkavians are cursed with insanity, or blessed with insight; the Gangrel are loners, in sync with their animalistic nature; the secretive, untrustworthy Tremere wield blood magic; and the monstrous Nosferatu are condemned to a life in the shadows to avoid humanity. The clans are loosely united by their belief in the Camarilla's goals and opposition to the Sabbat: vampires who revel in their nature, embracing the beast within. The Anarch Movement is a faction of idealistic vampires opposed to the Camarilla's political structure, believing that power should be shared by all vampires.
The main character of Bloodlines, whom the player controls, is an unnamed fledgling vampire, transformed at the start of a game and belonging to one of the clans. The fledgling is employed by Sebastian LaCroix (voiced by Andy Milder), prince of Los Angeles' vampires. The fledgling's travels through the vampire world bring them into contact with other undead creatures such as the deformed information broker Bertram Tung, the anarch Smiling Jack (John DiMaggio), and the dissociative Voerman sisters, Jeanette and Therese. Chinatown is controlled by the Kuei-Jin, Asian vampires led by Ming-Xiao, who do not require blood and consider themselves superior to the other vampires.
Plot
The game begins with the player character, an unnamed human, being killed and resurrected as a fledgling vampire. For this unauthorized act, the fledgling and their sire are brought before the Camarilla. The sire is executed by order of LaCroix; the fledgling is spared the same fate by the intervention of the anarch Nines Rodriguez, and employed by the prince.
LaCroix sends the fledgling to Santa Monica to help his ghoul, Mercurio, destroy a Sabbat warehouse. Following their success the fledgling travels to downtown Los Angeles, meeting separately with Nines, LaCroix, and Jack. LaCroix tasks the fledgling with investigating a docked ship, the Elizabeth Dane, for information about an Ankaran sarcophagus rumored to contain the body of an Antediluvian, one of the oldest and most powerful vampires, whose arrival would herald Gehenna, the vampire apocalypse. The fledgling discovers that the sarcophagus seems to have been opened from within.
Increased Sabbat activity coincides with the disappearance of the Malkavian chief, Alistair Grout. At Grout's mansion, the fledgling sees Nines leaving and discovers Grout's remains in the mansion with vampire hunter Grünfeld Bach, who denies involvement in Grout's death. Learning about Nines' presence at the mansion, LaCroix tells the other chiefs to approve Nines' execution. The fledgling is sent to the Museum of Natural History to recover the sarcophagus, but finds that it has been stolen. Jack later suggests to the fledgling that LaCroix wants the sarcophagus to drink the blood of the ancient within, gaining its power.
Believing that Gary, the Nosferatu chief, has stolen the sarcophagus, the fledgling is sent to Hollywood to find him; after locating a captured Nosferatu for Gary, he reveals that the sarcophagus was stolen by the Giovanni vampire clan. The fledgling infiltrates the Giovanni mansion and finds the sarcophagus guarded by the Kuei-Jin, who claim their leader, Ming-Xiao, has formed an alliance with LaCroix. The locked sarcophagus is returned to LaCroix's tower, and Beckett, a vampire scholar, tells the fledgling that the only person who can open it has been abducted by Bach to lure LaCroix. The fledgling kills Bach and learns that the sarcophagus' key has been stolen.
The fledgling returns to LaCroix, learning that the Sabbat tried to steal the sarcophagus to destroy it and prevent Gehenna, and kills the Sabbat leader to disperse his followers. The fledgling is met by Ming-Xiao, who offers to form an alliance. Ming-Xiao reveals that she has the key, and LaCroix killed Grout to prevent his powerful insight from unveiling LaCroix's plans; Ming-Xiao disguised herself as Nines at the mansion to frame him. Denying Ming-Xiao's claims, LaCroix rescinds the blood hunt on Nines and entrusts the fledgling with recruiting the anarchs to punish the Kuei-Jin for murdering Grout. The fledgling finds Nines hiding in Griffith Park, and they are then attacked by a werewolf and Nines is badly injured. The fledgling escapes with Jack, who reveals that LaCroix has issued an execution order on the fledgling for framing Nines on orders from Ming-Xiao.
The ending varies, depending on whom, if anyone, the fledgling allies with. If the fledgling supports LaCroix or Ming-Xiao, each sends the fledgling to kill the other. LaCroix opens the sarcophagus, to be killed with the fledgling by hidden explosives; Ming-Xiao betrays the fledgling, chaining them to the sarcophagus and sinking it in the ocean. Supporting the anarchs, or no one, makes the fledgling kill Ming-Xiao and maim LaCroix, who is killed after he opens the sarcophagus. If the fledgling opens the sarcophagus, they die in the explosion. If the fledgling is a Tremere, they kill Ming-Xiao; LaCroix is replaced by Tremere leader Maximillian Strauss, and the sarcophagus is stored. Each ending has Jack watching from afar with the mummy taken from the coffin and the enigmatic taxi driver who transports the fledgling between locations, who says, "The blood of Caine controls our fate ... Farewell, vampire."
Development
Conception
The development of Vampire: The Masquerade – Bloodlines began at Troika Games in November 2001. The developers wanted to put a role-playing game in a first-person setting, believing that the genre had become stale. Troika approached publisher Activision with its idea; Activision suggested using the Vampire: The Masquerade license used a year earlier in Nihilistic Software's Vampire: The Masquerade – Redemption, which had experienced sufficient success to merit a sequel. Instead of developing a sequel to Redemption, the development team researched the White Wolf property, including the game's rules and its storylines. Troika was a small game studio, with five developers and a total staff of thirty-two (including lead writer Brian Mitsoda, who joined the team less than a year after development began). Although some preliminary designs and levels were completed, much of the work was abandoned or redeveloped.
Troika wanted to make a 3D game, but was uncertain whether to build a new game engine or license an existing one and whether to use first- or third-person. At that time, the Source game engine was being built by Valve. Valve employee Scott Lynch approached Troika about using the engine, and it was the first external team to use it. Troika chose Source for its facial animation and lip-synching system, since it wanted players to speak to the characters face-to-face. Since the engine was in development with Bloodlines and Valve's own Half-Life 2, Troika was working with unfamiliar code and tools, forcing it to write its own code to compensate for the unfinished engine, and with only a single source for technical support. Troika developed a lighting system to create distinctive, moody illumination for the nighttime setting, a particle system for the special effects accompanying the vampire Disciplines, and a cloth system for clothing flow. Source lacked its later artificial intelligence (AI) coding, and Troika's code worked poorly with the Source engine.
Writing
Many of the central plot elements existed before designer Brian Mitsoda's involvement: the prince, the anarchs being upset, aspects of the Gehenna storyline, and Jack and the sarcophagus as a major subplot. The designers broadly tied the overarching story into each hub and level. Each designer controlled their assigned section of the game, and working with a small team enabled quick decision making and ease in keeping plot elements consistent. Mitsoda became the primary writer for many of the characters and their quests, dialog, and side content in the game, such as emails, which helped retain a consistent narrative. He was given freedom with respect to the script, with no restrictions on language or content, and could rewrite characters when he thought his initial draft weak. Although the story was developed by Troika, it is inspired by White Wolf's Time of Judgment novels about a vampire apocalypse. Bloodlines story was accepted as canonical by White Wolf, with the game serving as a prequel to Time of Judgment and including characters from the White Wolf game, such as Jack. Discussing character design, Mitsoda said he tried to disguise the need for characters who simply point a player in an appropriate direction:
You need a character to pose a problem or give out a quest or be a barrier of some kind. I don't like to make the [character] outright say "I need you to do X, then I'll give you Y" ... – it makes the character into an automated quest kiosk. I like the characters to come off like people actually do – they don't say "hi" when strangers come knocking, they say "who the hell are you?" or they're expecting you and know more than they let on, or they don't care. I don't like my [characters] to be standing around as if their lives begin when the character starts talking to them and end when the player leaves.
Single-purpose characters needed a distinctive personality trait to quickly establish them with the player, rather than serving as a disposable item, while major characters had to reflect the player's progression and actions through the game. Mitsoda wrote the characters by thinking about who each character was, assigning them motivations determining why they were where they were, what they thought about the player and what they wanted from them. In accordance with a suggestion by fellow writer Chad Moore, the Malkavian player character has a dialog script distinct from that of the other eight clans; Mitsoda said it was one of the simpler aspects of the development cycle. He wrote the Malkavian script last, with time running out on development, and the overwork and lack of sleep contributed to what Mitsoda considered an unhealthy state of mind, ideal for writing insane dialog. He wanted to highlight their madness, without making it comical. Since the story is set during the Camarilla's takeover of Los Angeles, the team simplified the plot by only allowing the player to belong to one of the LA-based clans.
Design
Troika co-founder Jason Anderson's research on Vampire: The Masquerade source material and fansites found that character interaction and involvement in the vampire societies, not statistics and powers, was the game's main attraction. Troika tried to remain true to the pen-and-paper role-playing game, hoping not to alienate the game's fans, but rules designed for multiple players did not translate well to single player computer game design. The team attempted to discover which elements could work equally well in pen-and-paper and computer games. Although much of the character system and attributes translated, not all the attributes (such as "knowledge of law") made sense in the computer game. Of 30 pen-and-paper abilities, 15 reached the final design.
Another difficult area was feats. Although common feats worked well, with a random chance of success or failure, uncommon ones would appear to fail more often. To avoid this, randomization was replaced by a degree of difficulty in accomplishing the feat. Although pen-and-paper falling damage is random, the computer game bases damage on the distance of the fall. The team's biggest challenge was adapting disciplines. The pen-and-paper version may require a little blood that requires a long time to use, or have no blood cost and can be used at will; upgraded disciplines had additional requirements considered too confusing for a computer game. Troika attempted to equalize the disciplines, keeping the effect intact and normalizing the cost, so a first-level power requires one blood point, a second-level two points and so on. To balance the clans, the aristocratic Ventrue were only allowed to feed on noble blood, though this was changed to allow them to feed on lower-class humans, receiving less blood. During character creation, the game had an optional character biography with unique positive and negative characteristics (increasing one ability while limiting another). This was removed from the released game; Activision felt that there was insufficient test time, and removing it was a more stable option.
The team's previous experience was with turn-based combat games, and it struggled to develop a real-time combat system affected by customizable attributes and abilities that provided feedback to the player on how those statistics were affecting the battle. It initially found that by adhering too closely to the White Wolf source material rules for guns, where the effectiveness of a shot is determined in a contest between the player's skill and the opponent's defense, the firearms seemed broken; the player would not hit where they aimed. Troika found it difficult to mesh the available factors in a real-time setting. Melee combat had to deal with a variety of melee weapons and animations and adjust for melee-on-melee and melee-on-ranged combat.
Troika used first-person perspective to immerse the player in the setting, interacting face-to-face with the characters and seeing their facial reactions to the player. It chose to follow a single-character to aid the immersion, creating the isolation of a vampire unable to trust any other character. This aided the story and compensated for the technical issues of allowing multiple player characters.
Choice is a significant aspect of the game, requiring a non-linear design to accommodate the customized characters. Level design began with a list of factors such as Disciplines, stealth and feats. Each area had to be viable for a shooting character (sufficient ammunition), a discipline-focused character (sufficient blood sources to keep the powers fueled) and a melee specialist (to reach enemies without being killed), with stealth options and option combinations. Level design began with a focus on stealth, taking into consideration the positioning of guards and the character's potential stealth capability at that point in the game. Then direct, combat-heavy and dialog paths were added. The amusement arcade area was to feature playable versions of Activision arcade games such as Pitfall!, though the idea was abandoned due to time constraints.
Director Leonard Boyarsky considered the animation system important in the team's choice of the Source engine. The integrated "faceposer" tool allowed Troika to customize facial animations, expressions, gestures and lip-synching, eliminating the need to explain what a character was doing. Every non-player character required a voiceover, which helped Troika define its characters more quickly. The engine had a physics system permitting new features, such as monsters hurling corpses at the player or dying characters realistically crumbling into pieces, instead of requiring pre-built animations. Although Troika had ignored first-person engines due to technical limitations, such as a low polygon count and limited texture memory, as the technology improved, it thought it could create a real-time action game without sacrificing the immersion and story of a role-playing game.
Describing the choice of developing a game based on the existing White Wolf property over creating their own, Boyarsky said that although an original property lacked the constraints of an existing one, the downside was that it had not been tested and could be rejected by its potential audience; an existing property was proven. Troika tried to stay as close as possible to the White Wolf rules, while reducing the number of abilities and disciplines to those relevant to Bloodlines gameplay.
Later development
Activision introduced the game in May 2003, but in October, Valve experienced a security breach in which hackers stole the source code for Half-Life 2. The breach required new security implementations for the engine, delaying both games; the release of Bloodlines was postponed until early 2005. Until May 2004, Troika and Activision said that the game would feature a multiplayer component and modes including a team of vampires against a team of vampire hunters, with the ability to upgrade characters between each round. The team was left without a producer by Activision for over a year before David Mullich was assigned to the project. With no producer oversight, Mullich found the game's design incomplete, game levels created and abandoned, and several technical issues, including problems with code for the proposed multiplayer option. The Source multiplayer code was in its infancy, increasing its development time, and the idea was abandoned.
In addition to problems with the Source engine, the designers found that the game's scope exceeded their resources. Bloodlines has several styles of gameplay, requiring different interfaces, animations and artificial intelligence for stealth and melee combat, and first- or third-person capability. Compared to contemporary first-person shooters, with 10 to 20 animated character models, Bloodlines had over 150 characters with 3,000 unique animations, in addition to boss characters, with their own styles of movement. The designers underestimated the length of time required to develop and improve these systems. The game's scope suffered from content not being removed when necessary; other components would be endlessly refined without being finalized, preventing the developers from focusing on other parts of the game system. All content additionally required approval by White Wolf and Activision.
After three years in development, the game was progressing slowly, and it was unknown when it would be finished. Activision set a series of deadlines for the project's development to ensure Troika would have sufficient time to effectively test the game, though these milestones were repeatedly extended, and Bloodlines eventually ran over budget. In 2003 Activision intervened, ordering that the game be ready for release in the next few months, and even advancing more money to Troika to complete its work on The Temple of Elemental Evil for Atari, freeing the Troika team to work on Bloodlines exclusively. Activision eventually issued an ultimatum that the project be finished within months, on September 15, 2004. Troika delivered a version of Bloodlines on the required date; due to its scale, the game underwent three weeks of testing. Activision decided that the game was suitable for release, but was contractually bound to withhold Bloodlines until after the debut of Half-Life 2 in November 2004. Troika convinced Activision to use the delay to fund further development; the additional budget was not enough to pay all of Troika's staff, and some employees worked unpaid to complete the project. This version underwent another three weeks of testing to become the final release code; the game was still unfinished when Activision forced its release. Bloodlines creative director Jason Anderson blamed Activision, saying that the publisher took the game from Troika without providing enough time to test and polish it. Conversely, Boyarsky defended Activision for supporting Troika as the project exceeded its budget and schedule. During the nearly four years of development, Anderson estimated that the team worked overtime for all but two months.
Music
The game's original score was composed and produced by Rik Schaffer. Troika licensed many songs for the game, and posters for real bands are featured on the walls of the game's clubs. The soundtrack was released as a limited edition CD to customers who pre-ordered the game through Best Buy. It features nine tracks by artists including Daniel Ash, Chiasm, Tiamat, Darling Violetta, Genitorturers, and Lacuna Coil. "Bloodlines", performed by Al Jourgensen and Ministry, was composed and performed specifically for the game. The licensed tracks were chosen by Activision without input from Troika. The song "Angel" by Massive Attack was used as a placeholder on the game's menu screen. Troika was unable to obtain the rights to use the song in the finished game, and tasked Schaffer with creating something similar.
Release
Vampire: The Masquerade – Bloodlines was released on November 16, 2004 in competition with Half-Life 2, Metal Gear Solid 3: Snake Eater, Halo 2, and several other titles. Valve's contract for Troika's use of the Source engine guaranteed that Bloodlines could not be released before Half-Life 2, and could not be introduced to the public until after the announcement of Half-Life 2, over eighteen months after development began. In February 2004, the game was scheduled for release in spring 2005, partially to avoid competing with Half-Life 2 and the competitive Christmas period, before Activision moved the date to November 2004. Activision obtained model Erin Layne to play Jeanette in promotional material for the game. Layne worked with Bloodlines artist Tim Bradstreet for a day to provide the poses chosen by Activision to represent Jeanette in the game's posters, clothing, and other items.
Despite generally favorable reviews, Bloodlines initial release sold 72,000 copies and earned approximately US$3.4 million in sales, below Troika's other games, Arcanum: Of Steamworks and Magick Obscura (234,000 units, $8.8 million) and The Temple of Elemental Evil (128,000 units, $5.2 million). In comparison, Bloodlines release competitor Half-Life 2 had sold 6.5 million copies by 2008. Bloodlines relative failure contributed to the demise of Troika Games.
Shortly after its debut, most of the development staff were laid off; the remaining staff tried to patch Bloodlines and develop game concepts to secure funding to keep Troika in business. Troika, unable to obtain further funding from Activision or other publishers, released its employees in two waves: the first in November 2004, followed by the remaining staff in December, except for its three founders Anderson, Boyarsky, and Tim Cain. Some employees worked without pay to fix the game. When the company closed in February 2005, it had secured no other game development deals. That month, Boyarsky confirmed that Troika had not been working on a patch for the game since most of its staff were gone since December 2004.
In a 2006 interview, Anderson said that although Troika Games' library had been critically well received, consistent technical issues had marred the perception of the company's games, contributing to Troika's difficulty in obtaining new projects. In 2013, Mitsoda said that Bloodlines was released at "the worst possible time - most people didn't even know we were out ... fans and the Troika [developers] are always going to wonder what the game could have been like with another six months." In a 2017 interview, Boyarsky echoed Mitsoda's sentiments, saying that a further three to six months of development time could have allowed Troika to address many technical flaws, but he was unsure that they could have resolved larger issues. He said "I feel the second half of the game isn't as good as the first. I feel like we devolved into relying too much on combat at the end." Boyarsky noted that it was impossible to know if the fixes would have made Bloodlines more successful, or if it would have remained a niche product. He said, "it might have been too early for people to appreciate it, but we'll never know."
Unofficial patches have been created by the game's fans to address Bloodlines technical problems, and restore missing and incomplete content. After experiencing problems with the first versions of an unofficial patch created by Dan Upright, analytical chemist Werner Spahl continued patching the game from version 1.2 with permission and instructions. The game community tested Spahl's patches, providing reports on bugs and spelling errors. Although the game's complexity meant that repairing one aspect often broke another, as work on the patches progressed Spahl began restoring removed and incomplete content in the game files, adding quests, items, weapons, and characters, with fan help to provide voice acting, models, and reinstating whole levels. Spahl contacted former Troika staff for insight into their intentions for cut content. A library area, for example, was restored after Mitsoda told Spahl only that "it was somehow connected to a main character and a Sabbat boss, and was meant to look like the real-world [Los Angeles] library." A fan traveled to the real library to gather notes on its layout and co-developed the in-game area with Spahl. Schaffer also provided Spahl with unreleased scores from the game. The changes altered the original game so much that Spahl was criticized by some of the game's fans. This resulted in two patch versions: a basic version, fixing the game's technical issues, and a "plus" version with the additional content. As of 2019, the game has over 15 years of post-release support. The patches are also included in the version of the game sold on the GOG.com distribution service.
Boyarsky voiced his support for unofficial patches, saying "they've found the stuff that we hoped people would find about the game, in terms of the different paths you can take and how it played differently for every class." Boyarsky said that while he would have preferred that the game was more successful at launch, that people were still playing and modifying it made Troika's efforts feel more "worthwhile". Schaffer released a remastered version of his score through Milan Records in October 2019, including eight previously unreleased tracks. The score could be purchased on compact disc, digital download, and a blood-red vinyl record version with a marbled, black smoke effect housed in a custom sleeve.
Reception
Vampire: The Masquerade – Bloodlines received a mixed response, with reviewers praising its writing and presentation and criticizing its technical problems. The aggregating review website Metacritic provides a score of 80 out of 100 (based on 61 reviews).
The game has been called a flawed masterpiece by critics. The scale and variety of choice and effect was highlighted by reviewers as Bloodlines greatest success, including the variety of clans, with specific dialog options, and the specific reactions from other characters, each with their own clan loyalty and bias. GameSpy called it a nearly flawless classic role-playing game; The New York Times described it as brilliant but unfinished. Eurogamer praised its "effortlessly intelligent" script, saying that "no other game has come close. Nothing's even tried". VideoGamer.com opined that at its best, Bloodlines stands among the greatest RPGs of the preceding five years, although its technical problems should be remembered. According to HonestGamers, the game "may not be polished and may end with a sigh instead of a shout, but for its ambition alone it deserves stream after stream of compliments." Reviewers compared it to other successful role-playing games, including Fallout, Star Wars: Knights of the Old Republic, The Elder Scrolls III: Morrowind, Planescape: Torment, Baldur's Gate II, and Deus Ex; Eurogamer described Bloodlines as Deus Ex with vampires.
IGN appreciated Bloodlines rewarding exploration outside the main story, and the New York Times and GameSpy praised its "wonderfully imaginative" missions. Reviewers noted that later parts of the game were disappointing, delivering repetitive combat-focused missions with regenerating enemies, abandoning dialog and stealth and punishing players who build characters with more social skills than combat abilities. GameSpy said that it had never seen a role-playing game so affected by player actions with everything, from clan choice and character build to actions in missions, influencing future options and dialog.
Its writing was consistently praised by reviewers. The narrative was considered deep, successfully using White Wolf's Vampire: The Masquerade content. Eurogamer said that it had the best script the website had ever seen in a video game, and others described it as a superbly crafted tale of conspiracies, underworld subterfuge, fun and intrigue. Reviewers appreciated the use of adult themes, such as sex and death, in the storyline of a contemporary video game, which no other games had tackled with similar effectiveness. The mature themes succeeded without being gratuitous or exploitative, and were explored honestly and intelligently by a knowledgeable writer. The game's characters were praised for their memorable, developed personalities, with most major characters possessing their own backstory and presented as living people instead of ciphers. Its ending had a mixed response, with some reviewers appreciating their ability to choose one of the game's four endings (adding an incentive to replay the game) and others considering the ending anti-climactic.
GameSpot and GameSpy called the dialog sharply written, with many memorable lines. Eurogamer noted that the characters' frequent use of vulgar language worked; written as real people, such language fit their character rather than giving the game an adult veneer. The website appreciated the breadth of dialog options, allowing the player greater control of how to play their character. PC Zone opined that the quantity of well-written dialog did not guarantee quality; many player choices seemed to have little effect on a conversation's outcome, and the best response was often the most obvious. The voice acting was repeatedly praised for the actors' quality and the amount of voice work, due to the many dialog options.
Much of Bloodlines criticism focused on technical problems when it was released, undermining the game experience or making it unplayable. Several reviewers noted errors which closed the game and typographical errors in on-screen text. Others cited frequent, sometimes-lengthy load times encountered while moving between hubs and entering or exiting buildings and areas. GameSpot called the game's artificial intelligence poor, often causing enemies to rush at an armed player, fire at them from too great a distance to be effective or become immobilized while waiting for the player's next attack. IGN noted that stealth broke the AI, allowing traps to be triggered and leaving the assailants standing still, unable to locate a hidden player. GameSpy said that the Source engine was Bloodlines greatest weakness; although the RPG aspects were the game's strong suit, features of the Source engine, such as first-person shooting, were where it stumbled.
The combat was also criticized. Reviewers called it poor, clumsy, and unsatisfactory, complaining that Bloodlines favors melee combat; firearms were weak, unwieldy and slow, even for characters specializing in guns. PC Zone, however, called the first-person shooting entertaining and challenging. Although melee combat was criticized as sluggish and difficult due to enemy attacks interrupting the player's, reviewers considered it overpowered; according to GameSpot, a boss character was killed with melee weapons on a first attempt after the repeated failure to do so with a gun. The New York Times found the unavoidable combat in the last part of the game to be so difficult that they had to cheat to succeed. Stealth was criticized, with IGN noting that even with low stealth skill it was possible to sneak around many enemies and feed from a guard without alerting another guard next to them. GameSpot opined that some of the best missions were stealth-based, as combat was more straightforward.
Accolades
In 2004, IGN named Bloodlines the Best PC RPG of that year and GameSpy called the "Ocean House Hotel" quest the Level of the Year. In 2005, Computer Gaming World called it the Role Playing Game of 2004, saying that it offered "a deep, balanced character creation system, a truckload of interesting quests, a good story and great NPCs to interact with." Computer Games Magazine nominated Bloodlines for its 2004 "Best Writing" award; the award went to Half-Life 2.
Legacy
Modern reception
Bloodlines is considered a cult classic. Retrospective critiques continue to praise the game's narrative and degree of choice. In 2009, an article in Rock, Paper, Shotgun declared: "The sense of sorrow comes from the realization that there's nothing like [Bloodlines] on the horizon ... why should there be so few games like this? Oh right, because it's so very hard to do ... the lack of games comparable to Bloodlines is one of the great tragedies of our time." Eurogamer called the game inspirational, with an unmatched level of narrative detail. In 2010, The Escapist called Bloodlines a flawed masterpiece which could have been a genuine masterpiece with more time, money, and staff; although great games may inspire awe, it instead created a devoted fan base which continued to develop the game.
In 2006, PC Zone listed Bloodlines the seventh-best PC game which people were unlikely to have played, calling it the "best buggy game ever released". In 2007, the game was 80th on Computer & Video Games list of its top 100 games, and 86th on PC Gamers 2014 list of the same; it also appeared in PC Gamers 2015 edition (moving to 63rd), 2017 edition (moving to 42nd), and 2021 edition (moving to 93rd). In 2008, bit-tech listed Jeanette as the second-best non-player video game character. In 2011, Rock, Paper, Shotgun called Bloodlines one of the most important PC games of all time ("it signposts a direction to a future of games that we were denied"), listing it as one of the 122 Best PC Games Ever. Cinema Blend called it one of the most underappreciated games of the decade. In 2011, Official Xbox Magazine called it one of the ten PC franchises it wanted on the Xbox 360 console. In 2013, PC Gamer named it one of the 100 Best Horror Games on PC, and PCGamesN called it the seventh-best PC role-playing game. In 2014, Bloodlines was 90th in Empires readers' poll of the 100 Greatest Video Games of All Time, and Maximum PC chose it as one of the games they wanted to be remastered for contemporary game systems.
In 2015, Rock, Paper, Shotgun listed Bloodlines as the PC's 19th Best RPG and 15th Best Horror Game. In 2017, the game was listed 42nd on IGNs list of the Top 100 RPGs of all Time, Den of Geek named it one of the 20 Video Games that Deserve Remakes, and PC Gamer named it one of the best role playing games of all time. In 2018, USGamer named it the 22nd best RPG of All Time, summarising that "for all of its bugs and questionable gameplay choices... the raw strength of its design still has the power to grab fans." PC Gamer highlighted the haunted "Ocean House Hotel" as a "high point of unexpected horror", comparing it to the Shalebridge Cradle level from Thief: Deadly Shadows (2004) and Ravenholm from Half-Life 2 (2004). In 2020, Rock, Paper, Shotgun named it the forty-fourth best RPG for PC.
Sequel
In a November 2004 interview, Boyarsky said that although the team would like to pursue a Bloodlines sequel, the decision was Activision's. Before their closure, Troika had begun development of a workable prototype based on another of White Wolf's tabletop role-playing games, Werewolf: The Apocalypse, set in the same universe as Vampire: The Masquerade. According to Boyarsky, the prototype was one small area built using assets taken from Bloodlines, and allowed the player to play as a werewolf, or a human capable of turning into one.
Paradox Interactive obtained the rights to Bloodlines in 2015, following their purchase of White Wolf. Paradox CEO Fredrik Wester confirmed that a sequel was possible, stating "when the time is right I guess a sequel will find its place in the market." Vampire: The Masquerade – Bloodlines 2 was announced in March 2019. Developed by Seattle-based Hardsuit Labs, the game is written by Bloodliness lead-writer Brian Mitsoda, and Cara Ellison. Set in Seattle, Bloodlines 2 casts the player as a fledgling thinblood vampire with relatively weak abilities, who was turned as part of a masquerade-violating "mass embrace" of humans. The game is in development as of 2021.
A 2018 actual play web series, entitled L.A. by Night aired from 2018 to 2021. L.A. by Night is set in the aftermath of the events of Bloodlines, and featured many returning characters from the game. Initially developed by Geek & Sundry, Paradox took over production in 2020 for the show's fourth and fifth season. Jason Carl - otherwise responsible for the Vampire: the Masquerade metaplot, including elements of Bloodlines - acted as storyteller for the show.
References
Works cited
External links
2004 video games
Action role-playing video games
Activision games
Dark fantasy video games
Dissociative identity disorder in video games
Gothic video games
Open-world video games
Python (programming language)-scripted video games
Single-player video games
Snuff films in fiction
Source (game engine) games
Troika Games games
Urban fantasy video games
Vampire: The Masquerade
Video games about vampires
Video games developed in the United States
Video games featuring protagonists of selectable gender
Video games set in 2004
Video games set in California
Video games set in Los Angeles
Video games with alternate endings
Windows games
Windows-only games
World of Darkness video games |
2111508 | https://en.wikipedia.org/wiki/David%20S.%20Miller | David S. Miller | David Stephen Miller (born November 26, 1974) is an American software developer working on the Linux kernel, where he is the primary maintainer of the networking subsystem and individual networking drivers, the SPARC implementation, and the IDE subsystem. With other people, he co-maintains the crypto API, KProbes, IPsec, and is also involved in other development work.
He is also a founding member of the GNU Compiler Collection steering committee.
Work
As of January 2022, Miller is #1 in "non-author signoff" patches, which are Linux kernel modifications reviewed by the subsystem maintainer who ultimately applies them. He's been in the top gatekeepers for years since kernel 2.6.22 in 2007.
He worked at the Rutgers University Center for Advanced Information Processing, at Cobalt Microserver, and then Red Hat since 1999.
SPARC porting
Miller ported the Linux kernel to the Sun Microsystems SPARC in 1996 with Miguel de Icaza. He has also ported Linux to the 64-bit UltraSPARC machines, including UltraSPARC T1 in early 2006 and later the T2 and T2+. he continues to maintain the sparc port (both 32-bit and 64-bit).
In April 2008, Miller contributed the SPARC port of gold, a from-scratch rewrite of the GNU linker.
Linux networking
Miller is one of the maintainers of the Linux TCP/IP stack and has been key in improving its performance in high load environments. He also wrote and/or contributed to numerous network card drivers in the Linux kernel.
eBPF
Miller is currently working on Linux's dynamic tracing technology, called eBPF.
Speeches
David delivered the keynote at netdev 0.1 on February 16, 2015, in Ottawa.
He also delivered the keynote at Ottawa Linux Symposium in 2000, and another keynote at Linux.conf.au in Dunedin in January 2006.
He gave a talk on "Multiqueue Networking Developments in the Linux Kernel" at the July 2009 meeting of the New York Linux Users Group.
References
External links
David S. Miller's Linux Networking Homepage
David Miller's old blog
David Miller Google+ page
People from Seattle
Linux kernel programmers
American computer programmers
1974 births
Living people
Red Hat employees |
7952 | https://en.wikipedia.org/wiki/Digital%20Equipment%20Corporation | Digital Equipment Corporation | Digital Equipment Corporation (DEC ), using the trademark Digital, was a major American company in the computer industry from the 1960s to the 1990s. The company was co-founded by Ken Olsen and Harlan Anderson in 1957. Olsen was president until forced to resign in 1992, after the company had gone into precipitous decline.
Although the company produced many different product lines over its history, it is best known for the work in the minicomputer market starting in the mid-1960s. The company produced a series of machines known as the PDP line, with the PDP-8 and PDP-11 being among the most successful minis in history. Their success was only surpassed by another DEC product, the late-1970s VAX "supermini" systems that were designed to replace the PDP-11. Although a number of competitors had successfully competed with Digital through the 1970s, the VAX cemented the company's place as a leading vendor in the computer space.
As microcomputers improved in the late 1980s, especially with the introduction of RISC-based workstation machines, the performance niche of the minicomputer was rapidly eroded. By the early 1990s, the company was in turmoil as their mini sales collapsed and their attempts to address this by entering the high-end market with machines like the VAX 9000 were market failures. After several attempts to enter the workstation and file server market, the DEC Alpha product line began to make successful inroads in the mid-1990s, but was too late to save the company.
DEC was acquired in June 1998 by Compaq in what was at that time the largest merger in the history of the computer industry. During the purchase, some parts of DEC were sold to other companies; the compiler business and the Hudson, Massachusetts facility, were sold to Intel. At the time, Compaq was focused on the enterprise market and had recently purchased several other large vendors. DEC was a major player overseas where Compaq had less presence. However, Compaq had little idea what to do with its acquisitions, and soon found itself in financial difficulty of its own. The company subsequently merged with Hewlett-Packard (HP) in May 2002.
, decades-old hardware (including PDP-11, VAX, and AlphaServer) is being emulated to allow legacy software to run on modern hardware; funding for this is planned to last at least until 2030.
History
From 1957 until 1992, DEC's headquarters were located in a former wool mill in Maynard, Massachusetts. The headquarters buildings were vacated in 1993, renamed Clock Tower Place, and subsequently redeveloped as Mill & Main Place, a 1.1 million square foot facility for offices and light industry.
Initially focusing on the small end of the computer market allowed DEC to grow without its potential competitors making serious efforts to compete with them. Their PDP series of machines became popular in the 1960s, especially the PDP-8, widely considered to be the first successful minicomputer. Looking to simplify and update their line, DEC replaced most of their smaller machines with the PDP-11 in 1970, the year they became the third largest computer manufacturer after IBM and the UNIVAC Division of Sperry Rand. The rising corporation eventually sold over 600,000 PDP-11s.
Originally designed as a follow-on to the PDP-11, DEC's VAX-11 series was the first widely used 32-bit minicomputer, sometimes referred to as "superminis". These systems were able to compete in many roles with larger mainframe computers, such as the IBM System/370. The VAX was a best-seller, with over 400,000 sold, and its sales through the 1980s propelled DEC to become the second largest computer company in the industry. At its peak, it was the second largest employer in Massachusetts, after the state government.
The rapid rise of the business microcomputer in the late 1980s, and especially the introduction of powerful 32-bit systems in the 1990s, quickly eroded the value of DEC's systems. DEC's last major attempt to find a space in the rapidly changing market was the DEC Alpha 64-bit RISC instruction set architecture. DEC initially started work on Alpha as a way to re-implement their VAX series, but also employed it in a range of high-performance workstations. Although the Alpha processor family met both of these goals, and, for most of its lifetime, was the fastest processor family on the market, extremely high asking prices were outsold by lower priced workstation chips from Intel and IBM/Motorola.
DEC was acquired in June 1998 by Compaq, in what was at that time the largest merger in the history of the computer industry. At the time, Compaq was focused on the enterprise market and had recently purchased several other large vendors. DEC was a major player overseas where Compaq had less presence. However, Compaq had little idea what to do with its acquisitions, and soon found itself in financial difficulty of its own. The company subsequently merged with Hewlett-Packard (HP) in May 2002.
Products
Beyond DECsystem-10/20, PDP, VAX and Alpha, DEC was known for its work in communication subsystem designs, such as Ethernet, DNA (DIGITAL Network Architecture: predominantly DECnet products), DSA (Digital Storage Architecture: disks/tapes/controllers), and its "dumb terminal" subsystems including VT100 and DECserver products.
Research
DEC's Research Laboratories (or Research Labs, as they were commonly known) conducted DEC's corporate research. Some of them were continued in operation by Compaq and are still operated by Hewlett-Packard. The laboratories were:
Cambridge Research Laboratory (CRL) in Cambridge, Massachusetts, US
MetroWest Technology Campus (MTC) in Maynard, Massachusetts, US
Network Systems Laboratory (NSL) in Palo Alto, California, US
Systems Research Center (SRC) in Palo Alto, California, US
Paris Research Laboratory (PRL) in Paris, France
Western Research Laboratory (WRL) in Palo Alto, California, US
Western Software Laboratory (WSL) in Palo Alto, California, US
Some of the former employees of DEC's Research Labs or DEC's R&D in general include:
Gordon Bell: technical visionary, VP Engineering 1972–1983; later moved to Microsoft Research
Leonard Bosack
Mike Burrows
Luca Cardelli
Dave Cutler: led RSX-11M, VAX/VMS, VAXELN and MICA operating systems development; then led Windows NT development at Microsoft
Ed deCastro: became co-founder of Data General Corporation
Alan Eustace
Jim Gettys: early developer of X Window System
Henri Gouraud
Jim Gray
Alan Kotok
Leslie Lamport
Butler Lampson
Scott A. McGregor: co-author of the X Window System, version 11
Louis Monier
Isaac Nassi
Radia Perlman
Marcus Ranum
Brian Reid
Paul Vixie
Sanjay Ghemawat
Jeff Dean
Patrick O'Neil
Some of the former employees of Digital Equipment Corp were responsible for developing DEC Alpha and StrongARM:
Daniel W. Dobberpuhl
Jim Keller
Rich Witek
Some of the work of the Research Labs was published in the Digital Technical Journal, which was in published from 1985 until 1998.
Accomplishments and legacy
DEC supported the ANSI standards, especially the ASCII character set, which survives in Unicode and the ISO 8859 character set family. DEC's own Multinational Character Set also had a large influence on ISO 8859-1 (Latin-1) and, by extension, Unicode.
Software
The first versions of the C language and the Unix operating system ran on DEC's PDP series of computers (first on a PDP-7, then the PDP-11), which were among the first commercially viable minicomputers, although for several years DEC itself did not encourage the use of Unix.
DEC produced widely used and influential interactive operating systems, including OS-8, TOPS-10, TOPS-20, RSTS/E, RSX-11, RT-11, and OpenVMS. PDP computers, in particular the PDP-11 model, inspired a generation of programmers and software developers. Some PDP-11 systems more than 25 years old (software and hardware) are still being used to control and monitor factories, transportation systems and nuclear plants. DEC was an early champion of time-sharing systems.
The command-line interfaces found in DEC's systems, eventually codified as DCL, would look familiar to any user of modern microcomputer CLIs; those used in earlier systems, such as CTSS, IBM's JCL, or Univac's time-sharing systems, would look utterly alien. Many features of the CP/M and MS-DOS CLI show a recognizable family resemblance to DEC's OSes, including command names such as DIR and HELP and the "name-dot-extension" file naming conventions.
Notes-11 and its follow-on product, , were two of the first examples of online collaboration software, a category that has become to be known as groupware. Len Kawell, one of the original Notes-11 developers, later joined Lotus Development Corporation and contributed to their Lotus Notes product.
The MUMPS programming language, with its built-in database, was developed on the PDP-7, 9, and 15 series machines. MUMPS is still widely used in medical information systems, such as those provide by Meditech and Epic Systems.
The Babel Fish machine translation service was developed by DEC researchers, and was one of the first machine translators to achieve broad success using natural language processing techniques.
Hardware
VAX and MicroVAX computers (very widespread in the 1980s) running VAX/VMS formed one of the most important proprietary networks, DECnet, which linked business and research facilities. The DECnet protocols formed one of the first peer-to-peer networking standards, with DECnet phase I being released in the mid-1970s. Email, file sharing, and distributed collaborative projects existed within the company long before their value was recognized in the market.
The LA36 and LA120 dot matrix printers became industry standards and may have hastened the demise of the Teletype Corporation.
The VT100 computer terminal became the industry standard, implementing a useful subset of the ANSI X3.64 standard, and even today terminal emulators such as HyperTerminal, PuTTY and Xterm still emulate a VT100 (or its more capable successor, the VT220).
DEC invented Digital Linear Tape (DLT), formerly known as CompacTape, which began as a compact backup medium for MicroVAX systems, and later grew to capacities of 800 gigabytes.
Work on the first hard-disk-based MP3 player, the Personal Jukebox, started at the DEC Systems Research Center. (The project was started about a month before the merger into Compaq was completed.)
DEC's Western Research Lab created the Itsy Pocket Computer. This was developed into the Compaq iPaq line of PDAs, which replaced the Compaq Aero PDA.
DEC also produced a proprietary personal computer known as the Rainbow 100. It could run either MS-DOS or CP/M but from a hardware standpoint it was largely incompatible with the IBM PC.
Networking
DEC, Intel and Xerox, through their collaboration to create the DIX standard, were champions of Ethernet, but DEC is the company that made Ethernet commercially successful. Initially, Ethernet-based DECnet and LAT protocols interconnected VAXes with DECserver terminal servers. Starting with the Unibus to Ethernet adapter, multiple generations of Ethernet hardware from DEC were the de facto standard. The CI "computer interconnect" adapter was the industry's first network interface controller to use separate transmit and receive "rings".
DEC also invented clustering, an operating system technology that treated multiple machines as one logical entity. Clustering permitted sharing of pooled disk and tape storage via the HSC50/70/90 and later series of Hierarchical Storage Controllers (HSC). The HSCs delivered the first hardware RAID 0 and RAID 1 capabilities and the first serial interconnects of multiple storage technologies. This technology was the forerunner to architectures such as Network of Workstations, which are used for massively cooperative tasks such as web searches and drug research.
The X Window System is the network transparent window system used on Unix and Linux and available on other operating systems such as MacOS. It was developed at MIT jointly between Project Athena and the Laboratory for Computer Science. DEC was the primary sponsor for the project, which was a contemporary of the GNU Project but not associated with it.
In the period 1994–99 Linus Torvalds developed versions of Linux on early AlphaServer systems provided by the engineering department. Compaq software engineers developed special Linux kernel modules. A well-known Linux distribution that ran on AlphaServer systems was Red Hat 7.2. Another distribution that ran on Alpha was Gentoo Linux.
DEC was one of the first businesses connected to the Internet, with dec.com, registered in 1985, being one of the first of the now ubiquitous .com domains. DEC's gatekeeper.dec.com was a well-known software repository during the pre-World Wide Web days, and DEC was also the first computer vendor to open a public website, on 1 October 1993. The popular AltaVista, created by DEC, was one of the first comprehensive Internet search engines. (Although Lycos was earlier, it was much more limited.)
DEC once held the Class A IP address block 16.0.0.0/8.
Corporate
Digital Federal Credit Union (DCU) is a credit union which was chartered in 1979 for employees of DEC. Today its field of membership is open to existing family members, over 900 different sponsors, several communities in Massachusetts and several organizations. Many of the sponsors are companies that had acquired pieces of DEC.
Matrix management
User organizations
Originally the users' group was called DECUS (Digital Equipment Computer User Society) during the 1960s to 1990s. When Compaq acquired DEC in 1998, the users group was renamed CUO, the Compaq Users' Organisation. When HP acquired Compaq in 2002, CUO became HP-Interex, although there are still DECUS groups in several countries. In the United States, the organization is represented by the Encompass organization; currently Connect.
Several editions of the Small Computer Handbook were published by DEC, giving information about their PDP line of computers. The editions were:
Small Computer Handbook (1973)
PDP8/e, PDP8/m & PDP8/f, Small Computer Handbook
Small Computer Handbook (1970 edition)
Web sites with photos of their covers include:
1967 edition (PDP 8/i)
Small Computer Handbook
pdp-8/e
1973 edition
Apple Woz Small Computer Handbook snapshot
Notes
References
(Present), "Digital Equipment Corporation: Nineteen Fifty-Seven to the Present", DEC Press, 1978
Further reading
"Digital Equipment Corporation (DEC): A Case Study of Indecision, Innovation and Company Failure", David Thomas Goodwin, Ph.D. thesis, University of Amsterdam, 2016
External links
GBell's CyberMuseum for Digital Equipment Corp (DEC)
Rise and Fall of Digital (Equipment Corporation), a company chronicle at a German computer museum
Ken Olsen, New England Economic Adventure
Companies based in Middlesex County, Massachusetts
Defunct computer companies based in Massachusetts
Defunct computer hardware companies
Hewlett-Packard
Manufacturing companies based in Massachusetts
Computer companies disestablished in 1998
Computer companies established in 1957
1998 mergers and acquisitions
1957 establishments in Massachusetts
1998 disestablishments in Massachusetts
1960s initial public offerings
Compaq |
7727159 | https://en.wikipedia.org/wiki/Inner-platform%20effect | Inner-platform effect | The inner-platform effect is the tendency of software architects to create a system so customizable as to become a replica, and often a poor replica, of the software development platform they are using. This is generally inefficient and such systems are often considered to be examples of an anti-pattern.
Examples
Examples are visible in plugin-based software such as some text editors and web browsers which often have developers create plugins that recreate software that would normally run on top of the operating system itself. The Firefox add-on mechanism has been used to develop a number of FTP clients and file browsers, which effectively replicate some of the features of the operating system, albeit on a more restricted platform.
In the database world, developers are sometimes tempted to bypass the RDBMS, for example by storing everything in one big table with three columns labelled entity ID, key, and value. While this entity-attribute-value model allows the developer to break out from the structure imposed by an SQL database, it loses out on all the benefits, since all of the work that could be done efficiently by the RDBMS is forced onto the application instead. Queries become much more convoluted, the indexes and query optimizer can no longer work effectively, and data validity constraints are not enforced. Performance and maintainability can be extremely poor.
A similar temptation exists for XML, where developers sometimes favor generic element names and use attributes to store meaningful information. For example, every element might be named item and have attributes type and value. This practice requires joins across multiple attributes in order to extract meaning. As a result, XPath expressions are more convoluted, evaluation is less efficient, and structural validation provides little benefit.
Another example is the phenomenon of web desktops, where a whole desktop environment—often including a web browser—runs inside a browser (which itself typically runs within the desktop environment provided by the operating system). A desktop within a desktop can be unusually awkward for the user, and hence this is generally only done to run programs that cannot easily be deployed on end user systems, or by hiding the outer desktop away.
Effect
It is normal for software developers to create a library of custom functions that relate to their specific project. The inner-platform effect occurs when this library expands to include general purpose functions that duplicate functionality already available as part of the programming language or platform. Since each of these new functions will generally call a number of the original functions, they tend to be slower, and if poorly coded, less reliable as well.
On the other hand, such functions are often created to present a simpler (and often more portable) abstraction layer on top of lower level services that either have an awkward interface, are too complex, non-portable or insufficiently portable, or simply a poor match for higher level application code.
Appropriate uses
An inner platform can be useful for portability and privilege separation reasons—in other words, so that the same application can run on a wide variety of outer platforms without affecting anything outside a sandbox managed by the inner platform. For example, Sun Microsystems designed the Java platform to meet both of these goals.
See also
End-to-end principle
Greenspun's tenth rule
Not invented here
Plain old Java object
Second-system effect
Zawinski's law of software envelopment
References
Original definition and example
Example: The Enterprise Rules Engine
Example: I Think I'll Call Them "Transactions"
AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis by William J. Brown et al.
Anti-patterns |
5632954 | https://en.wikipedia.org/wiki/Splice%20%28system%20call%29 | Splice (system call) | is a Linux-specific system call that moves data between a file descriptor and a pipe without a round trip to user space. The related system call moves or copies data between a pipe and user space. Ideally, splice and vmsplice work by remapping pages and do not actually copy any data, which may improve I/O performance. As linear addresses do not necessarily correspond to contiguous physical addresses, this may not be possible in all cases and on all hardware combinations.
Workings
With , one can move data from one file descriptor to another without incurring any copies from user space into kernel space, which is usually required to enforce system security and also to keep a simple interface for processes to read and write to files. works by using the pipe buffer. A pipe buffer is an in-kernel memory buffer that is opaque to the user space process. A user process can splice the contents of a source file into this pipe buffer, then splice the pipe buffer into the destination file, all without moving any data through userspace.
Linus Torvalds described in a 2006 email, which was included in a KernelTrap article.
Origins
The Linux splice implementation borrows some ideas from an original proposal by Larry McVoy in 1998. The splice system calls first appeared in Linux kernel version 2.6.17 and were written by Jens Axboe.
Prototype
ssize_t splice(int fd_in, loff_t *off_in, int fd_out, loff_t *off_out, size_t len, unsigned int flags);
Some constants that are of interest are:
/* Splice flags (not laid down in stone yet). */
#ifndef SPLICE_F_MOVE
#define SPLICE_F_MOVE 0x01
#endif
#ifndef SPLICE_F_NONBLOCK
#define SPLICE_F_NONBLOCK 0x02
#endif
#ifndef SPLICE_F_MORE
#define SPLICE_F_MORE 0x04
#endif
#ifndef SPLICE_F_GIFT
#define SPLICE_F_GIFT 0x08
#endif
Example
This is an example of splice in action:
/* Transfer from disk to a log. */
int log_blocks (struct log_handle * handle, int fd, loff_t offset, size_t size)
{
int filedes [2];
int ret;
size_t to_write = size;
ret = pipe (filedes);
if (ret < 0)
goto out;
/* splice the file into the pipe (data in kernel memory). */
while (to_write > 0) {
ret = splice (fd, &offset, filedes [1], NULL, to_write,
SPLICE_F_MORE | SPLICE_F_MOVE);
if (ret < 0)
goto pipe;
else
to_write -= ret;
}
to_write = size;
/* splice the data in the pipe (in kernel memory) into the file. */
while (to_write > 0) {
ret = splice (filedes [0], NULL, handle->fd,
&(handle->fd_offset), to_write,
SPLICE_F_MORE | SPLICE_F_MOVE);
if (ret < 0)
goto pipe;
else
to_write -= ret;
}
pipe:
close (filedes [0]);
close (filedes [1]);
out:
if (ret < 0)
return -errno;
return 0;
}
Complementary system calls
is one of three system calls that complete the architecture. can map an application data area into a pipe (or vice versa), thus allowing transfers between pipes and user memory where transfers between a file descriptor and a pipe. is the last part of the trilogy. It duplicates one pipe to another, enabling forks in the way applications are connected with pipes.
Requirements
When using with sockets, the network controller (NIC) should support DMA, otherwise splice() will not deliver a large performance improvement. The reason for this is that each page of the pipe will just fill up to frame size (1460 bytes of the available 4096 bytes per page).
Not all filesystem types support . Also, sockets do not support .
See also
System calls
References
External links
Linux kernel 2.6.17 (kernelnewbies.org)
Two new system calls: splice() and sync_file_range() (LWN.net)
Some new system calls (LWN.net)
Linux kernel features
System calls |
30639009 | https://en.wikipedia.org/wiki/Coppersmith%27s%20attack | Coppersmith's attack | Coppersmith's attack describes a class of cryptographic attacks on the public-key cryptosystem RSA based on the Coppersmith method. Particular applications of the Coppersmith method for attacking RSA include cases when the public exponent e is small or when partial knowledge of a prime factor of the secret key is available.
RSA basics
The public key in the RSA system is a tuple of integers , where N is the product of two primes p and q. The secret key is given by an integer d satisfying ; equivalently, the secret key may be given by and if the Chinese remainder theorem is used to improve the speed of decryption, see CRT-RSA. Encryption of a message M produces the ciphertext , which can be decrypted using by computing .
Low public exponent attack
In order to reduce encryption or signature verification time, it is useful to use a small public exponent (). In practice, common choices for are 3, 17 and 65537 . These values for e are Fermat primes, sometimes referred to as and respectively . They are chosen because they make the modular exponentiation operation faster. Also, having chosen such , it is simpler to test whether and while generating and testing the primes in step 1 of the key generation. Values of or that fail this test can be rejected there and then. (Even better: if e is prime and greater than 2, then the test can replace the more expensive test .)
If the public exponent is small and the plaintext is very short, then the RSA function may be easy to invert, which makes certain attacks possible.
Padding schemes ensure that messages have full lengths, but additionally choosing public exponent is recommended. When this value is used, signature verification requires 17 multiplications, as opposed to about 25 when a random of similar size is used. Unlike low private exponent (see Wiener's attack), attacks that apply when a small is used are far from a total break, which would recover the secret key d.
The most powerful attacks on low public exponent RSA are based on the following theorem, which is due to Don Coppersmith.
Coppersmith method
Theorem 1 (Coppersmith)
Let N be an integer and be a monic polynomial of degree over the integers. Set for . Then, given , attacker (Eve) can efficiently find all integers satisfying . The running time is dominated by the time it takes to run the LLL algorithm on a lattice of dimension O with .
This theorem states the existence of an algorithm that can efficiently find all roots of modulo that are smaller than . As gets smaller, the algorithm's runtime decreases. This theorem's strength is the ability to find all small roots of polynomials modulo a composite .
Håstad's broadcast attack
The simplest form of Håstad's attack is presented to ease understanding. The general case uses the Coppersmith method.
Suppose one sender sends the same message in encrypted form to a number of people , each using the same small public exponent , say , and different moduli . A simple argument shows that as soon as ciphertexts are known, the message is no longer secure: Suppose Eve intercepts , and , where . We may assume for all (otherwise, it is possible to compute a factor of one of the numbers by computing .) By the Chinese remainder theorem, she may compute such that . Then ; however, since for all , we have . Thus holds over the integers, and Eve can compute the cube root of to obtain .
For larger values of , more ciphertexts are needed, particularly, ciphertexts are sufficient.
Generalizations
Håstad also showed that applying a linear padding to prior to encryption does not protect against this attack. Assume the attacker learns that for and some linear function , i.e., Bob applies a pad to the message prior to encrypting it so that the recipients receive slightly different messages. For instance, if is bits long, Bob might encrypt and send this to the -th recipient.
If a large enough group of people is involved, the attacker can recover the plaintext from all the ciphertext with similar methods. In more generality, Håstad proved that a system of univariate equations modulo relatively prime composites, such as applying any fixed polynomial , could be solved if sufficiently many equations are provided. This attack suggests that randomized padding should be used in RSA encryption.
Theorem 2 (Håstad)
Suppose are relatively prime integers and set . Let be polynomials of maximum degree . Suppose there exists a unique satisfying for all . Furthermore, suppose . There is an efficient algorithm that, given for all , computes .
Proof
Since the are relatively prime the Chinese remainder theorem might be used to compute coefficients satisfying and for all . Setting , we know that . Since the are nonzero, we have that is also nonzero. The degree of is at most . By Coppersmith’s theorem, we may compute all integer roots satisfying and . However, we know that , so is among the roots found by Coppersmith's theorem.
This theorem can be applied to the problem of broadcast RSA in the following manner: Suppose the -th plaintext is padded with a polynomial , so that . Then is true, and Coppersmith’s method can be used. The attack succeeds once , where is the number of messages. The original result used Håstad’s variant instead of the full Coppersmith method. As a result, it required messages, where .
Franklin–Reiter related-message attack
Franklin and Reiter identified an attack against RSA when multiple related messages are encrypted: If two messages differ only by a known fixed difference between the two messages and are RSA-encrypted under the same RSA modulus , then it is possible to recover both of them. The attack was originally described with public exponent , but it works more generally (with increasing cost as grows).
Let be Alice's public key. Suppose are two distinct messages satisfying for some publicly known polynomial . To send and to Alice, Bob may naively encrypt the messages and transmit the resulting ciphertexts . Eve can easily recover , given , by using the following theorem:
Theorem 3 (Franklin–Reiter)
Let be an RSA public key. Let satisfy for some linear polynomial with . Then, given , attacker (Eve) can recover in time quadratic in .
Proof
Since , we know that is a root of the polynomial . Similarly, is a root of . Hence, the linear factor divides both polynomials.
Therefore, Eve may calculate the greatest common divisor of and , and if the turns out to be linear, is found. The can be computed in quadratic time in and using the Euclidean algorithm.
Coppersmith’s short-pad attack
Like Håstad’s and Franklin–Reiter’s attacks, this attack exploits a weakness of RSA with public exponent . Coppersmith showed that if randomized padding suggested by Håstad is used improperly, then RSA encryption is not secure.
Suppose Bob sends a message to Alice using a small random padding before encrypting it. An attacker, Eve, intercepts the ciphertext and prevents it from reaching its destination. Bob decides to resend to Alice because Alice did not respond to his message. He randomly pads again and transmits the resulting ciphertext. Eve now has two ciphertexts corresponding to two encryptions of the same message using two different random pads.
Even though Eve does not know the random pad being used, she still can recover the message by using the following theorem, if the random padding is too short.
Theorem 4 (Coppersmith)
Let be a public RSA key, where is bits long. Set . Let be a message of length at most bits. Define and , where and are distinct integers with . If Eve is given and the encryptions of (but is not given or ), she can efficiently recover .
Proof
Define and . We know that when , these polynomials have as a common root. In other words, is a root of the resultant . Furthermore, . Hence, is a small root of modulo , and Eve can efficiently find it using the Coppersmith method. Once is known, the Franklin–Reiter attack can be used to recover and consequently .
See also
ROCA attack
References
Cryptographic attacks
Attacks on public-key cryptosystems |
6620599 | https://en.wikipedia.org/wiki/366th%20Fighter%20Wing | 366th Fighter Wing | The 366th Fighter Wing (366 FW) is a fighter wing of the United States Air Force Air Combat Command stationed at Mountain Home Air Force Base, Idaho.
Units
The wing comprises four groups: the 366th Operations Group, 366th Maintenance Group, 366th Mission Support Group and 366th Medical Group.
The wing is home to three fighter squadrons: the 389th Fighter Squadron and 391st Fighter Squadron flying the F-15E Strike Eagle aircraft and the 428th Fighter Squadron which flies the Republic of Singapore Air Force F-15F (aka F-15SG). Until September 2010, a fourth squadron, the 390th Fighter Squadron flew the F-15C Eagle in an air superiority mission. The 417th Tactical Fighter Squadron which flew F-4D Phantoms and later F-111's. In September 2010 the redesignated 390th Electronic Combat Squadron assumed the mission of the 388th Electronic Combat Squadron and its F-15C/D aircraft redistributed to other F-15 units pursuant to a 2005 BRAC decision.
The 726th Air Control Squadron assigned here gives an air picture to the aircraft as they train. This is a mobile radar unit that routinely deploys to various theaters to operate command and control functions. Structured as a Control and Reporting Center, able to accommodate Control and Reporting Post function. Air Weapons Controller personnel often deploy without home-system to support flying units in various scenarios and exercises throughout the U.S. and European theater. An active Air National Guard unit, the 266th Range Squadron, controls and maintains emitter sites within the operational training range located in southern Idaho.
Additionally, the 390th Electronic Combat Squadron, located at Naval Air Station Whidbey Island, Washington, is assigned to the 366th Operations Group. The squadron, consisting of USAF flight crews flying U.S. Navy EA-6B Prowler and EA-18G Growler aircraft, is responsible for suppression of enemy air defenses in support of expeditionary aircraft and ground troops by disrupting enemy electronic activity and obtaining tactical electronic intelligence.
History
For additional history and lineage, see 366th Operations Group
The wing was activated on 1 January 1953 as the 366th Fighter Bomber Wing at Alexandria Air Force Base, Louisiana. It replaced the Federalized Iowa Air National Guard 132d Fighter Bomber Wing which was being returned to state control after a twenty-one-month period of activation as a result of the Korean War. Initially using the former ANG F-51D Mustangs, the 366th received F-86F Sabres which were returned from Korea in the summer of 1953, then received new swept-wing F-84F Thunderstreaks in early 1954. On 18 March 1954, the KB-29 equipped 420th Air Refueling Squadron was attached to the Wing to provide air refueling for the Thunderstreaks. The B-29s were later replaced with KB-50 aerial tankers.
The Wing became first TAC unit to perform six-month TDY rotations with NATO at Aviano AB, Italy, with rotations continuing to both Italy and France for six-month stretches. As it did so, the wing also began converting to the F-84F Thunderstreak. The 366th Fighter Day Group was inactivated in September 1957 when parent wing adopted Tri-Deputate organization and assigned operational squadrons directly to the wing.
In late 1957, the wing began conversion to the F-100 Super Sabre to its inventory while continuing to operate the F-84. Redesignated 366th Tactical Fighter Wing 1 July 1958 as part of Air Force-Wide naming change. Inactivated 1 April 1959 as part of a general budgetary reduction of USAF wings. Aircraft transferred to Air National Guard.
366th Tactical Fighter Wing
Chaumont-Semoutiers Air Base
On 8 May 1962, the 366th Tactical Fighter Wing was activated at Chaumont-Semoutiers Air Base, France with four Tactical Fighter Squadrons, formed by absorbing the assets and personnel of the provisional 7108th Tactical Wing, formed from the assets of several Air National Guard squadrons rushed to France in the wake of the Berlin Crisis of 1961, then as the ANG personnel were demobilized, personnel were drawn from the active-duty ranks to man the organization.
With Wing Headquarters at Chaumont AB, the 366th TFW was organized in France as follows:
389th Tactical Fighter Squadron (Chaumont AB Blue striping)
390th Tactical Fighter Squadron (Chambley-Bussieres Air Base Yellow striping)
391st Tactical Fighter Squadron (Etain-Rouvres Air Base Red striping)
480th Tactical Fighter Squadron (Phalsbourg-Bourscheid Air Base Green striping)
The 480th TFS operated at Chaumont until runway repairs were completed at Phalsbourg Air Base then deployed there on 20 December. This multi-base organizational structure was unique in that it was the only tactical fighter wing in USAFE with four squadrons at four different air bases in Europe. The 366th was also the last USAFE tactical fighter wing formed in Europe. Each squadron flew 20 F-84F Thunderstreaks left by the departing Air National Guard Units. In addition to the flying units being dispersed, the 366th also formed Combat Support Groups at each base to support the flying operations.
The decision to form, organize, equip and train the 366th at four different bases was a poor decision by USAFE. The first major problem being the simple logistics needed to operate the squadrons. Deliveries of services in France had always been a problem since the USAF bases were established in the early 1950s. Delivery of supplies and equipment sometimes took months, not weeks. In addition, the F-84 was being phased out of the USAF since 1958 and there was a shortage of pilots and trained mechanics in USAFE for the model. Personnel issues such as married personnel avoiding assignments in France due to poor housing conditions meant that most assigned personnel were first-term airmen with little, or elementary job skills. Also, the cost of maintaining USAFE bases in France were significantly higher.
In October 1962 the 366th was needed to respond to the Cuban Missile Crisis, assuming a 24/7 alert posture for two weeks beginning on 23 October. Some deployed aircraft were called back from Wheelus Air Base Libya where they were undergoing training. Targets in Eastern Europe were identified and changed on a daily, sometimes hourly schedule. Two KB-50 tankers were flown into Chaumont to provide aerial refueling to the tactical aircraft if necessary. On 5 November, the 24/7 alert was stood down and operations returned to normal peacetime levels.
Unlike their Air National Guard predecessors, HQ USAFE did not provide the 366th with a definitive mission statement. The wing simply continued to build on the 7108th Tactical Wing's missions. These were expanded to include the capability to receive and support dual-based CONUS tactical fighter squadrons. Plans were made for the 366th to absorb up to four additional fighter squadrons and operate from three additional NATO Dispersed Operating Bases.
A result of French president Charles de Gaulle's deep suspicion of "supranational organizations" and France's shift away from the NATO orbit in the early 1960s ultimately led to the decision in November 1962 that Chambley, Chaumont, Etain and Phalsbourg air bases would be returned to reserve status.
On 26 April 1963 the 366 TFW was notified of its pending relocation to Holloman AFB, New Mexico. The initial deployment of personnel began on 4 June. Personnel and equipment were either moved to Holloman, or reassigned throughout USAFE. The 366th officially departed Chaumont on 22 July 1963.
Holloman Air Force Base
The wing returned to the United States in July 1963 and its new home at Holloman AFB, New Mexico.
At Holloman, the wing began converting to the new F-4C Phantom II in February 1965. Later that year, the wing sent its first squadron to the Republic of Vietnam. The 390th Fighter Squadron was deployed to Da Nang Air Base (6252d Tactical Wing) in October 1965, and the 391st went to Cam Ranh Bay Air Base (12th Tactical Fighter Wing) in January 1966.
In March 1966, HQ 366th Tactical Fighter Wing, the 389th TFS and various support units of the wing entered the conflict and were reassigned to Phan Rang Air Base, Republic of Vietnam as the base host organization.
Phan Rang Air Base
The 366th arrived at Phan Rang Air Base in March 1966. It was an air base dating back to World War II, used by the Japanese and French. To accommodate the expanding Vietnam War, Phan Rang was expanded by the USAF in 1966 to accommodate both American and South Vietnamese fighter and helicopter units. The 366th was the first permanent USAF organization to be stationed at the base. The wing was composed of a mixture of F-100 Super Sabre and F-4C Phantom II squadrons, deployed from several Tactical Air Command wings:
352d Tactical Fighter Squadron, F-100D/F, deployed from the 354th TFW (Tail Code: VM)
389th Tactical Fighter Squadron, F-4C, component of the 366th TFW
614th Tactical Fighter Squadron, F-100D/F, deployed from the 401st TFW (Tail Code: VP)
615th Tactical Fighter Squadron, F-100D/F, deployed from the 401st TFW (Tail Code: VZ)
Missions then flown by the 366th TFW consisted generally of two types—MiG-CAP patrols to protect strike aircraft from attack by marauding North Vietnamese fighters and fighter-bomber strikes carried out with iron bombs against ground targets. The MiG patrols and attacks in North Vietnam were taken over by the F-4s and F-105s based in Thailand, which could carry a larger bomb load further and faster. In addition, the F-105 was built to take the extreme structural loads of low-level, high-speed flight, whereas the F-100 was not. Consequently, the F-100D fighter bombers generally operated only in South Vietnam where the F-100 turned out to be a very effective ground support aircraft, and beat back many enemy attacks.
In October 1966, the F-100-equipped 612th Tactical Fighter Squadron was activated at Phan Rang, composed of former Colorado Air National Guard aircraft which had deployed to Japan and were sent as additional aircraft to Vietnam when their deployment ended. Logistical difficulties in supporting both F-100 and F-4 aircraft at the same base led to the decision to move the 389th TFS to Da Nang Air Base, where F-4Cs were already stationed, and to make Phan Rang an all F-100 base.
As former 366th TFW squadrons were at Da Nang (390th, 480th) already, it was decided to perform a name-only reassignment and move the 366th TFW to Da Nang Air Base as the host unit, and reassign the 35th Tactical Fighter Wing at Da Nang to Phan Rang to become the host unit. This realignment was effective on 1 October 1966 in an administrative change, with no personnel reassignments.
Da Nang Air Base
The 366th TFW moved to Da Nang AB, Republic of Vietnam and regained the 390th FS on 1 October 1966, becoming the host unit at the larger, sprawling base that accommodated Army, Navy, Marine and Air Force units. The squadrons assigned to the wing at Da Nang were:
389th Tactical Fighter Squadron (F-4C/D)
390th Tactical Fighter Squadron (F-4C/D)
480th Tactical Fighter Squadron (F-4C/D)
In addition to the F-4 squadrons, the 64th Fighter-Interceptor Squadron from Clark Air Base, Philippines rotated F-102 Delta Dagger interceptors to the base from Clark, providing air defense of the facility from any North Vietnamese MiGs. The 64th was actually an Air Defense Command unit from Paine Field, Washington which had been deployed to Clark to provide air defense over several major USAF bases in South Vietnam.
The mission of the 366th at Da Nang was to support Operation Rolling Thunder; the tactical bombing of enemy targets in North Vietnam by destroying any North Vietnamese Aircraft that would attack the F-105 Thunderchief fighter-bombers carrying out tactical bombing missions. On a typical mission over the North, the F-4Cs from the 366th would carry four AIM-7D/E Sparrows, four AIM-9B/D Sidewinders, and a load of eight 750-pound bombs for bombing operations. At first, the bombs were dropped from medium or high-altitudes, but as SAMs became more dangerous, a shift was made to lower altitudes. Unfortunately, this technique also exposed the aircraft to small-arms fire from the ground
While at Da Nang, aircrews complained that they were missing many opportunities to shoot down enemy MiGs because the F-4C lacked an internal cannon and its missiles were ineffective at short ranges. So, wing maintainers mounted an external 20-millimeter SUU-16/A Gatling gun pod on the F-4Cs, and in less than a month the wing's aircrews had scored four MiG kills. The gun pod innovation and the MiG kills that followed earned the wing the nickname it carries today, the "Gunfighters." During this period, the wing earned a Presidential Unit Citation for shooting down 11 enemy aircraft in a three-month period.
By May 1968, the wing had upgraded to the F-4D aircraft. The "Stormy" FAC effort was begun at Da Nang so that the FACs could be co-located with Wing Intelligence. Two of the wing's pilots began training for forward air control (FAC) duties on 12 August 1968. Other volunteers followed, as FAC missions into North Vietnam's Route Package 1 began on 2 September. The "Stormies" flew two sorties per day of armed reconnaissance along North Vietnamese roads. On 24 October 1968, they began night operations against the Ho Chi Minh Trail. During this short-lived effort, there were six near midair collisions during the first eight missions. Seventh Air Force then held the night FAC missions in abeyance until April 1969. When "Stormy" night ops resumed, it was with use of the Starlight Scope to spot targets, and with support from "Blindbat" and "Candlestick" flareships. In May 1969, the "Stormy" FAC mission requirement was bumped from two to three sorties daily, and their numbers augmented to ten pilots.
In 1969, two additional squadrons of F-4Es (4th TFS w/ tail code "LA" & 421st TFS w/ tail code "LC") joined the wing. After this, the F-4Ds assumed forward air control duties, while the more advanced F-4Es concentrated on aircraft escort duties and conducted ground attack missions. The "Stormy" FACs were the principal forward air control for the Cambodian Incursion of 1970. By November 1971, the 366th was the only United States tactical fighter wing still stationed in Vietnam.
Between 1966 and 1972, the Gunfighters logged 18 confirmed MiG kills in Vietnam. Upon the wing's return to the United States in October 1972, Captain Lance P. Sijan, a 366th pilot shot down in 1967, was posthumously awarded the Medal of Honor for his actions as a prisoner of war.
Beginning in May 1972, the forces of the USAF were drawn down at Da Nang. On 30 June 1972, the 366th TFW was inactivated at Da Nang Air Base, being activated at Takhli Royal Thai Air Force Base, Thailand the same day.
Takhli Royal Thai Air Force Base
At Takhli, the 366th took over host unit responsibilities from the 49th Tactical Fighter Wing, which had deployed from Holloman Air Force Base in early May 1972 in response to the 1972 North Vietnamese Easter Offensive and invasion of South Vietnam by its regular armed forces. The assignment to Takhli was a name-only reassignment, as the wing consisted of four deployed Holloman F-4D squadrons (7th, 8th, 9th and 417th TFS), and two F-4E squadrons (4th, 421st) which were reassigned from Da Nang after the base in South Vietnam was closed.
From Takhli 366th TFW aircrews flew air superiority missions over Vietnam. In addition several AC-130 gunships were deployed to Takhli from the 8th TFW at Ubon. These AC-130s were assigned to Det 1., 16th Special Operations Squadron.
The Holloman-based TDY squadrons returned to New Mexico on 27 October 1972. The 4th and 421st TFSs were transferred to the 432d TRW at Udon RTAFB on 31 October 1972.
The 366th TFW was inactivated on 31 October 1972, and activated the same day without personnel or equipment at Mountain Home Air Force Base, Idaho.
Mountain Home Air Force Base
Relieved from combat assignment in Southeast Asia, the 366th was reassigned without personnel or equipment to the United States in October 1972 to replace the 347th Tactical Fighter Wing at Mountain Home AFB, Idaho. At Mountain Home, the wing was assigned the 389th, 390th, and 391st Tactical Fighter Squadrons which had returned from Vietnam, joined the 347th, and began converting to General Dynamics F-111F aircraft. For the first time since it left for Vietnam, the wing once again had its three original flying units.
Operations continued unchanged for several years. The wing tested its readiness in August 1976 when a border incident in South Korea prompted the United States to augment its military contingent in South Korea as a show of force. The 366th deployed a squadron of 20 F-111 fighters. They reached Korea only 31 hours after receiving launch notification. Tensions eased shortly afterward and the detachment returned home.
In 1977, the Air Force sent the F-111F aircraft from Mountain Home to the 48th Tactical Fighter Wing at RAF Lakenheath, England, in a move to modernize its European forces. In return, the 366th received F-111A aircraft from Nellis AFB, Nevada, where they equipped the 389th and 391st Squadrons.
In March 1980, the Air Force announced plans to base EF-111A Raven electronic combat aircraft at Mountain Home. The Raven variant was specifically design to blind enemy radars with powerful electronic signals. The 366th gradually sent part of its F-111A fleet to the Grumman Aerospace Corporation where they underwent extensive modification and were converted to the EF-111A configuration. In support of these changes, on 1 July 1981, Air Force activated the 388th Electronic Combat Squadron to receive the newly modified Ravens. However, a year later, Air Force redesignated the 390th Tactical Fighter Squadron as the 390th Electronic Combat Squadron, which replaced the 388th and began serving as the wing's only EF-111A squadron. Operations throughout the early 1980s remained stable with the 366th Tactical Fighter Wing training F-111A and EF-111A aircrews while maintaining combat readiness in both aircraft.
But as the F-111As were being retired, the wing's Ravens saw extensive service. In December 1989, the 366th deployed its EF-111As in support of Operation Just Cause in Panama. The 390th Electronic Combat Squadron contributed a small force of EF-111A aircraft to jam enemy radars during the brief invasion.
Likewise, in August 1990, most of the 390th ECS deployed to Saudi Arabia for Operation Desert Shield. The wing also deployed people to many different locations in the Middle East as forces were built up to defend against Iraqi aggression. The largest of the wing's contingents was the 390th ECS at King Fahad AB near Taif, Saudi Arabia. Here, the wing's EF-111A aircraft served with the 48th Tactical Fighter Wing (Provisional) which flew the F-111F.
In January 1991 coalition forces began Operation Desert Storm, initiating offensive operations against Iraqi forces. The deployed 390th flew electronic jamming missions during the six-week war, protecting coalition aircraft from Iraqi air defenses and contributing to the Allies' overwhelming control of the air. The deployed Ravens and most of the deployed Gunfighters returned to Mountain Home AFB in late March 1991.
366th Wing
The aging F-111A fleet was retired in the early 1990s, which prompted the inactivation of the 391st Tactical Fighter Squadron in June 1990 and of the 389th Tactical Fighter Training Squadron in June 1991, their aircraft being sent to the 27th TFW at Cannon AFB, New Mexico, the last USAF active duty F-111 equipped wing.
In early 1991, the Air Force announced that the 366th would become the Air Force's premier "air intervention" composite wing. The wing would grow from a single-squadron of EF-111As to a dynamic, five squadron wing with the ability to deploy rapidly and deliver integrated combat airpower. This resulted from General Merrill A. McPeak, then Chief of Staff of the Air Force (CSAF) and his belief that creating standing composite wings, wherein one commander would control all types of aircraft to defeat an enemy, would streamline and shorten tactical planning. General McPeak expressed that a composite wing would make "smaller mistakes because it works and trains together in peacetime...it knows the playbook...in other words, it can exploit the inherent flexibility of airpower."
The air intervention composite wing's rapid transition from concept to reality began in October 1991 when redesignated as the 366th Wing. The wing's newly activated "fighter squadrons" became part of the composite wing in March 1992. The 389th Fighter began flying the dual-role F-16C Fighting Falcon, while the 391st Fighter Squadron was equipped with the new F-15E Strike Eagle. These two squadrons provided the Gunfighters round-the-clock precision strike capability.
In June 1992, as part of Air Force restructuring, Strategic Air Command and Tactical Air Command merged to form Air Combat Command. A month later, the 366th also gained the 34th Bomb Squadron. Located at Castle AFB, California, the 34th flew the B-52G Stratofortress, giving the composite wing deep interdiction bombing capabilities as the only B-52 unit armed with the deadly, long-range HAVE NAP missile.
Next, in September 1992, Air Force redesignated the 390th Electronic Combat Squadron as the 390th Fighter Squadron, which began flying the Air Force's premier air superiority aircraft, the F-15C Eagle. With its internal 20-millimeter cannon and air-to-air missiles, the F-15C provided protection to the wing's high-value assets from enemy air threats. At the same time, Air Force activated the 429th Electronic Combat Squadron, which assumed control of the wing's EF-111A aircraft as they prepared to transfer to Cannon AFB, New Mexico.
During this buildup, however, the wing's Ravens remained busy flying combat missions over Iraq, both from Saudi Arabia in support of Operation Desert Calm, and from Incirlik AB, Turkey, in support of Operation Provide Comfort. In June 1993, however, the wing transferred its remaining EF-111As and the 429th ECS to Cannon AFB, ending Mountain Home's long association with the various models of the F-111 aircraft.
Not long afterward, in October 1993, the composite wing gained its final flying squadron when the 22nd Air Refueling Squadron was activated and equipped with the KC-135R Stratotankers. These tankers give the wing its ability to deploy globally at a moment's notice.
In summation, on 1 January 1994, the 366th Wing consisted of the following squadrons and aircraft:
22nd Air Refueling Squadron, KC-135R Stratotanker
34th Bomb Squadron, B-52G Stratofortress (At Castle AFB, California)
389th Fighter Squadron, F-16C Flying Falcon
390th Fighter Squadron, F-15C Eagle
391st Fighter Squadron. F-15E Strike Eagle
In another change, on 1 April 1994, the 34th Bomb Squadron transferred its flag to Ellsworth AFB, South Dakota. At the same time the squadron's B-52Gs were retired, making way for the squadron to be equipped with the technologically advanced B-1B Lancer. Next, a gradual transfer of the B-1s from Ellsworth to Mountain Home began in August 1996. The squadron completed a move to Mountain Home on 1 April 1997, when its flag was officially transferred to the Gunfighter home base.
Also in 1996, the wing gained yet another operational squadron. On 21 June, the 726th Air Control Squadron was reassigned from Shaw AFB, South Carolina, to Mountain Home. The new squadron brought mobile radar surveillance, and command and control capabilities to the composite wing.
In late October 1996, the wing's senior leadership also announced a new name for the 366th Wing. Henceforth, it would be known as the "Air Expeditionary Wing" while deployed in keeping with an Air Force decision to stand up a "battle lab" at Mountain Home to refine the new concept. The wing would soon begin working out the most efficient procedures for moving an airpower expeditionary force to pre-selected locations around the world. The Air Expeditionary Force Battlelab (AEFB) activated by paper only on 1 April 1997, stood up at MHAFB on 22 October 1997.
While all these changes in the wing's composition were going on, the Gunfighters met numerous operational challenges. They have supported numerous deployments in the United States and around the world from the time of composite wing implementation. Only the highlights of this hectic pace are described here.
Twice, in 1993 and again in 1995, the wing served as the lead unit for Exercise Bright Star, a large combined exercise held in Egypt.
In July 1995, the wing also verified its combat capability in the largest operational readiness inspection in Air Force history. The Gunfighters deployed a composite strike force to CFB Cold Lake, Alberta, Canada, and proved they could deliver effective composite airpower.
In 1996, the wing deployed to Incirlik AB, Turkey, for Operation Provide Comfort.
The 366th deployed twice to Shaikh Isa AB, Bahrain, to support Operation Southern Watch in 1997 and 1998. These Air Expeditionary Force (AEF) deployments showed that the 366th Wing could employ and sustain its composite force while conducting the mission. Gunfighters returned on a second rotation relieving the unit who had replaced them after the wing's first visit to Bahrain. This historical first set the pace and made way for operational advancements.
The 366th Wing then helped develop the way the Air Force will fly and fight in the 21st century through its participation as the lead AEF unit during Expeditionary Force Experiment 98. This CSAF experiment combined actual flights and combat simulations to create realistic warfighting environments. It aimed to rapidly mature initiatives that integrated air and space competency while applying decisive air and space power, thus dramatically improving command and control. The wing also participated in Operation Desert Thunder in 1998.
The 14 September 1998 announcement by CSAF Michael Ryan that the whole Air Force will reorganize into an 'Expeditionary Aerospace Force' came as no to surprise to the Gunfighters. Consequently, the 366th Wing ('Air Expeditionary Wing' (AEW), when deployed) led the way as the model from which other Air Expeditionary Wings were built after the September 11 terrorist attacks and the subsequent Operation Enduring Freedom and Operation Iraqi Freedom campaigns.
In early 1999, the wing's three fighter squadrons flew combat missions over southern Iraq, with the 391st dropping more bombs than any other unit since the end of Desert Storm. From April–June 1999, the 22 ARS supported Operation Allied Force, the NATO air campaign against Serbia. During this period, the squadron refueled 600 aircraft and off-loaded over 7 million pounds of fuel. The 726th Air Control Squadron also supported Kosovo operations from May–July 1999. They were the first American unit to deploy to Romania in 53 years. The team was led by the expertise of the radio maintenance shop.
In September 1999, the Gunfighters participated in JEFX 99, the latest in a series of exercises focused on testing emerging command and control technologies for deployed air expeditionary forces. Immediately following JEFX 99, the wing hosted Red Flag 00-1.1, the first red flag exercise in history not conducted at Nellis AFB, Nevada. Flown completely at night, the exercise combined traditional composite strike aircraft packages with low-observable F-117s and B-2 Spirit stealth aircraft in a simulated interdiction campaign.
Following the terrorist attacks on 11 September 2001 and the resultant United States invasion of Afghanistan, the 366th Wing once again got the call. While the 34th Bomb Squadron deployed to Diego Garcia as the B-1 component of the 28th Air Expeditionary Wing, the wing sent a Base Operations Support package to Al Udeid AB, Qatar to transform the bare base into a fully operational airfield for large-scale combat operations.
In October 2001, the 391st FS deployed to the Arabian Peninsula, while the 389th FS went to Al Udeid in November. Meanwhile, the 22 ARS, 390th FS, and 726th ACS supported Operation Noble Eagle protecting the skies of the Northwestern United States. The TDC Team displayed an exceptional performance at all levels in Support of Noble Eagle. In January 2007, the 391st FS deployed to Bagram Air Base, Afghanistan as the first F-15E Strike Eagle unit to patrol the skies over that country during Operation Enduring Freedom.
During the air campaign against Afghanistan that began on 7 October 2001, the 366th Wing's deployed crews flew nearly 1,000 sorties and dropped a total of 7.6 million pounds of bombs against Al Qaeda and Taliban targets—the most out of any unit participating in the operation.
366th Fighter Wing
Following the wing's return from Southwest Asia, consolidation of the Air Force's KC-135 and B-1 force led to the reallocation of the wing's bombers and tankers. While the 22d ARS aircraft transferred to McConnell AFB, Kansas in May 2002, the 34th BS B-1s went to Ellsworth AFB, South Dakota in June. As a result, the 22d ARS inactivated on 30 August 2002, while the 34th transferred to Ellsworth on 18 September.
On 30 September, the 366th Wing redesignated to the 366th Fighter Wing in conjunction with a significant change to its organizational structure. Under an Air Force-wide restructuring plan, the 366th Logistics Group redesignated as the 366th Maintenance Group and the 366th Support Group as the 366th Mission Support Group. Now, maintainers formerly assigned to their respective flying squadrons since the objective wing reorganization in 1992, belonged to the newly activated 366th Aircraft Maintenance Squadron under the maintenance group. Also within the maintenance group, the 366th Logistics Support Squadron redesignated as the 366th Maintenance Operations Squadron and the 366th Component Repair Squadron as the 366th Component Maintenance Squadron.
On the support side, the 366th Supply Squadron redesignated as the 366th Logistics Readiness Squadron on 18 July 2002, merging both the supply and transportation missions. On the same day, the 366th Transportation Squadron inactivated. Finally, the 366th Contracting Squadron moved from the 366th Logistics Group to the 366th Mission Support Group on 30 September. With these changes, the wing's 10-year mission as the Air Force's premiere air expeditionary wing came to an end, but did not affect its ability to meet any challenge the United States Air Force might face as it moves toward its vision of Global Engagement in the 21st Century.
In May 2005, the Base Realignment and Closure commission outlined recommendations to consolidate the 366th Fighter Wing from a multi-frame fighter base to a single frame of F-15E Strike Eagles. The move was part of the Air Force's efforts to consolidate its fighter fleets as a smarter way of doing business and to save money.
In November 2006, the 389th FS F-16CJs began to depart to McEntire Air National Guard Base, South Carolina, and Nellis Air Force Base, Nev., while new F-15Es arrived from Elmendorf Air Force Base, Alaska.
The F-16CJs completely departed in March 2007, leaving the base with two F-15E Strike Eagle fighter squadrons and one F-15C Eagle fighter squadron. In September 2010, the F-15C squadron was redesignated as the 390th Electronic Combat Squadron and assumed the mission that the 388th ECS was doing, leaving the base and wing with only two F-15E squadrons.
Lineage
Established as 366th Fighter-Bomber Wing on 15 November 1952
Activated on 1 January 1953
Redesignated 366th Tactical Fighter Wing on 1 July 1958
Inactivated on 1 April 1959
Activated on 30 April 1962
Organized on 8 May 1962
Redesignated: 366th Wing on 1 October 1991
Redesignated: 366th Fighter Wing on 30 September 2002.
Assignments
Ninth Air Force, 1 January 1953
Attached to Nineteenth Air Force, 15 February 1956 – 24 September 1957
834th Air Division, 25 September 1957 – 1 April 1959
United States Air Forces in Europe, 30 April 1962
Seventeenth Air Force, 8 May 1962
Twelfth Air Force, 12 July 1963
832d Air Division, 1 October 1964
2d Air Division, 20 March 1966
Seventh Air Force, 1 April 1966
Thirteenth Air Force, 27 June 1972
832d Air Division, 31 October 1972
Twelfth Air Force, 1 July 1975–August 2020
Fifteenth Air Force, 20 August 2020-onwards
Components
Groups
366th Fighter-Bomber (later, 366th Operations): 1 January 1953 – 25 September 1957; 1 March 1992–present
401st Fighter-Bomber: attached 5 February 1954 – 25 September 1957
Squadrons
4th Tactical Fighter Squadron: 12 April 1969 – 31 October 1972 (detached 29–31 October 1972)
20th Tactical Air Support Squadron: 15 March – 27 June 1972
35th Tactical Fighter Squadron: attached 3 April – 12 June 1972
352d Tactical Fighter Squadron: 15 August – 10 October 1966
362d Tactical Electronic Warfare Squadron: 1 February – 27 June 1972
388th Tactical Fighter Training (later, 388th Electronic Combat) Squadron: 1 July 1977 – 30 September 1979; 1 July 1981 – 15 December 1982
389th Fighter-Bomber (later, 389th Tactical Fighter; 389th Tactical Fighter Training) Squadron: 25 September 1957 – 1 April 1959 (detached 25 September – 22 December 1957); 8 May 1962 – 15 June 1969 (detached 15 September – 16 December 1965); 31 October 1972 – 22 July 1991 (detached 16 September – 5 October 1976)
390th Fighter-Bomber (later, 390th Tactical Fighter; 390th Electronic Combat) Squadron: 25 September 1957 – 1 April 1959; 8 May 1962 – 29 October 1965; 10 October 1966 – 30 June 1972; 31 October 1972 – 1 October 1982 (detached 19 August – 16 September 1976); 15 December 1982 – 1 March 1992
391st Fighter-Bomber (later, 391st Tactical Fighter) Squadron: 25 September 1957 – 1 April 1959; 8 May 1962 – 26 January 1966; 31 October 1972 – 1 July 1990.
420 Air Refueling, Fighter-Bomber: attached 18 March 1954 – 22 September 1955
421st Tactical Fighter Squadron: 16 April 1969 – 31 May 1972 (detached 23 April – 25 June 1969)
480th Fighter-Bomber (later, 480th Tactical Fighter) Squadron: 25 September 1957 – 1 April 1959; 8 May 1962 – 1 February 1966; 10 October 1966 – 15 April 1969
614th Tactical Fighter Squadron: 18 September – 10 October 1966
615th Tactical Fighter Squadron: 16 July – 10 October 1966
622d Air Refueling Squadron: attached 18 July 1955 – 1 July 1958.
Stations
Alexandria AFB (later, England AFB), Louisiana, 1 January 1953 – 1 April 1959
Chaumont-Semoutiers Air Base, France, 8 May 1962 – 15 July 1963
Holloman AFB, New Mexico, 15 July 1963 – 11 March 1966
Phan Rang AB, South Vietnam, 20 March 1966
Da Nang AB, South Vietnam, 10 October 1966
Takhli RTAFB, Thailand, 27 June – 31 October 1972
Mountain Home AFB, Idaho, 31 October 1972–present
Sheikh Isa Air Base, Bahrain (???-???)
Aircraft
F-51 Mustang, 1953
F-86 Sabre, 1953–1955, 1956
F-84 Thunderjet, 1954–1958
KB-29 Superfortress, 1954–1957
KB-50 Superfortress, 1957–1958
F-100 Super Sabre, 1957–1959
F-84 Thunderjet, 1962–1965
F-100 Super Sabre, 1963, 1966
F-4 Phantom II, 1965–1972
EC-47 Skytrain, 1972
O-2 Skymaster, 1972
OV-10 Bronco, 1972
General Dynamics F-111F, 1972–1977
General Dynamics F-111A, 1977–1991
EF-111A Raven, 1981–1993
F-15A/B Eagle, 1991–1993
B-1 Lancer, 1996–2002
F-16 Falcon, 1991–2007
F-15C & D Eagle, 1992–2010
F-15E Strike Eagle, 1992 – present
See also
List of B-52 Units of the United States Air Force
Notes
References
Rowley, Ralph A. (1975). The Air Force in Southeast Asia: FAC Operations 1965–1970. U.S. Office of Air Force History. Military Bookshop (2011 reprint). ISBNs 1780396562, 978-1780396569.
Schlight, John (1969). ''Project CHECO Report: JET FORWARD AIR CONTROLLERS IN SEASIA." Headquarters Pacific Air Force. ASIN B00ARRLMEY.
External links
Global Security page on the unit
DefenseLINK News: Air Expeditionary Force to Deploy to Bahrain
Air Force News Service: 366th AEW Accomplishes 'Firsts' while in Bahrain
366
Military units and formations in Idaho
1972 establishments in Idaho |
43008097 | https://en.wikipedia.org/wiki/Health%20%28Apple%29 | Health (Apple) | Health is the health informatics mobile app announced on June 2, 2014 by Apple Inc. at its Worldwide Developers Conference (WWDC). The app is included with iPhones and iPod Touch that run iOS 8 or later, and the Apple Watch starting with watchOS 1.
The application holds health data such as blood pressure measurement and glucose levels, but also holds physical tracking data such as step counts. It can pull data from fitness trackers, smartwatches, smart scales, and other devices.
About
The Health app is found on the iPhone and Apple Watch, the icon for the app is a white icon with the red heart. The Health app has four main categories of data - activity, mindfulness, sleep and nutrition. The app can store health data, tracking data, and clinical medical records. It offers a profile called "Medical ID" for first responders and can be connected to various hardware devices and third party apps.
Initially, the Health app was criticized for its lack of compatible third-party applications (at its release on September 17, 2014, along with iOS 8), glucose tracking, proper health data explanations, and sluggish app performance. Eventually, Apple fixed these issues with a software update.
"Medical ID" is stored within the Health app. This was designed for first responders and shares allergies, medications, blood type and organ donor status. As of July 2016, iOS 10 users or later in the United States were able to sign up to be an organ, eye, and tissue donor in the Apple Health app.
In 2018, the Apple Watch series 4 started to offer personal ECG measurement and cardiac health monitoring, which would store to the Health app.
In 2019, the Health app received a redesign as part of iOS 13, which simplified navigation of the app by replacing the dashboard with a summary tab and placing everything else under a "Browse" tab, similar to the previous "Health Data" tab. Cycle tracking and noise level monitoring were also made available.
Apple's "Health Records" is a place to store your medical clinical records, and is available if your health insurer or hospital is signed up for the Apple Health Records program.
As of 2020, the types of data stored by the Health app include steps, walking and running distance, flights climbed, heart rate, nutrition, sleep analysis, heart rate variability and weight.
As of 2020, the devices and hardware compatible with the Health app include, Upright Go 2 posture trainer, La Roche-Posay My Skin UV sensor, Beddit Sleep monitor, Withings smart blood pressure monitor, Withings thermometer, and Withings smart scales.
Electronic Health Records
In 2018, Apple's "Health Records" was introduced, which allowed on iOS 11.3 or later for users to import their medical records from their doctor or hospital.
On June 6, 2019, Northern Louisiana Medical Center announced an early partnership with Apple to allow clinical medical records shared through the app. Shortly after Apple began allowing compatible electronic health records (EHR) to self-register for the "Health Records" project. Other partnerships in 2019 included University of Tennessee Medical Center in Knoxville, Medical Center of South Arkansas; Northwest Health of Springdale, Arkansas; Blessing Health System of Quincy, Illinois; Doylestown Health of Pennsylvania; Franciscan Health; Bayhealth Medical Center of Dover, Delaware, and the Department of Veterans Affairs.
Employees
In July 2018, Apple hired cardiologist Dr. Alexis Beatty, while working on the Apple Watch and Health integration. In June 2019, the former chief information officer of pharmaceutical company AstraZeneca, David Smoley was hired as a Vice President of Apple.
In October 2019, former Columbia University Medical Center cardiologist Dr. David Tsay joined Apple Health.
HealthKit API
HealthKit is the accompanying developer application programming interface (API) included in the iOS SDK (Software Development Kit) for the Mac. It is used by software developers to design applications that have extensibility and that can interact with the health and fitness applications on iOS.
After the release of iOS 8 on September 17, 2014, Apple removed all HealthKit-compatible apps from its App Store to fix a bug that caused cellular and Touch ID issues, and then re-released Healthkit, with the release of iOS 8.0.2, on September 26, 2014.
As of February 2017, several manufacturers other than Apple sold hardware that was HealthKit enabled.
ResearchKit & CareKit APIs
ResearchKit and CareKit are two other health-related software frameworks which Apple have introduced to further build upon the capabilities of HealthKit, allowing software developers to create applications for gathering medical research and following care plans, respectively. Both APIs can interact with the health application and facilitate the sharing of health information between patients and doctors.
Apple has also introduced a standalone research application for iOS and watchOS devices, which allows users to volunteer and participate in long-term research studies run by Apple and various health partners.
See also
Apple Fitness
Google Fit
Google Health
Microsoft HealthVault
MSN Health & Fitness
MyFitnessPal
References
External links
First HealthKit medical device
Export health data
IOS-based software made by Apple Inc.
IOS
Health software |
42108337 | https://en.wikipedia.org/wiki/Agile%20Automation | Agile Automation | Agile Automation refers to the application of select Agile software development principles, patterns and practices, to the area of industrial automation and process control software development. The term was coined by HAL Software (Ireland) in 2013.
Traditionally, industrial automation software has been developed using languages that do not fully implement object-oriented programming. Software development lifecycle is in line with the Waterfall model. For example, the GxP (Good Automated manufacturing practice) V model that is pervasive throughout the pharmaceutical regulated industries. There was a growing belief however that the model was too rigid, did not allow for sufficient change throughout the software development lifecycle and did not target testing according to risk. The latest version of the GxP model went some way towards testing based on risk assessment.
The latest GxP model advocates testing and documenting according to perceived risk to the end user. (The patient, in the case of the Pharmaceutical industry).
In fact the GAMP5 guide in 2008 explicitly mentioned Agile programming;
"The approach described in this document is designed to be compatible with a wide range of other models, methods, and schemes, including: Software development methods such as RAD, Agile, RUP, or Extreme programming." (GAMP5)
There is debate however over whether Agile methods can truly satisfy regulatory requirements, as outlined in the article on Alternative Software development models and methods in GxP Environments, by ISAP GMAP D_A_C_H SIG ASDMM. (Pharmaceutical Engineering Jan2012 Vol32 No.1). The Industry has some experience of poorly executed manufacturing execution system Agile software projects and these experiences have tended to reinforce the traditional notion that Waterfall software development lifecycle is the simplest way to enforce Engineering Rigour and budgetary/schedule constraints on a software development team.
Agile Automation software development has the potential to reduce the development lifecycle and at the same time, encompass automated unit testing. Something that the industry is calling for. In addition, the "don't repeat yourself" aspects of Agile object oriented software development encompassing extension of software classes through interfaces (Software class is open for extension but closed for modification) are very attractive in a regulated industry where software change validation is particularly expensive. Agile software development promotes true object oriented software programming which in turn results in software that is more amenable to change and less likely to break.
The two most widely used strategy design patterns in Pharmaceutical and other Batch Industrial Automation higher level systems (SCADA, Batch and MES ) are ISA S88 & ISA S95. These patterns can be implemented such that the action behaviours (e.g., read/write method or Valve command on/off method) are encapsulated as interfaces using languages such C#, or Java. Commercial Control System software development is biased towards inheritance and subtyping, and the other OOP tenets (Encapsulation, Polymorphism) are not exposed to the programmer to the same extent. This incomplete OOP implementation increases the amount of design effort required. Even Commercial Proprietary DCS systems such as Emerson DeltaV are biased towards subtyping and inheritance without an easy way to implement a behaviour through an interface or similar construct. (There is no way to implement multiple inheritance.)
The IEC 61131-3 programming language is the most widely used language for programming PLC & DCS systems. It is not a truly object oriented language, implementing only 1 tenet of OOP (inheritance/subtyping) and not encapsulation or polymorphism. This limits its amenability to automated unit testing and encapsulating of behaviours for class extension.
Generally there is less scope for encapsulating behaviours in most industrial controllers except for platforms that run a more advanced operating system (for example the Beckhoff Twincat platform) that can be programmed via high level IDEs such as visual studio.
There is a replacement standard (IEC 61499) that is more object oriented, but industry uptake is small. There are moves towards IEC61131-3 consolidation, notably through the PLCOpen standard. This approach to developing an abstract XML class can result in a library of tested class modules/types that can subsequently be instantiated and imported to target platform.
Interest is growing in model driven architecture (MDA) Agile programming whereby a platform independent model is first developed. As a result of regulatory filing requirements and the need to protect against litigation, the Pharmaceutical industry records and saves data that must be reconstituted for subsequent filing submittal or Batch release (Electronic batch records). A model developed in the pilot lab and used as the guideline for manufacturing scale up, can aid filing submittal.
References
Agile software development |
2135319 | https://en.wikipedia.org/wiki/ITRON%20project | ITRON project | The ITRON project is the first of several sub-architectures of the TRON project.
Originally undertaken in 1984, ITRON is a Japanese open standard for a real-time operating system (RTOS) initiated under the guidance of Ken Sakamura. This project aims to standardize the RTOS and related specifications for embedded systems, particularly small-scale embedded systems. The ITRON RTOS is targeted for consumer electronic devices, such as mobile phones and fax machines. Various vendors sell their own implementations of the RTOS.
Details
ITRON, and µITRON (sometimes also spelled uITRON or microITRON) are the name of RTOS specifications coming out of ITRON projects. 'µ' means that the particular specification is meant for the smaller 8-bit or 16-bit CPU targets. Specifications are available for free. Commercial implementations are available, and offered under many different licenses. On 10 November 2017, the Institute of Electrical and Electronics Engineers acquired ownership of the 16- and 32- bit uITRON from TRON Forum.
A few sample sources exist, and there are many commercial source offerings, too.
Examples of open source RTOSes incorporating an API based on µITRON specification are eCos and RTEMS.
ITRON specification is meant for hard real-time embedded RTOS.
It is very popular in the embedded market, as there are many applications for it, i.e., devices with the OS embedded inside.
For example, there is an ACM Queue interview with Jim Ready, founder of MontaVista (realtime linux company), "Interview with Jim Reddy", April 2003, ACM Queue. He says in the interview, "The single, most successful RTOS in Japan historically is µITRON. This is an indigenous open specification led by Dr. Ken Sakamura of the University of Tokyo. It is an industry standard there."
Many Japanese digital cameras, for example, have use ITRON specification OS. Toyota automobile has used ITRON specification OS for engine control.
Supported CPUs are numerous. ARM, MIPS, x86, FR-V and many others including CPUs supported by open source RTOS eCos and RTEMS, both of which include the support for µITRON compatible APIs.
ITRON's popularity comes from many factors, but one factor is the notion of "loose standardization": the API specification is at the source level, and does not specify binary API compatibility. This makes it possible for implementers to make use of features of the particular CPU model to which the implementation is targeted. The developer even has the freedom of choosing to pass the parameters using a consolidated packet, or separate parameters to API (system call, library call, etc.). Such freedom is important to make the best use of not so powerful 8-bit or 16-bit CPUs. This makes keeping the binary compatibility among different implementations impossible. This led to the development of T-Kernel in the 2000s in order to promote binary compatibility for middleware distribution.
ITRON specification promotion was done by the various companies which sell the commercial implementations. There was also an NPO TRON Association that promoted the specification by publishing it as well as other TRON specification OSes. But since the first quarter of 2010, it has become part of T-Engine Forum, another non-profit organization that promotes other operating system such as the next generation RTOS, T-Kernel.
T-Kernel is the name of the specification and at the same time refers to the single implementation based on the authorized source code available from T-Engine Forum for free under T-License. So T-Kernel doesn't suffer from the binary API compatibility.
JTRON (Java TRON) is a sub-project of ITRON to allow it to use the Java platform.
See also
Expeed – Nikon
Bionz – Sony
CxProcess – Konica Minolta
Softune – Fujitsu
References
External links
, TRON
Dr. Ken Sakamura Lab
ITRON project archive
Fair on TRON, technology showcase, occurs yearly, in English
The Most Popular Operating System in the World
TRON project
de:ITRON |
38447884 | https://en.wikipedia.org/wiki/Christopher%20G.%20Chute | Christopher G. Chute | Christopher G. Chute is a Bloomberg Distinguished Professor at Johns Hopkins University, physician-scientist and biomedical informatician known for biomedical terminologies and health information technology (IT) standards. He chairs the World Health Organization Revision Steering Group for the revision of the International Classification of Diseases (ICD-11).
Biography
Chute received his undergraduate and medical training at Brown University, internal medicine residency at Dartmouth, and doctoral training in Epidemiology at Harvard. He is Board certified in Internal Medicine and Clinical Informatics. He is a Fellow of the American College of Physicians, the American College of Epidemiology, and the American College of Medical Informatics (ACMI). Chute is president of ACMI, a body of elected fellows within the American Medical Informatics Association (AMIA) who have made significant and sustained contributions to the field.
Since January 2015 Chute is the Bloomberg Distinguished Professor in Health Informatics at the Johns Hopkins University, with academic appointments in the School of Medicine (Division of General Internal Medicine & Division of Health Sciences Informatics), Bloomberg School of Public Health (Department of Health Policy and Management), and School of Nursing (Division of Health Informatics). He is also Chief Research Information Officer of Johns Hopkins Medicine.
In December 2014 Chute retired from Mayo Clinic, where he remains an emeritus professor. He became founding Chair of Biomedical Informatics at Mayo Clinic in 1988, stepping down after 20 years in that role. At Mayo Clinic he was Professor of Medical Informatics and Section Head. He was PI on a large portfolio of research including the HHS/Office of the National Coordinator (ONC) Strategic Health IT Advanced Research Projects on Secondary EHR Data Use, the ONC Beacon Community (Co-PI), the LexGrid projects, Mayo’s Clinical and Translational Science Award Informatics, and several National Institutes of Health (NIH) grants including one of the eMERGE centers from the National Human Genome Research Institute (NHGRI), which focus upon genome wide association studies against shared phenotypes derived from electronic medical records. Chute served as Chair of the Mayo Clinic Data Governance Committee, and on Mayo’s enterprise IT Oversight Committee. He was Chair of the International Organization for Standardization (ISO) Health Informatics Technical Committee (ISO/TC 215). He also served on the Health Information Technology Standards Committee for the Office of the National Coordinator in the United States Department of Health and Human Services, and the Health Level 7 Advisory Council. Recently held positions include Chair of the Biomedical Computing and Health Informatics study section at NIH, Chair of the Board of the HL7/FDA/NCI/CDISC BRIDG project, on the Board of the Clinical Data Interchange Standards Consortium, ANSI Healthcare Information Technology Standards Panel Board member, Chair of the US delegation to ISO TC215 for Health Informatics, Convener of Healthcare Concept Representation WG3 within the TC215, Co-chair of the HL7 Vocabulary Committee, Chair of the International Medical Informatics Association WG6 on Medical Concept Representation, American Medical Informatics Association Board member, and multiple other NIH biomedical informatics study sections as chair or member.
Awards
1987 Elected Fellow, American College of Epidemiology
1988 Elected Fellow, American College of Physicians
1995 Elected Fellow, American College of Medical Informatics
2002 President's Award, American Medical Informatics Association
2005 IBM Faculty Award
2015-2020 President, American College of Medical Informatics
2017 Inaugural Fellow, International Academy of Health Sciences Informatics
2017 Elected Fellow, Health Level Seven International (HL7)
Publications
Chute has more than 31,000 citations in Google Scholar and an h-index of 83.
PubMed Citations
Google Scholar Citations
Highly Cited Articles (more than 1000 citations)
1993 with JE Oesterling, SJ Jacobsen, HA Guess, CJ Girman, LA Panser, MM Lieber, Serum prostate-specific antigen in a community-based population of healthy men: establishment of age-specific reference ranges, in: JAMA. Vol. 270, nº 7; 860-864.
2010 with GK Savova, JJ Masanz, PV Ogren, J Zheng, S Sohn, KC Kipper-Schuler, Mayo clinical Text Analysis and Knowledge Extraction System (cTAKES): architecture, component evaluation and applications, in: Journal of the American Medical Informatics Association. Vol. 17, nº 5; 507-513.
1995 with E Giovannucci, KM Egan, DJ Hunter, MJ Stampfer, GA Colditz, WC Willett, FE Speizer, Aspirin and the risk of colorectal cancer in women, in: New England Journal of Medicine. Vol. 333, nº 10; 609-614.
1993 with E Giovannucci, EB Rimm, GA Colditz, MJ Stampfer, A Ascherio, WC Willett, A prospective study of dietary fat and risk of prostate cancer, in: JNCI: Journal of the National Cancer Institute. Vol. 85, nº 19; 1571-1579.
References
Living people
Health informaticians
Brown University alumni
Harvard School of Public Health alumni
Alpert Medical School alumni
1955 births |
11261155 | https://en.wikipedia.org/wiki/Censorship%20in%20Malaysia | Censorship in Malaysia | Censorship in Malaysia is a widespread issue which has become more apparent as it attempts to adapt to a modern knowledge-based economy. Despite having in its Federal Constitution that subject to certain conditions, "every citizen has the right to freedom of speech and expression" (Article 10), Malaysia has consistently sat low on global indexes related to press and media freedoms.
In 2016, Malaysia was ranked 146th (out of 180) in the Worldwide Press Freedom Index by Reporters Without Borders. It was also given a "Partly Free" status on the Freedom in the World report by Freedom House in 2008 and remains so in 2016. On the Freedom in the World index, graded on a scale of one to seven, with one being the most free and seven being the least, Malaysia obtained four points for both political rights and civil liberties.
Unlicensed use or possession of a printing press is illegal under the Printing Presses and Publications Act of 1984. Journalists are frequently given guidelines by the Prime Minister's Office when reporting 'sensitive' issues such as challenging Ketuanan Melayu policies, and media self-censorship is encouraged.
Background
Ex-Malaysian Home Minister Datuk Seri Syed Hamid Albar said in 2003 that the guidelines surrounding censorship, which were drawn up in 1993, would be restudied because some of the rules "were no longer applicable". He reiterated that the main objective of the code was to build a better "Bangsa Malaysia". On the current film censorship guidelines, he said that if a scene was "too sexy", then the scene would be axed. "It's up to the Board. They watch the scene and if it's too glaring then they will cut it. If it's not pornographic in nature, then they will allow it. It is very subjective." He also said, "Today's standard of morality and spirituality must be strong because people are exposed to all sorts of challenges" and "There is a correlation between criminal offenders and sex and violence shown on screen."
After the negative reactions towards the censoring of an article concerning the 2011 Bersih 2.0 rally, in mid-August 2011, Prime Minister Datuk Seri Najib Tun Razak stated that media censorship "is no longer effective" and that the government will review its current censorship laws.
Despite this promise, the Malaysian government again censored reports by the BBC and Al Jazeera on the 2012 Bersih 3.0 rally. Both organisations sent very strongly worded complaints to Astro Malaysia, the broadcasting company delivering the news, about the doctoring of their news reports. The complaints were dismissed with Astro saying that the news agencies "did not take cognizance of the duty of Astro to comply with local content regulations". The Minister of Culture and Information, Rais Yatim, went on record to say that "only the best parts of the report" were shown. There were also reports of the police seizing and destroying cameras and attacking journalists who attempted to take photos of what appeared to be police brutality.
Censorship policies
Nudity
Books, magazines and prints containing nudity (including nudity of aboriginal peoples) or government sensitive material are censored manually by shading areas in black ink. Some books are censored by removing entire pages.
Pornography of any kind is strictly banned in Malaysia. Sex and nude scenes are strictly disallowed by the censors.
Individual words
Under subsection 48(3) and (4) of the Penang Islamic Religious Administration Enactment 2004, non-Muslims in Peninsular Malaysia are penalised for using the following words, or to write or publish them, in any form, version or translation in any language or for use in any publicity material in any medium:
"Allah", "Firman Allah", "Ulama", "Hadith", "Ibadah", "Kaabah", "Qadhi'", "Illahi", "Wahyu", "Mubaligh", "Syariah", "Qiblat", "Haji", "Mufti", "Rasul", "Iman", "Dakwah", "Wali", "Fatwa", "Imam", "Nabi", "Sheikh", "Khutbah", "Tabligh", "Akhirat", "Azan", "Al Quran", "As Sunnah", "Auliya'", "Karamah", "Syahadah", "Baitullah", "Musolla", "Zakat Fitrah", "Hajjah", "Taqwa" and "Soleh".
Israel
Any Hebrew and Yiddish-language movies and movies from Israel are not allowed to be shown in Malaysian cinemas.
Internet
Up till 11 June 2011 and beginning July 2014, Internet content was officially uncensored, and civil liberties assured, though on numerous occasions the government has been accused of filtering politically sensitive sites. Any act that curbs internet freedom is theoretically contrary to the Multimedia Act signed by the government of Malaysia in the 1990s. However, pervasive state controls on traditional media spill over to the Internet at times, leading to self-censorship and reports that the state investigates and harasses bloggers and cyber-dissidents.
As of 28 January 2014 many political sites have been blocked by the Malaysian government. Internet users will encounter a blue and black box with "This website is not available in Malaysia as it violates the National law" announcement. When users try to resolve the IP address of those domain, they will get back a IP address provided by TM [175.139.142.25]
The OpenNet Initiative found no evidence of Internet filtering in Malaysia in the political, social, conflict/security, and Internet tools areas in May 2007. and is on the Reporters Without Borders 2011 list of countries under surveillance.
Prime Ministers Abdullah Badawi and Najib Razak, on many occasions, have pledged that Internet access in Malaysia will not be censored and that it is up to parents to install their own censorship software and provide education to their children (provide self-censorship). The ISPs also actively deny that there are Internet filters in place when asked. However, the Communications Minister has occasionally announced that they are working on a nationwide filter, but each time such an announcement is made the Prime Minister makes a rebuttal to emphasise that there will be no Internet censorship. The state ministries of Terengganu and Kelantan have also announced that they have statewide filters in place in their respective states.
In 2006, Deputy Science and Technology Minister Kong Cho Ha announced that all Malaysian news blogs will have to be registered with the Ministry of Information. He justified this by stating the law was necessary to dissuade bloggers from promoting disorder in Malaysia's multi-ethnic society.
In April 2011, Prime Minister Najib Razak repeated promises that Malaysia will never censor the Internet. In 2016, the blogging platform Medium was blocked in Malaysia, after an investigative blog it hosted, Sarawak Report, covered allegations of corruption against Prime Minister Najib Razak.
In February 2012, Malaysian authorities deported a Saudi journalist accused of insulting the Islamic prophet, Muhammad in a tweet.
In May 2013, leading up to the 13th Malaysian general election, there were reports of access to YouTube videos critical of the Barisan National government and to pages of Pakatan Rakyat political leaders in Facebook being blocked. Analysis of the network traffic showed that ISPs were scanning the headers and actively blocking requests for the videos and Facebook pages.
In July 2018, the Malaysian police announced the creation of the Malaysian Internet Crime Against Children Investigation Unit (Micac) that is equipped with real-time mass internet surveillance software developed in the United States and is tasked with the monitoring of all Malaysian internet users, with a focus on pornography and child pornography. The system creates a "data library" of users which includes details such as IP addresses, websites, locations, duration and frequency of use and files uploaded and downloaded.
In March 2020, routes to IP addresses belonging to the CDN provider for Pornhub and XVideos were blocked by Telekom Malaysia. Users were initially able to circumvent the block using an alternative DNS service provider, but these IPs were eventually blocked a few days later.
On 15 February 2021, online dating platform Sugarbook was blocked. Malaysian authorities claimed that the online dating platform violates Section 233 of the Multimedia and Communications Act 1998 for improper use of network facilities or network service. Malaysian Communications and Multimedia Commission (MCMC) has not confirmed the banning of Sugarbook, but the authority announced that they are investigating Sugarbook and several other applications that provide online dating services.
Print and publishing
All newspapers need an official permit to print, which must be renewed annually. The licensing system allows the government to close media outlets at will and often encourages publishers to toe the line.
In 2006 alone, 56 publications were banned by the Internal Security Ministry, including the Indonesian translation of Charles Darwin's On the Origin of Species.
Malaysia once banned the release of the Bible in Iban language. The translation of the word "God", i.e. "Allah Ta'ala" was deemed to be specifically for Muslim use. The ban has since been lifted.
In August 2008, the Sisters in Islam (SIS), an Islamic organisation in Malaysia, was surprised to find that a book published in 2005 featuring a compilation of research papers was banned by the Home Ministry of Malaysia. SIS research and publications programme manager Masjaliza Hamzah said that activists and academics from Southeast Asia and the Middle East contributed to the book in 2003 and that it mainly focused on challenges Muslim women faced in their countries. A statement from SIS described the book: "It discussed strategies...used to curb extremism and promote women’s rights".
On 27 October 1987, Operation Lalang was carried out. In this operation, two daily newspapers, The Star and Sin Chew Daily, and two weekly newspapers, The Sunday Star and Watan, were closed down for several months. They also had their publishing permits suspended temporarily. Prior to the operation, The Star was the primary English newspaper that provided news in the opposition's point of view. This was considered treason, and during Operation Lalang, this newspaper was shut down. Most of the staff working for the four newspapers were laid off or otherwise threatened with prison and detainment, under the Internal Security Act.
In 2003, Tan Sri Abdullah Ahmad, the former editor-in-chief of the New Straits Times, wrote an article criticising Saudi Arabian policies that aided the United States invasion of Iraq among other things. As a result, the Saudi government reduced the Malaysian quota for haj and in the same year Abdullah "was fired without warning by the daily’s management at the request of the ruling UMNO party following a complaint by the Saudi ambassador in Malaysia." UMNO, which holds a stake in the paper, later stated that he had jeopardised Malaysia's close relationship with Saudi Arabia.
In June 2010, Suara Keadilan'''s publication was not renewed because it published a report which claimed that a government agency was bankrupt. Suara Keadilan is run by opposition leader Anwar Ibrahim's Keadilan party. The Home Ministry, which overseas Malaysia's newspapers, said it was not satisfied with the paper's explanation for the allegedly inaccurate report.
In July 2011, parts of The Economist's article about the 2011 Bersih 2.0 rally were found to be censored by the Home Ministry on claims that the censored parts were "incorrect and misleading". The move was later slammed by politicians, who called it an outdated move in a maturing society. MCA vice-president Senator Gan Ping Sieu even recommended a better approach of rebutting the claims with facts and "lodging a complaint against the publisher" and that the censoring of the printed article which is also available online would only stir public curiosity and "would only result in more people learning about the article, thus defeating the ministry's purpose of censoring it in the first place."
In January 2012, eagle-eyed readers of the AFP website found that the local tabloid The Star had removed the mention of Malaysia from an article sourced from the AFP. This discovery was posted to the 1 Malaysia Don't Want SKMM Block File Sharing Website page where many of the members criticised The Star for their action. Malaysia was removed from a mention of countries that practice internet censorship, reaffirming the readers that the country is indeed practising internet censorship and is trying to hide the truth from the readers of the tabloid.
In January 2014, the image of pigs were censored in the Malaysian edition of International New York Times, which was partnered with The Malaysian Reserve in the country.
In March 2014, the Malay-language version of the comic book Ultraman the Ultra Power was banned in by Home Ministry, due to it referring to God as Allah, raising the ire of Malaysian netizens.
Silverfish Books in Kuala Lumpur has reported on the censorship of foreign books in Malaysia. They have discovered the censorship of Czech author Milan Kundera, the banning of works by Khalil Gibran, Chinua Achebe, and Iris Chang, and the restriction of books by Rushdie and many others. They also managed to get a list of some of the restricted books from one of their distributors. The list includes literary fiction (e.g. work from Salman Rushdie, Irvine Welsh, Anthony Burgess, New Village Zine, Rebecca Wells), a fantasy novel by Robert Jordan and children's books (e.g. SpongeBob SquarePants and Dora the Explorer titles).
Among the academic titles banned for "disrupting peace and harmony" in 2006 were Mona Johulan's The Bargaining for Israel: In the Shadow of Armageddon, Mathew S Gordon's Islam, Trudie Crawford, Lifting the Veil, Bobby S Sayyid's A Fundamental Fear of Eurocentrism and the Emergence of Islamism and Christine Mallouhi's Mini Skirts Mothers & Muslims. In 2014, the Home Ministry banned the novels "Perempuan Nan Bercinta" by Faisal Tehrani (for promoting Shiism), Alan Hollinghurst's The Line of Beauty (for promoting homosexuality), Jacob Appel's "The Man Who Wouldn't Stand Up" (for criticising Mohammed) and three other works of fiction.Aswaq Press, 7 July 2014.
Censored comics include It's a Good Life, If You Don't Weaken, Ultraman the Ultra Power and The Best of Drawn & Quarterly. Censorship of nonfiction varies; it includes academic works such as: Mao: A Life and Making Globalization Work, as well as a host of books dealing with human bodies and/or sexuality, such as The Vagina Monologues, Breastfeeding Your Baby: Revised Edition and How to Talk to Your Child About Sex.
Music
Malaysia has a history of music censorship.
In radios they will censor lyrics with coarse language.
Rastafarian reggae is often censored, as it refers to "Zion".
Music concerts
In 2003, American rock band Linkin Park was told to refrain from wearing shorts while performing and in 2004, singer Mariah Carey was asked to cover up.BBC News Online. Mariah upsets Malaysian Muslims. Retrieved on 19 January 2008. Madonna has been banned from Malaysian television and a scheduled concert by Norwegian metal band Mayhem was banned earlier in 2006. Malaysian organizers of a Pussycat Dolls concert were fined for flouting decency laws.
The country's opposition party, the Pan-Malaysian Islamic Party, urged the government to order the cancellation of a concert on 29 August 2008 by Canadian rock singer Avril Lavigne. Her onstage moves were considered too provocative for Malaysia's teenage population. Eventually the concert went on as scheduled; it sold over 10,000 tickets and was a critical success in Malaysia. After the event, the government lifted some bans, allowing musicians to perform in Malaysia to boost tourism.
In September 2009, the Malaysian government agreed to let Muslims attend a concert by US hip-hop stars The Black Eyed Peas, reversing an earlier ban imposed because the show was sponsored by an alcoholic beverage company. The government did not give further details on the U-turn, which had caused an outcry in the Muslim-majority nation. The protest reflects growing conflicts between moderate and conservative Muslims, including many occupying positions of power in the government and judiciary, in a country that has long been considered a moderate society in the Islamic world.
Shows by Gwen Stefani and Beyoncé Knowles (two concerts were cancelled in 2007 and 2009, respectively) have also faced protests by conservative Muslims over immodest clothing, forcing the artists to don attire that revealed little skin. Moderate Muslims, Chinese, Indians and other non-Muslims criticised conservative Muslims, calling them "narrow-minded" in the wake of these events.
In July 2010, the Wonder Girls were allowed to return to Malaysia for MTV World Stage Live in Malaysia, along with Katy Perry, despite her songs and clothing being too "sexy" for the Malaysian teenagers. In October the same year, Adam Lambert scheduled concert in Malaysia was given the green light amid moderate protests from fundamental Muslims over controversies pertaining to his sexuality.
In February 2012, an Erykah Badu concert was cancelled because it was found that she had applied a temporary tattoo of the word Allah on a part of her body.
In October 2013, a Kesha concert was cancelled at the 11th hour which has brought so much anger to the Malaysians. Although Kesha has tried to fit the rules set by the authorities but they still warned her that she will be imprisoned if she disobey the rules.
Songs
Any songs whether from local or foreign singers, may be censored if the song contains explicit lyrics or sexual references. For example, in 1989, the nation's public broadcaster, Radio Televisyen Malaysia, bans 71 songs by local artists in just three months alone. RTM also no longer to play or air the song Despacito from their TV and radio stations in 2017 due for sexually-charged lyrics. However, privately owned radio stations and online streaming services are still allowed to play and host the song.
Most song censoring were done by local radio stations such as Astro Radio's Hitz and Mix with stricter form of censorship and Malaysian feed of MTV Asia were delayed by 1 hour for censorship purpose. In addition, singles released to Malaysian radio stations may be different from the version released in the album due to censorship purpose.
Film and cinema
Film censorship in imposed in Malaysia and the Film Censorship Board of Malaysia is the government ministry that vets films. It is under the control of the Home Ministry.
The two main cinema operators in Malaysia, Golden Screen Cinemas and Tanjung Golden Village, are known to be strict in ensuring that only patrons aged 18 and above are allowed to view films rated "18". Although movies shown in Malaysian cinemas carry an age-restricted rating such as "18", films that contain scenes of sex and nudity are completely censored off by the LPF (Malaysia's film censorship board), which renders the 18 rating meaningless and strict entry by the cinema operators pointless. Kissing and make-out scenes are also censored in movies rated "P13" but in recent years the Board has loosened the censorship. On the other hand, there have been many "18" rated films filled with profanity and graphic violence that were hardly censored or uncensored in recent years. This shows that the board mostly views sex and nudity as completely unacceptable for a Malaysian audience.
The Film Censorship Board of Malaysia is the government agency responsible for granting licenses to the films for commercial viewing.
Malaysia's film censorship guidelines were further tightened in 2003 amid rising Islamic conservatism: In addition to nudity and sex scenes being strictly censored off, kissing scenes and cleavages were also censored and many movies were banned altogether. Many movies have been banned for high impact violence and/or cruelty, which is also not allowed by Malaysia's film censorship guidelines. Censorship guidelines for local movie productions were only slightly eased in March 2010 to allow LGBT characters who could only portray their sexual orientation through hugging the same sex. No kissing was allowed between two men or two women.
Censorship guidelines for films were loosened in March 2010, the first revision since 1994, allowing movies with violence and profanity to be screened in local cinemas, some without cuts, such as Night at the Museum: Secret of the Tomb, Zookeeper, Life of Pi and We Bought a Zoo. Minimal cuts are applied to some films, including Divergent, The Host, The Mortal Instruments: City of Bones, The Maze Runner and The Fault in Our Stars.
Television
Ownership of satellite receivers other than those provided by Astro is illegal without a license (which in itself is difficult and prohibitively expensive to obtain). Owners of such receivers without a license can face confiscation of equipment as well as a hefty fine if discovered. This is enforced through tip-offs, and owners can be found out quite easily, as many of these receivers rely on dishes that are significantly bigger than those provided by Astro.
In other aspects, kissing onscreen on local television networks, whether free-to-air or pay television is prohibited, as are homosexuality, sex scenes/nudity and strong graphic violence. As well, strong language is also censored, whether on both free-to-air or pay television. For a short time in the early 2000s, images of pigs on terrestrial TV were also censored, although images of pigs are now apparently allowed, and there was no such censorship on satellite/cable TV. Although contractually, satellite networks cannot be censored in the country, Astro has censored news footage that is critical of the ruling government. It is the network's duty to ensure that the feed provided to cable and satellite providers in the country is free of all banned content. Therefore, the Malaysian feed of most channels is often the one meant for conservative areas, i.e. Cambodia and Indonesia.
In 1995, Saban's Mighty Morphin Power Rangers was taken off the air because of the similarities of the word "Morphin" (a short form for "Metamorphorsizing"), to the drug Morphine.
On 6 April 2012, Information Communications and Culture Minister Rais Yatim said in a Twitter post that there is no censorship regarding the portrayal of LGBT characters on state-owned TV channels, including the portrayal of effeminate men; however the ministry has the right of select content suitable for the Malaysian public.
On 1 May 2012, the BBC strongly condemned Astro for tampering with their content on the BBC World News programme which was broadcast on 28 April 2012, the day when a rally which demanded electoral reform named "Bersih 3.0" was held in Kuala Lumpur. According to the video posted on YouTube, some short interviews with two demonstrators were removed from the news clip. On top of that, a scene which showed the riot police firing tear gas and chemical-laced water at the protestors was also censored. On the next day, Astro admitted to censoring the BBC's Bersih 3.0 coverage but expressed their disappointment with the world-renowned news agency for failing to understand their intention to "comply with local rules". Meanwhile, Al-Jazeera asked for an explanation from the local satellite television operator to clarify reports it had censored their coverage of the same Bersih rally.
Television shows
Malcolm in the Middle has been banned outright because it depicts violent and sexual content for school-aged children along with offensive depictions of sexual anti-social behaviour.
Supernanny UK has been banned outright because it has disgusting behaviour, heavy realistic violence, very coarse language and nudity for children. The U.S. version is also banned.
Home and Away has been banned outright because it has heavy violence, sexual content, strong adult themes, cruelty and horror beyond 2011.
From 1989, Neighbours has been banned because it depicts vulgar and sexual content along with offensive depictions of sexual behaviour. It was lifted by the end of 1994, because it was available on satellite network Astro.
Sydney-based news bulletins shown on both Australian advertisement networks Seven and Nine were banned because they had heavy violence, language and nudity.
Among the titles that were blacklisted include:
"A Wedding" episode on Glee "The Queen Bee" episode on Ally McBeal "The One with the Video Tape" and "The One Who Says "But I'm A Cheerleader"", two Friends episodes
South Park is banned outright because it has excessive vulgar content, sexual content and offensive, high impact violence, but is now available on Comedy Central Asia through HyppTV.
Family Guy'' has been banned outright because it depicts vulgar and sexual content along with offensive depictions of sexual behaviour. It was unbanned in 2010 due to the availability of FOX Asia through Astro, but remains heavily censored. The TV series, however, can still be watched on the national airline Malaysia Airlines.
See also
Malaysia Internet Blackout Day (2012)
Human rights in Malaysia
Racism in Malaysia
References
External links
Pulpmovie's Gagwatch
List of banned books in Malaysia
Censorship of Arts and Culture in Malaya/Malaysia from the MY Art Memory Project of Five Arts Centre |
175605 | https://en.wikipedia.org/wiki/Melissa%20%28computer%20virus%29 | Melissa (computer virus) | The Melissa virus was a mass-mailing macro virus released on or around March 26, 1999. It targeted Microsoft Word and Outlook-based systems and created considerable network traffic. The virus would infect computers via email; the email was titled "Important Message From," followed by the current username. Upon clicking the message, the body would read, "Here's that document you asked for. Don't show anyone else ;)." Attached was a Word document titled "list.doc," containing a list of pornographic sites and accompanying logins for each. It would then mass-mail itself to the first fifty people in the user's contact list and disable multiple safeguard features on Microsoft Word and Microsoft Outlook.
The virus was released on March 26, 1999, by David L. Smith.
However, the virus itself was credited to Kwyjibo, the Macro virus writer for VicodinS and ALT-F11, by comparing Microsoft Word documents with the same globally unique identifier. This method was also used to trace the virus back to Smith.
On April 1, 1999, Smith was arrested in New Jersey due to a collaborative effort involving the FBI, the New Jersey State Police, Monmouth Internet, a Swedish computer scientist, and others. They accused him of causing US$80 million worth of damages by disrupting personal computers and computer networks in business and government.
On December 10, 1999, Smith pleaded guilty to releasing the virus.
On May 1, 2002, he was sentenced to 20 months in federal prison and fined US$5,000.
See also
Code Red (computer worm)
Morris worm
SQL Slammer
Tuxissa
Timeline of computer viruses and worms
Comparison of computer viruses
References
External links
F-Secure Melissa Page
Melissa virus turns 10
SciShow: 5 Worst Computer Viruses
Hacking in the 1990s
Macro viruses |
43245585 | https://en.wikipedia.org/wiki/Roman%20Seleznev | Roman Seleznev | Roman Valerevich Seleznev (or Seleznyov, ; born 1984), also known by his hacker name Track2, is a Russian computer hacker. Seleznev was indicted in the United States in 2011, and was convicted of hacking into servers to steal credit-card data. His activities are estimated to have caused more than $169 million in damages to businesses and financial institutions. Seleznev was arrested on July 5, 2014, and was sentenced to 27 years in prison for wire fraud, intentional damage to a protected computer, and identity theft.
Early life
Seleznev is the son of , a member of Russia's Duma.
Hacking career
He began his activities in early 2003 on the credit card fraud site CarderPlanet, providing paid Social Security numbers and criminal-history research using (among others) stolen LexisNexis accurint.com accounts. Seleznev's employee later created a scanner which allowed a user to scan the internet for MSRDP open ports (3389 by default). Default configurations provided poor protection at the time, and many administrator accounts were not secured by passwords. Exploiting this vulnerability, Seleznev and his partner accessed many remote computers, including those with financial and credit-card data.
He contacted BadB, another hacker, to gain more experience in exploiting financial systems. BadB, a cybercriminal identified in 2009 as Vladislav Horohorin, provided Seleznev with an automated script to look for credit card traces in systems and networks. With this script, Seleznev obtained his first credit-card dumps, which he resold to Horohorin. He became dissatisfied with Horohorin, and decided to begin his own credit-card-dump operation using the nickname nCuX (from , "psycho").
Seleznev expanded his operations in 2008 from scanning MSRDP with default (or no) passwords to developing sophisticated malware which could intercept network traffic and search network shares, distributing it through flaws in Internet browsers by injecting malicious code into advertising traffic. He infected many computers, primarily in the United States.
By May 2009, USSS believed they had collected enough information to come to the conclusion that nCuX was probably the identity of Roman Seleznev. They had a meeting with the Russian intelligence agency FSB in which they shared information from their investigation and their belief that nCuX was Seleznev. Shortly after this meeting, in June 2009, nCuX closed all of his accounts and disappeared from the Internet; USSS suspected FSB had tipped Seleznev off.
After shutting down nCuX, Seleznev created two other names (Track2 and Bulba) and used them to operate his own automated stolen-credit-card shops. He bought advertising space in the "Dumps" section of the illegal carding forum carder.su, which was shut down in a 2012 Department of Homeland Security operation. Horohorin's advertising campaign on carder.su was also shut down, and a denial-of-service attack ensued. He was arrested by USSS in August 2010, leaving Seleznev without competition.
During a vacation in Morocco, Seleznev received a severe head injury in the 2011 Marrakesh bombing and was evacuated to Moscow for surgery.
Arrest and trial
Seleznev's 2014 arrest was controversial in Russia. Russian officials called his arrest a "kidnapping", and said that the U.S. had failed to notify Russian consulates. The DOJ initially refused to disclose the location of Seleznev's arrest, but prosecutors later revealed he was arrested while on vacation at Kanifushi Resort in the Maldives. The Russian Foreign Ministry criticized the island country for failing to follow "international legal norms", which prosecutors said was justified based on the noncooperation of the FSB in 2009 and the scope of Seleznev's crimes. As the Maldives does not have an extradition treaty with the United States, the USSS negotiated directly with the Maldivian government to arrange an expulsion of Seleznev into U.S. law enforcement custody, from which he was sent to Guam to await trial.
DHS Secretary Jeh Johnson said in a statement the arrest showed that "despite the increasingly borderless nature of transitional organized crime, the long arm of justice – and the Department of Homeland Security – will continue to disrupt and dismantle sophisticated criminal organizations".
In 2016, after a 1½-week trial in the U.S. District Court for the Western District of Washington, a jury found Seleznev guilty on 38 counts; the following year, he was sentenced to 27 years' imprisonment. On May 19, 2017, Seleznev faced charges in Atlanta and Nevada; he pled guilty that September to conspiracy to commit bank fraud, and was sentenced to 14 years in prison in November. This sentence will run concurrently with his original sentence.
Later reporting indicated that Seleznev's arrest may have been the result of a cooperative effort between the U.S. government and an officer working within the FSB.
Seleznev is currently being held at the medium security prison FCI Butner in North Carolina, after being transferred from USP Atlanta in 2018. He requested to be transferred to FCI Butner due to the prison's good living conditions and hospital.
Notes
References
External links
17-30085 USA v. Roman Seleznev – United States Court of Appeals for the Ninth Circuit
https://www.justice.gov/sites/default/files/usao-nv/legacy/2013/05/23/12-04%20indictment.pdf – Subject 14 Department of Justice
1984 births
Living people
Hacking (computer security)
People convicted of cybercrime
Russian computer criminals
Russian people imprisoned abroad |
45374721 | https://en.wikipedia.org/wiki/Legality%20of%20ridesharing%20companies%20by%20jurisdiction | Legality of ridesharing companies by jurisdiction | Many communities, governments, and organizations have established rules and regulations that specifically govern ridesharing companies. In some jurisdictions, for-profit ridesharing operations are completely illegal. Regulations can include requirements for driver background checks, fares, the number of drivers, and licensing.
Taxi industry groups have argued that ridesharing companies are illegal taxicab operations which take away their business. Others have called for governments to relax legislation in favor of ridesharing companies.
Ridesharing companies are banned from or have voluntary pulled out of, due to legal restrictions, the following jurisdictions: parts of Oregon, Bulgaria, Denmark, Hungary, and parts of Germany. The UberPop level of service is banned in Italy, France, Netherlands, and Finland.
Legality by country
Australia
Requirement of drivers to pay GST
In May 2015, the Australian Taxation Office (ATO) issued a directive stating that drivers that generate income via a ridesharing company need to have an Australian Business Number and be registered to pay the Goods and Services Tax (GST). Uber filed suit in the Federal Court of Australia, arguing that the public issue by the ATO "unfairly targets Uber's driver-partners". In February 2017, a justice found in favor of the ATO, requiring drivers to register, collect and pay GST. The ATO ruling overrides the standard applied to other small Australian businesses, which only requires businesses grossing more than A$75,000 to collect and remit GST.
Australian Capital Territory
Ridesharing was legalized in the Australian Capital Territory in September 2015. At the same time, fees for taxis and hire cars were reduced to enable them to compete against rideshare operators. Taxis will continue to have the exclusive right to work at taxi ranks or be hailed.
New South Wales
On 30 April 2014, Transport for New South Wales clarified that ridesharing company services must be provided in a licensed taxi or hire car, by an appropriately accredited driver. In December 2014, the New South Wales government confirmed that in April 2014, it conducted an unannounced search of Uber's Sydney offices in April.
In August 2015, the New South Wales government created a task force to look into regulating Uber. From 17 December 2015, taxi and ridesharing passengers pay a $1 levy per trip for five years to fund a $250 million compensation fund for taxi licence holders.
Northern Territory
Ridesharing was legalized in the Northern Territory in January 2018, with a $1 levy being imposed on all taxi, minibus, private hire and ridesharing trips.
Queensland
In mid-November 2014, the Taxi Council of Queensland (TCQ) launched an anti-Uber media campaign. Uber defended itself against the claims.
Effective 5 September 2016, Uber was legalized in Queensland.
South Australia
Ridesharing was legalised in South Australia on 1 July 2016, following a review that commenced in January 2015. As part of the reform package, compensation was offered for those in the taxi industry, and a $1 metropolitan ride levy was introduced to fund the compensation. Taxis will continue to have the exclusive right to work at ranks or be hailed.
Tasmania
Ridesharing companies were legalized in Tasmania in December 2016.
Victoria
On 6 May 2014, the Victorian Taxi Service Commission fined Uber drivers A$1,723. State officers said that they will review the state's Transport Act, while Uber said it will reimburse its drivers.
On 4 December 2015, an Uber driver was found guilty of driving a hire car without a licence or registration. The case was the first of 12 brought against Uber drivers. On 18 May 2016, the judgement was overturned on appeal, effectively legalizing Uber in Victoria.
On 25 August 2016, the government announced plans to legalize ridesharing in Victoria. From 2018, taxi licences were abolished and licence holders compensated by an 8-year A$1 levy on all taxi and ride-booking services in the state.
Western Australia
From 18 December 2015, new regulations were introduced, including a requirement that ridesharing company apply for omnibus licences, as required by taxi services. Both Uber and the taxi industry supported the regulations, which provided certainty.
Bangladesh
Uber was launched on November 22, 2016 in Dhaka, but within 36 hours of its launching, Bangladesh Road Transport Authority (BRTA) declared it illegal. Uber and other ridesharing companies lobbied the government to legalize ridesharing companies. Though the government ban was still on effect, the ridesharing companies operated in the city. On December 3, 2017, the BRTA formulated a guideline for ridesharing companies and most of the ridesharing companies were given operating licenses by February 2018.
The CNG Auto-rickshaw Drivers of Dhaka and Chittagong implemented a strike action on December 27–28, 2017 with 8 demands that included a ban on ridesharing companies. They faced a huge backlash from general public as the CNG auto-rickshaw drivers are notoriously known for overcharging passengers, breaking traffic rules, and misconduct with passengers. In early 2018, a large faction CNG auto-rickshaw drivers decided to join Uber and the ridesharing companies, which operate auto-rickshaw service.
Belgium
In April 2014, Uber was banned in Brussels, and the company was threatened with fines of €10,000 if it offers fares to drivers who are not in possession of a taxi license. Bruxelles-Mobilite, the city's federal region administration responsible for infrastructure and traffic, impounded 13 cars aligned with Uber after March 2014 and a spokesperson for the body described the service as "illegal" in June 2014. The spokesperson also said in a public statement that Bruxelles-Mobilite was generally addressing the issue of illegal taxi drivers in a sector that was difficult to regulate. Although already banned in Brussels, Uber advertised for a Brussels-based "General Manager" on the LinkedIn website in June 2014. The advertisement stated that the role was "by far the most demanding position Uber has to offer."
In October 2015, Uber suspended its UberPOP service, but continued to operate its UberX service, which uses licensed drivers.
In March 2018, taxi drivers protested, blocking roads, demanding the government drop plans to make it easier for ridesharing companies to operate.
Brazil
On April 29, 2015, a Brazilian court banned Uber in response to complaints by a taxi drivers' union. The court also ordered Apple Inc., Google Inc., Microsoft, and Samsung Electronics to prevent installation and use of the Uber mobile app by Brazilian residents. A few weeks later, the order was revoked, allowing Uber to operate normally.
On July 24, 2015, 1,000 taxi drivers in Rio de Janeiro blocked traffic during the morning rush hour. Lawmakers voted to ban Uber in São Paulo and Brasília.
In October 2015, Fernando Haddad, the mayor of São Paulo, signed a bill to allow for a new category of "black taxis" which would operate in parallel to the city's existing licensed taxis but only be bookable via mobile phone apps. Uber rejected the proposal.
In late 2015, an Uber driver was beaten by taxi drivers in Brazil, and similar attacks followed.
Bulgaria
Uber began operations in Sofia in December 2014. In September 2015, a court upheld fines imposed on Uber for unfair trade practices and Uber subsequently stopped service in Bulgaria.
Canada
Uber drivers in Canada are required "to register, collect and remit HST/GST from their fares to the government", regardless of their income.
Toronto
On December 5, 2012, Toronto officials charged Uber with 25 municipal licensing infractions, including operation of an unlicensed taxi brokerage and unlicensed limousine service. Municipal officials said they had advised the company to comply with local regulations and that rival taxi dispatch apps had obtained licenses. Despite support from some quarters including mayor John Tory, Toronto Police Service launched a crackdown on Uber drivers. In July 2015, a $400M class-action lawsuit was filed against UberX and UberXL in Toronto on behalf of Ontario taxi and limo drivers, brokers, and owners, who alleged that Uber violated section 39.1 of the province's Highway Traffic Act by having unlicensed drivers picking up passengers and transporting them for compensation. In March 2016, Sukhvir Tehethi, a local taxi driver, filed an injunction against Uber to stop it from operating. A Toronto city councillor warned that passengers using UberX may be fined up to $20,000. On March 3, 2016, after hours of heated debate, the City Council of Toronto passed a bylaw allowing UberX to operate legally in the city with conditions, while also cutting regulations for taxis.
Edmonton
Edmonton officials unveiled a proposed ridesharing bylaw on September 9, 2015 to permit Uber to operate legally in Edmonton. Uber opposed the accompanying regulations. Uber was legalized in Edmonton on Wednesday, January 27, 2016 effective as of March 1, 2016. However, Uber ceased operations in Edmonton on March 1, 2016, citing inability to obtain the necessary insurance. Uber continued to operate outside of Edmonton despite lack of insurance or proper licensing of their drivers. Uber pulled their cars off Edmonton streets until July 1 when the province approved an insurance policy specifically for ride-sharing companies.
Calgary
In 2015, Calgary, Alberta charged at least 17 drivers illegally driving for Uber without insurance. Uber was given clearance to operate in Calgary in December 2016.
Surrey
In 2020, mayor Doug McCallum gained criticism in the media when he refused to allow Uber drivers to operate in the city of Surrey. McCallum said that the reason for the ban on Uber drivers was done so in order to protect the jobs of the cab drivers working in Surrey. As part of the ban against Uber, any Uber driver that was caught driving within the Surrey city limits while driving a passenger would have to pay $500.
Quebec
Uber continues to negotiate with the government of Quebec after the government issued regulations requiring drivers to undergo 35 hours of training and a background check.
As of January 2019, in the same pilot project as Uber, the Government of Quebec authorizes Eva, a local cooperative alternative, to run in Montreal, Quebec and Gatineau. Eva launches the application in May 2019, becoming the second most used application in Quebec.
Halifax
Following a bylaw change November 1, 2020, ridesharing companies were officially allowed to begin operating in Halifax, Nova Scotia. Uber launched in the city on December 3, 2020.
New Brunswick
In November, 2020, the province of New Brunswick passed legislation that give ridesharing companies the right to operate, asking local municipalities to regulate their use.
Costa Rica
On August 21, 2015, Uber started operations in Costa Rica and multiple Uber drivers were immediately attacked by taxi drivers.
China
In December 2014, in Chongqing, police raided a training session organised by Uber that was attended by more than 20 drivers. In April 2015, Chinese authorities raided the offices of Uber in Guangzhou, Guangdong.
On May 6, 2015, local police raided Uber's offices in Chengdu, in Sichuan province.
In 2016, Uber sold its Chinese operations to Didi.
Croatia
Before Uber began operations in Croatia, the Sustainable Development of Croatia party and major taxi service companies were against it, stating that the price of Uber service doesn't compensate the drivers enough for gas, car maintenance, passenger insurance, nor health and retirement insurance for the driver, and Uber prices also don't include VAT nor surtax. In October 2015, Uber initiated service in Zagreb. In June 2016, the Uber started operating in Split, Croatia and Dubrovnik. In September 2016, a group of taxi drivers attacked a Uber driver who was waiting for a passenger at Zagreb Airport. The Uber driver canceled the ride before the passenger arrived and drove away, with the attackers following him. The attack was filmed by the victim and reported to the Law enforcement in Croatia.
Czech Republic
The biggest protests against Uber in Prague took place in February 2018, when the taxi drivers drove forth and back along the highway. This was repeated for several days. Roads in Prague was also occupied by taxi drivers in October 2017 when they protested near the airport. Uber's activity in Brno was preliminarily stopped by the regional court in July 2017, but in October 2017, a higher court canceled the measure. In March 2018, Uber concluded an agreement with the Czech government. Drivers under this agreement will have to be licensed as taxi drivers.
Denmark
After Uber Black and UberPop were launched in Copenhagen in November 2014, the Danish Transport Authority filed a complaint accusing Uber of operating illegally. In January 2015, Denmark's transport minister stated that, although he was not opposed to Uber, the app was "contrary" to Danish law—consumer safety and employee training were identified as the key concerns.
In July 2016, six Uber drivers were convicted for offering taxi services without license. Police also charged more than 48 Uber drivers for unlicensed taxi driving.
On November 18, 2016, the Østre Landsret ruled that Uber is an illegal taxi service.
Uber shut operations in Denmark in April 2017.
Egypt
After several protests, sit-ins, and violent attacks by taxi operators in 2016 and a lawsuit filed in March 2018, the Egyptian government legalized Uber and Careem in May 2018. The regulations require the ridesharing companies to pay license fees and share user data with the government.
European Union
On June 11, 2014, in a concerted action, taxis blocked roads in major European cities in protest against what they perceived as a threat to their livelihoods from ridesharing companies. The cabbies contended that Uber and similar smartphone app-based services have an unfair advantage because they are not subject to the same kinds of fees and regulations placed on taxis.
In December 2017, the European Court of Justice ruled that Uber is a transport company, subject to local transport regulation in European Union member states, rather than an information society service as Uber had argued.
Finland
Uber launched UberPop in Helsinki in 2014. In September 2016, the Helsinki Court of Appeal deemed Uber illegal, as the company did not have a taxi license. Drivers faced criminal prosecution.
In 2018, Uber was legalized in Finland.
France
On January 13, 2014, cab drivers in Paris attacked an Uber driver's car near Charles de Gaulle Airport, protesting competition.
On October 17, 2014, a court ruled that Uber was illegal and stated that UberPop violated a pre-existent regulation that bans carpooling for profit and fined Uber €100,000.
On December 12, 2014, a French court ruled that Uber could not advertise some of its services to the general public in France; if it did so, it would face a $25,000 daily fine.
Effective January 1, 2015, UberPop was banned under the provisions of the Thévenoud Law, which requires anyone carrying passengers for hire to be licensed and have insurance.
By February 23, 2015 about 100 drivers, mostly first-time offenders, had been ticketed.
UberPool remained operational in Paris and continued to aggressively recruit French drivers and passengers.
On June 25, 2015, cab drivers in Paris "locked down" Paris in an anti-Uber protest that became increasingly violent. Musician Courtney Love got caught in the protest and live tweeted as her Uber cab was violently attacked and she and her driver were held hostage.
In June 2015, French authorities arrested two Uber managers on six charges, including "deceptive commercial practices", complicity in instigating an illegal taxi-driving activity, and the illegal stocking of personal information.
On July 5, 2015, Uber suspended UberPop in the face of pressure by the French government while awaiting a court decision.
On September 22, 2015, France's highest constitutional authority rejected Uber's appeal of a law banning UberPop.
In June 2016, a Paris court fined Uber €800,000, half suspended, for illegally running its UberPop service in 2015.
Germany
In early 2014, Berlin authorities ruled against Uber—which operated in the German cities of Berlin, Munich, Frankfurt, Hamburg, and Düsseldorf—on two occasions following a case filed by the Berlin Taxi Association. The first ruling, delivered by a court in April 2014, deemed Uber's limousine service to be in breach of local legislation, while an August 13, 2014 decision banned the service from operating in Berlin due to safety concerns—the latter decision, which included a €25,000 fine for non-compliance, cited issues pertaining to unregulated vehicles and unqualified drivers who are not properly insured.
On August 28, 2014, a court in Frankfurt issued an immediate cease and desist order against Uber following an appeal from Taxi Deutschland. The preliminary injunction applied to all of Germany and included a fine of €250,000 per ride for non-compliance. If the injunction was breached, Uber's German-based employees could be jailed for up to 6 months and the company could be fined. UberBLACK was not affected by the ruling.
On September 16, 2014, the district court of Frankfurt revoked the preliminary injunction, thereby re-allowing Uber to operate in Germany. The presiding judge wrote that the Taxi Deutschland case "would have had prospects for success", but the case was merely lodged too late, as any case needs to be filed within two months of a service's launch—Uber started in Germany in April 2014, but the case was filed in August 2014. Taxi Deutschland appealed the ruling.
On March 18, 2015, a Frankfurt district court imposed a nationwide ban on UberPop, claiming that drivers do not have proper licensing and insurance. Each violation of this order would be subject to a €250,000 fine.
In October 2015, Uber limited its operations to its UberX and UberBLACK services, which requires drivers that hold passenger transport licenses.
In November 2018, Uber began operations in Düsseldorf, working with licensed drivers and taxi companies.
Greece
In April 2018, Uber suspended service in Greece after regulations were implemented that require all rides to begin and end in the fleet partner's designated headquarters or parking area.
Hong Kong
On August 11, 2015, Hong Kong Police raided Uber's office after arresting five drivers in a sting operation aimed at combating illegal taxis. Two more drivers were arrested on the next day. However, the Hong Kong government investment agency, InvestHK, had endorsed Uber as one of its "success stories" on its website, although the endorsement was later removed.
On March 15, 2018, a group of local taxi drivers protested outside the Hong Kong Police Headquarters, requesting for actions to be taken on those "unlicensed taxis". They accused Uber from using false and misleading documents to lie to the public. On the same day, another group of taxi drivers protested by honking their horns for 30 seconds in Admiralty, Hong Kong at noon. They also threatened to flood the area with their vehicles if no actions are taken by the government.
Hungary
In July 2016, Uber was ruled to be an illegal taxi service in Hungary and subsequently suspended operations.
India
Hyderabad
The Hyderabad road transport authority banned Uber cabs a day after the Indian Ministry of Home Affairs advised all states to stop the operation of ridesharing companies. A spokesman for the authority said that Uber did not hold a license to operate in the city, and asked the public to cease using Uber.
Karnataka
After Home Minister Rajnath Singh announced in Parliament on December 9, 2014 that he had advised all states and Union territories to ban unregistered and unlicensed cab services, the state government of Karnataka banned Uber on December 11, 2014.
New Delhi
In December 2014, following allegations of rape against an Uber driver in New Delhi, Uber was banned from New Delhi for not following the city's compulsory police verification procedure. The driver had been charged, then acquitted, of a prior sexual assault in 2011. Within two days of the rape incident, almost 7,000 people signed a petition calling on Uber to conduct mandatory 7-year background checks on drivers, in line with its U.S. operations. Delhi's transport department banned Uber. Uber issued a statement stating that it would work with the Indian government "to establish clear background checks currently absent in their commercial transportation licensing programs."
In banning Uber, Delhi's transport department cited several rules that Uber had broken. According to New Delhi's Radio Taxi Scheme, 2006, all taxi licensees must be either a company under the Companies Act, 2013 (or the 1956 Act), or a society under the Societies Registration Act, 1860. Furthermore, taxi services must provide adequate parking space for all taxis, as well as sufficiently sized office space to accommodate the control room, the maintenance of a minimum fleet size per license (500 vehicles), and all vehicles must be fitted with GPS/GPRS tracking systems (to be in constant communication with the control room while on duty). The rules also stipulate that the taxi licensee is responsible for ensuring the quality of drivers, including police verifications, supervision, and employee behaviour.
Uber is faced with limits to the number of drivers that are allowed to operate. but now its operating in New Delhi.
Indonesia
On March 22, 2016, thousands of taxi drivers in Jakarta demonstrated against Uber and a similar service, Grab. Several places were targeted during the protests, including the Istana Merdeka, the DPR/MPR Building, and the Ministry of Communication and Informatics central office. Taxi drivers accused that Grab and Uber were causing them to receive smaller daily incomes due to the rising number of app users. The demonstrators also demanded that the government ban the apps and issue a governmental decree concerning this problem.
In January 2019, Indonesia announced plans to fix the rates charged by ridesharing companies such as Grab and Go-Jek.
Israel
Uber first introduced a limited service in the Tel Aviv area in August 2014. However, in November 2017 the Tel Aviv District Court issued a permanent injunction against Uber's utilizing private cars in Israel on the grounds that these lacked the insurance coverage of regulated taxis. Uber was allowed to provide its service in licensed taxis as do other crowd-sourced ride-hailing companies such as Gett. Although Uber had the support of Prime Minister Benjamin Netanyahu, the court ruled for the taxi companies and drivers who opposed Uber.
Italy
On May 25, 2015, Italian judge dott. Claudio Marangoni banned the UberPop app for unfair competition practices.
In February 2017, Italian taxi drivers implemented a strike action.
On April 6, 2017, Italian judge dott. Alfredo Landi banned the UberBlack, Uber-Lux, Uber-SUV, Uber-X, Uber-XL, UberSelect and Uber-Van app throughout Italy for unfair competition practices.
In November 2017, Italian taxi drivers implemented another nationwide strike action.
Japan
In September 2018, Uber struck a deal with the Fuji Taxi Group to let users hail cabs through its app in Nagoya. Uber initially started with 350 cabs.
Malaysia
On October 15, 2014, five Uber drivers were involved in a crackdown by the Road Transport Department (JPJ), under the Ops Teksi Uber 2014 operation—which began on October 1. The 4 other vehicles were returned to their respective owners—with their documents confiscated pending further investigation by the Land Public Transport Commission (SPAD). Due to a wide range of circumstances, the 4 vehicles could be returned to owners should proper documents and other factors correlate. On October 17, 2014, JPJ continued its crackdown on drivers. Between October 2014 and October 2015, the Land Public Transport Commission impounded 44 Uber vehicles, using many methods such as tracking the vehicles using Uber's app. It was also reported that some taxi drivers have taken it upon themselves to nab Uber drivers and turn them over to the police.
In July 2017, legislation was passed to legalize Uber.
Morocco
Uber began services in Casablanca in July 2015 but suspended service in Morocco in February 2018 after it was not clear that the service was legal.
Netherlands
On December 8, 2014, Dutch judges banned UberPop and implemented a €100,000 fine and the €40,000 fine for drivers who are apprehended. At first Uber continued operating, but Uber shut down its service in November 2015 after office raids by Dutch authorities.
New Zealand
In January 2015, several Uber vehicles were stopped by New Zealand police, claiming that Uber was in violation of the Land Transport Act. Two Uber drivers were charged with violating the Land Transport Act and face fines of up to NZ$10,000.
On January 20, 2015, the Associate Transport Minister, Craig Foss, said that the rules covering taxis and private hire services, including Uber, will be reviewed by New Zealand officials by mid-2015.
In April and May 2016 the New Zealand Transport Authority (NZTA) sent warnings to 17 Uber drivers who did not comply with current regulations.
On August 3, 2017, Uber New Zealand GM, Richard Menzies, announced that Uber is formally recognized as part of the public transport mix, meaning it can legally operate in New Zealand. Uber Eats was later launched in New Zealand that year.
Norway
Uber began operations in Norway in 2014.
According to the Norwegian Professional Transport Act, a taxi license is required to charge for passenger transport "addressed to general public on public space" In 2015, an Uber driver was acquitted because the court found that communication through a mobile app was not to be regarded as "public space."
On October 30, 2017, Uber suspended its UberPOP service in Oslo, continuing to operate UberBLACK and UberXL service.
Philippines
On October 23, 2014, despite the recommendation of the Metropolitan Manila Development Authority, the Philippine Land Transportation Franchising and Regulatory Board (LTFRB) imposed a ₱120,000 (US$2,676) to ₱200,000 (US$4,460) fine for the use of the Uber app. A spokesperson for the board said that the fines were issued because Uber did not have an approved franchise to operate in the country. The LTFRB also remarked that Uber can still operate in Metro Manila if the House of Representatives of the Philippines grants the company a proper legislative franchise.
On October 30, 2014, after an intervention from the Department of Transportation and Communications, the LTFRB temporarily suspended its campaign of apprehending Uber vehicles.
Amid opposition from taxi companies, On May 10, 2015, ridesharing companies gained legal ground to operate. The country requires a GPS system installed, a young fleet of vehicles, and the appropriate permits. Taxis were also given a chance to compete by also giving them a sub-classification that matches features found in Uber and other similar services. On August 19, 2015, Uber complied and secured government registration to become the country's second ridesharing company after Grab. Individual vehicle operators however still need to undergo separate registrations with the LTFRB.
Uber suspended service for a month on August 14, 2017 due to the defiance of LTFRB's order on not to accredit drivers in their systems starting July 26, 2017.
In August 2018, the Philippines set additional regulations for ridesharing companies including fare transparency, acceptance rates for bookings and faster response time to complaints, with fines for non-compliance. At that time, Grab had a 93% market share.
Poland
Following the commencement of Uber services in Warsaw in 2014, Jarosław Iglikowski, chief of the Union of Warsaw Taxi Drivers, said: "We will put pressure on politicians, and demand that they change the regulations [for firms offering taxi services]."
In June 2017, after a protest by 2,000 taxi drivers, Deputy Prime Minister Mateusz Morawiecki announced that Poland may impose more regulations on Uber.
In April 2018, Poland announced new licensing requirements for ridesharing companies such as Uber and Taxify.
Portugal
On April 29, 2016, a protest including 2,000 taxi drivers took place in major cities in Portugal.
In October 2016, thousands of Portuguese cab drivers blocked access to Lisbon International Airport to protest government plans to legalize and regulate ridesharing companies.
In December 2017, Uber was ruled to be illegal in Portugal.
In November 2018, Uber and ride sharing became legal again with the so-called 'Uber law'. Law 45/2018 established a legal framework for individual and paid passenger transport in 'ordinary' vehicles based on an electronic platform referred to as TVDE. This allowed ride sharing companies to operate again with licensed TVDE operators. TVDE operators would need to have held a driving license for a minimum of three years, and have completed a specific training course covering communication, interpersonal relationships, and professionalism.
Romania
In May 2015, the Romanian Parliament adopted a law which banned transport services by unauthorized drivers, effectively making Uber illegal; however, Uber continues to operate in Romania as it battles in the courts.
In June 2018, Uber was banned in Cluj.
On June 25, 2019, the Romanian Government passed an emergency ordinance which regulates alternative transport servicies, such as Uber and Bolt. The law came into effect on February 1, 2020.
Saudi Arabia
In March 2017, Saudi Arabia banned Uber and Careem from picking up at the airport, citing license requirements. Saudi Arabia had earlier banned the ridesharing companies from allowing non-Saudis to register as drivers.
Singapore
On February 10, 2017, the Singapore Land Transport Authority (LTA)ruled that private hire cars who used Uber or Grab service are not exempted from the child seat requirement. For safety reasons, all vehicles in Singapore must have booster seats or child restraints for passengers under 1.35m in height.
In March 2017, LTA introduced a new regulation for private hire cars called Private Hire Car Driver's Vocational Licence (PDVL) which took effect in July 2017. This is to ensure that commuter's interest is better protected.
In September 2018, Singapore required that drivers cannot be exclusive to Grab, in an attempt to open the ridesharing market to competition.
In September 2020, Singapore required that drivers will now have to be at least 30 years old and be Singapore citizens, in a move that could reduce the industry's current glut of drivers. Previously, both Singaporeans and permanent residents (PRs) were eligible to apply for a PDVL, as long as they had held a driving licence for two years. This meant drivers could be as young as 20.
South Africa
Over 300 vehicles operating for the Uber service in Cape Town were impounded in 2015. Local transport officials claimed that the service was operating without suitable permits.
In Cape Town, on June 3, 2016, metered taxi drivers blockaded the road to the city's airport and forced passengers out of vehicles whilst attacking Uber drivers.
In July 2018, in Johannesburg, Uber and taxi drivers initiated a strike action, blocking roads and, in 3 cases, taking the phones of drivers that did not participate in the strike.
In August 2018, Uber opposed a new law that would prohibit the company from allowing drivers to operate without a license, subject to a fine of up to R100,000, claiming that many drivers were facing delays in getting permits from government agencies.
South Korea
The Seoul city government released an official statement in July 2014 expressing its intention to ban Uber. The government stated that South Korean law prohibits fee-paying transport services that use unregistered private or rented vehicles, and a Seoul driver received a one-million won (US$974) fine in April 2014 after using Uber to solicit customers in a rented car. The city government also initiated a police investigation of Uber in June 2014, but the request was suspended due to a lack of evidence; however, the July statement indicated that the investigation would be recommenced.
In December 2014, Uber announced that the Seoul Central District Prosecutors' Office had issued an indictment against both the company and Kalanick in regard to the violation of a Korean law prohibiting individuals or firms without appropriate license from providing or facilitating transportation services.
In March 2015, Uber suspended its UberX service in Korea after disputes with officials.
Spain
On December 9, 2014, In the absence of any legal provision for private hire, a judge ordered Uber to cease all activities in Spain. In a statement after the ruling, the Spanish court stated that drivers "lack the administrative authorisation to carry out the job, and the activity they carry out constitutes unfair competition." The company suspended its operations in Spain on December 30, 2014.
Uber restarted operations in Spain in March 2016, this time using only licensed drivers.
In August 2018, Spanish drivers ended a 6-day strike after the government agreed to set limits on licenses for ridesharing companies.
Switzerland
In August 2017, Uber suspended its UberPOP service in Zürich following controversy over its legality. It still operates the service in Basel and Geneva.
Taiwan
As of December 6, 2014, Uber Taiwan had received over NT$1,000,000 in fines for operating illegally, including a cease and desist of the app, on December 5, 2014. Issues included failure to insure vehicles, operating like a business without a business license, metered fares unknown to passengers, metered fares not inspected by the Ministry of Transportation and Communication, and failure to report income and pay taxes. Many drivers had their licenses suspended for violations. In December 2014, the Ministry of Transportation and Communications announced that the company was operating unlicensed taxis in violation of national law, and that the government was considering blocking the service.
Uber was fined 231 million Taiwan dollars ($7.4 million) over two weeks after new rules introduced on January 6, 2017. On February 2, 2017, Uber announced it will suspend its service in Taiwan after the fines.
In April 2017, Uber restarted service in Taiwan.
Turkey
On June 2, 2018, following pressure from Istanbul taxi drivers, President Recep Tayyip Erdoğan declared that Uber is "finished" in Turkey. The company was banned from operation.
Thailand
Following concerns raised by taxi drivers in Thailand over Uber's lower rates, Uber was declared illegal on November 28, 2014 under Thailand's Motor Vehicle Act B.E. 2522, claiming that Uber vehicles are not properly registered in Thailand, Thai Uber drivers are not properly licensed, and that Uber discriminates against people who do not possess credit cards. Following the announcement, Uber drivers faced a maximum 4,000-baht fine if caught by police.
In May 2016, Uber was forced to shut its motorcycle taxi service.
In March 2017, Thai transport authorities began a crackdown on ridesharing companies such as Grab and Uber and urged the government to ban them.
United Arab Emirates
Abu Dhabi
Uber launched in Abu Dhabi in 2013. In August 2016, Uber and Careem were suspended in Abu Dhabi after some drivers were detained over regulation violations. Careem resumed operation in December 2016.
Uber restarted service in Abu Dhabi in November 2018.
Dubai
Dubai-based Careem launched in 2012.
Uber launched in Dubai in 2013. In January 2017, after a long spat with regulators, Uber signed an agreement with the Roads and Transport Authority of Dubai and became fully regulated. Under this deal, Uber is entitled to deploy about 14,000 vehicles around the city per the law of transportation companies in Dubai.
United Kingdom
On October 28, 2016, in the case of Aslam v Uber BV, the Central London Employment tribunal ruled that Uber drivers are "workers", rather than self-employed individuals, and are entitled to the minimum wage under the National Minimum Wage Act 1998, paid holiday, and other normal worker entitlements. Two Uber drivers had brought the test case to the employment tribunal with the assistance of the GMB Union, on behalf of a group of drivers in London. Uber appealed the decision. Two Uber drivers had brought the case to the employment tribunal with the assistance of the GMB Union on 20 July 2016. On November 10, the court upheld the ruling against Uber's appeal. In December 2018, Uber lost an appeal at the Court of Appeal, but was granted permission to appeal to the Supreme Court of the United Kingdom.
In November 2018, Uber was fined £385,000 under the Data Protection Act 1998 for a data breach affecting 35 million users worldwide, and more detailed data from 3.7 million drivers including their weekly pay.
London
On 11 June 2014, London-based Hackney carriage (black cab) drivers, members of the Licensed Taxi Drivers Association, disrupted traffic as a protest against Transport for London's refusal to stop Uber's calculation of fares based on distance and time taken, as they claimed it infringes upon their right to be the sole users of taximeters in London. The following week, London mayor Boris Johnson stated it would be "difficult" for him to ban Uber "without the risk of a judicial review"; however, he expressed sympathy for the view of the black-cab drivers. On October 16, 2015, after Transport for London brought a case to the High Court of Justice to determine whether the way Uber's app calculates a fare falls under the definition of a taximeter, it was ruled that the app is legal in London.
On September 22, 2017 Transport for London announced that it would not renew the license of Uber's local service provider, which was due to expire at the end of that month. Transport for London declared that Uber London Limited was not "fit and proper" to hold a private hire operator license, citing concerns over the company's approach to reporting serious criminal offences, obtaining medical certificates and Disclosure and Barring Service checks, and the use of Uber#Greyball. Uber indicated that it would appeal the decision. On June 26, 2018, Westminster Magistrates' Court granted a license for 15 months with additional conditions. Uber had applied for a 5-year license.
York
On December 12, 2017 York's Gambling, Licensing & Regulatory Committee voted to deny the renewal of Uber's license due to a data breach in 2016 and several complaints against the company and drivers. Uber appealed with QC Philip Kolvin, taking City of York Council to the Magistrates.
Uber withdrew from the appeal on March 14, 2018 with the plan to reapply for the license. In November 2018, the city looked into the legality of Uber after a legal expert claimed that Uber drivers are "acting as unlicensed operators".
Brighton and Hove
On May 1, 2018, Brighton and Hove City Council's licensing panel refused to renew Uber's private hire operator license in the city. It cited "significant concerns" about the car hailing app's data breach in 2016, and whether the company was adhering to its commitment to use only Brighton and Hove licensed drivers in the city. In December 2018, Uber won an appeal of the case.
United States
Alabama
In July 2018, ridesharing companies such as Uber and Lyft became legal across Alabama.
Alaska
In September 2015, Uber paid the State of Alaska $77,925 and paused operations in Anchorage. The state argued that Uber was misclassifying drivers as contractors instead of employees, which was illegal.
Arkansas
A 2015 Arkansas law requires ridesharing companies to each pay a $15,000 annual fee and to vet potential drivers.
California
In May 2011, Uber received a cease-and-desist letter from the San Francisco Municipal Transportation Agency, claiming it was operating an unlicensed taxi service, and another legal demand from the California Public Utilities Commission (CPUC) that it was operating an unlicensed limousine dispatch. Both claimed criminal violations and demanded that the company cease operations. In response, the company, among other things, changed its name from UberCab to Uber. In the fall of 2012, the CPUC issued a cease-and-desist letter to Uber, Lyft, and Sidecar, and fined each $20,000. However, an interim agreement was reached in 2013 reversing those actions.
In June 2013, Lyft, Uber and Sidecar were served with cease and desist letters by the Los Angeles Department of Transportation.
In September 2013, the CPUC unanimously voted to make the agreement permanent, creating a new category of service called "transportation network company" to cover Lyft, UberX, SideCar, and Summon, thereby making California the first jurisdiction to recognize such services.
On September 17, 2014, California's Governor approved the "Assembly Bill No. 2293" bill that became effective on July 1, 2015. The bill amended "the Passenger Charter-party Carriers' Act to enact specified requirements for liability insurance coverage for transportation network companies, as defined, and their participating drivers." The driver under the law is defined as "any person who uses a vehicle in connection with a transportation network company's online-enabled application or platform to connect with passengers." The stated minimum insurance requirement ranges from US$50,000 to $100,000 for death and injuries per individual or incident, and stipulates US$30,000 for property damage. As a breach of the bill is classified as a criminal act, a corresponding "state-mandated local program" will be implemented.
In April 2016, a case that was originally filed on December 9, 2014, by the district attorneys of both Los Angeles, and San Francisco was resolved. Prosecutors claimed that Uber made misleading statements about the background checks it performs on drivers and falsely charged a "safe ride fee." The case was resolved when Uber agreed to no longer claim to be the "safest ride on the road", change the name of the "safe ride fee" to "booking fee", and pay $10 million. San Francisco's city attorneys had previously settled out of court with Lyft over similar allegations.
On December 14, 2016, the California Department of Motor Vehicles demanded that Uber cease its autonomous car program in San Francisco or obtain a licence, threatening legal action. Following the invitation of tech enthusiast and Arizona Governor Doug Ducey, Uber decided to move its fleet to Phoenix, Arizona.
Colorado
In June 2014, Colorado became the first state to pass rules for ridesharing companies through the legislative process, when S 125 was signed into law.
District of Columbia
In January 2012, an Uber driver's car was impounded as part of a sting by the Washington, D.C. taxicab commission. The commissioner said the company was operating an unlicensed taxicab service in the city. Following a social media campaign by Uber riders, the D.C. city council voted in July 2012 to formally legalize ridesharing companies, which led to protests by taxicab drivers. The Washington, D.C. City Council passed legislation in September 2013 to allow ridesharing companies to operate.
Florida
In July 2017, a new law regulating ridesharing companies in Florida went into effect. The law requires background checks on all drivers.
Georgia
In September 2014, a class-action lawsuit was filed by taxicab drivers claiming that Uber drivers were not properly licensed. The lawsuit was dismissed by the Georgia Supreme Court.
Hawaii
Regulations affecting ridesharing companies in Hawaii were proposed in 2019.
Idaho
In April 2015, a law was passed in Idaho that allows ridesharing companies to regulate themselves and not have to deal with regulations or laws imposed by city governments. The law was proposed by a lobbyist for Uber and had been opposed by certain local jurisdictions.
Illinois
On October 5, 2012, Uber was sued by the taxi and livery companies in Chicago. Uber was accused of violating Chicago city laws and Illinois state laws designed to protect public safety, consumer protection, and fair practices. Regulations affecting ridesharing companies were approved in December 2014.
Kansas
In May 2015, Uber was legalized in Kansas.
Kentucky
In December 2014, Kentucky imposed regulations on ridesharing companies that include annual licensing application, driver background checks, and driver liability insurance coverage.
Louisiana
In June 2019, Louisiana passed statewide regulations on ridesharing companies, permitting their operation statewide.
Massachusetts
On August 1, 2012, the Massachusetts Division of Standards issued a cease-and-desist letter to Uber on the grounds that the GPS-based smartphone app was not a certified measurement device, but on August 15, the agency reversed its ruling after prodding by Governor Deval Patrick, saying that technique was satisfactory because it was under study by the National Institute of Standards and Technology.
Uber worked out an arrangement with the city of Boston to share quarterly data on the duration, locations, and times of day in which riders used the app to travel in or out of the city. This information was first delivered to the city in February 2015, and the report kept all individual user data private.
The legislature passed a law formally legalizing and regulating ridesharing companies in July 2016. The law requires background checks, vehicle decals and inspections, insurance, state certification of drivers; prohibits increased fares during a declared emergency or for passengers with disabilities; requires drivers to be 21 or older; and sets up a complaint process and commission to review the economics of the whole ride-for-hire industry. Unlike taxis, rideshare vehicles are prohibited from "cruising" for passengers on streets. The law also establishes a $0.20 per-ride charge, which is distributed to cities and towns for transportation and ride-for-hire economic development purposes.
On July 14, 2020, the Massachusetts attorney general filed a lawsuit seeking a court ruling that Uber and Lyft drivers are employees under Massachusetts Wage and Hour Laws, a designation that will allow drivers access to critical labor rights and benefits, such as minimum wage, overtime, and earned sick time.
Michigan
In December 2016, Michigan instituted regulations on ridesharing companies.
Minnesota
In July 2014, the Minneapolis City Council voted almost unanimously to legalize ridesharing companies.
Mississippi
In April 2016, statewide regulations governing ridesharing companies in Mississippi were implemented.
In May 2017, officials in Jackson, Mississippi wanted more regulations on ridesharing companies.
Missouri
In April 2017, ridesharing companies were legalized statewide in Missouri after a law was passed that requires ridesharing companies to institute driver background checks and pay a licensing fee.
Nebraska
In July 2015, Uber received approval to legally operate in Nebraska.
In October 2017, taxi drivers in Lincoln, Nebraska petitioned the government to require rideshare drivers to undergo background checks and physical exams.
Nevada
On November 25, 2014, Washoe County, Nevada District Court Judge Scott Freeman, issued a preliminary injunction preventing Uber from operating statewide. The temporary injunction was based on the company's failure to file a certificate of public convenience and necessity, which is required for every transportation service in Nevada. The Government of Nevada also claimed that Uber's screening process was not rigorous enough to protect consumers, and failed to conform with the aforementioned regulations. Uber contested the ruling, arguing that it is an app-based technology company rather than a transportation company, but the company's management made the decision to temporarily shut down its Nevada operations. Nevada legalized ridesharing companies in May 2015.
New Hampshire
Legislation passed in 2016 in New Hampshire requires each ridesharing company (not each driver) to pay an annual fee of $500. It also includes requirements that each company get a permit from the state, obtain a driver history report on each driver that meets the provisions of the law, and require their drivers to have liability insurance.
New York
UberX was suspended in New York City in October 2012 after pressure from the New York City Taxi and Limousine Commission. Uber's premium sedan service was not affected.
In February 2017, the New York State Senate approved legislation allowing ridesharing companies to expand operations to Upstate New York and Uber began service there in June 2017.
North Carolina
In September 2015, Governor Pat McCrory signed a law regulating ridesharing companies. It also forbids the establishment by county and municipal governments of additional regulations upon ridesharing companies and drivers.
Ohio
In December 2015, regulations governing ridesharing companies in Ohio were implemented. ridesharing companies must pay a $5,000 permit fee and conduct driver background checks.
Oregon
On December 8, 2014, Portland, Oregon sued Uber, claiming that Uber violates the city's Private for Hire Transportation Regulations and Administrative Rules. The court was asked to stop Uber from operating in Portland. Uber suspended its operations in the city for 3 months, pending planned changes to local regulations.
Oklahoma
In February 2016, regulators ratified new rules for ridesharing companies such as Uber and Lyft.
Pennsylvania
On July 1, 2014, after implementing fines on Uber and Lyft, the Pennsylvania Public Utility Commission imposed a cease-and-desist order on the companies.
Pittsburgh
In December 2014, Uber and Lyft received two-year experimental licenses.
In June 2015, Uber drivers became eligible to pick up riders at Pittsburgh International Airport.
Philadelphia
In December 2014, Checker Cab Philadelphia and 44 other taxi companies in Philadelphia filed a lawsuit alleging that Uber was operating illegally in the city. On March 3, 2015, U.S. District Judge Nitza I. Quinones Alejandro denied a motion for a preliminary injunction against Uber.
In January 2016, a $1.5M lawsuit was filed against Uber in Philadelphia by Philadelphia taxicab medallion owners, claiming that Uber engaged in tortious interference and engaged in false advertising under the Lanham Act. The case was dismissed in August 2016.
Philadelphia legalized ridesharing companies in November 2016.
Texas
May 2017, Texas HB100 made the regulation of rideshare companies an exclusive power of the state of Texas. HB100 requires annual background checks of drivers but does not require fingerprinting.
Austin
In March 2015, UberPOOL began operations in Austin, Texas in advance of the annual South by Southwest festival.
On May 7, 2016, Uber and Lyft announced they would no longer provide service in Austin after city voters rejected a referendum backed by the ridesharing companies that would have repealed a city ordinance requiring their drivers to submit to fingerprint-based background checks.
May 2017, regulations pertaining to Austin were overridden by Texas HB100, and Uber and Lyft resumed operations in Austin.
Houston
In late 2016, Uber threatened to leave Houston ahead of Super Bowl LI, insisting various city regulations, including fingerprint background checks of drivers, were too burdensome. Houston officials and Uber reached a compromise in December 2016, whereby Houston would continue to require a fingerprint check for drivers but eliminate requirements for driver drug testing and physicals through at least February 5, 2017.
May 2017, Regulations pertaining to Houston were overridden by Texas HB100.
Tennessee
Regulations affecting ridesharing companies were implemented in December 2014.
Virginia
On June 5, 2014, the Virginia Department of Motor Vehicles issued a cease-and-desist letter to both Uber and Lyft, demanding they halt operations within Virginia. In February 2015, ridesharing companies were legalized in Virginia.
Washington
In March 2014, to appease taxi drivers, the Seattle City Council passed an ordinance in March 2014 that capped the number of drivers from any ridesharing company on the road at any given time to 150. However, on April 17, 2014, after a coalition obtained 36,000 signatures to put the question to voters in a referendum, Mayor Ed Murray announced a 45-day negotiation process to find an alternative approach. Uber donated over $613,000 to "Seattle Citizens to Repeal Ordinance 124441", a political group seeking to overturn the ordinance limiting the number of rideshare vehicles in Seattle. In June 2014, the mayor reached a deal to legalize ridesharing companies with no driver limits. The compromise was passed by the city council in July 2014.
In December 2018, Spokane instituted licensing requirements that require drivers for ridesharing companies to pay license fees on par with those paid by taxicab drivers.
Wisconsin
In May 2015, Governor Scott Walker signed legislation making it easier for ridesharing companies such as Uber and Lyft to operate without local regulation and oversight.
In August 2017, state senators introduced a bill supported by the taxi industry that would require ridesharing companies to conduct criminal background checks including fingerprint checks on all drivers.
Ukraine
In February 2016, taxi drivers protested in Kiev against the lack of licensing requirements for rideshare drivers.
On March 30, 2017, taxi drivers protested against Uber and Yandex.Taxi in Lviv.
References
Uber
Protests |
3097853 | https://en.wikipedia.org/wiki/Data%20Interchange%20Format | Data Interchange Format | Data Interchange Format (.dif) is a text file format used to import/export single spreadsheets between spreadsheet programs.
Applications that still support the DIF format are Collabora Online, *Excel, Gnumeric, and LibreOffice Calc. Historical applications that used to support it until they became end of life or no longer acknowledge support of the format are dBase, FileMaker, Framework, Lotus 1-2-3, Multiplan, OpenOffice.org Calc and StarCalc.
*Some implementations caused interoperability problems, notably those of older Microsoft Excel products, see the section below called "Discrepancies in implementations".
A limitation with DIF format is that it cannot handle multiple spreadsheets in a single workbook. Due to the similarity in abbreviation and in age (both date to the early 1980s), the DIF spreadsheet format it is often confused with Navy DIF; Navy DIF, however, is an unrelated "document interchange format" for word processors.
History
DIF was developed by Software Arts, Inc. (the developers of the VisiCalc program) in the early 1980s. The specification was included in many copies of VisiCalc, and published in Byte Magazine. Bob Frankston developed the format, with input from others, including Mitch Kapor, who helped so that it could work with his VisiPlot program. (Kapor later went on to found Lotus and make Lotus 1-2-3 happen.) The specification was copyright 1981.
DIF was a registered trademark of Software Arts Products Corp. (a legal name for Software Arts at the time).
Syntax
DIF stores everything in an ASCII text file to mitigate many cross-platform issues back in the days of its creation. However modern spreadsheet software, e.g. OpenOffice.org Calc and Gnumeric, offer more character encoding to export/import. The file is divided into 2 sections: header and data. Everything in DIF is represented by a 2- or 3-line chunk. Headers get a 3-line chunk; data, 2. Header chunks start with a text identifier that is all caps, only alphabetic characters, and less than 32 letters. The following line must be a pair of numbers, and the third line must be a quoted string. On the other hand, data chunks start with a number pair and the next line is a quoted string or a keyword.
Values
A value occupies two lines, the first a pair of numbers and the second either a string or a keyword.
The first number of the pair indicates type:
−1 – directive type, the second number is ignored, the following line is one of these keywords:
BOT – beginning of tuple (start of row)
EOD – end of data
0 – numeric type, value is the second number, the following line is one of these keywords:
V – valid
NA – not available
ERROR – error
TRUE – true boolean value
FALSE – false boolean value
1 – string type, the second number is ignored, the following line is the string in double quotes
Header chunk
A header chunk is composed of an identifier line followed by the two lines of a value.
TABLE - a numeric value follows of the version, the disused second line of the value contains a generator comment
VECTORS - the number of columns follows as a numeric value
TUPLES - the number of rows follows as a numeric value
DATA - after a dummy 0 numeric value, the data for the table follow, each row preceded by a BOT value, the entire table terminated by an EOD value
The numeric values in header chunks use just an empty string instead of the validity keywords.
Discrepancies in implementations
Some implementations (notably those of older Microsoft products) swapped the meaning of VECTORS and TUPLES. Some implementations are insensitive to errors in the dimensions of the table as written in the header and simply use the layout in the DATA section.
Example
For example, assume we have two columns with one column header row and two data rows:
In a .dif file, this would be (→ indicates comments):
TABLE
0,1
"EXCEL"
VECTORS → the number of columns follows as a numeric value
0,2 → '0' indicates that it's a numeric type, '2' since we have 2 columns
""
TUPLES → the number of rows follows as a numeric value
0,3 → '0' indicates that it's a numeric type, '3' since we have 3 rows
""
DATA → after a dummy 0 numeric value, the data for the table follow
0,0 → this is the dummy 0 numeric value
""
-1,0 → '-1' for the directive type. This is followed by either a 'BOT' or an 'EOD'
BOT → signifies the start of a row
1,0 → '1' since the cell contains a string. (The second number is ignored)
"Text" → this is the String that's in the cell
1,0 → '1' since the cell contains a string.
"Number"
-1,0
BOT → another row
1,0 → a string follows
"hello"
0,1 → numeric value ('0') of value '1'
V → 'V' is for 'Valid'
-1,0
BOT → another row
1,0
"has a double quote "" in text"
0,-3
V
-1,0
EOD → End of Data
See also
Data exchange
Comma-separated values (CSV format)
References
Sources
Jeff Walden: File Formats for Popular PC Software. John Wiley & Sons, Inc., 1986.
Comment from Dan Bricklin, one of the developers of VisiCalc, on the discussion page of this article
Commodore 64 Data Files, A BASIC Tutorial. (1984). David Miller. . Pages 212-231.
External links
Announcement of DIF Clearinghouse by Software Arts Products Corp.
Spreadsheet file formats
Data serialization formats |
33678444 | https://en.wikipedia.org/wiki/Dynatron%20Radio | Dynatron Radio | Dynatron Radio Ltd was the trade name used by H.Hacker & Sons for their wireless products. The firm started trading in 1927 and operated independently until being bought by Ekco in 1955. The rights to the Dynatron name are currently held by Roberts Radio. Dynatron was also a successful business with making record players; most of them were made in the sixties and seventies. Priced in the pro-sumer market sector, the average household would have had to save the equivalent of three weeks salary to buy one.
Early history
The Hacker brothers, Ron (born 1908) and Arthur (born 1910), shared a strong interest in radio, and started a company producing high quality radiograms and wireless receivers at the ages of just 19 and 17 respectively. As they were too young to become directors of a company, the firm was set up using their father's name, Harry Hacker, in 1927.
The firm began in a room above the family grocery shop on Maidenhead High Street, and the first product emerged in 1928 - the Dynatron U53 radiogram. A factory was built in the large rear garden of the family house "Little Gables" in Ray Lea Road in Maidenhead, measuring just 50 by 25 feet initially, but extended several times. In 1936, the company name was changed to Dynatron Radio Ltd.
The Hacker brothers always pursued the highest possible technical quality, and released designs incorporating many valves at a time when their competitors concentrated on reducing the number of valves in their products. For many years, they persisted with TRF principle, only adopting superhet designs after some 10 years of development.
World War II
During the Second World War, Dynatron contributed to the war effort on a not for profit basis, expanding the work force from around 70 employees to 160. The operation continued from the family home and expanded into a requisitioned factory, amounting to around 15,000 square feet of space. They produced airborne guidance systems such as Gee for the RAF, and after the war, Ron Hacker was awarded the M.B.E., though this was accepted with some reluctance as he felt that his brother also deserved the recognition.
Post war period
After the war, austerity measures and component shortages caused the company significant difficulties. The Dynatron range had always been aimed at the top of the market, but achieving this in post-war times was always going to be problematic. In 1954, an offer from Ekco was accepted, and control was handed over in 1955. At the time, there were 150 employees, and a new factory in St. Peter's Road had just been built. The Hacker brothers were retained as joint Managing Directors, and the company was successful; by 1959 there were 250 employees.
However, the brothers decided to leave the group in September 1959 to start Hacker Radio Ltd. Shortly afterwards in 1960, Ekco merged with Pye, and then Pye was bought by Philips in 1967. During this time, Dynatron was moved from Maidenhead to King's Lynn. In 1981, Philips sold Dynatron to Roberts Radio. During the 1980s, Roberts, a company already marketing portable radios at the premium end of the market sector, used the Dynatron brand for lower-end portable radios and clock-radios. This tactic was needed in order to prevent Dynatron and Roberts products from competing against each other in the same market sector, but unfortunately it also very much cheapened the image of the brand. Roberts manufactured the last Dynatron-branded radios in the late 1980s. Since then the brand has been in a state of permanent hiatus.
References
External links
Hacker Radio Yahoo Group - contains details of transistor radios made by Dynatron covering a period from 1958 to 1969.
The Dynatron Museum is a comprehensive website detailing the history of the company and showcasing many of their products.
Electronics companies of the United Kingdom
Defunct manufacturing companies of the United Kingdom
Companies based in Maidenhead
History of radio |
42505474 | https://en.wikipedia.org/wiki/Email%20retargeting | Email retargeting | Email retargeting can refer to either:
Retargeting an audience with display ads after they have read an email from the advertiser (Display-Ad Based)
Emailing a website visitor after their website visit (Email-Based)
Email retargeting is a commonly used form of Digital Marketing.
Display-ad based
Email from the advertiser is sent to recipients with a tracking pixel that tags the recipient's browser, in the same way they would be tagged if visiting a webpage.
Email retargeting is only effective if the email is opened in a web browser, where the tracking pixel will function. Any recipient who uses a dedicated mail client will not be tagged. Additionally, Gmail's decision to cache images means that this method of advertising does not work with gmail addresses.
Email-based
Email retargeting relies on sending personalized e-mail to an anonymous website visitor.
Visitor browses a website, views a product and leaves
Cookies from the website matches the user to an email address
Visitor receives a personalized offer via e-mail message concerning the product they viewed
This is possible thanks to using a DMP (Data Management Platform) or a noCRM email retargeting provider, where cookies collected on a website include the IP address of the visitor (the IP address can be read from the visitors web browser's header information). The IP address is then matched against the IP addresses previously collected with form submissions that include an e-mail address (whether those forms were completed on that website or on another).
This form of remarketing helps increasing conversion by reaching interested audience only.
See also
Behavioral retargeting
Email tracking
References
Behavioral retargeting
Online advertising |
4166591 | https://en.wikipedia.org/wiki/Dashboard%20%28business%29 | Dashboard (business) | A dashboard is a type of graphical user interface which often provides at-a-glance views of key performance indicators (KPIs) relevant to a particular objective or business process. In other usage, "dashboard" is another name for "progress report" or "report" and considered a form of data visualization.
The “dashboard” is often accessible by a web browser and is usually linked to regularly updating data sources.
Well known dashboards include Google Analytics dashboards, used on 55% of all websites, which show activity on a website; such as visits, entry pages, bounce rate and traffic sources.
The COVID-19 pandemic of 2020 brought other dashboards to the fore, with the Johns Hopkins coronavirus tracker and the UK government coronavirus tracker being good examples.
The term dashboard originates from the automobile dashboard where drivers monitor the major functions at a glance via the instrument panel.
Benefits
Digital dashboards allow managers to monitor the contribution of the various departments in their organization. In addition, they enable “rolling up” of information to present a consolidated view across an organization. To gauge exactly how well an organization is performing overall, digital dashboards allow you to capture and report specific data points from each department within the organization, thus providing a "snapshot" of performance.
Benefits of using digital dashboards include:
Visual presentation of performance measures
Ability to identify and correct negative trends
Measure efficiencies/inefficiencies
Ability to generate detailed reports showing new trends
Ability to make more informed decisions based on collected business intelligence
Align strategies and organizational goals
Saves time compared to running multiple reports
Gain total visibility of all systems instantly
Quick identification of data outliers and correlations
Consolidated reporting into one location
Available on mobile devices to quickly access metrics
Classification
Dashboards can be broken down according to role and are either strategic, analytical, operational, or informational. Dashboards are the 3rd step on the information ladder, demonstrating the conversion of data to increasingly valuable insights.
Strategic dashboards support managers at any level in an organization and provide the quick overview that decision-makers need to monitor the health and opportunities of the business. Dashboards of this type focus on high-level measures of performance and forecasts. Strategic dashboards benefit from static snapshots of data (daily, weekly, monthly, and quarterly) that are not constantly changing from one moment to the next.
Dashboards for analytical purposes often include more context, comparisons, and history, along with subtler performance evaluators. In addition, analytical dashboards typically support interactions with the data, such as drilling down into the underlying details. Dashboards for monitoring operations are often designed differently from those that support strategic decision making or data analysis and often require monitoring of activities and events that are constantly changing and might require attention and response at a moment's notice.
Types of dashboards
Digital dashboards may be laid out to track the flows inherent in the business processes that they monitor. Graphically, users may see the high-level processes and then drill down into low-level data. This level of detail is often buried deep within the corporate enterprise and otherwise unavailable to the senior executives.
Three main types of digital dashboards dominate the market today: desktop software applications, web-browser-based applications, and desktop applications are also known as desktop widgets. The last are driven by a widget engine.
Both Desktop and Browser-based providers enable the distribution of dashboards via a web browser.
Specialized dashboards may track all corporate functions. Examples include human resources, recruiting, sales, operations, security, information technology, project management, customer relationship management, digital marketing and many more departmental dashboards. For a smaller organization like a startup a compact startup scorecard dashboard tracks important activities across lot of domains ranging from social media to sales.
Digital dashboard projects involve business units as the driver and the information technology department as the enabler. Therefore, the success of dashboard projects depends on the relevancy/importance of information provided within the dashboard. This includes the metrics chosen to monitor and the timeliness of the data forming those metrics; data must be up to date and accurate.
Key performance indicators, balanced scorecards, and sales performance figures are some of the content appropriate on business dashboards.
Business dashboard examples
Manufacturing: a dashboard may show numbers related to productivity, such as the number of parts manufactured or some failed quality inspections per hour.
Human Resources: a dashboard may show numbers related to staff recruitment, retention, and composition, for example, the number of open positions or average days or cost per recruitment.
Sales – a dashboard can show the sales made by individuals/teams/products and how they are comparing against sales targets and sales from a prior period for comparison purposes
Customer relationship management – a dashboard can show the frequency of interactions with clients & prospects and highlight where contact may be overdue
Digital marketing – a dashboard can show the performance of a website and also the effectiveness of email campaigns, combining with finance data to give a more accurate view of the ROI
Dashboards and scorecards
Balanced Scorecards and Dashboards have been linked together as if they were interchangeable. However, although both visually display critical information, the difference is in the format: Scorecards can open the quality of an operation while dashboards provide calculated direction. A balanced scorecard has what they called a "prescriptive" format. It should always contain these components:
Perspectives – group
Objectives – verb-noun phrases pulled from a strategy plan
Measures – also called Metric or Key Performance Indicators (KPIs)
Spotlight Indicators – red, yellow, or green symbols that provide an at-a-glance view of a measure's performance.
Each of these sections ensures that a Balanced Scorecard is essentially connected to the businesses critical strategic needs.
The design of a dashboard is more loosely defined. Dashboards are usually a series of graphics, charts, gauges and other visual indicators that can be monitored and interpreted. Even when there is a strategic link, on a dashboard, it may not be noticed as such since objectives are not normally present on dashboards. However, dashboards can be customized to link their graphs and charts to strategic objectives.
Design
Digital dashboard technology is available "out-of-the-box" from many software providers. Some companies, however, continue to do in-house development and maintenance of dashboard applications. For example, GE Aviation has developed a proprietary software/portal called "Digital Cockpit" to monitor the trends in the aircraft spare parts business.
Good dashboard design practices take into account and address the following:
the medium it is designed for (desktop, laptop, mobile, tablet)
use of visuals over the tabular presentation of data
bar charts: to visualize one or more series of data
line charts: to track changes in several dependent data sets over a period of time
sparklines: to show the trend in a single data set
scorecards: to monitor KPIs and trends
use of legends anytime more than one color or shape is present on a graph
spatial arrangement: place your most important view on the top left (if the language is written left to right) then arrange the following views in a Z pattern with the most important information following the top-to-bottom, left-to-right pattern
use colorblind friendly palettes with color used consistently and only where necessary
A good information design will clearly communicate key information to users and makes supporting information easily accessible.
Assessing the quality of dashboards
There are a few key elements to a good dashboard:.
Simple, communicates easily
Minimum distractions...it could cause confusion
Supports organized business with meaning and useful data
Applies human visual perception to visual presentation of information
It can be accessed easily by its intended audience
A research-based framework for Business Intelligence dashboard design includes the following questions:
History
The idea of digital dashboards followed the study of decision support systems in the 1970s. Early predecessors of the modern business dashboard were first developed in the 1980s in the form of Executive Information Systems (EISs). Due to problems primarily with data refreshing and handling, it was soon realized that the approach wasn't practical as information was often incomplete, unreliable, and spread across too many disparate sources. Thus, EISs hibernated until the 1990s when the information age quickened pace and data warehousing, and online analytical processing (OLAP) allowed dashboards to function adequately. Despite the availability of enabling technologies, the dashboard use didn't become popular until later in that decade, with the rise of key performance indicators (KPIs), and the introduction of Robert S. Kaplan and David P. Norton's Balanced Scorecard. In the late 1990s, Microsoft promoted a concept known as the Digital Nervous System and "digital dashboards" were described as being one leg of that concept. Today, the use of dashboards forms an important part of Business Performance Management (BPM).
Dashboard (web administration)
A dashboard, in website administration, is typically the index page of the control panel for a website's content management system.
Examples include the popular blogging software WordPress, and in the project management website Basecamp.
A dashboard typically indicates items which require urgent actions at the top of the page, moving into less important statistics at the bottom. Dashboard is a design to show important data in more enhanced way.
See also
Business activity monitoring
Complex event processing
Corporate performance management
Data presentation architecture
Enterprise manufacturing intelligence
Event stream processing
Information graphics
Information design
Scientific visualization
Control panel (software)
References
Further reading
Business software
Business terms
Computing terminology
Content management systems
Data warehousing
Data management
Information systems
Website management |
21807593 | https://en.wikipedia.org/wiki/Mode%20setting | Mode setting | Mode setting is a software operation that activates a display mode (screen resolution, color depth, and refresh rate) for a computer's display controller by using VESA BIOS Extensions or UEFI Graphics extensions (on more modern computers).
The display mode is set by the kernel. In user-space mode-setting (UMS), the display mode is set by a user-space process.
Kernel mode-setting is more flexible and allows displaying of an error in the case of a fatal system error in the kernel, even when using a user-space display server.
User-space mode setting would require superuser privileges for direct hardware access, so kernel-based mode setting shuns such requirement for the user-space graphics server.
Implementation
Microsoft Windows
Microsoft Windows versions that are NT-based use kernel mode setting. The kernel error display made possible by kernel mode setting is officially called "bug check", but more commonly known as the Blue Screen of Death.
Linux
The Linux kernel got the prerequisite for kernel-based mode setting by accepting Intel GEM in version 2.6.28, released in December 2008. This will be replaced by Tungstens Graphics TTM (Translation Table Maps) memory manager which supports the GEM API. TTM was developed for the free and open-source drivers for Radeon and S3 Graphics graphic chipsets (see Free and open-source graphics device driver). Support for Intel GMA graphic chipsets was accepted in version 2.6.29, released on March 23, 2009. Support for pre-R600 ATI Radeon graphics cards was accepted in version 2.6.31, released on September 9, 2009. Support for R600 and R700 was in development within DRM and was merged in version 2.6.32. Support for Evergreen (R800) was merged in version 2.6.34. As Nvidia did not release all the needed documentation for its graphics chip, development proceeded under the nouveau project, which uses reverse engineering to build a working open-source driver for Nvidia cards. Nouveau was accepted in version 2.6.33 of the kernel, released on December 10, 2009. Kernel-based mode setting is not only supported by the nouveau driver, it is required. Wayland compositors (e.g. Weston) and kmscon depend on kernel mode setting via ioctl.
FreeBSD
FreeBSD has support for both kernel-based mode setting and GEM for later generations of Intel GPUs (IronLake, SandyBridge, and IvyBridge) starting with version 9.1.
NetBSD
NetBSD has support for kernel-based mode setting and accelerated graphics for Intel and Radeon devices. This implementation was introduced in version 7.0 by porting the Linux 3.15 DRM/KMS code.
OpenBSD
OpenBSD has kernel-based mode setting support for Intel and Radeon GPUs. Starting with version 5.4 of OpenBSD, support for Intel GPUs is available. With the release of version 5.5, the implementation has been extended to add support for Radeon chipsets as well.
Alternatives
The following alternatives have been presented during the Linux Plumbers Conference 2013:
It was suggested to split GEM and KMS.
Atomic Display Framework, by Google's Android-Team.
Common Display Framework.
See also
Screens of death
References
External links
Mode Setting on the X.org wiki
Intel Graphics Driver on the X.org wiki
ATI Radeon driver on the X.org wiki
Kernel Mode Setting on the Fedora project wiki
Device drivers
Graphics hardware
Operating system technology |
1952666 | https://en.wikipedia.org/wiki/Pinnacle%20Studio | Pinnacle Studio | Pinnacle Studio is a video editing program originally developed by Pinnacle Systems as a consumer level software. Upon Pinnacle System's acquisition of Munich-based FAST Multimedia, Pinnacle integrated the professional code base of FAST's editing software, (since re-branded as Pinnacle Liquid) beginning with Pinnacle Studio version 10. It was acquired by Avid and later by Corel in July 2012. Pinnacle Studio allows users to author video content in Video CD, DVD-Video, AVCHD or Blu-ray format, add complementary menus and burn them to disc.
In the second half of 2007, Pinnacle introduced VideoSpin, a shareware version of Studio with fewer features; it was discontinued in March 2009.
Versions
Since version 9, Studio has been sold in several editions: Studio, Studio Plus and Studio Ultimate, all of which are commercial software. There is some additional functionality in the Plus and Ultimate editions, notably a second video track. This allowed Overlay, A-B Edits, Chroma Key, and Picture-in-Picture.
Pinnacle Studio 24 was released in August 11, 2020. This version included Unlimited tracks plus 4K video support, Multi-camera Editing, Enhanced Motion Tracking, Enhanced Video masking, and many advanced technical features. No support for HEVC (H.265) on AMD hardware.
iOS
In addition to the desktop versions of Pinnacle Studio,two versions of Pinnacle Studio also exists for iPad and iPhone - Pinnacle Studio for iOS and Pinnacle Studio Pro for iOS. Last one has additional features, for example, trim frame by frame using the Dual Viewer Precision Trimmer, export to cloud services (such as Dropbox, Google Drive and OneDrive).
Last version of Pinnacle Studio for iOS (5.6.1) requires iOS 9.3 or later, iPad 2 or higher, iPhone 4s or higher, iPod Touch Series 5 or higher.
Reception
MacUser rated version Pinnacle Studio 4 for iOS as 4 out of 5, saying that it provides "a more fully featured movie editor than iMovie for iPad", but complained that the extra in-app purchase needed for cloud sync was excessive.
See also
Comparison of video editing software
References
External links
Pinnacle Systems
Video editing software
Video editing software for Windows
Cross-platform software
Corel software |
58027283 | https://en.wikipedia.org/wiki/Column%20level%20encryption | Column level encryption | Column level encryption is a type of database encryption method that allows user to select specific information or attributes to be encrypted instead of encrypting the entire database file. To understand why column level encryption is different from other encryption methods like file level encryption, disk encryption, and database encryption, a basic understanding of encryption is required.
Generally, when data are being collected and stored as records, those records will appear in a tabular format in rows in the database with each rows logging specific attributes. Some data can be more sensitive than others, for example, data of birth, social security number, home address, etc., which can act as a personal identification. In order to ensure that these private information is transferred and stored securely, data goes through encryption, which is the process of encoding plaintext into ciphertext. Non-designated readers or receivers will not be able to read the data without the decryption key. Another example to illustrate this concept is, given a database stores client's phone numbers. The set of phone numbers will appear to most readers as gibberish alphanumerical text with a mix of symbols, totally useless to those who do not have access privilege to view the data in plaintext (original form).
Because not all stored data are always sensitive and important, column level encryption was created to allow users the flexibility in choosing what sort of attributes should or should not be encrypted. This is to minimize performance disruption when executing crypto algorithms by moving data in and out of devices.
Application and advantages
The technology has been adopted by many encryption software companies around the world, including IBM, MyDiamo (Penta Security), Oracle and more. Column level encryption does not store the same encryption key like table encryption does but rather separate keys for each column. This method minimizes the probability of unauthorized access.
Advantages of column-level encryption
Advantages of column-level encryption:
Flexibility in data to encrypt. The application can be written to control when, where, by whom, and how data is viewed
Transparent encryption is possible
More secure as each column can have its own unique encryption key within the database
Encryption is possible when data is active and not just “at rest”
Retrieval speed is maintained because there's less encrypted data
References
Cryptographic software |
34417419 | https://en.wikipedia.org/wiki/Google%20Authenticator | Google Authenticator | Google Authenticator is a software-based authenticator by Google that implements two-step verification services using the Time-based One-time Password Algorithm (TOTP; specified in RFC 6238) and HMAC-based One-time Password algorithm (HOTP; specified in RFC 4226), for authenticating users of software applications.
When logging into a site supporting Authenticator (including Google services) or using Authenticator-supporting third-party applications such as password managers or file hosting services, Authenticator generates a six- to eight-digit one-time password which users must enter in addition to their usual login details.
Google provides Android, BlackBerry, and iOS versions of Authenticator.
An official open-source fork of the Android app is available on GitHub. However, this fork has not been updated since 2020. Likewise, for old versions of the Google Authenticator apps for iOS and BlackBerry, the source code is also freely available. Yet this source code, too, has not been updated in years.
Current releases of the software are proprietary freeware.
Typical use case
To use Authenticator, the app is first installed on a smartphone. It must be set up for each site with which it is to be used: the site provides a shared secret key to the user over a secure channel, to be stored in the Authenticator app. This secret key will be used for all future logins to the site.
To log into a site or service that uses two-factor authentication and supports Authenticator, the user provides a username and password to the site. The site then computes (but does not display) the required six-digit one-time password and asks the user to enter it. The user runs the Authenticator app, which independently computes and displays the same password, which the user types in, authenticating their identity.
With this kind of two-factor authentication, mere knowledge of username and password is insufficient to break into a user's account - the attacker also needs knowledge of the shared secret key, or physical access to the device running the Authenticator app. An alternative route of attack is a man-in-the-middle attack: if the computer used for the login process is compromised by a trojan, then username, password, and the one-time password can be captured by the trojan, which then can initiate its own login session to the site, or monitor and modify the communication between the user and the site.
Technical description
During setup, the service provider generates an 80-bit secret key for each user (whereas RFC 4226 §4 requires 128 bits and recommends 160 bits). This is transferred to the Authenticator app as a 16, 26 or 32 character base32 string, or as a QR code.
Subsequently, when the user opens the Authenticator app, it calculates an HMAC-SHA1 hash value using this secret key. The message can be:
the number of 30-second periods since the Unix epoch (TOTP); or
a counter that is incremented with each new code (HOTP).
A portion of the HMAC is extracted and displayed to the user as a six digit code.
Source code license
The Google Authenticator app for Android was originally open source, but later became proprietary. Google made earlier source for their Authenticator app available on its GitHub repository; the associated development page stated:
"This open source project allows you to download the code that powered version 2.21 of the application. Subsequent versions contain Google-specific workflows that are not part of the project."
The latest open-source release was in 2020.
Following Google Authenticator ceasing to be open source, a free-software clone was created, predominantly a fresh rewrite but including some code from the original. The currently-maintained fork of this clone is called FreeOTP+.
See also
Multi-factor authentication
HMAC-based one-time password
FreeOTP
LinOTP
References
External links
Google Authenticator on Google Help
Google Authenticator (Android) and Google Authenticator (other) legacy source code on GitHub
Google Authenticator PAM module source code on GitHub
Google Authenticator implementation in Python on Stack Overflow
Authenticator on F-Droid
Django-MFA Implementation Using Google Authenticator - Django-mfa is a simple package to add extra layer of security to your django web application. It gives web app a randomly changing password as an extra protection.
Source code of version 1.02 on GitHub
Articles with example pseudocode
Computer access control
Authenticator
Computer-related introductions in 2010 |
8028323 | https://en.wikipedia.org/wiki/Cryptlib | Cryptlib | cryptlib is an open-source cross-platform software security toolkit library. It is distributed under the Sleepycat License, a free software license compatible with the GNU General Public License. Alternatively, cryptlib is available under a proprietary license for those preferring to use it under proprietary terms.
Features
cryptlib is a security toolkit library that allows programmers to incorporate encryption and authentication services to software. It provides a high-level interface so strong security capabilities can be added to an application without needing to know many of the low-level details of encryption or authentication algorithms. It comes with an over 400 page programming manual.
At the highest level, cryptlib provides implementations of complete security services such as S/MIME and PGP/OpenPGP secure enveloping, SSL/TLS and SSH secure sessions, CA services such as CMP, SCEP, RTCS, and OCSP, and other security operations such as secure timestamping. Since cryptlib uses industry-standard X.509, S/MIME, PGP/OpenPGP, and SSH/SSL/TLS data formats, the resulting encrypted or signed data can be easily transported to other systems and processed there, and cryptlib itself runs on many operating systems—all Windows versions and most Unix/Linux systems. This allows email, files, and EDI transactions to be authenticated with digital signatures and encrypted in an industry-standard format.
cryptlib provides other capabilities including full X.509/PKIX certificate handling (all X.509 versions from X.509v1 to X.509v4) with support for SET, Microsoft AuthentiCode, Identrus, SigG, S/MIME, SSL, and Qualified certificates, PKCS #7 certificate chains, handling of certification requests and CRLs (certificate revocation lists) including automated checking of certificates against CRLs and online checking using RTCS and OCSP, and issuing and revoking certificates using CMP and SCEP. It also implements a full range of certification authority (CA) functions provides complete CMP, SCEP, RTCS, and OCSP server implementations to handle online certificate enrolment/issue/revocation and certificate status checking. Alongside the certificate handling, it provides a sophisticated key storage interface that allows the use of a wide range of key database types ranging from PKCS #11 devices, PKCS #15 key files, and PGP/OpenPGP key rings through to commercial-grade RDBMS' and LDAP directories with optional SSL protection.
cryptlib can make use of the crypto capabilities of a variety of external crypto devices such as hardware crypto accelerators, Fortezza cards, PKCS #11 devices, hardware security modules (HSMs), and crypto smart cards. It can be used with a variety of crypto devices that have received FIPS 140 or ITSEC/Common Criteria certification. The crypto device interface also provides a general-purpose plug-in capability for adding new functionality that can be used by cryptlib.
cryptlib is written in C and supports BeOS, DOS, IBM MVS, Mac OS X, OS/2, Tandem, a variety of Unix versions (including AIX, Digital Unix, DGUX, FreeBSD/NetBSD/OpenBSD, HP-UX, IRIX, Linux, MP-RAS, OSF/1, QNX, SCO/UnixWare, Solaris, SunOS, Ultrix, and UTS4), VM/CMS, Windows 3.x, Windows 95/98/ME, Windows CE/PocketPC/SmartPhone and Windows NT/2000/XP/Vista. It is designed to be portable to other embedded system environments. It is available as a standard Windows DLL. Language bindings are available for C / C++, C# / .NET, Delphi, Java, Python, and Visual Basic (VB).
Algorithm support
Release History
cryptlib 3.4.5 was released on .
cryptlib 3.4.4.1 was released on .
cryptlib 3.4.4 was released on .
cryptlib 3.4.3 was released on .
cryptlib 3.4.2 was released on .
cryptlib 3.4.1 was released on .
cryptlib 3.4.0 was released on .
cryptlib 3.3.2 was released on .
cryptlib 3.3.1 was released on .
cryptlib 3.3 was released on .
cryptlib 3.2.3a was released on .
cryptlib 3.2.3 was released on .
cryptlib 3.2.2 was released on .
cryptlib 3.2.1 was released on .
cryptlib 3.2 was released on .
cryptlib 3.1 was released on .
See also
OpenSSL
GnuTLS
Network Security Services
Libgcrypt
MatrixSSL
mbed TLS (previously PolarSSL)
wolfSSL (previously CyaSSL)
Comparison of TLS implementations
Comparison of cryptography libraries
References
External links
Cryptlib - Encryption Security Software Development Toolkit by Digital Data Security Limited
Cryptographic software
C (programming language) libraries
Free security software
Cross-platform software
OpenPGP
Transport Layer Security implementation
1995 software |
51154324 | https://en.wikipedia.org/wiki/Guccifer%202.0 | Guccifer 2.0 | "Guccifer 2.0" is a persona which claimed to be the hacker(s) who gained unauthorized access to the Democratic National Committee (DNC) computer network and then leaked its documents to the media, the website WikiLeaks, and a conference event. Some of the documents "Guccifer 2.0" released to the media appear to be forgeries cobbled together from public information and previous hacks, which had been mixed with disinformation. According to indictments in February 2018, the persona is operated by Russian military intelligence agency GRU. On July 13, 2018, Special Counsel Robert Mueller indicted 12 GRU agents for allegedly perpetrating the cyberattacks.
The U.S. Intelligence Community concluded that some of the genuine leaks from "Guccifer 2.0" were part of a series of cyberattacks on the DNC committed by two Russian military intelligence groups, and that "Guccifer 2.0" is actually a persona created by Russian intelligence services to cover for their interference in the 2016 U.S. presidential election. This conclusion is based on analyses conducted by multiple private sector cybersecurity individuals and firms, including CrowdStrike, Fidelis Cybersecurity, FireEye's Mandiant, SecureWorks, ThreatConnect, Trend Micro, and the security editor for Ars Technica. The Russian government denies involvement in the theft, and "Guccifer 2.0" denied links to Russia. WikiLeaks founder Julian Assange said multiple parties had access to DNC emails and that there was "no proof" Russia was behind the attack. In March 2018, Special Counsel Robert Mueller took over investigation of Guccifer 2.0 from the FBI while it was reported that forensic determination had found the Guccifer 2.0 persona to be a "particular military intelligence directorate (GRU) officer working out of the agency's headquarters on Grizodubovoy Street in Moscow".
Identity
On June 21, 2016, in an interview with Vice, "Guccifer 2.0" said he is Romanian, which is the nationality of Marcel Lazar Lehel, the Romanian hacker who originally used the "Guccifer" pseudonym. On June 30, 2016, and January 12, 2017, "Guccifer 2.0" stated that he is not Russian. However, despite stating that he was unable to read or understand Russian, metadata of emails sent from Guccifer 2.0 to The Hill showed that a predominantly-Russian-language VPN was used. When pressed to use the Romanian language in an interview with Motherboard via online chat, "he used such clunky grammar and terminology that experts believed he was using an online translator." Linguistic analysis by Shlomo Engelson Argamon showed that Guccifer 2.0 is most likely "a Russian pretending to be a Romanian".
Some cybersecurity experts have concluded that "Guccifer 2.0" is likely a creation of the Russian state-sponsored hacking groups thought to have executed the attack, invented to cover up Russian responsibility. The cybersecurity firm CrowdStrike, which was hired by the DNC to analyze the data breach, "posits that Guccifer 2.0 could be 'part of a Russian Intelligence disinformation campaign'", i.e. a creation to deflect blame for the theft. Russia has made use of the invention of "a lone hacker or an hacktivist to deflect blame" in the past, deploying this strategy in previous cyberattacks on the German government and the French network TV5Monde. Thomas Rid of King's College London, a cybersecurity expert, says it is "'more likely than not' that the whole operation, including the Guccifer 2.0 part, was orchestrated by Russian spies." The hackers responsible for the DNC email leak (a group called Fancy Bear by CrowdStrike) seem to have not been working on the DNC's servers on April 15 which in Russia is a holiday in honor of the Russian military's electronic warfare services.
On July 18, 2016, Russian government spokesman Dmitry Peskov denied Russian government involvement in the DNC theft. On July 25, 2016, during an interview with Democracy Now!, Julian Assange, editor in chief of WikiLeaks, said no one knows WikiLeaks' sources. He adds that "the dates of the emails that [WikiLeaks] published are significantly after all—or all but one, it is not clear—of the hacking allegations that the DNC says have occurred." The same day, Assange told NBC News that "it's what's in the emails that's important, not who hacked them." When asked by NBC News if WikiLeaks might have been used to distribute documents stolen as part of a Russian intelligence operation, Assange replied: "There is no proof of that whatsoever. We have not disclosed our source." Assange said this was "a diversion that's being pushed by the Hillary Clinton campaign." Assange in 2012 hosted a program on RT, a Russian state-run news channel. U.S. intelligence analyst Malcolm Wrightson Nance said Assange has long disliked Clinton.
In an October 2016 joint statement, the United States Department of Homeland Security and the Office of the Director of National Intelligence stated:
In March 2018, The Daily Beast, citing U.S. government sources, reported that Guccifer 2.0 is in fact a Russian GRU officer, explaining that Guccifer once forgot to use a VPN, leaving IP logs on "an American social media company" server. The IP address was used by U.S. investigators to identify Guccifer 2.0 as "a particular GRU officer working out of the agency's headquarters on in Moscow."
In April 2018, BuzzFeed reported that messages showed WikiLeaks' interest in Guccifer 2.0's emails and files.
On July 13, 2018, the United States Department of Justice (DOJ) indicted 12 Russian Intelligence Officers and revealed that Guccifer 2.0 was a persona used by GRU.
Twitter suspended the persona's account on July 14, 2018, for "being connected to a network of accounts previously suspended for operating in violation of our rules." The account had been dormant for at least a year and a half.
Computer hacking claims
On June 14, 2016, according to The Washington Post, the DNC acknowledged a hack which was claimed by Guccifer 2.0.
On July 18, 2016, Guccifer 2.0 provided exclusively to The Hill numerous documents and files covering political strategies, including correlating the banks that received bailout funds with Republican Party and Democratic Party donations.
On July 22, 2016, Guccifer 2.0 stated he hacked, then leaked, the DNC emails to WikiLeaks. "Wikileaks published #DNCHack docs I'd given them!!!", tweeted Guccifer 2.0.
On September 13, 2016, during a conference, an unknown and remote representative of Guccifer 2.0 released almost 700 megabytes (MB) worth of documents from the DNC. Forbes also obtained a copy of those. Still according to Forbes, on September 12, 2016, ahead of that conference, Guccifer posted a public Twitter message in which he confirmed that his representative was legitimate. The Russian government denied any involvement. The DNC, the DCCC, U.S. intelligence officials, and other experts speculated about Russia involvement. NGP VAN, who state they are the "leading technology provider" for the Democratic campaigns, declined to comment on Guccifer 2.0's recent statements.
On October 4, 2016, Guccifer 2.0 released documents and claimed that they were taken from the Clinton Foundation and showed "corruption and malfeasance" there. Security experts quickly determined that the release was a hoax; the release did not contain Clinton Foundation documents, but rather consisted of documents previously released from the DNC and DCCC thefts, data aggregated from public records, and documents that were fabricated altogether as propaganda. Singled out as particularly absurd was the idea that Clinton's team would have actually named a file "Pay for Play" on their own server, as Guccifer 2.0's screenshots of the alleged "hack" show. Former Trump confidant Roger Stone was in contact with Guccifer 2.0 during the campaign.
Post-election activities
The Guccifer 2.0 persona went dark just before the U.S. presidential election, and resurfaced on January 12, 2017, following the public release of the Steele dossier that asserted the Trump campaign was cooperating with the Russians in their interference in the 2016 presidential election. The dossier also asserted that "Romanian hackers" had performed the hacks.
The Guccifer 2.0 persona made a blog post denying that they had any relation to the Russian government, and calling the technical evidence suggesting links to the Russian government "a crude fake." In the blog post, Guccifer 2.0 indicated they had gained access to the DNC servers through a vulnerability in their NGP VAN software.
Timeline of Guccifer 2.0
2016
June: Around this time, the conspirators charged in the July 2018 indictment stage and release tens of thousands of stolen emails and documents using fictitious online personas, including "DCLeaks" and "Guccifer 2.0".
June 15: "Guccifer 2.0" (GRU) claims credit for the DNC hacking and posts some of the stolen material to a website. CrowdStrike stands by its "findings identifying two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016." Gawker publishes an opposition research document on Trump that was stolen from the DNC. "Guccifer 2.0" sent the file to Gawker.
June 22: WikiLeaks reaches out to "Guccifer 2.0" via Twitter. They ask "Guccifer 2.0" to send them material because it will have a bigger impact if they publish it. They also specifically ask for material on Clinton they can publish before the convention.
July 6: "Guccifer 2.0" releases another cache of DNC documents and sends copies to The Hill.
July 13: "Guccifer 2.0" releases over 10,000 names from the DNC in two spreadsheets and a list of objectionable quotes from Sarah Palin.
July 14: Four days after the murder of Seth Rich, "Guccifer 2.0" sends Assange an encrypted one-gigabyte file containing stolen DNC emails, and Assange confirms that he received it. WikiLeaks publishes the file's contents on July 22. The Mueller report asserts that Assange was "working to shift blame onto [Seth Rich] to obscure the source of the materials he was releasing". The Senate Intelligence Committee reported that "WikiLeaks actively sought, and played, a key role in the Russian intelligence campaign and very likely knew it was assisting a Russian intelligence influence effort."
July 18: "Guccifer 2.0" dumps a new batch of documents from the DNC servers, including personal information of 20,000 Republican donors and opposition research on Trump.
August 5: Stone writes an article for Breitbart News in which he insists "Guccifer 2.0" hacked the DNC, using statements by "Guccifer 2.0" on Twitter and to The Hill as evidence for his claim. He tries to spin the DNC's Russia claim as a coverup for their supposed embarrassment over being penetrated by a single hacker. The article leads to "Guccifer 2.0" reaching out to and conversing with Stone via Twitter.
August 12:
"Guccifer 2.0" releases a cache of documents stolen from the Democratic Congressional Campaign Committee.
Journalist Emma Best has two simultaneous conversations by Twitter direct message with "Guccifer 2.0" and WikiLeaks. Best tries to negotiate the hosting of stolen DNC emails and documents on archive.org. WikiLeaks wants Best to act as an intermediary to funnel the material from "Guccifer 2.0" to them. The conversation ends with "Guccifer 2.0" saying he will send the material directly to WikiLeaks.
August 13:
Twitter and WordPress temporarily suspend Guccifer 2.0's accounts. Stone calls "Guccifer 2.0" a hero.
August 15:
A candidate for Congress allegedly contacts Guccifer 2.0 to request information on the candidate's opponent. Guccifer 2.0 responds with the requested stolen information.
Guccifer 2.0 begins posting information about Florida and Pennsylvania races stolen from the DCCC.
The GRU stops its five-attempts-per-second attack on the Illinois State Board of Elections servers.
August 16: Stone sends "Guccifer 2.0" an article he wrote for The Hill on manipulating the vote count in voting machines. "Guccifer 2.0" responds the next day, "@RogerJStoneJr paying u back".
August 22:
"Guccifer 2.0" allegedly sends DCCC material on Black Lives Matter to a reporter, and they discuss how to use it in a story. "Guccifer 2.0" also gives the reporter the password for accessing emails stolen from Clinton's staff that were posted to "Guccifer 2.0's" website but had not yet been made public. On August 31, The Washington Examiner publishes a story based on the material the same day the material is released publicly on Guccifer 2.0's website.
Florida GOP campaign advisor Aaron Nevins contacts Guccifer 2.0 and asks for material. Nevins sets up a Dropbox account and "Guccifer 2.0" transfers 2.5 gigabytes of data into it. Nevins analyzes the data, posts the results on his blog, HelloFLA.com, and sends "Guccifer 2.0" a link. "Guccifer 2.0" forwards the link to Stone.
August 23: The Smoking Gun reaches out to "Guccifer 2.0" for comment on its contacts with Stone. "Guccifer 2.0" accuses The Smoking Gun of working with the FBI.
August 31: "Guccifer 2.0" leaks campaign documents stolen from House Minority Leader Nancy Pelosi's hacked personal computer.
September 3–5: Wealthy Republican donor Peter W. Smith gathers a team to try to acquire the 30,000 deleted Clinton emails from hackers. He believes Clinton's private email server was hacked and copies of the emails were stolen. Among the people recruited are former GCHQ information-security specialist Matt Tait, alt-right activist Charles C. Johnson, former Business Insider CTO and alt-right activist Pax Dickinson, "dark web expert" Royal O'Brien, and Jonathan Safron. Tait quickly abandons the team after learning the true purpose of the endeavor. Hackers contacted in the search include "Guccifer 2.0" and Andrew Auernheimer (a.k.a. "weev"). The team finds five groups of hackers claiming to have the emails. Two of the groups are Russian. Flynn is in email contact with the team. Smith commits suicide on May 14, 2017, about ten days after telling the story to The Wall Street Journal but before the story is published in June.
September 15: "Guccifer 2.0" sends a Twitter direct message to DCLeaks informing them that WikiLeaks is trying to contact them to set up communications using encrypted emails.
October 5: Trump Jr. retweets a WikiLeaks tweet announcing an "860Mb [sic]" archive of various Clinton campaign documents from "Guccifer 2.0".
October 7: At 12:40 pm. EDT, The DHS and the ODNI issue a joint statement accusing the Russian government of breaking into the computer systems of several political organizations and releasing the obtained material via DCLeaks, WikiLeaks, and "Guccifer 2.0", with the intent "to interfere with the U.S. election process."
2017
January 12: "Guccifer 2.0" denies having any relation to the Russian government.
March 10: Roger Stone admits to communicating with Guccifer 2.0.
March 13: Senate Intelligence Committee Chairman Richard Burr says Roger Stone's communications with Guccifer 2.0 are part of the Committee's ongoing investigation.
2018
March 22: The Daily Beast reports that Guccifer 2.0, the "lone hacker" who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia's military intelligence directorate (GRU) and that Mueller has taken over the investigation into his criminal activities and his direct contact with Stone.
June 18: Lawyers for Andrew Miller, a former associate of Roger Stone, challenge in court a subpoena he received for information about Stone, WikiLeaks, "Guccifer 2.0", "DCLeaks", and Julian Assange. Miller's lawyer Alicia Dearn asserts at the hearing that Miller had asked for immunity regarding political action committee transactions involving himself and Stone.
See also
DC Leaks
Guccifer
Hillary Clinton controversies
Mueller Report
Podesta emails
Russian interference in the 2016 United States elections
References
External links
Guccifer 2.0 website
WikiLeaks searchable DNC email database
Hacking in the 2010s
Unidentified people
Unidentified criminals
People associated with Russian interference in the 2016 United States elections
Hackers
Russians associated with interference in the 2016 United States elections |
6680361 | https://en.wikipedia.org/wiki/Project%20Starfighter | Project Starfighter | Project: Starfighter is a 2D shoot 'em up written by Parallel Realities (Stephen J Sweeney). It is a mission and objective based game also featuring an intricate plot. The game was later released by Sweeney as Freeware and the engine's source code was opened to the public. The game is now maintained and updated by the game's community as Free and open-source software.
Gameplay
The game is non linear allowing the player to choose the order of the missions they will undertake in the system. The player's craft can also be upgraded with a choice of secondary weapons and ability to powerup the main plasma cannons.
It also features computer controlled wingmates who assist players in battle. If the wingmate's craft is destroyed the wingmate will eject and be available in the next mission. Some missions however stipulate that the wingmate must not be allowed to be killed.
Plot
In the future, a weapons corporation known as WEAPCO has dominated the known galaxy with their AI driven starfighters. Under the rule of WEAPCO people begin to suffer and perish. A young rebel pilot called Chris Bainfield makes it his duty to free his home star system, known as Spirit, of WEAPCO's control. He hires a mercenary known as Krass Tyler to steal a Firefly starfighter for him. Along with his close friend, Sid Wilson, Chris begins his mission to fight in to Sol and take down the WEAPCO empire. After preventing a WEAPCO frigate from causing Spirit to supernova he begins the liberation of a number of slaves, including Phoebe Lexx who joins him in his quest. Shortly thereafter the pair are lured into a trap set by Kline Kethlan, the commander of WEAPCO's forces. Bainfield dog fights Kethlan who escapes just before Bainfield can destroy his starfighter.
Resuming their journey towards Sol, the three allies rescue Phoebe's twin sister, Ursula, before they are attacked by Krass Tyler. The mercenary informs them that it is nothing personal and that he has been paid off by WEAPCO to eliminate the team. Eventually the group arrive at Earth where they battle for control of the planet.
With WEAPCO overthrown Bainfield chases Kethlan to Venus where he begs the commander to surrender, so that he does not have to kill him. Kethlan refuses and informs Bainfield that he would prefer to die a warrior's death. The two dog fight for one last time, with Bainfield emerging as the victor.
Development history
Project: Starfighter was originally developed for the Amiga, and the source code was available as freeware (allowing only non-commercial usage) in the early 2000s. On 7 March 2002 the game was released for Linux too, and the source code was released under non-commercial terms. On 18 April 2004 the game become available for Debian and the GPL license was linked for the complete Parallel Realities website.
Project: Starfighter has been ported later to many platforms, including Linux, FreeBSD, Mac OS X, Microsoft Windows, Sony PSP, Amiga OS4, QNX and Xbox.
A continuation of Project Starfighter exists, where the original Freeware game assets were replaced by various Open content artwork (mostly CC BY and CC BY-SA licensed) in 2012 and 2015. The project moved in 2015 from SourceForge to GNU Savannah, and then moved to GitHub with the release of version 2.0 in 2019.
The project continues to be updated under the GNU GPL version 3 or later.
Novelization
In June 2014, Sweeney published a novelization of the story of Project: Starfighter, making it the first time a commercial novel has been based on a GPL video game. The story retains much of the plot of the original game, while also expanding on a number of aspects of the universe. Key characters from the game - Chris Bainfield, Sid Wilson, Kline Kethlan, Krass Tyler, and Phoebe and Ursula Lexx - are all given prominent roles, while WEAPCO is presented as the "Wade Ellen Asset Protection Corporation" (by way of a backronym). The most substantial change was that the starfighter itself that Chris flew during the game is now sentient in the book. The fighter goes by the name of Athena. Athena plays a large role in the story, and helps Chris in his fight back against WEAPCO. While piloting the Firefly, Athena is able to merge her mind with Chris', allowing him to increase his perception of the world and react much faster than an ordinary human pilot. The speed at which he learns to master flight and combat in the Firefly also increases significantly, with Chris becoming a legendary pilot in a matter of only a few days.
See also
Blob Wars: Metal Blob Solid
Blob Wars: Blob And Conquer
The Honour of the Knights
References
Further reading
Magnus "MdaG" Olsson, Project Starfighter review, reloaded.org
JuegaLinEx: más de 140 juegos compatibles con GNU-Linux, Chapter 31, Page 90
Linux Format, March 2003, Hot Pick
External links
Project: Starfighter homepage on GitHub
Project: Starfighter on SourceForge
Parallel Realities Homepage
Linux games
2001 video games
AmigaOS 4 games
MacOS games
MorphOS games
Shoot 'em ups
Open-source video games
PlayStation Portable games
Novels based on video games
Libre art
Creative Commons-licensed video games
Video games developed in the United Kingdom
Windows games
Xbox games |
13227713 | https://en.wikipedia.org/wiki/Northgate%20Computer%20Systems | Northgate Computer Systems |
Northgate Computer Systems, Inc., based in Eden Prairie, Minnesota, United States, was a mail-order personal computer company, founded in 1987 by Arthur "Art" Lazere.
The 1990s were a golden era for mail-order PC business. Consumers were fed up with high prices for IBM, Compaq and other brand-name PCs sold through dealers so they opted to purchase their computers from a catalog. This was a revolutionary idea at the time, because people wouldn't be able to see or touch their computer before buying it. Aside from Dell and Gateway, popular brands of mail-order PCs were Northgate and Zeos.
The company was known for its quality systems and keyboards; in particular, its line of OmniKey keyboards was highly praised. The keyboards were particularly valued for their tactile response and durability, and along with IBM's Model M PC keyboards, were considered some of the best in the industry. As such, the company's keyboards were often purchased by users of other manufacturers' PCs.
History
1987 - founded by Arthur Lazere
1989 - 386 Systems available.
1990 - Announced 486 systems using IBM's Micro Channel architecture and merger talks with CPT.
1992 - Discussed a merger with Everex Systems but these talks ended and a 51% stake was bought by investor group Marjac Investments.
August 1994 - A chapter 7 petition was filed against the company by creditors.
September 1994 - The company filed for a conversion to a chapter 11 reorganization plan. Mylex was owed $4.6 million, $113,000 was expected to be paid from liquidation from Northgate's inventories. The landlord of their Eden Prairie building also canceled their lease and they were planning to move to Minneapolis.
December 22, 1995 - Announced a reorganization plan with its creditors which paid 19 cents on the dollar to cover $16 million in unsecured debts. The funding would be from a percentage of computer sales up to a maximum of $3.75 million.
1997 - Northgate was purchased by Lan Plus.
October 2000 - Lan Plus begins merger with Mcglen Internet Group.
April 16, 2001 - Mcglen and Lan Plus announces that the merged company will be operating under the Northgate name.
September 10, 2001 - Lan Plus and Mcglen expect to complete the merger by October under the name Northgate Innovations with Andy Teng as chairman and CEO. However the completion of the merger wasn't announced until March.
September 20, 2002 - Announced a "Volunteer Training Program" with local technical schools to provide real-world computer manufacturing experience. Their principal executive offices are now in the city of Industry, California.
2003 - Announced a trial with 7-Eleven to sell Northgate Computer branded PCs through their stores.
2004 - Name changed to Digital Lifestyles Group to focus on the "teen computing and digital lifestyle" market with a new "hip-e" brand.
2005 - On April 25 an announcement on their web site stated "Northgate Computers will close its operations to all customers. Northgate will no longer supply any type of warranty services inclusive of technical phone support."
After Northgate went out of business, Creative Vision Technologies picked up the line of keyboards, marketing them under the Avant brand. However, CVT was acquired by Ideal System Solutions in 2011 and the product is no longer listed.
References
American companies established in 1987
American companies disestablished in 2005
Computer companies established in 1987
Computer companies disestablished in 2005
Defunct computer companies of the United States
Defunct computer hardware companies |
4503049 | https://en.wikipedia.org/wiki/Remote%20Installation%20Services | Remote Installation Services | RIS, Remote Installation Services is a Microsoft-supplied server that allows PXE BIOS-enabled computers to remotely execute boot environment variables.
These variables are likely computers that are on a company's (or that company's client's) network. RIS is used to create installation images of operating systems or computer configurations, which can be used to demonstrate the installation process to users whose machines have been granted access to the RIS server. This eliminates the need to use a CD-ROM for installing an operating system.
Background
At boot time, a workstation that has been set to boot from PXE will issue a BOOTP request via the network. Once the request is received, the DHCP Server will supply an IP address to the machine, and the DNS server will point the client computer to the RIS server, which in turn will issue a disc boot image (often called the "OS Chooser"). Once the OS Chooser environment has been booted, the user must authenticate against the Domain Controller, and can then select a Windows image to install. The source files for each image can be customized with 3rd party utilities such as nLite to slipstream updates and service packs, apply tweaks, perform unattended installations, and include software with the operating system.
History
Remote Installation Services was introduced with Windows 2000 as an optional component when installed on Windows 2000 Server. Initially, it supported only the distribution of Windows 2000 Professional, but with Service Pack 3 allowed for the remote installation of Windows 2000 Server. RIS was updated twice; once to support Windows XP, and again to support Windows Server 2003. With the release of Service Pack 2 for Windows Server 2003, RIS was replaced with Windows Deployment Services.
Overview
On Windows 2003, two services are required to provide Remote Installation Services: DHCP and Remote Installation Service. The Remote Installation Server doubles as a proxy DHCP server to provide Boot Server and File name instructions to clients. Remote Installation Service utilizes UDP port 4011 to provide clients the contents of each page the OS Chooser displays. Additionally, this service can provide drivers to clients; it is often used to provide the workstation's network card driver, which is required to launch the OS Chooser and mount the share where images are stored.
Installation Using RIS
RIS can be used only for clean installations and cannot be used to upgrade a previous version of Windows. A RIPrep image can contain the operating system and applications. Computers that are connected to the same network as the server, and have been enabled, automatically start the RIS sequence.
This process can be automated through what is called Remote Replication. Remote replication allows installations to be sent to a designated network share at a remote office, which can then be run by any system at that location. This allows servers to run the install automatically, eliminating the need for dedicated hardware or personnel at each facility. The primary benefit of remote replication is reduced cost and complexity of managing multi-site organizations.
See also
Windows Deployment Services
Disk Image
List of Microsoft Windows components
References
External links
Windows 2000 RIS Step-by-Step Gmango
RIS and Windows 98 Using Windows 2000 Remote Installation Service to Deploy Windows 98
BINL protocol explained
Windows components |
3961110 | https://en.wikipedia.org/wiki/Expr | Expr | expr is a command line utility on Unix and Unix-like operating systems which evaluates an expression and outputs the corresponding value. It first appeared in Unix v7. The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. The command has also been ported to the IBM i operating system.
Overview
expr evaluates integer or string expressions, including pattern matching regular expressions. Each symbol (operator, value, etc.) in the expression must be given as a separate parameter. Most of the challenge posed in writing expressions is preventing the invoking command line shell from acting on characters intended for expr to process.
Syntax
Syntax:
The operators available
for integers: addition, subtraction, multiplication, division and modulus
for strings: match a regular expression; in some versions: find a set of characters in a string ("index"), find substring ("substr"), length of string ("length")
for either: comparison (equal, not equal, less than, etc.)
Example
The following is a (non-POSIX-compliant) example involving boolean expressions:
expr length "abcdef" "<" 5 "|" 15 - 4 ">" 8
This example outputs "1". This is because length "abcdef" is 6, which is not less than 5 (so the left side of the | returns zero). But 15 minus 4 is 11 and is greater than 8, so the right side is true, which makes the or true, so 1 is the result. The program exit status is zero for this example.
For pure arithmetic, it is often more convenient to use bc. For example:
echo "3 * 4 + 14 / 2" | bc
since it accepts the expression as a single argument.
For portable shell programming, use of the "index", "length", "match" and "substr" commands must be avoided; string matching remains possible but it must use the "string : regexp" syntax.
See also
List of Unix commands
References
External links
expr invocation in GNU coreutils manual
GNU Project software
Unix programming tools
Standard Unix programs
Unix SUS2008 utilities |
25596411 | https://en.wikipedia.org/wiki/Dinesh%20Manocha | Dinesh Manocha | Dr. Dinesh Manocha is an Indian-American computer scientist and the Paul Chrisman Iribe Professor of Computer Science at University of Maryland College Park, formerly at University of North Carolina at Chapel Hill. His research interests are in Scientific Computation, Robotics, Self-Driving Cars, Affective Computing, Virtual and Augmented Reality and 3D Computer Graphics.
Biography
Dinesh Manocha is currently a Paul Chrisman Iribe Professor Professor of
computer science at the University of Maryland, College Park. He
received his B.Tech. degree in computer science and engineering from the
Indian Institute of Technology, Delhi in 1987; M.S. and Ph.D. in computer
science at the University of California at Berkeley in 1990 and 1992,
respectively.
Manocha has supervised more than 45 MS and Ph.D. students. He is married to his frequent collaborator and UNC faculty colleague, Ming C. Lin.
Research
Manocha's research interests include geometric computing, interactive
computer graphics, physics-based simulation and robotics. He has published
more than 280 papers in these areas.
Awards and honors
Manocha has received more than 11 best paper and panel awards at the
ACM SuperComputing, ACM Multimedia, ACM Solid Modeling, Pacific Graphics,
IEEE VR, IEEE Visualization, ACM SIGMOD, ACM VRST, CAD, I/ITSEC and
Eurographics Conferences. He was selected as an ACM Fellow in 2009 "for contributions to geometric computing and applications to computer graphics, robotics and GPU computing", and is also an AAAS Fellow.
References
External links
Dinesh Manocha home page at the Department of Computer Science, University of North Carolina at Chapel Hill
GAMMA research group at the Department of Computer Science, University of North Carolina at Chapel Hill
Computer graphics researchers
Fellows of the Association for Computing Machinery
Indian computer scientists
IIT Delhi alumni
Living people
Researchers in geometric algorithms
University of California, Berkeley alumni
University of North Carolina at Chapel Hill faculty
Year of birth missing (living people) |
56886069 | https://en.wikipedia.org/wiki/Alex%20Stamos | Alex Stamos | Alex Stamos is a Greek American computer scientist and adjunct professor at Stanford University's Center for International Security and Cooperation. He is the former chief security officer (CSO) at Facebook. His planned departure from the company, following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, was reported in March 2018.
Early life
Stamos grew up in Fair Oaks, California and graduated from Bella Vista High School in 1997. Stamos attended the University of California, Berkeley, where he graduated in 2001 with a degree in EECS.
Career
Stamos began his career at Loudcloud and, later, as a security consultant at @stake.
iSEC Partners
In 2004, Stamos co-founded iSEC Partners, a security consulting firm, with Joel Wallenstrom, Himanshu Dwivedi, Jesse Burns and Scott Stender. During his time at iSEC Partners, Stamos was well known for his research publications on vulnerabilities in forensics software and MacOS, Operation Aurora, and security ethics in the post-Snowden era.
Stamos was an expert witness for a number of cases involving digital privacy, encryption, and free speech:
EFF for their lawsuit against Sony BMG
Google for their Google Street View case
George Hotz
Aaron Swartz
iSEC Partners was acquired by NCC Group in 2010.
Artemis Internet
Following the acquisition of iSEC Partners by NCC Group, Stamos became the CTO of Artemis Internet, an internal startup at NCC Group. Artemis Internet petitioned ICANN to host a '.secure' gTLD on which all services would be required to meet minimum security standards Artemis ultimately acquired the right to operate the '.trust' gTLD from Deutsche Post to launch its services.
Stamos filed and received five patents for his work at Artemis Internet.
Yahoo!
In 2014, Stamos joined Yahoo! as CSO. While at Yahoo!, he testified to Congress on online advertising and its impact on computer security and data privacy. He publicly challenged NSA Director Michael S. Rogers on the subject of encryption backdoors in February 2015 at a cybersecurity conference hosted by New America.
Facebook
In 2015, Stamos joined Facebook as CSO. During his time at Facebook, Stamos co-authored a whitepaper (with Jen Weedon and Will Nuland) on the use of social media to attack elections. He later delivered a keynote address at the Black Hat Briefings in 2017 on the need to broaden the definition of security and diversify the cybersecurity industry.
Following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, he made plans in 2018 to leave the company to take a research professorship at Stanford University.
Stamos was interviewed about the Russian interference in the 2016 United States elections in the PBS Frontline documentary The Facebook Dilemma.
Controversies
During Stamos's tenure as the Chief Security Officer, Facebook was involved in numerous safety and security controversies including the Russian interference in the 2016 United States elections, failure to remove reported child-abuse images,
inaction against disinformation campaigns in Philippines that targeted and harassed journalists,
Facebook–Cambridge Analytica data scandal and the Rohingya genocide, for which the company has played a "determining role" according to the UN.
Stamos said, as the CSO during the 2016 election season he "deserve as much blame (or more) as any other exec at the company,"
for Facebook's failed response to the Russian interference.
Although the whitepaper Stamos coauthored
only mentioned $100,000 ad spend for 3,000 ads connected to about 470 inauthentic accounts, it was later revealed that
the Russian influence had reached 126 million Facebook users.
While Cambridge Analytica harvested data from 87 million Facebook users before Stamos's tenure, Facebook did not notify its users until 2018, despite knowing about it as early as 2015, the year Stamos joined the company as the CSO. In July 2019, Facebook agreed to pay $100 million to settle with the U.S. Securities and Exchange Commission
for misleading investors for more than two years (2015-2018) about the misuse of its users' data.
Stanford University
, Stanford University's Center for International Security and Cooperation lists Stamos as an adjunct professor, visiting scholar at the Hoover Institution, and director of the Stanford Internet Observatory.
Krebs Stamos Group
At the beginning of 2021, Stamos joined former CISA director Chris Krebs to form Krebs Stamos Group, a cybersecurity consultancy, which quickly landed its first customer, the recently-beleaguered SolarWinds.
References
Patents
Securing client connections, filed April 11, 2012, granted July 14, 2015
Domain policy specification and enforcement, filed April 11, 2012, granted August 5, 2014
Computing resource policy regime specification and verification, filed May 9, 2014, granted August 11, 2014
Assessing a computing resource for compliance with a computing resource policy regime specification, filed May 9, 2014, granted March 24, 2015
Discovery engine, filed May 9, 2014, granted February 16, 2016
External links
Alex Stamos on Twitter
Krebs Stamos Group official web site
Year of birth missing (living people)
Chief security officers
Facebook employees
Living people
MSNBC people
Place of birth missing (living people)
People associated with computer security
University of California, Berkeley alumni
Yahoo! employees |
58154213 | https://en.wikipedia.org/wiki/Tropy | Tropy | Tropy is a free and open-source desktop knowledge organization application that helps users manage and describe photographs of research materials. It was developed by the Center for History and New Media at George Mason University. Photos imported into Tropy can be combined into single items, described with metadata that is applied in bulk or created with custom metadata templates, annotated with research notes, and tagged in accordance with a researcher's preferred mode of organization.
Tropy acknowledges the ways in which that "digital photography and less-restrictive archival policies on digital reproduction for personal use" have transformed the ways that archives and their communities of users conduct research. Workshops on Tropy have been held by libraries at Brown University, Yale University, Northeastern University, and The University of Texas at Austin.
Features
Tropy does not seek to be photo editing software, a citation manager, a writing platform, or an online exhibit platform. Tropy seeks to address the challenges of the now-common experience of researchers photographing objects in archives. Tropy allows users to group a collection of photos into a single document, apply multiple tags to photos to allow for organization, and provide annotations and notes to individual items and groups of items. Material in Tropy can also be exported to JSON-LD and Omeka to allow collaboration with others.
Items are organized through a drag-and-drop interface, and can search the users' collections.
Currently, the platform accepts JPEG, PNG, SVG, AVIF, GIF, HEIC, JP2, PDF, TIF, WEBP file formats.
Financial support
The Andrew W. Mellon Foundation funded Tropy's development. Tropy's public released happened in October 2017.
See also
Knowledge organization systems
Comparison of reference management software
References
External links
Support and discussion forums
Source code repository
Reference management software
Free reference management software
Library 2.0
2017 software
Software using the GNU AGPL license |
30781473 | https://en.wikipedia.org/wiki/Windows%20Embedded%20Industry | Windows Embedded Industry | Windows Embedded Industry, formerly Windows Embedded POSReady and Windows Embedded for Point of Service (WEPOS), is an operating system subfamily developed by Microsoft as part of its Windows Embedded family of products. Based on Windows NT, Windows Embedded Industry is designed for use in industrial devices such as cash registers, automated teller machines, and self service checkouts. Windows Embedded 8.1 Industry was the last release, with Windows 10 IoT Enterprise superseding Windows Embedded Industry, Windows Embedded Standard, and Windows For Embedded Systems (FES).
Releases
Windows Embedded for Point of Service (WEPOS)
Windows Embedded for Point of Service was released on May 24, 2005, nearly a year after its Windows XP SP2 counterpart was launched by Microsoft in August 2004. WEPOS expanded Microsoft's Windows Embedded family of products. It was the first edition of Windows Embedded that could use the Windows Update Agent to update an installed and deployed image. Service Pack 3 (SP3) for WEPOS was released on October 8, 2008. When the new Microsoft Lifecycle Support policy for Internet Explorer went into effect on January 12, 2016, IE6 support was dropped from not only WEPOS, but all other supported platforms. WEPOS was also the last supported platform for IE7 after this date.
Windows Embedded POSReady 2009
Windows Embedded POSReady 2009 offers more features over Windows Embedded for Point of Service such as Full Localization, Internet Explorer 7 and XPS support if .NET Framework 3.5 or higher is installed. This edition was released on December 9, 2008, exactly seven months after its Windows XP SP3 counterpart was launched on May 6, 2008. Prior to XP's end of support, some Windows XP users have reported that the Regedit tool on their operating system can be used to 'trick' Windows Update into accepting updates targeting POSReady 2009, though it can break some older applications. POSReady 2009 is also notable as being the last XP derived operating system to receive official support from Microsoft. Starting in 2017, Microsoft announced end of support for POSReady 2009. Extended support for Windows Embedded POSReady 2009--the last supported edition of Windows based on Windows XP--ended on April 9, 2019, marking the final end of the Windows XP codebase after 17 years, 7 months, and 17 days.
Windows Embedded POSReady 7
Windows Embedded POSReady 7, which is based on Windows 7 with SP1, was released on July 1, 2011, nearly two years after Windows 7 debuted. It is the last supported edition of Windows based on Windows 7 to receive official support from Microsoft. Mainstream support for Windows Embedded POSReady 7 ended on and extended support ended on . Windows Embedded POSReady 7 is eligible for the Extended Security Updates service. This service is available via OEMs, in yearly installments. Security updates are available for the operating system until at most October 8, 2024. This will mark the final end of the Windows 7 codebase after 15 years, 2 months, and 17 days.
Windows Embedded 8 Industry
Based on Windows 8, Windows Embedded 8 Industry was released on April 2, 2013 and is available in Pro, Pro Retail, and Enterprise editions. The Pro and Pro Retail editions are only available pre-installed on OEM devices, while the Enterprise edition is available through the volume licensing channel only. The Pro Retail edition adds a few extra features for use in retail environments, while the Enterprise edition provides embedded-specific features designed to integrate seamlessly with Windows 8 Enterprise. Alaska Airlines uses Windows Embedded 8 Industry in-flight entertainment devices. Support ended on January 12, 2016; users must install Windows Embedded 8.1 Industry in order to continue receiving updates and support. IE11 was made available only for Windows Server 2012 and Windows Embedded 8 Standard in April 2019. It is the only supported version of Internet Explorer on these operating systems since January 31, 2020.
Windows Embedded 8.1 Industry
Based on Windows 8.1, Windows Embedded 8.1 Industry was released on October 17, 2013 by Microsoft as a component of the operating system itself. As with 8 Industry, it is available in Pro, Pro Retail, and Enterprise editions. Windows Embedded 8.1 Industry Update was released on April 16, 2014. Mainstream support for Windows Embedded 8.1 Industry ended on July 10, 2018 and extended support ends on July 11, 2023.
Windows IoT Enterprise
Microsoft rebranded "Windows Embedded" to "Windows IoT" starting with the release of embedded editions of Windows 10. Windows IoT Enterprise acts as the successor to Windows Embedded Industry.
System requirements
References
Further reading
External links
Embedded operating systems
Microsoft operating systems
Embedded Industry |
12641300 | https://en.wikipedia.org/wiki/Daz%203D | Daz 3D | Daz Productions, Inc. (commonly known as Daz 3D, stylized Daz3D or DAZ 3D in some logos) is a 3D-content and software company specializing in providing rigged 3D human models, associated accessory content, and software to the hobbyist as well as the prosumer market.
Daz 3D has a library of over 5 million assets for Daz Studio and other applications that allow users to create high-quality exportable 3D renders and animations. Daz 3D has continued to focus on 3D-content development, but has also expanded their own software offerings as well, with purchases of several notable 3D applications:
Bryce, a fractal-based landscape modeler and renderer acquired from Corel by Daz 3D in 2004.
Hexagon, a 3D mesh modeler originally developed by Eovia, acquired by Daz 3D in 2006.
Carrara, a general purpose 3D modeler/animation package also acquired from Eovia in 2006.
Additionally, Daz 3D developed their own scene creator software, Daz Studio, as an alternative to Poser.
History
Originally a part of Zygote Media Group, a general purpose, application-agnostic broker of 3D content, Daz 3D split off as Digital Art Zone in 2000 to focus on supplying content for the Poser market. The company no longer uses that name, and does not treat "Daz" as an acronym for it.
In 2016, Daz 3D spun off Tafi, a 3D-content company intended to focus more on the game developer market.
Free 3D software
In 2012, Daz 3D shifted their strategy from selling 3D software and content to one of giving the software away for free and focusing more on the selling of the content. This began with offering Daz Studio for free in 2012, which gave customers the ability to render images and video, and expanded in 2017 when Daz 3D added Hexagon to the list of their free software products and added the ability to do 3D modeling to that mix.
Figure technology
Daz 3D has had many versions of its human figures and characters, but in 2011 they launched a significant change in the underlying technology. Instead of each figure being designed individually, Daz 3D moved to their Genesis platform, in which figures were derived as morphs from the base mesh. Two of the key differences that this technology created were: the ability for characters to be blended into a huge variety of shapes; and, since these shapes were all derived from a common base, add-on content like clothing, hair, and additional morphs would not only work on all characters, but could actually change with the characters.
The Genesis platform has gone through several versions since the launch in 2011:
Genesis 2
One of the shortcomings of the Genesis platform was that although it allowed extremely flexibility in the shape of characters and clothing, it also toned down some of the elements of what made a male or female figure unique. Genesis 2, released in 2013, changed this by splitting the Genesis base figure into two separate base figures: Genesis 2 Male and Genesis 2 Female.
Genesis 3
Up until Genesis 3, the Genesis figures had been using TriAx Weight Maps, where many other industry platforms were using Dual Quaternion. This changed in Genesis 3, released in 2015, to allow Daz 3D figures to be more compatible with other 3D software platforms as well as Game Development platforms.
Genesis 8
The jump in version naming from Genesis 3 to Genesis 8 was in order to address confusion in naming conventions. Although Genesis had reached its fourth version, most of the Daz 3D flagship characters were now on their eight versions. In order to avoid the confusion of Victoria 8 or Michael 8 being Genesis 4 characters, Daz 3D shifted the versioning of Genesis to match with the character versions.
Genesis 8 also included significant changes, including joint and muscle bends and flexing, and facial expressions. This resulted in reduced backward compatibility with previous generations' figures and their content.
Genesis 8.1
Genesis 8.1 is the newest update to the Genesis Platform. It allows users to create realistic characters with emotions for 3D artwork. Genesis 8.1 has improved facial expressions, shader and UV improvements, more depth and realism to eyes, improved detail to mouth areas, and others. Previous characters and animations created in Genesis can be used in Genesis 8.1. However, the 8.1 creations can not be used on any of the other platforms.
Non-Fungible People
In January 2022 DAZ 3D minted a NFT collection "Non-Fungible People" featuring 8,888 unique female and non-binary PFP avatars, artistically rendered in a hyper-real style. Packed with utility geared toward the metaverse, NFP avatars can be used almost anywhere that supports 3D characters — including those used in real-time — from popular video game engines to AR and streaming software. Their vision is to help fulfill a diverse and inclusive metaverse.
Features
Daz 3D users are able to build and render realistic 3D models through the Genesis platform. Meanwhile, Daz Studio allows users to create and render 3D scenes by manipulating imported assets.
The Genesis platform allows Daz 3D users to design their own 3D characters using thousands of supported 3D assets such as clothes and accessories.<r
Through the Daz Bridges tool, Daz 3D users can transfer their content to third-party applications, including 3DS Max, Maya, Mudbox, Blender, Cinema 4D, Unity, and Unreal Engine.
Other available Daz Studio features include:
Realistic 3D character morphing technology
dForce physics for simulating natural cloth and hair movement
Backward compatibility for assets created in earlier versions of Genesis
Filament Viewport and Render Engine for faster rendering time
Asset and resource manager
Interface
Daz 3D programs utilize a modular design consisting of panes that enable users to personalize the interface to their preference. When the app launches, users can drag the panes to any location or close them entirely. Panes that have been closed can be reopened by selecting the Panes (Tabs) option from the Window drop-down menu. Additionally, users can customize the layout and design of the interface, from the color scheme to the font.
Resources such as an interactive tutorial, a user guide, and training videos are also provided by the software. Daz Marketplace and Wiki are also accessible through it.
Use
Adding assets to a scene in Daz 3D typically starts with the Smart Content tab, which lets users access Genesis characters, clothing, accessories, environments, and other ready-made assets. Users may also use their own 3D assets by using Import.
Once the asset appears in the viewport, users can customize it in various ways, such as by altering the figure's pose, its placement in the scene, or the clothing it wears. Additionally, they can add new cameras to provide a distinct perspective on their 3D scene, configure the lighting, and animate the characters before rendering.
Content creation
Daz 3D software allows for various kinds of 3D content creation, such as sculpting, sharing, backgrounds, and others.
Sculpting: Daz 3D Hexagon features include sculpted primitives and freehand modeling brushes, which allow users to sculpt detailed 3D models.
Shading: Besides conventional 3D scenes, artistic, cartoon-like renders are also possible through Daz 3D's shaders.
Characters: Daz Studio allows users to create highly configurable 3D character models either from scratch or by importing pre-made or self-created assets.
Costumes: Using the software, users can also design 3D outfits that have realistic materials, rigging, and real-time movement simulations.
Backgrounds: Daz 3D software can also be used to create 3D environments for use as backgrounds in 3D scenes.
Daz Studio
Daz Studio is a free software application developed by Daz 3D to allow users to create 3D scenes and rendering applications that are used to produce images and video. Daz Studio also supports importing and exporting various file formats of 3D objects and animations to use with other 3D content within Daz Studio, as well as to get content out of Daz Studio for use in other 3D applications.
References
External links
Daz 3D official website
Software companies based in Utah
Anatomical simulation
Companies based in Salt Lake City
3D graphics software
Software companies of the United States
2000 establishments in Utah |
16615403 | https://en.wikipedia.org/wiki/List%20of%20women%20warriors%20in%20folklore | List of women warriors in folklore | This is a list of women who engaged in war, found throughout mythology and folklore, studied in fields such as literature, sociology, psychology, anthropology, film studies, cultural studies, and women's studies. A mythological figure does not always mean a fictional one, but rather, someone of whom stories have been told that have entered the cultural heritage of a people. Some women warriors are documented in the written or scientific record and as such form part of history (e.g. the Ancient Briton queen Boudica, who led the Iceni into battle against the Romans). However, to be considered a warrior, the woman in question must have belonged to some sort of military, be it recognized, like an organized army, or unrecognized, like revolutionaries.
Pirates and seafarers
Anne Bonny and Mary Read sailed alongside Calico Jack, Mary dressing as a man. Anne eventually became Jack's lover, and they had a child. In October 1720, their ship was attacked by a royal fleet. All but one of the male crew members, drunk and afraid, hid below deck as the two women fought on with the help of the unknown man. While imprisoned, Bonny is reported to have said of her doomed lover: "Sorry to see him there, but if he had fought like a man, he need not have been hanged like a dog."
Ching Shih, legendary "Pirate Queen" of China, famous for commanding over 300 ships and an army of 20,000 to 40,000 pirates. She lived during the 18th and 19th centuries.
Gráinne O'Malley, legendary "Pirate Queen" of Ireland. She lived during the 16th century.
Muirisc, daughter of Úgaine Mór (Hugony the Great), the sixty-sixth high king of Ireland, c. 600 BC to AD 500.
Africa
Angola
Nzinga of Ndongo and Matamba fought and held off Portuguese control of present-day Angola for over thirty years during the early 17th century.
Benin history
The Dahomey Amazons (or N'Nonmiton, meaning our mothers in the Fon language), were a Fon all-female military regiment in Dahomey, an African kingdom (c. 1600–1894) located in the area of the present-day Republic of Benin. They were so named by Western observers and historians due to their similarity to the semi-mythical Amazons of ancient Anatolia and the Black Sea.
Berber history
Kahina or al-Kāhina (Classical Arabic for "female seer"; modern Maghreb Arabic l-Kahna, commonly romanised as Kah(i)na, also known as Dihya or Kahya) was a 7th-century female Berber religious and military leader, who led indigenous resistance to Arab expansion in Northwest Africa, the region then known as Numidia, known as the Maghreb today. She was born in the early 7th century and died around the end of the 7th century probably in modern-day Algeria.
Burkina Faso
Yennenga was a legendary warrior woman skilled in spear and bow, considered by the Mossi people as the mother of their empire.
Egypt
Ankt may have originated in Asia Minor. Within Egypt she was later syncretized as Neith (who by that time had developed aspects of a war goddess).
Cleopatra VII was a Hellenistic co-ruler of Egypt with her father (Ptolemy XII Auletes) and later with her brothers/husbands Ptolemy XIII and Ptolemy XIV. Her patron goddess was Isis, and thus during her reign, it was believed that she was the re-incarnation and embodiment of the goddess of wisdom.
Sekhmet is a warrior goddess depicted as a lioness, the fiercest hunter known to the Egyptians.
Though her reign was primarily peaceful, the pharaoh Hatshepsut fought in several battles during her younger years.
Nefertiti, wife of the pharaoh Akhenaten, has been at times depicted as smiting enemies in a manner similar to how a male ruler typically would.
Ahhotep, wife of Seqenenre Tao II, was believed to have been in command of the army while her son Ahmose I was still young.
Kongo
Aqualtune was a princess of Kongo who led an army of ten thousand in the Battle of Mbwila, where she was captured. She was enslaved and carried to Brazil, where according to legend she escaped and founded the runaway slave settlement of Quilombo dos Palmares, or Angola Janga.
Somalia
Arawelo was a legendary ancient Somali queen. The queen defied gender roles of the time. During her reign, Arawelo's husband objected to her self-ascribed role as the breadwinner to all of society, as he thought women should restrict themselves to merely domestic duties about the house and leave everything else to men. In response, Arawelo demanded that all women across the land abandon their womanly role in society, and started hanging men by their testicles.
Ethiopia
Gudit (Ge'ez: Yodit, Judith) is a semi-legendary, non-Christian, Beta Israel, queen (flourished c.960) who laid waste to Aksum and its countryside, destroyed churches and monuments, and attempted to exterminate the members of the ruling Axumite dynasty. Her deeds are recorded in the oral tradition and mentioned incidentally in various historical accounts.
Ghana (then Gold Coast)
Yaa Asantewaa was the Queen Mother of Ejisu (Asante Confederacy)—now part of modern-day Ghana. In 1900 she led the Ashanti rebellion known as the War of the Golden Stool against British colonialism.
Hausa history
Amina Sukhera (also called Aminatu) was a Muslim princess of the royal family of the kingdom of Zazzau, in what is now northeast Nigeria, who lived c. 1533 – 1610. Her military achievements brought her great wealth and power; she was responsible for conquering many of the cities in the area surrounding her seat.
Sarraounia Mangou, chief/priestess of the animist Azna subgroup of the Hausa, who fought French colonial troops of the Voulet–Chanoine Mission at the Battle of Lougou (in present-day Niger) in 1899. She is the subject of the 1986 film Sarraounia based on the novel of the same name by Nigerien writer Abdoulaye Mamani.
Yoruba mythology and history
Oya is the Orisha of the Niger River. She is the warrior-spirit of the wind, lightning, fertility, fire, and magic. It is believed that she creates hurricanes and tornadoes, and serves as guardian of the underworld. Prior to her post-mortem deification, the historical Oya was a queen of the Oyo clan as the consort of Shango, its reigning king. She is often depicted with leopard-like spots, these being either war paint or ritual scarification. This is done for propaganda purposes, as the Leopard is famous in Yoruba folklore for its cunning.
Efunroye Tinubu was a powerful titled aristocrat in Colonial Nigeria. As the first Iyalode of Egbaland, she and her private battalion fought against the Dahomeyans when they invaded Abeokuta in the 1850s and the 1860s.
Nubia/Kush (Sudanese) history
The legendary Candace of Meroe (a title, her real name never given) was a warrior queen in the Alexander Romance who caused Alexander The Great himself to retreat upon witnessing the army she'd gathered. This however may be classified a non-historical account because Alexander never reached Sudan.
Amanirenas, however, was a historical holder of the title of Candace who fought against the Romans after their conquest of Egypt.
Americas
Native Americans
Nonhelema was a Shawnee chieftess and sister of Cornstalk. She was known by white settlers as the Grenadier or Grenadier Squaw because of her height. She promoted an alliance with the Americans on the frontier in Ohio.
Woman Chief (c. 1806 – 1858) was a Crow chief and war leader in the mid-19th century. Born to the Gros Ventre people, she was adopted into the Crow. She gained renown in battles and raids, and assumed leadership of her lodge when her father died, becoming a leading chief. She married four wives and later participated in peace negotiations after the 1851 Treaty of Fort Laramie.
Running Eagle: she became a Blackfoot (Piegan) warrior after her husband was killed by the Crow.
Colestah: In the 1858 battle of Spokane Plains in Washington, Yakama leader Kamiakin's wife Colestah was known as a medicine woman, psychic, and warrior. Armed with a stone war club, Colestah fought at her husband's side. When Kamiakin was wounded, she rescued him, and then used her healing skills to cure him.
Buffalo Calf Road Woman: In the 1876 battle of the Rosebud in Montana, Buffalo Calf Road (aka Calf Trail Woman), the sister of Comes in Sight, rode into the middle of the warriors and saved the life of her brother. Buffalo Calf Road had ridden into battle that day next to her husband Black Coyote. This was considered to be one of the greatest acts of valor in the battle.
Moving Robe Woman: One of the best-known battles in the annals of Indian-American warfare is the 1876 Battle of the Greasy Grass in Montana where Lt. Col. George Armstrong Custer was defeated. One of those who led the counterattack against the cavalry was the woman Tashenamani (Moving Robe).
Lozen (c. 1840 – June 17, 1889) was a female warrior and prophet of the Chihenne Chiricahua Apache. She spent most of her adult life fighting the Apache Wars alongside her brother Victorio and the legendary Geronimo.
Aztec mythology
Itzpapalotl is a fearsome skeletal warrior goddess who ruled over the paradise world of Tamoanchan.
American Civil War
Frances Clayton disguised herself as a man to serve in the Union Army in the American Civil War.
Sarah Pritchard, who fought with the 26th Infantry of the Confederate Army alongside her husband, until wounded. She was sent home, whereupon she switched sides and fought guerrilla style for the Union.
Harriet Tubman escaped slavery and then led other escaped slaves into the northern union states and Canada. Tubman became the first woman to lead an armed assault during the American Civil War.
American Old West
Calamity Jane was a frontierswoman and professional scout best known for her claim of being a close friend of Wild Bill Hickok. She gained fame fighting Native Americans.
American Revolution
Deborah Sampson, first known female to fight in the American military (after disguising herself as a man)
"Molly Pitchers", patriot women who operated artillery fend off the British during the war for independence
Sally St. Clair, Creole woman killed during the Siege of Savannah
Tyonajanegen Doxtater Yerry, recognized by the United States military as the first Native American woman to serve American Colonial forces during the Battle of Oriskany 6 August 1777
Mexican Revolution
La Adelita is a folk song about a female soldier in the revolution who fell in love with Francisco I. Madero. Today, Adelita has become an archetype of women warriors in Mexico, and a symbol of action and inspiration.
Argentina – Bolivia
Juana Azurduy de Padilla was a military leader during the Argentine War of Independence and Bolivian War of Independence. She was appointed commander of the patriotic Northern Army of the Revolutionary Government of the United Provinces of the Rio de la Plata after the death of her husband.
María Remedios del Valle also known as the "Madre de la Patria" (Mother of the Homeland) was an Afro-Argentine soldier who participated in the Argentine War of Independence and eventually got recognized with the rank of captain in the army.
Brazil
Maria Quitéria, dressed as a man, enlisted in the forces fighting for Brazilian Independence. Once discovered, she was promoted to cadet and afterwards alferez. Her courage was recognized by the Emperor Pedro I.
Anita Garibaldi, fought on the Ragamuffin War
Maria Bonita, a member of a Cangaço band, marauders and outlaws who terrorized the Brazilian Northeast in the 1920s and 1930s. Maria Bonita means "Beautiful Maria". She has the status of a 'folk heroine' in Brazil.
East Asia
Historical Mongolia
Khutulun was a 13th-century Mongol princess, the daughter of the Mongol leader Qaidu Khan and a great-great granddaughter of Genghis Khan. According to legend she was a skilled warrior and wrestler who vowed that she would only marry a man who could defeat her in wrestling. Although no man was ever able to out-wrestle her, Khutuln ended up marrying a warrior named Abtakul (possibly to squelch rumors about an incestuous relationship between her and her father). Her story was made famous by foreign chroniclers Marco Polo, and Ibn Battuta, both of whom had heard of Khutuln's legend on their travels through Asia.
Historical China
Hua Mulan was a (possibly legendary) woman who went to war disguised as a man, and was able to return home after years of war without being found out.
Ng Mui was a Shaolin monastery abbess who created a kung fu system especially suitable for women.
Yim Wing-chun, often cited in Wing Chun legends as the first Wing Chun master outside the monastic tradition, was a pupil of Ng Mui.
Fu Hao was one of the many wives of King Wu Ding of the Shang Dynasty and, unusually for that time, also served as a military general and high priestess.
Mother Lü began a peasant rebellion.
Li Xiu defeated rebels as a military commander.
Lady of Yue was a famous swordswoman.
Qin Liangyu fought battles with her husband.
Liang Hongyu was a Chinese general of the Song Dynasty.
Sun Shangxiang, who is often depicted as a tomboy, was the sister of the warlord Sun Quan. She received extensive martial arts training, and her maidservants were armed with weapons, which was odd for her time.
Lady Zhurong It's unknown whether she existed, but she was the only woman portrayed in the Romance of the Three Kingdoms who took part in fighting in the war during the three kingdoms period alongside her husband.
Mu Guiying was a woman who commanded the armies against barbarian invaders
Princess Pingyang formed a rebel army to assist her father in overthrowing the Emperor, and was declared 'no ordinary woman' upon her death.
Ching Shih (1775–1844) prominent pirate in middle Qing China, early 19th century. A brilliant Cantonese pirate, she commanded over 300 junks crewed by 20,000 to 40,000 pirates – men, women, and even children. She challenged the empires of the time, such as the British, Portuguese, and the Qing dynasty. Undefeated, she would become one of China and Asia's strongest pirates, and one of world history's most powerful pirates. She was also one of the few pirate captains to retire from piracy.
Ruler of Women's Country is the ruler of a nation in Xiliang with an all-female population.
Historical Japan
Empress Jingū was a Japanese empress who led an army.
Hangaku Gozen was an onna-bugeisha ("woman warrior").
Tomoe Gozen ( – ) was an onna-bugeisha.
Marishi-Ten the goddess of heaven, who was adopted by warriors in the 8th century as a protector and patron goddess. While devotions to Marishi-ten predate Zen, they appear to be geared towards a similar meditative mode to enable the warrior to achieve a more heightened spiritual level. They lost interest in the issues of victory or defeat (or life and death), thus transcending to a level where they became so empowered that they were freed from their own grasp on mortality. The end result was that they became better warriors.
Kaihime (presumably born 1572) was said to have fought during the Siege of Odawara and to have personally crushed a rebellion, earning her father the respect of Hideyoshi Toyotomi. However, historians aren't entirely sure if she truly did accomplish those events.
Korea
Wonhwa, women warriors of Silla, most probably only legendary
Southeast Asia
Historical Indonesia
Cut Nyak Dhien, (1850–1908), leader of the Acehnese guerrilla forces during the Aceh War. Following the death of her husband Teuku Umar, she led guerrilla actions against the Dutch for 25 years. She was posthumously awarded the title of National Hero of Indonesia on 2 May 1964 by the Indonesian government.
Cut Nyak Meutia, (1870–1910), commander of the Achenese guerrilla forces during the Aceh War. Together with her husband, Teuku Cik Tunong, they worked hand in hand with the Acehnese to fight against the Dutch invasion.
Admiral Keumalahayati, (fl. 16th century), an admiral in the navy of the Aceh Sultanate, which ruled the area of modern Aceh Province, Sumatra, Indonesia. She was the first woman admiral in the modern world (if Artemisia I is not included). Her troops were drawn from Aceh's widows and known as the "Inong Balee", after the Inong Balee Fortress near the city of Banda Aceh.
Martha Christina Tiahahu, (1800–1818), a Moluccan freedom fighter and National Heroine of Indonesia. Born to a military captain, Tiahahu was active in the military from a very young age. She joined the war led by Pattimura against the Dutch colonial government when she was 17, fighting in several battles.
Nyi Ageng Serang, (1752–1838), born under the name Raden Ajeng Kustiyah Wulaningish Retno Edhi, was a commander during the Diponegoro War. The name Nyi Ageng Serang was given to her after her father died of disease and she took over his position. At the beginning of Diponegoro War in 1825, 73-year-old Nyi Ageng Serang commanded the force on a stretcher to help Pangeran Diponegoro fighting the Dutch. One of her best-known strategies was the use of lumbu (green taro leaves) for disguise.
Tribhuwana Wijayatunggadewi, was a Javanese queen regnant and the third Majapahit monarch, reigning from 1328 to 1350. She appointed Gajah Mada as prime minister and pursued massive expansion of the empire. In 1331, she led the empire's army personally to the battlefield with the help of her cousin, Adityawarman, to crush the rebellion in Sadeng and Keta.
Historical Malaysia
Walinong Sari, (ca. 4th–5th century AD) was a legendary princess of Inderapura, in the Old Pahang Kingdom. She was known for her beauty and strong character. She was an expert in weaponry like Kris, spears and swords, and was also renowned for her mastery of silat, the Malay martial art.
Tun Fatimah, (ca. 1488–1500s AD) a well-known queen of Johor-Riau Kingdom and daughter of Tun Mutahir, the Malaccan bendahara (prime minister) who lived in during the 16th century. She was one of Malacca's Sultan Mahmud Shah spouses. She was known to help the army to lead the Malays in their fight against the invading Portuguese forces in the early 16th century.
Siti Wan Kembang, (17th century) was legendary queen who reigned over a region on the east coast of Peninsular Malaysia. She was a warrior queen and engaged in battle on horseback with a sword accompanied by an army of female horse-riders.
Historical Philippines
Queen Sima, (ca. 637 AD) The legendary Queen of lower Cotabato known for her sense of justice and respect for the law.
Urduja, (ca. 1350–1400 AD) a legendary warrior princess who is recognized as a heroine in Pangasinan, Philippines. The name Urduja appears to be Sanskrit in origin, and a variation of the name "Udaya", meaning "arise" or "rising sun", or the name "Urja", meaning "breath". A historical reference to Urduja can be found in the travel account of Ibn Battuta (1304 – possibly 1368 or 1377 AD), a Muslim traveler from Morocco.
Gabriela Silang, (1731–1761), led insurgents from Ilocos during the Philippine Revolution against Spain, after the death of her husband, Diego Silang. She was captured by Spanish colonial forces in September 1761 and executed in the town square of Vigan, reportedly after watching the executions of all her men.
Ancient Philippine Mythologies had various deities called Diwatas, one of which is Ynaguiguinid, the Diwata of War.
Historical Thailand
Somdet Phra Sri Suriyothai () was a royal consort during the 16th century Ayutthaya period of Siam (now Thailand). She is famous for having given up her life in the defense of her husband, King Maha Chakkraphat, in a battle during the Burmese-Siamese War of 1548. For the movie, see The Legend of Suriyothai.
Thao Thep Kasattri () and Thao Sri Sunthon () were styles awarded to Than Phuying Chan (), wife of the then recently deceased governor, and her sister, Khun Muk (), who defended Phuket Province in the late 18th century. According to popular belief, they repelled a five-week invasion by Burmese in 1785, by dressing up as male soldiers and rallying Siamese troops. Chan and Muk were later honored by King Rama I with the Thai honorific Thao, as Thao Thep Kasattri and Thao Sri Sunthon, respectively. The "Heroine's Monument" honouring them is situated on the main highway (402) between the Phuket International Airport and Phuket town.
Historical Vietnam
The Trung Sisters, (c. 12 – 43 AD), known in Vietnamese as Hai Bà Trưng ("the two Trưng ladies"'), and individually as Trưng Trắc (Traditional Chinese: 徵側; pinyin: Zhēng Cè) and Trưng Nhị (Traditional Chinese: 徵貳; pinyin: Zhēng Èr), were two first century AD women leaders who repelled Chinese invasions for three years, winning several battles against considerable odds, and are regarded as national heroines of Vietnam.
Phùng Thị Chính was a Vietnamese noble woman who fought alongside the Trưng sisters. Legend says she gave birth on the front lines and carried her newborn in one arm and a sword in the other as she fought to open the ranks of the enemy.
Lê Chân, general of Trưng Sisters.
Triệu Thị Trinh once said "I'd like to ride storms, kill sharks in the open sea, drive out the aggressors, reconquer the country, undo the ties of serfdom, and never bend my back to be the concubine of whatever man."
Tây Sơn Ngũ Phụng Thư (Five Phoenix women generals of Tay Son dynasty):
Bùi Thị Xuân, (? – 1802), wife of general Trần Quang Diệu.
Bùi Thị Nhạn, (? – 1802), wife of Emperor Quang Trung.
Trần Thị Lan, (? – 1802), wife of general Nguyễn Văn Tuyết.
Huỳnh Thị Cúc, (? – 1802)
Nguyễn Thị Dung, (? – 1802), wife of general Trương Đăng Đồ.
Europe
Britons, Roman Britain, and history of Anglo-Saxon England
Three historical women:
Boudica was a queen of the Brythonic Celtic Iceni people of Norfolk in Eastern Britain who led a major uprising of the tribes against the occupying forces of the Roman Empire.
Ethelfleda (alternative spelling Aethelfled, Æthelfleda, Æthelflæd) (872/879 – 918), Queen of Mercia, called "Lady of the Mercians". Daughter of Alfred the Great, she succeeded to Mercian power upon the death of her husband Aethelred, Ealdorman of Mercia (883–911), in 911. She was a skilled military leader and tactician, who defended Mercia against neighboring tribes for eight years.
Gwenllian ferch Gruffydd was Princess consort of Deheubarth in Wales. Often accompanying her husband on "lightning raids," in 1136 she raised an army herself and led the forces in the battle near Kidwelly Castle. Though defeated, her patriotic revolt inspired others in South Wales to rise. Their battle cry became, "Revenge for Gwenllian!"
Two legendary women:
Queen Cordelia (on whom the character in Shakespeare's King Lear is based), battled her nephews for control of her kingdom.
Queen Gwendolen fights her husband Locrinus in battle for the throne of Britain. She defeats him and becomes queen.
Celtic mythology and Irish mythology
Andraste is a Celtic war goddess invoked by Boudica while fighting against the Roman occupation of Britain in AD 61.
Medb (also: Medhbh, Meadhbh, Meab°, Meabh, Maeve, Maev) is queen of Connacht in the Ulster Cycle of Irish mythology. As recounted in The Cattle Raid of Cooley, she started war with Ulster.
Scathach is a legendary Scottish woman warrior who appears in the Ulster Cycle. She trains Cuchulainn.
Aife is Scathach's rival in war; she becomes the lover of Cuchulainn and gives birth to his son Connla.
Liath Luachra, two characters of the same name in the Fenian Cycle.
Muirisc, legendary warrior princess, daughter of Úgaine Mór (Hugony the Great), the sixty-sixth high king of Ireland.
Triple warrior goddess: Morrígan, Badb, and Macha (could also include Nemain and Anann)
On St Kilda, one of the most isolated islands of Scotland, legends exist of a female warrior. A mysterious structure is known as Taigh na Banaghaisgeich, the 'Amazon's House'. As Martin Martin, who travelled there in 1697 recorded:
This Amazon is famous in their traditions: her house or dairy of stone is yet extant; some of the inhabitants dwell in it all summer, though it be some hundred years old; the whole is built of stone, without any wood, lime, earth, or mortar to cement it, and is built in form of a circle pyramid-wise towards the top, having a vent in it, the fire being always in the centre of the floor; the stones are long and thin, which supplies the defect of wood; the body of this house contains not above nine persons sitting; there are three beds or low vaults that go off the side of the wall, a pillar betwixt each bed, which contains five men apiece; at the entry to one of these low vaults is a stone standing upon one end fix’d; upon this they say she ordinarily laid her helmet; there are two stones on the other side, upon which she is reported to have laid her sword: she is said to have been much addicted to hunting, and that in her time all the space betwixt this isle and that of Harries, was one continued tract of dry land.
Similar stories of a female warrior who hunted the now submerged land between the Outer Hebrides and St Kilda are reported from Harris.
Historical Czech Lands
The story of Šárka and Vlasta is a legend dealing with events in the "Maidens' War" in 7th-century Bohemia.
England
Margaret of Anjou, wife of Henry VI, emerged as the de facto leader of the Lancastrians during the Wars of the Roses. She introduced conscription, amassed armies, tortured and burnt to death Yorkist knights and won several battles before ultimately being defeated by the Yorkists.
Catherine of Aragon was Queen Regent, Governor of the Realm and Captain General of the King's Forces from 30 June 1513 – 22 October 1513 when Henry VIII was fighting a war in France. When Scotland invaded, they were crushingly defeated at the Battle of Flodden, with Catherine addressing the army, and riding north in full armour with a number of the troops, despite being heavily pregnant at the time. She sent a letter to Henry along with the bloodied coat of the King of Scots, James IV, who was killed in the battle.
Duchy of Brittany
Joanna of Flanders (c. 1295 – September 1374), also known as Jehanne de Montfort and Jeanne la Flamme, was consort Duchess of Brittany by her marriage to John IV, Duke of Brittany. She was the daughter of Louis I, Count of Nevers and Joan, Countess of Rethel, and the sister of Louis I, Count of Flanders. Joanna organized resistance and made use of diplomatic means to protect her family and her country. In the siege of Hennebont, she took up arms, dressed in armor, and conducted the defence of the town. She eventually led a raid of soldiers outside the walls of the town and demolished one of the enemy's rear camps. She was an earlier patron for women, and a possible influence to Joan of Arc.
Illyria
Teuta was an Illyrian queen and is frequently evoked as a fearsome "pirate queen" in art and stories.
The Netherlands
Kenau Simonsdochter Hasselaer (1526–1588) became a legendary folk hero for her fearless defense of the city against the Spanish invaders during the siege of Haarlem in 1573.
Albania
Nora of Kelmendi (17th century), is also referred to as the "Helen of Albania" as her beauty also sparked a great war. She is also called the Albanian Brünhilde too, for she herself was the greatest woman warrior in the history of Albania.
Tringe Smajl Martini, a young girl in war against the Ottoman Empire army after her father Smajl Martini, the clan leader was kidnapped. She never married, never had children, and did not have any siblings. In 1911, the New York Times described Tringe Smajli as the "Albanian Joan of Arc".
Shote Galica (1895–1927), remarkable warrior of the Albanian insurgent national liberation with the goal of unification of all Albanian territories.
Historical France
Jeanne Hachette (1456 – ?) was a French heroine known as Jeanne Fourquet and nicknamed Jeanne Hachette ('Jean the Hatchet').
Joan of Arc (Jeanne d'Arc in French) asserted that she had visions from God which told her to recover her homeland from English domination late in the Hundred Years' War. The uncrowned King Charles VII sent her to the siege at Orléans as part of a relief mission. She gained prominence when she overcame the dismissive attitude of veteran commanders and lifted the siege in only nine days. She was tried and executed for heresy when she was only 19 years old. The judgment was rejected by the Pope and she was declared innocent 24 years later (and canonized in 1920).
Greek mythology
The Amazons (in Greek, ) were a mythical and ancient nation of female warriors. Herodotus placed them in a region bordering Scythia in Sarmatia. The histories and legends in Greek mythology may be inspired by warrior women among the Sarmatians.
Artemis (Latin Diana) is the Greek goddess of the hunt, daughter of Zeus and Leto and twin sister to Apollo. She is usually depicted bearing a bow and arrows.
Atalanta is one of the few mortal heroines in Greek mythology. She possessed great athletic prowess: she was a skilled huntress, archer, and wrestler, and was capable of running at astounding speeds. She is said to have participated in the Argonaut expedition, and is one of the central figures in the Calydonian Boar hunt. Atalanta was renowned for her beauty and was sought by many suitors, including Melanion or Hippomenes, whom she married after he defeated her in a foot race. According to some stories, the pair were eventually turned into lions, either by Zeus or Aphrodite.
Athena (Latin: Minerva) is the goddess of wisdom, war strategy, and arts and crafts. Often shown bearing a shield depicting the gorgon Medusa (Aegis) given to her by her father Zeus. Athena is an armed warrior goddess, and appears in Greek mythology as a helper of many heroes, including Heracles, Jason, and Odysseus.
Enyo, a minor war goddess, delights in bloodshed and the destruction of towns, and accompanies Ares—said to be her father, in other accounts her brother—in battles.
Hippolyta is a queen of the Amazons, and a daughter of Ares. It was her girdle that Hercules was required by Eurystheus to obtain. He captured her and brought her to Athens, where he gave her to the ruler, Theseus, to become his bride.
Penthesilea, in a story by the Greek traveller Pausanias, is the Amazonian queen who led the Amazons against the Greeks during the Trojan War. In other stories, she is said to be the younger sister of Hippolyta, Theseus's queen, whom Penthesilea had accidentally slain while on a hunt. It was then that she joined the Trojan War to assuage her guilt. She was killed and mourned by Achilles, who greatly admired her courage, youth and beauty.
Historical Republic of Poland and Grand Duchy of Lithuania
Emilia Plater (Emilija Pliaterytė) – Polish-Lithuanian commander in the November uprising against Russia in the 19th century, who became a symbol of resistance and was immortalised in a poem by Adam Mickiewicz. She was a Polish-Lithuanian noble woman and a revolutionary from the lands of the partitioned Polish-Lithuanian Commonwealth. She fought in the November Uprising and is considered a national hero in Poland, Lithuania and Belarus, which were former parts of the Commonwealth. She is often referred to as the Lithuanian Joan of Arc, while actually her most widely known portrait is often mistaken for a picture of Joan of Arc herself in worldwide popular culture (as in the series Charmed), despite the fact that "Joan of Arc" is anachronistically portrayed in Emilia's 19th-century clothing.
Grażyna (Gražina) – a mythical Lithuanian chieftainess Grażyna who fought against the forces of the medieval Order of the Teutonic Knights, described in an 1823 narrative poem, Grażyna, by Adam Mickiewicz. The woman character is believed to have been based on Mickiewicz's own sweetheart from Kaunas, Karolina Kowalska. The name was originally conceived by Mickiewicz himself, having used the root of the Lithuanian adjective gražus, meaning "beautiful".
Portuguese legend
Brites de Almeida, aka Padeira de Aljubarrota (Baker Woman of Aljubarrota) was a Portuguese legendary figure associated with Portuguese victory at Aljubarrota Battle over Spanish forces in 1385 near Aljubarrota, Portugal. She supposedly killed seven Spanish invaders by throwing the inside an oven.
Deu-la-deu Martins, the heroine of the North. The Castilian had besieged the town of Monção for many weeks and inside the town walls, provisions were almost depleted. Knowing that the invaders also were demoralized that the town resisted for so long and without provisions themselves, Deu-la-deu ("God gave her") made loaves of bread with the little flour that remained in Monção and threw the loaves at the invaders from the walls, shouting at them defiantly "God gave these, God will give more". As a result, the Castilians gave up the siege believing that still there was a lot resistance and infinite provisions within the town walls.
Italian history, folklore and Roman mythology
Bellona is the Roman goddess of war: the Roman counterpart to the Greek war goddess Enyo. She prepared the chariot of her brother Mars when he was going to war, and appeared in battles armed with a whip and holding a torch.
Bradamante is the sister of Rinaldo, and one of the heroines in Orlando Innamorato by Matteo Maria Boiardo and Orlando Furioso by Ludovico Ariosto in their handling of the Charlemagne legends. Bradamante and her lover Ruggiero were destined to become the legendary ancestors of the royal House of Este who were the patrons to both Boiardo and Ariosto. Bradamante is depicted as one of the greatest female knights in literature. She is an expert fighter, and wields a magical lance that unhorses anyone it touches. She is also one of the main characters in several novels including Italo Calvino's surrealistic, highly ironic novel Il Cavaliere inesistente (The Nonexistent Knight).
Marfisa (or Marphisa) is another warrior woman in the Italian epic of Orlando Innamorato and Orlando Furioso.
Camilla was the Amazon queen of the Volsci. She was famous for her footspeed; Virgil claims that she could run across water and chase down horses. She was slain by Arruns while fighting Aeneas and the Trojans in Italy.
Matilda of Tuscany (1046–1115) was a powerful feudal, Margrave of Tuscany, ruler in northern Italy and the chief Italian supporter of Pope Gregory VII during the Investiture controversy; in addition, she was one of the few medieval women to be remembered for her military accomplishments, thanks to which she was able to dominate all the territories north of the Church States.
Cia Ordelaffi (1351–1357) Marzia degli Ubaldini was an Italian noblewoman from Forlì came in help of Lodovico Ordelaffi during the battle of Dovadola (part of the Guelphs and Ghibellines war). In 1357 she took part in the defense of Cesena during the Forlivesi crusade induced by Pope Innocent VI.
Caterina Sforza (1463–28 May 1509), was an Italian noble woman and Countess of Forlì and Lady of Imola first with her husband, Girolamo Riario, and, after his death, as a regent of her son, Ottaviano. The descendant of a dynasty of noted condottieri, Caterina, from an early age, distinguished herself by her bold and impetuous actions taken to safeguard her possessions from possible usurpers, and to defend her dominions from attack, when they were involved in political intrigues that were a distinguishing in Italy. When Pope Sixtus IV died, rebellions and disorder immediately spread through Rome, including looting of his supporters' residences. In this time of anarchy, Caterina, who was in her seventh month of pregnancy, crossed the Tiber on horseback to occupy the rocca (fortress) of Castel Sant'Angelo on behalf of her husband. From this position, and with the obedience of the soldiers, Caterina could monitor the Vatican and dictate the conditions for the new conclave. Famous was also her fierce resistance to the Siege of Forlì by Cesare Borgia who finally was able to capture her dressed in armor and a sword in hand. Caterina's resistance was admired throughout all Italy; Niccolò Machiavelli reports that many songs and epigrams were composed in her honour. She had a large number of children, of whom only the youngest, Captain Giovanni dalle Bande Nere, inherited the forceful, militant character of his mother. In the following centuries Caterina was remembered in the folklore as Tigre di Forlivo (The Tiger of Forlì).
Caterina Segurana (1506 – 15 August 1543), was an Italian woman from the County of Nice who distinguished herself during the Siege of Nice of 1543 in which France and the Ottoman Empire invaded the Duchy of Savoy. Caterina Segurana, a common washerwoman, led the townspeople into battle.
Clorinda is a valiant Saracen knight and the beloved of Tancred in Torquato Tasso's La Gerusalemme liberata.
Dina and Clarenza were two women of Messina who defended their city from an attack by Charles of Anjou during the War of the Sicilian Vespers.
Fantaghirò is the main character of an ancient Tuscany fairy tale named Fanta-Ghirò, persona bella, an Italian fable about a rebellious youngest daughter of a warrior king, a warrior princess. Italo Calvino comments on a variant of the tale in his collection of Fiabe italiane.
Kinzica de' Sismondi, Pisa heroine, probably a legend.
Historical Russia
White Tights are an urban legend about Baltic female snipers supposed to have fought against Russian forces in various recent conflicts.
The Polenitsa are Amazon-like warrior females of the old Russian hero epics (byline).
Scandinavian folklore and Germanic paganism
Blenda is the heroine of a legend from Småland, who leads the women of Värend in an attack on a pillaging Danish army and annihilates it.
Freyja is a fertility goddess, the sister of the fertility god Freyr and daughter of the sea god Njörðr. Freyja is also a goddess of war, battle, death, magic, prophecy, and wealth. Freyja is cited as receiving half of the dead lost in battle in her hall Sessrúmnir, whereas Odin would receive the other half. Some scholars argue that Freyja, Frigg, and Gefion are Avatars of each other. She is also sometimes associated with the Valkyries and disir.
Shieldmaidens in Scandinavian folklore were women who did not have the responsibility for raising a family and could take up arms to live like warriors. Many of them figure in Norse mythology. One of the most famous shieldmaidens is Hervor and she figures in the cycle of the magic sword Tyrfing.
The Valkyries in Norse mythology are female divine shieldmaidens, who serve Odin. The name means choosers of the slain.
Þorgerðr Hölgabrúðr and Irpa are two goddesses, described as sisters, that appear at the Battle of Hjörungavágr to assist the fleet of Haakon Sigurdsson against the Jomvikings. The two goddesses produce harsh thunderstorms, ferocious squalls, and shoot arrows from their fingertips, each arrow described as killing a man, resulting in the defeat of the Jomvikings.
Brunhild, in the Nibelungen, is "a royal maiden who reigned beyond the sea:
"From sunrise to the sundown no paragon had she.
All boundless as her beauty was her strength was peerless too,
And evil plight hung o'er the knight who dared her love to woo.
For he must try three bouts with her; the whirling spear to fling;
To pitch the massive stone; and then to follow with a spring;
And should he beat in every feat his wooing well has sped,
But he who fails must lose his love, and likewise lose his head."
In The saga of Hrolf Kraki, Skuld (not to be confused with the Norn of the same name) was a half-elven princess who raised an army of criminals and monsters to take over the throne of her half-brother Hrolfr Kraki, using necromancy to resurrect any fallen soldiers before she personally saw to Kraki's end.
Lagertha: Lagertha was, according to legend, a Viking shieldmaiden and ruler from what is now Norway, and the onetime wife of the famous Viking Ragnar Lodbrok. Her tale, as recorded by the chronicler Saxo in the 12th century, may be a reflection of tales about Thorgerd (Þorgerðr Hölgabrúðr), a Norse deity.
Spain
Agustina de Aragón ('Agustina, maid of Aragon', also known as "the Spanish Joan of Arc") was a famous Spanish heroine who defended Spain during the Spanish War of Independence, first as a civilian and later as a professional officer in the Spanish Army. She has been the subject of much folklore, mythology, and artwork, including sketches by Goya. Her most famous feat was at the bloody sieges of Saragossa where, at the moment the Spanish troops abandoned their posts not to fall to nearby French bayonets, she ran forward, loaded a cannon, and lit the fuse, shredding a wave of attackers at point blank range. The sight of a lone woman bravely manning the cannons inspired the fleeing Spanish troops and other volunteers to return and assist her.
Ana María de Soto, was the first female marine (infante de Marina) in the world. She joined the Armada at the age of 16, in 1793, posing as a man, with the name of Antonio Maria de Soto, embarking on the frigate Mercedes. She fought in the battles of Banyuls-sur-Mer, Roses, Cape St. Vincent and Cádiz. She was noticed as a woman during a routine medical recognition, and given the rank and salary of sergeant, in 1798. She was authorized to use the marines' colours and sergeant's chevrons in her woman clothes.
La Galana ('Juana Galán') was another woman who fought in the Spanish War of Independence. She defended Valdepeñas, armed with a baton and aided by the rest of the women in the village because there were not enough men in Valdepeñas due to the war circumstances. They threw boiling water and oil through the windows. French soldiers were delayed in arriving at the Battle of Bailen because of this, so Spanish forces won. Also see Valdepeñas Uprising for more information about this guerrilla action.
La Fraila lived in Valdepeñas as Juana Galán did. During the Spanish War of Independence offered food and rest in Valdepeñas' hermitage to the French soldiers. When they were sleeping, La Fraila (which is an alias and her actual name is unknown) closed the doors and set the hermitage on fire using gunpowder as vengeance of her son's death by the French army. She died in the fire as well.
María Pita. She defended A Coruña against Sir Francis Drake's army.
Catalina de Erauso or The Nun Lieutenant (La Monja Alférez) was a personality of the Basque Country, Spain and Spanish America in the first half of the 17th century. At the age of fifteen, the age in which Catalina would be required to make her final vows and profess herself a nun, Catalina decided that she was not going to allow her family's traditions or strong religious beliefs guide her life. She ran away from the convent on 18 March 1600. Catalina disguised herself by dressing as a man, and began her journey to the New World. She gave herself the name, "Francisco de Loyola". She participated in several battles. As a prisoner, she confessed her sex to the bishop, Fray Agustín de Carvajal. Induced by Fray she entered a convent and her story spread across the ocean. In 1620, the archbishop of Lima called her. In 1624, she arrived in Spain, having changed ship after another fight. On 29 June 1626, Catalina de Erauso was seen by Pope Urban VIII, who granted her a special dispensation that would allow her to continue to wear men's clothing. She wrote her memoirs: Historia de la monja alférez escrita por ella misma.
West Asia
Antiquity Arabia
Queen Mavia (r 375–425) was an Arab warrior-queen, who ruled over the Tanukhids, a confederation of semi-nomadic Arabs, in southern Syria, in the latter half of the fourth century. She led her troops in a rebellion against late Roman rule, riding at the head of her army into Phoenicia and Palestine. After reaching the frontiers of Egypt and repeatedly defeating the Roman army, the Romans finally made a truce with her on conditions she stipulated.
Queen Zenobia of Palmyra
Islamic Arabia
Khawlah bint al-Azwar was the daughter of one of the chiefs of Bani Assad tribe, and her family embraced Islam in its first days. The recorded history of that era mentions repeatedly the feats of Khawla in battles that took place in Syria, Lebanon, Jordan and Palestine. In one instance, she fought in disguise as a man to rescue her brother Derar after the Romans captured him. The Romans eventually lost the battle and fled. When her identity was discovered, the commander of the Muslim army was very impressed with her courage, and he allowed her to lead the attack against the fleeing Romans; they were defeated and the prisoners were all released. In another battle in Ajnadin, Khawla's spear broke, and her mare was killed, and she found herself a prisoner. But she was astonished to find that the Romans attacked the women camp and captured several of them. Their leader gave the prisoners to his commanders, and ordered Khawla to be moved into his tent. She was furious, and decided that to die is more honorable than living in disgrace. She stood among the other women, and called them to fight for their freedom and honor or die. They took the tents' poles and pegs and attacked the Roman guards, keeping a formation of a tight circle, as she told them. Khawla led the attack, killed the first guard with her pole, with the other women following her. According to Al Wakidi, they managed to kill 30 Roman soldiers, five of whom were killed by Khawla herself, including the soldier who wanted to rape her. She was a brunette, tall, slim and of great beauty, and she was also a distinguished poet.
Nusaybah bint Ka’ab, also known as Umm Ammarah (Ammarah's mother), a Hebrew woman by origin from the Banu Najjar tribe, was an early convert to Islam. Nusaybah was attending the Battle of Uhud like other women, and her intention was to bring water to the soldiers, and attend the wounded while her husband and son fought on the side of the Muslims. But after the Muslim archers disobeyed their orders and began deserting their high ground believing victory was at hand, the tide of the battle changed, and it appeared that defeat was imminent. When this occurred, Nusaybah entered the battle, carrying a sword and shield. She shielded Muhammad from the arrows of the enemy, and received several wounds while fighting. She was highly praised by Muhammad on her courage and heroism. During the battle her son was wounded and she cut off the leg of the aggressor.
Hind bint Utbah, was a former opponent of prophet Muhammad in the late 6th and early 7th centuries whom later converted to Islam. She took part in the Battle of Yarmouk in 636, fighting the Byzantine Romans and encouraging the male soldiers to join her, which became one of major key to Muslim victory over Byzantines in the Levant.
Asmā' bint Abi Bakr, she was one of Abu Bakr As-Siddiq, the first Rashidun Caliph's daughter. She also took part in the Battle of Yarmouk and was one of the key instrumental of Byzantine's army defeat. Al-Waqidi wrote that the Quraysh women fought harder than the men. Every time the men ran away, the women fought, fearing that if they lost, the Romans would enslave them.
Ghazala, one of Kharijite leaders against Umayyad rule. She made the notorious Umayyad-Iraqi general Hajjāj ibn-Yūsuf flee, and take refuge in his palace in Kufa. Ghazāla also led her male warriors in prayer as well as recited two of the longest chapters from the Quran during the prayer in the Mosque.
Delhemma was a Muslim commander during the Arab–Byzantine wars. Her real name is Fatima bint Mazlum from Banu Kilab tribe.
Mesopotamian mythology
Ishtar is the Assyrian and Babylonian counterpart to the Sumerian Inanna and to the cognate Phoenician goddess Astarte. Anunit, Atarsamain and Esther are alternative names for Ishtar. Ishtar is a goddess of fertility, sexual love, and war. In the Babylonian pantheon, she "was the divine personification of the planet Venus".
Semiramis was a legendary Assyrian empress-regnant who first came to prominence for her bravery in battle and greatly expanded her empire.
Old Testament
Deborah, a prophetess mentioned in the Book of Judges, was a poet who rendered her judgments beneath a palm tree between Ramah and Bethel in the land of Benjamin. After her victory over Sisera and the Canaanite army, there was peace in the land for forty years.
Persian mythology and history of Iran/historical Persia
Apranik was a Sasanian military commander. She commanded the army of Yazdegerd III against the Arab invasion of 651 AD.
Artemisia I of Caria was a queen of the ancient Greek city-state of Halicarnassus and of the nearby islands of Kos, Nisyros and Kalymnos, within the Achaemenid satrapy of Caria, in about 480 BC. She was of Carian-Greek ethnicity by her father Lygdamis I, and half-Cretan by her mother. She was the first woman admiral. She fought as an ally of Xerxes I, King of Persia against the independent Greek city states during the second Persian invasion of Greece. She personally commanded her contribution of five ships at the naval battle of Artemisium and in the naval Battle of Salamis in 480 BC. She is mostly known through the writings of Herodotus, himself a native of Halicarnassus, who praises her courage and the respect in which Xerxes held her.
Gordafarid is one of the heroines in the Shāhnāmeh. She was a champion who fought against Sohrab (another Iranian hero who was the commander of the Turanian army) and delayed the Turanian troops who were marching on Persia.
Banu Goshasp is an important heroine in Persian mythology. She is the daughter of Rustam and the wife of the hero Giv.
Banu Khorramdin fought against the occupying Arab forces of the Abbasid Caliphate with her husband, Babak Khorramdin, leader of the Khorram-Dinān.
Tomyris reigned over the Massagetae, an Iranian people from Scythian pastoral-nomadic confederation of Central Asia. Tomyris led her armies to defend against an attack by Cyrus the Great of the Achaemenid Empire, and, according to Herodotus, defeated and killed him in 530 BC.
Phoenician mythology
Ashtart Phoenician "ʻštrt" (ʻAshtart); and Hebrew עשתרת (Ashtoreth, singular, or Ashtarot, plural); Greek (Astarte) is the Phoenician counterpart to the Sumerian Inanna and to the cognate Babylonian goddess Ishtar as well as the Greek Aphrodite. She is a goddess of fertility, sexual love, and war. Ashtoreth is mentioned in the Hebrew Bible as a foreign, non-Judahite goddess, the principal goddess of the homeland of the Phoenicians which is in modern-day Lebanon, representing the productive power of nature. Herodotus wrote that the religious community of Aphrodite originated in Phoenicia (modern day Lebanon) and came to Greeks from there. He also wrote about the world's largest temple of Aphrodite, in one of the Phoenician cities.
Tanit is a Phoenician lunar goddess, worshiped as the patron goddess at Carthage. Her shrine excavated at Sarepta in southern Phoenicia (Carthage) revealed an inscription that identified her for the first time in her homeland (Phoenicia of the Levant) and related her securely to the Phoenician goddess Astarte/Ashtart. In Egyptian, her name means Land of Neith, Neith being a war goddess. Long after the fall of Carthage, Tanit is still venerated in North Africa under the Latin name of Juno Caelestis, for her identification with the Roman goddess Juno. Hvidberg-Hansen (Danish professor of Semitic philology), notes that Tanit is sometimes depicted with a lion's head, showing her warrior quality. In modern times the name, with the spelling "Tanith", has been used as a female given name, both for real people and, more frequently, in occult fiction. From the 5th century BC onwards, Tanit is associated with that of Ba`al Hammon. She is given the epithet pene baal ("face of Baal") and the title rabat, the female form of rab (chief).
South Asia
Akkadevi (11th century) was a princess of the Chalukya dynasty of Karnataka and governor of an area known as Kishukādu. She was known as a capable general who laid siege to the fort of Gōkāge or Gōkāk to quell a rebellion.
Nayakuralu Nagamma (12th century) was a statesperson in the to King Nalagama, the ruler of Palnadu in Guntur District, known as a key participant in the Battle of Palnadu.
Razia Sultana (r 1236–1240), usually referred to in history as Razia Sultan or Razia Sultana, was the Sultana of Delhi in India from 1236 to 1240. She was of Mamluk ancestry and like some other Muslim princesses of the time, she was trained to lead armies and administer kingdoms if necessary. Razia Sultana, the fifth Mamluk Sultan, was the very first woman ruler in Muslim history.
Rani Rudrama Devi (1259–1289) was one of the most prominent rulers of the Kakatiya dynasty on the Deccan Plateau, is one of the few ruling queens in Indian history. She was born, as Rudrama, to King Ganapathideva (or Ganapatideva, or Ganapathi Devudu). As Ganapathideva had no sons, Rudrama was formally designated as a son through the ancient Putrika ceremony and given the male name of Rudradeva. When she was only fourteen years old, Rani Rudrama Devi succeeded her father. Rudramadevi was married to Veerabhadra, Eastern Chalukyan prince of Nidadavolu.
Rani Mangammal (1689–1704) was a queen regent on behalf of her grandson, in the Madurai Nayak kingdom in present-day Madurai, India, towards the end of the century. She was a popular administrator and is still widely remembered as a maker of roads and avenues, and a builder of temples, tanks, and choultries with many of her public works still in use. She is also known for her diplomatic and political skills and successful military campaigns. The capital of Madurai Kingdom during her times was Tiruchy.
Rani Velu Nachiyar (Tamil: இராணி வேலு நாச்சியார்) was an 18th-century Indian Queen from Sivaganga. Rani Velu Nachiyar was the first Queen to fight against the British in India, even preceding the famous Rani Laxmibai of Jhansi. She was the princess of Ramanathapuram and the daughter of Chellamuthu Sethupathy. She married the king of Siva Gangai and they had a daughter – Vellachi Nachiar. When her husband Muthuvaduganathaperiya Udaiyathevar was killed, she was drawn into battle. Her husband and his second wife were killed by a few British soldiers and the son of the Nawab of Arcot. She escaped with her daughter, lived under the protection of Hyder Ali at Virupachi near Dindigul for eight years. During this period, she formed an army and sought an alliance with Gopala Nayaker and Hyder Ali with the aim of attacking the British. In 1780, Rani Velu Nachiyar fought the British with military assistance from Gopala Nayaker and Hyder Ali and won the battle. When Velu Nachiyar finds the place where the British stock their ammunition, she builds the first human bomb. A faithful follower, Kuyili douses herself in oil, lights herself and walks into the storehouse. Rani Velu Nachiyar formed a woman's army named “udaiyaal” in honour of her adopted daughter — Udaiyaal, who died detonating a British arsenal. Nachiar was one of the few rulers who regained her kingdom and ruled it for 10 more years.
Chand Bibi (1550–1599), also known as Chand Khatun or Chand Sultana, was an Indian Muslim woman warrior. She acted as the Regent of Bijapur (1580–90) and Regent of Ahmednagar (1596–99). Chand Bibi is best known for defending Ahmednagar against the Mughal forces of Emperor Akbar.
Abbakka Rani or Abbakka Mahadevi was the queen of Tulu Nadu who fought the Portuguese in the latter half of the 16th century. She belonged to the Chowta dynasty who ruled over the area from the temple town of Moodabidri. In Dakshina Kannada's Bantwal taluk, a historian has erected a museum in the memory of a 16th-century warrior queen. The man behind the museum, called Tulu Baduku Museum, is Prof. Thukaram Poojary and his subject is Rani Abbakka Chowta of Ullal. The only woman in history to confront, fight and repeatedly defeat the Portuguese, Rani Abbakka's unflagging courage and indomitable spirit are at par with the legendary Rani Laxmi Bai of Jhansi, Rani Rudramma Devi of Warangal and Rani Chennamma of Kittur. Yet, little is written about her or her incredible story in the history books.
Tarabai (1675–1761) was a queen of the Maratha Empire in India.
Bibi Dalair Kaur was a 17th-century Sikh woman who fought against the Mughal Empire.
Bibi Sahib Kaur (1771–1801) was a Sikh princess and elder sister of Raja Sahib Singh of Patiala. Her brother recalled her after her marriage and appointed her prime minister in 1793. She led armies into battle against the British and was one of few Punjabi Sikh women to win battles against a British general.
Mai Bhago was a Sikh woman who led Sikh soldiers against the Mughals in 1704. She is known for leading a small force of 40 Sikh warriors to repulse a much larger Mughal army in the Battle of Muktsar. She is revered as a saint in Sikhism.
Onake Obavva (18th century) was a woman who fought the forces of Hyder Ali single-handedly with a masse (Onake) in the small kingdom of Chitradurga in the Chitradurga district of Karnataka, India. She is considered to be the epitome of Kannada women pride, with the same standing as Kittur Chennamma and Keladi Chennamma.
Kittur Chennamma (1778–1829) was the queen of the princely state of Kittur in Karnataka. She is known for having led an armed rebellion against the British East India Company in 1824 in defiance of the doctrine of lapse in an attempt to maintain Indian control over the region. Her legacy and first victory are still commemorated in Kittur, during the Kittur Utsava of every 22–24 October.
Begum Hazrat Mahal (1820–1879) was a warrior who rebelled against the British East India Company during the Indian Rebellion of 1857 and participated in the attack on Shahjahanpur.
Rani Lakshmibai (1828–1858) known as Jhansi Ki Rani, was the queen of the Maratha-ruled the princely state of Jhansi, was one of the leading figures of the India Rebellion of 1857, and a symbol of resistance to British rule in India.
Jhalkaribai (1830–1858) was an advisor and soldier in Rani Lakshmibai's army. She is known for having disguised herself as the Queen and fought on her behalf, on the front, allowing the Queen to escape safely out of the fort, at the height of the Siege of Jhansi.
Avantibai ( –1857) was a warrior who raised an army of 4000 and defeated British forces in a battle in Mandla district, Madhya Pradesh during the India Rebellion of 1857.
Uda Devi ( –1857) was a warrior who fought in the Battle of Sikandar Bagh in November 1857, part of the India Rebellion of 1857.
Rani Durgavati (1524–1564) was a Queen of Gondwana known for resisting the invasions of Bayazid Baz Bahadur Khan of the Malwa Sultanate and Mughal emperor Akbar.
Keladi Chennamma (1677-1696) was the daughter of Siddappa Setty of Kundapur. She became the queen of Keladi Nayaka dynasty who fought the Mughal Army of Aurangzeb from her base in the kingdom of Keladi in the Shimoga district of Karnataka State, India. Her rule lasted for 25 years and Keladi kingdom was probably the last to lose autonomy to Mysore rulers and subsequently to British.
Belawadi Mallamma, to defend her husband's kingdom, she fought against the Maratha king Shivaji Maharaj.
Unniyarcha: She was a chekava/Ezhava woman warrior from Kerala famous for her valour and beauty.
Hinduism Mythology
Durga ( or "the invincible", ) is a form of Devi, the supreme goddess of Hinduism. According to the narrative from the Devi Mahatmya of the Markandeya Purana, the form of Durga was created as a warrior goddess to fight a demon. The nine-day holiday dedicated to Durga, The Durga Puja, is the biggest annual festival in Bengal and other parts of Eastern India and is celebrated by Hindus all over the world.
Kālī (, ; ; ; ; ; ; ), also known as (, ), is the Hindu goddess associated with empowerment, shakti. The name Kali comes from kāla, which means black, time, death, lord of death, and thus another name for Shiva. Kali means "the black one". Although sometimes presented as dark and violent, her earliest incarnation as a figure of annihilation still has some influence. In Kāli's most famous myth, Durga and her assistants, the Matrikas, wound the demon Raktabija, in various ways and with a variety of weapons in an attempt to destroy him. They soon find that they have worsened the situation, for, with every drop of blood that is spilled from Raktabija, he reproduces a clone of himself. The battlefield becomes increasingly filled with his duplicates. Durga, in need of help, summons Kāli to combat the demons. It is said, in some versions, that the Goddess Durga actually assumes the form of Goddess Kāli at this time. Kali destroys Raktabija by sucking the blood from his body and putting the many Raktabija duplicates in her gaping mouth. Pleased with her victory, Kali then dances on the field of battle, stepping on the corpses of the slain. Her consort Shiva lies among the dead beneath her feet, a representation of Kali commonly seen in her iconography as Daksinakali.
Other warrior goddesses include Chamunda ("the killer of demon Chanda and Munda") and the goddess group Matrikas ("Mothers").
Vishpala (in The Rigveda) is a warrior queen who, after having lost a leg in battle had an iron prosthesis made. Afterwards, she returned to fight.
Central Asia
Afghanistan
Malalai of Maiwand
Malalai of Maiwand is a national folk hero of Afghanistan who rallied local Pashtun fighters against the British troops at the 1880 Battle of Maiwand.
See also
List of female action heroes
Woman warrior
Timeline of women in early modern warfare
References
Further reading
Addison, Catherine. «The Maiden on the Battlefield: War and Estrangement in Southey’s Joan Of Arc». In: Romanticism on the Net no 32-33 (2003). https://doi.org/10.7202/009262ar
Clover, Carol J. "Maiden Warriors and Other Sons." The Journal of English and Germanic Philology 85, no. 1 (1986): 35–49. Accessed 28 June 2020. www.jstor.org/stable/27709600.
Koser, Julie. Armed Ambiguity: Women Warriors in German Literature and Culture in the Age of Goethe. EVANSTON, ILLINOIS: Northwestern University Press, 2016. Accessed 28 June 2020. www.jstor.org/stable/j.ctv47w31v.
Milligan, Gerry. Moral Combat: Women, Gender, and War in Italian Renaissance Literature. Toronto; Buffalo; London: University of Toronto Press, 2018. Accessed 28 June 2020. www.jstor.org/stable/10.3138/j.ctt22rbk05.
Weaver, Elissa B. "Review" [Reviewed Work: The Fortunes of the Warrior Heroine in Italian Literature: An Index of Emancipation. by Margaret Tomalin]. In: Renaissance Quarterly 36, no. 3 (1983): 456–59. Accessed 28 June 2020. doi:10.2307/2862185.
Women in mythology
War goddesses
Lists of women |
241282 | https://en.wikipedia.org/wiki/Avie%20Tevanian | Avie Tevanian | Avadis "Avie" Tevanian (born 1961) is an American software engineer. At Carnegie Mellon University, he was a principal designer and engineer of the Mach operating system (also known as the Mach Kernel). He leveraged that work at NeXT Inc. as the foundation of the NeXTSTEP operating system. He was senior vice president of software engineering at Apple from 1997 to 2003, and then chief software technology officer from 2003 to 2006. There, he redesigned NeXTSTEP to become macOS. Apple’s macOS and iOS both incorporate the Mach Kernel, and iPadOS, watchOS, and tvOS are all derived from iOS. He was a longtime friend of Steve Jobs.
Early life
Tevanian is from Westbrook, Maine. He is of Armenian descent. Tevanian cloned the 1980s arcade game Missile Command, giving it the same name in a version for the Xerox Alto, and Mac Missiles! for the Macintosh platform. He has a B.A. in mathematics from the University of Rochester and M.S. and Ph.D. degrees in computer science from Carnegie Mellon University. There, he was a principal designer and engineer of the Mach operating system.
Career
NeXT Inc.
He was Vice President of Software Engineering at NeXT Inc. and was responsible for managing NeXT's software engineering department. There, he designed the NeXTSTEP operating system, based upon his previous academic work on Mach.
Apple Inc.
He was senior vice president of software engineering at Apple from 1997 to 2003, and then chief software technology officer from 2003 to 2006. There, he redesigned NeXTSTEP to become macOS, which became iOS.
In United States v. Microsoft in 2001, he was a witness for the United States Department of Justice, testifying against Microsoft.
Theranos and Dolby Labs
Tevanian left Apple on March 31, 2006, and joined the board of Dolby Labs and Theranos, Inc. He resigned from the board of Theranos in late 2007, with an acrimonious ending as he faced legal threats and was forced to waive his right to buy a company cofounder's shares, actions he believed were in retaliation for the skepticism he was often alone in expressing about the company's finances and progress in developing its technology at board meetings. In May 2006, he joined the board of Tellme Networks, which was later sold to Microsoft. On January 12, 2010, he became managing director of Elevation Partners. In July 2015, he cofounded NextEquity Partners and is currently serving as Managing Director.
References
External links
Avie Tevanian, oral history, Computer History Museum
American people of Armenian descent
Armenian scientists
Apple Inc. employees
Apple Inc. executives
Carnegie Mellon University alumni
American computer scientists
Living people
NeXT
University of Rochester alumni
People from Westbrook, Maine
Macintosh operating systems people
Date of birth missing (living people)
Place of birth missing (living people)
Theranos people
1961 births |
19509855 | https://en.wikipedia.org/wiki/Muhammed%20Lawal | Muhammed Lawal | Oklahoma State Cowboys
Central Oklahoma Bronchos
Muhammed Lawal (born January 11, 1981), also known as "King Mo", is an American professional wrestler and retired mixed martial artist currently signed to Major League Wrestling. As a mixed martial artist, he is a former Strikeforce Light Heavyweight Champion and Rizin Heavyweight Grand Prix Champion.
Early life
Lawal was raised along with his siblings by a single Muslim mother. Growing up Lawal was a fan of professional wrestling and began competing in wrestling at Plano East Senior High School in Plano, Texas. As a junior Lawal won a state title in the Greco-Roman category and also finished as a state runner-up. During his senior season Lawal went undefeated and became a state champion after defeating 171 pound favorite Barrett Lidji. Lawal also competed in football, earning All-District honors as a linebacker during his junior season and as a wide receiver in his senior season. Lawal also lettered in track and field.
Lawal went on to compete in NCAA Division II wrestling at the University of Central Oklahoma. He finished in 2nd place in the nation in 2001 and was a national champion in 2002. For his senior year Lawal moved on to Division I at Oklahoma State University. Lawal became a Big 12 Conference Champion and Division I All-American in 2003 for Oklahoma State, where he finished in third place for the 197 pound division. Lawal was also the university freestyle national champion at 185 pounds this year. After college Lawal continued his wrestling career at the senior level, and also
competed in the newly formed Real Pro Wrestling league and became the champion of the 184 pound weight class in 2004.
He won the Senior U.S. national championship in freestyle wrestling three times - in 2005, 2006 and 2008. He also represented the U.S. at the 2005 World Wrestling Championships, where he finished in 7th place. He controversially lost his match to Sazhid Sazhidov of Russia when he was penalized a point for passivity with 1 second remaining in a match he was winning, giving Sazhidov the win. Revaz Mindorashvili would be the gold medalist at these games, a wrestler Lawal has defeated.
For over three years, Lawal was the number one ranked wrestler in the United States in the 84 kilogram division. After narrowly missing entrance to the 2008 Olympics in a loss to Andy Hrovat, for which he was favored a spot, Lawal decided to enter the world of mixed martial arts.
Mixed martial arts career
World Victory Road
In his 2008 mixed martial arts debut at Sengoku 5, Lawal fought Travis Wiuff, a veteran of 66 fights at the time, knocking him out in the first round.
At Sengoku 6, Lawal fought Fábio Silva on November 1, 2008, defeating him in the third round via strikes.
On January 4, 2009 Lawal faced Yukiya Naito at World Victory Road Presents: Sengoku no Ran 2009, defeating him in the first round with punches.
On March 20, 2009 at Sengoku 7, Lawal defeated Ryo Kawamura by unanimous decision. His first time going the distance, Lawal attributed his performance to a knee injury sustained about a week before the fight, "I kinda tweaked it rolling around [with Dean Lister], and I tried to rehab it as much as I could before the fight."
M-1 Global
On August 28, 2009 Lawal fought for the first time on U.S. soil against Mark Kerr at M-1 Global Presents Breakthrough. Lawal defeated Kerr by technical knockout 25 seconds into the fight.
Strikeforce
On October 13, 2009, it was announced that Lawal had signed a multi-fight contract with U.S. based promotion Strikeforce. The contract allowed him to continue fighting in the Japanese circuit where he has gained his notoriety.
On December 19 at Strikeforce: Evolution Lawal fought Mike Whitehead, defeating him three minutes and eight seconds into round one via KO (punches). Lawal came in showing relaxed hands and strong counter punching and caught Whitehead with a strong right which dropped him. Lawal followed up with three punches causing the referee to stop the fight.
On April 17, 2010, Lawal defeated Gegard Mousasi by unanimous decision to win the Strikeforce Light Heavyweight Championship.
Lawal lost the Strikeforce Light Heavyweight Championship in Houston Texas, on August 21, against Rafael Cavalcante by TKO due to punches and elbows of 1:14 of round 3.
Lawal was out of action until mid-2011 after undergoing surgery to repair a knee injury.
Lawal was scheduled to fight Roger Gracie at Strikeforce: Fedor vs. Henderson on July 30, 2011. Gracie, however, withdrew from the bout in late June due to an injury. The fight was rescheduled for Strikeforce World Grand Prix: Barnett vs. Kharitonov on Sept. 10, 2011, and Lawal won via KO in the first round.
Lawal garnered his second straight victory, defeating previously unbeaten Lorenz Larkin at Strikeforce: Rockhold vs. Jardine via second-round KO. However, Lawal tested positive for anabolic steroids (Drostanolone) and as a result of the banned substance, the fight's result has been changed to a no contest while Lawal will have his license suspended for one year. After meeting with the Nevada State Athletic Commission on March 27, 2012 his suspension was reduced to nine months.
Lawal was released from Strikeforce following comments he made on Twitter regarding Pat Lundvall after his hearing for his drug test. Lawal said, "She asked if I did research for my training. I didn't get what she meant by the question, and she rolled her eyes and asked, 'Do you speak English? Can you read?' I felt I was disrespected by the woman's comments. How are you going to ask a college educated, well traveled man if he can speak or read English? I'm speaking English right in front of you and I've been speaking English right in front of you for the past 15 minutes."
After the release, Lawal issued an apology to Lundvall, stating, "I was out of line for calling the woman the b-word and I was wrong for that. I was kind of mad about the comments, I was offended by the comments made towards me and I was out of line. I was too emotional. I apologize for that. With that being said, I still feel that I was offended, but I'm in the wrong for what I said."
Bellator MMA
On May 10, 2012, it was reported that Lawal had signed a contract with the mixed martial arts promotion Bellator Fighting Championships.
On January 24, 2013, Lawal made his Bellator debut as a participant in the Season 8 light heavyweight tournament. He defeated Przemyslaw Mysiala in the quarterfinal round via right hook. Lawal faced Emanuel Newton in the semifinals on February 21, 2013 at Bellator 90. Despite being a considerable favorite, Lawal lost via KO due to a spinning back fist in the first round.
Lawal faced Seth Petruzelli in the opening round of a 4-man tournament at Bellator 96 on June 19, 2013, he won the fight by KO due to a punch in full guard at 1:35 of the first round.
Lawal next faced Jacob Noe at Bellator 97 in the light heavyweight tournament final. He won via TKO due to punches in round three to win the Bellator 2013 Summer Series light heavyweight tournament.
Lawal faced Emanuel Newton in a rematch for the Interim Bellator Light Heavyweight Championship on November 2, 2013 at Bellator 106. Lawal lost via unanimous decision.
Lawal entered into the Bellator season ten light heavyweight tournament on February 28, 2014. He faced Mikhail Zayats in the semifinals at Bellator 110 and won the fight via unanimous decision. He faced Quinton Jackson in the tournament final for a title shot. He lost the fight via controversial unanimous decision.
Muhammed Lawal was scheduled to fight Tom DeBlass on September 5, 2014 at Bellator 123; however, Tom DeBlass suffered a knee injury and was forced off the card. Lawal was expected to fight replacement Marcus Sursa at Bellator 123; however instead faced Dustin Jacoby. Lawal won the fight via TKO in the second round.
Lawal was again expected to face Tom DeBlass on November 15, 2014 at Bellator 131. However, on November 1, it was announced that Deblass had suffered a cut during training and had to withdraw from the bout. Lawal eventually faced Joe Vedepo. He won via TKO due to punches in the third round.
Lawal faced Cheick Kongo in a heavyweight bout on February 27, 2015 at Bellator 134. He won the fight by split decision.
Lawal was next a participant in Bellator's one-night light heavyweight tournament at Bellator MMA & Glory: Dynamite 1 on September 19, 2015. He faced Linton Vassell in the opening round and won by unanimous decision. However, Lawal was unable to advance to the finals due to a rib injury.
Lawal faced Phil Davis at Bellator 154 on May 14, 2016. The bout was to determine the next challenger for champion Liam McGeary. He lost the fight by unanimous decision.
Lawal faced Satoshi Ishii at Bellator 169 on December 16, 2016. He won the fight via unanimous decision.
Lawal faced Quinton Jackson in a rematch at Bellator 175 on March 31, 2017. He won the fight via unanimous decision, thus avenging his previous loss to Jackson. Post-fight, it was announced Lawal would face Ryan Bader at Bellator 180. However, Lawal pulled out of the bout in April and was replaced by Phil Davis.
Lawal was expected to face Liam McGeary at Bellator 185 on October 20, 2017. However, he pulled out of the bout on October 2 due to an undisclosed injury.
Lawal faced Ryan Bader in the Bellator Heavyweight Grand Prix for the Bellator Heavyweight championship at Bellator 199 on May 12, 2018. He lost the fight via TKO just 15 seconds into the first round.
Lawal faced former Bellator Light Heavyweight World Champion Liam McGeary at Bellator 213 on December 15, 2018. He lost the fight via TKO in the third round.
RIZIN Fighting Federation Tournament
On November 6, 2015, RIZIN Fighting Federation announced that Lawal would represent Bellator in 8-man tourney at New Year's Eve Rizin card in Japan. His first opponent was initially supposed to be BAMMA heavyweight champ Mark Godbeer, but he eventually faced Brett McDermott. Lawal won the fight via knockout in the first round. He faced Teodoras Aukstuolis in the semi-final round on December 31, 2015 and won via unanimous decision after two rounds. In the tournament finals, Lawal faced Jiří Procházka and won the fight via knockout in the first round.
On December 29, 2016, Lawal returned to Rizin FF as a participant in the Openweight Grand-Prix, replacing an injured Wanderlei Silva in a bout against Mirko Cro Cop. Lawal lost to Cro Cop via TKO in the second round.
Mixed martial arts record
|-
|Loss
|align=center|21–10 (1)
|Andrew Kapel
|KO (punches)
|Bellator 233
|
|align=center|1
|align=center|1:22
|Thackerville, Oklahoma, United States
|
|-
|Loss
|align=center|21–9 (1)
|Jiří Procházka
|TKO (punches)
|Rizin 15
|
|align=center|3
|align=center|3:02
|Yokohama, Japan
|
|-
| Loss
| align=center|21–8 (1)
|Liam McGeary
|TKO (punches)
|Bellator 213
|
|align=center|3
|align=center|0:53
|Honolulu, Hawaii, United States
|
|-
| Loss
| align=center|21–7 (1)
| Ryan Bader
| TKO (punches)
| Bellator 199
|
| align=center| 1
| align=center| 0:15
| San Jose, California, United States
|
|-
| Win
| align=center| 21–6 (1)
| Quinton Jackson
| Decision (unanimous)
| Bellator 175
|
| align=center| 3
| align=center| 5:00
| Rosemont, Illinois, United States
|
|-
| Loss
| align=center| 20–6 (1)
| Mirko Cro Cop
| TKO (punches)
| Rizin World Grand Prix 2016: 2nd Round
|
| align=center| 2
| align=center| 1:41
| Saitama, Japan
|
|-
| Win
| align=center| 20–5 (1)
| Satoshi Ishii
| Decision (unanimous)
| Bellator 169
|
| align=center| 3
| align=center| 5:00
| Dublin, Ireland
|
|-
| Loss
| align=center| 19–5 (1)
| Phil Davis
| Decision (unanimous)
| Bellator 154
|
| align=center| 3
| align=center| 5:00
| San Jose, California, United States
|
|-
| Win
| align=center| 19–4 (1)
| Jiří Procházka
| KO (punch)
| rowspan=2|Rizin World Grand Prix 2015: Part 2 - Iza
| rowspan=2|
| align=center| 1
| align=center| 5:09
| rowspan=2|Saitama, Japan
|
|-
| Win
| align=center| 18–4 (1)
| Teodoras Aukstuolis
| Decision (unanimous)
|align=center| 2
|align=center| 5:00
|
|-
| Win
| align=center| 17–4 (1)
| Brett McDermott
| KO (punch)
| Rizin World Grand Prix 2015: Part 1 - Saraba
|
|align=center| 1
| align=center| 9:20
| Saitama, Japan
|
|-
| Win
| align=center| 16–4 (1)
| Linton Vassell
| Decision (unanimous)
| Bellator 142: Dynamite 1
|
| align=center| 2
| align=center| 5:00
| San Jose, California, United States
|
|-
| Win
| align=center| 15–4 (1)
| Cheick Kongo
| Decision (split)
| Bellator 134
|
| align=center| 3
| align=center| 5:00
| Uncasville, Connecticut, United States
|
|-
| Win
| align=center| 14–4 (1)
| Joe Vedepo
| TKO (punches)
| Bellator 131
|
| align=center| 3
| align=center| 0:39
| San Diego, California, United States
|
|-
| Win
| align=center| 13–4 (1)
| Dustin Jacoby
| TKO (punches)
| Bellator 123
|
| align=center| 2
| align=center| 1:13
| Uncasville, Connecticut, United States
|
|-
| Loss
| align=center| 12–4 (1)
| Quinton Jackson
| Decision (unanimous)
| Bellator 120
|
| align=center| 3
| align=center| 5:00
| Southaven, Mississippi, United States
|
|-
| Win
| align=center| 12–3 (1)
| Mikhail Zayats
| Decision (unanimous)
| Bellator 110
|
| align=center| 3
| align=center| 5:00
| Uncasville, Connecticut, United States
|
|-
| Loss
| align=center| 11–3 (1)
| Emanuel Newton
| Decision (unanimous)
| Bellator 106
|
| align=center| 5
| align=center| 5:00
| Long Beach, California, United States
|
|-
| Win
| align=center| 11–2 (1)
| Jacob Noe
| TKO (punches)
| Bellator 97
|
| align=center| 3
| align=center| 2:51
| Rio Rancho, New Mexico, United States
|
|-
| Win
| align=center| 10–2 (1)
| Seth Petruzelli
| KO (punch)
| Bellator 96
|
| align=center| 1
| align=center| 1:35
| Thackerville, Oklahoma, United States
|
|-
| Loss
| align=center| 9–2 (1)
| Emanuel Newton
| KO (spinning back fist)
| Bellator 90
|
| align=center| 1
| align=center| 2:35
| West Valley City, Utah, United States
|
|-
| Win
| align=center| 9–1 (1)
| Przemyslaw Mysiala
| KO (punch)
| Bellator 86
|
| align=center| 1
| align=center| 3:52
| Thackerville, Oklahoma, United States
|
|-
| NC
| align=center| 8–1 (1)
| Lorenz Larkin
| NC (overturned)
| Strikeforce: Rockhold vs. Jardine
|
| align=center| 2
| align=center| 1:32
| Las Vegas, Nevada, United States
|
|-
| Win
| align=center| 8–1
| Roger Gracie
| KO (punch)
| Strikeforce: Barnett vs. Kharitonov
|
| align=center| 1
| align=center| 4:37
| Cincinnati, Ohio, United States
|
|-
| Loss
| align=center| 7–1
| Rafael Cavalcante
| TKO (punches and elbows)
| Strikeforce: Houston
|
| align=center| 3
| align=center| 1:14
| Houston, Texas, United States
|
|-
| Win
| align=center| 7–0
| Gegard Mousasi
| Decision (unanimous)
| Strikeforce: Nashville
|
| align=center| 5
| align=center| 5:00
| Nashville, Tennessee, United States
|
|-
| Win
| align=center| 6–0
| Mike Whitehead
| KO (punches)
| Strikeforce: Evolution
|
| align=center| 1
| align=center| 3:08
| San Jose, California, United States
|
|-
| Win
| align=center| 5–0
| Mark Kerr
| KO (punches)
| M-1 Global: Breakthrough
|
| align=center| 1
| align=center| 0:25
| Kansas City, Kansas, United States
|
|-
| Win
| align=center| 4–0
| Ryo Kawamura
| Decision (unanimous)
| World Victory Road Presents: Sengoku 7
|
| align=center| 3
| align=center| 5:00
| Tokyo, Japan
|
|-
| Win
| align=center| 3–0
| Yukiya Naito
| TKO (punches)
| World Victory Road Presents: Sengoku no Ran 2009
|
| align=center| 1
| align=center| 3:54
| Saitama, Japan
|
|-
| Win
| align=center| 2–0
| Fábio Silva
| TKO (punches)
| World Victory Road Presents: Sengoku 6
|
| align=center| 3
| align=center| 0:41
| Saitama, Japan
|
|-
| Win
| align=center| 1–0
| Travis Wiuff
| TKO (punches)
| World Victory Road Presents: Sengoku 5
|
| align=center| 1
| align=center| 2:11
| Tokyo, Japan
|
World Championships Matches
|-
! Res.
! Record
! Opponent
! Score
! Date
! Event
! Location
! Notes
|-
|Loss
|2-1
|align=left|Sazhid Sazhidov
|style="font-size:88%"|1–0, 0–1, 1–1
|style="font-size:88%"|2005-09-26
|style="font-size:88%"|2005 World Wrestling Championships
|style="text-align:left;font-size:88%;"|Budapest, Hungary
|style="text-align:left;font-size:88%;"|
|-
|Win
|2-0
|Ruslan Sumenkov
|style="font-size:88%"|6–0, 1–0
|style="font-size:88%"|2005-09-26
|style="font-size:88%"|2005 World Wrestling Championships
|style="text-align:left;font-size:88%;"|Budapest, Hungary
|style="text-align:left;font-size:88%;"|
|-
|Win
|1-0
|Ibrahim Al Khatib
|style="font-size:88%"|Fall
|style="font-size:88%"|2005-09-26
|style="font-size:88%"|2005 World Wrestling Championships
|style="text-align:left;font-size:88%;"|Budapest, Hungary
|style="text-align:left;font-size:88%;"|
|-
Professional wrestling career
Early career
Lawal was a professional wrestling fan from an early age. Upon graduating from college, Lawal was offered a contract by the professional wrestling promotion World Wrestling Entertainment. Lawal spent a week at Ohio Valley Wrestling, WWE's developmental territory, before ultimately rejecting the contract offer, instead opting to pursue a career in mixed martial arts.
Total Nonstop Action Wrestling (2012–2015)
In May 2012, upon signing with Bellator Fighting Championships, Lawal also signed a separate contract with the professional wrestling promotion Total Nonstop Action Wrestling (TNA), with the intention of simultaneously pursuing careers in mixed martial arts and professional wrestling. Lawal stated that he expected to appear with TNA "two or three times a month or whenever they can book me" and that "if I have a fight coming up, I won't be doing shows or taping". In September 2012, it was reported that Lawal would train as a professional wrestler at Ohio Valley Wrestling, now TNA's developmental territory in Louisville, Kentucky. Lawal made his first appearance in TNA on the October 4, 2012 episode of Impact Wrestling. He went on to serve as a special guest enforcer for a street fight between Bobby Roode and James Storm at the Bound for Glory pay-per-view on October 14, 2012.
King Mo returned to TNA on the July 24, 2014 episode of Impact Wrestling as a heel, attacking Tommy Dreamer, Bully Ray and Devon and aligning with Team Dixie and Dixie Carter. In late 2014, King Mo was removed from Team Dixie due to his absence from TNA.
When asked in February 2015 if he will appear again for TNA, King Mo stated: "I've always been MMA 100%. If they call me I'll make an appearance. Right now, there is nothing going on in wrestling unless they book me to do something." On July 20, 2015, Mo announced his departure from TNA.
Independent circuit (2014, 2019–present)
On June 14, 2014 at House of Hardcore 6, King Mo took part in a special Master Lock challenge from Chris Masters along with other wrestlers in the end, King Mo was able to avoid being to put in The Masterlock and he was able to put Masters in a leg lock submission making Masters tap out.
Return to Impact Wrestling (2017)
On June 27, 2017, it was announced that King Mo would make his return to Impact Wrestling and be in Lashley's corner for his Impact Wrestling World Heavyweight Championship match at Slammiversary.
Major League Wrestling (2019–present)
On November 8, 2019, Mo wore an MLW shirt during his entrance to his final fight for Bellator. The following morning it was announced that he had signed an exclusive deal with the promotion and would be making his debut for the promotion at their next TV taping. He won his debut match for the promotion, which aired on their Thanksgiving episode of MLW Fusion via submission.
Personal life
Lawal's parents are immigrants from Nigeria. Lawal was born in Murfreesboro, Tennessee. He has a younger brother named Abdullah and a younger sister named Aminat. The three were raised by a single mother, "My mom (Nike Rouseau) pretty much raised us all. My dad was never around." Muhammed's father committed suicide when Lawal was twenty years old.
After his fight with Larkin, Lawal was diagnosed with Staphylococcus obtained from knee surgery. Lawal had a fever of 103 degrees, and the infection ate away at parts of his hip and legs, "I had this moment where I was like, man, I can see my hip bone. I was ripped still. I had an eight-pack. But there's my hip bone. I looked at my leg, and it looked like those zombies from The Walking Dead. I feel like I looked death in the face, and I survived."
Championships and accomplishments
Mixed martial arts
Bellator MMA
Bellator 2013 Summer Series Light Heavyweight Tournament Championship
Bellator Season 10 Light Heavyweight Tournament Finalist
Bellator MMA Season 8 Light Heavyweight Tournament Semifinalist
Tied (with Liam McGeary) for most knockout wins in Bellator Light Heavyweight division history (5)
Rizin Fighting Federation
Rizin 2015 Heavyweight Grand Prix Championship
Strikeforce
Strikeforce Light Heavyweight Championship (One time)
Amateur wrestling
International Federation of Associated Wrestling Styles
2007 Hargobind International Tournament Senior Freestyle Gold Medalist
2007 Alexander Medved International Senior Freestyle Silver Medalist
2007 Pan American Championships Senior Freestyle Gold Medalist
2007 World Cup Senior Freestyle Silver Medalist
2007 Takhti Cup Senior Freestyle Gold Medalist
2006 Golden Grand Prix Senior Freestyle Bronze Medalist
2006 Uzbekistan Independence Cup Golden Grand Prix Senior Freestyle Gold Medalist
2006 Yasar Dogu International Senior Freestyle Gold Medalist
2006 Dave Schultz Memorial International Open Senior Freestyle Gold Medalist
2005 Dave Schultz Memorial International Open Senior Freestyle Silver Medalist
2004 Clan International Championships Senior Freestyle Silver Medalist
2004 Dave Schultz Memorial International Open Senior Freestyle Bronze Medalist
2004 FILA Manitoba Open Senior Freestyle Silver Medalist
2003 Sunkist Kids International Open Senior Freestyle Bronze Medalist
USA Wrestling
USA Senior Freestyle National Championship (2005, 2006, 2008)
USA University Freestyle National Championship (2003)
2006 NYAC Christmas Championships Senior Freestyle Gold Medalist
2005 FILA World Team Trials Senior Freestyle Winner
2004 NYAC Christmas Championships Senior Freestyle Silver Medalist
National Collegiate Athletic Association
NCAA Division I All-American (2003)
Big 12 Conference Championship (2003)
NCAA Division II Collegiate Championship (2002)
NCAA Division II All-American (2001, 2002)
University Interscholastic League
UIL High School Texas State Championship (1999)
UIL High School All-State (1997, 1998, 1999)
Wrestling
Real Pro Wrestling
RPW Season One 184 lb Championship
Professional wrestling
Vendetta Pro Wrestling
Vendetty Award: 2015 Vendetta Pro Match of the Year (as Special Guest Enforcer)
See also
List of male mixed martial artists
List of current Bellator fighters
References
External links
Official Bellator profile
MiddleEasy.com Interview
Muhammed Lawal profile at the National Wrestling Hall of Fame
1981 births
Living people
People from Murfreesboro, Tennessee
American male mixed martial artists
African-American Muslims
Light heavyweight mixed martial artists
Heavyweight mixed martial artists
Mixed martial artists utilizing collegiate wrestling
Mixed martial artists utilizing freestyle wrestling
African-American mixed martial artists
Mixed martial artists from Tennessee
Mixed martial artists from Texas
Strikeforce (mixed martial arts) champions
American male sport wrestlers
American people of Yoruba descent
American sportspeople of Nigerian descent
American sportspeople in doping cases
University of Central Oklahoma alumni
Central Oklahoma Bronchos wrestlers
Oklahoma State Cowboys wrestlers
American male professional wrestlers
Yoruba sportspeople
Doping cases in mixed martial arts
21st-century African-American sportspeople
20th-century African-American people |
2456372 | https://en.wikipedia.org/wiki/Map%C3%BAa%20University | Mapúa University | Mapúa University, formerly named Mapúa Institute of Technology and also referred to by its acronym MU, is a private, non-sectarian, research-oriented higher education institution located in Intramuros, Manila and in Makati.
It was founded in 1925 by the first registered Filipino architect, Tomás Mapúa, a graduate of Cornell University. After he died, the tradition was continued by his children, Óscar M. Mapúa Sr., a graduate in Civil Engineering from the Massachusetts Institute of Technology, and Gloria M. Mapúa-Lim.
The university's Civil Engineering program has been granted the Level IV Accredited status by the Philippine Association of Colleges and Universities Commission on Accreditation (PACUCOA), which is one of the first engineering programs to be accorded such status. The Commission on Higher Education (CHED) has also recently recognized Mapúa's Mechanical Engineering (ME), Computer Engineering (CpE), Civil Engineering (CE), Environmental and Sanitary Engineering (EnSE), Chemical Engineering (CHE), Electrical Engineering (EE), Information Technology (IT) and Electronics Engineering (ECE) programs as Centers of Excellence for Engineering (COE), while Industrial Engineering (IE) and Computer Science (CS) programs as a Center of Development.
Mapúa University is also the first Philippine and Southeast Asian educational institution to have ABET certification.
History
Early activities
The institute was founded on January 25, 1925, by Tomás B. Mapúa, a graduate of Cornell University and the first registered Filipino architect and Civil Engr. Gonzalo T. Vales. At first, the institute only offered architecture and civil engineering programs. It is the first educational institution in the Philippines to offer a bachelor's degree in architecture. When the school opened in 1925, there were 75 students and 15 faculty members. Classes were held in a rented commercial building in Carriedo Street near Feati University in Quiapo, Manila. In 1928, the Mapúa Institute of Technology Pre-Engineering High School was established in Doroteo Jose Street (now present site of Amaia Skies Tower Avenida developed by Ayala Group) through Rizal Avenue Sta. Cruz Manila. Then in 1930, Mapúa joined the National Collegiate Athletic Association as the Mapúa Cardinals.
World War II and after-war development
During World War II, Mapúa's Manila Campus was used as a garrison by the Japanese forces during the occupation of Manila, and all classes and organisations were suspended. The Institute would continue to suffer throughout the war as the effort of the Institute to continue the studies of the students were suspended and Senior students were forced to prematurely graduate. In 1945 the Institute suffered total destruction during the liberation. As a part of the rehabilitation program, the former De Luxe Fashion School in Doroteo José was Leased Lot property for 50 years (1948-1998) and housed the high school department in 1948. In 1951, the Don Tomas B. Mapúa family acquired a piece of land from the La Corporación Fransicana where the present Manila Campus stands. The campus opened at 1956 and the building construction was completed in 1963. All college programs under deanship of Engr. Gonzalo T. Vales were transferred from the Doroteo José campus to the Manila Campus in 1973. Tomas B. Mapúa died on December 22, 1965 and his son Óscar Sr. took over the presidency until his death in 1998.
It was under Tómas B. Mapúa, and later his son Óscar Sr., that the institute gained prominence as an engineering school. During this period, the institute took the top 10 and even the top 20 slots in most licensure exams for architecture and engineering. It also achieved the highest passing rates in the board exams among other competing schools in architecture and engineering.
Yuchengco administration
When Oscar Mapúa Jr., grandson of Tomás B. Mapúa, took over the presidency of the school, he served his duties until December 1999 only. He was replaced by Reynaldo B. Vea as the Mapúa family sold the institute to the Yuchengco Group of Companies (YGC) headed by Alfonso T. Yuchengco
In 2002, the old RCBC Building on Senator Gil Puyat Avenue in Makati was purchased and converted into the Mapúa Makati Campus, where the School of Information Technology was moved from the Manila Campus. A spin-off of the School of IT, the Mapúa IT Center, as the Makati Campus is named, was established. The MITC offers 2-year diploma programs that eventually lead into an associate degree ladderized to the bachelor's degree (4-year) IT courses of Mapúa.
Starting 2002, Mapúa, which originally was on a semestral system, adopted the quartem system. This academic system was intended to allow students to graduate faster (e.g. the original 5-year engineering programs could be taken in four years) and to focus on less, interrelated course subjects in an 11-week term.
On the other hand, Mapúa High School was closed down on 2005, since it was operated in the red.
Along with the establishment of the Malayan High School of Science and Malayan Colleges Laguna, the Administration intends to encompass all its educational institutions under the name Malayan Colleges, to be later pushed through to university status as is under the Vision 2020 initiative with Mapúa Institute of Technology as the College of Engineering.
On May 18, 2017, Mapúa Institute of Technology has been formally granted University Status, per Commission en banc Resolution No. 379-2017, dated May 9, 2017 at the CHED Auditorium in Diliman, Quezon City.
On January 8, 2018, Yuchengco Group of Companies and Ayala Corporation, through a joint press statement, has announced the possible merger of their education arms, namely Ayala Education, Inc. and iPeople, Inc, with the iPeople, Inc. being the surviving entity. It has been stated that the potential merger will be finalized in the first quarter of 2018. This brings together AEI's APEC Schools, University of Nueva Caceres, National Teachers College, and iPeople's Malayan Education System, operating under the name Mapúa University and its subsidiaries, Malayan Colleges Laguna (MCL) and Malayan Colleges Mindanao (MCM) a combined student population of over 60,000.
On May 2, 2019, the merger between AC Education and iPeople was completed, with the Yuchengco Group of Companies owning 51.3% of iPeople and Ayala Corporation with 33.5% share of the said company.
On August 1, 2021, the Mapúa Makati Campus at Gil Puyat Avenue closed for its relocated site at the former Bormaheco property along Vito Cruz Extension, which was acquired and converted by the Yuchengco Group in 2018.
Campus
Manila Campus
The Mapúa Manila Campus is located within the walls of Intramuros in Manila. Accessible from the campus are malls and recreational centers such as SM City Manila behind the Manila City Hall, Robinson's Place Ermita, Harrison Plaza in Vito Cruz, Rizal Park and the Baywalk along Roxas Boulevard. The Manila Campus holds the Architecture, Engineering, Multimedia and Visual Arts, and Social Science programs. The campus underwent through a lot of renovation in the past and is equipped for further studies in the fields of engineering.
The Manila Campus consists of 7 interconnected buildings:
The Juan Mapúa Memorial Hall (Administration Building) houses the Registrar's Office and the Treasury
The South Building houses the Multimedia Arts and Sciences, Digital Cinema, Industrial Engineering, Civil Engineering, Environmental and Sanitary Engineering, Architecture and Industrial Design Facilities, and Senior High School classrooms.
The Southwest Building serves as the intersection of the West and South Building. It also houses the Multimedia and Visual Arts Facilities and Senior High School classrooms.
The West Building houses the Canteen, the Physics department, audio visual rooms, the library, and Senior High School classrooms.
The Northwest Building serves as the intersection of West and North Building
The North Building houses the Chemistry, Chemical Engineering, Electrical Engineering, Electronics Engineering, Computer Engineering, Mechanical Engineering, Earth and Material Science and Engineering, Psychology Department, Graduate Studies Facilities, and Senior High School classrooms.
The East Building, recently renamed as the Yuchengco Innovation Center, houses the institute's new laboratories for research and development purposes. It stands on where the Student Pavilion used to be.
The Southeast Building serves as an extension of the South Building that directly faces the East Building. It houses the security office, the bookstore, and the admission's office.
Additional Facilities:
Gymnasium: The place where Physical Education activities are held, as well as game and concert events, and academic advising proceedings during enrollments.
St. Rita's Chapel: The chapel near the North entrance of the institute. It is where masses are regularly held and extends to the east side as the Guidance's office.
There are reports that Mapúa-Intramuros will start further expanding its infrastructure at the end of its 86th Foundation Week Celebration. This expansion mainly includes the Gymnasium Area and the Juan Mapúa Memorial Hall.
Makati Campus
The Mapúa Makati Campus is located in Makati and occupies the former Bormaheco property along Pablo Ocampo Sr. Extension. It previously occupied the former RCBC building at the corner of Gil Puyat Avenue and Nicanor Garcia Street, also as the Mapúa Information Technology Center (MITC), from 2002 to 2021. Accessible from the campus are malls and recreational centers such as the Ayala Center. Aside from the associate degrees held by the Mapúa IT Center, the 8-storey Makati Campus hosts the Senior High School, School of Information Technology and ETY School of Business and Management.
Student life
Innovations
Mapúa was the first institute in the Philippines to feature a RFID or Radio Frequency ID card system which they call "CARDINAL Plus" which stands for CARD and Integrated Network Access Log-in Plus. It is a two-piece plastic PVC card with a microchip and antenna inserted in between. The CARDINAL Plus functions not only as an identification card but acts as a Library card as well. It also has the capability to store student logs, grades, guidance records, schedules, and more. As a security measure, all students flash their cards on top of the readers at the entrance. A person will be identified easily with his photo and information appearing on the monitor. It also serves as an ATM Card. Other schools adopted the RFID identification system later on.
Mapúa has its own SIM card, the Mapúa Cardinal SIM which is powered by Smart Communications. The Cardinal SIM contains all the usual features of a regular Smart SIM card with the addition of the MapúaTXT service, which allows students to receive important school announcements and check for the remaining matriculation charges on their mobile phones.
In 2016, ABET has also accredited Mapúa's Biological Engineering, Manufacturing Engineering, and Materials Science and Engineering—having a total of 13, thus holding the most number of ABET-accredited programs in a single campus in the Philippines.
The Mapúa Robotics Team is a pioneering organization that has been granted several major projects by the Philippine Navy, the Department of Science and Technology and the Philippine National Police intending to modernize the weapons and equipment used by the Philippine government. Projects, to name a few, include the following:
Mechanical Anti-terrorist Concept or MAC (a bomb-defusal robot now used by the PNP-Makati)
The Project Trident Strike (a remotely operated sentry gun mounted in naval gunships and perimeter defenses)
Project Phalanx, a compact version of the Trident Strike.
MAC-2 (an improved version of the first Mechanical Anti-Terrorist Concept), will be released by the Robotics Team by February 2010.
The Philippine Electric Vehicle (electric car designed for urban mass transportation sponsored by the DOST)
The Submersible Rover (a scouting equipment for the Philippine Navy)
The institute's Civil Engineering program has received Level 4 Accredited Status from the Philippine Association of Colleges and Universities Commission on Accreditation PACUCOA as of January 2009, the first engineering program that has been granted this status in the Philippines.
The institute, effective on first term of AY 2011-2012, is pioneering the program Technical Communication (TechComm) under the School of Languages, Humanities and Social Sciences; the Institute is the first to offer the program in the Philippines.
Malayan controversy
On February 10, 2005, as a part of Mapúa's plans for elevating the institute to university status, the administration announced the renaming of the institute to Malayan University, inspired by the name of the insurance company owned by the Yuchengcos, the Malayan Insurance Company. But while waiting to become eligible for university status, the name "Malayan Colleges" will be used and the name "Mapúa Institute of Technology" will be retained for the College of Engineering, Architecture and IT. This move was very unpopular with the students and the alumni. On February 14, 2005, the students protested outside the campus, clad in black shirts protesting against the decision of the administration and criticized them for not consulting the students before making such a decision. This event has been called as the "Black Valentine" protest. Despite the efforts of the students, faculty and alumni against the decision, the Board of Trustees and the Commission on Higher Education (CHED Philippines) have approved the name change and will be implemented in the near future.
Notable Mapúans
References
Mapua
Research universities in the Philippines
National Collegiate Athletic Association (Philippines)
Mapua
Education in Intramuros
Universities and colleges in Makati
Educational institutions established in 1925
1925 establishments in the Philippines
Buildings and structures in Makati
Makati Central Business District |
31884571 | https://en.wikipedia.org/wiki/IPhone%204S | IPhone 4S | The iPhone 4S (retroactively stylized with a lowercase 's' as iPhone 4s as of September 2013) is a smartphone that was designed and marketed by Apple Inc. It is the fifth generation of the iPhone, succeeding the iPhone 4 and preceding the iPhone 5. It was announced on October 4, 2011, at Apple's Cupertino campus, and was the final Apple product announced in the lifetime of former Apple CEO and co-founder Steve Jobs, who died the following day.
Orders could be placed on October 7, 2011, and mainstream availability in retail stores began on October 14, 2011 in the United States, Australia, Canada, the United Kingdom, France, Germany, and Japan. Sales peaked over its predecessor with more than a million sales in the first twenty-four hours of order availability and more than four million sales in the first four days of retail availability. Further worldwide rollout, including 22 additional countries on October 28, came during the next several months.
This iPhone was named "4S" where the "S" stood for Siri an iPhone 4S-exclusive intelligent personal assistant that was later included in future generations of mobile Apple products. Retaining most of the external design of the iPhone 4, the 4S hosted major internal upgrades, including an upgrade to the Apple A5 chipset, and an 8-megapixel camera with 1080p video recording. It debuted with iOS 5, the fifth major version of iOS, Apple's mobile operating system, that introduced features including iCloud, iMessage, Notification Center, Reminders, and Twitter integration.
Reception to the was favorable. Reviewers noted Siri, the new camera, and processing speeds as significant advantages over the prior model. It was succeeded by the iPhone 5 as Apple's flagship smartphone on September 12, 2012. The iPhone 4S remained on sale, albeit being sold with reduced storage (from 16/32/64 GB down to 8 GB).
The 4S was officially discontinued on September 9, 2014 following the announcement of the iPhone 6, although production did continue for developing markets until February 17, 2016. During the course of its lifetime, the iPhone 4S was one of the best-selling iPhones ever produced and it is the first iPhone to support five major versions of iOS: iOS 5, iOS 6, iOS 7, iOS 8, and iOS 9 (the iPad 2 was supported from iOS 4 to iOS 9).
The 4S is the last iPhone to have the original 30 pin connector as the succeeding iPhone 5 replaced it with the all digital Lightning Connector.
The iPhone 4S had an issue where the Wi-Fi toggles would appear greyed out in both Settings and the Control Center, which was mainly caused by thermal shock of the Wi-Fi antenna.
Origin
As early as May 2011, some leaks had a fairly accurate description of the iPhone 4S including the name "", the Apple A5 chip, HSDPA, new camera, and Sprint carrying.
The was unveiled at Apple's "Let's Talk iPhone" event on October 4, 2011, on the Apple Campus in Cupertino, California. The keynote was the first which Tim Cook gave since the Verizon keynote earlier in the year. It was also Cook's first launch without Apple co-founder Steve Jobs, whose health was deteriorating, and he died the day after the announcement of the . Tim Carmody of Wired praised Cook for focusing on company achievements, calling him a "global business thinker" and a "taskmaster".
At the "Let's Talk iPhone" event held by Apple on October 4, 2011, Mike Capps demonstrated Epic Games' Infinity Blade II, the sequel to Infinity Blade, on an . Capps boasted that the game uses Epic Games' Unreal Engine 3 and features the same graphic techniques used in the Xbox 360 game Gears of War 3.
Speculation about Apple's next generation smartphone, including various specifications and a predicted name "iPhone 5", had been widespread in the time preceding its debut. After the was announced, it was considered by some media to be a disappointment, due to the expected release of an iPhone 5.
There were no external differences between the iPhone 4 CDMA model and the , with the exception of a SIM card slot on the . All changes were internal (slight external differences between the iPhone 4 GSM model and the exist, as said differences existed between the CDMA and GSM models of the iPhone 4).
On September 10, 2013, the iPhone 4S name was re-stylised as iPhone 4s, using a lower case 's' to reflect the names of the newly announced iPhone 5s and iPhone 5c. This was unusual for Apple as an upper case 'S' had been used since the introduction of the iPhone 3GS in 2009.
On September 9, 2014, the iPhone 4S was officially discontinued following the reveal of iPhone 6 and iPhone 6 Plus. However, 4S production did continue for developing markets until February 17, 2016.
On September 13, 2016, following the release of iOS 10, Apple dropped support for the iPhone 4S, making iOS 9 the last major iOS version available for the device.
Software
The , like other iPhones, runs iOS, Apple's mobile operating system. The user interface of iOS is based on the concept of direct manipulation, using multi-touch gestures. Interface control elements consist of sliders, switches, and buttons. The response to user input is immediate and provides a fluid interface. Interaction with the OS includes gestures such as swipe, tap, pinch, and reverse pinch, all of which have specific definitions within the context of the iOS operating system and its multi-touch interface.
Internal accelerometers are used by some applications to respond to shaking the device (one common result is the undo command) or rotating it in three dimensions (one common result is switching from portrait to landscape mode).
The iPhone 4S was first shipped with iOS 5, which was released on October 12, 2011, two days before the release of the device. The 4S uses iOS 5.1.1, which was released on May 7, 2012. As of April 2021, the device can be updated to iOS 9.
It can act as a hotspot, sharing its internet connection over WiFi, Bluetooth, or USB, and also accesses the App Store, a digital application distribution platform for iOS developed and maintained by Apple. The service allows users to browse and download applications from the iTunes Store that were developed with Xcode and the iOS SDK and were published through Apple.
The iPhone 4S can play music, movies, television shows, ebooks, audiobooks, and podcasts and can sort its media library by songs, artists, albums, videos, playlists, genres, composers, podcasts, audiobooks, and compilations. Options are always presented alphabetically, except in playlists, which retain their order from iTunes. The iPhone 4S uses a large font that allows users plenty of room to touch their selection. Users can rotate their device horizontally to landscape mode to access Cover Flow. Like on iTunes, this feature shows the different album covers in a scroll-through its photograph library. Scrolling is achieved by swiping a finger across the screen. Alternatively, headset controls can be used to pause, play, skip, and repeat tracks. On the 4S, the volume can be changed with the included Apple Earphones, and the Voice Control feature can be used to identify a track, play songs in a playlist or by a specific artist, or create a Genius playlist.
The introduced a new automated voice control system called Siri, that allows the user to give the iPhone commands, which it can execute and respond to. For example, iPhone commands such as "What is the weather going to be like?" will generate a response such as "The weather is to be cloudy and rainy and drop to 54 degrees today." These commands can vary greatly and control almost every application of the smartphone. The commands given do not have to be specific and can be used with natural language. Siri can be accessed by holding down the home button for a short amount of time (compared to using the regular function). An impact of Siri, as shown by Apple video messages, is that it is much easier for people to use device functions while driving, exercising, or when they have their hands full. It also means people with trouble reading, seeing, or typing can access the smartphone more easily.
On the , texting can be aided by the voice assistant, which allows speech-to-text. In addition to regular texting, messaging on the is supported by iMessage, a specialized instant messaging program and service that allows unlimited texting to other Apple iOS 5 products. This supports the inclusion of media in text messages, integration with the device's voice-controlled software assistant, and read receipts for sent messages. Input to the computer comes from a keyboard displayed on the multi-touch screen or by voice-to-text by speaking into the microphone. Entered text is supported by predictive and suggestion software as well as a spell-checker, that includes many regional dialects such as Swiss spoken French.
At the announcement, plans were in place for the to support many languages. Different features have different language requirements, such as keyboards compared to the word predictor and spell-checker, which needs a large dictionary of words. Language support is related to the iOS 5 operating system that the device launched with, although not always. The Siri digital assistant supported French, English, and German at launch. Since it uses a software-based keyboard supported by the multi-touch display, it can support many different keyboard layouts without having to change physically. The can display different languages and scripts at the same time.
On September 19, 2012, iOS 6 was released to the iPhone 4S among other compatible iOS devices as an over the air (OTA) upgrade package. According to Apple the update contained 200 new features and tweaks, which included a new maps app, dubbed Apple Maps, Facebook integration and Passbook, an application that allows users to store their coupons, boarding passes, and tickets digitally. On September 18, 2013, Apple released iOS 7 and the iPhone 4S is among other compatible iOS devices that also received the update without any lagging issues compared to the iPhone 4. Although the device improved performance over iOS 7, some newer features that were released to newer models such as AirDrop and CarPlay were not supported. The iPhone 4S can also run iOS 8, which was released on September 17, 2014. Given that the device was supported for more than three years, some newer features of the software such as Apple Pay were not supported. It is also unable to work with Apple Watch, due to the relatively aged hardware. In fact, some users often reported that performance on the 4S is very slow, similar to how iOS 7 ran on the iPhone 4, and suggesting that they should not upgrade due to battery draining issues and hanging up on calls. Meanwhile, Apple released iOS 8.1.1, which brought slight improvements to the phone and the iPad 2, but it still did not run so fast as newer models.
iOS 9 controversy
On June 8, 2015, Apple announced at the WWDC that the iPhone 4S would support iOS 9. This makes it the first iPhone to support five major versions of iOS, and the second iOS device to support five major versions (iOS 9 will support the iPad 2 as well, bringing its total up to six major versions of iOS supported). On December 22, 2015, Apple faced a class action lawsuit for crippling the iPhone 4S with the iOS 9 update with slow and buggy software or to pay hundreds of dollars on a new iPhone.
On June 13, 2016, Apple announced that the iPhone 4S would not support iOS 10 due to hardware limitations.
It was briefly possible to downgrade the iPhone 4S from iOS 9 to iOS 6.1.3 following a signing window, which opened in January 2018 and closed in November 2019. The option to downgrade to iOS 6.1.3 also allowed an over-the-air update to iOS 8.4.1 due to technical limitations preventing a direct update from iOS 6 to iOS 9.
2019 GPS rollover update
On July 22, 2019, Apple released iOS 9.3.6 for the iPhone 4S to fix issues caused by the GPS week number rollover. The issues would impact the accuracy of GPS location and set the device's date and time to an incorrect value, preventing connection to HTTPS servers and, consequently, Apple's servers for activation, iCloud and the iTunes and App stores.
Hardware
The uses the Apple A5 system-on-chip (SoC), also found in the iPad Mini (1st generation), that incorporates an Imagination Technologies PowerVR SGX543 graphics processing unit (GPU). This GPU features pixel, vertex, and geometry shader hardware supporting OpenGL ES 2.0. The SGX543 is an improved version of the GPU used in the predecessor, the iPhone 4. The uses a dual-core model that is integrated with the Apple A5 SoC in the same way as the iPad 2. Apple claims that the has up to seven times faster graphics than the iPhone 4; this was corroborated by Epic Games president Mike Capps.
The has 512 MB of DDR2 RAM. Maximum available storage size increased to 64 GB while the 32 GB and 16 GB model options were retained. In September 2013 Apple released an iPhone 4S for free with a two-year contract and but with only 8 GB of storage. The screen is the same as the prior generation iPhones; , 640×960 resolution (Apple's "retina" design). There was an improvement in interactive multimedia applications compared to its predecessor.
The has an improved cellular (GSM) antenna design over the iPhone 4. The new antenna is divided up into two pieces within the stainless steel band that wraps around the sides of the smartphone. Therefore, if the is gripped in such a way as to attenuate one piece of the cellular antenna, the radio will switch to the other piece that isn't being gripped. The can support a maximum theoretical download speed of up to 14.4 Mbps with HSDPA+. As a result of an upgraded radio chip inside it, in addition to being a world phone, both GSM and CDMA customers can roam internationally on GSM networks. It also supports Bluetooth 4.0.
The camera on the , also known as an iSight camera, can take 8-megapixel photographs (3,264 by 2,448 pixels) and record 1080p videos at up to 30 frames per second with upgraded quality (30% better clarity, 26% better white balance, color accuracy) due to an additional lens, IR filter, a wider f/2.4 aperture, and Image signal processor (built-in A5).
The built-in gyroscope allows for some image stabilization for the camera while recording video, although it still has room for improvement, since state-of-the-art image stabilization algorithms do not need to use a gyroscope, but use image processing. Other features of the camera are macro (for close up pictures) and faster capture including being able to take its first image in 1.1 seconds and the next half a second later.
The features a 960 by 640 pixel multitouch Retina display. It has two volume buttons and a ring-silent switch on the left side. On the top left there is a 3.5 mm headphone jack and a microphone that is used for both noise cancellation during calls and when in speakerphone/FaceTime (video calling) mode. The lock-power button is situated on the top right edge of the device. The right side of the device has a Micro-SIM card slot. The bottom of the device features a speaker output on the right and a microphone input on the left with the Apple proprietary 30-pin dock connector in the center. The supports video out via AirPlay and various Apple A/V cables. Supported video formats include H.264 (1080p 30 frames per second maximum), MPEG-4 video, and motion JPEG (M-JPEG).
In addition to user inputs, the device also has several sensors that give the smartphone information about its orientation and external conditions. These include a three-axis gyroscope, an accelerometer, a proximity sensor, and an ambient light sensor. The claimed to have 200 hours standby time, 8 hours talk time on 3G, 14 hours talk time on 2G, 6 hours 3G browsing, and 9 hours Wi-Fi browsing. Additionally, it can sustain up to 10 hours of video playback or 40 hours of audio playback.
Design
The has a stainless steel, dual cellular antenna design, identical to iPhone 4 CDMA. Apple redesigned the antenna in the CDMA after some original iPhone 4 users reported cellular signal attenuation problems as a result of holding it in certain positions. The improved cellular radio in the smartphone can switch between two antennas, depending on which is sending/receiving the best signal. These two antennas are incorporated into the distinctive stainless steel band that wraps around the sides of the . The bands on the iPhone 4S are divided into two antennas: cellular and Global Positioning System GPS, with Bluetooth and Wi-Fi reliant on an internal antenna.
The iPhone 4 and 4S were designed by Jonathan Ive. The '4' generation iPhones differ from earlier Apple designs; the bulges of the back panel as well as the band between the front and back are gone and have been replaced with flattened surfaces. The redesign reflects the utilitarianism and uniformity of existing Apple products, such as the iPad and the iMac. The overall dimensions of the are lower than that of the 3GS.
It is high, wide, and deep, compared to the iPhone 3GS, which is high, wide, and deep; making the iPhone 4 and 4S 21.5% thinner than the 3GS. The internal components are situated between two panels of aluminosilicate glass, described by Apple as being "chemically strengthened to be 20 times stiffer and 30 times harder than plastic," theoretically allowing it to be more scratch-resistant and durable than the prior models.
Reception
Critical reception
Reception to the was favorable. Reviewers noted Siri, the new camera, and processing speeds as significant advantages over the prior model. Tim Stevens of Engadget said that the " does everything better than the iPhone 4, but it simply doesn't do anything substantially different." Joshua Topolsky of The Verge stated that "if this were to be a car, it would be a Mercedes" and that Siri is "probably one of the most novel applications Apple has ever produced." Most reviewers thought that Siri was the most important feature on the . Brian Chen of Wired said that "the fifth-generation iPhone's superb camera and speedy dual-core processor are classy additions. But Siri is the reason people should buy this phone."
Retrevo surveyed more than 1,300 U.S. consumers and reported that 71 percent of all smartphone owners were not disappointed by the new , but 47 percent or almost a half of current iPhone 4 owners were; 12 percent were hoping for a bigger display, 21 percent wanted a refreshed design, and 29 percent desired 4G. Echoing technology pundits, Reuters suggested that the lack of a more radical departure from the iPhone 4 could open new market opportunities for rivals. Analyst C. K. Lu of Gartner believed that Apple no longer had the leading edge and that the 4S would only sell due to brand loyalty, as fans had been expecting an iPhone 5 with a thinner profile, edge-to-edge screen, and stronger features. These same fans had also wanted a cheaper, stripped-down iPhone 4.
Gaming on the has been likened to the PlayStation Vita, that features the same SGX GPU only in a quad-core configuration, and the Nintendo 3DS handheld game consoles. Further, the ' ability to process 80 million polygons per second has been compared to the PlayStation 3 and the Xbox 360 home video game consoles that can process 275 million and 500 million polygons per second respectively.
Computer and Video Games's (CVG) deputy editor Andy Robinson told TechRadar that the "4S is certainly laying down some serious credibility for the iPhone as a core gaming device. Not only is it now pushing out games that simply eclipse the 3DS visually, but features like cloud saving and TV streaming support are really exciting for gamers." The senior gaming analyst at Jon Peddie Research, Ted Pollak, believes the biggest improvement to gaming on the is the voice control features, noting that "one of the features that Nintendogs players loved was the ability to talk to it. There's no reason why a game like that couldn't be done on the , and much more sophisticated given the voice control shown."
In 2012, the iPhone 4S won the T3 "Work Gadget of the Year" award, beating RIM's Blackberry Bold 9900, rival Samsung's Galaxy Note amongst others.
Issues
Since the introduction of the iPhone 4S, there have been several issues reported by users on internet forums that have been noted by media organizations such as CNN, Boy Genius Report, The Guardian, and PC World.
No audio on outgoing calls
Sometimes there is no speaker audio for services such as web radio even though the speaker works fine when used as a telephone. This error may be due to a malfunctioning switch sensing the headphone plug and different handling of this information by different apps.
Yellow-tinted screens (primarily affecting white-cased units) - it turned out the previous models had a less accurately calibrated screen and thus, displayed images with a bluish tint.
Battery problems - Apple released iOS 5.1.1 to diagnose and address the issue. However, the update has failed to completely resolve the underperforming battery issue. , Apple was still investigating the battery drain issue.
Not understanding the accent of users from various countries while speaking to Siri.
Bluetooth connectivity and range sometimes poor, deficient, and/or defective. The sound quality on the other end is muffled and/or undiscernible, with reports indicating the iPhone is likely the problem as opposed to the Bluetooth headsets.
Wi-Fi overheating and toggle switch greyed out after updating the operating system to iOS 7.
The white model sometimes displayed images with a bluish tint and white lines.
Commercial reception
Unlike prior iPhone models, the number of sales of the iPhone 4 had not yet climaxed before the introduction of the 4S. Previous iPhone models were released during or after declining sales figures. In addition, iPhone 4 users had high marks for being satisfied with their smartphones. Upon the announcement of the , shares of Samsung Electronics, HTC and Nokia gained on Wednesday after the 4S was announced, while Apple stock fell. However, later in the day, Apple shares rebounded ending with a 1% gain.
With the launch of orders, AT&T said that the demand for the was "extraordinary". More than 200,000 orders were placed within 12 hours of release through AT&T. The German telephone company Deutsche Telekom said they were "satisfied" with consumer interest. In addition, AT&T, Verizon, and Sprint sold-out initial stock by October 8, 2011, and by October 9 there was a 1–2 week estimate on new orders to be filled. On October 20, 2011, AT&T surpassed one million activations. On October 10, Apple announced that more than one million orders for the had been received within the first 24 hours of it being on sale, beating the 600,000 device record set by the iPhone 4. The 16-month wait between the iPhone 4 and 4S may have contributed to overwhelming sales as well.
On October 17, 2011, Apple had announced that four million units of the were sold in the first three days of release, and 25 million iOS users had upgraded to the then latest version of iOS, iOS 5, which was released upon the introduction of the iPhone 4S. Phil Schiller, Apple's senior vice president of Worldwide Product Marketing, stated that the " is off to a great start with more than four million sold in its first weekend—the most ever for a phone and more than double the iPhone 4 launch during its first three days." The used smartphone market saw unprecedented rates of trade-ins in the weeks leading up to the 4S announcement, and after it, there was a drop in prices offered. Previous generation iPhones are recirculated through the markets via various methods and third-party buyers may purchase older generation iPhones. Apple also buys back previous generation iPhones under a special program. On April 24, 2012, AT&T announced that 7.6 million iPhone units were activated in Q4 2011, and 4.3 million in Q1 2012. In total, AT&T sold 5.5 million smartphones in the first quarter of 2012, out of which 78% were iPhones.
See also
Comparison of smartphones
List of iOS devices
Timeline of iPhone models
Notes
References
External links
– official site at Apple
Products introduced in 2011
Products and services discontinued in 2016
Mobile phones introduced in 2011
Videotelephony
IOS
Active noise control mobile phones
Discontinued iPhones |
32843220 | https://en.wikipedia.org/wiki/Applications%20of%20UML | Applications of UML | UML (Unified Modeling Language) is a modeling language used by software developers. UML can be used to develop diagrams and provide users (programmers) with ready-to-use, expressive modeling examples. Some UML tools generate program language code from UML. UML can be used for modeling a system independent of a platform language. UML is a graphical language for visualizing, specifying, constructing, and documenting information about software-intensive systems. UML gives a standard way to write a system model, covering conceptual ideas. With an understanding of modeling, the use and application of UML can make the software development process more efficient.
History
UML has applied to various activities since the second half of the 1990s and been used with object-oriented development methods.
Fields applying UML
UML has been used in following areas
Enterprise information systems
Banking and financial services
Telecommunications
Defense
Transportation
Retail
Science and Research
Distributed Web-based services
UML can also be used to model nonsoftware systems, such as workflow in the legal systems, medical electronics and patient healthcare systems, and the design of hardware.
Modeling applications of UML using various diagrams
The following lists of UML diagrams and functionality summaries enable understanding of UML applications in real-world examples.
Structure diagrams and their applications
Structuring diagrams show a view of a system that shows the structure of the objects, including their classifiers, relationships, attributes and operations:
Class diagram
Component diagram
Composite structure diagram
Deployment diagram
Object diagram
Package diagram
Profile diagram
Behaviour diagrams and their applications
Behaviour diagrams are used to illustrate the behavior of a system, they are used extensively to describe the functionality of software systems. Some Behaviour diagrams are:
Activity diagram
State machine diagram
Use case diagram
Interaction diagrams and their applications
Interaction diagrams are subset of behaviour diagrams and emphasize the flow of control and data among the things in the system being modelled:
Communication diagram
Interaction overview diagram
Sequence diagram
Timing diagram
Web applications
Web applications of UML can be used to model user interfaces of web applications and make the purpose of the website clear.
Web applications are software-intensive systems and UML is among the efficient choice of languages for modeling them. Web software complexity of an application can be minimized using various UML tools.
UML-based web engineering aims at offering a UML profile that matches the needs of web development better. The following are examples:
Representation of web applications using a set of models
Web app use case model
Web app implementation model
Web app deployment model
Web app security model
Web app site map
To model pages, hyperlinks, and dynamic content on the client and server side.
For modeling server side aspects of web page with one class and client side aspect with another and distinguishing the two by using UML's extension mechanism to define stereotype's and icons for each server and client page.
Stereotypes in UML are used to define new semantics for modeling element.
Forms in HTML can also be modeled using various UML constructs.
UML can be used to express the execution of the system’s business logic in those Web-specific elements and technologies.
Embedded systems
Software in embedded systems design needs to be looked carefully for software specification and analysis. Unified Modeling Language and extension proposals in the realtime domain can be used for the development of new design flows. UML can be used for specification, design and implementation of modern embedded systems. UML can also be used for modelling the system from functional requirements through executable specifications and for that purpose it is important to be able to model the context for an embedded system – both environmental and user-driven.
Some key concepts of UML related to embedded systems:
UML is not a single language, but a set of notations, syntax and semantics to allow the creation of families of languages for particular applications.
Extension mechanisms in UML like profiles, stereotypes, tags, and constraints can be used for particular applications.
Use-case modelling to describe system environments, user scenarios, and test cases.
UML has support for object-oriented system specification, design and modelling.
Growing interest in UML from the embedded systems and realtime community.
Support for state-machine semantics which can be used for modelling and synthesis.
UML supports object-based structural decomposition and refinement.
A specific UML profile, called MARTE for Modeling and Analysis of Real-Time and Embedded systems, provides some extensions dedicated to the domain.
See also
Unified Modeling Language
Web application
Embedded system
MARTE
UML tools
References and notes
Notes
Citations
External links
http://www.uml.org/
https://web.archive.org/web/20110906042707/http://www.itmweb.com/essay546.htm
https://web.archive.org/web/20120331162632/http://oss.org.cn/ossdocs/development/rup/webapps.htm
http://www.sereferences.com/uml-tools.php
http://blogs.oracle.com/JavaFundamentals/entry/the_importance_of_using_unified
Unified Modeling Language |
1886907 | https://en.wikipedia.org/wiki/Bachelor%20of%20Information%20Technology | Bachelor of Information Technology | A Bachelor of Information Technology (abbreviations BIT or BInfTech) is an undergraduate academic degree that generally requires three to five years of study. While the degree has a major focus on computers and technology, it differs from a Computer Science degree in that students are also expected to study management and information science, and there are reduced requirements for mathematics.
International variations
Australia
In BIT is a three-year or four-year undergraduate degree.
At the University of Technology, Sydney (UTS), a BIT
is a three-year, co-op scholarship degree with two six-month job placements.
At the University of New South Wales a BIT is referred to as "Business in Information technology" and is also a co-op scholarship degree that lasts four years.
At the University of Sydney a BIT is a four-year technical program, related to degrees such as Computer Science and Software Engineering.
At Swinburne University of Technology, a BIT is a three-year co-op scholarship degree incorporating two six-month job placements.
At RMIT University a BIT is offered as a three-year program, giving the student the choice of a majors These major are: Application Programming, Business Applications, Multimedia Design, Network Programming, System Administration and Web Systems
The state of the BIT program in Australia is unstable, as many universities offer it as a technical program while others as a business, e-commerce related program. The Australian Computer Society recognizes all BIT degrees, however Engineers Australia only recognises BIT degrees that are technical.
Canada
In Canada, Carleton University and Algonquin College have jointly created four programs under the Bachelor of Information Technology degree: Information Resource Management, Interactive Multimedia and Design, Network Technology, and Optical Systems and Sensors. University of Ontario Institute of Technology also offers streams in Networking & Information Technology Security, and Game Development and Entrepreneurship.
Puerto Rico
In Puerto Rico several universities offer Bachelor of Information Technology degrees with specializations in Networking, Security, and/or Programming; typically awarded after four years of full-time study and the completion of a supervised project or internship. Universities in Puerto Rico offering this specialized education via in-person and online modalities include Columbia Central University, EDP University of Puerto Rico, and National University College.
South Africa
In South Africa the University of Pretoria offers the Baccalaureus in Information Technology (BIT) degree as a four-year undergraduate programme. The University of Pretoria is also the first university in South Africa to offer this degree. Upon successful completion of a BIT degree a student can continue with either a part-time or full-time MIT programme at the University of Pretoria to round off his or her professional training or enter the workforce.
The BIT course includes, but is not limited to, the following subjects: Business Management, Economics, Statistics, Mathematics, English, Programming and Advanced Programming, Systems Development, Philosophy, Financial Accounting, Data Structures and Algorithms, Operating Systems, Databases, Networks, Artificial Intelligence, Information Organization and Retrieval, Computer Architecture, Software Engineering, Multimedia.
As an alternative to BIT, the University of Pretoria's Computer Science Department offers two three-year degrees, BSc CS and BSc IT.
United Arab Emirates
In UAE, Skyline University College offers 4 years Bachelor of Science in Information Technology enterprise computing.
See also
Bachelor of Computing
Bachelor of Software Engineering
Bachelor of Computer Information Systems
Bachelor of Computer Engineering
Bachelor of Science in Information Technology
Doctor of Information Technology
Master of Science in Information Technology
References
Information Technology Bachelor of
Computer science education
Information technology education
Information technology qualifications |
44106728 | https://en.wikipedia.org/wiki/TheSkyNet | TheSkyNet | TheSkyNet (stylized theSkyNet) was an astronomy research project which used volunteer Internet-connected computers to carry out research in astronomy. It was an initiative of the International Centre for Radio Astronomy Research (ICRAR), a joint venture of Curtin University and the University of Western Australia. TheSkyNet had two projects, Sourcefinder and POGS. Both projects have completed. TheSkyNet Sourcefinder aimed to test and refine automatic radio sourcefinding algorithms in preparation for radio galaxy surveys using the Australian Square Kilometre Array Pathfinder and the Square Kilometre Array. TheSkyNet POGS used Spectral Energy Distribution fitting to calculate characteristics of many galaxies using images taken by the Pan-STARRS PS1 optical telescope in Hawaii.
History
TheSkyNet Sourcefinder project was introduced publicly on 13 September 2011, operating on a Java-based user platform, processing data using new distributed computing software called Nereus.
One year later, theSkyNet celebrated its first birthday and at the same time theSkyNet POGS project became the first public Australian based project to participate in the well established distributed computing platform BOINC. The acronym POGS is a reference to a game played with discs that originated on Maui, Hawaii, in the 1920s, and the fact that the Pan-STARRS PS1 telescope, is situated on Mount Haleakala, Maui. However, the project recast "POGS" as a backronym for "Pan-STARRS Optical Galaxy Survey".
Scientific objectives
The aim of theSkyNet POGS project is to:
Combine the spectral coverage of GALEX, Pan-STARRS1, and WISE to generate a multi-wavelength (ultra-violet, optical and near infra-red) galaxy atlas for the nearby Universe.
Calculate the physical parameters of each galaxy, including: star formation rate, stellar mass of the galaxy, dust attenuation, and the total dust mass on a pixel-by-pixel basis using spectral energy distribution fitting techniques.
The aim of theSkyNet Sourcefinder project is to:
Refine the use of the Duchamp Sourcefinding algorithm for very large datasets in preparation for next generation radio telescope surveys using Australian Square Kilometre Array Pathfinder and the Square Kilometre Array.
Software
TheSkyNet POGS distributed computing software runs continuously in the background on a computer while a user works, making use of any processor time that would otherwise be unused. It is one of many projects which utilise the Berkeley Open Infrastructure for Network Computing (BOINC) Project Management software platform, which allows users to contribute to a range of distributed computing projects at the same time. Distributed Computing is often also referred to as Volunteer Computing or Grid Computing.
After a user downloads the BOINC Manager software and elects to join theSkyNet POGS project, work units are requested automatically by the BOINC Manager. These are downloaded and processed automatically on the user's computer, using a percentage of the computer's idle time, according to the parameters set up by the user.
On completion of a work unit, the results of the data processing are automatically transmitted back to theSkyNet via the Internet, the user is credited with the work done; and further work is requested.
TheSkyNet Sourcefinder, before its closure in early 2014 to undergo redevelopment, used a Java-based custom software either via a browser or installed software. TheSkyNet Sourcefinder was redeveloped to use BOINC and VirtualBox.
Hardware
The software runs on Windows, Unix/Linux, Macintosh and Android systems. Some discrepancies have been noted between the results created by Androids and those created by other devices.
The POGS project utilised CPUs but did not utilise the power of graphics processing units (GPUs).
Participation
The project is operated by ICRAR in Perth, Western Australia, under the team leadership of Associate Professor Kevin Vinsen.
On 13 October 2014, the project's server status page claimed 13,770 unpaid volunteer users worldwide with credit (5,268 with recent credit); and 40,847 computers with credit (16,508 with recent credit).
Scientific results
On 7 June 2013 a paper entitled "A BOINC based, citizen-science project for pixel Spectral Energy Distribution fitting of resolved galaxies in multi-wavelength surveys" was submitted for publication. It was last revised on 3 October 2013.
On 23 September 2014, the project Team Leader announced that the project was about to process its 50,000th galaxy.
Future projects
TheSkyNet has stated that it will expand to include other projects processing data from new sources, such as the Murchison Widefield Array telescope in Western Australia and perhaps even the Square Kilometre Array.
See also
List of distributed computing projects
References
External links
https://github.com/ICRAR/boinc-magphys
BOINC website
Berkeley Open Infrastructure for Network Computing projects
Free software Berkeley Open Infrastructure for Network Computing projects
Distributed computing projects
Citizen science |
429550 | https://en.wikipedia.org/wiki/The%20Sweeney | The Sweeney | The Sweeney is a 1970s British television police drama focusing on two members of the Flying Squad, a branch of the Metropolitan Police specialising in tackling armed robbery and violent crime in London. It stars John Thaw as Detective Inspector Jack Regan and Dennis Waterman as his partner, Detective Sergeant George Carter. It was produced by the Thames Television subsidiary Euston Films for broadcast on the ITV network in the UK between 2 January 1975 and 28 December 1978.
The programme's title The Sweeney comes from the real-world Cockney rhyming slang nickname "Sweeney Todd" used to refer to the Flying Squad by London's criminal fraternity in the mid 20th Century.
The very great popularity of the show in the UK helped bring about the production of two feature film iterations of the series in Sweeney! and Sweeney 2.
In the UK, repeats were shown on UK Gold and Channel 5 in the 1990s. In the 2020s, episodes are repeated most weekdays on ITV4.
In 1977, the BBC responded to the success of The Sweeney on ITV and commissioned its own hard hitting police series, Target. It was heavily criticised for the levels of violence and the BBC cancelled Target after just two seasons.
Background
The Sweeney was developed from a one-off TV drama entitled Regan which served as the pilot episode for the series. Regan is a 90-minute television film written by Ian Kennedy Martin for the Thames Television anthology series Armchair Cinema (see Armchair Theatre) in 1974.
The part of Jack Regan was specifically written for John Thaw, who was a friend of Ian Kennedy Martin, with whom he had worked on the TV drama series Redcap in the 1960s. Dennis Waterman was cast after his performance in the Special Branch episode "Stand and Deliver", also produced by Euston Films.
From the very beginning, the Regan film was seen as having series potential. After it scored highly in the ratings, work began on the development of the series proper. Ian Kennedy Martin saw the subsequent series as being mainly studio-based, with more dialogue and less action, but producer Ted Childs, inspired in part by Get Carter (1971) and The French Connection (1971), disagreed. Following this battle for creative control, Ian Kennedy Martin parted company with the project. His shoes as series writer were filled by his brother Troy Kennedy Martin, Roger Marshall, Ranald Graham and Trevor Preston.
Every writer on the series was given very specific guidelines to follow: "Each show will have an overall screen time (minus titles) of 48 minutes 40 seconds. Each film will open with a teaser of up to 3 minutes, which will be followed by the opening titles. The story will be played across three acts, each being no more than 19 minutes and no fewer than 8 minutes in length. Regan will appear in every episode, Carter in approximately 10 out of 13 episodes. In addition to these main characters, scripts should be based around three major speaking parts, with up to ten minor speaking parts."
Previously, most TV police dramas had shied away from showing officers as being fallible. The series shows a somewhat more realistic side of police life, depicting them as flawed human beings, some with a disregard for authority, rules and the "system". Police officers in The Sweeney are ready and willing to meet violence with violence when dealing with London's hardened criminals, and are prone to cut corners and bend the law in pursuit of their prey, as long as it gets the right result. Until The Sweeney, the violent reality of policing was largely ignored by British television. The series broke new ground for TV drama and didn't shy away from self-awareness and genre-referential humour. This is very evident in episodes such as 2.7 "Golden Fleece" when Regan brandishes a lollipop at Carter and says "who loves ya, baby" in a nod to hit US crime series Kojak (1973-78); or in 2.10 "Trojan Bus" when Regan whistles the theme-tune to the BBC's sedate police series Dixon of Dock Green (1955-76) after a particularly elementary piece of detective work.
The series also captured the zeitgeist as it was made during a dark period for the real-world Flying Squad. During the mid 1970s Flying Squad officers were publicly censured for being involved in bribery, corruption and for having excessively close links with the criminal fraternity. At the time, this reality served as a backdrop to the series, and it is reflected in the mood, tone and story lines of The Sweeney. Detective Chief Superintendent Kenneth Drury, the Flying Squad's real-life commander, was convicted on five counts of corruption and imprisoned for eight years. Twelve other officers were also convicted and many more resigned. In the late 1970s, this and other scandals led to a massive internal investigation into the activities of the Metropolitan and City of London Police lead by Dorset Police, codenamed Operation Countryman. All of this may have inspired parts of the plot of Sweeney 2.
Cast and characters
Main characters
The two main protagonists are Detective Inspector Jack Regan (John Thaw) and Detective Sergeant George Carter (Dennis Waterman). The third is Detective Chief Inspector Frank Haskins (Garfield Morgan), their boss and a senior Flying Squad officer.
Jack Regan
John Thaw stars as Detective Inspector John "Jack" Albert Regan, a tough police officer, often frustrated by Scotland Yard's red tape. Originally from Manchester (like Thaw himself), he has been in London for several years. He occasionally refers to his northern roots (his poor upbringing, his father's work on the Manchester Ship Canal), which prompts banter from George Carter, a Londoner, such as humming "The Red Flag". A heavy drinker and smoker (comically, he is sometimes seen stealing other people's cigarettes), Regan has some success with women; although not as much as Carter, or in one episode, Detective Chief Inspector Haskins. He has an ex-wife, Kate, and daughter, Susie, who live in Ruislip.
Regan may be tough but he is also a decent man, seen to help out an ex-informer whose son is kidnapped in 4.9 "Feet of Clay"; and his sympathetic pushing enables his boss Haskins to ask for help when his wife goes missing after a breakdown, in 4.13 "Victims"; it's Regan who finds her. Regan will bend the rules in order to achieve the desired result: for example, fabricating evidence, arranging for a criminal to be kidnapped, illegally entering private property and threatening to lie about being attacked by a prisoner in order to get information. Despite this he has his own very strong moral code. He's unwilling to cheat for personal gain, delivers a blistering attack on a corrupt copper, and refuses to take bribes.
Although he is seen driving various cars himself throughout the series, Regan usually travels by squad car with police driver. He drives what is presumably his own car, a green 1974 Ford Capri (Mk II) 3.0 Ghia (PTW 475M), in episode 1.13 "Abduction".
George Carter
Dennis Waterman plays Detective Sergeant George Hamilton Carter who comes from south London. In the series' timeline, George was in the Flying Squad prior to events in Regan, but quit for family reasons (cf. Regan and 1.5 "Jigsaw"). Carter is not as aggressive as Regan and usually plays the "good cop" role. He is married to Alison Carter, a schoolteacher, but is widowed when she is murdered in episode 2.5 "Hit and Run". He is a former amateur boxer, as shown in the pilot Regan, and is described as having professional boxing potential in episode 2.1 "Chalk and Cheese". Like Regan, he enjoys a drink, and follows football. After the death of his wife Carter is shown dating women in several episodes.
Frank Haskins
Garfield Morgan plays Detective Chief Inspector Frank Haskins. He is married and has three children, all at boarding school, and is Regan's immediate superior. Prior to the series timeline, the character had done "National Service in the Signals Corps in a minor intelligence role" (as revealed in episode 2.9 "Stay Lucky, Eh?"). He is frequently seen at odds with Regan, preferring more conventional "by-the-book" policing methods.
The main episodes featuring Haskins are 2.7 "Golden Fleece", in which he is set up to be the victim of a corruption inquiry, and 4.13 "Victims", in which his wife suffers a mental breakdown.
During the first three series, Haskins appears in the opening titles of every episode whether or not the character appears in the actual story.
Haskins is absent at the start of the fourth and final series due to Garfield Morgan's other professional committments, but he returns a few episodes in. Correspondingly, there are two versions of the fourth series opening titles, one with, and one without, Haskins.
Other recurring characters
The Squad
The series introduces several other Squad officers over the years including: Detective Sergeant Matt Mathews (John Flanagan); Detective Sergeant Kent (Carl Rigg); Detective Constable Thorpe (Martin Read); Detective Constable Jellineck (James Warrior); Detective Constable Gerry Burtonshaw (Nick Brimble); Detective Sergeant Tom Daniels (John Alkin).
Regan's squad car comes with an "authorised" police driver. In the first series Regan has a variety of drivers including Len (Jack McKenzie), Fred (Denis DeMarne) and Brian Cooney (Billy Murray). Episode 1.7 "The Placer" introduces the character of Bill (Tony Allen) who becomes Regan's regular driver, although he plays a peripheral, non-speaking role in most episodes. Tony Allen subsequently worked as wardrobe manager for many of John Thaw's later projects.
When Haskins is absent, other senior officers step in to manage the squad, including Detective Chief Inspector Stephen Quirk (Bill Maynard) and Detective Chief Inspector Anderson (Richard Wilson).
Other more senior officers include: Detective Chief Superintendent Maynon (Morris Perry), a semi-regular throughout the series and more willing than Haskins to bend the rules to get a result (later promoted to Commander); Detective Superintendent Grant (T.P. McKenna); Detective Chief Superintendent Braithwaite (Benjamin Whitrow). Colin Douglas features as an unnamed Commander in series 1, with Michael Latimer as Commander Jackman in series 2.
The relationship between Squad officers is largely informal. Regan is always referred to as "Guv'nor", or just "Guv". He invariably calls Carter and the other Squad members by their first names, or occasionally nicknames. When off duty, Regan and Carter are friends and drinking buddies, so in private Carter calls him "Jack". This is all in accordance with widespread police convention. Everyone calls DCI Haskins simply "Haskins" (or Mister Haskins), though Regan occasionally calls him by his first name, "Frank".
The Cars
Although not people, the cars used in The Sweeney became just as important to the series as any of the human characters.
The most iconic car in the series is NHK 295M, a metallic copper-bronze 1974 Ford Consul 3000 GT V6 (often mistaken for a Granada Mk1). As well as being the main squad car used to get Regan and Carter around London, it also features in the opening titles of series 1-3 (driven by stuntman Joe Wadham).
Other squad cars featured include an onyx green 1973 Ford Granada 3.0 Ghia (Mk1) (NHK 292M), a blue 1974 Ford Cortina 2000 XL (Mk3) (NHK 296M), a bronze 1976 Ford Granada (Mk1) 3.0 Ghia X (RHJ 997R). The main squad cars were supplied for filming by Ford from their press fleet at no cost, and the producers were specifically told that the cars were not to be damaged. Such was the prominence of the company's cars in the series, it was jokingly referred to as "The Ford Squad". In later episodes Ford updated the cars, providing a metallic silver Mk1 Ford Granada Ghia 3.0 V6 (NWC 301P), a silver 1978 Ford Granada (Mk2) 2.8iS (VHK 491S) and a silver Ford Cortina (Mk4) 2.0 GL (PNO 548R), among others.
A jupiter red Granada (UAY 272S) was due to be used for filming in season four but it suffered bodywork damage while being delivered to Euston Films and was replaced.
The series is infamous for featuring Jaguars as the criminal's car of choice. Jaguar S-types in particular were regularly deployed throughout the series as getaway cars, most notably in episode 1.10 "Stoppo Driver". A blue/grey S-type DWD 606C is used in the series 1-3 opening titles, pursued and chased down by the Squad in NHK 295M.
One reason cited for the regular appearance of Jaguars is that they were favoured by the stunt drivers as being the "safest" cars to use. The same few cars would be used and re-used, crashed, fixed up, and resprayed numerous times. According to Kevin Whately, John Thaw claimed that he had witnessed the regency red 1960 Jaguar Mark 2 (registration 248 RPA) used in Inspector Morse being written off several times while filming The Sweeney. Apparently, the car was in real-life a "polished up wreck" and would often break down during filming.
A red Fiat 850 coupé (UJB 92G) makes cameo appearances in several episodes: typically, it is parked at the side of the road as the action takes place around it. One theory is that the car belonged to a crew member who tried to include it as an in-joke in as many episodes as possible.
Family
Other featured characters include the close family of the three leads.
Regan's ex-wife Kate (Janet Key) appears in the pilot Regan and in episode 1.13 "Abduction". Their daughter Susie (Jennifer Thanisch) appears most notably in "Abduction".
Carter's wife Alison (Stephanie Turner) is seen attempting to prise him away from the Squad in episode 1.5 "Jigsaw", while her hostility toward Regan is apparent in 1.13 "Abduction". She is murdered in episode 2.5 "Hit and Run". In the DVD commentary for "Abduction", it is claimed that Alison was written out because actress Stephanie Turner was asking for too much money to continue to appear in the series. Stephanie Turner went on to appear in Juliet Bravo, also devised and part-written by Ian Kennedy Martin.
Doreen Haskins (Sheila Reid) features in the penultimate episode 4.12 "Victims", which deals with her deteriorating mental health and the impact of police work on family life. One of Haskins' three children, Richard, also appears in this episode.
Guest stars
Guest stars in the show included:
Joss Ackland
Tony Anholt
Coral Atkins
Lynda Bellingham
Hywel Bennett
Brian Blessed
James Booth
Donald Burton
Simon Callow
Cheryl Campbell
Tony Caunter
Warren Clarke
George Cole ɫ
Kenneth Colley
James Cosmo
John Rhys-Davies
Vernon Dobtcheff
Diana Dors
Colin Douglas
Lesley-Anne Down
Rosemarie Dunham
Michael Elphick
Arthur English
Norman Eshley
Derek Francis
Ronald Fraser
Prunella Gee
Sheila Gish
Peter Glaze
Julian Glover
Brian Hall
Cheryl Hall
Edward Hardwicke
Tina Heath
Ian Hendry
Del Henney
Paul Henry
Julian Holloway
John Hurt
Ken Hutchison
Barrie Ingham
David Jackson
Geraldine James
Peter Jeffrey
Paul Jones
John Junkin
Roy Kinnear
Ronald Lacey
Alan Lake
Lynda La Plante
George Layton
Maureen Lipman
Sue Lloyd
David Lodge
Kenny Lynch
John Lyons
T. P. McKenna
Philip Madoc
Alfred Marks
Judy Matheson
Bill Maynard
Malcolm McFee
Warren Mitchell
Morecambe and Wise ɫ̩ɫ̩
Lee Montague
Patrick Mower
Billy Murray
Alex Norton
Jim Norton
Daphne Oxenford
Nicola Pagett
Geoffrey Palmer
Moira Redmond
Michael Ripper
Maurice Roëves
Sheila Ruskin
Tony Selby
Nadim Sawalha
George Sewell
Catherine Schell
Anne Stallybrass
Tony Steedman
Gwen Taylor
Stephanie Turner
Patrick Troughton
Peter Vaughan
Colin Welland
Diana Weston
Geoffrey Whitehead
Margaret Whiting
Richard Wilson
Stuart Wilson
John Woodnutt
Robert Gillespie(thin ice)
Tony Aitken(thin ice)
June Brown(Ep1)
ɫGeorge Cole and Dennis Waterman went on to star in Minder.
ɫ̩ɫ̩Morecambe and Wise appeared in return for Thaw and Waterman appearing on their show.
Many up-and-coming actors also appeared in the show during its run, such as:
June Brown
John Challis
Carol Drinkwater
Christopher Ellison
Janet Ellis
Richard Griffiths
Karl Howman
Sally Knyvette
Patrick Malahide
Andrew Paul
Sandy Ratcliff
Ray Winstone
Production
The Sweeney strived for authenticity and social realism. This ethos was reflected in most aspects of production, from the storylines, casting, locations and most importantly the dialogue. As well as the series title, cockney rhyming-slang gave extra colour to the dialogue, including ‘poppy’ (money), ‘bottle’ (courage) and ‘grass’ (informer). Criminal and police slang was also used, including 'ringer' (a car thief, also a stolen car with fake plates), 'stoppo' (a getaway car), 'snout' (informant), 'factory' (police station/office), 'fence' (selling stolen goods, also someone who sells stolen goods) and 'fireman' (someone who deals with problems). Many of these slang terms were brought to a wider audience for the first time in The Sweeney, some even entered popular use, but the terms have remained part of the British crime drama landscape.
The Sweeney was shot on 16mm film, allowing producers to use much smaller and more agile camera crews than shooting on videotape allowed at that time. This made it possible to shoot almost entirely on location for both exteriors and interiors, helping to give the series a startling degree of realism and elevating London as a character of its own. Using film also allowed directors to feature many more action sequences. Directors Tom Clegg, Terry Green, Douglas Camfield, David Wickes, Mike Vardy and William Brayne were among the group of "guerrilla filmmakers" that realised the episodes. What they and the crews delivered is a fast-paced series, depicting the Squad's relentless battle against armed robbery; but it also includes a substantial degree of humour. For the period it has a high degree of on-screen violence, and it is not unknown for several deaths to occur in an episode.
Each episode had a budget of £266,000 with an eight-and-a-half-week production schedule: two weeks' pre-production (for casting, finding locations etc.), two weeks' shooting, four weeks' picture editing (the first two weeks of which overlapped with the shoot), two weeks' sound editing, and two-and-a-half days' dubbing.
The filming of each episode normally took 10 working days, shooting about five minutes of edited screen time per day. Due to this, the number of different filming locations had to be restricted to 10, i.e. one location per day. At the Euston Films production office in Colet Court, Hammersmith, a standing set of the Flying Squad offices was constructed which provided an alternative option for when inclement weather restricted the day's shooting. Two days would normally be spent filming on the set, equalling 10 minutes of any episode being set in the offices. Shooting took place through the spring, summer, autumn and winter months; exterior night shooting was expensive, and was limited to three minutes of external night material in any episode.
Filming location
Most of the locations used for filming The Sweeney were around the west London area—in particular, Acton, Chiswick, Shepherd's Bush, Hammersmith, Fulham, Earl's Court, Kensington & Chelsea and Notting Hill districts, close to the Euston Films HQ at Colet Court in Hammersmith. The London Docklands, derelict at the time, were ideal for filming location sequences. The opening titles were filmed in Colet Gardens. However, other notable locations in London, the South East of England and further afield were also used for filming the show's episodes and included:
Chertsey/Penton Hook Lock, Surrey - "Thin Ice", "Bad Apple", "On the Run", "Feet of Clay" & "Jack or Knave?".
Battersea - "Jigsaw", "Stoppo Driver", "Faces", "Trap", "Trojan Bus", "Country Boy", "Visiting Fireman", "Tomorrow Man", "May" & "Victims", "Chalk & Cheese" (Craven Arms, Lavender Hill)
Bermondsey - "Regan".
Black Park Country Park, Wexham, Buckinghamshire - "Regan", "Payoff", "On the Run" & "Hearts & Minds".
Dulwich - "Regan", "Ringer".
Dulwich Hamlet F.C. "Ringer".
Gozo/Maltese Archipelago - "Sweeney 2".
Earl's Court - "Bait" (Cromwell Crescent & Logan Place).
Earlsfield - Garratt Lane and Garratt Snooker Club - "Supersnout".
Hammersmith - "Jackpot".
Heathrow - "Golden Boy", "Stoppo Driver" & "Tomorrow Man".
Kingston upon Thames - "Hit and Run" & "Trojan Bus".
Ladbroke Grove - "Hard Men"
Maida Vale - "Night Out". (The Warrington Hotel)
Peckham - "Ringer".
Potters Bar "Big Spender".
Putney/Putney Bridge "Contact Breaker", "Abduction" "Taste of Fear" & "Sweeney 2".
Queens Park Rangers F.C., Loftus Road - "I Want the Man!".
Raynes Park - "Big Spender", "Golden Fleece" & "Victims".
Richmond (River Lane; Leonard Gold's house) -"The Bigger They Are"
Roehampton - "Queen's Pawn", "Golden Fleece" (Bank of England Sports Centre), "Victims" & "Sweeney 2" (Danebury Avenue/Alton Estate).
Sandown Park Racecourse, Esher, Surrey - "Big Spender".
Shepherd's Bush - "Jackpot".
Southall Gas Works - "Faces".
Southwark - "Ringer".
Staines, - "The Placer".
Tooting Bec - "Abduction" (Trinity Road & Tooting Bec Tube Station).
Twickenham - "The Placer", "Golden Fleece" (Twickenham Stadium) & "Bad Apple".
Uxbridge - "Thou Shalt Not Kill" (Brunel University) & "Bad Apple".
Wandsworth - "Queens Pawn", "Jigsaw", "Abduction", "Country Boy", "Tomorrow Man", "May", "Drag Act" & "Sweeney 2".
White City - "May" (White City Stadium).
Wimbledon - "Contact Breaker" (Wimbledon Stadium), "Stay Lucky, Eh?" "May", "Lady Luck" & "Money, Money, Money".
Wokingham, Berkshire - "Thin Ice".
Episodes
Series overview
Series 1 (1975)
Series 2 (1975)
Series 3 (1976)
Series 4 (1978)
Films
The cinematic versions of The Sweeney feature the same actors and characters as the TV series, however both films have levels of swearing, violence, sex and nudity that would not have been possible on television at the time.
Sweeney! (1977)
In Sweeney!, Regan and Carter become involved in a plot which shares similarities to the 1963 Profumo affair and British actor Barry Foster features as an American socialite loosely based on Stephen Ward. Made in 1976, and released in 1977, the film appears to be set in 1979. On screen and in-film references include the line "The same damned speech you made in 1978" and a large banner at the OPEC delegates meeting features the convention's logo and the year "1979". This suggests that the events of the film occur after the end of the television series chronologically, assuming series 4 is set in 1978 as broadcast.
Sweeney 2 (1978)
In Sweeney 2, Regan and Carter are on the trail of particularly violent armed criminals. The gang has carried out several successful bank and payroll robberies all over London and killed anyone that gets in their way, even their own members. Regan and Carter are assigned the case as a last order from Detective Chief Superintendent Jupp (Denholm Elliott) before he resigns to face allegations of corruption in the courts.
2012 Reboot
In director Nick Love's film, the characters from the original series are re-imagined, and the setting and action are moved to the early 21st Century. The Sweeney (2012) stars Ray Winstone as Regan, Ben Drew as Carter and Damian Lewis as Haskins.
In the UK, The Guardian's Steve Rose gave Nick Love's film a one star review, saying that "rather than upgrading the 1970s TV favourite, it (the 2012 film) treats it like a stolen car – to be stripped down, resprayed and erased of identifying features. Only the brand name has been retained."
The 2012 film was remade in France as The Squad (2015), also known as The Sweeney: Paris.
Music
The title theme music and end credit reprise were both written by Harry South, a key figure in British jazz during the 1950s and 1960s.
Dave Gelly writing in The Guardian called South's title music "the most emblematic TV theme of its day".
Incidental and background music for the series was selected from off-the-shelf production music libraries, including De Wolfe, KPM, Bruton and Chappell. In 2001 a soundtrack album Shut it! The Music of The Sweeney was released and in contains a large selection of the incidental music used in the programme, some augmented with classic pieces of dialogue from various episodes. Also included on the album is the main title theme music from the first feature film, Sweeney!.
Books
Nine books were written and released in 1977 published by Futura Publications Ltd.
The Sweeney
Regan and the Manhattan File
Regan and the Deal of the Century
Regan and the Lebanese Shipment
Regan and the Human Pipeline
Regan and the Bent Stripper
Regan and the Snout Who Cried Wolf
Regan and the Venetian Virgin
Regan and the High Rollers
The first three books were written by Ian Kennedy Martin, the rest by Joe Balham. The plots of the books are not taken from any of the television episodes; overall, the tone of the books differs somewhat from the television series in that Regan is usually depicted as working alone, and his relationship with Carter is distinctly unfriendly.
Popular culture
The repeat of the episode "Selected Target" on 21 December 1978 recorded the highest viewing figure of the series, with 19.05 million people watching. This coincided with a 24-hour strike at the BBC.
The Sweeney is mentioned in the song Wow! by Kate Bush.; and Cool For Cats by Squeeze.
In the orange-tinted photographs that are shown in the closing credits for Series 1–3, an enlarged set of fingerprints is displayed on a board behind Detective Chief Inspector Haskins.
Reference is made to The Sweeney in the Black Books episode "The Blackout".
Regan and Carter appear briefly as part of a stakeout operation in one of the novelizations of the TV series The Professionals.
Scotland Yard's real Flying Squad lost an important surveillance technique when The Sweeney exposed their use of the roadside tents erected by telephone engineers, who would place them over open manholes in the street to protect them from the weather. These tents are frequently shown in the series as hideaways for keeping a covert eye on suspects.
A two-part 1998 instalment of Diagnosis: Murder, "Obsession", features lead villains named Carter Sweeney and Regan Sweeney.
The creators of the show Life on Mars and its sequel, Ashes to Ashes, have often stated that The Sweeney was a big influence on both programmes.
To date, only one episode of The Sweeney has been shown on the BBC. It was shown on 31 May 1993 as part of the "Cops On The Box" segment of BBC Two's "Crime And Punishment" season. The episode broadcast was "Supersnout". It was introduced by Shaw Taylor, better known for his Police 5 series on ITV.
Detectives on the edge of a nervous breakdown
The 1993 Comic Strip film Detectives on the Edge of a Nervous Breakdown features a character introduced as "Shouting George from The Weeny" (played by Jim Broadbent).
Comics
In 1977 and 1978, publishers Brown Watson (who specialised in annuals based on TV series) published two editions of The Sweeney Annual featuring a mix of comic strips (some with art by Brian Lewis) and illustrated text stories, interspersed with occasional features on the TV series, articles about policing, puzzles and (in the 1978 annual) an interview with John Thaw and Dennis Waterman.
In the early 1980s, the comic Jackpot featured a strip called "The Teeny Sweeney" which was originally drawn by J. Edward Oliver. A trio of schoolboys played at being plain-clothes policemen, with two of them looking like little versions of Regan and Carter. They even had "Flying Squad" written on the side of their cartie. Their attempts at being helpful, however, almost always ended in disaster.
TV Advert
A TV ad for the Nissan Almera car in the late 1990s had two characters similar to Carter and Regan racing through London to deal with a "bank job". A suspicious group of men have entered a bank dressed as painters. As "Carter" races the car through the streets, "Regan" keeps bellowing at him and others to "Shut it!"
At one stage, "Regan" shouts "Mark it!", which is slang for following a suspect, but in this case, means "market" as "Carter" drives erratically through a market place. "Carter" tells "Regan" to stop shouting, to which "Regan" barks the reply "I can't!".
When they burst into the bank, it turns out that the men are genuine painters and that "Regan", their guv (or boss), is there to tell them that they have the wrong sort of white paint(!) "Carter" says, "Think we'd better go back to the yard, guv, and get some more." "Shut up!"
One of the painters talks in a squeaky-like voice and is called "Squealer", which is slang for informant.
Home releases
The complete tv series of The Sweeney was released by Network on 14 DVDs in 2005. This release did not include the pilot film Regan or either of the two feature films.
Regan was released on DVD in November 2005.
Both films, Sweeney! and Sweeney 2, have also been released on DVD.
In 2007 Network released an 18-disc box-set containing Regan, all four television series and both feature films. The box-set also contains exclusive extras, listed below:
Regan:
Introduction by Ian Kennedy-Martin.
Commentary with Dennis Waterman, producer Ted Childs and director Tom Clegg.
Series One:
Interview with creator Ian Kennedy-Martin.
Commentaries with Dennis Waterman, Garfield Morgan, producer Ted Childs, writers Trevor Preston and Troy Kennedy-Martin, directors Tom Clegg and David Wickes and editor Chris Burt.
"Thick as Thieves" episode and "Special Branch" episode.
Episode introductions by guest stars Warren Mitchell, Wanda Ventham, Prunella Gee, John Forgeham, Billy Murray, Tony Selby and Dudley Sutton.
Restoring The Sweeney
Series Two:
Interview with stunt arranger Peter Brayham.
"Wild Boys" featurette.
The Sweeney annual PDF.
Interview with writer Roger Marshall.
"Golden Fleece" episode script PDF.
Episode introductions by guest stars Bill Maynard, Gwen Taylor, James Booth, Ken Hutchison and Lynda Bellingham.
Sweeney! film trailer with introduction by Lynda Bellingham.
Sweeney! film promotional gallery.
Series Three:
"Redcap" episode.
"Morecambe and Wise Christmas Show" 1976 sketch.
"Strange Report" episode.
Episode introductions by guest stars Geraldine James, Steven Pacey, George Sweeney, Nadim Sawalha, Tina Heath and John Lyons.
"ITV – This is Your Life" clip from 1976 Thames trailer.
"Evening News Film Awards" clip.
The Sweeney 1977 Annual PDF
Series Four:
"The Electric Theatre Show" interviews with John Thaw, Dennis Waterman and Ted Childs.
"This is Your Life – John Thaw" extract.
"This is Your Life – Dennis Waterman" extract.
Series 4 textless titles with dual sound.
Episode introductions by guest stars James Warrior, George Sewell, Jenny Runacre, Nick Stringer, Gary Morecambe and Peter Wight.
Sweeney film trailer with introduction by Ken Hutchison and James Warrior.
Sweeney 2 promotional gallery PDF.
Out-takes.
The Sweeney 1978 Annual PDF.
Stills gallery Extract from "Behind the Sunshine" PDF, recounting the making of "Hearts and Minds".
Sweeney! and Sweeney 2:
Commentary on Sweeney! with Ted Childs, Ranald Graham and David Wickes.
Commentary on Sweeney 2 with Ted Childs and Tom Clegg.
Textless material.
These extras are exclusive to the boxset.
All four series one are now available as Region 1 (North America) DVDs.
Blu-ray Release
In 2012, the first series was released on high-definition Blu-ray by Network. For this release the original 16 mm film negatives were scanned in HD and comprehensively restored by BBC Studios and Post Production.
The pilot episode Regan was also given a Blu-ray release by Network at roughly the same time.
In September 2018, Network confirmed via Twitter that Blu-ray releases of Series 2 to 4 had been abandoned due to "lack of demand".
References
Further reading
Manuel Alvarado and John Stewart, Made for Television: Euston Films Limited. London: Methuen/BFI, 1985. .
Robert Fairclough and Mike Kenwood, Sweeney! The Official Companion. London: Reynolds & Hearn Ltd., 2002. . (review).
Dennis Waterman, Reminder. Hutchinson, 2000. .
Martin Day and Keith Topping, Shut It! Virgin Books, 1999. .
Mike Kenwood and George Williams, Fags, Blags, Slags & Jags: the Sweeney. The Unofficial Companion to the TV Series, 1998. No ISBN.
Troy Kennedy Martin, "Four of a Kind", in: H.R.F. Keating, ed., Crime Writers. London: BBC, 1978. .
Andrew Pixley, "The Sweeney: Compulsive Viewing", in: Prime Time Magazine, issue 13. London: WTVA ("Wider Television Access"), circa 1984. .
External links
The Sweeney at Nostalgia Central
The Sweeney ranked
Ian Kennedy-Martin, The Sweeney: a preamble
David Wickes: The Sweeney
1975 British television series debuts
1978 British television series endings
1970s British crime television series
1970s British drama television series
1970s British workplace drama television series
1970s crime drama television series
British detective television series
English-language television shows
ITV crime dramas
Robbery in television
Television shows produced by Thames Television
Television series by Euston Films
Television series by Fremantle (company)
Television shows set in London |
6769926 | https://en.wikipedia.org/wiki/RPG%20Maker | RPG Maker | RPG Maker, known in Japan as , is a series of programs for the development of role-playing video games (RPGs) with story-driven elements, created by the Japanese group ASCII, succeeded by Enterbrain. The Japanese name, Tsukūru, is a pun mixing the Japanese word tsukuru (作る), means "make" or "create", with tsūru (ツール), the Japanese transcription of the English word "tool".
The RPG Maker series was originally released primarily in Japan, but people started to translate and release the software illegally in China, Taiwan, South Korea, Russia, and North America with RPG Maker 2000 and RPG Maker 2003. However, most of the later engines were translated officially worldwide by Japan.
PC versions
RPG Maker is a program that allows users to create their own role-playing video games. Most versions include a tile set based map editor (tilesets are called chipsets in pre-XP versions), a simple scripting language for scripting events, and a battle editor. All versions include initial premade tilesets, characters, and events which can be used in creating new games. One feature of the PC versions of RPG Maker programs is that a user can create new tilesets and characters, and add any new graphics the user wants.
Despite being geared towards creating role-playing video games, the engine also has the capability to create games of other genres, such as adventure games (see Yume Nikki), story-driven games or visual novels with minimal tweaking. Some video games made in RPG Maker engine (See Super Columbine Massacre RPG! and Heartbeat) garnered controversy by many audiences.
RPG Tsukūru Dante 98
According to Enterbrain, RPG Tsukūru Dante 98, released on December 17, 1992, was the first software of the RPG Maker series, although there were a few versions of RPG making software by ASCII preceding it, dating back to 1988. This, along with its follow-up RPG Tsukūru Dante 98 II, was made for NEC PC-9801, and games created with these programs can be played on a Windows computer with emulators called Dante for Windows and D2win, respectively. RPG Maker was a product that came from various programs that ASCII Corporation had included in ASCII along with other users' code submitted to it, which the company decided to expand and publish into the standalone game-making toolkit.
RPG Maker 95
RPG Maker 95 was the first Microsoft Windows-based RPG Maker software. Despite being an early version, RPG Maker 95 has both a higher screen resolution, and higher sprite and tile resolution than the several following versions.
RPG Maker 2000
RPG Maker 2000, also referred to as RM2k, was the second release of RPG Maker for Microsoft Windows and is the most popular and used RPG Maker so far. While it is possible to do more with RM2k, it uses lower resolution sprites and tiles than RPG Maker 95. However, it does not have a noticeable limit of 'sprites'. Unlike RM95, which can only use one 'set', RM2k can use an unlimited number of sprite sheets with specific sizes for each type. The tilesets also have a similar non-limitation. However, because tiles must be entered into a database, there is a limit on tiles. This limit however is rarely a problem (normally 5000), and even when it is, an unofficial patch exists which can bump most limits much higher at the risk of potential game corruption. It doesn't support text output and can program only 2 buttons, Z and X. There is text in dialog boxes, by manner of overlaying sprites, or maps lain with text. But not plainly on the screen.
RPG Maker 2003
RPG Maker 2003, also referred to as RM2k3, and sometimes RM2k/3, is largely an improvement of RM2k. RM2k games can be ported to RM2k3 (but not back to RM2k, the conversion is permanent), and most resources are interchangeable. The main difference is the introduction of a side-view battle system similar to that found in the Final Fantasy games on the Super NES and the Sony PlayStation. This was the first version made by Enterbrain, which had previously been a part of ASCII.
RPG Maker XP
RPG Maker XP, also referred to as RMXP, is the first RPG Maker which can use Ruby, making it far more powerful than previous versions programming-wise. However, many normal, simplified features present in RM2k(3) have been removed. Most of these features, however, have been programmed with Ruby, and distributed online. RMXP runs at 1024x768 resolution (though games made in it run at 640x480), while offering four times the playable area of its predecessors. By default, games ran at 40 frames per second, though the game's scripts can be modified to set the framerate to any value. Additionally, it allows greater user control over sprite size (there is no specific image size regulation for sprite sheets) and other aspects of game design. This more open-ended arrangement, coupled with the inclusion of the Ruby Game Scripting System (RGSS), makes RPG Maker XP more versatile than older versions in the series, at the cost of a steeper learning curve.
RPG Maker VX
RPG Maker VX, also referred to as RMVX, its Japanese release date was Dec. 27 2007, and official release date in America was February 29, 2008. In this new maker, the interface is more user-friendly, allowing new users to create games with ease. The framerate was increased to 60 frames per second, providing much smoother animation in comparison to RMXP's often-choppy 40fps. The programming language Ruby is still implemented, and the game's default programming has been overhauled to allow more freedom to those scripting in new features. New editor and a new RTP are included, this time in a much simpler "blocky" style. The default battle system is comparable to that of the Dragon Quest series or its predecessor RM2k, with a frontal view of the battlefield and detailed text descriptions of each action taken. One notable disadvantage from the previous version, however, is the lack of support for multiple tilesets when mapping, leaving the player with only a finite number of unique tiles with which to depict all the game's environments. Multiple player-made workarounds exist, but this remains a sore point among many RMVX users.
RPG Maker VX Ace
RPG Maker VX Ace, also known as VXAce or simply "Ace", was released by Enterbrain in Japan on December 15, 2011. It was released in the United States on March 15, 2012 as a digital download. It was later made available through Steam, and is also now available as a physical CD. RPG Maker VX Ace is essentially an overhauled version of RPG Maker VX, and removes the issue with multiple tilesets. Battle backgrounds were re-introduced, and are separated into top and bottom halves. Spells, skills, and items can all now have their own damage and recovery formulas, although a quick calculation method reminiscent of the older RPG Makers is available. The VX RTP was redesigned for VX Ace, and a new soundtrack featuring higher quality techno-pop tracks was included. With VX Ace came a large quantity of DLC Resource Packages offered by Enterbrain, also available through Steam.
RPG Maker MV
Released by Degica on October 23, 2015, RPG Maker MV includes a large number of changes over previous versions, having multiplatform support, side-view battles, and high resolution features. It is the first engine in the series to use JavaScript instead of Ruby, with the addition of plugins. Completed games can be played on PC and mobile devices. RPG Maker MV also goes back to layered tilesets, a feature that was removed in RPG Maker VX and VX Ace. However, unlike RPG Maker XP which allowed users to manually choose which layers to build on, RPG Maker MV automatically stacks tiles on top of other tiles. It also came out on consoles under the name RPG Tsukūru MV Trinity. It was originally announced to only be on PlayStation 4 and Nintendo Switch but was later announced to also be on Xbox One. This release was later cancelled. It was released on Nintendo Switch and PlayStation 4 in Japan on November 15, 2018, and is scheduled for release in North America on September 8, 2020, and Europe on September 11, 2020.
RPG Maker MZ
RPG Maker MZ was announced in June 2020. RPG Maker MZ is the successor of RPG Maker MV. The first trailer received mixed reviews, critics highlighting its similarity with RPG Maker MV. MZ new updates include the Effekseer particle system, autosave function and XP-style autolayer mechanics, which many users have requested in the past. It released worldwide on August 20, 2020. Like MV, it allows users to develop plugins using JavaScript. Since its release, RPG Maker MZ received mostly positive reviews from users, who praised the return of the layer mechanics from XP, and the augmented features; though similarities to previous engine, RPG Maker MV, drew mixed response similar to the first trailer.
RPG Maker Unite
It was announced as a Unity-based RPG Maker.
Console versions
RPG Tsukūru Super Dante
Victor Reetz created the first console RPG Maker, RPG Tsukūru Super Dante, which debuted in 1995 for the Super Famicom, as a port of RPG Tsukūru Dante 98. RPG Tsukūru Super Dante was later broadcast via the Super Famicom's Satellaview accessory.
RPG Maker GB is the first console portable version of RPG Maker.
RPG Maker
In 2000, RPG Maker was released for the Sony PlayStation, however, only a limited number of copies were made for releases outside of Japan. The software allowed user-made characters, and monsters through Anime Maker which was separate from the RPG Maker, which required saving to an external memory card. However, there was a limit to how many user-made sprites and monsters could be used in RPG Maker. Also, in Anime Maker, the user could create larger sprites for a theater-type visual novel in which the player could animate and control characters, but these sprites were much larger and unusable in RPG Maker.
The RPG Maker interface was somewhat user-friendly, and battles were front-view style only. Item, Monster, Skill/Magic, and Dungeons had a small limit cap, as did the effects of any given Item, Magic or Skill (9,999). Items were all inclusive; Weapons and Armors were created in the Items interface. The types of items were as follows: None (mainly used for Key Items), Weapon, Armor, Key (up to eight sub types), Magic (for binding Magic created in the Magic interface to an item), Healing, and Food (which raises stats and EXP, or experience points in which this particular software is the only one of the series to do so natively).
Events were a separate save file from the System file, and are referred to as Scenario files. This is how the user could make multiple parts to one game, provided the user had enough memory cards and card space to create the files.
RPG Maker Fes
A version for the Nintendo 3DS was released by NIS America on June 27, 2017. While it remains portable on a small screen, users can create games on-the-go and also download games to play as well. The game received some criticism, with NintendoWorldReport writing that "Ultimately, it’s hard for me to recommend RPG Maker Fes to anyone but the most hardcore of RPG fans that have always dreamed of creating their own game." Games completed can be uploaded to the RPG Maker Fes Player app for those to download and play on their own systems. It is the second RPG Maker to receive a limited edition (the previous one being RPG Tsukūru DS) which includes a CD soundtrack in a jewel case containing all the soundtracks in the game, and a full-color paperback artbook. It is the first RPG Maker on consoles/handhelds to receive a digital release.
English versions
Historically, few early RPG Maker versions had official English releases. Each Windows version has, however, been subject to unlicensed distribution through the internet in some form or other. RPG Maker 95, as well as translation patches for the Super Famicom titles RPG Maker Super Dante and RPG Maker 2, were translated and distributed by a group called KanjiHack. In 1999, KanjiHack closed upon receiving a cease-and-desist e-mail from ASCII's lawyers. RPG Maker 95 was re-released with a more complete translation under the name RPG Maker 95+ by a Russian programmer, under the alias of Don Miguel, who later translated and released RPG Maker 2000. Later versions, RPG Maker 2003, and RPG Maker XP, were similarly translated and distributed by a programmer under the alias of RPG Advocate.
The first official English release of the PC series was of RPG Maker XP on September 16, 2005. The next two versions of the software, RPG Maker VX and RPG Maker VX Ace both received official English releases. Since 2010 English versions of RPG Maker have been published by Degica, who have also officially released English versions of the older titles RPG Maker 2000 and RPG Maker 2003.
The first official English language of a console version was the PlayStation version in 2000, simply called RPG Maker, by Agetec. Agetec also localized RPG Maker 2 and RPG Maker 3.
Reception and legacy
By August 2005, the series had sold more than two million copies worldwide. Later Steam releases are estimated to have sold nearly 1million units by April 2018, according to Steam Spy.
Since its first release, the series has been used to create numerous titles, both free and commercial. According to PC Gamer, it has become "the go-to tool for aspiring developers who want to make a game and sell it", due to being "the most accessible game engine around".
In addition to games, the series has been used for other purposes, such as studies involving students learning mathematics through the creation of role-playing games, and programming.
RPG Maker series timeline
Notable games
A number of developers who have created notable games via RPG Maker include:
See also
Fighter Maker
Game Maker
Sim RPG Maker
Sound Novel Tsukūru
RPG creation software
References
External links
Video game IDE
Video game engines
PlayStation (console) games
PlayStation 2 games
Satellaview games
Kadokawa Dwango franchises
Windows software
Top-down video games
Xbox One games |
30864276 | https://en.wikipedia.org/wiki/Planisware | Planisware | Planisware is the editor of the Enterprise Project Portfolio Management (EPPM) software Planisware V6 (formerly known as OPX2) targeting multiple industries – including energy, medical devices, high-tech, aerospace & defense, chemicals, government, pharmaceutical, and automotive.
Over the past five years, Planisware has regularly been reviewed by analysts in the project and portfolio management (PPM) space, such as Info-Tech Research Group, Gartner, Forrester Research and the European Business School.
Product
Functional Scope
Planisware (formerly known as OPX2) is Planisware's primary software solution for Project Management and Project Portfolio Management. Planisware supports five functional areas:
Project and Program Management (cost, resource, planning, suppliers)
Project Portfolio Management
Idea Management
Business Intelligence (roadmapping, simulation, scorecards, data exploration)
Collaboration (including document management) and time tracking
Product Architecture
Planisware has a three-tier architecture: a browser on the client side, an application server, and a database. On the client side, Planisware supports any mainstream browser on Microsoft Windows, Linux/UNIX, and Mac platforms, and runs with an Ajax applet. The Planisware application server combines with a classic Web server (IIS and Apache). The database can be either Oracle or SQL Server or PostgreSQL.
Markets and Product Reviews
Planisware's customer base encompasses various industries, including energy, medical device, high-tech, aerospace & defense, chemicals, government, pharmaceutical and automotive. Planisware targets more specifically:
New Product Development and Engineering
IT Project and Portfolio Management,
Earned Value Management
According to several analysts, Planisware strength lies in its highly configurable environment and functional scope breadth.
Reports from Analyst Firms
Forrester names Planisware a Leader in Portfolio Management for the Business Technology Agenda, Q1 2015. The Info-Tech Research Group ranked Planisware as a ”Champion” in their Enterprise Project Portfolio Management Vendor Landscape for 2014.
See also
List of project management software
Project portfolio management
References
External links
Planisware official site
Voted best solution for NPD in 2006
Projects@Work website with good OPX2 info
Project management software
Business software
Business software for Windows |
21966549 | https://en.wikipedia.org/wiki/Libre%20Graphics%20Meeting | Libre Graphics Meeting | The Libre Graphics Meeting (LGM) is an annual international convention for the discussion of free and open source software used with graphics; The first Libre Graphics Meeting was held in March 2006. Communities from Inkscape, GIMP, Krita, Scribus, sK1, Blender, Open Clip Art Library, Open Font Library, and more come together through the Create Project to assemble this annual conference. It was co-founded by Dave Neary and Dave Odin.
Overview
Held yearly since 2006 the Libre Graphics Meeting aims to attract developers, artists and professionals who use and improve free and open source software graphics applications. LGM aims to bring these people together in the cause of creating high quality free graphics applications; By collaborating it allows the development of cross-application assets like brushes and enhanced interoperability such as shared file formats.
Many of the separate groups take the opportunity to hold birds of a feather (BOF) sessions. For many individuals it is the only time they will get to see their team members in person.
Presentations
Many things are discussed at each Libre Graphics Meeting, including usability, standards, announcements, color management and furthering the use of free software graphics applications in professional environments.
Kinematic templates
At the University of Waterloo some original research was done in the field of creating drawing aids for graphics applications. The aim was to allow an artist to draw using templates that would improve the shape or correctness of a brush stroke while maintaining a natural look. This presentation was given by Michael Terry, the lead researcher on the project.
Professional adoption
Ginger Coons gave a presentation at LGM 2009 discussing what it will take to get free software graphics applications in the doors of professional environments and schools
Collaboration
As well as cross pollination of ideas the Libre Graphics Meeting allows the discussion of possible future collaboration.
Louis Suárez-Potts, OpenOffice.org's Community Development Manager and Community Lead was sent to the LGM 2007 to find ways that OpenOffice.org might be able to transcend the boundaries of a traditional office suite by collaborating with other open source projects. One of the ways that has been suggested was that open office could suggest another open source application when it could not perform the role a user required. For example when a user needed to edit an image in an office document, OpenOffice.org may suggest GIMP to fill the role required.
Locations of Libre Graphics Meetings
Main achievements
Addition of color management to GIMP and Inkscape.
OpenRaster initiative to develop an exchange file format for raster graphics, supported by Krita, GEGL and MyPaint.
Start of the UniConvertor project to provide Corel DRAW and WMF importers for Scribus, Inkscape and any other project willing to use them.
KDE SC 4 graphics software using LibRaw instead of DCRaw to process Raw files, which is intended to achieve more consistent demosaicing, faster processing using OpenMP and better metadata extraction.
LensFun library to automatically fix various lens distortions.
Release of Open Clip Art Library 3.0.
Release of Open Font Library publicly.
Release of DeviantArt Developer API.
Public Showing of Milkymist.
See also
Fontforge
Open Source Developers' Conference
Phatch
References
External links
Libre Graphics Meeting - Report 2007
Linux Format articles related to Libre Graphics Meeting
Nathan Willis, Historic Libre Graphics Meeting set for next month, Linux.com February 21, 2006
Nick Veitch, Libre Graphics Meeting 2006, Linux Format, March 21, 2006
Nick Veitch, "Libre graphics", Linux Format n. 80, June 2006
Nick Veitch, Interview: Oyvind Kolas, Linux Format no. 96, September 2007
Nick Veitch, Interview: Louis Suárez-Potts, Linux Format no. 97 (Linux Format, October 2007 ([also available online)
Nick Veitch, Libre Graphics 2008, Linux Format no. 109, September 2008
Ted Gould, Art meets open source at Libre Graphics Meeting, Linux.com, May 15, 2007
Linux.com article on 2008 LGM Fundraising Drive
Nathan Willis, Press Release for 2009 Conference, Linux.com, April 11, 2008
Computer graphics conferences
Free-software conferences
Libre culture
Recurring events established in 2006 |
614129 | https://en.wikipedia.org/wiki/PTS-DOS | PTS-DOS | PTS-DOS (aka PTS/DOS) is a disk operating system, a DOS clone, developed in Russia by PhysTechSoft and Paragon Technology Systems.
History and versions
PhysTechSoft was formed in 1991 in Moscow, Russia by graduates and members of MIPT, informally known as PhysTech. At the end of 1993, PhysTechSoft released the first commercially available PTS-DOS as PTS-DOS v6.4. The version numbering followed MS-DOS version numbers, as Microsoft released MS-DOS 6.2 in November 1993.
In 1995, some programmers left PhysTechSoft and founded Paragon Technology Systems. They took source code with them and released their own version named PTS/DOS 6.51CD as well as S/DOS 1.0 ("Source DOS"), a stripped down open-source version. According to official PhysTechSoft announcements, these programmers violated both copyright laws and Russian military laws, as PTS-DOS was developed in close relationship with Russia's military and thus may be subject to military secrets law.
PhysTechSoft continued development on their own and released PTS-DOS v6.6 somewhere between and presented PTS-DOS v6.65 at the CeBIT exhibition in 1997. The next version from PhysTechSoft, formally PTS/DOS Extended Version 6.70 was labeled PTS-DOS 2000 and is still being distributed as a last 16-bit PTS-DOS system, .
Paragon continued their PTS-DOS line and released Paragon DOS Pro 2000 (also known and labeled in some places as PTS/DOS Pro 2000). According to Paragon, this was the last version and all development since then ceased. Moreover, this release contained bundled source code of older PTS-DOS v6.51.
Later, PhysTechSoft continued developing PTS-DOS and finally released PTS-DOS 32, formally known as PTS-DOS v7.0, which added support for the FAT32 file system.
PTS-DOS is certified by the Russian Ministry of Defense.
Commands
The following list of commands are supported by PTS-DOS 2000 Pro.
APPEND
ASK
ASSIGN
ATTR
BEEP
BREAK
CALL
CD
CHDIR
CHKDSK
CHOICE
CLS
COMMAND
COPY
CTTY
DATE
DEBUG
DEL
DIR
DISKCOPY
DISP
ECHO
ECHONLF
ERASE
EXE2BIN
EXIT
FDISK
FIND
FOR
FORMAT
GOTO
HISTORY
IF
JOIN
KEYB
LABEL
LOADFIX
MD
MEM
MKDIR
MKZOMBIE
MODE
MORE
NLSFUNC
PATH
PAUSE
PRINT
PROMPT
RD
RDZOMBIE
REM
REN
RENAME
REPLACE
RMDIR
SET
SETDRV
SETVER
SHARE
SHIFT
SORT
SUBST
SYS
TIME
TREE
TYPE
UNINSTALL
VER
VERIFY
VOL
Exclusive commands
This command is specific to PTS/DOS 2000. Paragon's description is (quote)
Purpose: Restores the booting of a system installed before PTS-DOS on the disk and restores its the boot sector.
Syntax: UNINSTALL filename [drive:]
(balance omitted)
Hardware requirements
Intel 80286 CPU or better
512 KB RAM or more
See also
Comparison of DOS operating systems
АДОС, unrelated to Russian MS-DOS
Russian MS-DOS
References
External links
Unofficial PTS-DOS FAQ
Paragon GmbH homepage
DOS variants
Assembly language software
Disk operating systems
1993 software |
42174514 | https://en.wikipedia.org/wiki/Bug%20bounty%20program | Bug bounty program | A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla, Facebook, Yahoo!, Google, Reddit, Square, Microsoft, and the Internet bug bounty.
Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagon's use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.
History
Hunter and Ready initiated the first known bug bounty program in 1983 for their Versatile Real-Time Executive operating system. Anyone who found and reported a bug would receive a Volkswagen Beetle ( Bug) in return.
A little over a decade later in 1995, Jarrett Ridlinghafer, a technical support engineer at Netscape Communications Corporation coined the phrase 'Bug Bounty'.
Netscape encouraged its employees to push themselves and do whatever it takes to get the job done. Ridlinghafer recognized that Netscape had many product enthusiasts and evangelists, some of which could even be considered fanatical about Netscape's browsers. He started to investigate the phenomenon in more detail and discovered that many of Netscape's enthusiasts were actually software engineers who were fixing the product's bugs on their own and publishing the fixes or workarounds, either in online news forums that had been set up by Netscape's technical support department, or on the unofficial "Netscape U-FAQ" website, which listed all known bugs and features of the browser, as well as instructions regarding workarounds and fixes.
Ridlinghafer thought the company should leverage these resources and proposed the 'Netscape Bugs Bounty Program', which he presented to his manager, who in turn suggested that Ridlinghafer present it at the next company executive team meeting. At the next executive team meeting, which was attended by James Barksdale, Marc Andreessen and the VPs of every department including product engineering, each member was given a copy of the 'Netscape Bugs Bounty Program' proposal and Ridlinghafer was invited to present his idea to the Netscape Executive Team. Everyone at the meeting embraced the idea except the VP of Engineering, who did not want it to go forward believing it to be a waste of time and resources. However, the VP of Engineering was overruled and Ridlinghafer was given an initial $50k budget to run with the proposal.
On October 10 1995, Netscape launched the first technology bug bounty program for the Netscape Navigator 2.0 Beta browser.
Vulnerability Disclosure Policy controversy
In August 2013, a Palestinian computer science student reported a vulnerability that allowed anyone to post a video on an arbitrary Facebook account. According to the email communication between the student and Facebook, he attempted to report the vulnerability using Facebook's bug bounty program but the student was misunderstood by Facebook's engineers. Later he exploited the vulnerability using the Facebook profile of Mark Zuckerberg, resulting into Facebook refusing to pay him a bounty.
Facebook started paying researchers who find and report security bugs by issuing them custom branded "White Hat" debit cards that can be reloaded with funds each time the researchers discover new flaws. "Researchers who find bugs and security improvements are rare, and we value them and have to find ways to reward them," Ryan McGeehan, former manager of Facebook's security response team, told CNET in an interview. "Having this exclusive black card is another way to recognize them. They can show up at a conference and show this card and say 'I did special work for Facebook.'" In 2014, Facebook stopped issuing debit cards to researchers.
In 2016, Uber experienced a security incident when an individual accessed the personal information of 57 million Uber users worldwide. The individual supposedly demanded a ransom of $100,000 in order to destroy rather than publish the data. In Congressional testimony, Uber CISO indicated that the company verified that the data had been destroyed before paying the $100,000. Mr. Flynn expressed regret that Uber did not disclose the incident in 2016. As part of their response to this incident, Uber worked with partner HackerOne to update their bug bounty program policies to, among other things, more thoroughly explain good faith vulnerability research and disclosure.
Yahoo! was severely criticized for sending out Yahoo! T-shirts as reward to the Security Researchers for finding and reporting security vulnerabilities in Yahoo!, sparking what came to be called T-shirt-gate. High-Tech Bridge, a Geneva, Switzerland-based security testing company issued a press release saying Yahoo! offered $12.50 in credit per vulnerability, which could be used toward Yahoo-branded items such as T-shirts, cups and pens from its store. Ramses Martinez, director of Yahoo's security team claimed later in a blog post that he was behind the voucher reward program, and that he basically had been paying for them out of his own pocket. Eventually, Yahoo! launched its new bug bounty program on October 31 of the same year, that allows security researchers to submit bugs and receive rewards between $250 and $15,000, depending on the severity of the bug discovered.
Similarly, when Ecava released the first known bug bounty program for ICS in 2013, they were criticized for offering store credits instead of cash which does not incentivize security researchers. Ecava explained that the program was intended to be initially restrictive and focused on the human safety perspective for the users of IntegraXor SCADA, their ICS software.
Geography
Though submissions for bug bounties come from many countries, a handful of countries tend to submit more bugs and receive more bounties. The United States and India are the top countries from which researchers submit bugs. India, which has either the first or second largest number of bug hunters in the world, depending on which report one cites, topped the Facebook Bug Bounty Program with the largest number of valid bugs. "India came out on top with the number of valid submissions in 2017, with the United States and Trinidad & Tobago in second and third place, respectively", Facebook quoted in a post.
Notable programs
In October 2013, Google announced a major change to its Vulnerability Reward Program. Previously, it had been a bug bounty program covering many Google products. With the shift, however, the program was broadened to include a selection of high-risk free software applications and libraries, primarily those designed for networking or for low-level operating system functionality. Submissions that Google found adherent to the guidelines would be eligible for rewards ranging from $500 to $3,133.70. In 2017, Google expanded their program to cover vulnerabilities found in applications developed by third parties and made available through the Google Play Store. Google's Vulnerability Rewards Program now includes vulnerabilities found in Google, Google Cloud, Android, and Chrome products, and rewards up to $31,337.
Microsoft and Facebook partnered in November 2013 to sponsor The Internet Bug Bounty, a program to offer rewards for reporting hacks and exploits for a broad range of Internet-related software. In 2017, GitHub and The Ford Foundation sponsored the initiative, which is managed by volunteers including from Uber, Microsoft, Facebook, Adobe, HackerOne, GitHub, NCC Group, and Signal Sciences. The software covered by the IBB includes Adobe Flash, Python, Ruby, PHP, Django, Ruby on Rails, Perl, OpenSSL, Nginx, Apache HTTP Server, and Phabricator. In addition, the program offered rewards for broader exploits affecting widely used operating systems and web browsers, as well as the Internet as a whole.
In March 2016, Peter Cook announced the US federal government's first bug bounty program, the "Hack the Pentagon" program. The program ran from April 18 to May 12 and over 1,400 people submitted 138 unique valid reports through HackerOne. In total, the US Department of Defense paid out $71,200.
In 2019, The European Commission announced the EU-FOSSA 2 bug bounty initiative for popular open source projects, including Drupal, Apache Tomcat, VLC, 7-zip and KeePass. The project was co-facilitated by European bug bounty platform Intigriti and HackerOne and resulted in a total of 195 unique and valid vulnerabilities.
Open Bug Bounty is a crowd security bug bounty program established in 2014 that allows individuals to post website and web application security vulnerabilities in the hope of a reward from affected website operators.
Center for Analysis and Investigation of Cyber Attacks (TSARKA), a cybersecurity company of Kazakhstan, on December 8th, 2021, launched a National vulnerability reward program called BugBounty.kz. Among the private companies, governmental information systems and information resources have joined the program. Since the launch and up until October 28th, 2021, 1039 vulnerability reports were submitted. During the operation of the program several critical vulnerabilities were reported that could have led to the personal data leak from the critical infrastructure and possible manipulation of SCADA systems responsible for the city life support.
See also
Bounty hunter
Cyber-arms industry
Knuth reward check (Program in 1980)
List of unsolved problems in computer science
List of unsolved problems in mathematics
Market for zero-day exploits
Open-source bounty
White hat (computer security)
Zerodium
References
Internet security
Cyberwarfare
Competitions
Hacking (computer security) |
1179136 | https://en.wikipedia.org/wiki/DTrace | DTrace | DTrace is a comprehensive dynamic tracing framework originally created by Sun Microsystems for troubleshooting kernel and application problems on production systems in real time.
Originally developed for Solaris, it has since been released under the free Common Development and Distribution License (CDDL) in OpenSolaris and its descendant illumos, and has been ported to several other Unix-like systems.
DTrace can be used to get a global overview of a running system, such as the amount of memory, CPU time, filesystem and network resources used by the active processes. It can also provide much more fine-grained information, such as a log of the arguments with which a specific function is being called, or a list of the processes accessing a specific file.
In 2010, Oracle Corporation acquired Sun Microsystems and announced discontinuing OpenSolaris.
As a community effort of some core Solaris engineers to create a truly open source Solaris, illumos operating system was announced via webinar on Thursday, 3 August 2010, as a fork on OpenSolaris OS/Net consolidation, including DTrace technology.
In October 2011, Oracle announced the porting of DTrace to Linux, and in 2019 official DTrace for Fedora is available on GitHub. For several years an unofficial DTrace port to Linux was available, with no changes in licensing terms.
In August 2017, Oracle released DTrace kernel code under the GPLv2+ license, and user space code under GPLv2 and UPL licensing. In September 2018 Microsoft announced that they had ported DTrace from FreeBSD to Windows.
In September 2016 the OpenDTrace effort began on github with both code and comprehensive documentation of the system's internals. The OpenDTrace effort maintains the original CDDL licensing for the code from OpenSolaris with additional code contributions coming under a BSD 2 Clause license. The goal of OpenDTrace is to provide an OS agnostic, portable implementation of DTrace that is acceptable to all consumers, including macOS, FreeBSD, OpenBSD, NetBSD, and Linux as well as embedded systems.
Description
Sun Microsystems designed DTrace to give operational insights that allow users to tune and troubleshoot applications and the OS itself.
Testers write tracing programs (also referred to as scripts) using the D programming language (not to be confused with other programming languages named "D"). The language, inspired by C, includes added functions and variables specific to tracing. D programs resemble awk programs in structure; they consist of a list of one or more probes (instrumentation points), and each probe is associated with an action. These probes are comparable to a pointcut in aspect-oriented programming. Whenever the condition for the probe is met, the associated action is executed (the probe "fires"). A typical probe might fire when a certain file is opened, or a process is started, or a certain line of code is executed. A probe that fires may analyze the run-time situation by accessing the call stack and context variables and evaluating expressions; it can then print out or log some information, record it in a database, or modify context variables. The reading and writing of context variables allows probes to pass information to each other, allowing them to cooperatively analyze the correlation of different events.
Special consideration has been taken to make DTrace safe to use in a production environment. For example, there is minimal probe effect when tracing is underway, and no performance impact associated with any disabled probe; this is important since there are tens of thousands of DTrace probes that can be enabled. New probes can also be created dynamically.
Command line examples
DTrace scripts can be invoked directly from the command line, providing one or more probes and actions as arguments. Some examples:
# New processes with arguments
dtrace -n 'proc:::exec-success { trace(curpsinfo->pr_psargs); }'
# Files opened by process
dtrace -n 'syscall::open*:entry { printf("%s %s",execname,copyinstr(arg0)); }'
# Syscall count by program
dtrace -n 'syscall:::entry { @num[execname] = count(); }'
# Syscall count by syscall
dtrace -n 'syscall:::entry { @num[probefunc] = count(); }'
# Syscall count by process
dtrace -n 'syscall:::entry { @num[pid,execname] = count(); }'
# Disk size by process
dtrace -n 'io:::start { printf("%d %s %d",pid,execname,args[0]->b_bcount); }'
# Pages paged in by process
dtrace -n 'vminfo:::pgpgin { @pg[execname] = sum(arg0); }'
Scripts can also be written which can reach hundreds of lines in length, although typically only tens of lines are needed for advanced troubleshooting and analysis. Over 200 examples of open source DTrace scripts can be found in the DTraceToolkit, created by Brendan Gregg (author of the DTrace book), which also provides documentation and demonstrations of each.
Supported platforms
DTrace first became available for use in November 2003, and was formally released as part of Sun's Solaris 10 in January 2005. DTrace was the first component of the OpenSolaris project to have its source code released under the Common Development and Distribution License (CDDL).
DTrace is an integral part of illumos and related distributions.
DTrace is a standard part of FreeBSD and NetBSD.
Apple added DTrace support in Mac OS X 10.5 "Leopard", including a GUI called Instruments. Over 40 DTrace scripts from the DTraceToolkit are included in /usr/bin, including tools to examine disk I/O (iosnoop) and process execution (execsnoop). Unlike other platforms that DTrace is supported on, Mac OS X has a flag (P_LNOATTACH) that a program may set that disallows tracing of that process by debugging utilities such as DTrace and gdb. In the original Mac OS X DTrace implementation, this could affect tracing of other system information, as unrelated probes that should fire while a program with this flag set was running would fail to do so. The OS X 10.5.3 update addressed this issue a few months later. However, since El Capitan, System Integrity Protection prevents user from DTracing protected binary by default.
The Linux port of DTrace has been available since 2008; work continues actively to enhance and fix issues. There is also an active implementation on github. Standard core providers are available (fbt, syscall, profile), plus a special "instr" provider (some of the Solaris providers are not yet available ). The Linux DTrace implementation is a loadable kernel module, which means that the kernel itself requires no modification, and thus allows DTrace to avoid CDDL vs. GPL licensing conflicts (in its source form, at least). However, once DTrace is loaded the kernel instance will be marked as tainted.
In 2007, a developer at QNX Software Systems announced on his blog that he and a colleague were working on incorporating DTrace into the QNX operating system.
Oracle Corporation added beta DTrace support for Oracle Linux in 2011, as a technology preview in the Unbreakable Enterprise Kernel release 2, which is under GPLv2 (the DTrace Linux kernel module was originally released under CDDL). General availability was announced in December 2012.
On March 11, 2019, Microsoft released their build of DTrace for the Windows 10 insider builds.
Language and application providers
With a supported language provider, DTrace can retrieve context of the code, including function, source file, and line number location. Further, dynamic memory allocation and garbage collection can be made available if supported by the language. Supported language providers include assembly language, C, C++, Java, Erlang, JavaScript, Perl, PHP, Python, Ruby, shell script, and Tcl.
Application providers allow DTrace to follow the operation of applications through system calls and into the kernel. Applications that offer DTrace application providers include MySQL, PostgreSQL, Oracle Database, Oracle Grid Engine, and Firefox.
Authors and awards
DTrace was designed and implemented by Bryan Cantrill, Mike Shapiro, and Adam Leventhal.
The authors received recognition in 2005 for the innovations in DTrace from InfoWorld and Technology Review. DTrace won the top prize in The Wall Street Journals 2006 Technology Innovation Awards competition. The authors were recognized by USENIX with the Software Tools User Group (STUG) award in 2008.
See also
eBPF Linux kernel tracing backend providing a set of features similar to DTrace since kernel version 4.9
ftrace a tracing framework for the Linux kernel, capable of tracing scheduling events, interrupts, memory-mapped I/O, CPU power state transitions, etc.
ktrace a BSD Unix and macOS utility that traces kernel–program interactions
ltrace a Linux debugging utility, displays the calls a userland application makes to shared libraries
strace a debugging utility for Linux, monitors system calls used by a program and all received signals
SystemTap a scripting language and utility used for instrumenting Linux installations
LTTng
IBM ProbeVue
References
Notes
External links
DTrace Tools Brendan Gregg's DTrace examples (2004)
FreeBSD DTrace page FreeBSD DTrace homepage, includes a tutorial and one-liners
DTrace book includes hundreds of example scripts
DTrace guide Illumos DTrace book
Dynamic Tracing with DTrace & SystemTap free book with examples and exercises
DTrace book scripts DTrace book scripts on GitHub
DTraceToolkit a collection of DTrace scripts
DTrace Hands On Lab a step-by-step course to learn DTrace
DLight Tutorial an interactive GUI utility for C/C++ developers based on DTrace technology; part of Oracle Solaris Studio prior to version 12.4
Exploring Leopard with DTrace DTrace for debugging and exploration
Tech Talk on DTrace given by Bryan Cantrill
Hidden in Plain Sight, Sun Microsystems, by Bryan Cantrill
dtrace.org hosts blogs from software developers related to DTrace
Official Oracle DTrace port to Linux:
DTrace patches merged with recent Linux kernel releases
Userspace portion of the DTrace port to Linux
Compact Type Format library used by DTrace on Linux
DTrace on Fedora
Command-line software
Sun Microsystems software
Free system software
Debuggers
Aspect-oriented programming
Software using the CDDL license
Linux kernel features |
34037172 | https://en.wikipedia.org/wiki/ByWater%20Solutions | ByWater Solutions | ByWater Solutions is a privately owned and funded company founded in California in March 2009 by CEO Brendan A. Gallagher and EVP Nathan A. Curulla, which provides implementation, hosting, support, consultation, and development services for the Koha Integrated Library System.
History
After the founding of ByWater Solutions in 2009, Gallagher began contributing to the Koha community by way of small developmental fixes. ByWater signed their first contract in June 2009. Since that time, ByWater has grown to a Koha dedicated staff of 25, and supports over 1,100 library sites (including publics, schools, academic, small non profits and special libraries) within North America. Since its founding, ByWater has also partnered with other open source software companies worldwide to work on improving the Koha project both with documentation and developments.
Origin of the company name
ByWater Solutions is named after a village in J. R. R. Tolkien's epic trilogy The Lord of the Rings. Bywater is a village which is situated in close proximity to the Shire, the home of Bilbo and Frodo Baggins, who are the two main characters in the story. Bywater was known primarily for the Inn of the Green Dragon, a central meeting place for travelers and adventurers in the story. The Inn was a hub for the collaboration and exchange of news and ideas in the world of Middle Earth, and thus resembles the environment found in Koha and Open Source Software in general. Because of the company's primary dealings with libraries worldwide, the founders thought that it was important to incorporate a literary reference to the name of the company, and being lifelong childhood friends, this literary work has personal value to them both.
Partnerships
In March 2015, EBSCO Information Services and ByWater Solutions partnered together to allow libraries that use Koha ILS to easily integrate EBSCO Discovery Service™. Since then ByWater has expressed their commitment to support the FOLIO project in partnership with Ebsco.
Honors
In 2015, ByWater Solutions was recognized by Inc. Magazine as being one of the top 5,000 fastest growing business in the United States. ByWater was ranked number 3,862 out of the 5,000 businesses highlighted in the magazine’s annual spotlight. ByWater Solutions received the Platinum recognition in the 2017 Modern Library Awards.
References
Free software companies
Library automation
Library-related organizations
Software companies based in California
Software companies based in Connecticut
Companies based in Santa Barbara, California
Companies based in New Haven, Connecticut
American companies established in 2009
Software companies established in 2009
Software companies of the United States
2009 establishments in California |
27553448 | https://en.wikipedia.org/wiki/SMTP%20Authentication | SMTP Authentication | SMTP Authentication, often abbreviated SMTP AUTH, is an extension of the Simple Mail Transfer Protocol (SMTP) whereby a client may log in using any authentication mechanism supported by the server. It is mainly used by submission servers, where authentication is mandatory.
History
SMTP as specified by Jon Postel in the 1970s did not provide for using passwords for sending email messages; each server was by design an open mail relay. As a result, spam and worms, while not initially a problem, had become a plague by the late '90s. Before SMTP AUTH, a relay client had to be identified by IP address, which is only practical for email services provided by the same Internet service provider (ISP) supplying the connection, or else using specific hacks, such as POP before SMTP.
John Gardiner Myers published the first draft of SMTP AUTH in 1995, and it has been successively developed and discussed in the IETF along with mail submission protocol, Extended SMTP (ESMTP), and Simple Authentication and Security Layer (SASL). An older SASL mechanism for ESMTP authentication (ESMTPA) is CRAM-MD5, and uses of the MD5 algorithm in HMACs (hash-based message authentication codes) are still considered sound.
The Internet Mail Consortium (IMC) reported that 55% of mail servers were open relays in 1998, but less than 1% in 2002.
Role in the mail transport system
Using a mail submission agent (MSA), generally on port 587, implies SMTP AUTH. MSA usage is supported by most software and is recommended, especially to support nomadic users, as several network hubs either block port 25 or use SMTP proxies. The MSA is responsible for ensuring that the message envelope contains good addresses, and may enforce local policies for the From header field. Verifying that the envelope sender (a.k.a. Return-Path) used for SPF and the From address agree with the authenticated user-id is particularly important for domains that sign messages using DKIM.
Keywords ending in "A" such as ESMTPA and ESMTPSA, are provided for the with clause of Received header fields, when messages are received with SMTP AUTH. "The keywords are provided for statistical or diagnostic purposes" (RFC 3848); they are checked by some clients, e.g. Spamassassin.
Details
As with all SMTP extensions, SMTP AUTH is advertised in the EHLO response, along with a list of supported authentication methods. These methods may change after issuing STARTTLS, typically allowing plain text passwords in the latter case only. RFC 4954 provides the following example ("C:" and "S:" are not part of the protocol, they indicate lines sent by the client and server, respectively):
S: 220 smtp.example.com ESMTP Server
C: EHLO client.example.com
S: 250-smtp.example.com Hello client.example.com
S: 250-AUTH GSSAPI DIGEST-MD5
S: 250-ENHANCEDSTATUSCODES
S: 250 STARTTLS
C: STARTTLS
S: 220 Ready to start TLS
... TLS negotiation proceeds.
Further commands protected by TLS layer ...
C: EHLO client.example.com
S: 250-smtp.example.com Hello client.example.com
S: 250 AUTH GSSAPI DIGEST-MD5 PLAIN
C: AUTH PLAIN dGVzdAB0ZXN0ADEyMzQ=
S: 235 2.7.0 Authentication successful
SMTP AUTH can be used also on port 25. Usually, servers reject RCPT TO commands that imply relaying unless authentication credentials have been accepted. The specification recommends that servers issue 530 5.7.0 Authentication required in response to most commands in case the server is configured to require authentication and the client hasn't done it yet. Only servers listening on port 587, or private servers, should be configured that way, not a Message eXchange (MX). However, the historical trait that SMTP is not authenticated by default results in a different behavior with regard to access protocols, in some cases; for example, when using AUTH EXTERNAL after STARTTLS.
Besides the AUTH command, the extension also provides for an AUTH parameter to the MAIL FROM command, so as to allow to distinguish authentication from authorization. That way, a sender can identify itself and transmit several messages during the same session. While the authentication doesn't need to vary, once established, different messages may be sent according to different agreements and hence require different authorization. For example, messages may be relayed on behalf of different users. Use of this parameter is much less popular than using the command to grant relay privileges.
SMTP Authentication is an "extension" in SMTP terms, so it requires server and client to use EHLO verb for greeting to indicate support for extensions, as opposed to the obsolete HELO greeting. For backward compatibility, HELO greeting may be accepted when no extension is used.
The capitalized text after the AUTH command is a list of the types of authorization that the SMTP server will accept.
Some examples of authorization protocols include:
PLAIN (Uses Base64 encoding)
LOGIN (Uses Base64 encoding)
GSSAPI (Generic Security Services Application Program Interface)
DIGEST-MD5 (Digest access authentication)
MD5
CRAM-MD5
OAUTH10A (OAuth 1.0a HMAC-SHA1 tokens as defined in RFC 5849)
OAUTHBEARER (OAuth 2.0 bearer tokens as defined in RFC 6750)
XOAUTH2
Standards
, SMTP Service Extension for Secure SMTP over Transport Layer Security, Paul Hoffman, February 2002.
, ESMTP and LMTP Transmission Types Registration, Chris Newman, July 2004.
, Message Submission for Mail, Randall Gellens and John C. Klensin, November 2011 (obsoletes RFC 4409, from 2006, which in turn replaced RFC 2476, from December 1998).
, Simple Authentication and Security Layer (SASL), Alexey Melnikov and Kurt D. Zeilenga, June 2006.
, The PLAIN SASL Mechanism, K. Zeilenga, Ed., August 2006.
, SMTP Service Extension for Authentication, Robert Siemborski and Alexey Melnikov, July 2007.
, A Set of Simple Authentication and Security Layer (SASL) Mechanisms for OAuth, W. Mills, T. Showalter and H. Tschofenig, August 2015.
Other
Erwin Hoffmann, SMTP Authentication [Tutorial], last edit 2017-01-10.
See also
E-mail authentication
Simple Mail Transfer Protocol
Mail submission agent
Email client port numbers
Simple Authentication and Security Layer
Open mail relay
POP before SMTP
References
Email authentication
Internet mail protocols
Computer access control protocols |
30864588 | https://en.wikipedia.org/wiki/Trend%20Micro%20Internet%20Security | Trend Micro Internet Security | Trend Micro Internet Security (known as PC-cillin Internet Security in Australia and Virus Buster in Japan) is an antivirus and online security program developed by Trend Micro for the consumer market. According to NSS Lab comparative analysis of software products for this market in 2014, Trend Micro Internet Security was fastest in responding to new internet threats.
In addition to anti-malware and web threat protection, the premium version of this software includes compatibility for PCs, Macs, Android or iOS mobile devices; parental controls; identity theft prevention; a privacy scanner for major social networking sites; and 25 GB of cloud storage.
Features
Features in Trend Micro Internet Security 2015 include:
Antivirus
Antispyware
Antispam
Email safety scan
Two-way firewall
Website authentication
Home network protection
Parental controls and filtering
The software also includes:
Protection against rootkits
Proactive intrusion blocking
Personal data leak prevention
Trend Micro Premium Security includes additional features, including:
Wireless network validation
keylogger protection
Online data backup
Remote file and folder permissions control
PC tuning and cleanup
Security programs for mobile devices that run on Android, Symbian, and Windows Mobile operating systems
Cloud storage (25 GB)
Effectiveness
AV-Comparatives awarded Trend Micro a three-star Advanced + rating–the highest ranking given by the organization–in AV-Comparatives’ Whole Product Dynamic “Real-World” Protection Test for 2014.
AV-TEST in October 2014 gave Trend Micro Internet Security 2015 a score of 17 out of a possible 18 points.
Trend Micro Maximum Security scored the highest success rate in blocking malware downloads in NSS Labs’ 2014 Consumer Endpoint Protection test focused on Socially Engineered Malware. The results were based on continuous series of tests to determine the participants’ effectiveness against socially engineered malware. NSS Labs is an independent network testing facility, security and consultancy organization. NSS Labs also found that Trend Micro had the quickest time in adding protection against unknown threats - less than 15 minutes.
In January 2016 it was discovered that the consumer version of Trend Micro AV allowed any website visited by its users to execute arbitrary code or read all browser passwords on the Windows PC it purportedly protected. A patch was later issued to close the issue.
Mobile Security
In June 2014, AV-Test published results for its mobile security endurance tests, which assessed more than 30 apps over a six-month period. Trend Micro’s mobile security tied for the highest overall score of 13 out of 13 points.
Version history
Previous versions include:
PC-cillin
PC-cillin 2
PC-cillin 95
PC-cillin 2000
PC-cillin 2002
PC-cillin 2003
PC-cillin Internet Security v11/2004
PC-cillin Internet Security v12/2005
PC-cillin Internet Security v14/2006
Trend Micro Internet Security v15/2007
Trend Micro Internet Security v16/2008
Trend Micro Internet Security v17/2009
Trend Micro Internet Security v18/2010
Trend Micro Titanium Internet Security v19/2011
Trend Micro Titanium Internet Security v20/2012
Trend Micro Titanium Internet Security v21/2013
Trend Micro Titanium Internet Security v22/2014
Trend Micro Internet Security v23/2015
As of January 2015, Trend Micro supported Trend Micro Internet Security versions 19/2011 and higher.
PC-cillin 2000 and earlier versions were virus scanners without any additional features. PC-cillin 2002 and 2003 were stand-alone virus scanners which also included a firewall component and improved on the software’s scanning and virus detection engine.
Newer versions of Trend Micro Internet Security offer additional features such as spyware protection, antispam and an integrated firewall along with an improved scanning and virus detection engine and enhanced heuristics. PC-cillin 2003 was the last stand-alone antivirus product offered by Trend Micro until 2007, when the company released a standalone anti-malware product that offered protection from malicious software including viruses, spyware, and adware.
See also
Antivirus software
Internet Security
Comparison of antivirus software
Comparison of computer viruses
References
External links
Trend Micro HomePage
Antivirus software
Firewall software
Computer security software
Security software
Read more
Trend Micro HomePage |
1197294 | https://en.wikipedia.org/wiki/Netgear | Netgear | Netgear, Inc. is an American computer networking company based in San Jose, California, with offices in about 25 other countries. It produces networking hardware for consumers, businesses, and service providers. The company operates in three business segments: retail, commercial, and as a service provider.
Netgear's products cover a variety of widely used technologies such as wireless (Wi-Fi and LTE), Ethernet and powerline, with a focus on reliability and ease-of-use. The products include wired and wireless devices for broadband access and network connectivity, and are available in multiple configurations to address the needs of the end-users in each geographic region and sector in which the company's products are sold.
As of 2020, Netgear products are sold in approximately 24,000 retail locations around the globe, and through approximately 19,000 value-added resellers, as well as multiple major cable, mobile and wireline service providers around the world.
History
Netgear was founded by Patrick Lo in 1996. Lo graduated from Brown University with a degree in electronic engineering. Prior to founding Netgear, Lo was a manager at Hewlett-Packard. Netgear received initial funding from Bay Networks.
The company was listed on the NASDAQ stock exchange in 2003.
Product range
Netgear's focus is primarily on the networking market, with products for home and business use, as well as pro-gaming, including wired and wireless technology.
ProSAFE switches
Netgear markets network products for the business sector, most notably the ProSAFE switch range. , Netgear provides limited lifetime warranties for ProSAFE products for as long as the original buyer owns the product. Currently focusing on Multimedia segment and business product.
Network appliances
Netgear also markets network appliances for the business sector, including managed switches and wired and wireless VPN firewalls. In 2016, Netgear released its Orbi mesh Wi-Fi System, with models for business as well as household use. The system uses a Tri-band architecture, similar to the traditional dual-band, but with a dedicated 5 GHz connection between the router and a provided satellite. The addition of a second 5 GHz channel allows the network to distribute its traffic, easing congestion caused by the increasing number of 5 GHz compatible wireless devices present in many household networks. In September 2017, Netgear exited the VPN firewall product category. At CES 2021, the company unveiled the world's first WiFi 6E router that takes advantage of the 6 GHz frequency band in addition to the 5 GHz and 2.4 GHz bands. The 6 GHz frequency increases network capacity where there is high utilization of the 5 GHz and 2.4 GHz bands.
Network-attached storage
Netgear sells NAS devices to small businesses and consumers under the product name ReadyNAS. With this storage hardware line, Netgear vies with competitors like Buffalo, Zyxel and HP. Netgear entered the storage market in May 2007 when it acquired Infrant (originator of the ReadyNAS line). In March 2009, Netgear began to offer an integrated online backup solution called the ReadyNAS Vault.
Network surveillance cameras
Netgear created home surveillance camera brand Arlo, which was spun out into a separate company in August 2018. Arlo is now publicly traded on the New York Stock Exchange.
Netgear chipsets
Netgear uses Realtek chipsets which can run in monitor mode and perform wireless injection. For this function, a special driver is needed.
Manufacturing
Netgear outsources all manufacturing to other electronics companies, including Askey Computer Corporation, Cameo Communications, Delta Networks, Flex, Foxconn, Taicang T&W Electronics, Pegatron Corporation, SerComm, Wistron Neweb Corporation and USI Electronics (Shenzhen).
Manufacturing occurs primarily in mainland China and Vietnam, with pilot and low-volume manufacturing in Taiwan on a select basis.
To maintain quality standards, Netgear has established its own product quality organization, based in Hong Kong and mainland China, that is responsible for auditing and inspecting process and product quality on the premises of ODMs and JDMs (Joint Development Manufacturers).
Netgear was unaffected by US President Donald Trump's 25% tariffs on Chinese imports. Because all manufacturing is outsourced, the company was able to shift its production lines from China to Vietnam, Thailand and Indonesia.
Security concerns
Various Netgear products that were manufactured by SerComm were found to contain a backdoor that allowed unauthorized remote access to the affected devices. Netgear, along with other companies with products manufactured by SerComm that were affected by the aforementioned backdoor, issued firmware updates for some affected products. However, it was shortly found that the updates merely hid the backdoor but did not remove it.
A backdoor also existed on the DG834 series. Any person who can access the router using a web browser, can enable "debug" mode using and then connect via Telnet directly to the router's embedded Linux system as 'root', which gives unfettered access to the router's operating system via its Busybox functionality. Additionally, a 'hidden' URL also allows unfettered access (on a v5 model a username and password are requested). There is no user option provided to disable this. On default Netgear firmware Telnet access lacks password or other control; on ISP modified versions (such as Sky) a Telnet password exists based on the MAC address which can be found via online websites.
In January 2017, various Netgear products were found to be vulnerable to an exploit that allows third-party access to the router and the internal network and to turn the router into a botnet.
In 2020, a vulnerability was discovered that affected many Netgear home WiFi routers. The problem was in a web server built into the router's firmware. When launching the administration interface, the owner had to enter their password, which was not protected by security. The exploit was posted on GitHub.
See also
Bay Networks#Acquisition by Nortel
Netgear DG834 (series)
Netgear SC101
Netgear WGR614L
Netgear WNR3500L
References
External links
American companies established in 1996
Computer companies established in 1996
1996 establishments in California
Companies listed on the Nasdaq
Computer storage companies
Manufacturing companies based in San Jose, California
Technology companies based in the San Francisco Bay Area
Networking companies of the United States
Networking hardware companies
Nortel
Routers (computing)
2003 initial public offerings |
1446064 | https://en.wikipedia.org/wiki/WrestleMania%20V | WrestleMania V | WrestleMania V was the fifth annual WrestleMania professional wrestling pay-per-view (PPV) event produced by the World Wrestling Federation (WWF, now WWE). It took place on April 2, 1989, at the Boardwalk Hall in Atlantic City, New Jersey. A total of 14 matches were contested at the event.
The main event was Hulk Hogan versus Randy Savage for the WWF World Heavyweight Championship billed "The Mega Powers Explode" which Hogan won after a leg drop. Miss Elizabeth was at ringside in a neutral corner for the first half of the main event prior to the referee sending her to the locker room area. The undercard included matches pitting Rick Rude against The Ultimate Warrior for the WWF Intercontinental Heavyweight Championship, The Hart Foundation (Bret Hart and Jim Neidhart) against Greg Valentine and The Honky Tonk Man, and Demolition (Ax and Smash) against Powers of Pain and Mr. Fuji in a handicap match for the WWF Tag Team Championship.
Production
Background
WrestleMania is considered the World Wrestling Federation's (WWF, now WWE) flagship pay-per-view (PPV) event, having first been held in 1985. It is held annually between mid-March to mid-April. Following the advent of Survivor Series in 1987 and then Royal Rumble and SummerSlam in 1988—WWF's four original annual pay-per-views—the four would eventually be dubbed the "Big Four". WrestleMania V was scheduled to be held on April 2, 1989, at the Boardwalk Hall in Atlantic City, New Jersey. This event along with the previous year's WrestleMania IV were advertised as being held at the Trump Plaza Hotel and Casino, with both events taking place across the road at Convention Hall, but sponsored by Donald Trump. The two events were the only times that WrestleMania was held at the same venue for two consecutive years. Run-DMC performed a "WrestleMania Rap" for the audience. Other celebrity guests in attendance included Donald Trump, whose Trump Plaza Hotel and Casino was the main sponsor of the event, and Morton Downey Jr.
Storylines
The Mega Powers Explode
The main feud heading into WrestleMania was between Hulk Hogan and Randy Savage, who for most of the previous year were a unified team that referred to themselves as The Mega Powers.
The unit began forming after Savage wrestled The Honky Tonk Man for his Intercontinental Championship on the October 3, 1987 airing of Saturday Night's Main Event. After the match, which Savage won by disqualification, Honky Tonk Man enlisted the help of Bret Hart and Jim Neidhart in attacking Savage. As Honky was ready to strike Savage with his guitar, Savage’s valet Miss Elizabeth came back to ringside accompanied then-reigning World Wrestling Federation Champion Hogan, who helped Savage even the odds.
Later, Hogan faced Andre the Giant in a rematch of their championship bout from WrestleMania III on the premiere episode of The Main Event, which was broadcast live on February 5, 1988 in Indianapolis. With help from “The Million Dollar Man” Ted DiBiase and a crooked official, Andre dethroned Hogan as champion and immediately surrendered the title to DiBiase as repayment for his assistance. After the contest, Andre’s victory was upheld due to WWF referees’ decisions being regarded as final, but the WWF Championship was declared vacant as Andre was not permitted to surrender the title to another wrestler. Thus, a tournament was conceived for WrestleMania IV for the vacant title. Savage advanced to the finals and, with a little help from Hogan, won the tournament and the championship by defeating DiBiase in the finals. Hogan celebrated with Savage afterward, cementing their union.
Over the course of the rest of 1988, Hogan and Savage feuded with many heel tag teams, such as the Mega Bucks team of DiBiase and Andre and the Twin Towers, consisting of Akeem and The Big Boss Man. While they never actually chased the company’s tag team championships, the Mega Powers stayed together as one of the strongest tag team forces in the company as the year ended.
Things slowly began to change as 1989 began, however. Hogan had requested that Elizabeth accompany him to the ring for several of his matches in addition to her duties as Savage’s valet. This led to several occasions were Elizabeth was placed in harm’s way, which did not sit well with the Macho Man. Another sign that tensions were beginning to mount came when Savage picked up Boss Man’s nightstick after a match with Akeem and glared at Hogan while he had his back turned, posing as he often did for the crowd.
On the January 7 Saturday Night’s Main Event in Tampa, Savage came out and cleared the ring with a steel chair after Hogan was receiving a post-match beating by the Twin Towers. He did not bother to check on the injured Hogan, however, and left the ring. Elizabeth assisted Hogan backstage, which again angered Savage. This led to a confrontation between Savage and Elizabeth, but nothing came of it. He Later in January during the Royal Rumble match, Hogan accidentally eliminated Savage as he was trying to eliminate Bad News Brown.
Finally, on February 2 at the live The Main Event II program from Milwaukee, the tensions between Hogan and Savage boiled over. Once again, the Mega Powers and Twin Towers squared off. During a key point in the match, Akeem threw Savage through the ropes, causing him to land on Elizabeth. Hogan, distraught, picked her up and carried her backstage to the trainers’ room where he waited while she regained consciousness. Savage, meanwhile, was forced to take on Boss Man and Akeem alone until Hogan, at the behest of Elizabeth, came back out several minutes later. When Hogan went to tag into the match, Savage slapped him in the face and left the ring. Hogan managed to record the victory for the Mega Powers, but things were not over yet.
Immediately upon the conclusion of the match, Hogan returned to the trainers’ room where an angry Savage was waiting for him. The two got into a loud and physical confrontation, where Savage blamed Hogan for what happened to Elizabeth and accused him of being jealous of his championship reign. He also accused Hogan of only being his partner because he was lusting after Elizabeth. Hogan tried to calm the irate Macho Man down, but Savage had heard enough and struck Hogan with the title belt, knocking him to the floor. After punching the downed Hogan twice, Savage grabbed the belt again as Elizabeth went to check on Hogan. Savage grabbed her and threw her across the room, but before he could strike Hogan a second time Brutus Beefcake came into the room and grabbed the belt from him. Savage eventually left the room, but not before assaulting Beefcake and the WWF officials who were dispatched to defuse the situation and tend to the injured Hogan.
Hogan then issued the challenge to Savage for what he still considered to be rightfully his, and Savage agreed to defend the WWF Championship against him at WrestleMania. However, he would do so alone, as Elizabeth declined to be in his corner for the match; instead, she opted to be at ringside but in a neutral corner.
Other feuds
The second main feud heading into WrestleMania was between "Ravishing" Rick Rude and The Ultimate Warrior over the WWF Intercontinental Heavyweight Championship. Rude and Warrior were booked to face each other in a "Super Posedown" at Royal Rumble in January 1989. The winner had to be decided by a fan reaction, where Warrior won the posedown. After the posedown, a furious and angry Rude attacked Warrior. This led to a feud between the two and an Intercontinental Heavyweight Title match at WrestleMania.
The other main match on the undercard was Demolition (Ax and Smash) versus The Powers of Pain (The Barbarian and The Warlord) and Mr. Fuji in a handicap match for the WWF Tag Team Championship. Demolition was a dominant heel tag team since its debut in early 1987. They defeated Strike Force (Tito Santana and Rick Martel) for the titles at WrestleMania IV. They had a successful feud with The Hart Foundation during their early reign. In the summer of 1988, a powerhouse babyface tag team The Powers of Pain debuted and feuded with Demolition over the tag titles. At Survivor Series, Demolition's manager Mr. Fuji turned on them after causing them to lose their Survivor Series match, culminating in a double turn as Demolition turned babyfaces and Powers of Pain turned heels. Powers of Pain made Mr. Fuji their manager, leading to their WrestleMania encounter with Demolition for the tag titles in a 3-on-2 handicap match.
Jake "The Snake" Roberts and André the Giant began their feud in the fall of 1988 after André interfered in one of Roberts' matches against Rude. When Roberts retrieved his snake, Damien, from his bag, André became distressed, then petrified at the sight of the snake. When it became apparent André was deathly afraid of the snake, Roberts threw the snake onto André, causing him to collapse to the mat and pass out from a (kayfabe) heart attack. André recovered and swore revenge. Meanwhile, Andre's longtime adversary, Big John Studd returned to the WWF in late 1988, rejected a "welcome back" from longtime manager Bobby "the Brain" Heenan and, in becoming a face, said he was coming after André. The André-Roberts feud, meanwhile, continued into early 1989 and eventually, Studd agreed to become the special guest referee for their match at WrestleMania.
Shortly after Terry Taylor joined the WWF in the summer of 1988, he was packaged as "The Red Rooster" and, paired with Heenan as his manager, given a novice wrestler gimmick, someone who could not navigate his way through matches without constant instructions from Heenan. Eventually, the Red Rooster grew tired of Heenan's demeaning style of coaching and turned against him, becoming a face. Shortly thereafter, on an episode of Prime Time Wrestling, Heenan claimed to want to break off their relationship amicably but it was a ruse to set Rooster up to be ambushed by Heenan's new protégé, long-time enhancement talent Steve Lombardi, who had just been reinvented as The Brooklyn Brawler.
Event
WWF Women's Champion Rockin' Robin opened the show by performing "America the Beautiful".
The first match at WrestleMania V was between Hercules and King Haku. Haku attacked from behind to start, but Hercules used some power moves to get the advantage before he clotheslined Haku, sending him to the floor. He suplexed Haku in the ring and hit him a series of elbow drops. After dominating Haku, Hercules focused his attention on Haku's (and his own former) manager Bobby "The Brain" Heenan. Haku nailed Hercules from behind and hit him with two backbreakers for a near-fall. Hercules avoided a diving splash by Haku and hit him with a knee lift. He hit a series of clotheslines and powerslammed Haku for a near-fall. He attempted a top rope maneuver but when he came down, Haku caught him with a savate kick. Hercules fell in the corner and Haku tried to open the middle rope as Hercules rolled away. Hercules ducked a clothesline and hit Haku with a bridging back suplex to win the match.
The second match was a tag team match between The Twin Towers (Akeem and Big Boss Man) and The Rockers (Shawn Michaels and Marty Jannetty). Bossman slapped on Michaels in the corner and turned around to look on Jannetty but when he turned back, Michaels hit him a missile dropkick. He hit Akeem and Boss Man with flying forearm smashes before Bossman tagged in Akeem. The Rockers worked on Akeem's arm before he powered out and tagged Bossman. Jannetty tagged in and was hit with a leapfrog. Twin Towers took turns and beat Jannetty. He avoided a big splash by Akeem and tagged Michaels. Rockers hit Akeem with Double Flying Fists and Michaels tried a near-fall on Akeem. Akeem hit Michaels a lariat. Boss Man tagged in and tried to hit a corner body splash on Michaels but he sidestepped, getting a near-fall. They hit Akeem with a double dropkick and they hit Boss Man with a double missile dropkick. Akeem tagged in and dumped Jannetty. Michaels came off the top on Akeem but Boss Man powerbombed him. Akeem took advantage and hit Michaels with an Air Africa and pinned him to win the match.
The third match was a non-title match between Brutus "The Barber" Beefcake and "The Million Dollar Man" Ted DiBiase, the self-proclaimed Million Dollar Champion. It was the first time DiBiase's Million Dollar Championship belt had appeared on pay-per-view. Prior to the match, DiBiase glad-handed with event sponsor Donald Trump who was in attendance in the front row. Beefcake knocked DiBiase out on the floor before getting back into the ring. He pounded on DiBiase but Virgil caught Beefcake's foot. DiBiase hit him a clothesline and applied a chokehold on Beefcake, and followed it up with a Million Dollar Drop for a near-fall. He hit a middle rope diving back elbow drop on Beefcake for another near-fall. DiBiase hit him an Irish whip and had an inside cradle pinfall attempt on Beefcake. He tried to hit a vertical suplex on Beefcake but Beefcake countered it into a hanging suplex. DiBiase applied a Million Dollar Dream on Beefcake, who grabbed the ropes. He slammed DiBiase's face in the corner and applied a Barber's Chair (Sleeper) on DiBiase. Virgil hoped up on the apron, distracting Beefcake. Beefcake released DiBiase from the hold and went after Virgil. DiBiase nailed Beefcake from behind to the floor. The referee was busy with DiBiase while Virgil pounded on Beefcake but Beefcake no-sold and chased Virgil. DiBiase came from behind and nailed Beefcake. The two brawled outside the ring and were counted-out, resulting in a no contest. They continued to beat each other.
The fourth match was a tag team match between The Bushwhackers (Bushwhacker Luke and Bushwhacker Butch) and The Fabulous Rougeaus (Jacques Rougeau and Raymond Rougeau). The Bushwhackers grabbed Rougeaus' manager Jimmy Hart's jacket but Rougeaus caught them and went on the attack. Luke and Raymond began the match and Luke missed a fist drop on Raymond, but Luke and Butch hit him a battering ram. Luke made the cover but Jacques came in and accidentally hit a knee drop on Raymond as he was going to hit Luke but Luke sidestepped. Rougeaus double-teamed Luke for a while as the referee was busy with Butch. They kicked Luke in the gut and then celebrated. They celebrated too much that Bushwhackers hit Raymond a battering ram and a rib breaker. Luke then pinned Raymond to win the match.
The fifth match was between Mr. Perfect and The Blue Blazer. Perfect beat on Blazer until Blazer flipped out of a hip toss. Blazer hit some moves on Perfect and went for a split-legged moonsault on Perfect, who hit Blazer with his knees. He applied a chinlock on Blazer but Blazer escaped and hit Perfect with a boot to the head. He followed it up with a powerslam and a belly to belly suplex for near-falls. He busted out of a crucifix and got another near-fall and then he began arguing with the referee. This helped Perfect to connect with a forearm club and a Perfectplex pinfall for the victory.
The sixth match was a WWF Tag Team Championship handicap match between Demolition (Ax and Smash) and The Powers of Pain (The Warlord and The Barbarian) and their manager Mr. Fuji (himself a former WWF Tag Team Champion). In the beginning, Ax and Smash pounded on Warlord until Warlord backed Smash in their corner and tagged Barbarian. Smash fought back and tagged in Ax, who locked in a hammerlock on Barbarian. Fuji tagged in and hit a chop on Ax followed by a diving headbutt to the groin. He tagged in Warlord, who increased Ax's damage. Fuji tagged in and missed a Fuji Drop. Warlord cut Ax's tag with Smash but was hit with a forearm club by Ax. Ax tagged in Smash. Ax dumped Barbarian while Smash beat up on Warlord. Mr. Fuji tried to throw salt previously hidden in his tights in Smash's eyes, but Smash ducked and Fiju accidentally threw salt in Warlord's eyes. Demolition then grabbed Fuji and hit him with the Demolition Decapitation and Ax pinned Fuji to win the match and retain the titles.
The seventh match was between "The World's Strongest Man" Dino Bravo and "Rugged" Ronnie Garvin. Bravo hit a series of forearm smashes in Garvin's back and applied a bearhug. Bravo threw him in the corner and hit him with a series of shoulder blocks. Garvin smashed Bravo's head in the turnbuckles a few times for a near-fall. He followed it up with a sleeper hold on Bravo but Bravo grabbed the ropes. Garvin tried to hit a piledriver. Bravo went for a back body drop but Garvin held on for a sunset flip pin for a near-fall. Garvin took him to the corner and went for ten-count-corner punches. Bravo countered with an inverted atomic drop and a sidewalk slam, followed by a pinfall victory. After the match, Bravo's manager Frenchy Martin attacked Garvin but received a Garvin Stomp for his troubles.
The eighth match was a tag team match between the Brain Busters (Arn Anderson and Tully Blanchard) with Bobby Heenan in their corner, and Strike Force (Tito Santana and Rick Martel). Martel and Blanchard fought out before Anderson hit Martel with his knee in the back. Brain Busters tried to double-team him but he fought out of their corner. Strike Force hit Brain Busters with dropkicks, sending them to the floor. Back in the ring, Anderson was hit with an Irish whip and then he received a rolling spinebuster for a near-fall. Anderson went for a body scissors on Martel but Martel turned it into a Boston crab. Blanchard interfered and hit Martel with an eye rake. Blanchard tagged in while Santana grabbed Martel receiving a blind tag. He hit Blanchard with a bulldog and then slapped in a figure four leglock. Martel also applied the figure four leglock on Anderson. Santana got a near-fall with a back slide on Blanchard. He went to the top rope and hit a flying forearm smash on Blanchard. Blanchard ducked and Santana accidentally hit Martel. Brain Busters took advantage and double-teamed Santana. He fought out and crawled to tag Martel but he refused and walked away, turning heel. Anderson and Blanchard hit Santana with a spike piledriver. Anderson got a pin on Santana, getting the victory, and breaking up Strike Force.
Next was a Piper's Pit segment with Morton Downey Jr. as the guest. Before Rowdy Roddy Piper could interview Morton, Brother Love came out dressed as Piper and impersonated him. The real Piper then came out and got rid of Brother Love by ripping Brother Love's kilt off. After Morton blew constant smoke from his cigarette into Piper's face during the interview (despite Piper's repeated requests not to), finally, Piper put out the cigarette and Morton with a fire extinguisher.
The ninth match was between Jake "The Snake" Roberts and André the Giant (with Bobby Heenan), with Big John Studd as the Special Guest Referee. Studd and André were longtime enemies and spent a great deal of time jawing back and forth at each other. As Roberts was making his way down to the ring, behind Studd's back André had discretely removed one of the top turnbuckle pads exposing the steel ring underneath. André started the match by grabbing Roberts as he rolled into the ring and running his head into the exposed steel turnbuckle. He then pounded on Roberts until Roberts fought back and went on the attack. André got tied up in the ropes and Roberts took full advantage and got his snake Damien (in the storyline, André was deathly afraid of snakes though in reality he actually had some snakes as pets on his ranch) and attempted to throw him on a struggling and terrified André, but Studd stopped Roberts. André took advantage and broke free out of the ropes and applied a chokehold on Roberts. He went for a shoulder block on Roberts in the corner but accidentally hit a headbutt on the turnbuckle pad. Roberts hit André with a knee lift and drove him into the exposed turnbuckle. André chopped Roberts on the floor and knocked him on the apron before having a confrontation with Studd. Ted DiBiase and Virgil came out and attempted to steal Damien but Roberts got Damien back. In the ring, André hit Studd with a cheap shot from behind and began to choke Studd with the strap of his tights, thus getting disqualified. Despite having won the match, Roberts tossed Damien in the ring to save Studd from André, who hightailed it out of the ring to get away from the snake.
The tenth match was a tag team match between The Hart Foundation (Bret "Hitman" Hart" and Jim "The Anvil" Neidhart) and Greg "The Hammer" Valentine and The Honky Tonk Man (with manager Jimmy Hart). Neidhart hit Valentine with a slingshot shoulder block for a near-fall. Honky tagged in but got nailed by Neidhart. Hart tagged in and connected with a backbreaker on Honky but missed a double axe handle middle rope elbow drop. Honky had the match won as he hit Hart with a Shake, Rattle N' Roll but he tagged in Valentine instead of pinning Hart. Valentine slapped in the figure four leglock on Hart. Hart crawled out of it but then he received a Gutbuster by Honky. Hart managed to hit a flying crossbody on Honky. Valentine tagged in and blocked a roll-up by Hart. Hart rolled out and tagged Neidhart. Neidhart dropkicked both Valentine and Honky and then hit Valentine with a shoulder block and made a cover. Honky made the save. A lariat on Valentine got another near-fall for Neidhart. Hart and Honky tagged in. Valentine ran in and nailed Neidhart on the apron. The referee was busy with taking out Valentine. Neidhart took advantage and handed Bret Hart, Jimmy Hart's megaphone. Hart knocked Honky with it and pinned him to win the matchup.
The eleventh match was a WWF Intercontinental Championship match between defending champion The Ultimate Warrior and "Ravishing" Rick Rude with Bobby Heenan in his corner. As the Warrior was doing his usual running entrance, Rude tried to jump-start the match by attempting a knee to Warrior's stomach, only to find that the Warrior was still wearing the Intercontinental belt and hurt his knee with no effect to the champion. Warrior then shoved Rude into the corner 3 times from mid-ring before slapping on a bearhug. Rude hit a missile dropkick on Warrior and went for a cover, but Warrior no-sold and grabbed a second bearhug on Rude. Rude bit but Warrior hit him with a back body drop. He went for a Warrior Splash but Rude hit his knees on Warrior. Rude followed with a back to belly piledriver and got a near-fall on the champion. Rude hit a jawbreaker on Warrior and clotheslined him for a near-fall. He hit Warrior with a Russian legsweep and got another near-fall. Rude hooked on a surfboard but Warrior grabbed the ropes. He powered out hitting Rude with a running shoulder block. He delivered Rude a backbreaker and tried to lift him up, but dropped him clumsily in the ropes. Warrior hit Rude a series of Irish whips in every corner. He missed a Warrior Splash. Rude went for a Rude Awakening but Warrior powered out and clotheslined Rude to the apron. He tried to suplex him back into the ring, but just before he completed the move Bobby Heenan pulled Warrior's leg out from under him, which caused Rude to fall on top of the champion, and held onto it so the weakened Warrior could not escape as Rude pinned him. Rude won the match and became the new WWF Intercontinental Champion in what was Warrior's first pinfall loss in the WWF. Following the match, an enraged Warrior chased Heenan around and into the ring and hit him with a gorilla press drop.
The twelfth match was between "Hacksaw" Jim Duggan and Bad News Brown. The powerhouse Brown dominated Duggan in the early goings but missed a charge in the corner. Duggan hit him a series of punches. Brown hit Duggan an Irish whip and smashed his head into the turnbuckles but Duggan no-sold. Duggan hit Brown a series of shoulder blocks before getting slugged. They went to the floor where Duggan was whipped shoulder-first into the ring post. Brown hit Duggan a Ghetto Blaster but Duggan avoided it and instead hit his three-point stance clothesline. Brown fell to the floor and tossed a chair into the ring. Meanwhile, Duggan got his 2x4. They both hit each other with foreign objects. The referee disqualified both men, as the match resulted in a double disqualification.
The thirteenth match and the final match on the undercard was between The Red Rooster and his former manager Bobby "The Brain" Heenan in a rare in-ring appearance as a wrestler. Accompanying Heenan to the ring was the Brooklyn Brawler. As the match began, Heenan (still favoring his ribs due to his prior run-in with The Warrior), immediately covered on Rooster but failed. Rooster tried to hit Heenan with an Irish whip but Heenan reversed it into his own. He missed a charge on Rooster and ran shoulder-first into the ring post. Rooster pinned him and won the match in just thirty-one seconds. After the match, Rooster was attacked by the Brawler, but this had little effect on the Rooster who soon got the upper hand and chased the Brawler from the ring.
The main event was for the WWF World Heavyweight Championship between defending champion "Macho Man" Randy Savage and Hulk Hogan with their manager Miss Elizabeth in a neutral corner. The match was billed as "The Mega Powers Explode". Hogan hit Savage with a shoulder block to send him out to the floor. Savage returned to the ring and applied a headlock on Hogan before pounding him in the face. Hogan shoved Savage again, but Savage grabbed and went to the floor. Hogan chased Savage around the ringside before Savage hid behind Miss Elizabeth. Savage went back in the ring and began taunting Hogan. Hogan applied a headlock and hit Savage with a drop toe hold. He slapped a front facelock on Savage, which Savage countered into a back suplex. The champion hit a double axe handle from the top rope on Hogan for a near-fall. Savage applied an armbar on Hogan until Hogan yanked Savage out to the floor. Hogan threw Savage back in the ring and smashed him in the turnbuckle and followed with a running clothesline, a series of elbow drops and a big boot. He received an Irish whip and a clothesline by Savage. Savage got a near-fall. Savage hooked on a chinlock on Hogan until Hogan hit his elbow and hit Savage with an atomic drop but missed an elbow drop. Savage took advantage and hit Hogan a knee in the corner. Savage hit him Irish whips in every corner before he began posing. Hogan hit Savage a series of punches and a corner clothesline, sending him out. Elizabeth checked on Savage, but he pushed her away. Hogan lifted Savage in the shoulder and tried to ram him in the ring post but Elizabeth prevented Hogan from doing this. Savage took advantage and slipped off and rammed Hogan into the ring post. The referee Dave Hebner then sent Elizabeth to the backstage. As Hogan was getting up, Savage hit him a diving double axe handle. Savage hit Hogan a hotshot. He drove his elbow into Hogan's throat on the apron, damaging Hogan's throat. Savage hit a knee drop on Hogan, getting a near-fall. He went to the top rope and hit a Savage Elbow. He did a pinfall attempt on Hogan, but Hogan hulked up and hit Savage with punches, big boot and a leg drop for the victory and his second WWF World Heavyweight Championship.
Aftermath
Hulk Hogan continued his feud with Randy Savage. WWF financed a movie in 1989 titled No Holds Barred which starred Hogan as the lead character Rip and Tom Lister, Jr. acted as the villain Zeus. In the movie, Rip defeats Zeus. This movie led to a feud between Hogan and Zeus in the WWF because Zeus wanted to take revenge from Hogan of the movie in real-life. He was billed in the WWF as Zeus and he formed an alliance with Savage. Hogan's best friend Brutus Beefcake joined him in the war. This led to a tag team main event at SummerSlam, where Hogan and Beefcake defeated Zeus and Savage. The rivalry continued until the No Holds Barred pay-per-view, where Hogan and Beefcake beat Zeus and Savage in a steel cage match, thus ending the rivalry with Zeus. After the No Holds Barred cage match, Randy Savage and Hulk Hogan would meet one last time in a WrestleMania V rematch for the WWF World Heavyweight Championship on The Main Event III. The pinfall was counted by new heavyweight boxing champion Buster Douglas, who then punched Savage out post-match after Savage slapped Douglas in the face.
Savage, meanwhile, found a new manager. After the WrestleMania broadcast went off the air, Gene Okerlund attempted to interview Miss Elizabeth. Sensational Sherri interrupted the interview along with Savage, which caused Hogan to get involved and fall victim to a steel chair shot from the dethroned champion. From then on until WrestleMania VII, Sherri served as Savage's manager and after Savage defeated Hacksaw Jim Duggan to become King of the World Wrestling Federation in September 1989, she became known as Sensational Queen Sherri.
Rick Martel turned heel and eventually transformed into "The Model", breaking up Strike Force and feuded with now former partner Tito Santana. Martel and fellow French Canadians The Fabulous Rougeaus (Jacques Rougeau and Raymond Rougeau) defeated Santana and The Rockers (Marty Jannetty and Shawn Michaels) at SummerSlam.
Rick Rude defended his Intercontinental Championship primarily against The Ultimate Warrior, but also against other faces as Hacksaw Jim Duggan and Jimmy Snuka. Later in the summer of 1989, Rude began badmouthing Roddy Piper, and Piper would play a key role in Rude's ultimate title loss back to The Ultimate Warrior.
With a successful Tag Team Championship defense, Demolition moved on to new feuds with The Twin Towers (Akeem and Big Boss Man) and the Brain Busters (Arn Anderson and Tully Blanchard). Demolition would eventually lose the titles to Anderson and Blanchard on Saturday Night's Main Event XXII (taped July 18, 1989) following interference from André the Giant; Demolition's reign was 478 days, which remains the longest uninterrupted reign in the history of the classic WWF World Tag Team Championship which was decommissioned in 2010. (The previous 370-day record of The Valiant Brothers was eclipsed on the actual day of Wrestlemania V.) It was also the longest reign with any tag team championship in WWWF/WWF/WWE history until the record was broken in 2016 by WWE Raw Tag Team Champions The New Day. Meanwhile, the Powers of Pain would lose their push and eventually settled into mid-card matches, feuding with teams such as The Bushwhackers and The Rockers until they were eventually split up in early 1990.
Results
Notes
References
External links
1989 in sports in New Jersey
1989 WWF pay-per-view events
April 1989 events in the United States
Events in New Jersey
Events in Atlantic City, New Jersey
Professional wrestling in New Jersey
WrestleMania |
10755909 | https://en.wikipedia.org/wiki/DIKW%20pyramid | DIKW pyramid | The DIKW pyramid, also known variously as the DIKW hierarchy, wisdom hierarchy, knowledge hierarchy, information hierarchy, information pyramid, and the data pyramid, refers loosely to a class of models for representing purported structural and/or functional relationships between data, information, knowledge, and wisdom. "Typically information is defined in terms of data, knowledge in terms of information, and wisdom in terms of knowledge".
Not all versions of the DIKW model reference all four components (earlier versions not including data, later versions omitting or downplaying wisdom), and some include additional components. In addition to a hierarchy and a pyramid, the DIKW model has also been characterized as a chain, as a framework, as a series of graphs, and as a continuum.
History
Danny P. Wallace, a professor of library and information science, explained that the origin of the DIKW pyramid is uncertain:
The presentation of the relationships among data, information, knowledge, and sometimes wisdom in a hierarchical arrangement has been part of the language of information science for many years. Although it is uncertain when and by whom those relationships were first presented, the ubiquity of the notion of a hierarchy is embedded in the use of the acronym DIKW as a shorthand representation for the data-to-information-to-knowledge-to-wisdom transformation.Many authors think that the idea of the DIKW relationship originated from two lines in the poem: 'Choruses', by T. S. Eliot, that appears in the pageant play: 'The Rock', in 1934:
Where is the wisdom we have lost in knowledge?
Where is the knowledge we have lost in information?
Data, Information, Knowledge
In 1955, English-American economist and educator Kenneth Boulding presented a variation on the hierarchy consisting of "signals, messages, information, and knowledge". However, "[t]he first author to distinguish among data, information, and knowledge and to also employ the term 'knowledge management' may have been American educator Nicholas L. Henry", in a 1974 journal article.
Data, Information, Knowledge, Wisdom
Other early versions (prior to 1982) of the hierarchy that refer to a data tier include those of Chinese-American geographer Yi-Fu Tuan and sociologist-historian Daniel Bell.. In 1980, Irish-born engineer Mike Cooley invoked the same hierarchy in his critique of automation and computerization, in his book Architect or Bee?: The Human / Technology Relationship.
Thereafter, in 1987, Czechoslovakia-born educator Milan Zeleny mapped the elements of the hierarchy to knowledge forms: know-nothing, know-what, know-how, and know-why. Zeleny "has frequently been credited with proposing the [representation of DIKW as a pyramid]...although he actually made no reference to any such graphical model."
The hierarchy appears again in a 1988 address to the International Society for General Systems Research, by American organizational theorist Russell Ackoff, published in 1989. Subsequent authors and textbooks cite Ackoff's as the "original articulation" of the hierarchy or otherwise credit Ackoff with its proposal. Ackoff's version of the model includes an understanding tier (as Adler had, before him), interposed between knowledge and wisdom. Although Ackoff did not present the hierarchy graphically, he has also been credited with its representation as a pyramid.
In 1989, Bell Labs veteran Robert W. Lucky wrote about the four-tier "information hierarchy" in the form of a pyramid in his book Silicon Dreams.
In the same year as Ackoff presented his address, information scientist Anthony Debons and colleagues introduced an extended hierarchy, with "events", "symbols", and "rules and formulations" tiers ahead of data.
In 1994 Nathan Shedroff presented the DIKW hierarchy in an information design context which later appeared as a book chapter.
Jennifer Rowley noted in 2007 that there was "little reference to wisdom" in discussion of the DIKW in recently published college textbooks, and does not include wisdom in her own definitions following that research. Meanwhile, Zins' extensive analysis of the conceptualizations of data, information, and knowledge, in his recent research study, makes no explicit commentary on wisdom, although some of the citations included by Zins do make mention of the term.
Description
The DIKW model "is often quoted, or used implicitly, in definitions of data, information and knowledge in the information management, information systems and knowledge management literatures, but there has been limited direct discussion of the hierarchy". Reviews of textbooks and a survey of scholars in relevant fields indicate that there is not a consensus as to definitions used in the model, and even less "in the description of the processes that transform elements lower in the hierarchy into those above them".
This has led Israeli researcher Chaim Zins to suggest that the data–information–knowledge components of DIKW refer to a class of no less than five models, as a function of whether data, information, and knowledge are each conceived of as subjective, objective (what Zins terms, "universal" or "collective") or both. In Zins's usage, subjective and objective "are not related to arbitrariness and truthfulness, which are usually attached to the concepts of subjective knowledge and objective knowledge". Information science, Zins argues, studies data and information, but not knowledge, as knowledge is an internal (subjective) rather than an external (universal–collective) phenomenon.
Data
In the context of DIKW, data is conceived of as symbols or signs, representing stimuli or signals, that are "of no use until...in a usable (that is, relevant) form". Zeleny characterized this non-usable characteristic of data as "know-nothing".
In some cases, data is understood to refer not only to symbols, but also to signals or stimuli referred to by said symbols—what Zins terms subjective data. Where universal data, for Zins, are "the product of observation" (italics in original), subjective data are the observations. This distinction is often obscured in definitions of data in terms of "facts".
Data as fact
Rowley, following her study of DIKW definitions given in textbooks, characterizes data "as being discrete, objective facts or observations, which are unorganized and unprocessed and therefore have no meaning or value because of lack of context and interpretation." In Henry's early formulation of the hierarchy, data was simply defined as "merely raw facts"., while two recent texts define data as "chunks of facts about the state of the world" and "material facts", respectively. Cleveland does not include an explicit data tier, but defines information as "the sum total of...facts and ideas".
Insofar as facts have as a fundamental property that they are true, have objective reality, or otherwise can be verified, such definitions would preclude false, meaningless, and nonsensical data from the DIKW model, such that the principle of garbage in, garbage out would not be accounted for under DIKW.
Data as signal
In the subjective domain, data are conceived of as "sensory stimuli, which we perceive through our senses", or "signal readings", including "sensor and/or sensory readings of light, sound, smell, taste, and touch". Others have argued that what Zins calls subjective data actually count as a "signal" tier (as had Boulding), which precedes data in the DIKW chain.
American information scientist Glynn Harmon defined data as "one or more kinds of energy waves or particles (light, heat, sound, force, electromagnetic) selected by a conscious organism or intelligent agent on the basis of a preexisting frame or inferential mechanism in the organism or agent."
The meaning of sensory stimuli may also be thought of as subjective data:
Information is the meaning of these sensory stimuli (i.e., the empirical perception). For example, the noises that I hear are data. The meaning of these noises (e.g., a running car engine) is information. Still, there is another alternative as to how to define these two concepts—which seems even better. Data are sense stimuli, or their meaning (i.e., the empirical perception). Accordingly, in the example above, the loud noises, as well as the perception of a running car engine, are data. (Italics added. Bold in original.)
Subjective data, if understood in this way, would be comparable to knowledge by acquaintance, in that it is based on direct experience of stimuli. However, unlike knowledge by acquaintance, as described by Bertrand Russell and others, the subjective domain is "not related to...truthfulness".
Whether Zins' alternate definition would hold would be a function of whether "the running of a car engine" is understood as an objective fact or as a contextual interpretation.
Data as symbol
Whether the DIKW definition of data is deemed to include Zins's subjective data (with or without meaning), data is consistently defined to include "symbols", or "sets of signs that represent empirical stimuli or perceptions", of "a property of an object, an event or of their environment". Data, in this sense, are "recorded (captured or stored) symbols", including "words (text and/or verbal), numbers, diagrams, and images (still &/or video), which are the building blocks of communication", the purpose of which "is to record activities or situations, to attempt to capture the true picture or real event," such that "all data are historical, unless used for illustrative purposes, such as forecasting."
Boulding's version of DIKW explicitly named the level below the information tier message, distinguishing it from an underlying signal tier. Debons and colleagues reverse this relationship, identifying an explicit symbol tier as one of several levels underlying data.
Zins determined that, for most of those surveyed, data "are characterized as phenomena in the universal domain". "Apparently," clarifies Zins, "it is more useful to relate to the data, information, and knowledge as sets of signs rather than as meaning and its building blocks".
Information
In the context of DIKW, information meets the definition for knowledge by description ("information is contained in descriptions"), and is differentiated from data in that it is "useful". "Information is inferred from data", in the process of answering interrogative questions (e.g., "who", "what", "where", "how many", "when"), thereby making the data useful for "decisions and/or action". "Classically," states a recent text, "information is defined as data that are endowed with meaning and purpose."
Structural vs. functional
Rowley, following her review of how DIKW is presented in textbooks, describes information as "organized or structured data, which has been processed in such a way that the information now has relevance for a specific purpose or context, and is therefore meaningful, valuable, useful and relevant." Note that this definition contrasts with Rowley's characterization of Ackoff's definitions, wherein "[t]he difference between data and information is structural, not functional."
In his formulation of the hierarchy, Henry defined information as "data that changes us", this being a functional, rather than structural, distinction between data and information. Meanwhile, Cleveland, who did not refer to a data level in his version of DIKW, described information as "the sum total of all the facts and ideas that are available to be known by somebody at a given moment in time".
American educator Bob Boiko is more obscure, defining information only as "matter-of-fact".
Symbolic vs. subjective
Information may be conceived of in DIKW models as: (i) universal, existing as symbols and signs; (ii) subjective, the meaning to which symbols attach; or (iii) both. Examples of information as both symbol and meaning include:
American information scientist Anthony Debons's characterization of information as representing "a state of awareness (consciousness) and the physical manifestations they form", such that "[i]nformation, as a phenomenon, represents both a process and a product; a cognitive/affective state, and the physical counterpart (product of) the cognitive/affective state."
Danish information scientist Hanne Albrechtsen's description of information as "related to meaning or human intention", either as "the contents of databases, the web, etc." (italics added) or "the meaning of statements as they are intended by the speaker/writer and understood/misunderstood by the listener/reader."
Zeleny formerly described information as "know-what", but has since refined this to differentiate between "what to have or to possess" (information) and "what to do, act or carry out" (wisdom). To this conceptualization of information, he also adds "why is", as distinct from "why do" (another aspect of wisdom). Zeleny further argues that there is no such thing as explicit knowledge, but rather that knowledge, once made explicit in symbolic form, becomes information.
Knowledge
The knowledge component of DIKW is generally agreed to be an elusive concept which is difficult to define. The DIKW definition of knowledge differs from that used by epistemology. The DIKW view is that "knowledge is defined with reference to information." Definitions may refer to information having been processed, organized or structured in some way, or else as being applied or put into action.
Zins has suggested that knowledge, being subjective rather than universal, is not the subject of study in information science, and that it is often defined in propositional terms, while Zeleny has asserted that to capture knowledge in symbolic form is to make it into information, i.e., that "All knowledge is tacit".
"One of the most frequently quoted definitions" of knowledge captures some of the various ways in which it has been defined by others:
Knowledge is a fluid mix of framed experience, values, contextual information, expert insight and grounded intuition that provides an environment and framework for evaluating and incorporating new experiences and information. It originates and is applied in the minds of knowers. In organizations it often becomes embedded not only in documents and repositories but also in organizational routines, processes, practices and norms.
Knowledge as processed
Mirroring the description of information as "organized or structured data", knowledge is sometimes described as:
"synthesis of multiple sources of information over time"
"organization and processing to convey understanding, experience [and] accumulated learning"
"a mix of contextual information, values, experience and rules"
One of Boulding's definitions for knowledge had been "a mental structure" and Cleveland described knowledge as "the result of somebody applying the refiner's fire to [information], selecting and organizing what is useful to somebody". A recent text describes knowledge as "information connected in relationships".
Knowledge as procedural
Zeleny defines knowledge as "know-how" (i.e., procedural knowledge), and also "know-who" and "know-when", each gained through "practical experience". "Knowledge...brings forth from the background of experience a coherent and self-consistent set of coordinated actions.". Further, implicitly holding information as descriptive, Zeleny declares that "Knowledge is action, not a description of action."
Ackoff, likewise, described knowledge as the "application of data and information", which "answers 'how' questions", that is, "know-how".
Meanwhile, textbooks discussing DIKW have been found to describe knowledge variously in terms of experience, skill, expertise or capability:
"study and experience"
"a mix of contextual information, expert opinion, skills and experience"
"information combined with understanding and capability"
"perception, skills, training, common sense and experience".
Businessmen James Chisholm and Greg Warman characterize knowledge simply as "doing things right".
Knowledge as propositional
Knowledge is sometimes described as "belief structuring" and "internalization with reference to cognitive frameworks". One definition given by Boulding for knowledge was "the subjective 'perception of the world and one's place in it'", while Zeleny's said that knowledge "should refer to an observer's distinction of 'objects' (wholes, unities)".
Zins, likewise, found that knowledge is described in propositional terms, as justifiable beliefs (subjective domain, akin to tacit knowledge), and sometimes also as signs that represent such beliefs (universal/collective domain, akin to explicit knowledge). Zeleny has rejected the idea of explicit knowledge (as in Zins' universal knowledge), arguing that once made symbolic, knowledge becomes information. Boiko appears to echo this sentiment, in his claim that "knowledge and wisdom can be information".
In the subjective domain:
Knowledge is a thought in the individual's mind, which is characterized by the individual's justifiable belief that it is true. It can be empirical and non-empirical, as in the case of logical and mathematical knowledge (e.g., "every triangle has three sides"), religious knowledge (e.g., "God exists"), philosophical knowledge (e.g., "Cogito ergo sum"), and the like. Note that knowledge is the content of a thought in the individual's mind, which is characterized by the individual's justifiable belief that it is true, while "knowing" is a state of mind which is characterized by the three conditions: (1) the individual believe[s] that it is true, (2) S/he can justify it, and (3) It is true, or it [appears] to be true. (Italics added. Bold in original.)
The distinction here between subjective knowledge and subjective information is that subjective knowledge is characterized by justifiable belief, where subjective information is a type of knowledge concerning the meaning of data.
Boiko implied that knowledge was both open to rational discourse and justification, when he defined knowledge as "a matter of dispute".
Wisdom
Although commonly included as a level in DIKW, "there is limited reference to wisdom" in discussions of the model. Boiko appears to have dismissed wisdom, characterizing it as "non-material".
Ackoff refers to understanding as an "appreciation of 'why'", and wisdom as "evaluated understanding", where understanding is posited as a discrete layer between knowledge and wisdom. Adler had previously also included an understanding tier, while other authors have depicted understanding as a dimension in relation to which DIKW is plotted.
Cleveland described wisdom simply as "integrated knowledge—information made super-useful". Other authors have characterized wisdom as "knowing the right things to do" and "the ability to make sound judgments and decisions apparently without thought".
Wisdom involves using knowledge for the greater good. Because of this, wisdom is deeper and more uniquely human. It requires a sense of good and bad, right and wrong, ethical and unethical.
Zeleny described wisdom as "know-why", but later refined his definitions, so as to differentiate "why do" (wisdom) from "why is" (information), and expanding his definition to include a form of know-what ("what to do, act or carry out"). According to Nikhil Sharma, Zeleny has argued for a tier to the model beyond wisdom, termed "enlightenment".
Representations
Graphical representation
DIKW is a hierarchical model often depicted as a pyramid, with data at its base and wisdom at its apex. In this regard it is similar to Maslow's hierarchy of needs, in that each level of the hierarchy is argued to be an essential precursor to the levels above. Unlike Maslow's hierarchy, which describes relationships of priority (lower levels are focused on first), DIKW describes purported structural or functional relationships (lower levels comprise the material of higher levels). Both Zeleny and Ackoff have been credited with originating the pyramid representation, although neither used a pyramid to present their ideas.
DIKW has also been represented as a two-dimensional chart or as one or more flow diagrams. In such cases, the relationships between the elements may be presented as less hierarchical, with feedback loops and control relationships.
Debons and colleagues may have been the first to "present the hierarchy graphically".
Throughout the years many adaptations of the DIKW pyramid have been produced. One evolving adaptation, in use by knowledge managers in the United States Department of Defense, attempts to show the progression transforming data to information then knowledge and finally wisdom to enable effective decisions, as well as the activities involved to ultimately create shared understanding throughout the organization and managing decision risk.
Computational representation
Intelligent decision support systems are trying to improve decision making by introducing new technologies and methods from the domain of modeling and simulation in general, and in particular from the domain of intelligent software agents in the contexts of agent-based modeling.
The following example describes a military decision support system, but the architecture and underlying conceptual idea are transferable to other application domains:
The value chain starts with data quality describing the information within the underlying command and control systems.
Information quality tracks the completeness, correctness, currency, consistency and precision of the data items and information statements available.
Knowledge quality deals with procedural knowledge and information embedded in the command and control system such as templates for adversary forces, assumptions about entities such as ranges and weapons, and doctrinal assumptions, often coded as rules.
Awareness quality measures the degree of using the information and knowledge embedded within the command and control system. Awareness is explicitly placed in the cognitive domain.
By the introduction of a common operational picture, data are put into context, which leads to information instead of data. The next step, which is enabled by service-oriented web-based infrastructures (but not yet operationally used), is the use of models and simulations for decision support. Simulation systems are the prototype for procedural knowledge, which is the basis for knowledge quality. Finally, using intelligent software agents to continually observe the battle sphere, apply models and simulations to analyse what is going on, to monitor the execution of a plan, and to do all the tasks necessary to make the decision maker aware of what is going on, command and control systems could even support situational awareness, the level in the value chain traditionally limited to pure cognitive methods.
Criticisms
Rafael Capurro, a philosopher based in Germany, argues that data is an abstraction, information refers to "the act of communicating meaning", and knowledge "is the event of meaning selection of a (psychic/social) system
from its 'world' on the basis of communication". As such, any impression of a logical hierarchy between these concepts "is a fairytale".
One objection offered by Zins is that, while knowledge may be an exclusively cognitive phenomenon, the difficulty in pointing to a given fact as being distinctively information or knowledge, but not both, makes the DIKW model unworkable.
[I]s Albert Einstein's famous equation "E = mc2" (which is printed on my computer screen, and is definitely separated from any human mind) information or knowledge? Is "2 + 2 = 4" information or knowledge?
Alternatively, information and knowledge might be seen as synonyms. In answer to these criticisms, Zins argues that, subjectivist and empiricist philosophy aside, "the three fundamental concepts of data, information, and knowledge and the relations among them, as they are perceived by leading scholars in the information science academic community", have meanings open to distinct definitions. Rowley echoes this point in arguing that, where definitions of knowledge may disagree, "[t]hese various perspectives all take as their point of departure the relationship between data, information and knowledge."
American philosophers John Dewey and Arthur Bentley, in their 1949 book Knowing and the Known, argued that "knowledge" was "a vague word", and presented a complex alternative to DIKW including some nineteen "terminological guide-posts".
Information processing theory argues that the physical world is made of information itself. Under this definition, data is either made up of or synonymous with physical information. It is unclear, however, whether information as it is conceived in the DIKW model would be considered derivative from physical-information/data or synonymous with physical information. In the former case, the DIKW model is open to the fallacy of equivocation. In the latter, the data tier of the DIKW model is preempted by an assertion of neutral monism.
Educator Martin Frické has published an article critiquing the DIKW hierarchy, in which he argues that the model is based on "dated and unsatisfactory philosophical positions of operationalism and inductivism", that information and knowledge are both weak knowledge, and that wisdom is the "possession and use of wide practical knowledge.
David Weinberger argues that although the DIKW pyramid appears to be a logical and straight-forward progression, this is incorrect. "What looks like a logical progression is actually a desperate cry for help." He points out there is a discontinuity between Data and Information (which are stored in computers), versus Knowledge and Wisdom (which are human endeavours). This suggests that the DIKW pyramid is too simplistic in representing how these concepts interact. "...Knowledge is not determined by information, for it is the knowing process that first decides which information is relevant, and how it is to be used."
See also
References
Further reading
Information science
Knowledge management
Information systems
Stage theories |
21855574 | https://en.wikipedia.org/wiki/Brain%20simulation | Brain simulation | Brain simulation is the concept of creating a functioning computer model of a brain or part of a brain. Brain simulation projects intend to contribute to a complete understanding of the brain, and eventually also assist the process of treating and diagnosing brain diseases.
Various simulations from around the world have been fully or partially released as open source, such as C. elegans, and the Blue Brain Project Showcase. In 2013 the Human Brain Project, which has utilized techniques used by the Blue Brain Project and built upon them, created a Brain Simulation Platform (BSP), an internet-accessible collaborative platform designed for the simulation of brain models.
Methods
Modelling a brain (or brain subsystem) involves modelling neurons' electrical and bulk chemical properties (e.g. extracellular serotonin gradients). A model of the neural connectome of the target organism is also required. The connectome is extremely complex, and its detailed wiring is not yet understood; thus it is presently being modeled empirically in smaller mammals by projects like the Blue Brain Project.
The Blue Brain Project intends to create a computer simulation of a mammalian cortical column down to the molecular level. By one estimate, a full reconstruction of the human connectome using the methodology of the Blue Brain Project would require a zettabyte of data storage.
Examples
Caenorhabditis elegans (roundworm)
The connectivity of the neural circuit for touch sensitivity of the simple C. elegans nematode (roundworm) was mapped in 1985 and partly simulated in 1993. Since 2004, many software simulations of the complete neural and muscular system have been developed, including simulation of the worm's physical environment. Some of these models including source code have been made available for download. However, there is still a lack of understanding of how the neurons and the connections between them generate the surprisingly complex range of behaviors that are observed in the relatively simple organism. This contrast between the apparent simplicity of how the mapped neurons interact with their neighbours, and exceeding complexity of the overall brain function, is an example of an emergent property. This kind of emergent property is paralleled within artificial neural networks, the neurons of which are exceedingly simple compared to their often complex, abstract outputs.
Drosophila neural system
The brain of the fruit fly, Drosophila, has also been thoroughly studied. A simulated model of the fruit fly's brain offers a unique model of sibling neurons. Like the roundworm, this has been made available as open-source software.
Mouse brain mapping and simulation
Henry Markram mapped the types of neurons within the mouse brain and their connections between 1995 and 2005.
In December 2006, the Blue Brain project completed a simulation of a rat's neocortical column. The neocortical column is considered the smallest functional unit of the neocortex. The neocortex is the part of the brain thought to be responsible for higher-order functions like conscious thought, and contains 10,000 neurons in the rat brain (and 108 synapses). In November 2007, the project reported the end of its first phase, delivering a data-driven process for creating, validating, and researching the neocortical column.
An artificial neural network described as being "as big and as complex as half of a mouse brain" was run on an IBM Blue Gene supercomputer by the University of Nevada's research team in 2007. Each second of simulated time took ten seconds of computer time. The researchers claimed to observe "biologically consistent" nerve impulses that flowed through the virtual cortex. However, the simulation lacked the structures seen in real mice brains, and they intend to improve the accuracy of the neuron and synapse models.
In 2019, Idan Segev, one of the computational neuroscientists working on the Blue Brain Project, gave a talk titled: "Brain in the computer: what did I learn from simulating the brain." In his talk, he mentioned that the whole cortex for the mouse brain was complete and virtual EEG experiments would begin soon. He also mentioned that the model had become too heavy on the supercomputers they were using at the time, and that they were consequently exploring methods in which every neuron could be represented as a neural network (see citation for details).
Blue Brain and the rat
Blue Brain is a project that was launched in May 2005 by IBM and the Swiss Federal Institute of Technology in Lausanne. The intention of the project was to create a computer simulation of a mammalian cortical column down to the molecular level. The project uses a supercomputer based on IBM's Blue Gene design to simulate the electrical behavior of neurons based upon their synaptic connectivity and ion permeability. The project seeks to eventually reveal insights into human cognition and various psychiatric disorders caused by malfunctioning neurons, such as autism, and to understand how pharmacological agents affect network behavior.
K computer and human brain
In late 2013, researchers in Japan and Germany used the K computer, then 4th fastest supercomputer, and the simulation software NEST to simulate 1% of the human brain. The simulation modeled a network consisting of 1.73 billion nerve cells connected by 10.4 trillion synapses. To realize this feat, the program recruited 82,944 processors of the K Computer. The process took 40 minutes, to complete the simulation of 1 second of neuronal network activity in real, biological, time.
Human Brain Project
The Human Brain Project (HBP) is a 10-year program of research funded by the European Union. It began in 2013 and employs around 500 scientists across Europe. It includes 6 platforms:
Neuroinformatics (shared databases),
Brain Simulation
High-Performance Analytics and Computing
Medical informatics (patient database)
Neuromorphic computing (brain-inspired computing)
Neurorobotics (robotic simulations).
The Brain Simulation Platform (BSP) is a device for internet-accessible tools, which allows investigations that are not possible in the laboratory. They are applying Blue Brain techniques to other brain regions, such as the cerebellum, hippocampus, and the basal ganglia.
Open source brain simulation
Various models of the brain have been released as open-source software (OSS) and are available on sites such as GitHub, including the C. elegans roundworm, the Drosophila fruit fly, and the human brain models Elysia and Spaun, which is the world's largest functional brain model and is based on the NENGO software architecture. The Blue Brain Project Showcase likewise illustrates how models and data from the Blue Brain Project can be converted to NeuroML and PyNN (Python neuronal network models).
The Brain Simulation Platform (BSP) is an internet-accessible open collaboration platform for brain simulation, created by the Human Brain Project.
See also
Whole brain emulation
Artificial general intelligence
References
Computational neuroscience
Brain |
50966914 | https://en.wikipedia.org/wiki/Polymail | Polymail | Polymail is an email application for macOS and iOS known for its clean interface and additional features atop the Gmail platform. It publicly released in July 2016.
Features
Polymail adds several new features atop those associated with standard email. Its email tracking shows which recipients have received and opened the email. Users can also set reminders for when to follow up on an email and schedule when they want their emails to send, if not immediately. The app also holds emails briefly so that users can "undo send". Polymail will also show profiles for the user's recipients and senders by associating those email addresses with those used in other social network services.
Development
The apps for macOS and iOS platforms released to the public on July 20, 2016.
Reception
Matthew Hussey of The Next Web wrote in December 2015 that Polymail was the first email app he genuinely loved, and praised its improvements upon Gmail's interface.
References
Email clients
MacOS software
IOS software |
946264 | https://en.wikipedia.org/wiki/EPIA | EPIA | VIA EPIA (VIA Embedded Platform Innovative Architecture) is a series of mini-ITX, em-ITX, nano-ITX, pico-ITX and pico-ITXe motherboards with integrated VIA processors. They are small and consume less power than computers of comparable capabilities.
Model codes
The VIA EPIA motherboards have the following designators:
Pico-ITX
EPIA PX
Processor: 1× VIA C7 with 1000 MHz
Chipset: VIA VX700 Unified Digital Media IGP chipset
Main memory: 1 DDR2-533 SO-DIMM socket (max. 1024 MB)
Miscellaneous:
1× ATA
1× Serial ATA
1× LVDS / DVI connector
7.1 HD audio
All connections apart from the VGA and network connection are only onboard for reasons of space.
Nano-ITX
EPIA N
Processor: 1× Luke CoreFusion with 500, 800 or 1,000 MHz
Chipset: Luke CoreFusion (integrated VIA CN400 Northbridge) + VIA VT8237R Southbridge
Main memory: 1× DDR-SDRAM as SO-DIMM (PC3200, PC2700, PC2100 and PC1600)
Miscellaneous:
1× Mini PCI
1× Serial ATA
1× LVDS connector
1× S-Video
1× RCA (for S/PDIF or Composite)
EPIA NL
Processor: 1× Luke CoreFusion with 500, 800 or 1,000 MHz
Chipset: Luke CoreFusion (integrated VIA CN400 Northbridge) + VIA VT8237R Southbridge
Main memory: 1× DDR-SDRAM as SO-DIMM (PC3200, PC2700, PC2100 and PC1600)
Miscellaneous:
encryption unit
1× Mini PCI
1× Serial ATA
1× LVDS connector
Mini-ITX
EPIA
Processor: 1× VIA C3 (800 MHz) or 1× EDEN ESP (533 MHz)
Chipset: VIA PLE133T north bridge + VIA VT8231 south bridge
Main memory: 2× SDR-SDRAM (PC100 and PC133)
Miscellaneous:
1× S-Video
1× RCA (for S/PDIF or Composite)
EPIA CL
Processor: 1× VIA C3 (1000 MHz) or 1× EDEN ESP (600 MHz)
Chipset: VIA CLE266 north bridge + VIA VT8235 south bridge
Main memory: 1× DDR SDRAM (PC2100 and PC1600)
Miscellaneous:
2× LAN
1× LVDS connector
EPIA CN
Processor: 1× VIA C3 (1300MHz or 1000MHz)
Chipset: VIA CN700 Northbridge + VIA VT8237R Southbridge
VGA: VIA UniChromeTM Pro with MPEG-2 decoder
Main memory: 1× DDR2-SDRAM, 533 MHz (up to 1 GB)
Miscellaneous:
2× Serial ATA
1× S-Video
1× RCA (for S/PDIF or Composite)
1× LAN
8× USB
1× COM
EPIA M
Processor: 1× VIA C3 (1000 MHz) or 1× EDEN ESP (600 MHz)
Chipset: VIA CLE266 north bridge + VIA VT8235 south bridge
Main memory: 1× DDR SDRAM (PC2100 and PC1600)
Miscellaneous:
1× FDD connector
LVDS connector
1× S-Video
1× RCA (for S/PDIF or Composite)
EPIA MII
Processor: 1× VIA C3 (1200 or 1000 MHz) or 1× EDEN ESP (600 MHz)
Chipset: VIA CLE266 north bridge + VIA VT8235 south bridge
Main memory: 1× DDR SDRAM (PC2100 and PC1600)
Miscellaneous:
1× FDD connector
LVDS connector
1× S-Video
1× RCA (for S/PDIF or Composite)
CardBus / CompactFlash slot
1× FireWire (IEEE 1394)
EPIA ML
Processor: 1× VIA C3 (800 MHz) or 1× EDEN ESP (500 MHz)
Chipset: VIA CLE266 north bridge + VIA VT8235 south bridge
Main memory: 1× DDR SDRAM (PC2100 and PC1600)
Miscellaneous: -
EPIA MS
Processor: 1× VIA C3 (1200 MHz) or 1× EDEN ESP (1000 or 800 MHz)
Chipset: VIA CLE266 north bridge + VIA VT8237 south bridge
Main memory: 1× DDR SDRAM (PC2100 and PC1600)
Miscellaneous:
CardBus / CompactFlash slot
Most of the connections are implemented as plug strips
EPIA PD
Processor: 1× VIA C3 (1000 MHz) or 1× EDEN ESP (600 MHz)
Chipset: VIA CLE266 north bridge + VIA VT8235 south bridge
Main memory: 1× DDR-SDRAM (PC2100 and PC1600) max. 1 GB
Miscellaneous:
2× Local Area Network, 1x Via Rhine II + 1x Via Rhine III
4× USB 2.0+ 2x USB optional
1× COM external + 3× internal ports COM
1× parallel
1× 1x VIA/S3G CLE266 graphics onboard
1× 1xPCI with extension card
1× LVDS connector
1× AC97 sound on board
EPIA SP
Processor: 1× VIA C3 (1300 MHz) or 1× EDEN ESP (800 MHz)
Chipset: VIA CN400 north bridge + VIA VT8237 south bridge
Main memory: 1× DDR SDRAM (PC3200, PC2700, PC2100 and PC1600)
Miscellaneous:
encryption unit
2× Serial ATA
1× FireWire IEEE 1394
1× S-Video
1× RCA (for S/PDIF or Composite)
EPIA TC
Processor: 1× VIA C3 (1000 MHz) or 1× EDEN ESP (600 MHz)
Chipset: VIA CLE266 north bridge + VIA VT8235 south bridge
Main memory: 1× DDR-SDRAM as SO-DIMM (PC2100 and PC1600)
Miscellaneous:
CardBus / CompactFlash slot
1× LVDS connector
direct connection to 12 V DC
EPIA V
Processor: 1× VIA C3 (800 MHz) or 1× EDEN ESP (500 MHz)
Chipset: VIA PLE133T north bridge + VIA VT8231 south bridge
Main memory: 2× SDR-SDRAM (PC100 and PC133)
Miscellaneous: -
EPIA EX
Processor: 1× VIA C7 with 1500 MHz or 1000 MHz
Chipset: VIA CX700M2
VGA: UniChromeTM Pro II 3D/2D with MPEG-2/4 and WMV9 decoder
Main memory: 1× DDR2 533 (up to 1 Gb)
VT-310DP
Processor: 2× EDEN ESP (1000 MHz or 800 MHz)
Chipset: VIA CN400 Northbridge + VIA VT8237R Southbridge
Main memory: 1× DDR SDRAM (PC3200, PC2700, PC2100 and PC1600)
Miscellaneous:
encryption unit
2× Serial ATA
3× LAN
References
External links
VIA EPIA motherboards
VIA EPIA EN12000E: Today's most efficient CPU & mainboard
VIA EPIA ME6000 Mini ITX Review
Weblinks
http://www.viatech.com/ (English)
http://www.via-tech.de/ (Deutsche)
http://www.viaarena.com/ (English)
http://www.Mini-ITX.com/ (English) ... do-it-yourself projects / information / news / shop
VIA Technologies
Motherboard
Embedded systems |
26414846 | https://en.wikipedia.org/wiki/Command%20substitution | Command substitution | In computing, command substitution is a facility that allows a command to be run and its output to be pasted back on the command line as arguments to another command. Command substitution first appeared in the Bourne shell, introduced with Version 7 Unix in 1979, and has remained a characteristic of all later Unix shells. The feature has since been adopted in other programming languages as well, including Perl, PHP, Ruby and Microsoft's Powershell under Windows. It also appears in Microsoft's CMD.EXE in the FOR command and the ( ) command.
Syntax and semantics
Shells typically implement command substitution by creating a child process to run the first command with its standard output piped back to the shell, which reads that output, parsing it into words separated by whitespace. Because the shell can't know it has all the output from the child until the pipe closes or the child dies, it waits until then before it starts another child process to run the second command.
This C shell example shows how one might search for all the C files containing the string malloc using fgrep and then edit any that are found using the vi editor. The syntactical notation shown here, ` ... `, using backquotes as delimiters, is the original style and is supported by all the common Unix shells.
#!/bin/csh
vi `fgrep -l malloc *.c`
Objections have been raised to both the syntax, how it's typed, and the semantics, how it works.
While easy to type, an important factor for an interactive command processor, the syntax has been criticized as awkward to nest, putting one command substitution inside another, because both the left and the right delimiters are the same. The KornShell (ksh) solved this with an alternative notation, $( ... ), borrowing from the notational style used for variable substitution. Today, most UNIX shells support this syntax. Microsoft's PowerShell also uses this notation, with the same semantics.
#!/bin/bash
vi $(fgrep -l malloc *.c)
The semantics, breaking the output into words at whitespace, has also been criticized. It worked well on early Unix systems where filenames never contained spaces but it doesn't work at all well on modern Windows and Linux systems where filenames certainly can contain spaces. In either of these previous examples, if any of the filenames matched by the *.c wildcard contains a space, that filename will be broken into two separate arguments to vi, clearly not what was intended. Hamilton C shell solved this with a double backquote notation, `` ... ``, that parses into words only at line breaks.
This is an example of command substitution
using the () operator in PowerShell:
$MyVariable = (ls)
echo $MyVariable
Expression substitution
A related facility, expression substitution, is found in the languages Common Lisp and Scheme, invoked by using the comma-at operator in an expression marked with the backquote (or "quasiquote") operator, and in ABC, by using an expression enclosed between backquotes inside a text display (string literal). For example, the ABC command produces the output .
See also
Process substitution
References
Programming language topics
Unix programming tools |
39479747 | https://en.wikipedia.org/wiki/Ted%20N.%20Branch | Ted N. Branch | Ted N. "Twig" Branch (born 22 April 1957) retired as a vice admiral in the United States Navy on 1 October 2016, after serving the last three years of his 37-year career as the Deputy Chief of Naval Operations for information warfare. In that capacity, he was the resource sponsor for the N2N6 portfolio which includes program investments for assured command and control, battlespace awareness, and integrated fires. He was the Navy's Chief Information Officer, the Director of Navy Cybersecurity, the leader of the Information Warfare Community, and the Director of Naval Intelligence. Branch was questioned by the Department of Justice regarding the Glenn Defense Marine Asia investigation in November 2013 and his access to classified information was suspended by the Secretary of the Navy. After a three-year investigation, Branch was cleared of all charges.
Education
Bachelor of Science, United States Naval Academy, 1979
Master of international relations, Naval War College
Military career
Branch was a career naval aviator, specializing in A-7 Corsairs and F/A-18 Hornets. He has flown combat missions over Grenada, Lebanon, Bosnia-Herzegovina, and Iraq. He has served as the commanding officer of VFA-15 (Strike Fighter Squadron 15), the , the , Carrier Strike Group One (Carl Vinson Strike Group), and Naval Air Force Atlantic. He has also served on the Joint Staff at the Pentagon.
As the commander of the , then-Captain Branch was featured prominently in the Emmy award-winning documentary television series Carrier.
In January 2010, as the Commander of the Carl Vinson Strike Group, Branch led the initial US Navy response to the Haiti earthquake.
From February 2011 to July 2013, Branch served as the Commander of Naval Air Force, U.S. Atlantic Fleet, headquartered in Norfolk, Virginia. In that role he was responsible for manning, training, and equipping all elements of Naval Air Force, Atlantic – over 1000 aircraft, 40 thousand personnel, and six nuclear-powered aircraft carriers. While there, he also established the Interoperability Coordination Office for the United Kingdom's new aircraft carriers and the introduction of the F-35 aircraft.
On 16 May 2013, Branch was nominated by Secretary of Defense Chuck Hagel to become the Director of Naval Intelligence (DNI) and the Deputy Chief of Naval Operations (DCNO)for Information Dominance (later renamed Information Warfare). He was confirmed by the United States Senate in July 2013 and promoted to Vice Admiral (O-9).
While serving in the DCNO/DNI roles, he also took on the position of Directory of Navy Cybersecurity, becoming the Navy's leading proponent for cybersecurity. In this role, he stood up a year-long matrixed organization called Task Force Cyber Awakening to develop and implement Navy's cybersecurity strategy. That group developed the CYBERSAFE program to design and build in cyber resiliency, and inculcate an enhanced culture of cybersecurity throughout the U.S. Navy. When the Task Force completed their efforts, he stood up the Navy Cybersecurity Division within N2N6 so the process of instituting CYBERSAFE and a culture of cybersecurity could continue.
Corruption scandal
On 8 November 2013, the Navy suspended Branch's access to classified information in connection with a Department of Justice investigation involving Singapore-based defense contractor, Glenn Defense Marine Asia. The investigation as to Branch involves a non-criminal accusation of "inappropriate conduct" associated with his acceptance of gifts from Glenn Marine during his tour as commanding officer of USS Nimitz on a western Pacific/Persian Gulf deployment in 2005. Although Branch remained in his post during the lengthy Justice Department investigation, his access to classified information remained suspended, relegating him to unclassified duties.
In September 2015, the Navy formally nominated Rear Admiral Elizabeth L. Train to succeed Branch as Director of Naval Intelligence.
In January 2016, the Washington Post reported that Branch was still functioning in his role, yet was "barred from reading, seeing or hearing classified information since November 2013", due to the suspension tied to the investigation.
On 1 April 2016, the Navy Times reported that the Navy had withdrawn Elizabeth Train's nomination to succeed Branch in favor of Vice Admiral Jan E. Tighe, previously commander of the Navy's Fleet Cyber Command and Commander, U.S. Tenth Fleet. Vice Admiral Tighe relieved Branch as Deputy CNO for Information Warfare/Director of Naval Intelligence in July 2016. Branch's access to classified information remained suspended until he retired.
Both the Navy and the Department of Justice cleared Branch of any wrongdoing in September 2017 and declined to prosecute Branch after a three-year investigation that resulted in no charges being brought.
Military Awards and Decorations
References
External links
Official Navy Biography
United States Navy vice admirals
United States Naval Academy alumni
Recipients of the Legion of Merit
People from Long Beach, Mississippi
Living people
Directors of the Office of Naval Intelligence
1957 births |
37656 | https://en.wikipedia.org/wiki/Concurrent%20Versions%20System | Concurrent Versions System | Concurrent Versions System (CVS, also known as the Concurrent Versioning System) is a revision control system originally developed by Dick Grune in July 1986.
CVS operates as a front end to RCS, an earlier system which operates on single files. It expands upon RCS by adding support for repository-level change tracking, and a client-server model.
Released under the terms of the GNU General Public License, CVS is free software.
Design
CVS operates as a front end to Revision Control System (RCS), an older version control system that manages individual files but not whole projects. It expands upon RCS by adding support for repository-level change tracking, and a client-server model. Files are tracked using the same history format as in RCS, with a hidden directory containing a corresponding history file for each file in the repository.
CVS uses delta compression for efficient storage of different versions of the same file. This works well with large text files with few changes from one version to the next. This is usually the case for source code files. On the other hand, when CVS is told to store a file as binary, it will keep each individual version on the server. This is typically used for non-text files such as executable images where it is difficult to create compact deltas between versions.
CVS excludes symbolic links because when they are stored in a version control system they can pose a security risk. For instance, a symbolic link to a sensitive file can be stored in the repository, making the sensitive file accessible even when it is not checked in. In place of symbolic links, scripts that require certain privileges and conscious intervention to execute may be checked into CVS.
Operation
CVS labels a single project (set of related files) that it manages as a module. A CVS server stores the modules it manages in its repository. Programmers acquire copies of modules by checking out. The checked-out files serve as a working copy, sandbox or workspace. Changes to the working copy are reflected in the repository by committing them. To update is to acquire or merge the changes in the repository with the working copy.
CVS uses a client–server architecture: a server stores the current version(s) of a project and its history, and clients connect to the server in order to "check out" a complete copy of the project, work on this copy and then later "check in" their changes. CVS servers can allow "anonymous read access", wherein clients may check out and compare versions with either a blank or simple published password (e.g., "anoncvs"); only the check-in of changes requires a personal account and password in these scenarios. Several developers may work on the same project concurrently, each one editing files within their own "working copy" of the project, and sending (or checking in) their modifications to the server. To avoid conflicts, the server only accepts changes made to the most recent version of a file. Developers are therefore expected to keep their working copy up-to-date by incorporating other people's changes on a regular basis. This task is mostly handled automatically by the CVS client, requiring manual intervention only when an edit conflict arises between a checked-in modification and the yet-unchecked local version of a file. Clients can also use the "update" command to bring their local copies up-to-date with the newest version on the server. Clients can also compare versions, request a complete history of changes, or check out a historical snapshot of the project (e.g.: based on a given date). If the check-in operation succeeds, then the version numbers of all files involved automatically increment, and the server writes a user-supplied description line, the date and the author's name to its log files. CVS can also run external, user-specified log processing scripts following each commit. These scripts are installed by an entry in CVS's loginfo file, which can trigger email notification or convert the log data into a Web-based format.
CVS can also maintain different "branches" of a project. For instance, a released version of the software project may form one branch, used for bug fixes, while a version under current development, with major changes and new features, can form a separate branch. CVS assumes that the majority of work takes place on the trunk, and that branches should generally be short-lived or historical. When used as designed, branches are easily managed and branch operations are efficient and fast.
Portability
The server software normally runs on Unix (although at least the CVSNT server also supports various flavors of Microsoft Windows), while CVS clients may run on any major operating system platform.
History
Grune recalled:
Grune publicly released the code on June 23, 1986.
The code that eventually evolved into the current version of CVS started with Brian Berliner in April 1989, with later input from Jeff Polk and many other contributors. Brian Berliner wrote a paper introducing his improvements to the CVS program—which describes how the tool was extended and used internally by Prisma, a third-party developer working on the SunOS kernel, and was released for the benefit of the community under the GPL. On November 19, 1990, CVS version 1.0 was submitted to the Free Software Foundation for development and distribution.
The latest version was released on 8 May 2008.
Adoption and successors
Over time, developers have created new version control systems based on CVS in order to add features, alter the operational model, and improve developers' productivity. CVS replacement projects include CVSNT and Subversion.
See also
Cervisia
OpenGrok
StatCVS
TortoiseCVS
ViewVC
Notes
References
External links
Version Management with CVS: manual for CVS 1.12.13, by Per Cederqvist et al.
1990 software
Free software programmed in C
Free version control software
Software using the GPL license
Unix archivers and compression-related utilities |
9557059 | https://en.wikipedia.org/wiki/Red%20Hat%20cluster%20suite | Red Hat cluster suite | The Red Hat Cluster includes software to create a high availability and load balancing cluster. Both can be used on the same system although this use case is unlikely. Both products, the High Availability Add-On and Load Balancer Add-On, are based on open-source community projects. Red Hat Cluster developers contribute code upstream for the community. Computational clustering is not part of cluster suite, but instead provided by Red Hat MRG.
High-Availability Add-On
The High Availability Add-On is Red Hat's implementation of Linux-HA. It attempts to ensure service availability by monitoring other nodes of the cluster. All nodes of the cluster must agree on their configuration and shared services state before the cluster is considered to have a quorum and services are able to be started.
The primary form of communicating node status is via a network device (commonly Ethernet), although in the case of possible network failure, quorum can be decided through secondary methods such as shared storage or multicast.
Software services, filesystems and network status can be monitored and controlled by the cluster suite, services and resources can be failed over to other network nodes in case of failure.
The Cluster forcibly terminates a cluster node's access to services or resources, via fencing, to ensure the node and data is in a known state. The node is terminated by removing power (known as STONITH) or access to the shared storage. More recent versions of Red Hat use a distributed lock manager, to allow fine grained locking and no single point of failure. Earlier versions of the cluster suite relied on a "grand unified lock manager" (GULM) which could be clustered, but still presented a point of failure if the nodes acting as GULM servers were to fail. GULM was last available in Red Hat Cluster Suite 4.
Technical details
Support for up to 128 nodes (16 nodes on Red Hat Enterprise Linux 3, 4, 5, and 6)
NFS (Unix) /SMB /GFS /GFS2 (Multiple Operating systems) File system failover support
Service failover support
Fully shared storage subsystem
Comprehensive data integrity
SCSI and fibre channel support
OCF and LSM resource agents
Load Balancing Add-On
Red Hat adapted the Piranha load balancing software to allow for transparent load balancing and failover between servers. The application being balanced does not require special configuration to be balanced, instead a Red Hat Enterprise Linux server with the load balancer configured, intercepts and routes traffic based on metrics/rules set on the load balancer.
Support and Product Life-Cycle
Red Hat cluster suite support is tied to a matching version of Red Hat Enterprise Linux and follows the same maintenance policy. The product has no activation, time limit or remote kill switch, it will remain working after the support life cycle has ended. It is partially supported running under VMware Virtual Machine.
History
The cluster suite is available in:
Red Hat Enterprise Linux 2.1
Red Hat Enterprise Linux 3.x, 4.x, 5.x - with supported Global File System (v1.x) as a filesystem
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 5.3 and later - with Global File System 2
Red Hat Enterprise Linux 6.0 and later, with Corosync (project), CMAN, and RGManager
Red Hat Enterprise Linux 6.5 and later, with Corosync (project), CMAN, and RGManager, or Pacemaker Resource Manager
Red Hat Enterprise Linux 7.0 and later , with Corosync (project) and Pacemaker Resource Manager
See also
Global File System
Logical Volume Manager (Linux)
References
External links
Red Hat Cluster Suite
Configuring and Managing a Cluster
best how to not presuming/requiring gui
Red Hat Enterprise MRG
Cluster computing
High-availability cluster computing
Red Hat software
Virtualization-related software for Linux |
532495 | https://en.wikipedia.org/wiki/David%20Wheeler%20%28computer%20scientist%29 | David Wheeler (computer scientist) | David John Wheeler FRS (9 February 1927 – 13 December 2004) was a computer scientist and professor of computer science at the University of Cambridge.
Education
Wheeler was born in Birmingham, England, the second of the three children of (Agnes) Marjorie, née Gudgeon, and Arthur Wheeler, a press tool maker, engineer, and proprietor of a small shopfitting firm. He was educated at a local primary school in Birmingham and then went on to King Edward VI Camp Hill School after winning a scholarship in 1938. His education was disrupted by World War II, and he completed his sixth form studies at Hanley High School. In 1945 he gained a scholarship to study the Cambridge Mathematical Tripos at Trinity College, Cambridge, graduating in 1948. He was awarded the world's first PhD in computer science in 1951.
Career
Wheeler's contributions to the field included work on the Electronic delay storage automatic calculator (EDSAC) in the 1950s and the Burrows–Wheeler transform (published 1994). Along with Maurice Wilkes and Stanley Gill, he is credited with the invention around 1951 of the subroutine (which they referred to as the closed subroutine), and gave the first explanation of how to design software libraries; as a result, the jump to subroutine instruction was often called a Wheeler Jump. Wilkes published a paper in 1953 discussing relative addressing to facilitate the use of subroutines. (However, Turing had discussed subroutines in a paper of 1945 on design proposals for the NPL ACE, going so far as to invent the concept of a return address stack.)
He was responsible for the implementation of the CAP computer, the first to be based on security capabilities. In cryptography, he was the designer of WAKE and the co-designer of the TEA and XTEA encryption algorithms together with Roger Needham. In 1950, with Maurice Wilkes, he used EDSAC to solve a differential equation relating to gene frequencies in a paper by Ronald Fisher. This represents the first use of a computer for a problem in the field of biology.
In August 1957 Wheeler married Joyce Blackler, who had used EDSAC for her own mathematical investigations as a research student from 1955. He became a Fellow of Darwin College, Cambridge in 1964 and formally retired in 1994, although he continued to be an active member of the University of Cambridge Computer Laboratory until his death.
Recognition and legacy
Wheeler was elected a fellow of the Royal Society in 1981, and received a Computer Pioneer Award in 1985 for his contributions to assembly language programming. In 1994 he was inducted as a Fellow of the Association for Computing Machinery. In 2003, he was named a Computer History Museum Fellow Award recipient "for his invention of the closed subroutine, and for his architectural contributions to ILLIAC, the Cambridge Ring, and computer testing."
The Computer Laboratory at the University of Cambridge annually holds the "Wheeler Lecture", a series of distinguished lectures named after him.
Personal life
On 24 August 1957 Wheeler married astrophysics research student Joyce Margaret Blackler. Together they had two daughters and a son. He died of a heart attack on 13 December 2004 while cycling home from the Computer Laboratory.
Quotes
Wheeler is often quoted as saying "All problems in computer science can be solved by another level of indirection." or "All problems in computer science can be solved by another level of indirection, except for the problem of too many layers of indirection." This has been called the fundamental theorem of software engineering.
Another quotation attributed to him is "Compatibility means deliberately repeating other people's mistakes."
References
External links
Oral history interview with David Wheeler, 14 May 1987. Charles Babbage Institute, University of Minnesota. Wheeler discusses projects that were run on EDSAC, user-oriented programming methods, and the influence of EDSAC on the ILLIAC, the ORDVAC, and the IBM 701. He also notes visits by Douglas Hartree, Nelson Blackman (of ONR), Peter Naur, Aad van Wijngarden, Arthur van der Poel, Friedrich Bauer, and Louis Couffignal.
Oral history interview with Gene H. Golub. Charles Babbage Institute, University of Minnesota. Golub discusses the construction of the ILLIAC computer, the work of Ralph Meager and David Wheeler on the ILLIAC design, British computer science, programming, and the early users of the ILLIAC at the University of Illinois.
1927 births
2004 deaths
Alumni of Trinity College, Cambridge
British computer scientists
British information theorists
Fellows of the Association for Computing Machinery
Fellows of the British Computer Society
Fellows of Darwin College, Cambridge
Fellows of the Royal Society
History of computing in the United Kingdom
Members of the University of Cambridge Computer Laboratory
Modern cryptographers
People educated at Hanley High School
People from Birmingham, West Midlands |
20177824 | https://en.wikipedia.org/wiki/FiveSprockets | FiveSprockets | FiveSprockets was a web-based software company based in San Diego, California, United States focused on developing resources, social networking, and web-based collaborative software for scriptwriting, filmmaking and digital-video production. The name FiveSprockets came from the five phases, or sprockets, of media production: (1) Story Development & Scriptwriting; (2) Pre-production; (3) Production; (4) Post-production; and (5) Marketing & Distribution. Founded in 2007 by CEO Randy Ullrich, FiveSprockets launched its Beta Release in September 2008 with an initial focus on social networking, educational content, and web-based software for screenwriting and production management.
Ideas Module
FiveSprockets included an Ideas module where creators could store their raw ideas across several different Idea types (such as Story or Character).
vScripter
vScripter was FiveSprockets' web-based story-development and scriptwriting software. vScripter took a story-development perspective on the process and allows the writer(s) to collect metadata about each story and manage their stories. vScripter supported a variety of different media-project formats, including screenplay, TV Sitcom, TV drama, Stage Play, Audio / Radio Play, and Comic Book.
Editor - vScripter's scriptwriting editor included features typical of scriptwriting software such as (a) proper formatting as recommended by AMPAS Nicholl Fellowship in Screenwriting; (b) writing accelerators such as intelligent tab-and-enter key processing; and (c) character and location memory for auto-completion typing.
Story Metadata - vScripter stored metadata about the story, including Log line, Tagline, Treatment, and story notes.
Collaboration - The script's originator could selectively choose to share a script in read-only or write-access mode to any of the originator's contacts.
Import/Export - Scripts written in other applications could be imported into vScripter via the RTF standard, which typically preserved most (but not necessarily all) of the original script's formatting. Additionally, vScripter could export to RTF, PDF, and HTML.
Script Registration - Through a partnership with ProtectRite, the creator and pioneer of online intellectual-property registration, writers could access the ProtectRite service directly from within vScripter to register and protect their work.
vProductionOffice
vProductionOffice was FiveSprockets' web-based production-management software.
Script Breakdown - When the user Greenlights a production, vProductionOffice walked the user through a simple wizard that, among other things, created a script breakdown. This includes separating the various scenes, listing the characters needed in each scene, and marking the 1/8's of each scene. The scenes could then be scheduled for their shooting date.
Storyboarding - The Storyboard feature allowed the user to create storyboards for each scene in the breakdown and watch the storyboard in an animation viewer.
Casting and Crewing - The user could cast and crew the production from their various connections within FiveSprockets.
Job Board
FiveSprockets included a Job Board so that its users could seek out new collaborators across a variety of media-production roles, from "Above the Line" positions such as Actor, Director, and Producer, to "Below the Line" roles such as Line Producer, Script Supervisor, and Key Grip.
Social networking and community
FiveSprockets included social networking features such as user profiles, project showcasing, contact building, internal messaging, and discussion boards. FiveSprockets also included educational content and resources where users could share their knowledge and learn from others across content types like how-to videos, instructional guides, discussion forums, and glossary elements.
Closure
On the 2nd of November 2012 the site shut down. Anyone attempting to access the site is met with the following message:
After four years as a web service, FiveSprockets.com shut down on Friday, 2 November 2012, at 9pm Pacific Standard Time in the USA (Midnight Eastern Standard Time).
Thank you to all of our supporters, in your various capacities, over the last several years. There are plenty of other good services out there, so we think you can find a home. If nothing else, try good old Google Docs. Keep writing and keep creating. And never be discouraged because, in the wise words of William Goldman, "Nobody knows anything." Except maybe you.
Sincerely,
Randy
Founder, FiveSprockets
See also
Web 2.0
Web application
Social network service
Filmmaking
Screenplay
Scriptwriting
Screenwriting
List of screenwriting software
References
External links
FiveSprockets - Official site
ThemeIt - Official site
Web applications
Social networking services
Screenwriting software
Companies based in San Diego
Online mass media companies of the United States
Film production software
Privately held companies based in California |
58229662 | https://en.wikipedia.org/wiki/Paessler%20PRTG | Paessler PRTG | PRTG (Paessler Router Traffic Grapher until version 7) is an agentless network monitoring software from Paessler AG. Several software versions are combined under the umbrella term Paessler PRTG. It can monitor and classify system conditions like bandwidth usage or uptime and collect statistics from miscellaneous hosts as switches, routers, servers and other devices and applications.
The first version of PRTG was released on 29 May 2003 by the German company Paessler GmbH (now: Paessler AG), which was founded by Dirk Paessler in 2001.
Products of the Paessler PRTG family
The monitoring software Paessler PRTG is available in three versions. In addition to the classic standalone solution PRTG Network Monitor, Paessler sells PRTG Enterprise Monitor for large and distributed networks and PRTG Hosted Monitor as a SaaS-version.
PRTG Network Monitor
PRTG Network Monitor is the classic on-premise monitoring solution, which is hosted on a server in the user's network. For the installation of the core server, a computer with the Windows Server operating system is required.
PRTG Enterprise Monitor
Since 2020, Paessler has offered PRTG Enterprise Monitor, a specialized monitoring solution for large IT environments. In addition to a particularly high performance for distributed locations, PRTG Enterprise Monitor also includes the ITOps Board, which provides a centralized service-oriented overview. It can be used to map business processes, consolidate dashboards from multiple servers, and monitor SLA performance and availability, among other features.
PRTG Hosted Monitor
In 2017, a cloud-hosted version of PRTG was released. PRTG Hosted Monitor offers largely the same range of functions as the standard tool. The license is billed monthly and is based solely on the number of sensors. In contrast to PRTG Network Monitor and PRTG Enterprise Monitor, PRTG Hosted Monitor can also be used in networks without a Windows server, since it is hosted in the cloud and not locally.
Specifications
Paessler PRTG has an auto-discovery mode that scans predefined areas of an enterprise network and creates a device list from this data. In the next step, further information on the detected devices can be retrieved using various communication protocols. Typical protocols are ICMP, SNMP, WMI, NetFlow, jFlow, sFlow, but also communication via DICOM or the RESTful API is possible.
Sensors
The software is based on sensors that are configured for a specific purpose. A PRTG sensor is a single metric on a device. For instance, when managing a switch, a sensor could be measuring network health, or whether the switch's CPU utilization is running above 90%. Most devices require between five and ten sensors to be fully monitored. There are HTTP, SMTP/POP3 (e-mail) application sensors and hardware-specific sensors for switches, routers and servers. PRTG Network Monitor has over 200 different predefined sensors that retrieve statistics from the monitored instances, e.g. response times, processor, memory, database information, temperature or system status.
Web interface and desktop client
The software can be operated completely via an AJAX-based web interface. The web interface is suitable for both real-time troubleshooting and data exchange with non-technical staff via maps (dashboards) and user-defined reports. An additional administration interface in the form of a desktop application for Windows, Linux and macOS is available.
Notifications and reports
In addition to the usual communication channels such as Email and SMS, notification is also provided via push notification on smartphones using an app for iOS or Android. Paessler PRTG also offers customizable reports.
Pricing
Paessler PRTG's licensing is based on sensors. A version with 100 integrated sensors is available free of charge for PRTG Network Monitor.
See also
Comparison of network monitoring systems
References
External links
Official website
Literature
Andrés, Steven, Brian Kenyon, and Erik Pack Birkholz. Security Sage's guide to hardening the network infrastructure. Elsevier, 2004.
Elsayed, Abdellatief, and Nashwa Abdelbaki. "Performance evaluation and comparison of the top market virtualization hypervisors." Computer Engineering & Systems (ICCES), 2013 8th International Conference on. IEEE, 2013.
System administration
Network management
Port scanners
Network analyzers
Windows software |
4092830 | https://en.wikipedia.org/wiki/Federal%20Office%20for%20Information%20Security | Federal Office for Information Security | The Federal Office for Information Security (, abbreviated as BSI) is the German upper-level federal agency in charge of managing computer and communication security for the German government. Its areas of expertise and responsibility include the security of computer applications, critical infrastructure protection, Internet security, cryptography, counter eavesdropping, certification of security products and the accreditation of security test laboratories. It is located in Bonn and as of 2020 has about 1,100 employees. Its current president, since 1 February 2016, is former business executive Arne Schönbohm, who took over the presidency from Michael Hange.
BSI's predecessor was the cryptographic department of Germany's foreign intelligence agency (BND). BSI still designs cryptographic algorithms such as the Libelle cipher and initiated the development of the Gpg4win cryptographic suite.
Similar agencies
The BSI has a similar role as the
Computer Security Division (CSD) of Information Technology Laboratory (ITL) of NIST (United States)
CESG (United Kingdom)
National Cybersecurity Institute (INCIBE) (Spain)
Unlike those organizations, BSI is focused on IT security rather than being part of an organisation with a more general IT standards remit. BSI is separate from Germany's signals intelligence, which is part of the military and the foreign intelligence service (BND).
Responsibilities
The BSI's scope of duties is defined by the German Federal Office for Information Security (BSI Act). The aim of the BSI is the promotion of information and cyber security in order to enable and promote the use of secure information and communication technology in government, business and society. For example, the BSI develops practice-oriented minimum standards and target group-specific recommendations for handling IT and Internet security.
The BSI is also responsible for protecting the IT systems of the federal government. This involves defending against cyber attacks and other technical threats against the IT systems and networks of the federal administration. Once a year, the BSI reports on this to the Committee on Internal Affairs of the German Bundestag.
The tasks of the BSI include:
Protection of federal networks, detection and defense of attacks on government networks
Testing, certification and accreditation of IT products and services
Warning of malware or security holes in IT products and services
IT security consulting for the federal administration and other target groups
Information and raising awareness of the public and the economy on IT and Internet security
Development of uniform and binding IT security standards
Development of cryptographic systems for the federal IT
The BSI is the central certification body for the security of IT systems in Germany (computer and data security, data protection). Testing and certification is possible with regard to the standards of the IT-Grundschutzhandbuch, the Green Book, ITSEC and the Common Criteria.
The BSI is a national authority in the field of cryptography, which draws up recommendations and technical guidelines for cryptographic procedures and is involved in the development of international cryptographic standards.
National Cyber Defense Center
The National Cyber Defense Center (Nationales Cyber-Abwehrzentrum, Cyber-AZ) is a cooperative institution of German authorities at federal level for the defense of electronic attacks on IT infrastructures of the Federal Republic of Germany and its economy. It was launched on April 1, 2011 and is located at the BSI.
The center is a core element of the Cyber Security Strategy adopted by the German government in 2011. It aims to optimize operational cooperation and coordinate protection and defense measures. This is based on a holistic approach that brings together the various threats in cyberspace: Cyber espionage, cyber spying, cyber terrorism and cyber crime. The goal is a rapid exchange of information, rapid assessments and concrete recommendations for action derived from these.
Alliance for Cyber Security
The Alliance for Cyber Security, or Allianz für Cyber-Sicherheit, is an initiative of the German Federal Office for Information Security, which will be launched in 2012 in cooperation with the German Association for Information Technology, Telecommunications and New Media. (Bitkom) was founded. As an association of all major players in the field of cyber security in Germany, the alliance aims to provide up-to-date and valid information on threats in cyberspace. The initiative also supports the exchange of information and experience between the participants. More than 4,000 institutions now belong to the Alliance for Cyber Security, including almost 100 partner companies and 45 multipliers. Participation is free of charge and can be applied for by any German institution.
UP KRITIS
The UP KRITIS (UP stands for implementation plan) is a public-private cooperation between operators of critical infrastructures (KRITIS), their various associations and the responsible governmental agencies such as the BSI. It addresses eight of the nine critical infrastructure sectors. The sector "state and administration" is covered by the UP BUND and activities on state and municipal level. The goal of the UP KRITIS cooperation is to maintain the supply of critical infrastructure services in Germany. All organizations based in Germany that operate critical infrastructures in Germany, national professional and industry associations from the KRITIS sectors and the responsible authorities can participate in UP KRITIS upon application.
BSI for citizens
The tasks of the BSI include informing and sensitizing citizens to the safe use of information technology, mobile communication media and the Internet. The BSI therefore offers online content specially tailored to the needs of citizens (BSI für Bürger). The website covers topics and information on IT and Internet security in a way that is understandable even for technical laypersons. In addition to providing information, the BSI also offers specific and actionable recommendations, for example on topics such as e-mail encryption, smartphone security, online banking, cloud computing or social networks. Private users can also contact the BSI by phone or e-mail with their questions on IT and Internet security issues. In addition, the BSI offers a free warning and information service called "Bürger-CERT", which informs citizens and small businesses quickly and competently about weaknesses, security gaps and other risks and provides practical guidance.
Activities
In December 2018, Arne Schönbohm stated that the BSI had not yet seen evidence that Chinese telecommunications company Huawei had used its equipment to conduct espionage on behalf of China.
IT Baseline Protection Catalog
The IT Baseline Protection Catalog, or IT-Grundschutz, is a collection of enterprise security guidelines established by the office, which serve to identify and combat security-relevant vulnerabilities in IT environments. With introduction and catalogs, the collection comprises more than 4,800 pages and serves companies and authorities as a basis for obtaining certification according to IT-Grundschutz. By obtaining certification, a company demonstrates that it has taken appropriate measures to protect its IT systems against IT security threats.
See also
ENISA
National Cyberdefence Centre
Central Office for Information Technology in the Security Sector (ZITiS)
References
External links
English BSI publications
Interview with President Michael Hange
German federal agencies
Science and technology in Germany
Security organizations
Computer security organizations
Federal authorities in Bonn
Privacy in Germany |
12729719 | https://en.wikipedia.org/wiki/List%20of%20decisions%20of%20the%20EPO%20Boards%20of%20Appeal%20relating%20to%20Article%2052%282%29%20and%20%283%29%20EPC | List of decisions of the EPO Boards of Appeal relating to Article 52(2) and (3) EPC | This list provides a guide to decisions of the Boards of Appeal of the European Patent Office (EPO) relating to . These decisions touch the issue of patentable subject-matter under the European Patent Convention (EPC). The accompanying notes offer an explanation as to the content of the decision. For an introduction to patentable subject-matter under the EPC, see Patentable subject-matter under the EPC and Software patents under the EPC. The organisation of the list is by date of the decision. The criteria for inclusion in the list are:
the decision has been published on the Official Journal of the EPO (OJ), or will be published at the Official Journal, as indicated in the decision; and
the decision explicitly mentions Article 52(2) and/or (3) EPC in the reasons, unless the mention is tangential or the case exclusively relates to procedural questions.
1980 – 1989
March 19, 1986, T 51/84 (Coded distinctive mark/Stockburger). The Board held that if a claim focuses solely on procedural steps involved in applying a coded distinctive mark to an object without indicating or presupposing technical means for carrying them out, a process of this kind is excluded from patentability by Article 52(2)(c) and (3) EPC.
July 15, 1986, T 208/84 (Computer-related invention/VICOM). This decision set out the principles governing the patentability of computer-related inventions. The Board held that the fact that the idea or concept underlying the subject-matter of a claim resides in a mathematical method does not necessarily mean that the claimed subject-matter is a mathematical method "as such". "Decisive is what technical contribution the invention as defined in the claim when considered as a whole makes to the known art".
May 21, 1987, T 26/86 (X-ray apparatus/KOCH & STERZEL).
September 5, 1988, T 115/85 (Computer-related invention/IBM).
October 5, 1988, T 22/85 (Document abstracting and retrieving/IBM).
October 6, 1988, T 6/83 (Data processor network/IBM).
February 14, 1989, T 38/86 (Text processing/IBM).
March 14, 1989, T 163/85, (Colour television signal/BBC).
April 25, 1989, T 119/88, (Coloured disk jacket/FUJI).
December 11, 1989, G 2/88, (Friction reducing additive/MOBIL OIL III). In this case, one of the parties raised the issue of Article 52(2) EPC and the exclusion of "discoveries" from patentability in relation to a claim. The Enlarged Board of Appeal however held that the claim in question was not novel, so it considered that "of course" it was unnecessary to examine the exclusion from patentability under Article 52(2) EPC. The Board also mentioned that, in a particular case, concurrent novelty objections and objections under Article 52(2) and (3) EPC could exist, but that they were distinct objections.
December 12, 1989, T 158/88 (Character form/SIEMENS).
1990 – 1994
July 3, 1990, T 603/89, (Marker/BEATTIE).
March 19, 1992, T 854/90, (Card reader/IBM).
April 9, 1992, T 164/92, (Electronic computer components / ROBERT BOSCH)
April 15, 1993, T 110/90, (Editable document form/IBM).
May 31, 1994, T 769/92 (General-purpose management system/SOHEI). The Board held that a method was considered not excluded under Art. 52(2) and (3) EPC "if technical considerations concerning particulars of the solution of the problem the invention solves are required in order to carry out that same invention."
July 6, 1994, T 1002/92 (Queueing system/PETTERSSON).
1995 – 1999
July 1, 1998, T 1173/97 (Computer program product/IBM), which is considered a landmark decision for the current approach, as of 2012, to the patentability of computer-implemented inventions.
2000 – 2004
March 15, 2000, T 1194/97, (Data structure product/PHILIPS).
September 8, 2000, T 931/95, (Pension Benefit Systems Partnership), which is also considered a landmark decision for the current approach, as of 2012, to the patentability of computer-implemented inventions.
September 26, 2002, T 641/00 (Two identities/COMVIK), which is considered a further landmark decision for the current approach, as of 2012, to the patentability of computer-implemented inventions.
April 21, 2004, T 258/03 (Auction Method/Hitachi). In this landmark decision for the current approach, as of 2012, to the patentability of computer-implemented inventions, the Board went further than the Pension Benefit decision (T 931/95) and held that, in general, a method involving technical means is an invention within the meaning of Article 52(1) EPC.
July 6, 2004, T 315/03 (Transgenic animals/HARVARD). The Board stated that certain categories of subject-matter are not regarded as inventions at all – these are sometimes called the exclusions (Article 52(2)(3) EPC), in contrast to certain other categories of subject-matter, while being considered as being inventions, are denied the protection of patents – these are sometimes called the exceptions (Article 53 EPC).
2005 – 2009
December 16, 2005, G 1/04 (Diagnostic methods). The Board held that, "the deductive medical or veterinary decision phase, diagnosis for curative purposes in itself is an intellectual exercise, unless, as a result of developments in the field of diagnostic technology, a device capable of reaching diagnostic conclusions can be used. As an intellectual exercise, pursuant to Article 52(2) EPC, the deductive decision phase is not regarded as an invention within the meaning of Article 52(1) EPC, whereas the method carried out by the device might well represent an invention within the meaning of this provision."
March 22, 2006, T 388/04 (Undeliverable mail/PITNEY BOWES). The Board held that "subject-matter or activities that are excluded from patentability under Article 52(2) and (3) EPC remain so even where they imply the possibility of making use of unspecified technical means", such as an unspecified computer.
March 22, 2006, T 619/02 (Odour selection/QUEST INTERNATIONAL).
October 20, 2006, T 1242/04 (Provision of product specific data/MAN).
November 15, 2006, T 154/04 (Estimating sales activity / DUNS LICENSING ASSOCIATES). This landmark decision summarizes the current approach, as of 2012, regarding the patentability of computer-implemented inventions.
December 13, 2006, T 1227/05 (Schaltkreissimulation I / Infineon Technologies). The board held that, beyond its implementation, a procedural step may contribute to the technical character of a claimed method only to the extent that it serves a technical purpose of the method. In that light, simulation methods which form an essential part of the fabrication process and precede actual production, mostly as an intermediate step, cannot be denied a technical effect merely on the grounds that they do not yet incorporate the physical end product.
2010 – 2019
May 12, 2010, G 3/08 (Programs for computers), opinion issued by the Enlarged Board of Appeal following the referral by the President of the EPO on October 22, 2008. The referral relating the patentability of programs for computers was dismissed as inadmissible by the Enlarged Board of Appeal. The Enlarged Board considered that there was only a development in the case law, rather than a divergence in decisions given by the Boards of Appeal on the question of patentability of computer-implemented inventions.
From 2020
March 10, 2021, G 1/19 (Simulations), decision issued by the Enlarged Board of Appeal following a referral by the Technical Board of Appeal 3.5.07 in the interlocutory decision of T489/14 on February 22, 2019
See also
List of UK judgments relating to excluded subject matter
List of patent case law
Notes
References
Further reading
Case Law of the Boards of Appeal (9th edition, July 2019)
Software patent case law
European Patent Office case law
EPO Board of appeal |
17439 | https://en.wikipedia.org/wiki/K-Meleon | K-Meleon | K-Meleon is an open-source, lightweight web browser for Microsoft Windows. K-Meleon can use the secure Goanna layout engine based on Mozilla's Gecko or the Gecko engine itself. K-Meleon was one of the first projects to use Gecko outside of Netscape, predating even Mozilla Firefox and SeaMonkey. K-Meleon runs on legacy hardware and operating systems that other modern web browsers no longer support. Instead of Web Extensions, K-Melons supports configuration files and macros to allow users to customize most aspects of the browser. The browser is available under the GNU General Public License.
Development and specifications
K-Meleon uses the native Windows application programming interface (API) to create its user interface instead of Mozilla's cross-platform XML User Interface Language (XUL) layer, and as a result, is tightly integrated into the look and feel of the Windows desktop. This approach is similar to that of Galeon and Epiphany (for the GNOME desktop), and Camino (for Mac OS X). Omitting XUL makes K-Meleon less resource-intensive than other browsers on Windows.
The first version, K-Meleon 0.1, was originally written by Christophe Thibault and released to the public on August 21, 2000. A flurry of development happened until 2003 when a number of developers stopped working on it. Dorian Boissonnade eventually took over as the primary developer of the project, and continues to maintain the project to date.
After many major release versions from 0.1 to 0.9.x, K-Meleon 1.0 introduced major modifications. The most notable change was the main K-Meleon code being updated to accommodate the Gecko 1.8.0.x rendering engine, as used in the latest releases of Mozilla Firefox and SeaMonkey. This update to the layout engine brought significant improvements to security and usability, including support for favicons and multi-user environments. Some themes and macros from version 0.9 were still compatible with 1.0, although the macro system was updated.
The macro system was updated further in K-Meleon 1.1, which was based on the Gecko 1.8.1 rendering engine that was used in Mozilla Firefox 2.0 and SeaMonkey 1.1.
A true tabbed interface was introduced in version 1.5. Prior to this update, multiple web pages were only accessible within the same browser window using the included but optional "layers" plugin, which enabled a toolbar containing buttons representing each open page in a way that functionally mimicked tabbed browsing in every way other than appearance. These open pages were called "layers" instead of tabs.
In 2010, K-Meleon was one of the twelve browsers offered to European Economic Area users of Microsoft Windows.
As of 2012, the project was incorrectly reported as being on indefinite hold, presumably due to the fact that Mozilla stopped providing an embeddable version of the Gecko engine. This has since been clarified, as development continued.
In late 2013, the K-Meleon group began developing new versions based on Mozilla's XULRunner 24 runtime environment in place of the discontinued Gecko Runtime Environment. K-Meleon 74 was the first stable release to use updated versions of this environment.
K-Meleon 75 was released in mid-2015 with a Mozilla 31 backend, new skin and toolbar implementation, spellcheck, and form autocompletion.
Since 2019, stable builds of K-Meleon have been released using a fork of the Goanna engine.
Active branch
Since 2017, all active development on K-Meleon has taken place in the Goanna branch. Roytam forked the most recent version of K-Meleon in 2017 to run on the Goanna engine. This branch also includes tweaks and bug fixes for the K-Meleon shell from another community build. With Firefox Quantum, Mozilla rewrote most of the Gecko engine from the ground up. The Goanna engine is a maintained fork of the old Gecko engine created by Pale Moon developers. K-Meleon incorporated the improvements in web-rendering technology from Goanna Tycho and continues to port back security updates from the current version of Goanna maintained for Pale Moon.
Legacy Windows versions
K-Meleon supports many legacy versions of Windows. Windows XP and Vista are both actively supported. Microsoft ended mainstream support for Windows XP in 2009 and Vista in 2012. They released their final update for the XP family of operating systems on April 9, 2019, and Vista on April 11, 2017. Google dropped Windows XP support from Google Chrome on April 15, 2016, Mozilla dropped support in 2018 , and Microsoft has not made newer versions of Internet Explorer available for XP or Vista.
Even older versions of Windows receive some updates. Many older web browsers cannot access modern websites because they don't support the Transport Security Layer (TLS). An increasing number of websites are using HTTPS which encrypts communication for privacy and security using TLS. Older browsers released for Windows 9X operating systems do not include any support for TLS. Older versions of K-Meleon have received patches that allow them to access the modern web. K-Meleon 74 can access secure websites on Windows 2000 using TLS 1.2. K-Meleon 74 can run on Windows 98 using KernelEx but not natively. K-Meleon 1.5 can natively access secure websites on Windows 98 using TLS patches. However, there are no updates available for K-Meleon 1.5's web engine.
Customization
K-Meleon has a highly flexible interface design. All the menus and toolbar buttons can be customized using text-format configuration files. This feature is useful in environments where the browser must be customized for general public use, such as in a public library or Internet café. Although individual toolbars can be repositioned, users must edit toolbar configuration files to make any changes to button layouts as there is no graphical user interface (GUI) to customize them.
The use of the native Windows interface means that K-Meleon does not support Mozilla-formatted browser themes. Compatibility with Mozilla extensions is also limited, with only a few extensions that can be integrated. However, K-Meleon has its own plugins (called "kplugins") and browser themes (using Lim Chee Aun's Phoenity by default), which can extend the functionality and customize the appearance of the browser. There is also a macro plugin which allows users to extend the browser functionality without having to know the C programming language.
Release history
References: K-Meleon file releases, release notes, Wiki documentation, and Announcements forum.
See also
Comparison of feed aggregators
Comparison of lightweight web browsers
Comparison of web browsers
List of feed aggregators
List of web browsers
References
External links
2000 software
Free web browsers
Gecko-based software
Gopher clients
News aggregator software
Portable software
Windows-only free software
Windows web browsers |
56616302 | https://en.wikipedia.org/wiki/Posts%20and%20Telecommunications%20Division | Posts and Telecommunications Division | Posts and Telecommunications Division(ডাক ও টেলিযোগাযোগ বিভাগ) is the government department responsible for post and telecommunication under the Ministry of Posts, Telecommunications and Information Technology in Bangladesh and is located in Dhaka, Bangladesh.
History
During the term of Tarana Halim as State Minister of Ministry of Posts, Telecommunications and Information Technology, the Bangladesh Telecommunication Regulatory Commission under the Posts and Telecommunications Division of the ministry engaged in struggle over turf with the Information and Communication Technology Division of the same ministry in 2017. The dispute was regarding who had authority over the fiber optic network in Bangladesh. The dispute drew criticism from Bangladesh Parliament.
Constituent organisations
List of organisations and agencies under the division:
Bangladesh Telecommunication Regulatory Commission
Bangladesh Post Office
Bangladesh Telecommunications Company Limited
Bangladesh Submarine Cable Company Limited
Teletalk Bangladesh Ltd
Telephone Shilpa Sangstha
Bangladesh Cable Shilpa Limited
Department of Telecommunications
Mailing operator and courier services licensing authority
Bangladesh Communication Satellite Company Limited
References
Government agencies of Bangladesh
1972 establishments in Bangladesh
Postal system of Bangladesh
Organisations based in Dhaka
Ministry of Posts, Telecommunications and Information Technology |
245021 | https://en.wikipedia.org/wiki/Message%20delivery%20agent | Message delivery agent | A message delivery agent (MDA), or mail delivery agent, is a computer software component that is responsible for the delivery of e-mail messages to a local recipient's mailbox. It is also called a local delivery agent (LDA).
Within the Internet mail architecture, local message delivery is achieved through a process of handling messages from the message transfer agent, and storing mail into the recipient's environment (typically a mailbox).
Implementation
Many mail handling software products bundle multiple message delivery agents with the message transfer agent component, providing for site customization of the specifics of mail delivery to a user.
Unix
On Unix-like systems, procmail and maildrop are the most popular MDAs. The Local Mail Transfer Protocol (LMTP) is a protocol that is frequently implemented by network-aware MDAs.
Invocation
The mail delivery agent is generally not started from the command line, but is usually invoked by mail delivery subsystems, such as a mail transport agent, or a mail retrieval agent.
List of MDA software for Unix-like platforms
Cyrus IMAP - A mail server suite that includes a mail delivery agent
dovecot - A mail server suite that includes a mail delivery agent
fetchmail - Primarily a Mail retrieval agent (MRA)
getmail - simpler, more secure, modern fetchmail alternative
fdm — modern replacement for both fetchmail and procmail from the author of tmux
maildrop or courier-maildrop - traditional procmail replacement, part of Courier Mail Server, but can also be used with other mail servers
procmail - obsolete since it is unmaintained; old, but still used
bin/mail, the MDA part of Sendmail - Sendmail is one of the oldest email packages
Sieve mail filtering language - a standardised mail filtering language; also, a modern replacement for procmail from the GNU Mailutils package
See also
Message transfer agent (MTA)
Mail retrieval agent (MRA)
Message submission agent (MSA)
Message user agent (MUA) a.k.a. email client
E-mail agent (infrastructure) (MxA)
References |
19170396 | https://en.wikipedia.org/wiki/IT%20baseline%20protection | IT baseline protection | The IT baseline protection () approach from the German Federal Office for Information Security (BSI) is a methodology to identify and implement computer security measures in an organization. The aim is the achievement of an adequate and appropriate level of security for IT systems. To reach this goal the BSI recommends "well-proven technical, organizational, personnel, and infrastructural safeguards". Organizations and federal agencies show their systematic approach to secure their IT systems (e.g. Information Security Management System) by obtaining an ISO/IEC 27001 Certificate on the basis of IT-Grundschutz.
Overview baseline security
The term baseline security signifies standard security measures for typical IT systems. It is used in various contexts with somewhat different meanings. For example:
Microsoft Baseline Security Analyzer: Software tool focused on Microsoft operating system and services security
Cisco security baseline: Vendor recommendation focused on network and network device security controls
Nortel baseline security: Set of requirements and best practices with a focus on network operators
ISO/IEC 13335-3 defines a baseline approach to risk management. This standard has been replaced by ISO/IEC 27005, but the baseline approach was not taken over yet into the 2700x series.
There are numerous internal baseline security policies for organizations,
The German BSI has a comprehensive baseline security standard, that is compliant with the ISO/IEC 27000-series
BSI IT baseline protection
The foundation of an IT baseline protection concept is initially not a detailed risk analysis. It proceeds from overall hazards. Consequently, sophisticated classification according to damage extent and probability of occurrence is ignored. Three protection needs categories are established. With their help, the protection needs of the object under investigation can be determined. Based on these, appropriate personnel, technical, organizational and infrastructural security measures are selected from the IT Baseline Protection Catalogs.
The Federal Office for Security in Information Technology's IT Baseline Protection Catalogs offer a "cookbook recipe" for a normal level of protection. Besides probability of occurrence and potential damage extents, implementation costs are also considered. By using the Baseline Protection Catalogs, costly security analyses requiring expert knowledge are dispensed with, since overall hazards are worked with in the beginning. It is possible for the relative layman to identify measures to be taken and to implement them in cooperation with professionals.
The BSI grants a baseline protection certificate as confirmation for the successful implementation of baseline protection. In stages 1 and 2, this is based on self declaration. In stage 3, an independent, BSI-licensed auditor completes an audit. Certification process internationalization has been possible since 2006. ISO/IEC 27001 certification can occur simultaneously with IT baseline protection certification. (The ISO/IEC 27001 standard is the successor of BS 7799-2). This process is based on the new BSI security standards. This process carries a development price which has prevailed for some time. Corporations having themselves certified under the BS 7799-2 standard are obliged to carry out a risk assessment. To make it more comfortable, most deviate from the protection needs analysis pursuant to the IT Baseline Protection Catalogs. The advantage is not only conformity with the strict BSI, but also attainment of BS 7799-2 certification. Beyond this, the BSI offers a few help aids like the policy template and the GSTOOL.
One data protection component is available, which was produced in cooperation with the German Federal Commissioner for Data Protection and Freedom of Information and the state data protection authorities and integrated into the IT Baseline Protection Catalog. This component is not considered, however, in the certification process.
Baseline protection process
The following steps are taken pursuant to the baseline protection process during structure analysis and protection needs analysis:
The IT network is defined.
IT structure analysis is carried out.
Protection needs determination is carried out.
A baseline security check is carried out.
IT baseline protection measures are implemented.
Creation occurs in the following steps:
IT structure analysis (survey)
Assessment of protection needs
Selection of actions
Running comparison of nominal and actual.
IT structure analysis
An IT network includes the totality of infrastructural, organizational, personnel, and technical components serving the fulfillment of a task in a particular information processing application area. An IT network can thereby encompass the entire IT character of an institution or individual division, which is partitioned by organizational structures as, for example, a departmental network, or as shared IT applications, for example, a personnel information system. It is necessary to analyze and document the information technological structure in question to generate an IT security concept and especially to apply the IT Baseline Protection Catalogs. Due to today's usually heavily networked IT systems, a network topology plan offers a starting point for the analysis. The following aspects must be taken into consideration:
The available infrastructure,
The organizational and personnel framework for the IT network,
Networked and non-networked IT systems employed in the IT network.
The communications connections between IT systems and externally,
IT applications run within the IT network.
Protection needs determination
The purpose of the protection needs determination is to investigate what protection is sufficient and appropriate for the information and information technology in use.
In this connection, the damage to each application and the processed information, which could result from a breach of confidentiality, integrity or availability, is considered. Important in this context is a realistic assessment of the possible follow-on damages. A division into the three protection needs categories "low to medium", "high" and "very high" has proved itself of value. "Public", "internal" and "secret" are often used for confidentiality.
Modelling
Heavily networked IT systems typically characterize information technology in government and business these days. As a rule, therefore, it is advantageous to consider the entire IT system and not just individual systems within the scope of an IT security analysis and concept. To be able to manage this task, it makes sense to logically partition the entire IT system into parts and to separately consider each part or even an IT network. Detailed documentation about its structure is prerequisite for the use of the IT Baseline Protection Catalogs on an IT network. This can be achieved, for example, via the IT structure analysis described above. The IT Baseline Protection Catalogs' components must ultimately be mapped onto the components of the IT network in question in a modelling step.
Baseline security check
The baseline security check is an organisational instrument offering a quick overview of the prevailing IT security level. With the help of interviews, the status quo of an existing IT network (as modelled by IT baseline protection) relative to the number of security measures implemented from the IT Baseline Protection Catalogs are investigated. The result is a catalog in which the implementation status "dispensable", "yes", "partly", or "no" is entered for each relevant measure. By identifying not yet, or only partially, implemented measures, improvement options for the security of the information technology in question are highlighted.
The baseline security check gives information about measures, which are still missing (nominal vs. actual comparison). From this follows what remains to be done to achieve baseline protection through security. Not all measures suggested by this baseline check need to be implemented. Peculiarities are to be taken into account! It could be that several more or less unimportant applications are running on a server, which have lesser protection needs. In their totality, however, these applications are to be provided with a higher level of protection. This is called the (cumulation effect).
The applications running on a server determine its need for protection. Several IT applications can run on an IT system. When this occurs, the application with the greatest need for protection determines the IT systems protection category.
Conversely, it is conceivable that an IT application with great protection needs does not automatically transfer this to the IT system. This may happen because the IT system is configured redundantly, or because only an inconsequential part is running on it. This is called the (distribution effect). This is the case, for example, with clusters.
The baseline security check maps baseline protection measures. This level suffices for low to medium protection needs. This comprises about 80% of all IT systems according to BSI estimates. For systems with high to very high protection needs, risk analysis-based information security concepts, like for example ISO/IEC 27000-series standards, are usually used.
IT Baseline Protection Catalog and standards
During its 2005 restructuring and expansion of the IT Baseline Protection Catalogs, the BSI separated methodology from the IT Baseline Protection Catalog. The BSI 100-1, BSI 100-2, and BSI 100-3 standards contain information about construction of an information security management system (ISMS), the methodology or basic protection approach, and the creation of a security analysis for elevated and very elevated protection needs building on a completed baseline protection investigation.
BSI 100-4, the "Emergency management" standard, is currently in preparation. It contains elements from BS 25999, ITIL Service Continuity Management combined with the relevant IT Baseline Protection Catalog components, and essential aspects for appropriate Business Continuity Management (BCM). Implementing these standards renders certification is possible pursuant to BS 25999-2. The BSI has submitted the BSI 100-4 standards design for online commentary under.
The BSI brings its standards into line with international norms like the ISO/IEC 27001 this way.
Literature
BSI:IT Baseline Protection Guidelines (pdf, 420 kB)
BSI: IT Baseline Protection Cataloge 2007 (pdf)
BSI: BSI IT Security Management and IT Baseline Protection Standards
Frederik Humpert: IT-Grundschutz umsetzen mit GSTOOL. Anleitungen und Praxistipps für den erfolgreichen Einsatz des BSI-Standards, Carl Hanser Verlag München, 2005. ()
Norbert Pohlmann, Hartmut Blumberg: Der IT-Sicherheitsleitfaden. Das Pflichtenheft zur Implementierung von IT-Sicherheitsstandards im Unternehmen,
References
External links
Federal Office for Information Security
IT Security Yellow Pages
IT Baseline protection tools
Open Security Architecture- Controls and patterns to secure IT systems
Information technology management
Computer security |
68387585 | https://en.wikipedia.org/wiki/California%20Department%20of%20Fair%20Employment%20and%20Housing%20v.%20Activision%20Blizzard | California Department of Fair Employment and Housing v. Activision Blizzard | California Department of Fair Employment and Housing v. Activision Blizzard is a current lawsuit filed by the California Department of Fair Employment and Housing (DFEH) against video game developer Activision Blizzard in July 2021. The lawsuit asserts that management of Activision Blizzard allowed and at times encouraged sexual misconduct towards female employees, that the company maintained a "frat boy" culture, and that the company's hiring and employment practices were discriminatory against women.
After Activision Blizzard dismissed the claims in the lawsuit as false, more than 2,600 of the company's 9,500 staff signed an open letter demanding the company take the allegations seriously and make changes. While Activision CEO Bobby Kotick later promised the company would internally review the allegations, employees were not satisfied by the response. Employees walked out on July 28, 2021, joined virtually by other developers and players across the industry. DFEH's lawsuit triggered a separate class action lawsuit by Activision Blizzard's shareholders at the federal level, asserting the company failed to meet its fiduciary duties under the Securities Exchange Act. A later investigative report by The Wall Street Journal published in November 2021 claimed that Kotick had known about the allegations of misconduct for years but failed to take action, leading employees to stage a second walk-off, and they and other voices in the gaming industry called for Kotick to step down.
Coupled with allegations of misconduct and discrimination at game developers Riot Games and Ubisoft around the same time, the DFEH lawsuit is seen by analysts, academics, and media outlets such as The New York Times, The Guardian and CNN as forcing the video game industry to come to terms with the Me Too movement and consider the possibility of unionization to better protect workers.
Background
Activision Blizzard
Activision Blizzard was formed in July 2008 as a merger of Activision Inc. and Vivendi Games, a subdivision of the French media conglomerate Vivendi, which owned Blizzard Entertainment. The merger was influenced by the rapid growth of Blizzard's flagship product, the subscription-based massively multiplayer online game (MMO) World of Warcraft. At the time, Activision had yet to create any MMO games. Once the merger was approved, Activision Inc. rebranded as Activision Blizzard. Activision Publishing was established to house Activision's existing studios, and Blizzard Entertainment remained a division within the larger company. Vivendi's share in Activision Blizzard was eventually fully acquired by Activision shareholders in 2014. In February 2016, the company substantially expanded with the acquisition of King, the mobile game developer and publisher behind Candy Crush Saga. King became Activision Blizzard's third major division. Since 1991, Bobby Kotick has served as CEO for Activision and Activision Blizzard. Activision Blizzard is the largest North American publisher of video games based on revenue, surpassing Electronic Arts and Take-Two Interactive, and reported over in revenues for their 2020 fiscal year.
Since around 2018, Blizzard Entertainment underwent corporate changes, such as the departure of Blizzard's co-founder Mike Morhaime, and a heavier focus on mobile gaming at the cost of Blizzard's more traditional PC gaming background. PC Gamer considered that some of these changes may be a result of the parent Activision's influence on managing Blizzard towards a more profitable business. Jason Schreier of Bloomberg News reported on Activision's influence on the poor quality of Warcraft 3: Reforged, a remake of Warcraft III, in 2020. Activision did not see much value in remasters at the time of its development in 2017, and instead pressured Blizzard to focus on newer games, according to Schreier. This led to the development budget for Warcraft 3: Reforged to be cut significantly, impacting the game's quality, and the Classic Games team within Blizzard to be disbanded after the game was released.
Discrimination and sexual misconduct in the video game industry
Gender demographics in the video game industry have skewed towards men, particularly in contrast with the demographics of video game players. While companies have worked to improve diversity in hiring, the International Game Developers Association estimated in 2017 that only about 20% of the video game development workforce are women, while the Entertainment Software Association estimated that same year that 41% of gamers were women. As of 2021, Activision Blizzard's workforce is 80% male and following the departure of Jen Oneal the company's top level leadership is exclusively male. The gender gap arises from a feedback loop, in which women are less inclined to join the industry due to lack of apparent representation both within the industry and within video games, as well as typically accepted practices within the industry such as the use of "crunch time" and long working hours that typically disfavor female employees. This situation has led to ongoing concerns about the discrimination and treatment of women within the video game industry. The Gamergate controversy in 2014 raised awareness of mistreatment of women within the industry, alongside the larger Me Too movement in other sectors.
Prior to the lawsuit against Blizzard, the California Department of Fair Employment and Housing (DFEH) became involved with a similar matter at Riot Games. DFEH had been investigating Riot since 2018 on claims of workplace misconduct and discrimination, when in November 2018, a group of women employees sued the company's management for workplace discrimination and failure to handle the misconduct of other employees. Riot had reached a settlement with the class action group by 2019, but DFEH, based on their investigation, asserted this was too little and the class was due at least . The class withdrew their agreement to the settlement, leaving the action in litigation .
Ubisoft experienced similar conflict in 2020 and 2021. The French publisher, which has studios worldwide, was accused of allowing management and its human resources (HR) department to ignore sexual misconduct towards women employees for many years. While some staff were fired, and top-level management stated they would be improving their processes to prevent this from happening, several employees asserted in 2021 that little had changed, pointing to the fact that some of managers named by the investigations were reassigned to different studios rather than fired. The French trade union group Solidaires Informatique initiated two lawsuits representing employees against Ubisoft in 2021, alleging they had not responded to reports of sexual misconduct.
While the video games industry had experienced other isolated cases of sexual misconduct by one individual towards others, reporters for The Guardian, Time, and The New York Times have observed that the industry had not yet felt the weight of the Me Too movement that other entertainment industries had by 2021. Brianna Wu, one of several women in gaming who faced significant harassment as a result of the Gamergate harassment campaign, said that the video game industry has had visible incidents of sexual misconduct and misogyny towards female developers in which the persons at fault were fired. However, she argued that the impacts of these events had yet to reach the same level of change as the Me Too movement had brought to other media industries, stating that "our industry has done nothing but window-dressing in getting rid of the harassers".
Lawsuit
As a result of a two-year investigation, on July 20, 2021, DFEH filed a lawsuit in Los Angeles Superior Court. The lawsuit alleges that Activision Blizzard has fostered a "frat boy" culture in which female employees endure regular sexual harassment and experience discrimination and retaliation. DFEH sought an injunction to require Activision Blizzard to comply with state workforce protections, and to recover damages for female employees that would include unpaid wages, pay adjustments, back pay, and lost wages and benefits.
The lawsuit contends that Activision Blizzard and its workforce, which is 80% male, contribute to a hostile atmosphere towards female employees. The allegations mainly focus on reports of workplace misconduct at Blizzard Entertainment, though also asserts similar problems occurred within Activision and its studios. The complaint describes male employees playing video games during work hours while delegating their job to women employees, engaging in sexual banter and making advances towards female colleagues, and joking about rape. Prominent executives and creators at the company allegedly "engaged in blatant sexual harassment without repercussions". Within both Activision's and Blizzard's studios, management allegedly both allowed and encouraged "cube crawls", where male employees went from cubicle to cubicle, drinking heavily and making inappropriate advances towards and physically touching female employees. An employee's hotel room, rented during the company's annual BlizzCon event in 2013, was reportedly nicknamed the "Cosby suite" by other employees due to the man's reputation for harassing women. This was said to be in reference to the Bill Cosby sexual assault cases, though others claimed the name was chosen based on the room's rug pattern which resembled Cosby's sweaters. A woman employee reportedly died by suicide during a business trip after suffering "intense sexual harassment" in the preceding days, which included employees sharing nude photos of her at a company holiday party. The human resources departments allegedly did not keep reports of sexual harassment confidential, which as a result allowed managers and others to retaliate against employees who reported misconduct, such as by denying them promotions, transferring them to other departments, prioritizing them during company-wide layoffs, or preventing them from working on desirable projects.
The lawsuit specifically named Alex Afrasiabi, the former creative director on World of Warcraft, as an individual at the center of several of these allegations, including an allegation in the amended lawsuit by former software engineer Cher Scarlett that she had been harassed by Afrasiabi at a work event, and that a friend told her she experienced something similar a year prior at BlizzCon. Activision Blizzard later reported that Afrasiabi had been fired for misconduct in mid-2020 after their own internal investigation found him and two others at fault for similar misconduct between 2018 and 2020. The lawsuit listed an unnamed Chief technology officer, whom Scarlett alleged in a series of tweets to be Ben Kilgore. The allegations were later corroborated by Bloomberg News and The Wall Street Journal. Kilgore, who had previously worked as a VP at Microsoft, was terminated in 2018 for misconduct. Three other employees, including one known to be involved in incidents related to the 2013 "Cosby suite", were no longer working for the company by August 11, 2021. One of these employees included Jesse McCree, who was the namesake of the Overwatch character McCree.
Other parts of the complaint were focused on the discriminatory treatment of female employees, particularly women of color, in hiring, pay, assignment, promotion, and firing and constructive dismissal. Women were reportedly universally paid less and offered less stock and incentive pay than their male colleagues, beginning when they were hired and continuing throughout their employment. The lawsuit also alleges they had to work much harder to be promoted, or were passed over entirely. Some women employees reported being denied promotions due to fears they might become pregnant, being reprimanded for needing to go pick up their children, and being kicked out of lactation rooms by male colleagues who wanted to meet in the room. Some factors alleged by the DFEH were in connection with poor reporting of workplace harassment, but the suit also contends that Activision Blizzard overall failed to properly consider diversity in hiring and promotion practices.
The suit was filed under California's Senate Bill 973, which authorizes DFEH to file lawsuits relating to violations of the state's Equal Pay Act, and which passed in October 2020 and went into effect on January 1, 2021. The bill, authored by California senator Hannah-Beth Jackson, was intended to bypass complexities that had arisen during the Trump administration over the reporting of wage information to the Equal Employment Opportunity Commission. Under the Equal Pay Act, companies of 100 employees or more are required to report pay data for specific job areas, segmented by gender, race, and ethnicity; this data is kept confidential to the state, but may be used to determine if there are pay discrepancies due to gender or race. DFEH asserted "Blizzard's double-digit percentage growth, ten-figure annual revenues, and recent diversity marketing campaigns have unfortunately changed little. Defendants' compliance with California's broad workplace protections is long overdue". According to Noah Smith of The Washington Post, DFEH normally does not pursue such cases, typically seeking to find settlements when it finds actionable issues. In the prior two years, DFEH only proceeded to take companies to court a few dozen times out of over tens of thousands of submitted complaints. The director of DFEH, Kevin Kish, stated that "Our investigations and litigation have to be strategically targeted at remedying violations that affect as many people as we can reach. Our priority has to be on systemic violation of civil rights law, given the scope of what we have to do. We were given tools by the state legislature and we should be using them." Dawn Knepper, an employment attorney, told The Washington Post that because the Equal Pay Act is relatively recent legislation, the DFEH's case against Activision Blizzard could set a major precedent for California's employment laws.
The DFEH's complaint was expanded on August 24, 2021, to include temporary and contract workers in addition to permanent employees, as California law also was intended to protect temporary work rights as well. The amended complaint also accused Activision Blizzard of interfering in DFEH's discovery for the case, claiming that their HR department had shredded key documents they had requested. Activision Blizzard stated in response that "we have complied with every proper request in support of its review even as we had been implementing reforms to ensure our workplaces are welcoming and safe for every employee." Los Angeles County Superior Court judge Timothy P. Dillon agreed to the amended complaint in February 2022, and set an expected trial start date in February 2023.
Collaborating investigations
According to Jason Schreier for Bloomberg News, the complaint's primary focus on misconduct in Blizzard Entertainment was due to the division treating its top developers and management as "rock stars", making them nearly untouchable by any complaint filed against them. Blizzard had gained a reputation as both a highly creative studio and a desirable place to work, according to Schreier. Some employees who spoke to Schreier stated that attitudes shifted in the company when World of Warcraft rapidly grew in popularity between 2003 and 2005, and this shift marked the onset of the problems named in the lawsuit. Top developers attending BlizzCon, the annual convention held by Blizzard with players, reportedly viewed women attendees not as players but as groupies, and came to expect sexual favors from them. Schreier stated that this attitude continued to persist within Activision Blizzard through the 2010s in part due to the approximately 20% female demographic and the studio's pressure on employees to make personal sacrifices of time and salary for working at the prestigious studio. As described by Voxs Aja Romano, this type of "rock star" attitude persists across major studios like Activision Blizzard and Ubisoft, and coerces newer hires to commit to long hours to show their dedication to the craft and the company or otherwise potentially be fired. The male-dominated culture, particularly from those who grew up playing video games, can potentially bring a culture of "casual misogyny" with them which could then easily translate into a hostile workplace for women, according to Romano.
The Washington Post Shannon Liao also spoke to former employees, many of whom stated that Blizzard had a "drinking culture". The offices were well-stocked with alcohol, which led to the "cube crawls", and employees regularly became inebriated at company events like BlizzCon. This type of activity had been reined in by 2019, with alcohol in the offices severely reduced and employees limited to two drinks at public events.
Activision Blizzard employees speaking to Schreier said some complaints about the company's hostile environment went unreported because some senior management was known to disregard such incidents. Blizzard was also averse to reporting these problems to its parent Activision, which internally had been called the "Eye of Sauron", fearing retribution if the problems became known.
An investigative report by The Wall Street Journal published on November 16, 2021, stated that Kotick had been well aware of the misconduct at the company but had done little to stem it. The report describes one example of a former female employee of Activision's subsidiary Sledgehammer Games who said she had been raped by her male supervisor in 2016 and 2017 after she had been coerced to get drunk at work events. She had reported the incidents to management but nothing had been done, and instead the company reached a settlement with her after she had filed a lawsuit against them. Kotick had been aware of this and similar events, according to internal documents reviewed by The Wall Street Journal, but had failed to inform shareholders, which belied his more recent statements he had made at the onset of the DFEH's lawsuit. In another case given in the report, Dan Bunting, the co-founder of Treyarch Studios, had been accused of misconduct in 2017. An internal investigation had led to the suggestion of firing Bunting, but Kotick had reportedly vetoed this move due to his studio's success with the Call of Duty series, and instead he was ordered to see counseling. A second, external review in 2020 of Bunting's behavior found the same conclusion to firing Bunting, but only until the Wall Street Journal began their investigation was Bunting actually removed from the company. The report also describes specific cases of Kotick involved in misconduct, including a case where he threatened to kill an assistant in 2006 which he settled out of court.
Concurrent EEOC lawsuit
A separate investigation by the Equal Employment Opportunity Commission (EEOC) had been revealed at the same time as the DFEH's and SEC's, having been ongoing since around May 2020. Activision Blizzard and the EEOC were in settlement talks around September 2021 when this investigation was publicly made known. The EEOC filed a formal suit against Activision Blizzard on September 27, 2021, in the Federal District Court for Central California, as it "was unable to secure through informal methods an acceptable conciliation agreement". The lawsuit sought a jury trial to review the EEOC's charges of pervasive sexual harassment and discrimination, as well as an injunction for the company to cease unlawful behavior and pay restitution to affected employees. That day, Activision Blizzard announced it had reached a settlement with the EEOC, pending judicial approval. Among terms of the settlement, the company stated they will create an compensation fund for employees seeking relief from the prescribed workplace harassment. In a statement, Kotick stated "There is no place anywhere at our company for discrimination, harassment, or unequal treatment of any kind, and I am grateful to the employees who bravely shared their experiences. I am sorry that anyone had to experience inappropriate conduct, and I remain unwavering in my commitment to make Activision Blizzard one of the world's most inclusive, respected, and respectful workplaces."
The settlement offer was criticized by the Campaign to Organize Digital Employees, a project of the Communications Workers of America (CWA), calling the "mere pennies" compared to the estimated net worth of Activision-Blizzard, and "a slap in the face to workers [who have] dealt with toxic working conditions for [years]." The CWA itself also formally objected to the settlement, seeking to involve itself in the legal resolution.
DFEH also stated that the settlement would impact its case and filed their own formal compliant to challenge the settlement. DFEH said that the settlement would remove the employees from protection of California's law which is outside of the jurisdiction of the EEOC, and that provisions of the settlement would allow destruction of evidence needed for its case. EEOC asserted that due to a portion of DFEH's legal team having previously worked on EEOC's own case against Activision Blizzard, that the complaint was an ethics violation and conflict of interest under California law. EEOC requested the complaint to be removed and should DFEH seek to file a new complaint, they would need to do so with new legal counsel and without the information used by the prior one. Activision Blizzard petitioned the court to pause the proceedings of the DFEH case in light of these ethics issues raised by the EEOC as to allow time for limited discovery by their own counsel, as well as to request a change of venue due to the new complexity of the case. The court denied Activision-Blizzard's request to halt the suit in October 2021, but did grant them the ability to evaluate the ethics issue at the basis of the dispute. The court also denied California's request to intervene in the EEOC suit by December 2021, allowing the settlement terms to stand.
Attorney Lisa Bloom, representing a female Activision Blizzard employee who claimed she was fired for whistleblowing in regards to the workplace misconduct, claimed that the fund the company had set up was too low, and demanded the company increase that to with victims of the workplace harassment having stronger influence on the fund's use.
Response
Activision Blizzard management
On July 21, 2021, the day the lawsuit became public, Activision Blizzard responded with a public statement that the allegations did not accurately portray the company's current culture. In the statement, they described the suit as irresponsible, the allegations as distorted and false, and the DFEH as "unaccountable state bureaucrats". The company alleged that DFEH did not engage in "good faith discussions" before opting to start legal proceedings, though DFEH wrote in their filing that they had not been able to resolve issues with Activision Blizzard in mandatory dispute resolution.
Blizzard president J. Allen Brack, who was one of several executives named directly in the complaint, sent an internal email to all employees on July 21, stating that any of the behavior described in the lawsuit was "completely unacceptable", and encouraging employees to speak out to executive management or external support about any concerns they had with sexual harassment and discrimination within the company.
Separately, Activision executive Fran Townsend sent an internal letter to employees on July 23 that reiterated the company's public statement, saying "a recently filed lawsuit presented a distorted and untrue picture of our company, including factually incorrect, old, and out of context stories – some from more than a decade ago" and that the lawsuit was "truly meritless and irresponsible". Townsend's letter raised concerns among employees, and Townsend held an internal teleconference that day with members of the Activision-Blizzard-King Women's Network, which she had been sponsoring. She explained her email in the teleconference by stating that she had been following advice given to her by the legal department, which she said had made the letter sound unlike her. Employees were not fully satisfied with her explanation, and later that day, Townsend stepped down from sponsoring the Women's Network. The letter reportedly upset some employees with its dismissive nature of problems within the company, and several sought Townsend's resignation. The November 2021 Wall Street Journal report on Kotick's involvement with workplace allegations revealed that Kotick had written this email and instructed Townsend to send it. Kotick's representative stated that "Ms. Townsend should not be blamed for this mistake."
On August 3, 2021, Brack announced he was leaving Activision Blizzard, and that Jen Oneal and Mike Ybarra would take over leadership of the company. Oneal had been a lead of Vicarious Visions, one of Activision's studios that had been recently merged into Blizzard; Ybarra was a Blizzard executive vice president. Later that day, Activision Blizzard's global head of human relations, Jesse Meschuk, was also confirmed to have been fired. During the company's quarterly investor call on August 3, CEO Bobby Kotick said that the company would take "swift action to ensure a safe and welcoming work environment for all employees", and that "people will be held accountable for their actions. That commitment means that we will not just terminate employees where appropriate, but will also terminate any manager or leader found to have impeded the integrity of our processes for evaluating claims and imposing appropriate consequences". Kotick further stated to the shareholders, "our work environment everywhere we operate will not permit discrimination, harassment or unequal treatment. We will be the company that sets the example for this in our industry. While we've taken many steps towards this objective already, today, we are taking even more". In a statement in October 2021, the company stated that more than 20 employees, including developers and managers, had "exited" the company as a part of their internal evaluation, and more than another 20 employees were reprimanded for their actions. In addition, the company was planning to expand its ethics and compliance team to continue to oversee issues in these areas in the future.
In late October 2021, Kotick announced the company was taking several measures related to issues from the lawsuit, acknowledging that "The guardrails weren't in place everywhere to ensure that our values were being upheld." In addition to increased investment in anti-harassment training and resources to handle reporting of such incidents, the company was dropping the use of mandatory arbitration when dealing with workers' complaints, which had been sought by employee groups, and a zero-tolerance harassment policy within the company. He stated the company's plan to increase women and non-binary hires by 50% over the next ten years, and will annually report on pay comparisons between staff demographics. Further, Kotick stated he was seeking approve from the board to have his salary cut to the minimum state level and removing all current bonuses until the company has resolved the matters around the lawsuits.
In early November 2021, Oneal announced her departure from the company; in the later Wall Street Journal report related to accusations involving Kotick, Oneal stated that she had been " tokenized, marginalized, and discriminated against" from earlier in her career at Activision Blizzard, and had left the company as a decision that was best for her family. Oneal also stated that she had been promoted to co-lead Blizzard with Ybarra but had been initially paid based on her prior role which was less than Ybarra's. Both Oneal and Ybarra had made multiple requests to give Oneal equivalent pay which went unanswered until Oneal announced her resignation from the company.
Following the same Wall Street Journal report, Activision-Blizzard issued a statement denying the report's account. The company claimed the report was "a misleading view of Activision Blizzard and our CEO. . . The WSJ ignores important changes underway to make this the industry’s most welcoming and inclusive workplace and it fails to account for the efforts of thousands of employees who work hard every day to live up to their – and our — values." Kotick also said in a statement sent to employees that the report "paints an inaccurate and misleading view of our company, of me personally, and my leadership". The Activision-Blizzard board of directors issued a statement that they remained in support of Kotick towards the goals of addressing the misconduct concerns, stating "The goals we have set for ourselves are both critical and ambitious. The board remains confident in Bobby Kotick's leadership, commitment and ability to achieve these goals." The Board shortly thereafter announced the formation of a "Workplace Responsibility Committee" to oversee the company's progress towards improving workplace conditions.
According to a Wall Street Journal report in January 2022, Activision Blizzard had either pushed out or let go of 37 employees, and disciplined about 44 others as part of their internal investigation of workplace misconduct within the company since the start of DFEH's litigation.
Employees
According to Bloomberg News Jason Schreier, several employees sought Townsend's resignation after she sent the internal letter, which the employees felt was dismissive. Several employees stated publicly on Twitter that they held a work stoppage on July 23, 2021, in response to the letters from Brack and Townsend. Over 2,600 employees of Activision Blizzard signed an open letter demanding the company "recognize the seriousness of these allegations and demonstrate compassion for victims of harassment and assault", and concluding that "we will not be silenced, we will not stand aside, and we will not give up until the company we love is a workplace we can all feel proud to be a part of again". A large walkout was planned by the employees on July 28, 2021, with the organizers stating that "we believe that our values as employees are not being accurately reflected in the words and actions of our leadership." The organizers also demanded that Activision Blizzard end forced arbitration, implement new hiring and promotion guidelines across the company to address discrimination against women, publish all salary and promotion data across all demographic classes, and have the current diversity, equity, and inclusion task force hire a third-party organization to evaluate the company and determine causes and means to prevent future harassment and discrimination.
CEO Bobby Kotick, in a letter sent to all employees on the eve of the walkout, called the company's initial response "quite frankly tone deaf". He said that the company's leadership would be "immediately evaluating managers and leaders across the company" and bringing the law firm WilmerHale to "conduct a review of our policies and procedures to ensure that we have and maintain best practices to promote a respectful and inclusive workplace". Kotick also said that the company would assure hiring managers were complying with diversity directives within the company, removing in-game content deemed to be inappropriate, and creating listening sessions as safe spaces for employees to raise suggestions. Employees responded to Kotick's letter that, while they appreciated that he acknowledged the poor initial response to the lawsuit, there had been no action mentioned towards the demands they had requested on their walkout announcement, and continued with the walkout on July 28, 2021.
In addition to the matters brought up by the DFEH lawsuits, employees speaking to Axios identified that Activision Blizzard's HR departments had a significant hand in preventing any action to address sexual misconduct concerns. Employees told Axios that HR knew of the sexual misconduct reports for a long time but either failed to take action, protected those that were accused of sexual misconduct, or strongly discouraged employees that raised concerns by saying things like "this isn't a fight you want to fight".
Among employee concerns was the engagement of WilmerHale by Activision Blizzard, as the firm is considered to specialize in anti-union messaging and union busting, including participating in preventing Amazon workers from unionizing. Employees across the Activision Blizzard studios, including Activision, Beenox, Blizzard Entertainment, High Moon Studios, Infinity Ward, King, Sledgehammer Games, Raven Software, and Vicarious Visions, announced the formation of the ABK (Activision/Blizzard/King) Workers Alliance on August 3, 2021. The ABK Workers Alliance stated that Kotick's response was not sufficient to address the earlier demands made by employees in regards to resolving the workplace conduct and discrimination issues raised by the DFEH lawsuit. The Alliance rejected the use of WilmerHale as the auditing firm, due to their "pre-existing relationships with Activision Blizzard and its executives" and their past case work "discouraging workers' rights and collective action". Internally, the Alliance outlined steps they could take as employees to help mitigate issues, improve communications between employees, and mentor new employees. The ABK Alliance outlined the harsh conditions that many at Activision Blizzard employees working for quality assurance had, including 50 to 60 hour workweeks on average, being hired on contract and thus lacking benefits and employment security, and hostility towards transgender and other LGBT individuals.
Another employee group, A Better ABK, filed a complaint in conjunction with Communication Workers of America to the National Labor Relations Board in September 2021, asserting that Activision Blizzard had engaged in "coercive behavior" related to their activities in unionization and "discussing forced arbitration".
By November 2021, over 500 employee complaints related to workplace conduct and harassment had been filed with Activision, according to The Wall Street Journal report. Following the Wall Street Journal report related to Kotick's awareness of past misconduct issues, members of A Better ABK and other employees issued demands for Kotick to be removed from the company. In a statement from A Better ABK, the group said "We have instituted our own Zero Tolerance Policy...We will not be silenced until Bobby Kotick has been replaced as CEO, and continue to hold our original demand for third-party review by an employee-chosen source. We are staging a walkout today. We welcome you to join us." About 150 employees participated in the walk-off the day the Wall Street Journal report was published. A petition for Kotick's resignation drew more than 1000 employee signatures, with the employees stating "We, the undersigned, no longer have confidence in the leadership of Bobby Kotick as the CEO of Activision Blizzard. The information that has come to light about his behaviors and practices in the running of our companies runs counter to the culture and integrity we require of our leadership — and directly conflicts with the initiatives started by our peers."
In December 2021, Activision let go of about a dozen contracted quality assurance (QA) staff, or game testers, for Raven Software, despite having made promises of improved wages and other benefits in the months prior. Activision stated that they were in the process of converting about 500 contracted positions across the entire company into full-time staff, but this required them to let go of some contractors. While the action was not directly associated with the lawsuit, the tensions within the company led staff at Raven and later across other divisions of Activison Blizzard to stage another walk-off in protest of Activision's decision. The ABK Workers Alliance announced after the layoffs that alongside ongoing strike action, they were collecting crowdfunding to support a fund for employees as they began taking steps to organize their own union within the company under the Communications Workers of America. While there had been discussions among employees for unionization in the months prior, the layoffs at Raven Software was considered the tipping point to start the union-forming process. Following this announcement, Brian Bulatao, the company's chief administration officer, sent an email to employees that tried to discourage employees from unionizing. By January 21, 2022, the QA testers remaining at Raven had formed the Game Workers Alliance began seeking Activision Blizzard to recognize it as a union; If recognized, the Game Workers Alliance would be the first union at an AAA video game company. With the union formation, the other workers concluded their strike action.
Shareholders
Company shareholders started a separate investigation to determine if company executives were following proper fiduciary duties under the Securities Exchange Act of 1934 in the wake of DFEH's lawsuit and its impact on Activision Blizzard's stock price. A formal class action lawsuit was filed on behalf of the shareholders on August 3, 2021, in the United States District Court for the Central District of California, asserting that in light of the claims brought by DFEH's suit, Bobby Kotick and other senior management had failed to provide proper oversight to prevent the situations outlined in DFEH's suit, and that several of the past filings that Activision Blizzard made with the U.S. Securities and Exchange Commission (SEC) contained claims that were "materially false". Among specific claims, the suit said that the company failed to inform shareholders that it was under investigation by DFEH, and that the company had knowingly took minimal actual against the sexual misconduct complaints while stating in their SEC filings that "such routine claims and lawsuits are not significant and we do not expect them to have a material adverse effect on our business, financial condition, results of operations, or liquidity". The suit continues that by withholding this information, the company's stock price was "artificially inflated", which negatively affected shareholders.
A letter from shareholder SOC Investment Group to the management of Activision Blizzard criticized its response and ongoing attempts to mitigate the situation, as it does not go "nearly far enough to address the deep and widespread issues with equity, inclusion, and human capital management". Among concerns SOC raised were lack of means of addressing the replacement of management found to be complicit with the sexual misconduct accusations, including how this would affect bonuses or other benefits, and the use of WilmerHale to perform the internal review partially due to the firm having "a sterling reputation as a defender of the wealthy and connected, but it has no track record of uncovering wrongdoing". SOC implored Activision Blizzard to improve diversity at the management level, tie future bonuses to manage to achieving goals related to diversity and improved workplace conduct, and to have a more thorough Equity Review that evaluates the entire company on concerns raised by all stakeholders including Kotick and the company's employees and customers.
In the wake of The Wall Street Journal November 2021 report, shareholders led by the SOC Investment Group demanded that Kotick resign as well as the two most-senior board members, threatening that they would not vote them on the board at the next shareholders' vote in June 2022. In their letter to the company's management, they stated "In contrast to past company statements, CEO Bobby Kotick was aware of many incidents of sexual harassment, sexual assault and gender discrimination at Activision Blizzard, but failed either to ensure that the executives and managers responsible were terminated or to recognize and address the systematic nature of the company’s hostile workplace culture." They further stated that "Activision Blizzard needs a new CEO, board chair, and lead independent director with the expertise, skill set and conviction to truly change the company’s culture. We need to really have a reset button on the board."
Players and streamers
Some players have canceled their subscriptions to games made by Activision Blizzard, though as discussed by Kotaku and Axios, this raised concerns among current employees and some players that doing so might lead to layoffs that would negatively affect the employees they're trying to support. Some World of Warcraft players have staged in-game protests and organized mass log-outs, or organized fundraisers for charities that support women and people of color in gaming and the technology industry.
Several video game streamers on Twitch and other outlets, who had previously focused on Blizzard games, refused to stream these games after the lawsuit came to light, issued statements against the company, and joined in other boycotts and protests. Popular World of Warcraft streamer Asmongold began incorporating updates on the lawsuit and criticism of Activision Blizzard into his WoW streams. Hearthstone streamer Allie "Alliestrasza" Macpherson chose not to publish exclusive details about a new card when the allegations became public, instead creating a video in which she expressed solidarity with employees of the company. Streamers and other prominent members of the video game community urged players not to play any games made by Activision Blizzard on July 28, the day of the employee walkout, comparing playing such games that day to crossing a picket line. Prominent streamers including Brian Kibler and Sean "Day[9]" Plott supported the walkout by not streaming that day, or streaming games made by other companies. Many members of the gaming community showed their support for the walkout with the #ActiBlizzWalkout or #ActBlizzWalkout hashtags on Twitter.
At least three video game news websites, The Gamer, GameXplain, and Prima Games, stated they would not cover any Activision Blizzard gaming news until the situation was resolved.
Government
In September 2021, the U.S. Securities and Exchange Commission issued subpoenas for several Activision-Blizzard executives, including Kotick, related to the communications made by the company ahead of the DFEH's lawsuit and knowledge of the problems that the lawsuit had identified. The SEC had also requested records from as far back as 2019 related to what management knew of the internal issues related to sexual misconduct and workplace environment issues. Activision Blizzard stated they remained confident of their position and would comply with all requests from these agencies. By February 2022, the SEC had widened their investigation to include former executives and management since 2016.
The treasurers from six states, California, Massachusetts, Illinois, Oregon, Delaware and Nevada, called on Activision Blizzard's board in November 2021 to address the allegations made against the company and their planned response. The states have involved themselves due to the impact of the lawsuit on investments made by the states and their residents. Illinois' treasurer Michael Frerichs said in a separate statement, "We think there needs to be sweeping changes made in the company...We're concerned that the current CEO and board directors don't have the skillset, nor the conviction to institute these sweeping changes needed to transform their culture, to restore trust with employees and shareholders and their partners".
Others in the game industry
Several former Blizzard executives issued public apologies on Twitter. Co-founder and former president and CEO Michael Morhaime stated, "to the Blizzard women who experienced any of these things, I am extremely sorry that I failed you. I hear you, I believe you, and I am so sorry to have let you down". Chris Metzen, former senior vice president in Blizzard, issued a similar apology on Twitter: "We failed, and I'm sorry", adding that "this is later than it should have been". Other former Activision Blizzard employees, including Morhaime and members of Bungie and other Activision studios not at the center of the lawsuit, expressed support of the walkout. Take-Two's CEO Strauss Zelnick stated that "we will not tolerate harassment or discrimination or bad behavior of any kind. We never have" and that their company strives to make options to deal with such harassment or discrimination available open to all employees.
The lawsuit began to draw others outside of Activision Blizzard into the debate on workplace issues in the gaming industry. Nearly 500 employees of Ubisoft, which had similarly been subject to accusations of creating a hostile workplace for women in 2020, wrote an open letter in solidarity with the Activision Blizzard employees, stating that "it should no longer be a surprise to anyone: employees, executives, journalists, or fans that these heinous acts are going on. It is time to stop being shocked. We must demand real steps be taken to prevent them. Those responsible must be held accountable for their actions".
In light of the lawsuit, new calls to push for unionization of video game developers arose. Jeff Strain, a former Blizzard employee, wrote an open letter calling for the video game industry to consider the need to unionize to protect workers from these types of management problems. Carly Kocurek, an associate professor at the Illinois Institute of Technology, said that the response around the Activision Blizzard lawsuit was a "big deal" and could be turning point within the industry for unions to help protect workers right and assure fair treatment. CNN reporter Rishi Iyengar said the case had the potential to be a "watershed moment" for the industry, as it puts not only the male-dominated field in the spotlight but also the practice of drawing on employees' love of gaming rather than paid compensation to coerce extra work out of them (such as during crunch time), a practice that Iyengar wrote was driven by the male-dominated workforce. The Guardian Kari Paul also reported on other industry analysts and academics who viewed the suit as a possible watershed moment for the industry.
Following the November Wall Street Journal report, video game publications such as Polygon and Windows Central called for Kotick to resign. Jim Ryan, the head of PlayStation at Sony, said that they had reached out to Activision Blizzard after the report was released to see how the company would rectify the situation, but "We do not believe their statements of response properly address the situation." Head of Microsoft's Xbox division, Phil Spencer, said in an email to his employees that he was "disturbed and deeply troubled by the horrific events and actions" reported by the Wall Street Journal, and that they are "evaluating all aspects of our relationship with Activision Blizzard and making ongoing proactive adjustments". Nintendo of America's CEO Doug Bowser stated they have also been in contact with Activision Blizzard, and that "I find these accounts distressing and disturbing. They run counter to my values as well as Nintendo’s beliefs, values and policies." The Entertainment Software Association, the American trade association for video games, stated that "harassment, abuse, or mistreatment in the workplace is unacceptable and must never be tolerated". The non-profit group Girls Who Code severed ties with Activision Blizzard, stating that they "cannot in good conscience" continue to work with the company.
Microsoft announced its intent to acquire Activision Blizzard in January 2022 for , with the deal expected to close following governmental review by mid-2023. Kotick stated that the company accepted the deal due to its weakening stock position that made it hard to compete with other companies in the video game market; while he said that factors such as delays to Overwatch 2 and Diablo 4, along with the poor reception to Call of Duty: Vanguard, were among reasons for their weak position, he also attributed the DFEH lawsuit as a factor. This statement of Kotick was criticized by employees, with one engineer saying the statement is "Throwing game devs under the bus rather than taking responsibility for the culture he helped to foster."
In Activision Blizzard's SEC filings related to Microsoft's acquisition, Microsoft had approached the company in the days following the November 2022 Wall Street Journal report to reopen talks about acquisition. Both The Wall Street Journal and Bloomberg News reported that while Activision Blizzard's board had been considering buyout options, the board had become anxious of Kotick's leadership following the November 2021 Wall Street Journal report and quickly agreed to Microsoft's buyout as to give a graceful exit for Kotick. While the deal is reviewed by regulatory agencies, Kotick remained as CEO of Activision Blizzard. While another report from The Wall Street Journal suggested that Kotick "will depart once the deal closes" under Microsoft's management, in an interview Kotick has shown interest in remaining in the company.
Impact
The lawsuit forced Blizzard to cancel its planned livestream reveal of an upcoming Hearthstone expansion in early August, as the company frequently seeds information through streamers before their own official broadcast, and these streams had boycotted Blizzard. Instead, the company posted an announcement related to the new expansion with minimal fanfare. Lead designer for Hearthstone, Dean Ayala, stated that "Having any celebration is a hard sell right now. I can assure you the only hesitation we have with moving forward with things like streams or card reveals is out of the respect for our co-workers". The development team for World of Warcraft stated they would be removing content from both the main game and World of Warcraft Classic that is "not appropriate for our world" in light of the lawsuit, including in-game characters made in reference to Afrasiabi, and that their team is "committed to taking the actions necessary to ensure we are providing an inclusive, welcoming, and safe environment both for our team and for our players in Azeroth". Casters for the Overwatch League opted to avoid saying the name of McCree, one of the game's playable characters, and instead used "the cowboy", following reports that the character's namesake, Jesse McCree, was no longer with the company in August 2021. Subsequently, late that August, Blizzard confirmed it will change McCree's name to "something that better represents what Overwatch stands for", though will need to review their narrative state of the game to determine what the new name will be. McCree's new name, Cole Cassidy, was introduced and replaced the McCree name in an October 2021 patch to Overwatch, and a special in-game event planned for McCree was pushed out until November 2021, now named for Cassidy and featuring a digital comic that spoke to Cassidy finding a new identity. Blizzard stated that they will cease naming any characters in any of their games after employees in the future and will be "more thoughtful and discerning about adding real world references". The Warcaft team within Blizzard also announced similar plans to rename characters that had been based on employee names following the Overwatch announcement, as well as renaming quests and other items with offensive titles.
Blizzard opted not to hold their annual BlizzCon event for 2022, stating that they would instead spend the time "supporting our teams and progressing development of our games and experiences", and that for future events "we also need to ensure that it feels as safe, welcoming, and inclusive as possible".
T-Mobile had sponsored both the Overwatch League and Call of Duty League, but about two weeks after the DFEH lawsuit was announced, reporters for Polygon and Dexerto observed that both Leagues had removed all T-Mobile branding from the website and online broadcasts, and had covered up T-Mobile's logo on player uniforms. These sites believe that T-Mobile pulled its support of the Leagues due to the lawsuit, though they were unable to confirm with T-Mobile. Both Coca-Cola and State Farm issued statements that they would step back from Overwatch League sponsorship and reconsider their position in light of the lawsuit. Kellogg's stated they would not continue their sponsorship of the Overwatch League. Sports Business Journal observed that IBM branding was removed from all Overwatch League media, including the league's official partners' page and power rankings. Furthermore, The U.S. Army has pulled its sponsorship from the Call of Duty Esports League.
Geoff Keighley, the creator and host of The Game Awards, said that he was reevaluating the show's relationship with Blizzard, adding that he wanted the show to support employees and developers without diminishing individual achievements. After Kotaku Ethan Gach criticized Keighley for refusing to "take sides" and noted that the show's advisory board included Activision president Rob Kostich, Keighley stated that Blizzard would not be part of the 2021 ceremony outside of its nominated games.
References
External links
Complaint
Activision Blizzard
2021 controversies in the United States
2021 scandals
Video game controversies
Sexual misconduct allegations
Video game law
United States gender discrimination case law
United States employment discrimination case law
Harassment case law
Sexual harassment in the United States
California state case law
History of women in California |
54077164 | https://en.wikipedia.org/wiki/Visual%20Expert | Visual Expert | Visual Expert is a static code analysis tool, extracting design and technical information from software source code by reverse-engineering, used by programmers for software maintenance, modernization or optimization.
It is designed to parse several programming languages at the same time (PL/SQL, Transact-SQL, PowerBuilder...) and analyze cross-language dependencies, in addition to each language's source code.
Visual Expert checks source code against hundreds of code inspection rules for vulnerability assessment, bug fix, and maintenance issues.
Features
Cross-references exploration: Impact Analysis, E/R diagrams, call graphs, CRUD matrix, dependency graphs.
Software documentation: a documentation generator produces technical documentation and low-level design descriptions.
Inspect the code to detect bugs, security vulnerabilities and maintainability issues. Native integration with Jenkins.
Reports on duplicate code, unused objects and methods and naming conventions. Calculates software metrics and source lines of code.
Code comparison: finds differences between several versions of the same code.
Performance analysis: identifies code parts that slow down the application because of their syntax - it extracts statistics about code execution from the database and combines it with the static analysis of the code.
Usage
Visual Expert is used in several contexts:
Change impact analysis: evaluating the consequences of a change in the code or in a database. Avoiding negative side effects when evolving a system.
Static Application Security Testing (SAST): detecting and removing security issues.
Continuous Integration / Continuous Inspection : adding a static code analysis job in a CI/CD workflow to automatically verify the quality and security of a new build when it is released.
Program comprehension: helping programmers understand and maintain existing code, or modernize legacy systems. Transferring knowledge of the code, from one programmer to another.
Software sizing: calculating the size of an application, or a piece of code, in order to estimate development efforts.
Code review: improving the code by finding and removing code smells, dead code, code causing poor performances or violations of coding conventions.
Limitations
As a static code analyzer, Visual Expert is limited to the programming languages supported by its code parsers - Oracle PL/SQL, SQL Server Transact-SQL, PowerBuilder.
A preliminary reverse engineering is required. Visual Expert does it automatically, but its duration depends on the size of the code parsed. Users must wait for the parsing completion prior to using the features, or schedule it in advance. They must also allocate sufficient hardware resources to support their volume of code.
Visual Expert is based on a client/server architecture: the code analysis is running on a Windows PC - preferably a server. The information extracted from the code is stored in a RDBMS, communicating with a client application installed on the programmer's computer - no web client is available. This requires that the code, the parsers, the RDBMS and the programmers’ computers are connected to the same LAN or VPN.
History
1995- 1998 - Prog and Doc - Initial version distributed on the French market
2001 - Visual Expert 4.5
2003 - Visual Expert 5
2007 - Visual Expert 5.7
2010 - Visual Expert 6.0
2015 - Visual Expert 2015 - Server component added to schedule code analyses
2016 - Visual Expert 2016 - Oracle PL/SQL code parser, code inventory (lines of code, number of objects…)
2017 - Visual Expert 2017 - SQL Server T-SQL code parser, Code comparison, CRUD matrix
2018 - Visual Expert 2018 - DB Code Performance Analysis, integration with TFS
2019 - Visual Expert 2019 - Generation of E/R diagrams from the code
2020 - Visual Expert 2020 - Object dependency matrix, naming consistency verification, integration with GIT and SVN
2021 - Visual Expert 2021 - Continuous Code Inspection, integration with Jenkins
References
External links
Visual Expert for Oracle
Visual Expert for SQL Server
Visual Expert for PowerBuilder
Visual Expert Changelog
Programming tools
Software documentation
Documentation generators
Code navigation tools
Static program analysis tools
Software review
Oracle database tools
Desktop database application development tools
Microsoft database software |
18932641 | https://en.wikipedia.org/wiki/Motion%20Picture%20Association | Motion Picture Association | The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distributors of America (MPPDA) and known as the Motion Picture Association of America (MPAA) from 1945 until September 2019, its original goal was to ensure the viability of the American film industry. In addition, the MPA established guidelines for film content which resulted in the creation of the Motion Picture Production Code in 1930. This code, also known as the Hays Code, was replaced by a voluntary film rating system in 1968, which is managed by the Classification and Rating Administration (CARA).
More recently, the MPA has advocated for the motion picture and television industry, with the goals of promoting effective copyright protection, reducing piracy, and expanding market access. It has long worked to curb copyright infringement, including recent attempts to limit the sharing of copyrighted works via peer-to-peer file sharing networks and by streaming from pirate sites. Former United States Ambassador to France Charles Rivkin is the chairman and CEO.
About
The Motion Picture Association represents the interests of the six international producers and distributors of filmed entertainment. To do so, they promote and protect the intellectual property rights of these companies and conduct public awareness programs to highlight to movie fans around the world the importance of content protection.
The organizations act on behalf of the members of the Motion Picture Association. They have worldwide operations which are directed from their head offices in Los Angeles and Washington, D.C. with regional operations in Europe, Asia Pacific, Latin America, and Canada.
History
Foundation and early history: 1922–29
The MPA was founded as the Motion Picture Producers and Distributors of America (MPPDA) in 1922 as a trade association of member motion picture companies. At its founding, MPPDA member companies produced approximately 70 to 80 percent of the films made in the United States. Former Postmaster General Will H. Hays was named the association's first president.
The main focus of the MPPDA in its early years was on producing a strong public relations campaign to ensure that Hollywood remained financially stable and able to attract investment from Wall Street, while simultaneously ensuring that American films had a "clean moral tone". The MPPDA also instituted a code of conduct for Hollywood's actors in an attempt to govern their behavior offscreen. Finally, the code sought to protect American film interests abroad by encouraging film studios to avoid racist portrayals of foreigners.
From the early days of the association, Hays spoke out against public censorship, and the MPPDA worked to raise support from the general public for the film industry's efforts against such censorship. Large portions of the public opposed censorship, but also decried the lack of morals in movies. The organisation also had formed a trust to block out Independents and enforce the monopolistic studio system.
At the time of the MPPDA's founding, there was no national censorship, but some state and municipal laws required movies to be censored, a process usually overseen by a local censorship board. Thus, in certain locations in the U.S., films were often edited to comply with local laws regarding the onscreen portrayal of violence and sexuality, among other topics. This resulted in negative publicity for the studios and decreasing numbers of theater goers, who were uninterested in films that were sometimes so severely edited that they were incoherent. In 1929, more than 50 percent of American moviegoers lived in a location overseen by such a board.
In 1924, Hays instituted "The Formula", a loose set of guidelines for filmmakers, in an effort to get the movie industry to self-regulate the issues that the censorship boards had been created to address. "The Formula" requested that studios send synopses of films being considered to the MPPDA for review. This effort largely failed, however, as studios were under no obligation to send their scripts to Hays's office, nor to follow his recommendations.
In 1927, Hays oversaw the creation of a code of "Don'ts and Be Carefuls" for the industry. This list outlined the issues that movies could encounter in different localities. Hays also created a Studio Relations Department (SRD) with staff available to the studios for script reviews and advice regarding potential problems. Again, despite Hays' efforts, studios largely ignored the "Don'ts and Be Carefuls," and by the end of 1929, the MPPDA received only about 20 percent of Hollywood scripts prior to production, and the number of regional and local censorship boards continued to increase.
Production Code: 1930–34
In 1930, the MPPDA introduced the Production Code, sometimes called the "Hays Code". The Code consisted of moral guidelines regarding what was acceptable to include in films. Unlike the "Dont's and Be Carefuls", which the studios had ignored, the Production Code was endorsed by studio executives. The Code incorporated many of the "Don'ts and Be Carefuls" as specific examples of what could not be portrayed. Among other rules, the code prohibited inclusion of "scenes of passion" unless they were essential to a film's plot; "pointed profanity" in either word or action; "sex perversion"; justification or explicit coverage of adultery; sympathetic treatment of crime or criminals; dancing with "indecent" moves; and white slavery. Because studio executives had been involved in the decision to adopt the code, MPPDA-member studios were more willing to submit scripts for consideration. However, the growing economic impacts of the Great Depression of the early 1930s increased pressure on studios to make films that would draw the largest possible audiences, even if it meant taking their chances with local censorship boards by disobeying the Code.
In 1933 and 1934, the Catholic Legion of Decency, along with a number of Protestant and women's groups, launched plans to boycott films that they deemed immoral. In order to avert boycotts which might further harm the profitability of the film industry, the MPPDA created a new department, the Production Code Administration (PCA), with Joseph Breen as its head. Unlike previous attempts at self-censorship, PCA decisions were binding—no film could be exhibited in an American theater without a stamp of approval from the PCA, and any producer attempting to do so faced a fine of $25,000. After ten years of unsuccessful voluntary codes and expanding local censorship boards, the studio approved and agreed to enforce the codes, and the nationwide "Production Code" was enforced starting on July 1, 1934.
War years: 1934–45
In the years that immediately followed the adoption of the Code, Breen often sent films back to Hollywood for additional edits, and in some cases, simply refused to issue PCA approval for a film to be shown. At the same time, Hays promoted the industry's new focus on wholesome films and continued promoting American films abroad.
For nearly three years, studios complied with the Code. By 1938, however, as the threat of war in Europe loomed, movie producers began to worry about the possibility of decreased profits abroad. This led to a decreased investment in following the strictures of the code, and occasional refusals to comply with PCA demands. That same year, responding to trends in European films in the run-up to the war, Hays spoke out against using movies as a vehicle for propaganda. In 1945, after 24 years as president, Hays stepped down from his position at the MPPDA, although he continued to act as an advisor for the Association for the next five years.
Johnston era: 1945–63
In 1945 the MPPDA hired Eric Johnston, four-time president of the United States Chamber of Commerce, to replace Hays. During his first year as president, Johnston rebranded the Motion Picture Producers and Distributors of America as the Motion Picture Association of America (MPAA).
He also created the Motion Picture Export Association (MPEA) to promote American films abroad by opposing production company monopolies in other countries. In 1947 the MPEA voted to discontinue film shipments to Britain after the British government imposed an import tax on American films. Johnston negotiated with the British government to end the tax in 1948, and film shipments resumed.
In 1956, Johnston oversaw the first major revision of the Production Code since it was created in 1930. This revision allowed the treatment of some subjects which had previously been forbidden, including abortion and the use of narcotics, so long as they were "within the limits of good taste". At the same time, the revisions added a number of new restrictions to the code, including outlawing the depiction of blasphemy and mercy killings in films.
Johnston was well-liked by studio executives, and his political connections helped him function as an effective liaison between Hollywood and Washington. In 1963, while still serving as president of the MPAA, Johnston died of a stroke. For three years, the MPAA operated without a president while studio executives searched for a replacement.
Valenti era: 1966–2004
The MPAA appointed Jack Valenti, former aide to President Lyndon Johnson, as president of the MPAA in 1966. In 1968, Valenti replaced the Production Code with a system of voluntary film ratings, in order to limit censorship of Hollywood films and provide parents with information about the appropriateness of films for children. In addition to concerns about protecting children, Valenti stated in his autobiography that he sought to ensure that American filmmakers could produce the films they wanted, without the censorship that existed under the Production Code that had been in effect since 1934.
In 1975, Valenti established the Film Security Office, an anti-piracy division at the MPAA, which sought to recover unauthorized recordings of films to prevent duplication. Valenti continued to fight piracy into the 1980s, asking Congress to install chips in VCRs that would prevent illegal reproduction of video cassettes, and in the 1990s supported law enforcement efforts to stop bootleg distribution of video tapes. Valenti also oversaw a major change in the ratings system that he had helped create—the removal of the "X" rating, which had come to be closely associated with pornography. It was replaced with a new rating, "NC-17", in 1990.
In 1994, the Motion Picture Export Association of America changed its name to the Motion Picture Association to more accurately reflect the global nature of audiovisual entertainment in today's international marketplace.
In 2001, Valenti established the Digital Strategy Department at the MPAA to specifically address issues surrounding digital film distribution and piracy.
Modern era: 2004–present
After serving as president of the MPAA for 38 years, Valenti announced that he would step down in 2004. In September of that year, he was replaced by former Secretary of Agriculture Dan Glickman. During his tenure, Glickman focused on tax issues, content protection efforts, and increasing U.S. studios' access to international markets. He led lobbying efforts that resulted in $400 million in federal tax incentives for the movie industry, and also supported a law which created federal oversight of anti-piracy efforts. Glickman stepped down in 2010.
After a search which lasted over a year, the MPAA hired former U.S. Senator Chris Dodd to replace Glickman in March 2011. In his role as president, Dodd focused on content protection, trade, and improving Hollywood's image. He traveled to China in 2011 in an effort to encourage the Chinese government to both crack down on piracy and further open its film market. A settlement of a long-argued World Trade Organization complaint, coupled with Dodd's efforts, contributed to the United States' agreement with China in 2012 to open China's film market to more Hollywood films and to increase U.S. studios' share of box-office revenues in China. In addition to this agreement with China, the U.S. signed more than 20 memos of understanding with foreign governments regarding the enforcement of intellectual property rights during Dodd's tenure at the MPAA.
In 2011, the MPAA supported the passage of the Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA). After the two bills were shelved in early 2012, Dodd indicated that Hollywood might cut off campaign contributions to politicians who failed to support anti-piracy efforts in the future.
In 2012, the MPAA launched the Diversity and Multicultural Outreach program, as part of an effort to increase diversity in the television and film industry both through employment and representation on screen. Since its inception, the Diversity and Multicultural and Outreach group has conducted outreach and partnered with more than 20 multicultural groups and national civil rights organizations in sponsoring film screenings, festivals, and other diversity-themed events.
Throughout his tenure at the MPAA, Dodd also highlighted the need for movie studios to embrace technology as a means of distributing content.
In June 2017, the MPAA supported the launch of the Alliance for Creativity and Entertainment (ACE), a coalition of entertainment companies, including the six major studios, Netflix and Amazon, that would draw on the MPAA's resources in an effort to reduce online piracy through research and legal efforts.
Former U.S. diplomat and Assistant Secretary of State for Economic and Business Affairs Charles Rivkin succeeded Chris Dodd as CEO on September 5, 2017, and as chairman effective December 6, 2017. On January 25, 2019, film streaming service Netflix announced that it had joined the MPAA in an effort to identify itself among the major studios.
In September 2019, the association updated its branding to reflect the global nature of the film, television, and streaming industry, officially changing its name to the Motion Picture Association (MPA), a name which it has used internationally since 1994. An updated logo also went into effect at this time.
Film rating system
In 1968, the MPAA established the Code and Rating Administration, or CARA (later renamed the Classification and Rating Administration), which began issuing ratings for films exhibited and distributed commercially in the United States to help parents determine what films are appropriate for their children.
Since the rating system was first introduced in November 1968, it has gone through several changes, including the addition of a PG-13 rating. The ratings system is completely voluntary, and ratings have no legal standing. Instead, theater owners enforce the MPAA film ratings after they have been assigned, with many theaters refusing to exhibit non-rated films. An unrated film is often denoted by "NR", such as in newspapers, although this is not a formal MPAA rating.
In 2006, the film This Film Is Not Yet Rated alleged that the MPAA gave preferential treatment to member studios during the process of assigning ratings, as well as criticizing the rating process for its lack of transparency. In response, the MPAA posted its ratings rules, policies, and procedures, as well as its appeals process, online.
According to a 2015 study commissioned by CARA, ninety-three percent of parents in the U.S. find the rating system to be a helpful tool.
The ratings currently used by the MPAA's voluntary system are:
Members
The original MPAA members were the "Big Eight" film studios: Paramount Pictures, Fox Film, Loews, Universal Pictures, and United Artists, followed by Warner Bros. in 1923, Columbia Pictures in 1924, along with Metro-Goldwyn-Mayer (formed by the merger of Loews, Metro Pictures, Goldwyn Pictures, and Louis B. Mayer Productions), and RKO Pictures in 1928. Then came the 1935 merger of Fox Film and 20th Century Pictures into 20th Century Fox.
United Artists briefly resigned from the organization in 1956 over a ratings dispute, although they rejoined later in the decade. By 1966, Allied Artists Pictures had joined the original members. In the following decade, new members joining the MPAA included Avco Embassy in 1975 and Walt Disney Studios in 1979. The next year, Filmways became a MPAA member, but was later replaced in 1986 along with Avco Embassy when the De Laurentiis Entertainment Group and Orion Pictures joined the MPAA roster.
As of 1995, the MPAA members were MGM—which included United Artists after their 1981 merger, Paramount Pictures, Sony Pictures—which included Columbia and TriStar Pictures after their acquisition in 1989, 20th Century Fox, Universal Studios, Walt Disney Studios, and Warner Bros. Turner Entertainment joined the MPAA in 1995, but was purchased in 1996 by Time Warner. As a result, the MPAA's member companies remained intact until 2019,
until the Acquisition of 21st Century Fox by Disney, including 20th Century Fox.
Netflix was approved as a new member in January 2019, making it the first non-studio and the first streaming service to be part of the organization. The addition of Netflix also helped to maintain the number of members after the acquisition of 20th Century Fox by Disney. The MPA aims to recruit additional members.
Content protection efforts
The MPA's concerted efforts at fighting copyright infringement began in 1975 with the establishment of the Film Security Office, which sought to recover unauthorized recordings of films in order to prevent duplication. The MPA has continued to pursue a number of initiatives to combat illegal distribution of films and TV shows, especially in response to new technologies. In the 1980s, it spoke out against VCRs and the threat that the MPA believed they represented to the movie industry, with MPAA president Jack Valenti drawing a parallel between the threat of the VCR and that of the Boston Strangler. In 1986, the MPAA asked Congress to pass a law that would require VCRs to come equipped with a chip to prevent them from making copies. Legal efforts at stopping homemade copies of broadcast television largely ended, however, when the United States Supreme Court ruled that such copying constituted fair use.
The MPA continued to support law enforcement efforts to stop bootleg production and distribution of videotapes and laserdiscs into the 1990s, and in 2000 took successful legal action against individuals posting DVD decryption software on the Internet in Universal City Studios, Inc. v. Reimerdes. Following the release of RealDVD—an application that enabled users to make copies of DVDs—RealNetworks sued the DVD Copy Control Association and the major studios in 2008 over the legality of the software, accusing them of violating the Sherman Antitrust Act. The judgment found there were no grounds for the antitrust claim and dismissed the suit. The court later found that the RealNetworks product violated the Digital Millennium Copyright Act (DMCA).
The MPA has continued to support law enforcement efforts to prevent illegal distribution of copyrighted materials online. The MPA and its British counterpart, the Federation Against Copyright Theft (FACT), also funded the training of Lucky and Flo, a pair of Labrador Retrievers, to detect polycarbonates used in the manufacturing of DVDs.
The MPA strives to protect the creative rights of the large corporate film makers. Its counterpart has come up with infamous slogans such as "Who Makes Movies?" and "You can click, but you can't hide."
Online file sharing
In the early 2000s, the MPAA began focusing its efforts to curb copyright infringement specifically on peer-to-peer file sharing, initially using a combination of educational campaigns and cease and desist letters to discourage such activity. In the first six months of 2002, the MPAA sent more than 18,000 such letters to internet service providers to forward to users engaged in copyright infringement.
In late 2004, the MPAA changed course and filed lawsuits in a concerted effort to address copyright infringement on a number of large online file-sharing services, including BitTorrent and eDonkey. The following year, the MPAA expanded its legal actions to include lawsuits against individuals who downloaded and distributed copyrighted material via peer-to-peer networks.
The MPAA also played a role in encouraging the Swedish government to conduct a raid of the Pirate Bay file-sharing website in May 2006. Swedish officials have acknowledged that part of the motivation for the raid was the threat of sanctions from the World Trade Organization, along with a letter from the MPAA.
In 2013, the Center for Copyright Information unveiled the Copyright Alert System, a system established through an agreement between the MPAA, the Recording Industry Association of America, and five of the USA's largest internet service providers. The system used a third-party service to identify content being distributed illegally. Users were then informed that their accounts were being used for possible copyright infringement and were provided with information about ways to get authorized content online. Users who received multiple notices of infringement faced "mitigations measures," such as temporary slowing of their Internet service, but the system did not include termination of subscriber accounts. Subscribers facing such action had a right to appeal to the American Arbitration Association. In January 2017, the Copyright Alert System was discontinued. While no official reason was given, the MPAA's general counsel stated that the system had not been equipped to stop repeat infringers.
On December 24, 2014, the Sony Pictures hack revealed that following a lawsuit in which the MPAA won a multimillion judgment against Hotfile, a file hosting website, the MPAA colluded with Hotfile to misrepresent the settlement so that the case would serve as a deterrent. The settlement was previously believed to be $80 million and was widely reported; however, Hotfile only paid the studios $4 million and agreed to have the $80 million figure recorded as the judgment and the website shut down.
In a case resolved in 2015, the MPAA and others supported the United States International Trade Commission (ITC)'s decision to consider electronic transmissions to the U.S. as "articles" so that it could prevent the importation of digital files of counterfeit goods. While the case being considered by the ITC involved dental appliances, the ITC could have also used such authority to bar the importation of pirated movies and TV shows from rogue foreign websites that traffic in infringing content. The Federal Circuit Court of Appeals took up the matter, and ultimately ruled against the ITC.
In 2016, the MPAA reported Putlocker as one of the "top 5 rogue cyberlocker services" to the Office of the United States Trade Representative as a major piracy threat; the website was then blocked in the United Kingdom.
In 2019, the MPA released an overview of the piracy markets in contravention of the US Government. Added to the list were Chinese hosting service Baidu, and Russian gambling firm 1xBet.
Criticism and controversies
Publicity campaigns
The MPAA has also produced publicity campaigns to discourage piracy. The Who Makes Movies? advertising campaign in 2003 highlighted workers in the movie industry describing how piracy affected them. The video spots ran as trailers before movies, and as television advertisements. In 2004, the MPAA began using the slogan "You can click, but you can't hide". This slogan appeared in messages that replaced file-sharing websites after they had been shut down through MPAA legal action. It also appeared in posters and videos distributed to video stores by the MPAA. Also in 2004, the MPAA partnered with the Federation Against Copyright Theft and the Intellectual Property Office of Singapore to release a trailer shown before films in theaters equating piracy with theft. The trailer was later placed at the beginning of the video on many DVDs in many cases as an unskippable clip (not being able to skip or fast-forward), which triggered criticism and a number of parodies.
In 2005, the MPAA commissioned a study to examine the effects of file sharing on movie industry profitability. The study concluded that the industry lost $6.1 billion per year to piracy, and that up to 44 percent of domestic losses were due to file sharing by college students. In 2008, the MPAA revised the percentage of loss due to college students down to 15 percent, citing human error in the initial calculations of this figure. Beyond the percentage of the loss that was attributable to college students, however, no other errors were found in the study.
In 2015, theaters began airing the MPAA's "I Make Movies" series, an ad campaign intended to combat piracy by highlighting the stories of behind-the-scenes employees in the film and television industry. The series pointed audiences to the MPAA's "WhereToWatch" website (later dubbed "The Credits") which provides attention to the behind-the-scenes creativity involved in making movies.
Accusations of copyright infringement
The MPAA itself has been accused of copyright infringement on multiple occasions. In 2007, the creator of a blogging platform called Forest Blog accused the MPAA of violating the license for the platform, which required that users link back to the Forest Blog website. The MPAA had used the platform for its own blog, but without linking back to the Forest Blog website. The MPAA subsequently took the blog offline, and explained that the software had been used on a test basis and the blog had never been publicized.
Also in 2007, the MPAA released a software toolkit for universities to help identify cases of file sharing on campus. The software used parts of the Ubuntu Linux distribution, released under the General Public License, which stipulates that the source code of any projects using the distribution be made available to third parties. The source code for the MPAA's toolkit, however, was not made available. When the MPAA was made aware of the violation, the software toolkit was removed from their website.
In 2006, the MPAA admitted having made illegal copies of This Film Is Not Yet Rated (a documentary exploring the MPAA itself and the history of its rating system) — an act which Ars Technica explicitly described as hypocrisy and which Roger Ebert called "rich irony". The MPAA subsequently claimed that it had the legal right to copy the film despite this being counter to the filmmaker's explicit request, because the documentary's exploration of the MPAA's ratings board was potentially a violation of the board members' privacy.
International activities
Around the world, the MPA helps with local law enforcement to combat piracy.
The MPA offices in the world are:
Motion Picture Association – Canada
MPA EMEA (Europe, Middle East and Africa), which has anti-piracy programs in 17 European countries
MPA Asia and Pacific, which has anti-piracy programs in 14 Asian countries
MPA Latin America, which has anti-piracy programs in two Latin-American countries
See also
Australian Classification Board
British Board of Film Classification
DeCSS: decryption program for DVD video discs using Content Scramble System
Eirin
Entertainment Software Rating Board
Will H. Hays
National Association of Theatre Owners
Notorious markets
Operation Red Card
Pre-Code
Pre-Code Hollywood
United States Motion Picture Production Code of 1930
"You Wouldn't Steal a Car"
"One fuck rule"
References
External links
MPPDA Digital Archives (1922–1939)
Motion Picture Association of America. Production Code Administration records, Margaret Herrick Library, Academy of Motion Picture Arts and Sciences
Filmnummers: list of PCA (and MPAA) certificate numbers and titles
MPPDA - MPAA - The Motion Picture Production Code film numbers to 52000—Includes a downloadable Excel worksheet
The Production Code of the Motion Picture Industry
1922 establishments in the United States
Arts and media trade groups
Arts organizations based in Washington, D.C.
Cinema of the United States
Computer law
Entertainment rating organizations
Film censorship in the United States
Trade associations based in the United States
Organizations established in 1922
Film organizations in the United States |
302214 | https://en.wikipedia.org/wiki/Commodore%2016 | Commodore 16 | The Commodore 16 is a home computer made by Commodore International with a 6502-compatible 7501 or 8501 CPU, released in 1984 and intended to be an entry-level computer to replace the VIC-20. A cost-reduced version, the Commodore 116, was mostly sold in Europe.
The C16 and C116 belong to the same family as the higher-end Plus/4 and are internally very similar to it (albeit with less RAM – 16 KB rather than 64 KB – and lacking the Plus/4's user port and Three plus one software). Software is generally compatible among all three provided it can fit within the C16's smaller RAM and does not utilize the user port on the Plus/4.
While the C16 was a failure on the US market, it enjoyed some success in certain European countries and Mexico.
Intention
The C16 was intended to compete with other sub-$100 computers from Timex Corporation, Mattel, and Texas Instruments (TI). Timex's and Mattel's computers were less expensive than the VIC-20, and although the VIC-20 offered better expandability, a full-travel keyboard, and in some cases more memory, the C16 offered a chance to improve upon those advantages. The TI-99/4A was priced in-between Commodore's VIC-20 and Commodore 64, and is somewhat between them in capability, but TI was lowering its prices. On paper, the C16 is a closer match for the TI-99/4A than the aging VIC-20.
Commodore president Jack Tramiel feared that one or more Japanese companies would introduce a consumer-oriented computer and undercut everyone's prices. Although Japanese companies would soon dominate the U.S. video game console market, their feared dominance of the home computer field never materialized. Additionally, Timex, Mattel, and TI departed the computer market before the C16 was released.
Description
Outwardly the C16 resembles the VIC-20 and the C64, but with a dark-gray case and light-gray keys. The keyboard layout differs slightly from the earlier models, adding an escape key and four cursor keys replacing the shifted-key arrangement the C-64 and VIC inherited from the PET series. The C16 is in some respects faster than the Commodore 64 and Commodore VIC-20; the processor runs at a speed roughly 75% faster, and the BASIC interpreter contains dedicated graphics commands, making drawing images considerably faster.
The system was designed around the TED chip which included NTSC and PAL video, sound and DRAM refresh functionality. Though according to the designer it "was supposed to be as close to a single-chip computer as we could get in the 1980s," the CPU, RAM, ROM and some glue logic were still on their own separate chips. (This was considerably less integrated than microcontrollers of the day, but those did not generally offer video and sound functionality.)
The C16 has 16 KB of RAM with 12 KB available to its built-in BASIC interpreter. The TED chip offered a palette of 121 colors, which was considerably more than the 16 colors available on the Commodore 64's VIC-II video chip, but it lacked the VIC-II's sprites and the sound capabilities were not as advanced as the SID also used in the Commodore 64.
From a practical user's point of view, three tangible features the C16 lacks are a modem port and VIC-20/C64-compatible Datasette and game ports. Commodore sold a C16-family-specific Datassette (the Commodore 1531) and joysticks, but the pins are identical to those used on the Commodore 64, so can be used with a simple adapter, in fact Commodore themselves sold Commodore 16s with C2N datasettes designed for the Commodore 64 with adapters after the initial production run. The reason for changing the joystick ports was to reduce size. The C16's serial port (Commodore's proprietary "serial CBM-488 bus", was a variation of the Commodore PET IEEE interface as used on the VIC-20 and Commodore 64, which meant that printers and disk drives were interchangeable with the older machines. As it was a serial interface, modems could be connected with a suitable interface. Partially for cost reasons, the user port, designed for modems and other devices, was omitted from the C16 (although the connections for it were still present on the system board). Despite costing less than the Plus/4, the C16's keyboard was higher quality and easier to type on.
The Commodore 16 is one of three computers in its family. The even-less-successful Commodore 116 is functionally and technically similar but was shipped in a smaller case with a rubber chiclet keyboard and was only available in Europe. The family's flagship, the Commodore Plus/4, was shipped in a similar case but has a 59-key full-travel keyboard (with a specifically advertised "cursor key diamond" of four keys, contrasted with the VIC-20's and C64's two + shift key scheme inherited from the PET), 64 KB of RAM, a modem port, and built-in entry-level office suite software. Although shipped with 16K from the factory, it was possible to modify the C16 for 64K, making it able to run any Plus/4 software except applications that required the user port or built-in programs.
Hardware designer Bil Herd notes that the C116 is the original member of this family of computers and is the original vision as imparted by Jack Tramiel to the engineering department. It was designed to sell for $49 to $79. The C16 and the Plus/4 came later and were mostly driven by the company trying to figure out what to do with the new computer family after Tramiel's departure from Commodore.
In an early stage of development of the C16, Commodore was planning to have single layer PCBs built in as an attempt of cost reducing, with the manufacturing cost of such a PCB being around $12. But these plans were later discarded possibly due to technical problems. It was the first and only attempt of Commodore using single layer PCBs inside their computers, and only one such PCB is known to be preserved.
Market performance
The C16 was a major failure in the U.S. and was discontinued within a year, but it sold reasonably well in Europe as a low-end game machine (over 90% of all C16 software was produced by European developers) and in Mexico as well.
The C16's failure in the US market was likely due to a lack of software support, incompatibility with the C64, and lack of importance to Commodore after its competitors withdrew from the market.
A total of 1 million Plus/4s, C16s, and C116s were sold, with the latter two accounting for about 60% of its total volume.
Beginning in 1986, remaining C16, C116 and Plus/4 inventories were sold at a much-reduced price on the Eastern Bloc market, chiefly Hungary. Hungary did not produce any home computers at the time, while the Soviet, Bulgarian and East German models were far too expensive for most Hungarians, and most Western models were completely unavailable. Thus, this move by Commodore was the first chance for many people in Hungary to own a computer at all. It created a fanbase that lasted well into the 1990s and that contributed several unofficial ports of popular Commodore 64 programs.
Mexico
In Mexico, the C16 was sold as a beginner's computer from early 1985 to 1992. Aurrerá supermarkets distributed them with Grupo Sigma S.A., a local distributor of Commodore USA. The computer was marketed as "Sigma-Commodore 16" (all other Commodore computers sold in Mexico had the same moniker). Basically, this model is the same as the American/European C16; as it doesn't have the "Ñ" key needed for writing the Spanish language, the only difference is the custom label.
Aurrera Supermarket also sold software, peripherals and books about to how to program Commodore Computers. All this merchandise was displayed in special modules at the electronics department called "El Universo de la Computación" (The Universe of the Computer Science). The success of Commodore in Mexico was in granted by the fact that Aurrera Supermarket let anyone test the machines in store, so people gathered to play games and exchange programs in unofficial computer clubs.
At least four annual software writing contests were held sponsored by Aurrera Supermarket, Grupo Sigma and Commodore between 1985 and 1989. These contests had entries for programming, custom hardware and computer graphics for the C16, C64, C128 and Amiga. Prizes included money, Commodore software and hardware and the right to have the software published by Grupo Sigma for the local market. The contest winners had limited sales restricted only to Mexico, so the resulting original software is almost impossible to find.
Grupo Sigma stopped supporting the brand in mid-1993, in favor of the growing (and more profitable) IBM PC compatible market.
Video
15 colours in 8 luminance giving you 120 shades of colour levels plus Black.
High resolution:
320 x 200 in 2 colours per 8 x 8 pixel block.
No colour restriction per screen.
Multicolour
160 x 200 in 4 colours per block.
No colour restrictions.
Text
40 x 25 text in 8x8 pixels.
Sprites
No hardware sprites
See also
C16 games
PETSCII character set
References
External links
Plus/4 World – A comprehensive C16 and Plus/4 Game and demoscene site along with books, manuals, PRG files and TAP images of C16 and Plus/4 files
Commodore 8-bit computers
Computer-related introductions in 1984 |
29651 | https://en.wikipedia.org/wiki/SAS | SAS | SAS or Sas may refer to:
Arts, entertainment, and media
SAS (novel series), a French book series by Gérard de Villiers
Shimmer and Shine, an American animated children's television series
Southern All Stars, a Japanese rock band
Strong Arm Steady, an American hip hop group from California
Sunday All Stars, a Philippine Sunday variety show from 2013 to 2015
SAS (TV station), a television station in Adelaide, South Australia
Organizations
Military
An abbreviation for "Special Air Service" in various armed forces, including:
Special Air Service, a special forces unit of the British Army
Special Air Service Regiment, a special forces unit of the Australian Army
5th Special Air Service, a Belgian Second World War formation
Canadian Special Air Service Company, a Canadian unit from 1947 to 1949
Free French Special Air Service, the predecessor unit of the French 1st Marine Infantry Parachute Regiment (1er RPIMa)
New Zealand Special Air Service, a special forces unit of the New Zealand Army
Rhodesian Special Air Service, several special forces units from Rhodesia
Special Air Service, a unit within the Special Forces of Zimbabwe
South African Ship, the South African Navy warship prefix
Specialized Administrative Sections, a French civil-military program during the Algerian War
Su Altı Savunma, a special operations unit of the Turkish Navy
Brands and enterprises
SAS (shoemakers), trademark of a shoe company in San Antonio, Texas, US
SAS (TV station), a television station in Adelaide, South Australia
SAS Group (Scandinavian Airlines System Group), an airline company based in Stockholm, Sweden; Oslo, Norway; Copenhagen, Denmark
Scandinavian Airlines, the largest airline in Scandinavia (Denmark, Norway and Sweden)
SAS Cargo Group, a cargo company in Denmark, Norway and Sweden
SAS Institute, an analytics software company headquartered in North Carolina, US
SAS (software), the main software product of the company
SAS language, the language used to program the software
Société par actions simplifiée, French designation of a joint stock type of company
Southern Audio Services, an electronics manufacturer based in Baton Rouge, Louisiana, US
Education
Asia
St. Augustine's School, Kalimpong, a school in Kalimpong, West Bengal, India
Sekolah Sultan Alam Shah, a boarding school in Malaysia
Shanghai American School, an international school in Shanghai
Singapore American School, an international school in Singapore
Europe
Sankt-Ansgar-Schule, Hamburg, Germany
School of Advanced Study, a postgraduate institution of the University of London, United Kingdom
Sense About Science, a UK-based organization promoting respect for good science
Slovak Academy of Sciences, the main scientific and research institution in Slovakia
Studia Academica Slovaca, a summer school teaching the Slovak language
Sussex Archaeological Society, an archaeological society based in Lewes, Sussex, UK
North America
Saline Area Schools, a school district in Michigan
Saint Andrew's School (Boca Raton, Florida)
Saint Andrew's School (Savannah, Georgia)
Saint Andrew's School (Saratoga, California)
School for Advanced Studies, a high school program in Miami, Florida, United States
Semester at Sea, a shipboard academic program administered by the University of Virginia, United States
Society for Amateur Scientists, an American non-profit organization
Space Access Society, an organization dedicated to increasing the viability and reducing the cost of commercial access to space travel
Strong American Schools, an American non-profit organization that promotes sound education policies
International
Society for Animation Studies, an international scholarly organization
Healthcare
Andalusian Health Service (Servicio Andaluz de Salud), the government-run health system of Andalusia, Spain
Scottish Ambulance Service
Politics
Second Amendment Sisters, a women's advocacy group focusing on gun rights in the United States of America
Servants Anonymous Society, a nonprofit women's organization
Sloboda a Solidarita or Freedom and Solidarity, a political party in Slovakia
Surfers Against Sewage, a UK-based campaign for clean, safe recreational water
People
Sas of Moldavia (died 1358), voivode ruling over what was to become Moldavia between 1354 and 1358
Éva Sas, French politician
Ferenc Sas, Hungarian footballer
Hasan Şaş, Turkish footballer
Stephen A. Smith, American sports analyst
Places
Sas, Iran, a village in Mazandaran Province, Iran
Sas, a tributary of the river Bouleț in Romania
Sas van Gent, a town in the Netherlands
Science, technology, and mathematics
Biology and medicine
Solvent-accessible surface, the surface area of a biomolecule that is accessible to a solvent
Subarachnoid space, the space between the arachnoid mater and pia mater in the brain
Subvalvular aortic stenosis (non-human), an abnormal, congenital heart murmur
Syndesmotic ankle sprain, a type of ankle sprain
Computing
SAS (software), (Statistical Analysis System) an integrated software suite produced by SAS Institute Inc.
SAS language, a data processing and statistical analysis language
Secure Attention Sequence, a special key combination which invokes a trusted login process (e.g. Ctrl+Alt+Delete on Windows NT systems)
Serial Attached SCSI, a computer bus technology for the transfer of data to and from storage devices (e.g., hard disks)
Shared access signature, a security token which can be attached to a URL
Short Authentication String, a method used in the ZRTP cryptographic protocol
Slot Accounting System protocol, a slot machine communication method created by the International Game Technology (IGT) corporation
Sorcerer's Apprentice Syndrome, a network protocol flaw in the Trivial File Transfer Protocol (TFTP)
Spatially Aware Sublayer, an optional sublayer of the MAC that provides spatial reuse in Resilient Packet Ring
Space
Small Astronomy Satellite 1, the first of a series of NASA X-ray satellites launched on December 12, 1970
Small Astronomy Satellite 2, launched November 15, 1972
Small Astronomy Satellite 3, launched May 7, 1975
Space Access Society, an organization dedicated to increasing the viability and reducing the cost of commercial access to space travel
Space activity suit, a spacesuit which provides mechanical pressure by means of elastic garments
Space adaptation syndrome, an illness akin to motion sickness experienced by many first-time space travellers
Sistema Avariynogo Spaseniya, (Russian: CAC, Система Аварийного Спасения), the Soyuz launch escape system
Other uses in science, technology, and mathematics
Self-anchored suspension bridge, a suspension bridge in which the main cables attach to the ends of the deck
Side-angle-side, a concept in geometry for determining congruence or similarity of triangles
Small-angle scattering, a scattering technique based on the deflection of a beam of particles away from the straight trajectory after it interacts with a sample
Stability Augmentation System, a limited form of autopilot that stabilizes an aircraft in one or more axes
Synthetic aperture sonar, a form of sonar analogous to synthetic aperture radar
Supercritical Anti-Solvent, a method used for micronization of substances
Sport
San Antonio Spurs, a professional basketball team in San Antonio, Texas, United States
SAS Championship, a golf tournament in Cary, North Carolina, United States
SAS Masters Tour, a domestic professional golf tour operated by the Swedish Golf Association
Stars Association for Sports, a women's association football club in Aley, Lebanon
Transportation
Salton Sea Airport, IATA airport code SAS
Sam Shing stop, MTR station code SAS
San Antonio station (Texas), Amtrak code SAS
Second Avenue Subway, a subway line in New York City
Other uses
Sas coat of arms, a European coat of arms (German, Hungarian, Lithuanian, Polish, Romanian and Ukrainian)
Statements on auditing standards, a series of internationally recognized auditing standards
See also
History of the SAS (disambiguation)
Saas (disambiguation)
Sass (disambiguation) |
57721028 | https://en.wikipedia.org/wiki/Amitabh%20Varshney | Amitabh Varshney | Amitabh Varshney is an Indian-born American computer scientist. He is an IEEE fellow, and serves as Dean of the University of Maryland College of Computer, Mathematical, and Natural Sciences. Before being named Dean, Varshney was the director of the University of Maryland Institute for Advanced Computer Studies (UMIACS) from 2010 to 2018.
Education and academic career
Amitabh Varshney attended school at St Gabriel's Academy, Roorkee in Uttarakhand, India. Varshney went on to attend Indian Institute of Technology, Delhi, graduating with a B.Tech in Computer Science & Engineering in 1989. He continued his education at the University of North Carolina, Chapel Hill, earning an M.S. in Computer Science in 1991, and a Ph.D. in Computer Science in 1994. Varshney worked as an assistant professor of Computer Science at Stony Brook University from 1994 to 2000. In 2000, Varshney began working as a professor of Computer Science at the University of Maryland, College Park, where he still works.
Research
Varshney's research pertains to the applications of computer graphics and visualization in engineering, science, and medicine via developments in mesh processing, shading algorithms, perceptual image synthesis, and high-performance visual computing. His findings have been used in a variety of fields including pharmacology, meteorology, plasma physics, nanomanufacturing, medical imaging, and genealogy. Varshney is most renowned for his many studies on level of detail.
Smooth molecular surfaces
In their 1994 report, Varshney, Fred Brooks, and William Wright detail their advances in graphically modeling molecular surfaces:
Dynamic simplification for polygonal models
In 1996, Varshney published an algorithm for real-time simplifications of polygons in a 3-dimensional model:
A continuous level-of-detail representation for an object is first constructed off-line. This representation is then used at run-time to guide the selection of appropriate triangles for display. The list of displayed triangles is updated incrementally from one frame to the next. Our approach is more effective than the current level-of-detail-based rendering approaches for most scientific visualization applications where there are a limited number of highly complex objects that stay relatively close to the viewer.
Optimizing triangle strips
Also in 1996, Varshney published "Optimizing Triangle Strips for Fast Rendering". The study introduced new algorithms for rendering triangle strips in conjuncture with partially triangulated models. Describing their more efficient triangle strip algorithm, Varshney et al. write:
By using triangle strips ... , we can describe the triangulation using the strip ... and assuming the convention that the ith triangle is described by the ith, (i + 1)st, and (i + 2)nd vertices of the sequential strip. Such a sequential strip can reduce the cost to transmit n triangles from 3n to n + 2 verticies.
Simplification envelopes
Varshney proposed the idea of simplification envelopes as a method of simultaneously preserving both global and local topology. A surface's envelope is a shell-like structure consisting of a pair of surfaces a distance ε on either side of the original surface. Each surface has its own level of detail, often referred to as the 'hierarchy of LOD'.
Many consider the main drawback of simplification envelopes to be that the algorithms for their calculation are difficult to program.
Level of detail for 3D graphics
In 2002, Varshney published the first edition of "Level of Detail for 3D Graphics". The book details several principles for optimizing 3D rendering including:
The use of multiple discrete levels of detail (LODs) in lieu of a single view-dependent LOD
Topology-preserving and topology-sensitive simplification algorithms to maximize fidelity
The use of multiple LODs in multiple instantiations in gaming consoles and other constant frame-rate systems
Double buffering, frame locking, and frame-latency manipulation to eliminate tearing and maximize temporal control
The Augmentarium
Varshney serves as director of the Augmentarium Virtual and Augmented Reality Laboratory at the University of Maryland. He oversees research projects developing applications of virtual reality for atmospheric and oceanic sciences, astronomy, stem cell research, fluid dynamics simulations, surgical training, cybersecurity, and data visualization.
Awards
IEEE Fellow
IEEE Technical Achievement Award
IEEE Meritous Service Award
National Science Foundation Career Award
References
1966 births
Living people
IIT Delhi alumni
University of North Carolina at Chapel Hill alumni
Stony Brook University faculty
University of Maryland, College Park faculty
Fellow Members of the IEEE
Indian emigrants to the United States
American computer scientists
Indian computer scientists |
42191358 | https://en.wikipedia.org/wiki/VOGL | VOGL | VOGL is a debugger for the OpenGL rendering API intended to be used in the development of video games. VOGL was originally written at RAD Game Tools and Valve. VOGL is free and open-source software subject to the terms of the MIT License.
Description
There is a graphical front-end implementing Qt5-based GUI widgets.
VOGL was initially released with support for Linux operating systems only, but on April 23, 2014, additional support for Microsoft Windows was released.
Goals included:
Free and open-source
Steam integration
Vendor and driver version neutral
No special app builds needed
Frame capturing, full stream tracing, trace trimming
Optimized replayer
OpenGL usage validation
Regression testing, benchmarking
Robust API support: OpenGL v3/4.x, core or compatibility contexts
UI to edit captures, inspect state, diff snapshots, control tracing
VOGLperf is a benchmarking tool for Linux OpenGL games.
See also
GLAVE (software)
Valgrind
Linux gaming
References
External links
vogl's GitHub repository
Moving Your Games to OpenGL From 33:47 till the end of the video there is an introduction to VOGL
Moving Your Games to OpenGL Steam Dev Days 2014 Presentation PDF
Debuggers
Free software
Free software programmed in C++
Software that uses Qt
Valve Corporation
Video game development software for Linux |
799384 | https://en.wikipedia.org/wiki/Bhubaneswar | Bhubaneswar | Bhubaneswar (; ) is the capital and largest city of the Indian state of Odisha. The region, especially the old town, was historically often depicted as Ekamra Khetra (area (kshetra) adorned with mango trees (ekamra)). Bhubaneswar is dubbed the "Temple City"—a nickname earned because of the 700 temples which once stood there. In contemporary times, it has emerged as an education hub and an attractive business destination.
Although the modern city of Bhubaneswar was formally established in 1948, the history of the areas in and around the present-day city can be traced to the 7th century BCE and earlier. It is a confluence of Hindu, Buddhist and Jain heritage and includes several Kalingan temples, many of them from 6th–13th century CE. With Puri and Konark it forms the 'Swarna Tribhuja' ("Golden Triangle"), one of eastern India's most visited destinations.
Bhubaneswar replaced Cuttack as the capital on 19 August 1949, 2 years after India gained its independence from Britain. The modern city was designed by the German architect Otto Königsberger in 1946. Along with Jamshedpur and Chandigarh, it was one of modern India's first planned cities. Bhubaneswar and Cuttack are often referred to as the 'twin cities of Odisha'. The metropolitan area formed by the two cities had a population of 1.7 million in 2011. Recent data from the United Nations released in 2016 states that Bhubaneswar's metro area has a population of around a million people. Bhubaneswar is categorised as a Tier-2 city. Bhubaneswar and Rourkela are the only cities in smart city mission from Odisha.
Etymology
Bhubaneswar is the anglicisation of the Odia name "Bhubaneśwara"(ଭୁବନେଶ୍ୱର), derived from the word Tribhubaneśwar (ତ୍ରିଭୁବନେଶ୍ୱର), which literally means the Lord (Iśwar) of the Three Worlds (Tribhuban), which refers to Shiva.
History
Bhubaneswar stands near the ruins of Sisupalgarh, the ancient capital of the erstwhile province of Kalinga. Dhauli, near Bhubaneswar was the site of the Kalinga War (c. 262-261 BCE), in which the Mauryan emperor Ashoka invaded and annexed Kalinga. One of the most complete edicts of the Mauryan Emperor, Ashoka, dating from between 272 and 236 BCE, remains carved in rock, to the southwest of the modern city. After the decline of the Mauryan empire, the area came under the rule of Mahameghavahana dynasty, whose most well-known rule is Kharavela. His Hathigumpha inscription is located at the Udayagiri and Khandagiri Caves near Bhubaneswar. The area was subsequently ruled by several dynasties, including Satavahanas, Guptas, Matharas, and Shailodbhavas.
In the 7th century, Somavamshi or Keshari dynasty established their kingdom in the area, and constructed a number of temples. After the Kesharis, the Eastern Gangas ruled Kalinga area until the 14th century CE. Their capital Kalinganagara was located in present-day Bhubaneswar City. After them, Mukunda Deva of the Bhoi dynasty – the last Hindu ruler of the area until the Marathas – developed several religious buildings in the area. Most of the older temples in Bhubaneswar were built between 8th and 12th centuries, under Shaiva influence. The Ananta Vasudeva Temple is the only old temple of Vishnu in the city. In 1568, the Karrani dynasty of Afghan origin gained control of the area. During their reign, most of the temples and other structures were destroyed or disfigured.
In the 16th century, the area came under pachamani Mughal control. The Marathas, who succeeded the Mughals in the mid-18th century, encouraged pilgrimage in the region. In 1803, the area came under British colonial rule, and was part of the Bengal Presidency (until 1912), Bihar and Orissa Province (1912-1936) and Orissa Province (1936-1947). The capital of the British-ruled Orissa Province was Cuttack, which was vulnerabile to floods and suffered from space constraints. Because of this, on 30 September 1946, a proposal to move the capital to a new capital was introduced in the Legislative Assembly of the Odisha Province. After independence of India, the foundation of the new capital was laid by Prime Minister Jawaharlal Nehru on 13 April 1948.
The name of the new capital came from "Tribhubaneswara" or "Bhubaneswara" (literally "Lord of the Earth"), a name of Shiva, the deity of the Lingaraja temple. The Legislative Assembly of Odisha was shifted from Cuttack to Bhubaneswar in 1949. Bhubaneswar was built as a modern city, designed by German architect Otto Königsberger with wide roads, gardens and parks. Though part of the city followed the plan, it grew rapidly over the next few decades, outstripping the planning process. According to the first census of independent India, taken in 1951, the city's population was just 16,512. From 1952 to 1979, it was administered by a Notified Area Council or a nagar panchayat; a municipality was established only on 12 March 1979. By the 1991 census, the population of Bhubaneswar had increased to 411,542. Accordingly, on 14 August 1994, the Bhubaneswar Municipal Corporation was established.
Geography
Bhubaneswar is in Khordha district of Odisha. It is in the eastern coastal plains, along the axis of the Eastern Ghats mountains. The city has an average altitude of above sea level. It lies southwest of the Mahanadi River that forms the northern boundary of Bhubaneswar metropolitan area, within its delta.
The city is bounded by the Daya River to the south and the Kuakhai River to the east; the Chandaka Wildlife Sanctuary and Nandankanan Zoo lie in the western and northern parts of Bhubaneswar, respectively.
Bhubaneswar is topographically divided into western uplands and eastern lowlands, with hillocks in the western and northern parts. Kanjia lake on the northern outskirts, affords rich biodiversity and is a wetland of national importance. Bhubaneswar's soils are 65 per cent laterite, 25 per cent alluvial and 10 per cent sandstone. The Bureau of Indian Standards places the city inside seismic zone III on a scale ranging from in order of increasing susceptibility to earthquakes. The United Nations Development Programme reports that there is "very high damage risk" from winds and cyclones. The 1999 Odisha cyclone caused major damage to buildings, the city's infrastructure and cost many human lives. Floods and waterlogging in the low-lying areas have become common due to unplanned growth.
Urban structure
The Bhubaneswar urban development area consists of the Bhubaneswar Municipal Corporation area, 173 revenue villages and two other municipalities spread over . The area under the jurisdiction of the Bhubaneswar Municipal Corporation covers . The city is somewhat dumbbell-shaped with most of the growth taking place to the north, northeast and southwest. The north–south axis of the city is widest, at roughly . Growth in the east is restricted due to the presence of Kuakhai River and by the wildlife sanctuary in the northwestern part. The city can be broadly divided into the old town, planned city (or state capital), added areas and outer peripheral areas. It is subdivided into Units and Colonies.
The old town or "Temple Town", the oldest part of the city, is characterised by many temples, including the Lingaraja, Rajarani and Muktesvara temples, standing alongside residential areas. This area is congested, with narrow roads and poor infrastructure. Among neighbourhoods in the old town are Rajarani Colony, Pandaba Nagar, Brahmeswara Bagh, Lingaraja Nagar, Gouri Nagar, Bhimatangi and Kapileswara.
The planned city was designed in 1948 to house the capital. It is subdivided into units, each with a high school, shopping centres, dispensaries and play areas. While most of the units house government employees, Unit V houses the administrative buildings, including the State Secretariat, State Assembly, and the Raj Bhavan. Private residential areas were later built in other areas of the planned city, including Saheed Nagar and Satya Nagar. Unit I, popularly known as the Market Building, was formed to cater to the shopping needs of the new capital's residents. Later, markets and commercial establishments developed along the Janpath and Cuttack-Puri Road at Saheed Nagar, Satya Nagar, Bapuji Nagar and Ashok Nagar. A dedicated institutional area houses educational and research institutes, including Utkal University, the Institute of Physics, the Institute of Minerals and Materials Technology and Sainik School. Indira Gandhi Park, Gandhi Park and the Biju Patnaik Park are located in the unit.
The added areas are mostly areas lying north of National Highway 5, including Nayapalli, Jayadev Vihar, Chandrasekharpur and Sailashree Vihar, #Niladri vihar which were developed by Bhubaneswar Development Authority to house the growing population. With the development of the new areas such as Chandrasekharpur the city is now divided roughly into North(newer areas) and South Bhubaneswar (older areas) by the NH-5 highway.
The peripheral areas are outside the municipal boundary or have subsequently been included within the extended boundary, including Tomando, Patia and Raghunathpur. Most of these areas were developed in a haphazard manner, without proper planning. The Master Planning Branch of the Bhubaneswar Development Authority developed the Comprehensive Development Plan (CDP) in 2010. According to the Odisha Development Authorities Act, 1982, the Development Authority has control over the planning for municipal areas. Apart from the CDP, BDA has also created Zonal Development Plans for some of the areas under the CDP. Bhubaneswar secured the top rank in the Smart city list in India.
Climate
Bhubaneswar has a tropical savanna climate, designated Aw under the Köppen climate classification. The annual mean temperature is ; monthly mean temperatures are . Summers (March to June) are hot and humid, with temperatures in the low 30s C; during dry spells, maximum temperatures often exceed in May and June. Winter lasts for only about ten weeks, with seasonal lows dipping to in December and January. May is the hottest month, when daily temperatures range from . January, the coldest month, has temperatures varying from . The highest recorded temperature is , and the lowest is .
Rains brought by the Bay of Bengal branch of the south west summer monsoon lash Bhubaneswar between June and September, supplying it with most of its annual rainfall of . The highest monthly rainfall total, , occurs in August.
Economy
Bhubaneswar is an administrative, information technology, education and tourism city. Bhubaneswar was ranked as the best place to do business in India by the World Bank in 2014. Bhubaneswar has emerged as one of the fast-growing, important trading and commercial hub in the state and eastern India. Tourism is a major industry, attracting about 1.5 million tourists in 2011. Bhubaneswar was designed to be a largely residential city with outlying industrial areas. The economy had few major players until the 1990s and was dominated by retail and small-scale manufacturing. With the economic liberalisation policy adopted by the Government of India in the 1990s, Bhubaneswar received investment in telecommunications, information technology (IT) and higher education.
In 2011, according to a study by Associated Chambers of Commerce and Industry of India, Bhubaneswar had the highest rate of employment growth among 17 Tier-2 cities in India. It has been listed among the top ten emerging cities in India by Cushman and Wakefield, taking into consideration factors like demographics, physical, social and real estate infrastructure, current level and scope of economic activities and government support. In 2012, Bhubaneswar was ranked third among Indian cities, in starting and operating a business by the World Bank.
Bhubaneswar has been traditionally home to handicrafts industry, including silver filigree work, appliqué work, stone and wood carvings and patta painting, which significantly contributes to the city's economy. The late 2000s saw a surge of investments in the real estate, infrastructure, retail and hospitality sectors; several shopping malls and organised retails opened outlets in Bhubaneswar. In the informal sector, 22,000 vendors operate in regulated or unregulated vending zones.
As of 2001, around 2.15% of the city's workforce was employed in the primary sector (agriculture, forestry, mining, etc.); 2.18% worked in the secondary sector (industrial and manufacturing); and 95.67% worked in the tertiary sector (service industries).
The Department of Industries established four industrial areas in and around Bhubaneswar, in the Rasulgarh, Mancheswar, Chandaka, and Bhagabanpur areas. Industrial sector in Bhubaneswar includes paper, steel, automobile, food, pharma and electronics industries. A large number of companies including Odisha State Cooperative Milk Producers' Federation, Bharat Biotech, Topaz Solar, Britannia Industries, SMS Group and Jockey International have there manufacturing plant.
In 2009, Odisha was ranked ninth among Indian states in terms of software export by NASSCOM, with most IT/ITES companies established in Bhubaneswar. In 2011–12, Odisha had a growth rate of 17% for software exports. According to a 2012 survey, among the tier-2 cities in India, Bhubaneswar has been chosen as the best for conducting IT/ITES business. The government fostered growth by developing of IT parks such as Infocity-1, Infovalley, STPI-Bhubaneswar and JSS STP. Infocity was conceived as a five-star park, under the Export Promotion Industrial Parks (EPIP) Scheme to create infrastructure facilities for setting up information technology related industries. Infosys and Tech Mahindra have been present in Bhubaneswar since 1996. Other software companies include TCS, Wipro, IBM, Genpact, Firstsource, Mindtree, MphasiS, Ericsson, Semtech and Reliance Communications, AnantaTek and SA Intellect. Apart from the big multinationals, some 300 small and mid-size IT companies and business startups have offices in Bhubaneswar.
Demographics
Population
As per the 2011 census of India, Bhubaneswar had a population of 837,737, while the metropolitan area had a population of 881,988. As per the estimate of IIT Kharagpur, which made a development plan, the Bhubaneswar–Cuttack Urban complex, consisting of , has a population of 1.9 million (). , the number of males was 445,233, while the number of females were 392,504. The decadal growth rate was 45.90 per cent.
Literacy
Effective male literacy was 95.69 per cent, while female literacy was 90.26 per cent. About 75,237 were under six. Bhubaneswar's literacy rate is 93.15 per cent—significantly higher than the national average of 74.04 per cent.
Language
The main language spoken in the city is Odia. However, English and Hindi are understood by most residents. Although Odias comprise the vast majority, migrants from other states like Andhra Pradesh, Bihar, West Bengal, Rajasthan and Jharkhand also dwell in the city. Growth in the information technology industry and education sector in Bhubaneswar changed the city's demographic profile; likely infrastructure strains and haphazard growth from demographic changes have been a cause of concern.
Religion
Bhubaneswar is a very religiously diverse city. Hindus form the majority in the city with more than 95% of the total population, as of 2011 Census of India. Muslims forms the second largest minority with 3.3% and Christians with 0.92%. There is also a significant minority population of Sikhs, Buddhists and Jains.
Governance and Politics
Civic Administration
The Bhubaneswar Municipal Corporation (BMC) oversees and manages civic infrastructure for the city's 67 wards. It started as a Notified Area Committee in 1946 and was upgraded to a municipal corporation in 1994. Orissa Municipal Corporation Act, 2003 is the governing act. Residents of each ward elect a corporator to the BMC for a five-year term. Standing committees handle urban planning and maintain roads, government-aided schools, hospitals and municipal markets.
As Bhubaneswar's apex body, the corporation discharges its functions through the mayor-in-council, which comprises a mayor, a deputy mayor and other elected members. The executive wing is headed by a Commissioner. There are 13 administrative departments under BMC: PR & Communication, Disaster Management, Finance, Health & Sanitation, Engineering, Revenue & Tax, Electrical, Environment, Social Welfare, IT and Social Projects, Establishment, Land & Assets, Enforcement & Recovery. The responsibilities of the municipal body include drainage and sewerage, sanitation, solid waste management and street lighting.
The tenure of the last elected body ended in January 2019 and new elections have not taken place yet, because the High Court struck down the delimitation process that was carried out for exceeding 50% reservations of seats. Ward committees have been formed in Bhubaneswar and are very active. The Committees are responsible for issues such as public health, sanitation, street lighting and conservancy in their respective wards. There is no fixed number of members in the committees.
The processes for the municipal budget 2020-21 was initiated in February 2020, but it is unclear if they have continued after the lockdown was accounced. The budget for 2020-21 was supposed to be aroound Rs. 700, an increase of 51.8% from the 2019-20 budget. The increase was supposedly to fund the various socio-economic welfare schemes in the city. The key revenue sources for BMC are: Holding Taxes, tax from advertisements, rent from municipal properties such as markets, shopping complexes, and kalyan mandaps (marriage halls), fees and user charges, and grants from state and central governments.
Lok Sabha and Vidhan Sabha Constituencies
Citizens of Bhubaneswar elect one representative to India's lower house, the Lok Sabha, and three representatives to the state legislative assembly, through the constituencies of Bhubaneswar North, Ekamra-Bhubaneswar, and Bhubaneswar Central. The last Lok Sabha election was in 2019, when Aparajita Sarangi from Bharatiya Janata Party won the seat. The last state assembly election took place in 2019 as well, when all three Vidhan Sabha seats in Bhubaneswar were won by Biju Janata Dal: Susant Kumar Rout from North, Ashok Chandra Panda from Ekamra, and Ananta Narayan Jena from Central.
Judicial and Police Institutions
As the seat of the Government of Odisha, Bhubaneswar is home to the Odisha Legislative Assembly and the state secretariat. Bhubaneswar has lower courts: the Court of Small Causes and the District Civil Court decide civil matters; the Sessions Court rules in criminal cases. The Bhubaneswar–Cuttack Police Commissionerate, established in 2008, is a city police force with primary responsibilities in law enforcement and investigation in the Bhubaneswar-Cuttack area. Shri S.K. Priyadarshi, IPS is the police commissioner.
Public utilities
Electricity is supplied by the state-operated Central Electricity Supply Utility of Odisha. TATA Power as a private entity started Power distribution in the city by the end of 2020. Fire services are handled by the state agency Odisha Fire Service. Drinking water is sourced from the Mahanadi, Kuakhai and Daya rivers. Water supply and sewerage are handled by the Public Health Engineering Organisation. As of 2015, 35% of the city was covered by piped water connections, 1.4% of the households had metered water connection, and the extent of non-revenue water in the city ran to 62.5%. The Engineering Department of BMC creates and maintains roads.
26.7% of the city is covered by sewage network, while more than 50% of the households are dependent on onsite containment systems, such as septic tanks. There is no sewage treatment plant in Bhubaneswar right now, but one is being built using JNNURM funds. The waste from the limited sewage network flows untreated into the Daya river. There is one septage treatment plant for fecal sludge with a capacity of 75 KLD.
The municipal corporation is responsible for the solid waste management in the city. The average municipal waste generated in the city is 480 kg/m3 for wet waste and 600 kg/m3 for wet waste. Bhubaneswar Municipal Corporation BMC has introduced door to door collection through battery operated garbage collection vehicle. It is trying to introduce segregation at source by providing two waste bins to every household, one each for dry and wet waste. Landfilling is the most common method of waste disposal in Bhubaneswar. State-owned Bharat Sanchar Nigam Limited, or BSNL, as well as private enterprises, among them Reliance Jio, Vodafone, Bharti Airtel, Reliance, Idea Cellular, Aircel and Tata DoCoMo, are the leading telephone, cell phone and internet service providers in the city.
Education
Bhubaneswar is a centre for higher education in the Eastern Region and is considered the education hub of Eastern India with several government and privately funded Universities and colleges. IIT Bhubaneswar, NISER Bhubaneswar, AIIMS Bhubaneswar and NIFT Bhubaneswar are some of the elite institutions of country which are located in the city. Utkal University Bhubaneswar is the oldest university in Odisha and the 17th oldest university in India.
Primary and secondary education
Odia and English are the primary languages of instruction. Schools in Bhubaneswar follow the "10+2+3" plan for Regular Graduates and "10+2+4" plan for Technical studies. Schools in Bhubaneswar are either run by the state government or private organisations. Students typically enroll in schools that are affiliated with any of the following mediums of education.
BSE, Odisha
CHSE, Odisha
CBSE
Council for the Indian School Certificate Examinations
SCTE&VT, Odisha
Notable union government schools in the city include
Kendriya Vidyalaya No. 1, Bhubaneswar,
Sainik School,
Notable state government schools in the city include
Badagada Government High School, Bhubaneswar
Capital High School, Bhubaneswar
Government High School, Saheed Nagar
Notable private schools in the city include
DAV Public School, Unit-8, Bhubaneswar,
D.A.V. Public School, Chandrasekharpur,
Loyola School, Bhubaneswar,
Sai International School, Bhubaneswar,
St. Joseph's High School, Bhubaneswar,
Higher education
Several colleges are affiliated with universities or institution based in Bhubaneswar or elsewhere in India. Most offer a wide range of programs in STEM and applied research and are rated highly by the Ministry of Human Resource Development, India.
Engineering and applied sciences institutions
C. V. Raman Global University
Central Institute of Freshwater Aquaculture
College of Engineering and Technology, Bhubaneswar
Eastern Academy of Science and Technology
Indian Institute of Technology Bhubaneswar
Institute of Chemical Technology, Mumbai (off campus in collaboration with IndianOil and IIT Kharagpur)
Institute of Minerals and Materials Technology (IMMT, erstwhile RRL)
Institute of Physics
International Institute of Information Technology, Bhubaneswar (IIIT-BBSR or IIIT-BH)
Kalinga Institute of Industrial Technology
National Institute of Fashion Technology (NIFT)
National Institute of Science Education and Research (NISER)
Orissa Engineering College
Regional Institute of Education
Medical institutions
All India Institute of Medical Sciences Bhubaneswar
Hi-Tech Medical College & Hospital, Bhubaneswar
Institute of Medical Sciences and Sum Hospital
Kalinga Institute of Medical Sciences
Regional Medical Research Center
Universities
Birla Global University, Bhubaneswar
B.K. College of Art and Crafts
Centurion University of Technology and Management, Bhubaneswar
College of Engineering and Technology
International Institute of Information Technology, Bhubaneswar(IIIT-BBSR or IIIT-BH)
Kalinga Institute of Industrial Technology
Odisha State Open University
Odisha University of Agriculture and Technology
Rama Devi Women's University
Regional College of Management
Siksha 'O' Anusandhan
Utkal University of Culture
Utkal University
Xavier University
Professional Institute
The Institute of Cost Accountants of India -Bhubaneswar Chapter, Bhubaneswar.
The Institute of Chartered Accountants of India-Bhuneshwar Branch of EIRC
Think tanks / Research institutes
Nabakrushna Choudhury Centre for Development Studies (NCDS)
Tourism education is another field of study emerging. The Eastern Regional Centre of Indian Institute of Tourism and Travel Management (IITTM), the second in the country after Gwalior, was established in 1996. One IATA Authorised Training Centre (ATC) is also located in the city premises. Several regional management educational institutions also have travel and tourism related courses in their curriculum.
Transport
Bicycle
A public bicycle sharing project named Mo Cycle has been started by the Bhubaneswar Smart City Limited (BSCL) and the Capital Region Urban Transport (CRUT). The scheme aims to reduce traffic congestion, promote non-motorized transport in the city and ensure better last mile connectivity. Chief minister Naveen Patnaik in November 2011 inaugurated Mo Cycle.
Around 400 cycle stands have been set up across the city. Around 2,000 bicycles have been ordered from three companies - Hexi, Yaana and Yulu. Hexi (from Hero Cycles) will provide 1,000 bicycles and Yaana and Yulu will provide 500 each. The availability of rentals Bicycles are accessed by the Dedicated mobile app - "mo app".
Bus
Internal public transport is maintained by "Mo Bus (My Bus)" service administrated by CRUT(Capital Region Urban Transport) along with connecting nearest cities like Cuttack and Puri.
The headquarters of the Odisha State Road Transport Corporation (OSRTC) is in Bhubaneswar. The main Bhubaneswar inter-state bus terminus is at Barmunda, from the city centre, from where OSRTC and private operators run buses connecting Bhubaneswar to cities in Odisha and with the neighbouring states of Andhra Pradesh, Jharkhand, West Bengal and Chhattisgarh. Bhubaneswar is connected to the rest of Odisha and India by National Highway-NH 16, which is a part of the Kolkata-Chennai prong of the Golden Quadrilateral, NH 203, State Highway 13 (Odisha) and State Highway 27 (Odisha). Asian Highway- AH 45 passes through the city.
Road
Bhubaneswar has roads in grid form in the central city. Bhubaneswar has approximately of roads, with average road density of . Baramunda Inter State Bus Terminus (ISBT) is the major bus terminus in the city from where buses ply to all the districts in Odisha as well as to neighbouring state's cities like Hyderabad, Kolkata, Visakhapatnam, Raipur and Ranchi. City bus service (Mo Bus) runs across Bhubaneswar by Capital Region Urban Transport Authority run by Bhubaneswar Development Authority . A fleet of 300+ buses cover all major destinations including Cuttack, Puri and Khordha. Auto rickshaws are available for hire and on a share basis throughout the city. In parts of the city, cycle rickshaws offer short trips. To ease traffic jams, over-bridges at major road junctions and expansion of roads are under construction. In a study of six cities in India, Bhubaneswar was ranked third concerning pedestrian infrastructure. The city scored 50 points out of a maximum of 100.
Rail
Bhubaneswar has the following stations:
The East Coast Railway has its headquarters in Bhubaneswar. Bhubaneswar railway station is one of the main stations of the Indian railway network. It is connected to major cities by daily express and passenger trains and daily service to all metro cities is available from here. However, the station is overloaded by existing traffic. Currently, the station has six platforms. There are plans to add two more platforms.
A satellite station New Bhubaneswar railway station is opened near Barang in July 2018 to decongest the existing installation.
Air
Biju Patnaik International Airport (IATA: BBI, ICAO: VEBS) also known as Bhubaneswar Airport, south of the city centre, is the major and sole international airport in Odisha. There are daily domestic flights from Bhubaneswar to Delhi, Hyderabad, Mumbai, Kolkata, Vishakhapatnam, Chennai and Bangalore. There are international flights from Bhubaneswar to Bangkok and Kuala Lumpur thrice a week. The major carriers from Bhubaneswar are Indigo, Vistara, GoAir, AirAsia Berhad, AirAsia India and Air India. In March 2013, a new domestic terminal with a capacity of handling 30 million passengers per year was inaugurated to handle increased air traffic. On 10 July 2015, the first international flight took off from terminal 2 of Biju Patnaik International Airport.
Culture
Bhubaneswar is supposed to have had over one thousand temples, earning the tag of the 'Temple City of India'. Temples are made in the Kalinga architectural style with a pine spire that curves up to a point over the sanctum housing the presiding deity and a pyramid-covered hall where people sit and pray.
Famous temples include Lingaraja Temple, Muktesvara Temple, Rajarani Temple, Ananta Vasudeva Temple.
The twin hills of Khandagiri and Udayagiri, served as the site of an ancient Jaina monastery which was carved into cave-like chambers in the face of the hill. These caves, with artistic carvings, date back to the 2nd century BCE. Dhauli hills has major edicts of Ashoka engraved on a mass of rock and a white Peace Pagoda was built by the Japan Buddha Sangha and the Kalinga Nippon Buddha Sangha in the 1970s. Apart from the ancient temples, other important temples were built in recent times include Ram Mandir and ISKCON.
Bhubaneswar along with Cuttack is the home of the Odia cinema industry, dubbed "Ollywood", where most of the state's film studios are situated.
Odia culture survives in the form of Classical Odissi dance, handicrafts, sand artistry and sculpturing as well as theatre and music. Boundary walls and gardens are increasingly being redone to depict the folk art of the state. Odissi, the oldest of the eight surviving classical dance forms of India can be traced from archaeological evidence from the temples in Bhubaneswar.
Odissi dance
Odissi dance is generally accompanied by Odissi music. Srjan, the Odissi dance academy founded by Guru Kelucharan Mohapatra, the legendary Odissi dancer is found here. The Rabindra Mandapa in central Bhubaneswar plays host to cultural engagements, theatre and private functions.
Dress and attire
Though Odia women traditionally wear the sari, shalwar kameez and of late, Western attire is gaining acceptance among younger women. Western-style dress has greater acceptance among men, although the traditional dhoti and kurta are seen during festivals.
The Odisha State Museum offers archaeological artefacts, weapons, local arts and crafts as well as insights into Odisha's natural and indigenous history. The Tribal Research Institute Museum hosts authentic tribal dwellings created by tribal craftsmen. Nandankanan Zoological Park, located on the northern outskirt of the city, is India's first zoo to join World Association of Zoos and Aquariums. The State Botanical Garden (Odisha) and Regional Plant Resource Center, popularly known as Ekamra Kanan, a park and botanical garden, has a large collection of exotic and regional fauna. The Ekamra Haat is a hand-loom and handicrafts market. Nicco Park and Ocean World are amusement parks. Other museums include Pathani Samanta Planetarium, Regional Museum of Natural History, Regional Science Center and State Handicrafts Museum.
Festivals
On the day of Ashokashtami in the month of March or April, the image of Lingaraja (Shiva) and other deities are taken in a procession from Lingaraja Temple to the Mausima Temple, where the deities remain for four days. Hundreds of devotees participate in pulling the temple car that carries the deities, known as Rukuna Ratha. Ratha-Yatra, "Temple Car Festival," is the most important festival in Odisha and Bhubaneswar. The festival commemorates Jagannatha, who is said to have been the incarnation of India's revered deities, Vishnu and Krishna. Durga Puja, held in September–October, is an occasion for glamorous celebrations.
As a part of the Ekamra Festival, many cultural sub-festivals take place in January in Bhubaneswar which include Kalinga Mahotsaba (for traditional martial arts), Dhauli-Kalinga Mahotsaba (for classical dance forms), Rajarani Music Festival (for classical music) and Mukteswara Dance Festival (for Odishi dance). Residents engage in khattis, or leisurely chats, that often take the form of freestyle intellectual conversation.
Other festivals celebrated include Shivaratri, Diwali, Ganesha Chaturthi, Nuakhai and Saraswati Puja. Eid and Christmas are celebrated by the religious minorities in the city.
The Adivasi Mela, held in January, is a fair that displays the art, artefacts, tradition, culture, and music of the tribal inhabitants of Odisha. The Toshali National Crafts Mela, held in December, showcases handicrafts from all over India and from foreign countries. Other important fairs in the city include the Rajdhani Book Fair, Dot Fest and Khandagiri Utsav. Two international literary festivals are held in the city, Kalinga Literary Festival and Mystic Kalinga Festival. In modern times Bhubaneswar hosts a literary festival, the Odisha Literary Fest.
Cuisine
Key elements of the city's cuisine include rice and a fish curry known as Machha Jhola, which can be accompanied by desserts such as Rasagola, Rasabali, Chhena Gaja, Chhena Jhilli and Chhena Poda. Odisha's large repertoire of seafood dishes includes various preparations of lobsters and crabs brought in from Chilika Lake.
Street foods such as gupchup (a deep-fried crêpe, stuffed with a mix of mashed potatoes and boiled yellow peas, and dipped in tamarind-infused water), cuttack-chaat, dahi bara-aloo dum (a deep-fried doughnut-shaped lentil dumpling marinated in yogurt-infused water and served alongside potato curry) and bara-ghuguni are sold all over the city. Traditional Oriya food such as dahi-pakhala (rice soaked in water with yogurt and seasonings) which is considered as a body coolant, accompanied by badi chura or saga are consumed during the months of April–June.
The abadha of Lingaraja Temple and Ananta Vasudeva Temple served for devotees is considered a vegetarian culinary delight. Other vegetarian dishes are Dalma (made of lentils and vegetables boiled together and then fried with other spices) and Santula (lightly spiced steamed vegetables).
Sports
Bhubaneswar's major sporting arena is the Kalinga Stadium, having facilities for athletics, football, hockey, basketball, tennis, table tennis and swimming. It is known for hosting the Odisha Hockey World Cup in November–December 2018. Kalinga Lancers, the sixth franchise of Hockey India League and Odisha FC, a club of Indian Super League, are based in Bhubaneswar with Kalinga Stadium as their home ground. East Coast Railway Stadium, a prominent cricket stadium hosts Ranji Trophy and other matches.
The construction of a gallery and stadium renovation is under way. An air-conditioned indoor stadium, with a capacity of 2000 spectators for badminton, volleyball, basketball and table tennis games is also being constructed. Barabati Stadium in Cuttack, Odisha's only venue for international cricket matches, is located around away. Bhubaneswar has a franchise of Odisha Premier League, Bhubaneswar Jaguars, which started in 2010. Bhubaneswar Golf Club, a nine-hole golf course is situated in Infocity.
The Kalinga Institute of Industrial Technology Stadium commonly KIIT Stadium is a new multipurpose stadium located as a part of Kalinga Institute of Industrial Technology University Campus or KIIT University in Bhubaneswar with a capacity of 40,000 currently.
The 2017 Asian Athletics Championships was the 22nd edition of the Asian Athletics Championships. It was held from 6–9 July 2017 at the Kalinga Stadium. Bhubaneswar is the third Indian city to host the Asian Athletics Championships, with Delhi being the first, in 1989, and Pune, the second, in 2013.
Bhubaneswar is emerging as the new sports capital of India, as the FIH and the IOA president, Narindar Batra, recently stated in a ceremony, while unveiling the new logo for the Indian hockey team jersey, which is sponsored by the government of Odisha. The state, Batra mentioned, provides equal importance and opportunity for all sports such as cricket, football, field hockey, tennis, badminton, chess and many more.
Media
The city's widely circulated Odia-language newspapers are Sambad, Dharitri, Pragatibadi, Samaja, Khabara, Orissa Bhaskara, Prameya and Samaya. Orissa Post and Odia Age are the English-language newspaper that is produced and published from Bhubaneswar. Other popular English-language newspapers published and sold in Bhubaneswar include The Times of India, The Statesman, Hindustan Times, The Hindu, The Indian Express and the Asian Age. Bhubaneswar has substantial circulation of financial dailies, including The Economic Times, The Financial Express, Business Line and Business Standard. Vernacular newspapers, such as those in the Hindi, Bengali and Telugu languages are read by minorities. Major periodicals based in Bhubaneswar include Saptahika Samaya, Saptahika Samaja and Kadambini.
All India Radio, the national state-owned radio broadcaster, airs several AM channels from the radio station located in Cuttack. Bhubaneswar has five local radio stations broadcasting on FM, including two from AIR. India's state-owned television broadcaster Doordarshan Odia provides two free-to-air terrestrial channels, while a mix of Odia, Hindi, English and other regional channels are accessible via cable subscription and direct-broadcast satellite services. Some of the Odia language television channels are Colors Odia, Sarthak TV and Tarang TV. Odia-language 24-hour television news channels include News 7, Odisha TV, Kanak TV, ETV News Odia, MBC TV and Naxatra News.
Notable people
The following are some of the notable people associated with Bhubaneswar:
Subroto Bagchi
Ranjib Biswal
Dutee Chand
Nabakrushna Choudhuri
Bidhu Bhusan Das
Prabhat Nalini Das
Pankaj Charan Das
Baidyanath Misra
B. K. Misra
Bhubaneswar Mishra
Aparajita Mohanty
Bijay Mohanty
Debashish Mohanty
Gopinath Mohanty
Saraju Mohanty
Uttam Mohanty
Bibhu Mohapatra
Kelucharan Mohapatra
Mira Nair
Oopali Operajita
Sanjukta Panigrahi
Ramesh Chandra Parida
Prasanna Kumar Patasani
Biju Patnaik
Janaki Ballabh Patnaik
Naveen Patnaik
Sudarsan Pattnaik
Rakesh Pradhan
Trilochan Pradhan
Biswa Kalyan Rath
Mahasweta Ray
Tandra Ray
Archita Sahu
Salabega
Achyuta Samanta
Pathani Samanta
Mayadhar Swain
Sister cities
Cupertino, California, United States (16 August 2011)
Bloemfontein, South Africa
See also
Bhubaneswar ITIR
Chari Kshetra
List of neighbourhoods in Bhubaneswar
List of parks in Bhubaneswar
List of temples in Bhubaneswar
List of twin towns and sister cities in India
Sahadevesvara Siva Temple
Nandankanan Zoological Park
References
External links
Ekamra Kshetra – The Temple City, Bhubaneswar, UNESCO World Heritage Centre
Smart cities in India
Planned cities in India
Cities and towns in Khordha district
Populated places established in 1948 |
18767077 | https://en.wikipedia.org/wiki/INCA%20Internet | INCA Internet | INCA Internet Corporation (), also known as nProtect, is a corporation which sells computer software. INCA Internet was founded by Young Heum Joo, the current CEO and President of INCA Internet, in 2000. It offers anti-virus, anti-spyware, game security, and unified corporate security. Headquartered in Seoul, Republic of Korea, INCA Internet was selected as one of the Deloitte Technology Fast 50 Korea 2007 and Deloitte Technology Fast 500 Asia Pacific 2007.<ref
name="INCA_FAST500"></ref>
Company Overview
INCA Internet is an information security company based in Republic of Korea, and develops the 'nProtect' line of computer security products. Young Heum Joo founded the company on January 31, 2000, and is currently the CEO and President. The company currently holds more than 70% of the market share of information security for Korean financial institutions and more than 90% of game portal security. It is a public company limited by shares, Young Hem Joo being the largest stockholder, followed by JAIC from Japan and MeesPierson from the Netherlands. Other major investors include JAIC, Japan's largest independent venture capital firm, and KDB (Korea Development Bank).
The main business areas of INCA Internet include online PC security services for financial institutions, internet business corporations, and online game corporations among others, online game security solutions, a united PC security solution for corporate internal security and a B2C business such as an online Anti-Virus for normal internet users.
INCA Internet was one of the first Application Service Provider (ASP) companies in the online PC security industry. The products are widely used by Korean and Japanese financial institutions, public institutions, worldwide on-line game companies.
INCA Internet was awarded the IR52 Jang Yeong-sil award, which is regarded as the highest and most reputable award in the Korean industrial technology field. It acquired the ISO 9000 Certificate by TUViT, an IT certification institution affiliated to the German RWTUV group. INCA Internet was the only information security company in South Korea to be included in the Deloitte Technology Fast500 Asia Pacific 2007. INCA Internet currently has client companies in 23 countries and a total of
more than 200 million users in over 170 countries.
History
INCA Internet first entered the market in January 2000, and acquired a global patent through 'nProtect Netizen' which was the first program to provide a real-time client PC information security service. INCA Internet has developed into a strong corporation with an independent technology and is leading the Korean and Japanese security market in the financial and electronic commerce industry.
Since December 2005, INCA Internet has been located within the Guro Digital Complex, which is the largest IT industrial complex of South Korea and played a pivotal role in the economic growth of Korea, referred to as the "Miracle on the Han" contributing 10% of national exports in the 1970s. It is a futuristic industrial hub, centering on research and development, advanced information, technology, and knowledge industries. The relocation has had a great synergy effect on INCA Internet and many IT corporations located here have benefited through information sharing and partnerships.
Markets
All INCA Internet nProtect products apply a SaaS (software as a service) model. It was the first company of the security industry to provide internet banking security online and has since spread the SaaS model into PC security and web security.
The company currently holds more than 70% of the market share of information security for Korean financial institutions and more than 90% of game portal security. Internationally, INCA Internet mainly provides security solutions for China, Japan, South-east Asia, and Europe. Companies such as JCB Card, UFJ, Tokyo Star Bank are among some of the corporations using INCA Internet's protection.
Products
nProtect GameGuard
Online Game Security System
Provides game security for online game companies and portal sites in the form of B2B2C to provide security to games and game users (from hacking, cracking, user account information stealing, system viruses and other cyber crimes)
Bundled with many multiplayer online games such as Aion: The Tower of Eternity, Phantasy Star Universe, MapleStory, GunBound, GunZ: The Duel, Sudden Attack, FlyFF, Ragnarok Online and 9dragons
Hides the game application process, monitors the entire memory range, terminates applications defined by the game vendor and INCA to be cheats, blocks certain calls to DirectX functions and Windows APIs and auto-updates itself to change as new threats surface.
GameGuard is a subject of some controversy as the program itself is a rootkit that is installed without user authorization on their client machine.
nProtect Netizen, nProtect Personal, nProtect Keycrypt
ASP based PC Security
Provides protection for internet banking, electronic commerce and online transactions
24-hour stabilization service and provides customization for clients
Many business models are possible such as B2B2C, B2C, B2B according to the customer and client preferences and goals
nProtect Anti-Virus/Spyware, nProtect GameGuard Personal 2007
Anti-virus Solution
Provides end-user clients with real-time protection from viruses, spyware, hacking tools and other malware
GameGuard Personal product which contains PC optimization, game account protection, and Game Mode features for game users
File Management feature for file encryption/decryption and Secure Deletion
nProtect Enterprise
Unified Solution
Provides protection for corporations, public institutions, research facilities and educational institutions in the form of B2B based on PC firewall technology and provides a unified PC security solution for corporate users,
Provides unified administrator features for security managers and electronic managers within the organization.
Prevention of information leakage of sensitive and confidential information through information asset security.
nProtect WebScan
Web Security
Provides web security by inspecting the security vulnerabilities of applications providing services through the web and providing detailed descriptions and solutions to the vulnerabilities.
Inspects the Top 10 recommended security inspections by OWASP and further inspects for new, popular attacks and vulnerabilities of the server or service.
Provides fast inspection through multi-thread inspection and also provides a simulated hacking tool that can be used to simulate a security breach for security vulnerabilities found to provide a better understanding of the vulnerability.
Criticism
Their programs are widely used in the Korean internet environment; and depend on ActiveX and Microsoft Windows. Internet banks in the Korea need these programs by law, so users using Linux, Mac OS X, or other browsers or operating systems besides Internet Explorer and Microsoft Windows can not access these online banks.
Most of the functions run at kernel level of an OS, so versions of Windows that use UAC or User Account Control (Windows Vista, Windows 7 and higher.) are unable to run smoothly. Moreover, this program can crash kernel of x64 windows system and some input devices especially USB Keyboard, in conjunction with nProtect caused by same reason.
nProtect Netizen, nProtect Personal and nProtect Keycrypt are programs used mostly for internet banking in Korea. They are programmed to terminate processes that are not associated with banking, but processes are terminated indiscriminately if they are deemed a threat and thus may compromise a system's stability. These programs also inject themselves into all existing processes from startup, and sometimes collide with other anti-viruses. More problematically, Korean banks do not update their program every time INCA releases an update.
See also
nProtect GameGuard
Anti-Virus Software
Notes and references
Computer security software companies
Antivirus software
Software companies of South Korea
Companies based in Seoul
South Korean brands |
12362880 | https://en.wikipedia.org/wiki/Wikivoyage | Wikivoyage | Wikivoyage is a free web-based travel guide for travel destinations and travel topics written by volunteer authors. It is a sister project of Wikipedia and supported and hosted by the same non-profit Wikimedia Foundation (WMF). Wikivoyage has been called the "Wikipedia of travel guides".
The project began when editors at the German and then Italian versions of Wikitravel decided in September 2006 to move their editing activities and then current content to a new site, in accordance with the site copyright license, a procedure known as "forking". The resulting site went live as "Wikivoyage" on December 10, 2006, and was owned and operated by a German association set up for that purpose, Wikivoyage e.V. (which continues to be its representative association). Content was published under the copyleft license Creative Commons Attribution-ShareAlike.
In 2012, after a long history of problems with their existing host, the English-language version community of Wikitravel also decided as a community to fork their project. In a two-way move, the English Wikitravel community re-merged with Wikivoyage under the Wikivoyage brand. In addition, all Wikivoyage language versions moved their operations to be hosted by the Wikimedia Foundation, a non-profit organization hosting several of the world's largest wiki-based communities such as Wikipedia. Following agreements by the various communities involved and the Wikimedia Foundation, the site was moved to the WMF servers in December 2012 and the whole of Wikivoyage was officially re-launched as a Wikimedia project on January 15, 2013, the day of the 12th anniversary of Wikipedia's launch.
Description
Using a wiki model, Wikivoyage is built through collaboration of Wikivoyagers from around the globe. Articles can cover different levels of geographic specificity, from continents to districts of a city. These are logically connected in a hierarchy, by specifying that the location covered in one article "is within" the larger location described by another. The project also includes articles on travel-related topics, phrasebooks for travelers, and suggested itineraries.
Wikivoyage is a multilingual project available in languages, with each language-specific project developed independently. While now a Wikimedia project, it was begun independently. Wikivoyage content is broadly categorized as: destinations, itineraries, phrasebooks, and travel topics.
Destinations
Geographical units within the geographical hierarchy may be described in articles, based on the criterion, "can you sleep there?"
The hierarchy includes:
Continents
Continental sections (like the Nordic countries)
Countries
Regions within countries (provinces, counties, states, groups of states etc.)
Cities of any size, including fairly small villages if they are tourist destinations
Districts within large cities
National parks provided they have accommodation for the traveller
Attractions such as hotels, restaurants, bars, stores, nightclubs, tour operators, monuments, museums, statues or other works of art, city parks, town squares or streets, festivals or events, transport systems or stations, landscapes, bodies of water, and uninhabited islands are listed in the article for the place within which they are located, but they do not get their own articles.
Itineraries
An itinerary describes a group of destinations according to a temporal division rather than a spatial one and will list destinations and attractions to visit during a given amount of time, with recommended durations of stay and routes to follow. Itineraries may cross geographical regions, but usually have a well-defined path.
Phrasebooks
A phrasebook includes:
An overview of the language, giving a brief history, scope (where it is spoken, how many speakers), alphabet or symbol set, and any other general info on the language.
A pronunciation guide, with a description of each written symbol in the language (that is, its alphabet), and a pronunciation note for each symbol.
A phrase list. Each entry in the phrase list includes the word or phrase being translated, the spelling in the local language symbol set as it would be seen written down, and a pronunciation cue.
Travel topics
Travel topics are articles that deal with a specific topic of interest to travelers that is too large or detailed to go in a specific travel guide destination page; travel tips that are so general that they apply to nearly all destinations and do not need to be in each specific travel guide; major events that occur in different places; and specialist travel information, such as regional guides to scuba-diving sites.
Organization and operation
Mode of operation
Wikivoyage uses the free MediaWiki software (developed for Wikipedia) to allow internet-based editing without requiring registration. Quality assurance occurs in the same way as on Wikipedia: through reciprocal control by editors. The use of the same software was intended to facilitate familiarization with Wikivoyage.
Copyright
Wikivoyage licenses its content to the public under the Creative Commons Attribution-ShareAlike license, but not the GNU Free Documentation License. This is intended to facilitate the production of printed guides from a legal point of view. Media files are intended to be published either in the public domain or licensed under multiple licenses (GNU, Creative Commons).
Information structure
The information is built up in a more structured way than usual for encyclopaedias. Articles belonging to a topic are grouped by the categories known from the Mediawiki software as well as through the so-called bread crumb trails which show the geographical connection between the articles.
In the German-language version, different name spaces are used to separate different topics. The main name space contains travel destinations within their geographical hierarchy. Two other important name spaces are reserved for travel topics and travel news, with the intent to allow a tight interconnection between travel destinations and topics.
The content design is decided by consensus of the community of authors.
Languages
At the time of transfer to WMF, Wikivoyage was available in German, Italian, English, French, Dutch, Russian, and Swedish language versions. The Russian-language project is named Викигид (which translates roughly as "wiki guide"). In January 2013, Portuguese and Spanish versions were created, followed in March by Polish and Romanian, in April by Hebrew and Ukrainian, in May by Greek, and the Vietnamese in August. The Chinese version started in January 2014 and Persian in October. The Finnish version launched in November 2016, Hindi in September 2017 and Bengali and Pashto in June 2018. A Japanese version began in August 2020 and in 2021, a Turkish version began.
Statistics
As of , there are Wikivoyage sites for languages of which are active and are closed. The active sites have articles. There are registered users of which were recently active.
The top ten Wikivoyage language projects by mainspace article count:
For a complete list with totals see Wikimedia Statistics:
Distribution
The choice of the Creative Commons Attribution-ShareAlike copyright license is intended to allow simplified distribution by mention of the authors, without the need to state the complete license text.
Creative Commons Attribution-ShareAlike allows distribution through mirrors or by other means of modern media. Up-to-date archives are provided on a weekly basis. The files contained in these archives are provided with all the necessary legal licensing information, e.g. the attribution of the authors.
History
The name is a portmanteau of the words "Wiki" (an Internet-based software system that allows change and extension of the text by any user) and "voyage", meaning travel, journey, or trip. It was retained after extensive voting amongst established editors to decide on the post re-launch name.
Launch
Many Wikivoyage authors and administrators started by working on Wikitravel, which was started by Evan Prodromou and Michele Ann Jenkins in July 2003. By April 2004 the wiki's collection totalled over 1,200 destinations. A year later the project was acquired by the for-profit Internet Brands, an operator of media and e-commerce sites. Discontent increased in response to the management style of the new owners, which led to the contributors of the German and Italian language editions leaving to setup their own independent project, while forking the content on Wikitravel.
After about six months of preparation, the non-profit association Wikivoyage e.V. was founded and registered, as both the owner of the domain names and operator of the servers. On December 10, 2006, the project went live online with the initial data from the German-language Wikitravel. After seven months, 40% of the articles were new, rising to 50% after 10 months. At this stage there were still major gaps in the coverage, but there were several articles for travel destinations like Egypt, Thailand and Switzerland and for the travel topic "cycling".
The Italian branch of Wikivoyage was launched on December 10, 2007. The organization of media data and the administration of user access were already applicable for use in branches in other languages.
The project garnered some press reports, particularly by Swiss radio and newspapers. The Tages-Anzeiger from Zurich and the Swiss radio station DRS1 reported broadly on the project and discussed its weaknesses. The project was mainly supported by German and Swiss authors.
Additional languages and migration
In 2012, after a lengthy history of dissatisfaction with Wikitravel's host and owner, Internet Brands, it was proposed that the community at Wikitravel fork their work from Wikitravel and Wikitravel Shared and – together with the existing sites at Wikivoyage – merge to create a new travel wiki hosted by the Wikimedia Foundation, the steward of Wikipedia and a large range of other non-profit reference sites based upon a wiki community culture. After lengthy discussion by users of all three communities, comments by their respective hosts, and confirmation by the Wikimedia Foundation that it would host a travel project if users wished, nearly all administrators and bureaucrats at Wikitravel decided to fork their existing work to Wikivoyage.
The contents of Wikitravel in all languages and its related Commons-equivalent site (for images, video, and other media files) were downloaded on August 2, 2012 as a "database dump" in preparation for such a migration. This content became the starting point for all languages excluding German and Italian, which were already hosted by Wikivoyage. Forking is a normal or anticipated activity in wiki communities and is expressly permitted by the Creative Commons–Attribution–Share Alike (CC BY-SA) copyright license in use on sites such as Wikitravel. MediaWiki, the wiki software used for Wikitravel, included that facility, although Internet Brands disabled the function shortly after this date in an attempt to prevent the data migration. The community discussion at Wikimedia ended on August 23, 2012 with 540 votes for and 152 votes against the creation of a Wikimedia Foundation travel guide. The project began in beta on WMF servers on November 10, 2012 and was launched fully on January 15, 2013.
As part of the migration, it is planned that current owners and user body "Wikivoyage e.V." will remain in place as an associated organization affiliated with the Wikimedia Foundation "at an organizational level". Wikivoyage stated that, freed of the need to maintain its servers, it would be able to benefit by increasing its work related to outreach, community support, discussion and information, and technical enhancements to the site's software.
In September 2012, Internet Brands filed a lawsuit against one Wikitravel administrator, Ryan Holliday, and one Wikipedia administrator, James Heilman, accusing them of trademark breach and commercial misconduct in the proposals affecting that site, with the defendants and Wikimedia rejecting the case as an example of a SLAPP lawsuit—one that is undertaken without plausible legal grounds for the primary purpose of deterring, overwhelming, or frustrating people engaged in fully lawful actions. On November 19, 2012, the claims by Internet Brands were dismissed by the United States District Court for the Central District of California.
Growth trends in number of articles and active users
In 2016 English Wikivoyage experienced an increase in number of articles (about +1% per month) and a stable amount of activity (about 300 monthly active users and 800 total monthly editors).
Historical Alexa rank vs. that of Wikitravel
After a peak in visits and activity between January and March 2013, confirmed by an Alexa global rank of about 8000 in March for English Wikivoyage, 2013 Wikivoyage was for a time between the 20,000 and 30,000 position in the global Alexa rank, lower than Wikitravel's rank which, however, declined from around the 3,000th position in 2011 to about 6,000th in 2015. , Wikivoyage's Alexa rank was between 16,000 and 17,000 and Wikitravel's rank was around 20,000.
See also
Travel technology
Travel website
References
External links
English-language Wikivoyage, official website
Creative Commons-licensed websites
Internet properties established in 2006
MediaWiki websites
Multilingual websites
Travel websites
Wiki communities
Wikimedia projects
Advertising-free websites |
30889386 | https://en.wikipedia.org/wiki/Reception%20of%20WikiLeaks | Reception of WikiLeaks | The WikiLeaks whistleblowing website founded by Julian Assange has received praise as well as criticism. The organisation has won a number of awards, including The Economist's New Media Award in 2008 at the Index on Censorship Awards and Amnesty International's UK Media Award in 2009. In 2010, the New York Daily News listed WikiLeaks first among websites "that could totally change the news", and Julian Assange received the Sam Adams Award and was named the Readers' Choice for TIME's Person of the Year in 2010. The UK Information Commissioner has stated that "WikiLeaks is part of the phenomenon of the online, empowered citizen". In its first days, an Internet petition calling for the cessation of extrajudicial intimidation of WikiLeaks attracted over six hundred thousand signatures. Supporters of WikiLeaks in the media and academia have commended it for exposing state and corporate secrets, increasing transparency, supporting freedom of the press, and enhancing democratic discourse while challenging powerful institutions.
At the same time, several U.S. government officials have criticized WikiLeaks for exposing classified information and claimed that the leaks harm national security and compromise international diplomacy. From the perspective of the U.S. security establishment, the issue of concern is not only the publication of sensitive information but also, at a deeper level, the anonymity afforded by the internet. Several human rights organisations requested with respect to earlier document releases that WikiLeaks adequately redact the names of civilians working with international forces, in order to prevent repercussions. Some journalists have likewise criticised a perceived lack of editorial discretion when releasing thousands of documents at once and without sufficient analysis. In response to some of the negative reaction, the UN High Commissioner for Human Rights has expressed her concern over the "cyber war" against WikiLeaks, and in a joint statement with the Organization of American States the UN Special Rapporteur has called on states and other actors to keep international legal principles in mind.
Background
Timeline
2006: Julian Assange, an Australian programmer and activist, founded WikiLeaks which the intention of publishing leaked documents.
2010: WikiLeaks came to international attention when it published a series of leaks provided by U.S. Army intelligence analyst Chelsea Manning. These leaks included the Baghdad airstrike Collateral Murder video (April 2010), the Afghanistan war logs (July 2010), the Iraq war logs (October 2010), and Cablegate (November 2010). After the 2010 leaks, the United States government launched a criminal investigation into WikiLeaks.
2013: Assange stood for the Australian Senate for the short-lived WikiLeaks Party but failed to win a seat.
2016: During the 2016 U.S. election campaign, WikiLeaks published confidential Democratic Party emails, showing that the party's national committee favoured Hillary Clinton over her rival Bernie Sanders in the primaries.
Public opinion
: A UMR Research December 2010 poll showed that the majority of Australians are against the official government position on WikiLeaks. The findings which were done on 1,000 individuals show 59% support WikiLeaks' action in making the cables public and 25% oppose it. This was asked a few weeks after the initial release of the cables. The poll also looked at issues in relation to Julian Assange, with the results showing a positive opinion on him.
: According to a telephone survey of 1,004 German residents age 18 and older, which was conducted end of November for the German public broadcaster ARD, a majority of 53% disapprove of WikiLeaks, while 43% are generally in favour of the platform. Asked about the specific release of US diplomatic cables, almost two-Thirds (65%) believe that these documents should not be published, compared to 31% that agree that they are being released to the public.
: A December 2010 a Gallup poll found that 52% of Pakistanis believe that "America herself has published the documents on purpose to create unrest," while 24% believe that this is not the case and 24% did not respond.
: A CNN poll of 2,010 British adults conducted in December 2010 revealed that more people agree than disagree that WikiLeaks was right to release the cables, by 42% to 33%. The remaining 25% did not have a position. According to the same poll 41% of Britons believe that Assange should not be prosecuted for releasing the secret diplomatic cables, while 30% do want him prosecuted. Almost half of the respondents (44%) also believe that the sex charges against Assange are "an excuse" to keep him in custody so that the U.S. government can prosecute him for releasing secret diplomatic cables, while only 13% disagree. Nevertheless, almost half of Britons stated that their government should send Assange to Sweden for questioning. Older people were significantly more likely to oppose WikiLeaks. While 42% of persons 65 and older say Assange should be prosecuted for releasing the secret diplomatic cables, this view is only held by 21% of those between 25 and 34.
: According to a telephone survey of 1,029 US residents age 18 and older, conducted by the Marist Institute for Public Opinion in December 2010, 70% of American respondents – particularly Republicans and older people – think the leaks are doing more harm than good by allowing enemies of the United States government to see confidential and secret information about U.S. foreign policy. Approximately 22% – especially young liberals – think the leaks are doing more good than harm by making the U.S. government more transparent and accountable. A majority of 59% also want to see the people behind WikiLeaks prosecuted, while 31% said the publication of secrets is protected under the First Amendment guarantee of a free press.
Response from governments
Australia
On 16 March 2009, the Australian Communications and Media Authority added WikiLeaks to their proposed list of sites that will be blocked for all Australians if the mandatory internet filtering scheme is implemented as planned. The blacklisting had been removed by 29 November 2010.
On 2 December 2010, Prime Minister Julia Gillard made a statement that she 'absolutely condemns' WikiLeaks' actions and that the release of information on the site was 'grossly irresponsible' and 'illegal.' WikiLeaks founder Julian Assange is Australian and he responded two days later by accusing his prime minister of betraying him as an Australian citizen. However, on 8 December 2010 – after WikiLeaks published U.S. diplomatic cables in which United States diplomats labelled him a "control freak", former Australian Prime Minister and Foreign Minister (now resigned) Kevin Rudd said the leak of the US secret cables raised questions about US security. Rudd said, "The core responsibility, and therefore legal liability, goes to those individuals responsible for that initial unauthorised release." In an article in The Australian, Assange claimed, "The Australian attorney-general is doing everything he can to help a US investigation clearly directed at framing Australian citizens and shipping them to the US." However, Australian officials later said that Assange has done nothing illegal. Since then, representatives of the Australian Federal Government and the major opposition including Craig Emerson the Minister for Trade have come out in support of WikiLeaks and against some violent rhetoric directed against them, stating; "We condemn absolutely the threats that have been made by some people in the United States against Julian Assange."
Brazil
President Luiz Inácio Lula da Silva expressed his "solidarity" with Julian Assange following Assange's 2010 arrest in the United Kingdom. Lula went on to state – in reference to WikiLeaks disclosure of classified US diplomatic cables in November and December 2010 – WikiLeaks had "exposed a diplomacy that had appeared unreachable." He further criticised the arrest of Julian Assange as "an attack on freedom of expression".
China
The WikiLeaks website claims that the government of the People's Republic of China has attempted to block all traffic to websites with "wikileaks" in the URL since 2007, but that this can be bypassed by encrypted connections or by using one of WikiLeaks' many covert URLs.
Ecuador
In late November 2010, a representative of the government of Ecuador made what was, apparently, an unsolicited public offer to Julian Assange to establish residency in Ecuador. Deputy Foreign Minister Kinto Lucas stated "we are going to invite him to come to Ecuador so he can freely present the information he possesses and all the documentation, not just on the Internet, but in various public forums." Lucas went on to state his praise for WikiLeaks and Assange calling them "[people] who are constantly investigating and trying to get light out of the dark corners of [state] information." The following day, however, president Rafael Correa distanced his administration from the offer stating that Lucas had been speaking for himself and not on the government's behalf. Correa then criticised Assange for "breaking the laws of the United States and leaking this type of information."
France
The French Industry Minister Éric Besson said in a letter to the CGIET technology agency, WikiLeaks "violates the secret of diplomatic relations and puts people protected by diplomatic secret in danger." Therefore, it would be 'unacceptable' that the site was hosted on servers based in France. The minister asked for measures to bar WikiLeaks from France.
Germany
The home of Theodor Reppe, registrant of the German WikiLeaks domain name, wikileaks.de, was raided on 24 March 2009 after WikiLeaks released the Australian Communications and Media Authority (ACMA) censorship blacklist. The site was not affected.
Iceland
After the release of the 2007 Baghdad airstrikes video and as they prepared to release film of the Granai airstrike, Julian Assange has said that his group of volunteers came under intense surveillance. In an interview and Twitter posts he said that a restaurant in Reykjavík where his group of volunteers met came under surveillance in March; that there was "covert following and hidden photography" by police and foreign intelligence services; that an apparent British intelligence agent made thinly veiled threats in a Luxembourg car park; and that one of the volunteers was detained by police for 21 hours. Another volunteer posted that computers were seized, saying "If anything happens to us, you know why... and you know who is responsible." According to the Columbia Journalism Review, "the Icelandic press took a look at Assange's charges of being surveilled in Iceland [...] and, at best, have found nothing to substantiate them."
In August 2009, Kaupthing Bank secured a court order preventing Iceland's national broadcaster, RÚV, from broadcasting a risk analysis report showing the bank's substantial exposure to debt default risk. This information had been leaked to WikiLeaks and remained available on the WikiLeaks website; faced with an injunction minutes before broadcast, the channel aired a screen-shot of the WikiLeaks site instead of the scheduled piece on the bank. Citizens of Iceland were reported to be outraged that RÚV was prevented from broadcasting news of relevance. Therefore, WikiLeaks has been credited with inspiring the Icelandic Modern Media Initiative, a bill meant to reclaim Iceland's 2007 Reporters Without Borders (Reporters sans frontières) ranking as first in the world for free speech. It aims to enact a range of protections for sources, journalists, and publishers. Birgitta Jónsdóttir, a former WikiLeaks volunteer and member of the Icelandic parliament, is the chief sponsor of the proposal.
India
In identical statements to both Houses of Parliament on 18 March 2011, then Prime Minister Manmohan Singh rejected all allegations against his government revealed by the United States diplomatic cables leak, including allegations of bribery during the 2008 Lok Sabha vote of confidence. Singh told Parliament, "The Government of India cannot confirm the veracity, contents or even the existence of such communications. I may point out that many of the persons referred to in those reports have stoutly denied the veracity of the contents. An issue was raised that the offence of bribery was committed in India. Government rejects that allegation absolutely and firmly."
In an interview with Times Now, Julian Assange labelled the Indian government's response as "one of the worst in the world" and a "clear attempt to mislead the nation on what the cables were". Assange stated, "The response by the government left a lot to be desired. Before it was clear to me that Prime Minister Mr. Singh was deliberately attempting to mislead the Indian people on what type of material this was. People tell me that he is not personally corrupt, I do not know myself as I don't have information on that. But, his reaction left a lot to be desired. It wasn't to fully and frankly investigate what was going on and then provide finding to the parliament. Rather, it was attempt to spin the issue and I suspect that has come from experience in dealing with similar scandals in the past."
Iran
The President of Iran, Mahmoud Ahmadinejad, also criticised WikiLeaks following the release of United States diplomatic cables. Ahmadinejad claimed that the release of cables purporting to show concern with Iran by Arab states was a planned leak by the United States to discredit his government, though he did not indicate whether he believed WikiLeaks was in collusion with the United States or was simply an unwitting facilitator.
Libya
Muammar Gaddafi blamed WikiLeaks for the Tunisian revolution "[Do not be fooled by] WikiLeaks which publishes information written by lying ambassadors in order to create chaos."
Philippines
President Benigno Aquino III condemned WikiLeaks and leaked documents related to the country, saying that it can lead to massive cases of miscommunication.
Russia
In December 2010, the office of the Russian president Dmitry Medvedev issued a statement calling on non-governmental organisations to consider "nominating [Julian] Assange as a Nobel Prize laureate." The announcement followed commentary by Russian ambassador to NATO Dmitry Rogozin who stated that Julian Assange's earlier arrest on Swedish charges demonstrated that there was "no media freedom" in the west.
Thailand
The Centre for the Resolution of the Emergency Situation (CRES) is currently censoring the WikiLeaks website in Thailand and more than 40,000 other websites because of the emergency decree declared in Thailand at the beginning of April 2010 as a result of political instabilities.
Turkey
The Turkish government blocked access to Wikileaks on 20 July 2016 after it released nearly 300,000 emails involving the ruling Justice and Development Party. The email releases were in response to the 2016 Turkish coup d'état attempt.
United Nations
In December 2010 United Nations Special Rapporteur for Freedom of Opinion and Expression Frank LaRue stated he agreed with the idea that Julian Assange was a "martyr for free speech." LaRue went on to say Assange or other WikiLeaks staff should not face legal accountability for any information they disseminated, noting that, "if there is a responsibility by leaking information it is of, exclusively of the person that made the leak and not of the media that publish it. And this is the way that transparency works and that corruption has been confronted in many cases." High Commissioner for Human Rights, Navi Pillay, subsequently voiced concern at the revelation that private companies were being pressured by states to sever their relationships with WikiLeaks.
United States
On 17 July 2010, Jacob Appelbaum spoke on behalf of WikiLeaks at the Hackers on Planet Earth conference in New York City, replacing Assange because of the presence of federal agents at the conference. He announced that the WikiLeaks submission system was again operating, after it had been suspended temporarily. Assange was a surprise speaker at a TED conference on 19 July 2010 in Oxford, England, and confirmed that the site had begun accepting submissions again.
Upon returning to the US from the Netherlands, on 29 July, Appelbaum was detained for three hours at the airport by US agents, according to anonymous sources. The sources told CNET that Appelbaum's bag was searched, receipts from his bag were photocopied, and his laptop computer was inspected, although in what manner was unknown. Appelbaum reportedly refused to answer questions without a lawyer present, and was not allowed to make a telephone call. His three mobile telephones were reportedly taken and not returned. On 31 July, he spoke at a Defcon conference and mentioned his telephone being "seized". After speaking, he was approached by two FBI agents and questioned.
Access to WikiLeaks is currently blocked in the United States Library of Congress. On 3 December 2010 the White House Office of Management and Budget sent a memorandum forbidding all unauthorised federal government employees and contractors from accessing classified documents publicly available on WikiLeaks and other websites. The U.S. Army, the Federal Bureau of Investigation, and the Justice Department are considering criminally prosecuting WikiLeaks and Assange "on grounds they encouraged the theft of government property", although former prosecutors say doing so would be difficult. According to a report on the website Daily Beast, the Obama administration asked the UK, Germany, and Australia among others to also consider bringing criminal charges against Assange for the Afghan war leaks and to help limit Assange's travels across international borders. Columbia University students have been warned by their Office of Career Services that the U.S. State Department had contacted the office in an email saying that the diplomatic cables which were released by WikiLeaks were "still considered classified" and that "online discourse about the documents 'would call into question your ability to deal with confidential information'".
All U.S. federal government staff have been blocked from viewing WikiLeaks.
As for individual responses, government officials had mixed feelings. Although Hillary Clinton refused to comment on specific reports, she claimed that the leaks "put people's lives in danger" and "threatens national security". Former United States Secretary of Defense Robert Gates commented, "Is this embarrassing? Yes. Is it awkward? Yes. Consequences for U.S. foreign policy? I think fairly modest."
Following the November 2010 release of United States diplomatic cables, U.S. Secretary of State Hillary Clinton denounced the group saying, "this disclosure is not just an attack on America's foreign policy interests, it is an attack on the international community." Peter King, chairman of the Homeland Security Committee of the United States House of Representatives has stated his support of Clinton's position for listing WikiLeaks as a "foreign terrorist organisation" explaining that "WikiLeaks presents a clear and present danger to the national security of the United States." In a contrary statement, secretary of Defense Robert Gates has said that concerns about the disclosures were "over-wrought" in terms of their likely adverse impact on ordinary diplomatic activities. Philip J. Crowley, United States Assistant Secretary of State for Public Affairs, stated on 2 December 2010 that the US State Department does not regard WikiLeaks as a media organisation. "WikiLeaks is not a media organisation. That is our view." Crowley said and with regard to Assange;"Well, his – I mean he could be considered a political actor. I think he's an anarchist, but he's not a journalist."
US Senator Joe Lieberman called on Amazon.com to shut down a WikiLeaks web-site, praised the company for doing so, and called for other companies to follow suit. He also proposed new legislation targeting similar cases – Securing Human Intelligence and Enforcing Lawful Dissemination Act (SHIELD Act). Lieberman later said that also The New York Times and other news organisations publishing the US embassy cables being released by WikiLeaks could be investigated for breaking US espionage laws. After these statements the US Ambassador to Australia assured the Australian government and people that "The concerns we have do not centre on Julian Assange and they never should have"
U.S. Secretary of State and former CIA Director Mike Pompeo has held mixed views on WikiLeaks, citing leaked e-mails from Hillary Clinton, campaign chair John Podesta, and former Democratic National Committee chairperson Debbie Wasserman Schultz even using his Twitter as a platform to call attention to the "newly released emails of Hillary Clinton and her cronies," before a FOX appearance on the same topic. In April 2017, as CIA Director Mike Pompeo called WikiLeaks "a non-state hostile intelligence service often abetted by state actors like Russia."
In April 2017, AG Jeff Sessions stated that arresting Julian Assange of Wikileaks was a priority: "We have professionals that have been in the security business of the United States for many years that are shocked by the number of leaks and some of them are quite serious. So yes, it is a priority. We've already begun to step up our efforts and whenever a case can be made, we will seek to put some people in jail."
Venezuela
Hugo Chávez, president of Venezuela, stated his support for WikiLeaks following the release of US diplomatic cables in November 2010 that showed the United States had tried to rally support from regional governments to isolate Venezuela. "I have to congratulate the people of WikiLeaks for their bravery and courage," Chávez commented in televised remarks.
Response from media
People's Republic of China
Chinese journalist Shi Tao was sentenced to 10 years imprisonment, in 2005 after publicising an email from Chinese officials about the anniversary of the Tiananmen Square massacre. An article in The New Yorker said:
Assange responded to the suggestion that eavesdropping on Chinese hackers played a crucial part in the early days of WikiLeaks by saying "the imputation is incorrect. The facts concern a 2006 investigation into Chinese espionage one of our contacts was involved in. Somewhere between none and handful of those documents were ever released on WikiLeaks. Non-government targets of the Chinese espionage, such as Tibetan associations were informed (by us)".
Russian Federation
Russian investigative reporter Andrei Soldatov has criticised WikiLeaks for disclosing documents "without checking of the facts, without putting them in context, and without analysing them." Soldatov believes WikiLeaks is "filling the gap" left by the decline of investigative journalism with a sensationalist alternative while journalistic support of WikiLeaks is motivated by anger over declining funding and resources for investigative reporting.
Response from corporations
U.S. diplomatic cables leak responses
According to The Times (London), WikiLeaks and its members have complained about continuing harassment and surveillance by law enforcement and intelligence organisations, including extended detention, seizure of computers, veiled threats, "covert following and hidden photography." Two lawyers for Julian Assange in the United Kingdom told The Guardian that they believed they were being watched by the security services after the U.S. cables leak, which started on 28 November 2010.
Furthermore, several companies ended association with WikiLeaks. After providing 24-hour notification, American-owned EveryDNS deleted WikiLeaks from its entries on 2 December 2010, citing DDoS attacks that "threatened the stability of its infrastructure". The website's 'info' DNS lookup remained operational at alternative addresses for direct access respectively to the WikiLeaks and Cablegate websites. On the same day, Amazon.com severed its association with WikiLeaks, to which it was providing infrastructure services, after an intervention by an aide of U.S. Senator Joe Lieberman. Amazon denied acting under political pressure, citing a violation of its terms of service. Citing indirect pressure from the U.S. Government, Tableau Software also deleted WikiLeaks' data from its website for people to use for data visualisation.
During the days following, hundreds of (and eventually more than a thousand) mirror websites of the WikiLeaks website were established, and the Anonymous group of Internet activists asked sympathizers to attack the websites of companies which opposed WikiLeaks, under the banner of Operation Payback, previously directed at anti-piracy organisations. AFP reported that attempts to deactivate the wikileaks.org address had resulted in the website surviving via the so-called Streisand effect, whereby attempts to censor information online causes it to be replicated in many places.
On 3 December, PayPal, the payment processor owned by eBay, permanently ended the account of the Wau Holland Foundation that had been redirecting donations to WikiLeaks. PayPal alleged that the account violated its "Acceptable Use Policy", specifically that the account was used for "activities that encourage, promote, facilitate or instruct others to engage in illegal activity." The Vice President of PayPal stated later that they stopped accepting payments after the "State Department told us these were illegal activities. It was straightforward." Later the same day, he said that his previous statement was incorrect, and that it was in fact based on a letter from the State Department to WikiLeaks. On 8 December 2010, the Wau Holland Foundation released a press statement, saying it has filed a legal action against PayPal for blocking its account used for WikiLeaks payments and for libel due to PayPal's allegations of "illegal activity".
On 6 December, the Swiss bank PostFinance announced that it had frozen the assets of Assange that it holds, totalling €31,000. In a statement on its website, it stated that this was because Assange "provided false information regarding his place of residence" when opening the account. WikiLeaks released a statement saying this was because Assange, "as a homeless refugee attempting to gain residency in Switzerland, had used his lawyer's address in Geneva for the bank's correspondence".
On the same day, MasterCard announced that it was "taking action to ensure that WikiLeaks can no longer accept MasterCard-branded products", adding "MasterCard rules prohibit customers from directly or indirectly engaging in or facilitating any action that is illegal." The next day, Visa Inc. announced it was suspending payments to WikiLeaks, pending "further investigations". In a move of support for WikiLeaks, the organization XIPWIRE established a way to donate to WikiLeaks, and waived their fees. Datacell, the Iceland-based IT company controlled by Swiss investors that enabled WikiLeaks to accept credit card donations, announced that it would take legal action against Visa Europe and MasterCard, in order to resume allowing payments to the website.
On 7 December 2010, The Guardian stated that people could donate to WikiLeaks via Commerzbank in Kassel, Germany, or Landsbanki in Iceland, or by post to a post office box at the University of Melbourne or at the wikileaks.ch domain.
The UN High Commissioner for Human Rights Navi Pillay stated that Visa, MasterCard, and Amazon may be "violating WikiLeaks' right to freedom of expression" by withdrawing their services.
On 21 December, media reported that Apple Inc. had removed an application from its App Store, which provided access to the embassy cable leaks.
As part of its 'Initial Assessments Pursuant to... WikiLeaks', the US Presidential Executive Office has issued a memorandum to the heads of Executive Departments and Agencies asking whether they have an 'insider threat program'.
On 14 July 2011, WikiLeaks and DataCell ehf. of Iceland filed a complaint against the international card companies, VISA Europe and MasterCard Europe, for infringement of the antitrust rules of the EU, in response to their withdrawal of financial services to the organisation. In a joint press release, the organisations stated: "The closure by VISA Europe and MasterCard of Datcell's access to the payment card networks in order to stop donations to WikiLeaks violates the competition rules of the European Community." DataCell filed a complaint with the European Commission on 14 July 2011.
Response from the financial industry
Since the publications of CableGate, WikiLeaks has experienced an unprecedented global financial blockade by major finance companies including MasterCard, Visa and PayPal although there has been no legal accusation of any wrongdoing.
In October 2010, it was reported that the organization Moneybookers, which collected donations for WikiLeaks, had ended its relationship with the website. Moneybookers stated that its decision had been made "to comply with money laundering or other investigations conducted by government authorities, agencies or commissions."
On 18 December 2010, Bank of America announced it would "not process transactions of any type that we have reason to believe are intended for Wikileaks," citing "Wikileaks might be engaged in activities... inconsistent with our internal policies for processing payments". WikiLeaks responded in a tweet by encouraging their sympathizers who were BoA customers to close their accounts. Bank of America has long been believed to be the target of WikiLeaks' next major release.
Late in 2010, Bank of America communicated with the law company Hunton & Williams to stop WikiLeaks. Hunton & Williams assembled a group of security specialists, HBGary Federal, Palantir Technologies, and Berico Technologies.
During 5 and 6 February 2011, the group Anonymous hacked HBGary's website, copied tens of thousands of documents from HBGary, posted tens of thousands of company emails online, and usurped Barr's Twitter account in revenge. Some of the documents taken by Anonymous show HBGary Federal was working on behalf of Bank of America to respond to WikiLeaks' planned release of the bank's internal documents. Emails detailed a supposed business proposal by HBGary to assist Bank of America's law company, Hunton & Williams, and revealed that the companies were willing to violate the law to damage WikiLeaks and Anonymous.
In October 2011, Julian Assange said the financial blockade had destroyed 95% of WikiLeaks' revenues and announced that it was suspending publishing operations in order to concentrate on fighting the blockade and raising new funds.
On 18 July 2012, WikiLeaks, shunned by the financial industry and almost insolvent, announced that it had found a new method to accept donations. Accordingly, the Fund for the Defense of Net Neutrality (FDNN) had agreed to channel contributions via Carte Bleue, and WikiLeaks claimed that contractual obligation would prevent Visa and MasterCard blocking participation with such transactions.
On 24 January 2014, WikiLeaks announced via Twitter that the majority of its donations came from (the cryptocurrencies) Litecoin and Bitcoin. WikiLeaks massive returns from early investment into Bitcoin cryptocurrency has helped the organisation to survive various legal and financial hardships.
In December 2017, after five years of processing donations on behalf of WikiLeaks, Freedom of the Press Foundation's board unanimously found that the financial blockade of WikiLeaks by major payment processors was no longer in effect, and severed ties with WikiLeaks as of 8 January 2018.
Supporters of WikiLeaks and Assange
In July 2010 Veterans for Peace president Mike Ferner editorialised on the group's website "neither Wikileaks nor the soldier or soldiers who divulged the documents should be prosecuted for revealing this information. We should give them a medal."
Documentary filmmaker John Pilger wrote an August 2010 editorial in the Australian publication Green Left titled "Wikileaks must be defended." In it, Pilger said WikiLeaks represented the interests of "public accountability" and a new form of journalism at odds with "the dominant section ... devoted merely to taking down what cynical and malign power tells it."
Daniel Ellsberg, the man who released the Pentagon Papers in 1971, has been a frequent defender of WikiLeaks. Following the November 2010 release of U.S. diplomatic cables, Ellsberg rejected criticism that the site was endangering the lives of U.S. military personnel and intelligence assets stating "not one single soldier or informant has been in danger from any of the WikiLeaks releases. That risk has been largely overblown." Ellsberg went on to note that government claims to the contrary were "a script that they roll out every time there's a leak of any sort." Following the US diplomatic cable release, which a number of media reports sought to differentiate from Ellsberg's whistleblowing, Ellsberg claimed, "EVERY attack now made on WikiLeaks and Julian Assange was made against me and the release of the Pentagon Papers at the time."
On 3 December 2010 Republican Congressman of Texas, Ron Paul, spoke out publicly during a Fox Business interview in support of WikiLeaks founder, Julian Assange; "In a free society we're supposed to know the truth," Paul said. "In a society where truth becomes treason, then we're in big trouble." Paul went on to state, "Why don't we prosecute The New York Times or anybody that releases this?" In another speech at US House of Representatives Paul again defended WikiLeaks against criticism for revealing the truth and warned the US administration that "lying is not patriotic".
Fellow Republican congressman Connie Mack IV of Florida also praised WikiLeaks, stating that Americans have a right to know the contents of the leaks, "no matter how we acquire that knowledge."
Australia's most senior and high-profile media professionals expressed their support for WikiLeaks in a letter to Australian Prime Minister Julia Gillard. The letter was initiated by the Walkley Foundation, who present the yearly Walkley Awards for Excellence in Journalism. The letter was signed by "the ten members of the Walkley Advisory Board as well as editors of major Australian newspapers and news websites and the news directors of the country's three commercial TV networks and two public broadcasters." Their position (an extract from the letter) is summarised as follows:
Following the November 2010 leak of United States diplomatic cables The Atlantic, in a staff editorial, opined "Wikileaks is a powerful new way for reporters and human rights advocates to leverage global information technology systems to break the heavy veil of government and corporate secrecy that is slowly suffocating the American press." Calling legal and physical threats against WikiLeaks volunteers "shameful" the magazine went on to state, "Not since President Richard Nixon directed his minions to go after Pentagon Papers leaker Daniel Ellsberg and New York Times reporter Neil Sheehan ... has a working journalist and his source been subjected to the kind of official intimidation and threats that have been directed at Assange and Manning by high-ranking members of the Obama Administration."
On 4 December 2010, Reporters Without Borders condemned the "blocking, cyber-attacks and political pressure" being directed at WikiLeaks. The organisation is also concerned by some of the extreme comments made by American authorities concerning WikiLeaks and its founder Julian Assange. On 21 December the organisation announced it will host a mirror website for the leaked US diplomatic cables being published by WikiLeaks.
In an article titled "Only WikiLeaks can save US policy" published on the online foreign affairs magazine The Diplomat, former long-time CIA counter-terrorism expert Michael Scheuer said the source of interest in WikiLeaks revelations was in the inherent dishonesty of recent U.S. administrations. "In recent years, the US public has had to hear its leaders repeatedly tell Americans that black was white," Scheuer wrote, referencing the presidencies of Bill Clinton, George W. Bush and Barack Obama.
Evan Hughes, editor-in-chief of wired.com published his support for WikiLeaks in an online editorial titled "Why WikiLeaks is Good for America." Despite an often contentious relationship between Wired and WikiLeaks, with the former having been accused by the latter of complicity in the identification and arrest of Chelsea Manning, Hughes argued that "WikiLeaks stands to improve our democracy, not weaken it." He went on to note that "The greatest threat we face right now from WikiLeaks is not the information it has spilled and may spill in the future, but the reactionary response to it that's building in the United States that promises to repudiate the rule of law and our free speech traditions, if left unchecked."
The New York Times reported that over 200 WikiLeaks mirror sites sprang up after some hosting companies cut their services to the company. On 5 December, a group of activists and hackers known as "Anonymous" called upon supporters to attack sites of companies that oppose WikiLeaks as part of Operation Avenge Assange. PayPal has been targeted following their decision to stop processing donations for WikiLeaks. Gregg Housh, who previously worked on other projects with Anonymous, said that he had noticed an organised attempt taking place to attack companies that have not supported WikiLeaks. In reference to the support being shown for WikiLeaks, Mr. Housh said; "The reason is amazingly simple, we all believe that information should be free, and the Internet should be free." On 8 December 2010, the PayPal website was victim of a denial-of-service attack by Anonymous. Later that day, PayPal announced in their blog that they will release all remaining funds in the account to the foundation that was raising funds for WikiLeaks. On the same day, the websites of Visa and MasterCard were attacked by WikiLeaks supporters. By then over 1,200 mirror sites had been set up for hosting content no longer accessible at WikiLeaks.com. Anonymous also issued a fresh statement; "While we don't have much of an affiliation with WikiLeaks, we fight for the same reasons. We want transparency, and we counter censorship ... This is why we intend to utilise our resources to raise awareness, attack those against, and support those who are helping lead our world to freedom and democracy."
In December 2010, the Internet Society stated that despite the international concern about the content released by WikiLeaks, "we nevertheless believe it must be subject to the same laws and policies of availability as all Internet sites" and that "free expression should not be restricted by governmental or private controls over computer hardware or software, telecommunications infrastructure, or other essential components of the Internet". ISOC also called for appropriate action to "pursue and prosecute entities (if any) that acted maliciously to take it [WikiLeaks] off the air" because suppressing communication would merely serve to "undermine the integrity of the global Internet and its operation".
On 8 December 2010 a petition was launched on Avaaz in support of WikiLeaks, which was signed by over 250 thousand people within the first few hours, the total number went up to 600 thousand by 15 December 2010.
In early December 2010, Noam Chomsky offered his support to protesters across Australia planning to take to the streets in defence of WikiLeaks. In an interview for Democracy Now!, Chomsky criticized the government response, saying, "perhaps the most dramatic revelation ... is the bitter hatred of democracy that is revealed both by the U.S. Government – Hillary Clinton, others – and also by the diplomatic service."
In 2015, Randy Credico made news for being handcuffed and thrown out of the annual White House Correspondents' Dinner for supporting Assange. Randy appeared in an interview with Jimmy Dore after and described the experience, "I'm really feeling guilty about Julian Assange, being in that room, and everybody here about to be celebrated, CNN... and so I walked into the middle of the room[...] and I went up there before the program actually started. I just couldnt hold back because I didn't want to interrupt the comedian. So i started yelling out to the stage, 'We
should be celebrating and supporting Julian Assange. He's the greatest journalist, god bless..." and so i went to
about three different spots, as loud as I possibly could bellow out those words, 'We, CNN, all of the news organisations, should be celebrating, and we should be commending Julian Assange. 100% accuracy! he's sacrificing his liberty!'
Awards and nominations
In 2008, Index on Censorship presented WikiLeaks with their inaugural Economist New Media Award.
In 2009, Amnesty International awarded WikiLeaks their Media Award for exposing "extra judicial killings and disappearances" in Kenya.
In 2009, Ars Electronica awarded WikiLeaks an Award of Distinction in the Digital Communities category.
In 2010, TIME Magazine Person of the Year, People's Choice (highest global vote) and the Sam Adams Award for Integrity.
In 2011, Walkley Foundation for Journalism awarded the "Most outstanding contribution to journalism" Walkley Award to WikiLeaks. The Sydney Peace Foundation Gold Medal, the Martha Gellhorn Prize for Journalism, the Blanquerna Award for Best Communicator, the Walkley Award for Most Outstanding Contribution to Journalism, the Voltaire Award for Free Speech, the International Piero Passetti Journalism Prize of the National Union of Italian Journalists, the "VII José Couso Press Freedom Award" from Colexio Profesional de Xornalistas de Galicia and Club de Prensa de Ferrol and the Blanquerna Faculty of Communication awarded the "Blanquerna Best Communicator Award" to WikiLeaks.
In 2012 the Privacy International Hero of Privacy.
In 2013 the Global Exchange Human Rights People's Choice Award, the Yoko Ono Lennon Courage Award for the Arts and the Brazilian Press Association Human Rights Award.
In 2014 the Kazakhstan Union of Journalists Top Prize.
Additionally, Wikileaks was nominated for awards but did not win:
1 February 2011, Norwegian politician and musician Snorre Valen nominated WikiLeaks for the Nobel Peace Prize, totaling six nominations for the Nobel Peace Prize in consecutive years (2010-2015) for the organization
2015 Wikileaks received a nomination for the UN Mandela Prize. six nominations for the Nobel Peace Prize in consecutive years (2010-2015)
Critics of Wikileaks and Assange
WikiLeaks has attracted criticism from a variety of sources.
In 2007 John Young, operator of Cryptome, left his position on the WikiLeaks Board of Directors accusing the group of being a "CIA conduit". Young subsequently retreated from his assertion but has continued to be critical of the site. In a 2010 interview with CNET.com Young accused the group of a lack of transparency regarding their fundraising and financial management. He went on to state his belief that WikiLeaks could not guarantee whistleblowers the anonymity or confidentiality they claimed and that he "would not trust them with information if it had any value, or if it put me at risk or anyone that I cared about at risk."
When asked to join their initial advisory board, Steven Aftergood declined and told TIME that "they have a very idealistic view of the nature of leaking and its impact. They seem to think that most leakers are crusading do-gooders who are single-handedly battling one evil empire or another." Citing the leaking of the sorority rituals of Alpha Sigma Tau, Steven Aftergood has opined that WikiLeaks "does not respect the rule of law nor does it honor the rights of individuals." Aftergood went on to state that WikiLeaks engages in unrestrained disclosure of non-governmental secrets without compelling public policy reasons and that many anti-corruption activists were opposed to the site's activities.
In 2010, Amnesty International joined several other human rights groups in strongly requesting that WikiLeaks redact the names of Afghan civilians working as U.S. military informants from files they had released, in order to protect them from repercussions. Julian Assange responded by offering Amnesty International the opportunity to assist in the tedious document vetting process. When Amnesty International appeared to express reservations in accepting the offer, Assange stated that he had "no time to deal with people who prefer to do nothing but cover their asses." Other groups that joined Amnesty International in criticising WikiLeaks subsequently noted that, despite their displeasure over the issue of civilian name redaction, they generally appreciated WikiLeaks' work.
In an August 2010 open letter, the non-governmental organisation Reporters Without Borders praised WikiLeaks' past usefulness in exposing "serious violations of human rights and civil liberties" but criticised the group over a perceived absence of editorial control, stating "indiscriminately publishing 92,000 classified reports reflects a real problem of methodology and, therefore, of credibility. Journalistic work involves the selection of information. The argument with which you defend yourself, namely that WikiLeaks is not made up of journalists, is not convincing." The group subsequently clarified their statement as a criticism of WikiLeaks release procedure and not the organisation itself, stating "we reaffirm our support for Wikileaks, its work and its founding principles."
On 30 November 2010, former Canadian government adviser Tom Flanagan, while appearing on the CBC television program "Power & Politics", called for Julian Assange to be killed. "I think Assange should be assassinated," Flanagan stated, before noting to host Evan Solomon, "I'm feeling pretty manly today." Flanagan subsequently retracted his call for the death of Assange while reiterating his opposition to WikiLeaks. Dimitri Soudas, spokesman to Prime Minister Stephen Harper, decried Flanagan's comments and said the former Tory strategist's remarks are "simply not acceptable." Ralph Goodale, Deputy Leader of the Liberal Party in the House of Commons, called Flanagan's remarks "clearly contrary to the Canadian Charter of Rights and Freedoms."
References
External links
WikiLeaks
Criticism of journalism |
28252044 | https://en.wikipedia.org/wiki/Web2project | Web2project | web2project is a web-based, multi-user, multi-language Project Management application. It is an open-source software and free for any uses and is maintained by an open community of volunteer programmers. web2project, as collaborative software, allows for real-time interaction between task assignees and updates for participants.
Structures and Features
Basic data elements and management functions include:
Projects and Tasks
Contact Manager with vCard support
Resource / Asset Manager
Gantt charts, Export via PDF or simple JPEG images
Calendar with user-based time zones, Syndication via iCalendar (supports Outlook, Thunderbird, Google Calendar, etc.)
Reporting
Project file manager
Related Weblinks Manager
Access control via ACL including respect for private events, tasks, and contacts
Audit Log of all activities by all users
Translation System supporting Czech, German, English, Spanish, Farsi, French, Italian, Polish, Portuguese, Brazilian Portuguese, and Russian
History
web2project started as a fork of dotProject in late 2007.
Since the entire original team membership consisted of former dotProject contributors, the design and development decisions were quite similar to dotProject itself. As time went on, the systems diverged though web2project has maintained a "converter" which allows dotProject users to perform a one-way conversion to web2project. At present, the web2project community suffers from fewer add-on modules and a smaller community in general.
As of July 2010, web2project is available via RPM install for Mandriva Linux.
Support and Community
The primary means of day to day support is provided free by volunteers in both the forums and via online documentation.
See also
List of project management software
Project management
References
External links
Official Website
SourceForge Profile
Legal Operations Software
Field Service Management Software
Free project management software
PHP software |
73262 | https://en.wikipedia.org/wiki/Apple%20IIe | Apple IIe | The Apple IIe (styled as Apple //e) is the third model in the Apple II series of personal computers produced by Apple Computer. The e in the name stands for enhanced, referring to the fact that several popular features were now built-in that were formerly only available as upgrades or add-ons in earlier models. Improved expandability combined with the new features made for a very attractive general-purpose machine to first-time computer shoppers. As the last surviving model of the Apple II computer line before discontinuation, and having been manufactured and sold for nearly 11 years with relatively few changes, the IIe earned the distinction of being the longest-lived computer in Apple's history.
History
Apple Computer planned to discontinue the Apple II series after the introduction of the Apple III in 1980; the company intended to clearly establish market segmentation by designing the Apple III to appeal to the business market, leaving the Apple II for home and education users. Management believed that "once the Apple III was out, the Apple II would stop selling in six months", cofounder Steve Wozniak later said.
By the time IBM released the rival IBM PC in 1981, the Apple II's technology was already four years old. In September 1981 InfoWorld reported—below the PC's announcement—that Apple was secretly developing three new computers "to be ready for release within a year": Lisa, "Macintosh", and "Diana". Describing the last as a software-compatible Apple II replacement—"A 6502 machine using custom LSI" and a simpler motherboard—it said that Diana "was ready for release months ago" but decided to improve the design to better compete with the Xerox 820. "Now it appears that when Diana is ready for release, it will offer features and a price that will make the Apple II uncompetitive", the magazine wrote.
"Apple's plans to phase out the Apple II have also been delayed by complications in the design of the Apple III", the article also said. After the Apple III initially struggled, management decided in 1981 that the further continuation of the Apple II was in the company's best interest. After years of the Apple II Plus, essentially at a standstill, came the introduction of a new Apple II model — the Apple IIe (codenamed "Diana" and "Super II"). The Apple IIe was released in January 1983, the successor to the Apple II Plus. The Apple IIe was the first Apple computer with a custom ASIC chip, which reduced much of the old discrete IC-based circuitry to a single chip. This change resulted in reducing the cost and size of the motherboard. Some of the hardware features of the Apple III (e.g. bank-switched memory) were borrowed in the design of the Apple IIe, and some from incorporating the Apple II Plus Language card. The culmination of these changes led to increased sales and greater market share of home, education, and small business use.
New features
One of the most notable improvements of the Apple IIe is the addition of a full ASCII character set and keyboard. The most important addition is the ability to input and display lower-case letters. Other keyboard improvements include four-way cursor control and standard editing keys (Delete and Tab), two special Apple modifier keys (Open and Solid Apple), and a safe off-to-side relocation of the "Reset" key. The auto-repeat function (any key held down to repeat same character continuously) is now automatic, no longer requiring the "REPT" key found on the keyboards of previous models.
The machine came standard with 64 KB RAM, with the equivalent of a built-in Apple Language Card in its circuitry, and had a new special "Auxiliary slot" (replacing slot 0, though electronically mapped to slot 3 for compatibility with earlier third-party 80-column cards) for adding more memory via bank-switching RAM cards. Through this slot it also includes built-in support for an 80-column text display on monitors (with the addition of a plug-in 1K memory card, via bank-switching of 40 columns) and could be easily doubled to 128 KB RAM by alternatively plugging in Apple's Extended 80-Column Text Card. As time progressed, even more memory could be added through third-party cards using the same bank-switching slot or, alternatively, general-purpose slot cards that addressed memory 1 byte at a time (i.e. Slinky RAM cards). A new ROM diagnostic routine could be invoked to test the motherboard for faults and also test its main bank of memory.
The Apple IIe lowered production costs and improved reliability by merging the function of several off-the-shelf ICs into single custom chips, reducing total chip count to 31 (previous models used 120 chips). The IIe also switched to using newer single-voltage 4164 DRAM chips instead of the unreliable triple-voltage 4116 DRAM in the II/II+. For this reason the motherboard design is much cleaner and runs cooler as well, with enough room to add a pin-connector for an (optional) external numeric keypad. Also added was a backport-accessible DE-9 joystick connector, making it far easier for users to add and remove game and input devices (previous models requiring plugging the joystick/paddles directly into a 16-pin DIP socket on the motherboard; the IIe retained this connector for backwards compatibility). Also improved were port openings for expansion cards. Rather than cutout V-shaped slot openings as in the Apple II and II Plus, the IIe has a variety of different-sized openings, with thumb-screw holes, to accommodate mounting interface cards with DB-xx and DE-xx connectors (removable plastic covers filled the cutouts if not used).
Although the lower IC count improved reliability over previous Apple II models, Apple still retained the practice of socketing all ICs so that servicing and replacement could be performed more easily. Later-production IIe models had the RAM soldered to the system board rather than socketed.
Despite the hardware changes, the IIe maintains a high degree of backwards compatibility with the previous models, allowing most hardware and software from those systems to be used. Apple provided technical information on the IIe to hundreds of developers before its release, and claimed that, as a result, 85 to 90% of Apple II software worked with it.
Reception
BYTE wrote in February 1983 that the IIe was "like having an Apple II with all the extras built in ... with a variety of exciting new features and capabilities" for about the same price as the Apple II. It found the computer to be highly compatible with the Apple II and praised the quality of the documentation for developers and beginners. The review concluded, "Congratulations, Apple Computer, you've produced another winner". InfoWorlds reviewers, Apple II Plus owners for four years, wished that the IIe's price were lower but stated that it "does give you more for your money, however". They also found compatibility to be very high, and concluded that "we are generally pleased with the changes Apple has provided with the IIe". Creative Computing said in December 1984 that the IIe and IIc were the best home computers with prices above $500, with the IIe better for those wanting expansion cards, color graphics, and educational and entertainment software. The magazine also chose the IIe as the best educational computer above $1000, citing Apple's strong early commitment to the market and large number of third-party education-related peripherals.
Specifications
Microprocessor
6502 or 65C02 running at 1.023 MHz
8-bit data bus
Memory
64 kB RAM built-in
16 kB ROM built-in
Expandable from 64 kB up to 1 MB RAM or more
Video modes
40 and 80 columns text, white-on-black, with 24 lines
Low-Resolution: 40×48 (16 colors)
High-Resolution: 280×192 (6 colors)
Double-Low-Resolution: 80×48 (16 colors)
Double-High-Resolution: 560×192 (16 colors)
Audio
Built-in speaker; 1-bit toggling
Built-in cassette recorder interface; 1-bit toggle output, 1-bit zero-crossing input
Expansion
Seven Apple II Bus slots (50-pin card-edge)
Auxiliary slot (60-pin card-edge)
Internal connectors
Game I/O socket (16-pin DIP)
RF modulation output (4-pin Molex)
Numeric keypad (11-pin Molex)
External connectors
NTSC composite video output (RCA connector)
Cassette in/out (two -inch mono phono jacks)
Joystick (DE-9)
Notes
Revisions
In production from January 1983 to November 1993, the Apple IIe remained relatively unchanged through the years. However, there was one significant motherboard update, a major firmware update and two cosmetically revised machines. These revisions are detailed below.
Revision A motherboard
At the time of the Apple IIe's introduction, and well into the first few months of production, this motherboard shipped with all units. Graphics modes supported are identical to, and limited to, those of the Apple II Plus before it (Double-Low/Double-High resolution is not supported). This revision logic board is also incompatible with a small number of newer plug-in expansion slot cards. Under a free service upgrade program, Apple advised owners of the revision A to have authorized dealers replace it with the revision B motherboard.
Revision B motherboard
Shortly after the "Revision A" motherboard's release in 1983, engineers discovered that the bank-switching feature (which used a paralleled 64 KB of RAM on the Extended 80-Column Card or 1 KB to produce 80 columns using bank-switching) could also be used to produce a new graphics mode, Double-High-Resolution, which doubles the horizontal resolution and increases the number of colors from the 6 of standard High-Resolution to 16. In order to support this, some modifications had to be made to the motherboard, which became the Revision B. In addition to supporting Double-High-Resolution and a rarely used Double-Low-Resolution mode (see specifications above) it also added a special video signal accessible in slot 7.
Apple upgraded the motherboard free of charge. In later years Apple labeled newer IIe motherboards with a "-A" suffix once again, although in terms of functionality they were Revision B motherboards.
New case and keyboard
In 1984, Apple revised the case and keyboard. The original IIe uses a case very similar to the Apple II Plus, painted and with Velcro-type clips to secure the lid with a strip of metal mesh along the edge to eliminate radio frequency interference. The new case is made of dyed plastic mold in a slightly darker beige with a simplified snap-case lid. The other noticeable change is a new keyboard, with more-professional-looking print on darker keycaps (small black lettering, versus large white print). This was the first cosmetic change.
Enhanced IIe
In March 1985, the company replaced the original machine with a new revision called the Enhanced IIe. It is completely identical to the previous machine except for four chips changed on the motherboard (and a small "Enhanced" or "65C02" sticker placed over the keyboard power indicator). The purpose of the update was to make the Apple IIe more compatible with the Apple IIc (released the previous year) and, to a smaller degree, the Apple II Plus. This change involved a new processor, the CMOS-based 65C02 CPU, a new character ROM for the text modes, and two new ROM firmware chips. The 65C02 added more CPU instructions, the new character ROM added 32 special "MouseText" characters (which allowed the creation of a GUI-like display in text mode, similar to IBM code page 437), and the new ROM firmware fixed problems and speed issues with 80-column text, introduced the ability to use lowercase in Applesoft BASIC and Monitor, and contained some other smaller improvements (and fixes) in the latter two (including the return of the Mini-Assembler—which had vanished with the introduction of the II Plus firmware).
Although it affected compatibility with a small number of software titles (particularly those that did not follow Apple programming guidelines and rules, used illegal opcodes that were no longer available in the new CPU, or used the alternate 80-column character set that MouseText now occupied) a fair bit of newer software — mostly productivity applications and utilities — required the Enhanced chipset to run at all. An official upgrade kit, consisting of the four replacement chips and an "Enhanced" sticker badge, was made available for purchase to owners of the original Apple IIe. An alternative at the time, which some users chose as a cost-cutting measure, was to simply purchase their own 65C02 CPU and create (unlicensed and illegal) duplicates of the updated ROMs using re-rewritable EPROM chips. When Apple phased out the Enhancement kit in the early 1990s, this became the only available method for users looking to upgrade their IIe, and remains so right up until the present day. An Enhanced machine identifies itself with the name "Apple //e" on its start-up splash screen (as opposed to the less-specific "Apple ][").
Platinum IIe
In January 1987 came the final revision of the Apple IIe, often referred to as the Platinum IIe, due to the color change of its case to the light-grey color scheme that Apple dubbed "Platinum". Changes to this revision were mostly cosmetic to modernize the look of the machine. Besides the color change, there was a new keyboard layout with built-in numeric keypad. The keyboard was changed to match the layout of the Apple IIGS, with the reset key moved above the ESC and '1' keys, the Open and Solid Apple modifier keys replaced by Command and Option and the power LED relocated above the numeric keypad. Gone were the recessed metal ID badges (showing the Apple logo and name, with "//e" beside it) replaced with a simpler "Apple IIe" silk screened on the case lid in the Apple Garamond font. A smaller Apple logo badge remained, which was moved to the right side of the case.
Internally, a (reduced in size) Extended 80-Column Card was factory-installed, making the Platinum IIe come standard with 128 KB RAM and Double-Hi-Res graphics enabled. The motherboard has a reduced chip count by merging the two system ROM chips into one and using higher-density memory chips so its 64 KB RAM can be made up of two (64 Kbx4) chips rather than eight (64 Kbx1) chips, bringing the count down to a total of 24 chips. A solder pad location on the motherboard, present since the original IIe, for (optionally) making presses of the "Shift" keys detectable in software, is now shorted by default so that the feature is always active. Next, in a move to reduce radio frequency interference when a joystick plugs into the motherboard's game I/O socket, filtering capacitors were added. While this made no difference to the average user, it had the negative effect of lowering the available bandwidth to the socket, which is often used by specialized devices for such purposes as measuring temperature, controlling a robotic device, or even simplistic networking for data transfer to another computer. In such cases, the specialized devices were rendered useless on the Platinum IIe unless the user removed the capacitors from the board.
There were no firmware changes present, and functionally the motherboard was otherwise identical to the Enhanced IIe. This final model of the Apple IIe (which was not sold in Europe) was quietly discontinued on November 15, 1993, which (following the discontinuation of the Apple IIGS a year earlier) effectively marked the end of the Apple II family line.
Apple IIe Card for Macintosh
In March 1991, shortly after the release of the Macintosh LC series, Apple released the PDS slot-based Apple IIe Card for the Macintosh. By plugging this card into a Macintosh LC (and later models incorporating an LC PDS slot), through hardware and (some) software emulation, the Macintosh can run most software written for the 8-bit Apple IIe computer. This miniaturized computer on a card was made possible by a chip called the Gemini, which is heavily based on the Mega II, first used in the Apple IIGS computer to emulate the Apple IIe. The Gemini duplicates most of the functions of a standard Apple IIe, minus RAM, ROM, video generation and CPU.
Many of the built-in Macintosh peripherals can be "borrowed" by the card when in Apple II mode (i.e. extra RAM, 3-inch floppy, AppleTalk networking, clock, hard disk). It can run at either standard 1 MHz speed or an accelerated 1.9 MHz. As video is emulated using Macintosh QuickDraw routines, it is sometimes unable to keep up with the speed of a real Apple IIe, especially in the case of slower host machines. With a specialized Y-cable, the card can use an actual Apple 5.25, Apple UniDisk 3.5 and Apple II joystick or paddles. The Apple IIe Card is thought of as an Apple II compatibility solution or emulator rather than as an extension of the Apple II line.
International versions
Regional differences
The Apple IIe keyboard differed depending on what region of the world it was sold in. Sometimes the differences were very minor, such as extra local language characters and symbols printed on certain keycaps (e.g. French accented characters on the Canadian IIe such as "à", "é", "ç", etc., or the British Pound "£" symbol on the UK IIe) while other times the layout and shape of keys greatly differed (e.g. a European IIe). In order to access the local character set and keyboard layout, a user-accessible switch is found on the underside of the keyboard — flipping it will instantly switch the video output and keyboard input from the US character set to the local set. To support this, special double-capacity video and keyboard ROMs are used; in early motherboards they had to reside on a tiny circuit card that plugged into the socket. In some countries these localized IIes also support 50 Hz PAL video instead of the standard 60 Hz NTSC video and the different 220/240 volt power of that region. An equivalent of the "PAL color card" for the earlier Apple II Europlus model was integrated into the motherboard of these IIes, so that color graphics are available without the addition of a slot card.
Another difference with the European IIe, is the Auxiliary slot physically moved in location so it is in line and in front of slot 3, preventing both slots from being used simultaneously for full-sized cards. A few third-party cards are affected by this; some European cards plug into both slots simultaneously and are thus unusable on American IIes, and some American cards do not fit into the case of European IIes because the European location of the Auxiliary slot leaves less room for them.
European Platinum IIe (hybrid)
During approximately the same time period that the Platinum IIe was being produced (1987), Apple released an alternative machine for the European market. It reused the original Apple IIe case mold and keyboard, but both were redyed in the platinum color scheme—including the metal ID badges which were recolored from dark brown to platinum, blending them into the case lid. Additionally, the sticker over the keyboard power indicator was labeled "65C02" rather than "Enhanced". Internally it used the same (newer) motherboard found in the Platinum IIe with reduced chip count. Notably absent is the numeric keypad and standardized keyboard layout found on the Platinum IIe.
This cosmetic reissue of the classic IIe, with new motherboard and new coloring scheme, was only available in Europe, and therefore also had regional differences mentioned above. It has been rumored that a small number of these machines were made available in the Canadian and US markets, using the standard North American keyboard and motherboard (photographic evidence of this North American variant can be found in some period Apple II magazines). This hybrid platinum model is somewhat rare.
Upgrades
Apple IIGS upgrade kit
When the Apple IIGS computer was introduced in September 1986, Apple announced it would be making an upgrade kit for the IIe. The upgrade cost US$500, plus the trade-in of the user's existing Apple IIe motherboard and baseplate.
Users would bring their Apple IIe machines in to an authorized dealership, where the 65(C)02-based IIe motherboard and lower baseboard of the case were swapped for a 65C816-based Apple IIGS motherboard with a new baseboard. New metal sticker ID badges replaced those on the front of the Apple IIe, rebranding the machine. Retained were the upper half of the IIe case, the keyboard, speaker, and power supply. Original IIGS motherboards (those produced between 1986 and mid-1989) had electrical connections for the IIe power supply and keyboard present, although only about half of the units produced had the physical plug connectors factory-soldered in.
The upgrade kit proved unpopular as it did not include a mouse; the keyboard did not mimic all the features of the Apple Desktop Bus keyboard; and some cards designed for the Apple IIGS did not fit in the Apple IIe's slanted case. In the end, most users found they were not saving much, once they had to purchase a 3.5-inch floppy drive, analog RGB monitor, and mouse.
For a time, the Western Design Center (the company that designed the 16-bit 65C816 processor used in the Apple IIGS) also sold a 16-bit 65C802 processor that was a drop-in, pin-compatible replacement for the 65(C)02 that made the full 16-bit 65C816 instruction set available to the IIe, but using the same 8-bit data bus as the 65(C)02; however, this upgrade was insufficient, by itself, to allow IIGS software to run, as IIGS software additionally required the IIGS's firmware and specialized hardware.
See also
Apple II series
Apple II peripheral cards
Apple III
Apple IIc
Apple IIGS
KansasFest – an annual convention of Apple II users
List of publications and periodicals devoted to the Apple II
References
External links
A2Central.com – Apple II news and downloads
Steven Weyhrich's Apple II History
PCB pictures of the Apple II
Apple2clones has information on Apple II clones
Apple2Online.com Free public-access library of Apple II software, games, documentation, hardware photos & more
E
Computer-related introductions in 1983
fr:Apple II#Apple IIe (janvier 1983) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.