id
stringlengths
3
8
url
stringlengths
32
207
title
stringlengths
1
114
text
stringlengths
93
492k
6747501
https://en.wikipedia.org/wiki/Diagrams.net
Diagrams.net
diagrams.net (previously draw.io) is a free and open source cross-platform graph drawing software developed in HTML5 and JavaScript. Its interface can be used to create diagrams such as flowcharts, wireframes, UML diagrams, organizational charts, and network diagrams. diagrams.net is available as online as cross-browser web app, and as offline desktop application for Linux, macOS, and Windows. Its offline application is built using the Electron framework. The web app does not require online login or registration, and can open from and save to the local hard drive. Supported storage and export formats to download include PNG, JPEG, SVG, and PDF. It also integrates with cloud services for storage including Dropbox, OneDrive, Google Drive, GitHub, and GitLab.com. It is also available as plugin to embed the web app in platforms such as NextCloud, MediaWiki, Notion, Atlassian Confluence, and JIRA. It has been described by tech reviewers such as TechRadar and PCMag as an alternative to Lucidchart, Microsoft Visio, SmartDraw, and Cacoo. History JGraph Ltd JGraph Ltd is a private limited company founded by Gaudenz Alder and David Benson in 2000 in the United Kingdom. JGraph JGraph started as a pure Java language software project by Gaudenz Alder and as a University project in 2000 at ETH Zurich, Switzerland. The initial public release of JGraph 1.0 was in May 2002. The original design for JGraph was to make it an architectural extension of the Swing Java-toolkit and its JTree class. mxGraph In 2005, development began on mxGraph, which is a graph drawing software library written in JavaScript using HTML5 and SVG technologies. The project was publicly released in 2006, and supported Firefox 1.5 and Internet Explorer 5.5. mxGraph was originally made available as freeware through a hosted demo of the software for online use, with publicly available source under a end-user license agreement for non-commercial use with the option to purchse a commercial license. In 2009, mxGraph was open sourced under the Apache license. JGraph also bundled official ports of mxGraph in other languages including Java, C#, and PHP. JGraphX After the final JGraph 5.x release in February 2010, the project renamed its Java-language application to JGraphX, integrated the mxGraph library, and took on mxGraph's version numbering, starting with JGraphX 1.10.0.5 released in 2012. Diagramly In 2011, the company started publishing its hosted service for the mxGraph web application under a separate brand, Diagramly with the domain "diagram.ly". After removing the remaining use of Java applets from its web app, the service rebranded as draw.io in 2012 because the ".io suffix is a lot cooler than .ly", said co-founder David Benson in a 2012 interview. In February 2020, the company announced on its blog that the hosted version of the web application would move from "draw.io" to the "diagrams.net" domain, citing security reasons. The move was completed a month later. The software library, file format, and integrated services remain branded as "drawio". See also JUNG NetworkX, a Python library for studying graphs and networks. References External links Java (programming language) libraries Free data visualization software Data visualization software Diagramming software Windows software
25021893
https://en.wikipedia.org/wiki/Internet%20Security%20Alliance
Internet Security Alliance
Internet Security Alliance (ISAlliance) was founded in 2001 as a non-profit collaboration between the Electronic Industries Alliance (EIA), a federation of trade associations, and Carnegie Mellon University's CyLab, focussing on cyber security. The ISAlliance is a forum for information sharing and leadership on information security, and it lobbies for corporate security interests. Objectives Work with legislative and regulatory bodies to ensure that market incentives are at the forefront of policy Promote greater corporate responsibility on information security issues Facilitate executive-to-executive communications about solutions to threats and emerging trends Conducts research leading to identification and resolution of root causes to information security problems Develop training programs across the gamut of corporate information security issues Provide a coordination point for industry dialogue on self-regulation issues such as market incentives, IT risk management and privacy Develop organizationally viable models for integration and adoption of security best practices Educate senior management and boards, linking information security throughout the enterprise operations Conduct timely seminars on emerging security issues Provide early warning of emerging security threats and in-depth reports on vulnerabilities and threats The ISAlliance has proposed a "Cybersecurity Social Contract" that offers an "action plan" to protect the United States from cyber attacks. International operations While the ISAlliance is physically based in the United States, its membership operates internationally and the goal is international security for all its trusted partners. The ISAlliance has member companies on four continents. There has always been a non-U.S. based company on the Executive Committee. The ISAlliance believes the international communication it fosters is critical to the long-term success of achieving greater information security. Moreover, international representation and voice more realistically addresses the many difficult problems which face all users of the Internet. Publications Published in 2009, The Financial Impact of Cyber Risk is the first known guidance document to approach the financial impact of cyber risks from the perspective of core business functions. It provides guidance to CFOs and their colleagues responsible for legal issues, business operations and technology, privacy and compliance, risk assessment and insurance, and corporate communications. References External links The Internet Security Alliance website Non-profit organizations based in Arlington, Virginia Standards organizations in the United States Technology trade associations Companies established in 2001 Computer networks
56910423
https://en.wikipedia.org/wiki/Orchid%20International%20College
Orchid International College
Orchid International College , commonly known as (OIC), is an Information Technology (IT), Management college in Nepal. It was established in the year 2010 AD.The college is located at Bijayachwok-Gaushala, Kathmandu. The college currently offers Information technology, Management and Social Work courses at the Bachelor's levels. It is affiliated with the Tribhuvan University. Location Orchid International college is located in Bijayachwok-Gaushala, Kathmandu. Courses offered The college offers courses in Undergraduate programs Bachelor of Science in Information Technology (BSc.CSIT) Bachelor in Information Management (BIM) Bachelor of Arts in Social Work (BSW) Admission BSc CSIT Must have passed +2 or equivalent degree with minimum second division from science stream. Must have passed in the entrance exam taken by Institute of Science and Technology, Tribhuvan University. (Entrance forms are available in college) BIM Must have passed +2 or equivalent degree with minimum second division. Must have passed in the CMAT exam taken by Faculty of Management, Tribhuvan University. (CMAT forms are available in college) BSW Only those are eligible to study BSW, students who have completed +2 from any stream . Interested eligible students have to apply for admission and have to appear in interview taken by college. References External links Official website Universities and colleges in Nepal 2010 establishments in Nepal
30714362
https://en.wikipedia.org/wiki/Blue%20Marble%20Geographics
Blue Marble Geographics
Blue Marble Geographics is a developer and provider of geographic information system software products focused on data translation. They provide software products and services for working with GIS data in different formats. Blue Marble is a member of the Open Geospatial Consortium. Products Geographic Calculator Blue Marble's first software product, the Geographic Calculator, was developed in 1992 and released in 1993. The Geographic Calculator is a coordinate conversion library with a database of coordinate mathematical objects including projections, coordinate systems, datums, ellipsoids, linear and angular units. The tool is primarily used to translate map coordinates from one system to another. In 2004, the underlying GeoCalc library was re-written and in 2007 a new version was released as the Blue Marble Desktop. 2013 saw a rebranding of the Blue Marble Desktop back to the Geographic Calculator. Blue Marble incorporated all of the functionality of the Blue Marble Desktop including the Geographic Transformer, Translator and Spatial Connect products into the new Geographic Calculator. This did away with the confusing versioning and introduced an easier-to-follow annual naming convention with one or two service pack updates between releases. Global Mapper Global Mapper is a geographic information system software package currently developed by Blue Marble Geographics that runs on Microsoft Windows. Global Mapper handles both vector, raster, and elevation data, and provides viewing, conversion, and other general GIS features. In 1995 the USGS was in need of a Windows viewer for their data products, so they developed the dlgv32 application for viewing their DLG (Digital Line Graph) vector data products. Between 1995 and 1998 the dlgv32 application was expanded to include support for viewing other USGS data products, including DRG (topographic maps) and DEM (digital elevation model) and SDTS-DLG and SDTS-DEM data products. The development process is described in detail in the USGS paper titled 'A Programming Exercise'. In 1998 the USGS released the source code for dlgv32 v3.7 to the public domain. In 2001, the source code for dlgv32 was further developed by a private individual into the commercial product dlgv32 Pro v4.0 and offered for sale via the internet. Later that same year the product was renamed to Global Mapper and become a commercial product of the company Global Mapper Software LLC. The USGS was distributing a version of the software under the name dlgv32 Pro (Global Mapper). Blue Marble acquired Global Mapper, LLC at the end of 2011. Mike Childs, the original developer of Global Mapper, continues to work for Blue Marble as a lead developer. In 2013, Blue Marble released a major version update to Global Mapper that also introduced the new Global Mapper LiDAR Module. The Global Mapper LiDAR Module offers optional enhancement to base Global Mapper application and provides numerous advanced LiDAR processing tools (e.g., automatic point cloud classification, automatic extraction of buildings, trees, and powerlines, cross-sectional viewing and point editing, custom digitizing or extraction of 3D line and area features, etc.). Company history Blue Marble Geographics was established in 1993 and was originally located in Gardiner, Maine. The company founder, Jeffrey Bennett Cole, retired in 2003 and Patrick Cunningham took over as President, adding employees and re-focusing the product offering over the next few years. In 2008, they received the Governor’s Award for technology company of the year at the TechMaine technology awards showcase. Blue Marble is one of a handful of geospatial or GIS software companies to come out of Maine in the nineties. The company's founder studied at the University of Maine and like other well known GIS companies from Maine, its roots are tied to the surveying and forestry programs of the University of Maine. After years of growing, the company has moved its home office to Hallowell, Maine. See also The Blue Marble NASA photograph from Apollo 17 References External links 1993 establishments in Maine Companies based in Kennebec County, Maine Companies established in 1993 Computer companies of the United States Earth sciences data formats Hallowell, Maine GIS software companies Software companies based in Maine Software companies of the United States
2672232
https://en.wikipedia.org/wiki/BGP%20hijacking
BGP hijacking
BGP hijacking (sometimes referred to as prefix hijacking, route hijacking or IP hijacking) is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables maintained using the Border Gateway Protocol (BGP). Background The Internet is a global network in enabling any connected host, identified by its unique IP address, to talk to any other, anywhere in the world. This is achieved by passing data from one router to another, repeatedly moving each packet closer to its destination, until it is hopefully delivered. To do this, each router must be regularly supplied with up-to-date routing tables. At the global level, individual IP addresses are grouped together into prefixes. These prefixes will be originated, or owned, by an autonomous system (AS) and the routing tables between ASes are maintained using the Border Gateway Protocol (BGP). A group of networks that operate under a single external routing policy is known as an autonomous system. For example, Sprint, Verizon, and AT&T each are an AS. Each AS has its own unique AS identifier number. BGP is the standard routing protocol used to exchange information about IP routing between autonomous systems. Each AS uses BGP to advertise prefixes that it can deliver traffic to. For example, if the network prefix is inside AS 64496, then that AS will advertise to its provider(s) and/or peer(s) that it can deliver any traffic destined for . Although security extensions are available for BGP, and third-party route DB resources exist for validating routes, by default the BGP protocol is designed to trust all route announcements sent by peers, and few ISPs rigorously enforce checks on BGP sessions. Mechanism IP hijacking can occur deliberately or by accident in one of several ways: An AS announces that it originates a prefix that it does not actually originate. An AS announces a more specific prefix than what may be announced by the true originating AS. An AS announces that it can route traffic to the hijacked AS through a shorter route than is already available, regardless of whether or not the route actually exists. Common to these ways is their disruption of the normal routing of the network: packets end up being forwarded towards the wrong part of the network and then either enter an endless loop (and are discarded), or are found at the mercy of the offending AS. Typically ISPs filter BGP traffic, allowing BGP advertisements from their downstream networks to contain only valid IP space. However, a history of hijacking incidents shows this is not always the case. The Resource Public Key Infrastructure (RPKI) is designed to authenticate route origins via cryptographic certificate chains demonstrating address block range ownership, but is not widely deployed yet. Once deployed, IP hijacking through errant issues at the origin (via both accident or intent) should be detectable and filterable. IP hijacking is sometimes used by malicious users to obtain IP addresses for use in spamming or a distributed denial-of-service (DDoS) attack. When a router promulgates flawed BGP routing information, whether that action is intentional or accidental, it is defined by the Internet Engineering Task Force (IETF) in RFC 7908 as a "route leak". Such leaks are described as "the propagation of routing announcement(s) beyond their intended scope. That is, an announcement from an Autonomous System (AS) of a learned BGP route to another AS is in violation of the intended policies of the receiver, the sender, and/or one of the ASes along the preceding AS path." Such leaks are possible because of a long-standing "…systemic vulnerability of the Border Gateway Protocol routing system…" BGP hijacking and transit-AS problems Like the TCP reset attack, session hijacking involves intrusion into an ongoing BGP session, i.e., the attacker successfully masquerades as one of the peers in a BGP session, and requires the same information needed to accomplish the reset attack. The difference is that a session hijacking attack may be designed to achieve more than simply bringing down a session between BGP peers. For example, the objective may be to change routes used by the peer, in order to facilitate eavesdropping, black holing, or traffic analysis. By default EBGP peers will attempt to add all routes received by another peer into the device's routing table and will then attempt to advertise nearly all of these routes to other EBGP peers. This can be a problem as multi-homed organizations can inadvertently advertise prefixes learned from one AS to another, causing the end customer to become the new, best-path to the prefixes in question. For example, a customer with a Cisco router peering with say AT&T and Verizon and using no filtering will automatically attempt to link the two major carriers, which could cause the providers to prefer sending some or all traffic through the customer (on perhaps a T1), instead of using high-speed dedicated links. This problem can further affect others that peer with these two providers and also cause those ASs to prefer the misconfigured link. In reality, this problem hardly ever occurs with large ISPs, as these ISPs tend to restrict what an end customer can advertise. However, any ISP not filtering customer advertisements can allow errant information to be advertised into the global routing table where it can affect even the large Tier-1 providers. The concept of BGP hijacking revolves around locating an ISP that is not filtering advertisements (intentionally or otherwise) or locating an ISP whose internal or ISP-to-ISP BGP session is susceptible to a man-in-the-middle attack. Once located, an attacker can potentially advertise any prefix they want, causing some or all traffic to be diverted from the real source towards the attacker. This can be done either to overload the ISP the attacker has infiltrated, or to perform a DoS or impersonation attack on the entity whose prefix is being advertised. It is not uncommon for an attacker to cause serious outages, up to and including a complete loss of connectivity. In early 2008, at least eight US Universities had their traffic diverted to Indonesia for about 90 minutes one morning in an attack kept mostly quiet by those involved. Also, in February 2008, a large portion of YouTube's address space was redirected to Pakistan when the PTA decided to block access to the site from inside the country, but accidentally blackholed the route in the global BGP table. While filtering and MD5/TTL protection is already available for most BGP implementations (thus preventing the source of most attacks), the problem stems from the concept that ISPs rarely ever filter advertisements from other ISPs, as there is no common or efficient way to determine the list of permissible prefixes each AS can originate. The penalty for allowing errant information to be advertised can range from simple filtering by other/larger ISPs to a complete shutdown of the BGP session by the neighboring ISP (causing the two ISPs to cease peering), and repeated problems often end in permanent termination of all peering agreements. It is also noteworthy that even causing a major provider to block or shutdown a smaller, problematic provider, the global BGP table will often reconfigure and reroute the traffic through other available routes until all peers take action, or until the errant ISP fixes the problem at the source. One useful offshoot of this concept is called BGP anycasting and is frequently used by root DNS servers to allow multiple servers to use the same IP address, providing redundancy and a layer of protection against DoS attacks without publishing hundreds of server IP addresses. The difference in this situation is that each point advertising a prefix actually has access to the real data (DNS in this case) and responds correctly to end user requests. Public incidents April 1997: The "AS 7007 incident" December 24, 2004: TTNet in Turkey hijacks the Internet May 7, 2005: Google's May 2005 Outage January 22, 2006: Con Edison Communications hijacks big chunk of the Internet February 24, 2008: Pakistan's attempt to block YouTube access within their country takes down YouTube entirely. November 11, 2008: The Brazilian ISP CTBC - Companhia de Telecomunicações do Brasil Central leaked their internal table into the global BGP table. It lasted over 5 minutes. Although, it was detected by a RIPE route server and then it was not propagated, affecting practically only their own ISP customers and few others. April 8, 2010: Chinese ISP hijacks the Internet July 2013: The Hacking Team aided Raggruppamento Operativo Speciale (ROS - Special Operations Group of the Italian National Military police) in regaining access to Remote Access Tool (RAT) clients after they abruptly lost access to one of their control servers when the Santrex IPv4 prefix 46.166.163.0/24 became permanently unreachable. ROS and the Hacking Team worked with the Italian network operator Aruba S.p.A. (AS31034) to get the prefix announced in BGP in order to regain access to the control server. February, 2014: Canadian ISP used to redirect data from ISPs. - In 22 incidents between February and May a hacker redirected traffic for roughly 30 seconds each session. Bitcoin and other crypto-currency mining operations were targeted and currency was stolen. January 2017: Iranian pornography censorship. April 2017: Russian telecommunication company Rostelecom (AS12389) originated 37 prefixes for numerous other Autonomous Systems. The hijacked prefixes belonged to financial institutions (most notably MasterCard and Visa), other telecom companies, and a variety of other organizations. Even though the possible hijacking lasted no more than 7 minutes it is still not clear if the traffic got intercepted or modified. December 2017: Eighty high-traffic prefixes normally announced by Google, Apple, Facebook, Microsoft, Twitch, NTT Communications, Riot Games, and others, were announced by a Russian AS, DV-LINK-AS (AS39523). April 2018: Roughly 1300 IP addresses within Amazon Web Services space, dedicated to Amazon Route 53, were hijacked by eNet (or a customer thereof), an ISP in Columbus, Ohio. Several peering partners, such as Hurricane Electric, blindly propagated the announcements. July 2018: Iran Telecommunication Company (AS58224) originated 10 prefixes of Telegram Messenger. November 2018: US-based China Telecom site originated Google addresses. May 2019: Traffic to a public DNS run by Taiwan Network Information Center (TWNIC) was rerouted to an entity in Brazil (AS268869). June 2019: Large European mobile traffic was rerouted through China Telecom (AS4134) "This route leak began when [Swiss] SafeHost (AS21217) announced more than forty-thousand IPv4 routes that had been learned from other peers and providers to its provider China Telecom (AS 4134). …In turn, China Telecom accepted these routes and propagated them…" February 2021: Initially reported that Cablevision Mexico (AS28548) leaked 282 prefixes creating conflicts for 763 ASNs in 80 countries, with the main impact in Mexico. Data from the Isolario MRT dump suggested that 7,200 IPv4 prefixes were announced and leaked to AS1874 impacting more than 1290 ASNs from over 100 countries. April 2021: Large BGP routing leak out of India: over 30,000 BGP prefixes hijacked via Vodaphone Idea Ltd (AS55410) causing 13X spike in inbound traffic. Prefixes were from around the globe but mostly US including Google, Microsoft, Akamai, and Cloudflare. February 2022: Attackers hijacked BGP prefixes that belonged to a South Korean cryptocurrency platform, and then issued a certificate on the domain via ZeroSSL to serve a malicious JavaScript file, stealing $1.9 million worth of cryptocurrency. See also Bogon filtering Border Gateway Protocol Resource Public Key Infrastructure Internet outage References External links Qrator.Radar: A real-time BGP connectivity and security monitoring system. BGPmon.net: A BGP specific monitoring system to detect prefix hijacks, route leakage and instability. Cyclops: A BGP network audit tool (prefix hijack, route leakage) by UCLA NetViews: A Real Time BGP Topology visualization and IP Hijacking Detection tool by University of Memphis. AS-CRED: A service of reputation-based trust management and real-time alert (prefix hijacking, unstable prefix announcement), for inter-domain routing by University of Pennsylvania. Is BGP safe yet?: List of ISPs that implement Resource Public Key Infrastructure (RPKI). Internet security Routing
11301107
https://en.wikipedia.org/wiki/On-premises%20software
On-premises software
On-premises software (also referred to as on-premise, and alternatively abbreviated on-prem) is installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility such as a server farm or cloud. On-premises software is sometimes referred to as "shrinkwrap" software, and off-premises software is commonly called "software as a service" ("SaaS") or "cloud computing". The software consists of database and modules that are combined to particularly serve the unique needs of the large organizations regarding the automation of corporate-wide business system and its functions. Comparison between on-premises and cloud (SaaS) Location On-premises software is established within the organisation's internal system along with the hardware and other infrastructure necessary for the software to function. Cloud-based software is usually served via internet and it can be accessed by users online regardless of the time and their location. Unlike on-premises software, cloud-based software users only need to install an application or a web browser in order to access its services. Costs needed for access to services For on-premises software, there are several costs expected to incur until the software and its services would be fully available for use. First of all, the construction of on-premises software within the organisation requires high initial costs including costs incurred for the purchase of hardwares and other infrastructures as well as costs required for software installation and examination. In addition to this, the entity is entitled to the purchase of the license particular to the software which involves costs and time for the preparation and required procedures. Furthermore, in order to maintain the software functionality, sustainable maintenance and operations are required and the entity will be subjected to the costs incurred for these as well. On the other hand, in general, the initial costs required for the use of software services are considered relatively low for cloud-based software and thus suitable to small enterprises without a large amount of capital. Moreover, cloud-based software users are not subjected to license fees as well as maintenance and operation costs since these are on hands of software vendors. Furthermore, costs incurred for infrastructures are expected to be smaller compared to on-premises software as users only need their electronic devices to be able to get access to the services. Although initial costs for the access to services are usually low for cloud-based software, total costs required for the use of software over a specific time period are unsure as cloud-based software requires routine payment (i.e. monthly subscription fee) for the use of services whereas on-premises software does not. Operation and maintenance The entity using on-premises software are fully responsible for the daily operation and maintenance of the system by itself. This results in more time and costs required for the system operation as well as IT personnel who have specialization in managing the system. On the other hand, for cloud-based software, it is a software provider who is responsible for the system operations and maintenance. Thus, no IT professionals need to be hired within the entity specifically for the purpose of operating the software. Backup and data storage As for the maintenance and operations, the entity using on-premises software is also responsible for backup and storage of software data. This implies the ability of the entity to have a full control over its data and its security. For cloud-based software, the entity has no requirement of data backup by itself, as this is also a responsibility of the software provider and data backup is perquisite for the provider in offering their services. On the other hand, the control of data by software providers suggests that users have no control over the data and software system performance. This may result in some security issues, especially for those who are subject to high level of regulation standards against data security, such as financial institutions. Data security As discussed, users are responsible of data management for on-premises software while for cloud-based software, the responsibility is on the software provider. However, the difference in the level of safety over data security between on-premises and cloud-based software is arguable. Some experts claim that cloud-based software is likely to be more secure as they have more amount of capital and other resources to invest in data security system than normal business entities. While others argue that this is questionable as software vendors are usually more exposed to being targeted by cyberattacker as they hold vast amount of data within the system. Development of software from on-premises to cloud-based On-premises software was invented first mainly for the purpose of corporate-wide process automation of large entities, in advance to the evolvement of cloud-based software, SaaS. SaaS emerged in the early 2000s, and some of businesses published SaaS products have experienced a failure, as customers wanted SaaS particularly for the purpose of the automation of single specific corporate functions rather than corporate-wide system. However, the idea of on-demand service delivery of the software was not revolutionary at the time of 2000s, as some vendors already had attempted this delivery style of software service in 1900s. The reason of the business model for not being widely known at that time was the lack of broadband penetration and that there was no sufficient internet accessibility to effectively make all the on-demand software service to work. As SaaS market evolves in 2000s, as opposed to on-premises software, the cloud-based software gets adopted into the market demand which is to serve many types of businesses, including small and large corporations, to automate specific business processes within the entities. In addition, SaaS allowed customers to make selection among many functions depending on each customer needs and economic conditions. Although on-premises software previously had a huge advantage of being capable of customization and tailoring software services to each business needs, SaaS has also been evolved as platforms where customizable services are available to some extent as cloud-based software market develops. On-premises software was prevailing in 2013 in Software Market, however, more and more customers and thus software vendors shift toward cloud-based software since then. Key corporate players who have been contributed to this software model change as well as associated ERP system are: Oracle Sage Microsoft SAP Salesforce For instance, SAP was originally an on-premises software vendor. In accordance with the change in technologies and customer preferences in software market, the company has turned itself into cloud-based ERP provider that are available both in public cloud and in private cloud depending on the customer needs. Microsoft previously provided on-premises ERP such as SharePoint2010 for automation of corporate-wide business system of large corporations. Recent years the company has been published many cloud-based software such as Azure and Microsoft Dynamics LCS that provide customers internet services that offer automated and standardized business functions for specific area of the businesses. Salesforce has brought revolution to business's CRM process through its cloud-based software service, including Sales Cloud that offers best suitable standardized business processes regarding the customer relation to the businesses. Current software market condition General market trend Over the last decade of software market, an increasing trend toward cloud-based software from traditional on-premises software has been appeared with an acceleration to its speed. At the time of 2016, despite this trend, most of corporations maintained their traditional information management system through on-premises software. This suggested that the trend shift in software market is occurring with a slow pace as the businesses are gradually shifting their software system from the traditional on-premises to cloud-based. In 2020, approximately 70% of business customers are planning new or further transitions from on-premises software to cloud-based software. In accordance to this consumer movement toward cloud-based solutions in software market, more and more vendors, including industry leading software corporations such as Microsoft, Oracle and SAP, shift their business model and transfer their products to cloud-based solutions. Pace of market adaptation Type of customers Faster shift from on-premises to cloud-based is expected in B2C market than B2B market. This is because businesses usually require much more complex structure and system of information management in contrast to private users. In addition, businesses are more prudent to the shift of its software system because they have significant concern over the data security as its failure could potentially result in the loss of enormous amount of data as well as the business's reputation. Business model Primary customers for relatively new software, SaaS, was the non-users of on-premises software as it was easier for them to make the purchase, installation and implementation of its service due to the factors previously discussed such as the lower installation cost and the lower system management cost. As the convenience of these features associated with cloud-based software becomes widely known, more customers (mainly businesses) start shifting their software system toward cloud-based as they have been realizing that SaaS brings more efficiency to their information and system management. Especially for those whose business processes are highly standardized and shared within their industry. Legislation and restriction Another factor resulted in the difference of the pace of market adaptation toward cloud-based software was the degree of concern and legislation regarding data security. In fact, developing economies where subjected to less restrictions regarding data security and legacy management, showed a relatively quicker response to the software market trend shift. Vendors' reaction (supply-side) Some vendors, particularly for those who have originally been offering on-premises software, are not willing to shift their software service to cloud-based as they will need to change their business model entirely and this requires a large amount of cost, time and efforts. Besides the demand-side (or customer-side) factors above, this vendor reaction could be another reason for the slow migration toward cloud-based services in software market. Impact of trend change The movement toward cloud-based software not only implies the change in business's information management system but also result in potential change in their value creation processes. Change in the role of the platform Cloud-based platform incorporates the functionality of facilitating the interactions and communications among customers and producers due to its feature of being accessible from various stakeholders at the same time, while on-premises software usually limits the access to its platform owner in exclusion to other group of individuals. Variety of on-platform services Cloud-based software provides the software services in relatively more flexible way and with more variations. The reason of this exists in the architecture of cloud-based software platform that consists of a number of different platforms with different specialty and functions. The most representative example of such platform is Microsoft Azure. The software consists of a number of distinct business platforms. Integration of on-premises and cloud-based As discussed above, on-premises solution and cloud-based solution have both positive and negative sides respectively. Thus, the 'better' choice among 2 software depends on many factors, for instance, customer's business model, financial status and business strategy. However, neither choice would provide customers the perfect solutions as both software do not offer full functionalities to its users. In transition to cloud-based solution for the information management, customers' concern involves the security of data, privacy, and many more that may be better provided by the traditional on-premises solution. In order to deal with this problem, the software market came up with new solution to combine on-premises and cloud-based solution and its best features. As such, the software will be provided on-demand with customization simultaneously. Software industry History and evolution Software has begun evolving from the beginning of 1990s and there was a big movement in business market trend toward the use of software at the beginning of 2000s. Although, during these periods, IT industry as a whole was in the middle of market boom and experienced a rapid growth in its market size, software market accounted for nearly 25% of all the spending in IT industry products. According to Hietala's research, US has been always the biggest country player in the software business and has been presenting a dominant market position in the market. In 2006, software products of US companies occupied around 60% of the whole world software product turnover. Software product types There are mainly 3 types of software product from the function point of view and from a commercial perspective: Pure software product Embedded software product Customer-tailored software Pure software is mainly sold or purchased on its own as one independent product and not being incorporated into other products. Although these software are traded as main product, sometimes vendors get more revenue stream from services that are combined with or offered on the software platform. Unlike pure software product, embedded software products are not traded on its own but rather considered as a part being incorporated in other products. The examples are the software embedded into the mobile phone, computer and other electronic devices. In general, completely different ways of architecture and system construction needed for this type of software compared to that of traditional software products. Customer-tailored software are the software of which the system and the service can be tailored to individual needs of customers. This customization can be achieved through a variety of different combination of software modules and platforms. The core purpose of this software product is to solve a specific business issues of individual customers and provide a unique solution to that through technology. While standard cloud-based software usually offer standardized solution and service to a broad range of customers within an industry and/or market area. See also Client (computing) Self-hosting (web services) References Software delivery methods Software distribution
41476791
https://en.wikipedia.org/wiki/Meanings%20of%20minor%20planet%20names%3A%203001%E2%80%934000
Meanings of minor planet names: 3001–4000
3001–3100 |- | 3001 Michelangelo || || Michelangelo (1475–1564), an Italian sculptor, painter, architect, and poet of the High Renaissance || |-id=002 | 3002 Delasalle || || Jean-Baptiste de La Salle (1651–1719), French priest, educational reformer, and founder of the Institute of the Brothers of the Christian Schools || |-id=003 | 3003 Konček || 1983 YH || Mikuláš Konček (1900–1982), a Slovak meteorologist, who founded of the Meteorological Institute in Bratislava || |-id=004 | 3004 Knud || 1976 DD || Knud Rasmussen (1879–1933), a Greenlandic/Danish polar explorer and anthropologist, who has been called the "father of Eskimology" || |-id=005 | 3005 Pervictoralex || || Per Victor Alexander Lagerkvist, son of Swedish discoverer Claes-Ingvar Lagerkvist || |-id=006 | 3006 Livadia || || Livadiya, a suburb of Yalta on the coast of the Crimean Peninsula || |-id=007 | 3007 Reaves || 1979 UC || Gibson Reaves, American astronomer, historian and educator at the University of Southern California || |-id=008 | 3008 Nojiri || 1938 WA || Hōei Nojiri (1885–1977) Japanese essayist, author and astronomer || |-id=009 | 3009 Coventry || || Coventry, England, sister city of Volgograd || |-id=010 | 3010 Ushakov || || Fyodor Ushakov (1745–1817), Russian admiral || |-id=011 | 3011 Chongqing || || Chongqing, China || |-id=012 | 3012 Minsk || || Minsk, Byelorussian SSR || |-id=013 | 3013 Dobrovoleva || || Oleg Vasilyevich Dobrovolsky, Soviet astronomer known for his cometary studies. He was the head of the Cometary Astronomy Department of the Institute of Astrophysics of the Tadjik S.S.R. Academy of Sciences in Dushanbe. || |-id=014 | 3014 Huangsushu || 1979 TM || Su-Shu Huang (1915–1977), Chinese-American astrophysicist known for his studies on circumstellar habitable zones and prerequisites of extraterrestrial life || |-id=015 | 3015 Candy || 1980 VN || Michael P. Candy (1928–1994), British astrometrist and discoverer of minor planets and comets. Director of the Royal Greenwich Observatory and Perth Observatory. President of IAU Commission VI. || |-id=016 | 3016 Meuse || 1981 EK || The Meuse River (Dutch Maas), which rises in France and flows through Belgium and the Netherlands || |-id=017 | 3017 Petrovič || 1981 UL || Štefan Petrovič (1906–?), Slovak climatologist || |-id=018 | 3018 Godiva || 1982 KM || Lady Godiva (died ca. 1076), medieval Anglo-Saxon noblewoman and church patron, wife of Leofric, Earl of Mercia || |-id=019 | 3019 Kulin || 1940 AC || György Kulin (1905–1989), Hungarian astronomer || |-id=020 | 3020 Naudts || 1949 PR || Ignace Naudts (1949–1992), Belgian amateur astronomer || |-id=021 | 3021 Lucubratio || 1967 CB || Latin for "nocturnal study, night work" (from lucubrum, candle) || |-id=022 | 3022 Dobermann || 1980 SH || Karl Friedrich Louis Dobermann (1834–1894), German zoologist and amateur astronomer known for breeding the Dobermann || |-id=023 | 3023 Heard || 1981 JS || John Frederick Heard (1907–1976), a Canadian astronomer, professor of astronomy at the University of Toronto and fourth director of the David Dunlap Observatory || |-id=024 | 3024 Hainan || || Hainan Province || |-id=025 | 3025 Higson || 1982 QR || Roger Higson, American night assistant for the 1.2-meter Samuel Oschin telescope at Palomar Observatory in California. His supportive work has been appreciated by observers of comets and minor planets. || |-id=026 | 3026 Sarastro || || Sarastro, high priest of the Temple of Wisdom in Mozart's The Magic Flute || |-id=027 | 3027 Shavarsh || || Shavarsh Karapetyan (born 1953), a Soviet–Armenian champion and world-record finswimmer, who saved 20 lives from drowning when a trolleybus fell into the Yerevan Lake. || |-id=028 | 3028 Zhangguoxi || || Zhang Guoxi, a Chinese industrialist and philanthropist || |-id=029 | 3029 Sanders || || Jeffrey D. Sanders, American astronomer who participated in the Palomar Planet-Crossing Asteroid Survey as an undergraduate student || |-id=030 | 3030 Vehrenberg || || Hans Vehrenberg, German amateur astronomer from Düsseldorf. He is the author of the Atlas of Deep-Sky Splendors (). For researchers on minor planets and comets he published the "Falkauer Atlas" and "Atlas Stellarum". || |-id=031 | 3031 Houston || 1984 CX || Walter Scott Houston (1912–1993), American amateur astronomer well known for his column Deep Sky Wonders in Sky & Telescope || |-id=032 | 3032 Evans || || Reverend Robert O. Evans, Australian amateur astronomer, discoverer of several extragalactic supernovae || |-id=033 | 3033 Holbaek || 1984 EJ || Holbæk, Denmark, town nearest to the discovery site (Brorfelde Observatoriet) on the occasion of the former's 700th anniversary in 1986 || |-id=034 | 3034 Climenhaga || A917 SE || John L. Climenhaga (1916–2008), Canadian astronomer and father of journalist David Climenhaga (Src/Src) || |-id=035 | 3035 Chambers || A924 EJ || John Eric Chambers (born 1969), then British predoctoral fellow at the Harvard-Smithsonian Center for Astrophysics || |-id=036 | 3036 Krat || 1937 TO || Vladimir Krat (1911–1983), Russian astronomer || |-id=037 | 3037 Alku || 1944 BA || Finnish for "Beginning", the discoverer's boyhood boat, built by his father || |-id=038 | 3038 Bernes || || Mark Bernes (1911–1969), Soviet film actor and singer || |-id=039 | 3039 Yangel || || Mikhail Yangel (1911–1971), a leading Soviet rocket and missile designer || |-id=040 | 3040 Kozai || 1979 BA || Yoshihide Kozai (1928–2018), Japanese astronomer and celestial mechanician, discoverer of the Kozai mechanism || |-id=041 | 3041 Webb || 1980 GD || Rev. Thomas William Webb (1807–1885), a British astronomer, author of Celestial Objects for Common Telescopes and discoverer of S Orionis || |-id=042 | 3042 Zelinsky || || David S. Zelinsky, American mathematician at Brown University, formerly active participant in the Palomar Planet-Crossing Asteroid Survey while an undergraduate student at Caltech || |-id=043 | 3043 San Diego || 1982 SA || San Diego, California, in recognition of its efforts to curb light pollution || |-id=044 | 3044 Saltykov || || Nikita Saltykov (1893–1946), Russian farmer and grandfather of Natal'ja Vital'evna Metlova who co-discovered this minor planet || |-id=045 | 3045 Alois || 1984 AW || Alois T. Stuczynski, grandfather of American astronomer Joe Wagner who discovered this minor planet || |-id=046 | 3046 Molière || 4120 P-L || Molière (1622–1673), the famous French playwright || |-id=047 | 3047 Goethe || 6091 P-L || Johann Wolfgang von Goethe (1749–1832), German poet and playwright || |-id=048 | 3048 Guangzhou || || Guangzhou, Guangdong, China || |-id=049 | 3049 Kuzbass || 1968 FH || The coal mining Kuznets Basin, located in the Kemerovo Region of Siberia, one of the richest coal deposits in the world || |-id=050 | 3050 Carrera || 1972 NW || The four brothers of the Carrera family: Javiera (1781–1862), Juan José (1782–1818), José Miguel (1785–1821), and Luis (1791–1818), key figures of the Chilean War of Independence || |-id=051 | 3051 Nantong || 1974 YP || Nantong, Jiangsu, China || |-id=052 | 3052 Herzen || || Alexander Herzen (1812–1870), Russian revolutionary, writer, and philosopher, "father of Russian socialism" and founder of the free Russian press abroad || |-id=053 | 3053 Dresden || 1977 QS || The German city of Dresden || |-id=054 | 3054 Strugatskia || || The brothers Arkady and Boris Strugatsky (1925–1991, 1933–2012) Russian science fiction writers || |-id=055 | 3055 Annapavlova || || Anna Pavlova (1881–1931), a Russian prima ballerina best known for her performance of The Dying Swan || |-id=056 | 3056 INAG || || The French National Institute of Astronomy and Geophysics (; INAG), which built the discovery telescope || |-id=057 | 3057 Mälaren || 1981 EG || Lake Mälaren, Sweden || |-id=058 | 3058 Delmary || || Delmary Rose Schanz (born 1938), an American artist || |-id=059 | 3059 Pryor || || Carlton P. Pryor, American astronomer, who participated in the Palomar Planet-Crossing Asteroid Survey while an undergraduate student at Caltech || |-id=060 | 3060 Delcano || || Juan Sebastián Elcano or del Caño (1476–1526) a Spanish navigator, lieutenant of Magellan, first to continuously circumnavigate the globe || |-id=061 | 3061 Cook || || James Cook (1728–1779), British explorer and navigator || |-id=062 | 3062 Wren || 1982 XC || Sir Christopher Wren (1632–1723), British architect and astronomer || |-id=063 | 3063 Makhaon || 1983 PV || Makhaon, mythical physician to Greeks during the Trojan War || |-id=064 | 3064 Zimmer || || Louis Zimmer (1888–1970), Belgian amateur astronomer and clockmaker to the King of Belgium || |-id=065 | 3065 Sarahill || 1984 CV || Sarah J. Hill, professor of astronomy and later chairman of the astronomy department at Wellesley College || |-id=066 | 3066 McFadden || 1984 EO || Lucy-Ann McFadden (born 1953), an American astronomer and planetary scientist || |-id=067 | 3067 Akhmatova || || Anna Akhmatova (1889–1966), Soviet poet || |-id=068 | 3068 Khanina || || Frida Borisovna Khanina, Soviet orbit computer and long-time member of the Institute for Theoretical Astronomy || |-id=069 | 3069 Heyrovský || || Jaroslav Heyrovský (1890–1967), Czech physical chemist || |-id=070 | 3070 Aitken || 1949 GK || Robert Grant Aitken (1864–1951), an American astronomer, fourth director of the Lick Observatory, and author of the "New General Catalogue of Double Stars within 12° of the North Pole" (1932) || |-id=071 | 3071 Nesterov || || Pyotr Nesterov (1887–1914), a Russian pioneer airman || |-id=072 | 3072 Vilnius || || Vilnius, Lithuania || |-id=073 | 3073 Kursk || || Kursk, Russia || |-id=074 | 3074 Popov || || Alexander Stepanovich Popov (1859–1906), a Russian radio inventor || |-id=075 | 3075 Bornmann || || Patricia L. Bornmann, American solar astronomer, who participated in the Palomar Planet-Crossing Asteroid Survey while an undergraduate student at Caltech || |-id=076 | 3076 Garber || || Paul E. Garber (1899–1992), an American historian and first head of the National Air Museum of the Smithsonian Institution, in Washington, D.C || |-id=077 | 3077 Henderson || 1982 SK || Thomas Henderson (1798–1844), a Scottish astronomer, mathematician, and first Astronomer Royal for Scotland. In 1839 he was the first person to measure the distance Alpha Centauri || |-id=078 | 3078 Horrocks || 1984 FG || Jeremiah Horrocks (1619–1641), also known as Jeremiah Horrox, an English astronomer and mathematician, who predicted and was the first to observe the transit of Venus in 1639. He also to demonstrate that the Moon moved around the Earth in an elliptical orbit. || |-id=079 | 3079 Schiller || 2578 P-L || Friedrich Schiller (1759–1805), a German playwright || |-id=080 | 3080 Moisseiev || 1935 TE || Nikolay Moiseyev (1902–1955), a Soviet astronomer and an expert in celestial mechanics || |-id=081 | 3081 Martinůboh || 1971 UP || Bohuslav Martinů (1890–1959), a Czech composer of modern classical music || |-id=082 | 3082 Dzhalil || 1972 KE || Musa Cälil (Musa Mustafovich Dzhalil'; 1906–1944), a Tatar Soviet poet and resistance fighter || |-id=083 | 3083 OAFA || 1974 MH || Félix Aguilar Observatory in Argentina || |-id=084 | 3084 Kondratyuk || || Yuri Kondratyuk (1897–1942), a Soviet engineer, mathematician and pioneer of astronautics and spaceflight || |-id=085 | 3085 Donna || 1980 DA || Donna Marie Thompson, American administrative assistant for the Minor Planet Center and the Central Bureau for Astronomical Telegrams, secretary for the Planetary Sciences division of the Harvard-Smithsonian Center for Astrophysics || |-id=086 | 3086 Kalbaugh || 1980 XE || Carroll Kalbaugh Liller, father of Chilean astronomer William Liller || |-id=087 | 3087 Beatrice Tinsley || || Beatrice Tinsley (1941–1981), a British-born New Zealand astronomer and cosmologist || |-id=088 | 3088 Jinxiuzhonghua || || "Splendid China", park at Shenzhen, the largest miniature scenic spot in the world || |-id=089 | 3089 Oujianquan || || Ou Jianquan, a Chinese entrepreneur, for his notable contributions in developing township enterprises || |-id=090 | 3090 Tjossem || 1982 AN || The Tjossem family of central Washington State, four generations of whose members have been friends of the discoverer and his family (in particular Peter Tjossem, 19th–20th-century amateur entomologist and paleobotanist) || |-id=091 | 3091 van den Heuvel || 6081 P-L || Ed van den Heuvel (born 1940), a Dutch astronomer, and his niece Julia Edith van den Heuvel || |-id=092 | 3092 Herodotus || 6550 P-L || Herodotus (c. 484 BC – c. 425 BC), a Greek historian, "Father of Historiography" || |-id=093 | 3093 Bergholz || 1971 MG || Olga Bergholz (1910–1975), a Soviet poet || |-id=094 | 3094 Chukokkala || || Korney Chukovsky (1882–1969), pen name of Nikolaj Kornejchukov, one of the most popular children's poets in the Russian language || |-id=095 | 3095 Omarkhayyam || || Omar Khayyam (1048–1131), a Persian astronomer, mathematician and philosopher || |-id=096 | 3096 Bezruč || || Petr Bezruč (1867–1958), a Czech poet || |-id=097 | 3097 Tacitus || 2011 P-L || Tacitus (c. 56–120), Roman historian || |-id=098 | 3098 van Sprang || 4579 P-L || Bert van Sprang (1944–2015), Dutch meteor specialist || |-id=099 | 3099 Hergenrother || 1940 GF || Carl W. Hergenrother (born 1973), an American astronomer and discoverer of minor planets || |-id=100 | 3100 Zimmerman || || Nikolaj Vladimirovich Zimmerman (1890–1942), Russian astronomer at Pulkovo Observatory and professor at Leningrad University, known for his astrometric observations and his compilations of star catalogs || |} 3101–3200 |- | 3101 Goldberger || 1978 GB || Marvin Leonard Goldberger (1922–2014), American physicist, teacher and humanitarian, president of the California Institute of Technology, to commemorate his birthday, October 22 || |-id=102 | 3102 Krok || 1981 QA || Krok (Libuše), mythical Slavonic prince || |-id=103 | 3103 Eger || 1982 BB || Eger a small town NE of Budapest, at one time the sixth largest town in Hungary, known for its medieval streets, castle, and red wine (Bull's Blood) || |-id=104 | 3104 Dürer || || Albrecht Dürer (1471–1528), German master painter, woodcutter, engraver, and scholar || |-id=105 | 3105 Stumpff || A907 PB || Karl Stumpff (1895–1970), a German celestial mechanician and professor of astronomy, pioneer of Fast Fourier Analysis, author of the three-volume Himmelsmechanik || |-id=106 | 3106 Morabito || 1981 EE || Linda A. Morabito (born 1953), Education Programs Manager at the Planetary Society || |-id=107 | 3107 Weaver || || Kenneth Weaver (1915–2010), American senior assistant editor for science of the National Geographic magazine || |-id=108 | 3108 Lyubov || 1972 QM || Lyubov Orlova (1902–1975), actress and star of Soviet cinema || |-id=109 | 3109 Machin || 1974 DC || Arnold Machin (1911–1999), a British sculptor || |-id=110 | 3110 Wagman || 1975 SC || Nicholas E. Wagman (1905–1980), an American astronomer and astrometrist || |-id=111 | 3111 Misuzu || || Nickname of Shinano Province, now Nagano Prefecture, Japan, the discovery site || |-id=112 | 3112 Velimir || || Velimir (Viktor Vladimirovitch) Khlebnikov, 19th–20th-century Russian poet || |-id=113 | 3113 Chizhevskij || 1978 RO || Aleksandr Leonidovich Chizhevskij, 20th-century Soviet biologist, one of the founders of heliobiology || |-id=114 | 3114 Ercilla || || Don Alonso de Ercilla y Zúñiga, 16th-century Spanish poet and soldier, who distinguished himself in the campaign in Chile against the Araucanians, inspiration for the epic poem La Araucana || |-id=115 | 3115 Baily || 1981 PL || Francis Baily, 18th–19th-century English astronomer, one of the founders of the Royal Astronomical Society, and namesake of Baily's beads || |-id=116 | 3116 Goodricke || 1983 CF || John Goodricke, 18th-century Dutch-English deaf-mute astronomer, who identified Algol as an eclipsing variable and discovered δ Cephei || |-id=117 | 3117 Niepce || || Joseph Nicéphore Niépce, 18th–19th-century French photography pioneer || |-id=118 | 3118 Claytonsmith || 1974 OD || Clayton Albert Smith (1934–1993), an American astrometrist, director of the Yale-Columbia Southern Observatory and later the United States Naval Observatory's astrometry department || |-id=119 | 3119 Dobronravin || 1972 YX || Petr Pavlovich Dobronravin, Russian astrophysicist and spectroscopist, deputy director of the Crimean Astrophysical Observatory 1952–1969 || |-id=120 | 3120 Dangrania || 1979 RZ || Daniil Aleksandrovich Granin, 20th-century Russian writer || |-id=121 | 3121 Tamines || 1981 EV || Tamines, Belgium, now called (Sambreville) || |-id=122 | 3122 Florence || || Florence Nightingale, English nurse and hospital reformer || |-id=123 | 3123 Dunham || || David W. Dunham, American astronomer, organizer of the International Occultation Timing Association || |-id=124 | 3124 Kansas || 1981 VB || Kansas, United States, the discoverer's home state, and also the University of Kansas, the discoverer's alma mater, to commemorate the centennial of observational astronomy there, which began with the purchase of an Alvan Clark 6-inch refractor in 1885 || |-id=125 | 3125 Hay || || William Thompson Hay (1888–1949), British music-hall comedian, film star of the 1930s and early 1940s, and amateur astronomer, (re)discoverer of Saturn's Great White Spot in 1933 || |-id=126 | 3126 Davydov || || Denis Vasil'evich Davydov (1784–1839), Russian officer, writer and poet, hero of the Patriotic War of 1812 || |-id=127 | 3127 Bagration || || Petr Ivanovich Bagration, 18th–19th-century Russian (of Georgian descent) general, hero of the Patriotic War of 1812 who died at the Battle of Borodino || |-id=128 | 3128 Obruchev || || Vladimir Afanasjevich Obruchev, 19th–20th-century Russian geologist, geographer, and author of popular books on science and science-fiction novels || |-id=129 | 3129 Bonestell || || Chesley Bonestell, American space artist. Named following a competition organized by the Planetary Society || |-id=130 | 3130 Hillary || 1981 YO || Sir Edmund Hillary, British mountaineer || |-id=131 | 3131 Mason-Dixon || || Charles Mason and Jeremiah Dixon, 18th-century British astronomers who observed the 1761 transit of Venus from the Cape of Good Hope, and later (1763–1767) surveyed the boundary between Pennsylvania and Maryland, the Mason–Dixon line || |-id=132 | 3132 Landgraf || 1940 WL || Werner Landgraf, German astronomer, who established the orbit (and whose initials appear in the provisional designation) || |-id=133 | 3133 Sendai || A907 TC || Sendai, Japan, the "Heidelberg of the East" (this object was discovered from Heidelberg) and the Sendai Municipal Astronomical Observatory || |-id=134 | 3134 Kostinsky || A921 VA || Sergej Konstantinovich Kostinsky (1867–1936), Russian astronomer, after whom the "Kostinsky effect" is named || |-id=135 | 3135 Lauer || || Tod R. Lauer, American astronomer, who participated in the Palomar Planet-Crossing Asteroid Survey while an undergraduate student at Caltech || |-id=136 | 3136 Anshan || || Anshan, Liaoning, China || |-id=137 | 3137 Horky || || Czech hill, site of Antonín Mrkos' first telescope || |-id=138 | 3138 Ciney || 1980 KL || Ciney, Belgium, chief town of the Condroz, where the discoverer maintains a residence || |-id=139 | 3139 Shantou || || Shantou, Guangdong, China || |-id=140 | 3140 Stellafane || 1983 AO || Stellafane, the annual Vermont star party organized by the "Springfield Telescope Makers" || |-id=141 | 3141 Buchar || 1984 RH || Emil Buchar (1901–1979), Czech discoverer of minor planets and pioneer of satellite geodesy || |-id=142 | 3142 Kilopi || 1937 AC || Kilopi, or 1000 × π, which rounds off to 3142, the number assigned to this minor planet || |-id=143 | 3143 Genecampbell || 1980 UA || I. Gene Campbell, American systems programmer in the central computing facility at the Harvard-Smithsonian Center for Astrophysics || |-id=144 | 3144 Brosche || || Peter Brosche (born 1936), German astronomer || |-id=145 | 3145 Walter Adams || 1955 RY || Walter Sydney Adams, 19th–20th-century American astronomer, director of the Mount Wilson Observatory (1923–1946), whose spectroscopic studies led to the discovery, with Ernst Arnold Kohlschütter, of the spectroscopic method for determining parallax, and who identified Sirius B as the first white-dwarf star known || |-id=146 | 3146 Dato || 1972 KG || Dato Kratsashvili (1963–1980), a young Georgian painter || |-id=147 | 3147 Samantha || || Samantha Reed Smith, 20th-century American schoolgirl who became "America's Youngest Ambassador" || |-id=148 | 3148 Grechko || || Georgii Mikhailovich Grechko, Soviet cosmonaut and scientist || |-id=149 | 3149 Okudzhava || 1981 SH || Bulat Okudzhava, Russian (of Georgian descent) writer, poet and songwriter || |-id=150 | 3150 Tosa || 1983 CB || Tosa Province (Ancient name of Kōchi Prefecture), Japan, the discoverer's place of residence || |-id=151 | 3151 Talbot || 1983 HF || Henry Fox Talbot (1800–1877), British inventor and pioneer of photography || |-id=152 | 3152 Jones || 1983 LF || Albert F. A. L. Jones (1920–2013), New Zealand amateur astronomer || |-id=153 | 3153 Lincoln || || Abraham Lincoln (1809–1865), 16th American President of the United States || |-id=154 | 3154 Grant || || Ulysses S. Grant (1822–1885), 18th American President of the United States || |-id=155 | 3155 Lee || || Robert E. Lee (1807–1870), American general and commander of the Confederate Army of Northern Virginia in the American Civil War || |-id=156 | 3156 Ellington || 1953 EE || Duke Ellington (1899–1974), American musician || |-id=157 | 3157 Novikov || || Alexei Ivanovich Novikov (1916–1986), Soviet aviator and poet || |-id=158 | 3158 Anga || || Siberian village, birthplace of Russian ethnographers Ivan Evseevich Venyaminov and Afanasij Prokopevich Shchapov || |-id=159 | 3159 Prokof'ev || || Vladimir Prokofiev (1898–1993), Russian spectroscopist || |-id=160 | 3160 Angerhofer || 1980 LE || Phillip Edward Angerhofer (1950–1986), American astronomer and astrophysicist at USNO || |-id=161 | 3161 Beadell || || Len Beadell (1923–1995), Australian surveyor || |-id=162 | 3162 Nostalgia || 1980 YH || Nostalgia, a sentimentality for the past || |-id=163 | 3163 Randi || 1981 QM || James Randi (1928–2020), Canadian-American magician and science skeptic, who debunked numerous paranormal and pseudoscientific claims || |-id=164 | 3164 Prast || 6562 P-L || Martin Prast, American citizen and war veteran || |-id=165 | 3165 Mikawa || 1984 QE || Mikawa Province (Ancient name of eastern half of Aichi Prefecture), Japan || |-id=166 | 3166 Klondike || 1940 FG || The brothers Karl F. Joutsen and Anton F. Johnson, who made a fortune in the Klondike Gold Rush || |-id=167 | 3167 Babcock || 1955 RS || Horace W. Babcock (1912–2003) and his father Harold D. Babcock (1882–1968), American astronomers || |-id=168 | 3168 Lomnický Štít || 1980 XM || Lomnický Štít, Czech meteorological and solar observatory || |-id=169 | 3169 Ostro || 1981 LA || Steven Jeffrey Ostro (1946–2008), American radar astronomer || |-id=170 | 3170 Dzhanibekov || || Vladimir Dzhanibekov (born 1942), Soviet cosmonaut || |-id=171 | 3171 Wangshouguan || 1979 WO || Shou-Guan Wang (Wang Shouguan), Chinese astronomer and honorary president of the Chinese Astronomical Society || |-id=172 | 3172 Hirst || 1981 WW || William Parkinson Hirst, South African astronomer and orbit computer || |-id=173 | 3173 McNaught || 1981 WY || Robert McNaught (born 1956), British astronomer and discoverer of minor planets || |-id=174 | 3174 Alcock || 1984 UV || George Alcock (1912–2000), British comet and nova hunter || |-id=175 | 3175 Netto || 1979 YP || Edgar Rangel Netto, Brazilian astronomer || |-id=176 | 3176 Paolicchi || || Paolo Paolicchi, Italian astrophysicist and professor at University of Pisa || |-id=177 | 3177 Chillicothe || 1934 AK || City of Chillicothe, Ohio || |-id=178 | 3178 Yoshitsune || 1984 WA || Minamoto no Yoshitsune (1159–1189), nobleman and military commander, and one of the best known samurais || |-id=179 | 3179 Beruti || 1962 FA || Arturo Berutti (1862–1938), Argentinian composer of classical music, known for his operas Pampa, Kryse, Evangelina and Taras Bulba || |-id=180 | 3180 Morgan || 1962 RO || William Wilson Morgan (1906–1994), American astronomer || |-id=181 | 3181 Ahnert || 1964 EC || Paul Oswald Ahnert (1897–1989), German astronomer and author of the annual Kalender fur Sternfreunde || |-id=182 | 3182 Shimanto || 1984 WC || Shimanto River, longest river of the discoverer's home prefecture of Kochi, Japan || |-id=183 | 3183 Franzkaiser || 1949 PP || Franz Kaiser (1891–1962), German astronomer || |-id=184 | 3184 Raab || 1949 QC || Herbert Raab (born 1969), Austrian software engineer and amateur astronomer, author of Astrometrica software || |-id=185 | 3185 Clintford || || Clinton B. Ford (1913–1992), American investor and amateur astronomer, secretary of the AAVSO, co-founder of the Ford Observatory, and recipient of ASP's Amateur Achievement Award || |-id=186 | 3186 Manuilova || || Olga Maksimilianovna Manuilova (1893–1984), Soviet sculptor || |-id=187 | 3187 Dalian || || Dalian, Liaoning, China || |-id=188 | 3188 Jekabsons || 1978 OM || Peter Jekabsons (1943–1990), Australian amateur astronomer and astronomical painter, whose paintings adorn the walls of the discovering Perth Observatory || |-id=189 | 3189 Penza || || Penza, Russian city || |-id=190 | 3190 Aposhanskij || || Vladimir Mikhailovich Aposhanskij (1910–1943), a Soviet poet and journalist || |-id=191 | 3191 Svanetia || || Svanetia, a mountainous district in Georgia || |-id=192 | 3192 A'Hearn || || Michael A'Hearn (1940–2017), American astronomer || |-id=193 | 3193 Elliot || 1982 DJ || James L. Elliot (1943–2011), American professor of physics and astronomy at the Massachusetts Institute of Technology and co-discoverer of the Uranian rings || |-id=194 | 3194 Dorsey || || Dorsey Taylor Shoemaker Jr., American businessman and uncle of Eugene Shoemaker (formerly credited 2nd discoverer) || |-id=195 | 3195 Fedchenko || || The Russian Fedchenko family: Alexei Pavlovich Fedchenko (1844–1873), naturalist and explorer, his wife Olga Fedchenko (1845–1921), botanist and plant collector, and their son Boris Fedtschenko (1872–1947), botanist, geographer and writer. || |-id=196 | 3196 Maklaj || 1978 RY || Nicholas Miklouho-Maclay (1846–1888), Russian ethnologist and anthropologist who studied the Papuans in New Guinea || |-id=197 | 3197 Weissman || 1981 AD || Paul Robert Weissman, American cometary physicist || |-id=198 | 3198 Wallonia || || Wallonia (Walloon Region), one of the three federal regions of Belgium, the discoverer's birthplace and location of the Institut d'astrophysique (the discovery site operator) || |-id=199 | 3199 Nefertiti || 1982 RA || Nefertiti (c. 1370 – c. 1330 BC), Egyptian queen || |-id=200 | 3200 Phaethon || 1983 TB || Phaethon from Greek mythology. Son of Helios, he operated the solar chariot for a day, lost control of it and almost set fire to the Earth (the object, associated with the Geminid meteor stream, had then the smallest known perihelion distance) || |} 3201–3300 |- | 3201 Sijthoff || 6560 P-L || Albert Georg Sijthoff, a Dutch publisher whose family backed the construction of the Sijthoff Planetarium in The Hague in 1934. || |-id=202 | 3202 Graff || A908 AA || Gareth V. Williams (born 1965), British astronomer at the Minor Planet Center || |-id=203 | 3203 Huth || 1938 SL || Hans Huth (1925–1988), German astronomer || |-id=204 | 3204 Lindgren || 1978 RH || Astrid Lindgren (1907–2002), Swedish writer || |-id=205 | 3205 Boksenberg || || Alexander Boksenberg (born 1936), British astronomer || |-id=206 | 3206 Wuhan || || Wuhan, the largest city in central China || |-id=207 | 3207 Spinrad || || Hyron Spinrad (1934–2015), American astronomer || |-id=208 | 3208 Lunn || 1981 JM || Borge Lunn, Danish civil engineer and metallurgist || |-id=209 | 3209 Buchwald || || Vagn Fabritius Buchwald, Danish meteoriticist || |-id=210 | 3210 Lupishko || || Dmitrij Fedorovich Lupishko, Ukrainian astronomer || |-id=211 | 3211 Louispharailda || 1931 CE || Louis Pierre Van Biesbroeck, and Pharailda de Colpaert Van Biesbroeck, parents of the discoverer || |-id=212 | 3212 Agricola || || Georgius Agricola (1494–1555), German scientist, "father of mineralogy" || |-id=213 | 3213 Smolensk || 1977 NQ || Smolensk, Russian city || |-id=214 | 3214 Makarenko || || Anton Makarenko (1888–1939), Soviet teacher and writer || |-id=215 | 3215 Lapko || 1980 BQ || Konstantin Kuz'mich Lapko, Soviet surgeon || |-id=216 | 3216 Harrington || 1980 RB || Robert Sutton Harrington (1942–1993), American astronomer || |-id=217 | 3217 Seidelmann || 1980 RK || Paul Kenneth Seidelmann, American astronomer || |-id=218 | 3218 Delphine || 6611 P-L || Delphine Jehoulet Delsemme, wife of Armand Delsemme, a Belgian-born astronomer at the University of Toledo in Ohio (see ) || |-id=219 | 3219 Komaki || 1934 CX || Kōjirō Komaki, Japanese amateur astronomer || |-id=220 | 3220 Murayama || 1951 WF || Sadao Murayama, Japanese astronomer || |-id=221 | 3221 Changshi || || Changshu, Jiangsu, China || |-id=222 | 3222 Liller || 1983 NJ || William Liller, American astronomer † || |-id=223 | 3223 Forsius || 1942 RN || Sigfrid Aronus Forsius (Siegfried Aronsen; c. 1550–1624), Finnish-born Professor of Astronomy in Uppsala, Sweden. His 1611 manuscript propounding his theory of colours was discovered in the Royal Library in Stockholm in 1969 || |-id=224 | 3224 Irkutsk || || Irkutsk, Russia || |-id=225 | 3225 Hoag || 1982 QQ || Arthur Hoag (1921–1999), American astronomer || |-id=226 | 3226 Plinius || 6565 P-L || Pliny the Younger (62–114) || |-id=227 | 3227 Hasegawa || 1928 DF || Ichirō Hasegawa, Japanese astronomer || |-id=228 | 3228 Pire || 1935 CL || Georges Pire (Father Dominique), Belgian monk (Dominican Order), winner of the 1958 Nobel Prize for Peace || |-id=229 | 3229 Solnhofen || A916 PC || Solnhofen, south (SSE) of Nuremberg in Germany and known for its limestone and fossils || |-id=230 | 3230 Vampilov || 1972 LE || Alexander Vampilov (1937–1972), Soviet playwright || |-id=231 | 3231 Mila || || Lyudmila Pakhomova (1946–1986), Soviet ice dancer || |-id=232 | 3232 Brest || 1974 SL || Brest, a city in Belarus || |-id=233 | 3233 Krišbarons || || Krišjānis Barons (1835–1923), Latvian folklorist || |-id=234 | 3234 Hergiani || || Mikhail Vissarionovich Hergiani (1932–1969), famous Soviet mountaineer || |-id=235 | 3235 Melchior || || Paul Jacques Léon Melchior, Belgian geophysicist || |-id=236 | 3236 Strand || || Kaj Aage Gunnar Strand (1907–2000), Danish and American astronomer || |-id=237 | 3237 Victorplatt || || Victor D. Platt, father of astronomer John Platt who discovered this minor planet || |-id=238 | 3238 Timresovia || || Nikolay Timofeev-Ressovsky (1900–1981), Soviet biologist || |-id=239 | 3239 Meizhou || || Meizhou, Guangdong, China || |-id=240 | 3240 Laocoon || || Laocoön, Trojan priest of Poseidon || |-id=241 | 3241 Yeshuhua || || Ye Shuhua (born 1927), Chinese astronomer || |-id=242 | 3242 Bakhchisaraj || || Bakhchisaray, a town in Crimea, the center of the same district where Crimean Astrophysical Observatory was created || |-id=243 | 3243 Skytel || 1980 DC || named after Sky and Telescope magazine for its 50th anniversary || |-id=244 | 3244 Petronius || 4008 P-L || Petronius (c. 27–66 AD), Roman writer || |-id=245 | 3245 Jensch || || Alfred Jensch, German astronomer || |-id=246 | 3246 Bidstrup || || Herluf Bidstrup (1912–1988), Danish caricaturist || |-id=247 | 3247 Di Martino || 1981 YE || Mario Di Martino (born 1947), Italian astronomer and discoverer of minor planets at the Turin Observatory. He has been a prolific photometrist of rotational light-curves of minor planets, specialized in determining their shape and pole. || |-id=248 | 3248 Farinella || 1982 FK || Paolo Farinella (1953–2000), Italian astronomer || |-id=249 | 3249 Musashino || || Musashino, a suburb of Tokyo, Japan || |-id=250 | 3250 Martebo || 1979 EB || Martebo, on Gotland island in Sweden || |-id=251 | 3251 Eratosthenes || 6536 P-L || Eratosthenes (c. 276–194 BC), Ancient Greek scientist || |-id=252 | 3252 Johnny || || Johnny Carson (1925–2005), American TV host and comedian, and amateur astronomer || |-id=253 | 3253 Gradie || || Jonathan Carey Gradie, American astronomer || |-id=254 | 3254 Bus || 1982 UM || Schelte J. Bus (born 1956), American astronomer and discoverer of minor planets || |-id=255 | 3255 Tholen || 1980 RA || David J. Tholen (born 1955), American astronomer and discoverer of minor planets || |-id=256 | 3256 Daguerre || || Louis Daguerre (1787–1851), French chemist and artist, pioneer of photography (the Daguerreotype process) || |-id=257 | 3257 Hanzlík || 1982 GG || Stanislav Hanzlík (1878–1956), Czech meteorologist and climatologist || |-id=258 | 3258 Somnium || 1983 RJ || Kepler's Somnium, sive opus posthumum de astronomia lunaris (The Dream, or Posthumous Work on Lunar Astronomy), which combined a serious study of lunar astronomy and the fictional account of a journey to the Moon || |-id=259 | 3259 Brownlee || || Donald E. Brownlee (born 1943), American astronomer || |-id=260 | 3260 Vizbor || || Yuri Vizbor (1934–1984), Russian actor, poet, writer, composer and playwright || |-id=261 | 3261 Tvardovskij || || Aleksandr Tvardovsky (1910–1971), Soviet poet || |-id=262 | 3262 Miune || 1983 WB || Miune, mountain in Kōchi, Japan || |-id=263 | 3263 Bligh || 1932 CN || William Bligh (1754–1817), captain of the Bounty || |-id=264 | 3264 Bounty || 1934 AF || , ship || |-id=265 | 3265 Fletcher || || Fletcher Christian (1764–1793), Bounty mutineer || |-id=266 | 3266 Bernardus || 1978 PA || Andres Bernardus Muller, Dutch astronomer || |-id=267 | 3267 Glo || 1981 AA || Eleanor F. Helin (1932–2009), American astronomer, comet hunter, discoverer of minor planets and advisor to the Planetary Society. Glo is her nickname. || |-id=268 | 3268 De Sanctis || 1981 DD || Giovanni de Sanctis (born 1949), Italian astronomer and a discoverer of minor planets || |-id=269 | 3269 Vibert-Douglas || || Vibert Douglas (1894–1988), Canadian astronomer || |-id=270 | 3270 Dudley || 1982 DA || H. Dudley Wright, engineer, inventor, entrepreneur and benefactor of science, education and the arts in California and in Geneva, Switzerland. || |-id=271 | 3271 Ul || 1982 RB || Ul, a lunar deity in the mythology of Vanuatu || |-id=272 | 3272 Tillandz || || Elias Tillandz (1640–1693), Swedish physician and botanist || |-id=273 | 3273 Drukar || || Ivan Fyodorov (1525–1583), one of the first printers of books in Russia and Ukraine. The word Drukar means ‘printer' in Ukrainian and old Russian. || |-id=274 | 3274 Maillen || || Maillen, Belgium || |-id=275 | 3275 Oberndorfer || || Hans Oberndorfer (1925–2006), was a German amateur astronomer, author and director of the Bavarian Public Observatory (Volkssternwarte München) || |-id=276 | 3276 Porta Coeli || || Porta Coeli ("Gateway to Heaven") convent in Tišnov, Czech Republic || |-id=277 | 3277 Aaronson || || Marc Aaronson (1950–1987), American astronomer || |-id=278 | 3278 Běhounek || 1984 BT || František Běhounek (1898–1973), Czech physicist || |-id=279 | 3279 Solon || 9103 P-L || Solon (c. 630–560 BC), Greek lawmaker || |-id=280 | 3280 Grétry || 1933 SJ || André Grétry (1741–1813), Belgian composer from Wallonia || |-id=281 | 3281 Maupertuis || 1938 DZ || Pierre Louis Maupertuis (1698–1759), French mathematician and astronomer || |-id=282 | 3282 Spencer Jones || 1949 DA || Harold Spencer Jones (1890–1960), British astronomer, former Astronomer Royal || |-id=283 | 3283 Skorina || || Francysk Skaryna (died 1552), first doctor of medicine in Belarus, printer and publisher || |-id=284 | 3284 Niebuhr || 1953 NB || Reinhold Niebuhr (1892–1971), American theologian || |-id=285 | 3285 Ruth Wolfe || || Ruth Fanton Wolfe, American geologist, colleague of Gene and Carolyn Shoemaker at the United States Geological Survey || |-id=286 | 3286 Anatoliya || 1980 BV || Anatoly V. Karachkin (1947–1984), brother-in-law of astronomer Lyudmila Karachkina who discovered this minor planet || |-id=287 | 3287 Olmstead || || C. Michelle Olmstead (born 1969), American astronomer and discoverer of minor planets || |-id=288 | 3288 Seleucus || 1982 DV || Seleucus I Nicator (c. 358–281 BC), one of the generals of Alexander the Great and heir to the largest part of his empire || |-id=289 | 3289 Mitani || 1934 RP || Tetsuyasu Mitani (1927–2004), Japanese astronomer and discoverer of 1619 Ueta || |-id=290 | 3290 Azabu || || Azabu, a district of Tokyo, Japan || |-id=291 | 3291 Dunlap || || Larry Dunlap, American astronomer || |-id=292 | 3292 Sather || 2631 P-L || Bob Sather, research assistant Lunar and Planetary Laboratory || |-id=293 | 3293 Rontaylor || 4650 P-L || Ronald C. Taylor, American astronomer || |-id=294 | 3294 Carlvesely || 6563 P-L || Carl D. Vesely, American astronomer || |-id=295 | 3295 Murakami || 1950 DH || Tadayoshi Murakami (1907–1985), Japanese astronomer || |-id=296 | 3296 Bosque Alegre || 1975 SF || The astrophysical station of Córdoba Observatory in Argentina || |-id=297 | 3297 Hong Kong || || Hong Kong, Chinese island and city || |-id=298 | 3298 Massandra || || Massandra, town on the Crimean peninsula || |-id=299 | 3299 Hall || || John Scoville Hall, American astronomer and director of the Lowell Observatory from 1958 to 1977 || |-id=300 | 3300 McGlasson || 1928 NA || Scottish Surname of a small clan located in the highlands of Scotland. || |} 3301–3400 |- | 3301 Jansje || 1978 CT || Jansje Verveer, mother of Dutch astronomer Arie Verveer || |-id=302 | 3302 Schliemann || || Heinrich Schliemann (1822–1890), German archaeologist || |-id=303 | 3303 Merta || 1967 UN || František Merta (1872–1953), teacher and journalist. Grandfather of the discoverer. || |-id=304 | 3304 Pearce || || Joseph Algernon Pearce (1893–1988), Canadian astronomer || |-id=305 | 3305 Ceadams || 1985 KB || Charles Edward Adams (1870–1945), a New Zealand astronomer || |-id=306 | 3306 Byron || || Lord Byron (1788–1824), British poet || |-id=307 | 3307 Athabasca || || The Athabascans, ancient people of North America || |-id=308 | 3308 Ferreri || 1981 EP || Walter Ferreri (born 1948), Italian astronomer and discoverer of minor planets || |-id=309 | 3309 Brorfelde || 1982 BH || Brorfelde Observatory in Denmark || |-id=310 | 3310 Patsy || || Patricia Tombaugh (1912–2012), wife of discoverer Clyde Tombaugh || |-id=311 | 3311 Podobed || || Vladimir Vladimirovich Podobed, Soviet astronomer || |-id=312 | 3312 Pedersen || 1984 SN || Holger Pedersen (born 1946), Danish astronomer || |-id=313 | 3313 Mendel || 1980 DG || Gregor Mendel (1822–1884), Czech-Austrian father of genetics || |-id=314 | 3314 Beals || 1981 FH || Carlyle Smith Beals (1899–1979), Canadian astronomer || |-id=315 | 3315 Chant || 1984 CZ || Clarence Chant (1865–1956), Canadian astronomer || |-id=316 | 3316 Herzberg || || Gerhard Herzberg (1904–1999), German-born Canadian chemist and astronomer || |-id=317 | 3317 Paris || 1984 KF || Paris, Trojan prince || |-id=318 | 3318 Blixen || 1985 HB || Karen Blixen (1885–1962), Danish writer || |-id=319 | 3319 Kibi || || Kibi Province (ancient name of Okayama Prefecture and eastern half of Hiroshima Prefecture), Japan || |-id=320 | 3320 Namba || || Naniwa, traditional name of Osaka, Japan || |-id=321 | 3321 Dasha || || Dasha from Sevastopol (1836–1892), Russian sister of charity || |-id=322 | 3322 Lidiya || || Lidiya Vissarionovna Zvereva (1890–1916), the first Russian female aviator || |-id=323 | 3323 Turgenev || || Ivan Turgenev (1818–1883), Russian writer || |-id=324 | 3324 Avsyuk || || Yurii Nikolaevich Avsyuk, Russian geophysicist (specialist in gravimetry and geodynamics) || |-id=325 | 3325 TARDIS || 1984 JZ || The TARDIS, time machine in Doctor Who || |-id=326 | 3326 Agafonikov || 1985 FL || Askol'd M. Agafonikov, Russian geophysicist and navigator of the third Russian Antarctic expedition || |-id=327 | 3327 Campins || 1985 PW || Humberto Campins (Humberto Campins Camejo), Venezuelan-born American astronomer || |-id=328 | 3328 Interposita || || The discovery film was exposed hastily between two satellite laser ranging sessions in the adjacent dome. || |-id=329 | 3329 Golay || || Marcel Golay (1927–2015), Swiss astronomer at Geneva Observatory || |-id=330 | 3330 Gantrisch || || Gantrisch, a mountain south of Bern in Switzerland || |-id=331 | 3331 Kvistaberg || 1979 QS || Kvistaberg, site of Uppsala Observatory, Sweden || |-id=332 | 3332 Raksha || || Yurij Mikhajlovich Raksha (1937–1980), Russian artist || |-id=333 | 3333 Schaber || || Gerald Gene Schaber, American planetary geologist with the USGS || |-id=334 | 3334 Somov || 1981 YR || Mikhail Somov (1908–1973), Soviet Antarctic explorer || |-id=335 | 3335 Quanzhou || 1966 AA || Quanzhou, Fujian, China || |-id=336 | 3336 Grygar || 1971 UX || Jiří Grygar (born 1936), Czech astronomer || |-id=337 | 3337 Miloš || || Miloš Tichý (born 1966), Czech astronomer and discoverer of minor planets || |-id=338 | 3338 Richter || || Nikolaus B. Richter (1910–1980), first director of the Tautenburg Observatory (1960–1975) || |-id=339 | 3339 Treshnikov || 1978 LB || Alexey Tryoshnikov (1914–1991), Soviet Antarctic explorer || |-id=340 | 3340 Yinhai || 1979 TK || Yinhai, Guangxi, China || |-id=341 | 3341 Hartmann || 1980 OD || William Kenneth Hartmann (born 1939), American planetary scientist, writer, and painter || |-id=342 | 3342 Fivesparks || || In honor of Newton and Margaret Mayall (1902–1995), American astronomer. The name refers to their residence in Cambridge, Massachusetts || |-id=343 | 3343 Nedzel || 1982 HS || V. Alexander Nedzel, American supporter of the supporter of Lincoln Near-Earth Asteroid Research, which discovered this asteroid || |-id=344 | 3344 Modena || 1982 JA || Modena, city in Italy || |-id=345 | 3345 Tarkovskij || || Andrei Tarkovsky (1932–1986), Soviet film producer || |-id=346 | 3346 Gerla || 1951 SD || Gertrude Lawrence (1898–1952), English actress || |-id=347 | 3347 Konstantin || || Konstantin Kalinin (1889–1938), Soviet aviator || |-id=348 | 3348 Pokryshkin || || Alexander Pokryshkin (1913–1985), Soviet pilot || |-id=349 | 3349 Manas || || Manas, a Kyrgyz epic poem || |-id=350 | 3350 Scobee || 1980 PJ || Dick Scobee (1939–1986), STS-51-L crew member || |-id=351 | 3351 Smith || || Michael J. Smith (1945–1986), STS-51-L crew member || |-id=352 | 3352 McAuliffe || 1981 CW || Christa McAuliffe (1948–1986), STS-51-L crew member || |-id=353 | 3353 Jarvis || 1981 YC || Gregory Jarvis (1944–1986), STS-51-L crew member || |-id=354 | 3354 McNair || 1984 CW || Ronald McNair (1950–1986), STS-51-L crew member || |-id=355 | 3355 Onizuka || || Ellison Onizuka (1946–1986), STS-51-L crew member || |-id=356 | 3356 Resnik || 1984 EU || Judith Resnik (1949–1986), STS-51-L crew member || |-id=357 | 3357 Tolstikov || 1984 FT || Yevgeny Tolstikov (1913–1987), Russian meteorologist and Polar explorer who lead the third Soviet Antarctic expedition || |-id=358 | 3358 Anikushin || 1978 RX || Mikhail Anikushin (1917–1997), Russian sculptor || |-id=359 | 3359 Purcari || || Moldavian wine producer || |-id=360 | 3360 Syrinx || 1981 VA || Syrinx, a nymph || |-id=361 | 3361 Orpheus || 1982 HR || Orpheus, mythological Greek musician || |-id=362 | 3362 Khufu || 1984 QA || Khufu, Egyptian pharaoh || |-id=363 | 3363 Bowen || 1960 EE || Ira Sprague Bowen (1898–1973) was an American astronomer and director of the Mount Wilson and Palomar observatories || |-id=364 | 3364 Zdenka || 1984 GF || Zdeňka Vávrová (born 1945), Czech astronomer || |-id=365 | 3365 Recogne || || Recogne in the Ardennes, Belgium || |-id=366 | 3366 Gödel || || Kurt Gödel (1906–1978), Austro-Hungarian logician || |-id=367 | 3367 Alex || || Alex R. Baltutis, grandson of the discoverer || |-id=368 | 3368 Duncombe || 1985 QT || Raynor Lockwood Duncombe, American astronomer || |-id=369 | 3369 Freuchen || 1985 UZ || Peter Freuchen (1886–1957), Danish polar explorer and author || |-id=370 | 3370 Kohsai || 1934 CU || Hiroki Kosai (born 1933), Japanese astronomer || |-id=371 | 3371 Giacconi || 1955 RZ || Riccardo Giacconi (1931–2018), Italian-born American astrophysicist and winner (with Raymond Davis and Masatoshi Koshiba) of the Nobel Prize for Physics in 2002 || |-id=372 | 3372 Bratijchuk || || Matrena Vasil'evna Bratijchuk, Ukrainian astronomer || |-id=373 | 3373 Koktebelia || || Koktebel, a resort on the Black Sea in Crimea || |-id=374 | 3374 Namur || 1980 KO || Namur, capital of the region of Wallonia in Belgium || |-id=375 | 3375 Amy || || Amy Shoemaker Prescott, relative of the discoverer || |-id=376 | 3376 Armandhammer || || Armand Hammer (1898–1990), American industrialist and art collector || |-id=377 | 3377 Lodewijk || 4122 P-L || Lodewijk Woltjer (born 1930), Dutch astronomer || |-id=378 | 3378 Susanvictoria || A922 WB || Susan Titus and Victoria Van Biesbroeck Streeter, granddaughters of the discoverer || |-id=379 | 3379 Oishi || || Hideo Oishi, Japanese amateur astronomer and orbit computer || |-id=380 | 3380 Awaji || 1940 EF || Awaji Island, Japan || |-id=381 | 3381 Mikkola || 1941 UG || Seppo Mikkola (born 1947), Finnish astronomer || |-id=382 | 3382 Cassidy || 1948 RD || William A. Cassidy (born 1928), American meteoriticist || |-id=383 | 3383 Koyama || 1951 AB || Hisako Koyama, Japanese amateur astronomer || |-id=384 | 3384 Daliya || || Vladimir Dal (1801–1872), Russian lexicologist and ethnographer || |-id=385 | 3385 Bronnina || || Nina Mikhailovna Bronnikova, Russian astronomer at Pulkovo Observatory || |-id=386 | 3386 Klementinum || 1980 FA || The Clementinum, college in Prague || |-id=387 | 3387 Greenberg || 1981 WE || Richard J. Greenberg, American planetary scientist at the University of Arizona || |-id=388 | 3388 Tsanghinchi || || Hin-Chi Tsang, Chinese industrialist || |-id=389 | 3389 Sinzot || 1984 DU || Family name of the discoverer's grandmother || |-id=390 | 3390 Demanet || || The family name of the discoverer's paternal grandmother || |-id=391 | 3391 Sinon || || Sinon, mythical Greek warrior || |-id=392 | 3392 Setouchi || 1979 YB || Setouchi Region, Japan || |-id=393 | 3393 Štúr || || Ľudovít Štúr (1815–1856), Slovak leader and writer || |-id=394 | 3394 Banno || 1986 DB || Yoshiaki Banno (1952–1991), Japanese engineer and a discoverer of minor planets || |-id=395 | 3395 Jitka || 1985 UN || Jitka Beneš, Czech assistant at Klet Observatory || |-id=396 | 3396 Muazzez || A915 TE || Muazzez K. Lohmiller, staff member of the Smithsonian Astrophysical Observatory || |-id=397 | 3397 Leyla || 1964 XA || Nancy Leyla Lohmiller (born 1985), daughter of Muazzez Lohmiller || |-id=398 | 3398 Stättmayer || 1978 PC || Peter Stättmayer, German amateur astronomer, director of the Munich Public Observatory || |-id=399 | 3399 Kobzon || || Joseph Kobzon (1937–2018), Soviet singer || |-id=400 | 3400 Aotearoa || 1981 GX || Māori name for New Zealand || |} 3401–3500 |- | 3401 Vanphilos || 1981 PA || Vanessa Hall and Philip Osborne, on the occasion of their marriage. The name was given by Gareth V. Williams, astronomer at the Minor Planet Center and friend of the couple. || |-id=402 | 3402 Wisdom || 1981 PB || Jack Wisdom, American astronomer at MIT || |-id=403 | 3403 Tammy || 1981 SW || Tammy Irelan, wife of R. L. Irelan staff member at Lincoln Laboratory's Experimental Test Site || |-id=404 | 3404 Hinderer || 1934 CY || Fritz Hinderer (1912–1991), German astronomer at Babelsberg Observatory || |-id=405 | 3405 Daiwensai || 1964 UQ || Wen-Sai Dai (1911–1979), Chinese astronomer || |-id=406 | 3406 Omsk || 1969 DA || Omsk, Russia || |-id=407 | 3407 Jimmysimms || 1973 DT || James A. C. Simms III (born 1957), American system administrator || |-id=408 | 3408 Shalamov || || Varlam Shalamov (1907–1982), Soviet writer || |-id=409 | 3409 Abramov || || Fyodor Abramov (1920–1983), Soviet writer || |-id=410 | 3410 Vereshchagin || || Vasily Vereshchagin (1842–1904), Russian painter || |-id=411 | 3411 Debetencourt || 1980 LK || The family name of the mother of astronomer Georges Roland, who co-discovered Comet Arend–Roland || |-id=412 | 3412 Kafka || || Franz Kafka (1883–1924), German-Czech writer || |-id=413 | 3413 Andriana || || Andriana Marie Hazelton, granddaughter of the discoverer Norman G. Thomas || |-id=414 | 3414 Champollion || 1983 DJ || Jean-François Champollion (1790–1832), French linguist || |-id=415 | 3415 Danby || 1928 SL || Michael Anthony Danby, British-born mathematician formerly of North Carolina State University || |-id=416 | 3416 Dorrit || 1931 VP || Dorrit Hoffleit (1907–2007), American astronomer || |-id=417 | 3417 Tamblyn || 1937 GG || Peter Tamblyn, American astronomer || |-id=418 | 3418 Izvekov || || Vladimir Andreevich Izvekov, Soviet astronomer || |-id=419 | 3419 Guth || 1981 JZ || Vladimír Guth (1905–1980), Slovak astronomer || |-id=420 | 3420 Standish || 1984 EB || E. Myles Standish Jr, American astronomer, Caltech/JPL || |-id=421 | 3421 Yangchenning || || Yang Chen-Ning (born 1922), Chinese-American physicist || |-id=422 | 3422 Reid || 1978 OJ || Ruth and Gordon Reid (1923–1989), professor of politics at the University of Western Australia || |-id=423 | 3423 Slouka || 1981 CK || Hubert Slouka (1903–1973), Czech astronomer || |-id=424 | 3424 Nušl || 1982 CD || František Nušl (1867–1951), Czech astronomer and mathematician || |-id=425 | 3425 Hurukawa || 1929 BD || Kiichirō Furukawa (Hurukawa, 1929–2016), Japanese astronomer and discoverer of minor planets || |-id=426 | 3426 Seki || 1932 CQ || Tsutomu Seki (born 1930), Japanese astronomer and discoverer of minor planets || |-id=427 | 3427 Szentmártoni || 1938 AD || Béla Szentmártoni (1931–1988), Hungarian amateur astronomer || |-id=428 | 3428 Roberts || 1952 JH || Walter Orr Roberts (1915–1990), American astronomer and atmospheric physicist || |-id=429 | 3429 Chuvaev || || Konstantin Konstantinovich Chuvaev (1917–1994), Soviet astronomer || |-id=430 | 3430 Bradfield || || William A. Bradfield (1927–2014), Australian amateur astronomer || |-id=431 | 3431 Nakano || 1984 QC || Shuichi Nakano (born 1947), Japanese astronomer || |-id=432 | 3432 Kobuchizawa || 1986 EE || Kobuchizawa Observatory in Japan which contributes asteroid (Near Earth Objects) observations to the Minor Planet Center || |-id=433 | 3433 Fehrenbach || || Charles Fehrenbach (1914–2008), French astronomer || |-id=434 | 3434 Hurless || 1981 VO || Carolyn Hurless (1934–1987), American amateur astronomer || |-id=435 | 3435 Boury || || Arsène Boury (1934–1982), Belgian astronomer || |-id=436 | 3436 Ibadinov || || Hursandkul Ibadinov, Tajik astronomer || |-id=437 | 3437 Kapitsa || || Pyotr Kapitsa (1894–1984), Russian physicist, winner of the Nobel Prize for Physics in 1978 || |-id=438 | 3438 Inarradas || || Argentine Institute of Radio Astronomy || |-id=439 | 3439 Lebofsky || || Larry A. Lebofsky, American astronomer || |-id=440 | 3440 Stampfer || 1950 DD || Simon von Stampfer (1792–1864), Austrian geodesist and astronomer, pioneer of cinematography || |-id=441 | 3441 Pochaina || || , a tributary of the Dnieper in the Ukraine || |-id=442 | 3442 Yashin || || Lev Yashin (1929–1990), Soviet goalkeeper || |-id=443 | 3443 Leetsungdao || || Tsung-Dao Lee (born 1926), Chinese American physicist and winner of the Nobel Prize for Physics || |-id=444 | 3444 Stepanian || || Natalia Nikolaevna Stepanian (astrophysicist) and Arnol'd Artashesovich Stepanian (head of the gamma-ray laboratory) both astronomers at the Crimean Astrophysical Observtory || |-id=445 | 3445 Pinson || 1983 FC || William H. Pinson (1919–), American geochemist || |-id=446 | 3446 Combes || 1942 EB || Michel-Alain Combes (born 1942), French astronomer || |-id=447 | 3447 Burckhalter || 1956 SC || Charles Burckhalter (1849–1923), American astronomer || |-id=448 | 3448 Narbut || || Heorhiy Narbut (1886–1920), Ukrainian graphic designer || |-id=449 | 3449 Abell || || George O. Abell (1927–1983), American astronomer || |-id=450 | 3450 Dommanget || 1983 QJ || Jean Dommanget, Belgian astronomer || |-id=451 | 3451 Mentor || || Mentor, mythological Greek king, son of Imbrus at Pedaseus, father of Imbrius, ally of the Trojans || |-id=452 | 3452 Hawke || 1980 OA || Bernard Ray Hawke, American planetary geologist at the University of Hawaii || |-id=453 | 3453 Dostoevsky || || Fyodor Dostoevsky (1821–1881), Russian writer || |-id=454 | 3454 Lieske || || Jay Henry Lieske, American astronomer || |-id=455 | 3455 Kristensen || 1985 QC || Leif Kahl Kristensen, Danish astronomer || |-id=456 | 3456 Etiennemarey || || Étienne-Jules Marey (1830–1904), French surgeon, physiologist, inventor of the chronophotograph, pioneer of cinematography, contemporary of Eadweard Muybridge || |-id=457 | 3457 Arnenordheim || || Arne Nordheim (1931–2010), Norwegian composer || |-id=458 | 3458 Boduognat || || Boduognaty or Boduognatus, leader of the Nervii in Gaul who, with the Atrebates and Viromandui, fought Julius Caesar in 57 BC || |-id=459 | 3459 Bodil || 1986 GB || Bodil Jensen, wife of the discoverer Poul Jensen || |-id=460 | 3460 Ashkova || || Nataliya Vladimirovna Ashkova, Soviet astronomer at the Institute for Theoretical Astronomy || |-id=461 | 3461 Mandelshtam || || Osip Mandelstam (1891–1938), Soviet poet || |-id=462 | 3462 Zhouguangzhao || || Zhou Guangzhao (born 1929), Chinese physicist || |-id=463 | 3463 Kaokuen || || Charles K. Kao (1933–2018), Chinese physicist || |-id=464 | 3464 Owensby || 1983 BA || Pamela D. Owensby, planetary astronomer at the University of Hawaii || |-id=465 | 3465 Trevires || || Ancient Belgian tribe, mentioned in Julius Caesar's Gallic Wars || |-id=466 | 3466 Ritina || || discoverer's daughter Margarita, who was also an astronomer at Crimean Astrophysical Observatory || |-id=467 | 3467 Bernheim || || Robert Burnham Jr. (1931–1993), American astronomer and discoverer of minor planets || |-id=468 | 3468 Urgenta || 1975 AM || Type of potato || |-id=469 | 3469 Bulgakov || || Mikhail Bulgakov (1891–1940), Russian writer || |-id=470 | 3470 Yaronika || 1975 ES || discoverer's son Yaroslav, who also works at CrAO || |-id=471 | 3471 Amelin || || Valentin Mikhailovich Amelin (1930–1989), Soviet geodesist || |-id=472 | 3472 Upgren || || Arthur Reinhold Upgren, American astronomer || |-id=473 | 3473 Sapporo || A924 EG || Sapporo, Hokkaido, Japan || |-id=474 | 3474 Linsley || 1962 HE || Earl Garfield Linsley (1882–1969), professor of geography at Mills College, California || |-id=475 | 3475 Fichte || 1972 TD || Hubert Fichte (1935–1986), German writer || |-id=476 | 3476 Dongguan || || Dongguan, Guangdong, China || |-id=477 | 3477 Kazbegi || 1979 KH || Mount Kazbek, on the border between Georgia and Russia || |-id=478 | 3478 Fanale || 1979 XG || Fraser Partington Fanale, American planetary geologist || |-id=479 | 3479 Malaparte || 1980 TQ || Curzio Malaparte (1898–1957), Italian writer || |-id=480 | 3480 Abante || 1981 GB || Robert Hamilton Brown, planetary astronomer at the Jet Propulsion Laboratory || |-id=481 | 3481 Xianglupeak || || Xianglu Peak ("Incense Burner Peak", 557 m), highest point of the Fragrant Hill Park, northwest of Beijing, China || |-id=482 | 3482 Lesnaya || || village Lesnaya, near which Swedes were defeated by the Russian army in the Battle of Lesnaya || |-id=483 | 3483 Svetlov || || Mikhail Svetlov (1903–1964), Soviet poet || |-id=484 | 3484 Neugebauer || 1978 NE || The Neugebauers, American family of physicists and mathematicians: Otto Neugebauer, historian of astronomy, Marcia Neugebauer and Gerald Neugebauer, both astronomers || |-id=485 | 3485 Barucci || 1983 NU || Maria A. Barucci, Italian astronomer and discoverer of minor planets || |-id=486 | 3486 Fulchignoni || 1984 CR || Marcello Fulchignoni, Italian astronomer || |-id=487 | 3487 Edgeworth || 1978 UF || Kenneth Edgeworth (1880–1972), Irish engineer || |-id=488 | 3488 Brahic || 1980 PM || André Brahic (1942–2016), French astronomer || |-id=489 | 3489 Lottie || || Lottie Soll-Herkenhoff, wife of co-discoverer Kenneth E. Herkenhoff || |-id=490 | 3490 Šolc || 1984 SV || Ivan Šolc, Czech inventor || |-id=491 | 3491 Fridolin || || Fridolin of Säckingen, an Irish missionary, is the patron saint of the Swiss valley of Glarus || |-id=492 | 3492 Petra-Pepi || 1985 DQ || Daughter of the discoverer || |-id=493 | 3493 Stepanov || || Vladimir Yevgenyevich Stepanov (1913–1986), Soviet physicist || |-id=494 | 3494 Purple Mountain || 1980 XW || Purple Mountain Observatory, Jiangsu, China || |-id=495 | 3495 Colchagua || 1981 NU || Colchagua Province, Chile || |-id=496 | 3496 Arieso || 1977 RC || name consists of acronyms of Astronomisches Rechen-Institut and the European Southern Observatory || |-id=497 | 3497 Innanen || 1941 HJ || Kimmo Innanen (1937–2011), Finnish-Canadian astronomer || |-id=498 | 3498 Belton || || Michael J. Belton (1934–2018), American astronomer || |-id=499 | 3499 Hoppe || || Johannes Hoppe (1907–?), German professor of astronomy at the University of Jena || |-id=500 | 3500 Kobayashi || A919 SD || Takao Kobayashi (born 1961), astronomer || |} 3501–3600 |- | 3501 Olegiya || 1971 QU || Oleg Nikolaevich Korotsev (born 1922), Russian astronomer || |-id=502 | 3502 Huangpu || || Huangpu District, Shanghai || |-id=503 | 3503 Brandt || || John Conrad Brandt, American astronomer and author || |-id=504 | 3504 Kholshevnikov || || Konstantin Vladislavovich Kholshevnikov, a Russian astronomer who was a professor at Leningrad University || |-id=505 | 3505 Byrd || 1983 AM || Deborah Byrd (born 1951), producer of the Earth & Sky radio series || |-id=506 | 3506 French || || Linda M. French (born 1951), American Astronomer, Professor of Physics, Illinois Wesleyan University || |-id=507 | 3507 Vilas || 1982 UX || Faith Vilas (born 1952), American planetary scientist and Director of the MMT Observatory in Arizona || |-id=508 | 3508 Pasternak || || Boris Pasternak (1890–1960), Russian writer || |-id=509 | 3509 Sanshui || || Sanshui, Chinese city in the Sanshui District || |-id=510 | 3510 Veeder || 1982 TP || Glenn John Veeder, American astronomer || |-id=511 | 3511 Tsvetaeva || || Marina Tsvetaeva (1892–1941), Soviet poet || |-id=512 | 3512 Eriepa || || Erie, Pennsylvania || |-id=513 | 3513 Quqinyue || 1965 UZ || Qu Qinyue (born 1935), Chinese astronomer || |-id=514 | 3514 Hooke || 1971 UJ || Robert Hooke (1635–1703), English scientist || |-id=515 | 3515 Jindra || || Lumír Jindra (born 1936), Czech pharmacologist and friend of the discoverer || |-id=516 | 3516 Rusheva || || Nadya Rusheva (1952–1969), Russian painter || |-id=517 | 3517 Tatianicheva || || Lyudmila Tatianicheva (1915–1980), Soviet poetess || |-id=518 | 3518 Florena || || Pavel Florensky (1882–1943), Russian religious philosopher, physicist and mathematician and hisson, Kirill Florensky (1915–1982), geochemist and mineralogist || |-id=519 | 3519 Ambiorix || 1984 DO || Ambiorix, leader of Belgian tribe in time of the Romans || |-id=520 | 3520 Klopsteg || 1952 SG || Paul E. Klopsteg (1889–1991), American physicist || |-id=521 | 3521 Comrie || 1982 MH || Leslie Comrie (1893–1950), New Zealand-born astronomer and pioneer in mathematical computation || |-id=522 | 3522 Becker || 1941 SW || Ludwig Becker (1860–1947), German astronomer || |-id=523 | 3523 Arina || || Arina Rodionovna Yakoleva (1758–1828), the nurse of Russian poet Alexander Pushkin || |-id=524 | 3524 Schulz || || Charles M. Schulz (1922–2000), cartoonist and creator of the comic strip Peanuts (Charlie Brown; Charlie Brown). || |-id=525 | 3525 Paul || || Paul J. Baltutis, son-in-law of the discoverer Norman G. Thomas || |-id=526 | 3526 Jeffbell || 1984 CN || Space scientist/writer Jeffrey F. Bell || |-id=527 | 3527 McCord || || Thomas Bard McCord, American astronomer (planetary geologist) || |-id=528 | 3528 Counselman || || Charles Claude Counselman III (born 1943), American planetary scientist || |-id=529 | 3529 Dowling || || Timothy Edward Dowling, American planetary scientist and professor at MIT || |-id=530 | 3530 Hammel || || Heidi Hammel (born 1960), American planetary scientist || |-id=531 | 3531 Cruikshank || 1981 FB || Dale Cruikshank, NASA space scientist || |-id=532 | 3532 Tracie || || Tracie Lynn Ojakangas, wife of co-discoverer Gregory Wayne Ojakangas || |-id=533 | 3533 Toyota || 1986 UE || Toyota, Aichi, Japan || |-id=534 | 3534 Sax || 1936 XA || Adolphe Sax (1814–1894), Belgian musical instrument designer, best known for inventing the saxophone || |-id=535 | 3535 Ditte || || The main character of Ditte, a human child novel by Martin Andersen Nexø || |-id=536 | 3536 Schleicher || || David Glenn Schleicher, American astronomer at Lowell Observatory || |-id=537 | 3537 Jürgen || 1982 VT || Jürgen Rahe (1939–1997), Director of NASA's Solar System Exploration Division || |-id=538 | 3538 Nelsonia || 6548 P-L || Elisabeth Nelson, secretary at Heidelberg Observatory and Max Planck Institute for Astronomy and took care of the investigators of the Palomar–Leiden Survey || |-id=539 | 3539 Weimar || || Weimar, Germany || |-id=540 | 3540 Protesilaos || || Protesilaos, mythical person related to Trojan War || |-id=541 | 3541 Graham || 1984 ML || Lloyd Wilson Graham (1940- ), executive director of the department of state services, who supported the Perth Observatory || |-id=542 | 3542 Tanjiazhen || || Tan Jiazhen (1909–2008), Chinese geneticist || |-id=543 | 3543 Ningbo || || Ningbo Chinese city || |-id=544 | 3544 Borodino || || Village in Russia, where the Battle of Borodino took place in 1812 || |-id=545 | 3545 Gaffey || || Michael James Gaffey (born 1945), American planetary geologist || |-id=546 | 3546 Atanasoff || 1983 SC || John Vincent Atanasoff (1903–1995), American (of Bulgarian descent) mathematician and physicist, inventor of the Atanasoff–Berry Computer || |-id=547 | 3547 Serov || || Valentin Serov (1865–1911), Russian painter || |-id=548 | 3548 Eurybates || 1973 SO || Eurybates, mythological Greek soldier || |-id=549 | 3549 Hapke || 1981 YH || Bruce Hapke (born 1931), American planetary scientist || |-id=550 | 3550 Link || 1981 YS || František Link (1906–1984), Czech astronomer || |-id=551 | 3551 Verenia || 1983 RD || First vestal virgin consecrated by the legendary Roman king Numa Pompilius || |-id=552 | 3552 Don Quixote || 1983 SA || Don Quixote, eponymous hero of the novel by Cervantes || |-id=553 | 3553 Mera || 1985 JA || Maera, a daughter of Praetus || |-id=554 | 3554 Amun || 1986 EB || Amun, Egyptian god || |-id=555 | 3555 Miyasaka || || Seidai Miyasaka (born 1955), Japanese astronomer and discoverer of minor planets || |-id=556 | 3556 Lixiaohua || 1964 UO || Li Xiaohua, a Chinese industrialist from Beijing || |-id=557 | 3557 Sokolsky || || Andrej Georgievich Sokolskij, Soviet astronomer at ITA || |-id=558 | 3558 Shishkin || || Ivan Shishkin (1832–1898), Russian painter || |-id=559 | 3559 Violaumayer || 1980 PH || Martin Mayer, German amateur astronomer, operating from the Violau Public Observatory || |-id=560 | 3560 Chenqian || || Chen Qian, director of the History Museum of Chinese Astronomy, helped to popularize astronomy in China. || |-id=561 | 3561 Devine || 1983 HO || John Devine Hazelton, son-in-law of the discoverer Norman G. Thomas || |-id=562 | 3562 Ignatius || 1984 AZ || Ignatius of Loyola (1491–1556), founder of the Jesuit Order || |-id=563 | 3563 Canterbury || 1985 FE || Canterbury, New Zealand || |-id=564 | 3564 Talthybius || || Talthybius, mythological Greek soldier || |-id=565 | 3565 Ojima || 1986 YD || Ojima, Gunma, Japan, where the discoverers' observatory was situated || |-id=566 | 3566 Levitan || || Isaac Levitan (1860–1900), Russian painter || |-id=567 | 3567 Alvema || 1930 VD || The three great-granddaughters of the discoverer Eugène Joseph Delporte, Aline De Middelaer, and Véronique and Martine Warck || |-id=568 | 3568 ASCII || 1936 UB || ASCII Corporation, Japan || |-id=569 | 3569 Kumon || || Toru Kumon (1914–1995), Japanese educator || |-id=570 | 3570 Wuyeesun || 1979 XO || Wu Yee-sun (1900–2005), a Chinese bonsai artist || |-id=571 | 3571 Milanštefánik || 1982 EJ || Milan Rastislav Štefánik, Slovak-French astronomer, meteorologist, general, one of the founders of Czechoslovakia || |-id=572 | 3572 Leogoldberg || || Leo Goldberg (1913–1987), American astronomer || |-id=573 | 3573 Holmberg || || Erik Holmberg (1908–2000), Swedish astronomer || |-id=574 | 3574 Rudaux || 1982 TQ || Lucien Rudaux (1874–1947), French astronomer || |-id=575 | 3575 Anyuta || || Anna Aleksandrovna Shishmareva, Soviet parachutist || |-id=576 | 3576 Galina || || Galina Bogdanovna Pyasetskaya, Soviet parachutist || |-id=577 | 3577 Putilin || 1969 TK || Ivan Ivanovich Putilin (1893–1954), Soviet minor planet researcher || |-id=578 | 3578 Carestia || 1977 CC || Reinaldo Augusto Carestia (1932–1993) researcher at the Felix Aguilar Observatory in Argentina || |-id=579 | 3579 Rockholt || 1977 YA || Ronald Rockholt (born 1928), scientist || |-id=580 | 3580 Avery || || Avery Jordan Thomas (born 1994), grandson of the discoverer || |-id=581 | 3581 Alvarez || 1985 HC || Luis Walter Alvarez (1911–1988) and his son Walter Alvarez (born 1940), discoverers of the Iridium layer associated with the meteor impact which killed the dinosaurs 65 million years ago. || |-id=582 | 3582 Cyrano || || Cyrano de Bergerac (1619–1655), French dramatist || |-id=583 | 3583 Burdett || 1929 TQ || Burdett, Kansas, hometown of discoverer Clyde Tombaugh || |-id=584 | 3584 Aisha || 1981 TW || Aisha Renee Thomas (born 1991), granddaughter of the discoverer Norman G. Thomas || |-id=585 | 3585 Goshirakawa || 1987 BE || Emperor Go-Shirakawa (1127–1192), Japan || |-id=586 | 3586 Vasnetsov || || Viktor Vasnetsov (1848–1926) and Apollinary Vasnetsov (1856–1933), Russian painters || |-id=587 | 3587 Descartes || || René Descartes (1596–1650), French philosopher || |-id=588 | 3588 Kirik || || Kirik the Novgorodian (c. 1110–1158), a Novgorodian monk of the Antoniev Monastery || |-id=589 | 3589 Loyola || || Loyola, a Spanish town and birthplace of Ignatius of Loyola, founder of the Jesuit Order || |-id=590 | 3590 Holst || 1984 CQ || Gustav Holst (1874–1934), English composer || |-id=591 | 3591 Vladimirskij || || Boris Mikhajlovich Vladimirskij, astronomer at the Crimean Astrophysical Observatory || |-id=592 | 3592 Nedbal || 1980 CT || Oskar Nedbal (1874–1930), Czech composer || |-id=593 | 3593 Osip || || David J. Osip, researcher at Lowell Observatory || |-id=594 | 3594 Scotti || 1983 CN || James V. Scotti (born 1960), astronomer (member of Spacewatch team) || |-id=595 | 3595 Gallagher || || John S. Gallagher III, director of the Lowell Observatory || |-id=596 | 3596 Meriones || 1985 VO || Meriones, mythical Greek warrior || |-id=597 | 3597 Kakkuri || 1941 UL || Juhani Kakkuri, Finnish geodesist || |-id=598 | 3598 Saucier || || Agnes Saucier, grandmother of the American astronomer Ellen Howell, who discovered this minor planet || |-id=599 | 3599 Basov || || Nikolay Basov (1922–2001), Soviet physicist and Nobel Prize Laureate || |-id=600 | 3600 Archimedes || || Archimedes (c. 287–212 BC), ancient Greek scientist || |} 3601–3700 |- | 3601 Velikhov || || Evgenij Pavlovich Velikhov, Russian physicist and member of the Russian Academy of Sciences || |-id=602 | 3602 Lazzaro || || Daniela Lazzaro (born 1956), Brazilian astronomer || |-id=603 | 3603 Gajdušek || 1981 RM || Vilém Gajdušek (1895–1977), Czech telescope maker || |-id=604 | 3604 Berkhuijsen || 5550 P-L || E. M. Berkhuijsen, Dutch astronomer of the Max Planck Institute for Radio Astronomy in Germany || |-id=605 | 3605 Davy || 1932 WB || Humphry Davy (1778–1829), chemist || |-id=606 | 3606 Pohjola || 1939 SF || Pohjola, location in Finnish mythology || |-id=607 | 3607 Naniwa || || Naniwa, traditional name of Osaka, Japan || |-id=608 | 3608 Kataev || || Valentin Petrovich Kataev (1897–1986), Soviet writer || |-id=609 | 3609 Liloketai || || Loke-Tai Li, Chinese educator || |-id=610 | 3610 Decampos || || José Adolfo Snajdauf de Campos, Brazilian astronomer at Valongo Observatory || |-id=611 | 3611 Dabu || || Dabu County, Guangdong, China || |-id=612 | 3612 Peale || 1982 TW || Stanton J. Peale (1937–2015), American astrophysicist and planetary astronomer || |-id=613 | 3613 Kunlun || || Kunlun, mountain range in northwest China || |-id=614 | 3614 Tumilty || || Jodi Anne Tumilty Thomas, daughter-in-law of the discoverer Norman G. Thomas || |-id=615 | 3615 Safronov || 1983 WZ || Viktor Safronov (1917–1999), Soviet astronomer || |-id=616 | 3616 Glazunov || || Ilya Glazunov (1930–2017), Russian painter || |-id=617 | 3617 Eicher || 1984 LJ || David J. Eicher (born 1961), American writer popularizer of astronomy and former editor-in-chief of Astronomy || |-id=618 | 3618 Kuprin || || Aleksandr Kuprin (1870–1938), Russian writer || |-id=619 | 3619 Nash || || Douglas B. Nash, American planetary scientist || |-id=620 | 3620 Platonov || || Andrei Platonov (1899–1951), Russian writer || |-id=621 | 3621 Curtis || || Curtis R. Carbutt (1911–1976), a teacher of the discoverer Norman G. Thomas || |-id=622 | 3622 Ilinsky || || Igor Ilyinsky (1901–1987), Soviet actor || |-id=623 | 3623 Chaplin || || Charlie Chaplin (1889–1977), English comedy actor || |-id=624 | 3624 Mironov || || Andrei Mironov (1941–1987), Soviet actor and producer || |-id=625 | 3625 Fracastoro || || Mario Girolamo Fracastoro, Italian astronomer and former director of the Catania and the Pino Torinese observatories || |-id=626 | 3626 Ohsaki || 1929 PA || Shoji Osaki (1912–), Japanese astronomical historian || |-id=627 | 3627 Sayers || 1973 DS || Dorothy L. Sayers (1893–1957), British author || |-id=628 | 3628 Božněmcová || 1979 WD || Božena Němcová (1820–1862), Czech writer || |-id=629 | 3629 Lebedinskij || 1982 WK || Aleksandr Ignatevich Lebedinski (1913–1967), Soviet astronomer || |-id=630 | 3630 Lubomír || 1984 QN || Lubomír is a Slavic first name common in the South Bohemian Region || |-id=631 | 3631 Sigyn || || Daughter of the discoverer || |-id=632 | 3632 Grachevka || || Grachevka, a Russian village in Tambov Oblast (now Lipetsk Oblast), the birthplace of discoverer's parents Stepan Chernykh and Melaniya Chernykh || |-id=633 | 3633 Mira || || Hugo Mira (1937–1994), researcher at Felix Aguilar Observatory, Argentina || |-id=634 | 3634 Iwan || 1980 FV || Iwan P. Williams, British astronomer || |-id=635 | 3635 Kreutz || || Heinrich Kreutz (1854–1907), German astronomer || |-id=636 | 3636 Pajdušáková || || Ľudmila Pajdušáková (1916–1979), Slovak astronomer || |-id=637 | 3637 O'Meara || 1984 UQ || Stephen James O'Meara, American astronomer, astronomy writer and author and contributing editor to Sky and Telescope || |-id=638 | 3638 Davis || 1984 WX || Donald R. Davis, senior scientist at the Planetary Science Institute in Tucson || |-id=639 | 3639 Weidenschilling || 1985 TX || Stuart J. Weidenschilling, American planetary scientist || |-id=640 | 3640 Gostin || || Victor Gostin (born 1940), an Australian geologist and researcher of Australian impact craters || |-id=641 | 3641 Williams Bay || A922 WC || Williams Bay, Wisconsin, home of Yerkes Observatory || |-id=642 | 3642 Frieden || || German for "peace" || |-id=643 | 3643 Tienchanglin || || Chang-Lin Tien (1935–2002), former Chancellor of the University of California at Berkeley || |-id=644 | 3644 Kojitaku || 1931 TW || Takuo Kojima (born 1955), Japanese astronomer and discoverer of minor planets || |-id=645 | 3645 Fabini || 1981 QZ || Tatiana Fabini (1943–1989), Slovak astronomy writer || |-id=646 | 3646 Aduatiques || || Aduatiques (Aduatuci), an ancient tribe from Namur, Belgium || |-id=647 | 3647 Dermott || || Stanley F. Dermott, American astronomer || |-id=648 | 3648 Raffinetti || 1957 HK || Virgilio Raffinetti (1869–1946), Argentine astronomer and a director of La Plata Observatory || |-id=649 | 3649 Guillermina || 1976 HQ || Maria Guillermina Martin de Cesco (born 1915), widow and mother of Argentine astronomers Carlos Cesco and Mario R. Cesco, respectively || |-id=650 | 3650 Kunming || || Kunming, Yunnan, China || |-id=651 | 3651 Friedman || || Louis Friedman (born 1941), a co-founder of the Planetary Society, and his wife, Connie || |-id=652 | 3652 Soros || || George Soros (born 1930), Hungarian-born American businessman and philosopher || |-id=653 | 3653 Klimishin || || Ivan Antonovich Klimishin, Russian astronomer || |-id=654 | 3654 AAS || || American Astronomical Society || |-id=655 | 3655 Eupraksia || || wife of prince Fedor of Ryazan, who lived in the 13th century, she preferred to kill herself to being taken prisoner by Mongol-Tatars || |-id=656 | 3656 Hemingway || 1978 QX || Ernest Hemingway (1899–1961), US writer || |-id=657 | 3657 Ermolova || || Maria Yermolova (1853–1928), Russian actress || |-id=658 | 3658 Feldman || 1982 TR || Paul D. Feldman, American astronomer, and Paul A. Feldman, Canadian radioastronomer || |-id=659 | 3659 Bellingshausen || || Fabian Gottlieb von Bellingshausen (1778–1852), Antarctic explorer, who in 1819–1821 lead the first Russian Antarctic expedition || |-id=660 | 3660 Lazarev || || Mikhail Lazarev (1788–1851), Russian admiral || |-id=661 | 3661 Dolmatovskij || || Yevgeniy Dolmatovsky (1915–1994), Soviet poet || |-id=662 | 3662 Dezhnev || || Semyon Dezhnev (c. 1605–1673), Russian explorer || |-id=663 | 3663 Tisserand || || Félix Tisserand (1845–1896), French astronomer || |-id=664 | 3664 Anneres || 4260 P-L || Anna Theresia ("Anneres") Schmadel, wife of German astronomer Lutz D. Schmadel || |-id=665 | 3665 Fitzgerald || 1979 FE || Ella Fitzgerald, American jazz singer || |-id=666 | 3666 Holman || 1979 HP || Matthew J. Holman, American astronomer || |-id=667 | 3667 Anne-Marie || 1981 EF || Anne-Marie Malotki, a friend of the discoverer Edward L. G. Bowell || |-id=668 | 3668 Ilfpetrov || || Ilf and Petrov, Soviet writers || |-id=669 | 3669 Vertinskij || || Alexander Vertinsky (1889–1957), Russian actor, poet and composer || |-id=670 | 3670 Northcott || 1983 BN || Ruth J. Northcott (1913–1969), Canadian astronomer || |-id=671 | 3671 Dionysus || 1984 KD || Dionysus, Greek god of wine || |-id=672 | 3672 Stevedberg || 1985 QQ || Stephen J. Edberg (born 1952), American astronomer || |-id=673 | 3673 Levy || 1985 QS || David H. Levy (born 1948), Canadian astronomer and author || |-id=674 | 3674 Erbisbühl || 1963 RH || Mountain in Germany and location of the Sonneberg Observatory || |-id=675 | 3675 Kemstach || || Russian Marfa Vladimirovna Kemstach (1888–1971) and Semen Stepanovich Kemstach (1880–1938), grandparents of the discoverer Lyudmila Karachkina || |-id=676 | 3676 Hahn || 1984 GA || Gerhard Hahn, a planetary astronomer at Uppsala Observatory || |-id=677 | 3677 Magnusson || || Per Magnusson, a planetary astronomer at the Swedish Uppsala Observatory || |-id=678 | 3678 Mongmanwai || 1966 BO || Mong Man Wai (1927–2010), Chinese businessman || |-id=679 | 3679 Condruses || 1984 DT || Condruzes or Condruses, ancient inhabitants of what is now the Condroz, Belgium || |-id=680 | 3680 Sasha || 1987 MY || Alexandra Rachel Druyen Sagan (born 1982), daughter of Carl Sagan and Ann Druyan || |-id=681 | 3681 Boyan || || Boyan, an 11th-century Russian bard at the court of Yaroslav the Wise || |-id=682 | 3682 Welther || A923 NB || Barbara Welther (born 1938), historian of science at the Harvard–Smithsonian Center for Astrophysics || |-id=683 | 3683 Baumann || 1987 MA || Paul Baumann (1901–1976) and his wife Helene (1899–1986), German amateur astronomers || |-id=684 | 3684 Berry || 1983 AK || Richard Berry, editor-in-chief of Astronomy || |-id=685 | 3685 Derdenye || || Derald and Denise Nye, amateur astronomers in Tucson, Arizona || |-id=686 | 3686 Antoku || 1987 EB || Emperor Antoku (1178–1185), Japan || |-id=687 | 3687 Dzus || A908 TC || Paul K. Dzus, assistant and volunteer at the Minor Planet Center in the 1980s || |-id=688 | 3688 Navajo || 1981 FD || Navajo, Native American people in Arizona, New Mexico and Utah || |-id=689 | 3689 Yeates || || Anthony N. Yeates, Australian geologist || |-id=690 | 3690 Larson || 1981 PM || Stephen M. Larson, planetary scientist at the Lunar and Planetary Laboratory and a discoverer of minor planets || |-id=691 | 3691 Bede || 1982 FT || The Venerable Bede (673–735), English monk and historian || |-id=692 | 3692 Rickman || || Hans Rickman (born 1949), a planetary astronomer at Uppsala Observatory || |-id=693 | 3693 Barringer || 1982 RU || Daniel Barringer (1860–1929), and pioneer investigator of terrestrial meteorite craters and after whom the Barringer Crater is named || |-id=694 | 3694 Sharon || || Sharon Rachel Vinick, friend of the discoverer Arie William Grossman || |-id=695 | 3695 Fiala || || Alan D. Fiala (born 1942), American staff astronomer with the USNO who became Chief of the U.S. Nautical Almanac Office in 1992 || |-id=696 | 3696 Herald || 1980 OF || David R. Herald, Australian amateur astronomer || |-id=697 | 3697 Guyhurst || 1984 EV || Guy Hurst, British amateur astronomer from Basingstoke, south central England, who has been observing comets since 1970 Src || |-id=698 | 3698 Manning || || Brian G. W. Manning (1926–2011), British amateur cometary astrometrist || |-id=699 | 3699 Milbourn || || Stanley William Milbourn, editor of the circulars of the British Astronomical Association || |-id=700 | 3700 Geowilliams || || George E. Williams, an Australian geologist, who discovered the Acraman crater, a meteorite impact crater in South Australia || |} 3701–3800 |- | 3701 Purkyně || 1985 DW || Jan Evangelista Purkyně (1787–1869), Czech anatomist, patriot, and physiologist || |-id=702 | 3702 Trubetskaya || 1970 NB || Ekaterina Ivanovna Trubetskaya (1800–1854), Russian princess, wife of a Decembrist || |-id=703 | 3703 Volkonskaya || || Mariya Nikolayevna Volkonskaya (1805–1863), Russian princess, wife of a Decembrist || |-id=704 | 3704 Gaoshiqi || || Gao Shi-Qi (1905–1988), the founder of science popularization in China || |-id=705 | 3705 Hotellasilla || || Erich Schumann", long-time manager of the Hotel La Silla" at La Silla Observatory in Chile || |-id=706 | 3706 Sinnott || || Roger W. Sinnott, associate editor of Sky & Telescope || |-id=707 | 3707 Schröter || 1934 CC || Johann Hieronymus Schröter (1745–1816), German astronomer and selenographer || |-id=708 | 3708 Socus || || Socus, defending his brother, wounded Odysseus with a spear throw that would have been fatal had not the goddess Athena deflected it. Odysseus then speared Socus in the back and taunted him as he perished. || |-id=709 | 3709 Polypoites || || Polypoites, mythical Greek warrior || |-id=710 | 3710 Bogoslovskij || || Nikita Bogoslovsky (1913–2004), Russian composer and writer || |-id=711 | 3711 Ellensburg || 1983 QD || City of Ellensburg, Washington, United States || |-id=712 | 3712 Kraft || 1984 YC || Robert Kraft (1927–2015), American professor of astronomy and astrophysics and chairman of the IAU || |-id=713 | 3713 Pieters || || Carle M. Pieters (born 1943), American geologist and planetary scientist || |-id=714 | 3714 Kenrussell || || Kenneth S. Russell, Australian astronomer and a discoverer of minor planets and comets. He has been working with the UK Schmidt Telescope for many years. || |-id=715 | 3715 Štohl || 1980 DS || Ján Štohl (1932–1993), Slovak astronomer || |-id=716 | 3716 Petzval || 1980 TG || József Miska Petzval (1807–1891), Hungarian engineer and mathematician || |-id=717 | 3717 Thorenia || 1964 CG || Victor Eugene Thoren (1935–1991), an historian of astronomy at Indiana University || |-id=718 | 3718 Dunbar || || R. Scott Dunbar, American physicist, planetary scientist and discoverer of minor planets || |-id=719 | 3719 Karamzin || || Nikolay Karamzin (1766–1826), Russian historian || |-id=720 | 3720 Hokkaido || || Hokkaidō, Japan || |-id=721 | 3721 Widorn || 1982 TU || Thomas Widorn, Austrian astronomer || |-id=722 | 3722 Urata || 1927 UE || Takeshi Urata (1947–2012), Japanese astronomer and discoverer of minor planets || |-id=723 | 3723 Voznesenskij || || Andrei Voznesensky (1933–2010), Russian poet || |-id=724 | 3724 Annenskij || || Innokenty Annensky (1855–1909), Russian poet and writer || |-id=725 | 3725 Valsecchi || || Giovanni B. Valsecchi, Italian astronomer at the National Institute for Astrophysics || |-id=726 | 3726 Johnadams || 1981 LJ || John Adams (1735–1826), American president || |-id=727 | 3727 Maxhell || 1981 PQ || Maximilian Hell (1720–1792), Hungarian astronomer and Jesuit priest || |-id=728 | 3728 IRAS || 1983 QF || IRAS, the Infrared Astronomical Satellite || |-id=729 | 3729 Yangzhou || || Yangzhou, Jiangsu, China || |-id=730 | 3730 Hurban || || Jozef Miloslav Hurban (1817–1888), Slovak poet, writer, journalist, editor, critic || |-id=731 | 3731 Hancock || || John Hancock (1737–1793), American politician || |-id=732 | 3732 Vávra || || Anton Alfred Vávra, father of the discoverer || |-id=733 | 3733 Yoshitomo || 1985 AF || Minamoto no Yoshitomo (1123–1160), early Japanese samurai || |-id=734 | 3734 Waland || 9527 P-L || Robert L. Waland, Scottish optician who developed new techniques for making the optics of Schmidt telescopes || |-id=735 | 3735 Třeboň || 1983 XS || Třeboň, Czech Republic || |-id=736 | 3736 Rokoske || || Thomas Leo Rokoske, professor of physics and astronomy at the Appalachian State University in North Carolina || |-id=737 | 3737 Beckman || 1983 PA || Arnold O. Beckman (1900–2004), American chemist and inventor of the pH meter || |-id=738 | 3738 Ots || || Georg Ots (1920–1975), Estonian opera singer || |-id=739 | 3739 Rem || || Rem Viktorovich Khokhlov (1926–1977), Soviet physicist and co-founder of nonlinear optics || |-id=740 | 3740 Menge || 1981 EM || Sergio Menge de Freitas, vice-director of the Valongo Observatory, Brazil || |-id=741 | 3741 Rogerburns || || Roger Burns (1937–1994), New Zealand mineralogist || |-id=742 | 3742 Sunshine || || Jessica M. Sunshine, visiting scientist at MIT || |-id=743 | 3743 Pauljaniczek || 1983 EW || Paul Janiczek (born 1937), American astronomer || |-id=744 | 3744 Horn-d'Arturo || 1983 VE || Guido Horn d'Arturo (1879–1967), Italian astronomer || |-id=745 | 3745 Petaev || 1949 SF || Michail Ivanovich Petaev, visiting planetary geologist at Harvard–Smithsonian Center for Astrophysics || |-id=746 | 3746 Heyuan || || Heyuan, Guangdong, China || |-id=747 | 3747 Belinskij || || Vissarion Belinsky (1811–1848), Russian literary critic || |-id=748 | 3748 Tatum || 1981 JQ || Jeremy B. Tatum, Canadian astronomer || |-id=749 | 3749 Balam || || David D. Balam, Canadian astronomer and discoverer of minor planets || |-id=750 | 3750 Ilizarov || || Gavriil Ilizarov (1921–1992), Soviet orthopedic surgeon || |-id=751 | 3751 Kiang || 1983 NK || Tao Kiang, astronomer at Dunsink Observatory, near Dublin || |-id=752 | 3752 Camillo || 1985 PA || Camillo, son of the early Roman King Turno || |-id=753 | 3753 Cruithne || 1986 TO || Cruithne, ancient British tribe || |-id=754 | 3754 Kathleen || 1931 FM || Kathleen Willoughby Clifford, granddaughter of discoverer Clyde Tombaugh || |-id=755 | 3755 Lecointe || 1950 SJ || Georges Lecointe (1869–1929), Belgian astronomer and explorer || |-id=756 | 3756 Ruscannon || || Russell David Cannon, British astronomer || |-id=757 | 3757 Anagolay || 1982 XB || Anagolay is the goddess of lost things in ancient Philippine Tagalog mythology. Name suggested by the SGAC Name An Asteroid Campaign || |-id=758 | 3758 Karttunen || 1983 WP || Hannu Karttunen, Finnish astronomer || |-id=759 | 3759 Piironen || 1984 AP || Jukka Piironen, Finnish astronomer at the Finnish Meteorological Institute in Helsinki || |-id=760 | 3760 Poutanen || 1984 AQ || Markku Poutanen, Finnish astronomer and geodesist || |-id=761 | 3761 Romanskaya || 1936 OH || Sofia Romanskaya (1886–1969), Russian astronomer || |-id=762 | 3762 Amaravella || || Amaravella group of Russian painters, they represented Russian cosmism style || |-id=763 | 3763 Qianxuesen || || Qian Xuesen (1911–2009), Chinese aerodynamicist and cyberneticist || |-id=764 | 3764 Holmesacourt || || Robert Holmes a Court (1937–1990), an Australian lawyer, businessman and collector || |-id=765 | 3765 Texereau || || Jean Texereau, optical engineer in the optical laboratory at Paris Observatory and author of the classic How to Make a Telescope || |-id=766 | 3766 Junepatterson || 1983 BF || June C. Patterson (1923–1988) amateur astronomer of Sierra Vista, Arizona || |-id=767 | 3767 DiMaggio || 1986 LC || Joe DiMaggio (1914–1999), American baseball player || |-id=768 | 3768 Monroe || 1937 RB || Marilyn Monroe (1926–1962), American actress || |-id=769 | 3769 Arthurmiller || 1967 UV || Arthur Miller (1915–2005), American playwright, essayist, and author || |-id=770 | 3770 Nizami || || Nizami Ganjavi (1141–1209), Persian poet || |-id=771 | 3771 Alexejtolstoj || || Aleksey Nikolayevich Tolstoy (1883–1945), Russian writer || |-id=772 | 3772 Piaf || || Édith Piaf (1915–1963), French singer || |-id=773 | 3773 Smithsonian || 1984 YY || Smithsonian Institution, American museum || |-id=774 | 3774 Megumi || 1987 YC || Megumi, wife of Japanese astronomer Takuo Kojima who discovered this minor planet || |-id=775 | 3775 Ellenbeth || || Ellen Elizabeth Willoughby, granddaughter of the discoverer Clyde Tombaugh || |-id=776 | 3776 Vartiovuori || 1938 GG || Hill in Turku, Finland on which the first observatory was built by Argelander || |-id=777 | 3777 McCauley || || Francis McCauley, geologist with the USGS || |-id=778 | 3778 Regge || || Tullio Regge (1931–2014), Italian theoretical physicist at Turin University || |-id=779 | 3779 Kieffer || || Hugh H. Kieffer, American geophysicist with the USGS || |-id=780 | 3780 Maury || 1985 RL || Alain Maury (born 1958), French astronomer and discoverer of minor planets || |-id=781 | 3781 Dufek || || George J. Dufek (1903–1977), American Antarctic explorer and Rear Admiral || |-id=782 | 3782 Celle || 1986 TE || German town of Celle in Lower Saxony || |-id=783 | 3783 Morris || || Charles S. Morris, observer of comets (presumed: Charles S. Morris Observatory) || |-id=784 | 3784 Chopin || || Frédéric Chopin (1810–1849), Polish composer || |-id=785 | 3785 Kitami || 1986 WM || Kitami, Japan || |-id=786 | 3786 Yamada || 1988 AE || Sakao Yamada, Japanese engineer || |-id=787 | 3787 Aivazovskij || || Ivan Aivazovsky (1817–1900), Russian painter || |-id=788 | 3788 Steyaert || || Christian Steyaert (born 1955), Belgian amateur astronomer, president of the Belgian (Flemish) astronomical society Vereniging voor Sterrenkunde from 1988 to 2004 || |-id=789 | 3789 Zhongguo || 1928 UF || Chinese name for China || |-id=790 | 3790 Raywilson || 1937 UE || Raymond Wilson (1928–2018), astronomical optician and pioneer of active optics || |-id=791 | 3791 Marci || || Jan Marek Marci (1595–1667), Czech physician, physicist, astronomer, and natural philosopher || |-id=792 | 3792 Preston || 1985 FA || Richard Preston (born 1954), American author of the astronomy book First Light || |-id=793 | 3793 Leonteus || || Leonteus, mythical person related to Trojan War || |-id=794 | 3794 Sthenelos || || Sthenelos, mythical person related to Trojan War || |-id=795 | 3795 Nigel || || Nigel Henbest (born 1951), British author, co-founder of Pioneer TV Productions || |-id=796 | 3796 Lene || 1986 XJ || Lene Augustesen, daughter of Danish astronomer Karl Augustesen, college of discoverer Poul Jensen at Brorfelde Observatory || |-id=797 | 3797 Ching-Sung Yu || 1987 YL || Ching-Sung Yu, Chinese astronomer || |-id=798 | 3798 de Jager || 2402 T-3 || Cornelis de Jager (1921–), Dutch astronomer || |-id=799 | 3799 Novgorod || || Novgorod, Russia || |-id=800 | 3800 Karayusuf || 1984 AB || Alford S. Karayusuf, supporter of near-Earth asteroid research projects at JPL || |} 3801–3900 |- | 3801 Thrasymedes || 1985 VS || Thrasymedes, mythical person related to Trojan War || |-id=802 | 3802 Dornburg || || Dornburg, a German town near the discovering Tautenburg Observatory || |-id=803 | 3803 Tuchkova || || Margarita Mikhailovna Tuchkova (1781–1852), Russian, founder of Spaso-Borodinsky monastery || |-id=804 | 3804 Drunina || || Yulia Drunina (1924–1991), Soviet poet || |-id=805 | 3805 Goldreich || || Peter Goldreich (born 1939), an American astrophysicist || |-id=806 | 3806 Tremaine || || Scott D. Tremaine (born 1950), Canadian astrophysicist || |-id=807 | 3807 Pagels || || Heinz Pagels (1939–1988), an American physicist || |-id=808 | 3808 Tempel || || Wilhelm Tempel (1821–1889), German astronomer || |-id=809 | 3809 Amici || 1984 FA || Giovanni Battista Amici (1786–1863), Italian astronomer || |-id=810 | 3810 Aoraki || 1985 DX || Aoraki / Mount Cook is the highest mountain in New Zealand || |-id=811 | 3811 Karma || 1953 TH || Karma, Hindu philosophy || |-id=812 | 3812 Lidaksum || || Li Dak-sum, (1920–) Chinese entrepreneur and philanthropist || |-id=813 | 3813 Fortov || || Vladimir Fortov (born 1946), a Russian physicist and expert in thermal physics, shock waves, and plasma physics || |-id=814 | 3814 Hoshi-no-mura || 1981 JA || Job training school for disabled persons. "Hoshi no mura" is meaning "Star village" in Japanese || |-id=815 | 3815 König || 1959 GG || Arthur König (1895–1969), German astronomer and discoverer of this minor planet. It was named by the other two discoverers, Gerhard Jackisch and Wolfgang Wenzel || |-id=816 | 3816 Chugainov || || Pavel Fedorovich Chugainov (1933–1992), long-time astronomer at the Crimean Astrophysical Observatory || |-id=817 | 3817 Lencarter || || Leonard J. Carter, of the British Interplanetary Society || |-id=818 | 3818 Gorlitsa || || Mariya Avksent'evna Rudenko, a village schoolmistress in the Mohyliv-Podilskyi Raion of Ukraine || |-id=819 | 3819 Robinson || 1983 AR || Leif J. Robinson, editor of the monthly American magazine Sky & Telescope || |-id=820 | 3820 Sauval || 1984 DV || Henri Sauval (1623–1676), French historian || |-id=821 | 3821 Sonet || || Jean Sonet (1908–1987), a Belgian Jesuit || |-id=822 | 3822 Segovia || || Andrés Segovia (1893–1987), guitarist || |-id=823 | 3823 Yorii || || Yorii, a Japanese town in the Saitama Prefecture || |-id=824 | 3824 Brendalee || 1929 TK || Brenda Willoughby Anderson, granddaughter of the American discoverer Clyde Tombaugh || |-id=825 | 3825 Nürnberg || 1967 UR || Nuremberg, a city in Germany || |-id=826 | 3826 Handel || || George Frideric Handel (1685–1759), German baroque composer || |-id=827 | 3827 Zdeněkhorský || 1986 VU || Zdeněk Horský (1929–1988), Czech historian-astronomer || |-id=828 | 3828 Hoshino || 1986 WC || Jiro Hoshino, Japanese amateur astronomer || |-id=829 | 3829 Gunma || 1988 EM || Gunma, a prefecture of Japan || |-id=830 | 3830 Trelleborg || 1986 RL || Trelleborg, southernmost Swedish city and nearby located Brorfelde Observatory || |-id=831 | 3831 Pettengill || || Gordon Pettengill (1926–2021), an American radio astronomer and planetary physicist at MIT || |-id=832 | 3832 Shapiro || 1981 QJ || Irwin I. Shapiro (born 1926), an American astrophysicist and professor at Harvard University || |-id=833 | 3833 Calingasta || 1971 SC || Calingasta, department in San Juan, Argentina, where the discovering Leoncito Astronomical Complex is located || |-id=834 | 3834 Zappafrank || 1980 JE || Frank Zappa (1940–1993), American musician || |-id=835 | 3835 Korolenko || || Vladimir Korolenko (1853–1921), Russian writer || |-id=836 | 3836 Lem || || Stanisław Lem (1921–2006), Polish writer || |-id=837 | 3837 Carr || || Michael Harold Carr, planetary geologist with the USGS || |-id=838 | 3838 Epona || 1986 WA || Epona, Gallo-Roman goddess of horses, ponies, donkeys and mules || |-id=839 | 3839 Bogaevskij || 1971 OU || Konstantin Bogaevsky (1872–1943), Russian painter || |-id=840 | 3840 Mimistrobell || || Mary E. Strobell, geologist with the USGS || |-id=841 | 3841 Dicicco || || Dennis DiCicco, editor of Sky & Telescope || |-id=842 | 3842 Harlansmith || || Harlan Smith (1924–1991), American astronomer || |-id=843 | 3843 OISCA || 1987 DM || The Organization for Industrial, Spiritual and Cultural Advancement (OISCA), || |-id=844 | 3844 Lujiaxi || 1966 BZ || Lu Jiaxi (1915–2001), Chinese physical chemist || |-id=845 | 3845 Neyachenko || || Ilya Isaakovich Neyachenko, Russian journalist and amateur astronomer || |-id=846 | 3846 Hazel || || Hazel Arthur Spellmann (1896–1968), mother of the discoverer Carolyn Shoemaker || |-id=847 | 3847 Šindel || || Jan Šindel (c. 1375 – c. 1456), medieval Czech astronomer, mathematician, physician, and professor || |-id=848 | 3848 Analucia || || Ana Lucia Martins, friend of Belgian discoverer Henri Debehogne || |-id=849 | 3849 Incidentia || 1984 FC || Roger W. Martin, graduate of the Electrical and Computer Engineering Department at UC and expert in asteroid science || |-id=850 | 3850 Peltier || || Leslie Peltier (1900–1980), American amateur astronomer || |-id=851 | 3851 Alhambra || 1986 UZ || Alhambra palace in Spain || |-id=852 | 3852 Glennford || || Glenn Ford (1916–2006), a Canadian actor during Hollywood's Golden Age || |-id=853 | 3853 Haas || || Walter H. Haas (1917–2015), an American amateur astronomer and founder of the Association of Lunar and Planetary Observers (ALPO) || |-id=854 | 3854 George || 1983 EA || George Estel Shoemaker (1904–1960), father-in-law of American discoverer Carolyn Shoemaker || |-id=855 | 3855 Pasasymphonia || || The Pasadena Symphony and Pops, an American orchestra based in Pasadena, California || |-id=856 | 3856 Lutskij || 1976 QX || Valery Konstantinovich Lutsky, Russian astronomer and scientific commentator on astronomy || |-id=857 | 3857 Cellino || || Alberto Cellino, Italian astronomer at the Observatory of Turin (Pino Torinese) || |-id=858 | 3858 Dorchester || 1986 TG || Dorchester, a county town of Dorset in South West England || |-id=859 | 3859 Börngen || 1987 EW || Freimut Börngen (1930–2021), German astronomer || |-id=860 | 3860 Plovdiv || || Plovdiv, Bulgaria || |-id=861 | 3861 Lorenz || A910 FA || Konrad Lorenz (1903–1989), Austrian ethologist and 1973 Nobel Prize laureate || |-id=862 | 3862 Agekian || 1972 KM || Tateos Agekian, Russian astrophysicist || |-id=863 | 3863 Gilyarovskij || || Vladimir Gilyarovsky (1853–1935), a Russian writer and newspaper journalist || |-id=864 | 3864 Søren || 1986 XF || Soren Augustesen, son of Danish discoverer Poul Jensen || |-id=865 | 3865 Lindbloom || || George G. Lindbloom (1934–1989), artist, designer, writer, cartoonist, teacher, photographer and humorist || |-id=866 | 3866 Langley || || Samuel Pierpont Langley (1834–1906), an American astronomer, physicist, inventor of the bolometer and pioneer of aviation || |-id=867 | 3867 Shiretoko || 1988 HG || Shiretoko Peninsula, Japan || |-id=868 | 3868 Mendoza || 4575 P-L || Eugenio E. Mendoza V. (born 1928) astronomer and an expert on photometry and spectroscopy || |-id=869 | 3869 Norton || 1981 JE || Arthur Philip Norton (1876–1955), British amateur astronomer (Norton's Star Atlas) || |-id=870 | 3870 Mayré || || Mayré Elst, daughter of Belgian discoverer Eric Walter Elst || |-id=871 | 3871 Reiz || || Anders Reiz (1915–2000), a Danish astronomer † || |-id=872 | 3872 Akirafujii || 1983 AV || Akira Fujii (born 1941), Japanese astronomer || |-id=873 | 3873 Roddy || 1984 WB || David J. Roddy (1932–2002), American astrogeologist, researcher of terrestrial impact craters || |-id=874 | 3874 Stuart || || Stuart E. Jones, astronomer and photographic specialist at the Lowell Observatory || |-id=875 | 3875 Staehle || 1988 KE || Robert L. Staehle, astronautical engineer at JPL || |-id=876 | 3876 Quaide || 1988 KJ || William L. Quaide, expert in Solar System exploration at NASA || |-id=877 | 3877 Braes || 3108 P-L || Lucien Lucas Eduard Braes (born 1936), Belgian astronomer at Leiden Observatory || |-id=878 | 3878 Jyoumon || || Jōmon period, prehistoric Japan || |-id=879 | 3879 Machar || 1983 QA || Josef Svatopluk Machar (1864–1942), Czech writer and poet || |-id=880 | 3880 Kaiserman || 1984 WK || Michael Kaiserman, American aeronautical engineer || |-id=881 | 3881 Doumergua || 1925 VF || Gaston Doumergue (1863–1937), thirteenth president of France during 1924–1931, and his wife || |-id=882 | 3882 Johncox || 1962 RN || John P. Cox (1926–1984), American astronomer, researcher into variable stars || |-id=883 | 3883 Verbano || 1972 RQ || Lake Maggiore or Lago Verbàno, located in Italy and Switzerland on the south side of the Alps || |-id=884 | 3884 Alferov || || Zhores Alferov (born 1930), Russian physicist || |-id=885 | 3885 Bogorodskij || || Aleksandr Fyodorovich Bogorodskij (1907–1984), Soviet astrophysicist || |-id=886 | 3886 Shcherbakovia || || Sergej Vasil'evich Shcherbakov (1856–1931), founder of the Nizhegorodskij circle of amateur physicists and astronomers || |-id=887 | 3887 Gerstner || 1985 QX || František Josef Gerstner (1756–1832) and his son František Antonín Gerstner (1795–1840), Czech physicist and railway engineers || |-id=888 | 3888 Hoyt || 1984 FO || William Graves Hoyt (1921–1985), American journalist and historian || |-id=889 | 3889 Menshikov || || Alexander Danilovich Menshikov (1673–1729), Russian statesman and military leader || |-id=890 | 3890 Bunin || || Ivan Bunin (1870–1953) first Russian writer to win the Nobel Prize for Literature || |-id=891 | 3891 Werner || || Robert A. Werner, aerospace engineer at the University of Texas at Austin || |-id=892 | 3892 Dezsö || 1941 HD || Lóránt Dezső, Hungarian astronomer, founder and director of the Observatory for Solar Physics in Debrecen, Hungary || |-id=893 | 3893 DeLaeter || || John DeLaeter, retired professor at Curtin University, Western Australia || |-id=894 | 3894 Williamcooke || || William Ernest Cooke (1863–1947), an Australian astronomer || |-id=895 | 3895 Earhart || 1987 DE || Amelia Earhart (1897–1937; disappeared), an American aviation pioneer || |-id=896 | 3896 Pordenone || 1987 WB || Il Pordenone, one of the Italian 16th century masters of painting || |-id=897 | 3897 Louhi || 1942 RT || Louhi, the wicked queen of the land known as Pohjola in Finnish || |-id=898 | 3898 Curlewis || || Harold Curlewis (1875–1968), Australian government astronomer and director of the Perth Observatory || |-id=899 | 3899 Wichterle || || Otto Wichterle (1913–1998), Czech chemist and inventor of the contact lens || |-id=900 | 3900 Knežević || 1985 RK || Zoran Knežević (born 1949), an astronomer at the Astronomical Observatory of Belgrade || |} 3901–4000 |- | 3901 Nanjingdaxue || 1958 GQ || Nanjing University || |-id=902 | 3902 Yoritomo || 1986 AL || Minamoto no Yoritomo (1147–1199), founder of the Kamakura shogunate, Japan || |-id=903 | 3903 Kliment Ohridski || || Kliment Ohridski (840–916), one of the first Bulgarian philosophers || |-id=904 | 3904 Honda || 1988 DQ || Minoru Honda (1913–1990), Japanese astronomer || |-id=905 | 3905 Doppler || 1984 QO || Christian Doppler (1803–1853), Austrian mathematician and physicist || |-id=906 | 3906 Chao || || Edward C. T. Chao (1919–2008), American geologist || |-id=907 | 3907 Kilmartin || A904 PC || Pamela M. Kilmartin, New Zealand astronomer and discoverer of minor planets || |-id=908 | 3908 Nyx || 1980 PA || Nyx, Greek goddess || |-id=909 | 3909 Gladys || || Gladys Marie Zeigler (1921–1988), mother of discoverer Kenneth W. Zeigler || |-id=910 | 3910 Liszt || 1988 SF || Franz Liszt (1811–1886), Hungarian pianist and composer || |-id=911 | 3911 Otomo || 1940 QB || Satoru Otomo (born 1957), Japanese amateur astronomer and discoverer of minor planets || |-id=912 | 3912 Troja || 1988 SG || Troy, ancient legendary city || |-id=913 | 3913 Chemin || || Henriette and Robert Chemin, librarian, engineer at Paris Observatory, and discoverer of minor planets || |-id=914 | 3914 Kotogahama || 1987 SE || Kotogahama, beach in Geisei near Geisei Observatory, Japan || |-id=915 | 3915 Fukushima || || Hisao Fukushima (1911–), amateur astronomer and professor at Hokkaido University, Japan || |-id=916 | 3916 Maeva || || Maeva d'Alloy d'Hocquincourt Vitry (1985–1982), niece of ESO astronomer Patrice Bouchet Vitry || |-id=917 | 3917 Franz Schubert || 1961 CX || Franz Schubert (1797–1828), composer || |-id=918 | 3918 Brel || || Jacques Brel (1929–1978), Belgian songwriter and performer || |-id=919 | 3919 Maryanning || 1984 DS || Mary Anning (1799–1847), English fossil hunter || |-id=920 | 3920 Aubignan || 1948 WF || Aubignan, village in southeastern France || |-id=921 | 3921 Klement'ev || 1971 OH || Zahar Ivanovich Klementyev (1903–1994), Russian mathematician || |-id=922 | 3922 Heather || || Heather Couper (1949–2020), British astronomer, writer and broadcaster || |-id=923 | 3923 Radzievskij || || Vladimir Vyacheslavovich Radzievskii, Russian astronomer || |-id=924 | 3924 Birch || 1977 CU || Peter V. Birch, astronomer at Perth Observatory || |-id=925 | 3925 Tret'yakov || || Pavel Tretyakov (1832–1898) and his brother Sergei Mikhailovich Tretyakov (1834–1892), Russian art collectors || |-id=926 | 3926 Ramirez || || Abel R. Ramirez, manager and host of the Athenaeum at Caltech || |-id=927 | 3927 Feliciaplatt || || Felicia Platt, mother of John Platt, a computer scientist and discoverer of minor planets || |-id=928 | 3928 Randa || 1981 PG || Randa small village near Zermatt in the Swiss Alps || |-id=929 | 3929 Carmelmaria || || Carmel Maria Borg, secretary at the Perth Observatory and administrative assistant || |-id=930 | 3930 Vasilev || || Konstantin Vasilyev (1942–1976), Russian painter || |-id=931 | 3931 Batten || 1984 EN || Alan H. Batten, Canadian astronomer at the Dominion Astrophysical Observatory in Victoria, British Columbia || |-id=932 | 3932 Edshay || || Edwin L. Shay (1938–1998), educator in Worthington, Ohio, and Syracuse, New York || |-id=933 | 3933 Portugal || || Portugal || |-id=934 | 3934 Tove || || Tove Augustesen, wife of Danish discoverer Karl Augustesen || |-id=935 | 3935 Toatenmongakkai || 1987 PB || The Oriental Astronomical Association (Toatenmongakkai) was founded by Issei Yamamoto in 1920 || |-id=936 | 3936 Elst || 2321 T-3 || Eric Walter Elst (born 1936), Belgian astronomer and discoverer of minor planets || |-id=937 | 3937 Bretagnon || 1932 EO || Pierre Bretagnon, astronomer at the Bureau des Longitudes in France || |-id=938 | 3938 Chapront || 1949 PL || Jean Chapront and Michelle Chapront-Touzé, astronomers at the Bureau des Longitudes in France || |-id=939 | 3939 Huruhata || 1953 GO || Masaaki Huruhata (1912–1988), astronomer at Tokyo Astronomical Observatory, Japan || |-id=940 | 3940 Larion || || Larisa Ivanovna Golubkina, Russian actress || |-id=941 | 3941 Haydn || || Joseph Haydn (1732–1809), Austrian composer || |-id=942 | 3942 Churivannia || || Ivan Ivanovich Churyumov (1907–1942) Soviet soldier, and Ivan Ivanovich Churyumov (1929–1988), Soviet philosopher and poet || |-id=943 | 3943 Silbermann || || Gottfried Silbermann (1683–1753), a German builder of keyboard instruments || |-id=944 | 3944 Halliday || || Ian Halliday, Canadian astronomer || |-id=945 | 3945 Gerasimenko || 1982 PL || Svetlana Gerasimenko (born 1945) Soviet comets researcher || |-id=946 | 3946 Shor || || Viktor Abramovich Shor, Soviet minor planet researcher || |-id=947 | 3947 Swedenborg || 1983 XD || Emanuel Swedenborg (1688–1772), Swedish scientist, philosopher, poet and theologian || |-id=948 | 3948 Bohr || 1985 RF || Niels Henrik David Bohr (1885–1962), Danish physicist || |-id=949 | 3949 Mach || 1985 UL || Ernst Mach (1838–1916), Austrian-Czech physicist and philosopher || |-id=950 | 3950 Yoshida || 1986 CH || Tougo Yoshida (1864–1918), Japanese toponymist || |-id=951 | 3951 Zichichi || || Antonino Zichichi (born 1929), Italian astrophysicist and protagonist of CERN || |-id=952 | 3952 Russellmark || || Russell Mark Group has assisted Minor Planet Center with editing asteroid citations || |-id=953 | 3953 Perth || || Perth Observatory in Australia || |-id=954 | 3954 Mendelssohn || 1987 HU || Felix Mendelssohn (1809–1847), German composer || |-id=955 | 3955 Bruckner || || Anton Bruckner (1824–1896), Austrian composer || |-id=956 | 3956 Caspar || || Caspar Karstensen, grandson of the discoverer Poul Jensen || |-id=957 | 3957 Sugie || 1933 OD || Atsushi Sugie, Japanese astronomer || |-id=958 | 3958 Komendantov || 1953 TC || Nikolaj Vasil'evich Komendantov (1895–1937), Russian astronomer || |-id=959 | 3959 Irwin || || John B. Irwin, professor of astronomy at Indiana University and protagonist of the Kitt Peak National Observatory site selection || |-id=960 | 3960 Chaliubieju || 1955 BG || Cha Liubieju, a friend of the discoverer || |-id=961 | 3961 Arthurcox || 1962 OB || Arthur N. Cox, early member of the Indiana Asteroid Program || |-id=962 | 3962 Valyaev || 1967 CC || Valerij Ivanovich Valyaev (born 1944), Soviet astronomer at the Institute for Theoretical Astronomy (ITA) || |-id=963 | 3963 Paradzhanov || || Sergei Paradzhanov (1924–1990), Soviet film producer || |-id=964 | 3964 Danilevskij || || Grigory Danilevsky (1829–1890), Russian and Ukrainian writer || |-id=965 | 3965 Konopleva || || Valentina Petrovna Konopleva, astronomer at Main Ukrainian Astronomical Observatory (part of NAN Ukraine) || |-id=966 | 3966 Cherednichenko || || Vladimir Ivanovich Cherednichenko, cometary researcher at Kiev Polytechnic Institute || |-id=967 | 3967 Shekhtelia || || Fyodor Osipovich Shekhtel' (1859–1926), Russian architect || |-id=968 | 3968 Koptelov || || Afanasij Lazarevich Koptelov, Soviet writer || |-id=969 | 3969 Rossi || || Carlo Rossi (1775–1849), Italian-Russian architect || |-id=970 | 3970 Herran || || Jose Antonio Ruiz de la Herran Villagomez (born 1925), technical advisor of the Museum Universum in Mexico City || |-id=971 | 3971 Voronikhin || || Andrej Nikiforovich Voronikhin (1759–1814), Russian architect || |-id=972 | 3972 Richard || || Richard Arthur Spellmann, brother of discoverer Carolyn Shoemaker, chemist and mayor of El Cerrito, California || |-id=973 | 3973 Ogilvie || || Robert E. Ogilvie (1923–), professor of metallurgy at MIT and a researcher at the Boston Museum of Fine Arts || |-id=974 | 3974 Verveer || 1982 FS || Arie J. B. Verveer, Dutch-born astronomer, Director of Perth Observatory in Western Australia || |-id=975 | 3975 Verdi || || Giuseppe Verdi, Italian composer || |-id=976 | 3976 Lise || 1983 JM || Lise Melinda Breakey Thomas, daughter-in-law of discoverer Norman G. Thomas || |-id=977 | 3977 Maxine || 1983 LM || Maxine Shoemaker Heath, American entomologist, sister of Eugene Shoemaker || |-id=978 | 3978 Klepešta || || Josef Klepešta (1895–1976), Czech astronomer || |-id=979 | 3979 Brorsen || || Theodor Brorsen (1819–1895), Danish astronomer || |-id=980 | 3980 Hviezdoslav || 1983 XU || Pavol Országh Hviezdoslav (1849–1921), Slovak poet || |-id=981 | 3981 Stodola || 1984 BL || Aurel Stodola (1859–1942), Slovak engineer, physicist, and inventor || |-id=982 | 3982 Kastel' || || Galina Richardovna Kastel, Soviet comets researcher and discoverer of minor planets || |-id=983 | 3983 Sakiko || 1984 SX || Sakiko Nakano, sister of Japanese astronomer Syuichi Nakano || |-id=984 | 3984 Chacos || || Albert Anthony Chacos (born 1953), an American space engineer, helped further the exploration of the planets as a key engineer for NASA's New Horizons Pluto-Kuiper Belt mission. He also played important roles in other space missions, including the Messenger mission to Mercury || |-id=985 | 3985 Raybatson || 1985 CX || Raymond M. Batson, American planetary geologist and cartographer with the United States Geological Survey || |-id=986 | 3986 Rozhkovskij || || Dmitrij Aleksandrovich Rozhkovskij (1915–1991), Soviet astronomer || |-id=987 | 3987 Wujek || || Joseph H. Wujek, American scientist || |-id=988 | 3988 Huma || 1986 LA || The Huma bird in Iranian mythology and Sufi poetry is a bird of fortune since its touch, or even sight of its shadow, is said to be auspicious. || |-id=989 | 3989 Odin || 1986 RM || Odin, Norse god || |-id=990 | 3990 Heimdal || || Heimdall, Norse god || |-id=991 | 3991 Basilevsky || || Alexandr T. Basilevsky, Soviet planetary geologist || |-id=992 | 3992 Wagner || || Richard Wagner (1813–1883), German composer || |-id=993 | 3993 Šorm || || František Šorm (1913–1980), a Czech chemist, president of the Czechoslovak Academy of Sciences during the International Geophysical Year, and founder of the Institute for Organic Chemistry and Biochemistry in Prague || |-id=994 | 3994 Ayashi || 1988 XF || Ayashi, a district of the city of Sendai, Japan || |-id=995 | 3995 Sakaino || 1988 XM || Teruo Sakaino (born 1917), a glass and ceramics chemist || |-id=996 | 3996 Fugaku || || One of ancient names for Mount Fuji in Japan || |-id=997 | 3997 Taga || || Taga, Shiga, Japan || |-id=998 | 3998 Tezuka || 1989 AB || Osamu Tezuka (1928–1989), Japanese manga artist || |-id=999 | 3999 Aristarchus || 1989 AL || Aristarchus of Samos, Ancient Greek astronomer and mathematician || |-id=000 | 4000 Hipparchus || 1989 AV || Hipparchus, Ancient Greek scientist || |} References 003001-004000
4319693
https://en.wikipedia.org/wiki/Vidya%20Academy%20of%20Science%20and%20Technology%2C%20Thrissur
Vidya Academy of Science and Technology, Thrissur
Vidya Academy of Science and Technology (VAST) is a privately financed engineering college in Thrissur District in Kerala. The college offers a degree in Bachelor of Technology and courses in six branches of engineering - Production, Civil, Computer Science, Electrical and Electronics, Electronics and Communication, Mechanical. The college also offers a degree in Masters in Computer Application. From the year 2011, the college has offered four MTech courses and two PhD programmes in Electrical engineering & Computer science engineering. The college was established and is administered by Vidya International Charitable Trust (VICT), a body formed by more than a thousand non-resident Keralites mostly based in the Arab States of the Persian Gulf. History The college started functioning in August 2003 offering BTech courses in four branches of engineering, Computer Science, Electrical and Electronics, Electronics and Communication, and Mechanical Engineering. From 2006, the college began to offer BTech programmes in Civil Engineering and Production Engineering. In the same year, the postgraduate programme of Masters in Computer Application was started. There are around 1900 students and 112 faculty members. From 2012, the college has offered MTech in Power electronics and Drives, Computer science and engineering, Structural engineering and Embedded systems. The college is one of the Research Center for Doctoral Research (PhD) of Anna University, Chennai. Certifications The college is affiliated to the University of Calicut, approved by the All India Council for Technical Education and recognized by the Government of Kerala (see External links below). It has also secured ISO 9001:2008 certification. It is also a research center for Doctoral Research for Department of EEE and Dept. of CSE from Anna University, Chennai. College has National Board of Accreditation (NBA) for its EEE, ME and CE undergraduate programmes. Departments and courses The college has seven engineering departments (including the Department of Computer Applications) and three allied departments. The College runs six BTech, four MTech & two PhD programmes in engineering and a MCA programme. Engineering departments Department of Electrical and Electronics Engineering (60 + 30 PG + 8 PhD) Department of Civil Engineering (120 + 24 PG) Department of Computer Science and Engineering (120 + 30 PG + 8 PhD) Department of Computer Applications (60 PG) Department of Electronics and Communication Engineering (120 + 24 PG) Department of Mechanical Engineering (120) Allied departments Department of Applied Sciences Department of Humanities Department of Production Engineering Department of Training and Placement Academic support and services Twinning Programme VIDYA has signed a memorandum of understanding (MoU) with State University of New York at New Paltz providing for a twinning programme arrangement. Research and allied activities The college has a forum in the form of Research Development Extension and Consultancy Cell (RDEC Cell) for promoting research and allied activities. The infrastructure facilities of the college are utilized for formulating and implementing research projects. The laboratories provide the testing facilities. Institutional memberships The College has institutional memberships in the following professional associations : Computer Society of India (CSI) Indian Society for Technical Education (ISTE) Institution of Engineers (India) Nano Science and Technology Consortium In addition, there are active student chapters of Computer Society of India, ISTE and Institution of Engineers (India), and also of Institute of Electrical and Electronics Engineers (IEEE) in the college. Academic tie-ups The college has academic tie-ups with these IT industries. Infosys Technologies Limited through their Campus-Connect programme Tata Consultancy Services Limited Cisco Systems through the Cisco Networking Academy at Amrita Vishwa Vidyapeetham, Coimbatore National Service Scheme There are two units, Unit 101 and Unit 200 of the National Service Scheme (NSS) in the college. FOSS Club The college has an active Free & Open Source Software club called "FOSSers VAST" since 2008. Admissions For both BTech and MCA programmes, fifty percent of the students are selected by the Government of Kerala from the rank list prepared based on the Common Entrance Examination conducted by the commissioner of entrance examinations, and fifty percent of the students are selected by the management from a list prepared by them. Scholarships As part of its philanthropic activity, the Vidya International Charitable Trust, in co-operation with His Highness, Nahayan Bin Mubarak Al Nahyan, Minister of Higher Education and Scientific Research, United Arab Emirates, and Mr. Sunny Varkey, founder of GEMS Education, a consortium of educational institutions in India, the Middle East and Europe, awards nearly 100 scholarships. Administration Vidya International Charitable Trust, a non-profit charitable trust formed by a group of non-resident Indians and registered at Thiruvananthapuram in December 2000, is the promoter of the college. Under the provisions of the trust deed of Vidya International Charitable Trust, the board of trustees is the custodian of the trust and all its properties. The board of trustees vests the management and control of Vidya Academy of Science and Technology and other ventures of the trust on an executive committee of eleven trustees elected from the board of trustees. An advisory board guides the development of the college. A steering committee directs the day-to-day functioning of the college. There is also an academic council to provide leadership to the academic activities in the college. The chief patron is P. K. Asokan. Notable alumni Malavika Mohan - actress See also Vidya Academy of Science and Technology, Technical campus, Kilimanoor, Thiruvananthapuram References External links Vidya Academy of Science and Technology, Official Website Vidya International Charitable Trust, Official Website Vidya Academy of Science and Technology in Wikimapia Engineering colleges in Thrissur district All India Council for Technical Education Colleges affiliated with the University of Calicut Private engineering colleges in Kerala Engineering colleges in Kerala Educational institutions established in 2003 Vidya Academy of Science and Technology 2003 establishments in Kerala
24293173
https://en.wikipedia.org/wiki/List%20of%20people%20associated%20with%20the%20Royal%20Academy%20of%20Music
List of people associated with the Royal Academy of Music
This is a list of people associated with the Royal Academy of Music, London, including principals, alumni, and professors and teachers. Principals A complete list of principals. William Crotch (1822) Cipriani Potter (1832) Charles Lucas (1859) Sir William Sterndale Bennett (1866) Sir George Macfarren (1876) Sir Alexander Mackenzie (1888) Sir John McEwen (1924) Sir Stanley Marchant (1936) Sir Reginald Thatcher (1949) Sir Thomas Armstrong (1955) Sir Anthony Lewis (1968) Sir David Lumsden (1982) Lynn Harrell (1993) Sir Curtis Price (1995) Jonathan Freeman-Attwood (2008) Alumni More alumni can be found at :Category:Alumni of the Royal Academy of Music Louis Demetrius Alvanis (pianist) William Alwyn (composer) Simon Andrews (composer) Irvine Arditti (founder of the Arditti Quartet) Gary Arbuthnot (flute) Kit Armstrong (pianist) Rosemary Ashe (actress) Stephen Ashfield (actor) Lena Ashwell (actress) Augusta Amherst Austen (organist) Russell Austin (composer) Bill Bailey (actor) Bryan Balkwill (conductor) Christopher Ball (clarinettist) Sir John Barbirolli (conductor) Joseph Barnby (conductor) Claire Barnett-Jones (mezzo-soprano) Sandro Ivo Bartoli (pianist) Louisa Bassano (opera singer) Chappell Batchelor (organist) Ani Batikian (violinist) Sir Arnold Bax (composer) Richard Beaudoin (composer) Luke Bedford (composer) Sir Richard Rodney Bennett (composer) Michael Berkeley (composer) William Sterndale Bennett (pianist, composer) Vanraj Bhatia (film music composer) E. Power Biggs (organist) Sir Harrison Birtwistle (composer) Amy Black (mezzo-soprano) Henry Blagrove (violinist) Julian Bliss (clarinetist) Laci Boldemann (composer) Jessie Bond (opera singer) Nimrod Borenstein (composer) Denis Bouriakov (flute) York Bowen (composer, pianist) Christopher Bowers-Broadbent (organist) Kevin Bowyer (organist) Douglas Boyd (conductor) Caryl Brahms (novelist) Dennis Brain (horn player) Nicholas Braithwaite (conductor) Dudley Bright (trombonist) Adrian Brown (conductor) Paul Buckmaster (Composer/Arranger/Cellist) Susan Bullock (soprano) Oliver Butterworth (violinist, educator, administrator) Alan Caddy (guitarist with The Tornados) Arturo Cardelus (composer, pianist) Roy Carter (oboist) Doreen Carwithen (composer) Eason Chan (non-classical singer-songwriter, baritone-tenor) Roger Chase (violist) Belle Chen (pianist) Karel Mark Chichon (conductor) Kristian Chong (pianist) Nigel Clarke (composer) Rebecca Helferich Clarke (composer) Rodney Clarke (bass-baritone) Eric Coates (composer) Harriet Cohen (pianist) Daniel Cohen (conductor) William Cole (organist) Jacob Collier (singer, multi-instrumentalist, composer) Ray Cooper (rock percussionist) Garðar Thór Cortes (singer) Reginald Crompton (singer) Christine Croshaw (pianist) Lucy Crowe (singer) Colin Currie (percussionist) Sir Clifford Curzon (pianist) Benjamin Dale (composer) Sir John Dankworth (jazz composer) Iestyn Davies (countertenor) Mark Eager (conductor The Welsh Sinfonia) Florence Easton (soprano and first female fellow of the academy) Pip Eastop (horn player) Philip Edwards (clarinettist) Carwyn Ellis (rock musician, composer, arranger) Christopher Elton (pianist) John Escreet (jazz pianist) Richard Farnes (conductor) Brian Ferneyhough (composer) Andrew Foster-Williams (bass-baritone) Herbert Fryer (pianist) Melvyn Gale (cellist) Rumon Gamba (conductor) Edward Gardner (conductor) Lesley Garrett (soprano) Mark Gasser (pianist) Helen George (actress) John Georgiadis (violinist, conductor) Sir Edward German (composer) David Giménez Carreras (conductor) Derek Gleeson (conductor, composer, percussionist) Dame Evelyn Glennie (percussionist) Sylvia Glickman (pianist) Ayşedeniz Gökçin (pianist) Derrick Goodwin (theatre producer) Rachel Gough (bassoonist) Thomas Gould (violinist) Edward Gregson (former principal of the Royal Northern College of Music) Benjamin Grosvenor (current student, pianist) Alan Hacker (clarinetist) Robin Haigh (composer) Iain Hamilton (composer) Richard Hand (guitarist) Caroline Hatchard (soprano) Marjorie Hayward (violinist) Michael Head (composer, pianist, organist, singer) Rachel Helleur (cellist) Roy Henderson (baritone) Dame Myra Hess (pianist) Richard Hickox (conductor) Christopher Hobbs (composer) Alfred Charles Hobday (violist) Derek Holman (composer) Sungji Hong (composer) Daniel Hope (violinist) Philip Howard (pianist) Monica Huggett (baroque violinist) Emanuel Hurwitz (violinist) Clelia Iruzun (pianist) Joe Jackson (rock/pop singer, composer) Ifor James (horn player) Isabel Jay (soprano) Sir Karl Jenkins (composer) Katherine Jenkins (mezzo-soprano) Dominic John (pianist) Sir Elton John (rock musician) Guy Jonson (pianist and teacher) Graham Johnson (pianist) Aled Jones (singer) Daniel Jones (composer) Martin Jones (pianist) Paul Carey Jones (baritone) William Ifor Jones (conductor, organist) John Joubert (composer) Skaila Kanga (harpist) Jozef Kapustka (pianist) Miloš Karadaglić (Guitar) Peter Katin (pianist) Alexander Kelly (pianist) Jonathan Kelly (oboist) Freddy Kempf (pianist) Sooz Kempner (comedian and singer) John Kenny (trombonist) Myleene Klass (pop singer, broadcaster, pianist) Peter Knight (folk musician, violinist/fiddler) Rostislav Krimer (pianist, conductor) Mina Kubota (composer and pianist) David Lale (cellist) John Lanchbery (conductor, arranger) John Landor (conductor) Philip Langridge (tenor) Simmon Latutin (George Cross winner) Lewis Henry Lavenu (impresario) John Law (jazz pianist/composer) Edwin Lemare (organist, composer) Annie Lennox (pop singer, flautist) Frank Lloyd (horn player) Sue Longhurst (actress) Dame Felicity Lott (soprano) Nicola Loud (violinist) David Lumsdaine (composer) Dame Moura Lympany (pianist) Susanna Mälkki (conductor) Daniel Clive McCallum (composer) Richard McMahon (pianist) Sydney MacEwan (singer) Joanna MacGregor (pianist) Gareth Malone (choirmaster, TV personality) John McLeod (composer) Charles Manners (singer, producer) Jane Manning (soprano) Philip Martin (pianist, composer) Cliff Masterson (conductor, composer, orchestrator) Tobias Matthay (pianist) Denis Matthews (pianist) Nicholas Maw (composer) Antoinette Miggiani (opera singer) Yurie Miura (pianist) Deborah Mollison (composer) Walter Nugent Monck (actor, director) Gabriela Montero (pianist) Ludovic Morlot (conductor) Gareth Morris (flautist) Geraldine Mucha (composer) Mary Nelson (soprano) Máiréad Nesbitt (violinist/fiddler) Harry Norris (conductor) Chi-chi Nwanoku (double-bassist, founder Chineke! Orchestra) Michael Nyman (composer) Denise Orme (music hall singer) Martin Outram (violist) Dee Palmer (keyboardist) Roxanna Panufnik (composer) Paul Patterson (composer) Ashan Pillai (violist) Jonathan Pitkin (composer) Steve Race (composer, pianist, broadcaster) Frederick Ranalow (baritone, actor) Sir Simon Rattle (conductor) Augusta Read Thomas (composer) Hugo Rignold (conductor) Henry Brinley Richards (composer) Alan Richardson (pianist, composer) David Robertson (conductor) J. G. Robertson (singer, actor) Rodolfo Saglimbeni (conductor) Charlotte Sainton-Dolby (contralto) David Sanger (organist) Amandine Savary (pianist) Dominic Seldis (double-bassist) Mark Shanahan (conductor) James Shearman (composer, conductor) Philip Sheppard (cellist) Derek Simpson (cellist) Gustave Slapoffski (conductor) Ashley Solomon (recorder player, flautist) Dr Paul Steinitz (conductor, organist, Bach Scholar) Roger Steptoe (pianist) Vikki Stone (composer, comedian) David Strange (cellist) Marius Stravinsky (conductor) Yevgeny Sudbin (pianist) Luka Šulić (cellist, member of group 2Cellos) Sir Arthur Sullivan (composer) William Sweeney (composer) Sir John Tavener (composer) Matthew Taylor (composer) Lionel Tertis (violist) Toby Thatcher (oboist, conductor) Michael Thompson (horn player) Julia Thornton (harpist) Patsy Toh (pianist) Ernest Torrence (baritone) Dame Eva Turner (soprano) Maxim Vengerov (violinist) Christopher Ventris (Tenor) Jennifer Vyvyan (soprano) Rick Wakeman (rock keyboardist) Megan Walsh (Soprano) Christopher Warren-Green (conductor) Silu Wang (pianist) Ian "H" Watkins (singer) Christopher White (pianist, musicologist) E. Florence Whitlock (composer) Margaret Jones Wiles (composer, violinist, violist) Carol Williams (organist, composer) Llyr Williams (pianist) Nyle Wolfe (baritone) Sir Henry Wood (conductor) Henry Wylde (conductor) Veronica Yen (pianist) Zi Lan Liao (guzheng player) Alma Ferovic Fazlic (musical theatre) Professors and teachers More former and present teachers can be found at :Category:Academics of the Royal Academy of Music Thomas Adès (former Britten professor of composition) Pierre-Laurent Aimard (Piano – Visiting professor) Kenneth Amis (former International Brass Chair) Sulamita Aronovsky (piano teacher, founder of London International Piano Competition) Walter Bache (former Professor of Piano) Simon Bainbridge (former Head of Composition, still on the teaching staff) Evelyn Barbirolli (former professor of oboe) Sir John Barbirolli (former professor of conducting) Django Bates (visiting professor of jazz) Joshua Bell (Violin – Visiting Professor) Sir Richard Rodney Bennett (Composition – former Visiting Professor) William Bennett (Flute) James Seymour Brett Film Composer Sir Harrison Birtwistle (former professor of composition) Nicolas Bochsa (1789–1856) (Harp, founding director) Barbara Bonney (Opera – Visiting Professor) Thomas Brandis (Violin – Visiting Professor) Ian Bousfield (Trombone – Visiting Professor) Bruce Boyce (former Professor of singing) Zakhar Bron (former Professor of Violin) Aylmer Buesst (conductor) Semyon Bychkov (Otto Klemperer Chair of Conducting Studies) Colin Carr (Cello) Philip Cashian (Head of Composition) Simon Carrington (Timpani) Carole Cerasi (Harpsichord) Robert Cohen (Professor of Cello) William Crotch (First principal of the Royal Academy of Music, from 1822) William Hayman Cummings Laurence Cummings (Head of Historical Performance) Maria Curcio (Piano – former Visiting Professor) Sir Colin Davis (International Chair of Orchestral Studies) Julius Drake (pianist) Christopher Elton (Head of Keyboard until 2011) Peter Erskine (International Drum Set Consultant) Jonathan Freeman-Attwood (Principal) Herbert Fryer (pianist) John Georgiadis (Director of Orchestral Studies 1989–92) Jane Glover (artistic director of opera from 2009) Rachel Gough (Bassoon) Clio Gould (Violin and ensembles) Erich Gruenberg (violinist) Alan Hacker (clarinetist) Mary Hammond (Head of Musical Theatre) Lynn Harrell (former International Head of Cello Studies & Principal) Maurice Hasson (Violin) Joji Hattori (Violin) Marjorie Hayward (Violin) Christopher Hogwood (Consultant Visiting Professor) Stephen Hough (Visiting Professor of Piano) James Newton Howard (Visiting professor) Yuko Inoue (Viola) Guy Jonson (former professor of Piano) Frederick Keel (former professor of Singing) Hu Kun (Violin) Anthony Legge (Director of Opera to December 2008) Tasmin Little (violin) Joanna MacGregor (Piano; Head of Keyboard from 2011) Duncan McTier (Head of Double Bass) Andrew Marriner (Visiting Professor of Clarinet) Sir Peter Maxwell Davies (Composition) Colin Metters (Head of Conducting) Anne-Sophie Mutter (former Head of International Violin Studies) Ann Murray (singing) Owen Murray (Head of Classical Accordion) Clarence Myerscough (Violin, former Head of Strings) Pascal Nemirovski (Piano) Chi-chi Nwanoku (Professor, Historical Double-Bass) Charles Oberthür (First Professor of Harp, 1861) Dennis O'Neill (Visiting Professor of Opera) Martin Outram (Viola) Paul Patterson (Manson Chair of Composition) György Pauk (Ede Zathureczky Professor of Violin) Ashan Pillai (viola) Antony Pitts (composer, conductor, former Senior Lecturer in Creative Technology) Gerard Presencer (former Head of Jazz) Curtis Price (former Principal) David Pyatt (Horn – Visiting Professor) Priaulx Rainier, former professor of Composition Alan Richardson (Piano) Martin Roscoe (Piano) Patrick Russill (Head of Choral Conducting) Amandine Savary (Piano, Chamber Music) Mark Shanahan (Conducting – former Visiting Professor) Paul Silverthorne (viola) David Strange (Cello, Head of Strings) Yevgeny Sudbin (piano, visiting professor) Jeremy Summerly (Sterndale Bennett Lecturer in Music) Robert Tear (Opera – Visiting Professor) Michael Thompson (Horn) Patsy Toh (Piano) Eva Turner (former professor of Singing) Maxim Vengerov (Violin) Derek Watkins (Professor of Trumpet and commercial brass consultant) Richard Watkins (Horn) James Watson (Trumpet, former Head of Brass) Mark Wildman (Head of Vocal Studies) John Williams (Guitar – Visiting Professor) Honours Past and present Honorary Members of the Royal Academy of Music (Hon RAM) The Honorary Membership of the Royal Academy of Music (Hon RAM) is awarded to up to 300 distinguished musicians who did not attend the Royal Academy of Music (at college level). Claudio Abbado (1982) Jenny Abramsky (2002) Salvatore Accardo (1988) John Adams (2003) Pierre-Laurent Aimard (2006) Sir Thomas Allen (1988) Géza Anda (1970) Maurice Andre (1984) Martha Argerich (2001) Richard Armstrong (1984) Vladimir Ashkenazy (1972) Milton Babbitt (2005) Norman Bailey (1981) Simon Bainbridge (2002) Daniel Barenboim (1975) Cecilia Bartoli (1999) Yuri Bashmet (1989) Django Bates (2000) Joshua Bell (2000) George Benjamin (2003) William Bennett (1988) Teresa Berganza (2002) Luciano Berio (1988) Mary Berry (1994) Neil Black (1971) Barbara Bonney (2001) Ian Bostridge (2002) Pierre Boulez (1967) Ian Bousfield (2002) Thomas Brandis (2005) Julian Bream (1966) Alfred Brendel (1972) Charles Brett (1990) Dudley Bright (2003) Iona Brown (1996) Frans Brüggen (2001) David Cairns (2000) Colin Carr (2001) José Carreras (1990) Elliott Carter (1990) John Carol Case (1976) Riccardo Chailly (1996) William Christie (2003) Kyung-wha Chung (1991) Nicholas Cleobury (1985) Van Cliburn (1978) Robert Cohen (2009) Imogen Cooper (1997) John Copley (1999) Gordon Crosse (1980) Laurence Cummings (2005) Paul Daniel (1999) Sir Andrew Davis (1991) Sir Colin Davis (1962) Sir Peter Maxwell Davies (1978) Winton Dean (1971) Plácido Domingo (2000) Antal Doráti (1983) Laurence Dreyfus (1995) Gustavo Dudamel (2012) Henri Dutilleux (1996) Sir Mark Elder (1984) Margaret Eliot (1960) Paul Esswood (1990) Dietrich Fischer-Dieskau (1970) Renée Fleming (2000) Peter Fletcher (1966) Jonathan Freeman-Attwood (1997) Louis Frémaux (1978) Peter Gabriel (2009) Sir James Galway (1999) Sir John Eliot Gardiner (1992) John Gardner (1959) Nicolai Gedda (1994) Valery Gergiev (2000) Kenneth Gilbert (1988) Emil Gilels John Gilhooly (2006) Carlo Maria Giulini (1972) Alexander Goehr (1974) Matthias Goerne (2001) Szymon Goldberg (1970) Clio Gould (1999) Erich Gruenberg (1990) Ida Haendel (1982) Emmanuelle Haïm (2007) Bernard Haitink (1973) Derek Hammond-Stroud (1976) Thomas Hampson (1996) Hakan Hardenberger (1992) George Lascelles, 7th Earl of Harewood (1983) Nikolaus Harnoncourt (1996) Heather Harper (1972) Lynn Harrell (1987) Simon Harris (1979) Jonathan Harvey (2001) Maurice Hasson (1989) Joji Hattori (2003) Thomas Hemsley (1974) Hans Werner Henze (1975) Raimund Herincx (1972) Adolph Herseth (2001) Christopher Hogwood (1995) Heinz Holliger (1975) Sir Anthony Hopkins (1979) Vladimir Horowitz (1972) Stephen Hough (2003) James Newton Howard (2008) Elgar Howarth (1991) Hu Kun (2002) Peter Hurford (1981) George Hurst (1984) John Ireland (composer) Steven Isserlis (1995) Gundula Janowitz (2000) Mariss Jansons (1999) Sir Elton John (1997), attended as junior exhibitioner Dame Gwyneth Jones (1980) Simon Keenlyside (2007) Nicholas Kenyon (2005) Joseph Kerman (1972) Thea King (1998) Angelika Kirchschlager (2009) Dame Emma Kirkby (1999) Evgeny Kissin (2005) Otto Klemperer Oliver Knussen (1995) Ton Koopman (1990) Gidon Kremer (1999) Piers Lane (1994) Lang Lang (2012) Alicia de Larrocha (1987) Philip Ledger (1984) Anthony Legge (2007) Karl Leister (1987) Gustav Leonhardt (2000) Raymond Leppard (1978) György Ligeti (1992) John Lill (1986) Magnus Lindberg (2001) Robert Lloyd (1999) James Lockhart (1993) Christa Ludwig (2000) Sir David Lumsden (1978) Radu Lupu (2000) Benjamin Luxon (1980) William Lyne (1999) Yo-Yo Ma (1992) Julia Mackenzie (2005) Sir Charles Mackerras (1969) James MacMillan (2007) Andrew Marriner (1994) Sir Neville Marriner (1970) Wynton Marsalis (1996) Sir George Martin (1999) Malcolm Martineau (1998) Valerie Masterson (1994) Kurt Masur (2001) John McCabe (1985) Sir Paul McCartney (2008) Duncan McTier (1998) Colin Metters (1995) Felix Mendelssohn (1843) Rodney Milnes (2002) Yvonne Minton (1975) Donald Mitchell (1992) Ignaz Moscheles (1822) Maurice Murphy (2008) Ann Murray (1998) Owen Murray (1993) Thea Musgrave (1976) Riccardo Muti (1981) Anne-Sophie Mutter (1986) Kent Nagano (1998) Martin Neary (1988) James Newton-Howard (2008) Birgit Nilsson (1973) Jessye Norman (1987) Roger Norrington (1988) John Orford (1989) Robin Orr (1966) Antonio Pappano (2007) Ian Partridge (1996) Győrgy Pauk (1990) Aleksandar Pavlovic (2006) Antony Pay (1986) Krzysztof Penderecki (1974) Murray Perahia (1985) Itzhak Perlman (1993) Trevor Pinnock (1984) Rachel Podger (2005) André Previn (1977) Curtis Price (1993) Dame Margaret Price (1988) Ruggiero Ricci (1983) H. C. Robbins Landon (1998) Winifred Roberts (1983) Christopher Robinson (1980) Mstislav Rostropovich Gennadi Rozhdestvensky (1979) Patrick Russill (1993) Esa-Pekka Salonen (2003) Kurt Sanderling (2000) András Schiff (1989) Peter Schreier (2000) Dame Elisabeth Schwarzkopf (1975) John Scott (1990) John Shirley-Quirk (1972) Leonard Slatkin (1993) Philip Smith (2005) Nicholas Snowman (1999) Elisabeth Soderstrom (1982) Stephen Sondheim (1992) John Stainer (1962) Simon Standage (2009) Janos Starker (1980) Karlheinz Stockhausen (1987) Richard Stokes (2008) Jeremy Summerly (2006) Dame Joan Sutherland (1979) Henryk Szeryng (1969) Richard Taruskin (2001) Eric Taylor (1976) Dame Kiri Te Kanawa (2003) Robert Tear (1978) Bryn Terfel (2000) Yan Pascal Tortelier (2002) Stan Tracey (1984) Barry Tuckwell (1966) John Tusa (1999) Dame Mitsuko Uchida (2009) Richard van Allan (1987) Tamás Vásáry (1992) Josephine Veasey (1972) Jon Vickers (1977) Roger Vignoles (1984) Anne Sofie von Otter (2002) Gillian Weir (1989) Judith Weir (1997) Kenny Wheeler (2009) Jonathan Willcocks (1996) John Williams (guitarist) (1989) John Williams (composer) (1995) David Willcocks (1965) Arthur Wills (1974) Victoria Wood (2006) Rae Woodland (1983) Denis Wright (1966) Pinchas Zukerman (1976) Past and present Fellows of the Royal Academy of Music (FRAM) A more comprehensive list is at Category:Fellows of the Royal Academy of Music Irvine Arditti (1984) Stephen Ashfield (2018) Sir Richard Rodney Bennett (1963) Alan Bush (1938) Christopher Elton (1982) Rachel Gough (2002) Dame Evelyn Glennie (1992) Alan Ray Hacker (1958) (clarinetist) Freddie Kempf (2005) Annie Lennox (1997) Dame Felicity Lott (1986) Susanna Mälkki (2010) Philip Martin (1988) Odaline de la Martinez (1990) Dee Palmer (1994) Frederick Ranalow Sir Simon Rattle (1984) Honorary Doctorates (Hon DMus) Sir Thomas Allen (2014, Honorary Doctorate of the University of London) Daniel Barenboim (2010, Honorary Doctorate of the University of London) Pierre Boulez (2010, Honorary Doctorate of the University of London) Sir Colin Davis (2002, Honorary Doctorate of the University of London) Sir Mark Elder (2012, Honorary Doctorate of the University of London) Sir Elton John (2002, Honorary Doctorate of the University of London) Sir Ralph Kohn (2014, Honorary Doctorate of the University of London) Sir Charles Mackerras (2005, Honorary Doctorate of the University of London) Sir George Martin (2011, Honorary Doctorate of the University of London) Sir Peter Maxwell Davies (2006, Honorary Doctorate of the University of London) Sir Simon Rattle (2011, Honorary Doctorate of the University of London) Gennady Rozhdestvensky (2013, Honorary Doctorate of the University of London) Stephen Sondheim (2010, Honorary Doctorate of the University of London) Past and present Honorary Fellows of the Royal Academy of Music (Hon FRAM) The Duchess of Gloucester Robin Butler (2018) Sam Jackson (2019) Dame Emma Kirkby Dame Felicity Lott Timothy Parker (2019) Ian Ritchie (2018) Honorary Associate of the Royal Academy of Music (Hon ARAM) Celia Craig (1997) Peter Stark Margaret Steinitz (2001) Barbara Strudwick (violinist) Denis Wright (1965) References Royal Academy of Music
2221775
https://en.wikipedia.org/wiki/The%20Real%20Adventures%20of%20Jonny%20Quest
The Real Adventures of Jonny Quest
The Real Adventures of Jonny Quest (also known as Jonny Quest: The Real Adventures) is an American animated television series produced by Hanna-Barbera and broadcast on Cartoon Network from August 26, 1996, to April 16, 1997. A continuation of the Jonny Quest (1964) series and The New Adventures of Jonny Quest (1986) series, it features teenage adventurers Jonny Quest, Hadji Singh, and Jessie Bannon as they accompany Dr. Benton Quest and bodyguard Race Bannon to investigate strange phenomena, legends, and mysteries in exotic locales. Action also takes place in the virtual realm of QuestWorld, a three-dimensional cyberspace domain rendered with computer animation. Conceived in the early 1990s, Real Adventures suffered a long and troubled development. Hanna-Barbera dismissed creator Peter Lawrence in 1996 and hired new producers to finish the show. John Eng and Cosmo Anzilotti completed Lawrence's work; David Lipman, Davis Doi, and Larry Houston wrote new episodes with reworked character designs akin to those of classic Quest. Each team produced half of the show's fifty-two episodes. While Lawrence's team crafted stories of real-world mystery and exploration, later writers used science fiction and paranormal plots. Turner supported the show through a massive marketing campaign with thirty-three licensees. Real Adventures debuted with an unprecedented wide release on Cartoon Network, TBS, and TNT, airing twenty-one times per week. Critics have debated the merits of the show's animation, writing, and spirit compared to classic Quest, but it has also received praise in those categories. Real Adventures failed to gain high ratings with its targeted demographics and its merchandise performed poorly, leading to cancellation after fifty-two episodes. Turner Home Entertainment and Warner Home Video have released eight VHS tapes, two laserdiscs, and twenty-six DVD episodes; reruns have appeared on Toonami, CNX, and other Turner networks. All 52 episodes were made available for digital purchase on the iTunes Store in 2013. Development and history Hanna-Barbera created The Real Adventures of Jonny Quest in the early 1990s after being acquired by Turner Entertainment Co. Turner planned a series of year-long "Turner-wide initiatives" to capitalize on old characters and create new franchises. Turner received copious fan mail and phone inquiries about Quest, and observed "incredibly high" marketing Q Scores. The show was also Hanna-Barbera's most popular venture in the action-adventure genre; no other contemporary series featured realistic children enjoying lifelike adventures. With William Hanna and Joseph Barbera's blessings, the company planned a new series, live action film, and two telefilms—Jonny's Golden Quest and Jonny Quest vs. The Cyber Insects. Combined with a substantial marketing campaign, the project would be their largest initiative since Turner acquired H-B. Turner Home Entertainment President Philip Kent claimed Quest would be a "consumer-products bonanza", and the company considered Real Adventures the linchpin of the Quest revival. Real Adventures, the live-action film, and release of classic episodes on VHS would constitute a "Year of Jonny Quest" marketing blitz. Delayed until 1996, the project echoed 1994's "Year of the Flintstones" and 1995's "Year of Yogi Bear". Production on Real Adventures commenced in 1993. Turner hired a team led by director Dick Sebast, writer Peter Lawrence, and art director Takashi Masunaga. The firm appointed Stephanie Sperber head of the Quest task force in 1994. Hanna-Barbera President Fred Seibert allowed Lawrence to create a new team of companions for Jonny, but Lawrence chose to revive the original group. Sebast and Lawrence decided to make the series as realistic as possible through accurate physics and depictions of machinery. Lawrence emphasized believability, eschewing "ridiculous ...laser guns" for real sidearms. The creative team researched child psychology, ensuring they could depict realistic action and consequences without fueling nightmares. Seibert touted Quest as the "Home Alone of adventure", with "high-tech, multicultural themes" that would appeal to contemporary youth. Promoters promised the new Quest would avoid "mindless violence, chauvinism, xenophobia and insensitivity", addressing historical criticisms of the classic series. Turner also claimed that Quest would appeal to any gender, stating, "Traditionally, action adventure animation may be stronger with boys, but in this case, storylines are being developed to draw girls in ... we're really hoping for a wide berth of viewership." Seibert further described the show's theme as "The X-Files for kids", citing difficult questions and mysteries to be posed in each episode. Departures from the classic series included new character designs and the introduction of a new character to the Quest family. Takashi designed Jonny to be "edgy and handsome", and rendered characters in the style of Japanese animation to differentiate from American superhero cartoons. The team used a new character—Race's daughter, Jessie Bannon—to create conflict with Jonny. She was introduced in Jonny's Golden Quest as Race's daughter by Jezebel Jade. Lawrence initially titled the show Jonny Quest's Extraordinary Adventures, but the title changed in 1995 to its final name. Intended for a 1995 release with 65 episodes, Real Adventures fell into development hell; roughly 30 scripts and only eight reels were in progress by March 1995. Both Lawrence and Takashi were removed in 1996, hiring John Eng and Cosmo Anzilotti to finish the first twenty-six episodes. Certain sequences necessitated exhaustive work and heavy revision. A new team led by David Lipman, Davis Doi and Larry Houston finished twenty-six more for broadcast as a separate series named The New Jonny Quest. Time Warner's acquisition of Turner negated this plan, leading to the episodes' release as the second season of Real Adventures. Animation Peter Lawrence aimed to "go beyond cartooning and into animated film-making" for the show's storytelling. Producers contracted seven studios to animate the first season, including Pacific Animation Co. in Japan and Toon's Factory in France. Japanese and Korean animators drew traditional cel sequences and added color; an international team handled digital post-production and QuestWorld scenes. Teva, a subsidiary of Total Group, organized a post-production team in Paris, led by Eric Jacquot, Gilles Deyries, and Pascal Legeay. Using video post-production high-end specialized tools, including Henry, Spirit, Flame, and others, the team strove to deliver a high-speed computer editing and post-production process. The majority of the first season's footage was digitally inked and painted to enhance background elements. Producers applied the process in excess of twenty hours per episode, adding light effects, rain, snow, glitter, reflections, and fog. Hanna-Barbera implemented a new computer system to combine manual animation with digital paint, and to provide camera movement flexibility, which created a partial three-dimensional effect. Takashi felt the system made the creative team "honest filmmakers" through hands-on production. Lawrence described the system in 1995: The "pencil test [is] imported into the computer" referred to by Lawrence was an animatic. This process was implemented by Stephen Toback's H-B Production Technology Group, which also set up and maintained the in-house digital ink and paint systems for Hanna Barbera, as well as the post-production Avid and Pro Tools systems. Japan-based Mook Studios exclusively animated the second season without digital post-processing. Real Adventures maintained the classic show's realistic violence, featuring off-screen deaths of villains and allies. Music Bodie Chandler directed music for Quest, and Gary Lionelli, Thomas Chase, Stephen Rucker, Lawrence H. Brown, Guy Moon, Kevin Kiner, Christophe Beck, and Mark Koval wrote incidental music and cues. Lionelli conceived a new main theme based on the original 1960s Jonny Quest theme by Hoyt Curtin. Composer Guy Moon considered working for the show the "hardest thing I've done in my life" due to the producers' demands for epic music: "They want a big orchestra with a good synth rig... It's great because they push me so much I'll probably replace my whole demo reel with 'Jonny Quest' music... It's hip and it's current." Stephen Rucker and Thomas Chase (who later composed in The Powerpuff Girls) used MIDI to facilitate composing. Chase appreciated the producers' commitment to scoring, noting, "For many kids, animation music is their first exposure to orchestral music." QuestWorld Producers cultivated an element of virtual reality through QuestWorld, a cyberspace simulation rendered with three-dimensional computer animation and motion capture. QuestWorld was designed as a futuristic application of contemporary technology, similar to the classic series' high-tech lasers, satellites, and robots. Seibert traced its origin to "the same problem that James Bond has... When you look at even his newest gadgets, they're somewhat quaint." H-B marketers polled children on their familiarity with virtual reality, discovering that each child was aware of the concept. Planners took inspiration from cyberpunk novels written by Neal Stephenson and William Gibson, including Snow Crash. Short, independent QuestWorld segments called "Quest Bytes" concluded certain episodes. H-B initially contracted Dream Quest Images to animate QuestWorld, but was credited for work on only a single episode as competitor Disney acquired the studio in April 1996, necessitating a different vendor. Animation company Buzz F/X, based in Montreal and Santa Monica, created first season sequences. Work began in April 1996 with the opening titles—a gliding journey through a canyon of green, cartographic lines with scenes illuminated upon the walls. QuestWorld characters were created as wire frame models, augmented with faces scanned from clay busts, then digitally painted and inked. Buzz F/X used mostly inexperienced animators, as budgetary constraints would not permit hiring seasoned employees. Work followed on "Escape to Questworld" and "Trouble on the Colorado" as animators worked 12 hours a day, six days a week in a small garage with inadequate computers. Buzz F/X augmented the small team in July with ten recruits, but only two were experienced. Amateur employees struggled with lighting, and with synchronizing jerky motion capture from the House of Moves in Venice Beach; Quest was their first capture production order. By August, the team was working 14 hours a day, seven days a week, including full nights and mornings. After two more episodes, Buzz F/X terminated its unprofitable contract with H-B, later filing for bankruptcy in 1997 due to $3.6 million of debt created by work on Quest. H-B hired Blur Studio to finish the second season's scenes on a ten-week production schedule. Blur used Intergraph hardware, and its sharp performance attracted press attention and sealed an amicable relationship with H-B. Both companies produced in total roughly one hundred minutes of computer animation for QuestWorld. International promotion and network run Turner Entertainment promoted the series in forty countries and fourteen languages to establish international markets. Broadcasters included Antena 3 in Spain, TF1 in France, Channel One in Russia, RAI in Italy, Taurus Film in Germany, the BBC in the United Kingdom and Asia Television in ten Asian countries, representing ATL's first animated series to be broadcast in both English and Cantonese. Turner planned to introduce US-style animation to the Asian market through Quest. The show was launched in Singapore on TCS Channel 5 (now known as MediaCorp Channel 5) to take advantage of Singapore's "sophisticated retail sector and well-developed licensing industry". Brandweek reported in 1995 that the show's budget, including merchandising and promotional costs, topped $40 million. Director Richard Donner, producer Lauren Shuler Donner, and Jane Rosenthal purchased rights for a live-action film, having expressed interest in the property after Turner acquired H-B. Peter Segal was attached to direct. Slated to begin production in mid-1995, filming was delayed until 1996 and ultimately never began. Turner advertised Real Adventures as the "next evolution in children's programming ... [redefining] television animation for the next generation." The company hosted a 1995 discussion with Peter Lawrence and Takashi at Yanceyville, and later aired previews at United States waterpark events. Staged in major US cities, these "dive-in theaters" featured previews of new series and local celebrities, including Jennifer Love Hewitt, Lacey Chabert, Cameron Finley, and Ashley Johnson for the UCLA event. Turner announced the debut countries and TV stations on May 1, 1996. Turner aired Real Adventures seven nights a week on TBS, TNT, and Cartoon Network for an unprecedented 21 weekly showings. Turner aired several commercial spots featuring the Quest logo and show introductions to build viral support. Turner's marketers surmised that juvenile groups watching TNT in the morning, TBS in the afternoon, or Cartoon Network in prime time and late night were mutually exclusive. Real Adventures premiered August 26, 1996, three months after a twenty-hour "Farewell Marathon" of original Quest. The show averaged a 2.0 Nielsen rating over August and September 1996, considered a strong start for an animated series. Though Cartoon Network suffered declining viewership in 1996, Quest was consistently one of the highest-rated programs; later season-one episodes drew around 650,000 viewers. Real Adventuress merchandise performed poorly, and it failed to build consistent ratings in its targeted demographics (though it did attract adult audiences). Turner tried to revive interest in February 1997 with a contest for an adventurous trip to Jamaica called Quest World Adventure. Cartoon Network did not order new episodes beyond the 52nd. Reruns aired for two years on Toonami until September 24, 1999, on Cartoon Network in other formats until 2004; and on CNX until 2003. Overview The show's premise is that Dr. Quest, a famous phenomenologist, investigates mysterious occurrences and exotic locales with his son, Jonny Quest, adopted son Hadji Singh, bodyguard Race Bannon, Race's daughter Jessie, and pet bulldog Bandit. Real Adventures is set a few years after the classic series, making Jonny and his friends teenagers. Lawrence aimed to use "existing, real phenomenon"—such as the "Airstrips of Nazca, the Ruins of Teotihuacan or the possible existence of Giant Squid"—to capture audiences' curiosity. Stressing plausibility, he suggested writers cover real-world enigmas, cryptozoology, unique locales, an alien posing as the vice president, and fictional but "believable" mysteries. The Quests would frequently visit the virtual environment of QuestWorld, and encounter the villainous Jeremiah Surd and Ezekiel Rage. Paralyzed years prior by Race's SWAT team, Surd would try to exact revenge through technology; Rage—a former government agent left for dead on a botched mission—would try to destroy the world with nuclear terrorism. The Quests would sparingly fight "monsters of the week", instead battling antagonists whose conflicts lay in "personal objective or ambition ... opposed by Dr. Quest". Lawrence stationed the family at a new compound on the coast of Maine, replete with houses, barns, and workshops. Rooms suited for each character included a library for Dr. Quest, workshop for Jonny, computer-equipped den for Jessie, dojo and gym for Race, and lighthouse lookout for Hadji's meditation. Lawrence equipped Dr. Quest with a fleet of air, land, and sea vehicles, including a 1940s biplane and state-of-the-art catamaran named Questor with diving bells and smaller research vessels stored in the hulls. Peter Lawrence prided Real Adventures on the strength of its writing, opining that "very few writers in this or any other field actually write visually," and contesting that each episode would have "enough material or potential to develop into a movie". Characters Peter Lawrence described Jonny as a "hero in training" on the cusp of adulthood. He remarked that Jonny possessed "a straight-ahead, right-on attitude" free of introspection or self-doubt. At age 14, Jonny was a confident problem-solver prone to getting in trouble. Writers framed him as more an intuitive thinker than an intellectual, and created tension by contrasting his father's academic leanings with Jonny's affinity for Race's daring lifestyle. Jonny inherited his father's driving curiosity (rendering him a "walking query"), as well as his mother's "restless, adventurous spirit". Takashi designed Jonny to be lean, wiry, athletic, and coordinated. Creative directors centered episodes around Jonny; Seibert summarized the shift: Hadji, age 16, became Dr. Quest's personal assistant, lacking his mentor's formal education but sharing his burning interest in archaeology, anthropology and the paranormal. A Hindu and yogi, he held a fatalistic attitude towards the show's drama, reacting to situations "from the philosophical point of view that everything is as it's supposed to be". Hadji often used wise aphorisms, taken from diverse cultures and sources and sometimes baffling Jonny. Lawrence cut Hadji's classic telekinesis to align his abilities with realistic yogi practices. "He doesn't say things like 'Sim, Sim Sala Bim' anymore," season one voice actor Michael Benyaer explained. "The writers and producers actually researched the actual yogic powers. He can do more plausible stuff. There is an episode where Hadji pretends to stop his breathing so that the bad guys think he is dead." Takashi drew Hadji taller and thinner than his classic counterpart. Jessie Bannon, age 15, was characterized to be just as tough, smarter, and more thoughtful than Jonny. Written as "more of an egghead", she elected to spend time with Dr. Quest as Jonny did with Race, and was "more in tune with Hadji". Turner conceived Jessie as cool, independent, and a strong role model for contemporary girls. Peter Lawrence took pains to ensure Jessie would not be written as "a guy in a skirt", and made her more mature than Jonny. Race Bannon (Jessie's father) age 38, retained his classic, laconic sense of humor and fearless, dependable nature. He retired from government work over ethical scruples with his former intelligence agency. Writers noted that Race was helplessly overprotective of Jessie, and Jonny was "the boy Race never had". Race was also given a western-US accent and a knack for crafting elaborate, colorful similes. Peter Lawrence sculpted Race to be a "cowboy philosopher or philosopher-warrior". Writers tasked Race with physical and self-defense training for the Quest team. Dr. Benton Quest, age 55, retired from government research and operated from the "Quest Compound" on the coast of Maine. Driven by curiosity, he was "consulted by individuals, governments and corporations" to investigate enigmatic events. Described as "single-minded—almost to the point of obsession—in his pursuit of knowledge", he often encountered trouble as "his drive to learn blanks out more basic instincts like self-preservation." Jessie appreciated his ponderous sense of humor. The show's promoters summarized him as the "benevolent king" archetype. Bandit the family dog also appeared in the series. Lawrence removed Bandit's clownish origins, stressing that Bandit could not understand English, nor reliably save the family from perilous situations. Summarizing the group's behavior, Lawrence wrote, "Jonny's response to danger will be close to Race's. Jessie's intrigue with mysterious, unexplained phenomena will be close to Dr. Quest's and Hadji, with his roots in a different culture and a more spiritual approach to life, is different again." Takashi designed each character as physically fit and well-sculpted to reflect "a more exercise-oriented society". Fred Seibert downplayed worries that the new characters would disappoint cult fans of the classic series. He hoped Real Adventures would find success as new interpretations of comic book heroes had done. Second season changes Season two directors Larry Houston and Davis Doi changed the show to resemble the classic franchise. Writer Glenn Leopold revived Hadji's latent psionic powers—including spoon-bending and rope tricks—as he felt the first season's realism was "not that interesting to watch". All characters lost a year in age; Jonny became 13. Writer Lance Falk returned Race to governmental guard duty, sealed by an episodic visit with classic Quest spymaster Phil Corven. Race lost his western accent (with Falk even comparing Race's western accent to Batman having a French accent), and Dr. Quest regained his classic red hair and exhibited rudimentary combat skills. Falk regarded Jessie as the "missing piece needed to complete the Quest family", and Leopold added slight romantic overtones to episodes. Some fans complained about changes to Jessie, criticized as a damsel in distress with stereotypically female pink clothes. Jonny saved Jessie from danger several times. Falk defended his portrayal as giving her realistic, human fears, such as claustrophobia. Censors asked the second season team to replace firearms with dart guns, notably in the episode "General Winter". Second season writers took greater creative liberties with Real Adventures, invoking ghosts, other dimensions, and megalomaniacal schemes. Leopold and Falk sought to create a "slam-bang adventure show with real monsters" and heightened narrative emphasis on Jonny and his friends. Falk explained that cool contrivances took precedence over accuracy, stating that "Jonny Quest is a show with one foot in the fantastic, and one foot solidly based in reality." Opposed to QuestWorld, the new team was nonetheless contractually obligated to use it in their episodes. Falk felt that virtual reality undermined the show's "strong connection to reality", and suggested that after so many dangerous incidents Dr. Quest would have turned the system off. Writers brought back several classic characters, including Pasha the Peddler, Jezebel Jade, Dr. Zin and his twin daughters, Anaya and Melana,. Falk honored Quest creator Doug Wildey by creating an eponymous grandfather for Jonny in the episode "Nuclear Netherworld", as well as homage to William Hanna's birthstate of New Mexico where Jonny's grandfather resides. The team created Estella Velasquez as Jessie's mother to retcon the telefilms, feeling that Jade would never get married. Writers eventually killed off villains Ezekiel Rage and Dr. Jeremiah Surd in favor of new adversaries. Comparing Quest without Zin to "James Bond without S.P.E.C.T.R.E.", Falk penned a season finale featuring classic robot spies and a visceral fight between Dr. Quest and Zin. Falk planned to resuscitate Palm Key as the Quest home in new episodes. Cartoon Network did not renew Real Adventures, despite a pledge to explore the history of Jonny's mother Rachel in the season premiere. Cast The first season of Real Adventures featured J. D. Roth as Jonny, George Segal as Dr. Quest, Robert Patrick as Race, Jesse Douglas as Jessie, Michael Benyaer as Hadji, and veteran voice actors Frank Welker and Michael Bell as Dr. Jeremiah Surd and Ezekiel Rage, respectively. A childhood fan of the original series, J.D. Roth was inspired by Turner's vision for the new series and swiftly accepted the role of Jonny. Roth was attracted by Jonny's "star quality", and approved of his characterization as a real kid without superpowers. He enjoyed Jonny's infectious enthusiasm and impulsive alacrity. Roth also admired the show's educational quality, something he had tried to integrate in his personal television pilots. When asked about how he played the relationship with Jonny's father, he commented, "Jonny is crazy about his dad. He looks up to him and thinks he is the smartest man ever to walk to face of the earth. He has the typical teenage relationship with his father, but his father definitely sees something in him. Dr. Quest knows that Jonny is going to be something really special." Michael Benyaer also enjoyed playing Hadji: "[he] is one of the few roles for an ethnic actor that is not a bad guy. I mean, how many East Indian heroes have been on television? Hadji is for the sensitive kids out there. He is the outsider in all of us." A Star Wars fan, Benyaer was happy to work with Mark Hamill for "In the Realm of the Condor". Peter Lawrence's request for an Indian-descended voice actor was seen as an "unusual case of multi-ethnic casting". The producers struggled to cast Jessie Bannon. Peter Lawrence ultimately chose Jesse Douglas, who he felt reflected Jessie's energy and intelligence—"[Jesse Douglas] has immense energy, huge energy, and is the kind of woman who could do all the kind of things Jessie could do—you know, athletic, smart, so and so forth [sic]." Douglas impressed Lawrence with her active lifestyle, including ballet, equestrianism, and tennis. When asked about the character's inclusion, Douglas stated, "I'd be bummed if I upset anybody. Jessie is pretty cool. It is not like she is a girl who is whining all the time. If anything, she is a really good springboard for the rest of the storyline." Roth supported her, claiming that "Jonny hasn't discovered girls yet but when he does Jessie would be the type of girl he'd like to be with...I think something will happen between them but right now Jess is his best friend." H-B Chief Fred Seibert agreed, hinting that as adults "there might be a Tracy/Hepburn thing going on." Turner approached George Segal to audition for the part of Dr. Quest. Segal described the show as having "a real family feeling about it... I'd never seen this stuff before. That was quite remarkable." Hanna-Barbera bought out the first cast's contracts and hired new actors for the second season. This cast featured Quinton Flynn as Jonny, John de Lancie as Dr. Quest, Granville Van Dusen (for the first two episodes) and Robert Foxworth as Race, Jennifer Hale as Jessie, and Rob Paulsen as Hadji. Paulsen previously voiced Hadji in The New Adventures of Jonny Quest and the two Quest telefilms. Don Messick was hired to reprise his classic role as Dr. Quest, but was forced into retirement by a stroke during early sessions. Van Dusen voiced Bannon in the 1986 Quest series, and Foxworth took over the part after auditioning for Dr. Quest. Frank Welker, Michael Bell and B.J. Ward reprised their respective roles as Surd, Rage and Iris (the QuestWorld A.I.) in the second season. Throughout the two seasons, several notable guest stars included Kevin Conroy, Earl Boen, Clancy Brown, Robert Ito, James Shigeta, Irene Bedard, Lucy Liu, Brock Peters, Tristan Rogers, Edward Asner, Julian Sands, Helene Udy, Mayim Bialik, Mark Hamill, Andreas Katsulas, Jeffrey Tambor, Dorian Harewood, Clive Revill, Kenneth Mars, Nick Chinlund, George Kennedy, Clyde Kusatsu, Dean Jones, Thomas Gibson, Sarah Douglas, Tasia Valenza and Carl Lumbly. Season two writer Lance Falk has also regretted not thinking about veteran voice actor John Stephenson, who was the very first voice of Dr. Quest, for a guest role. Marketing Turner launched a massive marketing campaign to promote Real Adventures, intending to reach 80% of American children aged six to eleven. Each Turner network spent $5 to $7 million for a total $20 million invested in promotion; the company contracted 33 licensees. Other reports pegged the budget at $40 million, and Marketing Week estimated that the series launched with $300 million of merchandising support. The Wall Street Journal called Quest a "property to watch" in 1995; People and Good Housekeeping considered it a surefire blockbuster. Turner provided digital and bound style guides featuring collections of Quest artwork, coloring instructions, and product ideas. Produced for $100,000 and believed to be the first of its kind, the digital style guide included fonts, logos, character art, merchandising mock-ups, voice clips, and other interactive content. Hanna-Barbera launched Questworld.com as the show's internet hub, presenting it as if written by members of the Quest team. Complementing the show's educational, real-world premise, the site hosted links to academic, archaeological, and exploratory websites. Turner announced 32 licensees as of summer 1996. Turner marketed Real Adventures through a substantial diversity of products, considering its Quest campaign a role model for future shows. Galoob acquired figurine licensing rights in 1995 and created a product line of vehicles, figures, and Micro Machines for fall 1996 release. Turner felt that Galoob's commitment legitimized the Quest marketing plan, and next secured partnership with Pizza Hut and food retailers. Pillsbury included $3 mail-in rebates for future Quest videos, display contests, and instant coupon offers on over 20 million packages. Campbell Soup Company released six holographic miniature posters on the same number of SpaghettiOs cans; the posters were awarded in Converting in 1997. General Mills outfitted boxes of Honey Nut Cheerios and Cinnamon Toast Crunch with offers for T-shirts and other items. Over five thousand Pizza Hut restaurants held a two-month-long give-away of figurines with meals during the show's launch. Galoob failed to build popularity for its toys outside the United States, and discontinued the line in 1997. Upper Deck Company used art, sketches, and plots from the first season to create a sixty-piece card collection. Turner also marketed Zebco fishing poles bearing the Quest logo. Kid Rhino produced a cassette audio adventure based on the episode "Return of the Anasazi". The show's credits advertised a soundtrack available from Rhino, never sold or otherwise promoted. Turner listed several products in a "Quest Adventure Value Pack" coupon catalogue. Marketers tied in classic Quest merchandise, launching a classic H-B promotion with Days Inn hotels, Planet Hollywood restaurants, and Little Debbie snack cakes and offering rebates for Cyber Insects and classic episodes. The marketing campaign culminated with the release of eight VHS Real Adventures season one episodes. Turner also released two episodes on laserdisc. Metropolitan newspapers worked with Turner to promote the videos through grab-bag give-aways. Turner sold merchandise through several international distributors, and expected to make a $60 million profit per year in the Asia-Pacific region alone. Savoy Brands International handled South American distribution, involving 750,000 retail outlets in Argentina, Chile, Peru, Guatemala, Honduras, Panama, Venezuela, Ecuador and Columbia. Turner debuted Quest at a cocktail party for the European Licensing Fair in late 1996, and released merchandise in Europe through 90,000 retail outlets over the next six months. Copyright Promotions Licensing Group handled lincensing in the United Kingdom. Turner ensured that the license agreements forbade retailers from discounting Quest items. The size of the marketing initiative left one newspaper reviewer wondering, "are [the Quests] back because they're too cool to die, or because they're too well known to be squandered as a licensing product?" Turner worried that the promotion might overhype the brand, and timed commercial rollouts over the life of the show. H-B chief Fred Seibert expected high sales and success: Dark Horse Comics composed a 12-issue series released over the show's first run, expecting higher store patronage and cross-selling. Editor Phil Amara assured fans that the comics would contain tributes to the classic Jonny Quest. Kate Worley wrote the Real Adventures series and Francisco Lopez illustrated; guest writers and artists regularly contributed. A lifetime fan of Quest, Eisner Award-winner Paul Chadwick drew the cover of the final issue, depicting Jonny's descent into a cave on Easter Island. Dark Horse worked with Galoob to ship comic shop-locator phone numbers and preview-URLs with figurines. The company also advertised and released a special three-issue series through mail offers with over 8 million boxes of Honey Nut Cheerios. Three two-page "mini-adventures" packaged with existing Dark Horse products preceded the series' release. Dark Horse also worked with Converse to stage a promotion in early 1997 for a fan to appear in a Quest comic. Terry Bisson and others working under the alias "Brad Quentin" produced 11 original novellas featuring adventure and virtual reality themes. Critics appreciated that the books may have drawn kids to reading, especially those interested in technology. Only certain comics and coloring books used season two's designs, such as Dark Horse's Countdown to Chaos, featuring General Vostok. Turner did not market the show again until April 2004, when Warner Home Video released the episodes "Escape to Questworld" and "Trouble on the Colorado" as TV Premiere DVD: The Real Adventures of Jonny Quest on MiniDVD. Cover-up at Roswell Virgin Sound and Vision produced an adventure game for the series named Cover-Up At Roswell, released in August 1996. Known as Escape from Quest World in development, Roswell cost $1 million to make. Virgin handled all marketing, sales, and distribution; Turner cross-promoted. Developers recycled fifty minutes of footage and art from six season one episodes to construct a new story about the Quest family gathering alien artifacts and saving an extraterrestrial from autopsy at The Pentagon. Jeremiah Surd and the Men in Black of General Tyler plan to misuse the technology and try to hinder the Quests. Gameplay consists of clicking areas on images of locations to navigate paths. Players sometimes encounter minigames, such as guiding a diving bell away from rocks or shooting rats with a slingshot. Virgin designed certain segments to be viewed with packaged stereostopic Chromatek plastic glasses. Virgin estimated the game would provide 20–25 hours of game play for adults and 80–100 hours for children. The season two cast provided all voices except for Michael Benyaer as Hadji and Charles Howerton as Dr. Quest. The game's music featured a "high-intensity orchestral sound" prone to monotony. One reviewer praised Roswell for "good entertainment and variety", but regretted low replay value and no modes of difficulty. Critics were divided over the puzzles, naming them both "ingenious" and "elementary". Peter Scisco of ComputerLife and FamilyPC's testers criticized some of the puzzles for relying on "reflexes, not logical thinking". Entertainment Weekly rated the game B+, naming the puzzles "unimaginative...Pac-Man rip-offs and dopey jigsaws". Scisco appreciated the nonviolent content and the inclusion of Jessie as a strong female character, but considered the extraterrestrial story too familiar. A writer from the Sydney Morning Herald warned against buying the game for easily frightened children, but recommended it for those who enjoy mental challenges. Other promotions Turner, TBS, and Holiday Inn partnered to hold an essay contest as part of the Safe America Foundation's "Quest for Safety" drive. From October 9 to November 4, 1996, spots encouraged children to write essays about important safety issues and personal safety. A panel of public safety and community leaders selected the winner, dubbing them the "Safest Kid in America". TBS posted the winner's essay to the kids section of its website and awarded them a position on the Real Adventures float for the 1997 Tournament of Roses Parade in Pasadena. Second-prize winners received bicycle helmets, T-shirts, and Jonny Quest lapel pins. Turner staged an international contest in February 1997 called "Quest World Adventure", featuring the grand prize of a trip to a "secret island" (Jamaica) in July to take part in a staged dramatic scenario. Commercials instructed fans to mail in episodes' geographical destinations during sweeps week. Advertisements appeared through Time Warner's television channels, Sports Illustrated for Kids, DC Comics publications, radio stations, and Warner Brothers stores. The contest marked the first time that Cartoon Network U.S., TNT Europe, Cartoon Network Europe, Cartoon Network Asia, and Cartoon Network Latin America united for a single promotion. Turner encouraged local cable operators to submit their own spots, generating 34,000 ads among 174 cable systems for a total of $3.4 million cross-channel media support. 50,000 children with a median age of ten entered the competition, and 20,000 answered correctly. Turner selected ten viewers from the United States and nine from Latin America and Asia as grand-prize winners. They and two-hundred others received Quest-themed adventure packs, including a backpack, flashlight and siren, travel journal, pen, T-shirt, and glow sticks. Cartoon Network aired the names of winning children on a special feature in which Jeremiah Surd issued personal threats. Winners received all-expenses-paid trips to Ocho Rios, Jamaica, with up to three family members. Planners kept the destination secret until shortly before travel. In Jamaica, kids combated Surd's "environmental terrorism" by preventing him from finding the Jamaican "Irie" stones. Children received clues on the mission through e-mails seemingly written by Jonny Quest. Posing as allies, network employees prepared clues, buried treasure, and hosted barbecues, reggae concerts, and rafting trips. Participants searched for the stones at the White River, Dunn's River Falls, and Prospect Plantation; hosts filmed the proceedings for possible future promotions. The quest centered on cerebral challenges and puzzles. Attendees also learned about the history and ecology of Jamaica. The adventure doubled the show's ratings for February sweeps and tripled Questworld.coms hits. Brandweek awarded it the year's top honors for a global marketing promotion. Home media On October 8, 1996, Turner Home Entertainment and the Cartoon Network Video line released all four volumes of the series on VHS, "The Alchemist", "Rage's Burning Wheel", "The Darkest Fathoms" and "Escape to Questworld", with each videocassette containing two episodes along with two bonus shorts from the What a Cartoon! series. Warner Home Video released only "Escape to Questworld" on MiniDVD in April 2004, then WHV (via Hanna-Barbera Cartoons and Warner Bros. Family Entertainment) released the first thirteen episodes on February 17, 2009 as Season 1, Volume 1 of The Real Adventures of Jonny Quest on DVD in Region 1. On March 27, 2012, Warner Archive released The Real Adventures of Jonny Quest: Season 1, Volume 2 on DVD in Region 1 as part of their Hanna–Barbera Classics Collection. This is a Manufacture-on-Demand (MOD) release, available exclusively through Warner's online store and Amazon.com. The complete second (and final) season was released to DVD on November 10, 2015 from Warner Archive. All 52 episodes were made available for digital purchase in 2013 on the iTunes Store. This represents the most recent show to be released under the Hanna-Barbera banner on DVD all subsequent shows would use the Cartoon Network banner. Critical reception Announcement of Jessie Bannon's inclusion caused backlash among Quest fans. TV Guide'''s editors feared that Jonny and Jessie would become romantically entangled, declaring her an "icky female". H-B Chief Fred Seibert responded, "Jessie is a little older and smarter than Jonny... We're not doing Moonlighting here." Seibert also denied that Jessie had been created solely to appeal to little girls, citing extant support for Jonny and the classic team. A Miami Herald columnist called Jessie an "effort to rewrite the past to conform to the sociopolitical mandates of the present" and political correctness "run amok". Billboard conversely welcomed the change over an all-male cast. The fiasco subsided after the Cyber Insects telefilm aired; the Atlanta Journal-Constitution rebuffed the "icky girl" label, as Jessie saved Jonny's life and taught him patience. A test screening of Cyber Insects to males revealed that though some questioned her addition, most understood that like certain elements criticized in the original series, it was a reflection of the times. Some fans still took issue with the series' distance from classic Quest, which suffered accusations of cultural insensitivity and "racial and sexual stereotypes". Real Adventures evoked critical comparisons to the original series. Cinefantastique felt Real Adventures remained true to the classic show's formula, and praised the "impressive" cast. Another critic recommended the show to "die-hard adult fans", affirming that Real Adventures maintained the violence and off-screen deaths of the old series, as even the opening titles featured "explosions, murder and mayhem". The Washington Post judged the first season as "grittier and more lifelike" than the original Quest. Chicago Tribune critic Allan Johnson agreed that Real Adventures was less "way-out" and contrasted the shows in detail. TV Guide applauded the writing as "miles deeper and darker than on the old show"; Hadji's quotations impressed the magazine's reviewer. Chicago's Daily Herald called the first episode "vintage Quest", and The Panama City Times-Herald echoed this position: Critics debated the success of the show's premise. Peter Scisco of ComputerLife appreciated that the team "rely on their brains, not mutant superpowers". People praised Turner's shift from the "politically correct claptrap" of Captain Planet and the Planeteers, giving Real Adventures a B grade as "children's programming the way it oughta be". The authors of 1998's Saturday Morning Fever contrarily felt the show lacked "the sense of why the original was so successful". They disliked H-B's packaging of disparate seasons as one series, preferring the second for its characters and classic references. Greg Aaron of HotWired praised the franchise's return but warned against QuestWorld hype, arguing that "it will take more than visual sophistication to hook today's viewers". Hanna-Barbera founder and chairman Joseph Barbera considered Real Adventures a "disaster" because of changes to the characters and stories. He conceded, "that's their business. Everybody needs to do their own thing." Critics generally enjoyed the characters and voice acting. People liked the cast, particularly George Segal. Saturday Morning Fever praised Jessie Bannon for her resemblance to Dr. Quest. Allan Johnson approved of the age jump, as Jonny and Hadji were now old enough to be part of the action. He considered Jessie "cool... she gives Jonny grief just because she can, and she's not afraid of the action." He did not enjoy the "toned down" portrayal of Race Bannon. Some fans objected to Race's Western accent in the first season. Peter Lawrence defended the portrayal of Race as a "man of action, not thought—though perfectly capable of deep thought", noting that his accent and mannerisms encouraged variety, surprise, and originality. The quality of Quests traditional and computer animation split critics. The Toronto Star scathingly criticized the show for "facile plots heavily laced with jarring science fiction and incongruous computer animation", naming QuestWorld a "poorly explained techno-gimmick." Le Figaro concurred, but praised QuestWorld for capturing the attention of young viewers. The Star praised QuestWorld, but regarded traditional sequences as "flat and textureless, with minimal characterization, unnaturally stiff movement, and poor execution of shading and shadow". Ted Cox of the Chicago Daily Herald agreed that animated motion was sometimes "remarkably uneven", but lauded realistic imagery like "the play of light on the ocean". TV Guide also found the animation somewhat flat, but considered the sound effects and backgrounds to be state-of-the-art. Special effects director Alberto Menache criticized QuestWorld in Understanding Motion Capture for Computer Animation and Video Games, considering it a mistake-laden failure. He explained that the size difference between the motion capturers and the characters caused unsteady animation and shaking, consequently mismatching interaction with props and uneven terrain. Menache blamed the show's budget, which did not allow for digital post-production and review; producers instead expected "plug-and-play" results straight from the capture studio. Menache concluded that the QuestWorld sequences suffered from a "pipeline set up for mass production" with little testing or planning. Quests Senior Vice President of Production Sherry Gunther admitted that the motion capture technology was "a little crude" and best suited for broad movements. Menache was less critical of the facial capture, considering it "medium-quality" but still unacceptable given H-B's resources. These criticisms mirrored the comments of Buzz F/X animator Francois Lord, who cited inexperienced Montreal animators and rushed production schedules. He pointed out that Blur Studios had more time, money, and experience for season two's sequences. The show's sound was warmly received by the industry. Episodes "Nuclear Netherworld" and "Alien in Washington" were nominated respectively for music and sound editing Golden Reel Awards in 1997, and the entire series was nominated for an animated sound editing Golden Reel Award in 1998. Real Adventures'' was also nominated for a 1997 Daytime Emmy Award for music direction and composition. References Works cited External links JQStyle, a Jonny Quest fan site QuestFan, a series encyclopedia Jonny Quest TNT (American TV network) original programming YTV (Canadian TV channel) original programming Cartoon Network original programming TBS (American TV channel) original programming 1990s American animated television series 1990s American science fiction television series 1996 American television series debuts 1997 American television series endings American animated television spin-offs American children's animated action television series American children's animated adventure television series American children's animated science fantasy television series Television series by Hanna-Barbera Television series by Warner Bros. Television Studios Television series about alien visitations Television shows about virtual reality English-language television shows Toonami Neanderthals in fiction Television shows adapted into comics Television shows adapted into video games Animated television series about orphans Animated television series about teenagers
34925114
https://en.wikipedia.org/wiki/Institute%20of%20Information%20Technology%20Bogra%20%28IITB%29
Institute of Information Technology Bogra (IITB)
Institute of Information Technology Bogura (IITB) is a polytechnic at Sherpur Road, Bogura, Bangladesh, established in 2000. The institute is recognized by the Board of Technical Education, Dhaka, Bangladesh. The average graduating class from Institute of Information Technology Bogura (IITB) each year has 400 to 600 students. The institute has a campus with a play-ground for soccer, basketball, cricket, volleyball, badminton and so on. The school basketball court also serves as a multipurpose auditorium. Selection of students Students are generally chosen for every department with written & viva through an admission test. The students who score the highest are admitted in the school. Generally around 100 students from a total of 900-1000 are admitted each year, around fifty-five for each three section. Department Garments Design and Pattern Making Textile Electrical Electronics Computer Telecommunication Mechanical Civil Architecture References Polytechnic institutes in Bangladesh Information technology in Bangladesh Bogura District
638447
https://en.wikipedia.org/wiki/Embedded%20software
Embedded software
Embedded software is computer software, written to control machines or devices that are not typically thought of as computers, commonly known as embedded systems. It is typically specialized for the particular hardware that it runs on and has time and memory constraints. This term is sometimes used interchangeably with firmware. A precise and stable characteristic feature is that no or not all functions of embedded software are initiated/controlled via a human interface, but through machine-interfaces instead. Manufacturers build embedded software into the electronics of cars, telephones, modems, robots, appliances, toys, security systems, pacemakers, televisions and set-top boxes, and digital watches, for example. This software can be very simple, such as lighting controls running on an 8-bit microcontroller with a few kilobytes of memory with the suitable level of processing complexity determined with a Probably Approximately Correct Computation framework (a methodology based on randomized algorithms). However, embedded software can become very sophisticated in applications such as routers, optical network elements,airplanes, missiles, and process control systems. Operating systems Unlike standard computers that generally use an operating systems such as macOS, Windows or Linux, embedded software may use no operating system. When they do use one, a wide variety of operating systems can be chosen from, typically a real-time operating system. Code for embedded software is typically written in C or C++, but various high-level programming languages, such as Java, Python and JavaScript, are now also in common use to target microcontrollers and embedded systems. Assembly languages are often used too, especially in booting and interrupt handling. Ada is used in some military and aviation projects. Differences from application software Most consumers are familiar with application software that provide functionality on a computer. However embedded software is often less visible, but no less complicated. Unlike application software, embedded software has fixed hardware requirements and capabilities, and addition of third-party hardware or software is strictly controlled. Embedded software needs to include all needed device drivers at manufacturing time, and the device drivers are written for the various hardware devices. These device drivers, called BSP (Board support package), form the layer of software containing hardware-specific drivers and other routines that allow a particular operating system (traditionally a real-time operating system, or RTOS) to function in a particular hardware environment (a computer or CPU card), integrated with the RTOS itself. The software is highly dependent on the CPU and specific chips chosen. Most embedded software engineers have at least a passing knowledge of reading schematics, and reading data sheets for components to determine usage of registers and communication system. Conversion between decimal, hexadecimal and binary is useful as well as using bit manipulation. Web applications are often used for managing hardware, although XML files and other output may be passed to a computer for display. File systems with folders are typically used, however SQL databases are often absent. Software development requires use of a cross compiler, which runs on a computer but produces executable code for the target device. Debugging requires use of an in-circuit emulator, and debugging hardware such as JTAG or SWD debuggers. Software developers often have access to the complete kernel (OS) source code. Size of the storage memory and RAM can vary significantly. Some systems run in 16 KB of Flash and 4 KB of RAM with a CPU operating at 8 MHz, other systems can rival contemporary computers. These space requirements lead to more work being done in C or embedded C++, instead of C++. Interpreted languages like BASIC (while e.g. Parallax Propeller can use compiled BASIC) and Java (Java ME Embedded 8.3 is available for e.g. ARM Cortex-M4, Cortex-M7 microcontrollers and older ARM11 used in Raspberry Pi and Intel Galileo Gen. 2) are not commonly used; while an implementation of the interpreted Python 3 language MicroPython is however available expressly for microcontroller use, e.g. 32-bit ARM-based (such as BBC micro:bit) and 16-bit PIC microcontrollers. Communication protocols Communications between processors and between one processor and other components are essential. Besides direct memory addressing, hardware level common protocols include I²C, SPI, serial ports, 1-Wires, Ethernets, and USB. Communications protocols designed for use in embedded systems are available as closed source from companies including InterNiche Technologies and CMX Systems. Open-source protocols stem from uIP, lwip, and others. See also Embedded system Notes References Edward A. Lee, "Embedded Software", Advances in Computers (M. Zelkowitz, editor) 56, Academic Press, London, 2002. Computing terminology Embedded systems
9986064
https://en.wikipedia.org/wiki/Roman%20de%20Troie
Roman de Troie
(The Romance of Troy) by Benoît de Sainte-Maure, probably written between 1155 and 1160, is a 30,000 line epic poem, a medieval retelling of the theme of the Trojan War. It inspired a body of literature in the genre called the , loosely assembled by the poet Jean Bodel as the Matter of Rome. The Trojan subject itself, for which de Sainte-Maure provided an impetus, is referred to as the Matter of Troy. Le Roman de Troie influenced the works of many in the West, including Chaucer and Shakespeare. In the East it was translated into Greek as The War of Troy (Ο Πόλεμος της Τρωάδος), by far the longest medieval Greek romance. Of medieval works on this subject, only Guido delle Colonne's Historia destructionis Troiae was adapted as frequently. Benoît's sources for the narrative were the Latin recensions of Dictys and Dares, and some material from the all-but-lost Latin recension that is represented now only in part, in a single, fragmentary manuscript, the Rawlinson in the Bodleian Library at the University of Oxford. The audience for Benoît's famous poem consisted of aristocrats for whom this retelling (and the romans antiques in general) served a moral purpose: it was a "mirror for princes" within the larger didactic genre of mirror literature. To fulfil this audience's expectation that heroic characters should be lovers in accordance with the principles of courtly love, Benoît invented the story of the young Trojan prince Troilus's love for the daughter of Calchas, the priestly defector to the Greeks. After she is handed over to her father during a hostage exchange, she is successfully wooed by the Greek warrior Diomedes. This love triangle would be the central subject of a number of later works. In the Roman, the daughter of Calchas is called Briseida, but she is better known under a different name, becoming Criseida in Boccaccio's , Criseyde in Chaucer, Cresseid in Robert Henryson's The Testament of Cresseid, and ultimately Cressida in Shakespeare's Troilus and Cressida. The dedication of the poem, to a "riche dame de riche rei", generally believed to be Eleanor of Aquitaine, consort of Henry II, is buried deep within it, interpolated in the narrative. It serves to date the poem to the years before Eleanor's imprisonment by Henry in 1173. References Medieval French romances Works based on classical literature Trojan War literature
67288064
https://en.wikipedia.org/wiki/Proteon
Proteon
Proteon, Inc. was a pioneering designer and manufacturer computer network equipment based in Westborough, Massachusetts. Proteon created the first commercial Token Ring products and created the first commercially available multiprotocol Internet router as well as the OSPF routing protocol. History Proteon designed and manufactured of some of the earliest commercial Local Area Network and TCP/IP Internet Router products. Although founded in 1972 by Howard Salwen as communications consulting firm, Proteon became a manufacturer when they produced the first commercial Token Ring network interfaces and media access units in conjunction with MIT. In 1981, they released the 10Mbit/sec Pronet-10 Token Ring network. and evolved the speeds through 16 MBit/sec, 80 Mbit/sec and 100 Mbit/sec. IBM released a competing Token Ring system in 1984. In 1986, Proteon released the first commercially available multi-protocol router, the p4200, based on the MIT multi-protocol router, using code developed by Noel Chiappa. Proteon's router products made them one of the key companies producing products to support the growing Internet, among rivals such as Cisco and Wellfleet Communications. Proteon went public in 1991, issuing 3.1 million shares. Proteon was renamed and relaunched as OpenROUTE Networks in 1998. OpenRoute Networks merged into Netrix in 1999. The combined company was rebranded as NX Networks. which was acquired by NSGDatacom in 2002, who dropped the NX Networks name in favor of Netrix. References External links Defunct networking companies Networking companies of the United States Companies based in Westborough, Massachusetts Defunct companies based in Massachusetts 1991 initial public offerings Networking hardware companies
10898736
https://en.wikipedia.org/wiki/SofCheck%20Inspector
SofCheck Inspector
The SofCheck Inspector is a static analysis tool for Java and Ada. It statically determines and documents the pre- and postconditions of Java methods or Ada subprograms, and uses that information to identify logic flaws, race conditions, and redundant code in an individual Java class or Ada package, a subsystem, or a complete program. The SofCheck Inspector is produced by SofCheck, Inc., a software product company in Burlington, Massachusetts. The SofCheck Inspector static analysis engine is used within the CodePeer static analysis product from AdaCore. See also Static code analysis Software testing Software Security Assurance List of tools for static code analysis References External links SofCheck, Inc. web site Video on technology underlying SofCheck Inspector SofCheck Inspector to support Common Weakness Enumeration (CWE) AdaCore's CodePeer developed in partnership with SofCheck Static program analysis tools Java development tools Java platform software Development software companies Software companies based in Massachusetts Software companies of the United States
30479625
https://en.wikipedia.org/wiki/SpaceClaim
SpaceClaim
SpaceClaim is a solid modeling CAD (computer-aided design) software that runs on Microsoft Windows and developed by SpaceClaim Corporation. The company is headquartered in Concord, Massachusetts. SpaceClaim Corporation was founded in 2005 to develop 3D solid modeling software for mechanical engineering. Its first CAD application was launched in 2007 and used an approach to solid modeling where design concepts are created by pulling, moving, filling, combining, and reusing 3D shapes. It was acquired by Ansys in May 2014, Inc, and was integrated in subsequent versions of Ansys Simulation packages as a built-in 3D modeler. SpaceClaim Corporation markets SpaceClaim Engineer directly to end-user and indirectly by other channels. SpaceClaim also licenses its software for OEMs, such as ANSYS, Flow International Corporation, CatalCAD. Modeling technology SpaceClaim's 3D direct modeling technology is primarily expressed through its user interface in four tools: pull, move, fill, and combine: Pull contains most creation features found in traditional CAD systems, determining its behavior through users’ selection and though the use of secondary tool guides. For example, using the Pull tool on a face by default offsets the face, but using the Pull tool on an edge rounds the edge. Move repositions components and geometry, and can also be used to create patterns (often called arrays). Fill primarily removes geometry from a part by extending geometry to fill in the surrounding area. Popular uses include deleting rounds and holes from a model. SpaceClaim Engineer also includes more specialized tools for model preparation. Combine performs boolean and splitting operations, such as merging parts and subtracting parts from each other. These functions were developed in the modelling kernel ACIS licensed to SpaceClaim by Dassault Systemes. History In September 2005, Mike Payne, Danny Dean, David Taylor, and Blake Courter founded SpaceClaim Corporation. Mike Payne was previously a founder of PTC and SolidWorks. On April 1, 2007, SpaceClaim released SpaceClaim 2007 Professional, its first commercial release. On September 30, 2008, Chris Randles become CEO and Mike Payne become chairman of the board. On July 21, 2009, SpaceClaim announced support for multi-touch hardware. On April 29, 2014, technical software company ANSYS (NASDAQ: ANSS) acquired SpaceClaim for $85 million in cash, plus considerations. . ANSYS is specialized in developing software for product development simulation and analysis, and has sold a version of SpaceClaim (named ANSYS SpaceClaim Direct Modeler) as an option for its CAE software since 2009. Release history See also Comparison of CAD software Comparison of CAD editors for CAE References External links Official Web Site CatalCAD SpaceClaim product 3D graphics software Computer-aided design software
83631
https://en.wikipedia.org/wiki/Diores
Diores
In Greek mythology, Diorês (Ancient Greek: Διώρης) referred to four different people. Diorês, father of Automedon who was the charioteer of Achilles during the Trojan War. Diorês, leader of the Elis contingent during the Trojan War. He was the son of Amarynceus (Diorês Amaryngkëidês). Diores was killed by Peiros. Diorês, a Trojan prince who participated in the games held by the exiled Aeneas in Sicily. He was killed by Turnus, the man who opposed Aeneas in Italy. Diorês, son of Aeolus, who married his sister Polymela. With his father's approval, he married his sister Polymele who was otherwise about to be put to death because of her secret love affair with Odysseus. Notes References Aken, Dr. A.R.A. van. (1961). Elseviers Mythologische Encyclopedie. Amsterdam: Elsevier. Bartelink, Dr. G.J.M. (1988). Prisma van de mythologie. Utrecht: Het Spectrum. Gaius Julius Hyginus, Fabulae from The Myths of Hyginus translated and edited by Mary Grant. University of Kansas Publications in Humanistic Studies. Online version at the Topos Text Project. Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. . Online version at the Perseus Digital Library. Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. . Greek text available at the Perseus Digital Library. Homer, The Odyssey with an English Translation by A.T. Murray, PH.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1919. . Online version at the Perseus Digital Library. Greek text available from the same website. Publius Vergilius Maro, Aeneid. Theodore C. Williams. trans. Boston. Houghton Mifflin Co. 1910. Online version at the Perseus Digital Library. Publius Vergilius Maro, Bucolics, Aeneid, and Georgics. J. B. Greenough. Boston. Ginn & Co. 1900. Latin text available at the Perseus Digital Library. Vollmer, Wilhelm. (1874). Wörterbuch der Mythologie. Stuttgart, p. 85. Achaean Leaders Characters in Greek mythology
2140603
https://en.wikipedia.org/wiki/Ballblazer
Ballblazer
Ballblazer is a futuristic sports game created by Lucasfilm Games and published in 1985 by Epyx. Along with Rescue on Fractalus!, it was one of the initial pair of releases from Lucasfilm Games, Ballblazer was developed and first published for the Atari 8-bit family. The principal creator and programmer was David Levine. The game was called Ballblaster during development; some pirated versions bear this name. It was ported to the Apple II, ZX Spectrum, Amstrad CPC, Commodore 64, and MSX. Atari 5200 and Atari 7800 ports were published by Atari Corporation. A version for the Famicom was released by Pony Canyon. Gameplay Ballblazer is a simple one-on-one sports-style game bearing similarities to basketball and soccer. Each side is represented by a craft called a "rotofoil", which can be controlled by either a human player or a computer-controlled "droid" with ten levels of difficulty. (The game allows for human vs. human, human vs. droid, and droid vs. droid matches.) The basic objective of the game is to score points by either firing or carrying a floating ball into the opponent's goal. The game takes place on a flat, checkerboard playfield, and each player's half of the screen is presented from a first-person perspective. A player can gain possession of the ball by running into it, at which point it is held in a force field in front of the craft. The opponent can attempt to knock the ball away from the player using the fire button, and the player in possession of the ball can also fire the ball toward the goal. When a player does not have possession of the ball, his or her rotofoil automatically turns at 90-degree intervals to face the ball, while possessing the ball turns the player toward the opponent's goal. The goalposts move from side to side at each end of the playfield, and as goals are scored, the goal becomes narrower. Pushing the ball through the goal scores one point, firing the ball through the posts from close range scores two points, and successfully scoring from long range (where the goalposts are not visible) scores three points. The maximum number of total points between the two players is ten, meaning that any points scored that would take the combined total above ten will cause the opponent's score to be reduced by the same amount, resulting in a kind of tug of war scoring system. The game ends when either a player successfully scores ten points or the timer runs out. If time runs out and the score is tied, the game goes into "sudden death", where the first player to score wins. Development Ballblazer, together with Rescue on Fractalus!, were the first two games developed by the fledgling Lucasfilm Computer Division Games Group. The Games Group had been established in 1982 on a $1 million funding from Atari, Inc. in exchange for the "right of first refusal" for Atari as publisher. Both games were developed with the Atari 8-bit computers and the Atari 5200 console in mind. The games were ready by March 1984 and were first publicly revealed on a Lucasfilm press conference on May 8, 1984. Cartridge versions for the Atari computers and the 5200 were planned to be the released first in the third quarter of 1984, with disk versions for the Commodore 64, IBM PC and Apple IIc and IIe coming under the Atarisoft label in the fourth quarter of that year. On May 21, 1984 Atari also announced that Ballblazer and Rescue on Fractalus! would be also released for the upcoming Atari 7800 console. On July 3, 1984 Warner Communications sold all assets of the Consumer Division of Atari, Inc. to Jack Tramiel, and the agreement with Lucasfilm fell through. On the Winter Consumer Electronics Show on January 5-8 1985, with both Ballblazer and Rescue on Fractalus! not yet being released on any platform, it was announced that Epyx would become a distributor for both games, which would be released in disk format for the Atari 8-bit and Commodore 64 computers. The Atari 5200 versions were not part of the distribution deal. By August 1985 the games have been finally released to the market. Besides the Atari 8-bit and Commodore 64 computers, Ballblazer was ported to the Apple II by K-Byte, and to Amstrad CPC, MSX and ZX Spectrum computers by Activision, who published the game in Europe. While the IBM PC port announced in 1984 never materialized, Tramiel's Atari Corporation eventually released the Atari 5200 cartridge version in limited quantities in late 1986, manufactured from the stock inherited from the July 1984 buyout of Atari, Inc.; the cartridge version for the Atari 8-bit computers in December 1987, packaged for their new XE Game System; and the Atari 7800 version in March 1988. In Japan, Pony Canyon published a Nintendo Famicom port in 1987. Soundtrack Ballblazer'''s theme music, called "Song of the Grid" and heard between matches, was algorithmically generated, a technique designed by Lucasfilm Games team leader Peter Langston and called "riffology". The lead melody is assembled from a predefined set of 32 eight-note melody fragments, or riffs, which are put together randomly by an algorithm that also makes choices on several parameters including "how fast to play the riff, how loud to play it, when to omit or elide notes, when to insert a rhythmic break". The melody is accompanied by bassline, drums and chords, which are also assembled on the fly by a simplified version of the above approach. In effect the music plays forever, without repeating itself but without straying too far from the original theme. Langston, an experienced jazz, rock, and folk musician, said of Ballblazer's music: "One reviewer, an eminent jazz player [Pat Metheny], said it sounded like John Coltrane did it. I think that's my best compliment so far." The Atari 7800 version was one of the rare releases for the system to use the POKEY additional sound chip. A sample of Ballblazer music from the Commodore 64 version : ReceptionComputer Gaming World stated that the "quick and intense" Ballblazer "squeezes more out of the Atari 400/800 than any game I've ever seen ... spectacular graphics". Info rated Ballblazer four stars out of five, stating that "It is undoubtedly the FASTEST game available for the 64" and recommending it to "gamers with strobe-like reflexes".Zzap!64 gave an enthusiastic review of the Commodore 64 version of the game, their only criticism being weak sound effects. With an overall rating of 98% the game was described as being "The best sports simulation to hit the 64 yet." Commodore User were less impressed, stating that playing against the computer gave "little satisfaction" although this "improved slightly" when playing with a human opponent. The reviewer felt "inhibited by the constraints of the game." It was rated 3 out of 5 stars for value.Computer and Video Games gave the Atari 7800 version a 97% score in 1989. In a retrospective review, Atari 7800 Forever gave it a 3.5 out of 5, and notes that it has the best audio of any game in the entire 7800 library. In a retrospective review of the Commodore 64 version from 2007, Eurogamer's Kristan Reed said "its visual approach has dated hideously" but it remained "a fascinating period piece." It was rated 6/10. Legacy In 1990, LucasArts and Rainbow Arts released a remake and follow-up called Masterblazer for the Amiga, Atari ST, and MS-DOS. On March 31, 1997, a remake of the original titled Ballblazer Champions was released for the PlayStation. See alsoRescue on Fractalus!References External links 1984 Antic story on the production of Ballblazer Video from the 1984 Lucasfilm press conference introducing Ballblazer and Rescue on Fractalus'' 1985 video games Amstrad CPC games Apple II games Atari 8-bit family games Atari 5200 games Atari 7800 games Commodore 64 games Fantasy sports video games Epyx games LucasArts games MSX games MSX2 games Multiplayer and single-player video games Nintendo Entertainment System games Video games developed in the United States ZX Spectrum games Split-screen multiplayer games
563960
https://en.wikipedia.org/wiki/OpenAL
OpenAL
OpenAL (Open Audio Library) is a cross-platform audio application programming interface (API). It is designed for efficient rendering of multichannel three-dimensional positional audio. Its API style and conventions deliberately resemble those of OpenGL. OpenAL is an environmental 3D audio library, which can add realism to a game by simulating attenuation (degradation of sound over distance), the Doppler effect (change in frequency as a result of motion), and material densities. OpenAL aimed to originally be an open standard and open-source replacement for proprietary (and generally incompatible with one another) 3D audio APIs such as DirectSound and Core Audio, though in practice has largely been implemented on various platforms as a wrapper around said proprietary APIs or as a proprietary and vendor-specific fork. While the reference implementation later became proprietary, there are open source implementations such as OpenAL Soft available. History OpenAL was originally developed in 2000 by Loki Software to help them in their business of porting Windows games to Linux. After the demise of Loki, the project was maintained for a time by the free software/open source community, and implemented on NVIDIA nForce sound cards and motherboards. It is now hosted (and largely developed) by Creative Technology with on-going support from Apple, Blue Ripple Sound via their Rapture3D OpenAL Driver, and individual open-source developers. While the OpenAL charter says that there will be an "Architecture Review Board" (ARB) modeled on the OpenGL ARB, no such organization has ever been formed and the OpenAL specification is generally handled and discussed via email on its public mailing list. Since 1.1, the implementation by Creative has turned proprietary , with the last releases in free licenses still accessible through the project's Subversion source code repository. However, OpenAL Soft is a widely used open source alternative. API structure and functionality The general functionality of OpenAL is encoded in source objects, audio buffers and a single listener. A source object contains a pointer to a buffer, the velocity, position and direction of the sound, and the intensity of the sound. The listener object contains the velocity, position and direction of the listener, and the general gain applied to all sound. Buffers contain audio data in PCM format, either 8- or 16-bit, in either monaural or stereo format. The rendering engine performs all necessary calculations as far as distance attenuation, Doppler effect, etc. The net result of all of this for the end user is that in a properly written OpenAL application, sounds behave quite naturally as the user moves through the three-dimensional space of the virtual world. From a programmer's perspective, very little additional work is required to make this happen in an existing OpenGL-based 3D graphical application. Unlike the OpenGL specification, the OpenAL specification includes two subsections of the API: the core consisting of the actual OpenAL function calls, and the ALC (Audio Library Context) API which is used to manage rendering contexts, resource usage and locking in a cross platform manner. There is also an 'ALUT' (Audio Library Utility Toolkit) library that provides higher level 'convenience' functions — exactly analogous to OpenGL's 'GLUT'. In order to provide additional functionality in the future, OpenAL utilizes an extension mechanism. Individual vendors are thereby able to include their own extensions into distributions of OpenAL, commonly for the purpose of exposing additional functionality on their proprietary hardware. Extensions can be promoted to ARB (Architecture Review Board) status, indicating a standard extension which will be maintained for backwards compatibility. ARB extensions have the prospect of being added to the core API after a period of time. For advanced digital signal processing and hardware-accelerated sound effects, the EFX (Effects Extension) or environmental audio extensions (EAX) can be used. Limitations The single listener model in OpenAL is tailored to a single human user and is not fit for artificial intelligence or robotic simulations or multiple human participants as in collaborative musical performances. In these cases a multiple listener model is required. OpenAL also fails to take into account sound propagation delays (the speed of sound is used for the Doppler effect only). The distance to a sound source only translates into an amplitude effect (attenuation) and not a delay. Hence OpenAL cannot be used for time difference of arrival calculations unless that functionality is added in separately. In order to take full speed advantage of OpenAL, a vendor/hardware specific implementation is needed and these are seldom released as open source. Many supported platforms in fact implement OpenAL as a wrapper which simply translates calls to the platform's native, and often proprietary, audio API. On Windows, if a vendor specific implementation is not detected it will fall back to the wrap_oal.dll wrapper library that translates OpenAL into DirectSound (Generic Software) or DirectSound3D (Generic Hardware); the removal of the latter from Windows Vista onward has effectively broken generic hardware acceleration on modern versions of Windows. Supported platforms The API is available on the following platforms and Operating systems: Android (supports OpenSL ES), AmigaOS 3.x and 4.x, Bada, BlackBerry 10, BlackBerry PlayBook, BSD, iOS (supports Core Audio), IRIX, Linux (supports ALSA, OSS, PortAudio and PulseAudio), Mac OS 8, Mac OS 9 and Mac OS X (Core Audio), Microsoft Windows (supports DirectSound, Windows Multimedia API and Windows Multimedia Device (MMDevice) API), MorphOS, OpenBSD, Solaris, QNX, and AROS. Supported gaming devices are for instance: GameCube, PlayStation 2, PlayStation 3, Xbox, Xbox 360, Wii, and PlayStation Portable. Applications Games The following video games are known to use OpenAL: 0 A.D. Alpha Protocol America's Army: Operations American Truck Simulator Amnesia: The Dark Descent Armed Assault Baldur's Gate: Enhanced Edition Battlefield 2 Battlefield 2142 BioShock Colin McRae: DiRT Doom 3 Euro Truck Simulator 2 FlightGear ioquake3 Jedi Knight II: Jedi Outcast Jedi Knight: Jedi Academy Mari0 Mass Effect (video game) OpenArena Orbz Penumbra: Overture Postal 2 Prey Psychonauts Quake 4 Race Driver: Grid Regnum Online Running With Rifles S.T.A.L.K.E.R. System Shock 2 The Dark Mod Tremulous Unreal II: The Awakening Unreal Tournament 2003 Unreal Tournament 2004 Unreal Tournament 3 War§ow Wurm Online Other applications Blender – 3D modelling and rendering tool uses OpenAL for its built-in game engine 3DMark06 – Gamer's benchmarking tool Dolphin (emulator) – GameCube and Wii emulator Vanda Engine – uses OpenAL 1.1 to simulate 2D and 3D sounds Croquet Project Bino - Video player software that has support for stereoscopic 3D video and multi-display video Implementations OpenAL SI The OpenAL Sample Implementation is the original implementation, from Loki, and is not currently maintained. OpenAL Soft OpenAL Soft is an LGPL-licensed, cross-platform, software implementation. The library is meant as a compatible update/replacement to the deprecated OpenAL Sample Implementation, as well as a free alternative to the now-proprietary OpenAL. OpenAL Soft supports mono, stereo, 4-channel, 5.1, 6.1, 7.1, HRTF, UHJ, and B-Format output. AeonWave-OpenAL AeonWave-OpenAL is an LGPL-licensed OpenAL emulation layer that takes advantage of the hardware acceleration provided by the non-free but low cost AeonWave 4D-audio library for Linux and Windows made by Adalin B.V. The author claims that AeonWave-OpenAL implementation renders 3D audio five (on an AMD Athlon 64 X2) to seven (on an Intel Atom N270) times faster than either OpenAL SI or OpenAL Soft under the same conditions. By using the AeonWave library this implementation supports HRTF as well as spatialised surround sound for up to eight speakers. Rapture3D OpenAL Driver The Rapture3D OpenAL Driver is a non-free, commercial, Windows only, software implementation made by Blue Ripple Sound. The library is intended as a high performance drop-in replacement for other implementations. It features: 32bit floating point audio path. High quality sample rate conversion (used for various purposes including Doppler shift). High quality effects and filters. Directional sound sources. Support for multi-channel sound sources (including assets encoded using Ambisonics). The only limit on the number of sources or effects is CPU power, can render hundreds of sound sources and multiple effects on relatively old hardware. Higher-order Ambisonics (HOA) bus running at up to fourth order. See also OpenCL OpenML OpenMAX AL FMOD Java OpenAL irrKlang Lightweight Java Game Library References External links OpenAL official website OpenAL Soft AeonWave-OpenAL DevMaster.net OpenAL Tutorials (Note: these tutorials are showing their age slightly by, for instance, using deprecated functions such as alutLoadWAVFile) Rapture3D advanced OpenAL 1.1 driver OpenAL package for C++ Application programming interfaces Audio libraries Computer libraries Cross-platform software Formerly free software Linux APIs Video game engines
10312830
https://en.wikipedia.org/wiki/Nikolai%20Bezroukov
Nikolai Bezroukov
Nikolai Bezroukov is a Senior Internet Security Analyst at BASF Corporation and was member of Computer Science at Farleigh Dickinson University (New Jersey, United States). Also Webmaster of Open Source Software University, a volunteer technical site for the United Nations Sustainable Development Networking Programme (SDNP) that helps with Internet connectivity and distributes Linux to developing countries. Early career Softpanorama From 1989 to 1996 he was founder and editor-in-chief of Softpanorama bulletin, an influential Russian language e-zine. From 1996 he is the webmaster of Softpanorama.org, a site with the self-claimed mission-statement to offer "slightly skeptical" positions regarding computer science education, system administration and software development professions. Contributions He created a classification systems for computer viruses, an influential Russian language book on the subject - Computer Virology (1991) - and organized the first conference of anti-virus researchers for the region. His later Virus Bulletin Conference review He claims to have coined the term "Orthodox File Managers" (OFM) in 1996 in the first e-book devoted to the subject that systematized the field and tried to define the common features of major implementations of this class of file managers: such as FAR, Total Commander and Midnight Commander. Open source issues Since 1998 he became an albeit controversial, critic of the possibilities of open source and the dangers of its commercialization. In 1999 he introduced the highly controversial term "Vulgar Raymondism" and in 2005 coined the names of two philosophical schools on writing open source software: "Software Realism" and "Software Idealism". In 1999 he published two influential papers devoted to analyses and critique of Eric Raymond's views on the development of open source software: "Critique of vulgar Raymondism" and "A second look at the Cathedral and the Bazaar". These papers discuss the similarities between open source software development and academic research. The first paper produced a sharp response from Eric Raymond. In 2000 he published a third paper, cited in academia, in which he analyzed the essence of Stallman's software development model and provided a comprehensive critique of GPL's foundations. In 2005 he published the next of his series of papers devoted to a critical assessment of open source development, in which he tried to analyze achievements and pitfalls of two similar operating systems: Linux and Solaris. References External links Bezroukov's website "Softpanorama" Living people Year of birth missing (living people) Fairleigh Dickinson University faculty
70136094
https://en.wikipedia.org/wiki/Bangladesh%20e-Government%20Computer%20Incident%20Response%20Team
Bangladesh e-Government Computer Incident Response Team
Bangladesh e-Government Computer Incident Response Team (BGD e-Gov CIRT; ) is state-run agency of the government of Bangladesh responsible for maintaining cybersecurity in the country. Works under the Ministry of Posts, Telecommunications and Information Technology, it is the national computer emergency response team (CERT) with prim focus on receiving and reviewing, and responding to cybersecurity incidents in the country. BGD e-Gov CIRT conduct research in the field of cybersecurity and issues advisory on security-oriented vulnerabilities in coordination with various government and non-government organizations, including critical infrastructures, financial organizations, law enforcement agencies, academia and civil society. It works within its framework for providing assistance for the improvement of national defense system of Bangladesh. It has maintained a network with foreign organizations and communities for transborder cybersecurity-related matters. Service components BGD e-Gov CIRT has 8 active service components designed for various cybersecurity matters, including computer systems, networks, capacity building and internet security awareness among others. Incident Handling Unit Digital Forensic Unit Cyber Awareness and Capacity Building Unit Cyber Sensor Unit Cyber Range Unit Cyber Risk Assessment Unit Critical Information Infrastructure Unit Cyber Audit Unit History BGD e-Gov CIRT was established by the federal government after the Bangladesh Bank robbery incident took place. It was originally introduced by the Bangladesh Computer Council (BCC) in 2015. BGD e-GOV CIRT became operational in February 2016. It also signed a memorandum of understanding (MoU) with the government of India's Ministry of Electronics and Information Technology on 8 April 2017 and remained the member of the Indian Computer Emergency Response Team until 7 April 2022. It is also a permanent member of the OIC Computer Emergency Response Team. In September 2018 BGD e-Gov CIRT became a trusted introducer incorporated by the European Computer Incident Response Team. References Further reading Computer emergency response teams National cyber security centres 2016 establishments in Bangladesh Government agencies of Bangladesh Information technology in Bangladesh
1192971
https://en.wikipedia.org/wiki/Wicked%20problem
Wicked problem
In planning and policy, a wicked problem is a problem that is difficult or impossible to solve because of incomplete, contradictory, and changing requirements that are often difficult to recognize. It refers to an idea or problem that cannot be fixed, where there is no single solution to the problem; and "wicked" denotes resistance to resolution, rather than evil. Another definition is "a problem whose social complexity means that it has no determinable stopping point". Moreover, because of complex interdependencies, the effort to solve one aspect of a wicked problem may reveal or create other problems. The phrase was originally used in social planning. Its modern sense was introduced in 1967 by C. West Churchman in a guest editorial Churchman wrote in the journal Management Science, responding to a previous use of the term by Horst Rittel. Churchman discussed the moral responsibility of operations research "to inform the manager in what respect our 'solutions' have failed to tame his wicked problems." Rittel and Melvin M. Webber formally described the concept of wicked problems in a 1973 treatise, contrasting "wicked" problems with relatively "tame", soluble problems in mathematics, chess, or puzzle solving. Characteristics Rittel and Webber's 1973 formulation of wicked problems in social policy planning specified ten characteristics: There is no definitive formulation of a wicked problem. Wicked problems have no stopping rule. Solutions to wicked problems are not true-or-false, but better or worse. There is no immediate and no ultimate test of a solution to a wicked problem. Every solution to a wicked problem is a "one-shot operation"; because there is no opportunity to learn by trial and error, every attempt counts significantly. Wicked problems do not have an enumerable (or an exhaustively describable) set of potential solutions, nor is there a well-described set of permissible operations that may be incorporated into the plan. Every wicked problem is essentially unique. Every wicked problem can be considered to be a symptom of another problem. The existence of a discrepancy representing a wicked problem can be explained in numerous ways. The choice of explanation determines the nature of the problem's resolution. The social planner has no right to be wrong (i.e., planners are liable for the consequences of the actions they generate). Conklin later generalized the concept of problem wickedness to areas other than planning and policy; Conklin's defining characteristics are: The problem is not understood until after the formulation of a solution. Wicked problems have no stopping rule. Solutions to wicked problems are not right or wrong. Every wicked problem is essentially novel and unique. Every solution to a wicked problem is a "one shot operation." Wicked problems have no given alternative solutions. Examples Classic examples of wicked problems include economic, environmental, and political issues. A problem whose solution requires a great number of people to change their mindsets and behavior is likely to be a wicked problem. Therefore, many standard examples of wicked problems come from the areas of public planning and policy. These include global climate change, natural hazards, healthcare, the AIDS epidemic, pandemic influenza, international drug trafficking, nuclear weapons, homelessness, and social injustice. In recent years, problems in many areas have been identified as exhibiting elements of wickedness; examples range from aspects of design decision making and knowledge management to business strategy to space debris. Background Rittel and Webber coined the term in the context of problems of social policy, an arena in which a purely scientific-engineering approach cannot be applied because of the lack of a clear problem definition and differing perspectives of stakeholders. In their words, Thus wicked problems are also characterised by the following: The solution depends on how the problem is framed and vice versa (i.e., the problem definition depends on the solution) Stakeholders have radically different world views and different frames for understanding the problem. The constraints that the problem is subject to and the resources needed to solve it change over time. The problem is never solved definitively. Although Rittel and Webber framed the concept in terms of social policy and planning, wicked problems occur in any domain involving stakeholders with differing perspectives. Recognising this, Rittel and Kunz developed a technique called Issue-Based Information System (IBIS), which facilitates documentation of the rationale behind a group decision in an objective manner. A recurring theme in research and industry literature is the connection between wicked problems and design. Design problems are typically wicked because they are often ill-defined (no prescribed way forward), involve stakeholders with different perspectives, and have no "right" or "optimal" solution. Thus wicked problems cannot be solved by the application of standard (or known) methods; they demand creative solutions. Strategies to tackle wicked problems Wicked problems cannot be tackled by the traditional approach in which problems are defined, analysed and solved in sequential steps. The main reason for this is that there is no clear problem definition of wicked problems. In a paper published in 2000, Nancy Roberts identified the following strategies to cope with wicked problems: Authoritative These strategies seek to tame wicked problems by vesting the responsibility for solving the problems in the hands of a few people. The reduction in the number of stakeholders reduces problem complexity, as many competing points of view are eliminated at the start. The disadvantage is that authorities and experts charged with solving the problem may not have an appreciation of all the perspectives needed to tackle the problem. Competitive These strategies attempt to solve wicked problems by pitting opposing points of view against each other, requiring parties that hold these views to come up with their preferred solutions. The advantage of this approach is that different solutions can be weighed up against each other and the best one chosen. The disadvantage is that this adversarial approach creates a confrontational environment in which knowledge sharing is discouraged. Consequently, the parties involved may not have an incentive to come up with their best possible solution. Collaborative These strategies aim to engage all stakeholders in order to find the best possible solution for all stakeholders. Typically these approaches involve meetings in which issues and ideas are discussed and a common, agreed approach is formulated. A significant advantage of this approach is the creation of a strong information sharing environment. The main problem is the risk that certain ideas, while integral to finding a possible solution, may be too controversial to accept by other involved parties. In his 1972 paper, Rittel hints at a collaborative approach; one which attempts "to make those people who are being affected into participants of the planning process. They are not merely asked but actively involved in the planning process." A disadvantage of this approach is that achieving a shared understanding and commitment to solving a wicked problem is a time-consuming process. Another difficulty is that, in some matters, at least one group of people may hold an absolute belief that necessarily contradicts other absolute beliefs held by other groups. Collaboration then becomes impossible until one set of beliefs is relativized or abandoned entirely. Research over the last two decades has shown the value of computer-assisted argumentation techniques in improving the effectiveness of cross-stakeholder communication. The technique of dialogue mapping has been used in tackling wicked problems in organizations using a collaborative approach. More recently, in a four-year study of interorganizational collaboration across public, private, and voluntary sectors, steering by government was found to perversely undermine a successful collaboration, producing an organizational crisis which led to the collapse of a national initiative. In "Wholesome Design for Wicked Problems," Robert Knapp stated that there are ways forward in dealing with wicked problems: Examining networks designed to tackle wicked problems in health care, such as caring for older people or reducing sexually transmitted infections, Ferlie and colleagues suggest that managed networks may be the "least bad" way of "making wicked problems governable." Communication of wicked problems Scientific wicked problems as communication issues Scientific knowledge can be both a solution to wicked problems, by helping to address climate change or the COVID-19 pandemic, and also a source of wicked problems, for example, gene editing. There is an outdated belief among scientists that knowledge deficits within the public hinder scientific progress and application, with around 95% of scientists listing it as an objective for scientific engagement. However, research on public opinion has found that more knowledge can lead to either more support for science, or less support, depending on the issue that is being debated. Additionally, although risk communication shapes public perception, so do individual heuristics. Inherent to the context of wicked problems, is the lack of a single, right answer. In other words, although the issues mentioned should have scientific input, they are not solely scientific questions and cannot be separated from moral, political and economic questions. So, while leaders in the field of science communication consider wicked problems to be an issue of communication, the scientific aspects need consideration in conjunction with moral, political, and economic factors as well. Problem structuring methods A range of approaches called problem structuring methods (PSMs) have been developed in operations research since the 1970s to address problems involving complexity, uncertainty and conflict. PSMs are usually used by a group of people in collaboration (rather than by a solitary individual) to create a consensus about, or at least to facilitate negotiations about, what needs to change. Some widely adopted PSMs include soft systems methodology, the strategic choice approach, and strategic options development and analysis (SODA). Related concepts Messes and social messes Russell L. Ackoff wrote about complex problems as messes: "Every problem interacts with other problems and is therefore part of a set of interrelated problems, a system of problems.... I choose to call such a system a mess." Extending Ackoff, Robert Horn says that "a Social Mess is a set of interrelated problems and other messes. Complexity—systems of systems—is among the factors that makes Social Messes so resistant to analysis and, more importantly, to resolution." According to Horn, the defining characteristics of a social mess are: No unique "correct" view of the problem; Different views of the problem and contradictory solutions; Most problems are connected to other problems; Data are often uncertain or missing; Multiple value conflicts; Ideological and cultural constraints; Political constraints; Economic constraints; Often a-logical or illogical or multi-valued thinking; Numerous possible intervention points; Consequences difficult to imagine; Considerable uncertainty, ambiguity; Great resistance to change; and, Problem solver(s) out of contact with the problems and potential solutions. Divergent and convergent problems E. F. Schumacher distinguishes between divergent and convergent problems in his book A Guide for the Perplexed. Convergent problems are those for which attempted solutions gradually converge on one solution or answer. Divergent problems are those for which different answers appear to increasingly contradict each other all the more they are elaborated, requiring a different approach involving faculties of a higher order like love and empathy. Wicked problems in software development In 1990, DeGrace and Stahl introduced the concept of wicked problems to software development. In the last decade, other computer scientists have pointed out that software development shares many properties with other design practices (particularly that people-, process-, and technology-problems have to be considered equally), and have incorporated Rittel's concepts into their software design methodologies. The design and integration of complex software-defined services that use the Web (web services) can be construed as an evolution from previous models of software design, and therefore becomes a wicked problem also. Super wicked problems Kelly Levin, Benjamin Cashore, Graeme Auld and Steven Bernstein introduced the distinction between "wicked problems" and "super wicked problems" in a 2007 conference paper, which was followed by a 2012 journal article in Policy Sciences. In their discussion of global climate change, they define super wicked problems as having the following additional characteristics: There is a significant time deadline on finding the solution There is no central authority dedicated to finding a solution Those seeking to solve the problem are also causing it Certain policies irrationally impede future progress While the items that define a wicked problem relate to the problem itself, the items that define a super wicked problem relate to the agent trying to solve it. Global warming as a super wicked problem, and the need to intervene to tend to our longer term interests has also been taken up by others, including Richard Lazarus. See also :Category:Problem structuring methods Collaborative information seeking Collective action problem Competing harms Complex question Drama theory Encyclopedia of World Problems and Human Potential Hard problem of consciousness Ludic fallacy Morphological analysis Nonlinear system Post-normal science Problem solving Small Is Beautiful Social issue Societal collapse Soft systems methodology Structured systems analysis and design method Systems theory References Notes Bibliography (Reprinted, May 1979). . Further reading Buchanan, R. (1992). Wicked Problems in Design Thinking. Design Issues, Vol. 8, No. 2, (Spring, 1992), pp. 5–21: http://web.mit.edu/jrankin/www/engin_as_lib_art/Design_thinking.pdf Brown, Valerie A. and Harris, John A. and Russell, Jacqueline Y; "Tackling wicked problems : through the transdisciplinary imagination" Edited by Valerie A. Brown, John A. Harris and Jacqueline Y. Russell Earthscan, London ; Washington, DC : 2010. . Conklin, Jeff; Building Shared Understanding of Wicked Problems, Rotman Magazine, the alumni magazine of Rotman School of Management (Winter 2009). Culmsee, Paul; Awati, Kailash . The Heretic's Guide to Best Practices: The Reality of Managing Complex Problems in Organisations. iUniverse Star, 2013. Horn, Robert E., Knowledge Mapping for Complex Social Messes, a Stanford University presentation to the "Foundations in the Knowledge Economy" conference at the David and Lucile Packard Foundation, July 16, 2001 Kolko, Jon; Wicked Problems: Problems Worth Solving, a free book available online, 2012 Richardson, Adam; Wicked Problems: Today's business problems can be impossible to define, let alone solve, Fall 2006 Rittel, Horst; "Second Generation Design Methods," Interview in Design Methods Group, 5th Anniversary Report, DMG Occasional Paper 1, 1972, pp. 5–10. Reprinted in N. Cross (ed.), Developments in Design Methodology, John Wiley & Sons, Chichester, 1984, pp. 317–327. Shum, Simon J. Buckingham; Albert M. Selvin, Maarten Sierhuis, Jeffrey Conklin, Charles B. Haley, Bashar Nuseibeh; Hypermedia Support for Argumentation-Based Rationale: 15 Years on from gIBIS and QOC, December 2005 External links The Wicked7 Project – an open-source project to map the world's wicked problems CogNexus Institute – more information on wicked problems and dialogue mapping Knowledge Media Institute Swedish Morphological Society – Wicked Problems: Structuring Social Messes with Morphological Analysis Policy Cognition Problem solving 1967 introductions
37281225
https://en.wikipedia.org/wiki/Dracut%20%28software%29
Dracut (software)
Dracut is a set of tools that provide enhanced functionality for automating the Linux boot process. The tool named is used to create a Linux boot image (initramfs) by copying tools and files from an installed system and combining it with the Dracut framework, which is usually found in . Unlike existing Linux boot images, the Dracut framework attempts to introduce as little hard-coded logic into the initramfs as possible. The initramfs has essentially one purpose: locating and mounting the real root file system so that the boot process can transition to it. This functionality is dependent on device availability. Therefore, instead of having hard-coded scripts to determine device availability and suitability, Dracut's initramfs depends on the Linux device manager (udev) to create symbolic links to device nodes. When the root file system's device node appears, Dracut mounts it as the new root file system. This helps to keep the time required in initramfs down so that things like a 5-second boot are now made possible. Most of the initramfs generation functionality in Dracut is provided by generator modules that are sourced by the main tool to install specific functionality into the initramfs. They live in the modules subdirectory, and use functionality provided by dracut-functions to do their work. Currently, dracut supports booting from ext2, ext3, ext4, btrfs, ISO_9660, DM RAID, MD RAID, LVM2, device mapper multipath I/O, dm-crypt, cifs, FCoE, iSCSI, NBD and NFS. Adoption Red Hat is the original author of dracut. Red Hat-derived distributions use dracut for initramfs creation. Use outside Red Hat-derived distributions is limited. Fedora since version 12, Constantine Red Hat Enterprise Linux since version 6 openSUSE since version 13.2, when it became the default initramfs creation tool SUSE Linux Enterprise Server since version 12 Void Linux Distributions which include dracut, but do not use by default for initramfs creation: Gentoo since 2010 Debian since version 6 (Squeeze) OpenMandriva Lx, since it was Mandriva Linux in 2011 Mageia since Mageia 2 Arch Linux in extra repository Ubuntu Linux since 18.04 See also References External links https://dracut.wiki.kernel.org https://www.kernel.org/pub/linux/utils/boot/dracut/dracut.html Linux kernel
305
https://en.wikipedia.org/wiki/Achilles
Achilles
In Greek mythology, Achilles ( ) or Achilleus () was a hero of the Trojan War, the greatest of all the Greek warriors, and is the central character of Homer's Iliad. He was the son of the Nereid Thetis and Peleus, king of Phthia. Achilles' most notable feat during the Trojan War was the slaying of the Trojan prince Hector outside the gates of Troy. Although the death of Achilles is not presented in the Iliad, other sources concur that he was killed near the end of the Trojan War by Paris, who shot him with an arrow. Later legends (beginning with Statius' unfinished epic Achilleid, written in the 1st century AD) state that Achilles was invulnerable in all of his body except for one heel, because when his mother Thetis dipped him in the river Styx as an infant, she held him by one of his heels. Alluding to these legends, the term "Achilles' heel" has come to mean a point of weakness, especially in someone or something with an otherwise strong constitution. The Achilles tendon is also named after him due to these legends. Etymology Linear B tablets attest to the personal name Achilleus in the forms a-ki-re-u and a-ki-re-we, the latter being the dative of the former. The name grew more popular, even becoming common soon after the seventh century BC and was also turned into the female form Ἀχιλλεία (Achilleía), attested in Attica in the fourth century BC (IG II² 1617) and, in the form Achillia, on a stele in Halicarnassus as the name of a female gladiator fighting an "Amazon". Achilles' name can be analyzed as a combination of () "distress, pain, sorrow, grief" and () "people, soldiers, nation", resulting in a proto-form *Akhí-lāu̯os "he who has the people distressed" or "he whose people have distress". The grief or distress of the people is a theme raised numerous times in the Iliad (and frequently by Achilles himself). Achilles' role as the hero of grief or distress forms an ironic juxtaposition with the conventional view of him as the hero of ("glory", usually in war). Furthermore, laós has been construed by Gregory Nagy, following Leonard Palmer, to mean "a corps of soldiers", a muster. With this derivation, the name obtains a double meaning in the poem: when the hero is functioning rightly, his men bring distress to the enemy, but when wrongly, his men get the grief of war. The poem is in part about the misdirection of anger on the part of leadership. Another etymology relates the name to a Proto-Indo-European compound *h₂eḱ-pṓds "sharp foot" which first gave an Illyrian *āk̂pediós, evolving through time into *ākhpdeós and then *akhiddeús. The shift from -dd- to -ll- is then ascribed to the passing of the name into Greek via a Pre-Greek source. The first root part *h₂eḱ- "sharp, pointed" also gave Greek ἀκή (akḗ "point, silence, healing"), ἀκμή (akmḗ "point, edge, zenith") and ὀξύς (oxús "sharp, pointed, keen, quick, clever"), whereas ἄχος stems from the root *h₂egʰ- "to be upset, afraid". The whole expression would be comparable to the Latin acupedius "swift of foot". Compare also the Latin word family of aciēs "sharp edge or point, battle line, battle, engagement", acus "needle, pin, bodkin", and acuō "to make pointed, sharpen, whet; to exercise; to arouse" (whence acute). Some topical epitheta of Achilles in the Iliad point to this "swift-footedness", namely ποδάρκης δῖος Ἀχιλλεὺς (podárkēs dĩos Achilleús "swift-footed divine Achilles") or, even more frequently, πόδας ὠκὺς Ἀχιλλεύς (pódas ōkús Achilleús "quick-footed Achilles"). Some researchers deem the name a loan word, possibly from a Pre-Greek language. Achilles' descent from the Nereid Thetis and a similarity of his name with those of river deities such as Acheron and Achelous have led to speculations about his being an old water divinity (see below Worship). Robert S. P. Beekes has suggested a Pre-Greek origin of the name, based among other things on the coexistence of -λλ- and -λ- in epic language, which may account for a palatalized phoneme /ly/ in the original language. Birth and early years Achilles was the son of the Thetis, a nereid, and Peleus, the king of the Myrmidons. Zeus and Poseidon had been rivals for Thetis's hand in marriage until Prometheus, the fore-thinker, warned Zeus of a prophecy (originally uttered by Themis, goddess of divine law) that Thetis would bear a son greater than his father. For this reason, the two gods withdrew their pursuit, and had her wed Peleus. There is a tale which offers an alternative version of these events: In the Argonautica (4.760) Zeus' sister and wife Hera alludes to Thetis' chaste resistance to the advances of Zeus, pointing out that Thetis was so loyal to Hera's marriage bond that she coolly rejected the father of gods. Thetis, although a daughter of the sea-god Nereus, was also brought up by Hera, further explaining her resistance to the advances of Zeus. Zeus was furious and decreed that she would never marry an immortal. According to the Achilleid, written by Statius in the 1st century AD, and to non-surviving previous sources, when Achilles was born Thetis tried to make him immortal by dipping him in the river Styx; however, he was left vulnerable at the part of the body by which she held him: his left heel (see Achilles' heel, Achilles' tendon). It is not clear if this version of events was known earlier. In another version of this story, Thetis anointed the boy in ambrosia and put him on top of a fire in order to burn away the mortal parts of his body. She was interrupted by Peleus and abandoned both father and son in a rage. None of the sources before Statius make any reference to this general invulnerability. To the contrary, in the Iliad, Homer mentions Achilles being wounded: in Book 21 the Paeonian hero Asteropaeus, son of Pelagon, challenged Achilles by the river Scamander. He was ambidextrous, and cast a spear from each hand; one grazed Achilles' elbow, "drawing a spurt of blood". In the few fragmentary poems of the Epic Cycle which describe the hero's death (i.e. the Cypria, the Little Iliad by Lesches of Pyrrha, the Aithiopis and Iliou persis by Arctinus of Miletus), there is no trace of any reference to his general invulnerability or his famous weakness at the heel. In the later vase paintings presenting the death of Achilles, the arrow (or in many cases, arrows) hit his torso. Peleus entrusted Achilles to Chiron the Centaur, who lived on Mount Pelion, to be reared. Thetis foretold that her son's fate was either to gain glory and die young, or to live a long but uneventful life in obscurity. Achilles chose the former, and decided to take part in the Trojan War. According to Homer, Achilles grew up in Phthia with his companion Patroclus. According to Photius, the sixth book of the New History by Ptolemy Hephaestion reported that Thetis burned in a secret place the children she had by Peleus. When she had Achilles, Peleus noticed, tore him from the flames with only a burnt foot, and confided him to the centaur Chiron. Later Chiron exhumed the body of the Damysus, who was the fastest of all the giants, removed the ankle, and incorporated it into Achilles' burnt foot. Other names Among the appellations under which Achilles is generally known are the following: Pyrisous, "saved from the fire", his first name, which seems to favour the tradition in which his mortal parts were burned by his mother Thetis Aeacides, from his grandfather Aeacus Aemonius, from Aemonia, a country which afterwards acquired the name of Thessaly Aspetos, "inimitable" or "vast", his name at Epirus Larissaeus, from Larissa (also called Cremaste), a town of Thessaly, which still bears the same name Ligyron, his original name Nereius, from his mother Thetis, one of the Nereids Pelides, from his father, Peleus Phthius, from his birthplace, Phthia Podarkes, "swift-footed", due to the wings of Arke being attached to his feet. Hidden on Skyros Some post-Homeric sources claim that in order to keep Achilles safe from the war, Thetis (or, in some versions, Peleus) hid the young man at the court of Lycomedes, king of Skyros. There, Achilles was disguised as a girl and lived among Lycomedes' daughters, perhaps under the name "Pyrrha" (the red-haired girl), Cercysera or Aissa ("swift"). With Lycomedes' daughter Deidamia, whom in the account of Statius he raped, Achilles there fathered two sons, Neoptolemus (also called Pyrrhus, after his father's possible alias) and Oneiros. According to this story, Odysseus learned from the prophet Calchas that the Achaeans would be unable to capture Troy without Achilles' aid. Odysseus went to Skyros in the guise of a peddler selling women's clothes and jewellery and placed a shield and spear among his goods. When Achilles instantly took up the spear, Odysseus saw through his disguise and convinced him to join the Greek campaign. In another version of the story, Odysseus arranged for a trumpet alarm to be sounded while he was with Lycomedes' women. While the women fled in panic, Achilles prepared to defend the court, thus giving his identity away. In the Trojan War According to the Iliad, Achilles arrived at Troy with 50 ships, each carrying 50 Myrmidons. He appointed five leaders (each leader commanding 500 Myrmidons): Menesthius, Eudorus, Peisander, Phoenix and Alcimedon. Telephus When the Greeks left for the Trojan War, they accidentally stopped in Mysia, ruled by King Telephus. In the resulting battle, Achilles gave Telephus a wound that would not heal; Telephus consulted an oracle, who stated that "he that wounded shall heal". Guided by the oracle, he arrived at Argos, where Achilles healed him in order that he might become their guide for the voyage to Troy. According to other reports in Euripides' lost play about Telephus, he went to Aulis pretending to be a beggar and asked Achilles to heal his wound. Achilles refused, claiming to have no medical knowledge. Alternatively, Telephus held Orestes for ransom, the ransom being Achilles' aid in healing the wound. Odysseus reasoned that the spear had inflicted the wound; therefore, the spear must be able to heal it. Pieces of the spear were scraped off onto the wound and Telephus was healed. Troilus According to the Cypria (the part of the Epic Cycle that tells the events of the Trojan War before Achilles' wrath), when the Achaeans desired to return home, they were restrained by Achilles, who afterwards attacked the cattle of Aeneas, sacked neighbouring cities (like Pedasus and Lyrnessus, where the Greeks capture the queen Briseis) and killed Tenes, a son of Apollo, as well as Priam's son Troilus in the sanctuary of Apollo Thymbraios; however, the romance between Troilus and Chryseis described in Geoffrey Chaucer's Troilus and Criseyde and in William Shakespeare's Troilus and Cressida is a medieval invention. In Dares Phrygius' Account of the Destruction of Troy, the Latin summary through which the story of Achilles was transmitted to medieval Europe, as well as in older accounts, Troilus was a young Trojan prince, the youngest of King Priam's and Hecuba's five legitimate sons (or according other sources, another son of Apollo). Despite his youth, he was one of the main Trojan war leaders, a "horse fighter" or "chariot fighter" according to Homer. Prophecies linked Troilus' fate to that of Troy and so he was ambushed in an attempt to capture him. Yet Achilles, struck by the beauty of both Troilus and his sister Polyxena, and overcome with lust, directed his sexual attentions on the youth – who, refusing to yield, instead found himself decapitated upon an altar-omphalos of Apollo Thymbraios. Later versions of the story suggested Troilus was accidentally killed by Achilles in an over-ardent lovers' embrace. In this version of the myth, Achilles' death therefore came in retribution for this sacrilege. Ancient writers treated Troilus as the epitome of a dead child mourned by his parents. Had Troilus lived to adulthood, the First Vatican Mythographer claimed, Troy would have been invincible; however, the motif is older and found already in Plautus' Bacchides. In the Iliad Homer's Iliad is the most famous narrative of Achilles' deeds in the Trojan War. Achilles' wrath (μῆνις Ἀχιλλέως, mênis Achilléōs) is the central theme of the poem. The first two lines of the Iliad read: The Homeric epic only covers a few weeks of the decade-long war, and does not narrate Achilles' death. It begins with Achilles' withdrawal from battle after being dishonoured by Agamemnon, the commander of the Achaean forces. Agamemnon has taken a woman named Chryseis as his slave. Her father Chryses, a priest of Apollo, begs Agamemnon to return her to him. Agamemnon refuses, and Apollo sends a plague amongst the Greeks. The prophet Calchas correctly determines the source of the troubles but will not speak unless Achilles vows to protect him. Achilles does so, and Calchas declares that Chryseis must be returned to her father. Agamemnon consents, but then commands that Achilles' battle prize Briseis, the daughter of Briseus, be brought to him to replace Chryseis. Angry at the dishonour of having his plunder and glory taken away (and, as he says later, because he loves Briseis), with the urging of his mother Thetis, Achilles refuses to fight or lead his troops alongside the other Greek forces. At the same time, burning with rage over Agamemnon's theft, Achilles prays to Thetis to convince Zeus to help the Trojans gain ground in the war, so that he may regain his honour. As the battle turns against the Greeks, thanks to the influence of Zeus, Nestor declares that the Trojans are winning because Agamemnon has angered Achilles, and urges the king to appease the warrior. Agamemnon agrees and sends Odysseus and two other chieftains, Ajax and Phoenix. They promise that, if Achilles returns to battle, Agamemnon will return the captive Briseis and other gifts. Achilles rejects all Agamemnon offers him and simply urges the Greeks to sail home as he was planning to do. The Trojans, led by Hector, subsequently push the Greek army back toward the beaches and assault the Greek ships. With the Greek forces on the verge of absolute destruction, Patroclus leads the Myrmidons into battle, wearing Achilles' armour, though Achilles remains at his camp. Patroclus succeeds in pushing the Trojans back from the beaches, but is killed by Hector before he can lead a proper assault on the city of Troy. After receiving the news of the death of Patroclus from Antilochus, the son of Nestor, Achilles grieves over his beloved companion's death. His mother Thetis comes to comfort the distraught Achilles. She persuades Hephaestus to make new armour for him, in place of the armour that Patroclus had been wearing, which was taken by Hector. The new armour includes the Shield of Achilles, described in great detail in the poem. Enraged over the death of Patroclus, Achilles ends his refusal to fight and takes the field, killing many men in his rage but always seeking out Hector. Achilles even engages in battle with the river god Scamander, who has become angry that Achilles is choking his waters with all the men he has killed. The god tries to drown Achilles but is stopped by Hera and Hephaestus. Zeus himself takes note of Achilles' rage and sends the gods to restrain him so that he will not go on to sack Troy itself before the time allotted for its destruction, seeming to show that the unhindered rage of Achilles can defy fate itself. Finally, Achilles finds his prey. Achilles chases Hector around the wall of Troy three times before Athena, in the form of Hector's favorite and dearest brother, Deiphobus, persuades Hector to stop running and fight Achilles face to face. After Hector realizes the trick, he knows the battle is inevitable. Wanting to go down fighting, he charges at Achilles with his only weapon, his sword, but misses. Accepting his fate, Hector begs Achilles not to spare his life, but to treat his body with respect after killing him. Achilles tells Hector it is hopeless to expect that of him, declaring that "my rage, my fury would drive me now to hack your flesh away and eat you raw – such agonies you have caused me". Achilles then kills Hector and drags his corpse by its heels behind his chariot. After having a dream where Patroclus begs Achilles to hold his funeral, Achilles hosts a series of funeral games in honour of his companion. At the onset of his duel with Hector, Achilles is referred to as the brightest star in the sky, which comes on in the autumn, Orion's dog (Sirius); a sign of evil. During the cremation of Patroclus, he is compared to Hesperus, the evening/western star (Venus), while the burning of the funeral pyre lasts until Phosphorus, the morning/eastern star (also Venus) has set (descended). With the assistance of the god Hermes (Argeiphontes), Hector's father Priam goes to Achilles' tent to plead with Achilles for the return of Hector's body so that he can be buried. Achilles relents and promises a truce for the duration of the funeral, lasting 9 days with a burial on the 10th (in the tradition of Niobe's offspring). The poem ends with a description of Hector's funeral, with the doom of Troy and Achilles himself still to come. Later epic accounts: fighting Penthesilea and Memnon The Aethiopis (7th century BC) and a work named Posthomerica, composed by Quintus of Smyrna in the fourth century CE, relate further events from the Trojan War. When Penthesilea, queen of the Amazons and daughter of Ares, arrives in Troy, Priam hopes that she will defeat Achilles. After his temporary truce with Priam, Achilles fights and kills the warrior queen, only to grieve over her death later. At first, he was so distracted by her beauty, he did not fight as intensely as usual. Once he realized that his distraction was endangering his life, he refocused and killed her. Following the death of Patroclus, Nestor's son Antilochus becomes Achilles' closest companion. When Memnon, son of the Dawn Goddess Eos and king of Ethiopia, slays Antilochus, Achilles once more obtains revenge on the battlefield, killing Memnon. Consequently, Eos will not let the sun rise until Zeus persuades her. The fight between Achilles and Memnon over Antilochus echoes that of Achilles and Hector over Patroclus, except that Memnon (unlike Hector) was also the son of a goddess. Many Homeric scholars argued that episode inspired many details in the Iliads description of the death of Patroclus and Achilles' reaction to it. The episode then formed the basis of the cyclic epic Aethiopis, which was composed after the Iliad, possibly in the 7th century BC. The Aethiopis is now lost, except for scattered fragments quoted by later authors. Achilles and Patroclus The exact nature of Achilles' relationship with Patroclus has been a subject of dispute in both the classical period and modern times. In the Iliad, it appears to be the model of a deep and loyal friendship. Homer does not suggest that Achilles and his close friend Patroclus had sexual relations. Although there is no direct evidence in the text of the Iliad that Achilles and Patroclus were lovers, this theory was expressed by some later authors. Commentators from classical antiquity to the present have often interpreted the relationship through the lens of their own cultures. In 5th-century BCE Athens, the intense bond was often viewed in light of the Greek custom of paiderasteia. In Plato's Symposium, the participants in a dialogue about love assume that Achilles and Patroclus were a couple; Phaedrus argues that Achilles was the younger and more beautiful one so he was the beloved and Patroclus was the lover. However, ancient Greek had no words to distinguish heterosexual and homosexual, and it was assumed that a man could both desire handsome young men and have sex with women. Many pairs of men throughout history have been compared to Achilles and Patroclus to imply a homosexual relationship. Death The death of Achilles, even if considered solely as it occurred in the oldest sources, is a complex one, with many different versions. In the oldest version, the Iliad, and as predicted by Hector with his dying breath, the hero's death was brought about by Paris with an arrow (to the heel according to Statius). In some versions, the god Apollo guided Paris' arrow. Some retellings also state that Achilles was scaling the gates of Troy and was hit with a poisoned arrow. All of these versions deny Paris any sort of valour, owing to the common conception that Paris was a coward and not the man his brother Hector was, and Achilles remained undefeated on the battlefield. After death, Achilles' bones were mingled with those of Patroclus, and funeral games were held. He was represented in the Aethiopis as living after his death in the island of Leuke at the mouth of the river Danube. Another version of Achilles' death is that he fell deeply in love with one of the Trojan princesses, Polyxena. Achilles asks Priam for Polyxena's hand in marriage. Priam is willing because it would mean the end of the war and an alliance with the world's greatest warrior. But while Priam is overseeing the private marriage of Polyxena and Achilles, Paris, who would have to give up Helen if Achilles married his sister, hides in the bushes and shoots Achilles with a divine arrow, killing him. In the Odyssey, Agamemnon informs Achilles of his pompous burial and the erection of his mound at the Hellespont while they are receiving the dead suitors in Hades. He claims they built a massive burial mound on the beach of Ilion that could be seen by anyone approaching from the ocean. Achilles was cremated and his ashes buried in the same urn as those of Patroclus. Paris was later killed by Philoctetes using the enormous bow of Heracles. In Book 11 of Homer's Odyssey, Odysseus sails to the underworld and converses with the shades. One of these is Achilles, who when greeted as "blessed in life, blessed in death", responds that he would rather be a slave to the worst of masters than be king of all the dead. But Achilles then asks Odysseus of his son's exploits in the Trojan war, and when Odysseus tells of Neoptolemus' heroic actions, Achilles is filled with satisfaction. This leaves the reader with an ambiguous understanding of how Achilles felt about the heroic life. According to some accounts, he had married Medea in life, so that after both their deaths they were united in the Elysian Fields of Hades – as Hera promised Thetis in Apollonius' Argonautica (3rd century BC). Fate of Achilles' armour Achilles' armour was the object of a feud between Odysseus and Telamonian Ajax (Ajax the greater). They competed for it by giving speeches on why they were the bravest after Achilles to their Trojan prisoners, who, after considering both men's presentations, decided Odysseus was more deserving of the armour. Furious, Ajax cursed Odysseus, which earned him the ire of Athena, who temporarily made Ajax so mad with grief and anguish that he began killing sheep, thinking them his comrades. After a while, when Athena lifted his madness and Ajax realized that he had actually been killing sheep, he was so ashamed that he committed suicide. Odysseus eventually gave the armour to Neoptolemus, the son of Achilles. When Odysseus encounters the shade of Ajax much later in the House of Hades (Odyssey 11.543–566), Ajax is still so angry about the outcome of the competition that he refuses to speak to Odysseus. A relic claimed to be Achilles' bronze-headed spear was preserved for centuries in the temple of Athena on the acropolis of Phaselis, Lycia, a port on the Pamphylian Gulf. The city was visited in 333 BCE by Alexander the Great, who envisioned himself as the new Achilles and carried the Iliad with him, but his court biographers do not mention the spear; however, it was shown in the time of Pausanias in the 2nd century CE. Achilles, Ajax and a game of petteia Numerous paintings on pottery have suggested a tale not mentioned in the literary traditions. At some point in the war, Achilles and Ajax were playing a board game (petteia). They were absorbed in the game and oblivious to the surrounding battle. The Trojans attacked and reached the heroes, who were saved only by an intervention of Athena. Worship and heroic cult The tomb of Achilles, extant throughout antiquity in Troad, was venerated by Thessalians, but also by Persian expeditionary forces, as well as by Alexander the Great and the Roman emperor Caracalla. Achilles' cult was also to be found at other places, e. g. on the island of Astypalaea in the Sporades, in Sparta which had a sanctuary, in Elis and in Achilles' homeland Thessaly, as well as in the Magna Graecia cities of Tarentum, Locri and Croton, accounting for an almost Panhellenic cult to the hero. The cult of Achilles is illustrated in the 500 BCE Polyxena sarcophagus, which depicts the sacrifice of Polyxena near the tumulus of Achilles. Strabo (13.1.32) also suggested that such a cult of Achilles existed in Troad: The spread and intensity of the hero's veneration among the Greeks that had settled on the northern coast of the Pontus Euxinus, today's Black Sea, appears to have been remarkable. An archaic cult is attested for the Milesian colony of Olbia as well as for an island in the middle of the Black Sea, today identified with Snake Island (Ukrainian Зміїний, Zmiinyi, near Kiliya, Ukraine). Early dedicatory inscriptions from the Greek colonies on the Black Sea (graffiti and inscribed clay disks, these possibly being votive offerings, from Olbia, the area of Berezan Island and the Tauric Chersonese) attest the existence of a heroic cult of Achilles from the sixth century BC onwards. The cult was still thriving in the third century CE, when dedicatory stelae from Olbia refer to an Achilles Pontárchēs (Ποντάρχης, roughly "lord of the Sea," or "of the Pontus Euxinus"), who was invoked as a protector of the city of Olbia, venerated on par with Olympian gods such as the local Apollo Prostates, Hermes Agoraeus, or Poseidon. Pliny the Elder (23–79 AD) in his Natural History mentions a "port of the Achæi" and an "island of Achilles", famous for the tomb of that "man" (), situated somewhat nearby Olbia and the Dnieper-Bug Estuary; furthermore, at 125 Roman miles from this island, he places a peninsula "which stretches forth in the shape of a sword" obliquely, called Dromos Achilleos (Ἀχιλλέως δρόμος, Achilléōs drómos "the Race-course of Achilles") and considered the place of the hero's exercise or of games instituted by him. This last feature of Pliny's account is considered to be the iconic spit, called today Tendra (or Kosa Tendra and Kosa Djarilgatch), situated between the mouth of the Dnieper and Karkinit Bay, but which is hardly 125 Roman miles (c. 185 km) away from the Dnieper-Bug estuary, as Pliny states. (To the "Race-course" he gives a length of 80 miles, c. 120 km, whereas the spit measures c. 70 km today.) In the following chapter of his book, Pliny refers to the same island as Achillea and introduces two further names for it: Leuce or Macaron (from Greek [νῆσος] μακαρῶν "island of the blest"). The "present day" measures, he gives at this point, seem to account for an identification of Achillea or Leuce with today's Snake Island. Pliny's contemporary Pomponius Mela (c. 43 AD) tells that Achilles was buried on an island named Achillea, situated between the Borysthenes and the Ister, adding to the geographical confusion. Ruins of a square temple, measuring 30 meters to a side, possibly that dedicated to Achilles, were discovered by Captain Kritzikly () in 1823 on Snake Island. A second exploration in 1840 showed that the construction of a lighthouse had destroyed all traces of this temple. A fifth century BC black-glazed lekythos inscription, found on the island in 1840, reads: "Glaukos, son of Poseidon, dedicated me to Achilles, lord of Leuke." In another inscription from the fifth or fourth century BC, a statue is dedicated to Achilles, lord of Leuke, by a citizen of Olbia, while in a further dedication, the city of Olbia confirms its continuous maintenance of the island's cult, again suggesting its quality as a place of a supra-regional hero veneration. The heroic cult dedicated to Achilles on Leuce seems to go back to an account from the lost epic Aethiopis according to which, after his untimely death, Thetis had snatched her son from the funeral pyre and removed him to a mythical (Leúkē Nêsos "White Island"). Already in the fifth century BC, Pindar had mentioned a cult of Achilles on a "bright island" (φαεννά νᾶσος, phaenná nâsos) of the Black Sea, while in another of his works, Pindar would retell the story of the immortalized Achilles living on a geographically indefinite Island of the Blest together with other heroes such as his father Peleus and Cadmus. Well known is the connection of these mythological Fortunate Isles (μακαρῶν νῆσοι, makárôn nêsoi) or the Homeric Elysium with the stream Oceanus which according to Greek mythology surrounds the inhabited world, which should have accounted for the identification of the northern strands of the Euxine with it. Guy Hedreen has found further evidence for this connection of Achilles with the northern margin of the inhabited world in a poem by Alcaeus, speaking of "Achilles lord of Scythia" and the opposition of North and South, as evoked by Achilles' fight against the Aethiopian prince Memnon, who in his turn would be removed to his homeland by his mother Eos after his death. The Periplus of the Euxine Sea (c. 130 AD) gives the following details: The Greek geographer Dionysius Periegetes, who likely lived during the first century CE, wrote that the island was called Leuce "because the wild animals which live there are white. It is said that there, in Leuce island, reside the souls of Achilles and other heroes, and that they wander through the uninhabited valleys of this island; this is how Jove rewarded the men who had distinguished themselves through their virtues, because through virtue they had acquired everlasting honour". Similarly, others relate the island's name to its white cliffs, snakes or birds dwelling there. Pausanias has been told that the island is "covered with forests and full of animals, some wild, some tame. In this island there is also Achilles' temple and his statue". Leuce had also a reputation as a place of healing. Pausanias reports that the Delphic Pythia sent a lord of Croton to be cured of a chest wound. Ammianus Marcellinus attributes the healing to waters (aquae) on the island. A number of important commercial port cities of the Greek waters were dedicated to Achilles. Herodotus, Pliny the Elder and Strabo reported on the existence of a town Achílleion (Ἀχίλλειον), built by settlers from Mytilene in the sixth century BC, close to the hero's presumed burial mound in the Troad. Later attestations point to an Achílleion in Messenia (according to Stephanus Byzantinus) and an Achílleios (Ἀχίλλειος) in Laconia. Nicolae Densuşianu recognized a connection to Achilles in the names of Aquileia and of the northern arm of the Danube delta, called Chilia (presumably from an older Achileii), though his conclusion, that Leuce had sovereign rights over the Black Sea, evokes modern rather than archaic sea-law. The kings of Epirus claimed to be descended from Achilles through his son, Neoptolemus. Alexander the Great, son of the Epirote princess Olympias, could therefore also claim this descent, and in many ways strove to be like his great ancestor. He is said to have visited the tomb of Achilles at Achilleion while passing Troy. In AD 216 the Roman Emperor Caracalla, while on his way to war against Parthia, emulated Alexander by holding games around Achilles' tumulus. Reception during antiquity In Greek tragedy The Greek tragedian Aeschylus wrote a trilogy of plays about Achilles, given the title Achilleis by modern scholars. The tragedies relate the deeds of Achilles during the Trojan War, including his defeat of Hector and eventual death when an arrow shot by Paris and guided by Apollo punctures his heel. Extant fragments of the Achilleis and other Aeschylean fragments have been assembled to produce a workable modern play. The first part of the Achilleis trilogy, The Myrmidons, focused on the relationship between Achilles and chorus, who represent the Achaean army and try to convince Achilles to give up his quarrel with Agamemnon; only a few lines survive today. In Plato's Symposium, Phaedrus points out that Aeschylus portrayed Achilles as the lover and Patroclus as the beloved; Phaedrus argues that this is incorrect because Achilles, being the younger and more beautiful of the two, was the beloved, who loved his lover so much that he chose to die to avenge him. The tragedian Sophocles also wrote The Lovers of Achilles, a play with Achilles as the main character. Only a few fragments survive. Towards the end of the 5th century BCE, a more negative view of Achilles emerges in Greek drama; Euripides refers to Achilles in a bitter or ironic tone in Hecuba, Electra, and Iphigenia in Aulis. In Greek philosophy Zeno The philosopher Zeno of Elea centred one of his paradoxes on an imaginary footrace between "swift-footed" Achilles and a tortoise, by which he attempted to show that Achilles could not catch up to a tortoise with a head start, and therefore that motion and change were impossible. As a student of the monist Parmenides and a member of the Eleatic school, Zeno believed time and motion to be illusions. Plato In Hippias Minor, a dialogue attributed to Plato, an arrogant man named Hippias argues with Socrates. The two get into a discussion about lying. They decide that a person who is intentionally false must be "better" than a person who is unintentionally false, on the basis that someone who lies intentionally must understand the subject about which they are lying. Socrates uses various analogies, discussing athletics and the sciences to prove his point. The two also reference Homer extensively. Socrates and Hippias agree that Odysseus, who concocted a number of lies throughout the Odyssey and other stories in the Trojan War Cycle, was false intentionally. Achilles, like Odysseus, told numerous falsehoods. Hippias believes that Achilles was a generally honest man, while Socrates believes that Achilles lied for his own benefit. The two argue over whether it is better to lie on purpose or by accident. Socrates eventually abandons Homeric arguments and makes sports analogies to drive home the point: someone who does wrong on purpose is a better person than someone who does wrong unintentionally. In Roman and medieval literature The Romans, who traditionally traced their lineage to Troy, took a highly negative view of Achilles. Virgil refers to Achilles as a savage and a merciless butcher of men, while Horace portrays Achilles ruthlessly slaying women and children. Other writers, such as Catullus, Propertius, and Ovid, represent a second strand of disparagement, with an emphasis on Achilles' erotic career. This strand continues in Latin accounts of the Trojan War by writers such as Dictys Cretensis and Dares Phrygius and in Benoît de Sainte-Maure's Roman de Troie and Guido delle Colonne's Historia destructionis Troiae, which remained the most widely read and retold versions of the Matter of Troy until the 17th century. Achilles was described by the Byzantine chronicler Leo the Deacon, not as Hellene, but as Scythian, while according to the Byzantine author John Malalas, his army was made up of a tribe previously known as Myrmidons and later as Bulgars. In modern literature and arts Literature Achilles appears in Dante's Inferno (composed 1308–1320). He is seen in Hell's second circle, that of lust. Achilles is portrayed as a former hero who has become lazy and devoted to the love of Patroclus, in William Shakespeare's Troilus and Cressida (1602). The French dramatist Thomas Corneille wrote a tragedy La Mort d'Achille (1673). Achilles is the subject of the poem Achilleis (1799), a fragment by Johann Wolfgang von Goethe. In 1899, the Polish playwright, painter and poet Stanisław Wyspiański published a national drama, based on Polish history, named Achilles. In 1921, Edward Shanks published The Island of Youth and Other Poems, concerned among others with Achilles. The 1983 novel Kassandra by Christa Wolf also treats the death of Achilles. Akhilles is killed by a poisoned Kentaur arrow shot by Kassandra in Marion Zimmer Bradley's novel The Firebrand (1987). Achilles is one of various 'narrators' in Colleen McCullough's novel The Song of Troy (1998). The Death of Achilles (Смерть Ахиллеса, 1998) is an historical detective novel by Russian writer Boris Akunin that alludes to various figures and motifs from the Iliad. The character Achilles in Ender's Shadow (1999), by Orson Scott Card, shares his namesake's cunning mind and ruthless attitude. Achilles is one of the main characters in Dan Simmons's novels Ilium (2003) and Olympos (2005). Achilles is a major supporting character in David Gemmell's Troy series of books (2005–2007). Achilles is the main character in David Malouf's novel Ransom (2009). The ghost of Achilles appears in Rick Riordan's The Last Olympian (2009). He warns Percy Jackson about the Curse of Achilles and its side effects. Achilles is a main character in Terence Hawkins' 2009 novel The Rage of Achilles. Achilles is a major character in Madeline Miller's debut novel, The Song of Achilles (2011), which won the 2012 Orange Prize for Fiction. The novel explores the relationship between Patroclus and Achilles from boyhood to the fateful events of the Iliad. Achilles appears in the light novel series Fate/Apocrypha (2012–2014) as the Rider of Red. Achilles is a main character in Pat Barker's 2018 novel The Silence of the Girls, much of which is narrated by his slave Briseis. Visual arts Achilles with the Daughters of Lycomedes is a subject treated in paintings by Anthony van Dyck (before 1618; Museo del Prado, Madrid) and Nicolas Poussin (c. 1652; Museum of Fine Arts, Boston) among others. Peter Paul Rubens has authored a series of works on the life of Achilles, comprising the titles: Thetis dipping the infant Achilles into the river Styx, Achilles educated by the centaur Chiron, Achilles recognized among the daughters of Lycomedes, The wrath of Achilles, The death of Hector, Thetis receiving the arms of Achilles from Vulcanus, The death of Achilles (Museum Boijmans Van Beuningen, Rotterdam), and Briseis restored to Achilles (Detroit Institute of Arts; all c. 1630–1635) Pieter van Lint, "Achilles Discovered among the Daughters of Lycomedes", 1645, at the Israel Museum, Jerusalem Dying Achilles is a sculpture created by Christophe Veyrier (c. 1683; Victoria and Albert Museum, London). The Rage of Achilles is a fresco by Giovanni Battista Tiepolo (1757, Villa Valmarana Ai Nani, Vicenza). Eugène Delacroix painted a version of The Education of Achilles for the ceiling of the Paris Palais Bourbon (1833–1847), one of the seats of the French Parliament. created a statue group Achilles and Penthesilea (1895; Vienna). Achilleus (1908) is a lithography by Max Slevogt. Music Achilles has been frequently the subject of operas, ballets and related genres. Operas titled Deidamia were composed by Francesco Cavalli (1644) and George Frideric Handel (1739). Achille et Polyxène (Paris 1687) is an opera begun by Jean-Baptiste Lully and finished by Pascal Collasse. Achille et Déidamie (Paris 1735) is an opera composed by André Campra. Achilles (London 1733) is a ballad opera, written by John Gay, parodied by Thomas Arne as Achilles in petticoats in 1773. Achille in Sciro is a libretto by Metastasio, composed by Domenico Sarro for the inauguration of the Teatro di San Carlo (Naples, 4 November 1737). An even earlier composition is from Antonio Caldara (Vienna 1736). Later operas on the same libretto were composed by Leonardo Leo (Turin 1739), Niccolò Jommelli (Vienna 1749 and Rome 1772), Giuseppe Sarti (Copenhagen 1759 and Florence 1779), Johann Adolph Hasse (Naples 1759), Giovanni Paisiello (St. Petersburg 1772), Giuseppe Gazzaniga (Palermo 1781) and many others. It has also been set to music as Il Trionfo della gloria. Achille (Vienna 1801) is an opera by Ferdinando Paër on a libretto by Giovanni de Gamerra. Achille à Scyros (Paris 1804) is a ballet by Pierre Gardel, composed by Luigi Cherubini. Achilles, oder Das zerstörte Troja ("Achilles, or Troy Destroyed", Bonn 1885) is an oratorio by the German composer Max Bruch. Achilles auf Skyros (Stuttgart 1926) is a ballet by the Austrian-British composer and musicologist Egon Wellesz. Achilles' Wrath is a concert piece by Sean O'Loughlin. Achilles Last Stand a track on the 1976 Led Zeppelin album Presence. Achilles, Agony and Ecstasy in Eight Parts is the first song on the 1992 Manowar album The Triumph of Steel. Achilles Come Down is a song on the 2017 Gang of Youths album Go Farther in Lightness. Film and television In films Achilles has been portrayed in the following films and television series: The 1924 film Helena by Carlo Aldini The 1954 film Ulysses by Piero Lulli The 1956 film Helen of Troy by Stanley Baker The 1961 film The Trojan Horse by Arturo Dominici The 1962 film The Fury of Achilles by Gordon Mitchell The 1997 television miniseries The Odyssey by Richard Trewett The 2003 television miniseries Helen of Troy by Joe Montana The 2004 film Troy by Brad Pitt The 2018 TV series Troy: Fall of a City by David Gyasi Architecture In 1890, Elisabeth of Bavaria, Empress of Austria, had a summer palace built in Corfu. The building is named the Achilleion, after Achilles. Its paintings and statuary depict scenes from the Trojan War, with particular focus on Achilles. The Wellington Monument is a statue representing Achilles erected as a memorial to Arthur Wellesley, the first duke of Wellington, and his victories in the Peninsular War and the latter stages of the Napoleonic Wars. Namesakes The name of Achilles has been used for at least nine Royal Navy warships since 1744 – both as and with the French spelling . A 60-gun ship of that name served at the Battle of Belleisle in 1761 while a 74-gun ship served at the Battle of Trafalgar. Other battle honours include Walcheren 1809. An armored cruiser of that name served in the Royal Navy during the First World War. was a which served with the Royal New Zealand Navy in World War II. It became famous for its part in the Battle of the River Plate, alongside and . In addition to earning the battle honour 'River Plate', HMNZS Achilles also served at Guadalcanal 1942–1943 and Okinawa in 1945. After returning to the Royal Navy, the ship was sold to the Indian Navy in 1948, but when she was scrapped parts of the ship were saved and preserved in New Zealand. A species of lizard, Anolis achilles, which has widened heel plates, is named for Achilles. Gallery References Further reading Ileana Chirassi Colombo (1977), "Heroes Achilleus – Theos Apollon." In Il Mito Greco, edd. Bruno Gentili and Giuseppe Paione. Rome: Edizione dell'Ateneo e Bizzarri. Anthony Edwards (1985a), "Achilles in the Underworld: Iliad, Odyssey, and Æthiopis". Greek, Roman, and Byzantine Studies. 26: pp. 215–227. Anthony Edwards (1985b), "Achilles in the Odyssey: Ideologies of Heroism in the Homeric Epic". Beiträge zur klassischen Philologie. 171. Graves, Robert, The Greek Myths, Harmondsworth, London, England, Penguin Books, 1960. Graves, Robert, The Greek Myths: The Complete and Definitive Edition. Penguin Books Limited. 2017. Hélène Monsacré (1984), Les larmes d'Achille. Le héros, la femme et la souffrance dans la poésie d'Homère, Paris: Albin Michel. Gregory Nagy (1984), The Name of Achilles: Questions of Etymology and 'Folk Etymology, Illinois Classical Studies. 19. Gregory Nagy (1999), The Best of The Acheans: Concepts of the Hero in Archaic Greek Poetry. Johns Hopkins University Press (revised edition, online). Dale S. Sinos (1991), The Entry of Achilles into Greek Epic, PhD thesis, Johns Hopkins University. Ann Arbor, Michigan: University Microfilms International. Jonathan S. Burgess (2009), The Death and Afterlife of Achilles. Baltimore: Johns Hopkins University Press. Abrantes, M.C. (2016), Themes of the Trojan Cycle: Contribution to the study of the greek mythological tradition (Coimbra). External links Trojan War Resources Gallery of the Ancient Art: Achilles Poem by Florence Earle Coates Greek mythological heroes Kings of the Myrmidons Achaean Leaders Thessalians in the Trojan War Metamorphoses characters Mythological rapists Demigods in classical mythology LGBT themes in Greek mythology Deeds of Apollo Medea
3110383
https://en.wikipedia.org/wiki/Defence%20Information%20Infrastructure
Defence Information Infrastructure
Defence Information Infrastructure (DII) is a secure military network owned by the United Kingdom's Ministry of Defence MOD. It is used by all branches of the armed forces, including the Royal Navy, British Army and Royal Air Force as well as MOD civil servants. It reaches to deployed bases and ships at sea, but not to aircraft in flight. The partnership developing DII is called the Atlas Consortium and is made up of DXC Technology (formerly EDS), Fujitsu, Airbus Defence and Space (formerly EADS Defence & Security) and CGI (formerly Logica). Starting in May 2016, MOD users of DII begin to migrate to the New Style of IT within the defence to be known as MODNET; again supported by ATLAS. Overview DII supports 2,000 MOD sites with some 150,000 terminals (desktops and laptops) and 300,000 user accounts. It is designed to offer a high level of resilience, flexibility, and security in the provision of connectivity from ‘business space to battlespace’ in MOD offices in the UK, bases overseas, at sea, and on the front line. It aims to rationalise and improve IT provision for the defence sector in the 21st century; involving a major culture change for MOD users and their ways of working through a structure of shared working areas with controlled security and access. It should provide a records management system and search facility together with a range of office services. It hosts several hundred COTS (commercial off-the-shelf) and bespoke MOD applications from a range of suppliers judged to meet the required security standards. The network handles alphanumeric data, graphics, and video. The system carries information from Restricted to above-Secret levels, but users are able to see only the data and applications for which they are authorised. Incremental approach In order to de-risk the programme Atlas and the MOD took an incremental approach to the development and implementation of DII, with a separate contract for each increment. The extended timeline allowed the MOD flexibility in defining its requirements. Increment 1: Contract awarded March 2005. This covered 70,000 user access devices (UADs) and 200,000 user accounts in the Restricted and Secret domains in 680 fixed locations. Increment 2a: Contract awarded December 2006. This was for an additional 44,000 UADs and 58,000 user accounts in the Restricted and Secret domains, again in fixed locations. Increment 2b: Contract awarded September 2007: This extended DII(F) into the deployed environment with the provision of UADs to support land and maritime deployed operations. Increment 2c: Signed in January 2009. This extended the DII footprint into the above-Secret domain to support a number of key operations and intelligence initiatives. Increment 3a: Contract awarded January 2010. Atlas provided 42,000 UADs operating in the Restricted and Secret domains to the remaining MOD fixed sites. This supported some 60,000 personnel, notably within the RAF, at Joint Helicopter Command and other MOD locations. Increment 3a received an MOD Chief of Defence Materiel commendation. Costs and transparency The Ministry of Defence informed Parliament the system would cost £2.3bn, even though it knew the cost would be at least £5.8bn. By 2008 the programme was running at least 18 months late; had delivered only 29,000 of a contracted 63,000 terminals; and had delivered none of the contracted Secret capability. In January 2010 the Parliamentary Under-Secretary of State for Defence announced that the Ministry of Defence had authorised DII increment 3a at a cost of around £540 million to provide 42,000 terminals within the RAF and at Joint Helicopter Command. He stated that the project would deliver "benefits" worth over £1.6 billion over the 10 years of the contract. That year the project was scheduled to cost at least £7bn, however, the UK government said it might attempt to reduce this sum. By 2014 the rollout of all UK terminals was complete and a refresh of the original desktops and printers to new hardware underway. The overseas rollout was coming to an end and well over half the fleet, including aircraft carrier HMS Queen Elizabeth, equipped. The final part of Secret capability deployment was scheduled to complete in summer of 2014. References External links Defence Equipment and Support at the UK Ministry Of Defence (official website) Command and control Computer networks Information technology organisations based in the United Kingdom Military communications of the United Kingdom
9519567
https://en.wikipedia.org/wiki/HTTP%20403
HTTP 403
The HTTP 403 is an HTTP status code meaning access to the requested resource is forbidden. The server understood the request, but will not fulfill it. Specifications HTTP 403 provides a distinct error case from HTTP 401; while HTTP 401 is returned when the client has not authenticated, and implies that a successful response may be returned following valid authentication, HTTP 403 is returned when the client is not permitted access to the resource despite providing authentication such as insufficient permissions of the authenticated account. Error 403: "The server understood the request, but is refusing to authorize it.", RFC 7231 Error 401: "The request requires user authentication. The response MUST include a WWW-Authenticate header field (section 14.47) containing a challenge applicable to the requested resource. The client MAY repeat the request with a suitable Authorization header field (section 14.8). If the request already included Authorization credentials, then the 401 response indicates that authorization has been refused for those credentials." RFC2616 See "403 substatus error codes for IIS" for possible reasons of why the webserver is refusing to fulfill the request. The Apache web server returns 403 Forbidden in response to requests for URL paths that correspond to file system directories when directory listings have been disabled in the server and there is no Directory Index directive to specify an existing file to be returned to the browser. Some administrators configure the Mod proxy extension to Apache to block such requests and this will also return 403 Forbidden. Microsoft IIS responds in the same way when directory listings are denied in that server. In WebDAV, the 403 Forbidden response will be returned by the server if the client issued a PROPFIND request but did not also issue the required Depth header or issued a Depth header of infinity. Substatus error codes for IIS The following nonstandard codes are returned by Microsoft's Internet Information Services, and are not officially recognized by IANA. 403.1 – Execute access forbidden 403.2 – Read access forbidden 403.3 – Write access forbidden 403.4 – SSL required 403.5 – SSL 128 required 403.6 – IP address rejected 403.7 – Client certificate required 403.8 – Site access denied 403.9 – Too many users 403.10 – Invalid configuration 403.11 – Password change 403.12 – Mapper denied access 403.13 – Client certificate revoked 403.14 – Directory listing denied 403.15 – Client Access Licenses exceeded 403.16 – Client certificate is untrusted or invalid 403.17 – Client certificate has expired or is not yet valid 403.18 – Cannot execute request from that application pool 403.19 – Cannot execute CGIs for the client in this application pool 403.20 – Passport logon failed 403.21 – Source access denied 403.22 – Infinite depth is denied 403.502 – Too many requests from the same client IP; Dynamic IP Restriction limit reached 403.503 – Rejected due to IP address restriction See also List of HTTP status codes URL redirection References External links Apache Module mod_proxy – Forward Working with SELinux Contexts Labeling files Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content Computer error messages Hypertext Transfer Protocol status codes
9448373
https://en.wikipedia.org/wiki/D-Wave%20Systems
D-Wave Systems
D-Wave Systems Inc. is a Canadian quantum computing company, based in Burnaby, British Columbia, Canada. D-Wave was the world's first company to sell computers to exploit quantum effects in their operation. D-Wave's early customers include Lockheed Martin, University of Southern California, Google/NASA and Los Alamos National Lab. In 2015, D-Wave's 2X Quantum Computer with more than 1,000 qubits was installed at the Quantum Artificial Intelligence Lab at NASA Ames Research Center. They have subsequently shipped systems with 2,048 qubits. In 2019, D-Wave announced a 5000 qubit system available mid-2020, using their new Pegasus chip with 15 connections per qubit. D-Wave does not implement a generic quantum computer; instead, their computers implement specialized quantum annealing. History D-Wave was founded by Haig Farris (former chair of board), Geordie Rose (former CEO/CTO), Bob Wiens (former CFO), and Alexandre Zagoskin (former VP Research and Chief Scientist). Farris taught a business course at the University of British Columbia (UBC), where Rose obtained his PhD, and Zagoskin was a postdoctoral fellow. The company name refers to their first qubit designs, which used d-wave superconductors. D-Wave operated as an offshoot from UBC, while maintaining ties with the Department of Physics and Astronomy. It funded academic research in quantum computing, thus building a collaborative network of research scientists. The company collaborated with several universities and institutions, including UBC, IPHT Jena, Université de Sherbrooke, University of Toronto, University of Twente, Chalmers University of Technology, University of Erlangen, and Jet Propulsion Laboratory. These partnerships were listed on D-Wave's website until 2005. In June 2014, D-Wave announced a new quantum applications ecosystem with computational finance firm 1QB Information Technologies (1QBit) and cancer research group DNA-SEQ to focus on solving real-world problems with quantum hardware. On May 11, 2011, D-Wave Systems announced D-Wave One, described as "the world's first commercially available quantum computer", operating on a 128-qubit chipset using quantum annealing (a general method for finding the global minimum of a function by a process using quantum fluctuations) to solve optimization problems. The D-Wave One was built on early prototypes such as D-Wave's Orion Quantum Computer. The prototype was a 16-qubit quantum annealing processor, demonstrated on February 13, 2007, at the Computer History Museum in Mountain View, California. D-Wave demonstrated what they claimed to be a 28-qubit quantum annealing processor on November 12, 2007. The chip was fabricated at the NASA Jet Propulsion Laboratory Microdevices Lab in Pasadena, California. In May 2013, a collaboration between NASA, Google and the Universities Space Research Association (USRA) launched a Quantum Artificial Intelligence Lab based on the D-Wave Two 512-qubit quantum computer that would be used for research into machine learning, among other fields of study. On August 20, 2015, D-Wave Systems announced the general availability of the D-Wave 2X system, a 1000+ qubit quantum computer. This was followed by an announcement on September 28, 2015, that it had been installed at the Quantum Artificial Intelligence Lab at NASA Ames Research Center. In January 2017, D-Wave released the D-Wave 2000Q and an open source repository containing software tools for quantum annealers. It contains Qbsolv, which is a piece of open-source software that solves QUBO problems on both company's quantum processors and classic hardware architectures. D-Wave operated from various locations in Vancouver, British Columbia, and laboratory spaces at UBC before moving to its current location in the neighboring suburb of Burnaby. D-Wave also has offices in Palo Alto and Vienna, USA. Computer systems The first commercially produced D-Wave processor was a programmable, superconducting integrated circuit with up to 128 pair-wise coupled superconducting flux qubits. The 128-qubit processor was superseded by a 512-qubit processor in 2013. The processor is designed to implement a special-purpose quantum annealing as opposed to being operated as a universal gate-model quantum computer. The underlying ideas for the D-Wave approach arose from experimental results in condensed matter physics, and in particular work on quantum annealing in magnets performed by Gabriel Aeppli, Thomas Felix Rosenbaum and collaborators, who had been checking the advantages, proposed by Bikas K. Chakrabarti & collaborators, of quantum tunneling/fluctuations in the search for ground state(s) in spin glasses. These ideas were later recast in the language of quantum computation by MIT physicists Edward Farhi, Seth Lloyd, Terry Orlando, and Bill Kaminsky, whose publications in 2000 and 2004 provided both a theoretical model for quantum computation that fit with the earlier work in quantum magnetism (specifically the adiabatic quantum computing model and quantum annealing, its finite temperature variant), and a specific enablement of that idea using superconducting flux qubits which is a close cousin to the designs D-Wave produced. In order to understand the origins of much of the controversy around the D-Wave approach, it is important to note that the origins of the D-Wave approach to quantum computation arose not from the conventional quantum information field, but from experimental condensed matter physics. D-Wave maintains a list of peer-reviewed technical publications by their own scientists and others on their website. Orion prototype On February 13, 2007, D-Wave demonstrated the Orion system, running three different applications at the Computer History Museum in Mountain View, California. This marked the first public demonstration of, supposedly, a quantum computer and associated service. The first application, an example of pattern matching, performed a search for a similar compound to a known drug within a database of molecules. The next application computed a seating arrangement for an event subject to compatibilities and incompatibilities between guests. The last involved solving a Sudoku puzzle. The processors at the heart of D-Wave's "Orion quantum computing system" are designed for use as hardware accelerator processors rather than general-purpose computer microprocessors. The system is designed to solve a particular NP-complete problem related to the two dimensional Ising model in a magnetic field. D-Wave terms the device a 16-qubit superconducting adiabatic quantum computer processor. According to the company, a conventional front end running an application that requires the solution of an NP-complete problem, such as pattern matching, passes the problem to the Orion system. According to Geordie Rose, founder and Chief Technology Officer of D-Wave, NP-complete problems "are probably not exactly solvable, no matter how big, fast or advanced computers get"; the adiabatic quantum computer used by the Orion system is intended to quickly compute an approximate solution. 2009 Google demonstration On December 8, 2009, at the Neural Information Processing Systems (NeurIPS) conference, a Google research team led by Hartmut Neven used D-Wave's processor to train a binary image classifier. D-Wave One On May 11, 2011, D-Wave Systems announced the D-Wave One, an integrated quantum computer system running on a 128-qubit processor. The processor used in the D-Wave One, code-named "Rainier," performs a single mathematical operation, discrete optimization. Rainier uses quantum annealing to solve optimization problems. The D-Wave One was claimed to be the world's first commercially available quantum computer system. Its price was quoted at approximately US$10,000,000. A research team led by Matthias Troyer and Daniel Lidar found that, while there is evidence of quantum annealing in D-Wave One, they saw no speed increase compared to classical computers. They implemented an optimized classical algorithm to solve the same particular problem as the D-Wave One. Lockheed Martin and D-Wave collaboration On May 25, 2011, Lockheed Martin signed a multi-year contract with D-Wave Systems to realize the benefits based upon a quantum annealing processor applied to some of Lockheed's most challenging computation problems. The contract included purchase of the D-Wave One quantum computer, maintenance, and associated professional services. Optimization problem-solving in protein structure determination In August 2012, a team of Harvard University researchers presented results of the largest protein-folding problem solved to date using a quantum computer. The researchers solved instances of a lattice protein folding model, known as the Miyazawa–Jernigan model, on a D-Wave One quantum computer. D-Wave Two In early 2012, D-Wave Systems revealed a 512-qubit quantum computer, code-named Vesuvius, which was launched as a production processor in 2013. In May 2013, Catherine McGeoch, a consultant for D-Wave, published the first comparison of the technology against regular top-end desktop computers running an optimization algorithm. Using a configuration with 439 qubits, the system performed 3,600 times as fast as CPLEX, the best algorithm on the conventional machine, solving problems with 100 or more variables in half a second compared with half an hour. The results are presented at the Computing Frontiers 2013 conference. In March 2013 several groups of researchers at the Adiabatic Quantum Computing workshop at the Institute of Physics in London produced evidence, though only indirect, of quantum entanglement in the D-Wave chips. In May 2013 it was announced that a collaboration between NASA, Google and the USRA launched a Quantum Artificial Intelligence Lab at the NASA Advanced Supercomputing Division at Ames Research Center in California, using a 512-qubit D-Wave Two that would be used for research into machine learning, among other fields of study. D-Wave 2X and D-Wave 2000Q On August 20, 2015, D-Wave released general availability of their D-Wave 2X computer, with 1000 qubits in a Chimera graph architecture (although, due to magnetic offsets and manufacturing variability inherent in the superconductor circuit fabrication, fewer than 1152 qubits are functional and available for use; the exact number of qubits yielded will vary with each specific processor manufactured). This was accompanied by a report comparing speeds with high-end single threaded CPUs. Unlike previous reports, this one explicitly stated that question of quantum speedup was not something they were trying to address, and focused on constant-factor performance gains over classical hardware. For general-purpose problems, a speedup of 15x was reported, but it is worth noting that these classical algorithms benefit efficiently from parallelization—so that the computer would be performing on par with, perhaps, 30 high-end single-threaded cores. The D-Wave 2X processor is based on a 2048-qubit chip with half of the qubits disabled; these were activated in the D-Wave 2000Q. Pegasus In February 2019 D-Wave announced their next-generation Pegasus quantum processor chip, announcing that it would be "the world’s most connected commercial quantum system," with 15 connections per qubit instead of 6; that the next-generation system would use the Pegasus chip; that it would have more than 5000 qubits and reduced noise; and that it would be available in mid-2020. A description of Pegasus and how it differs from the previous "Chimera" architecture has been available to the public. Comparison of D-Wave systems See also Adiabatic quantum computation Analog computer AQUA@home Flux qubit Quantum annealing Superconducting quantum computing IBM Q System One References External links Companies based in Burnaby Technology companies established in 1999 Computer hardware companies Quantum computing Quantum information science Technology companies of Canada Privately held companies of Canada 1999 establishments in British Columbia
22596333
https://en.wikipedia.org/wiki/VideoThang
VideoThang
VideoThang was free video editing software for Windows 2000, XP, and Vista. The software has three parts to it which are My Stuff, Edit My Stuff, and My Mix. The software accepts MOV, AVI, MPG, MP4, PNG, WMV, FLV, and MP3 standards. Its official website is now no longer available. Reception Jan Ozer, of Pcmag, said that the software "suffers from several unfortunate design and implementation flaws that dramatically limit output quality and overall utility." Jon L. Jacobi, of PC World, said that the software "may not be the most flexible multimedia editor in the world, but the trim/zoom basics are there, it's free, and it's so simple to use that just about anyone in the world should be able figure it out." Amit Agarwal, of Digital Inspiration, said that the software "doesn’t offer loads of features like other video editors but is perfect for making quick video slideshows of your pictures that you can upload on the web or share via email." References External links VideoThang 2.1.0 at CNET Download.com Freeware Video editing software
6661198
https://en.wikipedia.org/wiki/Computeractive
Computeractive
Computeractive (sometimes written as Computeract!ve, to reflect the logo) is a fortnightly computer magazine published by Future plc in the United Kingdom. It is the sister magazine to Web User. History and profile It was first published in February 1998 by VNU Business Publications, which was bought by Incisive Media in 2007. In February 2013 it was sold to Dennis Publishing. Its sister magazine is The Ultimate Guide series. Based on fortnightly sales, confirmed by the UK's Audit Bureau of Circulation, Computeractive is the UK's best-selling computer magazine. The iPad app version of the magazine was launched in January 2012. An ebook version of Computeractive is provided by Zmags, although purchasers cannot read the magazine offline. Future acquired Dennis Publishing and its computing division including Computeractive in 2021. Contents The magazine is split into the following sections: News – summary of recent technology news Question of the Fortnight – essay on a chosen question Protect Your Tech – summary of recent security news and latest preventative measures Letters – letters from readers Consumeractive – legal help for items bought online Grow Your Family Tree – tips for making family trees Best Free Software – reviews of free software Named & Shamed – warns readers of unsafe programs Reviews – reviews of consumer hardware and software by the magazine's staff and various freelance journalists. Workshops & Tips – demonstrates processes which can be done on a device What's All The Fuss About? – summarises a new technology Cover Features – special features Problems Solved – solved reader problems Reader Support – solves reader problems with software bought from the Computeractive Store Jargon Buster – explains jargon Easy When You Know How – special workshop References External links Computeractive homepage Archived Computeractive magazines on the Internet Archive 1998 establishments in the United Kingdom Biweekly magazines published in the United Kingdom Computer magazines published in the United Kingdom Magazines established in 1998 Mass media in Bath, Somerset
6082474
https://en.wikipedia.org/wiki/2006%20Notre%20Dame%20Fighting%20Irish%20football%20team
2006 Notre Dame Fighting Irish football team
The 2006 Notre Dame Fighting Irish football team represented the University of Notre Dame in the 2006 NCAA Division I FBS football season. The team was coached by Charlie Weis and played its home games at Notre Dame Stadium in South Bend, Indiana. The team completed the season with a record of ten wins and three losses that culminated in a post-season appearance in the 2007 Sugar Bowl and a number 19 ranking in the nation. Pre-season After finishing 9–3 in 2005, Notre Dame began the 2006 season ranked No. 3 in the USA Today Coaches Poll and No. 2 in the Associated Press Poll. These were Notre Dame's highest preseason rankings since 1994, when they occupied the same positions in both polls. Roster changes The Irish lost nine former starters to graduation and the NFL after the 2005 season, including five offensive starters, three defensive, and placekicker D.J. Fitzpatrick. However, the Irish returned many key players such as quarterback Brady Quinn, wide receiver Jeff Samardzija, running back Darius Walker, and safety Tom Zbikowski from the previous year's squad, Notre Dame received much pre-season hype as a possible national championship contender. Recruits In Weis' first full year of recruiting, the Irish signed 28 recruits. The top ten ranked recruiting class, included three five star recruits on offense and 14 four star recruits with eight on offense and six on defense. Award candidates Quinn also entered the season as one of the favorites to win the coveted Heisman Trophy. Along with Quinn, the following Fighting Irish football players were named to national award watchlists for the 2006 season: Brady Quinn – Maxwell Award, Walter Camp Award Jeff Samardzija – Maxwell Award, Walter Camp Award Darius Walker – Maxwell Award Tom Zbikowski – Nagurski Award, Bednarik Award Ryan Harris – Outland Trophy Victor Abiamiri – Ted Hendricks Award John Sullivan – Dave Rimington Trophy Notre Dame's three players on the Maxwell Award watchlist tied Miami, Michigan, Ohio State, and USC for most nominees. Schedule Roster Coaching staff Game summaries Georgia Tech Pregame Line: ND −7.5 Georgia Tech drew first blood when quarterback Reggie Ball connected on a four-yard touchdown pass with receiver Calvin Johnson at the end of the first quarter. Georgia Tech's defense continued to menace 3rd-ranked Notre Dame's offense, while a Travis Bell field goal increased Tech's lead to 10–0. It was the last time Georgia Tech would score, however. Notre Dame orchestrated a 14-play, 80-yard drive right before the half, punctuated by a five-yard rushing touchdown from Brady Quinn, to close the score to 10–7 at the half. Coach Charlie Weis adjusted at halftime and began the second half determined to establish the Irish running game. The move paid off when running back Darius Walker hit paydirt on Notre Dame's first drive of the second half, scoring on a 13-yard touchdown run to put the Irish ahead for the first time in 2006, 14–10. Both defenses tightened, as the teams traded punts. With Notre Dame facing a 4th-and-1 at the Georgia Tech 47-yard line with 1:10 left to play in the game, Georgia Tech appeared to be on the verge of getting the ball back with a chance to win the game. However, Weis gambled and elected to go for the first down rather than punt. Weis' gamble was rewarded when Quinn picked up the yard on a quarterback sneak, giving Notre Dame the first down and enabling them to run the clock out for the 14–10 victory. Quinn completed 23 of 38 passes for 246 yards. Quinn rushed for a score, but was held without a passing touchdown. Walker rushed 22 times for 99 yards and one touchdown, while Rhema McKnight was Notre Dame's leading receiver with 8 receptions for 108 yards. Despite being confounded by Georgia Tech's defense all night, Notre Dame was able to seize control during the second half and walk away with the victory in its 2006 season opener. Both teams notably had a player who would go on to be better known in a different sport, for Notre Dame wide receiver Jeff Samardzija would join Major League Baseball's Chicago Cubs and Georgia Tech defensive lineman Joe Anoa'i would sign with WWE and become a multi-time world champion as Roman Reigns. Penn State Pregame Line: ND −8.5 Penn State came to Notre Dame for the first time since the 1992 Snow Bowl game between the two. The game began as a defensive battle with Notre Dame scoring the only points of the first quarter on a field goal. However, the Irish offense picked up in the second quarter as quarterback Brady Quinn threw two touchdown passes (his first of the season) to Jeff Samardzija and Rhema McKnight. With another field goal, Notre Dame led 20–0 at the half. In the third quarter Penn State quarterback, Anthony Morelli fumbled the ball during a lateral pass as he ran an option play. Tom Zbikowski picked up the fumble and ran it for a touchdown. Penn State would score their first points later in the quarter on a 28-yard field goal by Kevin Kelly, but the Irish scored again on a 1-yard touchdown run by Travis Thomas. In the fourth quarter Brady Quinn threw a third touchdown to Darius Walker, Morelli threw his only touchdown of the day to Deon Butler, and Penn State running back Daryll Clark ran a 5-yard touchdown with time running out. The game ended with Notre Dame winning 41–17. Michigan Pregame Line: ND −5.5 The Michigan Wolverines came to Notre Dame having lost three of the last four games to the Irish and having not won at Notre Dame since 1994, the year before Lloyd Carr became head coach. The game began with Notre Dame receiving the ball on the opening kickoff. On the second play, Brady Quinn's pass was intercepted by Prescott Burgess who ran it back for a 21-yard touchdown to put Michigan ahead 7–0. After a punt on Notre Dame's next drive Michigan quarterback Chad Henne threw an interception to Chinedum Ndukwe which was returned to the 4-yard line to set up a Brady Quinn touchdown pass to Ashley McConnell. Michigan would score the next 27 points with three touchdown passes by Henne to Mario Manningham and a run by Mike Hart. The Irish would score with a touchdown pass to Jeff Samardzija before halftime to leave the score 34–14. In the third quarter Michigan kicked two more field goals, one after Brady Quinn's second interception in the game. Brady Quinn threw a touchdown in the fourth quarter to Rhema McKnight to end the Irish scoring. The Wolverines ended any chance of a comeback when, while being sacked, Quinn's fumble was returned for a 54-yard touchdown by LaMarr Woodley. The game ended as a Wolverine blowout of 47–21, giving Lloyd Carr his first win in Notre Dame. Michigan State Pregame Line: ND −3.0 The game between Notre Dame and Michigan State in East Lansing seemed doomed to be overshadowed by pregame hype. A controversial incident where Spartan players planted a flag in Notre Dame's field after Michigan State's 2005 win was talked about in the week leading up to the game. Spartan officials said the incident occurred because Notre Dame didn't present the Megaphone Trophy after the game and players needed to celebrate. Irish officials stated that they never presented rivalry trophies after games, but sent them later in the week. More controversy was sparked when it was reported that Irish head coach Charlie Weis told a group of Notre Dame alumni during the summer of 2006 that he would never lose to Michigan State again as head coach. Weis denied it, but nevertheless Spartans used it as motivation. Added to these controversies was the fact that 2006 marks the 40th anniversary of the Game of the Century between the teams. Before the game Michigan State brought back players from that team and retired Bubba Smith's jersey. The controversies continued into the game when a late hit on Michigan State's quarterback by the Notre Dame bench lead to a scuffle between the teams and Charlie Weis claiming an MSU player slapped him in the face. This claim brought a penalty from the officials, and after the game John L. Smith implied that Charlie Weis had lied about a slap that could not be seen on any replay footage. The game was played in windy and rainy conditions for most of the night. Notre Dame won the coin toss and took the ball as Charlie Weis normally does. Michigan State chose to play with the wind at their backs for the first quarter. The commentators for the game, especially Bob Davie, questioned Weis' decision, believing that the windy conditions would affect play significantly. It seemed to as Notre Dame was held without a score for the entire first quarter, while the Spartans threw two quick touchdowns, one after a fumble on a punt return by Tom Zbikowski, and added a field goal before having to change sides. In the second quarter Notre Dame switched to a no-huddle offense with worked to confuse the Spartan defense for a drive allowing Brady Quinn to throw a 32-yard touchdown to Rhema McKnight. On their next drive, however, Quinn threw an interception to Ervin Baldwin which was returned for a 19-yard touchdown to give the Spartans a 24–7 lead. Quinn would throw another touchdown to Jeff Samardzija and Spartan quarterback Drew Stanton would add another touchdown pass to Kerry Reed to end the half with the Spartans leading 31–14. The second half began with a defensive stop by the Irish which allowed Quinn to throw a third touchdown of 62-yards to John Carlson to cut the Spartan lead to 10. However, later in the quarter Michigan State's Jehuu Caulcrick would run for a 30-yard touchdown. The Spartans failed in a two-point conversion attempt leaving the score 37–21 at the end of the third quarter. In the fourth quarter, Michigan State had the ball at the Notre Dame 42-yard line and looked to score again. However a series of miscues and holding penalties halted the Spartan drive and forced them to punt. Quinn took advantage and threw a fourth touchdown to Jeff Samardzija. The Irish attempted a two-point conversion to make their deficit only 8, but failed, leaving the score 37–27 with 8 minutes left in the game. On the ensuing drive, a Stanton fumble was recovered by the Irish on the Spartan 24-yard line. Aided by a pass interference call on 3rd down and 25-yards to go, Quinn would throw his fifth touchdown pass of the evening to Rhema McKnight. The extra point was missed leaving the Spartans ahead 37–33. On the next drive, Stanton threw an interception to Terrail Lambert which was returned 23-yards for the go-ahead touchdown. The Irish led 40–37 with almost 3 minutes left. Stanton would take the Spartans to the Notre Dame 44-yard line before throwing a pass which was tipped twice and which Terrail Lambert would catch off of the back of a Spartan wide receiver to end the game, with the Irish winning 40–37. Purdue Pregame Line: ND −14.0 The Purdue Boilermakers came to Notre Dame undefeated, but still underdogs to the Irish. Notre Dame started the scoring with a 70-yard opening drive capped with an 11-yard run by George West for a touchdown, their first opening drive touchdown of the year. Purdue tied the game later in the quarter with a 7-yard run by Kory Sheets. However, the Irish completed another long drive with a 14-yard touchdown run by Darius Walker to put them in the lead 14–7 at the end of the first quarter. Brady Quinn threw his first touchdown of the game to Rhema McKnight for 6-yards halfway through the second quarter. With a little over a minute remaining before halftime, the Irish faked a field goal and Jeff Samardzija, the holder, ran for a 5-yard touchdown. However, 30 seconds later, Purdue quarterback Curtis Painter threw an 88-yard touchdown pass to Selwyn Lymon to put the halftime score at 28–14, in favor of Notre Dame. The only score in the third quarter was a 12-yard touchdown pass by Brady Quinn to Rhema McKnight to give the Irish a 21-point lead. In the fourth quarter, Curtis Painter threw a 9-yard touchdown to Selwyn Lymon to give the final score of 35–21, Notre Dame winning. At the end of the game, Lymon had 238 receiving yards, the second most yards ever for a Purdue receiver and the most receiving yards ever against the Irish. The teams combined for 955 total yards, and only 242-yards were from rushing. Darius Walker ran for 146 of those yards himself. Stanford Pregame Line: ND −29.5 The Stanford Cardinal came to Notre Dame winless and big underdogs. However, in the first half the Cardinal kept the game closer than expected. The Irish started the game taking their opening drive for a touchdown. Brady Quinn threw an 8-yard pass to Jeff Samardzija to cap off a 91-yard drive which consumed more than seven minutes off the clock. The Cardinal's opening possession took advantage of a porous Irish defense which was without linebacker Travis Thomas and safety Tom Zbikowski, both out with injuries. Stanford drove to the Irish 3-yard line before being forced to kick a field goal after a sure touchdown was dropped. The Cardinal took six minutes off the clock themselves and the first quarter ended with Notre Dame winning 7–3. The second quarter was uneventful until the Notre Dame's final drive, which began with just over two minutes left in the half. Brady Quinn orchestrated a 72-yard drive which resulted in a 16-yard pass to Rhema McKnight to put the Irish up 14–3 at halftime. In the third quarter the Irish began to pull away. Darius Walker ran for a 32-yard touchdown, his longest run of the season, to give the Irish an 18-point lead. Later in the quarter, Carl Gioia added a 32-yard field goal to put the Irish up 24–3 at the end of the third quarter. In the fourth quarter the Cardinal used a trick play to get on the scoreboard again. On a toss play to running back Anthony Kimble, Kimble threw a 57-yard touchdown to a wide open Kelton Lynn. The score brought the Cardinal within 14. Later in the quarter, Brady Quinn would throw his third touchdown of the game to tight end John Carlson to give the final margin of victory, 31–10, in favor of the Irish. UCLA Pregame Line: ND −13 After trailing UCLA for most of the game, Brady Quinn was able to lead Notre Dame to a miraculous last minute comeback that may have saved Notre Dame's BCS hopes, as well as Quinn's Heisman candidacy. Notre Dame got on the board first when Quinn capped a 7-play, 44-yard drive with a two-yard touchdown pass to Jeff Samardzija. UCLA would roar back, however, scoring fourteen unanswered second quarter points before Notre Dame would add a field goal as the quarter expired. Down 14–10 heading into the locker room at halftime, the situation looked grim for the Irish, who were unable to deal with the relentless UCLA defense. Notre Dame would cut the Bruins' lead to one when Carl Gioia capped a long, 14-play, 60-yard drive with a 33-yard field goal near the end of the third quarter. UCLA would answer with a field goal of its own midway through the fourth quarter to push its lead to 17–13. The UCLA defense continued to frustrate the Notre Dame offense, and it appeared the Bruins had the game won after stopping Notre Dame on a fourth-and-1 attempt from the UCLA 35 with 2:25 remaining in the game. UCLA, though, was unable to run the clock out. UCLA was forced to punt after running three straight running plays that netted 6 yards. UCLA was only able to take 1:19 off the clock with its three running plays. After Aaron Perez's 59-yard punt resulted in a touchback, Notre Dame took over on its own 20-yard line with :55 remaining in the game, needing a touchdown to avoid its second loss of the season. Rather than blitz Quinn, UCLA head coach Karl Dorrell opted to rush only his four down linemen. UCLA was unable to generate any kind of a pass rush against the Notre Dame offensive line, allowing the masterful Quinn to pick apart the Bruin defense with surgical precision. On the first play of the drive, Quinn dropped back deep, but was initially unable to find an open man. Quinn started to roll out to his right before he spotted Samardzija along the right sideline and fired a 21-yard strike that moved the Irish to the Notre Dame 41-yard line. Quinn picked up 14 yards on the next play with a completion to wide receiver David Grimes, bringing Notre Dame to the UCLA 45. Before the Bruins knew what hit them, Notre Dame had taken the lead. After taking a five step drop, Quinn pump-faked and began to roll to his right in search of an open receiver. Quinn spotted Samardzija open on the right side of the field and delivered a bullet to the Irish receiver. Samardzija caught the ball at the 30-yard line and then jutted towards the middle of the field, weaving in and out of Bruin defenders before momentarily losing his balance after taking a hit from UCLA safety Dennis Keyes near the 15-yard line. Samardzija was quickly able to regain his footing, jumping the final yard into the end zone and scoring the winning touchdown with the ball raised aloft. The touchdown, which came with just :27 left in the game, was only the third game-winning touchdown in Notre Dame history come with less than :30 remaining in the game, the other two occurring in the 1979 Cotton Bowl Classic and a 1992 game against Penn State. Quinn finished the game 27 of 45 for 304 yards and 2 touchdowns, thrusting himself back into the forefront of the Heisman race with his late game heroics. With the victory, Notre Dame improved its record to 6–1 on the season. Navy Pregame Line: ND −13.5 Brady Quinn has put himself back in Heisman contention after a fantastic performance against Navy. He made 18 of 25 passes and threw for 296 yards making 3 TD passes. He also showed his footwork by taking a TD in from 19 yards out. The Irish started out their scoring quickly with Carl Gioia hitting a 40-yard FG, 3:15 into the game putting them up 3–0 and ended the 1st quarter with a 36-yard pass from Quinn to WR David Grimes to make it a 10–0 game with 1:32 left. Navy got back in the game quickly with a 1-yd run by Kaipo-Noa Kaheaku-Enhada to make 10–7 with 11:39 left in the half, but the Irish came back quickly with Travis Thomas running in a ball 16 yards to make it a 17–7 game with 8 min. left in the half. But Kaheaku-Enhada once again got Navy back in the game with another 1-yard run to make 17–14 with 2:43 left in the half giving Navy only a 3 pt deficit. Quinn turned right around and hit hitting Rhema McKnight with a 33-yard pass and his 2nd TD pass with a 1:19 left to give Notre Dame a 24–14 lead heading into halftime. Quinn continued his dominance in the second half leading 3 strong drives two of them scoring TDs. With 8:10 left in the 3rd, Quinn ran in a TD from 19 yards out to give the Irish a 31–14 lead the drive was helped out by a late hit call on 3rd and 19 that allowed Quinn to make the play. The second drive stalled at the 1 when the Midshipmen's defense held. The third drive however ended with Quinn hitting McKnight with a 6-yard pass and his 2nd TD catch and Quinn's 3rd TD pass with 9:36 left in the game, to give the Irish a 38–14 final. North Carolina Pregame Line: ND −28 Notre Dame gets another win and Brady Quinn makes another case for the Heisman Trophy going 23 of 35 for 346 yards and 4 TDs. The game started with Brady Quinn hitting Rhema McKnight for a 7-yd TD pass and giving Notre Dame a 7–0 lead. But UNC came back with Joe Dailey throwing a 12-yd TD pass to Jesse Holley to knot up the score 7–7. But Notre Dame came back with Quinn throwing an 11-yd strike to John Carlson to close out the 1st quarter 14–7. The 2nd quarter started like the 1st with Quinn hitting McKnight for a 14-yd TD pass putting the Irish up 21–7 and Carl Gioia hit a 27-yd kick to make it 24–7 but UNC's Brandon Tate would return the kickoff 90-yds for a TD, the only saving grace being that the XP was blocked making the score 24–13. The half closed out with Tom Zbikowski returning a punt 52 yds for a TD and increasing the lead to 31–13 going into the half. Joe Dailey would start off the scoring in the second half with a 13-yd pass to Hakeem Nicks but the Irish defense would block another XP attempt making the score 31–19. The Irish would strike back with Quinn hitting Jeff Samardzija with a 42-yd pass to make the score 38–19. UNC would repeat their earlier tandem with Dailey throwing a 72-yd pass to Nicks to cut the deficit to 38–26. But that would be UNC's last hurrah in this game as the Irish defense would prevent anymore scoring and the lone score of the 4th quarter was Darius Walker's 1-yd run to give 45–26 final. Air Force Pregame Line: ND −11.5 Less Than a minute into the game Brady Quinn proved just why he's one of the top QBs in College Football today and he didn't stop there going 14 of 19 for 207 yards passing and 4 TDs. At :54 seconds Quinn hit Jeff Samardzija for a 51-yd TD pass and a 7–0 lead. Less than five minutes later he threw a 1-yd pass to John Carlson to put Notre Dame up 14–0. At 8:40 into the game Air Force got on the board when Zach Sasser kicked a 32-yd field goal to shrink the deficit to 14–3. But Quinn would respond with a 24-yd pass to Rhema McKnight. Air Force was able to block the Extra Point Attempt and Notre Dame was now up 20–3 to finish up the 1st quarter. The second quarter showed off a lot of good defense including a blocked FG attempt that saw Terrail Lambert return the blocked kick 76-yds for a TD to put Notre Dame up 27–3 at the half. Brady Quinn came out of halftime and with 8:33 left in the quarter threw a 23-yd pass to Marcus Freeman, but Air Force once again block Carl Gioia's XP attempt putting Notre Dame up 33–3. And with :17 seconds left in the quarter Shaun Carney threw a 12-yd pass to Beau Suder to make it 33–10 to close out the 3rd quarter of play. The 4th quarter saw Darius Walker run in a TD from 4-yds out with Gioia missing the XP attempt giving Notre Dame a 39–10 lead. Carney then hit Jacobe Kendrick for a 7-yd TD to give the game a 39–17 final. Army Pregame Line: ND −36 In the final home game for the team's senior class, the Irish took the field donning their special green jerseys. The first quarter of the game featured good defense by both teams including a stop on 4th down by the Irish and a pick that led to 3 by Army to give the Black Knights an early 3–0 lead. But in the second quarter the Irish came out firing and less than a minute into the 2nd Brady Quinn handed the ball to Darius Walker and he ran it in 10-yds for the Touchdown making it 7–3 Notre Dame. After a Defensive stop by the Irish they got the ball back and on 9 plays drove down field topping it off with Quinn throwing a 13-yd pass to Jeff Samardzija for the Irish's 2nd TD, but Gioia missed the PAT making the score 13–3 Notre Dame. With just over a minute left in the 1st half Brady Quinn hooked up with Rhema McKnight for an 8-yd touchdown reception and this time Carl Gioia hit the PAT giving Notre Dame a 20–3 lead going into halftime. The Irish kept up the offensive onslaught to start off the 2nd half, scoring a touchdown when receiver David Grimes recovered teammate Darius Walker's fumble in the endzone to give Notre Dame a 27–3 lead. The next Black Knights drive saw an interception by the Irish which led to a 24-yd pass from Quinn to McKnight for a TD extending their lead to 34–3. 4 minutes into the 4th quarter Notre Dame struck again with Darius Walker taking it in from 8-yds out to make it a 41–3 lead for Notre Dame. The drive started out with great field position due to Michael Richardson's 2nd pick of the day. On the last play of the game with no time left on the clock Army was finally able to make it into the endzone on a 12-yd pass from David Pevoto to Tim Dunn to make it a 41–9 final. USC Pregame Line: USC −7 Notre Dame visited the Coliseum with a four-game losing streak to the Trojans. After the epic 2005 game, the Irish were hopeful that they could end their losing streak. The Trojans, however, knew that with a win they would still be in the national title hunt. The game started with the Irish receiving the ball and Brady Quinn throwing a quick 38-yard pass to Rhema McKnight. The Irish drive stalled afterwards and turned the ball over after Quinn's fourth down pass flew errantly into the endzone. The Trojans took over and quarterback John David Booty led them on a 61-yard drive that ended with a 9-yard touchdown pass to Dwayne Jarrett. After the next Irish drive ended with a punt and a return by the Trojans to the Irish 26, Booty completed another touchdown pass to Jarrett to put the Trojans ahead 14–0. On the ensuing Irish drive, Quinn and Darius Walker brought the Irish downfield, allowing Carl Gioia to kick a field goal. The first quarter ended with the Trojans winning 14–3. In the first drive of the second quarter, Booty led the Trojans to the Irish 1-yard line where he sneaked the ball in for USC's third touchdown of the game. On the ensuing drive for the Irish, on a third down, Quinn scrambled for 59-yards, Notre Dame's longest run of the season, to bring the Irish to the USC 17-yard line. Four plays later, a Darius Walker fumble was recovered by the Trojans giving them the ball back. The Irish defense, however, held the Trojans for the first time forcing a punt. The punt was partially blocked giving the Irish the ball back on the 7-yard line. On the next play, Quinn threw a touchdown to Marcus Freeman. The next two drives by the Trojans both ended when Booty threw an interception, but the Irish couldn't capitalize on either, turning the ball over on downs two more times. The half ended with the Trojans leading 21–10. The second half began with a Trojan drive of 65-yards capped with a Chauncey Washington 2-yard touchdown run. The only other score of the third quarter came on Notre Dame's second drive of 58-yards, when Quinn hit Rhema McKnight for a 2-yard touchdown pass on fourth down. The fourth quarter began with the Trojans driving to an eventual 32-yard field goal by Mario Danelo. After the Irish were held, Booty threw a 43-yard touchdown pass to Dwayne Jarrett to give the Trojans a 37–17 lead (Danelo missed the extra point). Quinn drove the Irish 78-yards and threw a 2-yard touchdown pass to Jeff Samardzija to put the Irish deficit to 13 points. However, the onside kick attempt, was recovered by Brian Cushing, who ran it back to give the Trojans a 20-point lead again. Notre Dame's last drive would end on another failed fourth down attempt, giving the Trojans the 44–24 win. Sugar Bowl Post-season Awards After the season, a four Irish players were nominated for or won postseason awards. Geoff Price, was named as a Ray Guy Award semi-finalist, Tom Zbikowski was named as a Jim Thorpe Award semi-finalist, and John Carlson was named as a John Mackey Award finalist. Brady Quinn, after finishing third in balloting for the Heisman Trophy, was named a finalist to two top quarterbacking awards, the Johnny Unitas Award and the Davey O'Brien Award, and won two player of the year awards, the Maxwell Award and the Cingular All-American Player of the Year. Along with the award winners, six Irish players were named to All-American lists. Sam Young was named by The Sporting News as a first team freshman All-American. Five players were named by Sports Illustrated, including Quinn on the second team, and Jeff Samardzija, Rhema McKnight, John Carlson, and Geoff Price as honorable mentions. The AP named Quinn and Samardzija on their second team and Tom Zbikowski on their third team, while Samardzija and Zbikowski were named by the Walter Camp Football Foundation on their second team. Finally, Samardzija was named by the Football Writers Association of America on their first team as well as being named, for the second time, as a Consensus All-American by the NCAA. NFL Draft In the 2007 NFL Draft seven players were taken, including offensive starters Quinn, Ryan Harris and Dan Santucci and defensive starters Victor Abiamiri, Derek Landri, Mike Richardson and Chinedum Ndukwe. Five others also signed contracts with NFL teams, while Samardzija signed a deal with the Chicago Cubs as a baseball pitcher. References Notre Dame Notre Dame Fighting Irish football seasons Notre Dame Fighting Irish football
51609059
https://en.wikipedia.org/wiki/Zaloni
Zaloni
Zaloni, Inc. is a provider of data management software. Overview Zaloni provides DataOps software for big data scale-out architectures, such as Amazon AWS, Microsoft Azure, and Google Cloud. The company focuses on streamlining DataOps for enterprises with their flagship product, the Arena data management platform, which offers an end-to-end data ingestion service, metadata catalog, self-service provisioning, and data governance. They also offer additional add-ons for master data management and professional services. Zaloni is a privately owned, software, and services company headquartered in Durham, North Carolina, United States with offices in Guwahati, Assam, India and Bangalore, Karnataka, India. History The company was founded in 2007 by Ben Sharma and Bijoy Bora as a data management company. After 5 years of working within the industry, Zaloni released its first software product, the Bedrock Data Lake Management platform. In October 2015, the company released Mica, their first self-service data preparation platform. Mica was listed in the Gartner Market Guide for Self-Service Data Preparation (August 25, 2016), showing very robust capabilities among products from over 36 products in self-service data preparation. As of March 2020, the Zaloni Data Platform, which had been created from the merging of Mica and Bedrock, has been renamed the Arena software platform. Technology The Arena software platform is created in such a way that it is storage agnostic. Whether the data is stored on-premises, cloud, multicloud, or hybrid, it can be ingested into the platform to be accessed by governed data users throughout the organization. Zaloni's Arena platform is based on a cloud data architecture written by Ben Sharma, called EndZone Governance. This architecture involves four zones that data travels through from ingestion to consumption. These zones are Transient Landing, Raw, Trusted, and Refined. The platform includes a metadata catalog, workflows for data quality, data preparation, and data collaboration, along with self-service data consumption that delivers data to sandboxes for business tools and applications. Funding On March 7, 2016, Zaloni announced its Series A financing by Sierra Ventures & Baird Capital. As part of the transaction, Mark Fernandes, managing director of Sierra Ventures, joined Zaloni's board of directors. In 2018, Zaloni received a $1.5 million debt offering and in 2020 received a $6 million credit facility from Epresso Capital. As of 2021, the company had raised $7.5 million. Partnerships On September 8, 2016, NetApp announced a partnership with Zaloni on a mid-tier storage for complete lifecycle management of the data lake. Zaloni is also an Amazon Web Services and Microsoft Azure approved partner. References Business software companies Software companies based in North Carolina Big data companies Enterprise software Software companies of the United States
11969224
https://en.wikipedia.org/wiki/List%20of%20Eclipse-based%20software
List of Eclipse-based software
The Eclipse IDE platform can be extended by adding different plug-ins. Notable examples include: Acceleo, an open source code generator that uses EMF-based models to generate any textual language (Java, PHP, Python, etc.). Actifsource, a modeling and code generation workbench. Adobe ColdFusion Builder, the official Adobe IDE for ColdFusion. Adobe Flash Builder (formerly Adobe Flex Builder), an Adobe IDE based on Eclipse for building Flex applications for the Flash Platform and mobile platforms. ADT Eclipse plugin developed by Google for the Android SDK. AnyLogic, a simulation modeling tool developed by The AnyLogic Company. Appcelerator, a cross platform mobile development tool by Axway Appcelerator Aptana, Web IDE based on Eclipse Avaya Dialog Designer, a commercial IDE to build scripts for voice self-service applications. Bioclipse, a visual platform for chemo- and bioinformatics. BIRT Project, open source software project that provides reporting and business intelligence capabilities for rich client and web applications. Bonita Open Solution relies on Eclipse for the modeling of processes, implementing a BPMN and a Web form editors. Cantata IDE is a computer program for software testing at run time of C and C++ programs. CityEngine procedural based city generator. Code Composer Studio Texas Instruments' IDE for microcontroller development. CodeWarrior Freescale's IDE for microcontrollers, since Version 10 (C/C++/Assembly compilers). Compuware OptimalJ, a model-driven development environment for Java Coverity Static Analysis, which finds crash-causing defects and security vulnerabilities in code DBeaver, universal database manager and SQL client ECLAIR, a tool for automatic program analysis, verification, testing and transformation EasyEclipse, bundled distributions of the Eclipse IDE Elysium, a frontend for the LilyPond music-engraving program g-Eclipse, an integrated workbench framework to access the power of existing Grid infrastructures GForge Advanced Server - Collaboration tool with multiframe view through Eclipse integration for multiple functions Google Plugin for Eclipse, Development tools to design, build, optimize and deploy cloud applications to Google App Engine GumTree, an integrated workbench for instrument control and data analysis IBM Rational Application Developer for WebSphere Software, supporting design, development, analysis, testing, profiling and deployment of Java-based applications. It used to be named IBM WebSphere Studio Application Developer. IBM Rational Functional Tester is an automated functional regression testing tool to test Web, Java, .NET, Siebel, SAP and Oracle applications. IBM Rational Software Architect, supporting design with UML and development of applications. This product replaces some Rational Rose products family. IBM Rational Software Modeler is a robust, scalable solution for requirements elaboration, design, and general modeling. It supports design with UML. This product replaces some Rational Rose products family. IBM Rational Performance Tester is a performance testing tool used to identify the presence and cause of system performance bottlenecks. IBM Rational Method Composer, a software development process management and delivery platform IBM Rational Publishing Engine, a document generation solution IBM WebSphere Portlet Factory is a software tool to develop portlets. IBM Lotus Expeditor a client-server platform that provides a framework to develop lightweight rich client applications for desktops and various mobile devices. IBM Lotus Symphony a set of applications free of charge: a word processor, a spreadsheet program, and a presentation program, each based on OpenOffice.org IBM Notes (since version 8), a client-server collaborative application platform, used for enterprise email and calendaring, as well as for collaborative business applications. Intel FPGA (formerly Altera), Nios-II EDS, embedded C/C++ software development environment for Intel Nios-II and ARM processors in the HPS part of SoC FPGA's. Jasper Studio, a development environment for Jasper Reports Kalypso (software), an Open Source software project, that can be used as a general modeling system. It is focused mainly on numerical simulations in water management such as generation of concepts for flood prevention and protection or risk management. KNIME, an open source data analytics, reporting and integration platform. Maveryx plug-in to Eclipse. It is an Open Source tool that provides testers with automated testing capabilities for functional testing, regression testing, GUI testing and data-driven testing. MontaVista DevRocket, plug-in to Eclipse MyEclipse, from Genuitec is a robust, full featured, full-stack IDE solution which also enables Angular Typescript development from within the Java-Eclipse platform using its Webclipse plug-in and Angular IDE solution. Nodeclipse is Eclipse-based IDE for Node.js development. Nuxeo RCP, an open source rich client platform for ECM applications. OEPE, Oracle Enterprise Pack for Eclipse. OMNeT++, Network Simulation Framework. Parasoft C/C++test, an automated C and C++ software testing tool for static analysis, Unit test-case generation and execution, regression testing, runtime error detection, and code review. Parasoft Jtest, an automated Java software testing tool for static analysis, Unit test-case generation and execution, regression testing, runtime error detection, and code review. Parasoft SOAtest tool suite for testing and validating APIs and API-driven applications (e.g., cloud, mobile apps, SOA). Parasoft Virtualize, a service virtualization product that can create, deploy, and manage simulated test environments for software development and software testing purposes. Photran is an open source IDE with functions for editing and debugging Fortran code. PHP Development Tools (or simply PDT) is an open source IDE with basic functions for editing and debugging PHP application. PHPEclipse is an open source PHP IDE with integrated debugging, developed and supported by a committed community. Polyspace detects and proves the absence of certain run-time errors in source code with a plugin for Eclipse for C, C++, and Ada languages Powerflasher FDT is an Eclipse-based integrated development environment for building Flex applications for the Flash Platform and mobile platforms. Pulse (ALM) from Genuitec is a free or for-fee service intended for Eclipse tool management and application delivery, collaboration and management. PyDev is an Integrated Development Environment (IDE) used for programming in Python supporting code refactoring, graphical debugging, code analysis among other features. Red Hat JBoss Developer Studio Remote Component Environment is an integration platform for engineers which enables integration, workflow management and data management in a distributed environment. RSSOwl, a Java RSS/RDF/Atom newsreader SAP NetWeaver Developer Studio, an IDE for most of the Java part of SAP technology Servoy, Servoy 4.0 is an Eclipse plug in to write business applications. Sirius allows creating custom graphical modeling workbenches by leveraging the Eclipse Modeling technologies, including EMF and GMF. Spatiotemporal Epidemiological Modeler (STEM), is an open source tool for creating and studying new mathematical models of Infectious Disease. SpringSource STS, plugin for Spring framework based development Sybase PowerDesigner, a data-modeling and collaborative design tool for enterprises that need to build or re-engineer applications. Teamcenter, from version 2007.1 this Product Lifecycle Management software uses Eclipse as platform. Talend STUDIO, an ETL IDE used to extract data from databases or csv files, treat the data, and load them to a database or csv file or a standard Tensilica Xtensa Xplorer, an IDE which integrates software development, processor configuration and optimization, multiple-processor SOC architecture tools and SOC simulation into one common design environment. ThreadSafe, a static analysis tool for Java focused on finding and diagnosing concurrency bugs (race conditions, deadlocks, ...) uDig, a user-friendly GIS map-making program VistaMax IDE for Maemo, a visual Integrated Development Environment based on Eclipse VP/MS, Eclipse-based modeling language and product lifecycle management tool by CSC. WireframeSketcher, a wireframing tool for desktop, web and mobile applications. XMind, a cross-platform mind-mapping/brainstorming/presentation software application. Xilinx's EDK (Embedded Development Kit) is the development package for building MicroBlaze (and PowerPC) embedded processor systems in Xilinx FPGAs as part of the Xilinx IDE software (until version 14.7) Xilinx SDK as part of the newer Vivado design software package Zen Coding, A set of plugins for HTML and CSS hi-speed coding. Zend Studio An IDE used for developing PHP websites and web services. Zoom A profiling and performance analysis tool for Linux and Mac OS X. References Eclipse-based software
1472869
https://en.wikipedia.org/wiki/Tulip%20Computers
Tulip Computers
Tulip Computers NV was a Dutch computer manufacturer that manufactured PC clones. History It was founded in 1979 as Compudata, as an importer of American microcomputers. Compudata was the distributor for Europe for the Exidy Sorcerer, a Zilog Z80 based home computer. When Exidy gave up on the Sorcerer in 1979, Compudata licensed the design and manufactured them locally for several years. In 1983 it launched its own PC, the Tulip PC. To achieve 100% compatibility it simply copied the IBM PC, including the BIOS. IBM sued, and after years of litigation, Tulip and IBM settled out of court for an undisclosed amount in 1989. It was listed on the Amsterdam Stock Exchange in 1984. In 1987, Compudata changed its name to Tulip Computers. Tulip made headlines among Commodore computer enthusiasts when it acquired the Commodore brand name in September 1997, and made headlines again in 2003 and 2004, when it tried to grab a share of the games and entertainment markets with Commodore branded products. In 2000, the Government of Bangladesh cancelled a contract, funded by the Dutch government, with Tulip Computers to supply computers. The Bangladesh government reported the price for the computers were too high. Tulip computers sued the Government of Bangladesh in a court in The Hague and secured a verdict that awarded Tulip computer compensation. After supposedly making some headway in the market, it sold the Commodore name to Yeahronimo Media Ventures for €22 million. Negotiations began in the end of 2004; the transaction was completed in March 2005. On 27 September 2007, Tulip announced it wanted to buy back the Commodore brand for one dollar per share. Tulip thought it could make more profit by buying it again, due to the new activities of Commodore on other markets. Tulip sponsored Crystal Palace Football Club between 1991 and 1993 and eponymous professional cycling teams based in Spain (1989–1990) and Belgium (1990–1992), Tulip Computers. On 26 June 2008, Tulip changed its name to Nedfield NV. Nedfield faced serious problems due to the recession, and filed for suspension of payment after several of its subsidiaries went bankrupt. Nedfield NV itself was pronounced bankrupt by the district court of Utrecht on 3 September 2009. See also Tulip System-1, one of the first 16 bit PCs References External links Nedfield.nl on Archive.org Home computer hardware companies Defunct computer hardware companies Defunct companies of the Netherlands Dutch companies established in 1979 Dutch companies disestablished in 2009 Computer companies established in 1979 Computer companies disestablished in 2009 Companies based in Utrecht (province) Amersfoort
59954851
https://en.wikipedia.org/wiki/VTuber
VTuber
A , or , is an online entertainer who uses a virtual avatar generated using computer graphics and real-time motion capture software or technology. A digital trend that originated in Japan in the mid-2010s and, since the early 2020s, has become an international online phenomenon, a majority of VTubers are English and Japanese-speaking YouTubers or live streamers who use avatar designs. By 2020, there were more than 10,000 active VTubers. Although the term alludes to the video platform YouTube, virtual YouTubers also appear on platforms including Niconico, Twitch and Bilibili. The first entertainer to use the phrase "virtual YouTuber", Kizuna AI, began creating content on YouTube in late 2016. Her popularity sparked a VTuber trend in Japan, and spurred the establishment of specialized agencies to promote them, including Hololive Production and . Fan translations and foreign-language VTubers have marked a rise in the trend's international popularity. Virtual YouTubers have appeared in domestic advertising campaigns in Japan, and have broken livestream-related world records. Overview Virtual YouTubers (although more commonly refers as VTubers) are online entertainers who are typically YouTubers or live streamers. They use avatars created with programs such as Live2D, portraying characters designed by online artists. VTubers are not bound by physical limitations, and many of them engage in activities that are unconstrained by their real-world identity. VTubers often portray themselves as a kayfabe character, not unlike professional wrestling; Mace, a WWE wrestler who himself began streaming on Twitch as a VTuber in 2021, remarked that the two professions were "literally the same thing". VTubers are associated with Japanese popular culture and aesthetics, such as anime and manga, and moe anthropomorphism with human or non-human traits. Some VTubers use anthropomorphic avatars, non-human characters such as animals. Technology A VTuber's avatar is typically animated using a webcam and software, which captures the streamer's motions, expressions, and mouth movements, and maps them to a two- or three-dimensional model. Both free and paid programs have been developed, with some capable of being used without a webcam (albeit with pre-determined animations), and some also supporting virtual reality hardware, or hand tracking devices such as the Leap Motion Controller. Some software utilize a smartphone phone camera The animation software Live2D is typically used to rig two-dimensional models constructed from drawn textures, while programs such as VRoid Studio have sometimes been used to create three-dimensional models. Commissioned models can cost as high as US$2,000 depending on their level of detail. Agencies and commercialization Major VTubers are often employed by talent agencies, with business models influenced by those used by idol agencies. Streamers are employed by an agency to portray characters developed by the company, which are then commercialized via merchandising and other promotional appearances, as well as traditional revenue streams such as monetization of their videos, and viewer donations. The use of the term "graduation" to refer to a streamer retiring their character and leaving an agency is also a holdover from the idol industry. History Predecessors In 2009 Cyberlink Youcam was released. This was a software which could be used to animate various characters using your webcam. On 12 February 2010, visual novel maker Nitroplus began uploading videos to its YouTube channel featuring an animated 3D version of its mascot Super Sonico, who would usually talk to the audience about herself or about releases related to the company. On 13 June 2011, UK-based Japanese vlogger Ami Yamato uploaded her first video, which featured an animated, virtual avatar speaking to the camera. In 2012, Japanese company Weathernews Inc. debuted a Vocaloid-styled character called Weatheroid Type A Airi on SOLiVE24, a 24-hour weather live stream on Nico Nico Douga, on YouTube and their website. In 2014, Airi got her own solo program every Thursday and began live broadcasting with motion capture. In 2014 the FaceRig indie software launched on Indiegogo as a EU crowdfunding project, and later that year it was released on Steam becoming the first software suite that enabled live avatars at home via face motion capture that started being actively used on steaming website and YouTube. The Live2D software module enabling 2D avatars and was added one year later in 2015 in collaboration with Live2D, Inc. from Japan. Breakout In late 2016, Kizuna AI, the first VTuber to achieve breakout popularity, made her debut on YouTube. She was the first to coin and use the term "virtual YouTuber". Created by digital production company Activ8 and voice-acted by Nozomi Kasuga, Kizuna AI created a sense of "real intimacy" with fans, as she was responsive to their questions. Within ten months, she had over two million subscribers and later became a culture ambassador of the Japan National Tourism Organization. Kizuna Ai's popularity can be attributed to the oversaturation of traditional webcam YouTubers and for aspects of characters that the audience would not expect. For example, despite having a friendly appearance, Kizuna Ai often swears in her videos when she gets frustrated while playing a game. The VTuber trend Kizuna AI's sudden popularity sparked a VTuber trend. Between May and mid-July 2018, the number of active VTubers increased from 2,000 to 4,000. and followed Kizuna as the second and third most popular VTubers, with 750,000 and 625,000 subscribers respectively. and , two other early VTubers, each gained followings of 500,000 in six months. In the beginning of 2018, Anycolor Inc. (then known as Ichikara) founded the VTuber agency . Nijisanji helped popularise the use of Live2D models instead of the prior focus on 3D models as well as the shift towards livestreaming instead of edited video and clips that was the standard for VTubers like Kizuna Ai. Cover Corporation, a company that was originally developing augmented and virtual reality software, shifted its focus to VTubers by establishing Hololive. After their initial success in Japan, the trend began to expand internationally via their appeal to the anime and manga fandom. Agencies like Hololive and Nijisanji created branches in China, South Korea, Indonesia, and India, as well as English-language branches targeting a global audience. Meanwhile, independent VTubers began to appear in many countries, from Japan to the United States. In July 2018, VTubers had a collective subscriber count of 12.7 million, and more than 720 million total views. By January 2020, there were over 10,000 VTubers. The COVID-19 pandemic led to an overall increase in viewership of video game live streaming in general in 2020, which helped contribute to the growth of VTubers into a mainstream phenomenon. In August 2020, seven of the ten largest Super Chat earners of all time on YouTube were VTubers, including Hololive member at number one, who by that time had earned approximately (approximately US$ in 2020). At the same time, the popularity of VTubers continued to rise on Twitch, with a host of several notable English-speaking VTubers such as VShojo members Projekt Melody and Ironmouse. Pokimane also experimented with avatar-based streams using a model commissioned from a VTuber artist. In September 2020, Anycolor, the management company for Nijisanji, one of the major VTuber agencies in Japan, created an "Aggressive Acts and Slander Countermeasure Team" to offer counselling to victims of harassment and take legal measures against perpetrators of harassment, specifically the online harassment plaguing the Japanese entertainment industry. This announcement came in the wake of Hololive VTuber Mano Aloe's retirement after only two weeks of activity due to online harassment. YouTube's 2020 Culture and Trends report highlights VTubers as one of the notable trends of that year, with 1.5 billion views per month by October. On March 30, 2021, Kizuna AI was chosen as one of Asia's top 60 influencers. In May 2021, Twitch added a VTuber tag for streams as part of a wider expansion of its tag system. In July 2021, Gawr Gura—a member of Hololive's first English branch—overtook Kizuna Ai as the most-subscribed VTuber on YouTube. Cover's CEO Motoaki "Yagoo" Tanigo was selected as one of the Japan's Top 20 Entrepreneurs by Forbes Japan in its January 2022 issue. The following month, in the midst of a subathon event, Ironmouse accumulated the largest number of active paid subscriptions of all streamers on the platform at that point in time, although still behind an overall record previously set by Ludwig. Use in marketing Due to their popularity, companies and organisations have used virtual YouTubers as a method of advertising or bringing attention to a product or service. When SoftBank announced the release of the iPhone XS and XS Max in 2018, Kizuna AI appeared at the event and promoted the products on her channel. In August 2018, Wright Flyer Live Entertainment released a mobile application allowing VTubers to live stream videos while monetizing them and connecting with their viewers. In a news conference in Tokyo, the head of Wright Flyer Live Entertainment stated, "just increasing the number [of VTubers] is not that effective. We want them to keep on doing their activities. [To do that], gaining fans and monetization are essential. So, we are providing a platform to support that". This followed Wright Flyer Live Entertainment's parent company Gree, Inc.'s ¥10 billion ($89.35 million) investment in VTubers, as well as a ¥10 billion sales target by 2020. On June 24, 2019, VTuber Kaguya Luna, in collaboration with Nissin Foods to advertise its Yakisoba UFO noodles, held a live stream with a smartphone attached to a helium balloon. By the end of the stream, the smartphone reached an altitude of above sea level and was noted by Guinness World Records as being the live stream recorded at the highest altitude, breaking the previous record of . Some organizations and companies have employed their own VTuber characters as mascots within marketing. These include the government of Japan's Ibaraki Prefecture (which developed the character of Ibaraki Hiyori), the video streaming service Netflix (which developed the character N-ko promote its anime lineup), Sega (who planned to have in-character streams with Sonic the Hedgehog and his Japanese voice actor Jun'ichi Kanemaru), and anime streaming service Crunchyroll (which launched a YouTube channel for its mascot Crunchyroll-Hime in October 2021). In 2021, Hololive English member Gawr Gura made a background cameo appearance in an anime-themed ad by American fast food chain Taco Bell (which premiered to coincide with the 2020 Summer Olympics in Tokyo). Good Smile Company has begun producing nendoroid's of various Japanese and International Vtuber's since the 2020's. The Fukuoka SoftBank Hawks baseball team also has 2 VTuber mascots, named Takamine Umi (also known as Hawk Kannon Sea) and Aritaka Hina, both unveiled in 2020. They have their own YouTube channel and their own Twitter accounts. Occasionaly, they make appearances on the Fukuoka PayPay Dome's videoboard. See also Avatar (computing) Content creation Internet celebrity Japanese idol Japanese popular culture Uncanny valley Video gaming in Japan Virtual actor Virtual character Virtual idol Virtual influencer References Further reading External links 2010s fads and trends 2020s fads and trends Otaku Wasei-eigo 2010s neologisms
16609314
https://en.wikipedia.org/wiki/Document%20Freedom%20Day
Document Freedom Day
Document Freedom Day (DFD) is an annual event to "celebrate and raise awareness of Open Standards". It is celebrated on the last Wednesday of March each year. Document Freedom Day was first celebrated on 26 March 2008, and has continued to be celebrated every year since. Document Freedom Day is organised by a team of volunteers of the Digital Freedom Foundation since 2016. It was previously organised by the Free Software Foundation Europe. DFD is funded by donors and partners which vary from year to year. DFD 2013 was the largest ever with 60 events in 30 countries. A year later, in 2014, 51 groups in 22 countries held events celebrating Document Freedom Day. In 2019 it took place on Wednesday 27 March. Relationship to free software Document Freedom Day is a campaign about open standards and document formats, aimed at a non-technical audience. Open standards ensure communication is independent of software vendor; this, in turn, ensures that people "are able to communicate and work using Free Software." Document freedom addresses much more than just essays and spreadsheets, it is about control of any kind of a digital data - including artwork, sheet and recorded music, email, and statistics. These can be stored in ways which empower users, but they can also be stored in formats which constrain and manipulate users at enormous cost. Documents that are not free are locked to some particular software or company. The author cannot choose how to use them because they are controlled by technical restrictions. Relationship to open standards According to Document Freedom volunteers, "Open Standards are essential for interoperability and freedom of choice based on the merits of different software applications. They provide freedom from data lock-in and the subsequent supplier lock-in. This makes Open Standards essential for governments, companies, organisations and individual users of information technology." Document Freedom Day organizers have their own definition of technical standards that are considered to be open. These require standards to be: Subject to full public assessment and use without constraints in a manner equally available to all parties; Without any components or extensions that have dependencies on formats or protocols that do not meet the definition of an open standard themselves; Free from legal or technical clauses that limit its utilisation by any party or in any business model; Managed and further developed independently of any single supplier in a process open to the equal participation of competitors and third parties; Available in multiple complete implementations by competing suppliers, or as a complete implementation equally available to all parties. Past dates 26 March 2008 25 March 2009 31 March 2010 30 March 2011 28 March 2012 27 March 2013 26 March 2014 25 March 2015 30 March 2016 29 March 2017 28 March 2018 27 March 2019 25 March 2020 See also Digital dark age OpenDocument Portable Document Format LibreOffice Apache OpenOffice Calligra Suite KOffice Software Freedom Day Hardware Freedom Day Culture Freedom Day References External links Free Software Foundation Europe Campaigns Open formats March observances Recurring events established in 2008 Intellectual property activism Unofficial observances International observances
49674701
https://en.wikipedia.org/wiki/15094%20Polymele
15094 Polymele
15094 Polymele is a primitive Jupiter trojan from the Greek camp, approximately in diameter. It is a target of the Lucy mission with a close fly by planned to occur in September 2027. It was discovered on 17 November 1999, by astronomers with the Catalina Sky Survey at Mount Lemmon Observatory, Arizona, in the United States. The P-type asteroid has a rotation period of 5.9 hours and possibly a spherical shape. It was named after Polymele from Greek mythology, the wife of Menoetius and the mother of Patroclus. Orbit and classification Polymele is a Jupiter trojan (or Jovian asteroid) orbiting in the leading Greek camp at Jupiter's Lagrangian point, 60° ahead of the Gas Giant's orbit (see Trojans in astronomy). It orbits the Sun at a distance of 4.7–5.7 AU once every 11 years and 9 months (4,289 days; semi-major axis of 5.17 AU). Its orbit has an eccentricity of 0.09 and an inclination of 13° with respect to the ecliptic. The asteroid's observation arc begins 48 years prior to its official discovery observation at Mount Lemmon, with a precovery taken at Palomar Observatory in 1951, and published by the Digitized Sky Survey later on. Naming This minor planet was named after Polymele, the daughter of Peleus from Greek mythology. According to the Latin author Gaius Julius Hyginus ( 64 BC – AD 17), she is the wife of the Argonaut Menoetius and the mother of Patroclus, who participated in the Trojan War. Polymele is also known as "Philomela"; that name was previously used for the asteroid 196 Philomela. The approved naming citation was published by the Minor Planet Center on 22 February 2016 (). Lucy mission target Polymele is planned to be visited by the Lucy spacecraft which will launch in 2021. The fly by is scheduled for 15 September 2027, and will approach the asteroid to a distance of 415 kilometers at a velocity of 6 kilometers per second. Physical characteristics Polymele has been characterized as a primitive P-type asteroid by the investigators of the Lucy mission. P-type asteroids are known for their low albedo. It has a V–I color index of 0.799, which is lower than that for most larger Jupiter trojans (see table below). Diameter and albedo According to the survey carried out by the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer, Polymele measures 21.075 kilometers in diameter and its surface has an albedo of 0.091, while in 2018, Marc Buie published an albedo of 0.073 and an absolute magnitude of 11.691 in the S- and/or R band. The Collaborative Asteroid Lightcurve Link assumes a standard albedo for a carbonaceous asteroid of 0.057 and calculates a larger diameter of 26.64 kilometers based on an absolute magnitude of 11.6. Lightcurves In March 2016, a rotational lightcurve of Polymele was obtained from photometric observations by Marc Buie and colleges. Lightcurve analysis gave a rotation period of hours with a small brightness amplitude of magnitude (), which indicates that the body has a spheroidal shape. Previously, the Lucy mission team published spin rates of 6.1 and 4 hours, respectively. References External links Asteroid Lightcurve Database (LCDB), query form (info ) Dictionary of Minor Planet Names, Google books Discovery Circumstances: Numbered Minor Planets (15001)-(20000) – Minor Planet Center 015094 015094 Minor planets named from Greek mythology Named minor planets 015094 19991117
4207480
https://en.wikipedia.org/wiki/Platinum%20Technology
Platinum Technology
Platinum Technology Inc. was founded by Andrew Filipowski in 1987 to market and support deployment of database management software products and the applications enabled by database management technology and to render related services. Over its 12-year history, it was known for its acquisition of other companies, having bought more than 50 companies between 1994 and 1999 and growing to become the eighth largest global software company with revenue of a billion dollars per year. Acquisitions included Altai, Inc. (1995), AutoSystems Corporation, Brownstone Solutions, ICON Computing, Intervista Software, Software Interfaces, Locus Computing Corporation, LBMS (1998), Logic Works (1998), Protosoft, RELTECH Group, Memco Software, Softool, SQL TOOLS, Inc., Trinzic, Viatech and VREAM (1996). The company was a member of the UML Partners consortium. Acquisition by Computer Associates In March 1999, Platinum was itself acquired by Computer Associates (CA) for 3.5 billion U.S. dollars, at that time the largest transaction in the history of the software industry. CA offered $29.25 per share, almost a three-to-one premium over Platinum's stock price of $9.875. Transition In 2001, CA was sued by the United States Department of Justice (DOJ), alleging that the two companies prematurely reduced competition between each other. The DOJ claimed that this was achieved by agreeing to limit discounts offered to customers before the deal was completed. Acquisitions Protosoft In November 1995, Protosoft was acquired by Platinum Technology for 40 million U.S. dollars. Protosoft was founded by Dr. Anthony Lekkos and Erick Rivas in 1990 to develop and market Paradigm Plus, an object-oriented analysis and design (OOAD) modeling product and associated code generation and reverse engineering tools. Memco Software In September 1998, Platinum Technology acquired Israeli company Memco Software (Nasdaq: MEMCF). The acquisition was accounted for as a stock-for-stock pooling of interests valued at just more than $400 million. The combined offering of both companies was aimed at providing a complete software security solution for protecting enterprise networks, databases, and systems across multiple platforms. With this merger; Platinum was hoping to become a major security software provider in areas such as access control, single sign-on, user and database security administration, authentication, intrusion detection, secure communications, and policy audit. Memco Software was founded in 1990 in Tel Aviv, Israel; in 1996 it had an initial public offering on NASDAQ, raising $50 million. Following the acquisition of Platinum by Computer Associates, Memco Software became the basis for CA’s research and development center in Israel. References External links Press release following acquisition Defunct software companies of the United States Software companies based in Illinois Companies based in DuPage County, Illinois Oakbrook Terrace, Illinois Software companies established in 1987 Software companies disestablished in 1999 Defunct companies based in Illinois CA Technologies 1999 mergers and acquisitions
7024411
https://en.wikipedia.org/wiki/Bad%20sector
Bad sector
A bad sector in computing is a disk sector on a disk storage unit that is permanently damaged. Upon taking damage, all information stored on that sector is lost. When a bad sector is found and marked, the operating system like Windows or Linux will skip it in the future. Details A bad sector is the result of mechanical damage, most commonly caused by a head crash, manufacturing flaw(s), wear-and-tear, physical shock, sudden power outages, or dust intrusion. Bad sectors are a threat to information security in the sense of data remanence. Very often physical damages can interfere with parts of many different files. Operating system Bad sectors may be detected by the operating system or the disk controller. Most file systems contain provisions for sectors to be marked as bad, so that the operating system avoids them in the future. Disk diagnostic utilities, such as CHKDSK (Microsoft Windows), Disk Utility (on macOS), or badblocks (on Linux) can actively look for bad sectors upon user request. Disk controller When a sector is found to be bad or unstable by the firmware of a disk controller, the disk controller remaps the logical sector to a different physical sector. Typically, automatic remapping of sectors only happens when a sector is written to. In the normal operation of a hard drive, the detection and remapping of bad sectors should take place in a manner transparent to the rest of the system and in advance before data is lost. There are two types of remapping by disk hardware: P-LIST (mapping during factory production tests) and G-LIST (mapping during consumer usage by disk microcode). Utilities can read the Self-Monitoring, Analysis, and Reporting Technology (SMART) information to tell how many sectors have been reallocated, and how many spare sectors the drive may still have. Because reads and writes from G-list sectors are automatically redirected (remapped) to spare sectors, it slows down drive access even if data in drive is defragmented. Once the G-list is filled up, the storage unit must be replaced. See also Spiradisc - a copy protection scheme writing sectors on spiraling paths on the disk rather than in concentric circles. Sector slipping – a method of avoiding bad sectors ARccOS Protection – bad sector protection on DVDs, used by Sony. Head crash - a more serious form of damage to the hard disk platter References External links Bad Blocks Definition Hard disk computer storage Solid-state computer storage Copy protection
188336
https://en.wikipedia.org/wiki/NSD
NSD
In Internet computing, NSD (for "name server daemon") is an open-source Domain Name System (DNS) server. It was developed by NLnet Labs of Amsterdam in cooperation with the RIPE NCC, from scratch as an authoritative name server (i.e., not implementing the recursive caching function by design). The intention of this development is to add variance to the "gene pool" of DNS implementations used by higher level name servers and thus increase the resilience of DNS against software flaws or exploits. NSD uses BIND-style zone-files (zone-files used under BIND can usually be used unmodified in NSD, once entered into the NSD configuration). NSD uses zone information compiled via zonec into a binary database file (nsd.db) which allows fast startup of the NSD name-service daemon, and allows syntax-structural errors in Zone-Files to be flagged at compile-time (before being made available to NSD service itself). The collection of programs/processes that make-up NSD are designed so that the NSD daemon itself runs as a non-privileged user and can be easily configured to run in a Chroot jail, such that security flaws in the NSD daemon are not so likely to result in system-wide compromise as without such measures. As of May, 2018, four of the Internet root nameservers are using NSD: k.root-servers.net was switched to NSD on February 19, 2003. One of the 2 load-balanced servers for h.root-servers.net (called "H1", "H2") was switched to NSD, and now there are 3 servers all running NSD (called "H1", "H2", "H3"). l.root-servers.net switched to NSD on February 6, 2007. d.root-servers.net was switched to NSD in May 2018. Several other TLDs use NSD for part of their servers. See also Unbound, a recursive DNS server, also developed by NLnet Labs Comparison of DNS server software References External links NSD License NSD DNS Tutorial with examples and explanations DNS software Free network-related software DNS server software for Linux Software using the BSD license
55265785
https://en.wikipedia.org/wiki/Lakshmipuram%20College%20of%20Arts%20and%20Science
Lakshmipuram College of Arts and Science
Lekshmipuram College of Arts and Science, is a general degree college located in Lekshmipuram, Kanyakumari district, Tamil Nadu. It was established in 1964. The college is affiliated with Manonmaniam Sundaranar University. It is nationally accredited by NAAC with 'B' grade. The college offers courses in arts, commerce and science. Departments Arts and Commerce Tamil English Malayalam History Economics Political Science Commerce Science Physics Chemistry Mathematics Botany Zoology Information Technology Electronics Biochemistry Costume Design and fashion Technology Library and Information Science Physical Education UGC Career Oriented Programmes certificates/Diplomo/Advanced Diplomo in: Journalism & Medicinal Plants UG Courses Aided courses: B.A.Tamil literature B.A.English literature B.A.History and Tourism (English medium) B.A.History and Tourism (Tamil Medium) B.Sc.Mathematics B.Sc.Physics B.Sc.Zoology Self-financing courses: B.A.English Literature B.Com.Computer Application B.Sc.Mathematics B.Sc.Information Technology B.Sc.Electronics B.Sc.Bio-Chemistry B.Sc.Costume Design and Fashion Technology PG Courses M.A.Tamil Literature M.A.English Literature M.A.History M.Com.Computer Application (#) M.Sc.Mathematics M.Sc.Physics M.Sc.Information Technology (#) M.Sc.Bio-Chemistry (#) (#) Temporarily Course Stopped Facilities Canteen PCO, Fax, Photocopying, E-mail & Internet browsing. Book Store (Textbook, notebooks, record books, stationary, sweets, biscuits, cakes, cool drinks, water bottles etc. are available) M.Phil and Ph.D Programmes M.Phil.Tamil M.Phil.English M.Phil.History M.Phil.Mathematics Ph.D.Research centre-Tamil Ph.D.Research centre-English Co-curricular activities College Union English Literary Association Tamil Mantram Malayala Samajam Mathematics Association Physics Association Biology Association History, Economics & Politics Association Fine Arts Association Youth Welfare Youth Red Cross Red Ribbon Club Citizens Consumer Club Ilayor Avai Eco Club Other activities NCC-National Cadet Corps NSS-National Service Scheme YRC-Youth Red Cross Physical Education Various committees of the college College Union Alumni Association Parent Teacher Association Internal Quality Assurance Cell Admission Committee Discipline Committee Anti-Eve Teasing Committee Anti-Ragging Committee Women Cell Students Union- Advisory Committee Career Guidance Cell Placement Cell Grievances Redressal Committee Free Noon Meal Scheme Committee Human Resources Development Cell Campus Amenity Committee Student Magazine Health Practices Library Committee Book Review Club College Record Bureau Quiz Club Cultural Committee Audio Video Club Photography Club SC/ST Welfare Committee Debate Club and Essay Writing Remedial Programme Nature club College Greening Club Eco Club Health Club Trekking Club Information Communication Technology Cell Consumer Club Lekshmi Research Club College News Letter Model Examination Committee Sports Committee Accreditation The college is recognized by the University Grants Commission (UGC). References External links http://www.lpc.org.in Educational institutions established in 1964 1964 establishments in Madras State Colleges affiliated to Manonmaniam Sundaranar University Universities and colleges in Kanyakumari district
8669692
https://en.wikipedia.org/wiki/Windows%20booting%20process
Windows booting process
The Windows booting process is the process by which the Microsoft Windows series of operating systems boots. DOS-based Windows Windows 1.x/2.x In Windows versions 1.01 to Windows 2.11, the system was loaded when WIN.COM was executed. It then loaded WIN100.BIN or WIN200.BIN and WIN100.OVL or WIN200.OVL, along with the configuration settings file WIN.INI. The default shell is the MS-DOS Executive. The modules GDI.EXE, KERNEL.EXE and USER.EXE, fonts, and the various device drivers (such as COMM.DRV, MOUSE.DRV, KEYBOARD.DRV) are incorporated in WIN100.BIN/WIN200.BIN and WIN100.OVL/WIN200.OVL. Windows 3.x/9x In Windows 3.x and 95/98/ME, the boot loader phase is handled by MS-DOS. During the boot phase, CONFIG.SYS and AUTOEXEC.BAT are executed, along with the configuration settings files WIN.INI and SYSTEM.INI. Virtual device drivers are also loaded in the startup process: they are most commonly loaded from the registry (HKLM\System\CurrentControlSet\Services\VxD) or from the SYSTEM.INI file. When all system configuration files and device drivers have been loaded, the 16-bit modules, KRNL386.EXE, GDI.EXE, and USER.EXE, are loaded, then the 32-bit DLLs (KERNEL32.DLL, GDI32.DLL, and USER32.DLL) are loaded. The 32-bit VxD message server (MSGSRV32) starts MPREXE.EXE, which is responsible for loading the network logon client (such as Client for Microsoft Networks, Microsoft Family Logon or Windows Logon). When a user is logging on to Windows, the startup sound is played, the shell (usually EXPLORER.EXE) is loaded from the [boot] section of the SYSTEM.INI file, and startup items are loaded. In all versions of Windows 9x except ME, it is also possible to load Windows by booting to a DOS prompt and typing "win". There are some command line switches that can be used with the WIN command: with the /D switch, Windows boots to safe mode, and with the /D:n switch, Windows boots to safe mode with networking. The latter switch only works properly with Windows 95. In Windows 3.1, additional options are available, such as /3, which starts Windows in 386 enhanced mode, and /S, which starts Windows in standard mode A startup sound was first added in Windows 3.0 after installing the Multimedia Extensions (MME), but not enabled by default until Windows 3.1. Windows NT In Windows NT, the boot loader is called NTLDR. It is responsible for accessing the file system on the boot drive, for starting ntoskrnl.exe and for loading boot-time device drivers into memory. Once all the Boot and System drivers have been loaded, the kernel (system thread) starts the Session Manager Subsystem (smss.exe), which in turn starts winlogon, which loads the graphical identification and authentication library. After a user has successfully logged into the machine, winlogon does the following: User and Computer Group Policy settings are applied. Startup programs are run from the following locations: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Runonce HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run HKCU\Software\Microsoft\Windows\CurrentVersion\Run HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce All Users ProfilePath\Start Menu\Programs\Startup\ (this path is localized on non-English versions of Windows) Current User ProfilePath\Start Menu\Programs\Startup\ (this path is localized on non-English versions of Windows) In Windows 95/98/ME, it was also possible to run a program before the user logs on by using RunServicesOnce or RunServices keys. In Windows NT, this has been replaced by the services.exe program, which is able to load a set of system services before a user logs on. Additionally, in English-language versions of Windows, the startup folder was called "StartUp" instead of "Startup" in Win9x. Due to the minimally restricted environment of these operating systems, any program can add itself to the Startup registry key or system folder. This method is frequently used by malware. Windows NT 6 The sequence of booting Windows Vista and later versions is different from any previous version of Windows that uses the NT kernel. The operating system boot loader in Vista is called winload.exe, and is invoked by Windows Boot Manager. Additionally, the GINA that has been in use with all versions of Windows NT since 3.1 has been entirely replaced by "Credential Providers". See also Linux startup process References Windows architecture Booting
53663408
https://en.wikipedia.org/wiki/Search%20engine%20scraping
Search engine scraping
Search engine scraping is the process of harvesting URLs, descriptions, or other information from search engines such as Google, Bing, Yahoo, Petal or Sogou. This is a specific form of screen scraping or web scraping dedicated to search engines only. Most commonly larger search engine optimization (SEO) providers depend on regularly scraping keywords from search engines, especially Google, Petal, Sogou to monitor the competitive position of their customers' websites for relevant keywords or their indexing status. Search engines like Google have implemented various forms of human detection to block any sort of automated access to their service, in the intent of driving the users of scrapers towards buying their official APIs instead. The process of entering a website and extracting data in an automated fashion is also often called "crawling". Search engines like Google, Bing, Yahoo, Petal or Sogou get almost all their data from automated crawling bots. Difficulties Google is the by far largest search engine with most users in numbers as well as most revenue in creative advertisements, which makes Google the most important search engine to scrape for SEO related companies. Although Google does not take legal action against scraping, it uses a range of defensive methods that makes scraping their results a challenging task, even when the scraping tool is realistically spoofing a normal web browser: Google is using a complex system of request rate limitation which can vary for each language, country, User-Agent as well as depending on the keywords or search parameters. The rate limitation can make it unpredictable when accessing a search engine automated as the behaviour patterns are not known to the outside developer or user. Network and IP limitations are as well part of the scraping defense systems. Search engines can not easily be tricked by changing to another IP, while using proxies is a very important part in successful scraping. The diversity and abusive history of an IP is important as well. Offending IPs and offending IP networks can easily be stored in a blacklist database to detect offenders much faster. The fact that most ISPs give dynamic IP addresses to customers requires that such automated bans be only temporary, to not block innocent users. Behaviour based detection is the most difficult defense system. Search engines serve their pages to millions of users every day, this provides a large amount of behaviour information. A scraping script or bot is not behaving like a real user, aside from having non-typical access times, delays and session times the keywords being harvested might be related to each other or include unusual parameters. Google for example has a very sophisticated behaviour analyzation system, possibly using deep learning software to detect unusual patterns of access. It can detect unusual activity much faster than other search engines. HTML markup changes, depending on the methods used to harvest the content of a website even a small change in HTML data can render a scraping tool broken until it is updated. General changes in detection systems. In the past years search engines have tightened their detection systems nearly month by month making it more and more difficult to reliable scrape as the developers need to experiment and adapt their code regularly. Detection When search engine defense thinks an access might be automated the search engine can react differently. The first layer of defense is a captcha page where the user is prompted to verify they are a real person and not a bot or tool. Solving the captcha will create a cookie that permits access to the search engine again for a while. After about one day the captcha page is removed again. The second layer of defense is a similar error page but without captcha, in such a case the user is completely blocked from using the search engine until the temporary block is lifted or the user changes their IP. The third layer of defense is a long-term block of the entire network segment. Google has blocked large network blocks for months. This sort of block is likely triggered by an administrator and only happens if a scraping tool is sending a very high number of requests. All these forms of detection may also happen to a normal user, especially users sharing the same IP address or network class (IPV4 ranges as well as IPv6 ranges). Methods of scraping Google, Bing, Yahoo, Petal or Sogou To scrape a search engine successfully the two major factors are time and amount. The more keywords a user needs to scrape and the smaller the time for the job the more difficult scraping will be and the more developed a scraping script or tool needs to be. Scraping scripts need to overcome a few technical challenges: IP rotation using Proxies (proxies should be unshared and not listed in blacklists) Proper time management, time between keyword changes, pagination as well as correctly placed delays Effective longterm scraping rates can vary from only 3–5 requests (keywords or pages) per hour up to 100 and more per hour for each IP address / Proxy in use. The quality of IPs, methods of scraping, keywords requested and language/country requested can greatly affect the possible maximum rate. Correct handling of URL parameters, cookies as well as HTTP headers to emulate a user with a typical browser HTML DOM parsing (extracting URLs, descriptions, ranking position, sitelinks and other relevant data from the HTML code) Error handling, automated reaction on captcha or block pages and other unusual responses Captcha definition explained as mentioned above by An example of an open source scraping software which makes use of the above mentioned techniques is GoogleScraper. This framework controls browsers over the DevTools Protocol and makes it hard for Google to detect that the browser is automated. Programming languages When developing a scraper for a search engine almost any programming language can be used. Although, depending on performance requirements, some languages will be favorable. PHP is a commonly used language to write scraping scripts for websites or backend services, since it has powerful capabilities built-in (DOM parsers, libcURL); however, its memory usage is typically 10 times the factor of a similar C/C++ code. Ruby on Rails as well as Python are also frequently used to automated scraping jobs. For highest performance, C++ DOM parsers should be considered. Additionally, bash scripting can be used together with cURL as a command line tool to scrape a search engine. Tools and scripts When developing a search engine scraper there are several existing tools and libraries available that can either be used, extended or just analyzed to learn from. iMacros - A free browser automation toolkit that can be used for very small volume scraping from within a users browser cURL – a command line browser for automation and testing as well as a powerful open source HTTP interaction library available for a large range of programming languages. google-search - A Go package to scrape Google. SEO Tools Kit – Free Online Tools, Duckduckgo, Baidu, Petal, Sogou) by using proxies (socks4/5, http proxy). The tool includes asynchronous networking support and is able to control real browsers to mitigate detection. se-scraper - Successor of SEO Tools Kit. Scrape search engines concurrently with different proxies. Legal When scraping websites and services the legal part is often a big concern for companies, for web scraping it greatly depends on the country a scraping user/company is from as well as which data or website is being scraped. With many different court rulings all over the world. However, when it comes to scraping search engines the situation is different, search engines usually do not list intellectual property as they just repeat or summarize information they scraped from other websites. The largest public known incident of a search engine being scraped happened in 2011 when Microsoft was caught scraping unknown keywords from Google for their own, rather new Bing service, but even this incident did not result in a court case. One possible reason might be that search engines like Google, Petal, Sogou are getting almost all their data by scraping millions of public reachable websites, also without reading and accepting those terms. See also Comparison of HTML parsers References External links Scrapy Open source python framework, not dedicated to search engine scraping but regularly used as base and with a large number of users. Compunect scraping sourcecode - A range of well known open source PHP scraping scripts including a regularly maintained Google Search scraper for scraping advertisements and organic resultpages. Justone free scraping scripts - Information about Google scraping as well as open source PHP scripts (last updated mid 2016) Scraping.Services source code - Python and PHP open source classes for a 3rd party scraping API. (updated January 2017, free for private use) PHP Simpledom A widespread open source PHP DOM parser to interpret HTML code into variables. SerpApi Third party service based in the United States allowing you to scrape search engines legally. Search engine software Internet search algorithms Search_engine_optimization Web scraping
36017435
https://en.wikipedia.org/wiki/Anonymous%20blog
Anonymous blog
An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a pseudonym, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer (e.g., in whistleblower cases), a government (in countries that monitor or censor online communication), or another group. Deanonymizing techniques Fundamentally, deanonymization can be divided into two categories: Social correlation compares known details about a person's life with the contents of an anonymous blog to look for similarities. If the author does not attempt to conceal their identity, social correlation is a very straightforward procedure: a simple correlation between the "anonymous" blogger's name, profession, lifestyle, etc., and the known person. Even if an author generally attempts to conceal their identity (by not providing their name, location, etc.), the blog can be deanonymized by correlating seemingly innocuous, general details. Technical identification determines the author's identity through the blog's technical details. In extreme cases, technical identification entails looking at the server logs, the Internet provider logs, and payment information associated with the domain name. These techniques may be used together. The order of techniques employed typically escalates from the social correlation techniques, which do not require the compliance of any outside authorities (e.g., Internet providers, server providers, etc.), to more technical identification. Types Just as a blog can be on any subject, so can an anonymous blog. Most fall into the following major categories: Political: A commentary on the political situation within a country, where being open may risk prosecution. Anonymous blogging can also add power to a political debate, such as in 2008 when blogger Eduwonkette, later revealed as Columbia University sociology graduate student Jennifer Jennings, successfully questioned New York Mayor Michael Bloomberg's takeover of New York schools. Revolutionary and counter-revolutionary: These can either be inspiring activity or counter activity, often against a violent state apparatus. For example, Salam Pax, the Baghdad blogger, wrote for The Guardian newspaper under a pseudonym that he could shed only when Saddam Hussein no longer ruled in Iraq. Similar bloggers appeared during the Arab Spring. Dissident: Dissident blogs may document life under an oppressive or secretive regime, while not actively promoting or inspiring revolutionary or counter-revolutionary action. Mosul Eye, which has described life under ISIL occupation in Mosul, Iraq, has been called one of the few reliable sources of information on life inside the city since it began in June 2014. Religious: Views and comments about religious view points and issues, perhaps questioning some written standpoints. Whistleblower: The whistleblower blog is a modern-day twist on the classical "insider spotting illegality" theme. This can cover all sectors or issues. Among the most notable is that by the Irish Red Cross head of the international department Noel Wardick, who highlighted that €162,000 in donations to the 2004 Indian Ocean earthquake and tsunami had sat in an account for over three years. After spending over €140,000 on private investigators and legal expenses to find the whistle blower, including court orders to obtain Wardick's identity from UPC and Google, the IRC disciplined and later dismissed Wardick. In 2010, an internal enquiry into Wardick's allegations found other such bank accounts, and proposals to overhaul the IRC's management were discussed in the Dáil on 15 December. Questions were answered by Tony Killeen, then the Minister of Defence. Wardick later successfully sued the IRC for unfair dismissal. Company insider: A company employee or insider reports on company operations and issues from within the organisation. The most famous is probably the Dooce.com blogger Heather Armstrong, who was fired for writing satirical accounts of her experiences at a dot-com startup on her personal blog, dooce.com. Community pressure: Written by a citizen of an area, on a particular subject, to bring about a change. In 2007, reporter and blogger Mike Stark came out in support of anonymous blogger Spocko, who was trying to bring what he called "violent commentary" on San Francisco area radio station KSFO to the attention of its advertisers. Experience/Customer Service: Most experience blogs focus on personal insights or views of customer service, frequently with dissatisfaction. Most anonymous experience blogs are written anonymously as they allow the customer/user to keep experiencing and using the service, and reporting/blogging, while nudging at a defined and appropriate level against the target organisation. Among these are Sarah Wu's/Mrs Q. "Fed Up With Lunch" blog, a chronicle of her experience as an adult eating Chicago area high school lunch every day for a year, which has now been turned into a book. Personal: The personal blog strays into personal life in ways that allow more risk taking and open in terms of detail. Hence, many of these blogs are sexual in nature, although many also exist for those with health problems and disabilities and how they see the world and cope with its challenges. Some of the latest personal blogs are seen by many as extended group therapy, covering issues including weight loss. Recently, anonymous blogging has moved into a more aggressive and active style, with organized crime groups such as the Mafia using anonymous blogs against mayors and local administrators in Italy. How online identity is determined IP addresses An IP address is a unique numerical label assigned to a computer connected to a computer network that uses the Internet Protocol for communication. The most popular implementation of the Internet Protocol would be the Internet (capitalized, to differentiate it from smaller internetworks). Internet Service Providers (ISPs) are allocated chunks of IP addresses by a Regional Internet registry, which they then assign to customers. However, ISPs do not have enough addresses to give the customers their own address. Instead, DHCP is used; a customer's device (typically a modem or router) is assigned an IP address from a pool of available addresses. It keeps that address for a certain amount of time (e.g., two weeks). If the device is still active at the end of the lease, it can renew its connection and keep the same IP address. Otherwise, the IP address is collected and added to the pool to be redistributed. Thus, IP addresses provide regional information (through Regional Internet registries) and, if the ISP has logs, specific customer information. While this does not prove that a specific person was the originator of a blog post (it could have been someone else using that customer's Internet, after all), it provides powerful circumstantial evidence. Word and character frequency analysis Character frequency analysis takes advantage of the fact that all individuals have a different vocabulary: if there is a large body of data that can be tied to an individual (for example, a public figure with an official blog), statistical analysis can be applied to both this body of data and an anonymous blog to see how similar they are. In this way, anonymous bloggers can tentatively be deanonymized. See also Anonymous P2P Anonymous web browsing List of anonymously published works Citizen journalism Mix network Anonymous remailer Tor (anonymity network) I2P References External links Computer Law and Security Report Volume 22 Issue 2, Pages 127-136 blogs, Lies and the Doocing by Sylvia Kierkegaard (2006) Legal Guide for bloggers by the Electronic Frontier Foundation Blog Personal Blogging Internet terminology Non-fiction genres Internet privacy Anonymity
13428186
https://en.wikipedia.org/wiki/Provider%20router
Provider router
In Multiprotocol Label Switching (MPLS), a P router or provider router is a label switch router (LSR) that functions as a transit router of the core network. The P router is typically connected to one or more PE routers. Here's one scenario: A customer who has facilities in LA and Atlanta wants to connect these sites over an MPLS VPN provided by AT&T. To do this, the customer would purchase a link from the on-site CE router to the PE router in AT&T's central office in LA and would also do the same thing in Atlanta. The PE routers would connect over AT&T's backbone routers (P routers) to enable the two CE routers in LA and Atlanta to communicate over the MPLS network. See also Customer edge router Provider edge router References MPLS networking
43704520
https://en.wikipedia.org/wiki/Who%20Am%20I%20%282014%20film%29
Who Am I (2014 film)
Who Am I (; English: "Who Am I: No System Is Safe") is a 2014 German techno-thriller film directed by Baran bo Odar. It is centered on a computer hacker group in Berlin geared towards global fame. It was screened in the Contemporary World Cinema section at the 2014 Toronto International Film Festival. The film was shot in Berlin and Rostock. Because of its storyline and some elements, the film is often compared to Fight Club and Mr. Robot. Plot Benjamin Engel, a hacker from Berlin, sits in an interrogation room. The officer in charge tells Hanne Lindberg, Head of the Cyber Division of Europol, that Benjamin asked to conduct the interrogation. Benjamin says that he has information regarding FR13NDS (), a notorious hacking group of four members connected to the Russian cyber mafia, and MRX, an infamous hacker known on Darknet; he tells her that he could give them both to Hanne if she listens to him. Having no choice, Hanne sits down. Benjamin tells Hanne that he is like a superhero: like many heroes, he, too, has no parents; he never met his father as he abandoned the family when Benjamin was born, and his mother committed suicide when he was 8. He lives alone with his ailing grandmother. He regards his "superpower" as invisibility, as he was never noticed by most people during his childhood, due to him being socially awkward. He says he learned programming and hacked his first system when he was 14. Though he felt like a loser in real life, he felt a sense of belonging on the Internet. While spending most of his time on Darknet, he met his hacking hero, MRX, whose identity no one knows and who can hack into any system. Benjamin aspires to be like him. However, as he was unable to attend university, he worked as a pizza delivery boy to pay the bills. He tells Hanne that, one night while he delivered pizzas to a group of students, he saw Marie, a girl with whom he was in love since his school days. Hearing her having trouble with examinations, he decided to help her and be a 'superhero'. He went to the University, hacked into its servers to download the exam questions—but he was caught by a security guard and arrested. Having no prior criminal record, he was forced to perform community service as a punishment. He tells Hanne that while working on cleaning the streets as punishment, he met Max, a fellow hacker, who Benjamin feels is the opposite of himself; a charismatic, cocky and confident individual. Later, Max had introduced him to his colleagues Stephan and Paul. After Benjamin proved himself as a hacker, Max explained to him that the concept of social engineering is the greatest form of hacking. They decide to form a hacking group, called "Clowns Laughing At You", nicknamed CLAY, and they use Benjamin's house as a base of operations, since Benjamin was forced to send his grandmother to a nursing home due to her Alzheimer's disease. They cause general mayhem around Berlin in a form of pranking, becoming popular around social media. However, MRX, with whom is Max obsessed, mocks them outright. Infuriated, Max wants to perform a more outrageous feat of hacking, and Benjamin suggest hacking the main building of BND (German Central Intelligence). Impressed by this outrageous idea, the group agrees with Benjamin and decide to hack the BND in order to impress MRX. Using dumpster diving and phishing to gain access to the BND building, they manage to hack the internal servers and hack the printers to print their logo, titled "NO SYSTEM IS SAFE", all around the building, impressing MRX. However, when they go to a club and celebrate, Benjamin notices Max kissing Marie. Infuriated, Benjamin refuses to let them into the house, also offending Marie when she visits him due to his anger. Feeling inferior, he secretly contacts MRX, offering him valuable information: a database from BND's private servers, which he hacked while he was in the BND building, which impresses MRX. When the group arrives the next day, Benjamin is still furious and attacks Max, who responds by beating him up. However, Paul, watching the TV, hears on the news that one of the members of FR13NDS, nicknamed Krypton, was murdered. Benjamin admits that he gave the information from the BND to MRX, and after checking them, realizes that the information identified Krypton as a double agent working with Hanne to expose MRX and FR13NDS, and CLAY is now labeled as a terrorist group for hacking the information. Seeking to clear their name for the murder, Benjamin contacts MRX, who instructs them to hack into the Europol database in exchange for MRX's identity, giving them a hacking tool to help. After dissolving their hard drives in acid to erase data, they travel to Europol's headquarters in The Hague in order to try and break their way in—but it's impossible to find a way inside. The headquarters dump their trash in a secured building, the sewers are locked, and phishing attempts failed. However, while checking out the building, Benjamin notices a group of scholars visiting the building, and one of them drops his visitor card. Using Max's advice about social engineering, Benjamin manages to gain access to the building by fooling a guard and plants a hacking device inside. He then hacks into the internal Europol servers and provides MRX with an entrance, secretly encoded inside a double trojan horse so MRX will be exposed when he tries to gain access. However, MRX, anticipating this, takes a snapshot of Benjamin via his webcam, exposing him. Benjamin is forced to flee when a group of Russian mobsters finds him; he evades them in the subway. Benjamin returns to the hotel where he was staying with the trio, only to find them murdered. Having no other choice and knowing that FRI3NDS would kill him, he decided to turn himself in to Hanne, proving that he is serious after stating that he hacked her profile and learned personal information about her. Hanne, who was suspended for her failure to capture them and is desperate to apprehend FRI3NDS and MRX, agrees to put Benjamin into a witness protection program in exchange for capturing them. Benjamin logs in as MRX himself and spreads lies about MRX being a snitch, forcing the real MRX to force his way into the Darknet servers with unsafe methods, allowing Benjamin to expose him. MRX is exposed as a 19-year-old American boy from New York City, whom the FBI arrests in a coffee shop. However, after agreeing to give Benjamin the witness exchange program, Hanne notices a wound going through his palm (the same wound that Max got after running a nail through his hand), and realizes that Max, Stephan and Paul are all made-up characters. Distraught, she visits Benjamin's doctor, who states that his mother had multiple personality disorder and committed suicide because of it, learning that it can be genetically inherited. Hanne connects various plot holes in Benjamin's story and realizes that "he" alone was CLAY; he committed all the atrocities, he hacked into the BND alone, and he planted the WWII bullets from his grandmother in the hotel to make it look like they were killed, imagining the trio due to his illness. Hanne confronts Benjamin, who has an emotional breakdown, as people with mental disorders cannot be given witness protection. However, Hanne changes her mind and allows him access to the witness protection program, revealed to be an "actual" program containing information about all citizens of Germany; Benjamin changes his identity here. Hanne, dropping Benjamin off, states that she let him go because he truly wants to stay invisible, and lets him go on the condition that he never hacks again. Benjamin, now sporting blonde hair, is standing alone on a Scandlines ferry heading north. However, he is suddenly joined by Marie, Max, Stephan and Paul. In narration, Benjamin states that he performed "the greatest social engineering hack" ever; the scene shifts back to Benjamin going back to the hotel, finding the guys alive and well; he instructs them to flee since MRX knows his identity, but they refuse to leave him behind. After Marie visits them and confirms that mentally ill subjects cannot be granted witness protection, they devise a plan for Benjamin to go to Hanne and dictate the story, deliberately giving plot holes which she will most likely dechiper, and then using her grief for him to give him access to the witness protection program, and also spiking his hand with a nail to make the story seem truthful. In the server room, it was revealed that Benjamin didn't change his identity, he "erased" it completely. Benjamin states that Hanne will eventually realize his deception, but she won't hunt him down as she got what she wanted. Indeed, at a press conference announcing the defeat of FR13NDS and MRX, Hanne, having an epiphany, smiles as she realizes the truth. Cast Tom Schilling as Benjamin Engel Elyas M'Barek as Max Hannah Herzsprung as Marie Wotan Wilke Möhring as Stephan Antoine Monot, Jr. as Paul Trine Dyrholm as Hanne Lindberg Stephan Kampwirth as Martin Bohmer Leonard Carow as MRX Lena Dörrie as BKA Investigator Reception The film premiered in the Contemporary World Cinema section at the 2014 Toronto International Film Festival. It was also screened at the 17th European Union Film Festival. The film won three German Movie Awards and the Bambi for Best German Film. Other versions Warner Bros. struck a deal in 2014 to remake the film. David Goyer is set to direct the film. The script will be written by Dan Wiedenhaupt, who wrote the Albert Hughes-directed The Solutrean. The film will be produced by Goyer and his Phantom Four banner, along with Kevin Turen and Langley Park's Kevin McCormick. References External links 2014 films 2010s thriller films 2010s German-language films 2010s English-language films German films German thriller films English-language German films Films about computing Films shot in Berlin Malware in fiction Techno-thriller films Works about computer hacking
2732586
https://en.wikipedia.org/wiki/Zimbra
Zimbra
Zimbra Collaboration, formerly known as the Zimbra Collaboration Suite (ZCS) before 2019, is a collaborative software suite that includes an email server and a web client. Zimbra was initially developed by LiquidSys, which changed their name to Zimbra, Inc. on 26 July 2005. The Zimbra Collaboration Suite was first released in 2005. The company was subsequently purchased by Yahoo! on September 17, 2007, and later sold to VMware on January 12, 2010. In July 2013, it was sold by VMware to Telligent Systems which changed its name to Zimbra, Inc. in September 2013. It was then acquired by Synacor on 18 August 2015. According to former Zimbra President and CTO Scott Dietzen, the name for Zimbra is derived from the song "I Zimbra" by Talking Heads. Edition The software consists of both client and server components, and at one time also offered a desktop email client, called Zimbra Desktop. Two versions of Zimbra are available: an open-source version, and a commercially supported version ("Network Edition") with closed-source components such as a proprietary Messaging Application Programming Interface connector to Outlook for calendar and contact synchronisation. The now discontinued Zimbra Desktop was a full-featured free desktop email client. Development was discontinued under VMware's stewardship in 2013 but was restarted in February 2014, but was ended again by 2019. The web client featured an HTML5 offline mode starting with version 8.5. The Zimbra Web Client is a full-featured collaboration suite that supports email and group calendars. At one time it featured document-sharing using an Ajax web interface that enabled tool tips, drag-and-drop items, and right-click menus in the UI. Today it has document sharing, chat, and videoconferencing. Also included are advanced searching capabilities and date relations, online document authoring, "Zimlet" mashups, and a full administration UI. It is written using the Zimbra Ajax Toolkit. The Zimbra Server uses several open source projects (see the section, Included open source projects). It exposes a SOAP application programming interface to all its functionality and is also an IMAP and POP3 server. The server runs on many Linux distributions. On other, non-Linux operating systems it can be run using a virtual machine and using container technology. It supports CalDAV, CardDAV and SMTP for messaging, LDAP for directory services, and Microsoft Active Directory (AD). Zimbra uses Postfix for its MTA functionality. It includes technology from ClamAV, SpamAssassin and DSPAM for anti-malware features and S/MIME for email signing and encryption. OS X Server support was dropped with version ZCS 7.0. Zimbra can synchronize mail, contacts, and calendar items with open-source mail clients such as Mozilla Thunderbird and Evolution and also with proprietary clients such as Microsoft Outlook and Apple Mail, either through proprietary connectors or using the ActiveSync protocol, both available exclusively in the commercially supported version. Zimbra also provides native two-way sync to many mobile devices. Software license The closed source variant Network edition is distributed under the Zimbra Network Edition EULA. Starting with version 8.5 the Zimbra source code is available under the terms of the GNU General Public License version 2 (backend) and the Common Public Attribution License version 1 (frontend). Previous versions were released under the Zimbra Public License (ZPL). The Free Software Foundation accepts the license as being a free software license and refers to it as being identical to the Yahoo! Public License with the exception that Zimbra, Inc. provides the license, rather than Yahoo!. Included open source projects The Zimbra Server uses open source projects such as: Postfix MariaDB (since version 8.5) OpenDKIM (since version 8.0) OpenLDAP Jetty (since version 5) Lucene ClamAV SpamAssassin Amavis (amavisd-new) DSPAM (deprecated starting 8.7) Aspell nginx (since 5.0) ØMQ (since 8.0) It previously used: MySQL (last used in version 8.0) Apache Tomcat (last used in version 4.5) Perdition mail retrieval proxy (until 4.5) See also List of collaborative software List of applications with iCalendar support References External links Free email software Webmail Instant messaging Free groupware Collaborative software Web-based email clients for Linux Email client software for Linux
35865512
https://en.wikipedia.org/wiki/Li%20Hongping
Li Hongping
Li Hongping (; born 14 February 1963) is a Chinese former diver who competed in the 1984 Summer Olympics. Hongping Li, an NCAA champion and two-time Olympian who has been one of the most successful NCAA coaches for more than a decade, is in his 14th year as USC's head diving coach. He was named to the position on July 1, 1999. Diving career Originally from Beijing, Li was a 12-time national champion and a two-time Olympian while competing for China. He finished fourth on the 3-meter springboard at the 1984 Olympics in Los Angeles, earned gold medals on platform at the 1981 FINA World Cup in Mexico City and the 1981 World University Games and won bronze on 3-meter at the 1986 World Championships. He also qualified for the 1980 Olympics, but did not compete because of the Chinese boycott. Coaching career Li, a two-time NCAA Coach of the Year (2002, 2006) and nine-time Pac-10 Women's (2001-02-03-05-06-09-10-11-12) and 2009 Pac-10 Men's Diving Coach of the Year and the winner of the 1998 and 1999 United States Olympic Committee's "Diving Developmental Coach of the Year" award, came to USC after serving as the head coach of the Mission Viejo (Calif.) Nadadores Diving Team since 1993. Li led the Nadadores to the 1998 Junior National Championships team title as well as every Western National team title since 1996. He served as an assistant coach at Mission Viejo from 1989–93, helping the club to consecutive junior team titles from 1991-93. At Mission Viejo, he produced eight Junior National champions who won a combined 20 individual titles. Among the elite divers Li coached was Erica Sorgi, who has captured five senior national titles since 1996. Li, 49, was named the 1998 and 1999 U.S. Diving Outstanding Age Group Coach of the Year, was a U.S. team coach at the 1999 Pan Am Games, the 1998 World Diving Championships, the 1998 Goodwill Games and the 1997 World Junior Championships, and earned the Coach of Excellence award at the 1995 Senior National Championships. Li has had sustained and broad success since joining the USC staff. He has directed eight men's and women's divers to a combined 34 All-American honors, six NCAA titles and 27 conference titles. In 2001, Li guided Brennan to a pair of All-American honors (and her third consecutive Pac-10 1-meter title) and Fusaro to her first at the 2001 NCAAs. Both also reached the top three at the 2001 U.S. Indoor Championships. Brennan was named Pac-10 Diver of the Year, Fusaro was tabbed as Newcomer of the Year and Li earned his first Pac-10 Coach of the Year honor. A year earlier in 2000, Li helped guide Brennan to her first two All-American honors. He earned NCAA Coach of the Year honors after directing the women's diving squad to superb results at the 2002 NCAA Championships. Hartley won a pair of NCAA titles and made three finals appearances on her way to 2002 NCAA Women's Diver of the Year while Fusaro also made three NCAA finals appearances. Senior diver Kellie Brennan also scored and just missed earning All-American honors. Also in 2002, Hartley won a silver and a bronze at the 2002 Commonwealth Games while Fusaro qualified for the 2002 U.S. national team. In 2003, three of Li's divers earned All-American honors. Vincent became Li's first men's diver at USC to do so, taking third in the platform at the 2003 NCAA Championships. At the women's NCAAs, Hartley was a three-time All-American while Nicci Fusaro earned one All-American honor. Hartley also swept the 2003 Pac-10 Championship diving events on the women's side (Fusaro took a pair of seconds) and Vincent won the platform title in the men's meet. For their efforts, Li was named 2003 Pac-10 Women's Coach of the Year for the third consecutive season and Hartley was named Pac-10 Women's Diver of the Year for the second straight year. Li also served as head coach for the U.S. Diving team that competed at the 2003 Grand Prix Diving Championships in Rome, Italy. In 2004, Vincent earned All-American honors on the platform, continuing Li's streak of having Trojans earn All-American honors each year he's been at USC. Hilde won his first Pac-10 platform title weeks earlier. Additionally, Hartley represented Canada at the 2004 Olympics (winning bronze on platform synchro) while Li's club diver Rachelle Kunkel made the U.S. team placing 9th on 3-meter springboard. Li was also an assistant coach on the 2004 U.S. Olympic Diving team. In 2005, Hartley won her third career NCAA title while Ray Vincent earned his third consecutive All-American honors on the platform. Hartley was named 2005 NCAA and Pac-10 women's diver of the year after winning the NCAA 3-meter title and her fifth and sixth career Pac-10 titles a few weeks earlier. She went on to win her second career World Championship gold medal on 1-meter in July, 2005, in Montreal. Vincent also won a Pac-10 title on platform and Troy's men's diving contingent was the highest scoring unit of the meet. In 2006, Blythe Hartley won her fourth and fifth career NCAA titles with wins on the 1-meter and 3-meter springboard while Hilde made his All-American debut on 3-meter. Hartley, who also earned her 12th (a maximum for a diver) All-American honor with a final appearance on platform, was named NCAA Women's Diver of the Year for the second time. Her five career NCAA titles is tied for second among NCAA women divers. She also won her seventh and eighth career Pac-10 titles (a Pac-10 record). Junior Michael Hilde earned his first career All-American honor with an eighth-place on 3-meter at the NCAAs and he won his second career Pac-10 platform title (Troy's fourth in a row in the event). In addition to Hilde, Jenkins qualified for his first NCAA Championships, marking the third straight year USC has had two men at the NCAAs. It was the seventh year in a row USC featured at least one All-American diver under Li. In 2007, Kenny Jenkins became the sixth USC diver to garner All-American honors under Li with a fifth place on platform at the 2007 NCAA Championships. Both Jenkins and fellow senior Michael Hilde scored individually at the NCAA Championships in both the 1-meter springboard and platform. Also, Popp reached the NCAAs for the second year in a row and scored for the first time with a 12th-place finish on platform. In 2008, Starks, as a freshman, was an NCAA point scorer on platform and was a three-time Pac-10 finalist, including a second-place on platform. Freshman Christine Petrilli was third on both 1-meter and springboard at the Pac-10 Championships while senior Kim Popp was also a two-time Pac-10 finalist on the same boards. Also in 2008, Li worked for the USOC at the 2008 Olympics in Beijing as part of the administrative staff that bridged cultural and language gaps between U.S. and China coaches and athletes. While in Beijing, he was able to watch club divers Rittenhouse (springboard synchro) and Haley Ishimatsu (platform synchro) become Olympic finalists. In 2009, Jones (1-meter and platform) and Ishimatsu (1-meter), then both freshmen, earned a combined three All-American honors, becoming the seventh and eighth All-American divers to compete for Li. Jones also was 10th on 3-meter while Ishimatsu was 12th on platform and Starks scored on platform. In the Pac-10, Jones won a title on platform and was second on both springboards while Starks was a three-time finalist. On the women's side, Ishimatsu won the 3-meter springboard and was second on 1-meter. In the summer of 2009, Li served as the head coach for the U.S. World Championships squad as well as at the international Canada Open Grand Prix. Also in 2009, club diver Haley Ishimatsu won a silver medal at the 2009 World Championships on 10m synchro. In 2010, Victoria Ishimatsu earned a pair of All-American honors on 1-meter and 3-meter and was 10th on platform at the NCAA Championships. That followed Pac-10 titles on 1- and 3-meter, which helped her earn Pac-10 Diver of the Meet for the second year in a row. Freshman Ariel Rittenhouse finished 12th on 3-meter at the NCAAs and was second on 1-meter and third on 3-meter at the Pac-10s. On the men's side, Jones scored in two NCAA events and was a three-time Pac-10 finalist, including a title on 1-meter. Starks was a two-time Pac-10 finalist. Also in 2010, Li served as head coach for the U.S. contingent at the first ever Youth Olympic Games in Singapore and was a FINA World Cup Diving Assistant Coach. In 2011, Ishimatsu was tabbed as the Pac-10 Women's Diver of the Year for the third year in a row after claiming both Pac-12 springboard titles for the second year in a row. She competed in all three boards at the NCAAs, scoring on the 1-meter and platform. Junior Harrison Jones earned All-American honors on 3-meter and won the 1-meter title at Pac-12s. Senior Steven Starks was also a three-time Pac-12 finalist. Also in 2011, Li served as the World Championships USA Diving Team Manager. Li's then-club diver and current Trojan, Haley Ishimatsu (the younger sister of Victoria), won a 2011 U.S. national title on 10-meter. In 2012 under Li, senior Victoria Ishimatsu won her first career NCAA title and became the first conference diver to win the Women's Diver of the Year four straight years (she was also the first to do it three straight). Ishimatsu won the NCAA title on 1-meter and was seventh on 3-meter, finishing with five career All-American honors. She was named Pac-12 Diver of the Meet for the third year in a row at the 2012 Pac-12 Championships after she won her fourth straight title on 3-meter (386.80) -- becoming the first Pac-12 woman to win four in a row on the same board—and her third consecutive crown on 1-meter (337.05). Freshman men's diver Jordan Gear was a finalist on platform at the Pac-12s last year, taking fourth. Personal life Li attended USC from 1985–89 and received a bachelor's degree in physical education in 1989. He won an NCAA title in the 3-meter springboard as a freshman in 1986 and earned All-American honors in the 1-meter springboard. He also earned Pac-10 titles in the 1- and 3-meter springboards that same year. He was not eligible to compete after 1986 because of an NCAA age rule. Li lives in La Palma, Calif., with his wife Ling, their 22-year-old daughter, Amanda, a graduate of USC, and their toy poodle Coco. 1963 births Living people Chinese male divers Olympic divers of China Divers at the 1984 Summer Olympics Asian Games medalists in diving Divers at the 1978 Asian Games USC Trojans men's divers USC Trojans diving coaches Sportspeople from Guangdong People from Shantou Asian Games silver medalists for China Medalists at the 1978 Asian Games Universiade medalists in diving Universiade gold medalists for China Medalists at the 1979 Summer Universiade Medalists at the 1981 Summer Universiade Medalists at the 1983 Summer Universiade
2666078
https://en.wikipedia.org/wiki/SIGSOFT
SIGSOFT
The Association for Computing Machinery's Special Interest Group on Software Engineering provides a forum for computing professionals from industry, government and academia to examine principles, practices, and new research results in software engineering. SIGSOFT focuses on issues related to all aspects of software development and maintenance, with emphasis on requirements, specification and design, software architecture, validation, verification, debugging, software safety, software processes, software management, measurement, user interfaces, configuration management, software engineering environments, and CASE tools. SIGSOFT (co-)sponsors conferences and symposia including the International Conference on Software Engineering (ICSE), the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) and other events. SIGSOFT publishes the informal bimonthly newsletter Software Engineering Notes (SEN) newsletter with papers, reports and other material related to the cost-effective, timely development and maintenance of high-quality software. SIGSOFT's mission is to improve the ability to engineer software by stimulating interaction among practitioners, researchers, and educators; by fostering the professional development of software engineers; and by representing software engineers to professional, legal, and political entities. References External links SIGSOFT website Association for Computing Machinery Special Interest Groups Software engineering organizations Organizations established in 1976
8852523
https://en.wikipedia.org/wiki/List%20of%20virtual%20printer%20software
List of virtual printer software
The following is a list of Wikipedia articles relating to virtual printer software: Free software The following are distributed under free software licences: CC PDF Converter (discontinued) – A Ghostscript-based virtual printer, provided by CogniView. cups-pdf – An open source Ghostscript-based virtual printer that can be shared with Windows users over the LAN. CUPS Ghostscript – A command-line library for creation of PostScript and PDF files. RedMon – Redirects a special printer port to the standard input of another program. Freeware The following are proprietary software but free of charge: Microsoft XPS Document Writer – A virtual printer for Microsoft Windows that creates an XPS (*.xps, *.oxps) document file from the print output of an application. Virtual PDF printers Virtual PDF printers for Microsoft Windows: Bullzip PDF Printer – there is a free version CutePDF DoPDF – this is a simplified version of NovaPDF PDFCreator – a Ghostscript-based virtual printer for Microsoft Windows, with user interface for advanced options (security settings, combining multiple documents, etc.). PrimoPDF PDF24 Creator – a free virtual PDF printer for Microsoft Windows, with user interface and additional tools like merging, splitting, compressing and assembling PDF files. Commercial Adobe Acrobat – Adobe System's commercial PDF authoring suite includes Adobe Distiller, a virtual printer for converting documents to PDF files. Adobe Distiller is not included with the free-to-use Adobe Reader product. Virtual printers Virtual printers for Microsoft Windows: Microsoft Office Document Image Writer – Included in Microsoft Office Professional allowing documents to be saved in TIFF or Microsoft Document Imaging Format. MODI is only supported in 32 bit Windows' versions. Universal Document Converter – Creating PDF, JPEG, TIFF, PNG, GIF, PCX, DCX and BMP files. Free version adds watermark. Notes 1.This software has risk of installing potentially unwanted programs. For more information, refer to its main article. Virtual printer software Computer printers
63435456
https://en.wikipedia.org/wiki/Zoom%20%28software%29
Zoom (software)
Zoom Meetings (commonly shortened to Zoom, and stylized as zoom) is a proprietary video teleconferencing software program developed by Zoom Video Communications. The free plan allows up to 100 concurrent participants, with a 40-minute time restriction. Users have the option to upgrade by subscribing to a paid plan. The highest plan supports up to 1,000 concurrent participants for meetings lasting up to 30 hours. During the COVID-19 pandemic, there was a major increase in the use of Zoom for remote work, distance education, and online social relations. The increase led to Zoom being the 5th most downloaded mobile app worldwide in 2020 at 477.3 million downloads. History Zoom was originally founded in 2011. Its headquarters are located in San Jose, California. Zoom also has offices in Europe, Asia, and Australia. A beta version of Zoom—that could host conferences with only up to 15 video participants—was launched on August 21, 2012. On January 25, 2013, version 1.0 of the program was released with an increase in the number of participants per conference to 25. By the end of its first month, Zoom had 400,000 users, and rose to over one million users by May 2013. After the start of the COVID-19 pandemic, by February 2020, Zoom had gained 2.22 million users in 2020 – more users than it amassed in the entirety of 2019 with the company's share price spiking by 35 percent. In March 2020, the Zoom app was downloaded 2.13 million times. In April 2020, Zoom had more than 300 million daily meeting participants. On August 24, 2020, Zoom experienced widespread outages for several hours before service was restored. Features Zoom is compatible with Windows, macOS, iOS, Android, Chrome OS, and Linux. It is noted for its simple interface and usability, regardless of technological expertise. Features include one-on-one meetings, group video conferences, screen sharing, plugins, browser extensions, and the ability to record meetings and have them automatically transcribed. On some computers and operating systems, users are able to select a virtual background, which can be downloaded from different sites, to use as a backdrop behind themselves. Use of the platform is free for video conferences of up to 100 participants at once, with a 40-minute time limit if there are more than two participants. For longer or larger conferences with more features, paid subscriptions are available, costing $15–20 per month. Features geared towards business conferences, such as Zoom Rooms, are available for $50–100 per month. Up to 49 people can be seen on a desktop or laptop screen at once, up to 4 people per screen in iPhone and Android mobile phones and tablet computers, and up to 16 people per screen on iPad. Zoom has several tiers: Basic, Pro, Business, and Enterprise. Participants do not have to download the app if they are using Google Chrome or Firefox; they can click on a link and join from the browser. Users have to download the software in tablet computers and mobile phones with Android and iOS. Zoom security features include password-protected meetings, user authentication, waiting rooms, locked meetings, disabling participant screen sharing, randomly generated IDs, and the ability for the host to remove disruptive attendees. As of June 2020, Zoom began offering end-to-end encryption to business and enterprise users, with AES 256 GCM encryption enabled for all users. In October 2020, Zoom added end-to-end encryption for free and paid users. It's available on all platforms, except for the official Zoom web client. Zoom also offers a transcription service using Otter.ai software that allows businesses to store transcriptions of the Zoom meetings online and search them, including separating and labeling different speakers. As of July 2020, Zoom Rooms and Zoom Phone also became available as hardware as a service products. Zoom Phone is available for domestic telephone service in 40 countries as of August 2020. In January 2021, the company disclosed that it had sold 1 million seats for the Zoom Phone service. Zoom for Home, a category of products designed for home use, became available in August 2020. In September 2020, Zoom added new accessibility features to make the app easier to use for those who are deaf, hard of hearing, or visually impaired. New features include the ability to move around video windows in gallery view, pin video windows to be spotlighted; improved keyboard shortcuts; new tools to adjust the size of closed captioning text; and sign language interpreters' windows can now sit directly next to the speaker. In October 2020 at Zoomtopia, Zoom's annual user conference, the company unveiled OnZoom, a virtual event marketplace with an integrated payment system where users can host and promote free or paid live events. With OnZoom, users will be able to schedule and host one-time events or event series for up to 1,000 attendees, and sell tickets online. The company also announced Zoom Apps, a feature integrating third-party apps so they can be used within the Zoom interface during meetings. The first such apps were expected to be available around the end of 2020, from companies including Slack, Salesforce, Dropbox. and Qatalog. In October 2020, Zoom gave its users better security with an upgrade to end-to-end encryption for its online meetings network. On March 22, 2021, Zoom announced that it would start selling its videoconferencing technology as a white-label product, so other companies can embed it in their own products, with the calls running over Zoom but not carrying the company's brand name. In August 2021, Zoom launched a new feature called Focus Mode. It is designed for use in digital classrooms and other educational settings. When active, the mode will hide participants' screens from each other (though they can see each other's names) while the host retains the ability to see everyone's camera stream or screen share. The feature is available across all Zoom accounts, including free ones. In September 2021 at Zoomtopia, the company announced that end-to-end encryption would now be available as an upgrade for Zoom Phone users. The company also announced Bring Your Own Key (BYOK) (for users to manage their own encryption keys that Zoom cannot access or see), Verified Identity (a multi-factor authentication feature working through Okta that allows users to confirm the identity of meeting participants), and Video Engagement Center (for businesses to digitally interact with customers). Other announced updates include revamped virtual whiteboard features, including touchscreen whiteboards that can be digitized for remote participants, and improved collaboration between Zoom Meetings and Zoom Chat. In October 2021, the option to automatically generate closed captions in English for Zoom meetings was expanded to all accounts, including free ones. The feature had previously only been available for Premium users. Usage Since the start of the COVID-19 pandemic, Zoom has been used by banks, schools, universities, and government agencies around the world, by the UK Parliament, by healthcare professionals for telemedicine, barbershops, and ceremonies such as birthday parties, funeral services, and bar and bat mitzvah services. Zoom formed a partnership with Formula One to create a virtual club where fans can go behind the scenes and take part in virtual activities through Zoom, beginning with the Hungarian Grand Prix on July 19, 2020. An article published in July 2020 in the San Francisco Chronicle noted a new real estate trend in San Francisco and Oakland where some listings include "Zoom rooms" with backdrops for Zoom calls. People were complaining about "zoom fatigue" (too many video calls) before they had their "zoom happy hour" (online social meeting with friends or colleagues). Richard Nelson's play What Do We Need to Talk About? takes place on Zoom, with its main characters congregating online during the COVID-19 pandemic using Zoom. Written and directed by Nelson, it was commissioned by The Public Theater and premiered on YouTube on April 29, 2020, as a benefit performance. The New Yorker called it "the first great original play of quarantine". Oprah's Your Life in Focus: A Vision Forward was a live virtual experience hosted by Oprah Winfrey on Zoom from May 16 through June 6, 2020. In Source Material's play In These Uncertain Times, directed by Samantha Shay, characters communicate on Zoom. The play premiered on Zoom on July 25, 2020. In the 2020 British found-footage Zoom-based horror film Host, directed by Rob Savage, a group of young people have a remote séance in which they try contacting spirits over Zoom. It premiered on Shudder in July 2020. A live reading of Kristoffer Diaz's 2009 play The Elaborate Entrance of Chad Deity over Zoom streamed on Play-PerView from August 15–20, 2020. In the 2021 film Locked Down, directed by Doug Liman and starring Anne Hathaway and Chiwetel Ejiofor, characters communicate through Zoom conferences. On July 3–4, 2020, using Zoom Webinar, the International Association of Constitutional Law and Alma Mater Europaea organized the first "round-the-clock and round-the-globe" event that traveled through time zones, featuring 52 speakers from 28 countries. Soon after, a format of conferences that "virtually travel the globe with the sun from East to West", became common, some of them running for several days. On September 17, 2020, a live table read of the script for the 1982 film Fast Times at Ridgemont High was hosted by Dane Cook, with performers including Brad Pitt, Jennifer Aniston, Julia Roberts, original cast member Sean Penn, Matthew McConaughey, Shia LaBeouf, Morgan Freeman (who served as the narrator), Jimmy Kimmel, Ray Liotta, and John Legend, to raise money for the charity CORE. The broadcast of the 72nd Primetime Emmy Awards on September 20, 2020, hosted by Jimmy Kimmel, featured nominees participating through Zoom. On an alternate music video for the 2020 single "Ice Cream" by Blackpink featuring Selena Gomez, the artists appeared via Zoom from their homes. The series Zoom Where It Happens, airing on Zoom as a partnership between Zoom and Black female artists, launched in September 2020 with a virtual table read of an episode of The Golden Girls, reimagined with an all-Black cast. The second episode featured an all-Black cast in a table read of an episode of Friends, hosted by Gabrielle Union and featuring Sterling K. Brown and Uzo Aduba. Reception Zoom has been criticized for "security lapses and poor design choices" that have resulted in heightened scrutiny of its software. Many of Zoom's issues "surround deliberate features designed to reduce friction in meetings", which Citizen Lab found to "also, by design, reduce privacy or security". In March 2020, New York State Attorney General Letitia James launched an inquiry into Zoom's privacy and security practices, the inquiry was closed on May 7, 2020, with Zoom not admitting wrongdoing, but agreeing to take added security measures. In April 2020, CEO Yuan apologized for the security issues, stating that some of the issues were a result of Zoom's having been designed for "large institutions with full IT support", he noted that in December 2019, Zoom had a maximum of 10 million daily users, and in March 2020 the software had more than 200 million daily users, bringing the company increased challenges. Zoom agreed to focus on data privacy and issue a transparency report. In April 2020, the company released Zoom version 5.0, which addressed a number of the security and privacy concerns. It includes passwords by default, improved encryption, and a new security icon for meetings. In September 2020, Zoom added support for two-factor authentication to its desktop and mobile apps; the security feature was previously Web-only. As of April 2020, businesses, schools, and government entities who have restricted or prohibited the use of Zoom on their networks include Google, Siemens, the Australian Defence Force, the German Ministry of Foreign Affairs, the Indian Ministry of Home Affairs, SpaceX, and the New York City Department of Education. In May 2020, the New York City Department of Education lifted their ban on Zoom after the company addressed security and privacy concerns. By September 2020, Zoom had 370,200 institutional customers with more than 10 employees, up about 458 percent from the same quarter to the year before. The company's revenue rose 355 percent to $663.5 million, topping analysts' average estimate of $500.5 million. They were able to raise their annual revenue forecast by more than 30 percent after many of their free users converted to paid subscriptions. During the pandemic, Zoom's profit increased by 4000% despite paying zero taxes according to a report by the Institute on Taxation and Economic Policy, leading to controversies. Privacy Zoom has been criticized for its privacy and corporate data sharing policies, as well as enabling video hosts to potentially violate the privacy of those participating in their calls. There may also be issues with unauthorized surveillance of students and possible violations of students' rights under the Family Educational Rights and Privacy Act (FERPA). According to the company, the video services are FERPA-compliant, and it collects and stores user data only for tech support. In March 2020, a Motherboard article found that the company's iOS app was sending device analytics data to Facebook on startup, regardless of whether a Facebook account was being used with the service, and without disclosing it to the user. Zoom responded that it had recently been made aware of the issue and patched the app to remove the SDK after learning that it was collecting unnecessary device data. The company stated that the SDK was only collecting information on the user's device specifications (such as model names and operating system versions) in order to optimize its service and that it was not collecting personal information. In the same month, Zoom was sued by a user in U.S. Federal Court for illegally and secretly disclosing personal data to third parties including Facebook. Zoom responded that it "has never sold user data in the past and has no intention of selling users' data going forward". In April 2020, a Zoom information gathering feature was found that automatically sent user names and email addresses to LinkedIn, allowing some participants to surreptitiously access LinkedIn profile data about other users without their express consent. The companies disabled their integration. In May 2020, the Federal Trade Commission announced that it was looking into Zoom's privacy practices. The FTC alleged in a complaint that since at least 2016, "Zoom maintained the cryptographic keys that could allow Zoom to access the content of its customers' meetings, did not provide advertised end-to-end encryption, falsely claimed HIPAA compliance, installed the ZoomOpener webserver without adequate consent, did not uninstall the web server after uninstalling the Zoom App, and secured its Zoom Meetings with a lower level of encryption than promised." On November 9, 2020, a settlement was reached, requiring the company to stop misrepresenting security features, create an information security program, obtain biannual assessments by a third party, and implement additional security measures. Security In November 2018, a security vulnerability was discovered that allowed a remote unauthenticated attacker to spoof UDP messages that allowed the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens. The company released fixes shortly after the vulnerability was discovered. In July 2019, security researcher Jonathan Leitschuh disclosed a zero-day vulnerability allowing any website to force a macOS user to join a Zoom call, with their video camera activated, without the user's permission. Attempts to uninstall the Zoom client on macOS would prompt the software to re-install automatically in the background using a hidden web server that was set up on the machine during the first installation so that it remains active even after attempting to remove the client. After receiving public criticism, Zoom removed the vulnerability and the hidden webserver to allow complete uninstallation. In April 2020, security researchers found vulnerabilities where Windows users' credentials could be exposed. Another vulnerability allowing unprompted access to cameras and microphones was made public. Zoom issued a fix in April 2020. In the same month, "Zoombombing", the phenomenon of unwanted participants joining a meeting to cause disruption, prompted a warning from the Federal Bureau of Investigation. Motherboard reported that there were two Zoom zero-days for macOS and Windows respectively, selling for $500,000, on April 15, 2020. Security bug brokers were selling access to Zoom security flaws that could allow remote access into users' computers. Hackers also put up over 500,000 Zoom user names and passwords for sale on the dark web. In response to the multitude of security and privacy issues found, Zoom began a comprehensive security plan, which included consulting with Luta Security, Trail of Bits, former Facebook CSO Alex Stamos, former Google global lead of privacy technology Lea Kissner, BishopFox, the NCC Group, and Johns Hopkins University cryptographer Matthew D. Green. On April 20, 2020, the New York Times reported that Dropbox engineers had traced Zoom's security vulnerabilities back over two years, pushing Zoom to address such issues more quickly, and paying top hackers to find problems with Zoom's software. In the same article, the New York Times noted that security researchers have praised Zoom for improving its response times, and for quickly patching recent bugs and removing features that could have privacy risks. In April 2020, Zoom made many of its security settings default settings, and they advised users on ways to mitigate Zoombombing. In a blog post on April 1, 2020, Yuan announced a 90-day freeze on releasing new features, to focus on fixing privacy and security issues within the platform. The company created a new "report a user to Zoom" button, intended to catch those behind Zoombombing attacks. On July 1, 2020, at the end of the freeze, the company stated it had released 100 new safety features over the 90-day period. Those efforts include end-to-end encryption for all users, turning on meeting passwords by default, giving users the ability to choose which data centers calls are routed from, consulting with security experts, forming a CISO council, an improved bug bounty program, and working with third parties to help test security. Yuan also stated that Zoom would be sharing a transparency report later in 2020. On 16 November 2020, Zoom announced a new security feature to combat disruptions during a session. The new feature was said to be a default for all free and paid users and made available on the Zoom clients for Mac, PC, and Linux, as well as Zoom mobile apps. Encryption practices Zoom encrypts its public data streams, using TLS 1.2 with AES-256 (Advanced Encryption Standard) to protect signaling, and AES-128 to protect streaming media. Security researchers and reporters have criticized the company for its lack of transparency and poor encryption practices. Zoom initially claimed to use "end-to-end encryption" in its marketing materials, but later clarified it meant "from Zoom end point to Zoom end point" (meaning effectively between Zoom servers and Zoom clients), which The Intercept described as misleading and "dishonest". Alex Stamos, a Zoom advisor who was formerly security chief at Facebook, noted that a lack of end-to-end encryption is common in such products, as it is also true of Google Hangouts, Microsoft Teams, and Cisco Webex. On May 7, 2020, Zoom announced that it had acquired Keybase, a company specializing in end-to-end encryption, as part of an effort to strengthen its security practices moving forward. Later that month, Zoom published a document for peer review, detailing its plans to ultimately bring end-to-end encryption to the software. In April 2020, Citizen Lab researchers discovered that a single, server-generated AES-128 key is being shared between all participants in ECB mode, which is deprecated due to its pattern-preserving characteristics of the ciphertext. During test calls between participants in Canada and United States, the key was provisioned from servers located in mainland China where they are subject to the China Internet Security Law. On June 3, 2020, Zoom announced that users on their free tier will not have access to end-to-end encryption so that they could cooperate with the FBI and law enforcement. Later, they said that they do not "proactively monitor meeting content". On June 17, 2020, the company reversed course and announced that free users would have access to end-to-end encryption after all. On September 7, 2020, cryptography researcher Nadim Kobeissi accused Zoom's security team of failing to credit his open-source protocol analysis research software, Verifpal, with being instrumental during the design phase of Zoom's new encryption protocol, as described in their whitepaper published in June 2020. Kobeissi published a week's worth of conversations with Zoom's security leadership in support of his claim, including Max Krohn, which included eight Verifpal models that Zoom's team asked for feedback on, promises of a citation to credit Kobeissi for his contributions and an admission that the Verifpal citation was pulled from the whitepaper at the last moment for unspecified reasons. Kobeissi also linked to a tweet by Zoom security consultant Lea Kissner which he described as a public character assassination attempt issued in response to his repeated requests to have his work cited in the research paper published by Zoom. Data routing Zoom admitted that some calls in early April 2020 and prior were mistakenly routed through servers in mainland China, prompting some governments and businesses to cease their usage of Zoom. The company later announced that data of free users outside of China would "never be routed through China" and that paid subscribers will be able to customize which data center regions they want to use. The company has data centers in Europe, Asia, North America, and Latin America. Censorship An April 2020 Citizen Lab report warned that having much of Zoom's research and development in China could "open up Zoom to pressure from Chinese authorities". Lee Cheuk Yan's (Chairman of Hong Kong Labour Party) account was also closed in early May 2020, and human rights activist Zhou Fengsuo's was closed in June after he held an event discussing the 1989 Tiananmen Square protests and massacre. In June 2020, Zoom acknowledged that it had terminated two accounts belonging to U.S. users and one of a user from Hong Kong connected to meetings discussing 1989 Tiananmen Square protests, the accounts were later re-opened, with the company stating that in the future it "will have a new process for handling similar situations". Zoom also announced upcoming technology that could prevent participants from specific countries from joining calls that were deemed illegal in those areas. In September 2020, Zoom blocked San Francisco State University from using its video conferencing software to host Popular Front for the Liberation of Palestine (PFLP) militant and hijacker Leila Khaled in response to vigorous lobbying by the Jewish coalition group "End Jewish Hatred". In justifying its decision, Zoom cited the PFLP's designation as a terrorist organization by the United States Government and its efforts to comply with U.S. export control, sanctions, and anti-terrorism laws. Facebook and YouTube also joined Zoom in denying their platforms to the conference organizers. Professor Rabab Ibrahim Abdulhadi, one of the conference organizers, criticized Zoom, Facebook, and Google for allegedly censoring Palestinian voices. Transparency On December 18, 2020, Zoom announced it would be issuing its first transparency report. These reports will be published twice a year beginning in 2021. These reports are supposed to show how Zoom responds when user data is requested by law enforcement or government officials. Zoom states that it "only produces user data to governments in response to valid and lawful requests in accordance with our Government Requests Guide and relevant legal policies". The first report covers from May 1, 2020, to December 12, 2020. Regulatory issues In August 2021, the Data Protection regulatory body in Hamburg, Germany, ruled that Zoom is operating in the European Union in breach of the General Data Protection Regulation (GDPR). This is due to the fact that, as per the Schrems II ruling, data that is being transferred out of the EU must be given the same protections that provided by GDPR. The data gathered by Zoom is being sent to the United States. See also List of video telecommunication services and product brands Impact of the COVID-19 pandemic on science and technology Zoom fatigue Zoom town References External links 2012 software Videotelephony Web conferencing Internet properties established in 2012 Impact of the COVID-19 pandemic on science and technology Impact of the COVID-19 pandemic in the United States Software associated with the COVID-19 pandemic
1113557
https://en.wikipedia.org/wiki/System%20bus
System bus
A system bus is a single computer bus that connects the major components of a computer system, combining the functions of a data bus to carry information, an address bus to determine where it should be sent or read from, and a control bus to determine its operation. The technique was developed to reduce costs and improve modularity, and although popular in the 1970s and 1980s, more modern computers use a variety of separate buses adapted to more specific needs. The system level bus (as distinct from a CPU's internal datapath busses) connects the CPU to memory and I/O devices. Typically a system level bus is designed for use as a backplane. Background scenario Many of the computers were based on the First Draft of a Report on the EDVAC report published in 1945. In what became known as the Von Neumann architecture, a central control unit and arithmetic logic unit (ALU, which he called the central arithmetic part) were combined with computer memory and input and output functions to form a stored program computer. The Report presented a general organization and theoretical model of the computer, however, not the implementation of that model. Soon designs integrated the control unit and ALU into what became known as the central processing unit (CPU). Computers in the 1950s and 1960s were generally constructed in an ad-hoc fashion. For example, the CPU, memory, and input/output units were each one or more cabinets connected by cables. Engineers used the common techniques of standardized bundles of wires and extended the concept as backplanes were used to hold printed circuit boards in these early machines. The name "bus" was already used for "bus bars" that carried electrical power to the various parts of electric machines, including early mechanical calculators. The advent of integrated circuits vastly reduced the size of each computer unit, and buses became more standardized. Standard modules could be interconnected in more uniform ways and were easier to develop and maintain. Description To provide even more modularity with reduced cost, memory and I/O buses (and the required control and power buses) were sometimes combined into a single unified system bus. Modularity and cost became important as computers became small enough to fit in a single cabinet (and customers expected similar price reductions). Digital Equipment Corporation (DEC) further reduced cost for mass-produced minicomputers, and memory-mapped I/O into the memory bus, so that the devices appeared to be memory locations. This was implemented in the Unibus of the PDP-11 around 1969, eliminating the need for a separate I/O bus. Even computers such as the PDP-8 without memory-mapped I/O were soon implemented with a system bus, which allowed modules to be plugged into any slot. Some authors called this a new streamlined "model" of computer architecture. Many early microcomputers (with a CPU generally on a single integrated circuit) were built with a single system bus, starting with the S-100 bus in the Altair 8800 computer system in about 1975. The IBM PC used the Industry Standard Architecture (ISA) bus as its system bus in 1981. The passive backplanes of early models were replaced with the standard of putting the CPU and RAM on a motherboard, with only optional daughterboards or expansion cards in system bus slots. The Multibus became a standard of the Institute of Electrical and Electronics Engineers as IEEE standard 796 in 1983. Sun Microsystems developed the SBus in 1989 to support smaller expansion cards. The easiest way to implement symmetric multiprocessing was to plug in more than one CPU into the shared system bus, which was used through the 1980s. However, the shared bus quickly became the bottleneck and more sophisticated connection techniques were explored. Even in very simple systems, at various times the data bus is driven by the program memory, by RAM, and by I/O devices. To prevent bus contention on the data bus, at any one instant only one device drives the data bus. In very simple systems, only the data bus is required to be a bidirectional bus. In very simple systems, the memory address register always drives the address bus, the control unit always drives the control bus, and an address decoder selects which particular device is allowed to drive the data bus during this bus cycle. In very simple systems, every instruction cycle starts with a READ memory cycle where program memory drives the instruction onto the data bus while the instruction register latches that instruction from the data bus. Some instructions continue with a WRITE memory cycle where the memory data register drives data onto the data bus into the chosen RAM or I/O device. Other instructions continue with another READ memory cycle where the chosen RAM, program memory, or I/O device drives data onto the data bus while the memory data register latches that data from the data bus. More complex systems have a multi-master bus—not only do they have many devices that each drive the data bus, but also have many bus masters that each drive the address bus. The address bus as well as the data bus in bus snooping systems is required to be a bidirectional bus, often implemented as a three-state bus. To prevent bus contention on the address bus, a bus arbiter selects which particular bus master is allowed to drive the address bus during this bus cycle. Dual Independent Bus As CPU design evolved into using faster local buses and slower peripheral buses, Intel adopted the dual independent bus (DIB) terminology, using the external front-side bus to the main system memory, and the internal back-side bus between one or more CPUs and the CPU caches. This was introduced in the Pentium Pro and Pentium II products in the mid to late 1990s. The primary bus for communicating data between the CPU and main memory and input and output devices is called the front-side bus, and the back-side bus accesses the level 2 cache. Since 2005/2006, considering an architecture in which 4 processors share a chipset, the DIB is composed by two buses, each of them is shared among two CPUs. The theoretical bandwidth is doubled compared to a shared front-side bus up to 12.8 GB/s in the best case. However, the snoop information useful to guarantee the cache coherence of shared data located in different caches have to be sent in broadcast, reducing the available bandwidth. To mitigate this limitation, a snoop filter was inserted in the chipset, in order to cache the snoop information. Modern personal and server computers use higher-performance interconnection technologies such as HyperTransport and Intel QuickPath Interconnect, while the system bus architecture continued to be used on simpler embedded microprocessors. The systems bus can even be internal to a single integrated circuit, producing a system-on-a-chip. Examples include AMBA, CoreConnect, and Wishbone. See also Bus (computing) External Bus Interface Expansion bus References Computer buses
27547786
https://en.wikipedia.org/wiki/Owen%20Mock
Owen Mock
Owen R. Mock was a computer software designer and programmer who pioneered computer operating systems in the 1950s. In 1954 Mock was part of a group of programmers at the Los Angeles division of North American Aviation (NAA) who developed the PACT series of compilers for the IBM 701 computer. In December 1955, Mock's group installed in the IBM 701 the "North American 701 Monitor" which was the first operating system to be in operation. General Motors Research (GMR) also had an IBM 701 and used the compilers developed by Mock's group. When Robert L. Patrick at GMR designed a non-stop multi-user batch processing operating system for use on the next generation computer (IBM 704), Mock's group at NAA and George Ryckman's group at GMR joined forces to develop Robert Patrick's design for the IBM 704. This GM-NAA I/O software was the first operating system for the 704 and began production in 1956. Publications Owen R. Mock, Logical Organization of the PACT I Compiler, J. ACM, vol. 3, No. 4, pages 279-287 (October, 1956). Owen R. Mock, The Share 709 System: Input-Output Buffering, J. ACM, vol. 6, No. 2, pages 145-151, (April, 1959). References North American 701 Monitor by Owen R. Mock American computer programmers Living people Year of birth missing (living people)
72303
https://en.wikipedia.org/wiki/Blackberry%20%28disambiguation%29
Blackberry (disambiguation)
The blackberry is a widespread and well known shrub of the genus Rubus, and its fruit. Blackberry may also refer to: Company and products BlackBerry Limited, formerly known as Research in Motion Ltd, with the following products: BlackBerry, smartphones by Blackberry Ltd. BlackBerry 10, the mobile operating system used by BlackBerry devices released between 2013 and 2015 List of BlackBerry 10 devices, Devices shipped with the BlackBerry 10 operating system BlackBerry OS, the original operating system used by BlackBerry smartphone devices BlackBerry Bold, QWERTY keyboard smartphones by Research in Motion Ltd BlackBerry Torch, a full-touchscreen line of smartphones by Research in Motion Ltd BlackBerry Curve, an entry-level line of smartphones by Research in Motion Ltd BlackBerry Tour, a previous line of smartphones by Research in Motion Ltd BlackBerry PlayBook, a touchscreen tablet computer by Research in Motion Ltd BlackBerry Priv, an Android slider device developed by BlackBerry Limited Characters Blackberry (Watership Down), a fictional rabbit People Blackberri (1945–2021), American singer-songwriter and community activist George Odhiambo (born 1992), Kenyan association footballer known as Blackberry Wren Blackberry, children's fiction author Places Black Berry Islands, Nunavut, Canada Blackberry Creek (Kentucky) Blackberry Creek (Missouri) Blackberry Township, Itasca County, Minnesota, USA Blackberry Township, Kane County, Illinois, USA Songs "Blackberry" (song), by the Black Crowes "Blackberry Way", by The Move See also Blackberry Blossom (disambiguation) Black raspberry
34784001
https://en.wikipedia.org/wiki/Marmik
Marmik
Marmik (Marathi: मार्मिक Mārmik) meaning: [Straight from the heart/A silent word that goes directly to the Heart] is an Indian weekly published by the Shiv Sena from Mumbai, until publication of its daily Saamana it was Shiv Sena's organ. It is seen as the frontrunner or launchpad for the Shiv Sena party. It focused on issues of common Marathi man or Maratha Manoos including unemployment, influx of migrant, retrenchment of Marathi workers and its office in Ranade Road became the rallying point for Marathi youth. It was Marmik issue on 5 June 1966 which first announced the launch of membership for the Shiv Sena. Bal Thackeray later stated "that not just a cartoon weekly but also the prime reason for the birth and growth of the Sena.". History Bal Thackeray, started as a cartoonist for The Free Press Journal. In 1960 when he was 34, he quit his job and started Marmik. He was joined by his younger brother Shrikant Thackeray. It was launched on 13 August 1960 and it was inaugurated by the then Maharashtra chief Minister Yashwantrao Chavan. Bal Thakre's cartoons used to be published in Marmik. It basically mock maharashtra government policies and raise unemployment issue. References News magazines published in India Bal Thackeray Publications established in 1960 1960 establishments in Maharashtra Mass media in Mumbai
10453104
https://en.wikipedia.org/wiki/Google%20Pinyin
Google Pinyin
Google Pinyin IME () was an input method developed by Google China Labs. The tool was made publicly available on April 4, 2007. Aside from Pinyin input, it also includes stroke count method input. As of March 2019, Google Pinyin has been discontinued and the download page has been deleted. However, Google Pinyin IME can still be obtained from https://dl.google.com/pinyin/v2/GooglePinyinInstaller.exe (as of July 31, 2021). Availability Windows , Google Pinyin was available for Windows XP, Windows Vista, Windows 7, Windows 8 & Windows 10 version 1511 or below. Both 32-bit and 64-bit versions were available. Android Google released a Pinyin IME system for Android 1.5 or newer in March 2009. The Android Pinyin IME supports user dictionary synchronization with the desktop version. Linux By the end of 2008, more than 20% users of Google Pinyin wanted a Linux version of the input method, which was answered in the FAQ section with a general PR phrase "We always strive to provide a better user experience and we never stop our hard work to fulfill the customer needs". However, the Linux user community is porting the Android Google Pinyin IME to the non-Android Linux IME framework SCIM in the scim-googlepinyin module. After Christmas 2009, the Google pinyin module for SCIM became also available for the Nokia Maemo 5 platform, which meant it could be downloaded to any Nokia N900 phone through the official application repositories. Mac OS X A closed beta version of Google Pinyin for Mac OS X was leaked on September 14, 2010. The first public version is not yet available. Copyright infringement allegations After Google Pinyin was initially released in April 2007, it was soon discovered that Google Pinyin's dictionary database contained employee names of Sogou Pinyin, an indication that the dictionary was taken from Sogou, one of Google's competitors in the Chinese Internet market. On April 8, 2007, Google admitted that they used "non-Google database resources". Shortly thereafter, a new version of Google Pinyin was released which no longer appeared to be based on Sogou's database. Synchronization failure Google Pinyin for Windows has been failing to synchronize for years because of the deprecation of Google ClientLogin authentication. A client with an alternative authentication method has not been announced yet. Google Pinyin for Android can still synchronize (within this platform only). See also Pinyin input method Google Zhuyin Google IME Google Japanese Input Microsoft Pinyin IME Sogou Pinyin References External links Google Pinyin Website Official Google Group (Old) Version History Pinyin Han character input Freeware Windows text-related software Android (operating system) software Pinyin Han pinyin input
62908349
https://en.wikipedia.org/wiki/David%20Notkin
David Notkin
David Notkin (1 January 1955 – 22 April 2013) was an American software engineer and professor of computer science. Early life and education Notkin was born in 1955 in Syracuse, New York, U.S. He pursued his Sc. B. degree from Brown University, graduating in 1977, and later received his doctoral degree from Carnegie Mellon University in 1984. He then moved to Seattle and joined as a faculty at the University of Washington. His interest was in software engineering, with a particular focus on software evolution. Career In 2000, Notkin received the Distinguished Graduate Mentor Award from the University of Washington. He served as chair of the computer science and engineering department from 2001 to 2006, during which he helped to open the Paul G. Allen Center for Computer Science & Engineering. He was a Fellow of both the ACM and IEEE. From 2007 to 2012, he served as the editor-in-chief of the ACM Transactions on Software Engineering and Methodology. He was also a board member of the Computing Research Association. Notkin is also noted for his efforts to expand the demographics of computing research, particularly to include women. In 2013, he received the A. Nico Habermann Award in recognition of this. He is also one of the two people after whom the Harrold and Notkin Research and Graduate Mentoring Award, given by the National Center for Women & Information Technology, is named. In February 2013, the University of Washington announced the creation of the David Notkin Endowed Graduate Fellowship in Computer Science & Engineering, in an event attended by over 300 computer science students at the university to recognise Notkin's contributions. Death and legacy After a few years of battling cancer, Notkin died on April 22, 2013. Awards Notkin received a number of awards: National Science Foundation Presidential Young Investigator Award (1988) Distinguished Graduate Mentor Award, University of Washington (2000) ACM SIGSOFT Distinguished Service Award (2007) AMC SIGSOFT Influential Educator Award (2012) A. Nico Habermann Award (2013) References 1955 births 2013 deaths People from Syracuse, New York Brown University alumni Carnegie Mellon University alumni University of Washington faculty Fellows of the Association for Computing Machinery Fellow Members of the IEEE American computer scientists
5008398
https://en.wikipedia.org/wiki/653d%20Electronic%20Systems%20Wing
653d Electronic Systems Wing
The 653d Electronic Systems Wing is a wing of the United States Air Force located at Hanscom Air Force Base, Massachusetts. Mission The 653d Electronic Systems Wing executes a $21 billion fiscal year defense plan budget with 1,300 personnel. The 653 ELSW acquires, delivers and sustains Air Force and Joint systems to include communications, intelligence and airspace management capabilities supporting AF Global Continuous Operations. Additionally, the wing provides engineering and integration to optimize delivery of net-centric capabilities to warfighter for effects-based combat operations and support. The wing serves 9 major commands, 4 Services, 7 Combatant Commands (COCOM), 14 national agencies, and NATO. Units From 2004 to 2010 the 653rd Wing consisted of three groups with four squadrons: The 653d Electronic Systems Group, the 753d Electronic Systems Group, the 853d Electronic Systems Group, the 639th Electronic Systems Squadron, the 640th Electronic Systems Squadron, the 641th Electronic Systems Squadron, and the 644th Electronic Systems Squadron. The 653d Electronic Systems Group (653 ELSG) executed a $18 billion Fiscal Year Defense Plan budget with six divisions and squadrons. The group had 720 personnel. The 653 ELSG acquired, delivered and sustained networks, integrated information systems, enterprise services and applications for the Global Information Grid, facilitating communication between land, naval, air and space warfare forces. The group delivered capabilities for voice, video and data networks focused on joint and coalition warfighter needs to enable worldwide net-centric ops. The 753d Electronic Systems Group (753 ELSG) executed a $500 million Fiscal Year Defense Plan budget with 350 personnel. The group was the ESC lead for AF and joint capabilities, planning and enterprise integration. The 753 ELSG leveraged $14 billion Air Force combat and command budget in support of net-centric operations, performed XR staff functions, and identified technical opportunities through management of experiments and simulations. Additionally the group acquired, fielded and sustained interoperable C2 capabilities; implemented C2 net-centric integration with all commands and services. The 853d Electronic Systems Group (853 ELSG) executed a $2.6 billion Fiscal Year Defense Plan budget with 260 personnel. The group acquired, fielded and sustained mission critical fixed and deployable airborne, space and ground-based Communication, navigation and surveillance/Air Traffic Management and landing systems. The group also certified CNS/ATM systems to meet warfighting requirements for access to global airspace vital to AF Global Attack, Rapid Global Mobility and joint operations worldwide. History The wing was last active on 1 October 1994, after being redesignated the 653d Communications-Computer Systems Group on 1 October 1992 at Robins Air Force Base, GA. The redesignated Wing activated in November 2005 at Hanscom Air Force Base as the Network Centric Operations and Integration Systems Wing. It received its present designation after the two units were consolidated in 2006. Lineage 653d Communications-Computer Systems Group Designated as the 1926th Airways and Air Communications Squadron and organized on 18 February 1956 Redesignated 1926th Communications Squadron on 1 July 1961 Redesignated 1926th Communications and Installation Group on 30 June 1977 Redesignated 1926th Communications Squadron on 1 June 1981 Redesignated 1926th Information Systems Squadron on 1 January 1986 Redesignated 1926th Communications Squadron on 1 November 1986 Redesignated 1926th Communications-Computer Systems Group on 1 October 1990 Redesignated 653d Communications-Computer Systems Group on 1 October 1992 Inactivated on 1 October 1994 Consolidated on 6 May 2006 with the 653d Electronic Systems Wing as the 653d Electronic Systems Wing 653d Electronic Systems Wing Constituted as the Network Centric Operations/Integration Systems Wing on 23 November 2004 Activated on 17 December 2004 Redesignated 653d Electronic Systems Wing on 17 April 2006 Consolidated on 6 May 2006 with the 653d Communications-Computer Systems Group Assignments 1803d Airways and Air Communications System Group (later Southeastern Airways and Air Communications System Region, Southeastern Communications Region): 18 February 1956 Eastern Communications Region: 1 July 1963 Southern Communications Area: 1 May 1970 Continental Communications Division: 1 June 1981 Logistics Information Systems Division (later Logistics Communications Division): 1 January 1986 Warner Robins Air Logistics Center: 1 October 1990 – 1 October 1994 Electronic Systems Center: 17 December 2004 - present Subordinate Units Global Information Grid Systems Group (later 653rd Electronic Systems Group), 17 December 2004 – 30 June 2010 639 Electronic Systems Squadron, 17 April 2006 – 30 June 2010 640 Electronic Systems Squadron, 17 April 2006 – 30 June 2010 Enterprise Integration Systems Group (later 753rd Electronic Systems Group), 17 December 2004 – 30 June 2010 644 Electronic Systems Squadron, 17 April 2006 – 30 June 2010 Global Air Traffic Systems Group (later 853rd Electronic Systems Group), 17 December 2004 – 30 June 2010 641 Electronic Systems Squadron, 17 April 2006 – 30 June 2010 Stations Robins Air Force Base, Georgia, 18 February 1956 – 1 October 1994 Hanscom Air Force Base, Massachusetts, 17 December 2004 - Present Weapons Systems Supported References Notes Citations Bibliography External links Official Fact-Sheet Hanscom AFB Website Air Force Historical Research Agency Military units and formations in Massachusetts Electronic Systems 0653
1630783
https://en.wikipedia.org/wiki/Tim%20Hartnell
Tim Hartnell
Tim Hartnell (1951–1991) was an Australian journalist, self-taught programmer and author of books and magazines on computer games. He set up The National ZX80 User Group with Trevor Sharples in 1980 producing a more-or-less monthly magazine entitled Interface. This User Group then expanded to include the ZX81, Acorn Atom and Spectrum computers, and provided a springboard for Tim and Trevor to launch the first of their home computing books. His company, Interface Publications (set up with Elizabeth North), produced titles for all of the machines in the home computer market, including Sinclair machines. Hartnell wrote several compendiums of computer games, which typically had several categories of games, with several games in each category. Each category had tips for writing enjoyable games in that genre. Each game had a description of the program and an explanation of its implementation, sometimes with ideas for modifications; this was followed by the raw code, which the reader had to enter into the computer. Some long games, such as Bannochburn Legacy, had more than 500 lines of code. To illustrate the style of these compendiums, here is the Table of Contents from Hartnell's Giant Book of Computer Games: BOARD GAMES - Chess, Gomoku, Awari, Knightsbridge, Shogun and others ADVENTURE GAMES - Stronghold of the Dwarven Lords, The Duke of Dragonfear, The Bannochburn Legacy SIMULATIONS - including Mistress of Xenophobia DICE GAMES - Chemin de Computer, No Sweat, and three more ARTIFICIAL INTELLIGENCE - including Eliza and Electronic Brain JUST FOR FUN - Inner Spring, Robot Minefield, and five others FUN WITH YOUR PRINTER - Celestia and Billboard SPACE GAMES - including Moonlander BRAIN GAMES - Fastermind, Switcheroo and several others Hartnell also wrote several how-to books about various genres of computer games, including Giant Book of Spectrum Games published in 1983, and also edited others, including Pete Shaw's Creating Adventure Games On Your ZX Spectrum, also published in 1983. They were designed so that a beginner could, using his programs as examples, intuitively learn the BASIC programming language. Although he created a wide variety of games, the code for all of them tended to be characterized by an outline-style organization that made it easy to discern the basics of how the program worked. His prose showed a passionate interest in, and enjoyment of, the games he created; he tended to be imaginative, witty, and dramatic, as well as nostalgic - he had little use for graphics, favoring text games that let the programmer's and player's imaginations do the work of creating the setting. Hartnell returned to Australia in 1984 and died of cancer in 1991, at the age of 40. References External links The Giant Book of Computer Games, Table of Contents, The Giant Book of Spectrum Arcade Games, Tanzarine Technology Ltd. Hartnell, Tim: Creating Adventure Games On Your Computer. Tribute at worldofspectrum.org About Interface Publications Hartnell, Tim Hartnell, Tim Hartnell, Tim Hartnell, Tim Australian computer programmers
28677568
https://en.wikipedia.org/wiki/Oil%20Rush
Oil Rush
Oil Rush is a tower defense real-time strategy game developed by UNIGINE Holding S.à r.l. using their Unigine engine technology. Set in a flooded, post-apocalyptic world, the game consists of players fighting over control of the world's last remaining oil reserves. The game was released as a digital download for Microsoft Windows, Linux, and OS X. This theme has been viewed as controversial by some, especially as Oil Rush was originally intended to be released only a little more than a year after the much publicized Deepwater Horizon oil spill. The game itself actually delivers an environmental warning message, with Unigine's CEO Denis Shergin commenting that "Fuel devouring armies that fight over the last drops of oil and pollute already trashed world is nothing but doublethink. That is a warning environmental message we'd like to deliver in a single-player campaign." Plot In Oil Rush, the player is shown the viewpoint and story of Kevin, a recent graduate and serviceman, following in his father's footsteps who has recently died. He is almost immediately tasked by The Commander to suppress a rebel faction, The Raiders, who are trying to take control of the oil rigs in the army's possession. Now in control of a fleet of combat units, an in-game guidance PDA issues the player basic instructions to help learn how to complete the set of objectives they are assigned, such as deploying only 25 percent of the combat units, production of armed defense units on oil rigs in your control, and dividing forces into groups to attack opposing rigs simultaneously. Gameplay The game combines classic elements of strategy and tower defense as players must defend and attack oil rigs through the use of armed platforms against hordes of enemy watercraft and other attack units. The campaign's story puts the player in the shoes of Kevin, a graduate of the military academy and disciple of The Commander in a story-driven succession, while multiplayer allows players to go head-to-head against friends or online opponents in a strategic manner. Players are forced to maintain, upgrade, defend, and attack oil rigs put in various locations on each map. Development Although originally planned to be released in the fourth quarter of 2010, the game was later delayed until March 2011 due to more development time being needed as well as more time to negotiate with potential publishers. It was then further delayed until June 2011 to allow more time to work on the single-player campaign. The ability to pre-order the game has been available since March 2, 2011. Unigine worked on development throughout 2011, providing incremental updates to the beta builds for those who pre-ordered the game. Over time, noteworthy fixes and updates came through in the form of improved gamma control on Windows and Linux platforms, fixing anti-aliasing issues, debugging, performance optimizations, usability fixes, subtitles, voice-overs, and 3D capability for users with certain high-end graphics cards, amongst much more. Each update was rolled out in around two weeks of the last, continuing improvement on the game. In the last update before release, version 0.98, Unigine's changelog noted that it had included splashes during the introduction of its partners, including NVIDIA and RakNet. Though originally uninterested in an OS X release of the game, Unigine later announced that they intended to launch a native OS X version of the game. Release The game was released internationally on January 25, 2012 through digital portals including Desura, Ubuntu Software Center, and finally launching on Steam later the same day. Independent European publisher Iceberg Interactive signed with Unigine to secure retail distribution of Oil Rush in the United Kingdom, Germany, France, Scandinavia, Australia, New Zealand, and South Africa, set to be released on February 24, 2012 throughout Europe, with a fully localized version for the German market to follow on March 23, 2012. Android version was released on March 18, 2013. iOS version was released on October 24, 2013. Reception Since its announcement, the game has garnered much attention from Linux-oriented tech sites and blogs, the most notable of which would be Phoronix and received much praise for its graphics and gameplay even during its beta testing stages. Phoronix featured many articles about it for over a year and a half, before releasing their release date announcement and unofficial review of the game, going on to say, "Even if you're not the biggest Linux gamer or a real-time strategy fan, I still would recommend picking up this $20 USD Linux-native title on the basis of supporting Unigine Corp as one of the leading Linux-friendly commercial game studios". On the review aggregator website Metacritic, Destructoid's Maurice Tan reviewed the game and gave it a rating of 8.0 out of 10. He noted, "What could have been a messy title merely created to showcase the Unigine Engine has turned out to be a surprisingly polished and deep strategy game. Oil Rush isn't just a joy to behold in action, but manages to make an old genre feel fresh while looking the part." Later in the review, he said of the game that it was "one of the first strategy surprises of the year" and that the "simple design of hop-skip-jump platform fights hides layers of depths that make it an easy-to-learn, hard-to-master arcade naval warfare experience." User reviews of the game on the digital content distribution platform Desura have also been positive, receiving an average rating of 9.5 out of 10, 73% of reviewers having given the game a 10/10 score. Reviews ranged from praising the graphics, the performance of the game, particularly on Linux systems, and the mix of the game's strategy and tower defense gameplay. On the Ubuntu Software Center, the game currently has 4 out of 5 stars, based on 42 user reviews. References External links 2012 video games Android (operating system) games Cancelled PlayStation 3 games Indie video games IOS games Linux games MacOS games Post-apocalyptic video games Real-time strategy video games Tower defense video games Video games developed in Russia Windows games Multiplayer and single-player video games Iceberg Interactive games
25146925
https://en.wikipedia.org/wiki/Mephisto%20%28chess%20computer%29
Mephisto (chess computer)
Mephisto was a line of chess computers sold by Hegener & Glaser (H+G). In addition to integrated travel and sensory computers, they also sold a line of modular electronic autosensory boards (Modular, Exclusive, München, and Bavaria) which could accept different program, processor, and display modules. Its strongest software was written by Richard Lang, who later ported it to personal computers as Psion and ChessGenius. Lang's Mephisto programs won six World Computer Chess Championships (WCCC) from 1984 to 1990. H&G also sold engines licensed from Johan de Koning, Ed Schröder, and Frans Morsch. Different models used different 8-bit, 16-bit and 32-bit processors, including MOS Technology 6502, Motorola 68HC05, Motorola 68000 and others. Hegener & Glaser and its Mephisto brand were bought in 1994 by Saitek. Their computers currently sold under the Mephisto brand use programs written by Frans Morsch. Hegener & Glaser (Mephisto) 1969 established in Munich by Manfred Hegener and Florian Glaser for the production of semiconductors 1978 the programmers Thomas Nitsche and Elmar Henne came into contact with H+G Thomas Nitsche and Elmar Henne 1980 the "Mephisto" Tradename was created, nicknamed Brikett (German for briquette) — the first German Chess Computer — programmed by Thomas Nietsche and Elmar Henne, appeared in stores. 1983 Introduction of the Modular system, with the Mobil, Modular, and Exclusive boards and MM I module. 1984 with Richard Lang and his Psion chess (Winner of World Microcomputer Chess Championship 1984 in Glasgow) began a long series of World Championship successes. 1985 introduction of Lang's first Mephisto module, the Amsterdam 68000 1989 over 90% of all chess computers sold in Germany were Mephistos 1989 H+G buys "Fidelity Electronics Inc." for ~ 7 Million US $ 1990 the market for high-priced chess computers collapses. The cause is the growth of high-performance 486 PCs and the availability of newly developed low-cost strong chess software for PCs. 1992 H+G shows losses of 28 Million DM 1992 Ed Schröder wins with Gideon 3.1 (later sold as Mephisto Risc 2) the open 7. WCCC — ahead of large mainframe computers and special hardware machines 1994 H+G is bought by Saitek for ~ 7 Million DM 1994 Richard Lang's Genius (Mephisto London) beats Garry Kasparov in the Intel World Chess Grand Prix Turnier in London on a Pentium Processor 1997 Manfred Hegener and Ossi Weiner form the company "Millennium 2000 GmbH Hegener & Weiner" and produce the "Millennium Schachpartner 2000", sold at 99 DM 2005 Phoenix Chess Systems releases the Resurrection module for existing Mephisto modular boards. The hardware uses a 200 MHz ARM processor to run modern chess engines, resulting in the strongest dedicated chess computer ever created. 2007 Phoenix Chess Systems releases an updated module set, the Resurrection II, with a faster 500 MHz XScale processor. Mephisto Modular System Boards: Mephisto Mobil (folding magnetic board) Mephisto Modular (plastic autosensory board) Mephisto Exclusive (40x40 cm wooden autosensory board) Mephisto München (50x50 cm wooden autosensory board) Mephisto Bavaria (50x50 cm wooden piece recognition board) Modules: Mephisto Marco Polo Mephisto Almeria 68000 Mephisto Almeria 68020 Mephisto Amsterdam Mephisto B&P Mephisto Dallas 68000 Mephisto Dallas 68020 Mephisto Genius 68030 Mephisto III-S Glasgow Mephisto London 68000 Mephisto London 68020 Mephisto London 68030 Mephisto Lyon 68000 Mephisto Lyon 68020 Mephisto Magellan Mephisto Mirage Mephisto MM I Mephisto MM II Mephisto MM IV Mephisto MM V Mephisto MM VI Mephisto MM VI Schröder - was never distributed Mephisto Mystery Modul Mephisto PC Modul Mephisto Polgar Mephisto Polgar 10 MHz Beware: modified Exclusive Board Mephisto Portorose 68000 Mephisto Portorose 68020 Mephisto Rebell 5.0 Mephisto Risc 1MB Mephisto Risc 2 Mephisto Roma 68000 Mephisto Roma 68020 Mephisto Roma II Mephisto Senator Mephisto Vancouver 68000 Mephisto Vancouver 68020 Tournament machines Mephisto sold limited edition versions of Lang's championship winning programs in dedicated boards with upgraded processors, cooling, and memory, similar to the hardware used in the championship tournaments. Mephisto TM Roma (68020, 25 MHz) Mephisto TM Almeria (68020, 30 MHz) Mephisto TM Portorose (68030, 36 MHz) Mephisto TM Lyon (68030, 36 MHz) Mephisto TM Vancouver (68030, 36 MHz) Mephisto TM London (68030, 36 MHz) Mephisto Wundermaschine (80486, 66 MHz) Other chess computers from the manufacturer Hegener & Glaser Mephisto Academy Mephisto Advanced Travel Chess Computer Mephisto Alaska Mephisto America Mephisto America II Mephisto Atlanta Mephisto Avanti Mephisto Beach Mephisto Berlin 68000 Mephisto Berlin Professional Mephisto Bistro Mephisto Champion Mephisto Chessbook Mephisto Chess Challenger Mephisto Chess Explorer Mephisto Chess Trainer Mephisto College Mephisto ESB 6000 Mephisto Europa Mephisto Europa A Mephisto Excalibur Mephisto Excalibur Glasgow Mephisto Expert Travel Chess Mephisto Explorer Pro Mephisto HG 170 Mephisto HG 240 Mephisto HG 440 Mephisto HG 550 Mephisto I Mephisto II Mephisto III Mephisto Junior (Sensor) Mephisto Junior (Tasten) Mephisto Junior Master Chess Computer Mephisto Madison Mephisto Maestro Travel Chess Computer Mephisto Manhattan Mephisto Marco Polo Mephisto Master Chess Mephisto Mega IV Mein erster Mephisto Mephisto Merlin 16K Mephisto MeXs Mephisto Miami Mephisto Micro Travel Chess Computer Mephisto Milano Mephisto Milano Pro Mephisto Mini Mephisto Modena Mephisto Monaco Mephisto Mondial Mephisto Mondial II Mephisto Mondial 68000XL Mephisto Montana Mephisto Monte Carlo Mephisto Monte Carlo IV Mephisto Monte Carlo IV LE Mephisto Montreal 68000 Mephisto Montreux (Johan de Koning) Mephisto Mystery Mephisto Mythos Mephisto Nigel Short Mephisto PC Schachbrett (Electronic chess board connected to a PC) Mephisto Phantom Mephisto Schachakademie Mephisto Schachschule Mephisto Schachschule II Mephisto Super Mondial Mephisto Super Mondial II Mephisto Supermini Mephisto Talking Chess Trainer Mephisto Talking Chess Academy Mephisto Travel Chess Russian made chess computer ″ШК-1″ (ShK-1 for ″shakhmatniy kompyuter″ – Chess Computer) using "Mephisto H&G OEM chip" See also ChessGenius Saitek Computer chess Mephisto (automaton) References External links Mephisto page on saitek site Collection of chess computers Mephisto on computer-chess wiki (German) Collection of chess computers, Valencia,(Spanish) Computer chess Chess computers Defunct video game companies of Germany
4197451
https://en.wikipedia.org/wiki/Zuken
Zuken
is a Japanese multinational corporation, specializing in software and consulting services for end-to-end electrical and electronic engineering. Zuken came into existence as a pioneer in the development of CAD systems in Japan to contribute to electronics manufacturing. The literal translation of Zuken is "graphics laboratory." Established in 1976 in Yokohama, Japan, it is listed on the Tokyo Stock Exchange; net sales amounted to US$216 million for the year 2011. Zuken's software is primarily used for designing printed circuit boards (PCBs), Multi-Chip Modules, and for the engineering of electrotechnical, wiring, wiring harness, pneumatics and hydraulics applications. Furthermore, Zuken offers software for electrical and electronic engineering data management (e-PLM). The company's key markets are the electronics industry – which includes digital home electrical appliances; mobile communications devices; transportation equipment, such as automobiles, special vehicles and railroads; industrial equipment, such as medical equipment and devices; and construction machinery. Zuken also has a strong presence in the aviation and space industries. Zuken is one of three major EDA companies which specialize in PCB design software, the other two being Cadence Design Systems and Mentor Graphics. History 1976 Zuken Inc. Established. 1978 Released "CREATE-2000" (CR-2000) for PC (HP-1000 Platform). 1983 Zuken America Inc. (Now: Zuken U.S. Inc.) established. 1985 Released Logic Design Workstation for UNIX Platform. 1988 Released CAD/CAM for PCB "CR-3000" for UNIX Platform. 1991 Listed on Tokyo Stock Exchange Level-2. 1992 Zuken Europe GmbH. (Germany) Established. 1992 Zuken Korea Inc. (Seoul) Established. 1992 Zuken Singapore Pte. Ltd. Established. 1993 Zuken Inc. China (Beijing) Established. 1994 Acquired Racal-Redac Ltd. 1994 Listed on Tokyo Stock Exchange Level-1 1994 Released CAD/CAM for PCB "CR-5000" for UNIX & PC Platform. 1994 Released Data Management System "PDM-5000". 1996 Realvision Inc. Established. 2000 Acquired Incases Engineering GmbH (Germany). 2000 Zuken Tecnomatix Inc. established. 2001 Zuken NetWave Inc. established. 2002 Zuken Shanghai Technical Center Co. Ltd. established. 2005 Zuken Taiwan Inc. established. 2006 Acquired CIM-Team GmbH (Germany), which develops "E³.series". Products Visula - a historically important EDA tool by Redac of Racal-Redac Ltd. taken over by Zuken CR-8000 - 2D and 3D, multi-board system design CR-5000 - Zuken's enterprise-wide PCB design software platform for both analogue and digital PCB design. CR-5000 includes modules such as System Designer, Board Designer, Lightning, Package Predictor/Synthesizer. The program runs on both UNIX and Windows. Design Gateway - Circuit design creation software. It is positioned within Zuken's CR-5000 enterprise-wide software for electronics systems design and is at the core of its constraints driven design and verification process. E³.series - This is the most recent addition to the Zuken family of products. It is a Windows-based electrical design software for wiring, harnesses, cable, fluid, hydraulics, and panel design. Cabling Designer - This is a design tool that integrates with Catia for wire harness design. Modules include Cabling Designer, Harness Designer, Topology Designer, Simulation and Verifications. CADSTAR - A desktop software for producing schematic and PCB designs. eCADSTAR - An Internet connected PCB design platform. DS-2 - Zuken's Electronic Product Lifecycle Management tool. References External links Official Zuken Website in English Electronics companies of Japan Electronic design automation companies Companies based in Yokohama Software companies established in 1976 Software companies of Japan Companies listed on the Tokyo Stock Exchange Japanese companies established in 1976 Japanese brands
2106968
https://en.wikipedia.org/wiki/Augmentative%20and%20alternative%20communication
Augmentative and alternative communication
Augmentative and alternative communication (AAC) encompasses the communication methods used to supplement or replace speech or writing for those with impairments in the production or comprehension of spoken or written language. AAC is used by those with a wide range of speech and language impairments, including congenital impairments such as cerebral palsy, intellectual impairment and autism, and acquired conditions such as amyotrophic lateral sclerosis and Parkinson's disease. AAC can be a permanent addition to a person's communication or a temporary aid. Stephen Hawking used AAC to communicate through a speech-generating device. Modern use of AAC began in the 1950s with systems for those who had lost the ability to speak following surgical procedures. During the 1960s and 1970s, spurred by an increasing commitment in the West towards the inclusion of disabled individuals in mainstream society and developing the skills required for independence, the use of manual sign language and then graphic symbol communication grew greatly. It was not until the 1980s that AAC began to emerge as a field in its own right. Rapid progress in technology, including microcomputers and speech synthesis, have paved the way for communication devices with speech output and multiple options for access to communication for those with physical disabilities. AAC systems are diverse: unaided communication uses no equipment and includes signing and body language, while aided approaches use external tools. Aided communication methods can range from paper and pencil to communication books or boards to speech generating devices (SGDs) or devices producing written output. The symbols used in AAC include gestures, photographs, pictures, line drawings, letters and words, which can be used alone or in combination. Body parts, pointers, adapted mice, or eye tracking can be used to select target symbols directly, and switch access scanning is often used for indirect selection. Message generation is generally much slower than spoken communication, and as a result rate enhancement techniques may be used to reduce the number of selections required. These techniques include "prediction", in which the user is offered guesses of the word/phrase being composed, and "encoding", in which longer messages are retrieved using a prestored code. The evaluation of a user's abilities and requirements for AAC will include the individual's motor, visual, cognitive, language and communication strengths and weaknesses. The evaluation requires the input of family members, particularly for early intervention. Respecting ethnicity and family beliefs are key to a family-centered and ethnically competent approach. Studies show that AAC use does not impede the development of speech, and may result in a modest increase in speech production. Users who have grown up with AAC report satisfying relationships and life activities; however, they may have poor literacy and are unlikely to be employed. While most AAC techniques are reliable, two techniques (facilitated communication and the rapid prompting method) have arisen which falsely claim to allow people with intellectual disabilities to communicate. These techniques involve an assistant (called a facilitator) guiding a disabled person to type on a keyboard or point at a letter board. It has been shown that the facilitator, rather than the disabled person, is the source of the messages generated in this way. There have been a large number of false allegations of sexual abuse made through facilitated communication. The Convention on the Rights of Persons with Disabilities defines augmentative and alternative communication as forms of communication including languages as well as display of text, large-print, tactile communication, plain language, accessible multimedia and accessible information and communications technology. Scope Augmentative and alternative communication is used by individuals to compensate for severe speech-language impairments in the expression or comprehension of spoken or written language. People making use of AAC include individuals with a variety of congenital conditions such as cerebral palsy, autism, intellectual disability, and acquired conditions such as amyotrophic lateral sclerosis, traumatic brain injury and aphasia. Prevalence data vary depending on the country and age/disabilities surveyed, but typically between 0.1 and 1.5% of the population are considered to have such severe speech-language impairments that they have difficulty making themselves understood, and thus could benefit from AAC. An estimated 0.05% of children and young people require high technology AAC. Well-known AAC users include physicist Stephen Hawking, broadcaster Roger Ebert and poet Christopher Nolan. Award-winning films such as My Left Foot and The Diving Bell and the Butterfly, based on books by AAC users Christy Brown and Jean-Dominique Bauby respectively, have brought the lives of those who use AAC to a wider audience. History The field was originally called "Augmentative Communication"; the term served to indicate that such communication systems were to supplement natural speech rather than to replace it. The addition of "alternative" followed later, when it became clear that for some individuals non-speech systems were their only means of communication. AAC users typically utilize a variety of aided and unaided communication strategies depending on the communication partners and the context. There were three, relatively independent, research areas in the 1960s and 1970s that lead to the field of augmentative and alternative communication. First was the work on early electromechanical communication and writing systems. The second was the development of communication and language boards, and lastly there was the research on ordinary (without disability) child language development. Forms of AAC Unaided AAC Unaided AAC systems are those that do not require an external tool, and include facial expression, vocalizations, gestures, and sign languages and systems. Informal vocalizations and gestures such as body language and facial expressions are part of natural communication, and such signals may be used by those with profound disabilities. More formalized gestural codes exist that lack a base in a naturally occurring language. For example, the Amer-Ind code is based on Plains Indian Sign Language, and has been used with children with severe-profound disabilities, and adults with a variety of diagnoses including dementia, aphasia and dysarthria. The benefits of gestures and pantomime are that they are always available to the user, usually understood by an educated listener, and are efficient means of communicating. In contrast, sign languages have a linguistic base and permit the expression of an unlimited number of messages. Approaches to signing can be divided into two major categories, those that encode an existing language, and those that are languages in their own right. In the United States of America, Signing Exact English may be considered the most widely used example of the former and American Sign Language as a common example of the latter. Signing is used alone or in conjunction with speech to support communication with individuals with a variety of disorders. The specific hand shapes and movements of sign and gesture require an individual to have adequate fine motor and motor planning skills. Sign languages require more fine-motor coordination and are less transparent in meaning than gestural codes such as Amer-Ind; the latter limits the number of people able to understand the person's communication without training. Aided AAC An AAC aid is any "device, either electronic or non-electronic, that is used to transmit or receive messages"; such aids range from communication books to speech generating devices. Since the skills, areas of difficulty and communication needs of AAC users vary greatly, an equally diverse range of communication aids and devices is required. Low-tech Low-tech communication aids are defined as those that do not need batteries, electricity or electronics. These are often very simple communication boards or books, from which the user selects letters, words, phrases, pictures, and/or symbols to communicate a message. Depending on physical abilities and limitations, users may indicate the appropriate message with a body part, light pointer, eye-gaze direction, or a head/mouth stick. Alternatively, they may indicate yes or no while a listener scans through possible options. High-tech High-tech AAC aids permit the storage and retrieval of electronic messages, with most allowing the user to communicate using speech output. Such devices are known as speech generating devices (SGD) or voice output communication aids (VOCA). A device's speech output may be digitized and/or synthesized: digitized systems play recorded words or phrases and are generally more intelligible while synthesized speech uses text-to-speech software that can be harder to understand but that permits the user to spell words and speak novel messages. High-tech systems may be dedicated devices developed solely for AAC, or non-dedicated devices such as computers that run additional software to allow them to function as AAC devices. They may be static or dynamic in form. Static communication devices have symbols in fixed positions on paper overlays, which are changed manually. To increase the vocabulary available, some static devices have multiple levels, with different words appearing on different levels. On dynamic AAC devices, the user can change the symbols available using page links to navigate to appropriate pages of vocabulary and messages. High-tech devices vary in the amount of information that they can store, as well as their size, weight and thus their portability. Access methods depend on the abilities of the user, and may include the use of direct selection of symbols on the screen or keyboard with a body part, pointer, adapted mice or joysticks, or indirect selection using switches and scanning. Devices with voice output offer its user the advantage of more communicative power, including the ability to initiate conversation with communication partners who are at a distance. However, they typically require programming, and tend to be unreliable. High-tech systems can also include Keyboard based solutions that do not require programming with a mix of flexibility, simplicity, and associated reliability. In this case, a keyboard and audio speaker are configured to be create a "talking keyboard" where typed text is spoken directly in an audio speaker. This allows any phrase to be spoken as it is typed using unlimited vocabulary text-to-speech conversion. One simple benefit is that a talking keyboard, when used with a standard telephone or speakerphone can enable a voice impaired individual have 2 way conversation over a telephone. Game accessibility often utilizes high-tech solutions to allow individuals with disabilities to participate in conversations and understand call outs. In all cases of use, low tech systems often recommended as a backup in case of device failure. Symbols Symbols are visuals used to represent objects, actions, and concepts through the use of items such as the physical object itself, colored or black and white photographs, line drawings, and written words. For users with literacy skills, alphabet-based symbols including individual letters, whole words, or parts thereof may be used in combination with the other types of symbols. Tactile symbols which are textured objects, real objects or parts of real objects that are used as a communication symbols particularly for individuals with visual impairments and/or significant intellectual impairments. Both low- and high-tech devices can incorporate the use of symbols. With low-tech devices, a communication partner is involved and must interpret the symbols chosen. Picture Communication Exchange System (PECS) is a commonly used low-tech communication system that teach individuals how to request, comment, and answer questions through the use of line drawings known as picture communication symbols (PCS). LAMP Words for Life, a high-tech communication system, is an app that incorporates various symbols and motor planning. Symbols are placed in fixed position on the screen which allow users to develop motor patterns associated with certain requests or statements. The choice of symbols and aspects of their presentation, such as size and background, depend on an individual's preferences as well as their linguistic, visual, and cognitive skills. This can be determined using an assessment for symbolic understanding. Access and selection methods Technological advances have dramatically increased the types of selection methods available for individuals with communication impairments. In "Direct Selection", the selection is made by pointing to the desired symbol using a finger or an alternative pointer, such as eye gaze, a head stick, head- or eye-controlled mouse. To accommodate motor control difficulties some users use alternative activation strategies; for example in "timed activation", the user maintains selection of the symbol for a predetermined period of time until it is recognized by the system. With the "release activation", the selection of the item is only made when the person releases contact from the display. Direct activation of an AAC system is generally the first choice of access method as it is faster and cognitively easier. Those unable to do so may use indirect selection or "scanning". In this method, items displayed for selection are scanned; the scanning may be visual using indicators such as lights, highlighting, and/or contrasting borders, or auditory using spoken prompts from a communication partner or device. When the desired message is reached, the AAC user indicates the choice using an alternative selection technique such as a switch, vocalization or gesture. Several different patterns for switch access scanning are available: in "circular scanning", the items are displayed in a circle and then scanned one at a time. It is often the first type introduced to children or beginning AAC users because it is the easiest to understand. In "linear scanning", items are organized in rows and are scanned one at a time until a choice is made. Although more demanding than circular scanning, it is still easy to learn. Finally, in "group-item scanning", items are grouped and the groups scanned consecutively. Once a particular group is selected, items within the group are scanned. One of the most common group-item strategies is row-column scanning in which each row forms a group. The rows of items are scanned, and when a row is selected, the items in the row are scanned one at a time until a message is selected. There are three main selection control techniques in scanning. In "automatic scanning", the scan proceeds at a pre-determined speed and pattern until the user selects an item. In "inverse scanning", the switch is held down to advance the scan, and released to choose the desired item. In "step scanning", the AAC user activates one switch to move the indicator through the items, and another switch to select the item. Vocabulary organization Vocabulary organization refers to the way pictures, words, phrases, and sentences are displayed on the communication system. In general, the goal is to facilitate efficient and effective communication, especially when the individual's AAC system contains a large number of symbols. Communication books and devices are often presented in a grid format; the vocabulary items displayed within them may be organized by spoken word order, frequency of usage or category. In the Fitzgerald Key organization, symbols from different semantic and syntactic classes are organized grammatically in groups from left to right to facilitate sentence construction. Since research has shown that children and adults use a small number of words frequently, in a core-fringe vocabulary organization, the words and messages that are communicated most frequently appear on a "main page". The fringe vocabulary—words and messages used more rarely and that are specific to an individual—appear on other pages. Symbols may also be organized by category, grouping people, places, feelings, foods, drinks, and action words together. Another form of grid organization groups vocabulary according to specific activities. Each display contains symbols for the people, places, objects, feelings, actions, and other relevant vocabulary items for a specific activity or routine. Visual scene displays are a different method of organizing and presenting symbols. These are depictions of events, people, objects, and related actions in a picture, photograph, or virtual environment representing a situation, place, or specific experience. They are similar to activity displays in that they contain vocabulary that is associated with specific activities or routines. For example, a photo of a child's room may be included in the child's AAC system. Objects and events within the photograph are then used as symbols for communication. Research suggests that visual scene displays are easier than grid displays for young children or those with cognitive impairments to learn and use. Rate enhancement strategies Augmentative and alternative communication is typically much slower than speech, with users generally producing 8–10 words per minute. Rate enhancement strategies can increase the user's rate of output to around 12–15 words per minute, and as a result enhance the efficiency of communication. There are two main options for increasing the rate of communication: encoding and prediction. Encoding is a technique permitting an AAC user to produce an entire word, sentence or phrase using only one or two activations of their AAC system. In numeric, alpha-numeric, and letter encoding (also known as abbreviation-expansion), words and sentences are coded as sequences of letters and numbers. For example, typing "HH" may retrieve "Hello, how are you?". In iconic encoding strategies, such as Semantic compaction, icons (picture symbols) are combined in a sequence to produce words or phrases. Prediction is a rate enhancement strategy in which the device attempts to predict the letter, word or phrase being written by the user. The user can then select the correct prediction without needing to write the full word. Word prediction software may determine the words predicted based on their frequency in language, association with other words, past choices of the user, or grammatical suitability. Assessment and system implementation An evaluation of an individual's abilities, limitations and communication needs is necessary to select appropriate AAC techniques. The purpose of the assessment is to identify potential AAC approaches that can bridge discrepancies between a potential user's current communication and their present and future communication needs. AAC evaluations are often conducted by specialized teams which may include a speech-language pathologist, occupational therapist, rehabilitation engineer, physiotherapist, social worker and a physician. Users, family members and teachers are also key members of the decision making team. Sensitivity to and respect of cultural diversity contributes to ongoing family involvement and to the selection of the most appropriate AAC system. For members of some cultural groups the presence of an AAC device increases the visibility of disability and is thus viewed as stigmatizing. A user's motor abilities, communication skills and needs, cognition and vision are assessed in order to determine the most appropriate match to a communication system. Depending on the individual's physical status, recommendations of an alternative access method, a change in seating/positioning, a mounting system and/or communication aid adaptations may be needed. For example, someone with spastic arm movements may require a key guard on top of the keyboard or touchscreen to reduce the selection of non-target items. The person's needs and abilities determine the symbols chosen and their organization, with the goal being that the communication system can be used as efficiently as possible in different contexts, with different communication partners, and for different social purposes. Researcher Janice Light identified four social purposes of communicative interaction in AAC: the expression of needs and wants to a listener, the transfer of information as in more general conversation, the development of social closeness through such things as jokes and cheering, and finally social etiquette practices such as "please" and "thank you". These four purposes vary in terms of the relative importance of the content, rate, duration and the focus of the interaction. It is important that the AAC systems selected also reflect the priorities of the individual and their family. In Western cultures, professionals may see a communication device as helping to promote an individual's self-determination, i.e., the ability to make one's own decisions and choices. However, cultural and religious factors may affect the degree to which individual autonomy is a valued construct, and influence family attitudes towards AAC. Training can help the user make use of their AAC system to communicate effectively with others, to control their environment through communication, and to make choices, decisions and mistakes. Skilled users of AAC show communicative competence in four interrelated areas: linguistic, operational, social and strategic. Linguistic competence refers to language skills in the person's native language as well as the linguistic code of the symbol system selected. Operational competence involves the skills in the use and maintenance of the tool of communication, while social competence and strategic competence reflect knowledge and judgment in communicative interactions, including the compensations required for a slow speaking rate, communication breakdowns and those unfamiliar with AAC. An AAC user may require specific device programming and/or training to achieve competency in these areas. Communication partners may also require training to notice and consistently interpret the communication signals of a severely disabled individual, particularly because there is a danger that learned helplessness can be the result of repeated failure to communicate successfully. Parties may need assistance to avoid the directive communication style that can lead a child user of AAC not to develop a full range of communication skills such as initiating or taking the lead in conversation, using complex syntax, asking questions, making commands or adding new information. Young AAC users benefit from rich language and literacy experiences to foster vocabulary development, discourse skills, and phonological awareness, all of which supports successful literacy learning. Communication partners are encouraged to provide augmented input with the child, such as signing or pointing to symbols and codes as they communicate, including using the individual's communication system themselves. They also benefit from focussed and explicit reading instruction. Outcomes Speech Several reviews have found that the use of AAC does not impede the development of speech in individuals with autism or developmental disabilities, and in fact, may result in modest gains being observed. A 2006 research review of 23 AAC intervention studies found gains in speech production in 89% of the cases studied, with the remainder showing no change. A descriptive review looking specifically at Picture Exchange Communication System (PECS) intervention studies found that several studies reported an increase in speech, often during later phases, while one noted little or no effect. Researchers hypothesize that using an AAC device relieves the pressure of having to speak, allowing the individual to focus on communication, and that the reduction in psychological stress makes speech production easier. Others speculate that in the case of speech generating devices, the model of spoken output leads to an increase in speech production. Language and literacy Language and literacy have far reaching effects as they facilitate self-expression and social interaction in a variety of settings. Furthermore, literacy fosters independence by providing access to educational and vocational opportunities. Children whose disabilities require AAC often experience developmental delays in language skills such as vocabulary knowledge, length of sentences, syntax, and impaired pragmatic skills. These delays may be due in part to the fact that expressive language is limited by more than the children's own language knowledge. Unlike speaking children, children who use AAC do not always have access to their AAC system, and don't select the content available on the device. These external characteristics may impact language learning opportunities. Most children in this category do not achieve literacy skills beyond that of a typically developing 7–8 year old. Cognitive, language and learning delays contribute to difficulty with literacy development, but environmental factors also play a role. The most literate AAC users often report having access to abundant reading and writing material at home as well as in school during childhood. Studies have shown that many children who use AAC have literacy experiences that are reduced quality, quantity, and opportunity at home and at school as compared to children without disabilities. Research suggests that with explicit reading instruction, AAC users can develop good literacy skills. Employment According to a 1997 U.S. Census Bureau report less than 10% of severely disabled individuals were employed. Despite the various barriers to employment, some AAC users achieve success in educational endeavours and employment, though often in lower paying jobs. Factors that have been found to be related to employment are a strong work ethic and access to AAC technology, the support of family and friends, education, and work skills. Individuals with ALS who use AAC may continue working; factors supporting continued employment include access to AAC, support from employers, governmental programs and others. Employers of AAC users report that skills in time management, problem solving, communication, technology and a good education are important to employers. Quality of life Several studies of young adults who had used AAC since childhood report a generally good quality of life, though few lived independently, or were in paid employment. The young adults used multiple modes of communication including aided and unaided AAC approaches. More positive quality of life outcomes often correlated with better quality of communication and interaction, as well as personal characteristics, family and community support, and excellent AAC services. Poorer outcomes were related to lack of access to appropriate AAC supports and resources, problems with technology and negative attitudes. Specific groups of AAC users Cerebral palsy Cerebral palsy is a term referring to a non-progressive developmental neuromotor disorder with an upper motor neuron lesion origin. Depending on the location of the brain lesion, individuals with cerebral palsy can have a wide variety of gross and fine motor challenges, including different forms and areas of the body affected. Fine motor planning, control and coordination are often affected. Dysarthria, a speech disorder resulting from neurological damage to the motor-speech system, occurs in an estimated 31% to 88% of those with cerebral palsy. Such individuals may require AAC support for communication. Approximately one half to one third have some degree of intellectual impairment, and visual and hearing problems are also common. Gross and fine motor challenges are often of particular concern in accessing an AAC device. Appropriate seating and positioning are important to facilitate optimum stability and movement. Extensive motor training and practice may be required to develop efficient AAC access and use. The trend towards custom-placed sensors and personalized signal processing may assist in facilitating communication for those who are incapable of using other AAC technologies. Intellectual impairment Individuals with intellectual impairments face challenges in developing communication skills, including problems with generalization (the transfer of learned skills into daily activities). They may lack communication opportunities in their daily lives, and responsive communicators who understand their communication methods. AAC intervention for this population emphasizes partner training as well as opportunities for integrated, natural communication. Studies have shown that appropriate use of AAC techniques with children and adults with intellectual impairments can enhance communication skills, increase participation in activities, choice-making, and even influence the perceptions and stereotypes of communication partners. In Ireland, a system of manual communication (a simplified sign language) called Lámh is used by the developmentally disabled, their family, carers and friends. While most individuals with intellectual disabilities do not have concomitant behavioural issues, problems in this area are typically more prevalent in this population than others. AAC approaches may be used as part of teaching functional communication skills to non-speaking individuals as an alternative to "acting out" for the purpose of exerting independence, taking control, or informing preferences. Autism Autism is a disorder of neural development characterized by impaired social interaction and communication, and by restricted and repetitive behaviour. Typically there is particular difficulty acquiring expressive communication skills. People with autism have been found to have strong visual processing skills, making them good candidates for an AAC approach. AAC intervention in this population is directed towards the linguistic and social abilities of the child, including providing the person with a concrete means of communication, as well as facilitating the development of interactional skills. AAC systems for this population generally begin with communication boards and/or object or picture exchanges such as the Picture Exchange Communication System (PECS). A 2009 descriptive review provided preliminary evidence that PECS is easily learned by most individuals with autism, provides communication to those with little or no functional speech, and has some limited positive impact on social interaction and challenging behaviours. A study that compared the use of a speech generating device to a picture exchange system found that both were reasonable options for children with autism, as the ease and speed of acquisition of each system was similar. Developmental verbal dyspraxia Developmental verbal dyspraxia, also known as childhood apraxia of speech, is a developmental motor speech disorder involving impairments in the motor control of speech production. The speech of a child with developmental verbal dyspraxia may be unintelligible to the point that daily communication needs cannot be met. A child with developmental verbal dyspraxia often experiences great amounts of frustration, so AAC can be a strategy to support communication alongside more traditional speech therapy to improve speech production. A wide variety of AAC systems have been used with children with developmental verbal dyspraxia. Manual signs or gestures are frequently introduced to these children, and can include the use of fingerspelling alongside speech. Manual signs have been shown to decrease errors in articulation. Aided AAC systems typically include communication boards and speech generating devices. A multimodal approach is often used, with several AAC approaches introduced so that the child can take advantage of the most effective method for a particular situation. Traumatic brain injury Traumatic brain injury can result in severe motor speech disorders; dysarthria is the most common such disorder, accounting for roughly a third of all cases. Depending on the stage of recovery, AAC intervention may involve identifying consistent communication signals, the facilitation of reliable yes/no responses to questions, and the ability to express basic needs and answer questions. Individuals who do not recover natural speech to a degree sufficient to meet their communication needs typically suffer from severe impairments related to cognition. Difficulties with memory and learning new skills may influence AAC choices; well-established competencies such as spelling may be more effective than AAC systems that require navigation through multiple pages to access information. Aphasia Aphasia is the result of damage to the brain's language centres affecting production, comprehension, or both, and can cause severe, chronic language impairment. Individuals with aphasia often communicate using a combination of speech, gestures, and aided communication; the proportion of each may change as the person recovers, and depends on the context and the individual's skills. Depending on their language and cognitive skills, those with aphasia may use AAC interventions such as communication and memory books, drawing, photography, written words, speech generating devices and keyboards. Visual scene displays have been used on communication devices with adults who have chronic, severe aphasia; these feature photos of people, places or events that are meaningful to the individual and facilitative of communicative interaction. Approaches such as "Supported Conversation for Adults with Aphasia" train the communication partners to use resources such as writing key words, providing written choices, drawing, and using items such as photographs and maps to help the individual with aphasia produce and comprehend conversation. Communication boards can be very helpful for patients with aphasia, especially with patients who are very severe. They can be produced at a very low tech level, and can be utilized by patients to point to pictures/words they are trying to say. Communication boards are extremely functional and help patients with aphasia communicate their needs. Locked-in syndrome Strokes that occur in the brainstem may cause profound deficits, including locked-in syndrome, in which cognitive, emotional and linguistic abilities remain intact but all or almost all voluntary motor abilities are lost. Most people affected by this type of stroke rely on AAC strategies to communicate, since few recover intelligible speech or functional voice. The AAC strategies used vary with the individual's preferences and motor capabilities which may change over time. As eye movements are most likely to be preserved, eye blinks are frequently used for communication. Low-tech alphabet boards are often introduced immediately to provide the individual with basic communication. Partner-assisted scanning may be used, in which the AAC user signals when the desired letter is named by a communication partner. When vertical and horizontal eye movements are functional, a transparent alphabet board may be used in which the AAC user looks at the desired letter and this is acknowledged by the communication partner. Individuals with locked-in syndrome have difficulty using high-tech devices due to issues with motor control, vision, memory, alertness and linguistic ability. In particular, a voluntary, reliable and easily controlled muscle movement is necessary to access such a device, such as head, jaw, hand or finger movements. In some individuals, intensive practice, even long after the initial stroke, has been shown to increase the accuracy and consistency of head movements, which can be used to access a communication device. Amyotrophic lateral sclerosis Amyotrophic lateral sclerosis (ALS) or motor neuron disease (MND) is a progressive condition which leads to weakness and eventual paralysis. Approximately 75% of people with ALS are unable to speak by the time of their death. In a procedure known as voice banking, people with ALS may digitally record words and phrases while still able to do so, for later inclusion in a communication device. AAC systems used typically change over time depending on severity of speech impairment, physical status, and the individual's communication needs. Use of augmentative communication strategies generally begins when speaking rate drops to 100 words per minute. In the early stages, AAC may consist of using an alphabet board to cue the listener to the first letter of the word being spoken, and may be used with those less familiar with the individual. In the later stages, AAC often becomes the main communicative method, although familiar conversation partners may still understand some spoken words. Since cognition and vision are typically unaffected in ALS, writing-based systems are preferred to graphic symbols, as they allow the unlimited expression of all words in a language. The method of access to a communication device depends on the type and severity of the disease. In the spinal form of ALS, the limbs are affected from the onset of the disease; in these cases a head mouse or eye tracking access may be used initially. In the bulbar form, speech is affected before the limbs; here handwriting and typing on keyboard-style devices are frequently the first forms of AAC. AAC users may change access methods as the disease progresses. Low-tech systems, such as eye gazing or partner assisted scanning, are used in situations when electronic devices are unavailable (for example, during bathing) and in the final stages of the disease. Parkinson's disease Parkinson's disease is a progressive neurological condition in which dysarthria may develop later in the progression of the disease. Some individuals eventually lose all functional speech. AAC approaches are generally used to supplement and support natural speech. A portable amplifier, for example, may be used to increase the volume of speech and thus its intelligibility. The individual may be taught to point to the first letter of each word they say on an alphabet board, leading to a reduced speech rate and visual cues for the listener to compensate for impaired articulation. Entire words can be spelled out if necessary. In users that have reduced range and speed of movement, a smaller than usual selection display may be preferred. High-tech AAC keyboard speech-generating devices are also used; keyguards may be required to prevent accidental keystrokes caused by the tremor typical of the disease. Factors affecting AAC use in Parkinson's disease include motor deficits and cognitive changes; the latter may result in unawareness of their problems with spoken communication. Multiple sclerosis Dysarthria is the most common communication problem in individuals with multiple sclerosis (MS), however, significant difficulties with speech and intelligibility are uncommon. Individuals with MS vary widely in their motor control capacity and the presence of intention tremor, and methods of access to AAC technology are adapted accordingly. Visual impairments are common in MS and may necessitate approaches using auditory scanning systems, large-print text, or synthetic speech feedback that plays back words and letters as they are typed. Dementia Dementia is an acquired, chronic, cognitive impairment characterized by deficits in memory and other cognitive domains. Communication impairments are partly attributed to memory deficits, and AAC intervention may be used to compensate for deficits and to capitalize on the person's strengths, such as the ability to recognize material they cannot recall. Low-tech devices are generally preferred, such as memory books that include autobiographical information, daily schedules, photographs, and reminders or labels. Several studies have shown positive outcomes in the amount of on-topic conversation and the length of interaction with these approaches. The gains were maintained four months after the training in the use of the memory aids had ceased. High-tech devices with voice output have been found to be less effective; in one study devices resulted in limited topic elaboration/initiation, reduced output and heightened distraction. AAC is also used to enhance the comprehension of those with dementia. The use of augmented listening strategies, such as identifying topics of conversation with pictures, improves the conversational skills of individuals with dementia. History The history of AAC can be traced to the days of classical Rome and Greece, with the first recorded use of augmentative strategies with the deaf. The use of manual alphabets and signs was recorded in Europe from the 16th century, as was the gestural system of Hand Talk used by Native Americans to facilitate communication between different linguistic groups. The first known widely available communication aid was a letter and word-based communication board developed for, and with, F. Hall Roe, who had cerebral palsy. This communication board was distributed in the 1920s by a men's group in Minneapolis. The modern era of AAC began in the 1950s in Europe and North America, spurred by several societal changes; these included an increased awareness of individuals with communication and other disabilities, and a growing commitment, often backed by government legislation and funding, to develop their education, independence and rights. In the early years, AAC was primarily used with laryngectomy and glossectomy cases, and later with individuals with cerebral palsy and aphasia. It was typically only employed after traditional speech therapy had failed, as many felt hesitant to provide non-speech intervention to those who might be able to learn to speak. Individuals with intellectual impairment were not provided with AAC support because it was believed that they did not possess the prerequisite skills for AAC. The main systems used were manual signs, communication boards and Morse code, though in the early 1960s, an electric communication device in the form of a sip-and-puff typewriter controller named the Patient Operated Selector Mechanism (POSM or POSSUM) was developed in the United Kingdom. From the 1960s onward, sign language increased in acceptance and use in the deaf community, and AAC also came to be viewed as acceptable for those with other diagnoses. Manual sign languages, such as Makaton, were advocated for those with both hearing and cognitive impairments, and later for those with intellectual impairment or autism with normal hearing. Research into whether primates could learn to sign or use graphic symbols spurred further interest the use of AAC with those with cognitive impairments. The use of Amer-Ind hand signals opened the field to AAC techniques specifically for adult users. Blissymbols were first used in Canada in 1971 to provide communication to those not able to use traditional orthography; their use quickly spread to other countries. With improved technology, keyboard communication devices developed in Denmark, the Netherlands and the US increased in portability; the typed messages were displayed on a screen or strip of paper. By the end of the 1970s, communication devices were being commercially produced, and a few, such as the HandiVoice, had voice output. Countries such as Sweden, Canada and the United Kingdom initiated government-funded services for those with severe communication impairments, including developing centres of clinical and research expertise. The late 1970s and 1980s saw a massive increase of AAC-related research, publications, and training as well the first national and international conferences. The International Society for Alternative and Augmentative Communication (ISAAC) was founded in 1983; its members included clinicians, teachers, rehabilitation engineers, researchers, and AAC users themselves. The organization has since played an important role in developing the field through its peer-reviewed journal, conferences, national chapters and its focus on AAC in developing countries. AAC became an area of professional specialization; a 1981 American Speech-Language-Hearing Association position paper, for example, recognized AAC as a field of practice for speech-language pathologists. At the same time, AAC users and family members played an increasing prominent role in the development of knowledge of AAC through their writing and presentations, by serving on committees and founding advocacy organizations. From the 1980s, improvements in technology led to a greatly increased number, variety, and performance of commercially available communication devices, and a reduction in their size and price. Alternative methods of access such eye pointing or scanning became available on communication devices. Speech output possibilities included digitized and synthesized speech, with text-to-speech options available in German, French, Italian, Spanish, Swedish and Ewe. AAC services became more holistic, seeking to develop a balance of aided and unaided strategies with the goal of improving functioning in the person's daily life, and greater involvement of the family. Increasingly, individuals with acquired conditions such as amyotrophic lateral sclerosis, Parkinson's disease, head injury, and locked-in syndrome, received AAC services. In addition, with the challenge to the notion of AAC prerequisites, those with severe to profound intellectual impairments began to be served. Courses on AAC were developed for professional training programs, and literature such as textbooks and guides were written to support students, clinicians and parents. The 1990s brought a focus on greater independence for people with disabilities, and more inclusion in mainstream society . In schools, students with special needs were placed in regular classrooms rather than segregated settings, which led to an increased use of AAC as a means of improving student participation in class. Interventions became more collaborative and naturalistic, taking place in the classroom with the teacher, rather than in a therapy room. Facilitated communication – a method by which a facilitator guides the arm of a person with severe communication needs as they type on a keyboard or letter board – received wide attention in the media and in the field. However, it has been demonstrated that the facilitator rather than the disabled person is the source of the messages generated in this way. Consequently, professional organizations and researchers and clinicians have rejected the method as a pseudoscience. Rapid progress in hardware and software development continued, including projects funded by the European Community. The first commercially available dynamic screen speech generating devices were developed in the 1990s. At the same time synthesized speech was becoming available in more languages. Software programs were developed that allowed the computer-based production of communication boards. High-tech devices have continued to reduce in size and weight, while increasing accessibility and capacities. Modern communication devices can also enable users to access the internet and some can be used as environmental control devices for independent access of TV, radio, telephone etc. Future directions for AAC focus on improving device interfaces, reducing the cognitive and linguistic demands of AAC, and the barriers to effective social interaction. AAC researchers have challenged manufacturers to develop communication devices that are more appealing aesthetically, with greater options for leisure and play and that are easier to use. The rapid advances in smartphone and tablet computer technologies has the potential to radically change the availability of economical, accessible, flexible communication devices, which can generate astonishing results; however, the user interfaces are needed that meet the various physical and cognitive challenges of AAC users. Android and other open source operating systems, provide opportunities for small communities, such as AAC, to develop the accessibility features and software required. Other promising areas of development include the access of communication devices using signals from movement recognition technologies that interpret body motions, or electrodes measuring brain activity, and the automatic transcription of dysarthric speech using speech recognition systems. Utterance-based systems, in which frequent utterances are organized in sets to improve the speed of communication exchange, are also in development. Similarly, research has focused on the provision of timely access to vocabulary and conversation appropriate for specific interactions. Natural language generation techniques have been investigated, including the use of logs of past conversations with conversational partners, data from a user's schedule and from real-time Internet vocabulary searches, as well as information about location from global positioning systems and other sensors. However, despite the frequent focus on technological advances in AAC, practitioners are urged to retain the focus on the communication needs of the AAC users: "The future for AAC will not be driven by advances in technology, but rather by how well we can take advantage of those advancements for the enhancement of communicative opportunities for individuals who have complex communication needs". Pseudoscience Some techniques masquerade as AAC, but are not legitimate. Two of these, facilitated communication and the rapid prompting method, claim to allow nonverbal people to communicate while the true source of the messages is the facilitator. Facilitated Communication Facilitated communication is a scientifically discredited technique that attempts to aid communication by people with autism or other communication disabilities who are non-verbal. The facilitator guides the disabled person's arm or hand and attempts to help them type on a keyboard or other device. While advocates of the technique claim that it can help disabled people communicate, research indicates that the facilitator is the source of the messages obtained through FC, rather than the disabled person. The facilitator may believe they are not the source of the messages due to the ideomotor effect, which is the same effect that guides a Ouija board. Studies have consistently found that FC is unable to provide the correct response to even simple questions when the facilitator does not know the answers to the questions (e.g., showing the patient but not the facilitator an object). In addition, in numerous cases disabled persons have been assumed by facilitators to be typing a coherent message while the patient's eyes were closed or while they were looking away from or showing no particular interest in the letter board. Facilitated communication has been called "the single most scientifically discredited intervention in all of developmental disabilities". Some promoters of the technique have claimed that FC cannot be clearly disproven because a testing environment might cause the subject to lose confidence. However, there is a scientific consensus that facilitated communication is not a valid communication technique, and its use is strongly discouraged by most speech and language disability professional organizations. There have been a large number of false abuse allegations made through facilitated communication. Rapid Prompting Method The rapid prompting method (RPM), is a pseudoscientific technique that attempts to aid communication by people with autism or other disabilities to communicate through pointing, typing, or writing. Also known as Spelling to Communicate, it is closely related to the scientifically discredited technique facilitated communication (FC). Practitioners of RPM have failed to assess the issue of message agency using simple and direct scientific methodologies, saying that that doing so would be stigmatizing and that allowing scientific criticisms of the technique robs people with autism of their right to communicate. The American Speech-Language-Hearing Association has issued a statement opposing the practice of RPM. Soma Mukhopadhyay is credited with creating RPM, though others have developed similar techniques, known as informative pointing or alphabet therapy. RPM users report unexpected literacy skills in their clients, as well as a reduction in some of the behavioral issues associated with autism. As noted by Stuart Vyse, although RPM differs from facilitated communication in some ways, "it has the same potential for unconscious prompting because the letter board is always held in the air by the assistant. As long as the method of communication involves the active participation of another person, the potential for unconscious guidance remains." Critics warn that RPM's over-reliance on prompts (verbal and physical cuing by facilitators) may inhibit development of independent communication in its target population. As of April 2017, only one scientific study attempting to support Mukhopadhyay's claims of efficacy has been conducted, though reviewers found the study had serious methodological flaws. Vyse has noted that rather than proponents of RPM subjecting the methodology to properly controlled validation research, they have responded to criticism by going on the offensive, claiming that scientific criticisms of the technique rob people with autism of their right to communicate, while the authors of a 2019 review concluded that "...until future trials have demonstrated safety and effectiveness, and perhaps more importantly, have first clarified the authorship question, we strongly discourage clinicians, educators, and parents of children with ASD from using RPM." Notes References (full text) (full text PDF) (full text PDF) External links ISAAC – International Society for Augmentative and Alternative Communication RERC on AAC – Rehabilitation Engineering Research Center on Augmentative and Alternative Communication USSAAC – United States Society for Augmentative and Alternative Communication Communication Matters AAC Institute ASHA AAC Information Rehabilitation Engineering and Assistive Technology Society of North America Speech and language pathology
16998477
https://en.wikipedia.org/wiki/Red%20Hacker%20Alliance
Red Hacker Alliance
The Red Hacker Alliance (中国红客联盟) is an informal group of Chinese hackers that at one time had over 80,000 members, making it one of the largest hacking groups in the world. In December 2004, the group took down their website and became inactive until March 2005, when it regrouped and relaunched its site. Computer World Australia and InformationWeek both reported that members of the Red Hacker Alliance were involved in a planned DDOS attack against CNN.com on April 19, 2008. CNN reported that they took preventive measures after news broke of the impending attack. See also GhostNet Honker Union RedHack (from Turkey) References Hacker groups
24746707
https://en.wikipedia.org/wiki/Regional%20Institute%20of%20Science%20and%20Technology
Regional Institute of Science and Technology
The Regional Institute of Science & Technology (RIST) was established in 2009 by the Erd Foundation (a charitable trust). It is a technical college in the north eastern region of India. The college and courses are recognized by the All India Council for Technical Education (AICTE) and affiliated to The North Eastern Hill University, Shillong, Meghalaya. The Regional Institute of Science & Technology was set up to cater to the needs for technical manpower in the north eastern region of the country. The college offers four year undergraduate courses in six disciplines, viz. Computer Science & Engineering, Electronics and Communication Engineering, Information Technology, Electrical & Electronics Engineering, Mechanical Engineering and Civil Engineering. Location The institute is located on the hills of 9th Mile, opposite the CRPF group centre, Khanapara, Ri-Bhoi district of Meghalaya. It is from Dispur, the capital of Assam and from Shillong, the capital of Meghalaya. Branches The college offers BTech courses in: Computer Science & Engineering Electrical & Electronics Engineering Electronics & Communication Engineering Information Technology Mechanical Engineering Civil Engineering MBBS The courses are affiliated to North-Eastern Hill University. Intake The following are the intake for each branch: Computer Science & Engineering 120 Electrical & Electronics Engineering 60 Electronics & Communication Engineering 60 Information Technology 60 Mechanical Engineering 60 Civil Engineering 120 Admission Candidates with valid AIEEE score can apply directly. Candidates not having AIEEE score can appear for the Common Entrance Test conducted by the ERD Foundation. All the north eastern states has reserved seats for which candidates are selected by the Director of Technical Education of the state. Facilities Computerized library Residential accommodation in separate hostels for boys and girls. Fleet of buses for transport. Dedicated leased line internet connectivity More than 100 desktop terminals in a network with a server farm. Other facilities includes gym, fitness studio, health care, IT centre, cafes and restaurants. See also University of Science and Technology Meghalaya References External links RIST Official Website ERDF Official Website USTM Official Website Universities and colleges in Meghalaya
3063359
https://en.wikipedia.org/wiki/University%20of%20Namibia
University of Namibia
The University of Namibia (UNAM) is a multi-campus public research university in Namibia, as well as the largest university in the country. It was established by an act of Parliament on 31 August 1992. Background UNAM comprises the following faculties and schools: Faculty of Agriculture and Natural Resources. Faculty of Economics & Management Science. Department of Political Science Faculty of Education. Faculty of Humanities and Social Sciences. Faculty of Law School of Medicine Faculty of Science. Faculty of Engineering and Information. School of Nursing. School of Pharmacy. School of Public Health. School of Military Science Center of Postgraduate studies. Ranked in the top 30 of tertiary institutions on the continent in the past 10 years, UNAM is one of the best universities in Africa. The University of Namibia is the only institution in the world to offer a doctorate in the study of the Khoekhoe language. Faculty of Engineering and Information Technology The Faculty of Engineering and Information Technology was founded on 1 January 2008 following the dissolution of the Department of Engineering and Technology, which had existed under the Faculty of Science since 2000. Sam Nujoma, the first president of Namibia and then-chancellor of the university conducted the groundbreaking ceremony at Ongwediva on 17 November 2007. The ceremony took place on a 13-hectare plot of land that had been donated to UNAM by the Ongwediva town council. In January 2008, the National Planning Commission approved funding for the construction of phase 1 of the new Faculty of Engineering and Information Technology (FOET) in Ongwediva. Construction work began in April 2008 with emphasis on lecture rooms, staff offices, laboratories, IT facilities, student hostels, staff houses and other support facilities. The completion of these facilities (phase 1A) enabled the first batch of students to be admitted in the FOET. Academics Notable academics at the University of Namibia have included Bience Gawanas, former ombudsperson, professor Nico Horn, André du Pisani, Lazarus Hangula, Dorian Haarhoff, Elizabeth Amukugo, Job Amupanda and Günter Heimbeck. Marks scandal There are reports that UNAM's lecturers have been exchanging marks for sexual favors from students and exchanging completed assignment for money. This has resulted in serious academic degradation. Investigating and combating such illegal practices has become an important priority for the Namibian government and UNAM management. Notable alumni The University of Namibia has produced several notable and famous public individuals since its founding, including: Sebastian Ignatius ǃGobs, Namibian politician – Class of 1995 Fransina Kahungu, former mayor of Windhoek Theo-Ben Gurirab, received a Doctorate of Law honoris causa – Class of 1999 Pendukeni Iivula-Ithana received Bachelor of Laws and B.Juris degrees – class of 1998 and 1999 Alfredo Tjiurimo Hengari, political scientist and presidential spokesperson to Hage Geingob – Class of 2001 Monica Geingos, First Lady of the Republic of Namibia and businesswoman – Class of 2002 Petrina Haingura, Namibian politician – Class of 2002 Sacky Shanghala, former Namibian minister of justice – Class of 2003 Sisa Namandje, Namibian lawyer – Class of 2003 Bernadus Swartbooi, Namibian politician and president of the Landless People's Movement (Namibia) – Class of 2003 Peya Mushelenga, Minister of Urban and Rural Development – Class of 2003 Tangeni Amupadhi – journalist and editor of The Namibian newspaper – Class of 2005 Sam Nujoma, Namibian politician and former President of Namibia – Class of 2007 Lucia Iipumbu, Deputy Minister of Industrialisation, Trade and SME development – Class of 2008 Job Amupanda, Namibian politician and leader of the Affirmative Repositioning and current mayor of Windhoek – Class of 2010 Francine Muyumba, Congolese Senator, Former President of the Panafrican Youth Union – Class of 2012 Joseph Kalimbwe, youth activist and author – Class of 2017 Henny Seibeb, Namibian politician and deputy president of the Landless People's Movement (Namibia) – Class of 2019 Inna Hengari, member of Parliament, youth politician and student leader – Class of 2019 Utaata Mootu, member of Parliament, youth politician – Class of 2019 Emma Theofelus, member of Parliament, youth politician – Class of 2019 Patience Masua, member of Parliament, youth politician - Class of 2020 See also UNAM SRC References External links University of Namibia website Universities in Namibia Educational institutions established in 1992 1992 establishments in Namibia
46902017
https://en.wikipedia.org/wiki/Outline%20of%20MySQL
Outline of MySQL
The following outline is provided as an overview of and topical guide to MySQL: MySQL ("My Structured Query Language") – world's second most widely used relational database management system (RDBMS) and most widely used open-source RDBMS. It is named after co-founder Michael Widenius's daughter, My. What type of thing is MySQL? MySQL can be described as all the following: Software – any set of machine-readable instructions that directs a computer's processor to perform specific operations. Applications software – set of computer programs designed to permit the user to perform a group of coordinated functions, tasks, or activities. Application software cannot run on itself but is dependent on system software (an operating system) to execute. Database management system (DBMS) – computer software application that interact with the user, other applications, and the database itself to capture and analyze data. Relational database management system (RDBMS) – database management system (DBMS) based on the relational model, in which all data is represented in terms of tuples (ordered set of attribute values), grouped into relations. Most relational databases use the SQL data definition and query language. Open-source software – computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Solution stack component – one of the pieces of a solution stack, which is a set of software subsystems or components needed to create a complete platform such that no additional software is needed to support applications. Applications are said to "run on" or "run on top of" the resulting platform. Some definitions of a platform overlap with what is known as system software. AMP-stack component – MySQL is the "M" component of Apache-MySQL-Perl/PHP/Python solution stacks (which, by the way, are available across all computer platforms). AMP software bundles are used to run dynamic Web sites or servers. It supports php, perl,c,c++,java etc. Component of LAMP – Linux version of AMP Component of WAMP – Windows version of AMP Ownership and copyrights Owners Original owner: MySQL AB – former software company that was founded in 1995. It was acquired by Sun Microsystems in 2008; Sun was in turn acquired by Oracle Corporation in 2010. Current owner: Oracle Corporation – multinational computer technology corporation headquartered in Redwood City, California, United States. The company specializes in developing and marketing computer hardware systems and enterprise software products – particularly its own brands of database management systems. License GNU General Public License – most widely used free software license, which guarantees end users (individuals, organizations, companies) the freedoms to use, study, share (copy), and modify the software. Software that allows these rights is called free software and, if the software is copylefted, requires those rights to be retained. The GPL demands both. Editions MySQL Community Server MySQL Enterprise – includes MySQL Enterprise Server software (a distribution of the MySQL Server) and several other components, as a subscription-based service produced by Oracle Corporation and targeted toward the commercial market. Graphical user interfaces MySQL Workbench – official (yet 3rd-party developed) integrated environment for MySQL. It was developed by MySQL AB, and enables users to graphically administer MySQL databases and visually design database structures. Adminer – free MySQL front end capable of managing multiple databases, with many CSS skins available. It is a light-weight alternative to phpMyAdmin, distributed under the Apache license (or GPL v2) as a single PHP file (around 300 KiB in size). Database Workbench a software application for development and administration of multiple relational databases including MySQL, with interoperationality between different database systems DBEdit a free front end for MySQL and other databases HeidiSQL a full featured free front end that runs on Windows, and can connect to local or remote MySQL servers to manage databases, tables, column structure, and individual data records. Also supports specialised GUI features for date/time fields and enumerated multiple-value fields LibreOffice Base LibreOffice Base allows the creation and management of databases, preparation of forms and reports that provide end users easy access to data. Like Microsoft Access, it can be used as a front-end for various database systems, including Access databases (JET), ODBC data sources, and MySQL or PostgreSQL Navicat a series of proprietary graphical database management applications, developed for Windows, Macintosh and Linux OpenOffice.org freely available OpenOffice.org Base can manage MySQL databases if the entire suite is installed phpMyAdmin a free Web-based front-end, widely installed by web hosting services since it is developed in PHP and included in the LAMP stack, and MAMP, XAMPP and WAMP software bundle installers SQLBuddy a free Web-based front end, developed in PHP SQLyog proprietary, but there is also a free 'community' edition available Toad for MySQL a free development and administration front end for MySQL from Dell Software Webmin a free Web-based management utility and a MySQL front end, developed in Perl with some parts written in Java MySQL storage engines MySQL storage engines – a storage engine (or database engine) is the underlying software component that a database management system (DBMS) uses to create, read, update and delete (CRUD) data from a database. Most database management systems include their own application programming interface (API) that allows the user to interact with their underlying engine without going through the user interface of the DBMS. MySQL storage engines include: Aria – storage engine for the MariaDB and MySQL relational database management systems. Its goal is to make a crash-safe alternative to MyISAM. It is not yet transactional but plans to add proper support for database transactions at some point in the future. The long-term goal is for Aria to be the default transactional and non-transactional storage engine for MariaDB. Berkeley DB – software library that provides a high-performance embedded database for key/value data. Berkeley DB is written in C with API bindings for C++, C#, PHP, Java, Perl, Python, Ruby, Tcl, Smalltalk, and many other programming languages. Prior to v5.1, MySQL included a BDB data storage backend. BlitzDB – CassandraSE – CONNECT (storage engine) – Falcon – was a transactional storage engine being developed for the MySQL relational database management system. Development was stopped after Oracle purchased MySQL. It was based on the Netfrastructure database engine. Falcon was designed to take advantage of Sun's zfs file system. FederatedX – InfiniDB – scalable, software-only columnar database management system for analytic applications. However, on 1 October 2014 InfiniDB ceased operations and filed for bankruptcy protection in US Bankruptcy Court in the Eastern District of Texas. Existing customers may be able to receive support from other companies, notably MariaDB. InnoDB – storage engine for MySQL. MySQL 5.5 and later use it by default. It provides the standard ACID-compliant transaction features, along with foreign key support (Declarative Referential Integrity). mroonga – MyISAM – default storage engine for the MySQL relational database management system versions prior to 5.5. It is based on the older ISAM code but has many useful extensions. MySQL Archive – this analytic storage engine can be used to create a table that is “archive” only. Data cannot be deleted from this table, only added. MySQL Cluster – technology providing shared-nothing clustering and auto-sharding for the MySQL database management system. It is designed to provide high availability and high throughput with low latency, while allowing for near linear scalability.[2] MySQL Cluster is implemented through the NDB or NDBCLUSTER storage engine for MySQL ("NDB" stands for Network Database). MySQL Federated – allows a user to create a table that is a local representation of a foreign (remote) table. It utilizes the MySQL client library API as a data transport, treating the remote data source the same way other storage engines treat local data sources whether they be MYD files (MyISAM), memory (Cluster, Heap), or tablespace (InnoDB). NDB Cluster – storage engine for storing tables of rows. NDB Cluster can concurrently support access from many types of API processes including from a MySQL server, Memcached, JavaScript/Node.JS, Java, JPA and HTTP/REST. All API processes can operate on the same tables and data stored in the NDB Cluster. sequence – SphinxSE – TokuDB – open source, high-performance storage engine for MySQL and MariaDB. It achieves this by using a Fractal tree index. It is a scalable, ACID and MVCC compliant storage engine that provides indexing-based query improvements, offers online schema modifications, and reduces slave lag for both hard disk drives and flash memory. WiredTiger – XtraDB – storage engine for the MariaDB and Percona Server databases, and is intended as a drop-in replacement to InnoDB, which is one of the default engines available on the MySQL database. Comparison of MySQL database engines – comparison between the available database engines for the MySQL database management system (DBMS). A database engine (or "storage engine") is the underlying software component that a DBMS uses to create, read, update and delete (CRUD) data from a database. Applications that use MySQL databases Drupal Joomla MODx MyBB phpBB TYPO3 WordPress Software stacks that include MySQL LAMP – solution stack, including the Linux operating system, the Apache HTTP Server, the MySQL relational database management system (RDBMS), and the PHP programming language. LAMP is suitable for building dynamic web sites and web applications. WAMP – MS Windows, Apache HTTP Server, MySQL, and PHP. Forks of MySQL Drizzle – free software/open source relational database management system (DBMS) that was forked from the now-defunct 6.0 development branch of the MySQL DBMS. MariaDB is a community-developed fork of MySQL intended to remain free under the GNU GPL, being led by the original developers of MySQL, who forked it due to concerns over its acquisition by Oracle. Percona Server – created by Percona, aims to retain close compatibility to the official MySQL releases, while focusing on performance and increased visibility into server operations. Also included in Percona Server is XtraDB, Percona's fork of the InnoDB Storage Engine. WebScaleSQL – software branch of MySQL 5.6 jointly developed by Facebook, Google, LinkedIn and Twitter to provide a centralized development structure for extending MySQL with new features specific to large-scale deployments, such as building large replicated databases running on server farms. The project's objective is to tightly follow new MySQL community releases, rather than merely be a software fork. See also Outline of free software Infobright – MySQL DataController – Toad Data Modeler – Xeround – References External links MySQL 5.6 Reference Manual MySQL 5.6 Tutorial MySQL site at Oracle.com Interview with David Axmark, MySQL co-founder Video MySQL MySQL
23574194
https://en.wikipedia.org/wiki/Gitorious
Gitorious
Gitorious was a free and open source web application for hosting collaborative free and open-source software development projects using Git revision control. Although it was freely available to be downloaded and installed, it was written primarily as the basis for the Gitorious shared web hosting service at gitorious.org, until it was acquired by GitLab in 2015. According to the Git User's Survey, Gitorious was the second most popular hosting service for Git in 2011, with 11.7% of respondents indicating they used it, behind 87.5% using GitHub. On 3 March 2015, Gitorious was acquired by GitLab, who announced service through gitorious.org would be discontinued on 1 June 2015 and encouraged Gitorious users to make use of its import tools to migrate projects to GitLab. Features and constraints In addition to source code hosting, Gitorious provided projects with wikis, a web interface for merge requests and code reviews, and activity timelines for projects and developers. According to the terms of service, if bandwidth usage for an account, project or repository exceeded 500 MB/month, or significantly exceeds the average bandwidth usage of other Gitorious.org users or customers, Gitorious.org reserved the right to immediately disable or throttle the account, project or repository until the account owner can reduce the bandwidth consumption. Gitorious AS released the Gitorious software under the AGPLv3 as free software. Acquisitions In August 2013, Gitorious AS was acquired by Powow AS, a Norwegian-Polish consulting company. Gitorious was then acquired by GitLab as of 3 March 2015. GitLab kept gitorious.org online through May 2015 and added an automatic migration function for project to move to GitLab.com which offers both paid and free hosting services and maintains an open source "community" edition for self-hosting. At the time of the GitLab acquisition, there were four Powow employees behind Gitorious. GitLab CEO Sytse Sijbrandij, responding to comments about the acquisition on Hacker News, wrote that "[Powow] wanted to shut the company down without a bankruptcy". So, GitLab, as a way to bolster their user base, bought Gitorious even though they were not hiring the employees or using the Gitorious software. In addition to providing optional migration to GitLab.com, GitLab opened discussions with Archive.org about preserving the Gitorious repositories for historical reference. As of mid-2016, as a result of efforts by GitLab, ex-Gitorious staff, and Archive Team, Gitorious.org existed as a read-only mirror of its former self, containing some 120,000 repositories comprising 5TB of data. See also Comparison of open source software hosting facilities References External links Gitorious source code (GitHub mirror, last updated in 2015) Open-source hosted development tools Open-source software hosting facilities Project management software Version control Software using the GNU AGPL license Discontinued open-source software hosting facilities
1111421
https://en.wikipedia.org/wiki/English%20Electric%20KDF9
English Electric KDF9
KDF9 was an early British computer designed and built by English Electric (which in 1968 was merged into International Computers Limited (ICL)). The first machine came into service in 1964 and the last of 29 machines was decommissioned in 1980 at the National Physical Laboratory. The KDF9 was designed for, and used almost entirely in, the mathematical and scientific processing fields in 1967, nine were in use in UK universities and technical colleges. The KDF8, developed in parallel, was aimed at commercial processing workloads. The KDF9 was an early example of a machine that directly supported multiprogramming, using offsets into its core memory to separate the programs into distinct virtual address spaces. Several operating systems were developed for the platform, including some that provided fully interactive use through PDP-8 machines acting as smart terminal servers. A number of compilers were available, notably both checkout and globally optimizing compilers for Algol 60. Architecture The logic circuits of the KDF9 were entirely solid-state. The KDF9 used transformer-coupled diode–transistor logic, built from germanium diodes, about 20,000 transistors, and about 2,000 toroid pulse transformers. They ran on a 1 MHz clock that delivered two pulses of 250 ns separated by 500 ns, in each clock cycle. The maximum configuration incorporated 32K words of 48-bit core storage (192K bytes) with a cycle time of 6 microseconds. Each word could hold a single 48-bit integer or floating-point number, two 24-bit integer or floating-point numbers, six 8-bit instruction syllables, or eight 6-bit characters. There was also provision for efficient handling of double-word (96-bit) numbers in both integer and floating point formats. However, there was no facility for byte or character addressing, so that non-numerical work suffered by comparison. Its standard character set was a version of the Friden Flexowriter paper tape code that was oriented to Algol 60, and included unusual characters such as the Algol subscript 10. However, each other I/O device type implemented its own subset of that. Not every character that could be read from paper tape could be successfully printed, for example. Registers The CPU architecture featured three register sets. The Nest was a 16-deep pushdown stack of arithmetic registers, The SJNS (Subroutine Jump Nesting Store) was a similar stack of return addresses. The Q Store was a set of 16 index registers, each of 48 bits divided into Counter (C), Increment (I) and Modifier (M) parts of 16 bits each. Flags on a memory-reference instruction specified whether the address should be modified by the M part of a Q Store, and, if so, whether the C part should be decremented by 1 and the M part incremented by the contents of the I part. This made the coding of counting loops very efficient. Three additional Nest levels and one additional SJNS level were reserved to Director, the Operating System, allowing short-path interrupts to be handled without explicit register saving and restoring. As a result, the interrupt overhead was only 3 clock cycles. Instruction set Instructions were of 1, 2 or 3 syllables. Most arithmetic took place at the top of the Nest and used zero-address, 1-syllable instructions, although address arithmetic and index updating were handled separately in the Q store. Q Store handling, and some memory reference instructions used 2 syllables. Memory reference instructions with a 16-bit address offset, most jump instructions, and 16-bit literal load instructions, all used 3 syllables. Dense instruction coding, and intensive use of the register sets, meant that relatively few store accesses were needed for common scientific codes, such as scalar product and polynomial inner loops. This did much to offset the relatively slow core cycle time, giving the KDF9 about a third of the speed of its much more famous, but 8 times more expensive and much less commercially successful contemporary, the Manchester/Ferranti Atlas Computer. Multiprogramming (timesharing) The KDF9 was one of the earliest fully hardware-secured multiprogramming systems. Up to four programs could be run at once under the control of its elegantly simple operating system, the Timesharing Director, each being confined to its own core area by BA (Base Address) and NOL (Number of Locations) registers. Each program had its own sets of stack and Q store registers, which were activated when that program was dispatched, so that context switching was very efficient. Each program could drive hardware I/O devices directly, but was limited by hardware checks to those that the Director had allocated to it. Any attempt to use an unallocated device caused an error interrupt. A similar interrupt resulted from overfilling (or over-emptying) the Nest or SJNS, or attempting to access storage at an address above that given in the NOL register. Somewhat different was the Lock-Out interrupt, which resulted from trying to access an area of store that was currently being used by an I/O device, so that there was hardware mutual exclusion of access to DMA buffers. When a program blocked on a Lock-Out, or by voluntarily waiting for an I/O transfer to terminate, it was interrupted and Director switched to the program of highest priority that was not itself blocked. When a Lock-Out cleared, or an awaited transfer terminated, and the responsible program was of higher priority than the program currently running, the I/O Control (IOC) unit interrupted to allow an immediate context switch. IOC also made provision to avoid priority inversion, in which a program of high priority waits for a device made busy by a program of lower priority, requesting a distinct interrupt in that case. Later operating systems, including Eldon 2 at the University of Leeds, and COTAN, developed by UKAEA Culham Laboratories with the collaboration of Glasgow University, were fully interactive multi-access systems, with PDP-8 front ends to handle the terminals. The Kidsgrove and Whetstone Algol 60 compilers were among the first of their class. The Kidsgrove compiler stressed optimization; the Whetstone compiler produced an interpretive object code aimed at debugging. It was by instrumenting the latter that Brian Wichmann obtained the statistics on program behaviour that led to the Whetstone benchmark for scientific computation, which inspired in turn the Dhrystone benchmark for non-numerical workloads. Reminiscence Machine code orders were written in a form of octal officially named syllabic octal (also known as 'slob-octal' or 'slob' notation,). It represented 8 bits with three octal digits but the first digit represented only the two most-significant bits, whilst the others the remaining two groups of three bits each. Although the word 'byte' had been coined by the designers of the IBM 7030 Stretch for a group of eight bits, it was not yet well known, and English Electric used the word 'syllable' for what is now called a byte. Within English Electric, its predecessor, DEUCE, had a well-used matrix scheme based on GIP (General Interpretive Programme). The unreliability of valve machines led to the inclusion of a sum-check mechanism to detect errors in matrix operations. The scheme used block floating-point using fixed-point arithmetic hardware, in which the sum-checks were precise. However, when the corresponding scheme was implemented on KDF9, it used floating point, a new concept that had only limited mathematical analysis. It quickly became clear that sum checks were no longer precise and a project was established in an attempt to provide a usable check. (In floating point (A + B) + C is not necessarily the same as A + (B + C) i.e. the + operation is not associative.) Before long, however, it was recognized that error rates with transistor machines was not an issue; they either worked correctly or didn’t work at all. Consequently, the idea of sum checks was abandoned. The initial matrix package proved a very useful system testing tool as it was able to generate lengthy performance checks well before more formal test packages which were subsequently developed. There is a legend that the KDF9 was developed as project KD9 (Kidsgrove Development 9) and that the 'F' in its designation was contributed by the then Chairman after a long and tedious discussion on what to name the machine at launch—"I don’t care if you call it the F—". The truth is more mundane: the name was chosen essentially at random by a marketing manager. (See also KDF8 for the parallel development and use of a commercially oriented computer.) The EGDON operating system was so named because one was going to UKAEA Winfrith: in Thomas Hardy's book The Return of the Native Winfrith Heath is called Egdon Heath. EGDON Fortran was called EGTRAN. Eldon was so named because Leeds University's computer was located in a converted Eldon chapel. Physical The machine weighed more than . Control desk with interruption typewriter 300 lb (136 kg), main store and input/output control unit 3,500 (1,587 kg), arithmetic and main control unit 3,500 (1,587 kg), power supply unit 3,000 (1,360 kg). See also Reverse Polish notation (RPN) Notes References External links The English Electric KDF9 The Hardware of the KDF9 The Software of the KDF9 The KDF9 and Benchmarking The KDF9: a Bibliography The KDF9 character codes ee9, a KDF9 emulator written in GNU Ada Delivery List and applications for the English Electric KDF9 History of KDF9 Algol compiler The Whetstone KDF9 Algol Translator Some KDF9 Algol compiler anecdotes Presentation on KDF9 Algol on visit from Dijkstra KDF9 Nest (images) Source Code for KDF9 port of Atlas Autocode compiler Early British computers KDF9 Magnetic logic computers Transistorized computers KDF9 Computer-related introductions in 1964
39842782
https://en.wikipedia.org/wiki/ISO/IEC%2027001
ISO/IEC 27001
ISO/IEC 27001 is an international standard on how to manage information security. The standard was originally published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in 2005 and then revised in 2013. It details requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS) – the aim of which is to help organizations make the information assets they hold more secure. A European update of the standard was published in 2017. Organizations that meet the standard's requirements can choose to be certified by an accredited certification body following successful completion of an audit. The effectiveness of the ISO/IEC 27001 certification process and the overall standard has been addressed in a recent large-scale study. How the standard works Most organizations have a number of information security controls. However, without an information security management system (ISMS), controls tend to be somewhat disorganized and disjointed, having been implemented often as point solutions to specific situations or simply as a matter of convention. Security controls in operation typically address certain aspects of information technology (IT) or data security specifically; leaving non-IT information assets (such as paperwork and proprietary knowledge) less protected on the whole. Moreover, business continuity planning and physical security may be managed quite independently of IT or information security while Human Resources practices may make little reference to the need to define and assign information security roles and responsibilities throughout the organization. ISO/IEC 27001 requires that management: Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities, and impacts; Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and Adopt an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis. What controls will be tested as part of certification to ISO/IEC 27001 is dependent on the certification auditor. This can include any controls that the organisation has deemed to be within the scope of the ISMS and this testing can be to any depth or extent as assessed by the auditor as needed to test that the control has been implemented and is operating effectively. Management determines the scope of the ISMS for certification purposes and may limit it to, say, a single business unit or location. The ISO/IEC 27001 certificate does not necessarily mean the remainder of the organization, outside the scoped area, has an adequate approach to information security management. Other standards in the ISO/IEC 27000 family of standards provide additional guidance on certain aspects of designing, implementing and operating an ISMS, for example on information security risk management (ISO/IEC 27005). History of ISO/IEC 27001 BS 7799 was a standard originally published by BSI Group in 1995. It was written by the UK government's Department of Trade and Industry (DTI) and consisted of several parts. The first part, containing the best practices for information security management, was revised in 1998; after a lengthy discussion in the worldwide standards bodies, it was eventually adopted by ISO as ISO/IEC 17799, "Information Technology - Code of practice for information security management." in 2000. ISO/IEC 17799 was then revised in June 2005 and finally incorporated in the ISO 27000 series of standards as ISO/IEC 27002 in July 2007. The second part of BS7799 was first published by BSI in 1999, known as BS 7799 Part 2, titled "Information Security Management Systems - Specification with guidance for use." BS 7799-2 focused on how to implement an Information security management system (ISMS), referring to the information security management structure and controls identified in BS 7799-2. This later became ISO/IEC 27001:2005. BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005. BS 7799 Part 3 was published in 2005, covering risk analysis and management. It aligns with ISO/IEC 27001:2005. Very little reference or use is made to any of the BS standards in connection with ISO/IEC 27001. Certification An ISMS may be certified compliant with ISO/IEC 27001 by a number of Accredited Registrars worldwide. Certification against any of the recognized national variants of ISO/IEC 27001 (e.g. JIS Q 27001, the Japanese version) by an accredited certification body is functionally equivalent to certification against ISO/IEC 27001 itself. In some countries, the bodies that verify conformity of management systems to specified standards are called "certification bodies", while in others they are commonly referred to as "registration bodies", "assessment and registration bodies", "certification/ registration bodies", and sometimes "registrars". The ISO/IEC 27001 certification, like other ISO management system certifications, usually involves a three-stage external audit process defined by the ISO/IEC 17021 and ISO/IEC 27006 standards: Stage 1 is a preliminary, informal review of the ISMS, for example checking the existence and completeness of key documentation such as the organization's information security policy, Statement of Applicability (SoA) and Risk Treatment Plan (RTP). This stage serves to familiarize the auditors with the organization and vice versa. Stage 2 is a more detailed and formal compliance audit, independently testing the ISMS against the requirements specified in ISO/IEC 27001. The auditors will seek evidence to confirm that the management system has been properly designed and implemented, and is in fact in operation (for example by confirming that a security committee or similar management body meets regularly to oversee the ISMS). Certification audits are usually conducted by ISO/IEC 27001 Lead Auditors. Passing this stage results in the ISMS being certified compliant with ISO/IEC 27001. Ongoing involves follow-up reviews or audits to confirm that the organization remains in compliance with the standard. Certification maintenance requires periodic re-assessment audits to confirm that the ISMS continues to operate as specified and intended. These should happen at least annually but (by agreement with management) are often conducted more frequently, particularly while the ISMS is still maturing. Structure of the standard The official title of the standard is "Information technology — Security techniques — Information security management systems — Requirements" ISO/IEC 27001:2013 has ten short clauses, plus a long annex, which cover: 1. Scope of the standard 2. How the document is referenced 3. Reuse of the terms and definitions in ISO/IEC 27000 4. Organizational context and stakeholders 5. Information security leadership and high-level support for policy 6. Planning an information security management system; risk assessment; risk treatment 7. Supporting an information security management system 8. Making an information security management system operational 9. Reviewing the system's performance 10. Corrective action Annex A: List of controls and their objectives This structure mirrors other management standards such as ISO 22301 (business continuity management) and this helps organizations comply with multiple management systems standards if they wish. Annexes B and C of 27001:2005 have been removed. Controls Clause 6.1.3 describes how an organization can respond to risks with a risk treatment plan; an important part of this is choosing appropriate controls. A very important change in ISO/IEC 27001:2013 is that there is now no requirement to use the Annex A controls to manage the information security risks. The previous version insisted ("shall") that controls identified in the risk assessment to manage the risks must have been selected from Annex A. Thus almost every risk assessment ever completed under the old version of ISO/IEC 27001 used Annex A controls but an increasing number of risk assessments in the new version do not use Annex A as the control set. This enables the risk assessment to be simpler and much more meaningful to the organization and helps considerably with establishing a proper sense of ownership of both the risks and controls. This is the main reason for this change in the new version. There are 114 controls in 14 groups and 35 control categories: A.5: Information security policies (2 controls) A.6: Organization of information security (7 controls) A.7: Human resource security - 6 controls that are applied before, during, or after employment A.8: Asset management (10 controls) A.9: Access control (14 controls) A.10: Cryptography (2 controls) A.11: Physical and environmental security (15 controls) A.12: Operations security (14 controls) A.13: Communications security (7 controls) A.14: System acquisition, development and maintenance (13 controls) A.15: Supplier relationships (5 controls) A.16: Information security incident management (7 controls) A.17: Information security aspects of business continuity management (4 controls) A.18: Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls) The controls reflect changes to technology affecting many organizations—for instance, cloud computing—but as stated above it is possible to use and be certified to ISO/IEC 27001:2013 and not use any of these controls. See also ISO/IEC JTC 1/SC 27 - IT Security techniques ISO/IEC 27000-series ISO 9001 BS 7799 Cybersecurity standards International Organization for Standardization List of ISO standards References External links ISO website Information assurance standards 27001
32991861
https://en.wikipedia.org/wiki/Control-Alt-Delete
Control-Alt-Delete
Control-Alt-Delete (often abbreviated to Ctrl+Alt+Del, also known as the "three-finger salute" or "Security Keys") is a computer keyboard command on IBM PC compatible computers, invoked by pressing the Delete key while holding the Control and Alt keys: . The function of the key combination differs depending on the context but it generally interrupts or facilitates interrupting a function. For instance, in pre-boot environment (before an operating system starts) or in DOS, Windows 3.0 and earlier versions of Windows or OS/2, the key combination reboots the computer. Starting with Windows 95, the key combination invokes a task manager or security related component that facilitates ending a Windows session or killing a frozen application. History The soft reboot function via keyboard was originally designed by David Bradley. Bradley, as the chief engineer of the IBM PC project and developer of the machine's ROM-BIOS, had originally used , but found it was too easy to bump the left side of the keyboard and reboot the computer accidentally. According to his own account, Mel Hallerman, who was the chief programmer of the project, therefore suggested switching the key combination to as a safety measure, a combination impossible to press with just one hand on the original IBM PC keyboard. The feature was originally conceived only as a development feature for internal use and not intended to be used by end users, as it triggered the reboot without warning or further confirmation—it was meant to be used by people writing programs or documentation so that they could reboot their computers without powering them down. Bill Gates (former Microsoft CEO) remembered it as "just something we were using in development and it wouldn't be available elsewhere". The feature, however, was detailed in IBM's technical reference documentation to the original PC and thereby revealed to the general public. Bradley viewed this work as just one small task out of many: "It was five minutes, 10 minutes of activity, and then I moved on to the next of the 100 things that needed to get done." In a March 2018 email, one of Bradley's co-workers confirmed the command was invented in 1981 in Boca Raton, Florida. Bradley is also known for his good-natured jab at Gates at the celebration of the 20th anniversary of the IBM PC on August 8, 2001 at The Tech Museum: "I have to share the credit. I may have invented it, but I think Bill made it famous."; he quickly added it was a reference to Windows NT logon procedures ("Press Ctrl + Alt + Delete to log on"). During a question and answer presentation on 21 September 2013, Gates said "it was a mistake", referring to the decision to use Ctrl+Alt+Del as the keyboard combination to log into Windows. Gates stated he would have preferred a single button to trigger the same actions, but could not get IBM to add the extra button into the keyboard layout. BIOS By default, when the operating system is running in real mode (or in a pre-boot environment, when no operating system is started yet), this keystroke combination is intercepted by the BIOS. The BIOS reacts by performing a soft reboot (also known as a warm reboot). Examples of such operating systems include DOS, Windows 3.0 in Standard Mode as well as earlier versions of Windows. Windows DOS-based Windows In Windows 9x and Windows 3.0 running in 386 Enhanced mode, the keystroke combination is recognized by the Windows keyboard device driver. According to the value of the option in the section of system.ini, Windows performs one of several actions in response. If (default): Windows 3.1x displays a blue screen that allows the user to press Enter to end a task that has stopped responding to the system (if such a task exists) or press Control+Alt+Delete again to perform a soft reboot. The text of this rudimentary task manager was written by Steve Ballmer. Windows 9x temporarily halts the entire system and displays the Close Program dialog box, a window which lists currently running processes and allows the user to end them (by force, if necessary). The user can press Control+Alt+Delete again to perform a soft reboot. If , Windows performs a soft reboot. Windows NT family The Windows NT family of operating system, whose members do not have "NT" in their names since Windows 2000, reserve Ctrl+Alt+Delete for the operating system itself. Winlogon, a core component of the operating system, responds to the key combination in the following scenarios: Invoking Windows Security When a user is logged onto a Windows computer, pressing Ctrl+Alt+Delete invokes Windows Security. It is a graphical user interface that allows user to lock the system, switch user, log off, change the password, invoke Windows Task Manager, or end the Windows session by shutting down, rebooting or putting the computer into sleep or hibernation; clicking "Cancel" or pressing the Escape key returns the user to where they were. The key combination always invokes Windows Security in all versions and editions of Windows NT family except Windows XP. (See below.) Prior to Windows Vista, Windows Security was a dialog box, did not allow user switching and showed the logon date and time, name of user account into which the user has logged on and the computer name. Starting with Windows Vista, Windows Security became full-screen. Secure attention Login spoofing is a social engineering trick in which a malicious computer program with the appearance of a Windows login dialog box prompts for user's account name and password to steal them. To thwart this attack, Windows NT implements an optional security measure in which Ctrl+Alt+Delete acts as a secure attention key combination. Once the protection is activated, Windows requires the user to press Ctrl+Alt+Delete each time before logging on or unlocking the computer. Since the key combination is intercepted by Windows itself and malicious software cannot mimic this behavior, the trick is thwarted. Unless the Windows computer is part of a Windows domain network, the secure attention protection is disabled by default and must be enabled by the user. Windows XP behavior Windows XP introduces Welcome Screen, a redesigned logon interface. The Welcome Screen of Windows XP, however, does not support the secure attention scenario. It may be disabled in favor of the classic plain logon screen, either explicitly by the user or as a consequence of the Windows XP computer becoming part of a Windows domain network. With that in mind, Windows XP uses the Ctrl+Alt+Delete in the following unique scenarios: At a logon prompt, the key combination dismisses Welcome Screen and invokes classic logon user interface. When a user is logged on to a Windows XP computer and Welcome Screen is enabled, pressing the key combination invokes Windows Task Manager instead of Windows Security. Windows Vista and the next versions of Windows NT did not inherit any of the above. OS/2 In OS/2, this keystroke combination is recognized by the OS/2 keyboard device driver, which notifies the session manager process. The normal session manager process in OS/2 versions 2.0 and later is the parent Workplace Shell process, which displays the "system is rebooting" window and triggers a soft reboot. If it is pressed twice in succession OS/2 triggers an immediate soft reboot, without waiting for the session manager process. In both cases, the system flushes the page cache, cleanly unmounts all disc volumes, but does not cleanly shut down any running programs (and thus does not save any unsaved documents, or the current arrangements of the objects on the Workplace Shell desktop or in any of its open folders). Mac Ctrl+Alt+Delete is not a keyboard shortcut on macOS. Instead, brings up the Force Quit panel. restarts the computer. The original Mac OS X Server had an Easter egg in which pressing (as the Option key is the equivalent of Alt key on a Mac keyboard) would show an alert saying "This is not DOS!". Linux On some Linux-based operating systems including Ubuntu and Debian, is a shortcut for logging out. On Ubuntu Server, it is used to reboot a computer without logging in. Equivalents on various platforms Cultural adoption As computers became ubiquitous, so too, has the jargon. Control-Alt-Delete can also mean "dump," or "do away with". The keystrokes are well known and infamous for escaping from problems in pop culture. For example, in the Billy Talent song "Perfect World", part of the lyrics include the sequence and associate it with resetting their memory and escaping from a situation: "Control-Alt-Deleted. Reset my memory." See also Table of keyboard shortcuts Notes References Further reading Linux manual pages for kill(2) and reboot(2). External links David Bradley explaining how he invented Ctrl-Alt-Delete, at GreatBigStory Windows administration Computer keys IBM PC compatibles Operating system technology
47578331
https://en.wikipedia.org/wiki/2008%20Queen%27s%20Birthday%20Honours%20%28Australia%29
2008 Queen's Birthday Honours (Australia)
The Queen's Birthday Honours 2008 were appointments Australian honours system to recognise and reward good works by citizens of Australia and other nations that contribute to Australia. The Birthday Honours are awarded as part of the Queen's Official Birthday celebrations and were announced on 8 June 2008 in Australia. The recipients of honours are displayed as they were styled before their new honour and arranged by honour with grades and then divisions i.e. Civil, Diplomatic and Military as appropriate. Order of Australia Companion (AC) General Division The Honourable Emeritus Professor Peter Erne Baume, , of New South Wales. For service to advancing higher education as an academic, researcher and administrator, and to the community through leadership roles in organisations addressing significant public health and social policy issues. Dr David Michael Bennett, , of New South Wales. For service to the law, particularly as Commonwealth Solicitor-General, through the provision of advice on matters of national interest and the international promotion of Australian legal services and education. The Honourable Dr Geoffrey Ian Gallop, of New South Wales. For distinguished service to the Parliament of Western Australia, to the promotion of economic development and environmental sustainability, and to the community through educational, health and social reform. Mr Reg Grundy, , of New South Wales. For service to the entertainment and television industry as the creator and producer of television programs depicting national cultural identity, to the promotion of Australia internationally, and to the community through philanthropic contributions to a range of organisations. The Honourable John Winston Howard, of New South Wales. For distinguished service to the Parliament of Australia, particularly as Prime Minister and through contributions to economic and social policy reform, fostering and promoting Australia's interests internationally, and the development of significant philanthropic links between the business sector, arts and charitable organisations. Mr William John Kelty, of Victoria. For service to the trade union movement, particularly through the establishment of the universal system of superannuation, through improvements to productivity and conditions in the workplace and the development of youth training schemes. His Excellency the Honourable Justice Kevin Horace Parker, , The Hague, Netherlands. For eminent service to the law and the judiciary, particularly as Vice-President of the International Criminal Tribunal for the former Yugoslavia, and to the Anglican Church in Western Australia. Mr Kerry Matthew Stokes, , of Western Australia. For service to business and commerce through strategic leadership and promotion of corporate social responsibility, to the arts through executive roles and philanthropy, and to the community, particularly through contributions to organisations supporting youth. Officer (AO) General Division Mr Richard Hugh Allert, , of South Australia. For service to the business sector through visionary leadership and promotion of corporate social responsibility, and to the community through involvement with and support for a range of artistic, charitable and educational organisations. The Most Reverend Archbishop John Alexius Bathersby, of Queensland. For service to the Catholic Church in Australia, particularly as Archbishop of Brisbane, and to the community through the promotion of ecumenical dialogue. Professor James Frank Bishop, of New South Wales. For service to medicine, particularly in the field of cancer treatment and research and through the development of innovative policy, improved public awareness and service delivery programs. Professor Christopher John Burrell, of South Australia. For service to medicine as a specialist in infectious diseases, particularly in the field of virology, as an administrator and educator, and to the community of South Australia through the establishment of the Coriole Music Festival. Mr Roger Campbell Corbett, , of New South Wales. For service to business, particularly through leadership and executive roles in the retail sector and a range of allied organisations, and to the community. Ms Patricia Mary Faulkner, of Victoria. For service to the community through the development and implementation of public policy relating to health, aged care, children's services, disability services and housing. Dr Geoffrey Graham Garrett, of Australian Capital Territory. For service to scientific research and administration through leadership of the Commonwealth Scientific and Industrial Research Organisation and the development and implementation of innovative research initiatives. Dr Colin (Col) Gellatly, of New South Wales. For service to the community as a leader in policy reform and administration in the New South Wales public sector, particularly through the coordination of whole-of-government program initiatives. Professor Michael Francis Good, of Queensland. For service to medical research, particularly in the fields of infectious disease immunology and vaccine technology, through leadership roles at the Queensland Institute of Medical Research and contributions to education. Ms Joanna Miriam Hewitt, Washington DC, USA. For service to the community, particularly through significant contributions to Australia's agricultural, forestry and fishing sectors, to cross departmental policy formulation and delivery, and to international relations through fostering diplomatic, trade and cultural interests. The Honourable Chief Justice Terence John Higgins, of Australian Capital Territory. For service to the judiciary and to the law, particularly as Chief Justice for the Australian Capital Territory, and to the community through leadership roles with a range of sporting, educational and social welfare organisations. Mrs Dorothy Jane Hoddinott, of New South Wales. For service to education and the teaching profession, particularly through the Australian Joint Council of Professional Teaching Associations and through the professional development of teachers of English as a second language, and to the community through the support of immigrant and refugee students. Commissioner Malcolm Arthur Hyde, , of South Australia. For service to policing and law enforcement as Commissioner of Police in South Australia, particularly through the development of improved service delivery methods, to the detection and prevention of illicit drug use and electronic crime, and through contributions to national law enforcement policies. Mr Ubaldo Larobina, , of Victoria. For service to the media, particularly through the distribution of news and information to Italians living in Australia, and to the community through a range of multicultural, educational and charitable organisations. Ms Kim Coral McKay, of New South Wales. For service to the environment through executive public relations roles with a range of organisations, particularly as co-founder of Clean Up Australia and Clean Up the World, and to the community. Mr Martyn Kenneth Myer, of Victoria. For service to business and to the community, particularly through contributions to medical research and the establishment of the Florey Neurosciences Institute and through executive and philanthropic roles with a range of organisations. His Honour Thomas Ian Pauling, , of Northern Territory. For service to the Northern Territory through significant contributions to the law, particularly relating to constitutional matters, to the development of legal organisations and the promotion of professional standards, and to the community. Professor John Ralston, of South Australia. For service to science and to scientific research, particularly in the field of physical chemistry and minerals processing, to education and to the creation and application of new scientific knowledge to industry. Mr Arthur Sinodinos, of New South Wales. For service to politics through the executive function of government, to the development of economic policy and reform, and to the Greek community. Professor Ian Hugh Sloan, of New South Wales. For service to education through the study of mathematics, particularly in the field of computational mathematics, as an academic, researcher and mentor, and to a range of national and international professional associations. Dr Ian James Watt, of Australian Capital Territory. For service to the community through the development of public policy and administration in the areas of finance and governance, budget and expenditure policy, taxation reform, and through contributions to international professional finance organisations. Mr Jeffrey Robert Whalan, of Australian Capital Territory. For service to the community through the implementation and administration of government policies and initiatives in the area of social services and welfare programs, and to the development of corporate accountability and stakeholder management processes. Member (AM) General Division Mr Donald John Alexander, of South Australia. For service to engineering, particularly the water supply sector in South Australia. Professor Dennis Patkin Altman, of Victoria. For service to education as an academic, social and political commentator, and to the community through raising awareness of human rights issues and as a contributor to the development of HIV/AIDS policy. Mr Peter James Andren, deceased, of New South Wales. For service to the Parliament of Australia, and to the rural and regional communities of central west New South Wales, particularly through support for a range of Indigenous, disability and health service organisations. Dr Anona Fern Armstrong, of Victoria. For service to education through research and teaching roles in the fields of management, corporate governance, and evaluation, to professional organisations, and to the community. Associate Professor Robert Neville Atkinson, , of South Australia. For service to medicine as an orthopaedic surgeon and through contributions to professional associations. Mr Edmund John Bailey, of Northern Territory. For service to the horseracing industry in the Northern Territory through the development and administration of the sport, and to the community. Mr Gerald Anthony Barry, of Queensland. For service to the community through a range of executive and support roles with ostomy associations. Dr Alfred John Bass, of Tasmania. For service to the community through the development of information technology systems relating to the collection of population health data. Mr Brian Joseph Bertwistle, of Queensland. For service to the transport and logistics industry, particularly through support for educational programs and driver and vehicle safety initiatives. Mr Michael Peter Berwick, of Queensland. For service to conservation and the environment through initiatives supporting the preservation of the Daintree Rainforest and far north Queensland, to local government, and to the community of Douglas Shire. Mr Kenneth Robert Bickle, of New South Wales. For service to the pharmacy profession through executive roles with a range of organisations, and to the community as a supporter of the Return Unwanted Medicines Program. Mr Ian Ross Bidmeade, of South Australia. For service to public health and to people with disabilities through contributions to administrative and legislative reforms, and to the community through a range of social welfare organisations. Professor Louis Charles Birch, of New South Wales. For service to science, particularly in the field of biology as an academic and researcher, and through contributions to the understanding of the relationship of science to religion. Mr Kevin Michael Blake, of Victoria. For service to international humanitarian aid through fundraising and administrative roles with Melbourne Overseas Missions. Mrs Shirley Lillian Blake, of Victoria. For service to international humanitarian aid through fundraising and administrative roles with Melbourne Overseas Missions. Mrs Ellen May Boyd, of Victoria. For service to youth, particularly through the Guiding movement as State Commissioner, Victoria, and to the community as a contributor to a range of women's organisations. Ms Dorothy Buckland-Fuller, , of New South Wales. For service to the community as a contributor to a range of social justice, ethnic and migrant women's organisations and through raising awareness of issues affecting women from culturally and linguistically diverse backgrounds. Professor Catherin Jane Bull, of Victoria. For service to landscape architecture and urban design as an academic, researcher and practitioner and through contributions to a range of professional organisations and advisory bodies. Mr Bruno Giovanni Camarri, of Western Australia. For service to business, particularly in the resources sector, to the law, and to the community of Western Australia through a range of charitable organisations. Mrs Doreen Fay Campbell, of New South Wales. For service to industrial relations, and to the community of the Illawarra. Mr Peter David Campbell, of New South Wales. For service to the community through philanthropic contributions to a range of health, social welfare, youth and charitable organisations. Mrs Mollie Campbell-Smith, , of Tasmania. For service to the community of Tasmania, particularly through the promotion of issues that affect the interests of women and to a range of organisations involved in the areas of health and aged care. Professor Robert John Clark, of Tasmania. For service to agricultural science as an academic, educator and administrator, particularly through contributions to the University of Tasmania and the Tasmanian Institute of Agricultural Research. Mr Denis Chadwick Cleary, of New South Wales. For service to business, particularly the finance sector, and to the community through a range of voluntary roles with sporting groups. The Reverend Canon Dr Raymond Leslie Cleary, of Victoria. For service to the Anglican Church of Australia, and to the community through executive roles in a range of social justice and welfare organisations. Mr Paul Hugh Clitheroe, of New South Wales. For service to the finance sector through the promotion of financial literacy, and to the community. Mr Michael Stanley Cockram, of Western Australia. For service to the community through executive roles with Prison Fellowship Western Australia and as a supporter of restorative justice programs. Sister Mary Denise Coghlan, of Queensland. For service to international humanitarian aid as Director of the Jesuit Refugee Services, Cambodia. Dr Timothy James Cooper, of South Australia. For service to the brewing industry, particularly through the implementation of environmentally sustainable production and manufacturing practices, to professional organisations, and to the community. Mr Gregory Gane Cornwell, of Australian Capital Territory. For service to the Australian Capital Territory Legislative Assembly, and to a range of community organisations. Adjunct Professor Peter Russell Corrigan, of Victoria. For service to architecture as an academic, educator and practitioner and to the arts, particularly through theatre production design. Ms Sue Margaret Cumming, of Queensland. For service to the community, particularly in the field of social work as a clinician and through administrative roles with a range of professional associations. Mr Albert Dadon, of Victoria. For service to the arts, particularly through the Melbourne Jazz Festival, to the community through philanthropic support for cultural and charitable organisations, and to business. Professor Elizabeth Anne Davies, of New South Wales. For service to nursing, particularly in the areas of nurse and midwifery education, and to the community through a range of health-related organisations and advisory bodies. Mrs Janice Maxine (Jan) Davis, of South Australia. For service to the Legislative Council of the Parliament of South Australia through administrative and support roles. Mr John Kelvin Dawson, of Queensland. For service to business, particularly the banking and finance sector and to the development of relations between Australia and Britain. Ms Rayne De Gruchy, , of Australian Capital Territory. For continued service to public administration, particularly through specialist legal services and to corporate governance. Ms Tania Karen de Jong, of Victoria. For service to the arts as a performer and entrepreneur and through the establishment and development of music and arts enrichment programs for schools and communities. Dr Andrew Wesley Dent, of Victoria. For service to emergency medicine as an academic, researcher and educator and through administrative roles at St Vincent's Hospital, Melbourne. Emeritus Professor David Michael Doddrell, of Queensland. For service to science in the field of magnetic resonance as an academic and researcher. Mr Esmond Joseph Downey, of Victoria. For service to the community through a range of church, educational and aged care organisations. Professor Geoffrey Gordon Duggin, of New South Wales. For service to renal medicine and toxicology as a clinician and researcher, and through contributions to professional associations. Professor Elizabeth Jane Elliott, of New South Wales. For service to paediatrics and child health as an academic, researcher and educator and through the establishment of the Australian Paediatric Surveillance Unit. Mr Tony Fini, of Western Australia. For service to the building and construction industry in Western Australia, and to the community through support for sporting and cultural organisations. Councillor Kevin Malcolm Forbes, of Western Australia. For service to local government in the Mount Barker region, and to the community through business, educational and emergency service organisations. Emeritus Professor Richard George Fox, of Victoria. For service to the law and to legal education, particularly in the areas of criminal procedure and sentencing. Mr Arthur George Frame, of Queensland. For service to the performing arts and to the community through administrative and advisory roles with a range of organisations in Queensland and support for artists in rural and regional areas. Mr David Maxwell Freeman, of New South Wales. For service to the Jewish community, particularly through the development of hospital and aged care facilities in Sydney. Mr Paul Albert Gardner, of Victoria. For service to the community through social welfare organisations addressing youth homelessness and unemployment, to the arts, and to advertising. Ms Carol Frances Gaston, of South Australia. For service to the community, particularly through the health services planning and management sector in South Australia, to nursing education, and to humanitarian work in Australia and overseas. Mr James Philip Graham, of New South Wales. For service to business, particularly in the financial services sector, and to the community through support for medical research and educational organisations. Mr David John Gray, of Western Australia. For service to commerce and industry through leadership roles in peak organisations representing the business sector, and to the performing arts in Western Australia. Dr Robert Stirling Greenhill, , of Queensland. For service to public sector dentistry, particularly through the development of specialist orthodontic services and interdisciplinary management of patients with cleft lip and palate and craniofacial anomalies, to dental education, and to professional organisations. Mr Malcolm John Grierson, of Queensland. For service to the community, particularly through contributions to the development of major infrastructure and public works facilities in Queensland. Mr Peter John Griffin, of Victoria. For service to the community through support for health, medical research, arts and charitable organisations, and to business, particularly in the investment and banking sectors. Professor Miraca Una Gross, of New South Wales. For service to education as an academic, researcher and author through the design and delivery of programs and policies for gifted students and their teachers, to professional development and educational practice. Mrs Jennifer Therese Hagger, of South Australia. For service to the community, particularly through executive roles with the House of Prayer for All Nations - Adelaide and Mission World Aid. Dr Janet Mary Hammill, of Queensland. For service to the community through health services for Indigenous women and children and research into the effects of foetal alcohol syndrome. Mr Vivian William Hanley, of New South Wales. For service to the transport, storage and furniture removal industries through a range of representational roles, training initiatives, and contributions to improving industry standards. Associate Professor Jack Hansky, of Victoria. For service to medicine in the field of gastroenterology, particularly through research and clinical practice in the treatment of gastric bleeding, to medical education, and to the community. Mr Ian Kenneth Hardy, of South Australia. For service to the community, particularly in the area of aged care as a leading contributor to the development of better services, and through support for opera. The Honourable Justice David Lindsey Harper, of Victoria. For service to law reform, to the judiciary, and in the area of international humanitarian law, and to the community through support services for the care and resettlement of offenders and their families. Mr Antony Paul Hasham, of New South Wales. For service to the community through Variety, the Children's Charity and Life Education Australia, and to the hairdressing industry. Ms Carmel Hattch, of Northern Territory. For service to paediatric and outreach nursing, to the welfare of Indigenous children in the Northern Territory, and as a foster parent. Mr Michael Sidney Hill Smith, of South Australia. For service to the development of the Australian wine industry, particularly as a judge, educator and mentor, to professional organisations, and as a winemaker. Mr Edward William Howard, , of Queensland. For service to the community through executive, advisory and leadership roles with a range of health, tenancy, church and social welfare organisations. Mr John Weir Ingram, of New South Wales. For service to industry, particularly in the area of industrial relations reform, to the manufacturing sector through executive roles, and to the community. Mr Antony Simon Jeffrey, of New South Wales. For service to arts administration through executive roles with a range of cultural organisations, and to the design, development and promotion of sponsorship and fundraising programs for the performing arts. Dr Kenneth Alan Johnson, of Northern Territory. For service to the development of conservation management strategies for Australia's desert flora and fauna through research and in partnership with the traditional Aboriginal owners of the land. Dr Roderic Edward Kefford, of New South Wales. For service to primary and secondary education through administrative and teaching roles, particularly in independent schools, and contributions to educational organisations. Mr Donald William Kinsey, of Victoria. For service to the community through public speaking programs and a range of executive roles with charitable, child health care and educational support organisations. Mr John Kendall (Jack) Knight, of New South Wales. For service to engineering through leadership and innovation in major infrastructure development projects in Australia and internationally, to professional education, and to the community. Mr Justin Lee Langer, of Western Australia. For service to cricket as a player and mentor and to the community, particularly through fundraising and support for a wide range of charities, including children's leukaemia and cancer research organisations. Mr John Mick Lee, , of Western Australia. For service to local government, particularly within the Town of Victoria Park, and to the community through leadership and support roles with a range of organisations. Ms Frances Hewlett Lovejoy, deceased, of New South Wales. For service to education, particularly in the fields of sociology and women's studies as an educator, author and mentor. Emeritus Professor Judy Lumby, of New South Wales. For service to nursing education, to professional organisations, and to the community through contributions to improving safety and quality in health care services. Professor Peter Francis McDonald, of Australian Capital Territory. For service in the fields of demography and social research, particularly relating to population dynamics and future studies, through the exploration of related policy options and through education. Mr Andrew John McGalliard, , of Victoria. For service to the Defence community, particularly through leadership roles with support, advisory and charitable organisations, and to engineering. Mr John Francis McGrath, of Victoria. For service to the community through a range of mental health organisations, to the Parliament of Victoria and to the National Party of Australia. Professor John Ralph McKellar, , of South Australia. For service to people with dementia, particularly Alzheimer's disease, and their carers through organisations that provide education, support services and funding for research. Ms Cathryn Rosemary McKenzie, of Victoria. For service to the law and to the community as an advocate for human rights and equal opportunity. Professor Sandra Vianne (Vi) McLean, of Queensland. For service to higher education as an administrator, academic and leader, and to the development of national standards for the teaching profession. Mr Leo Francis Mahony, deceased, of Australian Capital Territory. For service to the community through executive roles with the Royal United Services Institute of Australia. Mr John Messara, of New South Wales. For service to the thoroughbred horseracing industry, particularly through the introduction of best practice initiatives in the areas of reproduction and stud management. Ms Voula Messimeri-Kianidis, of Victoria. For service to the community through executive roles with a range of multicultural organisations, and advocacy roles on behalf of migrants, refugees and women. Sister Theresa Anne Morellini, of Western Australia. For service to the Indigenous community of the Kimberley region, particularly in the areas of social welfare and education, the prevention of alcohol and substance abuse, and pastoral care programs. Dr Jacqueline April Morgan, of New South Wales. For service to medicine, particularly in the field of neuromuscular disorders, and to the community through a range of organisations involved in research and support for people with muscular dystrophy. Dr Kenneth John Moss, of New South Wales. For service to business in the mining, financial and property development sectors, and to the community through contributions to maritime, educational and health organisations. Mr Ian Crawford Murray, of New South Wales. For service to business, particularly international trade, through executive roles with a range of export-related organisations, and to professional education. Professor Hyland Neil (Hank) Nelson, of Australian Capital Territory. For service to tertiary education as an academic, researcher and political commentator on the contemporary history of Papua New Guinea. Mr Norman John O'Bryan, of Victoria. For service to the community through executive and fundraising roles for medical research organisations, particularly in the area of cardiovascular health. Professor Patrick Joseph O'Keefe, of Queensland. For service to the protection and repatriation of cultural property and heritage, to the law as a lecturer and author, and to legal education. Mr Justin Francis O'Sullivan, of Queensland. For service to the law through a range of roles with professional legal organisations, particularly the Queensland Law Society, as a practitioner, and to the community. Professor Anthony Wilfred (Tony) Parker, of Queensland. For service to sports medicine and exercise science as an academic, researcher and author and through executive and advisory roles with professional organisations. Associate Professor David Cleland Paton, of South Australia. For service to conservation and the environment through research into the ecology and behaviour of Australian birds, to the management and restoration of the natural environment, and to education. Ms Penelope Ann Paton, of South Australia. For service to conservation and the environment through the management of natural resources and ecosystems, and as a contributor to environmental and ornithological research projects. Mr Michael Delaney Perrott, of Western Australia. For service to the community through support for a range of mental health and suicide prevention organisations, and to governance and strategic planning in the tertiary education sector. Emeritus Professor Peter Duhig Phelan, of Victoria. For service to medicine, particularly in the area of paediatrics as an academic and administrator and through contributions to the development of health care delivery and clinical practice management. Dr Glen David Postle, of Queensland. For service to education through the design and introduction of flexible learning programs for disadvantaged youth in rural and remote areas, and to professional development. Professor Stephen John Redman, of Australian Capital Territory. For service to medical science, particularly in the field of experimental neuroscience as an academic and researcher and through contributions to professional organisations. Mrs Margaret Lynette Rose, of New South Wales. For service to the building and construction industry and to the community, particularly in the area of sustainable urban development and planning and through support for a range of charitable organisations. Mr Robert Michael Rose, of New South Wales. For service to the building and construction industry and to the community, particularly in the area of sustainable urban development and planning and through support for a range of charitable organisations. Mr Stanley Barry Roth, of New South Wales. For service to the community through executive roles with the United Israel Appeal of Australia, as a supporter of a range of charitable organisations, and to business. Dr John Frank Roulston, of Queensland. For service to education, particularly through administrative and teaching roles in the independent schools sector, to the development of schools-based drug prevention programs and contributions to professional organisations. Mrs Pamela Ryan, , of Victoria. For service to athletics as a competitor, coach and mentor, and through administrative roles with Athletics International. Mr Leslie John (Les) Schirato, of New South Wales. For service to the community through philanthropic contributions to health, youth, church and social welfare organisations, and to business. Mr Reginald Francis Scott, , of New South Wales. For service to dental health through executive roles with professional organisations, and to the development of training programs for dental prosthetists. Mrs Penelope Alice Seidler, of New South Wales. For service to the preservation of cultural heritage, particularly through The Australiana Fund, to visual arts organisations, and to architecture. Mr Alwyn Jeffrey Shaw, of Tasmania. For service to the building and construction industries through a range of civil and infrastructure projects, and to the thoroughbred horse breeding industry. Dr Marie Gabrielle Siganto, of Queensland. For service to the arts and education through contributions to artistic, cultural, educational and multicultural organisations, and as a benefactor and supporter of professional development programs. Mr Warwick Louis Smith, of Victoria. For service to people with vision impairments, particularly through executive roles with Guide Dogs Victoria, and to the accountancy profession. Professor Edgar William (Ted) Snell, of Western Australia. For service to the visual arts as an academic, artist, commentator and administrator, to professional organisations, and as a mentor of young artists. Mr Anthony Eric (Tony) South, , of Queensland. For service to the community as a campaigner for people with a disability and through contributions to the development of spinal injury prevention and research programs. Professor Thomas Harley Spurling, of Victoria. For service to chemical science through contributions to national innovation policies, strategies and research, and to the development of professional scientific relationships within the Asian region. Mr Anthony Charles Stacey, of Tasmania. For service to the footwear manufacturing industry, and to the community through executive roles with a range of arts, motoring and service groups. Ms Janette Mary (Jan) Stirling, of South Australia. For service to women's basketball as an elite coach and player and as a contributor to professional development, and to the community. Professor Russell William Stitz, , of Queensland. For service to medicine in the field of colorectal surgery, to the development of surgical education and training programs, and through leadership roles in professional organisations. The Right Reverend Ronald Francis Stone, of Victoria. For service to the Anglican Church of Australia, and to rural and remote communities through executive roles with social welfare organisations. Dr Helen Lesley Sykes, of Victoria. For service to youth, particularly through the Trust for Young Australians, to leadership development programs, and to child and adolescent mental health. Ms Dianne Marion Thorley, of Tasmania. For service to local government and to the community of the Toowoomba region through a range of youth education, social welfare, environment and conservation projects and associations. Mr Barry Thornton, of Queensland. For service to the manufacturing and transport industries, to the development of infrastructure reform projects, and to the community through support for educational, arts and charitable organisations. Mr Richard Kinsley (Darcy) Tronson, of Tasmania. For service to politics through roles supporting the executive function of government, and to the Australian Maritime College. Associate Professor Ronald Stewart Walls, of New South Wales. For service to medicine in the fields of clinical immunology and allergy, as an academic, researcher and administrator, to the advancement of medical education, and to professional associations. Mr Russell Alexander Watts, of New South Wales. For service to conservation and the environment through advocacy roles for the preservation of endangered flora and fauna, particularly native bird species, and to the development of ecotourism initiatives. Mr John Randall Weigel, of New South Wales. For service to the conservation of reptile and amphibian species, to wildlife management, research and education, and to regional tourism in New South Wales. Brother Anthony Peter Whelan, of New South Wales. For service to education through a range of executive and teaching roles in the Catholic education sector, to the promotion of social justice, and to professional standards development. Mr Bruce Gilmore Wilson, of Queensland. For service to transport planning, infrastructure development and reform, and to land management policy, particularly in Queensland, and through contributions to advisory bodies. Mrs Karen Louise Wilson, of New South Wales. For service to botany as a researcher and through the recording and documentation of Australian biodiversity. Mr Phillip Paul Wolanski, of New South Wales. For service to the community through executive roles and philanthropic contributions to a range of arts, sporting and cultural organisations, particularly the National Institute of Dramatic Art. Mr Andrew Stuart Wright, of Victoria. For service to the heavy vehicle design and manufacturing industry, to the development of automotive export markets, and through fostering innovative trade skills training programs. Military Division Navy Captain Jaimie Charles Hatcher, of Australian Capital Territory. For exceptional service as Commanding Officer during deployment on Operation Catalyst. Commodore Bruce James Kafer, , of New South Wales. For exceptional service to the Royal Australian Navy, particularly as the Chief, Combat Support Group in Fleet Headquarters. Commodore Clinton William Thomas, , of Victoria. For exceptional service as Commanding Officer /Training Authority-Logistics, Director General Strategic Logistics, Director General Sea Change Implementation Team, and Chairman of the Royal Australian Navy Relief Trust Fund. Army Lieutenant Colonel Peter James Connor, of New South Wales. For exceptional service as Commanding Officer, 2nd/17th Battalion, Royal New South Wales Regiment and Rotation 12 of Combined Task Force 635, Operation Anode. Colonel Fergus Andrew McLachlan, of Australian Capital Territory. For exceptional service to the Australian Defence Force as the Commanding Officer of the 1st Armoured Regiment; Operations Officer on Headquarters Joint Task Force 633 during Operation Catalyst; Acting Director of Operations — Army; Director of Officer Career Management Army, and as the Commander Career Management Army. Lieutenant Colonel Paul Michael Nothard, , of New South Wales. For exceptional service as Staff Officer Grade One for Senior Officer Management in the Australian Army, Commanding Officer of the 1st Combat Service Support Battalion, and as the Commander of the Force Level Logistic Asset in the Middle East Area of Operations. Brigadier Malcolm Rerden, , of Victoria. For exceptional service as the Commander Joint Task Force 631 on Operation Astute. Brigadier Craig Douglas Williams, of New South Wales. For exceptional service to the Australian Army as Assistant Commander 2nd Division and as Commander 5th Brigade. Air Force Air Commodore John Stephen Hewitson, of Australian Capital Territory. For exceptional service to the Royal Australian Air Force, particularly in the fields of Maritime Surveillance Operations and Personnel Management. Group Captain Peter Frederick Norford, , United Kingdom. For exceptional service in the fields of Flying Training and Aviation Safety. Air Commodore Kym Osley, , of New South Wales. For exceptional service to the Royal Australian Air Force, particularly in the fields of Air Combat Operations and Capability Development. Medal (OAM) General Division Mr John Christopher Adams, of South Australia. For service to engineering, particularly through the standardisation of rail transport systems and executive roles with a range of professional organisations. Mr Dudley (Jim) Agnew, of New South Wales. For service to the community of the Clarence Valley, particularly through a range of healthcare organisations. Mr John MacDonald Allen, of Queensland. For service to community music, particularly through brass and concert bands, and as a mentor of young musicians. Councillor John Anderson, of New South Wales. For service to local government and to the community of Shoalhaven. Dr Robert Martin Anderson, of New South Wales. For service to medicine as a general practitioner, and to the community of the Narrabri district. Mr Giovanni Antonaglia, of Queensland. For service to the Italian community of Brisbane, particularly as a supporter of a range of charitable, social welfare, cultural and religious organisations. Dr Mary Maitland Atkinson, of New South Wales. For service to veterinary science, particularly through the Moruya Veterinary Hospital. Dr Peter Roderick Atkinson, of New South Wales. For service to veterinary science, particularly through the Moruya Veterinary Hospital. Mrs Valerie May Austin, of New South Wales. For service to the pharmacy profession, particularly as an initiator of programs to improve Indigenous health care. Mr Eric Arthur Ball, of Western Australia. For service to the community in the field of animal welfare, particularly through the Royal Society for the Prevention of Cruelty to Animals. Mr Henry Owen (Harry) Barker, of Queensland. For service to the community, particularly through Lions International and a range of ex-service organisations. Mr John Barry Beasley, of New South Wales. For service to the community, particularly through the surf lifesaving movement as an executive at state, regional and club level. Mr Mervyn John Bennett, of New South Wales. For service to equestrian sports as a competitor, coach and event coordinator. Mr Edgar Richard Bickford, of New South Wales. For service to the community of the Great Lakes District, particularly through graffiti removal programs, and as a mentor and supporter of young people. Dr Michael Wallace Birrell, of Victoria. For service to medicine as a general practitioner in the Point Lonsdale region. Ms Amanda Jane Boardman, of New South Wales. For service to the conservation of Australian fauna through rescue and rehabilitation of injured and distressed wildlife, and through community education programs. Mr Douglas James Boulton, of Queensland. For service to the surf lifesaving movement as a competitor, official and administrator, and to the community of Caloundra. Mr David Boyd, of New South Wales. For service to art as an innovator of design and techniques in pottery and ceramic sculpture, and as a painter. Mrs Rosemary Teresa Breen, of New South Wales. For service to the community, particularly to people with developmental disabilities, and to refugee and women's support organisations. Mrs Susi Brieger, of New South Wales. For service to education in the field of syllabus development and assessment, and to the Jewish community. Mrs Marianne Brockwell, of Western Australia. For service to the community as a supporter and fundraiser for a range of ex-service, charitable, health and motoring organisations. Mrs Carmel Dawn Brown, of New South Wales. For service to the communities of Murrumburrah and Harden, particularly through health and sporting organisations. Dr Grahame Brown, deceased, of Queensland. For service to dentistry as an educator in the speciality of endodontics and through the Royal Australian Army Dental Corps, and to gemmology. Mr Kevan Leslie Brown, of New South Wales. For service to the community of Deniliquin, particularly the welfare of ex-service personnel and their families. Mr Patrick Anthony Brown, of New South Wales. For service to the communities of Murrumburrah and Harden through a range of local government, sporting and health organisations. Mrs Helen Shiela Brustman, of Victoria. For service to the Jewish community, particularly through the Australia/Israel and Jewish Affairs Council. Dr Grace Jeannette Bryant, of New South Wales. For service to medicine as a Medical Officer to a range of sporting institutions and organisations and through administrative roles with professional associations. Mrs Adair Brice Bunnett, of Victoria. For service to the community, particularly through the preservation and promotion of local history and as a proponent of responsible urban development. Mrs Diane Margaret Burke, of Queensland. For service to the community particularly through the ANZAC Day Commemoration Committee of Queensland and to veterans' welfare programs as a fundraiser. Mr Keith Butterworth, Tasmania. For service to the community, particularly through the Australia Day Council of Tasmania, and as a supporter of a range of charitable organisations. Mr Paul Geoffrey Byrne, Tasmania. For service to the vocational education and training sector, particularly as a leader in reform initiatives and policy directions. The Reverend Father Brian Francis Byron, deceased, of New South Wales. For service to the Catholic Church through Our Lady of Peace Parish Gladesville and through a range of archdiocesan leadership roles. Mr John Michael Cannon, of Victoria. For service to the community, particularly through the St Vincent de Paul Society in Victoria. Dr Elizabeth Anne Carew-Reid, of Victoria. For service to medicine as a general practitioner, particularly through the provision of paediatric palliative care, and to the community. Mrs Shirley Olive Chandler, of New South Wales. For service to the community of Tamworth, as a supporter and organiser of a range of balls, concerts and débutante events. Mrs Elaine Chapman, of New South Wales. For service to the welfare of police officers and their families through the New South Wales Police Wives and Friends Support Group. Mr Reginald Stephen Chirgwin, of New South Wales. For service to the community of the Sutherland area, particularly through charitable and service groups. Miss Margaret Christensen, of Victoria. For service to the performing arts as a radio, stage, television and film actor, and to the community. Mr David Alexander Christie, of Victoria. For service to the community of Dromana, particularly through a range of cultural and service organisations. Mr Trevor Morton Clark, of Victoria. For service to the community, particularly through contributions to mental health research and reform. Mr Bruce Clarke, of Victoria. For service to the arts as a jazz guitarist and teacher. Mr Murray Alan Clarke, of New South Wales. For service to rowing, particularly as a coach and administrator, and to the community. Mr Alan Clive Cochrane, of Queensland. For service to the preservation of the marine environment. The Reverend Michael Edward Cockayne, of New South Wales. For service to the community of Queanbeyan, particularly through social welfare programs, and to the Anglican Church of Australia. Mr Ken Cohalan, of Northern Territory. For service to the business sector, particularly through the Northern Territory Chamber of Commerce. Mrs Ida Lena Collard, of New South Wales. For service to the community, particularly through leadership roles in women's organisations in the Port Stephens area. Mr Brian Michael Considine, of Victoria. For service to the community of Bendigo, particularly through the pipe band movement as a player and administrator, and to the Catholic Church. Mrs Beverley Josephine Cook, of Victoria. For service to the community of Gippsland East through a range of educational, health, sporting and church organisations, and to music. Mrs Jean Meryl Cook, of Victoria. For service to the community of Doncaster, particularly through social welfare organisations. Dr Peter Robert Cooke, of New South Wales. For service to the performing arts through theatrical design education, research and administration. Mr Paul Arthur Copeland, of Victoria. For service to veterans, particularly through the Australian Peacekeeper and Peacemaker Veterans' Association. Mr Barry Neil Couzner, of South Australia. For service to volleyball as an administrator and educator, and to the community. Colonel Arthur Reginald Craig (Retd), of Australian Capital Territory. For service to veterans and their families, particularly through the Australian Capital Territory Branch of the Returned and Services League of Australia. Sister Monica Josephine Crawford, of Queensland. For service to the community through the establishment and development of the Mater Health Services Archives, and to health care as an administrator and a nurse. Mr Keith Thomas Crellin, of South Australia. For service to classical music and musicians through artistic leadership, as an educator and mentor, and as a musician. Mr James Nicholas Crethar, of New South Wales. For service to the community of Lismore through a range of youth, service and progress organisations. Ms Kerry Anne Crowley, of New South Wales. For service to contemporary art in Australia, particularly through fostering the work of emerging artists in Australia and internationally. Mrs Gloria Jean Curtis, of South Australia. For service to the community through St John Ambulance Australia, particularly through cadet leadership and training roles. Mrs Gloria May Davey, of Queensland. For service to the community of Wynnun through service, music and sporting organisations. Mr Keith William Davidson, of Victoria. For service to youth through the Scouting movement. Mr Hilton Stanley Davis, of New South Wales. For service to the community of Blayney, particularly through retirement and aged care organisations. Mr John Ernest Davis, of New South Wales. For service to the community through fundraising activities to benefit the St Vincent's Hospital Heart and Lung Transplant program. Mr Raymond Kyrle Deane, of South Australia. For service to ex-service personnel and their families in South Australia through a range of roles with the RAAF Association. Mrs Elsie May Denney, of Victoria. For service to the community, particularly through service clubs and organisations relating to youth. Mr Allan John Devereaux, of Western Australia. For service to the community, particularly through the National Association of Extremely Disabled War Veterans. Mr Donovan John Ditter, of New South Wales. For service to the Australian wine industry, particularly as Chief Winemaker at Penfolds Wines. Mr David John Doherty, of Victoria. For service to logistics through contributions to the transport and supply chain industry, to the promotion and development of sector-wide best practice, and to Australian Rules football. Sister Enid Eliza Doherty, of New South Wales. For service to the community, particularly through the activities of the Sisters of Charity Outreach program. Mr John Francis (Jack) Dowd, deceased, of South Australia. For service to the community of Loxton, particularly to the welfare of veterans and their families. Mrs Doreen Florence Dunwoodie, deceased, of New South Wales. For service to the community of the South Coast, particularly through Lifeline. Dr Eric Mitchell (Tim) Ealey, of Victoria. For service to conservation and the environment. Dr Carl Wilfrid Edmonds, of New South Wales. For service to subaquatic and hyperbaric medicine as a practitioner, researcher and educator, and to the advancement of diving safety. Professor James Murray Ellis, of Western Australia. For service to the promotion of the information technology industry, particularly in Western Australia, and to the expansion of professional development and training opportunities. Mr Andrew Austin Embling, of Victoria. For service to the community of Alexandra and district through tourism initiatives and fundraising. Mr John Blair England, of South Australia. For service to the welfare of veterans and their families, particularly through The Royal Australian Regiment Association. Mr Giancarlo (John) Faustini, of Victoria. For service to the community of Ballarat, particularly through the Eureka Stockade Memorial Association and the Ballarat Italian Club. Mrs Gay Fetherstonhaugh, of Queensland. For service to the community of Queensland, particularly through the Country Women's Association and agricultural and horticultural societies. Mr Kenneth George Fewster, of Victoria. For service to cricket in Victoria. Dr Kenneth Ray Fielke, of South Australia. For service to the communities of rural and remote South Australia through the delivery of mental health services and programs, and contributions to professional organisations. Mr Stephen William Finney, of New South Wales. For service to veterans through a range of ex-service organisations in the Newcastle and Hunter region. Mr Reginald Harold Fitzpatrick, of Queensland. For service to the communities of Rockhampton and Yeppoon through health education, aged care welfare and the encouragement of photographic achievement. Mr Walter Douglas Flynn, of New South Wales. For service to the community of Dubbo through the airline industry, the Northcott Society and a range of business, sporting and service organisations. Mr Lawrence Edmund Fraser, , of Western Australia. For service to veterans and their families, and to the Freemasonry movement. Mrs Mira Vivien Freshwater, of Victoria. For service to conservation, particularly through the identification and control of weeds in Sherbrooke Forest. Mr John Leonard Fry, of New South Wales. For service to the community through church organisations and social justice initiatives to assist prisoners and detainees. Mr Brian Joseph Gainsford, of New South Wales. For service to cricket in New South Wales through administrative roles at state, regional and local levels. Mr Lucio Galletto, of New South Wales. For service to the community through contributions as a restaurateur and author, and to the support of arts organisations. Mrs Rosemary Helen Gentle, of New South Wales. For service to education, particularly through the Rudolf Steiner schools. Dr Sydney Dennis Giddy, of Victoria. For service to medicine as an anaesthetist, and to the community of Ballarat. Councillor Beverley Giegerl, of New South Wales. For service to local government and to the community, particularly through the provision of library services. Mr Anthony Kenward Gifford, of New South Wales. For service to sport, particularly as the founder of the Australian Schools' Cricket Council, and to the community. Mrs Dulcie Juanita Giles, of New South Wales. For service to the community of Newcastle through ex-service organisations. Mrs Robyn Hope Ginn, of Queensland. For service to the arts of quiltmaking and needlecraft. Mr Alan Roy Gloyn, deceased, of South Australia. For service to the community of Whyalla through a range of community, service and sporting organisations. Mr Theofilos Gomatos, of Northern Territory. For service to the Greek community of the Northern Territory. Mr Clifford Scantlebury Grant, of New South Wales. For service to the arts, particularly as an opera singer. Mr Neville John Gray, of South Australia. For service to the community through the promotion of motorcycle road safety. Mrs Claire Guinness, deceased, of Western Australia. For service to the community through a range of organisations that contribute to the development and promotion of the Dunsborough area. Mr Vincent John Habermann, of Queensland. For service to sport, particularly cricket, and to the community of Bundaberg. Mrs Michelle Lucelle Hanton, of Northern Territory. For service to women's health, particularly as the founder of Dragons Abreast Australia. Mr Robert John Harding, of Victoria. For service to the merino sheep industry, and to the community of Nhill. Mr Ronald Charles Harrington, of Victoria. For service to the community of Ballarat, particularly through the Royal South Street Society. Mrs Diana Jean Harris, of South Australia. For service to education in the field of music. Mr Tressler Nixon (Mick) Harvey, of New South Wales. For service to the conservation of native flora, to education and to the community. Mr Michael Stewart Hatton, of New South Wales. For service to the tourism industry, particularly through the Australian Federation of Travel Agents. Mr Denis John Hawkins, of New South Wales. For service to the community, particularly through the provision of aged care. Mr Edward George Headland, of Western Australia. For service to the community of Moora and Midlands through a range of Indigenous, ex-service, sporting and community organisations. Mrs Elizabeth Joy Heagney, of Victoria. For service to the community through the Australian Ex-Prisoners of War Memorial. Mr James Bruce Henry, of Victoria. For service to education in the field of mathematics as an educator and through contributions to enrichment programs for students and professional development. Mrs Margaret Rose Hickey, of Queensland. For service to the community, particularly through roles with the Samford District Historical Museum. Mr Kenneth Frederick Hince, of Victoria. For service to the arts as a music critic, collector and historian, and to the antiquarian book trade. Mr William Ross Hine, of Tasmania. For service to local government and to the community of Circular Head through regional development and emergency service organisations. Ms Barbara Mary Hocking, of Victoria. For service to the community through advocacy and public awareness programs in the field of mental health. Mrs Lois Mary Hoeper, of South Australia. For service to the community through the National Council of Women and a range of service and church organisations. Mrs Norma Grace Holder, of New South Wales. For service to the community, particularly through the Country Women's Association of New South Wales. Mrs Mary Byron Holdsworth, of Victoria. For service to the community, particularly through the Altona Community Choir. Mr Donald Edmond Hopkins, of New South Wales. For service to horseracing in New South Wales through executive roles in industry organisations, and to the community of Taree. Ms Marion Rosslyn Hosking, of New South Wales. For service to people affected by domestic violence in the Manning district through accommodation and public awareness programs. Venerable Adrienne Lois Howley, of New South Wales. For service to the community of Maitland, particularly as a volunteer in the areas of palliative care and vision impairment. Mr Max Hutchinson, of Tasmania. For service to the community of Burnie through social welfare, agricultural, service and business organisations. Mr John Iori, of New South Wales. For service to the egg industry through roles in industry regulatory bodies, and to the community of Rouse Hill. Mr John Jackson, of New South Wales. For service to the optical dispensing industry, particularly through the development of education and training programs, and through leadership roles in professional organisations. Associate Professor Norman McIlrath James, of South Australia. For service to medicine in the discipline of psychiatry through the development and delivery of mental health services, to professional organisations, and to the community. Mr Kenneth Edward Jarvis, of Victoria. For service to the community of Geelong through a range of roles with local government, education, health and business organisations. Mr Noel Jennings, of Victoria. For service to badminton through administrative roles and as a coach and umpire. Mrs Mary Johnston, of New South Wales. For service to the community of the Illawarra, particularly through the William Beach Day Club. Dr Olive Johnston, of South Australia. For service to medicine, particularly in the area of maternal and child health, and to the community through Soroptimist International. Mrs Maureen Doris Jones, of South Australia. For service to the community of Gladstone through a range of sporting organisations, particularly the Rocky River Softball Club, and to youth through the Scouting movement. Mr Peter Francis Jones, of Western Australia. For service to music in Western Australia through the pipe band movement. Mr Errol Norman Jorgensen, , of Queensland. For service to veterans through the preservation of military history and support of ex-service organisations, and to the community of Toowoomba. Mr Murray Robert Juers, of South Australia. For service to the community through leadership roles in a range of aged care organisations. Mrs Gillian Kelly, of New South Wales. For service to the community in the area of social and local history and genealogical research through the Australian Society of the Lacemakers of Calais. Mr Ivan Bruce Kelly, of Tasmania. For service to the forest industries of Tasmania, particularly through the representation of country sawmillers, and to the community of Dunalley. Mr Philip Charles Kelly, of Victoria. For service to the shipping industry through executive roles with a range of transport and business organisations, and to the preservation of Australia's maritime history. Mr Saidley Peter Kelly, of New South Wales. For service to community of the Hawkesbury region through support and fundraising for a range of charitable organisations. Mr James Lawrence Kemsley, deceased, of New South Wales. For service to the community as a cartoonist and illustrator of the "Ginger Meggs" comic strip, through local government roles, and through the Bradman Foundation. Mr Percival John Keppie, of Queensland. For service to swimming through a range of executive, technical and managerial roles. Mrs Robyn Elizabeth Kerr, of New South Wales. For service to the Liberal Party of Australia through executive, administrative and fundraising roles. Ms Joanna Marie Knott, of New South Wales. For service to the community through leadership roles in organisations supporting research into the treatment of spinal cord injury and other conditions. Ms Maha Krayem Abdo, of New South Wales. For service to the Muslim community in Western Sydney, particularly in the areas of Muslim women's leadership training, social justice and interfaith dialogue. Mr Ronald George Laird, of Victoria. For service to cricket through the Bentleigh and St Kilda Cricket Clubs, and through executive roles with regional and state cricket associations. Mrs Beverley Ann Lamotte, of Western Australia. For service to youth through the Guide movement, and to the community through the National Council of Women of Western Australia. Mr Francis Henry (Frank) Lampard, of South Australia. For service to the Indigenous community through public sector roles, particularly in the field of education, and as a contributor to social welfare policy development. Mr Richard Hamilton Lane, deceased, of New South Wales. For service to the arts as the author of screenplays, radio and television scripts, and histories of Australian radio drama. Mr Andrew Gabor Lang, of New South Wales. For service to the law, particularly in the field of property and conveyancing law, as an author and educator, and to the community. Mr David Stanley Lawry, of South Australia. For service to arboriculture and the environment, particularly through research and support for sustainable plantings in the urban landscape, and to the community through the Avenues of Honour project. Mr Allan Andrew Lawson, of South Australia. For service to youth, particularly through fundraising for programs supporting young people at risk, and to education. Mr Raymond Charles Lee, of New South Wales. For service to education and to the community through The Scots College Pipes and Drums. Mr Terence Henry Legge, of New South Wales. For service to the community of Yass, particularly in the areas of health and aged care. Mr Edward McGregor Lennie, of Western Australia. For service to football as a referee. Mr Michael Andrew Lewis, of New South Wales. For service to the performing arts as an operatic baritone, to the education and mentoring of young singers, and to the community. Mr Richard Frederick Lornie, of New South Wales. For service to education, particularly as the Headmaster of Central Coast Grammar School and through administrative roles in the independent school sector. Mr Andrew Brantley Lu, of Australian Capital Territory. For service to the arts through a range of administrative roles, and to the community. Mr James Humphrey Lucey, of Queensland. For service to education through leadership, teaching and rugby coaching roles. Mr Christopher John Lusted, of Tasmania. For service to the community of Ulverstone through music. Ms Wilma Christine McBain, of Western Australia. For service to the community through the care and support of children requiring craniofacial plastic and reconstructive surgery. Coordinator of the Cleft Lip and Palate Service, since 1988 and the Cranio-Maxillo-Facial Unit, since 1993. Mr Ian George McClelland, of Victoria. For service to agriculture, particularly through the development of sustainable crop production systems, and innovative farming and land management practices. Mrs Beverley Ruth McClymont, of New South Wales. For service to the preservation and promotion of local history through a range of roles with historical societies. Mr Alan Alexander McCray, of Queensland. For service to the community, particularly with Rotary International, and to business through a range of roles with export, freight and food manufacturing organisations. Mrs Patricia Anita McDougall, of New South Wales. For service to nursing, particularly in the area of trauma and injury management, to nurse education, and to professional organisations. Mrs Denise Frances McGill, of Victoria. For service to the community through local government and the Parliament of Victoria. Mrs Sandra Mary McGrady, of Queensland. For service to the community of Mount Isa through charitable, service and cultural organisations. Dr John Joseph McGuinness, , of New South Wales. For service to medicine in the field of anaesthesia, to medical education, and through the provision of humanitarian assistance to communities in the Asia-Pacific region. Mrs Enid Jean McIlraith, of New South Wales. For service to the Indigenous community of the Manly, Warringah and Pittwater regions through the promotion of reconciliation. Colonel Kenneth Stuart McKenzie, (Retd), of Queensland. For service to the welfare of ex-service personnel and their families through roles with the Returned and Services League of Australia. Mrs Elizabeth May McKerlie, of Victoria. For service to young people, particularly through the Scouting movement, and to the community of Bendigo. Mr George McLelland, of New South Wales. For service to the community through health, service, civic and sporting organisations. Ms Evol Gayle McLeod, of Australian Capital Territory. For service to the arts as an administrator and advocate, and to the community of Canberra. Mr Tom Walker McLucas, , of Queensland. For service to the community of Bundaberg, particularly through the Returned and Services League of Australia, and to the sport of cycling. Ms Janne Christine McMahon, of South Australia. For service to the community in the area of mental health advocacy, particularly for private mental health consumers and carers. Mr John Terrence McMahon, of New South Wales. For service to cricket in New South Wales, particularly through administrative and coaching roles. Mr Aubrey Francis (Frank) McPherson, of Northern Territory. For service to Rugby League football in the Northern Territory. Mr Carey Howard McQuillan, deceased, of New South Wales. For service to ex-service personnel and their families through a range of veterans' groups and activities. Mr Peter John McWilliam, of New South Wales. For service to the community through a range of roles with organisations that support people with Parkinson's disease and their families. Mr John Richard Mace, of New South Wales. For service to the community of Lismore through the New South Wales Rural Fire Service and the Lismore Uniting Church. Mr Kenneth Mackay, of New South Wales. For service to the community of Nowra, particularly through the Nowra Town Band. Dr Patricia Mackay, of Victoria. For service to medicine in the field of clinical anaesthesia, particularly as a contributor to the improvement of quality and safety of patient care, and to the community. Mr Phillip Falk Maisel, of Victoria. For service to the community through the Jewish Holocaust Museum and Research Centre. Ms Margaret Ann Maloney, of South Australia. For service to international humanitarian aid through the provision of volunteer nursing services in developing countries. Mr Laurence William Marchant, of New South Wales. For service to the community of Grafton through a range of financial, medical and educational organisations. The Reverend Barry John May, of Western Australia. For service to the community, particularly through chaplaincy roles with the Western Australia Police Service and veterans' organisations. Mrs Charlene Stuart Meade, of New South Wales. For service to people with a disability, particularly through rehabilitation and support services. Mr Kryn Jan Meerman, of Tasmania. For service to the community, particularly through a range of roles in the health sector. Mr Kevin Alexander Meyer, of New South Wales. For service to the community through a range of roles in welfare, charitable, sporting and service organisations, and to the banking industry. Mr Gordon Stewart Millar, of Tasmania. For service to the community of the Longford area through a range of roles with sporting, civic, church and local government organisations. Mrs Avis Jean Miller, of South Australia. For service to education, particularly as a supporter of information technology studies and through roles with professional associations, and to the community of Port Elliot. Mr John Victor Miller, of New South Wales. For service to World War II veterans, particularly though the recognition of under-age servicemen. Mr John Alexander Millroy, of Queensland. For service to the horseracing industry, to tourism, and to the community. Ms Nancy Jane Milne, of New South Wales. For service to the legal sector, particularly as an insurance lawyer, and to the community. Ms Valerie Anne Milne, of Western Australia. For service to the community of Albany, particularly through the preservation of local history and heritage. Mr David Charles Minnis, of Victoria. For service to primary industry, particularly to the horticultural sector, as a contributor to national policy development and through the promotion of Australian exports. Mrs Dianne Margaret Mitchell, of Australian Capital Territory. For service to the Australian War Memorial and to the community through the Voluntary Guides programme. Mr Noel Paul Mitchell, of New South Wales. For service to the community of Cessnock, particularly through health care organisations. Mrs Susan Kathrine Mitchell, deceased, of New South Wales. For service to the community, particularly through a range of roles with organisations in the farming, regional development and health sectors. Mrs Barbara Annette Morgan, of Victoria. For service to the community through a range of lifesaving organisations. Associate Professor David Allan Morgan, of Queensland. For service to medicine as an orthopaedic surgeon, particularly through the establishment of the Queensland Bone Bank. Mr Michael David Morton-Evans, of New South Wales. For service to the community, particularly through a range of roles with organisations that support young people and those with a disability, and to local government. Mr Alfred George (Alf) Moufarrige, of New South Wales. For service to business and to the community, particularly through support for cancer research and a range of charitable organisations. Ms Judith Ann Munday, of Queensland. For service to the welfare of ex-servicewomen, and to the community. Mr Russell Alexander Murray, of New South Wales. For service to the community of Sussex Inlet, particularly through aged care and service organisations. Mr Franklyn William Nankervis, deceased, of Victoria. For service to the communities of Hurstbridge and Arthurs Creek through a range of veterans' welfare, municipal and service organisations. Mr Steven Peter Nemes, of New South Wales. For service to the community, particularly through Mount Sinai College and as a supporter of diabetes research. The Reverend Canon Brian Charles Newing, of Western Australia. For service to the Anglican Church in Western Australia, and to the community of Bunbury through roles with a range of aged care, educational and social welfare organisations. Mr Ben Buntha Nhem, of New South Wales. For service to the Cambodian community in New South Wales and to the Cambodian International Network for Peace and Reconciliation. Mr Maxwell Alan Nixon, deceased, of New South Wales. For service to the community, particularly through roles with Lions Clubs International Australia. Mr Terence John Noonan, of Western Australia. For service to agriculture, particularly through the Western Australian Farmers Federation, and to the community of Katanning. Ms Susan Anne Norrie, of Queensland. For service to the nursing profession, and to the community through a range of leadership and advisory roles. Mrs Susan O'Connor, of New South Wales. For service to the community as a foster parent and through training and support services for foster carers in New South Wales. Mrs Pearl Margaret Ogden, of Northern Territory. For service to the community in the Northern Territory, particularly as an historian and author, and through heritage conservation roles. Mr Stephen Gordon O'Grady, of New South Wales. For service to athletes with intellectual disabilities through the New South Wales Branch of the Law Enforcement Torch Run Committee for the Special Olympics. Mrs Jean Lydia Oldham, of Western Australia. For service to the community, particularly through Zonta International and the Royal Perth Hospital. Mr Richard Kenneth Osborne, of New South Wales. For service to the community through the Australian Volunteer Coast Guard Association and Rural Fire Services. Mrs Anne-Louise Oystragh, of New South Wales. For service to the Jewish community through a range of roles with the Central Synagogue. Mr Colin Duncan Pace, of Queensland. For service to the community of the Rollingstone district, and through leadership in the pineapple growing industry. Mr James Lawrence Paterson, of New South Wales. For service to skiing as a Paralympics and Disabled World Cup Ski Championships medallist. Mrs Marie Patterson, of New South Wales. For service to the community through the Australasian Charge Syndrome Association. Mr Kenneth Peters, of Queensland. For services to the community, particularly through the Lions Club of Mooloolaba and the Maroochydore Branch of The Cancer Council, Queensland. Mr Richard Isaac Pilpel, of Western Australia. For service to the printing industry in Western Australia, and to the Jewish community. Mr David Alexander Piper, of New South Wales. For service to the community, particularly through surf lifesaving in New South Wales, and through support for rehabilitation services and wheelchair sports. Mr David Evan Pitt, of New South Wales. For service to the community of Newport, particularly through Rugby Union football, and as a contributor to the newsagency industry in New South Wales. Mr Lawrence James (Laurie) Prandolini, of New South Wales. For service to marine engineering, particularly through executive roles in professional organisations. Mr Max Pringle, of New South Wales. For service to the community of Narrabri through a range of agricultural, aged care, historical and social welfare organisations. Mr Ronald Samuel Raab, of Victoria. For service to the community through roles with diabetes care organisations, particularly through the development of humanitarian programs with Insulin for Life Australia. Mr John David Radcliffe, of Tasmania. For service to the communities of Moonah and Glenorchy through volunteer work with a range of organisations. Ms Pamela Apolonia Rajkowski, of South Australia. For service to the community through research into the history of the Afghan and Aboriginal cameleers in Australia. Dr John Philip Rasmussen, of New South Wales. For service to heritage conservation, particularly through the New South Wales Branch of the National Trust of Australia, and to the arts. Dr Richard Rawson, of New South Wales. For service to the community as an ophthalmologist, to Indigenous health, and through humanitarian aid in developing countries. Dr Con Scott Reed, of New South Wales. For service to medicine in the areas of oncology and haematology as a clinician, researcher and executive member of professional associations. Mrs Anne Lloyd Rees, of New South Wales. For service to women, particularly through the Country Women's Association, and to the community of Cootamundra. Mrs Robyn Margaret Richards, of New South Wales. For service to people with vision impairment through Retina Australia. Mrs Caroline McPherson Richardson, of Victoria. For service to community health through the Australian Red Cross Victoria. Mr Bruce Norman Robertson, of New South Wales. For service to the community, particularly through the Keep Australia Beautiful Program. Ms Jeanette Margaret Robertson, of Western Australia. For service to nursing and to the community through athletics, the Perth Zoo Docent Association and other voluntary roles. Mrs Margaret Ruth Rogers, of New South Wales. For service to the community, particularly through voluntary work with the Taree and District Eisteddfod Society. Mr Luciano (Charlie) Rossetti, of Victoria. For service to aged care, to local government, and to the community of Pakenham. Mrs Maureen Agnes Rudge, of Tasmania. For service to occupational therapy and vocational rehabilitation in Tasmania, and to the community in a range of voluntary roles. Mrs Dianne Maria Sackelariou, of New South Wales. For service to the community through support and fundraising for a range of charitable organisations, and to mental health nursing. Mr Victor Sahade, of New South Wales. For service to the Lebanese community, particularly through the Maronite Church. Professor Philip Neil Sambrook, of New South Wales. For service to medicine, particularly as a researcher and clinician in the fields of rheumatology and osteoporosis. Ms Carolyn Jean Santagiuliana, of Queensland. For service to the community of Redland Shire through a range of welfare, health, sporting and cultural organisations. Miss Lavinus Monica Schneider, of South Australia. For service to nursing in South Australia and to health care in developing countries. Mr Geoffrey Edwin Secker, of Victoria. For service to the community, particularly through the Portsea Camp, Apex Australia and Lions International. Mr Desmond John Seymour, of Western Australia. For service to the community of Miling, particularly through a range of agricultural, local government, sporting and civic organisations, and to Australian Rules Football in Western Australia. Mr Ronald Charles Shattock, of South Australia. For service to the national caravan park industry and tourism in South Australia, particularly through the West Beach Trust. Mr Stuart Anthony Silbert, of Western Australia. For service to the Jewish community through a range of aged care, commercial, educational and charitable organisations. Mr Philip John Sketchley, of New South Wales. For service to the community of Newcastle and the Hunter Valley area through music as a performer, director, fundraiser and teacher. Mr Geoffrey Albert Smith, of New South Wales. For service to the community, particularly through the Bathurst District Historical Society and the Bathurst Show Society. Mrs Katherine Anne Smith, of New South Wales. For service to the community through fostering peaceful conflict resolution and the promotion of interfaith understanding. Mr Malcolm Richard Smith, of New South Wales. For service to the community through fostering peaceful conflict resolution and the promotion of interfaith understanding. Mr Paul Stuart Snell, of New South Wales. For service to the community of Coogee, particularly ex-service personnel and their families, and as a fundraiser. Mrs Joan Edith Spence, of Victoria. For service to the welfare of veterans and their families, particularly through the Noble Park Women's Auxiliary of the Returned and Services League of Australia. Mr Arthur Roland Squire, of Queensland. For service to the community of Chinchilla, particularly in the area of aged care. Mr Kevin Harold Stanford, of New South Wales. For service to the surf lifesaving movement as a competitor, coach and administrator at local, state and national levels. Dr Alan Wesley Stephens, of Australian Capital Territory. For service as an historian of the Royal Australian Air Force and a contributor to the development of air power strategy and doctrine. Mr Henry Ludwell (Harry) Stephenson, of New South Wales. For services to the community of the Central Coast through a range of organisations, particularly the Terrigal Senior Citizens' Association. Mr Richard Andrew Stevens, of Queensland. For service to the fishing industry, particularly through fisheries management. Mr Daniel Malcolm Stewart, of New South Wales. For service to the community, particularly through the Meniere's Research Fund and Merniere's Support Group of New South Wales. The Reverend Neville Thornley Stewart, of South Australia. For service to the community of north and west Adelaide, particularly through social welfare roles within the Uniting Church in Australia. Mrs Tracy Anne Stockwell, of Queensland. For service to sport as an administrator and proponent of sporting opportunities for women. Mr Richard Alvin Stubbs, of Victoria. For service to people with severely impaired mobility in the Mornington Peninsula area through the establishment of the Beyond Disability interactive communication program. Mr Thomas Raymond Sullivan, of Queensland. For service to local government and to the community of the Goondiwindi Shire. Mrs Verlie June Sullivan, of New South Wales. For service to people with Parkinson's disease and their carers, particularly in the Newcastle and Hunter Valley area. Mrs Shirley Gladys Swan, of Victoria. For service to swimming as an instructor, coach and mentor, and to the community of Swan Hill. The Reverend Dr Robin Taylor, of Western Australia. For service to the community as a chaplain, pastoral care coordinator and counsellor in Perth and the south-west region of Western Australia. Venerable Phuoc Tan Thich, of Victoria. For service to the Buddhist and Vietnamese communities in Victoria, and through support for a range of charitable organisations. Mr David George Thomas, of Queensland. For service to youth through the Scouting movement, the Duke of Edinburgh's Awards scheme and organisations that support young people with a disability. Professor Robert J. S. Thomas, of Victoria. For service to medicine through surgical oncology and cancer services in Victoria. Mr Donald Thomas Thompson, of Victoria. For service to the community of Rochester through a range of community organisations and activities. Mr John Ellis Thornton, of New South Wales. For service to the community of Finley, particularly through service and sporting organisations. Dr Ross Maxwell Toll, of New South Wales. For service to the community through fundraising and executive roles with the Children's Cancer Institute of Australia. Miss Shirley Treacy, of Queensland. For service to dance, particularly through the establishment of the Queensland Dance School of Excellence, and as an examiner and teacher. Mr Bruce Raymond Trewartha, of Australian Capital Territory. For service to youth, particularly through the Tuggeranong Valley Cricket Club and Scouts Australia. Mrs Dorothy Mae Truscott, of Queensland. For service to the community through the Bundaberg Blind and Vision Impaired Persons' Friendship Club and fundraising for organisations supporting children with a hearing impairment. Mr Robert Henry Truscott, of Queensland. For service to the community through the Bundaberg Steam Tramway Preservation Society and fundraising for organisations supporting children with a hearing impairment. Dr Warwick John Vaughan, of New South Wales. For service to education through the Primary English Teaching Association, contributions to curriculum development and public administration. Mr Ian Baker Wall, of South Australia. For service to business, particularly through the design and manufacture of electronic communication equipment, and to the community through philanthropic activities. Ms Sally Louise Waterford, of New South Wales. For service to the community of the Southern Highlands of New South Wales through roles with a range of social welfare organisations. Mrs Daphne Isobel Wells, of Australian Capital Territory. For service to senior citizens in the Canberra community, particularly through the coordination of social activities. Professor David Lawrence Wells, of Victoria. For service to forensic medicine and to the development of educational and training programs. Mr William Leslie (Les) Wells, of Australian Capital Territory. For service to senior citizens in the Canberra community, particularly through the coordination of social activities. Mr Raymond Douglass Wheatley, of New South Wales. For service to boxing as an administrator, judge and referee, and through contributions to publications. Ms Anne-Marie White, of Queensland. For service to the promotion of women's sport, particularly through journalism and advisory roles. Mr Peter John White, of Queensland. For service to the community through contributions to veterans, youth and civic organisations, and to the foundation construction industry. Mrs Margaret Aitken Wilke, of Queensland. For service to women through the Queensland Country Women's Association. Mr Geoffrey Line (Geoff) Wilkinson, of Victoria. For service to the community through the introduction and establishment of crime prevention initiatives, particularly the Crime Stoppers program. Mr Peter Wilkinson, of Western Australia. For service to the automotive industry, particularly through the development of accredited motor body repair training and apprenticeship schemes. The Reverend Dr Raymond Keith Williamson, of New South Wales. For service to the promotion of ecumenism and to community welfare, particularly through collaborative projects with the government to establish affordable housing. Dr Neville Beaumont Wilmer, of Queensland. For service to medicine and to the community of Gympie, particularly through the development of medical services and the Returned and Services League of Australia. Mr Darrell Albert Wilson, of Tasmania. For service to the community of Wynyard through a range of community organisations. Mr Graham John Wilson, of New South Wales. For service to the community of Armidale through roles in heritage organisations. Ms Coralie Faye Wood, of Australian Capital Territory. For service to the entertainment industry in the Australian Capital Territory. Mr Ian John Woodcock, of New South Wales. For service to the community of Lightning Ridge, particularly through aged care, local government and sporting organisations. Lieutenant Colonel Douglas Morris Wyatt, (Retd), of Tasmania. For service to the community, particularly through the preservation of Tasmanian military history, and executive roles in a range of defence reserve organisations. Military Division Navy Lieutenant Sean Lyle Feenan, of Western Australia. For meritorious service in engineering postings in the Royal Australian Navy, particularly during seagoing appointments in HMA Ships and . Chief Petty Officer Robert Mark Glover, of New South Wales. For meritorious service as a Chief Petty Officer Electronic Technician in the Royal Australian Navy. Lieutenant Gerrard Leslie Hoctor, of Victoria. For meritorious service to the Royal Australian Navy in the field of Communications and Information Systems. Army Warrant Officer Class One Allan John Beatty, of Victoria. For meritorious service in the performance of duty as the Regimental Sergeant Major of 5th Brigade Administrative Support Battalion, 3rd Combat Service Support Battalion and Army Logistic Training Centre. Warrant Officer Class One Kenneth John Bullman, of New South Wales. For meritorious service as the Platoon Sergeant Major of 13 Military Police Platoon, Company Sergeant Major of the 1st Military Police Company, and the Regimental Sergeant Major of the 1st Military Police Battalion. Warrant Officer Class One David Charles Cross, of Queensland. For meritorious service to Army Aviation as Regimental Sergeant Major, 5th Aviation Regiment, and Regimental Sergeant Major, Army Aviation Training Centre. Warrant Officer Class One Lynne Foster, of Queensland. For meritorious service as the Transport Warrant Officer Class One of the Headquarters 3rd Brigade, the Regimental Sergeant Major of the 9th Force Support Battalion, and the inaugural Regimental Sergeant Major of the Force Level Logistic Asset – Middle East Area of Operations. Warrant Officer Class One Kenneth Charles Morris, of Queensland. For meritorious service as the Regimental Sergeant Major of 4th Battalion, The Royal Australian Regiment (Commando) and the Special Forces Training Centre. Warrant Officer Class One Stanley Francis Paulson, of New South Wales. For meritorious service as a Regimental Sergeant Major in the Australian Regular Army and the Army Reserve. Warrant Officer Class One Robert James Thompson, of Victoria. For meritorious service as the Regimental Sergeant Major of 7th Field Regiment, Royal Regiment of Australian Artillery, 4th Field Regiment, Royal Regiment of Australian Artillery, and Career Manager Royal Regiment of Australian Artillery. Air Force Warrant Officer Anthony James McDermott, of Australian Capital Territory. For meritorious service as Warrant Officer Engineering at Number 75 Squadron and Number 79 Squadron, and as Maintenance Training Manager within the New Air Combat Capability Integrated Project Team. Flight Lieutenant David Warren Slattery, , of Australian Capital Territory. For meritorious service as the Warrant Officer-in-Charge of Number 278 Squadron, and as Warrant Officer Engineering at Number 76 Squadron. Public Service Medal (PSM) Australian Public Service Mr John Forrest Boersig, of Australian Capital Territory. For outstanding public service in the delivery of law and justice services to Indigenous Australians. Ms Adele Michelle Byrne, of Victoria. For outstanding public service in the establishment and administration of the Federal Magistrates Court of Australia. Dr Teresa Yuk Ching, of New South Wales. For outstanding public service in the field of audiology as a researcher, clinician, innovator and professional. Mr Mark John deWeerd, of New South Wales. For outstanding public service in implementing the Council of Australian Governments' Whole of Government Indigenous Trial in the Murdi Paaki region. Ms Mary Frances Durkin, of Australian Capital Territory. For outstanding public service in developing the Immigration Ombudsman function and improving the integrity of the immigration detention program. Ms Andrea Louise Flanagan, of Queensland. For outstanding public service in the provision of advice and assistance to veterans and their families, particularly in instances of death or major injury to members of the Australian Defence Force. Miss Stephanie Claire Foster, of New South Wales. For outstanding public service in the provision of high level policy advice to government in relation to the deployment of Australian military personnel on overseas operations. Ms Merrie Elizabeth Hennessy, of Australian Capital Territory. For outstanding public service in the development and implementation of superannuation regulation and legislation. Mr Andrew Ronald Lesbirel, of Australian Capital Territory. For outstanding public service in the development of new technical solutions to improve online service delivery in Centrelink. Mr Damian Francis Miley, of Queensland. For outstanding public service in managing projects under the Land and Sea Management Strategy for Torres Strait. Mr William Peel, of Australian Capital Territory. For outstanding public service to the Australian business community, particularly through his leadership of AusIndustry. Ms Sally Michelle Riley, of New South Wales. For outstanding public service in the development of initiatives that have increased the participation of Indigenous Australians in the film and television industries. Mr Trevor Michael Sutton, of Australian Capital Territory. For outstanding public service in managing the Child Support Agency's reform agenda, "Building a Better CSA". Mr Steven John Swift, of Australian Capital Territory. For outstanding public service in the regulation and promotion of aircraft structural safety. Mr John Leslie Williams, of Victoria. For outstanding public service in the successful settlement and participation of both established and emerging migrant communities in Australia. New South Wales Public Service Ms Tarryn Kay Bracken, of New South Wales. For outstanding public service in the delivery of speech pathology services in the Illawarra region. Deputy Superintendent Gordon James Casey, of New South Wales. For outstanding public service in the delivery of correctional services, particularly at the Long Bay Complex of Prisons. Mr Benjamin Paul Chard, of New South Wales. For outstanding public service, particularly in the Hunter region. Mrs Beverley Ann Creagh, of New South Wales. For outstanding public service, particularly to New South Wales Fire Brigades and the Newcastle community. Ms Denise Gloria Darlow, of New South Wales. For outstanding public service as Private Secretary to eminent statesmen. Ms Dianne Mary Duff, of New South Wales. For outstanding public service in the development of performing arts within the public education system in New South Wales. Mr Robert John Gallagher, of New South Wales. For outstanding public service in the area of government advertising and information. Mr Lindsay Bernard Gilligan, of New South Wales. For outstanding public service, particularly as the Director of the Geological Survey of New South Wales. Mr Paul Joseph Henry, of New South Wales. For outstanding public service, particularly to the Inverell Shire Council. Mr Richard Runga Matenga, of New South Wales. For outstanding public service to the Department of Corrective Services, particularly the Indigenous community. Captain Timothy James Turner, of New South Wales. For outstanding public service to the Port of Newcastle. Victorian Public Service Mr Kelvin John Anderson. For outstanding public service in the development and service delivery of correctional services in Victoria. Ms Sandra Jane Brien. For outstanding public service and innovative leadership in supporting Indigenous and refugee groups. Dr Anthony Gerard Britt. For outstanding public service to Victoria's livestock industries and animal health through the establishment of the National Livestock Identification System. Mr Clifford Gregory Owen. For outstanding public service in the development and implementation of a corporate governance model, and as a leader in police vehicle safety. Queensland Public Service Mr Dennis Wayne Bidgood. For outstanding public service to the housing sector by streamlining administrative processes and delivering significant cost savings. Mrs Susan Lynette Rainbow. For outstanding public service to education, mentoring and program development for the Indigenous community of the Wide Bay Burnett region. Mr Terence Joseph Skehan. For outstanding public service to Queensland particularly in the field of special education. Mr Gary John Stevenson. For outstanding public service and leadership within local government, particularly through local government reforms. Mr Allan William Welsh. For outstanding public service to the development of arts and cultural infrastructure in Queensland. Western Australian Public Service Dr James Macquarie Limerick. For outstanding public service to Western Australia's mineral and resource industries. South Australian Public Service Dr David Anthony Cunliffe. For outstanding public service to the community of South Australia by ensuring the quality and safety of drinking water. Ms Patricia Anne Duhring. For outstanding public service to rural and remote communities as a Continence Nurse. Mr Rodney James Frisby. For outstanding public service and leadership in the field of motor vehicle registration and licensing. Australian Police Medal (APM) Australian Federal Police Assistant Commissioner Andrew Alexander Colvin, . Assistant Commissioner Mandy Newton. New South Wales Police Detective Chief Inspector James Michael Johnson. Deputy Commissioner Naguib Kaldas. Sergeant Andrew John McCoullough. Detective Sergeant Lindsay Matthew McGillicuddy. Superintendent Michael Charles Plotecki. Sergeant Garry John Salafia. Superintendent Stanley Kenneth Single. Senior Constable Norman William Wales. Victoria Police Inspector Christopher Phillip Duthie. Detective Superintendent Richard Duncan Grant. Senior Sergeant Joy Lynette Murphy. Inspector Ross Hugh Smith. Inspector Jillian Wood. Queensland Police Sergeant Arthur William Brennan. Detective Superintendent Peter Crawford. Detective Sergeant Kathryn Clare Dorge. Superintendent Peter Guild. Assistant Commissioner Brett Michael Pointing. Western Australia Police Inspector Dennis Eric Collinson. Detective Sergeant Thomas James Doyle. Detective Inspector Anthony James Lee. Senior Aboriginal Police Liaison Officer Allan Douglas Tang Wei. South Australia Police Chief Superintendent Silvio Alberto Amoroso. Senior Sergeant Annemieke Lyndy Baker. Senior Sergeant First Class Allan Mitchell McDonald. Tasmania Police Inspector Robert George Gyselman. Northern Territory Police Commander Katherina Laura Vanderlaan. Australian Fire Service Medal (AFSM) New South Wales Mr William George Alexander, Zone Manager, Rural Fire Service. Mr Gerard Charles Cannon, of New South Wales Fire Brigades. Mr Edward William Davies, Rural Fire Brigade. Mr William Frederick Dunn, Group Captain, Rural Fire Brigade. Mr William Anderson Ewing, of New South Wales Fire Brigades. Mr Roy Leslie Harvey, of New South Wales Fire Brigades. Mr Ronald James Jollow, Senior Deputy Captain, Rural Fire Brigade. Mr Dennis James Saunders, Group Officer, Rural Fire Service. Mr James Smith, Area Commander, of New South Wales Fire Brigades. Mr Mark Andrew Swayn, Rural Fire Service. Mr Mark Robert Whybro, of New South Wales Fire Brigades. Mr Steven George Yorke, Chief Superintendent, Rural Fire Brigade. Victoria Mr Barry Richard Barnett, Country Fire Authority. Mrs Patricia Elaine Bigham, Country Fire Authority. Mr David Miller, Manager Strategic Fire Planning, Department of Sustainability and Environment. Mr Paul Ritchie, Metropolitan Fire and Emergency Services Board. Mr Richard Kenneth (Rick) Williams, Country Fire Authority. Queensland Mr Ilikena Dabea, Queensland Fire and Rescue Service Rural Fire Advisory Council. Mr John Frederik van Klaveren, Queensland Fire and Rescue Service. Western Australia Mr David George Gossage, Fire and Emergency Services & Chief Bushfire Control Officer, Oakford Brigade. Mr John Campbell McMillan, Western Australia Fire Brigades. Mr Richard John Sneeuwjagt, Manager, Fire Management Services, Department of Environment and Conservation. Mr Ray Sousa, Chief Bushfire Control Officer, Training Officer and Emergency Services Coordinator, Fire and Emergency Services Authority. South Australia Mr Graham Andrew Thomas, Group Officer, Country Fire Service. Mr Arthur Robert Tindall, Manager, Infrastructure & Logistics, Country Fire Service. Ambulance Service Medal (ASM) Queensland Dr Eric Desmond Elks, Clinical Support Officer, Queensland Ambulance Transport Brigade. Mr Leslie Joseph Steel, Communications Centre Supervisor, Queensland Ambulance Transport Brigade. South Australia Mr Laidley Bruce Francis, General Manager, Emergency and Major Events, South Australian Ambulance Service. Mr Christopher David Lemmer, Chief Executive, South Australian Ambulance Service. Emergency Services Medal (ESM) Victoria Mr Graeme Francis Jackman, State Emergency Service. Queensland Mr Rhys William Fraser, South West Regional Director, Emergency Management Queensland. Mr Horace Vickers Hunt, State Training Coordinator, Volunteer Marine Rescue. Western Australia Mr Rodney Alan Paterson, State Emergency Service. South Australia Mr Donald John Skinner, State Emergency Service. Mrs Joan Stanton, South Australian Sea Rescue Squadron. Commendation for Gallantry Army Private Trent Ollis, of Queensland. For gallantry in action in hazardous circumstances while acting as Lead Scout of 12 Platoon, Security Task Group, 2nd Reconstruction Task Force under enemy fire at Musazai on 8 August 2007. Distinguished Service Cross (DSC) Army Lieutenant Colonel Harold James Jarvie, , of Western Australia. For distinguished command and leadership in action as the Commanding Officer of 2nd Reconstruction Task Force in Afghanistan. Major Ian Douglas Langford, of New South Wales. For distinguished command and leadership in action as Officer Commanding Alpha Commando Company Group in the Special Operations Task Group, Operation Slipper, Afghanistan. Distinguished Service Medal (DSM) Army Major Micah Batt, of Queensland. For distinguished leadership in action as the Officer Commanding Security Detachment XI in Baghdad. Major Simon William Moore-Wilton, of Queensland. For distinguished leadership in action as the Officer Commanding, Security Task Group of the 2nd Reconstruction Task Force during Operation Slipper in Afghanistan. Lieutenant Glenn Leon Neilson, of Queensland. For distinguished leadership in action while commanding 12 Platoon, Security Task Group, 2nd Reconstruction Task Force under enemy fire at Musazai on 8 and 10 August 2007. Colonel John Peter Smith, of Australian Capital Territory. For distinguished leadership in action as the Australian National Representative and Chief J7 to the Multi National Division – South East, Iraq. Commendation for Distinguished Service Army Private Steven Andrew Hall, of Queensland. For distinguished performance of duties in warlike operations as a Rifleman, 12 Platoon, Security Task Group, 2nd Reconstruction Task Force during Operation Slipper. Sergeant Wade James McFarlane, of Queensland. For distinguished performance of duties in warlike operations as the Troop Sergeant of 3 Troop, Security Task Group, 2nd Reconstruction Task Force during Operation Slipper. Captain Paul Michael Sanderson, of Australian Capital Territory. For distinguished performance of duties in warlike operations as the acting Officer Commanding the Security Task Group, 2nd Reconstruction Task Force during Operation Sydney 3. Major Kelvin Stuart Seabrook, of New South Wales. For distinguished performance of duties in warlike operations as Operations and Training Major for the 10th Iraqi Army Division Military Transition Team during Operation Catalyst. Air Force Group Captain Gavin Alexander Turnbull, of New South Wales. For distinguished performance of duties in warlike operations as the Chief of Staff Headquarters Joint Task Force 633 during Operations Catalyst and Slipper. Conspicuous Service Cross (CSC) Navy Lieutenant Commander Mitchell Andrew Carmock, of New South Wales. For outstanding achievement as the Engineering Officer . Commodore Simon Terrence Cullen, , of New South Wales. For outstanding achievement as the Director Combined Planning Group, United States Central Command. Lieutenant Richard David Elsom, of Australian Capital Territory. For outstanding achievement as the inaugural Officer-in-Charge of the Directorate of Sailors' Career Management, Fleet Base West - Local Career Management Centre. Chief Petty Officer Dane Peter Rasmussen, of New South Wales. For outstanding achievement as the Ship's Technical Officer of . Army Colonel Michael James Kingsford, of Australian Capital Territory. For outstanding achievement as the Commanding Officer of the 4th Field Regiment, and as the Brigade Commander Rear, 3rd Brigade. Colonel David Michael Luhrs, of New South Wales. For outstanding achievement as the Director of Personnel Capability – Army. Brigadier Barry Neil McManus, of Queensland. For outstanding achievement as the Chief Staff Officer Personnel and Logistics (J1/4) Headquarters Joint Operations Command. Lieutenant Colonel Suzanne Melotte, of Victoria. For outstanding achievement as the Commanding Officer/Chief Instructor of the Melbourne University Regiment. Lieutenant Colonel Ian Philip Spiers, of Queensland. For outstanding achievement in providing medical support as Commanding Officer 2nd Health Support Battalion. Lieutenant Colonel Kathryn Leslei Toohey, of Australian Capital Territory. For outstanding achievement as the Deputy Director Communications, Capability Development Group in the development of Military Satellite Communications. Air Force Wing Commander Jay Andrew Clarke, of Australian Capital Territory. For outstanding achievement as Deputy Director Remuneration Reform Project 2007 within Air Force Headquarters Personnel Branch. Group Captain Gavin Neil Davies, of Australian Capital Territory. For outstanding achievement as Officer Commanding at Number 82 Wing, Royal Australian Air Force Base Amberley. Flight Sergeant Craig Anthony O'Malley, of New South Wales. For outstanding achievement as a Senior Non-Commissioned Officer at Number 1 Combat Communications Squadron. Wing Commander Tracey Lee Simpson, of New South Wales. For outstanding achievement as Base Commander/Commanding Officer at Combat Support Unit Richmond, Royal Australian Air Force Base Richmond. Conspicuous Service Medal (CSM) Navy Chief Petty Officer Raymond John Beasy, of Victoria. For meritorious achievement in recruit entry and specialist seamanship training. Leading Seaman Roger Cairncross Dalby, of New South Wales. For meritorious achievement as a Leading Seaman Communications Information Systems sailor in the Royal Australian Navy. Lieutenant Commander Grahame Andrew Falls, of Australian Capital Territory. For meritorious achievement as the Integrated Logistic Support Manager for the Landing Helicopter Dock Naval Shipbuilding Project. Commander Ainsley Glen Morthorpe, of Northern Territory. For meritorious achievement as the Staff Officer Grade One Operations for Operation Resolute at Headquarters Northern Command. Captain Nicholas James Youseman, of New South Wales. For meritorious achievement as Commanding Officer . Army Sergeant Lindsay Wayne Black, of Victoria. For meritorious achievement as a Squadron Sergeant Major within 1st Armoured Regiment, and as the Warrant Officer Instructor – Tank at Gunnery Wing, School of Armour. Major Stefan Hreszczuk, of New South Wales. For meritorious achievement as Staff Officer Grade Two, Officer Career Management, Army Personnel Agency Sydney. Corporal Ryan John Ingold, of Queensland. For meritorious achievement as a Rifle Section Commander of Alpha Company, the 2nd Battalion, The Royal Australian Regiment. Major Gordon Ross Lambie, of Victoria. For meritorious achievement as Officer Commanding and Music Director of the Australian Army Bands Sydney and Melbourne. Sergeant Juliet Nehi Payne, of Queensland. For meritorious achievement to the Australian Army as the Operations Sergeant at Headquarters 11th Brigade in support of Operations Relex II, Resolute and Anode. Warrant Officer Class Two Mark John Retallick, of Queensland. For meritorious achievement as the Company Sergeant Major of First Class at the Royal Military College, Duntroon. Sapper Malcolm MacCallum Stewart, of Western Australia. For meritorious achievement as a tradesman and trade mentor for the Army Aboriginal Community Assistance Program Training Team. Warrant Officer Class One Phillip Andrew Symmans, of Queensland. For meritorious achievement as the Regimental Quartermaster Sergeant of the 3rd Combat Signals Regiment, the 5th Aviation Regiment, the 1st Signal Regiment, and Headquarters 1st Division. Captain Rik Andrew Walter, of Victoria. For meritorious achievement as the Secretary of the Soldier Career Management Agency, Medical Employment Classification Review Board. Air Force Sergeant Matthew Stephen Hanley, of New South Wales. For meritorious achievement as the Acting Senior Non-Commissioned Officer-in-Charge of Number 2 Operational Conversion Unit Aircraft Life Support Section. Wing Commander William Kourelakos, of New South Wales. For meritorious achievement as Executive Officer of Numbers 36 and 37 Squadrons. Squadron Leader Colin Andrew Smith, of South Australia. For meritorious achievement as Executive Officer of Number 11 Squadron. Group Captain Peter Neil Wood, of Australian Capital Territory. For meritorious achievement as Chief of Staff at Headquarters Air Lift Group. References 2008 awards Orders, decorations, and medals of Australia
11376350
https://en.wikipedia.org/wiki/Agile%20Software%20Corporation
Agile Software Corporation
Oracle Agile PLM, formerly Agile Software Corporation, is a product lifecycle management (PLM) software owned by Oracle. Agile Software Corporation was a San Jose, California based company that provided product lifecycle management (PLM) software. After Oracle acquired the company in 2007, it became Oracle Agile PLM. The acquisition also allowed Oracle to expand and rewrite their Oracle Cloud PLM software within the Oracle Cloud SCM suite. In February, 2005, Agile Software Corporation acquired Cimmetry Systems Corporation, a privately owned software developer specializing in enterprise visualization, for approximately US$41.5 million in cash. Cimmetry Systems Corporation became a wholly owned subsidiary of Agile Software Corporation. Agile Software Corporation operated as a public company, with shares trading on NASDAQ. On 15 May 2007, Oracle Corporation announced that it would acquire Agile Software Corporation through a cash merger for US$8.10 per share, or approximately US$495 million. On July 16, 2007, Oracle Corporation completed the acquisition of Agile, which became a wholly owned subsidiary. See also List of acquisitions by Oracle External links Official website References Oracle acquisitions Product lifecycle management
5827862
https://en.wikipedia.org/wiki/Dale%20Meyerrose
Dale Meyerrose
Dr. Dale W. Meyerrose, Major General (Retired) was the first President-appointed, Senate-confirmed Associate Director of National Intelligence/Intelligence Community Chief Information Officer (CIO) and Information Sharing Executive for the Director of National Intelligence (DNI). Dr. Meyerrose is president of the MeyerRose Group, LLC, a company that consults with a wide range of business, government, and academic organizations on strategy, business planning, technology, education, and executive development issues. He is a visiting associate professor at the School of Information Studies, Syracuse University. He is an adjunct professor at Carnegie Mellon University's School of Computer of Science with the Institute for Software Research and director for the Cybersecurity Leadership (CSL) certificate program. Additionally, Dr. Meyerrose is a Trustee and Treasurer for the U.S. Air Force Academy Falcon Foundation. He was formerly the president and chairman of the board for the Air Force Historical Foundation, and advisor to the U.S. Air Force Heritage Program. Dr. Meyerrose was recently a vice president and general manager for Harris Corporation, a Global Fortune 500 company. He was responsible for leading all aspects of strategy, business development and program execution for cyber growth initiatives across the corporation—and participated in multiple merger and acquisition activities. In 2018, Dr. Meyerrose became president and chairman of the board for Imcon International, Inc. and joined the Board of Directors of ThinkRF. Government career Dr. Meyerrose was the first President-appointed, Senate-confirmed Associate Director of National Intelligence/Intelligence Community Chief Information Officer (CIO) and Information Sharing Executive for the Director of National Intelligence (DNI). He managed activities relating to the information technology infrastructure and enterprise requirements of the U.S. Intelligence Community. He had the procurement approval authority over all information technology items related to the enterprise architectures of all Intelligence Community components. He directed and managed all information technology-related procurement for the Intelligence Community and ensured that all expenditures for information technology and research and development activities were consistent with government enterprise architectures. He also led the information sharing strategy and policy for the Intelligence Community. This position was created by the 2004 Intelligence Reform and Terrorism Protection Act. Dr. Meyerrose initiated an effort to test and ultimately use blogs as a tool for intelligence gathering. While the blogosphere is well known amongst Internet users, it was new terrain for the secure information culture of the intelligence community. Recognizing the trappings of large scale initiatives, Dr. Meyerrose pursued "thinking big, starting small, and scaling fast" through the use of Web 2.0 technology. He fostered the development of Intellipedia and pilot projects such as a U.S. government-wide focused on avian flu, in which participants numbered in the tens-of-thousands in just a few months. Information sharing contributions were made worldwide, and content and quality grew rapidly, becoming the impetus for information sharing across the U.S. government. Military career While on military active duty, Major General Dale W. Meyerrose served as chief information officer of three major U.S. Air Force Commands and three unified U.S. military combatant commands. He was the director of Command Control Systems for the North American Aerospace Defense Command during 9/11, helping to safeguard the air sovereignty of North America. He subsequently became the first chief information officer for U.S. Northern Command, the first modern U.S. military command responsible for homeland defense. General Meyerrose served as the director of communications for coalition task forces supporting post-DESERT STORM operations in Southwest Asia and subsequent combat operations in the Balkan Peninsula. In his last military assignment, General Meyerrose was the Director of Command Control Systems, Headquarters North American Aerospace Defense Command, and Director of Architectures and Integration, Headquarters U.S. Northern Command, Peterson Air Force Base, Colorado. He also served as the Chief Information Officer and Air Force Element Commander for Air Force personnel for both commands. General Meyerrose ensured the availability and performance of the command and control systems to safeguard the air sovereignty of North America. He facilitated communications and information sharing for military assistance to civil authorities for incident response responsibilities assigned to Northern Command. Born in Indianapolis, Indiana, General Meyerrose entered the Air Force in 1975 after graduating from the United States Air Force Academy. The general wears the master communications badge and is a master parachutist. Education Military Assignments July 1975 - February 1976, distinguished graduate, Communications-Electronics Officer Course, Keesler Air Force Base, Mississippi February 1976 - April 1977, maintenance officer, 4th Combat Communications Group, Altus Air Force Base, Oklahoma May 1977 - June 1979, aide-de-camp, later, assistant executive officer to the Commander, European Communications Division, Kapaun Air Station, West Germany June 1979 - June 1980, aide-de-camp to the Commander, Air Force Communications Command, Scott Air Force Base, Illinois June 1980 - February 1982, Chief of Maintenance, 1974th Communications Group, Scott Air Force Base, Illinois March 1982 - March 1983, member and Air Staff Training Program officer, Secretary of the Air Force Personnel Council, Washington, D.C. March 1983 - May 1985, Chief, Long-Haul Information Systems, later, point of contact, Command, Control and Communications Systems Panel, Headquarters U.S. Air Force, Washington, D.C. June 1985 - July 1987, Commander, 2048th Communications Squadron, Carswell Air Force Base, Texas July 1987 - June 1990, Communications Support Officer, National Military Command Center, the Joint Staff, Washington, D.C. June 1990 - July 1991, Chief, Future Concepts, Deputy Chief of Staff for Command, Control, Communications and Computers, Headquarters U.S. Air Force, Washington, D.C. August 1991 - June 1992, student, National War College, Fort Lesley J. McNair, Washington, D.C. July 1992 - June 1994, Commander, 3rd Combat Communications Group, Tinker Air Force Base, Oklahoma (February 1993 - May 1993, Director of Communications, Operation Southern Watch, Riyadh, Saudi Arabia) July 1994 - December 1996, Director of Communications and Information and Chief Information Officer, Headquarters U.S. Air Forces in Europe, Ramstein Air Base, Germany December 1996 - June 2000, Director of Communications and Information and Chief Information Officer, Headquarters Air Combat Command, Langley Air Force Base, Virginia June 2000 - October 2002, Director of Command Control Systems and Chief Information Officer, Headquarters North American Aerospace Defense Command and U.S. Space Command, and Director of Communications and Information and Chief Information Officer, Headquarters Air Force Space Command, Peterson Air Force Base, Colorado October 2002 - 2005, Director of Command Control Systems and Chief Information Officer, Headquarters North American Aerospace Defense Command, and Director of Architectures and Integration and Chief Information Officer, Headquarters U.S. Northern Command, Peterson Air Force Base, Colorado Awards and decorations Other achievements 1987 Outstanding Young AFCEAN Award, Armed Forces Communications and Electronics Association (AFCEA) 1992 Medal of Merit, AFCEA 1999 International AFCEAN of the Year, AFCEA 2005 "Top 100" Information Technology Professionals, Federal Computer Weekly 2007 "Premier 100", Computerworld 2007 "Federal List of Top Ten Power Players in Washington, DC, Federal Computer Weekly 2008 "North American Technology Leadership Award", Rocky Mountain AFCEA Chapter 2008 "Lifetime Public Service Award", Association of Federal Information Resource Managers 2008 "Outstanding Information technology Achievement in Government", Government Computer News 2008 "Public Service Award for Excellence in Public Leadership", Executive CIO Top 10 Leaders and Innovators 2008 "Lifetime Achievement Award", Air Force C4 Association 2008 National Intelligence Superior Service Medal 2008 National Geospatial-Intelligence Agency Medallion for Excellence 2011 "Thought Leadership Award", EMC2 2012 Air Force Communicators and Air Traffic Controllers Association Hall of Honor 2012 U.S. Air Force Cyberspace Operations and Support Hall of Fame 2014 Doctoral prize for Excellence in Scholarship and Research, School of Information Studies, Syracuse University 2015 Federal News Radio, "Federal Executive Forum" Hall of Fame 2020 AFCEA International Distinguished Life Member award Effective dates of promotion References External links United States Air Force Academy alumni United States Air Force generals People from Indianapolis University of Utah alumni Harvard Kennedy School alumni Haas School of Business alumni Recipients of the Air Force Distinguished Service Medal Recipients of the Legion of Merit United States Deputy Directors of National Intelligence Living people Recipients of the Defense Superior Service Medal 1953 births Recipients of the Meritorious Service Medal (United States)
1557384
https://en.wikipedia.org/wiki/Gateway%20Load%20Balancing%20Protocol
Gateway Load Balancing Protocol
Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary protocol that attempts to overcome the limitations of existing redundant router protocols by adding basic load balancing functionality. In addition to being able to set priorities on different gateway routers, GLBP allows a weighting parameter to be set. Based on this weighting (compared to others in the same virtual router group), ARP requests will be answered with MAC addresses pointing to different routers. Thus, by default, load balancing is not based on traffic load, but rather on the number of hosts that will use each gateway router. By default, GLBP load balances in round-robin fashion. GLBP elects one AVG (Active Virtual Gateway) for each group. Other group members act as backup in case of AVG failure. In case there are more than two members, the second best AVG is placed in the Standby state and all other members are placed in the Listening state. This is monitored using hello and holdtime timers, which are 3 and 10 seconds by default. The elected AVG then assigns a virtual MAC address to each member of the GLBP group, including itself, thus enabling AVFs (Active Virtual Forwarders). Each AVF assumes responsibility for forwarding packets sent to its virtual MAC address. There could be up to four AVFs at the same time. By default, GLBP routers use the local multicast address 224.0.0.102 to send hello packets to their peers every 3 seconds over UDP 3222 (source and destination). Cisco implemented IPv6 support for GLBP in IOS release 12.2(33)SXI. See also Common Address Redundancy Protocol First Hop Redundancy Protocols Hot Standby Router Protocol Virtual Router Redundancy Protocol References External links Cisco GLBP documentation Cisco protocols First-hop redundancy protocols
532895
https://en.wikipedia.org/wiki/Kademlia
Kademlia
Kademlia is a distributed hash table for decentralized peer-to-peer computer networks designed by Petar Maymounkov and David Mazières in 2002. It specifies the structure of the network and the exchange of information through node lookups. Kademlia nodes communicate among themselves using UDP. A virtual or overlay network is formed by the participant nodes. Each node is identified by a number or node ID. The node ID serves not only as identification, but the Kademlia algorithm uses the node ID to locate values (usually file hashes or keywords). In fact, the node ID provides a direct map to file hashes and that node stores information on where to obtain the file or resource. When searching for some value, the algorithm needs to know the associated key and explores the network in several steps. Each step will find nodes that are closer to the key until the contacted node returns the value or no more closer nodes are found. This is very efficient: like many other s, Kademlia contacts only nodes during the search out of a total of nodes in the system. Further advantages are found particularly in the decentralized structure, which increases the resistance against a denial-of-service attack. Even if a whole set of nodes is flooded, this will have limited effect on network availability, since the network will recover itself by knitting the network around these "holes". I2P's implementation of Kademlia is modified to mitigate Kademlia's vulnerabilities, such as Sybil attacks. System details Peer-to-peer networks are made of nodes, by design. The protocols that these nodes use to communicate, and locate information, have become more efficient over time. The first generation peer-to-peer file sharing networks, such as Napster, relied on a central database to co-ordinate look ups on the network. Second generation peer-to-peer networks, such as Gnutella, used flooding to locate files, searching every node on the network. Third generation peer-to-peer networks, such as Bittorrent, use Distributed hash tables to look up files in the network. Distributed hash tables store resource locations throughout the network. Kademlia uses a "distance" calculation between two nodes. This distance is computed as the exclusive or (XOR) of the two node IDs, taking the result as an unsigned integer number. Keys and Node IDs have the same format and length, so distance can be calculated among them in exactly the same way. The node ID is typically a large random number that is chosen with the goal of being unique for a particular node (see UUID). It can and does happen that geographically widely separated nodes—from Germany and Australia, for instance—can be "neighbors" if they have chosen similar random node IDs. Exclusive or was chosen because it acts as a distance function between all the node IDs. Specifically: the distance between a node and itself is zero it is symmetric: the "distances" calculated from A to B and from B to A are the same it follows the triangle inequality: given A, B and C are vertices (points) of a triangle, then the distance from A to B is shorter than (or equal to) the sum of both the distance from A to C and the distance from C to B. These three conditions are enough to ensure that exclusive or captures all of the essential, important features of a "real" distance function, while being cheap and simple to calculate. Each Kademlia search iteration comes one bit closer to the target. A basic Kademlia network with 2n nodes will only take n steps (in the worst case) to find that node. Fixed Size Routing tables Fixed size routing tables were presented in the pre-proceedings version of the original paper and are used in the later version only for some mathematical proofs. An actual Kademlia implementation does not have a fixed size routing table, but a dynamically sized one. Kademlia routing tables consist of a list for each bit of the node ID. (e.g. if a node ID consists of 128 bits, a node will keep 128 such lists.) A list has many entries. Every entry in a list holds the necessary data to locate another node. The data in each list entry is typically the IP address, port, and node ID of another node. Every list corresponds to a specific distance from the node. Nodes that can go in the nth list must have a differing nth bit from the node's ID; the first n-1 bits of the candidate ID must match those of the node's ID. This means that it is very easy to populate the first list as 1/2 of the nodes in the network are far away candidates. The next list can use only 1/4 of the nodes in the network (one bit closer than the first), etc. With an ID of 128 bits, every node in the network will classify other nodes in one of 128 different distances, one specific distance per bit. As nodes are encountered on the network, they are added to the lists. This includes store and retrieval operations and even helping other nodes to find a key. Every node encountered will be considered for inclusion in the lists. Therefore, the knowledge that a node has of the network is very dynamic. This keeps the network constantly updated and adds resilience to failures or attacks. In the Kademlia literature, the lists are referred to as k-buckets. k is a system wide number, like 20. Every k-bucket is a list having up to k entries inside; i.e. for a network with k=20, each node will have lists containing up to 20 nodes for a particular bit (a particular distance from itself). Since the possible nodes for each k-bucket decreases quickly (because there will be very few nodes that are that close), the lower bit k-buckets will fully map all nodes in that section of the network. Since the quantity of possible IDs is much larger than any node population can ever be, some of the k-buckets corresponding to very short distances will remain empty. Consider the simple network to the right. The network size is 2^3 or eight maximum keys and nodes. There are seven nodes participating; the small circles at the bottom. The node under consideration is node six (binary 110) in black. There are three k-buckets for each node in this network. Nodes zero, one and two (binary 000, 001, and 010) are candidates for the farthest k-bucket. Node three (binary 011, not shown) is not participating in the network. In the middle k-bucket, nodes four and five (binary 100 and 101) are placed. Finally, the third k-bucket can only contain node seven (binary 111). Each of the three k-buckets are enclosed in a gray circle. If the size of the k-bucket was two, then the farthest 2-bucket can only contain two of the three nodes. For example, if node six has node one and two in the farthest 2-bucket, it would have to request a node ID lookup to these nodes to find the location (ip address) of node zero. Each node knows its neighbourhood well and has contact with a few nodes far away which can help locate other nodes far away. It is known that nodes that have been connected for a long time in a network will probably remain connected for a long time in the future. Because of this statistical distribution, Kademlia selects long connected nodes to remain stored in the k-buckets. This increases the number of known valid nodes at some time in the future and provides for a more stable network. When a k-bucket is full and a new node is discovered for that k-bucket, the least recently seen node in the k-bucket is PINGed. If the node is found to be still alive, the new node is placed in a secondary list, a replacement cache. The replacement cache is used only if a node in the k-bucket stops responding. In other words: new nodes are used only when older nodes disappear. Protocol messages Kademlia has four messages. PING — Used to verify that a node is still alive. STORE — Stores a (key, value) pair in one node. FIND_NODE — The recipient of the request will return the k nodes in its own buckets that are the closest ones to the requested key. FIND_VALUE — Same as FIND_NODE, but if the recipient of the request has the requested key in its store, it will return the corresponding value. Each RPC message includes a random value from the initiator. This ensures that when the response is received it corresponds to the request previously sent. (see Magic cookie) Locating nodes Node lookups can proceed asynchronously. The quantity of simultaneous lookups is denoted by α and is typically three. A node initiates a FIND_NODE request by querying to the α nodes in its own k-buckets that are the closest ones to the desired key. When these recipient nodes receive the request, they will look in their k-buckets and return the k closest nodes to the desired key that they know. The requester will update a results list with the results (node ID's) it receives, keeping the k best ones (the k nodes that are closer to the searched key) that respond to queries. Then the requester will select these k best results and issue the request to them, and iterate this process again and again. Because every node has a better knowledge of its own surroundings than any other node has, the received results will be other nodes that are every time closer and closer to the searched key. The iterations continue until no nodes are returned that are closer than the best previous results. When the iterations stop, the best k nodes in the results list are the ones in the whole network that are the closest to the desired key. The node information can be augmented with round trip times, or RTT. This information will be used to choose a time-out specific for every consulted node. When a query times out, another query can be initiated, never surpassing α queries at the same time. Locating resources Information is located by mapping it to a key. A hash is typically used for the map. The storer nodes will have information due to a previous STORE message. Locating a value follows the same procedure as locating the closest nodes to a key, except the search terminates when a node has the requested value in its store and returns this value. The values are stored at several nodes (k of them) to allow for nodes to come and go and still have the value available in some node. Periodically, a node that stores a value will explore the network to find the k nodes that are close to the key value and replicate the value onto them. This compensates for disappeared nodes. Also, for popular values that might have many requests, the load in the storer nodes is diminished by having a retriever store this value in some node near, but outside of, the k closest ones. This new storing is called a cache. In this way the value is stored farther and farther away from the key, depending on the quantity of requests. This allows popular searches to find a storer more quickly. Because the value is returned from nodes farther away from the key, this alleviates possible "hot spots". Caching nodes will drop the value after a certain time depending on their distance from the key. Some implementations (e.g. Kad) do not have replication nor caching. The purpose of this is to remove old information quickly from the system. The node that is providing the file will periodically refresh the information onto the network (perform FIND_NODE and STORE messages). When all of the nodes having the file go offline, nobody will be refreshing its values (sources and keywords) and the information will eventually disappear from the network. Joining the network A node that would like to join the net must first go through a bootstrap process. In this phase, the joining node needs to know the IP address and port of another node—a bootstrap node (obtained from the user, or from a stored list)—that is already participating in the Kademlia network. If the joining node has not yet participated in the network it computes a random ID number, which by virtue of being a very large random number is extremely likely not to be already assigned to any other node. It uses this ID until leaving the network. The joining node inserts the bootstrap node into one of its k-buckets. The joining node then performs a node lookup of its own ID against the bootstrap node (the only other node it knows). The "self-lookup" will populate other nodes' k-buckets with the new node ID, and will populate the joining node's k-buckets with the nodes in the path between it and the bootstrap node. After this, the joining node refreshes all k-buckets further away than the k-bucket the bootstrap node falls in. This refresh is just a lookup of a random key that is within that k-bucket range. Initially, nodes have one k-bucket. When the k-bucket becomes full, it can be split. The split occurs if the range of nodes in the k-bucket spans the node's own id (values to the left and right in a binary tree). Kademlia relaxes even this rule for the one "closest nodes" k-bucket, because typically one single bucket will correspond to the distance where all the nodes that are the closest to this node are, they may be more than k, and we want it to know them all. It may turn out that a highly unbalanced binary sub-tree exists near the node. If k is 20, and there are 21+ nodes with a prefix "xxx0011....." and the new node is "xxx000011001", the new node can contain multiple k-buckets for the other 21+ nodes. This is to guarantee that the network knows about all nodes in the closest region. Accelerated lookups Kademlia uses an XOR metric to define distance. Two node ID's or a node ID and a key are XORed and the result is the distance between them. For each bit, the XOR function returns zero if the two bits are equal and one if the two bits are different. XOR metric distances hold the triangle inequality: given A, B and C are vertices (points) of a triangle, then the distance from A to B is shorter than (or equal to) the sum of the distance from A to C to B. The XOR metric allows Kademlia to extend routing tables beyond single bits. Groups of bits can be placed in k-buckets. The group of bits are termed a prefix. For an m-bit prefix, there will be 2m-1 k-buckets. The missing k-bucket is a further extension of the routing tree that contains the node ID. An m-bit prefix reduces the maximum number of lookups from log2 n to log2m n. These are maximum values and the average value will be far less, increasing the chance of finding a node in a k-bucket that shares more bits than just the prefix with the target key. Nodes can use mixtures of prefixes in their routing table, such as the Kad Network used by eMule. The Kademlia network could even be heterogeneous in routing table implementations, at the expense of complicating the analysis of lookups. Academic significance While the XOR metric is not needed to understand Kademlia, it is critical in the analysis of the protocol. The XOR arithmetic forms an abelian group allowing closed analysis. Other DHT protocols and algorithms require simulation or complicated formal analysis in order to predict network behavior and correctness. Using groups of bits as routing information also simplifies the algorithms. Mathematical analysis of the algorithm To analyze the algorithm, consider a Kademlia network of nodes with IDs , each of which is a string of length that consists of only ones and zeros. It can be modeled as a trie, in which each leaf represents a node, and the labeled path from the root to a leaf represents its ID. For a node , let be the set of nodes (IDs) that share a prefix with of length . Then filling the -th bucket of can be modeled as adding pointers from the leaf to leaves (IDs) chosen uniformly at random from . Thus routing can be seen as jumping among the leaves along these pointers such that each step goes towards the target ID as much as possible, i.e., in a greedy way. Let be number of jumps needed to go from the leaf to a target ID . Assuming that are chosen deterministically from , it has been proved that where is the -th Harmonic Number. Since as , when is large is bounded from above by about , however the IDs and the target are chosen. This justifies the intuition that in Kademlia only nodes are contacted in searching for a target node. To make the model closer to real Kademlia networks, can also be assumed to be chosen uniformly at random without replacement from . Then it can be proved that for all and , where is a constant depending only on with as . Thus for large, converges to a constant close . This implies that the number of nodes need to be contact in searching for a target node is actually on average. Use in file sharing networks Kademlia is used in file sharing networks. By making Kademlia keyword searches, one can find information in the file-sharing network so it can be downloaded. Since there is no central instance to store an index of existing files, this task is divided evenly among all clients: If a node wants to share a file, it processes the contents of the file, calculating from it a number (hash) that will identify this file within the file-sharing network. The hashes and the node IDs must be of the same length. It then searches for several nodes whose ID is close to the hash, and has its own IP address stored at those nodes. i.e. it publishes itself as a source for this file. A searching client will use Kademlia to search the network for the node whose ID has the smallest distance to the file hash, then will retrieve the sources list that is stored in that node. Since a key can correspond to many values, e.g. many sources of the same file, every storing node may have different information. Then, the sources are requested from all k nodes close to the key. The file hash is usually obtained from a specially formed Internet magnet link found elsewhere, or included within an indexing file obtained from other sources. Filename searches are implemented using keywords. The filename is divided into its constituent words. Each of these keywords is hashed and stored in the network, together with the corresponding filename and file hash. A search involves choosing one of the keywords, contacting the node with an ID closest to that keyword hash, and retrieving the list of filenames that contain the keyword. Since every filename in the list has its hash attached, the chosen file can then be obtained in the normal way. Implementations Networks Public networks using the Kademlia algorithm (these networks are incompatible with one another): I2P: an anonymous overlay network layer. Kad Network: developed originally by the eMule community to replace the server-based architecture of the eDonkey network. Ethereum: the node discovery protocol in the Ethereum blockchain network stack is based on a slightly modified implementation of Kademlia. Overnet: With KadC a C library for handling its Kademlia is available. (development of Overnet is discontinued) Mainline DHT: a DHT for BitTorrent based on an implementation of the Kademlia algorithm, for trackerless torrents. Osiris (all version): used to manage distributed and anonymous web portal. Retroshare: F2F decentralised communication platform with secure VOIP, instant messaging, file transfer etc. Tox: a fully distributed messaging, VoIP and video chat platform Gnutella DHT: originally by LimeWire to augment the Gnutella protocol for finding alternate file locations, now in use by other gnutella clients. IPFS: a peer-to-peer distributed filesystem based on libp2p. TeleHash: a mesh networking protocol that uses Kademlia to resolve direct connections between parties. iMule: file sharing utility software for I2P. OpenDHT: library providing an implementation of Kademlia, used by Jami and others. GNUnet: alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Uses randomized version of Kademlia called R5N Dat: a peer-to-peer file sharing tool based on the Hypercore Protocol. See also Content addressable network Chord (DHT) Tapestry (DHT) Pastry (DHT) Koorde References External links Xlattice projects Kademlia Specification and definitions. Computer-related introductions in 2002 Distributed data storage Hash based data structures Distributed data structures File sharing Network architecture Hashing Routing Key-based routing Overlay networks
1325873
https://en.wikipedia.org/wiki/Deflection%20routing
Deflection routing
Deflection routing is a routing strategy for networks based on packet switching which can reduce the need of buffering packets. Every packet has preferred outputs along which it wants to leave the router, and when possible a packet is sent along one of these outputs. However, two or more packets may want to leave along the same output (which is referred to as a contention among packets), and then only one of the packets may be sent along the link, while the others are sent along available outputs, even though the other links are not preferred by the packets (because, for instance, those links do not yield shortest paths). Depending on the rate of incoming packets and the capacity of the outgoing links, deflection routing can work without any packet buffering. Of course, it is always possible to simply drop packets in a network with a best effort delivery strategy. See also Cut-through switching Dynamic Alternative Routing References Routing
49489000
https://en.wikipedia.org/wiki/General%20Mission%20Analysis%20Tool
General Mission Analysis Tool
General Mission Analysis Tool (GMAT) is open-source space mission analysis software developed by NASA and private industry. It has been used for several missions, including LCROSS, the Lunar Reconnaissance Orbiter, OSIRIS-REx, the Magnetospheric Multiscale Mission, and the Transiting Exoplanet Survey Satellite (TESS) mission. GMAT is an open-source alternative to software like Systems Tool Kit and FreeFlyer. References External links GMAT Wiki GMAT Download (SourceForge) GMAT channel on YouTube Aerospace engineering 3D graphics software Astronomy software Mathematical software Physics software
48273312
https://en.wikipedia.org/wiki/IMC%20AG
IMC AG
IMC AG is a German software company, publishing house and supplier of E-Learning content with headquarters in Saarbrücken. Development The company IMC AG was founded in 1996 within the Scheer Group of the Saarland, by business informatics professor and former BITKOM President August-Wilhelm Scheer as a spin off to bundle the E-learning business and to expand. The IMC AG does not belong to IDS Scheer, which was at that time the third largest German software company after SAP and Software AG and which was sold to Software AG in 2009, but became a part of the E-learning division within the newly founded Scheer Group GmbH. August-Wilhelm Scheer is the Head of the Supervisory Board. In June, 2014, Wolfgang Kraemer, Frank Milius, and Volker Zimmermann, founding Board members, left the company after 17 years. Their Successors were Christian Wachter, Tobias Blickle and Rudolf Keul. According to MMB ranking, the company is market leader for E-learning software in Germany and the second largest provider for E-learning after the in 2015 renamed Jaber AG. The company's main product is a learning management system (abbreviated as LMS, also learning platform). This LMS developed by IMC is also the technical basis of the 2011 introduced free access MOOCS platform OpenCourseWorld. First courses were offered in January 2013. By the end of 2013, the MOOCS platform was revised and redesigned. Also, more courses were offered, in particular in the areas of information technology, economics and health care. In 2014, the IT Journal CHIP placed OpenCourseWorld under the three best MOOCS platforms in the German speaking world together with Coursera and iversity. 2013, the company moved with 170 employees in the new building of the Scheer towers on the University campus North of the University of the Saarland. The red facade made of aluminium of the nine-storey office building is supposed to create associations to the Golden Gate Bridge in San Francisco and the Californian Silicon Valley as the location of IT startups and high-technology. Other locations are Munich, Freiburg, Graz (Austria), Zurich (Switzerland), Sibiu (Romania), London (United Kingdom), Scottsdale (Arizona, United States), Singapore and Melbourne (Australia). Products In addition to the MOOCS platform OpenCourseWorld and E-learning content, the IMC AG publishes books and sells in particular software products. These include the IMC Learning Suite, a learning platform, the IMC Content Studio, an authoring software for creating E-learning content and the IMC Process Guide, an electronic performance support system (EPSS). The Educational Software is used among others by the New York Stock Exchange, the British National Health Service and the citizenship test in Austria. The learning platform ranked third among 600 tested programs in the international LMS mid-year ranking of 2014 as the "best software of Germany". As Publisher, in addition to several books on management issues, the IMC AG first published the journal IM+ioin 2013, merging the journal „IM Information management and consulting“ published since 1986 and the magazine „io“, founded in 1932 and until then issued by the Axel Springer Verlag. Partner is the BWI Center for Industrial Management of ETH Zurich. References External links Website of IMC AG Software companies of Germany German educational websites Learning management systems Companies based in Saarland
35567527
https://en.wikipedia.org/wiki/Carl%20Bass
Carl Bass
Carl Bass is a former president and chief executive officer of Autodesk, Inc., a maker of professional 3D design software and consumer applications, and was a co-founder of Ithaca Software, which commercialized HOOPS, a 3D graphics system. Bass has been credited with expanding Autodesk beyond its core AutoCAD software through acquisitions and new product developments and transitioning from 2D to 3D model-based design. Early life and education Bass was born in New York, New York to a chemist father and school teacher mother. After starting at Cornell University, Bass took a break to build boats, furniture, and sculpture in Seattle and Maine for five years. He returned to Cornell and graduated with Bachelor of Arts in mathematics in 1983. Career In 1981, Bass co-founded a computer graphics company called Flying Moose Systems and Graphics Ltd., which became Ithaca Software in 1986. The company commercialized HOOPS, a 3D graphics system originally developed at Cornell University in the mid-1980s. Bass served as Ithaca Software’s chief technology officer and CEO. He joined Autodesk when the company acquired Ithaca Software in 1993, serving as the chief architect for AutoCAD. In 1995, Bass was forced out by Autodesk’s then president and CEO Carol Bartz, only to be rehired five months later, after top Autodesk engineers said they needed Bass’s software development skills. Bass left Autodesk in 1999 to launch Buzzsaw, an online service for management of construction projects, where he served as president and CEO. Bass returned to Autodesk when it acquired the company in 2001. In addition to being the company's president and CEO from 2006 through 2017, Bass held a number of high-level positions at Autodesk, including executive vice president and chief strategy officer (2001 to 2002); senior executive vice president of the Design Solutions Group (2002 to 2004); chief operating officer (2004 to 2006); and interim chief financial officer (2008 to 2009). Tenure at Autodesk In 2006, Carol Bartz stepped down as Autodesk’s president and CEO, naming Bass as her replacement. During his tenure as CEO, Bass focused on expanding the company beyond its core AutoCAD software through acquisitions and new product development, and transitioning from 2D to 3D design. He emphasized vertical markets focusing on model-based design, simulation, and lifecycle management. Under his direction, Autodesk introduced consumer-oriented products such as SketchBook, a mobile painting and drawing app with more than 7 million users as of Nov. 2011. Bass helped lead the company to develop Building Information Modeling (BIM) and generative design technologies. In March 2008, Autodesk was ranked number 25 on Fast Company's list of "The World's 50 Most Innovative Companies." Bass serves on the Board of Directors of Autodesk, HP Inc., Zendesk Inc., Planet, VELO3D, Formlabs Inc, Box, and Built Robotics. He also serves on the board of trustees of the Smithsonian's Cooper-Hewitt National Design Museum, Art Center College of Design, and California College of the Arts, and is a member of the advisory boards of Cornell Computing and Information Science, UC Berkeley School of Information, and UC Berkeley College of Engineering. He currently acts as an advisor to Zoox Inc. and a special advisor to Alphabet CEO Larry Page. Bass announced that he would be stepping down as Autodesk's CEO effective on February 8, 2017. He remains a board member and special advisor to the company. Personal life Bass owns a workshop near his home in Berkeley, Calif., where he designs and fabricates objects made from wood, metal and stone. Bass’ projects have included furniture, sculpture and a walk-in wooden rocket ship he built for his children, which is on permanent display at Chabot Science Center. References External links Carl Bass on Bloomberg Carl Bass Bio Page on Autodesk Carl Bass on Twitter Carl Bass Furniture and Other Objects Living people American computer businesspeople American company founders American technology chief executives 1957 births Businesspeople from New York City Cornell University alumni Autodesk people
13172231
https://en.wikipedia.org/wiki/Wicked%20Rose
Wicked Rose
Wicked Rose is the pseudonym of a Chinese hacker responsible for developing the GinWui rootkit used in internet attacks during the summer of 2006. It has been suggested that he works for the Chinese Army. Beginnings Tan Dailin was a graduate student at a Sichuan University when he was noticed (for attacking a Japanese site) by the People’s Liberation Army (PLA) in the summer of 2005. He was invited to participate in a PLA-sponsored hacking contest and won. He subsequently participated in a one-month, 16-hour-per-day training program where he and the other students simulated various cyber invasion methods, built dozens of hacking exploits, and developed various hacking tactics and strategies. He was chosen for the Sichuan regional team to compete against teams from Yunnan, Guizhou, Tibet, and Chongqing Military District. His team again ranked number one and he won a cash prize of 20,000 RMB. Network Crack Program Hacker Group Then, under the pseudonym Wicked Rose, he formed the Network Crack Program Hacker Group (NCPH Group) and recruited other talented hackers from his school. He found a funding source (an unknown benefactor) and started attacking US sites. After an initial round of successful attacks, his funding was tripled. All through 2006, NCPH built sophisticated rootkits and launched a barrage of attacks against multiple US government agencies. By the end of July, 2006, NCPH had created some 35 different attack variants for one MS Office vulnerability. During the testing phase, NCPH used Word document vulnerabilities. They switched to Excel and later to PowerPoint vulnerabilities. The result of all of this activity is that the NCPH group siphoned thousands, if not millions, of unclassified US government documents back to China. References Living people Rootkits Hacking (computer security) Year of birth missing (living people)
14787401
https://en.wikipedia.org/wiki/Lots%20of%20Luv%27
Lots of Luv'
Lots of Luv' is the second album by Dutch girl group Luv', released in May 1979 by Philips Records/Phonogram. It features the hit singles Casanova (a Top 10 song in a large part of Continental Europe) and Eeny Meeny Miny Moe, which maintained Luv's position as the best Dutch export act of 1979. In 2006, this LP was reissued in digitally remastered form by Universal Music Netherlands as part of the Completely in Luv' box set and featured the popular chart topper "Trojan Horse". Background In the second half of 1978, Luv' reached fame in a large part of Europe and South Africa thanks to the success of smash hits like "You're the Greatest Lover", "Trojan Horse" and the With Luv' album. The release party of the second LP (entitled Lots of Luv) took place at the Lido Club in Amsterdam in May 1979. Two songs from this opus were released as singles: "Casanova" and "Eeny Meeny Miny Moe" (inspired by Boney M.'s 1978 song "Rasputin"). After the release of the 1978 With Luv', the producers and songwriters Hans van Hemert and Piet Souer (under the pseudonym Janschen & Janschens) teamed up once again to supervise the recording and the production of Lots of Luv, influenced by Pop music, Disco and Latin American music sounds. Track listing All tracks written by Hans van Hemert and Piet Souer under the pseudonym 'Janschen & Janschens' except where noted.Side A:"Casanova" – 3:48 "Eeny Meeny Miny Moe" – 2:46 "DJ" – 3:20 "Shoes Off (Boots On)" – 3:07 "Marcellino" – 3:14 "Dandy" – 2:46Side B:"The Night of Love" – 3:32 "Money, Honey" – 3:16 "I.M.U.R" – 3:35 "I Like Sugar Candy Kisses" – 3:34 "If You Love Me" – 2:34 "Saint Tropez" – 3:04 2006 bonus tracks Lots of Luv was remastered and reissued in 2006 as part of the Completely in Luv' box set with the same track listing and four bonus tracks: <LI>"Trojan Horse" (Janschen & Janschens) – 3:24 <LI>"Casanova" (Alfred Garrido, Janschen & Janschens) – 3:49 Spanish version <LI>"Luv' Hitpack" (Janschen & Janschens) – 5:29 Long version:Casanova/Life Is on My Side/U.O.Me/Casanova/You're the Greatest Lover/Life Is On My Side/Trojan Horse/Everybody's Shakin' Hands on Broadway/Casanova <LI>"All You Need Is Luv' Jingle" (Janschen & Janschens) – 0:12 PersonnelLuv' José Hoebee – vocals Marga Scheide – vocals Patty Brard – vocalsAdditional personnel Ernö Olah & Metropole Orkest – strings Production Producer: Hans van Hemert Arranger/conductor: Piet Souer Mastering: www.pat-sound.nl Remix track 15 Luv' Hitpack by Peter 'Hithouse' Slaghuis Design Photography: Claude Vanheye Design: Jan H. van Uden Art Direction: Clouds Studio Singles Charts Because Luv's public was composed by a majority of teenagers at the time of the release of ''Lots of Luv, the group's singles/performance (sales) fared more significant than the albums. In the late 1970s, 45-RPM vinyl records were popular formats among the young public whereas the full-length LP's attracted more adult listeners. This situation explains why Luv' achieved a greater success on the singles charts than on the album lists.Lots of Luv reached platinum status in the Netherlands. References External links Page about Lots of Luv' from the website Fonos.nl about the Dutch Pop Music Archives Review of Luv' records (including Lots of Luv''') on Bubblegum University website 1979 albums Luv' albums
887521
https://en.wikipedia.org/wiki/BitComet
BitComet
BitComet (originally named SimpleBT client from versions 0.11 to 0.37) is a cross-protocol BitTorrent, HTTP and FTP client written in C++ for Microsoft Windows and available in 52 different languages. Its first public release was version 0.28. The current BitComet logo has been used since version 0.50. Features The BitComet program is a multi-threaded multi-protocol hybrid download manager and BitTorrent peer-to-peer (P2P) file-sharing application. It supports simultaneous download tasks. To complete a particular download, it can draw parts of files from many sources across different P2P and client–server protocols. BitComet's main features include an embedded Internet Explorer window to let users search for torrents. Along with the features typical of contemporary BitTorrent clients, it supports UPnP gateway configuration, bandwidth scheduling, Webseeding, selecting only certain files for download inside a torrent package, NAT traversal (removed in v.1.03), Peer Exchange (in older versions, using a proprietary protocol and starting with v.1.19 also by using the Extension Protocol, implementing a PEX mechanism compatible with μTorrent / Mainline PEX), Initial-Seeding (Super-Seeding) and support for Magnet Links. When downloading, BitComet provides the option to prioritize the first and last portions of media files so that files may be previewed before they are completely downloaded.It also has a "Preview Download Mode" in which all pieces of the torrent will be, basically, downloaded sequentially thus allowing the user to play a media file while downloading (provided that the downloading speed and piece availability stay ahead of playing bitrate).BitComet also allows users to share their .torrent files, on a searchable P2P network, with other BitComet users through the torrent sharing feature, named "Torrent Share" in previous versions and renamed to "Torrent Exchange" since v.1.17. BitComet uses the Kademlia (mainline) DHT to operate even when the tracker is offline. BitComet is capable of downloading files over HTTP and FTP as well as bittorrent, and it includes download plugins for Firefox, Internet Explorer, and Maxthon. An optional plugin is available to connect to the eD2K network. The plugin is a modified version of the GPL eMule program. When installed, it connects automatically to a server. The software includes an application to play Flash Video files (.flv and .swf files). In February 2011, BitComet launched an anonymous downloading feature to its VIP customers. Using this feature, downloads will be handled by BitComet VIP servers and the real IP address of the user will be hidden. Optional standalone software BitComet.com offers a BitTorrent tracker available for download from the official site. The FLV player program can also be downloaded separately and used independently of the BitComet software. Search engine The search site is google.atcomet.com Controversy and criticism Hash reporting Since version 0.86 BitComet includes discussion and stat-tracking features which send information about torrents to the Bitcomet.com servers, including the torrent hash. DHT exploit During version 0.60, BitComet received bad publicity because its implementation of the DHT feature, which was new at the time, could be exploited to ignore the private flag of a tracker. This allowed users to avoid download and upload ratio restrictions, which are common on private trackers. Some private trackers responded to this by blacklisting version 0.60. BitComet developer RnySmile reverted the client back to version 0.59 in response to the blacklisting. The DHT exploit was fixed in version 0.61. Padding files Starting with version 0.85 (from early 2007), BitComet added a non-standard option to its torrent maker that ensures that no two data files in a multi-file torrent occupy the same BitTorrent "piece." To accomplish this, BitComet includes in the torrent a collection of empty "padding" files which houses the remainder of each file's last "piece". While these files are transparent to BitComet users, they damage the performance of other clients, because peers must devote resources and bandwidth to the padding files, with no benefit to the non-BitComet users. These files can constitute up to 10% of the total data transferred, creating a substantial drain on the swarm. BitComet developers added this feature to allow support of a feature called Long-Term Seeding in which the BitComet client can download files from other BitComet clients who have an identical file but not from the same torrent. It also allows the downloading of individual files from other non torrent sources like ED2K links. The addition of the padding file ensures that a complete version of the file can be obtained rather than being unable to complete the relevant file or last "piece" Creation of padding files has been enabled by default since version 0.85, and as of version 1.36 is still enabled by default. FileHippo controversy The download site FileHippo ceased carrying new versions of BitComet in April 2008, with this announcement. As of April 2008 FileHippo will no longer be updating BitComet. As they have copied the FileHippo site text, files, images and update checker and are passing it off as original work. We recommend you use a different more reputable torrent client such as uTorrent. This occurred after FileHippo reportedly noticed that the design and code of the AppHit.com site was very similar with the one FileHippo used, copying not only icons, but text from FileHippo's website and FileHippo's own original update checking software. Because AppHit and BitComet were contractual partners, FileHippo decided to stop carrying BitComet. BitComet has since terminated the partnership, by 2015 FileHippo made BitComet available once more. Torrent file format According to the official BitTorrent specification, 'All strings in a .torrent file that contains text must be UTF-8 encoded'. When generating torrents on non-Latin character systems such as Chinese or Japanese, BitComet versions prior to 1.20 encoded the files' names and paths using the Windows Chinese/Japanese code page, and stored a UTF-8 version in a non-standard attribute. Starting with the March 2010 release of version 1.20, BitComet's torrent format now conforms to the standard. See also Comparison of BitTorrent clients BitLord (based on BitComet) References External links BitTorrent clients C++ software Windows-only freeware 2003 software
155520
https://en.wikipedia.org/wiki/Shaanxi
Shaanxi
Shaanxi (; , ; alternately Shensi) is a landlocked province of the People's Republic of China. Officially part of Northwest China, it borders the province-level divisions of Shanxi (NE, E), Henan (E), Hubei (SE), Chongqing (S), Sichuan (SW), Gansu (W), Ningxia (NW) and Inner Mongolia (N). Shaanxi covers an area of over with about 37 million people, the 16th highest in China. Xi'an – which includes the sites of the former Chinese capitals Fenghao and Chang'an – is the provincial capital as well as the largest city in Northwest China and also one of the oldest cities in China and the oldest of the Four Great Ancient Capitals, being the capital for the Western Zhou, Western Han, Jin, Sui and Tang dynasties. Xianyang, which served as the Qin dynasty capital, is just north across Wei River. The other prefecture-level cities into which the province is divided are Ankang, Baoji, Hanzhong, Shangluo, Tongchuan, Weinan, Yan'an and Yulin. Shaanxi is geographically divided into three parts, namely Northern, Central and Southern Shaanxi. Northern Shaanxi (or "Shaanbei") makes up the southeastern portion of the Ordos Basin and mainly comprises the two prefectural cities of Yulin and Yan'an on the northern Loess Plateau, demarcated from the Ordos Desert and the grasslands of Inner Mongolia's Ordos City by the Ming Great Wall. Central Shaanxi (or "Shaanzhong") is also known as the Guanzhong region and comprises the drainage basin of lower Wei River east of Mount Long and north of the Qinling Mountains, where the majority of Shaanxi's population reside. Southern Shaanxi (or "Shaannan") comprises the three prefectural cities in the edge of the historical Bashu region south of the Qinling Mountains and includes the three mountainous cities of Hanzhong, Ankang and Shangluo. Along with areas of adjacent Shanxi and Henan provinces, it formed the cradle of Chinese civilization. The vast majority of the population of Shaanxi is Han Chinese. Mandarin is mainly spoken in Shaanxi, including Zhongyuan Mandarin and Southwestern Mandarin; another variety of Chinese, Jin, is also spoken. Shaanxi is China's 15th largest economy, ranking within the middle among China's administrative divisions. The fossil fuel and high technology sectors compose the two largest industries in Shaanxi Province. The high technology sector includes aircraft and aerospace industries and Shaanxi produces more than 50% of the R&D and manufacturing equipment for the country's domestic commercial aviation industry. Name The name of the province, , means "West of the Shan [plateau]". The territory of Shaanxi actually begins 60 km west of Shan plateau (, now Zhanbian plateau). The pronunciation of and its neighbouring province causes confusion in some non-native languages. While the two native languages in the two provinces distinguish the two province names by both vowels and consonants (Central Plains Mandarin contrasts // with //; Jin language contrasts // with // ); however, Standard Beijing Mandarin pronounces both as // with a different tone, which means their spelling in Beijing-based pinyin differs only by tone marks (Shǎnxī and Shānxī). For the convenience of typewriters without tone marks, the State Council has adopted the Gwoyeu Romatzyh romanization, spelling as "Shaanxi". Before the adoption of pinyin, Shaanxi was romanized as Shensi in the Chinese postal romanization scheme. The name first appeared as (Shaanxi circuit), an administrative division of Song dynasty in 997. History Shaanxi is considered one of the cradles of Chinese civilization. Thirteen feudal dynasties established their capitals in the province during a span of more than 1,100 years, from the Zhou dynasty to the Tang dynasty. The province's principal city and current capital, Xi'an, is one of the four great ancient capitals of China and is the eastern terminus of the Silk Road, which leads to Europe, the Arabian Peninsula and Africa. Under the Han dynasty, the Northern Silk Road was expanded to advance exploration and military purposes to the west. This Northern Silk Road is the northernmost of the Silk Roads and is about in length. It connected the ancient Chinese capital of Xi'an to the west over the Wushao Ling Pass to Wuwei and emerging in Kashgar before linking to ancient Parthia. The Northern Song dynasty established a Shaanxi Lu, (circuit) in the area, governed from modern Xi'an in 997. The Yuan dynasty established Shaanxi Province (Yuan dynasty), governed by a Branch Secretariat in 1286. Under the Ming dynasty, Shaanxi was established with the founding of the Saanxi Provincial Administration Commission in 1376, whose administration also included the modern provinces of Gansu, Ningxia, and part of Qinghai. One of the most devastating earthquakes in history occurred near Hua Shan, in south-eastern part of Shaanxi Province on January 23, 1556, killing an estimated 830,000 people (see 1556 Shaanxi earthquake). After the founding of the Qing dynasty, Gansu was split from Shaanxi, but both provinces were governed under the Viceroy of Shaan-Gan. The end of the short-lived Jiangxi Soviet signaled the beginning of the Long March by Mao Zedong and the Chinese Communists to the Shaanxi Soviet at Yan'an. Pre-historic site The Lantian Man site, with hominin fossils of one million years ago, was found in Lantian County in northwestern Shaanxi province, near the city of Xi'an. Scientists classify Lantian Man as a subspecies of Homo erectus. The fossils are displayed at the Shaanxi History Museum, Xi'an, China. Geography The geography of the area is described as being part of the Ordos Desert in the north along the border with Inner Mongolia, the Loess Plateau in the central part of the province, the Qin Mountains (Qinling) running east to west in the south central part, and subtropical climate south of the Qinling. In between the Loess Plateau and the Qinling lies the Wei River Valley, or Guanzhong, a cradle of early Chinese civilization. Going clockwise, Shaanxi borders Shanxi (E, NE), Henan (E), Hubei (SE), Chongqing (S), Sichuan (SW), Gansu (W), Ningxia (NW), and Inner Mongolia (N). In terms of number of bordering provincial-level divisions, Shaanxi ties Inner Mongolia. Due to its large span in latitude, Shaanxi has a variety of climates. Under the Köppen climate classification, the northern parts, including the Loess Plateau, have either a cold arid (Köppen BWk) or cold semi-arid (Köppen BSk), with cold and very dry winters, dry springs and autumns, and hot, humid summers. The area known as Guanzhong is mostly semi-arid, though there are a few areas with a humid subtropical climate (Köppen Cwa), with cool to cold winters, and hot, humid summers that often see early-season heatwaves. The southern portion is much more humid and lies in the humid subtropical zone, with more temperate winters and long, hot, humid summers. Annual mean temperature is roughly between , with January temperatures ranging from and July temperatures ranging from . Besides the provincial capital of Xi'an, other cities include: Baoji, Hanzhong, Lintong, Tongchuan, Xianyang, Yan'an and Ankang. Administrative divisions Shaanxi consists of ten prefecture-level divisions: all prefecture-level cities (including a sub-provincial city): The ten prefecture-level cities of Shaanxi are subdivided into 107 county-level divisions (30 districts, 4 county-level cities, and 73 counties). Urban areas Politics The politics of Shaanxi is structured in a triple party-government system like all other governing institutions in mainland China. The Governor of Shaanxi is the highest-ranking official in the People's Government of Shaanxi. However, in the province's dual party-government governing system, the Governor is considered to have less power than the Shaanxi Communist Party of China Provincial Committee Secretary (), colloquially termed the "Shaanxi CPC Party Chief"; since the Governor is always ranked as the First-Deputy Secretary in the Shaanxi Communist Party of China Provincial Committee. Shaanxi was established as a provincial government since Qing dynasty. On 10 January 1950, the People's Government of Shaanxi was established in Xi'an. Ma Minfang was then appointed as the first Governor of Shaanxi. Economy As of the mid-19th century, Shaanxi exported animal skins, wine, liquor, and musk. Money loans were also common, with Shaanxi business people involved in the Guangzhou loan business. Shaanxi commonly imported European animal skins, watches, Chinese language books, and cloth. The fossil fuel and high technology sectors compose the two largest industries in Shaanxi province. During 2009, the province ranked third in China for production of coal, natural gas and crude oil. As the home of several of the leading universities and research institutes in Western China, Shaanxi province also plays a major role in China's burgeoning aircraft and aerospace industries, producing more than 50% of the R&D and manufacturing equipment for the country's domestic commercial air industry. Nominal GDP for 2011 was 1,239 billion RMB (US$196.7 billion) and GDP per capita was 21,729 RMB (US$3,179), ranking 17th in the PRC. In the first half of 2019, Shaanxi's total production value reached 1,162.557 billion yuan, a year-on-year increase of 5.4%. The added value of the primary industry was 55.319 billion yuan, an increase of 4.5%; the second industry was 557.935 billion yuan, an increase of 4.2%; the tertiary industry was 549.303 billion yuan, an increase of 6.8%. Economic and technological development zones Baoji Hi-Tech Industrial Development Zone Established in 1992, Baoji Hi-Tech Industrial Development Zone was approved as a national hi-tech zone by the State Council. It has a long-term planned area of . The transportation system around the zone includes Xi'an-Xianyang International Airport and National Highway 310, and industries operating within the zone include auto parts, electronics, IT, pharmaceuticals and bioengineering industries and new materials. Shaanxi Xi'an Export Processing Zone Shaanxi Xi'an Export Processing Zone (XEPZ) was approved on 21 June 2002 by the State Council for its establishment and was put on 5 April 2004. As the first state-level export processing zone in northwest China, XEPZ has become one of the seven pioneer EPZs with the function of bonded logistics in China. XEPZ is under the leadership of the Administrative Committee of Xi'an Economic and Technological Development Zone (XETDZ), which is designated by Xi'an municipal government to exercise economic and administrative power within the zone. XEPZ is a special economic zone. By now, there are more than 40 enterprises home and abroad settled in XEPZ. The pillar industries feature aviation, machinery, electronics and new energy. Western Triangle The Western Triangle is a new economic zone composing the three major city-level economies of Western China: Xi'an, Chongqing and Chengdu. It is believed that the addition of Xi'an to the Triangle will spur economic growth in the region and allow the city an opportunity to capitalize on the commercial potential of its high-technology industries. Xi'an Economic and Technological Development Zone Established in 1993, Xi'an Economic and Technology Development Zone was approved as a national zone in 2000. The zone is 20 minutes from Xi'an Xianyang International Airport, and national highways pass through. It has formed four pillar industries: automotive, electronics, food, and new materials industries. So far, the zone has attracted more than 1,700 enterprises. Xi'an High-tech Industrial Development Zone Xi'an HTDZ opened its gates in 1991. It was established as a "pivotal location" for investment by high-tech industry companies in central and northwest China. Established in 1991, Xi'an Hi-Tech Industrial Development Zone is a national high-tech zone. It is surrounded by national highways and it is 30 minutes from Xi'an International Airport. Furthermore, it is ranked in the top three high-tech zones in China. Xi'an Software Park Xi'an Software Park, established in December 1998, is the professional park for Xi'an to develop scale software and service outsourcing industries. The park has been appraised as a software industry base under the National Torch Program, national software industry base, national software export base, city demonstrational area of national service outsourcing base. It is one of the four parks with "double bases" of software in China. Xi'an Software Park assembles 90% of enterprises engaging in software and service outsourcing in Xi'an. There were nearly 780 companies, of which foreign-funded enterprises account for 170, and over 71,000 jobholders in the park by the end of 2008. Yangling Agriculture Hi-Tech Industrial Zone Yangling Agriculture Hi-Tech Industrial Zone was approved as a national-level hi-tech development zone by State Council in 1997. It is from Xi'an to the east and from Xi'an Xianyang International Airport. Demographics Nearly all the people in Shaanxi are ethnic Han Chinese, with pockets of Hui population in the northwestern region (adjacent to Ningxia). Shaanxi province is one of the centers of ancient Chinese civilization. The central part of Shaanxi, known as Guanzhong, where the provincial capital Xi'an is located, is more populous compared to the others (Shaannan and Shaanbei), Religion The predominant religions in Shaanxi are Chinese folk religions, Taoist traditions and Chinese Buddhism. According to surveys conducted in 2007 and 2009, 7.58% of the population believes and is involved in ancestor veneration, while 1.57% of the population identifies as Christian. The reports didn't give figures for other types of religion; 90.85% of the population may be either irreligious or involved in worship of nature deities, Buddhism, Confucianism, Taoism, folk religious sects, and small minorities of Muslims. Catholic Church in Shaanxi Catholic Church in Zhifang, destroyed in 2017 Golden Lampstand Church, destroyed in 2018 Culture Shaanxi cuisine Qinqiang, the representative folk opera of Shaanxi Shaanxi shadow play Xintianyou Also see Xi'an#Culture Tourism Banpo Neolithic village, near Xi'an Daqin Pagoda Imperial mausoleums Zhao Mausoleum Mount Hua, one of the five best known mountains in China. Taibaishan (Mount Taibai), the highest peak of the Qinling Range. Mausoleum and Terracotta Army Museum of the First Qin Emperor in Xi'an (World Heritage Site) The city of Xi'an: City Walls, Great Mosque, Bell Tower and Drum Tower, Forest of Stone Steles Museum, Shaanxi History Museum, Wild Goose Pagoda Yan'an, the destination of the Long March and the center of Chinese Communist revolution from 1935 to 1948 Biángbiáng noodles, one of the "ten strange wonders of Shaanxi" () Media Shaanxi Radio serves Xi'an and the surrounding Shaanxi province area with music, and news. The Story of Yue Fei, a 17 – 18th century wuxia fiction novel about the life of Song dynasty general Yue Fei, says his military arts teacher, Zhou Tong, was from Shaanxi. Education Tertiary education Sports Professional sports teams based in Shaanxi include: Chinese Basketball Association Southern Division: Shaanxi Kylins National Basketball League (NBL): Shaanxi Wolves Women's Chinese Basketball Association (WCBA): Shaanxi Red Wolves Chinese Football Association China League One: Shaanxi Chang'an Athletic F.C. See also List of prisons in Shaanxi Major national historical and cultural sites in Shaanxi Notes References External links Economic profile for Shaanxi at HKTDC Provinces of the People's Republic of China Western China
711841
https://en.wikipedia.org/wiki/Berkeley%20r-commands
Berkeley r-commands
The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network. The r-commands were developed in 1982 by the Computer Systems Research Group at the University of California, Berkeley, based on an early implementation of TCP/IP (the protocol stack of the Internet). The CSRG incorporated the r-commands into their Unix operating system, the Berkeley Software Distribution (BSD). The r-commands premiered in BSD v4.1. Among the programs in the suite are: (remote copy), (remote execution), (remote login), (remote shell), , , and (remote who). The r-commands were a significant innovation, and became de facto standards for Unix operating systems. With wider public adoption of the Internet, their inherent security vulnerabilities became a problem, and beginning with the development of Secure Shell protocols and applications in 1995, its adoption entirely supplanted the deployment and use of r-commands (and Telnet) on networked systems. Authentication The original Berkeley package that provides rlogin also features rcp (remote-copy, allowing files to be copied over the network) and rsh (remote-shell, allowing commands to be run on a remote machine without the user logging into it). These share the hosts.equiv and .rhosts access-control scheme (although they connect to a different daemon, rshd). Commands rlogin enables a user to log in on another server via computer network, using TCP network port 513. rlogin is also the name of the application layer protocol used by the software, part of the TCP/IP protocol suite. Authenticated users can act as if they were physically present at the computer. RFC 1282, in which it was defined, states: "The rlogin facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output." rlogin communicates with a daemon, rlogind, on the remote host. rlogin is similar to the Telnet command, but is not as customizable and is able to connect only to Unix-like hosts. rsh rsh opens a shell on a remote computer without a login procedure. Once connected, the user can execute commands on the remote computer through the shell's command-line interface. rsh passes input and output through the standard streams, and it sends standard output to the user's console. Over the network, standard input and standard out flow through TCP port 514, while Standard Error flows through a different TCP port, which the rsh daemon (rshd) opens. rexec Like rsh, rexec enables the user to run shell commands on a remote computer. However, unlike the rsh server, the rexec server (rexecd) requires login: it authenticates users by reading the username and password (unencrypted) from the network socket. rexec uses TCP port 512. rcp rcp can copy a file or directory from the local system to a remote system, from a remote system to the local system, or from one remote system to another. The command line arguments of cp and rcp are similar, but in rcp remote files are prefixed with the name of the remote system: rcp file.txt subdomain.domain:~/home/foo/file.txt As with the Unix copy command cp, rcp overwrites an existing file of the same name in the target; unlike cp, it provides no mechanism for warning the user before overwriting the target file. Like rsh, rcp uses TCP port 514. rwho Just as the who command lists the users who are logged in to the local Unix system, rwho lists those users who are logged into all multi-user Unix systems on the local network. rwho's daemon, rwhod, maintains a database of the status of Unix systems on the local network. The daemon and its database are also used by the ruptime program. rstat rstat returns performance statistics from the kernel. ruptime Just as the command shows how long a Unix system has been running since the last restart, requests a status report from all computers on the local network. It then returns the uptime report. If a computer did not respond within the time limit, then ruptime reports that the system is down. This information is tracked and stored by the daemon rwhod, which is also used by the rwho command. Security Those r-commands which involve user authentication (rcp, rexec, rlogin, and rsh) share several serious security vulnerabilities: All information, including passwords, is transmitted unencrypted (making it vulnerable to interception). The .rlogin (or .rhosts) file is easy to misuse. They are designed to allow logins without a password, but their reliance on remote usernames, hostnames, and IP addresses is exploitable. For this reason many corporate system administrators prohibit .rhosts files, and actively scrutinize their networks for offenders. The protocol partly relies on the remote party's rlogin client to provide information honestly, including source port and source host name. A corrupt client is thus able to forge this and gain access, as the rlogin protocol has no means of authenticating other machines' identities, or ensuring that the requesting client on a trusted machine is the real rlogin client. The common practice of mounting users' home directories via NFS exposes rlogin to attack by means of fake .rhosts files - this means that any of NFS's security faults automatically plague rlogin. Due to these problems, the r-commands fell into relative disuse (with many Unix and Linux distributions no longer including them by default). Many networks that formerly relied on rlogin and telnet have replaced them with SSH and its rlogin-equivalent slogin. See also List of Unix commands Notes References Further reading External links , BSD Rlogin (1991) Internet protocols Internet Standards Unix network-related software
1132602
https://en.wikipedia.org/wiki/Tactical%20role-playing%20game
Tactical role-playing game
Tactical role-playing games (abbreviated TRPGs), known in Japan as (abbreviated SRPGs), are a video game genre that combines core elements of role-playing video games with those of tactical (turn-based or real-time) strategy video games. The formats of tactical RPGs are much like traditional tabletop role-playing games and strategy games in appearance, pacing, and rule structure. Likewise, early tabletop role-playing games are descended from skirmish wargames such as Chainmail, which were primarily concerned with combat. Game design This subgenre of role-playing video games principally refers to games which incorporate elements from strategy video games as an alternative to traditional role-playing game (RPG) systems. Like standard RPGs, the player typically controls a finite party and battles a similar number of enemies. And like other RPGs, death is usually temporary. But this genre incorporates strategic gameplay such as tactical movement on an isometric grid. Unlike traditional RPGs which are traditionally single-player, some tactical RPGs feature multiplayer play, such as Final Fantasy Tactics. A distinct difference between tactical RPGs and traditional RPGs is the lack of exploration; for instance, Final Fantasy Tactics does away with the third-person exploration of towns and dungeons that is typical in a Final Fantasy game. In Final Fantasy Tactics, instead of exploration, there is an emphasis on battle strategy. Players are able to build and train characters to use in battle, utilizing different classes, including warriors and magic users, depending on the game. Characters normally gain experience points from battle and grow stronger, and are awarded secondary experience points which can be used to advance in specific character classes. Battles have specific winning conditions, such as defeating all enemies or surviving a certain number of turns, that the player must accomplish before the next map will become available. In between battles, players can access their characters to equip them, change classes, train them, depending on the game. History A number of early role-playing video games used a tactical form of combat, such as Tunnels of Doom (1982) and Ultima III: Exodus (1983), as well as The Dragon and Princess (1982) and Bokosuka Wars (1983), which introduced party-based, tiled combat to America and Japan, respectively. Further, tactical RPGs are descendants of tabletop role-playing games and wargames, such as Dungeons & Dragons and Chainmail, which were mainly tactical in their original form. Nevertheless, much of the development of tactical RPGs has diverged on each side of the Pacific, and the term "tactical RPG" is sometimes reserved only for those titles that were created in Japan. 8-bit origins in the East (1982–1990) One of the earliest Japanese RPGs, Koei's The Dragon and Princess, released NEC's PC-8001 home computer platform in 1982. This game can also be considered a precursor to the tactical RPG genre. It used a combat system where, following a random encounter, the game transitioned to a separate, graphical, overhead battle screen, and tactical turn-based combat ensued. That same year, in 1982, Tunnels of Doom used a similar combat system; as did Ultima III: Exodus released in 1983. During the 8-bit era, Bokosuka Wars, a computer game developed by Koji Sumii for the Sharp X1 in 1983 and ported to the Nintendo Entertainment System (NES) by ASCII in 1985, was responsible for laying the foundations for the tactical RPG genre, or "simulation RPG" genre as it is known in Japan, with its blend of role-playing and strategy game elements. The game revolves around a king who must recruit soldiers and lead his army against overwhelming enemy forces, while each unit gains experience and levels up along the way. It is also considered to be an early prototype real-time strategy game. Another notable early example of the genre was Kure Software Koubou's 1988 PC-8801 strategy RPG, Silver Ghost, which was cited by Camelot Software Planning's Hiroyuki Takahashi as inspiration for the Shining series of tactical RPGs. According to Takahashi, Silver Ghost was "a simulation action type of game where you had to direct, oversee and command multiple characters." Unlike later tactical RPGs, however, Silver Ghost was not turn-based, but instead used real-time strategy and action role-playing game elements. It also featured a point-and-click interface, to control the characters using a cursor. A similar game released by Kure Software Koubo that same year was First Queen, a unique hybrid between a real-time strategy, action RPG, and strategy RPG. Like an RPG, the player can explore the world, purchase items, and level up, and like a strategy video game, it focuses on recruiting soldiers and fighting against large armies rather than small parties. The game's "Gochyakyara" ("Multiple Characters") system let the player control one character at a time while the others are controlled by computer AI that follow the leader, and where battles are large-scale with characters sometimes filling an entire screen. Master of Monsters, developed by SystemSoft and released in 1989 for the MSX2, added fantasy characters and magic attacks to the gameplay of the wartime combat Daisenryaku series, which had instead opted for tanks, planes, and other vehicles of real-world modern combat. Master of Monsters also added experience bars for the character units, a concept which would be adapted and popularized by later console-based series like Fire Emblem. Unlike many other early titles in the genre, Master of Monsters made its way to the west via a port to the Sega Genesis in 1991, albeit only in North America. However, the genre did not become prolific until Nintendo published the game that set the template for tactical wargame RPGs, Fire Emblem: Ankoku Ryū to Hikari no Tsurugi. Developed by Intelligent Systems and released exclusively in Japan for the Nintendo Famicom in 1990, Fire Emblem would become an archetype for the whole genre, establishing gameplay elements that are still used in tactical RPGs today, though many of these elements were influenced by earlier RPGs and strategy games. Combining the basic concepts from games like Dragon Quest and simple turn-based strategy elements that the development team gained experience with in their 1988 release Famicom Wars, Intelligent Systems created a hit, which spawned many sequels and imitators. It introduced unique features such as how the characters were not interchangeable pawns but each of them were unique, in terms of both class and stats, and how a character who runs out of hit points would usually remain dead forever. The latter mechanic was used to introduce a non-linear storyline to the genre, where different multiple endings are possible depending on which characters are alive or dead, a concept still used in recent games such as Shin Megami Tensei: Devil Survivor, and Final Promise Story. However, it was not until the release of Fire Emblem: The Blazing Blade for the Game Boy Advance, many years later, that the series was introduced to Western gamers, who until then were more familiar with localized precursors like Nobunaga's Ambition, as well as later tactical RPGs partially influenced by Fire Emblem, including the Shining and Ogre series and Final Fantasy Tactics, and Nippon Ichi games like Disgaea. Eastern console history (1991–present) 16-bit consoles During the 16-bit generation, among the first imitators was Langrisser by NCS/Masaya, first released for the Mega Drive / Genesis in 1991. It was translated for North American release and retitled Warsong. The Langrisser series differed from Fire Emblem in that it used a general-soldier structure instead of controlling main characters. Langrisser, too, spawned many sequels, none of which were brought to North America. Langrisser set itself apart from other tactical RPGs in its time with larger-scale battles, where the player could control over thirty units at one time and fight against scores of enemies. Since Der Langrisser in 1994, the series offered non-linear branching paths and multiple endings. The player's choices and actions affected which of four different paths they followed, either aligning themselves with one of three different factions or fighting against all of them. Each of the four paths leads to a different ending and there are over 75 possible scenarios. Langrisser III introduced a relationship system similar to dating sims. Depending on the player's choices and actions, the feelings of the female allies will change towards the player character, who will end up with the female ally he is closest with. Master of Monsters was a unique title by SystemSoft. Where Langrisser and Fire Emblem used a square-based grid, Master of Monsters used a hexagonal grid. Players could choose one of four different Lords to defend their Towers and areas on the grid by building an army of creatures to destroy the opposing armies. This game had a sequel for the PlayStation called Master of Monsters: Disciples of Gaia, which had limited success and was criticized for its slow gameplay. Both Warsong and Master of Monsters were cited as the inspirations behind the 2005 turn-based strategy computer RPG, The Battle for Wesnoth. The first game in the long-running Super Robot Wars series is another early example of the genre, initially released for the Game Boy in 1991. Another influential early tactical RPG was Sega's Shining Force for the Sega Genesis, which was released in 1992. Shining Force used even more console RPG elements than earlier games, allowing the player to walk around towns and talk to people and buy weapons. It spawned sequels, Shining Force II for Sega Genesis and Shining Force CD for Sega CD, besides the Shining Force Gaiden 1, 2 and 3 for Sega Game Gear and Shining Force III for Sega Saturn. The game's creator, Camelot Software Planning's Hiroyuki Takahashi, cited Kure Software Koubou's 1988 tactical RPG, Silver Ghost, as his inspiration. One game released solely in Japan for the Super Nintendo Entertainment System (SNES), Bahamut Lagoon, began Square's (now Square Enix) famous line of tactical RPGs. Four games from the Ogre Battle series have been released in North America. The first was Ogre Battle: March of the Black Queen was released for the SNES in 1993 and was more of a real-time strategy RPG in which the player forms character parties that are moved around a map in real-time. When two parties meet, the combat plays out with minimal user interaction. The game is notable for introducing a moral alignment system that not only affects the gameplay but where tactical and strategic decisions influence the outcome of a non-linear branching storyline, which is affected by factors such as the moral alignments of the troops used to liberate a city, whether to keep certain liberated cities guarded, making popular or unpopular decisions, concentrating power among just a few units, making deals with thieves, and a general sense of justice. These factors lead to one of 13 possible endings, alongside other factors such as how many and which units are used, how battles are fought, the army's reputation, player character's alignment and charisma, and secrets discovered. The sequel, Tactics Ogre: Let Us Cling Together, was originally a 1995 SNES game that was not released outside Japan. It was later ported to the PlayStation, along with Ogre Battle: March of the Black Queen. Both of the PlayStation re-releases were marketed in North America by Atlus, as was Ogre Battle 64: Person of Lordly Caliber for the Nintendo 64. Tactics Ogre's gameplay is more similar to the genre of tactical RPGs that Final Fantasy Tactics belongs to (which was developed by former members of Quest and created/written/directed by Yasumi Matsuno), complete with battles taking place on isometric grids. It was also the first to bear the name "Tactics" in the title, a term gamers would come to associate with the genre. Not only are characters moved individually on a grid, but the view is isometric, and the order of combat is calculated for each character individually. The game also expanded the non-linear alignment system of its predecessor, with three types of alignments for each unit: Lawful, Neutral, and Chaos, neither of which are portrayed as necessarily good or bad. The game gives players the freedom to choose their own destiny, with difficult moral decisions, such as whether to follow a Lawful path by upholding the oath of loyalty and slaughter civilian non-player characters on the leader's command, or follow the chaotic path by following a personal sense of justice and rebelling, or instead follow a more neutral path. Such factors affect the game's ending, which is also affected by decisions such as whether to obtain the most powerful class, which can only be acquired by making a tragic sacrifice. Another feature was "Warren's Report", a type of database on the land, people, encounters and races of Valeria (similar to, but much more expansive than, the troves of knowledge in Mass Effect). Although this game defined the genre in many ways, it was not widely recognized by American gamers because it was released to American audiences several years later. Final Fantasy Tactics shared some staff members with Tactics Ogre and shares many of its gameplay elements. A prequel to the original Tactics Ogre, Tactics Ogre: The Knight of Lodis, was later released for the Game Boy Advance. A remake of Let Us Cling Together was later released for the PSP in 2011. In 1996, the tactical role-playing game Fire Emblem: Genealogy of the Holy War also featured a non-linear branching storyline, but instead of using an alignment system, it used a relationship system resembling dating sims that gave players the ability to affect the relationship points between different units/characters. This in turn affected both the gameplay and storyline, with the different possible relationships in the first generation of the game's plot leading to different units/characters appearing during the second generation, ultimately leading to different possible outcomes to the storyline. 32-bit consoles The 32-bit era saw many influential tactical RPGs, such as Konami's 1996 Vandal Hearts series, which feature branching storylines that can be altered by the player's dialogue choices that lead to different endings, as well as Sega's 1997 Shining Force 3, SCEI's Arc the Lad Collection (1996–1999), and Square's 1997 Final Fantasy Tactics and 1999 Front Mission 3. Konami's Vandal Hearts was an early PlayStation title that helped popularize tactical RPGs in the US. It was released by Konami and featured a 3D isometric map that could be rotated by the player. A sequel was subsequently released, also for the PlayStation, and Konami has announced a third title in development for the Nintendo DS. One of the first 32-bit tactical RPGs, Guardian War, was developed by Micro Cabin and released in 1993 on the Panasonic 3DO. While the game lacked in story, it included many game mechanics that are seen throughout many of the 32-bit tactical RPGs; like isometric camera rotation, interchangeable and hybridization of "jobs" or "classes" for each character, the combination of moves between characters, and the capture of NPCs and having them play on your side. Sega's Sakura Wars, released for the Sega Saturn in 1996, combined tactical RPG combat with dating sim and visual novel elements, introducing a real-time branching choice system where, during an event or conversation, the player must choose an action or dialogue choice within a time limit, or not to respond at all within that time. The player's choice, or lack thereof, affects the player character's relationship with other characters and in turn the characters' performance in battle, the direction of the storyline, and the ending. Later games in the series added several variations, including an action gauge that can be raised up or down depending on the situation, and a gauge that the player can manipulate using the analog stick depending on the situation. The success of Sakura Wars led to a wave of games that combine the RPG and dating sim genres, including Thousand Arms in 1998, Riviera: The Promised Land in 2002, and Luminous Arc in 2007. Final Fantasy Tactics was arguably the most responsible for bringing tactical RPGs to North America. Developed by former employees of Quest, the developer responsible for the Ogre Battle series, it combined many elements of the Final Fantasy series with Tactics Ogre-style gameplay. It also expanded on the isometric grid combat of Tactics Ogre by allowing players to freely rotate the camera around the battlefield rather than keeping the camera in a fixed position. The storyline of Final Fantasy Tactics was also more linear than its predecessor, in order to provide a deeper epic narrative. Thanks to Hiroyuki Ito, lead designer on the game, it also successfully implemented a modified job system, previously used in Final Fantasy V, which allowed the player to change a unit's character class at any time during the game and learn new abilities from job points earned with each class. The game was acclaimed for both its highly tactical gameplay and its well-written storyline that touches on issues such as class, privilege, religion, and politics. The game's reputation led to other developers adding the word "Tactics" to their titles to indicate the tactical RPG genre. It was later ported to the PSP as Final Fantasy Tactics: The War of the Lions and is still regarded as one of the greatest tactical RPGs of all time. Sixth generation On sixth-generation consoles, a loyal American fan-base has been established by Nippon Ichi, makers of the PlayStation 2 games La Pucelle: Tactics, Phantom Brave, and Disgaea: Hour of Darkness. Of these games, Disgaea has been the most successful to date, and was the second Nippon Ichi game released in North America, the first being Rhapsody: A Musical Adventure (published by Atlus). Throughout this generation, companies have recognized the large audience and popularity of these types of games, particularly Atlus and Nintendo. La Pucelle: Tactics and Disgaea: Hour of Darkness, which Atlus re-released due to high demand, have become cult hits for the PlayStation 2. In 2001, Sakura Wars 3 for the Dreamcast introduced a new combat system that incorporates action elements, and abandons the use of grids in favour of allowing each character to move around freely across the battlefield but with a limited number of moves each turn illustrated using a bar at the bottom of the screen. This type of combat system would later be the basis for the combat system in Valkyria Chronicles, developed by much of the same team in 2008. The Sakura Wars series would not be released in the West until the fifth game, Sakura Wars: So Long, My Love (2005). The Front Mission series also continued on to the PlayStation 2, with Front Mission 4 and Front Mission 5, the latter of which never saw a Western release, but a fan translation. The Game Boy Advance would also see the release of Rebelstar: Tactical Command (2005) by X-COM creators, Nick and Julian Gollop. The game would be highly praised for adapting the combat mechanics of the highly detailed and acclaimed PC strategy series; but would also receive criticism for sub-par presentation, a lackluster storyline, and lack of link-mode support. The game ended up receiving an average score of 77.83% at GameRankings. In early 2006, Idea Factory's Blazing Souls featured nonlinear gameplay that allows the player to progress through the game and the story in whatever order they wish. In addition, instead of having separate screens or maps for exploration and battle, the game features a seamless transition between exploration and battle. This time period also saw the Western debut of Fire Emblem in Fire Emblem: The Blazing Blade (simply titled Fire Emblem outside Japan.). Seventh generation On seventh-generation consoles, Sega's Valkyria Chronicles (2008) for the PlayStation 3 utilizes the seventh-generation console processing power by using a distinctive anime/watercolor art style, as well as incorporating third-person tactical shooter elements. After selecting a character in the overhead map view, the player manually controls him/her from a third-person view. This mechanic allows for, among others: free movement to a certain range, manual aiming with extra damage for headshots, a limited cover system, and real-time hazards, such as interception fire and landmines. The game has been described as "the missing link between Final Fantasy Tactics and Full Spectrum Warrior." In 2004, Konami released Metal Gear Acid, which combined the stealth game elements of the Metal Gear series with turn-based tactical RPG gameplay of games like Fire Emblem, Final Fantasy Tactics, and Disgaea, along with the random-draw, forethought and resource management appeal of card battles like in Konami's own Yu-Gi-Oh! games (1999 onwards). Developer Kuju Entertainment released Dungeons & Dragons Tactics for the PlayStation Portable in 2007. The game intended to adapt the rules and mechanics of the popular table-top role-playing game, Dungeons & Dragons, but suffered from a poor interface and awkward camera controls. The Atlus title Shin Megami Tensei: Devil Survivor (2009) blended together both traditional and tactical RPG gameplay along with non-linear adventure game elements. It also featured an innovative demon auction system and a death clock system where each character has a specified time of death, with the player's actions and choices having consequences on who lives and dies. Infinite Space (2009) by PlatinumGames, for the Nintendo DS, is a hybrid of tactical role-playing, real-time strategy and space simulator elements, and features a non-linear branching narrative with numerous choices that can have dramatic consequences, and an epic scale spanning hundreds of planets. Radiant Historia, released by Atlus for the Nintendo DS in 2010, combined the gameplay of traditional RPG titles with a highly tactical grid combat system, with several unique features such as a queue allowing party members to switch turns and perform combo attacks when near each other on the queue, and the manipulation of enemy positions by knocking a target onto another grid space and attack multiple targets when enemies fall onto the same grid space. The game is most notable for its unique take on the concept of non-linear branching storylines, which it combines with the concepts of time travel and parallel universes, expanding on the Chrono series. Radiant Historia takes it much further by giving players the freedom to travel backwards and forwards through a timeline to alter the course of history, with each of their choices and actions having a major effect on the timeline. The player can return to certain points in history and live through certain events again to make different choices and see different possible outcomes on the timeline. The player can also travel back and forth between two parallel timelines, and can obtain many possible parallel endings. Square Enix's PSP version of Tactics Ogre: Let Us Cling Together, released around the same time, featured a similar "World" system that allows players to revisit key plot points and make different choices to see how the story unfolds differently. Atlus title Growlanser IV: Wayfarer of the Time (2012) features a unique battle system that blends turn-based and real-time strategy. The player controls each character in turn, but the actions play out in real-time. Imageepoch's upcoming Saigo no Yakusoku no Monogatari (Final Promise Story) for the PlayStation Portable has a strategic command-based battle system where enemies learn from previous skirmishes. The characters can also die permanently during gameplay which in turn affects the game's storyline. Western personal computers Many Western PC games have utilized this genre for years, as well. Western games tend to have stronger military themes, without many of the fantasy elements often found in their console (and mainly Japanese) counterparts; as well as greater freedom of movement when interacting with the surrounding environment. Notable examples include the Jagged Alliance series (1994-2018) and the Silent Storm series (2003-2005), with many titles owing considerably to the X-COM series (1994-2016) of strategy games. In fact, Western PC games in the genre were largely defined by X-COM in much the same way as Eastern console games were by Fire Emblem. 1990s Incubation: Time Is Running Out (1997), part of the Battle Isle series, was one of the first strategy titles to use fully 3D graphics and support hardware acceleration on the 3dfx Voodoo. Other titles in the series are mainly tactical wargames featuring vehicle combat and base capturing. The game was generally well received by critics. Gorky 17 (1999, a.k.a. Odium) is a tactical RPG by Polish developer Metropolis Software featuring elements of survival horror. It is also the first title in a series featuring the main character, Cole Sullivan. Later titles in the series were third-person shooters. The game's reception was mixed. Vantage Master is a series of tactical RPGs similar to Master of Monsters developed and published by Nihon Falcom for Microsoft Windows, beginning in 1997. The first game in the series was never released outside Japan, South Korea and Taiwan. The latest game, Vantage Master Portable, was announced for the PSP on December 20, 2007, and released on April 24, 2008. Jagged Alliance is tactical turn-based RPG series developed by Sir-Tech Canada. First game was released in 1995, second in 1999. 2000s Shadow Watch (2000) is a video game adaptation of the Tom Clancy's Power Plays novel of the same name developed by Red Storm Entertainment. It has also been compared to X-COM, though it features a different action point system and is missing the latter game's upgradable units. The game's reception was mixed. Fallout Tactics: Brotherhood of Steel (2001) is a spin-off of the Fallout series of CRPGs by Interplay Entertainment developed by Australian company Micro Forté. Unusual for the genre is the option to choose between real-time and turn-based play, or between "Continuous Turn-Based Mode" (CTB), "Individual Turn-Based Mode" (ITB), and "Squad Turn-Based Mode" (STB) modes as the developers put it. The game even allows the player to switch modes in the middle of play. The game received generally favorable reviews from critics, though was not as well-received as the series' more traditional RPG titles. Soldiers of Anarchy (2002) is a squad-based real-time tactics computer game by German developer Silver Style Entertainment. Gameplay involves squad tactics, vehicles and a wide variety of weapons and ammunition. The game received mixed reviews from critics. Freedom Force (2002) and its sequel, Freedom Force vs. the Third Reich (2005) - both by Irrational Games - are two examples of comic book superhero tactical RPGs that are played in real-time instead of turns. Both games received favorable reviews from critics. Paradise Cracked (2003), COPS 2170: The Power of Law (2005), Metalheart: Replicants Rampage (2004) and Shadow Vault (2004) are poorly received tactical RPGs by MiST Land South, Akella and Mayhem Studios of Russia and Slovakia, respectively. Paradise Cracked was inspired by cyberpunk works such as The Matrix, Blade Runner, Ghost in the Shell, and Philip K. Dick novels; and Metalheart: Replicants Rampage is a post-apocalyptic cyberpunk tactical RPG inspired by Jagged Alliance, Syndicate, and Fallout. COPS 2170: The Power of Law is set in the same "Reality 4.13" universe that first appeared in Paradise Cracked. Hammer & Sickle (2005) is a tactical RPG co-developed by Russian companies Novik & Co and Nival Interactive, and published by CDV. It is set in the Silent Storm universe and follows the events in the main series. After this came Night Watch (2006) and its sequel, Day Watch (2007), also by Nival Interactive, but instead based on the Russian novels and films of the same name. All three games received mediocre-to-poor review scores despite utilizing the highly regarded Silent Storm engine. Other titles inspired by Jagged Alliance include Brigade E5: New Jagged Union (2006) and its sequel, simply titled 7.62 (2007), by Russian developer Apeiron; Hired Guns: The Jagged Edge (2007) by GFI Russia; and Jagged Alliance: Back in Action by bitComposer Games. The Brigade E5 series incorporates an innovative hybrid real-time system the company calls "Smart Pause Mode" in an attempt to heighten realism; Hired Guns: The Jagged Edge began its life as Jagged Alliance 3D before Strategy First withdrew the rights to the series name; and Jagged Alliance: Back in Action is a 3D, real-time remake of Jagged Alliance 2. Lastly, Jagged Alliance: Flashback was released in 2014 following a successful Kickstarter. The developer Full Control gained notoriety, however, for feuding with its backers, and the company stopped making games shortly thereafter. Additional titles inspired by X-COM include UFO: Aftermath (2003), UFO: Aftershock (2005), UFO: Afterlight (2007) and UFO: Extraterrestrials (2007) by Czech developers ALTAR Interactive and Chaos Concept; as well as Xenonauts (2014) by Goldhawk Interactive. ALTAR's UFO series features real-time play; Chaos Concept's UFO: Extraterrestrials received only mixed reviews; and Xenonauts currently has a "Very Positive" rating on Steam. The open source, cross-platform X-COM-clone UFO: Alien Invasion is also under development. The Battle for Wesnoth (2005) is another Master of Monsters and Warsong clone, released under an open source license for multiple platforms. It also is continually updated. 2010s The tactical isometric cyberpunk/fantasy RPG, Shadowrun Returns (2013), was funded via a successful crowd-sourced Kickstarter campaign that raised a total of $1.9 million for development. The game is based on the popular Shadowrun pen-and-paper setting by Jordan Weisman, and features tactical combat in a world filled with cybernetics, magic and fantasy creatures. Two sequels, Shadowrun: Dragonfall (2014) and Shadowrun: Hong Kong (2015) quickly followed. An online tactical game not directly related to the previous three games, Shadowrun Chronicles: Boston Lockdown, was released to less-than-positive reviews in 2015. In 2014 the tactical RPG Blackguards based on the German The Dark Eye pen-and-paper setting was released to mixed or average reviews. A sequel, Blackguards 2, was released in 2015. 2015 saw the release of Invisible, Inc. for OS X, Windows and Linux. It has been described as a "tactical RPG that mixes stealth with procedural generation", since it introduces elements of espionage and roguelike gameplay. It received generally favorable scores from reviewers. A version for the PlayStation 4 and Nintendo Switch has been released. In March 2017 the German indie developer Overhype Studios released its tactical RPG Battle Brothers out of Early Access to generally favorable reviews. This mercenary company simulation was described as a "cleverly constructed, carefully balanced board game". Genre blurring Other games combine similar mechanics, but typically belong in other genres. Tactical wargames such as the Steel Panthers series (1995–2006) sometimes combine tactical military combat with RPG-derived unit advancement. Avalon Hill's Squad Leader (2000), a man-to-man wargame utilizing the Soldiers at War engine, has also been compared (unfavorably) to X-COM and Jagged Alliance. Rebelstar (1984) and Laser Squad (1988) were precursors to X-COM created by the same developer, Julian Gollop. They did not, however, feature the statistical character development and strategic map of the later series. Bokosuka Wars (1983), a game regarded as the progenitor of the strategy/simulation RPG genre, is also difficult to clearly define. While often referred to as a strategy/simulation RPG, it is also sometimes referred to as a prototype real-time strategy, an early reverse tower defense game, and an early action role-playing game. Nobunaga's Ambition (1983) and later Koei titles as well as Capcom's Destiny of an Emperor (1989) have blurred the line between a role-playing game, turn-based grand strategy wargame, and simulation video game. Similarly, Kure Software Koubou's Silver Ghost (1988) combined elements of both tactical RPGs and action RPGs, while Ogre Battle: March of the Black Queen (1993) blurred the line between a tactical RPG and a real-time strategy. Metal Gear Acid (2004) blurs the line between a stealth game, a genre the Metal Gear series is normally known for, along with tactical role-playing inspired by the likes of Fire Emblem and Final Fantasy Tactics, infused with card gameplay found in games like Konami's own Yu-Gi-Oh! series. In addition to a turn-based tactical combat layer, the X-COM series also possesses a real-time 3D strategic layer, complete with global defensive map as well as a technology tree that the player must research in order to unlock new weapons and armor. Jagged Alliance 2 features a country sector map with fortified towns and roving bands of enemies that must be defeated before entering the capital city of Meduna. Knights in the Nightmare (2009) combines elements of traditional tactical RPGs with bullet hell–style shoot 'em up gameplay. Sega's Valkyria Chronicles (2008) blurs the line even further by incorporating tactical RPG gameplay with both real-time strategy and third-person tactical shooter elements, including over-the-shoulder manual aiming and a cover system. This has led to the game being described by one source as "the missing link between Final Fantasy Tactics and Full Spectrum Warrior." In an interview with Eurogamer, X-COM developer Julian Gollop mentioned how surprised he was how close Valkyria Chronicles was in design to his cancelled game Dreamland Chronicles. Infinite Space (2009) by PlatinumGames is a hybrid of tactical RPG, real-time strategy, and space simulator. The 3rd Birthday (2010), the third game in the Parasite Eve series, features a unique blend of action role-playing game, real-time tactical RPG, survival horror and third-person tactical shooter elements. Dead State (2014) is a turn-based RPG developed by DoubleBear Productions and Iron Tower Studios set in a zombie apocalypse scenario. Players are tasked with leading a group of survivors living in a shelter in the fictional town of Splendid, Texas. Dead State mixes tactical combat and RPG character development with survival horror and base management elements. An "enhanced edition" was released in 2015 under the name, Dead State: Reanimated. Full-fledged CRPGs A number of "full-fledged" computer role-playing games could also be described as having "tactical combat". Examples from the classic era of CRPGs include parts of the aforementioned Ultima series beginning with Ultima III: Exodus (1983); SSI's Wizard's Crown (1985) and The Eternal Dagger (1987); the Realms of Arkania (1992-1996) series based on the German The Dark Eye pen-and-paper system; and the Gold Box games of the late '80s and early '90s—many of which were later ported to Japanese video game systems. Other examples include Troika Games' The Temple of Elemental Evil (2003), which features a highly accurate implementation of the Dungeons & Dragons 3.5 edition ruleset; Knights of the Chalice (2009), which implements the d20 Open Game License; and Pyrrhic Tales: Prelude to Darkness (2002), an open world RPG featuring one continuous game world. More recent examples include Wasteland 2 (2014), Divinity: Original Sin (2014) and The Age of Decadence (2015). Partly due to the success of Wasteland 2, Divinity: Original Sin, Shadowrun: Dragonfall, Blackguards and Dead State, 2014 has been labeled "the first year of the CRPG renaissance". Tir-nan-óg (beginning in 1984) is a series of role-playing video games that premiered in Japan on the PC98 and later released for Windows. The latest title in the series is also being released for the PlayStation 2 and PSP. Heroes of Jin Yong (1996), a Chinese role-playing game based on the popular historical Wuxia novels by Jin Yong, features a number of melee and ranged kung fu skills to train and develop, as well as a grid-based battle system. A remake of the game under the title of Tale of Wuxia was released in Chinese in 2015, and later on Steam in both Chinese and English in 2016. Massively multiplayer online gaming Several massively multiplayer online games (MMOs) have combined multiplayer online gaming with tactical turn-based combat. Examples include, Dofus (2005), The Continuum (2008), as well as the Russian game Total Influence Online (2009?). Tactica Online was a planned MMORPG that would have featured tactical combat, had development not been cancelled in 2006. Gunrox (2008), Poxnora (2006) and Wakfu (2012) are some other recent examples. Popularity Many tactical RPGs can be both extremely time-consuming and extremely difficult. Hence, the appeal of most tactical RPGs is to the hardcore, not casual, computer and video game player. Traditionally, tactical RPGs have been quite popular in Japan but have not enjoyed the same degree of success in North America and elsewhere. However, the audience for Japanese tactical RPGs has grown substantially in the West since the mid-90s, with PS1 and PS2 titles such as Final Fantasy Tactics, Suikoden Tactics, Vanguard Bandits and Disgaea enjoying a surprising measure of popularity outside Japan. Further, older Japanese tactical RPGs are also being re-released via software emulation—such as on the Wii's Virtual Console—as well as on handheld systems, giving these games a new lease on life. However, in the 2000s, some developers complained it was becoming increasingly difficult to develop games of this type (though several had been developed in Eastern Europe with limited success); and even some developers were beginning to complain about a supposed bias against turn-based systems. Reasons cited include publishers' focus on developing real-time, action-oriented games; as well as a perception that games with turn-based mechanics were "too niche" to become successful. However, things may have turned around in the 2010s, at least in the West. A few high-profile titles, such as 2K Games' strategy video games, XCOM: Enemy Unknown and XCOM 2—as well as a number of Kickstarter-funded RPGs, such as Larian's Divinity: Original Sin, inXile's Wasteland 2 and Harebrained Schemes' Shadowrun Returns—were successfully developed and published in recent years, in part due to new means of funding and distributing them. According to Dan Tudge of n-Space, "The resurgence of tactical-isometric RPGs has a lot to do with accessibility. ... Changes in the ecosystem like Steam and digital distribution have made it easier than ever for developers to connect with players." See also History of role-playing video games Role-playing battle systems List of tactical role-playing video games Notes References Video game genres Video game terminology
17800413
https://en.wikipedia.org/wiki/Satellite%20navigation%20device
Satellite navigation device
A satellite navigation device, colloquially called a GPS receiver, or simply a GPS, is a device that is capable of receiving information from GNSS satellites and then calculate the device's geographical position. Using suitable software, the device may display the position on a map, and it may offer routing directions. The Global Positioning System (GPS) is one of a handful of global navigation satellite systems (GNSS) made up of a network of a minimum of 24, but currently 30, satellites placed into orbit by the U.S. Department of Defense. GPS was originally developed for use by the United States military, but in the 1980s, the United States government allowed the system to be used for civilian purposes. Though the GPS satellite data is free and works anywhere in the world, the GPS device and the associated software must be bought or rented. A satellite navigation device can retrieve (from one or more satellite systems) location and time information in all weather conditions, anywhere on or near the Earth. GPS reception requires an unobstructed line of sight to four or more GPS satellites, and is subject to poor satellite signal conditions. In exceptionally poor signal conditions, for example in urban areas, satellite signals may exhibit multipath propagation where signals bounce off structures, or are weakened by meteorological conditions. Obstructed lines of sight may arise from a tree canopy or inside a structure, such as in a building, garage or tunnel. Today, most standalone GPS receivers are used in automobiles. The GPS capability of smartphones may use assisted GPS (A-GPS) technology, which can use the base station or cell towers to provide a faster Time to First Fix (TTFF), especially when GPS signals are poor or unavailable. However, the mobile network part of the A-GPS technology would not be available when the smartphone is outside the range of the mobile reception network, while the GPS aspect would otherwise continue to be available. The Russian Global Navigation Satellite System (GLONASS) was developed contemporaneously with GPS, but suffered from incomplete coverage of the globe until the mid-2000s. GLONASS can be added to GPS devices to make more satellites available and enabling positions to be fixed more quickly and accurately, to within 2 meters. Other satellite navigation services with global coverage are the European Galileo and the Chinese BeiDou. Automotive navigation system Using satellite information and subject to the sophistication of installed software, a GPS device used as an automobile navigation system may be used in a number of contexts, including: maps, including street maps, displayed in human-readable format via text or in a graphical format, turn-by-turn navigation directions to a human in charge of a vehicle or vessel via text or speech, directions fed directly to an autonomous vehicle such as a robotic probe, traffic congestion maps (depicting either historical or real-time data) and suggested alternative directions, information on nearby amenities such as restaurants, fueling stations, and tourist attractions. Navigation devices may be able to indicate: the roads or paths available, traffic congestion and alternative routes, roads or paths that might be taken to get to the destination, if some roads are busy (now or historically) the best route to take, The location of food, banks, hotels, fuel, airports or other places of interests, the shortest route between the two locations, the different options to drive on highway or back roads. History As with many other technological breakthroughs of the latter 20th century, the modern GNSS system can reasonably be argued to be a direct outcome of the Cold War of the latter 20th century. The multibillion-dollar expense of the US and Russian programs was initially justified by military interest; on the contrary the European Galileo was conceived as purely civilian. In 1960, the US Navy put into service its Transit satellite based navigation system to aid in naval navigation. The US Navy in the mid-1960s conducted an experiment to track a submarine with missiles with six satellites and orbiting poles and was able to observe satellite changes. Between 1960 and 1982, as the benefits were shown, the US military consistently improved and refined its satellite navigation technology and satellite system. In 1973, the US military began to plan for a comprehensive worldwide navigational system which eventually became known as the GPS (global positioning system). In 1983, in the wake of the tragedy of the downing of the Korean Airlines Flight 007, an aircraft which was shot down while in Soviet airspace due to a navigational error, President Reagan made the navigation capabilities of the existing military GPS system available for dual civilian use. However, civilian use was initially only a slightly degraded "Selective Availability" positioning signal. This new availability of the US military GPS system for civilian use required a certain technical collaboration with the private sector for some time, before it could become a commercial reality. In 1989, Magellan Navigation Inc. unveiled its Magellan NAV 1000, the world's first commercial handheld GPS receiver. These units initially sold for approximately US$2,900 each. In 2000, the Clinton administration removed the military use signal restrictions, thus providing full commercial access to the US GPS satellite system. In 1990, Mazda's Eunos Cosmo was the first production car in the world with a built-in GPS navigation system. In 1991, Mitsubishi introduced GPS car navigation on the Mitsubishi Debonair (MMCS: Mitsubishi Multi Communication System). In 1997, a navigation system using Differential GPS was developed as a factory-installed option on the Toyota Prius. As GPS navigation systems became more and more widespread and popular, the pricing of such systems began to fall, and their widespread availability steadily increased. Also, several additional manufacturers of these systems, such as Garmin (1991), Benefon (1999), Mio (2002) and TomTom (2002) entered the market. Mitac Mio 168 was the first PocketPC to contain a built-in GPS receiver. Benefon's 1999 entry into the market also presented users with the world's first phone based GPS navigation system. Later, as smartphone technology developed, a GPS chip eventually became standard equipment for most smartphones. To date, ever more popular satellite navigation systems and devices continue to proliferate with newly developed software and hardware applications. It has been incorporated, for example, into cameras. While the American GPS was the first satellite navigation system to be deployed on a fully global scale, and to be made available for commercial use, this is not the only system of its type. Due to military and other concerns, similar global or regional systems have been, or will soon be deployed by Russia, the European Union, China, India, and Japan. GNSS have made many strides into today's world. It can now help out in things such as parents now using GNSS devices to attach to their kids to monitor their movement and always know their location. Also helps out with detecting the movements and behavior of animals and also helps officers with car chases and not having to chase exactly behind a criminal and lastly using GPS bullets to catch criminals. The Macrometer Interferometric Surveyor was the first commercial GPS-based system for performing geodetic measurements. Sensitivity GNSS devices vary in sensitivity, speed, vulnerability to multipath propagation, and other performance parameters. High Sensitivity receivers use large banks of correlators and digital signal processing to search for signals very quickly. This results in very fast times to first fix when the signals are at their normal levels, for example outdoors. When signals are weak, for example indoors, the extra processing power can be used to integrate weak signals to the point where they can be used to provide a position or timing solution. GNSS signals are already very weak when they arrive at the Earth's surface. The GPS satellites only transmit 27 W (14.3 dBW) from a distance of 20,200 km in orbit above the Earth. By the time the signals arrive at the user's receiver, they are typically as weak as −160 dBW, equivalent to one-tenth of a million-billionth of a watt (100 attowatts). This is well below the thermal noise level in its bandwidth. Outdoors, GPS signals are typically around the −155 dBW level (−125 dBm). Conventional GPS receivers integrate the received GPS signals for the same amount of time as the duration of a complete C/A code cycle which is 1 ms. This results in the ability to acquire and track signals down to around the −160 dBW level. High Sensitivity GPS receivers are able to integrate the incoming signals for up to 1,000 times longer than this and therefore acquire signals up to 1,000 times weaker, resulting in an integration gain of 30 dB. A good High Sensitivity GPS receiver can acquire signals down to −185 dBW, and tracking can be continued down to levels approaching −190 dBW. High Sensitivity GPS can provide positioning in many but not all indoor locations. Signals are either heavily attenuated by the building materials or reflected as in multipath. Given that High Sensitivity GPS receivers may be up to 30 dB more sensitive, this is sufficient to track through 3 layers of dry bricks, or up to 20 cm (8 inches) of steel-reinforced concrete for example. Examples of high sensitivity receiver chips include SiRFstarIII and MediaTekʼs MTK II. Consumer applications Consumer GNSS navigation devices include: Dedicated GNSS navigation devices modules that need to be connected to a computer to be used loggers that record trip information for download. Such GPS tracking is useful for trailblazing, mapping by hikers and cyclists, and the production of geocoded photographs. Converged devices, including GPS Phones and GPS cameras, in which GNSS is a feature rather than the main purpose of the device. The majority of GNSS devices are now converged devices, and may use assisted GPS or standalone (not network dependent) or both. The vulnerability of consumer GNSS to radio frequency interference from planned wireless data services is controversial. Dedicated GNSS navigation devices Dedicated devices have various degrees of mobility. Hand-held, outdoor, or sport receivers have replaceable batteries that can run them for several hours, making them suitable for hiking, bicycle touring and other activities far from an electric power source. Their design is ergonomical, their screens are small, and some do not show color, in part to save power. Some use transflective liquid-crystal displays, allowing use in bright sunlight. Cases are rugged and some are water-resistant. Other receivers, often called mobile are intended primarily for use in a car, but have a small rechargeable internal battery that can power them away from the car. Special purpose devices for use in a car may be permanently installed and depend entirely on the automotive electrical system. Many of them have touch-sensitive screens as input method. Maps may be stored on a memory card. Some offer additional functionality such as a rudimentary music player, image viewer, and video player. The pre-installed embedded software of early receivers did not display maps; 21st-century ones commonly show interactive street maps (of certain regions) that may also show points of interest, route information and step-by-step routing directions, often in spoken form with a feature called "text to speech". Manufacturers include: Navman products TomTom products Garmin products Mio products Navigon products Magellan Navigation consumer products Satmap Systems Ltd TeleType products Integration with smartphones Almost all smartphones now incorporate GNSS receivers. This has been driven both by consumer demand and by service suppliers. There are now many phone apps that depend on location services, such as navigational aids, and multiple commercial opportunities, such as localised advertising. In its early development, access to user location services was driven by European and American emergency services to help locate callers. All smartphone operating systems offer free mapping and navigational services that require a data connection; some allow the pre-purchase and downloading of maps but the demand for this is diminishing as data connection reliant maps can generally be cached anyway. There are many navigation applications and new versions are constantly being introduced. Major apps include Google Maps Navigation, Apple Maps and Waze, which require data connections, iGo for Android, Maverick and HERE for Windows Phone, which use cached maps and can operate without a data connection. Consequently, almost any smartphone now qualifies as a personal navigation assistant. The use of mobile phones as navigational devices has outstripped the use of standalone GPS devices. In 2009, independent analyst firm Berg Insight found that GPS-enabled GSM/WCDMA handsets in the USA alone numbered 150 million units, against the sale of only 40 million standalone GPS receivers. Assisted GPS (A-GPS) uses a combination of satellite data and cell tower data to shorten the time to first fix, reduce the need to download a satellite almanac periodically and to help resolve a location when satellite signals are disturbed by the proximity of large buildings. When out of range of a cell tower the location performance of a phone using A-GPS may be reduced. Phones with an A-GPS based hybrid positioning system can maintain a location fix when GPS signals are inadequate by cell tower triangulation and WiFi hotspot locations. Most smartphones download a satellite almanac when online to accelerate a GPS fix when out of cell tower range. Some, older, Java-enabled phones lacking integrated GPS may still use external GPS receivers via serial or Bluetooth) connections, but the need for this is now rare. By tethering to a laptop, some phones can provide localisation services to a laptop as well. Palm, pocket and laptop PC Software companies have made available GPS navigation software programs for in-vehicle use on laptop computers. Benefits of GPS on a laptop include larger map overview, ability to use the keyboard to control GPS functions, and some GPS software for laptops offers advanced trip-planning features not available on other platforms, such as midway stops, capability of finding alternative scenic routes as well as only highway option. Palms and Pocket PC's can also be equipped with GPS navigation. A pocket PC differs from a dedicated navigation device as it has an own operating system and can also run other applications. GPS modules Other GPS devices need to be connected to a computer in order to work. This computer can be a home computer, laptop, PDA, digital camera, or smartphones. Depending on the type of computer and available connectors, connections can be made through a serial or USB cable, as well as Bluetooth, CompactFlash, SD, PCMCIA and the newer ExpressCard. Some PCMCIA/ExpressCard GPS units also include a wireless modem. Devices usually do not come with pre-installed GPS navigation software, thus, once purchased, the user must install or write their own software. As the user can choose which software to use, it can be better matched to their personal taste. It is very common for a PC-based GPS receiver to come bundled with a navigation software suite. Also, GPS modules are significantly cheaper than complete stand-alone systems (around €50 to €100). The software may include maps only for a particular region, or the entire world, if software such as Google Maps are used. Some hobbyists have also made some GPS devices and open-sourced the plans. Examples include the Elektor GPS units. These are based around a SiRFstarIII chip and are comparable to their commercial counterparts. Other chips and software implementations are also available. Aviators Aviators use GPS to increase their ability to keep safety up to par and also to maintain the efficiency of the flight. A GPS navigation system can help aviators always know their position and its surroundings in all of its phases starting from its departure all the way to its landing point. Also, a GPS now allows an aviator from start to finish not to have to depend on ground infrastructures and allows them to be able to have a preferred route from its departure and landing point, but not only do they play a part in preferred routes they also help in airports that lack ground-based navigation and surveillance equipment. With the use of a GPS for aviators, it saves time and money being used on fuel. More efficient air routes are continuing to expand every day. There are now some GPS units that allow aviators to get a clearer look in areas where the satellite is augmented to be able to have safe landings in bad visibility conditions. There have now been two new signals made for GPS, the first being made to help in critical conditions in the sky and the other will make GPS more of a robust navigation service. Many aviator services have now made it a required service to use a GPS. Commercial aviation applications include GPS devices that calculate location and feed that information to large multi-input navigational computers for autopilot, course information and correction displays to the pilots, and course tracking and recording devices. Military Military applications include devices similar to consumer sport products for foot soldiers (commanders and regular soldiers), small vehicles and ships, and devices similar to commercial aviation applications for aircraft and missiles. Examples are the United States military's Commander's Digital Assistant and the Soldier Digital Assistant. Prior to May 2000 only the military had access to the full accuracy of GPS. Consumer devices were restricted by selective availability (SA), which was scheduled to be phased out but was removed abruptly by President Clinton. Differential GPS is a method of cancelling out the error of SA and improving GPS accuracy, and has been routinely available in commercial applications such as for golf carts. GPS is limited to about 15 meter accuracy even without SA. DGPS can be within a few centimeters. Sequential receivers A sequential GPS receiver tracks the necessary satellites by typically using one or two hardware channels. The set will track one satellite at a time, time tag the measurements and combine them when all four satellite pseudoranges have been measured. These receivers are among the least expensive available, but they cannot operate under high dynamics and have the slowest time-to-first-fix (TTFF) performance. Mishaps GPS maps and directions are occasionally imprecise. Some people have gotten lost by asking for the shortest route, like a couple in the United States who were looking for the shortest route from South Oregon to Jackpot, Nevada. In August 2009 a young mother and her six-year-old son became stranded in Death Valley after following GPS directions that led her up an unpaved dead-end road. When they were found five days later, her son had died from the effects of heat and dehydration. In May 2012, Japanese tourists in Australia were stranded when traveling to North Stradbroke Island and their GPS receiver instructed them to drive into Moreton Bay. In 2008 a GPS sent a softball team bus into a 9 ft tunnel slicing off the top of the bus and the whole team was hospitalized. A man named Brad Preston from Oregon City, Oregon has been experiencing troubles with GPS for a while. He says five to eight times a week people pull into his driveway because on a GPS it shows a street through his property. John and Starry Rhodes, a couple from Reno, Nevada were driving home from Oregon when they started to see there was a lot of snow in the area but thought to keep going because they were already on the road for 30 miles. But really the GPS led them to a road that was not plowed in the Oregon forest and they were stuck for 3 days. A woman named Mary Davis was driving in an unfamiliar place when her GPS told her to make a right turn onto a train track while there was a train coming down. Mary was lucky there was a local police officer who noticed the situation and urged her quickly to get out of the car as fast as she could. Mary was lucky enough to get out of the car leaving it for the train to hit it and totaling it. The officer commented after and said there was a very good chance that they could have had a fatality on their hands. Other hazards involve an alley being listed as a street, a lane being identified as a road, or rail tracks as a road. Obsolete maps sometimes cause the unit to lead a user on an indirect, time-wasting route, because roads may change over time. Smartphone GPS information is usually updated automatically, and free of additional charge. Manufacturers of separate GPS devices also offer map update services for their merchandise, usually for a fee. Privacy concerns User privacy may be compromised if GPS receivers in handheld devices such as mobile phones upload user geo-location data through associated software installed on the device. User geo-location is currently the basis for navigational apps such as Google Maps, location-based advertising, which can promote nearby shops and may allow an advertising agency to track user movements and habits for future use. Regulatory bodies differ between countries regarding the treatment of geo-location data as privileged or not. Privileged data cannot be stored, or otherwise used, without the user's consent. GPS vehicle tracking systems allow employers to track their employees' location raising questions regarding violation of employee privacy. There are cases where employers continued to collect geo-location data when an employee was off duty in private time. Rental car services may use the same technique to geo-fence their customers to the areas they have paid for, charging additional fees for violations. In 2010, New York Civil Liberties Union filed a case against the Labor Department for firing Michael Cunningham after tracking his daily activity and locations using a GPS device attached to his car. Private investigators use planted GPS devices to provide information to their clients on a target's movements. See also Comparison of web map services Dashcam Defense Advanced GPS Receiver Head unit GPS watch Precision Lightweight GPS Receiver Radio clock Turn-by-turn navigation References Global Positioning System Consumer electronics Navigational equipment device 20th-century inventions
3104642
https://en.wikipedia.org/wiki/Snarestone
Snarestone
Snarestone is a small rural village in North West Leicestershire, England. It lies on the edge of the National Forest and is from the market town of Ashby-de-la-Zouch. It has a population of approximately 300 people and 120 households, increasing to a population of 312 in 128 households at the 2011 census. The village is surrounded by farmland and open countryside. It is positioned at the foot of a slight hill that gently rises to a height of 115 metres. Other topographical features include the River Mease and the terminus for the Ashby Canal. Both of these waterways are sites of special scientific interest (SSSI). Based on the 2011 census data, it is the centre of population density for the island of Great Britain. Village Features Although Snarestone is a Leicestershire village it has a Derby postcode and is from the county boundary of North Warwickshire. The village has an active Parish Council that meets throughout the year and publishes a regular newsletter. Snarestone's amenities include two public houses, a primary school, a church, a blacksmiths, an antique reclamation yard, an allotment, a post box and a traditional red telephone kiosk. The village has various types of housing from thatched roof cottages, semi-detached houses, self-contained flats to large detached properties, complete with private tennis courts. Most settlements in the village extend along Main Road and Quarry Lane. There is another minor road (Derby Lane) that connects to neighbouring Shackerstone. The village is served by an ADSL enabled telephone exchange that is capable of providing broadband access to the internet at speeds of up to 80 Mbit/s. Refuse and recycling collections take place on a bi-weekly rota and a mobile public library makes regular stops in the village on alternate Fridays. A mobile fish and chip van also visits the village on Thursday evenings. An ATM cash machine is housed in the Globe Pub and the nearest supermarkets are located away in Measham. Snarestone's other public house (the Odd House) is located at the very top of Main Road and offers overnight accommodation. The area to the south of Snarestone is Crown Estate land and belongs to (but is not the private property of) the British Monarch. Much of this land is agricultural and is the site of a former Georgian country house (Gopsall Hall). It is reputed that George Frideric Handel composed his Messiah oratorio here in 1741. Transport Snarestone is from junction 11 of the M42 motorway and is less than from the five surrounding cities of Birmingham, Leicester, Nottingham, Coventry, and Derby. Other nearby roads include the A444 that runs to Coventry and the B4116 Ashby Road to Atherstone. East Midlands Airport is situated to the north and Birmingham Airport lies to the south. There is also a bus from Measham to Fenny Drayton which runs through Snarestone and provides connections to Shackerstone, Atherstone and Twycross. The bus though is not frequent with only 6 services both ways each day except Sunday. There was also a railway station on the Ashby and Nuneaton Joint Railway but it was closed in 1931 and to freight in 1970. The nearest railway stations are Atherstone, Hinckley and Leicester. There is also a section of the former line still open from Shackerstone to Shenton via Market Bosworth known as the Battlefield Line. There was at one time interest expressed to reopen a new station at Snarestone on the Battlefield Line to serve Measham and the newly restored Ashby Canal. This has since been abandoned due to costs and the land being privately owned. Only the goods shed and station masters house remain as private residence. Ashby Canal Snarestone is linked via the Ashby Canal to the national network of canals. The canal crosses through the village and terminates in fields just to the north. The canal meanders through a gentle rural landscape and is free of locks. The canal is popular with leisure boaters, anglers and wildlife enthusiasts. Hedgerows and reeds offer an ideal habitat for many species of plant and animal including herons, kingfishers, moorhens as well as numerous coarse fish including bream, roach, chub and pike. A stretch of the canal between Snarestone and Carlton has been designated a Site of Special Scientific Interest (SSSI), mainly because of the aquatic plant life and varieties of dragonfly attracted to the area. In 2005 the Government approved plans to restore a stretch of the canal to provide Snarestone with a green route into the heart of the National Forest. The proposals also include a canalside wharf for the new terminus at Measham. Events and Attractions The quiet lanes and canal paths that surround Snarestone are popular with walkers, ramblers and cyclists. A long distance trail (the Ivanhoe Way) also crosses through the village and runs for 35 miles through the Leicestershire countryside. Every year in November the Globe Inn hosts a large bonfire and firework display to celebrate Guy Fawkes Night. The event has gained local popularity and attracts many visitors from outside the village. In the Spring and Autumn the residents of Snarestone often race rubber ducks on a nearby stream to raise funds for village improvements. Most years the villagers also organise a summer fete with street parades and various entertainments (the last one took place in 2007). Other nearby attractions include Twycross Zoo, Ashby de la Zouch Castle, Conkers Visitor Centre, Snibston Discovery Park, Bosworth Battlefield, Ashby Woulds Heritage Trail, the National Forest and a railway preservation society (The Battlefield Line) that has its own rolling stock, museum and track. Every February during half-term locals of the village perform an amateur pantomime at the primary school. The money raised goes towards charity. For 2010 the money was donated to the Haiti Appeal. Brief history The village appears in the Domesday Book as Snarchetone and was the farmstead of a man called Snar(o)c. At the time of Domesday Snarestone amounted to a single carucate of waste land. This small area of land was held in 1086 by Robert the Dispensator (or Robert the Bursar). Robert was steward to William the Conqueror and the land was granted by Robert's successor (Henry de Hastynges) to an Adam Stake. At some time during the thirteenth century the land passed to the Charnell family who held it for the following five centuries. The estate was partitioned in 1796, and half came to Charles Powell Leslie II via his wife Anne (née Ryder). The other half came to Colonel Samuel Madden via his marriage to Katherine (née Ryder). Snarestone was sold some time after Madden's death in 1814 (probably in the 1830s after the death of his father-in-law, the Rev. Charles Dudley Ryder). Snarestone passed in 1846 to Lady Anna Maria Leslie. Snarestone's chief crops were wheat and barley. Bricks were made in the village during the nineteenth century and a coal mine was sunk in 1875 but found only water. The Ashby Canal opened in 1804 and still runs underneath a section of Main Street (formerly Long Street) via a 400-yard (366 m) tunnel. By 1846 Snarestone had a population of 404 people. The Census of 1891 recorded 302 people and by 1901 this figured had dropped to only 265 people. The village church is dedicated to St. Bartholomew and has a register dating back to 1559. The church was rebuilt in 1752 and enlarged in 1834 to a capacity of 150 sittings. In 1766 there were four alehouses in Snarestone. Records from 1772 reveal that George Gadsby was the landlord of a Crown Inn but the names of the other alehouses is not known. By 1785 the village had two pubs and by 1795 the Crown Inn was the only survivor of these early establishments. The Gadsby family had a long association with the Crown Inn that lasted until 1820. The pub still exists today as the Odd House.George Gadsby (pub landlord) was the only son of George Gadsby (died 1748) who inherited the family farm and later diversified into becoming a pub landlord. Originally the Gadsby family were yeomen who had lived in Snarestone for generations. George (pub landlord) had six sisters, one of whom was Hannah Foster who married local farmer Frances Foster of Appleby Magna, both of whom are buried in the graveyard with an existing headstone. Richard Roberts is also recorded as the landlord of the Square and Compass between 1855 and 1861 but its history is obscure. The Globe Inn first appears in the trade directories from 1870 onwards and still operates under the same name. Railway Past Between 1873 and 1967 Snarestone was a stop on the Ashby to Nuneaton railway line. The station building no longer exists although evidence of platforms can still be found. The goods shed and station master's house remain but have been converted into private households. Information on the regions railway heritage can be found in The Battlefield Line Museum in neighbouring Shackerstone. The museum contains photographs of Snarestone station prior to its closure in the 1960s. Although the Heritage Battlefield Line hopes to one day (though eventually) extend their services towards Snarestone within the near future, (Even though a new site maybe required as part of this plan). The neighbouring village of Newton Burgoland also claims to have the oldest public house in Leicestershire (The Belper Arms) which was built circa 1290. Nearby Towns Ashby de la Zouch Burton Upon Trent Atherstone Coalville Hinckley Ibstock Market Bosworth Nuneaton Tamworth Surrounding Villages Appleby Magna Barton in the Beans Bilstone Carlton Congerstone Measham Odstone Norton-Juxta-Twycross Newton Burgoland Shackerstone Sheepy Magna Swepstone Twycross See also Battle of Bosworth Field Notes This population estimate is based on figures from the 2001 Census provided by the Office for National Statistics Neighbourhood Statistics website and uses the Snarestone CP (Parish) area which excludes surrounding villages. BBC News Story A Dictionary of British Place-Names. A. D. Mills. Oxford University Press, 2003. Oxford Reference Online. Oxford University Press. Domesday Book The History and Antiquities of Leicester, John Nichols Vol. lV Pt. ll Leicestershire Trade Directories White’s History, Gazetteer and Directory of Leicestershire, William White Leicestershire Census Data, Leicestershire County Records Office Trade Directories, Kelly, Leicestershire Libraries and Information Service Trade Directories, Alehouse Recognizance Books Belper Arms Website References External links 1923 Ordnance Survey map of Snarestone Snarestone Village Website Bosworth Battlefield Centre and Country Park Ashby Canal Restoration Project Executive Summary by Leicestershire County Council Villages in Leicestershire Civil parishes in Leicestershire North West Leicestershire District
176271
https://en.wikipedia.org/wiki/Microsoft%20Outlook
Microsoft Outlook
Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office suite. Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Individuals can use Outlook as a stand-alone application; organizations can deploy it as multi-user software (through Microsoft Exchange Server or SharePoint) for such shared functions as mailboxes, calendars, folders, data aggregation (i.e., SharePoint lists), and appointment scheduling. Microsoft has released apps for most mobile platforms, including iOS and Android. In addition, Windows Phone devices can synchronize almost all Outlook data to Outlook Mobile. Using Microsoft Visual Studio, developers can also build their own custom software that works with Outlook and Office components. In March 2020, Microsoft announced the launch of a series of new features to appeal to business customers of its Teams platform, in addition to the features introduced the previous month. The chat and collaboration module now includes more efficient and integrated way points, designed to simplify group work for organizations and to encourage such an organization to adopt the Microsoft platform to become the go-to company chat-platform. Web applications Outlook.com is a free webmail version of Microsoft Outlook, using a similar user interface. Originally known as Hotmail, it was rebranded as Outlook.com in 2012. Outlook on the web (previously called Exchange Web Connect, Outlook Web Access, and Outlook Web App) is a web business version of Microsoft Outlook, and is included in Office 365, Exchange Server, and Exchange Online. Versions Outlook has replaced Microsoft's previous scheduling and email clients, Schedule+ and Exchange Client. Outlook 98 and Outlook 2000 offer two configurations: Internet Mail Only (aka IMO mode): A lighter application mode with specific emphasis on POP3 and IMAP accounts, including a lightweight Fax application. Corporate Work group (aka CW mode): A full MAPI client with specific emphasis on Microsoft Exchange accounts. Perpetual versions of Microsoft Outlook include: Microsoft Windows Outlook 2002 Outlook 2002 introduced these new features: Autocomplete for email addresses Colored categories for calendar items Group schedules Hyperlink support in email subject lines Native support for Outlook.com (formerly Hotmail) Improved search functionality, including the ability to stop a search and resume it later Lunar calendar support MSN Messenger integration Performance improvements Preview pane improvements, including the ability to: open hyperlinks; respond to meeting requests; and display email properties without opening a message Reminder window that consolidates all reminders for appointments and tasks in a single view Retention policies for documents and email Security improvements, including the automatic blocking of potentially unsafe attachments and of programmatic access to information in Outlook: SP1 introduced the ability to view all non-digitally signed email or unencrypted email as plain text; SP2 allows users to—through the Registry—prevent the addition of new email accounts or the creation of new Personal Storage Tables; SP3 updates the object model guard security for applications that access messages and other items. Smart tags when Word is configured as the default email editor. This option was available only when the versions of Outlook and Word were the same, i.e. both were 2002. Outlook 2003 Outlook 2003 introduced these new features: Autocomplete suggestions for a single character Cached Exchange mode Colored (quick) flags Desktop Alert Email filtering to combat spam Images in HTML mail are blocked by default to prevent spammers from determining whether an email address is active via web beacon; SP1 introduced the ability to block email based on country code top-level domains; SP2 introduced anti-phishing functionality that automatically disables hyperlinks present in spam Expandable distribution lists Information rights management Intrinsic support for tablet PC functionality (e.g., handwriting recognition) Reading pane Search folders Unicode support Outlook 2007 Features that debuted in Outlook 2007 include: Attachment preview, with which the contents of attachments can be previewed before opening Supported file types include Excel, PowerPoint, Visio, and Word files. If Outlook 2007 is installed on Windows Vista, then audio and video files can be previewed. If a compatible PDF reader such as Adobe Acrobat 8.1 is installed, PDF files can also be previewed. Auto Account Setup, which allows users to enter a username and password for an email account without entering a server name, port number, or other information Calendar sharing improvements including the ability to export a calendar as an HTML file—for viewing by users without Outlook—and the ability to publish calendars to an external service (e.g., Office Web Apps) with an online provider (e.g., Microsoft account) Colored categories with support for user roaming, which replace colored (quick) flags introduced in Outlook 2003 Improved email spam filtering and anti-phishing features Postmark intends to reduce spam by making it difficult and time consuming to send it Information rights management improvements with Windows Rights Management Services and managed policy compliance integration with Exchange Server 2007 Japanese Yomi name support for contacts Multiple calendars can be overlaid with one another to assess details such as potential scheduling conflicts Ribbon (Office Fluent) interface Outlook Mobile Service support, which allowed multimedia and SMS text messages to be sent directly to mobile phones Instant search through Windows Search, an index-based desktop search platform Instant search functionality is also available in Outlook 2002 and Outlook 2003 if these versions are installed alongside Windows Search Integrated RSS aggregation Support for Windows SideShow with the introduction of a calendar gadget To-Do Bar that consolidates calendar information, flagged email, and tasks from OneNote 2007, Outlook 2007, Project 2007, and Windows SharePoint Services 3.0 websites within a central location. The ability to export items as PDF or XPS files Unified messaging support with Exchange Server 2007, including features such as missed-call notifications, and voicemail with voicemail preview and Windows Media Player Word 2007 replaces Internet Explorer as the default viewer for HTML email, and becomes the default email editor in this and all subsequent versions. Outlook 2010 Features that debuted in Outlook 2010 include: Additional command-line switches An improved conversation view that groups messages based on different criteria regardless of originating folders IMAP messages are sent to the Deleted Items folder, eliminating the need to mark messages for future deletion Notification when an email is about to be sent without a subject Quick Steps, individual collections of commands that allow users to perform multiple actions simultaneously Ribbon interface in all views Search Tools contextual tab on the ribbon that appears when performing searches and that includes basic or advanced criteria filters Social Connector to connect to various social networks and aggregate appointments, contacts, communication history, and file attachments Spell check-in additional areas of the user interface Support for multiple Exchange accounts in a single Outlook profile The ability to schedule a meeting with a contact by replying to an email message To-Do Bar enhancements including visual indicators for conflicts and unanswered meeting requests Voicemail transcripts for Unified Messaging communications Zooming user interface for calendar and mail views Outlook 2013 Features that debuted in Outlook 2013, which was released on January 29, 2013, include: Attachment reminder Exchange ActiveSync (EAS) Add-in resiliency Cached Exchange mode improvements IMAP improvements Outlook data file (.ost) compression People hub Startup performance improvements Outlook 2016 Features that debuted in Outlook 2016, include: Attachment link to cloud resource Groups redesign Search cloud Clutter folder Email Address Internationalization Scalable Vector Graphics Outlook 2019 Features that debuted in Outlook 2019, include: Focused Inbox Add multiple time zones Listen to your emails Easier email sorting Automatic download of cloud attachments True Dark Mode (version 1907 onward) Macintosh Microsoft also released several versions of Outlook for classic Mac OS, though it was only for use with Exchange servers. It was not provided as a component of Microsoft Office for Mac but instead made available to users from administrators or by download. The final version was Outlook for Mac 2001, which was fairly similar to Outlook 2000 and 2002 apart from being exclusively for Exchange users. Microsoft Entourage was introduced as an Outlook-like application for Mac OS in Office 2001, but it lacked Exchange connectivity. Partial support for Exchange server became available natively in Mac OS X with Entourage 2004 Service Pack 2. Entourage is not directly equivalent to Outlook in terms of design or operation; rather, it is a distinct application that has several overlapping features including Exchange client capabilities. Somewhat improved Exchange support was added in Entourage 2008 Web Services Edition. Entourage was replaced by Outlook for Mac 2011, which features greater compatibility and parity with Outlook for Windows than Entourage offered. It is the first native version of Outlook for MacOS. Outlook 2011 initially supported Mac OS X's Sync Services only for contacts, not events, tasks or notes. It also does not have a Project Manager equivalent to that in Entourage. With Service Pack 1 (v 14.1.0), published on April 12, 2011, Outlook can now sync calendar, notes and tasks with Exchange 2007 and Exchange 2010. On October 31, 2014, Microsoft released Outlook for Mac (v15.3 build 141024) with Office 365 (a software as a service licensing program that makes Office programs available as soon as they are developed). Outlook for Mac 15.3 improves upon its predecessors with: Better performance and reliability as a result of a new threading model and database improvements. A new modern user interface with improved scrolling and agility when switching between Ribbon tabs. Online archive support for searching Exchange (online or on-premises) archived mail. Master Category List support and enhancements delivering access to category lists (name and color) and sync between Mac, Microsoft Windows and OWA clients. Office 365 push email support for real-time email delivery. Faster first-run and email download experience with improved Exchange Web Services syncing. The "New Outlook for Mac" client, included with version 16.42 and above, became available for "Early Insider" testers in the fall of 2019, with a public "Insider" debut in October 2020. It requires macOS 10.14 or greater and introduces a redesigned interface with significantly changed internals, including native search within the client that no longer depends on macOS Spotlight. Some Outlook features are still missing from the New Outlook client as it continues in development. To date, the Macintosh client has never had the capability of syncing Contact Groups/Personal Distribution Lists from Exchange, Microsoft 365 or Outlook.com accounts, something that the Windows and web clients have always supported. A UserVoice post created in December 2019 suggesting that the missing functionality be added has shown a "Planned" tag since October 2020. Phones and tablets First released in April 2014 by the venture capital-backed startup Acompli, the company was acquired by Microsoft in December 2014. On January 29, 2015, Acompli was re-branded as Outlook Mobile—sharing its name with the Microsoft Outlook desktop personal information manager and Outlook.com email service. In January 2015, Microsoft released Outlook for phones and for tablets (v1.3 build) with Office 365. This was the first Outlook for these platforms with email, calendar, and contacts. On February 4, 2015, Microsoft acquired Sunrise Calendar; on September 13, 2016, Sunrise ceased to operate, and an update was released to Outlook Mobile that contained enhancements to its calendar functions. Similar to its desktop counterpart, Outlook mobile offers an aggregation of attachments and files stored on cloud storage platforms; a "focused inbox" highlights messages from frequent contacts, and calendar events, files, and locations can be embedded in messages without switching apps. The app supports a number of email platforms and services, including Outlook.com, Microsoft Exchange and Google Workspace (formerly G Suite) among others. Outlook mobile is designed to consolidate functionality that would normally be found in separate apps on mobile devices, similarly to personal information managers on personal computers. is designed around four "hubs" for different tasks, including "Mail", "Calendar," "Files" and "People". The "People" hub lists frequently and recently used contacts and aggregates recent communications with them, and the "Files" hub aggregates recent attachments from messages, and can also integrate with other online storage services such as Dropbox, Google Drive, and OneDrive. To facility indexing of content for search and other features, emails and other information are stored on external servers. Outlook mobile supports a large number of different e-mail services and platforms, including Exchange, iCloud, GMail, Google Workspace (formerly G Suite), Outlook.com, and Yahoo! Mail. The app supports multiple email accounts at once. Emails are divided into two inboxes: the "Focused" inbox displays messages of high importance, and those from frequent contacts. All other messages are displayed within an "Other" section. Files, locations, and calendar events can be embedded into email messages. Swiping gestures can be used for deleting messages. Like the desktop Outlook, Outlook mobile allows users to see appointment details, respond to Exchange meeting invites, and schedule meetings. It also incorporates the three-day view and "Interesting Calendars" features from Sunrise. Files in the Files tab are not stored offline; they require Internet access to view. Outlook mobile temporarily stores and indexes user data (including email, attachments, calendar information, and contacts), along with login credentials, in a "secure" form on Microsoft Azure servers located in the United States. On Exchange accounts, these servers identify as a single Exchange ActiveSync user in order to fetch e-mail. Additionally, the app does not support mobile device management, nor allows administrators to control how third-party cloud storage services are used with the app to interact with their users. Concerns surrounding these security issues have prompted some firms, including the European Parliament, to block the app on their Exchange servers. Microsoft maintains a separate, pre-existing Outlook Web Access app for Android and iOS. Outlook Groups Outlook Groups was a mobile application for Windows Phone, Windows 10 Mobile, Android and iOS that could be used with an Office 365 domain Microsoft Account, e.g. a work or school account. It is designed to take existing email threads and turn them into a group-style conversation. The app lets users create groups, mention their contacts, share Office documents via OneDrive and work on them together, and participate in an email conversation. The app also allows the finding and joining of other Outlook Groups. It was tested internally at Microsoft and launched September 18, 2015 for Windows Phone 8.1 and Windows 10 Mobile users. After its initial launch on Microsoft's own platforms they launched the application for Android and iOS on September 23, 2015. Outlook Groups was updated on September 30, 2015 that introduced a deep linking feature as well as fixing a bug that blocked the "send" button from working. In March 2016 Microsoft added the ability to attach multiple images, and the most recently used document to group messages as well as the option to delete conversations within the application programme. Outlook Groups was retired by Microsoft on May 1, 2018. The functionality was replaced by adding the "Groups node" to the folder list within the Outlook mobile app. Internet standards compliance HTML rendering Outlook 2007 was the first Outlook to switch from Internet Explorer rendering engine to Microsoft Word 2007's. This meant that HTML and Cascading Style Sheets (CSS) items not handled by Word were no longer supported. On the other hand, HTML messages composed in Word look as they appeared to the author. This affects publishing newsletters and reports, because they frequently use intricate HTML and CSS to form their layout. For example, forms can no longer be embedded in an Outlook email. Support of CSS properties and HTML attributes Outlook for Windows has very limited CSS support compared to various other e-mail clients. Neither CSS1 (1996) nor CSS2 (1998) specifications are fully implemented and many CSS properties can only to be used with certain HTML elements for the desired effect. Some HTML attributes help achieve proper rendering of e-mails in Outlook, but most of these attributes are already deprecated in the HTML 4.0 specifications (1997). In order to achieve the best compatibility with Outlook, most HTML e-mails are created using multiple boxed tables, as the table element and its sub-elements support the width and height property in Outlook. No improvements have been made towards a more standards-compliant email client since the release of Outlook 2007. Transport Neutral Encapsulation Format Outlook and Exchange Server internally handle messages, appointments, and items as objects in a data model which is derived from the old proprietary Microsoft Mail system, the Rich Text Format from Microsoft Word and the complex OLE general data model. When these programs interface with other protocols such as the various Internet and X.400 protocols, they try to map this internal model onto those protocols in a way that can be reversed if the ultimate recipient is also running Outlook or Exchange. This focus on the possibility that emails and other items will ultimately be converted back to Microsoft Mail format is so extreme that if Outlook/Exchange cannot figure out a way to encode the complete data in the standard format, it simply encodes the entire message/item in a proprietary binary format called Transport Neutral Encapsulation Format (TNEF) and sends this as an attached file (usually named "winmail.dat") to an otherwise incomplete rendering of the mail/item. If the recipient is Outlook/Exchange it can simply discard the incomplete outer message and use the encapsulated data directly, but if the recipient is any other program, the message received will be incomplete because the data in the TNEF attachment will be of little use without the Microsoft software for which it was created. As a workaround, numerous tools for partially decoding TNEF files exist. Calendar compatibility Outlook does not fully support data and syncing specifications for calendaring and contacts, such as iCalendar, CalDAV, SyncML, and vCard 3.0. Outlook 2007 claims to be fully iCalendar compliant; however, it does not support all core objects, such as VTODO or VJOURNAL. Also, Outlook supports vCard 2.1 and does not support multiple contacts in the vCard format as a single file. Outlook has also been criticized for having proprietary "Outlook extensions" to these Internet standards. .msg format Outlook (both the web version and recent non-web versions) promotes the usage of a proprietary .msg format to save individual emails, instead of the standard .eml format. Messages use .msg by default when saved to disk or forwarded as attachments. Compatibility with past or future Outlook versions is not documented nor guaranteed; the format saw over 10 versions released since version 1 in 2008. The standard .eml format replicates the format of emails as used for transmission and is therefore compatible with any email client which uses the normal protocols. Standard-compliant email clients, like Mozilla Thunderbird, use additional headers to store software-specific information related e.g. to the local storage of the email, while keeping the file plain-text, so that it can be read in any text editor and searched or indexed like any document by any other software. Security concerns As part of its Trustworthy Computing initiative, Microsoft took corrective steps to fix Outlook's reputation in Office Outlook 2003. Among the most publicized security features are that Office Outlook 2003 does not automatically load images in HTML emails or permit opening executable attachments by default, and includes a built-in Junk Mail filter. Service Pack 2 has augmented these features and adds an anti-phishing filter. Outlook add-ins Outlook add-ins are small additional programs for the Microsoft Outlook application, mainly purposed to add new functional capabilities into Outlook and automate various routine operations. The term also refers to programs where the main function is to work on Outlook files, such as synchronization or backup utilities. Outlook add-ins may be developed in Microsoft Visual Studio or third-party tools such as Add-in Express. Outlook add-ins are not supported in Outlook Web App. From Outlook 97 on, Exchange Client Extensions are supported in Outlook. Outlook 2000 and later support specific COM components called Outlook Add-Ins. The exact supported features (such as .NET components) for later generations were extended with each release. SalesforceIQ Inbox for Outlook In March 2016, Salesforce announced that its relationship intelligence platform, SalesforceIQ, would be able to seamlessly integrate with Outlook. SalesforceIQ works from inside the Outlook inbox providing data from CRM, email, and customer social profiles. It also provides recommendations within the inbox on various aspects like appointment scheduling, contacts, responses, etc. Hotmail Connector Microsoft Outlook Hotmail Connector (formerly Microsoft Office Outlook Connector), is a discontinued and defunct free add-in for Microsoft Outlook 2003, 2007 and 2010, intended to integrate Outlook.com (formerly Hotmail) into Microsoft Outlook. It uses DeltaSync, a proprietary Microsoft communications protocol that Hotmail formerly used. In version 12, access to tasks and notes and online synchronization with MSN Calendar is only available to MSN subscribers of paid premium accounts. Version 12.1, released in December 2008 as an optional upgrade, uses Windows Live Calendar instead of the former MSN Calendar. This meant that calendar features became free for all users, except for task synchronization which became unavailable. In April 2008, version 12.1 became a required upgrade to continue using the service as part of a migration from MSN Calendar to Windows Live Calendar. Microsoft Outlook 2013 and later have intrinsic support for accessing Outlook.com and its calendar over the Exchange ActiveSync (EAS) protocol, while older versions of Microsoft Outlook can read and synchronize Outlook.com emails over the IMAP protocol. Social Connector Outlook Social Connector was a free add-in for Microsoft Outlook 2003 and 2007 by Microsoft that allowed integration of social networks such as Facebook, LinkedIn and Windows Live Messenger into Microsoft Outlook. It was first introduced in November 18, 2009. Starting with Microsoft Office 2010, Outlook Social Connector is an integral part of Outlook. CardDAV and CalDAV Connector Since Microsoft Outlook does not support CalDAV and CardDAV protocol along the way, various third-party software vendors developed Outlook add-ins to enable users synchronizing with CalDAV and CardDAV servers. CalConnect has a list of software that enable users to synchronize their calendars with CalDAV servers/contacts with CardDAV servers. Importing from other email clients Traditionally, Outlook supported importing messages from Outlook Express and Lotus Notes. In addition, Microsoft Outlook supports POP3 and IMAP protocols, enabling users to import emails from servers that support these protocols. Microsoft Hotmail Connector add-in (described above) helps importing emails from Hotmail accounts. Outlook 2013 later integrated the functionality of this add-in and added the ability to import email (as well as a calendar) through Exchange ActiveSync protocol. There are some ways to get the emails from Thunderbird; the first is to use a tool that can convert a Thunderbird folder to a format that can be imported from Outlook Express. This method must be processed folder by folder. The other method is to use a couple of free tools that keep the original folder structure. If Exchange is available, an easier method is to connect the old mail client (Thunderbird) to Exchange using IMAP, and upload the original mail from the client to the Exchange account. See also Address book Calendar (Apple)—iCal Comparison of email clients Comparison of feed aggregators Comparison of office suites Evolution (software) Kontact List of applications with iCalendar support List of personal information managers Personal Storage Table (.pst file) Windows Contacts References Notes Citations External links Outlook Developer Portal Microsft Outlook error [pii_email_84e9c709276f599ab1e7] solved 1997 software Calendaring software Computer-related introductions in 1997 Outlook Outlook News aggregator software Personal information managers Windows email clients Android (operating system) software IOS software
25717578
https://en.wikipedia.org/wiki/College%20of%20Agricultural%20Engineering%20and%20Post%20Harvest%20Technology
College of Agricultural Engineering and Post Harvest Technology
The College of Agricultural Engineering and Post Harvest Technology (CAEPHT), located in Ranipool, Gangtok (Sikkim), is one of the seven constituent colleges of the only Central Agricultural University (CAU) in India, funded by the Government of India through the Ministry of Agriculture, Department of Agriculture Research and Education (DARE). This college is considered among the top three colleges under the UGC-ICAR system. It imparts education, research and extension in the field of agricultural engineering. It aims to provide qualified technical human resource in agricultural and food process engineering to the public and industrial sector of northeast India through its undergraduate and postgraduate programmes. Departments CAEPHT has four departments: Department of Process and Food Engineering Department of Farm Machinery and Power Department of Soil and Water Conservation Engineering Department of Basic Sciences and Humanities Academics Undergraduate programmes Every year students are admitted to two B. Tech. programmes, one in Agricultural Engineering and the other in Food Technology, on the basis of their performance and ranking in the Common Entrance Test conducted by North-Eastern states of India and ICAR. The undergraduate course in Agricultural Engineering includes subjects on basic sciences and engineering, computer science, and core engineering courses in farm machinery and power, soil and water conservation engineering, agricultural processing and food engineering, etc. Similarly, the UG programme in Food Technology covers basic sciences and engineering, computer application and design, and core courses in food safety and quality control, plant design and layout, food product development, storage and packaging. During the four years (spread over eight semesters) for the B. Tech programmes, a student reads a minimum of 168 credit hours and undergoes four months practical training in an industrial/training organisation. The students submit a project report in partial fulfillment of the programme. Postgraduate programmes The college has started M.Tech. in the following specializations in the academic session 2013-2014 : Food Engineering Farm Power and Machinery Engineering The college will start M.Tech. in Soil and Water Engineering from the academic session 2014–2015. Infrastructure CAEPHT has its academic and administrative units in the Gangtok campus of CAU at Ranipool. The college has an auditorium with a seating capacity of around 270. It has a centrally air-conditioned conference hall with audiovisual tools and a computer. The college provides separate accommodation facilities (hostels) for boys and girls. All the rooms are equipped with Internet facilities. It has a training and placement unit to help students to decide on their training and career placement. Library CAEPHT Library has 8,500 volumes, including textbooks, reference books, encyclopaedias and non-book material such as CD-ROMs and audio tapes. It has access to the CAU central library with more than 100,000 books and subscription to more than 100 journals. The college library subscribes to about 100 periodicals. All operations of the library are automated with the help of an integrated library software package (LibSys). The database for the collection is available through Online Public Access Catalog (OPAC) to the users on the campus network. It an has e-library facility for students with more than 100 computers in LAN with Internet access. CAEPHT Library, being a member of DELNET (Developing Library Network), provides online access to the Union Catalogue of Books, Union List of Current Periodicals, Database of Theses and Dissertations, MEDLINE and other databases of NLM, U.S. Patents: full text, and engineering and technology e-journals. Laboratories Laboratories include Physics and Chemistry for conducting practical in Basic Sciences, Engineering Drawing Laboratory, Electrical and Electronics Laboratory, Computer Laboratory, Thermo-Dynamics and Heat Engine Laboratory, Soil Mechanics and Fluid Mechanics Laboratory and Farm Machinery Laboratory etc. Farm Power, Surveying, Food Processing and Language Laboratories are being developed. Pilot Plants Many important pilot plants have been installed in the campus to train the students under experiential learning: Dairy Plant, Fruits and Vegetable Processing Plant, Rice Mill, Multistage Evaporator, Milk and Juice Powder Plant, Seed Processing Plant, Oil Expeller Plant etc. Central Instrumentation Facility The college has developed a central instrumentation facility which has many high-end instruments including super-critical fluid extraction, Texture analyzer, Color meter, GC, LC, GCMS, steam distillation and solvent extraction. Computer Laboratory The computer laboratory has 40 computers. Students have access to the computers for their courses. Computers are provided to the boys' and girls' hostels. Internet connectivity with 2 Mbit/s bandwidth has been developed in the college. The computer lab's software compilers include FORTRAN, Visual Studio, Adobe Suit, MS Office, PageMaker, etc. Facilities for CAD, CAM, Remote Sensing and GIS have been developed. Important Links College of Agricultural Engineering and Post Harvest Technology website Central Agricultural University website Indian Council of Agricultural Research website Universities and colleges in Sikkim Agricultural universities and colleges in India Agriculture in Sikkim
45116490
https://en.wikipedia.org/wiki/User%20activity%20monitoring
User activity monitoring
In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text entered/edited, URLs visited and nearly every other on-screen event to protect data by ensuring that employees and contractors are staying within their assigned tasks, and posing no risk to the organization. User activity monitoring software can deliver video-like playback of user activity and process the videos into user activity logs that keep step-by-step records of user actions that can be searched and analyzed to investigate any out-of-scope activities. Issues The need for UAM rose due to the increase in security incidents that directly or indirectly involve user credentials, exposing company information or sensitive files. In 2014, there were 761 data breaches in the United States, resulting in over 83 million exposed customer and employee records. With 76% of these breaches resulting from weak or exploited user credentials, UAM has become a significant component of IT infrastructure. The main populations of users that UAM aims to mitigate risks with are: Contractors Contractors are used in organizations to complete information technology operational tasks. Remote vendors that have access to company data are risks. Even with no malicious intent, an external user like a contractor is a major security liability. Users 70% of regular business users admitted to having access to more data than necessary. Generalized accounts give regular business users access to classified company data. This makes insider threats a reality for any business that uses generalized accounts. IT users Administrator accounts are heavily monitored due to the high-profile nature of their access. However, current log tools can generate “log fatigue” on these admin accounts. Log fatigue is the overwhelming sensation of trying to handle a vast amount of logs on an account as a result of too many user actions. Harmful user actions can easily be overlooked with thousands of user actions being compiled every day. Overall risk According to the Verizon Data Breach Incident Report, “The first step in protecting your data is in knowing where it is and who has access to it.” In today's IT environment, “there is a lack of oversight and control over how and who among employees has access to confidential, sensitive information.” This apparent gap is one of many factors that have resulted in a major number of security issues for companies. Components Most companies that use UAM usually separate the necessary aspects of UAM into three major components. Visual forensics Visual Forensics involves creating a visual summary of potentially hazardous user activity. Each user action is logged, and recorded. Once a user session is completed, UAM has created both a written record and a visual record, whether it be screen-captures or video of exactly what a user has done. This written record differs from that of a SIEM or logging tool, because it captures data at a user-level not at a system level –providing plain English logs rather than SysLogs (originally created for debugging purposes). These textual logs are paired with the corresponding screen-captures or video summaries. Using these corresponding logs and images, the visual forensics component of UAM allows for organizations to search for exact user actions in case of a security incident. In the case of a security threat, i.e. a data breach, Visual Forensics are used to show exactly what a user did, and everything leading up to the incident. Visual Forensics can also be used to provide evidence to any law enforcement that investigate the intrusion. User activity alerting User activity alerting serves the purpose of notifying whoever operates the UAM solution to a mishap or misstep concerning company information. Real-time alerting enables the console administrator to be notified the moment an error or intrusion occurs. Alerts are aggregated for each user to provide a user risk profile and threat ranking. Alerting is customizable based on combinations of users, actions, time, location, and access method. Alerts can be triggered simply such as opening an application, or entering a certain keyword or web address. Alerts can also be customized based on user actions within an application, such as deleting or creating a user and executing specific commands. User behavior analytics User behavior analytics add an additional layer of protection that will help security professionals keep an eye on the weakest link in the chain. By monitoring user behavior, with the help of dedicated software that analyzes exactly what the user does during their session, security professionals can attach a risk factor to the specific users and/or groups, and immediately be alerted with a red flag warning when a high-risk user does something that can be interpreted as a high-risk action such as exporting confidential customer information, performing large database queries that are out of the scope of their role, accessing resources that they shouldn't be accessing and so forth. Features Capturing activity UAM collects user data by recording activity by every user on applications, web pages and internal systems and databases. UAM spans all access levels and access strategies (RDP, SSH, Telnet, ICA, direct console login, etc.). Some UAM solutions pair with Citrix and VMware environments. User activity logs UAM solutions transcribe all documented activities into user activity logs. UAM logs match up with video-playbacks of concurrent actions. Some examples of items logged are names of applications run, titles of pages opened, URLs, text (typed, edited, copied/pasted), commands, and scripts. Video-like playback UAM uses screen-recording technology that captures individual user actions. Each video-like playback is saved and accompanied by a user activity log. Playbacks differ from traditional video playback to screen scraping, which is the compiling of sequential screen shots into a video-like replay. The user activity logs combined with the video-like playback provides a searchable summary of all user actions. This enables companies to not only read, but also view exactly what a particular user did on company systems. Privacy Some companies and employees raised issue with the user privacy aspect of UAM. They believe employees will resist the idea of having their actions monitored, even if it is being done for security purposes. In reality, most UAM strategies address these concerns. While it is possible to monitor every single user action, the purpose of UAM systems is not to snoop on employee browsing history. UAM solutions use policy-based activity recording, which enables the console administrator to program exactly what is and isn't monitored. Audit and compliance Many regulations require a certain level of UAM while others only require logs of activity for audit purposes. UAM meets a variety of regulatory compliance requirements (HIPAA, ISO 27001, SOX, PCI etc....). UAM is typically implemented for the purpose of audits and compliance, to serve as a way for companies to make their audits easier and more efficient. An audit information request for information on user activity can be met with UAM. Unlike normal log or SIEM tools, UAM can help speed up an audit process by building the controls necessary to navigate an increasingly complex regulatory environment. The ability to replay user actions provides support for determining the impact on regulated information during security incident response. Appliance vs. software UAM has two deployment models. Appliance-based monitoring approaches that use dedicated hardware to conduct monitoring by looking at network traffic. Software-based monitoring approaches that use software agents installed on the nodes accessed by users. More commonly, software requires the installation of an agent on systems (servers, desktops, VDI servers, terminal servers) across which users you want to monitor. These agents capture user activity and reports information back to a central console for storage and analysis. These solutions may be quickly deployed in a phased manner by targeting high-risk users and systems with sensitive information first, allowing the organization to get up and running quickly and expand to new user populations as the business requires. References Data security Crime prevention National security Regulatory compliance Secure communication
56072909
https://en.wikipedia.org/wiki/Richard%20Vuduc
Richard Vuduc
Richard Vuduc is a tenured professor of computer science at the Georgia Institute of Technology. His research lab, The HPC Garage, studies high-performance computing, scientific computing, parallel algorithms, modeling, and engineering. He is a member of the Association for Computing Machinery (ACM). As of 2016, Vuduc serves as Vice President of the SIAM Activity Group on Supercomputing. He has co-authored over 150 articles in peer-reviewed journals and conferences. Education Dr. Vuduc received his Ph.D. in Computer Science from the University of California, Berkeley, in 2004. He received his B.S in computer science at Cornell University in 1997. He is also an alumnus of the Thomas Jefferson High School for Science and Technology in Alexandria, Virginia. Academic career Vuduc was a Postdoctoral Scholar in the Center for Advanced Scientific Computing at the Lawrence Livermore National Laboratory. He has served as an associate editor of both the International Journal of High-Performance Computing Applications and IEEE Transactions on Parallel and Distributed Systems. He co-chaired the Technical Papers Program of the “Supercomputing” (SC) Conference in 2016 and was later elected to be Vice President of the SIAM Activity Group on Supercomputing from 2016 to 2018. He also served as department’s Associate Chair and Director of its graduate (MS & Ph.D.) programs from 2013-2016. Major honors and awards Member of the DARPA Computer Science Study Group Recipient NSF CAREER award Collaborative Gordon Bell Prize 2010 Lockheed-Martin Aeronautics Company Dean’s Award for Teaching Excellence 2013 Best Paper Awards, including the SIAM Conference on Data Mining (SDM, 2012) and IEEE Parallel and Distributed Processing Symposium (IPDPS, 2015) Major publications References Living people Georgia Tech faculty Cornell University alumni Year of birth missing (living people)
3062111
https://en.wikipedia.org/wiki/Kiangsu-Chekiang%20College%20%28Shatin%29
Kiangsu-Chekiang College (Shatin)
Kiangsu-Chekiang College (Shatin) (), abbreviated as KCCS or KCCST, is one of the secondary schools in Sha Tin District, Hong Kong. The school campus is next to Shatin Pui Ying College. History The school is one of the four schools established by the Kiangsu & Chekiang Residents (HK) Association. When the school first opened in 1978, the permanent premises were not ready owing to a delay in the construction work. Classes had to be conducted on the school premises of the TWGHs Fung Wong Fung Ting Secondary School. In August 1979, the school moved into the present premises. In 1982, the school was converted from a private capitation secondary school into a government aided secondary school. In the years that followed, the government, the Association and the School Management Committee have continuously supported the school by providing professional advice, technical assistance and financial resources. The past two decades, therefore, have witnessed remarkable progress in the school development with respect to the students' academic achievement, moral standard, teaching facilities and equipment. School motto and values "Orderly and Respectful" is the school motto and a code of behaviour is set for the students to follow. The education philosophy is based on the following three principles: that equal significance be put on moral, intellectual, physical, social and aesthetic development, equal emphasis laid on arts and sciences and equal importance attached to learning Chinese and English. It aims to provide a high-quality, all-rounded education so that the students can have the best opportunity to study, develop their potential to the fullest and acquire positive attitudes and values towards work, life and the community. Information technology in education The School Administration and Management System (SAMS) has been adopted and efforts have been made to strengthen the related facilities, for example, installing nodes in the school campus and using broadband network in order to gain faster access to the Internet. Both teachers and students can have access to the Internet via the developed intranet system in the school. In addition, educational CD-ROMs have been purchased for teaching purposes. Projection screens are installed in classrooms, special rooms and the assembly hall. There are about sixty computers and each teacher of the school is provided with a notebook computer which can be connected with the projectors and TV sets in the classrooms. About one hundred and twenty computers are available on loan for needy students of the school. All teachers and students are given free e-mail accounts. To provide students with easy access to and arouse their interest in information technology, the Computer Rooms are open to the students during lunchtime and after school. Guidance from staff is available. In 2001, all of the staff completed the school-based information technology elementary, intermediate or advanced training courses and reached the IT standard set by the government. Meanwhile, information technology is widely applied to the teaching and learning of different subjects. School facilities and resources There are twenty-six standard classrooms, three lifts, an assembly hall, a library, two playgrounds, four laboratories and a number of special rooms like six computer rooms, a student activity center, a dancing room, interview rooms and a broadcasting studio. There are also facilities for the physically disabled. The assembly hall, the library, classrooms and special rooms are all air-conditioned. A computerized roll call taking system and an information booth have been installed. The opened playground is surfaced with all weather flooring. All of these facilities aim to provide an ideal teaching and learning environment. References External links Secondary schools in Hong Kong Educational institutions established in 1978 1978 establishments in Hong Kong
20289168
https://en.wikipedia.org/wiki/PCI%20hole
PCI hole
The PCI hole or PCI memory hole is a limitation of 32-bit hardware and 32-bit operating systems that causes a computer to appear to have less memory available than is physically installed. This memory addressing limitation and the later workarounds necessary to overcome it are functionally similar to the memory limits of the early 8088 IBM PC memory architecture (see Conventional memory). Similar situations have often arisen in the history of computing, when hardware intended to have up to a certain level of resources is designed to handle several times the maximum expected amount, which eventually becomes a severe restriction as Moore's law increases resources economically available. The original IBM PC was typically supplied with 64 KB of memory or less; it was designed to take a maximum of 640 KB, far more than it was thought would ever be needed. This rapidly became a restriction that had to be handled by complex DOS memory management. Similar successive restrictions in size have been imposed and overcome on hard drives. Unavailable memory The loss of usable memory caused by the PCI hole, when using memory-mapped I/O, is caused by using the same address space for both physical memory and to communicate with hardware devices. Thus, installed hardware devices need some of the address space in order to communicate with the processor and system software. As 32-bit hardware has a total of four gigabytes of addressable memory, some of the real physical memory of a 32-bit machine, when enough memory is installed, needs to be sacrificed by making it hidden so the devices have room to communicate. Which part of physical memory becomes replaced with the device communication space depends upon the machine, but it is usually anything above 2.5 to 3.5 GB. The amount of system memory that is hidden and unavailable varies widely with the actual mainboard and chipset, the BIOS, the amount of physical memory, the amount of video RAM installed on graphics cards, and the number and type of PCI cards installed in the system. More than a gigabyte of 32-bit system memory can be unavailable when four gigabytes of physical memory and multiple 3D cards with large amounts of video memory are installed; on some mainboards, the hole is always at least one gigabyte in size regardless of the installed expansion cards. Physical address extension A workaround first developed in the Pentium Pro, known as Physical Address Extension (PAE), allows certain 32-bit operating systems to access up to 36-bit memory addresses, even though individual programs are still limited to operating within 32 bits of address space. Provided there is enough memory installed, each program can have its own four-gigabyte addressing space, together utilizing up to 64 gigabytes of memory across all programs. But PAE alone is not enough to address the PCI hole issue, as memory addresses and I/O PCI addresses are still overlapping somewhere between the 3rd and 4th gigabyte. A PAE compatible operating system together with a PAE compatible CPU cannot do better than accessing memory from the 1st to the 3rd gigabyte, then from the 5th to the 64th gigabyte. The PCI hole is still there. On a 4GB host, and in the absence of one or another additional workaround, PAE does nothing for accessing the ~1GB memory overlapped by the PCI I/O. PAE was fully supported in Windows XP up to the Service Pack 1 (SP1) release, but then withdrawn for SP2; the only 32-bit versions of Microsoft Windows to fully support this are certain high-end server versions of Windows Server 2003 and earlier; as of 2014, it is mainly in use by 32-bit Linux distributions; Ubuntu has made it mandatory for its 32-bit version since 2013. Microsoft disabled the support in Windows XP SP2 and later operating systems because there were many compatibility problems with graphics card and other devices, which needed PAE-aware drivers, distinct from both standard 32-bit and later 64-bit drivers. Many versions of MS Windows can activate what is still called PAE for the purpose of using the NX bit, but this no longer extends the address space. Filling the memory hole As stated earlier, in a 32-bit PAE-enabled and even in 64-bit systems, memory below and above the "memory hole" is available, but 512 MB to 1.5 GB of RAM is unavailable, around the 3rd gigabyte, because it uses there memory addresses required for devices. With the decreasing cost of memory this may not be a serious issue, but there are ways to regain access to the missing memory. Mapping devices to addresses above 4 GB The limitations of the 32-bit PCI hole can affect purely 64-bit operating systems as the system BIOS must cater for all operating systems which are supported by the hardware (16-, 32-, and 64-bit operating systems all run on the same hardware). The BIOS must be able to boot mapping all devices below four gigabytes, although a 64-bit system does not require this. Many BIOSes can be configured by the user to fill the memory hole by mapping devices high up in the 64-bit address space, so long as the devices, their drivers, and the chipset all support this. A machine configured this way cannot boot into a 16- or 32-bit operating system; if a machine is set up this way, the BIOS setup must be temporarily changed to boot into a 16- or 32-bit operating system, e.g. from a bootable CD or USB storage device. Mapping memory to addresses above 4 GB Another way to remove the PCI hole, which is only useful for 64-bit operating systems and those 32-bit systems that support the Physical Address Extension method described above, is to "remap" some or all of the memory between the two- and four-gigabyte limits to addresses above four gigabytes. This needs to be supported by the chipset of the computer and can usually be activated in the BIOS Setup. This remapping works on the level of physical addresses, unlike the higher-level remapping of virtual to physical addresses that happens inside the CPU core. Activating this for traditional 32-bit operating systems does more harm than good, as the remapped memory (often larger than the PCI hole itself) is unusable to such operating systems, even though e.g. Windows Vista will show such memory to physically exist on the "System Properties" page. See also AGP aperture 3 GB barrier Expanded memory PSE-36 an alternative to PAE on x86 processors to extend the physical memory addressing capabilities from 32 bits to 36 bits RAM limit Notes References X86 architecture Virtual memory X86 memory management Peripheral Component Interconnect
45462810
https://en.wikipedia.org/wiki/OpenFX%20%28API%29
OpenFX (API)
OpenFX (OFX), a.k.a. The OFX Image Effect Plug-in API, is an open standard for 2D visual effects or compositing plug-ins. It allows plug-ins written to the standard to work on any application that supports the standard. The OpenFX standard is owned by The Open Effects Association, and it is released under a 'BSD' open source license. OpenFX was originally designed by Bruno Nicoletti at The Foundry Visionmongers. Plug-ins are written as dynamic shared objects, and the API specifies a few entry points that must be implemented by the plug-in. The OpenFX host exposes sets of entry points to the plug-in, called suites. The Property Suite is used to manage attribute-value pairs attached to objects defined by all other suites of the API, the Image Effect Suite is used to fetch film frames from the inputs or the output of the effect, and there are other suites to display informative messages or ask questions to the user, handle multithreading, use OpenGL for processing, etc. Each plugin is described by a list of parameters and supported inputs and output. The host may execute various actions, for example to signal that a parameter value has changed or that a portion of a film frame has to be rendered. Optionally, the plug-in may also display graphical information over the current frame using OpenGL, and propose interactions using mouse and keyboard (this is called interacts in the OFX specification). An OpenFX host is an application capable of loading and executing OpenFX plugins. History UPDATE: Current version is 1.4 as of June 2017 OpenFX was first announced on Feb 10, 2004 The Foundry Visionmongers. The OpenFX specification was written so that a plugin supporting the latest version of the API may be implemented to be compatible with a host implementing an earlier version. OpenFX 1.0 was released in 2006. OpenFX 1.1 was released in 2007. OpenFX 1.2 was released in 2010. OpenFX 1.3 was released in 2012. OpenFX 1.4 was released in 2015. Hosts Free and open source hosts ButtleOFX (for Linux, open source, LGPL license, alpha status, unmaintained) Kaliscope (scanner controller/batch conversion tool based on OpenFX host and plugins, open source, GPL 3 license) Natron for macOS, Linux, FreeBSD and Windows (open source, GPL license) Ramen compositor (CDDL 1.0 license, never officially released, but source code is available) ShuttleOFX (online OpenFX platform, open source, LGPL license) TuttleOFX (command-line OpenFX host and plugins, open source, LGPL license) Commercial hosts Baselight (from version 2.2) by FilmLight Catalyst Edit by Sony Creative Software DaVinci Resolve (from version 10) and DaVinci Resolve Lite, by Blackmagic Design DustBuster+ (from version 4.5), by HS-ART DVS Clipster by DVS EDIUS Pro (from version 8.1, by OFX-bridge plugin from NewBlueFX), by Grass Valley Fusion (from version 4.04), by Blackmagic Design (formerly by eyeon) HitFilm (from version 3 Pro) by FXhome Mistika (from version 6.5.35) and Mamba FX by SGO Motion Studio by IDT Vision Nucoda Film Master (from version 2011.2.058) by Digital Vision Nuke (from version 4.5), by The Foundry Piranha by Interactivefx Quantel Rio by SAM SCRATCH (from version 6.1), by Assimilate Titler Pro 4 by NewBlueFX Toon Boom Harmony Vegas Pro (from version 10), by Magix Software GmbH Vegas Movie Studio (Platinum edition and above), by Magix Software GmbH Discontinued: Autodesk Toxik (from version 2009) (included with Maya) Avid DS (from version 10.3) Bones by Thomson/Technicolor MATRIX Compositing by Chrome Imaging Shake by Apple OpenFX plug-ins Free and open source plugins The official OpenFX SDK (BSD license) contain sample plugins, programmed using the standard C API, or a C++ wrapper. openfx-arena is a set of visual effects plugins, mainly based on ImageMagick. openfx-io is a set of plugins for reading or writing image and video files (using OpenImageIO and FFmpeg), and for color management (using OpenColorIO). openfx-misc is a collection of essential plugins, which provide many basic compositing tools, such as filters, geometric transforms, and color transforms. Commercial OpenFX hosts usually provide their own versions of these plugins. TuttleOFX provides many plug-ins, especially for color grading, usable in most OpenFX hosts. INK green/blue screen keyer and ChannelMath by casanico.com TalentTracker by Mut1ny.com Commercial plug-ins Beauty Box Video by digital anarchy Color Symmetry Composite Suite Pro, Film Stocks, Rays, reFine, zMatte, Tiffen DFX by Digital Film Tools DE:Flicker, DE:Noise, RE:Match, Twixtor and ReelSmart Motion Blur by RE:Vision Effects Film Convert for OFX by Rubber Monkey Software Genifect by Dual Heights Software HitFilm Ignite by FXhome Lenscare and Flair by frischluft RealPerception by Motiva Neat Video by ABSoft NewBlueFX plugins (including Titler Pro 3) Primatte by Photron/Imagica Red Giant Universe and Magic Bullet (in version 12.1, Looks, Film, Cosmo and Mojo are OpenFX plugins) by Red Giant Software Sapphire Visual Effects OFX and Monsters GT VFX Plugins OFX by GenArts White balance, exposure and color matching by FBmn Software InviziGrain by InviziPro Extensions OpenFX' suite-based design enables one to easily introduce new sets of entry points, in order to cover other applications while still relying on the same core dynamic plug-in mechanism. A notable example is OpenMfx, an API based on OpenFX but meant to define procedural effects on 3D meshes rather than 2D images. An host that supports the Image Effects API does not necessarily support the Mesh Effect API, and vice versa, but both support the same core plug-in mechanism and basic suites like the Property Suite or the Parameter Suite. OpenMfx is an initiative independent from The Open Effects Association, lead by Élie Michel since 2019. Documentation The OFX Image Effects API is the official reference. The OFX Programming Guide for Image Effects by Bruno Nicoletti. OpenFX plugin programming guide, based on the C++ Support library. OpenMfx documentation, an OFX Mesh Effects API, including the API reference as well as a C++ Support library and some tutorials. References External links The Open Effects Association Home page of the project Application programming interfaces Graphics standards
1155952
https://en.wikipedia.org/wiki/Computer%20reservation%20system
Computer reservation system
Computer reservation systems, or central reservation systems (CRS), are computerized systems used to store and retrieve information and conduct transactions related to air travel, hotels, car rental, or other activities. Originally designed and operated by airlines, CRSs were later extended for use by travel agencies, and global distribution systems (GDSs) to book and sell tickets for multiple airlines. Most airlines have outsourced their CRSs to GDS companies, which also enable consumer access through Internet gateways. Modern GDSs typically also allow users to book hotel rooms, rental cars, airline tickets as well as other activities and tours. They also provide access to railway reservations and bus reservations in some markets, although these are not always integrated with the main system. These are also used to relay computerized information for users in the hotel industry, making reservation and ensuring that the hotel is not overbooked. Airline reservations systems may be integrated into a larger passenger service system, which also includes an airline inventory system and a departure control system. The current centralised reservation systems are vulnerable to network-wide system disruptions. History Origins In 1946, American Airlines installed the first automated booking system, the experimental electromechanical Reservisor. A newer machine with temporary storage based on a magnetic drum, the Magnetronic Reservisor, soon followed. This system proved successful, and was soon being used by several airlines, as well as Sheraton Hotels and Goodyear for inventory control. It was seriously hampered by the need for local human operators to do the actual lookups; ticketing agents would have to call a booking office, whose operators would direct a small team operating the Reservisor and then read the results over the telephone. There was no way for agents to directly query the system. The MARS-1 train ticket reservation system was designed and planned in the 1950s by the Japanese National Railways' R&D Institute, now the Railway Technical Research Institute, with the system eventually being produced by Hitachi in 1958. It was the world's first seat reservation system for trains. The MARS-1 was capable of reserving seat positions, and was controlled by a transistor computer with a central processing unit and a 400,000-bit magnetic drum memory unit to hold seating files. It used many registers, to indicate whether seats in a train were vacant or reserved to accelerate searches of and updates to seat patterns, for communications with terminals, printing reservation notices, and CRT displays. Remote access In 1953, Trans-Canada Airlines (TCA) started investigating a computer-based system with remote terminals, testing one design on the University of Toronto's Manchester Mark 1 machine that summer. Though successful, the researchers found that input and output was a major problem. Ferranti Canada became involved in the project and suggested a new system using punched cards and a transistorized computer in place of the unreliable tube-based Mark I. The resulting system, ReserVec, started operation in 1962, and took over all booking operations in January 1963. Terminals were placed in all of TCA's ticketing offices, allowing all queries and bookings to complete in about one second with no remote operators needed. In 1953, American Airlines CEO C. R. Smith chanced to sit next to R. Blair Smith, a senior IBM sales representative, on a flight from Los Angeles to New York. C.R. invited Blair to visit their Reservisor system and look for ways that IBM could improve the system. Blair alerted Thomas Watson Jr. that American was interested in a major collaboration, and a series of low-level studies started. Their idea of an automated airline reservation system (ARS) resulted in a 1959 venture known as the Semi-Automatic Business Research Environment (SABRE), launched the following year. By the time the network was completed in December 1964, it was the largest civil data processing system in the world. Other airlines established their own systems. Pan Am launched its PANAMAC system in 1964. Delta Air Lines launched the Delta Automated Travel Account System (DATAS) in 1968. United Airlines and Trans World Airlines followed in 1971 with the Apollo Reservation System and Programmed Airline Reservation System (PARS), respectively. Soon, travel agents began pushing for a system that could automate their side of the process by accessing the various ARSes directly to make reservations. Fearful this would place too much power in the hands of agents, American Airlines executive Robert Crandall proposed creating an industry-wide computer reservation system to be a central clearing house for U.S. travel; other airlines demurred, citing fear of antitrust prosecution. Travel agent access In 1976, United Airlines began offering its Apollo system to travel agents; while it would not allow the agents to book tickets on United's competitors, the marketing value of the convenient terminal proved indispensable. SABRE, PARS, and DATAS were soon released to travel agents as well. Following airline deregulation in 1978, an efficient CRS proved particularly important; by some counts, Texas Air executive Frank Lorenzo purchased money-losing Eastern Air Lines specifically to gain control of its SystemOne CRS. Also in 1976 Videcom international with British Airways, British Caledonian and CCL launched Travicom, the world's first multi-access reservations system (wholly based on Videcom technology), forming a network providing distribution for initially two and subsequently 49 subscribing international airlines (including British Airways, British Caledonian, Trans World Airlines, Pan Am, Qantas, Singapore Airlines, Air France, Lufthansa, SAS, Air Canada, KLM, Alitalia, Cathay Pacific and Japan Airlines) to thousands of travel agents in the UK. It allowed agents and airlines to communicate via a common distribution language and network, handling 97% of UK airline business trade bookings by 1987. The system went on to be replicated by Videcom in other areas of the world including the Middle East (DMARS), New Zealand, Kuwait (KMARS), Ireland, Caribbean, United States and Hong Kong. Travicom was a trading name for Travel Automation Services Ltd. When British Airways (who by then owned 100% of Travel Automation Services Ltd) chose to participate in the development of the Galileo system Travicom changed its trading name to Galileo UK and a migration process was put in place to move agencies from Travicom to Galileo. European airlines also began to invest in the field in the 1980s initially by deploying their own reservation systems in their homeland, propelled by growth in demand for travel as well as technological advances which allowed GDSes to offer ever-increasing services and searching power. In 1987, a consortium led by Air France and West Germany's Lufthansa developed Amadeus, modeled on SystemOne. Amadeus Global Travel Distribution was launched in 1992. In 1990, Delta, Northwest Airlines, and Trans World Airlines formed Worldspan, and in 1993, another consortium (including British Airways, KLM, and United Airlines, among others) formed the competing company Galileo GDS based on Apollo. Numerous smaller companies such as KIU have also formed, aimed at niche markets not catered for by the four largest networks, including the low-cost carrier segment, and small and medium size domestic and regional airlines. Trends For many years, global distribution systems (GDSs) have had a dominant position in the travel industry. To bypass the GDSs, and avoid high GDS fees, airlines have started to sell flights directly through their websites. Another way to bypass the GDSs is direct connection to travel agencies, such as that of American Airlines. Major airline CRS systems Timeline Sabre Holdings was purchased by private investors Silver Lake Partners and Texas Pacific Group on March 30, 2007, for about US$5 billion. Full-year 2008 Sabre Holdings revenues were about US$3 billion. In December 2006, Travelport, which owns Galileo, agreed to buy and merge with the Worldspan GDS. The combined company would then control a 46.3% market share using 2002 airline booking data. Worldspan's market share is 16.9% globally and 31% in the U.S. according to 2006 MIDT airline transaction data. In March 2007, KLM switched from its own reservations system (CORDA) to Amadeus as a result of the merger with Air France. In February 2010, JetBlue converted its reservation system over to the SabreSonic Customer Sales and Service platform. In September 2018 Turkish Airways migrated from Sabre to Hitit Other systems Polyot-Sirena See also Airline reservations system Overselling#Airlines Passenger name record Travel technology ARINC Rockwell Collins SITA (company) References Further reading Winston, Clifford, "The Evolution of the Airline Industry", Brookings Institution Press, 1995. . Cf. p. 61-62, Computer Reservation Systems. Wardell, David J, "Airline Reservation Systems", 1991. Research paper. Pilling, Mark, "Airline reservations systems: can IT deliver?", 2008. News Article. External links Consumer Web Watch: Computer Reservations System (CRSs) and Travel Technology Hospitality.net: Galileo International Tells USDOT: Modified Computer Reservation System (CRS) Rules Necessary to Protect Consumers and Competition, 18 March 2003 Das, Samipatra. "Global Distribution Systems in Present Times," Hospitality.net, 30 September 2003 Hasbrouck, Edward. The Practical Nomad: "What's in a Passenger Name Record (PNR)?" European Union: Code of conduct for use of computerized reservation systems (CRS's) Airline tickets Business software Travel technology
2650691
https://en.wikipedia.org/wiki/Joint%20Task%20Force%20%E2%80%93%20Global%20Network%20Operations
Joint Task Force – Global Network Operations
Joint Task Force-Global Network Operations (JTF-GNO) was a subordinate command of United States Strategic Command whose mission was to: direct the operation and defense of the Global Information Grid (GIG) across strategic, operational, and tactical boundaries in support of the US Department of Defense's full spectrum of war fighting, intelligence, and business operations. The Task Force's operations were moved to Fort Meade, Maryland, in April 2010 as part of decisions reached under the 2005 Base Realignment and Closure process. JTF-GNO was dissolved and incorporated within the United States Cyber Command on September 7, 2010. Primary responsibilities Identifies and resolves computer security anomalies that affect the GIG's ability to support Secretary of Defense (SECDEF) elements, Joint Staff, Supported Combatant Commands and the "warfighter". Identifies significant threats to the GIG. Develop, disseminate and implement countermeasures to these threats in a timely manner via Information Assurance Vulnerability Messages (IAVM) Assesses the incidents reported by Combatant Command, service, and agency (CC/S/A) computer network defense (CND) and Regions individually and cumulatively for their impact on the "warfighter’s" ability to carry out current and future missions. Coordinates the response actions taken by the CC/S/A CND service providers (CNDSP). Identifies emerging technologies and their associated threats in order to integrate migrations and response actions into current CND posture. History In 1998 the Department of Defense recognized a growing cyber threat and in response created the Joint Task Force-Computer Network Defense (JTF-CND), which achieved initial operational capability on 30 December 1998 and full operational capability by June 1999. In the fall of 2000, the JTF-CND assumed responsibility for the DoD computer network attack mission and became the Joint Task Force—Computer Network Operations (JTF-CNO). In October 2002, the new Unified Command Plan, Change 2, re-aligned JTF-CNO under the United States Strategic Command (USSTRATCOM) The JTF-CNO began its largest and most comprehensive transformation in April 2004 when the Commander of US Strategic Command approved the Joint Concept of Operations for GIG Network Operations. This “NetOps CONOPS” provided the common framework and command and control structure to conduct the USSTRATCOM Unified Command Plan-assigned mission of Global Network Operations, combining the disciplines of enterprise systems and network management, network defense, and information decision management. The Secretary of Defense signed a delegation of authority letter on 18 June 2004, designating the Director, DISA as the new Commander of the Joint Task Force-Global Network Operations. With this designation, the new command assumed the responsibility for directing the operation and defense of the GIG. This transformation enhanced the JTF GNO's mission and objectives was crucial in pushing towards the Joint Vision 2020 Objectives and the evolving concept of Net-Centricity. Hackers attempted to enter United States Department of Defense networks nearly 75,000 times in 2004. Former operations The JTF-GNO functions in accordance with Unified Command Plan 2002 (Change 2) and the Joint Concept of Operations for GIG NetOps, assuring Global Information Superiority by achieving the three assurances outlined in the Joint Concept of Operations for GIG NetOps: Assured System and Network Availability, Assured Information Protection, and Assured Information Delivery. The Task Force has a number of associated service components, including the 1st Information Operations Command (Land), the affiliated United States Army formation. Personnel The JTF-GNO was authorized 255 positions at the height of its operations in early 2009. Lieutenant General Carroll F. Pollett was the Commander of JTF-GNO during its disestablishment. References Bibliography Ackerman, Robert K. (August 2005). “Keeping ahead of cyberfoes remains the key to protecting information technology assets.” Signal Magazine Brooks, Peter. (August 30, 2005). “The Art of (Cyber) War.” The Heritage Foundation External links Joint Task Force-Global Network Operations (JTF-GNO) (restricted access) Military units and formations established in 2004 United States Strategic Command Joint task forces of the United States Armed Forces Net-centric
61022764
https://en.wikipedia.org/wiki/Spinnaker%20%28software%29
Spinnaker (software)
Spinnaker is a free and open-source continuous delivery software platform originally developed by Netflix and extended by Google. It is designed to work with Kubernetes, Google Cloud Platform, AWS, Microsoft Azure and Oracle Cloud. Spinnaker was developed by Netflix as a successor to the internally developed Asgard. It was released under the Apache License 2.0 on November 16, 2015 and has been adopted by tech companies. Summit An annual summit on Spinnaker software is held; the 2019 summit took place in San Diego, California on 15–17 November. The third annual Spinnaker Summit will be co-located with the CD Foundation's cdCon. Day Zero of cdCon is dedicated to Spinnaker topics. After the first day, a Spinnaker track continues as part of main cdCon schedule. cdCon will be fully virtual and held June 23 – 24, 2021. Commercial vendors There are companies commercially supporting Spinnaker. Current list of vendors: Armory OpsMx References Free and open-source software Build automation Netflix Google software 2015 software Linux software Software using the Apache license
6508389
https://en.wikipedia.org/wiki/Cryptography%20law
Cryptography law
Cryptography is the practice and study of encrypting information, or in other words, securing information from unauthorized access. There are many different cryptography laws in different nations. Some countries prohibit export of cryptography software and/or encryption algorithms or cryptoanalysis methods. Some countries require decryption keys to be recoverable in case of a police investigation. Overview Issues regarding cryptography law fall into four categories: Export control, which is the restriction on export of cryptography methods within a country to other countries or commercial entities. There are international export control agreements, the main one being the Wassenaar Arrangement. The Wassenaar Arrangement was created after the dissolution of COCOM (Coordinating committee for Multilateral Export Controls), which in 1989 "decontrolled password and authentication-only cryptography." Import controls, which is the restriction on using certain types of cryptography within a country. Patent issues, which deal with the use of cryptography tools that are patented. Search and seizure issues, on whether and under what circumstances, a person can be compelled to decrypt data files or reveal an encryption key. Cryptography law in different countries France As of 2011 and since 2004, the law for trust in the digital economy (LCEN) mostly liberalized the use of cryptography. As long as cryptography is only used for authentication and integrity purposes, it can be freely used. The cryptographic key or the nationality of the entities involved in the transaction do not matter. Typical e-business websites fall under this liberalized regime. Exportation and importation of cryptographic tools to or from foreign countries must be either declared (when the other country is a member of the European Union) or requires an explicit authorization (for countries outside the EU). United States In the United States, the International Traffic in Arms Regulation restricts the export of cryptography. See also Official Secrets Act - (United Kingdom, India, Ireland, Malaysia and formerly New Zealand) Regulation of Investigatory Powers Act 2000 (United Kingdom) Restrictions on the Import of Cryptography Export of cryptography Key disclosure law United States v. Boucher, on the right of a criminal defendant not to reveal a passphrase FBI–Apple encryption dispute on whether cellphone manufacturers can be compelled to assist in their unlocking References External links Bert-Jaap Koops' Crypto Law Survey - existing and proposed laws and regulations on cryptography
29334567
https://en.wikipedia.org/wiki/Umar%20Saif
Umar Saif
Umar Saif (; born 1979) is a Pakistani computer scientist and academic. He is currently serving as CEO of SurveyAuto, Chief Digital Officer of the Jang Group and the Chief Investment Officer of Khudi Ventures. He is also serving as an advisor to the United Nations Development Programme in Pakistan. After studying computer science at the Lahore University of Management Sciences (LUMS), Saif received his doctorate from the University of Cambridge at the age of 22. He then moved to the Massachusetts Institute of Technology where he did his postdoc. He returned to Pakistan in 2005 and joined LUMS where he taught as an associate professor of computer science between 2006 and 2013. In 2011, Saif was appointed as chairman of the Punjab Information Technology Board (PITB) and also became a cabinet member in Government of Punjab. During his tenure as Chair of PITB between 2011 and 2018, he founded Pakistan's first technology incubator, Plan 9 and carried out more than 300 projects. Simultaneously, he served as the founding vice-chancellor of the Information Technology University from 2013 to 2018. For his research, entrepreneurial ventures, and for being the brains behind digital governance of Punjab and one of the main driving forces behind the IT ecosystem in the country, he was awarded numerous notable awards and titles such as Young Global Leader by the World Economic Forum, Google's Faculty Research Award, Sitara-i-Imtiaz, UNESCO Chair for using ICT for Development, and was named as one of the top 35 young innovators in the world by the MIT Technology Review (TR35). He was named among The 500 Most Influential Muslims consecutively between 2015 and 2019. Education Saif attended Aitchison College before enrolling at Lahore University of Management Sciences where he obtained a Bachelor of Science degree in computer science in 1998. He received a doctor of philosophy degree in computer science from the University of Cambridge at the age of 22 in 2001. In 2002 he did his postdoc at MIT, also in computer science. From 2001 to 2005 he taught at MIT and worked at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) as a research scientist, becoming part of the team which developed Project Oxygen. Career Upon returning to Pakistan in 2005, Saif joined LUMS where he worked as an associate professor of computer sciences between 2006 and 2013. He became one of the youngest tenured professors at LUMS in 2009. While teaching full-time, Saif carried out several research projects. In 2010 Saif was named as Young Global Leader by the World Economic Forum. In 2011 he was placed on MIT's TR35 list, naming him as one of the world's top 35 young innovators for developing a bittorrent client, BitMate, and a text message-based social network, SMSall. The same year he became the first Pakistani to receive the Google's Faculty Research Award. Upon learning of his achievements the Chief Minister of the Punjab, Shahbaz Sharif, invited Saif to head the Punjab Information Technology Board (PITB). In November 2011 he was appointed Chairman of the PITB. In his role as Chairman of the PITB Saif was made responsible for all public-sector information technology projects in Punjab. In 2012 he established Pakistan's first technology incubator, Plan 9, with financial support from the government and became known for introducing the startup culture to Pakistan. During his tenure as Chairman of the PITB, he also established E-Rozgaar programme. He also founded Pakistan's first start-up incubator, SCI. In response to the 2011 outbreak of dengue fever in Pakistan PITB, under Saif's supervision, developed a smartphone-based early warning system to assist medical teams in curbing the outbreaks which received extensive recognition. He played a vital role in digitalising the land records in Punjab as well those of police, and other departments of the Punjab government. Saif established Pakistan's first IT university Information Technology University (ITU) and on 20 January 2013, he was appointed as the first and founding Vice Chancellor of the ITU by the Government of Punjab. At the age of 34, he became the youngest vice chancellor of a university in Pakistan at the time. In November 2016 he was inducted into the Punjab provincial cabinet of Chief Minister Shahbaz Sharif and was appointed as an adviser to the Chief Minister. In March 2017 Saif began co-hosting the reality television series Idea Croron Ka as a business expert. On 12 November 2018, the government of Punjab asked Saif to step down from the office of chairman of the PITB and Vice Chancellor of Information Technology University. He is credited for being the brains behind digital governance of Punjab and one of the main driving forces behind the IT ecosystem in the country. During his term as chairman of the PITB, more than 300 projects were carried out. In January 2019, Saif joined Jang Group as Chief Digital Officer. In February 2019, Saif founded his new startup called SurveyAuto and also announced to start his own venture capital firm called Khudi Ventures. Recognition In 2006, Saif received the Digital Inclusion Award from Microsoft Research. In 2008 he received the MIT Technovator Award. The same year he received the Mark Weiser Award and the IDG CIO Technology Pioneer Award. In August 2014 Saif was awarded the Sitara-i-Imtiaz by the Government of Pakistan for his services in the field of education and information technology. In 2015 and again in 2016 he was named as one of the 500 most influential Muslims. In March 2017 he was awarded the Alumni Award in the professional achievement award category by the British Council. In April 2018, he was appointed UNESCO chair for using Information and Communication Technology for Development. In May 2018, Bill Gates commended Saif for enabling Pakistan to use technology for immunisation coverage. In 2019, he was again named as one of the 500 most influential Muslims. References Living people 1979 births Place of birth missing (living people) Aitchison College alumni Alumni of Trinity College, Cambridge Lahore University of Management Sciences alumni Lahore University of Management Sciences faculty Massachusetts Institute of Technology faculty Pakistani computer scientists Scientists from Lahore Recipients of Sitara-i-Imtiaz
34885743
https://en.wikipedia.org/wiki/Lego%20Super%20Heroes
Lego Super Heroes
Lego Super Heroes is a theme and product range of the Lego construction toy, introduced in 2011. The line features DC Comics, Marvel Comics, and Pixar's The Incredibles franchises. Lego Batman existed as its own franchise from 2006 to 2008 before the official DC "Super Heroes" brand name was launched in late 2011. Lego Spider-Man first appeared in 2002, based on the Spider-Man film and its sequel, while sets based on the broader Marvel Comics universe were first launched in April 2012 to feature alongside the 2012 film The Avengers. Meanwhile, sets based on Pixar's The Incredibles were launched in June 2018 to feature alongside the 2018 animated film Incredibles 2. Overview The main focus of the line is the various fictional superheroes who have appeared in DC Universe and Marvel Universe, with large emphasis on the film incarnations thereof. Development Daily Bugle In 2021, AFOL-turned-designer Mark Stafford had revealed Daily Bugle (set number: 76178) has explained why the towering skyscraper is his ‘dream’ set. Mark Stafford explained: "I was seven years old when I was given my first Spider-Man comic, and I have always had an image of creating a Lego model of the Daily Bugle and having Spidey and his Amazing Friends in conflict with his various enemies. One of my favourite elements is the Green Goblin flying inside the building through the window. Being able to design a moment of frozen action like this in a Lego set has always been a dream and I finally got to make it happen!" The designer behind Daily Bugle (set number: 76178) had revealed why the soaring skyscraper is able to connect to the modular buildings. Mark Stafford explained: "A couple of [the modular buildings] look like New York brownstones so I figured an easy conversion into the law offices of Nelson and Murdock could be made". Construction sets The first wave of sets released included nine sets from the DC Universe line. The largest of the sets was Arkham Asylum Breakout (set number: 10937) which included 1619 pieces and eight minifigures. In addition to the first release, two promotional polybags were also released under the DC Universe line, Batman Jetski (set number: 30160) and Batmobile (set number: 30161). Nine new sets were released later in 2012 under the Marvel Universe line. Prior to the first wave of sets, Lego had given away five different minifigure promotional sets at comic conventions in the United States. At the 2011 San Diego Comic-Con, a Green Lantern minifigure and a Batman minifigure were given away to raffle winners and at New York Comic Con the same year, the minifigures of Green Lantern, Batman and Superman were given away at the DC Comics booth. In July 2012, four more exclusive minifigures were given at New York Comic Con to raffle winners - Shazam!, Phoenix, Bizarro and Symbiote Spider-Man. One year later, four more minifigures - Green Arrow, Black Man of Steel suit Superman, Spider-Woman, and The Amazing Spider-Man 2 suit Spider-Man were released at NYCC. Lego have also released an accompanying magnet set under the Super Heroes theme. It is a three piece magnet set consisting of the Batman, Robin and The Joker minifigures each attached to a magnetized brick. DC Universe Constraction Three sets were released on 1 January 2012. They are 4526 Batman, 4527 The Joker, and 4528 Green Lantern. Comics For July 2012's San Diego Comic-Con, exclusive Shazam and Bizarro minifigures were given away as part of a raffle draw. At 2013's SDCC, Black Suit Superman and Green Arrow minifigures were given away. In the same year, Toys "R" Us stores had The Joker's Mech minibuild available. For SDCC 2014, Batman of Zur-En-Arrh was released as an exclusive minifigure given away to attendees. In the same year, Toys "R" Us stores had the Batman Bat Signal minibuild available. At SDCC 2015, the exclusive Arsenal minifigure was given away to attendees. In addition, the exclusive Action Comics #1 Superman vignette set was also available, paying homage to the classic comic cover featuring Superman's debut. In 2016, the 30604 Cosmic Boy polybag was released together with Lego DC Comics Super Heroes Justice League: Cosmic Clash (Blu-ray + DVD). In addition, Atom was released as an exclusive minifigure given away at SDCC 2016. In 2017, the DC Comics Super Heroes Build Your Own Adventure book by Dorling-Kindersley was released, containing 11914 DC Comics Super Heroes Build Your Own Adventure parts and an exclusive Green Lantern minifigure. Furthermore, an exclusive Vixen minifigure was given away at SDCC 2017. At SDCC 2018, the exclusive 75996 Aquaman and Storm promotional set was available to attendees. In addition, an exclusive Black Lightning minifigure was released to convention attendees as well. For SDCC 2019, the event exclusive 77903 The Dark Knight of Gotham City vignette set was available to commemorate 80 Years of Batman. An exclusive Zebra Batman minifigure was also released for the event. In addition, since 2019, various DC Universe minifigures ranging from Batman and Superman to The Joker and The Penguin were released as magazine gifts with the Lego DC Magazine. Based on the Supergirl TV series, an event exclusive Supergirl minifigure was released exclusively through a DC FanDome 2020 raffle. In addition, a limited 77906 Wonder Woman was also released in conjunction with DC FanDome exclusively on Lego's official online store in the US and Canada. These exclusives were originally made for SDCC 2020, but were repurposed in the wake of the COVID-19 pandemic. Batman Five sets were released on 1 January 2012. They are 6857 The Dynamic Duo Funhouse Escape, 6858 Catwoman Catcycle City Chase, 6860 The Batcave, 6863 Batwing Battle Over Gotham City, and 6864 Batmobile and the Two-Face Chase. In addition, 30160 Batman Jetski and the microscale 30161 Batmobile were released as promotions in 2012. On 1 January 2013 (first sold on 28 December 2012), 10937 Batman: Arkham Asylum Breakout, and 76000 Artic Batman vs. Mr. Freeze: Aquaman on Ice were released, with the 30166 Robin and Redbird Cycle polybag released as a promotion. Three sets were released on 4 January 2014. They are 76010 Batman: The Penguin Face off, 76011 Batman: Man-Bat Attack and 76012 Batman: The Riddler Chase. Later, on 18 February, 76013 Batman: The Joker Steam Roller was released. In addition, microscale 30301 Batwing polybag was released as a promotion. On 1 January 2015, 30303 The Joker Bumper Car was released as a promotional polybag. Later, two sets were released on August 2 (first on June 1). They are 76034 Batboat Harbour Pursuit and 76035 Jokerland. Both sets were also alternatively rereleased together as 5004816 Super Heroes DC Collection on 22 August. On 1 March 2016, 76053 Gotham City Cycle Chase was released. Later, three sets namely 76054 Batman: Scarecrow Harvest of Fear, 76055 Batman: Killer Croc Sewer Smash and 76056 Batman: Rescue from Ra's al Ghul were released in June–August. In addition, 30606 Nightwing was released as a promotion the same year. Three sets were released on 1 August 2018. They are 76110 Batman: The Attack of the Talons, 76111 Batman: Brother Eye Takedown and 76112 App-Controlled Batmobile. Two sets were released on 1–2 January 2019. They are 76116 Batman Batsub and the Underwater Clash, and 76117 Batman Mech vs. Poison Ivy Mech. Later, on 12 June, a total of 6 more sets were first released. They are 76118 Mr. Freeze Batcycle Battle, 76119 Batmobile: Pursuit of The Joker, 76120 Batwing and The Riddler Heist and 76122 Batcave Clayface Invasion, as well as the Lego Juniors sets 76137 Batman vs. The Riddler Robbery and 76138 Batman and The Joker Escape. These sets were made available to the US and Canada on later dates, July 1 and August 2. Three sets were released on 1 June 2020, then on 24 August for the US and Canada. They are 76158 Batboat The Penguin Pursuit!, 76159 Joker's Trike Chase, and 76160 Mobile Bat Base. On 1 January 2021, the 40453 Batman vs. The Penguin & Harley Quinn blister pack was first released. Later, on 26 April, Lego Juniors set 76180 Batman vs. The Joker: Batmobile Chase and 76182 Batman Cowl were also released, though the latter was first released on April 2 in the US and Canada. Superman On 1 January 2012, 6862 Superman vs. Power Armor Lex was released. In addition, 30164 Lex Luthor was released as a promotion with preorders of the video game Lego Batman 2: DC Super Heroes. In 2018, the 30614 Lex Luthor polybag was released as a promotion. The Dark Knight Trilogy At the New York Comic Con, in October 2011, a promotional Batman minifigure based on the trilogy was given away at the DC comics booth. 76001 The Bat vs. Bane: Tumbler Chase, based on The Dark Knight Rises film, was first released on 29 December 2012, and launched three days later. D2C set 76023 The Tumbler based on The Dark Knight film was released on 24 December 2014. In addition, the microscale 30300 The Batman Tumbler polybag was released as a promotion. In June 2015, 5004590 Bat-Pod had a limited release as a VIP members' competition prize. 76239 Batmobile Tumbler: Scarecrow Showdown and the D2C set 76240 Batmobile Tumbler were released on 3 September 2021, based on the trilogy. DC Extended Universe Three sets based on the Man of Steel film were released on 28 April 2013. They are 76002 Superman Metropolis Showdown, 76003 Superman: Battle of Smallville, and 76009 Superman: Black Zero Escape. In addition, a 5001623 Jor-El polybag was released as a promotion. Three sets based on the Batman v Superman: Dawn of Justice film were released on 1–2 January 2016. They are 76044 Clash of the Heroes, 76045 Kryptonite Interception and 76046 Heroes of Justice: Sky High Battle. In addition, the microscale 30446 The Batmobile polybag was released as a promotion. 76075 Wonder Woman Warrior Battle, based on the Wonder Woman film, was released on 1–2 May 2017. Three sets based on the Justice League film were released on 1 August 2017. They are 76085 Battle of Atlantis, 76086 Knightcrawler Tunnel Attack and 76087 Flying Fox: Batmobile Airlift Attack. Additional sets were also released as a part of the Lego BrickHeadz theme. Subsequently, another set 853744 Knightmare Batman Accessory Set was first released on 1 August 2018. 76095 Black Manta Strike, based on the Aquaman film was released on 1 August 2018. The promotional polybag 30623 SHAZAM!, based on the Shazam! film was released in 2019. 76157 Wonder Woman vs. Cheetah, based on the Wonder Woman 1984 film, was released on 27 April 2020. Batman Classic TV Series At SDCC 2014, Batman Classic TV Series Batmobile, based on Batman (TV series) was released exclusively for purchase to convention attendees. 76052 Batman Classic TV Series - Batcave, based on the TV series, was released on 1 March 2016. In addition, a 30603 Batman Classic TV Series - Mr. Freeze polybag was released as a promotion. 76188 Batman Classic TV Series Batmobile was released based on the vehicle from the TV series on 26 April 2021. 76238 Classic TV Series Batman Cowl was released on October 1 the same year, based on Batman from the TV series. Justice League In 2014, 5002126 Martian Manhunter and 5004081 Plastic Man were polybags released as promotion for qualifying purchases and pre-orders of the video game Lego Batman 3: Beyond Gotham respectively. Based on the Justice League from DC Comics Super Heroes, 76025 Green Lantern vs. Sinestro, 76026 Gorilla Grodd Goes Bananas, 76027 Black Manta Deep Sea Strike, 76028 Darkseid Invasion and 76040 Brainiac Attack were released on 1 January 2015. In 2018, 76096 Superman & Krypto Team-Up, 76097 Lex Luthor Mech Takedown and 76098 Speed Force Freeze Pursuit was released on 11 January. Mighty Micros Three sets were released on 1 March 2016. They are 76061 Mighty Micros: Batman vs. Catwoman, 76062 Mighty Micros: Robin vs. Bane, and 76063 Mighty Micros: The Flash vs. Captain Cold. These 3 Mighty Micros were also released together as 66545 Mighty Micros Mighty Pack 3 in 1. Three sets were released on 2 January 2017. They are 76068 Mighty Micros: Superman vs. Bizarro, 76069 Mighty Micros: Batman vs. Killer Moth, and 76070 Mighty Micros: Wonder Woman vs. Doomsday. Three sets were released on 12 October 2018. They are 76092 Mighty Micros: Batman vs. Harley Quinn, 76093 Mighty Micros: Nightwing vs. The Joker, and 76094 Mighty Micros: Supergirl vs. Brainiac. Batman 1989 76139 1989 Batmobile, based on the Batman (1989 film), was released on 30 November 2019. In addition, 40433 1989 Batmobile - Limited Edition was released on 29 November as well. On 1 November 2020, the 76161 1989 Batwing, based on Batman 1989 as well, was subsequently released, after being first available on Lego's website since 22 October. The Batman In conjunction with The Batman (film), Lego released four movie tie-in sets on 1 November 2021, namely 76179 Batman & Selina Kyle Motorcycle Pursuit, 76181 Batmobile: The Penguin Chase, 76183: Batcave: The Riddler Face-Off as well as 42127 The Batman - Batmobile under the Lego Technic theme. Marvel Universe The Marvel Universe sets were first released in 2012. Four The Avengers sets and one X-Men set were released in March, followed by one Ultimate Spider-Man set in August. 2013 saw a much smaller selection available, with two Ultimate Spider-Man sets released in January, followed by three Iron Man 3 sets in March. All of the older sets have now been retired by Lego. Constraction Three sets were released on 4 May 2012. They are 4529 Iron Man, 4530 The Hulk, and 4597 Captain America. Comics 6866 Wolverine's Chopper Showdown, based on the X-Men comics, was released on 9 April 2012. For the 2012 International Toy Fair in New York, USA, exclusively limited comic book variant minifigures of Iron Man and Captain America (Bucky Barnes) were given out as promotional material, as well as competition prizes to promote the Lego Super Heroes Movie Maker App. Captain America's Shield was available as an in-store build at Toys "R" Us in 2014. 76022 X-Men vs. The Sentinel was released on 3 June 2014. Three sets were released on 17 February 2017. They are 76076 Captain America Jet Pursuit, 76077 Iron Man: Detroit Steel Strikes, and 76078 Hulk vs. Red Hulk. 30610 Giant Man Hank Pym, a promotional polybag was released alongside the video game Lego Marvel Super Heroes 2 Deluxe Edition in 2017. On 1 January 2022, 76202 Wolverine Mech Armor will be released, marking the first X-Men retail set since 2014 and third overall. In December 2021, The Lego Group announced 76202 Wolverine Mech Armor will not be released in January 2021, to be released on a later date. On 11 January 2022, 76202 Wolverine Mech Armor will be released in April 2022. For the San Diego Comic-Con, various Marvel minifigures have been given away over the years, exclusively available to convention attendees. These include the likes of Phoenix, Spider-Man in Black Symbiote Costume (2012), Spider-Woman (2013), All New Captain America (Sam Wilson) (2015), Steve Rogers Captain America (2016), Deadpool Duck (2017), and Sheriff Deadpool (2018) have been made and given out as event exclusive promotional merchandise across different conventions held each year. There have also been instances of non-comic based minifigures or sets given out or available for purchase. Ultimate Spider-Man 6873 Spider-Man's Doc Ock Ambush, based on the Ultimate Spider-Man TV series, was first released on 24 July 2012. Two sets were released on 3 January 2013. They are 76004 Spider-Man: Spider-Cycle Chase, and 76005 Spider-Man: Daily Bugle Showdown. Three sets were released on 18 February 2014. They are 76014 Spider-Trike vs. Electro, 76015 Doc Ock Truck Heist and 76016 Spider-Helicopter Rescue. In addition, a 30302 Spider-Man polybag was released as a promotion. Two sets were released on 2 August 2015. They are 76036 Carnage's Shield Sky Attack, and 76037 Rhino and Sandman Super Villain Team-up. In addition, a 30305 Spider-Man Super Jumper polybag was released as a promotion. In 2016, a 30448 Spider-Man vs. The Venom Symbiote polybag was released as a promotion. The Avengers Four sets based on The Avengers film were released on 9 April 2012. They are 6865 Captain America's Avenging Cycle, 6867 Loki's Cosmic Cube Escape, 6868 Hulk's Helicarrier Breakout, and 6869 Quinjet Aerial Battle. In addition, four polybags namely the microscale 30162 Quinjet, 30163 Thor and the Cosmic Cube, 30165 Hawkeye with Equipment, and 5000022 The Hulk were released as promotions. In 2013, the 30167 Iron Man vs. Fighting Drone polybag was also released as a promotion. Six sets based on the Avengers: Age of Ultron film were released on 1 March 2015. They are 76029 Iron Man vs. Ultron, 76030 Avengers Hydra Showdown, 76031 The Hulk Buster Smash, 76032 The Avengers Quinjet City Chase, 76038 Attack on Avengers Tower, and 76041 The Hydra Fortress Smash. In addition, the microscale 30304 The Avengers Quinjet, 5002946 Silver Centurion, and 5003084 The Hulk polybags were released as promotions. For San Diego Comic-Con 2015, Throne of Ultron was released as an event exclusive set. Furthermore, the D2C set 76042 The S.H.I.E.L.D. Helicarrier was released on 7 March in the same year. Later on, 76105 The Hulkbuster: Ultron Edition was released on 4 March 2018. Six sets based on the Avengers: Infinity War film were released on 4 March 2018. They are 76101 Outrider Dropship Attack, 76102 Thor's Weapon Quest, 76103 Corvus Glaive Thresher Attack, 76104 The Hulkbuster Smash-Up, 76107 Thanos Ultimate Battle, and 76108 Sanctum Sanctorum Showdown. In addition, the microscale polybag 30525 The Guardians' Ship was released as a promotion. Additional sets were also released as a sub-brand of the Lego Brickheadz theme. Later in October, 5005256 Marvel Super Heroes Minifigure Collection was released as an exclusive promotional set only available in Toys "R" Us stores or its online store. Five sets based on the Avengers: Endgame film were released on 1 April 2019. They are 76123 Captain America: Outriders Attack, 76124 War Machine Buster, 76125 Iron Man Hall of Armor, 76126 Avengers Ultimate Quinjet and 76131 Avengers Compound Battle. Later, 76144 Avengers Hulk Helicopter Rescue was released on 27 November. In addition, an 30452 Iron Man and Dum-E polybag was released as a promotion. Stormbreaker was available as an in-store build in 2019. In 2019, the 40334 Avengers Tower promotional set was released, based on The Avengers film franchise. Additional sets based on the films would later be apart of the Infinity Saga sets. Iron Man 3 Three sets based on the Iron Man 3 film were released on 7 March 2013. They are 76006 Iron Man: Extremis Sea Port Battle, 76007 Iron Man: Malibu Mansion Attack and 76008 Iron Man vs. The Mandarin: Ultimate Showdown. In addition, a 30168 Gun Mounting System polybag was released as a promotion with pre-orders of the Lego Marvel Super Heroes video game. In August 2020, 76165 Iron Man Helmet was released, based on the Iron Man film. Additional sets based on the film would later be apart of the Infinity Saga sets. The Amazing Spider-Man For San Diego Comic-Con 2013, an exclusive Spider-Man minifigure based on The Amazing Spider-Man film was given away as an event exclusive. In 2014, the polybag 5002125 Electro was released as a promotion, based on The Amazing Spider-Man 2 film. Avengers Assemble Two sets based on the Avengers Assemble TV series were released on 18 February 2014. They are 76017 Avengers: Captain America vs. Hydra, and 76018 Avengers: Hulk Lab Smash. Two more sets were released on 2 January 2016. They are 76048 Iron Skull Sub Attack, and 76049 Avenjet Space Mission. Captain America: The Winter Soldier In 2015, the polybag 5002943: Winter Soldier was released as a promotion, based on both the Captain America: The Winter Soldier film and Marvel comics. Guardians of the Galaxy Three sets based on the Guardians of the Galaxy film were released on 3 June 2014. They are 76019 Starblaster Showdown, 76020 Knowhere Escape Mission, and 76021 The Milano Spaceship Rescue. In addition, a 5002145 Rocket Raccoon polybag was released as a promotion. Furthermore, Rocket Racoon's Warbird, and The Collector were released as San Diego Comic-Con 2014 exclusives, as a limited retail set and giveaway minifigure. Three sets based on the Guardians of the Galaxy Vol. 2 film were released on 17 February 2017. They are 76079 Ravager Attack, 76080 Ayesha's Revenge, and 76081 The Milano vs. The Abilisk. In addition, a microscale 30449 The Milano polybag was released as a promotion. Ant-Man 76039 Ant-Man Final Battle, based on the Ant-Man film, was released on 1 June 2015. 76109 Quantum Realm Explorers, based on the Ant-Man and the Wasp film, was released on 2 June 2018. In addition, 75997 Ant-Man and the Wasp was released as an exclusive set to San Diego Comic-Con 2018. Mighty Micros Three sets were released on 1 March 2016. They are 76064 Mighty Micros: Spider-Man vs. Green Goblin, 76065 Mighty Micros: Captain America vs. Red Skull, and 76066 Mighty Micros: Hulk vs. Ultron. Three sets were released on 2 January 2017. They are 76071 Mighty Micros: Spider-Man vs. Scorpion, 76072 Mighty Micros: Iron Man vs. Thanos, and 76073 Wolverine vs. Magneto. Three sets were released on 1 January 2018. They are 76089 Mighty Micros: Scarlet Spider vs. Sandman, 76090 Mighty Micros: Star-Lord vs. Nebula, and 76091 Mighty Micros: Thor vs. Loki. Captain America: Civil War Three sets based on the Captain America: Civil War film were released on 1 March 2016. They are 76047 Black Panther Pursuit, 76050 Crossbones Hazard Heist, and 76051 Super Hero Airport Battle. Subsequently, 76067 Tanker Truck Takedown was released on 1 August as a Toys "R" Us exclusive. In addition, a 30447 Captain America's Motorcycle polybag was released as a promotion. Doctor Strange 76060 Doctor Strange's Sanctum Sanctorum, based on the film Doctor Strange, was released on 1 August 2016. 76205 Gargantos Showdown, based on the film Doctor Strange in the Multiverse of Madness was released on 1 January 2022. Spider-Man Three sets were released on 1 August 2016. They are 76057 Spider-Man: Web Warriors Ultimate Bridge Battle, 76058 Spider-Man: Ghost Rider Team-Up, and 76059 Spider-Man: Doc Ock's Tentacle Trap. Five sets were released on 25 November 2018. They are 76113 Spider-Man Bike Rescue, 76114 Spider-Man's Spider Crawler, 76115 Spider Mech vs. Venom, and Juniors sets 76133 Spider-Man Car Chase and 76134 Spider-Man: Doc Ock Diamond Heist. In 2019, the 30451 Spider-Man's Mini Spider Crawler polybag was released as a promotion. Five sets were released on 2 January 2020. They are 76146 Spider-Man Mech, 76147 Vulture's Trucker Robbery, 76148 Spider-Man vs. Doc Ock, 76149 The Menace of Mysterio, and 76150 Spiderjet vs. Venom Mech. Later, two sets were released on 3 July. They are 76151 Venomosaurus Ambush, and 76163 Venom Crawler. In addition, since 2020, various Spider-Man minifigures ranging from Spider-Man and Venom to Iron Spider were released as magazine gifts with the Lego Avengers Magazine. Five sets were released on 2 January 2021. They are 76171 Miles Morales Mech Armor, Juniors set 76172 Spider-Man and Sandman Showdown, 76173 Spider-Man and Ghost Rider vs. Carnage, 76174 Spider-Man's Monster Truck vs. Mysterio, and 76175 Attack on the Spider Lair. Four sets were released subsequently in 2021. They are 40454 Spider-Man versus Venom and Iron Venom, 76187 Venom, 76198 Spider-Man & Doctor Octopus Mech Battle, and 76199 Carnage. The first Marvel Modular was released on 1 June 2021: 76178 Daily Bugle. It is currently the tallest of all licensed and unlicensed modular sets, measuring roughly 82 centimeters and is composed of 3772 bricks and pieces. This Lego set includes 25 minifigures, including but not limited to Spider-Man, J. Jonah Jameson, Doctor Octopus, and Daredevil. The Daily Bugle Skyscraper comprises four stories (not including the roof), a newspaper stand, a "Spider-Buggy", and a taxi. Rooms in the Daily Bugle depict a lobby, an editor's bullpen, a storage room, as well as Jameson's office, and Brant's secretarial desk. On one of the floors, there is a reference to a meme originating from Spider-Man (1967 TV series). Littered throughout the playset are newspapers referencing several Marvel characters, such as Norman Osborn, Morbius the Living Vampire, Kingpin, The Lizard, J. Jonah Jameson III, and several more. This is one of the first modular buildings to include alleyways. The third story displays a window that is severely damaged caused by the Green Goblin. 76219 Spider-Man & Green Goblin Mech Battle will be released on 1 April 2022. The set consists of 296 pieces and 2 minifigures. The set included Lego minifigures of Spider-Man and Green Goblin. Spider-Man: Homecoming Two sets based on the Spider-Man: Homecoming film were released on 2 June 2017. They are 76082 ATM Heist Battle, and 76083 Beware the Vulture. Three sets based on the Spider-Man: Far From Home film were released on 22 April 2019. They are 76128 Molten Man Battle, 76129 Hydro-Man Attack, and 76130 Stark Jet and the Drone Attack. Later, an exclusive 40343 Spider-Man and the Museum Break-In set was released on 12 June. In addition, a promotional polybag set namely 30443 Spider-Man Bridge Battle will be released in 2022 as well. Three sets inspired by all three films from the trilogy was released in 2021 in conjunction with the Spider-Man: No Way Home film. They are 76184 Spider-Man vs. Mysterio's Drone Attack, 76185 Spider-Man at the Sanctum Workshop and 76195 Spider-Man's Drone Duel. Thor: Ragnarok Two sets based on the Thor: Ragnarok film were released on 1 August 2017. They are 76084 The Ultimate Battle For Asgard, and 76088 Thor vs. Hulk: Arena Clash. 76208 The Goat Boat based on the Thor: Love and Thunder film will be released on 26 April 2022. The set consists of 564 pieces with 5 minifigures. The set included Lego minifigures of Thor, Jane Foster / Mighty Thor, Valkyrie, Korg and Gorr the God Butcher. Black Panther Two sets based on the Black Panther film were released on 1 January 2018. They are 76099 Rhino Face-Off by the Mine, and 76100 Royal Talon Fighter Attack. In addition, a microscale 30450 Royal Talon Fighter polybag was released as a promotion. Marvel's Spider-Man For San Diego Comic-Con 2019, PS4 Spider-Man was released as an event exclusive, based on the Spider-Man video game by Insomniac Games. Produced as an exclusive for San Diego Comic-Con 2020, Classic Suit Miles Morales was instead released as part of a sweepstakes in October, based on the Spider-Man: Miles Morales video game by Insomniac Games. Captain Marvel 76127 Captain Marvel and The Skrull Attack, based on the Captain Marvel film, was released on 2 January 2019. For the San Diego Comic-Con 2019, 77902 Captain Marvel and the Asis was released as an event exclusive. Furthermore, Mini Captain Marvel Ship was available as an in-store build at Toys "R" Us the same year. In 2020, a 30453 Captain Marvel and Nick Fury polybag was released as a promotion. Avengers Four sets based on the Avengers were released on 2 January 2020. They are 76140 Iron Man Mech, 76141 Thanos Mech, 76142 Avengers Speeder Bike Attack, and 76143 Avengers Truck Take-down. On 1 June 2020, 40418 Falcon & Black Widow Team-Up was released. Later, five more sets were released on 3 July the same year. They are Juniors set 76152 Avengers Wrath of Loki, 76153 Avengers Helicarrier, 76164 Iron Man Hulkbuster versus A.I.M. Agent, 76155 Iron Man, and 76166 Avengers Tower Battle. On 24 August, 76167 Iron Man Armory was released. In addition, since 2020, various Avengers minifigures ranging from Iron Man and Captain America to Captain Marvel and War Machine were released as magazine gifts with the Lego Avengers Magazine. Three sets were released on 2 January 2021. They are 76168 Captain America Mech Armor, 76169 Thor Mech Armor, and Juniors set 76170 Iron Man vs. Thanos. On 1 September 2021, 76196 The Avengers Advent Calendar, the first Marvel Advent Calendar, was released. On 1 January 2022, 76203 Iron Man Mech Armor and 76204 Black Panther Mech Armor will be released. In December 2021, The Lego Group announced the 3 sets will not be released in January 2021, to be postponed to a later date. On 11 January 2022, the 3 sets will be released in April 2022. Black Widow 76162 Black Widow's Helicopter Chase, based on the Black Widow film, was released on 1 March 2020. Later, 77905 Taskmaster's Ambush, which was only made available via Lego USA's website and online store, was released in October. It was originally made to be an SDCC exclusive, but was repurposed in light of the COVID-19 pandemic. Shang-Chi and the Legend of the Ten Rings Two sets, along with a promotional polybag, based on the Shang-Chi and the Legend of the Ten Rings film on 26 April 2021. These were 76176 Escape from The Ten Rings, 76177 Battle at the Ancient Village and 30454 Shang-Chi and The Great Protector. Infinity Saga Six sets based upon past films from the Infinity Saga were released in June 2021. They are 76186 Black Panther Dragon Flyer, 76189 Captain America and Hydra Face-Off, 76190 Iron Man: Iron Monger Mayhem, 76191 The Infinity Gauntlet, 76192 Avengers: Endgame Final Battle and 76193 The Guardians' Ship. Another two sets, namely 76200 Bro Thor's New Asgard and 76237 Sanctuary II: Endgame Battle were released later in 2021. On 1 January 2022, 76206 Iron Man Figure featuring Iron Man Mark XLIII from Avengers: Age of Ultron was released. On 1 February 2022, 76209 Thor's Hammer based on Thor will be released in March 2022. The set consists of 979 pieces with 1 minifigure of Thor as well as trinkets from Odin's Vault. What If...? Two sets based on the What If...? series were released in 2021. They are 76194 Tony Stark's Sakaarian Iron Man, and 76201 Captain Carter & The Hydra Stomper. Eternals Four sets based on the Eternals film were launched in 2021 to feature alongside the film's release. Namely, 76145 Eternals' Aerial Assault, 76154 Deviant Ambush!, 76155. In Arishem's Shadow and 76156 Rise of the Domo. Spidey and His Amazing Friends Four sets based on the children's television series Spidey and His Amazing Friends were released in January 2022. They are 10781 Spider-Man's Techno Trike, 10782 Hulk vs. Rhino Truck Showdown, 10783 Spider-Man at Doc Ock's Lab and 10784 Spider-Man Webquarters Hangout. Pixar's The Incredibles Three sets based on the Incredibles 2 film were released on 21 April 2018. They are 10759 Elastigirl's Rooftop Pursuit, 10760 Underminer's Bank Heist, and 10761 The Great Home Escape. In addition, an 30615 Edna Mode polybag was released as a promotion. Each of the sets featured the five core characters: Mr. Incredible, Mrs. Incredible, Violet Parr, Dashiell 'Dash' Parr and Jack-Jack. Other characters and character variants (Mr. Incredible, Syndrome, Frozone, Edna Mode etc.) have also been released in Lego Minifigures The Lego Disney Series 1 and 2. Lego Minifigures In 2017, 71017 The Lego Batman Movie Series 1 was released, based on The Lego Batman Movie film, with a total of 20 minifigures. A follow-up was released in 2018 in 71020 The Lego Batman Movie Series 2, with a total of 20 minifigures. In 2020, 71026 DC Super Heroes Series was released, based on DC Comics, with a total of 16 minifigures. In 2021, 71031 Marvel Studios Series was released, based on the Marvel Cinematic Universe Disney+ series WandaVision, The Falcon and the Winter Soldier, Loki and What If...?, with a total of 12 minifigures. In 2016, 71012 Disney Series 1 was released, with 2 minifigures from The Incredibles franchise: Mr. Incredible and Syndrome. In 2019, a follow-up 71024 Disney Series 2 was released with Edna Mode and Frozone. Lego Brick Sketches Lego released the 40386 Batman and 40428 The Joker under the Lego Brick Sketches theme on 1 June 2020. Lego Art Lego released the 31199 Marvel Studios Iron Man under the Lego Art theme on 1 August 2020. TV specials and movies DC Lego Batman: The Movie – DC Super Heroes Unite (2013) Lego Batman: The Movie – DC Super Heroes Unite is a direct-to-video computer-animated superhero action comedy film based on the video game Lego Batman 2: DC Super Heroes. It encompasses most cutscenes from the game, while the gameplay was replaced by new scenes. The film was released on Blu-ray and DVD on 21 May 2013, and received generally positive reviews, with praise for the animation and action, although the promotional tone of the film was criticized. Lego DC Comics: Batman Be-Leaguered (2014) Lego DC Comics Super Heroes: Batman Be-Leaguered is an animated superhero short film based on the Lego and DC Comics brands. It premiered on Cartoon Network on October 27, 2014, and is the second Lego DC Comics film following Lego Batman: The Movie – DC Super Heroes Unite. The film was released on DVD with Lego DC Comics Super Heroes: Justice League vs. Bizarro League in 2015. Lego DC Comics Super Heroes: Justice League vs. Bizarro League (2015) Lego DC Comics Super Heroes: Justice League vs. Bizarro League is an computer-animated comedy film based on the Lego and DC Comics brands, released on February 10, 2015, on Blu-ray and DVD. This is the third Lego DC Comics film following Lego Batman: The Movie – DC Super Heroes Unite and Lego DC Comics: Batman Be-Leaguered. Some actors from various DC properties reprise their respective roles, including Nolan North as Superman, Khary Payton as Cyborg, Diedrich Bader as Green Lantern (Guy Gardner) and Tom Kenny as The Penguin and Plastic Man. The film received negative reviews from critics, with criticisms focusing on the silly and promotional tone and the characters, although the animation was praised. Lego DC Comics Super Heroes: Justice League: Attack of the Legion of Doom (2015) Lego DC Comics Super Heroes: Justice League – Attack of the Legion of Doom is an computer-animated comedy film based on the Lego]and DC Comics brands, which was released on August 25, 2015, on Blu-ray, DVD and Digital HD. This is the fourth Lego DC Comics film following Lego Batman: The Movie – DC Super Heroes Unite, Lego DC Comics: Batman Be-Leaguered and Lego DC Comics Super Heroes: Justice League vs. Bizarro League. Actors from various (also copyrighted) DC properties reprise their respective roles, including Mark Hamill as The Trickster, Nolan North as Superman, Khary Payton as Cyborg, John DiMaggio as The Joker, Josh Keaton as Green Lantern, Kevin Michael Richardson as Black Manta, Grey Griffin as Lois Lane and Tom Kenny as The Penguin. The film received generally positive reviews, with praise for the animation, action, and humor, although some criticized the consumerism in the film. Lego DC Comics Super Heroes: Justice League: Cosmic Clash (2016) Lego DC Comics Super Heroes: Justice League – Cosmic Clash is an computer-animated action comedy film based on the Lego and DC Comics brands, which was released on February 9, 2016, on Digital HD and March 1 on Blu-ray and DVD. It is the fifth Lego DC Comics film following Lego Batman: The Movie – DC Super Heroes Unite, Lego DC Comics: Batman Be-Leaguered, Lego DC Comics Super Heroes: Justice League vs. Bizarro League and Lego DC Comics Super Heroes: Justice League – Attack of the Legion of Doom. Some actors from various DC properties reprised their respective roles, including Nolan North as Superman and Khary Payton as Cyborg. The film received positive reviews, with critics deeming it superior to past films in the Lego DC Comics film series. Lego DC Comics Super Heroes: Justice League: Gotham City Breakout (2016) Lego DC Comics Super Heroes: Justice League – Gotham City Breakout is a direct-to-video computer-animated superhero action comedy film based on the Lego and DC Comics brands, which was released on June 21, 2016, in Digital HD and July 12 on Blu-ray and DVD. It is the sixth Lego DC Comics film following Lego Batman: The Movie – DC Super Heroes Unite, Lego DC Comics: Batman Be-Leaguered, Lego DC Comics Super Heroes: Justice League vs. Bizarro League, Lego DC Comics Super Heroes: Justice League – Attack of the Legion of Doom and Lego DC Comics Super Heroes: Justice League – Cosmic Clash. Some actors from various DC properties reprise their respective roles, including Nolan North as Superman and Troy Baker as Batman. The film received positive reviews, with praise for the action, although the consumerism was criticized. The Lego Batman Movie (2017) The Lego Batman Movie is a 2017 computer-animated superhero comedy film produced by the Warner Animation Group and distributed by Warner Bros. Pictures. It was directed by Chris McKay in his directorial debut, and written by Seth Grahame-Smith, Chris McKenna, Erik Sommers, Jared Stern, and John Whittington, and produced by Dan Lin, Roy Lee, and Phil Lord and Christopher Miller. Based on the Lego Batman toy line, the film is an international co-production of the United States, Australia, and Denmark, the first spin-off installment of The Lego Movie film series and the second installment overall. The story centers on the DC Comics character Batman as he attempts to overcome his greatest fear to stop the Joker's latest plan. The film features Will Arnett reprising his role as Batman from The Lego Movie alongside Zach Galifianakis, Michael Cera, Rosario Dawson, and Ralph Fiennes. The Lego Batman Movie had its world premiere in Dublin, Ireland on January 29, 2017, and was released in the United States on February 10. The film was released in 3D, RealD 3D, Dolby Cinema, IMAX, IMAX 3D and 4DX. The film received generally positive reviews from critics for its animation, voice acting, soundtrack, visual style, and humor, and was also commercially successful, having grossed $312 million worldwide against a budget of $80 million. A sequel was announced in 2018, but with Universal Pictures acquiring the rights to The Lego Movie franchise, it is unknown if it will still be produced. Lego DC Comics Super Heroes: The Flash (2018) Lego DC Comics Super Heroes: The Flash is an American direct-to-video computer-animated film. It is a superhero action-adventure comedy, based on the DC Comics and Lego brands. It is produced by DC Entertainment, The Lego Group and Warner Bros. Animation and distributed by Warner Bros. Home Entertainment, and was released digitally on February 13, 2018, and was released on DVD and Blu-ray on March 13. It is the seventh Lego DC Comics film. This is the first posthumous release for longtime DC producer Benjamin Melniker, who died a month before its release. The film received positive reviews from critics, who praised the action, humor, and animation. Lego DC Comics Super Heroes: Aquaman: Rage of Atlantis (2018) Lego DC Comics Super Heroes: Aquaman – Rage of Atlantis is an American direct-to-video computer-animated film. It is a superhero action-adventure comedy, based on the DC Comics and Lego brands. Produced by DC Entertainment, The Lego Group and Warner Bros. Animation and distributed by Warner Bros. Home Entertainment. It premiered at the San Diego Comic-Con International on July 22, 2018 and was released digitally, DVD and Blu-ray on July 31. It is the eighth Lego DC Comics film. The film received mixed reviews, with praise for the animation but criticism for the consumerism. Lego DC Batman: Family Matters (2019) Lego DC Batman: Family Matters is an American direct-to-video computer-animated film. It is a superhero action-adventure comedy based on the DC Comics and Lego brands produced by DC Entertainment, The Lego Group and Warner Bros. Animation, and distributed by Warner Bros. Home Entertainment, it premiered at the San Diego Comic-Con on July 21, 2019 and was released on DVD, Blu-ray and Digital on August 20. It is the ninth Lego DC Comics film. The DVD release includes a free 84-piece Lego set. The film received positive reviews, with praise for the humor and action, although the consumerism was criticized. Lego DC: Shazam!: Magic and Monsters (2020) Lego DC Shazam!: Magic and Monsters is an American direct-to-video computer-animated superhero action-adventure comedy film based on the DC Comics and Lego brands produced by DC Entertainment, The Lego Group and Warner Bros. Animation and distributed by Warner Bros. Home Entertainment. It is the tenth Lego DC Comics film. The film was released on digital on April 28, and on Blu-ray/DVD on June 16, 2020. The film received positive reviews from critics, with praise for the humor and action. Marvel Lego Marvel Super Heroes: Maximum Overload (2013) Lego Marvel Super Heroes: Maximum Overload (also known as Marvel Super Heroes: Maximum Overload) is a computer-animated Lego film based on Marvel Comics characters that were also featured in Lego Marvel Super Heroes. It premiered online in five parts on November 5, 2013. The film can also be viewed on Netflix and Amazon Video being free with Amazon Prime. Lego Marvel Super Heroes: Avengers Reassembled (2015) Lego Marvel Super Heroes: Avengers Reassembled is a computer animated Lego film based on Marvel Comics characters that appeared in Lego Marvel Super Heroes and Lego Marvel's Avengers. It is a re-imagined retelling of Avengers: Age of Ultron while using some elements from Ant-Man and Spider-Man. The film first aired on Disney XD. It is available to watch at Lego.com. Lego Marvel Super Heroes - Guardians of the Galaxy: The Thanos Threat (2017) Lego Marvel Super Heroes - Guardians of the Galaxy: The Thanos Threat is a computer-animated Lego film based on Marvel Comics and starring the Guardians of the Galaxy. The film premiered on YouTube and Disney XD. Lego Marvel Super Heroes - Black Panther: Trouble in Wakanda (2018) Lego Marvel Super Heroes - Black Panther: Trouble in Wakanda is a computer-animated Lego film based on Marvel Comics and starring Black Panther. It is a re-imagined retelling of Black Panther and Avengers: Infinity War. The film premiered on YouTube and Disney XD. Lego Marvel Spider-Man: Vexed by Venom (2019) Lego Marvel Spider-Man: Vexed by Venom is a computer-animated Lego film based on Marvel Comics and starring Spider-Man. It premiered on YouTube and Disney XD. Lego Marvel Avengers: Climate Conundrum (2020) Lego Marvel Avengers: Climate Conundrum is a four-part computer-animated Lego film based on Marvel Comics and starring Avengers. The film premiered on YouTube and Disney XD. Video games DC Lego Batman: The Videogame A video game based on the Lego DC Super Heroes half of the line, titled Lego Batman: The Videogame was released in fall 2008. The game was released for personal computer, Nintendo DS, PlayStation 2 and 3, the PSP, Wii and Xbox 360. The Mac OS X version of the game was released in April 2009 by Feral Interactive. Lego Batman 2: DC Super Heroes A video game sequel based on the Lego DC Super Heroes half of the line, titled Lego Batman 2: DC Super Heroes was released in the summer of 2012 as a sequel to Lego Batman: The Video Game. The game was released on personal computer, PlayStation 3, PlayStation Vita, Nintendo 3DS, Nintendo DS, Wii and Xbox 360. The Mac OS X version of the game, published by Feral Interactive, was released on 6 September the same year. Lego Batman 3: Beyond Gotham The third video game based on the Lego DC Super Heroes line, titled Lego Batman 3: Beyond Gotham was released in November 2014 as a sequel to both Lego Batman: The Video Game and Lego Batman 2: DC Super Heroes. The game was released on iOS, personal computer, PlayStation 3, PlayStation 4, PlayStation Vita, Nintendo 3DS, Wii U, Xbox 360 and Xbox One. Lego Dimensions The crossover toys-to-life game Lego Dimensions developed by Traveller's Tales features content based on the original The Lego Movie and The Lego Batman Movie. A "Starter Pack" includes an additional level that recreates the events of the original film and adds Wyldstyle as a playable character. Additional "Fun packs" add Emmet, Benny, Bad Cop and Unikitty as playable characters. A "story pack" offers an extended six-level story campaign retelling the events of The Lego Batman Movie, and includes a playable Robin and Batgirl. Additional "Fun packs" add Excalibur Batman as a playable character. The Lego Batman Movie Game Based on The Lego Batman Movie, Warner Bros. Interactive Entertainment released the endless-runner game coinciding with the release of the film. It was released for Android and iOS. Lego DC Super-Villains The fourth video game based on the Lego DC Super Heroes line, titled Lego DC Super-Villains was released in October 2018. Unlike the Lego Batman trilogy, this is the first Lego video game to focus entirely on villains of the DC Universe, similar to the villain levels featured in Lego Batman: The Videogame. The macOS version of the game was released by Feral Interactive in July 2019. Marvel Lego Marvel Super Heroes A video game based on the Lego Marvel Super Heroes line, titled Lego Marvel Super Heroes was released in October 2013. Originally, a Lego Avengers game was set to be made, but the developers felt that just being able to play as the Avengers was not enough, and thus decided to add other Marvel heroes. The game was released on iOS, personal computer, PlayStation 3, PlayStation 4, PlayStation Vita, Nintendo DS, Nintendo 3DS, Wii U, Xbox 360, Xbox One and published by Feral Interactive for OS X. Lego Marvel's Avengers A second standalone video game featuring the Lego Marvel Super Heroes line, separate from the first game, titled Lego Marvel's Avengers was released in January 2016. It follows the plots of the two Avengers movies, The Avengers and Avengers: Age of Ultron. It was released on personal computer, PlayStation 3, PlayStation 4, PlayStation Vita, Nintendo 3DS, Wii U, Xbox 360 and Xbox One. Lego Marvel Super Heroes 2 The third game featuring the Lego Marvel Super Heroes line, titled Lego Marvel Super Heroes 2 was released in November 2017, as a direct sequel to the original Lego Marvel Super Heroes. The game is not related to the standalone game Lego Marvel's Avengers. Pixar Lego The Incredibles A video game adaptation based on the events of The Incredibles and Incredibles 2 films, titled Lego The Incredibles was released in June 2018. The game was developed by TT Fusion and released by Warner Bros. Interactive Entertainment for Nintendo Switch, Xbox One and PlayStation 4 coinciding with the release of the second film. A macOS version of the game was released by Feral Interactive in November the same year. App An app titled Lego Duplo Marvel was developed by The Lego Group for iOS and Android. It was released on 9 December 2021 for preschoolers. It includes Spider-Man, Captain America, Ghost-Spider and more. Aimed towards children ages 2 to 5 years old. Reception In 2020, the Toy Retailers Association listed the Iron Man Hall of Armor (set number: 76125) on its official list of Toy of the Year Awards. Awards and nominations In 2022, Lego Marvel Series Collectible Minifigures (set number: 71031) was awarded "Toy of the Year" and also "Collectible of the Year" by the Toy Association. Daily Bugle (set number: 76178) was awarded "Toy of the Year" and also "Construction Toy of the Year" by the Toy Association. See also Lego Batman The Lego Batman Movie (Lego theme) Lego DC Super Hero Girls Lego Spider-Man Lego Minifigures (theme) Notes References Bibliography Lego Batman: Visual Dictionary. Authored by Daniel Lipkowitz. Published by Dorling Kindersley, 2012. Lego Dc Universe Super Heroes: Batman: Ultimate Sticker Collection. Published by Dorling Kindersley, 2012. Save the Day (Lego DC Superheroes: Comic Reader). Authored by Trey King. Published by Scholastic Inc., 2013. Lego Batman 2: DC Super Heroes. Authored by Stephen Stratton. Published by Prima Games, 2013. Lego DC Superheroes Handbook. Authored by Greg Farshtey. Published by Scholastic Inc., 2013. Lego Marvel Super Heroes : Prima's Official Game Guide. Authored by Sir Michael Knight and Nick von Esmarch. Published by Dorling Kindersley, 2013. Lego DC Universe Super Heroes Phonics Boxed Set. Authored by Quinlan B Lee. Published by Scholastic Inc., 2014. Friends and Foes! (Lego DC Super Heroes). Authored by Trey King and Sean Wang. Published by Scholastic Inc., 2015. DK Readers L2: Lego(r) DC Comics Super Heroes: Amazing Battles! : It's Time to Beat the Bad Guys!. Published by Dorling Kindersley, 2015. Sidekick Showdown!. Authored by Trey King and Sean Wang. Published by Turtleback Books, 2016. Attack of the Legion of Doom!. Authored by Jim Krieg. Published by Turtleback Books, 2016. Lego DC Super Heroes: Carnival Capers!. Authored by Eric Esquivel. Published by Scholastic Inc., 2016. Lego DC Comics Super Heroes Handbook. Authored by Greg Farshtey. Published by Scholastic Inc., 2016. Lego DC Superheroes Friends and Foes. Authored by Trey King. Published by Scholastic Inc., 2016. Lego DC Comics Super Heroes Character Encyclopedia : New Exclusive Pirate Batman Minifigure. Published by Dorling Kindersley, 2016. Lego Marvel Super Heroes Strategy Guide & Game Walkthrough - Cheats, Tips, Tricks, and More!. Authored by 2up Guides. Published by Createspace Independent Publishing Platform, 2017. Lego DC Comics Super Heroes Build Your Own Adventure : With minifigure and exclusive model. Authored by Daniel Lipkowitz. Published by Dorling Kindersley, 2017. Lego DC Super Heroes: Super Hero Stories. Published by Scholastic Inc., 2017. Cosmic Clash. Authored by J.E. Bright and Kenny Kiernan. Published by Scholastic US, 2017. Lego DC Super Heroes Visual Dictionary : With Exclusive Yellow Lantern Batman Minifigure. Authored by Elizabeth Dowsett and Arie Kaplan. Published by Dorling Kindersley, 2018. Official Justice League Training Manual. Published by Scholastic US, 2017. Lego DC Comics Super Heroes The Awesome Guide: With Exclusive Wonder Woman Minifigure. Published by Dorling Kindersley, 2017. Bad Guy Blizzard. Authored by Liz Marsham. Published by Scholastic US, 2018. Super-Villain Scare!. Authored by Liz Marsham. Published by Scholastic US, 2018. Faster Than Lightning! ACT+FIG. Authored by Ameet Studio. Published by Scholastic US, 2018. Lego DC Comics Super Heroes Ultimate Quiz Book: 1000 Brain-Busting Questions. Authored by Melanie Scott. Published by Dorling Kindersley, 2018. Lego DC Comics Super Heroes Visual Dictionary: With Exclusive Yellow Lantern Batman Minifigure. Authored by Elizabeth Dowsett and Arie Kaplan. Published by Dorling Kindersley, 2018. Lego Marvel Super Hero Jumbo Coloring Book : DC Comics Coloring Book for Kids and Any Fan of Marvel and DC (Perfect for Children Ages 4-12). Authored by Mia Smith. Published by Createspace Independent Publishing Platform, 2018. Lego DC Marvel superheroes coloring book : for kids ages 5-9. Authored by Hola Warhola. Published by Independently Published, 2019. Lego Batman Sticker Super Heroes and Super-Villains. Published by Dorling Kindersley, 2020. Lego Batman Batman vs. the Joker: Lego DC Super Heroes and Super-Villains Go Head to Head. Authored by Julia March. Published by Dorling Kindersley, 2020. External links Lego Super Heroes Official Site Super Heroes DC Comics action figure lines Marvel Comics action figure lines Products introduced in 2011 Video game franchises introduced in 2008