id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
30605487 | https://en.wikipedia.org/wiki/1926%20USC%20Trojans%20football%20team | 1926 USC Trojans football team | The 1926 USC Trojans football team represented the University of Southern California (USC) in the 1926 college football season. In their second year under head coach Howard Jones, the Trojans compiled an 8–2 record (5–1 against conference opponents), finished in second place in the Pacific Coast Conference, and outscored their opponents by a combined total of 317 to 52. The season featured the first game in the Notre Dame–USC football rivalry; Notre Dame won by a 13 to 12 score in Los Angeles.
Schedule
References
USC
USC Trojans football seasons
USC Trojans football |
49605366 | https://en.wikipedia.org/wiki/Lazarus%20Group | Lazarus Group | Lazarus Group (also known by other monikers such as Guardians of Peace or Whois Team) is a cybercrime group made up of an unknown number of individuals run by the North Korean state. While not much is known about the Lazarus Group, researchers have attributed many cyberattacks to them between 2010 and 2021. Originally a criminal group, the group has now been designated as an advanced persistent threat due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include HIDDEN COBRA (used by the United States Intelligence Community to refer to malicious cyber activity by the North Korean government in general) and Zinc (by Microsoft).
The Lazarus Group has strong links to North Korea. The United States Federal Bureau of Investigation says that the Lazarus Group is a North Korean "state-sponsored hacking organization". According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.
History
The earliest known attack that the group is responsible for is known as "Operation Troy", which took place from 2009 to 2012. This was a cyber-espionage campaign that utilized unsophisticated distributed denial-of-service attack (DDoS) techniques to target the South Korean government in Seoul. They were also responsible for attacks in 2011 and 2013. It is possible that they were also behind a 2007 attack targeting South Korea, but that is still uncertain. A notable attack that the group is known for is the 2014 attack on Sony Pictures. The Sony attack used more sophisticated techniques and highlighted how advanced the group has become over time.
The Lazarus Group were reported to have stolen US$12 million from the Banco del Austro in Ecuador and US$1 million from Vietnam's Tien Phong Bank in 2015. They have also targeted banks in Poland and Mexico. The 2016 bank heist included an attack on the Bangladesh Bank, successfully stealing US$81 million and was attributed to the group. In 2017, the Lazarus group was reported to have stolen US$60 million from the Far Eastern International Bank of Taiwan although the actual amount stolen was unclear, and most of the funds were recovered.
It is not clear who is really behind the group, but media reports have suggested the group has links to North Korea. Kaspersky Lab reported in 2017 that Lazarus tended to concentrate on spying and infiltration cyberattacks whereas a sub-group within their organisation, which Kaspersky called Bluenoroff, specialised in financial cyberattacks. Kaspersky found multiple attacks worldwide and a direct link (IP address) between Bluenoroff and North Korea.
However, Kaspersky also acknowledged that the repetition of the code could be a “false flag” meant to mislead investigators and pin the attack on North Korea, given that the worldwide WannaCry worm cyber attack copied techniques from the NSA as well. This ransomware leverages an NSA exploit known as EternalBlue that a hacker group known as Shadow Brokers made public in April 2017.
Symantec reported in 2017 that it was "highly likely" that Lazarus was behind the WannaCry attack.
2009 Operation Troy
The next incident took place on July 4, 2009 and sparked the beginning of "Operation Troy." This attack utilized the Mydoom and Dozer malware to launch a large-scale, but quite unsophisticated, DDoS attack against US and South Korean websites. The volley of attacks struck about three dozen websites and placed the text "Memory of Independence Day" in the master boot record (MBR).
2013 South Korea Cyberattack (Operation 1Mission/ DarkSeoul)
Over time, attacks from this group have grown more sophisticated; their techniques and tools have become better developed and more effective. The March 2011 attack known as "Ten Days of Rain" targeted South Korean media, financial, and critical infrastructure, and consisted of more sophisticated DDoS attacks that originated from compromised computers within South Korea. The attacks continued on March 20, 2013 with DarkSeoul, a wiper attack that targeted three South Korean broadcast companies, financial institutes, and an ISP. At the time, two other groups going by the personas ″NewRomanic Cyber Army Team and WhoIs Team″, took credit for that attack but researchers did not know the Lazarus Group was behind it at the time. Researchers today know the Lazarus Group as a supergroup behind the disruptive attacks.
Late 2014: Sony breach
The Lazarus Group attacks culminated on November 24, 2014. On that day, a Reddit post appeared stating that Sony Pictures had been hacked via unknown means; the perpetrators identified themselves as the "Guardians of Peace". Large amounts of data were stolen and slowly leaked in the days following the attack. An interview with someone claiming to be part of the group stated that they had been siphoning Sony's data for over a year.
The hackers were able to access previously unreleased films, emails, and the personal information of around 4,000 employees.
Early 2016 Investigation: Operation Blockbuster
Under the name ″Operation Blockbuster″, a coalition of security companies, led by Novetta, was able to analyse malware samples found in different cyber-security incidents. Using that data, the team was able to analyse the methods used by the hackers. They linked the Lazarus Group to a number of attacks through a pattern of code re-usage.
2016 Bangladesh Bank cyber heist
Bangladesh Bank cyber heist, was a theft that took place in February 2016. Thirty-five fraudulent instructions were issued by security hackers via the SWIFT network to illegally transfer close to US$1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh Bank, the central bank of Bangladesh. Five of the thirty-five fraudulent instructions were successful in transferring US$101 million, with US$20 million traced to Sri Lanka and US$81 million to the Philippines. The Federal Reserve Bank of New York blocked the remaining thirty transactions, amounting to US$850 million, due to suspicions raised by a misspelled instruction. Cybersecurity experts claimed that the North Korea-based Lazarus Group was behind the attack.
May 2017 WannaCry Ransomware Attack
The WannaCry attack was a massive ransomware cyberattack that hit institutions across the globe ranging all the way from the NHS in Britain, to Boeing, and even to Universities in China on the 12th of May, 2017. The attack lasted 7 hours and 19 minutes. Europol estimates it affected nearly 200,000 computers in 150 countries, primarily affecting Russia, India, Ukraine, and Taiwan. This was one of the first attacks to travel via a cryptoworm. Cryptoworms are a recent form of computer virus that can travel between computers using networks, exploiting TCP port 445). To be infected, there is no need to click on a bad link - the malware can spread autonomously, from a computer to a connected printer, and then beyond to adjacent computers, perhaps connected to the wifi, etc. The port 445 vulnerability allowed the malware to move freely across intranets, and infect thousands of computers rapidly. The Wannacry attack was one of the first large scale uses of a cryptoworm.
Attack
The virus exploited a vulnerability in the Windows operating system, then encrypted the computer's data in return for a sum of Bitcoin worth roughly $300 to get the key. In order to encourage payment, the ransom demand doubled after three days, and if not paid in a week, the malware deletes the encrypted data files. The malware used a legitimate piece of software called Windows Crypto, made by Microsoft to scramble the files. Once the encryption is completed, the filename has "Wincry" appended, which is the root of the Wannacry name. Wincry was the base of the encryption, but two additional exploits, EternalBlue and DoublePulsar, were used by the malware to make it a cryptoworm. EternalBlue automatically spreads the virus through networks, while DoublePulsar triggered it to activate on a victim's computer. In other words, EternalBlue got the infected link to your computer, and DoublePulsar clicked it for you.
Marcus Hutchins brought the attack to an end, when he received a copy of the virus from a friend at a security research company and discovered a kill switch hardcoded into the virus. The malware included a periodic check to see if a specific website was running, and would only proceed with encryption if that website didn't exist. Hutchins identified this check, then promptly registered the relevant domain at 3:03 pm UTC. The malware immediately stopped propagating itself and infecting new machines. This was very interesting, and is a clue as to who created the virus. Usually stopping malware takes months of back and forth fighting between the hackers and security experts, so this easy win was unexpected. Another very interesting and unusual aspect of the attack was that the files were not recoverable after paying the ransom: only $160,000 was collected, leading many to believe that the hackers weren't after the money.
The easy kill switch and lack of revenue led many to believe that the attack was state-sponsored; the motive was not financial compensation, but just to cause chaos. After the attack security experts traced the DoublePulsar exploit back to the United States NSA where the exploit had been developed as a cyberweapon. The exploit was then stolen by a Russian backed hacking group, Shadowbrokers, who first tried to auction it off, but after failing to do that simply gave it away for free. The NSA subsequently revealed the vulnerability to Microsoft who issued an update on March 14th 2017,a little under a month before the attack occurred. It wasn't enough. The update wasn't mandatory and the majority of computers with the vulnerability had not resolved the issue by the time May 12th rolled around, leading to the astonishing effectiveness of the attack.
Aftermath
The US Department of Justice and British authorities later attributed the WannaCry attack on the North Korean hacking gang, the Lazarus group. North Korea is very well placed to conduct cyber operations because of Asymmetric threat, where they can take on an ever more digitalized world, especially South Korea, with a small group of Cyber Warriors.
For further, more in depth research on the Wannacry attack, see:
WannaCry ransomware attack
https://open.spotify.com/10. Kill Switch_Lazurus Heist_BBC World Service
2017 cryptocurrency attacks
In 2018, Recorded Future issued a report linking the Lazarus Group to attacks on cryptocurrency Bitcoin and Monero users mostly in South Korea. These attacks were reported to be technically similar to previous attacks using the WannaCry ransomware and the attacks on Sony Pictures. One of the tactics used by Lazarus hackers was to exploit vulnerabilities in Hancom's Hangul, a South Korean word processing software. Another tactic was to use spear-phishing lures containing malware and which were sent to South Korean students and users of cryptocurrency exchanges like Coinlink. If the user opened the malware it stole email addresses and passwords. Coinlink denied their site or users emails and passwords had been hacked. The report concluded that “This late-2017 campaign is a continuation of North Korea’s interest in cryptocurrency, which we now know encompasses a broad range of activities including mining, ransomware, and outright theft...” The report also said that North Korea was using these cryptocurrency attacks to get round international financial sanctions. North Korean hackers stole US$7 million from Bithumb, a South Korean exchange in February 2017. Youbit, another South Korean Bitcoin exchange company, filed for bankruptcy in December 2017 after 17% of its assets were stolen by cyberattacks following an earlier attack in April 2017. Lazarus and North Korean hackers were blamed for the attacks. Nicehash, a cryptocurrency cloud mining marketplace lost over 4,500 Bitcoin in December 2017. An update about the investigations claimed that the attack is linked to Lazarus Group.
September 2019 attacks
In mid-September 2019, the USA issued a public alert about a new version of malware dubbed ELECTRICFISH. Since the beginning of 2019, North Korean agents have attempted five major cyber-thefts world-wide, including a successful $49 million theft from an institution in Kuwait.
Late 2020 pharmaceutical company attacks
Due to the ongoing COVID-19 pandemic, pharmaceutical companies became major targets for the Lazarus Group. Using spear-phishing techniques, Lazarus Group members posed as health officials and contacted pharmaceutical company employees with malicious links. It is thought that multiple major pharma organizations were targeted, but the only one that has been confirmed was the Angloswedish-owned AstraZeneca. According to a report by Reuters, a wide range of employees were targeted, including many involved in COVID-19 vaccine research. It is unknown what the Lazarus Group's goal was in these attacks, but the likely possibilities include:
Stealing sensitive information to be sold for profit.
Extortion schemes.
Giving foreign regimes access to proprietary COVID-19 research.
AstraZeneca has not commented on the incident and experts do not believe any sensitive data has been compromised as of yet.
Education
North Korean hackers are sent vocationally to Shenyang, China for special training. They are trained to deploy malware of all types onto computers, computer networks, and servers. Education domestically includes the Kim Chaek University of Technology, Kim Il-sung University and Moranbong University, which picks the brightest students from across the country and puts them through six years of special education.
Units
Lazarus is believed to have two units.
BlueNorOff
BlueNorOff (also known as: APT38, Stardust Chollima, BeagleBoyz, NICKEL GLADSTONE) is a financially motivated group that is responsible for the illegal transfers of money via forging orders from SWIFT. BlueNorOff is also called APT38 (by Mandiant) and Stardust Chollima (by Crowdstrike).
According to a 2020 report by the U.S. Army, Bluenoroff has about 1,700 members carrying out financial cybercrime by concentrating on long-term assessment and exploiting enemy network vulnerabilities and systems for financial gain for the regime or to take control of the system. They target financial institutions and cryptocurrency exchanges, including over 16 organizations in at least 13 countries between 2014 and 2021 Bangladesh, India, Mexico, Pakistan, Philippines, South Korea, Taiwan, Turkey, Chile, and Vietnam. The revenue is believed to go towards the development of missile and nuclear technology.
BlueNorOff's most infamous attack was the 2016 Bangladesh Bank robbery in which they tried to use the SWIFT network to illegally transfer close to US$1 billion from the Federal Reserve Bank of New York account belonging to Bangladesh Bank, the central bank of Bangladesh. After several of the transactions went through (US$20 million traced to Sri Lanka and US$81 million to the Philippines), The Federal Reserve Bank of New York blocked the remaining transactions, due to suspicions raised by a misspelling.
Malware associated with BlueNorOff include: "DarkComet, Mimikatz, Net, NESTEGG, MACKTRUCK, WANNACRY, WHITEOUT, QUICKCAFE, RAWHIDE, SMOOTHRIDE, TightVNC, SORRYBRUTE, KEYLIME, SNAPSHOT, MAPMAKER, net.exe, sysmon, BOOTWRECK, CLEANTOAD, CLOSESHAVE, DYEPACK, Hermes, TwoPence, ELECTRICFISH, PowerRatankba, PowerSpritz"
Tactics commonly used by BlueNorOff include: phishing, backdoors, Drive-by compromise, Watering hole attack, exploitation of insecure out-of-date versions of Apache Struts 2 to execute code on a system, strategic web compromise, and accessing Linux servers. It's reported that they sometimes work together with criminal hackers.
AndAriel
AndAriel (also spelled Andarial, and also known as: Silent Chollima, Dark Seoul, Rifle, and Wassonite) is logistically characterized by its targeting of South Korea. AndAriel's alternative name is called Silent Chollima due to the stealthy nature of the subgroup. Any organization in South Korea is vulnerable to AndAriel. Targets include government, defense, and any economic symbol.
According to a 2020 report by the U.S. Army, Andarial has about 1,600 members whose mission reconnaissance, assessment of the network vulnerabilities, and mapping the enemy network for potential attack. In addition to South Korea, they also target other governments, infrastructure, and businesses. Attack vectors include: ActiveX, vulnerabilities in South Korean software, watering hole attacks, spear phishing (macro), IT management products (antivirus, PMS), and supply chain (installers and updaters). Malware used include: Aryan, Gh0st RAT, Rifdoor, Phandoor, and Andarat.
Indictments
In February 2021, the US Department of Justice indicted three members of the Reconnaissance General Bureau, a North Korean military intelligence agency, for having participated in several Lazarus hacking campaigns: Jin Hyok, Jon Chang Hyok and Kim Il. Park Jin Hyok had already been indicted earlier in September 2018. The individuals are not in U.S. custody. A Canadian and two Chinese individuals have also been charged with having acted as money mules and money launderers for the Lazarus group.
Coverage
The group was the subject of a BBC World Service podcast The Lazarus Heist broadcast in 2021. The second season is coming out in mid 2022.
See also
North Korea–United States relations
Ricochet Chollima
Kimsuky
Park Jin Hyok
unit 121
Notes
References
Sources
Virus News (2016). "Kaspersky Lab Helps to Disrupt the Activity of the Lazarus Group Responsible for Multiple Devastating Cyber-Attacks", Kaspersky Lab.
RBS (2014). "A Breakdown and Analysis of the December 2014 Sony Hack". RiskBased Security.
Cameron, Dell (2016). "Security Researchers Say Mysterious 'Lazarus Group' Hacked Sony in 2014", The Daily Dot.
Zetter, Kim (2014). "Sony Got Hacked Hard: What We Know and Don't Know So Far", Wired.
Zetter, Kim (2016). "Sony Hackers Were Causing Mayhem Years Before They Hit The Company", Wired.
External links
Indictment of Park Jin Hyok, September 2018
Indictment of Park Jin Hyok, Jon Chang Hyok and Kim Il, January 2020
The Lazarus Heist 10 part podcast from BBC World Service.
Cyberattacks
North Korean advanced persistent threat groups
Hacking in the 2000s
Hacking in the 2010s
Cyberattack gangs |
842178 | https://en.wikipedia.org/wiki/Shafi%20Goldwasser | Shafi Goldwasser | Shafrira Goldwasser (; born 1959) is an Israeli-American computer scientist and winner of the Turing Award in 2012. She is the RSA Professor of Electrical Engineering and Computer Science at MIT, a professor of mathematical sciences at the Weizmann Institute of Science, Israel, co-founder and chief scientist of Duality Technologies and the director of the Simons Institute for the Theory of Computing in Berkeley, CA.
Education and early life
Born in New York City, Goldwasser obtained her Bachelor of Science degree in 1979 in mathematics and science from Carnegie Mellon University. For her postgraduate study, she did a Master of Science degree in 1981 followed by a PhD (1984) in computer science from the University of California, Berkeley supervised by Manuel Blum.
Career and research
Goldwasser joined MIT in 1983, and in 1997 became the first holder of the RSA Professorship. She became a professor at the Weizmann Institute of Science, concurrent to her professorship at MIT, in 1993. She is a member of the theory of computation group at MIT Computer Science and Artificial Intelligence Laboratory. Goldwasser was a co-recipient of the 2012 Turing Award. In 2005, Goldwasser was elected a member of the National Academy of Engineering for contributions to cryptography, number theory, and complexity theory, and their applications to privacy and security.
On January 1, 2018, Goldwasser became the director of the Simons Institute for the Theory of Computing at the University of California, Berkeley.
Since November 2016, Goldwasser has been serving as the chief scientist and co-Founder of Duality Technologies, a US-based start-up which offers secure data analytics using advanced cryptographic techniques. She is also a scientific advisor for several technology startups in the security area, including QED-it, specializing in the Zero Knowledge Blockchain, and Algorand, a pure proof-of-stake blockchain.
Goldwasser's research areas include computational complexity theory, cryptography and computational number theory.
She is the co-inventor of probabilistic encryption, which set up and achieved the gold standard for security for data encryption.
Goldwasser is a co-inventor of zero-knowledge proofs, which probabilistically and interactively demonstrate the validity of an assertion without conveying any additional knowledge, and are a key tool in the design of cryptographic protocols. Her work in complexity theory includes the classification of approximation problems, showing that some problems in NP remain hard even when only an approximate solution is needed, and pioneering methods for delegating computations to untrusted servers. Her work in number theory includes the invention with Joe Kilian of primality proving using elliptic curves.
Awards and honors
Goldwasser was awarded the 2012 Turing Award along with Silvio Micali for their work in the field of cryptography.
Goldwasser has twice won the Gödel Prize in theoretical computer science: first in 1993 (for "The knowledge complexity of interactive proof systems"), and again in 2001 (for Interactive Proofs and the Hardness of Approximating Cliques). Other awards include the ACM Grace Murray Hopper Award (1996) for outstanding young computer professional of the year and the RSA Award for Excellence in Mathematics (1998) for outstanding mathematical contributions to cryptography. In 2001 she was elected to the American Academy of Arts and Sciences and in 2002 she gave a plenary lecture at the International Congress of Mathematicians in Beijing. In 2004 she was elected to the National Academy of Sciences, and in 2005 to the National Academy of Engineering. She was selected as an IACR Fellow in 2007. Goldwasser received the 2008–2009 Athena Lecturer Award of the Association for Computing Machinery's Committee on Women in Computing. She is the recipient of The Franklin Institute's 2010 Benjamin Franklin Medal in Computer and Cognitive Science. She received the IEEE Emanuel R. Piore Award in 2011.
She received the 2018 Frontier of Knowledge award together with Micali, Rivest and Shamir.
Goldwasser was elected as an ACM Fellow in 2017. In July 2017, she was a plenary lecturer in the Mathematical Congress of the Americas.
In 2018, Goldwasser was awarded an honorary degree by her alma mater, Carnegie Mellon University. On 26 June 2019 Goldwasser was awarded an honorary doctorate of science by the University of Oxford.
Goldwasser is featured in the Notable Women in Computing cards. She won the Suffrage Science award in 2016. She was on the Mathematical Sciences jury for the Infosys Prize in 2020. She was awarded the 2021 L’Oréal-UNESCO for Women in Science Award in Computer Science.
References
American computer scientists
Israeli computer scientists
Theoretical computer scientists
1959 births
Living people
Modern cryptographers
Israeli women computer scientists
American women mathematicians
Israeli women scientists
Israeli women academics
Fellows of the Association for Computing Machinery
International Association for Cryptologic Research fellows
Members of the United States National Academy of Engineering
Members of the United States National Academy of Sciences
Foreign Members of the Russian Academy of Sciences
Gödel Prize laureates
Grace Murray Hopper Award laureates
Turing Award laureates
Weizmann Institute of Science faculty
Carnegie Mellon University alumni
UC Berkeley College of Engineering alumni
American emigrants to Israel
Naturalized citizens of Israel
Israeli Jews
Jewish American scientists
MIT School of Engineering faculty
Scientists from New York City
20th-century American engineers
21st-century American engineers
20th-century American mathematicians
21st-century mathematicians
20th-century American scientists
21st-century American scientists
20th-century American women scientists
21st-century American women scientists
Simons Investigator
20th-century women mathematicians
21st-century women mathematicians
Mathematicians from New York (state)
Israeli cryptographers |
44413895 | https://en.wikipedia.org/wiki/Economy%20of%20Kollam | Economy of Kollam | Kollam or Quilon is an old seaport and a city on the Laccadive Sea coast in Kerala, India, on Ashtamudi Lake. The city remains notable as the ancient commercial capital of Kerala and the southwestern Indian coast, in addition to its fame as the "Cashew Capital of the World". The Kollam Municipal Corporation has the second largest budget in Kerala in terms of revenue and expenditure.
Outline
The Kollam sea port was founded by Mar Abo in 825 AD, sanctioned via the Tamil king of Venad (otherwise called the Ay kingdom), Udayamarthandavarma. The trade and business culture of Quilon is as old as Kollam Port. Kollam was the most famous port city in India, serving as a business hub for merchants from China, Middle East, Dutch, Portugal, Brazil and other Eastern Mediterranean countries. The recent discovery of treasures and remnants at the Kollam Port area substantiates claims concerning ancient trade activities related to old the Quilon city; archaeologists believe that there is an engulfed city in the seabed of the current Kollam Port.
Since the 1950s, local businessmen are active in the business of the city; key players, like the TKM Group, started their first business center and potentially the first mall at the heart of Kollam in 1950, at Chinnakada. This enterprise included several shops and the Grand and Prince Theatres. Their first bakery, "Supreme", started in 1984 at Chinnakada, now a prominent group across Kollam, Kochi, and Thiruvananthapuram. Kollam is a moderately industrialized city, with several of the major employers in the public sector remaining Indian Rare Earths Limited (IRE), Kerala Metals and Minerals Limited, United Electrical Industries Limited or UNILEC (popularly known as the Meter Company), the Kerala Primo Pipe Factory, Parvathy Mills Limited, ALIND Kundara and Kerala Ceramics.
The industrial estates within the city include:
The Industrial Estate at Mundakkal and
The SIDCO Industrial Estate at Umayanalloor/
Economy
Kollam is a relatively industrialized city, and the Kollam Municipal Corporation is the second-largest revenue-earning city corporation in Kerala, second to Kochi. The meeting of three National Highways and a flourishing Port has made the city a favorable location for export and import businesses. Educational institutions like the TKM College of Engineering are known as the "cradle of Kerala entrepreneurs", as they greatly encourage entrepreneurial activities. Kollam was the third city in Kerala to adopt a shopping mall culture, (after Kochi and Kozhikode). The Kollam district ranks first in livestock wealth in the state. Downtown Kollam is the leading central business district of the city, with the city remaining the most populous incorporated city in Kerala until 2005; during that time, the population density in the city was 6041 individuals per square kilometer.
Because of Kollam's importance as a trade and export hub, the Export Inspection Council of India (EICI) runs a sub-office with a laboratory facility in the city, one of the 7 sub-offices of the EICI in South India. Along with the city, the town of Punalur and suburbs of cities such as Chavara and Kundara are also industrially well-developed in nature.
The cashew business
Kollam is the largest processed cashew exporter in the world; in recent years, over 600 cashew processing centres developed in the city and approximately 800,000 tonnes of raw cashews are brought to Kollam for processing every year. 90% of India's export quality cashew kernels are prepared from Kollam, with the city remaining known as the "Cashew Capital of the World". The CEPCI, responsible for the promotion of cashew exports, is expecting a rise in exported products to 275,000 tonnes by 2020.
Two principal councils/agencies are working at Kollam for the growth of the cashew business of the city, in addition to its export promotion; they are the Cashew Export Promotion Council of India (CEPCI) and the Kerala State Cashew Development Corporation Limited (KSCDC).
Cashew Export Promotion Council of India
The national government established the Cashew Export Promotion Council of India (CEPCI) in 1955 with the active cooperation of the cashew industry, with the stated mission of promoting exports of cashew kernels and cashew shell oil from India. The CEPC is headquartered in the Mundakkal area of Kollam, serving as an intermediary between importers of cashew kernels and exporters who are members of the council. It is also tasked with dispute resolution when problems arise on account of matters including quality standards and breaches of contract between parties, in particular with regards to import and export contracts. It undertakes numerous additional activities, such as: organising global buyer-seller meetings; organizing studies on the nutritional aspects of the cashew; and providing support to cashew processors and exporters for the improvement of their infrastructure.
Kerala State Cashew Development Corporation Limited
The Kerala State Cashew Development Corporation Limited (KSCDC) is a model employer in the cashew industry field, protecting the interest of workers and providing maximum employment to its workers; they additionally give statutory benefits like minimum wages and bonuses, prevailing in the cashew industry. The corporation remains headquartered within the city of Kollam, with its head office is situated at the Cashew House, in Mundakkal. KSCDC was incorporated in July 1969 and initiated commercial activities in the year 1971, as a company wholly owned by the Government of Kerala. The corporation now possesses a turnover of more than Rs. 250 crores.
The seafood export business
Kollam is one of the famous seafood exporting business hubs of India, with many seafood exporting companies stationed din the city. The large majority of the companies work in the Maruthadi, Sakthikulangara, Kavanad, Neendakara, Asramam, Kilikollur, Thirumullavaram and Uliyakovil areas of the city. Companies such as Capithans, Kings Marine Exporters, India Food Exports and Oceanic Fisheries are some of the renowned names from the city in the seafood business. The dynamic development of the Kollam Port will accelerate further development of the seafood business in the city. The total export contribution from the city is very high compared to other Kerala cities. Kochi based Marine Products Export Development Authority(MPEDA)'s one among seven sub-regional offices is situated at Chinnakada in the city due to the importance of it as a significant marine food exporting business hub.
Clam fishery
Kollam's clam fishery is now world-famous, being the only Marine Stewardship Council (MSC)-certified fishery in India; the Marine Stewardship Council is an international non-profit organization set up to help transform the seafood market into a sustainable endeavor.
Ashtamudi Lake in Kollam, a Ramsar wetland of international importance and the second largest estuarine system in Kerala, is the major source of the clam used in this fishery. It has extensive mangrove habitats harboring approximately 90 species of fish and 10 species of clams, with the clam fishery in the city remaining initiated in 1981. It supports the livelihood of around 3,000 fishermen involved in the collecting, cleaning, processing and trading of clams.
80% of India's export-quality clams come from Kollam. The growth of Ashtamudi’s commercial fishery was driven by demand from Vietnam, Thailand and Malaysia in the 1980s and 90s. By 1991, the catch peaked at 10,000 tonnes a year, but declined by 50 percent in 1993 due to overfishing. Today, An average of 10,000 tonnes of clam fishing per year occurs within proximity to the city.
Apart from this, the main fishing areas of the city, like Sakthikulangara, Neendakara and Tangasseri, have emerged as the main source of lanternfish, a rich source of Omega-3 fatty acid. About 50 to 60 tonnes of Lanternfish are caught at the Sakthikulangara fishing harbor every day, sold at Rs.16/kg. This provides approximately Rs.50,000 per fishing trip for an individual boat. This fish is exclusively traded from the Sakthikulangara harbor within the Kerala state.
Pencil slat manufacturing
Kollam is the largest pencil slat manufacturing hub of India., with more than 160 slat production units in Kollam, employing approximately 5,000 individuals. These Kollam-based units meet a good portion of the demand for pencil slats in the country and worldwide, with 35% of the pencil slots manufactured in the world coming from Kerala. Of the approximately 170 pencil slot manufacturing units in Kerala, 125 are based in and around Kollam district. These units are export approximately 160 loads of slots per month to companies across the world. This, according to slot manufacturers, is enough to make 20 crore pencils a month. A slot is of 185mm length, 77mm width and 5.5mm thickness; each load exported contains 300 bags with 900 slots bundled into each of them. On average, each month, 150 loads of pencil slat consignment go to pencil factories based in Delhi, Chennai, Mumbai and various places in Gujarat. Over 30 countries depend on pencil slot manufacturing units in Kollam, which produce pencils under varying brand names. These factories are working with the support of their associations, namely The Kerala Slots Factories Association and the Kerala State Small Industries Association (KSSIA). Most of the important staff office bearers of these associations are from Kollam.
Kollam Port
Port operations are responsible for generating a large portion of revenue in Kollam; the Kollam Port, situated 4 kilometers away from the heart of the city, is one of 20 major ports in India and is the second major port in Kerala, after the Cochin Port. Construction equipment, sand, cashews and industrial products for companies and organisations including the Vikram Sarabhai Space Centre (VSSC) and Kerala Minerals and Metals Limited (KMML) are transported through Kollam Port. To modernize the state's second-largest port, The Government of Kerala is planning to build a wharf for the port, capable of accommodating 6 ships at a time. It is one of the two ports in Kerala with an online customs clearance facility and a Vessel Tracking and Monitoring System or VTMS. The port is now undergoing a second phase of development worth Rs.125 crores.
Information technology
IT development is a major revenue earner of Kollam. A large technology park, Kollam Technopark, is functioning in the suburb of the city, which is the only technological park in India that will be accessible by road, rail, water, and air transportation facilities after the inauguration of Seaplane service was scheduled to start in December 2014. The Government of Kerala began several small Information Technology parks, named Techno-lodges, prior to the recent project in the neighborhoods of the city, but these projects ceased operation following their initiation.
The Kollam Technopark is part of Technopark, Trivandrum, built on the hub-and-spoke model for the development of the Information Technology industry in Kerala. As the second phase of development for the IT industry in Kerala, the Kollam Technopark shall remain constructed in one of the earliest industrial towns of Kerala, Kundara. Located on the banks of the Kanjiracode Lake, a tributary of the Ashtamudi in Kollam. this technopark is to offer support including uniform talent distribution, infrastructure and support for IT platforms (e.g. telecom, datacom and digital exchanges), excellent infrastructure availability and back-up support available in Kollam.
Notable firms
Kollam has an array of manufacturing and other industrial corporations, including mineral sand mining and related material production plants, such as electrical equipment and Titanium sponge in the city.
United Electrical Industries Limited (UNILEC), Pallimukku
United Electrical Industries Limited, an ISO 9001:2000-accredited State Level Public Enterprise, has been successfully operating in the electrical engineering sector since 1950. This company is one of the pioneers in energy meter manufacturing and Switchgear items and is situated at Pallimukku in the city. UEI Ltd. has supplied over 40 lakhs of electromechanical meters and 50 lakhs of electronic meters for domestic and industrial purposes. The company received several awards for the achievements for their efforts in energy conservation.
Indian Rare Earths Limited (IREL)
Indian Rare Earths Limited (IREL) is a government-owned ISO 9002 Certified corporation in India. One of the four production plants of IREL is situated near Chavara, in the suburbs of the city. The plant operates on a mining area containing as high as a percentage of 40% with regards to heavy minerals and extending over a length of 23 kilometres in the Chavara belt. The present annual production capacity of the Chavara unit, engaged in dry and wet (dredging or up-gradation) mining and mineral separation, stands at 1,54,000t of ilmenite, 9,500t of rutile, 14,000t of zircon and 7,000t of sillimanite. The plant additionally possesses facilities for the annual production of ground zircon called zirflor (-45 micron) and microzir (1-3 micron) on the order of 6,000t and 500t, respectively. The other plants of the company remain the plant at Manavalakurichi, OSCOM and the Rare Earths Division at Aluva.
The Kollam coast of Kerala possesses the largest mineral sand deposit within the nation. This belt, commonly known as the Chavara deposit after its main locality, covers a total length of 22 kilometres and a width of approximately 8 kilometres along its northern side, in addition to approximately 6 kilometres along its southern side. The Chavara barrier beach portion contains a concentration of heavy minerals above 60% and the Chavara deposit is estimated to contain approximately 127 million tonnes of heavy minerals, with an ilmenite content of 80 million tonnes from a reserve of raw sand encompassing 1400 million tonnes. The deposit is quite rich with regards to ilmenite, rutile and zircon; the ilmenite deposits within the region happen to be of weathered variety, including an approximate titanium dioxide composition of 60% .
Kerala Minerals and Metals Ltd. (KMML)
Kerala Minerals and Metals Ltd. (KMML) is an integrated, titanium dioxide-manufacturing public sector undertaking in Kollam. Its operations comprise mining, mineral separation and synthetic rutile and pigment-production plants. Apart from producing rutile-grade titanium dioxide pigment, utilised within various types of industries, it also produces other products, such as ilmenite, rutile, synthetic rutile, zircon and sillimanite. It is one of the best-performing public sector units in India.
Parvathy Mills
Parvathy Mills is a public sector undertaking, maintained under the National Textile Development Corporation in Kollam. It is situated very close to the heart of the city. It was one of the glorious spinning units in India. The mill is under the consideration of the National Textile Development Corporation for a proposed renovation. and is additionally placed in the master plan of a project encompassing the entirety of the city, as the city government is planning to build a large-scale garment manufacturing unit via the utilisation of available infrastructural facilities.
References |
4702327 | https://en.wikipedia.org/wiki/List%20of%20universities%20in%20Vietnam | List of universities in Vietnam | This is a list of universities in Vietnam. It includes comprehensive universities, specialized universities, "senior colleges", institutes, conservatories, and military academies. The list is organized into public, private, and foreign-owned institutions.
Public universities
Universities (Đại học)
Vietnam National University, Hanoi (Đại học Quốc gia Hà Nội)
University of Economics and Business (Trường Đại học Kinh tế)
University of Education (Trường Đại Học Giáo Dục)
University of Languages and International Studies (Trường Đại học Ngoại ngữ)
Hanoi University of Science (Trường Đại học Khoa học Tự nhiên)
University of Social Science and Humanity (Trường Đại học Khoa học Xã hội và Nhân văn)
University of Engineering and Technology (Trường Đại học Công nghệ)
School of Law (Khoa Luật)
School of Medicine and Pharmacy (Khoa Y Dược)
School of International Studies (Khoa Quốc tế)
School of Interdisciplinary Studies (Khoa các Khoa học liên ngành)
Vietnam National University, Ho Chi Minh City (Đại học Quốc gia Thành phố Hồ Chí Minh)
VNUHCM - Ho Chi Minh University of Technology (Trường Đại học Bách khoa - Đại học Quốc gia Thành phố Hồ Chí Minh)
VNUHCM - International University (Trường Đại học Quốc tế - Đại học Quốc gia Thành phố Hồ Chí Minh)
VNUHCM - University of Economics and Law (Trường Đại Học Kinh Tế - Luật - Đại học Quốc gia Thành phố Hồ Chí Minh)
VNUHCM - University of Science (Trường Đại học Khoa học Tự nhiên - Đại học Quốc gia Thành phố Hồ Chí Minh)
VNUHCM - University of Social Sciences and Humanities (Trường Đại học Khoa học Xã hội và Nhân văn - Đại học Quốc gia Thành phố Hồ Chí Minh)
VNUHCM - University of Information Technology (Trường Đại học Công Nghệ Thông Tin - Đại học Quốc gia Thành phố Hồ Chí Minh)
VNUHCM - University of An Giang (Trường Đại học An Giang - Đại học Quốc gia Thành phố Hồ Chí Minh)
Faculty of Medicine (Khoa Y - Đại học Quốc gia Thành phố Hồ Chí Minh)
Institute for Resources and Environment (Trung tâm nghiên cứu tài nguyên và môi trường)
Hanoi University of Science and Technology (formerly Hanoi University of Technology - Trường Đại học Bách Khoa Hà Nội)
Ho Chi Minh City University of Technology and Education (Đại học Sư phạm Kỹ thuật Thành phố Hồ Chí Minh)
Can Tho University (Đại học Cần Thơ; formerly Viện Đại học Cần Thơ [1966-1975])
Hanoi Foreign Trade University (Trường Đại học Ngoại Thương Hà Nội)
Hanoi Medical University (Trường Đại học Y Hà Nội)
Hanoi National University of Education (Trường Đại học Sư Phạm Hà Nội)
Hanoi University (Trường Đại học Hà Nội, formerly Hanoi University of Foreign Studies - Trường Đại học Ngoại Ngữ Hà Nội)
Hanoi University of Agriculture ([Đại học Nông nghiệp Hà Nội, formerly Đại học Nông nghiệp 1 Hà Nội])
Hanoi University of Civil Engineering (Trường Đại học Xây Dựng)
Hanoi University of Industry (Đại học Công Nghiệp Hà Nội, high-technology and engineering)
Hanoi University of Natural Resources and Environment (Đại học Tài nguyên và Môi trường Hà Nội)
Hanoi University of Mining and Geology (Trường Đại học Mỏ - Địa chất)
Ho Chi Minh City Medicine and Pharmacy University (Đại học Y Dược Thành phố Hồ Chí Minh)
Ho Chi Minh City Open University (Đại học Mở Thành phố Hồ Chí Minh)
National Economics University (Trường Đại học Kinh tế Quốc dân)
Nông Lâm University (Agriculture and Forestry) (Đại học Nông lâm Thành phố Hồ Chí Minh)
University of Economics, Ho Chi Minh City (Trường Đại học Kinh tế Thành phố Hồ Chí Minh)
Banking University Ho Chi Minh City (Trường Đại học Ngân hàng Thành phố Hồ Chí Minh)
University of Transport and Communications (Trường Đại học Giao thông Vận tải)
An Giang University (Đại học An Giang) (became a member of VNU-HCM from 2017)
Dalat University (Đại học Đà Lạt; formerly, Viện Đại học Đà Lạt)
Dong Nai University (Đại học Đồng Nai)
Electric Power University (Trường Đại học Điện lực)
Hai Phong Medical University (Đại học Y dược Hải Phòng)
Hai Phong University (Đại học Hải Phòng)
Hanoi Architectural University (Đại học Kiến trúc Hà Nội)
Ho Chi Minh City University of Architecture (Đại học Kiến trúc Thành phố Hồ Chí Minh)
Ho Chi Minh City University of Fine Arts (Đại học Mỹ thuật Thành phố Hồ Chí Minh)
Ho Chi Minh City University of Finance and Marketing(Đại học Tài chính Marketing Thành Phố Hồ Chí Minh)
Ho Chi Minh City University of Food Industry (Trường Đại Học Công Nghiệp Thực Phẩm)
Ho Chi Minh City University of Industry (Đại học Công nghiệp Thành phố Hồ Chí Minh)
Vinh University (Đại học Vinh)
Hue University (Đại học Huế; formerly Viện Đại học Huế [1957-1975])
Hue College of Agriculture and Forestry (Trường Đại học Nông lâm Huế)
Hue College of Arts (Trường Đại học Nghệ thuật Huế)
Hue College of Economics (Trường Đại học Kinh tế Huế)
Hue College of Foreign Languages
Hue University of Medicine and Pharmacy (Trường Đại học Y Dược, Đại học Huế)
Hue College of Teacher Training (Trường Đại học Sư phạm Huế)
Foreign Trade University, Ho Chi Minh City Campus (Trường Đại học Ngoại Thương cơ sở II - TP. HCM)
Hanoi Open University (Đại học Mở Hà Nội)
Hanoi University of Law (Trường Đại học Luật Hà Nội)
Hanoi Pedagogical University N°2 (Trường Đại học Sư Phạm Hà Nội 2)
Thai Nguyen University (Đại học Thái Nguyên), Thai Nguyen
Thai Nguyen University of Technology (Trường Đại học Kĩ thuật Công nghiệp Thái Nguyên)
Thai Nguyen University of Education (Trường Đại học Sư phạm Thái Nguyên)
University of Da Nang (Đại học Đà Nẵng)
Da Nang College of Education (Trường Đại học Sư phạm Đà Nẵng)
Da Nang College of Foreign Languages (Trường Đại học Ngoại ngữ Đà Nẵng)
Da Nang College of Information Technology (Trường Đại học Công nghệ Thông tin Đà Nẵng)
Da Nang College of Technology (Trường Cao đẳng công nghệ Đà Nẵng)
Da Nang University Branch at Kontum (Chi nhánh Trường Đại học Đà Nẵng tại Kontum)
Da Nang University of Economics (Trường Đại học Kinh tế Đà Nẵng)
Da Nang University of Technology (Trường Đại học Bách khoa Đà Nẵng)
University of Labour - Social Affairs (Trường Đại học Lao động - Xã hội)
University of Labour and Social Affairs 2, Ho Chi Minh City (Đại học Lao Động - Xã Hội cơ sở phía Nam)
Bac Giang University of Agriculture and Forestry (Đại học Nông - Lâm Bắc Giang)
Cần Thơ University of Technology (Đại Học Kỹ Thuật- Công Nghệ Cần Thơ)
Dong Thap University (Đại học Đồng Tháp)
Hong Duc University (Đại học Hồng Đức)
Hung Vuong University (Đại học Hùng Vương - Phú Thọ)
Nha Trang Fisheries University (Đại học Thuỷ sản Nha Trang)
Nha Trang University (Đại học Nha Trang)
Pham Ngoc Thach University of Medicine (Đại học Y Khoa Phạm Ngọc Thạch)
Quy Nhon University (Đại học Quy Nhơn)
Tay Bac University (Đại học Tây Bắc)
Tay Nguyen University (Đại học Tây Nguyên)
Thai Binh University of Medicine (Đại học Y dược Thái Bình)
Ton Duc Thang University (Đại học Tôn Đức Thắng, Thành phố Hồ Chí Minh)
Tra Vinh University (Đại học Trà Vinh, Thành phố Trà Vinh)
University of Communications and Transportation (Đại học Giao thông Vận tải)
University of Finance and Accountancy (Đại học Tai chinh Ke Toan)
Vietnam Forestry University (Đại học Lâm nghiệp)
Vietnam Maritime University (Đại học Hàng hải)
Vietnam University of Commerce (Đại học Thương mại)
Vietnamese-German University (Đại học Việt-Đức)
VinUniversity
Water Resources University (Đại học Thủy lợi)
Ha Noi university of culture ( Đại học văn hóa Hà Nội )
University Of Transport Technology (Trường Đại học Công nghệ Giao thông Vận tải)
Senior colleges (Trường Đại học)
Hanoi School of Public Health (Trường Đại học Y tế Công cộng)
Hanoi University of Pharmacy (Trường Đại học Dược Hà Nội)
Ho Chi Minh City University of Pedagogy (Trường Đại học Sư phạm Thành phố Hồ Chí Minh)
Ho Chi Minh City University of Transportation (Trường Đại học Giao Thông Vận Tải Thành phố Hồ Chí Minh)
Trade Union University (Trường Đại học Công Đoàn)
Academy (Học viện)
Academy of Finance and Accounting (Học viện Tài chính Kế toán)
Academy of Finance of Vietnam (Học viện Tài chính Việt Nam)
Banking Academy of Vietnam (Học viện Ngân hàng Việt Nam)
Diplomatic Academy of Vietnam (Học viện Ngoại giao Việt Nam)
Ho Chi Minh National Academy of Politics and Public Administration (Học viện Chính trị - Hành chính Quốc gia Hồ Chí Minh)
Academy of Journalism and Communication (Học viện Báo chí và Tuyên truyền Việt Nam)
National Academy of Public Administration (Học viện Hành chính Việt Nam)
Institut de la Francophonie pour l'Informatique
Institute for International Relations (Học viện Quan hệ Quốc tế)
National Institute of Education Management (Học viện Quản lý Giáo dục Việt Nam)
Posts and Telecommunications Institute of Technology (Học viện Công nghệ Bưu chính Viễn thông)
Vietnam Academy of Science and Technology (Viện Hàn lâm Khoa học và Công nghệ Việt Nam)
Vietnam Academy of Social Sciences (Viện Khoa học Xã hội Việt Nam)
Graduate Academy of Social Sciences (Học viện Khoa học Xã hội Việt Nam)
Vietnam Aviation Academy (Học viện Hàng không Việt Nam)
Vietnam University of Traditional Medicine
Hanoi Academy of Theatre and Cinema (Học viện Sân Khấu Điện Ảnh Hà Nội)
Conservatories (Nhạc viện)
Hanoi Conservatory of Music (Nhạc viện Hà Nội)
Ho Chi Minh City Conservatory (Nhạc viện thành phố Hồ Chí Minh)
Hue Conservatory (Nhạc viện Huế)
Military academies
Academy of Cryptography Techniques of Vietnam (Học viện Kỹ thuật Mật mã Việt Nam)
Border Defense Force Academy (Học viện Biên phòng Việt Nam)
Le Quy Don Technical University (Học viện Kỹ thuật Quân sự Việt Nam), also known as Le Quy Don University of Science and Technology
National Defense Academy of Vietnam (Học viện Quốc phòng Việt Nam)
Vietnam Academy of Logistics (Học viện Hậu cần Việt Nam)
Vietnam Academy of Military Science (Học viện Khoa học Quân sự Việt Nam)
Vietnam Air and Air Defense Forces Academy (Học viện Phòng không - Không quân Việt Nam)
Vietnam Military Academy, Dalat (Học viện Lục quân Đà Lạt)
Vietnam Military Medical Academy (Học viện Quân y Việt Nam)
Vietnam Military Political Academy (Học viện Chính trị Quân sự Việt Nam)
Vietnam Naval Academy (Học viện Hải quân Việt Nam)
Private universities
Private universities (Đại học tư thục, formerly Đại học dân lập)
Bac Ha International University (Đại học Quốc tế Bắc Hà)
Binh Duong University (Đại học Bình Dương - BDU)
Đông Á University (Đại học Đông Á)
Duy Tan University (Đại học Duy Tân - DTU)
Eastern International University (TRƯỜNG ĐẠI HỌC QUỐC TẾ MIỀN ĐÔNG - EIU)
FPT University (Đại học FPT)
Fulbright University Vietnam (Đại học Fulbright Việt Nam)
Gia Đinh University (Đại học Gia Định)
Hai Phong Private University
Hanoi University of Business and Technology (Đại học Kinh Doanh và Công Nghệ Hà Nội - HUBT)
Hung Vuong University Ho Chi Minh City (Đại học Hùng Vương TPHCM - HVUH)
Ho Chi Minh City University of Foreign Languages and Information Technology (Đại học Ngoại ngữ Tin học Thành phố Hồ Chí Minh)
Ho Chi Minh City University of Technology - HUTECH (Đại học Dân lập Kỹ thuật Công nghệ Thành phố Hồ Chí Minh; HUTECH)
Hoa Sen University (Đại học Hoa Sen - HSU)
Hong Bang University (Đại học Hồng Bàng - HBU)
Long An University of Economics and Industry (Đại học Kinh Tế Công Nghiệp Long An - DLA or LAU)
Nguyen Tat Thanh University (Đại học Nguyễn Tất Thành - NTU)
Phu Xuan University (Trường Đại học Dân lập Phú Xuân, Huế)
Phuong Dong University (Đại học Phương Đông)
Quang Trung University (Đại học Quang Trung)
Saigon International University (Đại học Quốc Tế Sài Gòn - SIU)
Saigon Technology University (Đại học công nghệ Sài Gòn - STU)
Vo Truong Toan University (Đại học Võ Trường Toản - VTTU)
Tan Tao University (Đại học Tân Tạo - TTU)
Thang Long University (Đại học Thăng Long)
Ho Chi Minh City University of Economics and Finance (UEF) (Đại học Kinh Tế - Tài Chính TPHCM - UEF)
Pacific Vietnam University (Đại học Quốc Tế PACIFIC Vietnam)
Van Hien University (Đại học Văn Hiến)
Van Lang University (Đại học Văn Lang)
Van Xuan University of Technology (Đại học Công nghệ Vạn Xuân - VXUT)
VinUniversity (Trường Đại học VinUni)
Western University Hanoi (Đại học Thành Tây, Hà Nội)
Senior colleges (Trường Đại học)
Lac Hong University (Trường Đại học Lạc Hồng)
Long An University of Economy and Industry (Trường Đại học Kinh tế Công nghiệp Long An - DLA or LAU)
PACE Institute of Leadership and Management
Thai Binh University (Trường Đại học Thái Bình)
Foreign universities
British University Vietnam (U.K.)
Griggs University Vietnam (U.S.)
PSB College Vietnam (Singapore)
RMIT University Vietnam (Australia)
Fulbright University Vietnam (U.S)
Kaizen Institute in Vietnam (Global)
See also
Education in Vietnam
Vietnam Ministry of Education and Training (universities)
Vietnam Ministry of Industry (vocational schools)
Vietnam Ministry of Transport (schools and colleges)
References
External links
https://universityimages.com/list-of-universities-in-vietnam/
Universities
Vietnam
Vietnam |
13706 | https://en.wikipedia.org/wiki/Hero | Hero | A hero (heroine in its feminine form) is a real person or a main fictional character who, in the face of danger, combats adversity through feats of ingenuity, courage, or strength. Like other formerly solely gender-specific terms (like actor), hero is often used to refer to any gender, though heroine only refers to women. The original hero type of classical epics did such things for the sake of glory and honor. Post-classical and modern heroes, on the other hand, perform great deeds or selfless acts for the common good instead of the classical goal of wealth, pride, and fame. The antonym of hero is villain. Other terms associated with the concept of hero may include good guy or white hat.
In classical literature, the hero is the main or revered character in heroic epic poetry celebrated through ancient legends of a people, often striving for military conquest and living by a continually flawed personal honor code. The definition of a hero has changed throughout time. Merriam Webster dictionary defines a hero as "a person who is admired for great or brave acts or fine qualities". Examples of heroes range from mythological figures, such as Gilgamesh, Achilles and Iphigenia, to historical and modern figures, such as Joan of Arc, Giuseppe Garibaldi, Sophie Scholl, Alvin York, Audie Murphy, and Chuck Yeager, and fictional "superheroes", including Superman, Spider-Man, Batman, and Captain America.
Etymology
The word hero comes from the Greek ἥρως (hērōs), "hero" (literally "protector" or "defender"), particularly one such as Heracles with divine ancestry or later given divine honors. Before the decipherment of Linear B the original form of the word was assumed to be *, hērōw-, but the Mycenaean compound ti-ri-se-ro-e demonstrates the absence of -w-. Hero as a name appears in pre-Homeric Greek mythology, wherein Hero was a priestess of the goddess Aphrodite, in a myth that has been referred to often in literature.
According to The American Heritage Dictionary of the English Language, the Proto-Indo-European root is *ser meaning "to protect". According to Eric Partridge in Origins, the Greek word hērōs "is akin to" the Latin seruāre, meaning to safeguard. Partridge concludes, "The basic sense of both Hera and hero would therefore be 'protector'." R. S. P. Beekes rejects an Indo-European derivation and asserts that the word has a Pre-Greek origin. Hera was a Greek goddess with many attributes, including protection and her worship appears to have similar proto-Indo-European origins.
Antiquity
A classical hero is considered to be a "warrior who lives and dies in the pursuit of honor" and asserts their greatness by "the brilliancy and efficiency with which they kill". Each classical hero's life focuses on fighting, which occurs in war or during an epic quest. Classical heroes are commonly semi-divine and extraordinarily gifted, such as Achilles, evolving into heroic characters through their perilous circumstances. While these heroes are incredibly resourceful and skilled, they are often foolhardy, court disaster, risk their followers' lives for trivial matters, and behave arrogantly in a childlike manner. During classical times, people regarded heroes with the highest esteem and utmost importance, explaining their prominence within epic literature. The appearance of these mortal figures marks a revolution of audiences and writers turning away from immortal gods to mortal mankind, whose heroic moments of glory survive in the memory of their descendants, extending their legacy.
Hector was a Trojan prince and the greatest fighter for Troy in the Trojan War, which is known primarily through Homer's Iliad. Hector acted as leader of the Trojans and their allies in the defense of Troy, "killing 31,000 Greek fighters," offers Hyginus. Hector was known not only for his courage, but also for his noble and courtly nature. Indeed, Homer places Hector as peace-loving, thoughtful, as well as bold, a good son, husband and father, and without darker motives. However, his familial values conflict greatly with his heroic aspirations in the Iliad, as he cannot be both the protector of Troy and a father to his child. Hector is ultimately betrayed by the deities when Athena appears disguised as his ally Deiphobus and convinces him challenge Achilles, leading to his death at the hands of a superior warrior.
Achilles was a Greek hero who was considered the most formidable military fighter in the entire Trojan War and the central character of the Iliad. He was the child of Thetis and Peleus, making him a demi-god. He wielded superhuman strength on the battlefield and was blessed with a close relationship to the deities. Achilles famously refused to fight after his dishonoring at the hands of Agamemnon, and only returned to the war due to unadulterated rage after Hector killed his close friend Patroclus. Achilles was known for uncontrollable rage that defined many of his bloodthirsty actions, such as defiling Hector's corpse by dragging it around the city of Troy. Achilles plays a tragic role in the Iliad brought about by constant de-humanization throughout the epic, having his menis (wrath) overpower his philos (love).
Heroes in myth often had close, but conflicted relationships with the deities. Thus Heracles's name means "the glory of Hera", even though he was tormented all his life by Hera, the Queen of the Greek deities. Perhaps the most striking example is the Athenian king Erechtheus, whom Poseidon killed for choosing Athena rather than him as the city's patron deity. When the Athenians worshiped Erechtheus on the Acropolis, they invoked him as Poseidon Erechtheus.
Fate, or destiny, plays a massive role in the stories of classical heroes. The classical hero's heroic significance stems from battlefield conquests, an inherently dangerous action. The deities in Greek mythology, when interacting with the heroes, often foreshadow the hero's eventual death on the battlefield. Countless heroes and deities go to great lengths to alter their pre-destined fates, but with no success, as none, neither human or immortal can change their prescribed outcomes by the three powerful Fates. The most characteristic example of this is found in Oedipus Rex. After learning that his son, Oedipus, will end up killing him, the King of Thebes, Laius, takes huge steps to assure his son's death by removing him from the kingdom. When Oedipus encounters his father when his father was unknown to him in a dispute on the road many years later, Oedipus slays him without an afterthought. The lack of recognition enabled Oedipus to slay his father, ironically further binding his father to his fate.
Stories of heroism may serve as moral examples. However, classical heroes often didn't embody the Christian notion of an upstanding, perfectly moral hero. For example, Achilles's character-issues of hateful rage lead to merciless slaughter and his overwhelming pride lead to him only joining the Trojan War because he didn't want his soldiers to win all of the glory. Classical heroes, regardless of their morality, were placed in religion. In classical antiquity, cults that venerated deified heroes such as Heracles, Perseus, and Achilles played an important role in Ancient Greek religion. These ancient Greek hero cults worshipped heroes from oral epic tradition, with these heroes often bestowing blessings, especially healing ones, on individuals.
Myth and monomyth
The concept of the "Mythic Hero Archetype" was first developed by Lord Raglan in his 1936 book, The Hero, A Study in Tradition, Myth and Drama. It is a set of 22 common traits that he said were shared by many heroes in various cultures, myths, and religions throughout history and around the world. Raglan argued that the higher the score, the more likely the figure is mythical.
The concept of a story archetype of the standard monomythical "hero's quest" that was reputed to be pervasive across all cultures, is somewhat controversial. Expounded mainly by Joseph Campbell in his 1949 work The Hero with a Thousand Faces, it illustrates several uniting themes of hero stories that hold similar ideas of what a hero represents, despite vastly different cultures and beliefs. The monomyth or Hero's Journey consists of three separate stages including the Departure, Initiation, and Return. Within these stages there are several archetypes that the hero of either gender may follow, including the call to adventure (which they may initially refuse), supernatural aid, proceeding down a road of trials, achieving a realization about themselves (or an apotheosis), and attaining the freedom to live through their quest or journey. Campbell offered examples of stories with similar themes such as Krishna, Buddha, Apollonius of Tyana, and Jesus. One of the themes he explores is the androgynous hero, who combines male and female traits, such as Bodhisattva: "The first wonder to be noted here is the androgynous character of the Bodhisattva: masculine Avalokiteshvara, feminine Kwan Yin." In his 1968 book, The Masks of God: Occidental Mythology, Campbell writes, "It is clear that, whether accurate or not as to biographical detail, the moving legend of the Crucified and Risen Christ was fit to bring a new warmth, immediacy, and humanity, to the old motifs of the beloved Tammuz, Adonis, and Osiris cycles."
Slavic fairy tales
Vladimir Propp, in his analysis of Russian fairy tales, concluded that a fairy tale had only eight dramatis personæ, of which one was the hero, and his analysis has been widely applied to non-Russian folklore. The actions that fall into such a hero's sphere include:
Departure on a quest
Reacting to the test of a donor
Marrying a princess (or similar figure)
Propp distinguished between seekers and victim-heroes. A villain could initiate the issue by kidnapping the hero or driving him out; these were victim-heroes. On the other hand, an antagonist could rob the hero, or kidnap someone close to him, or, without the villain's intervention, the hero could realize that he lacked something and set out to find it; these heroes are seekers. Victims may appear in tales with seeker heroes, but the tale does not follow them both.
Historical studies
No history can be written without consideration of the lengthy list of recipients of national medals for bravery, populated by firefighters, policemen and policewomen, ambulance medics, and ordinary have-a-go heroes. These persons risked their lives to try to save or protect the lives of others: for example, the Canadian Cross of Valour (C.V.) "recognizes acts of the most conspicuous courage in circumstances of extreme peril"; examples of recipients are Mary Dohey and David Gordon Cheverie.
The philosopher Hegel gave a central role to the "hero", personalized by Napoleon, as the incarnation of a particular culture's Volksgeist, and thus of the general Zeitgeist. Thomas Carlyle's 1841 work, On Heroes, Hero Worship and the Heroic in History, also accorded a key function to heroes and great men in history. Carlyle centered history on the biography of a few central individuals such as Oliver Cromwell or Frederick the Great. His heroes were political and military figures, the founders or topplers of states. His history of great men included geniuses good and, perhaps for the first time in historical study, evil.
Explicit defenses of Carlyle's position were rare in the second part of the 20th century. Most in the philosophy of history school contend that the motive forces in history may best be described only with a wider lens than the one that Carlyle used for his portraits. For example, Karl Marx argued that history was determined by the massive social forces at play in "class struggles", not by the individuals by whom these forces are played out. After Marx, Herbert Spencer wrote at the end of the 19th century: "You must admit that the genesis of the great man depends on the long series of complex influences which has produced the race in which he appears, and the social state into which that race has slowly grown...[b]efore he can remake his society, his society must make him." Michel Foucault argued in his analysis of societal communication and debate that history was mainly the "science of the sovereign", until its inversion by the "historical and political popular discourse".
Modern examples of the typical hero are, Minnie Vautrin, Norman Bethune, Alan Turing, Raoul Wallenberg, Chiune Sugihara, Martin Luther King Jr., Mother Teresa, Nelson Mandela, Oswaldo Payá, Óscar Elías Biscet, and Aung San Suu Kyi.
The Annales school, led by Lucien Febvre, Marc Bloch, and Fernand Braudel, would contest the exaggeration of the role of individual subjects in history. Indeed, Braudel distinguished various time scales, one accorded to the life of an individual, another accorded to the life of a few human generations, and the last one to civilizations, in which geography, economics, and demography play a role considerably more decisive than that of individual subjects.
Among noticeable events in the studies of the role of the hero and great man in history one should mention Sidney Hook's book (1943) The Hero in History. In the second half of the twentieth century such male-focused theory has been contested, among others by feminists writers such as Judith Fetterley in The Resisting Reader (1977) and literary theorist Nancy K. Miller, The Heroine's Text: Readings in the French and English Novel, 1722–1782.
In the epoch of globalization an individual may change the development of the country and of the whole world, so this gives reasons to some scholars to suggest returning to the problem of the role of the hero in history from the viewpoint of modern historical knowledge and using up-to-date methods of historical analysis.
Within the frameworks of developing counterfactual history, attempts are made to examine some hypothetical scenarios of historical development. The hero attracts much attention because most of those scenarios are based on the suppositions: what would have happened if this or that historical individual had or had not been alive.
Modern fiction
The word "hero" (or "heroine" in modern times), is sometimes used to describe the protagonist or the romantic interest of a story, a usage which may conflict with the superhuman expectations of heroism. A good example is Anna Karenina, the lead character in the novel of the same title by Leo Tolstoy. In modern literature the hero is more and more a problematic concept. In 1848, for example, William Makepeace Thackeray gave Vanity Fair the subtitle, A Novel without a Hero, and imagined a world in which no sympathetic character was to be found. Vanity Fair is a satirical representation of the absence of truly moral heroes in the modern world. The story focuses on the characters, Emmy Sedley and Becky Sharpe (the latter as the clearly defined anti-hero), with the plot focused on the eventual marriage of these two characters to rich men, revealing character flaws as the story progresses. Even the most sympathetic characters, such as Captain Dobbin, are susceptible to weakness, as he is often narcissistic and melancholy.
The larger-than-life hero is a more common feature of fantasy (particularly in comic books and epic fantasy) than more realist works. However, these larger-than life figures remain prevalent in society. The superhero genre is a multibillion-dollar industry that includes comic books, movies, toys, and video games. Superheroes usually possess extraordinary talents and powers that no living human could ever possess. The superhero stories often pit a super villain against the hero, with the hero fighting the crime caused by the super villain. Examples of long-running superheroes include Superman, Wonder Woman, Batman, and Spider-Man.
Research indicates that male writers are more likely to make heroines superhuman, whereas female writers tend to make heroines ordinary humans, as well as making their male heroes more powerful than their heroines, possibly due to sex differences in valued traits.
Psychology
Social psychology has begun paying attention to heroes and heroism. Zeno Franco and Philip Zimbardo point out differences between heroism and altruism, and they offer evidence that observer perceptions of unjustified risk play a role above and beyond risk type in determining the ascription of heroic status.
Psychologists have also identified the traits of heroes. Elaine Kinsella and her colleagues have identified 12 central traits of heroism, which consist of brave, moral integrity, conviction, courageous, self-sacrifice, protecting, honest, selfless, determined, saves others, inspiring, and helpful. Scott Allison and George Goethals uncovered evidence for "the great eight traits" of heroes consisting of wise, strong, resilient, reliable, charismatic, caring, selfless, and inspiring. These researchers have also identified four primary functions of heroism. Heroes give us wisdom; they enhance us; they provide moral modeling; and they offer protection.
An evolutionary psychology explanation for heroic risk-taking is that it is a costly signal demonstrating the ability of the hero. It may be seen as one form of altruism for which there are several other evolutionary explanations as well.
Roma Chatterji has suggested that the hero or more generally protagonist is first and foremost a symbolic representation of the person who is experiencing the story while reading, listening, or watching; thus the relevance of the hero to the individual relies a great deal on how much similarity there is between them and the character. Chatterji suggested that one reason for the hero-as-self interpretation of stories and myths is the human inability to view the world from any perspective but a personal one.
In the Pulitzer Prize-winning book, The Denial of Death, Ernest Becker argues that human civilization is ultimately an elaborate, symbolic defense mechanism against the knowledge of our mortality, which in turn acts as the emotional and intellectual response to our basic survival mechanism. Becker explains that a basic duality in human life exists between the physical world of objects and a symbolic world of human meaning. Thus, since humanity has a dualistic nature consisting of a physical self and a symbolic self, he asserts that humans are able to transcend the dilemma of mortality through heroism, by focusing attention mainly on the symbolic self. This symbolic self-focus takes the form of an individual's "immortality project" (or "causa sui project"), which is essentially a symbolic belief-system that ensures that one is believed superior to physical reality. By successfully living under the terms of the immortality project, people feel they can become heroic and, henceforth, part of something eternal; something that will never die as compared to their physical body. This he asserts, in turn, gives people the feeling that their lives have meaning, a purpose, and are significant in the grand scheme of things. Another theme running throughout the book is that humanity's traditional "hero-systems", such as religion, are no longer convincing in the age of reason. Science attempts to serve as an immortality project, something that Becker believes it can never do, because it is unable to provide agreeable, absolute meanings to human life. The book states that we need new convincing "illusions" that enable people to feel heroic in ways that are agreeable. Becker, however, does not provide any definitive answer, mainly because he believes that there is no perfect solution. Instead, he hopes that gradual realization of humanity's innate motivations, namely death, may help to bring about a better world. Terror Management Theory (TMT) has generated evidence supporting this perspective.
Mental and physical integration
Examining the success of resistance fighters on Crete during the Nazi occupation in WWII, author and endurance researcher C. McDougall drew connections to the Ancient Greek heroes and a culture of integrated physical self-mastery, training, and mental conditioning that fostered confidence to take action, and made it possible for individuals to accomplish feats of great prowess, even under the harshest of conditions. The skills established an "...ability to unleash tremendous resources of strength, endurance, and agility that many people don’t realize they already have.”
McDougall cites examples of heroic acts, including a scholium to Pindar’s Fifth Nemean Ode: “Much weaker in strength than the Minotaur, Theseus fought with it and won using pankration, as he had no knife.” Pankration is an ancient Greek term meaning "total power and knowledge,” one "...associated with gods and heroes...who conquer by tapping every talent.”
See also
Action hero
List of female action heroes and villains
Antihero
Byronic hero
Carnegie Hero Fund
Culture hero
Folk hero
Germanic hero
Hero and Leander
Hero of Socialist Labour
Heroic fantasy
List of genres
Randian hero
Reluctant hero
Romantic hero
Space opera
Tragic hero
Youxia
References
Further reading
Carlyle, Thomas (1840) On Heroes, Hero Worship and the Heroic in History
Craig, David, Back Home, Life Magazine-Special Issue, Volume 8, Number 6, 85–94.
Hook, Sydney (1943) The Hero in History: A Study in Limitation and Possibility
Lidell, Henry and Robert Scott. A Greek–English Lexicon. link
(Republished 2003)
External links
The British Hero — online exhibition from screenonline, a website of the British Film Institute, looking at British heroes of film and television.
Listen to BBC Radio 4's In Our Time programme on Heroism
"The Role of Heroes in Children's Lives" by Marilyn Price-Mitchell, PhD
10% — What Makes A Hero directed by Yoav Shamir
Epic poetry
Good and evil
Fantasy tropes
Jungian archetypes
Literary archetypes
Mythological archetypes
Mythological characters
Protagonists by role |
31657946 | https://en.wikipedia.org/wiki/Casio%20G%27zOne%20Commando | Casio G'zOne Commando | The Casio G'zOne Commando is a smartphone which is ruggedized and runs the Android operating system. It is made by NEC Casio Mobile Communications, a joint venture of three Japanese electronics makers: NEC, Casio and Hitachi. It was first released by Verizon in the United States on 28 April 2011.
Its main selling feature is that it is ruggedized to military standard MIL-STD-810G. , it is the first retail-available smartphone so certified. Thus, it is stronger and more durable than normal consumer electronics, similar in concept to the Motorola DEFY, but certified tougher. The phone should be able to handle drops, spills and dirt that accompany physically demanding activities such as those in harsh work environments or outdoors. At one publication, technicians tested this phone and more recently, the updated model, G'zOne Commando 4G LTE. They found both models "rugged"; and describe no ill effects after randomly dropping G'zOne Commando 4G LTE, and submerging it under water for half an hour.
The phone was released with the Android 2.2.1 Froyo operating system, but an upgrade to Android 2.3.3 is available.
Some reviewers have criticized the phone's styling and aesthetics as unattractive.
See also
Casio
Samsung Rugby Smart
References
External links
Does not appear to be a website owned by Casio
Smartphones
Android (operating system) devices
Verizon Wireless
Mobile phones introduced in 2011 |
943527 | https://en.wikipedia.org/wiki/Virtual%20directory | Virtual directory | In computing, the term virtual directory has a couple of meanings. It may simply designate (for example in IIS) a folder which appears in a path but which is not actually a subfolder of the preceding folder in the path. However, this article will discuss the term in the context of directory services and identity management.
A virtual directory or virtual directory server (VDS) in this context is a software layer that delivers a single access point for identity management applications and service platforms. A virtual directory operates as a high-performance, lightweight abstraction layer that resides between client applications and disparate types of identity-data repositories, such as proprietary and standard directories, databases, web services, and applications.
A virtual directory receives queries and directs them to the appropriate data sources by abstracting and virtualizing data. The virtual directory integrates identity data from multiple heterogeneous data stores and presents it as though it were coming from one source. This ability to reach into disparate repositories makes virtual directory technology ideal for consolidating data stored in a distributed environment.
, virtual directory servers most commonly use the LDAP protocol, but more sophisticated virtual directories can also support SQL as well as DSML and SPML.
Industry experts have heralded the importance of the virtual directory in modernizing the identity infrastructure. According to Dave Kearns of Network World, "Virtualization is hot and a virtual directory is the building block, or foundation, you should be looking at for your next identity management project." In addition, Gartner analyst, Bob Blakley said that virtual directories are playing an increasingly vital role. In his report, “The Emerging Architecture of Identity Management,” Blakley wrote: “In the first phase, production of identities will be separated from consumption of identities through the introduction of a virtual directory interface.”
Capabilities
Virtual directories can have some or all of the following capabilities:
Aggregate identity data across sources to create a single point of access.
Create high-availability for authoritative data stores.
Act as identity firewall by preventing denial-of-service attacks on the primary data stores through an additional virtual layer.
Support a common searchable namespace for centralized authentication.
Present a unified virtual view of user information stored across multiple systems.
Delegate authentication to backend sources through source-specific security means.
Virtualize data sources to support migration from legacy data stores without modifying the applications that rely on them.
Enrich identities with attributes pulled from multiple data stores, based on a link between user entries.
Some advanced identity virtualization platforms can also:
Enable application-specific, customized views of identity data without violating internal or external regulations governing identity data. Reveal contextual relationships between objects through hierarchical directory structures.
Develop advanced correlation across diverse sources using correlation rules.
Build a global user identity by correlating unique user accounts across various data stores, and enrich identities with attributes pulled from multiple data stores, based on a link between user entries.
Enable constant data refresh for real-time updates through a persistent cache.
Advantages
Virtual directories:
Enable faster deployment because users do not need to add and sync additional application-specific data sources
Leverage existing identity infrastructure and security investments to deploy new services
Deliver high availability of data sources
Provide application-specific views of identity data which can help avoid the need to develop a master enterprise schema
Allow a single view of identity data without violating internal or external regulations governing identity data
Act as identity firewalls by preventing denial-of-service attacks on the primary data-stores and providing further security on access to sensitive data
Can reflect changes made to authoritative sources in real-time
Leverages existing update processes of authoritative sources, so no separate (sometimes manual) process to update a central directory is needed
Present a unified virtual view of user information from multiple systems so that it appears to reside in a single system
Can secure all backend storage locations with a single security policy
Disadvantages
An original disadvantage is public perception of "push & pull technologies" which is the general classification of "virtual directories" depending on the nature of their deployment. Virtual directories were initially designed and later deployed with "push technologies" in mind, which also contravened with privacy laws of the United States. This is no longer the case. There are, however, other disadvantages in the current technologies.
The classical virtual directory based on proxy cannot modify underlying data structures or create new views based on the relationships of data from across multiple systems. So if an application requires a different structure, such as a flattened list of identities, or a deeper hierarchy for delegated administration, a virtual directory is limited.
Many virtual directories cannot correlate same-users across multiple diverse sources in the case of duplicate users
Virtual directories without advanced caching technologies cannot scale to heterogeneous, high-volume environments.
Sample terminology
Unify metadata: Extract schemas from the local data source, map them to a common format, and link the same identities from different data silos based on a unique identifier.
Namespace joining: Create a single large directory by bringing multiple directories together at the namespace level. For instance, if one directory has the namespace "ou=internal,dc=domain,dc=com" and a second directory has the namespace "ou=external,dc=domain,dc=com," then creating a virtual directory with both namespaces is an example of namespace joining.
Identity joining: Enrich identities with attributes pulled from multiple data stores, based on a link between user entries. For instance if the user joeuser exists in a directory as "cn=joeuser,ou=users" and in a database with a username of "joeuser" then the "joeuser" identity can be constructed from both the directory and the database.
Data remapping: The translation of data inside of the virtual directory. For instance, mapping “uid” to “samaccountname,” so a client application that only supports a standard LDAP-compliant data source is able to search an Active Directory namespace, as well.
Query routing: Route requests based on certain criteria, such as “write operations going to a master, while read operations are forwarded to replicas.”
Identity routing: Virtual directories may support the routing of requests based on certain criteria (such as write operations going to a master while read operations being forwarded to replicas).
Authoritative source: A "virtualized" data repository, such as a directory or database, that the virtual directory can trust for user data.
Server groups: Group one or more servers containing the same data and functionality. A typical implementation is the multi-master, multi-replica environment in which replicas process "read" requests and are in one server group, while masters process "write" requests and are in another, so that servers are grouped by their response to external stimuli, even though all share the same data.
Use cases
The following are sample use cases of virtual directories:
Integrating multiple directory namespaces to create a central enterprise directory.
Supporting infrastructure integrations after mergers and acquisitions.
Centralizing identity storage across the infrastructure, making identity information available to applications through various protocols (including LDAP, JDBC, and web services).
Creating a single access point for web access management (WAM) tools.
Enabling web single sign-on (SSO) across varied sources or domains.
Supporting role-based, fine-grained authorization policies
Enabling authentication across different security domains using each domain’s specific credential checking method.
Improving secure access to information both inside and outside of the firewall.
References
Data management |
31937663 | https://en.wikipedia.org/wiki/DebWRT | DebWRT | DebWrt is a discontinued, niche Linux distribution mainly installed on embedded systems (e.g. residential gateways). It was built on top of an OpenWrt base which was used to load a fully functional version of Debian from the RootFS stored on the attached USB storage device. For easy installation and deinstallation of packages it relied on the dpkg Package management system. DebWrt used the command-line interface of Bash. There was no web-based GUI interface.
Features
DebWrt offered all of the features provided in the stock firmware for residential gateways, such as DHCP services and wireless encryption via WEP, Wi-Fi Protected Access and WPA2. In addition it offered all of the features offered by Debian that are typically not included in a standard firmware.
Features included:
Package manager apt-get
Extensible configuration of your network involving VLAN with exhaustive possibilities to configure the routing itself
Customizable methods to filter, manipulate, delay and rearrange network packets:
Static DHCP leases
Other devices with available Linux drivers
Regular bug fixes and updates, even for devices no longer supported by their manufacturers
DebWrt had a fully writable file system, which allowed for package management via the dpkg package system, allowing users to install new software to meet their individual needs. This contrasted with Linux-based firmware built using a read-only SquashFS filesystem (or similar) that offered efficient compression but no way to modify the installed software without rebuilding and flashing a complete firmware image.
Versions
2.0: Angel - 2009 February
See also
List of router firmware projects
References
External links
Linksys GPL Code Center
Embedded Linux distributions
Linux distributions |
6839952 | https://en.wikipedia.org/wiki/Akademy | Akademy | Akademy (capitalized as aKademy before 2009) is an annual contributors and users conference of the KDE community. Akademy is held at varying venues in Europe.
While Akademy usually takes place late summer or early autumn and is always held in Europe, Camp KDE, another contributors conference of the KDE community, is held in the Americas.
Format
The numbers below are the participation at the Akademy 2008.
Two-day KDE conference, 350 people.
One-day KDE e.V. meeting, 100 people.
Five-day hacking session, 350 people at the start, 250 people at the end.
Social program like a reception, party and optionally a sight-seeing tour.
Conference history
Akademy Awards
The yearly Akademy conference gives Akademy Awards, are awards that the KDE community gives to KDE contributors. There are three awards, best application, best non-application and jury's award.
KDE One
KDE One is the first KDE community meeting with 15 participants, and budget is 14000 DEM (7158 EUR). The results of discussions are: KParts for embedding applications into each other, definition of a filesystem standard, all applications should be internationalized, need a list of keybindings that are obligatory for all applications, and need more and better documentation. The social event is a walk through the historical town of Arnsberg. The sponsors helped with money donations consists of S.u.S.E. GmbH, Caldera Inc., LST Software GmbH, O'Reilly Verlag, JF Lehmanns Buchhandlung, Delix Computer GmbH, Dorint Hotel Arnsberg-Neheim, and Wirtschaftsförderung Arnsberg GmbH.
KDE Two
KDE Two is the second KDE community meeting with 40 participants, organized by SuSE and Caldera. KDE e.V. meeting elect the new board consists of Kurt Granroth (president), Chris Schläger (vice president), Mirko Boehm (treasurer), and Preston Brown (board member).
Kastle
The KDE Contributor Conference (code-named Kastle) was held at the Zámek (Castle) in Nové Hrady, Czech Republic. The conference program consists of KDE e.V. membership meeting, technical Talks, brewery tour, and hacking festival. The conference is run by KDE e.V., the Academic and University Center Nove Hrady and the Polytechnic University of Upper Austria in Hagenberg.
Conferences
aKademy 2004
The KDE Community World Summit 2004 (code-named aKademy) take place at the Filmakademie Ludwigsburg. The conference is jointly organized by KDE e.V., Wirtschaftsförderung Region Stuttgart (WRS), and Linux New Media AG.
aKademy 2005
The KDE Developers and Users Conference 2005 (code-named aKademy) take place at the University of Málaga. KDE e.V. Meeting take place at 26 August. KDE User and Administrator Conference takes place at 27 to 28 August. KDE Developers and Contributors Conference takes place at 29 to 30 August. Coding Marathon for KDE Developers and Contributors takes place at 31 August to 4 September.
aKademy 2006
The aKademy 2006 takes place in Trinity College, Dublin. The conference was focused on KDE SC 4, desktop standards and cross-project collaboration, and meeting the community.
aKademy 2007
The aKademy 2007 takes place at the Graham Hills Building, University of Strathclyde.
Akademy 2008
The Akademy 2008 takes place at Campus De Nayer, Lessius Hogeschool.
Akademy 2010
The Akademy 2010 was held in the main building of the University of Tampere from July 2–9, 2010.
Akademy 2017
The Akademy 2017 was held in Universidad de Almería (UAL) in Almería, Spain, from July 22–27, 2017.
Stalls at the conference were held by LibreOffice, Slimbook, and SUSE, among others.
Akademy 2018
The Akademy 2018 was held at TU Wien in Vienna, Austria, from Saturday 11th to Friday 17 August.
Akademy-es
Akademy-es is a conference for Spanish community since 2006, aimed at Spanish speakers. The event is organized by Spanish local organization. KDE España organizes the event since 2008. The annual KDE España Assembly takes place during the event.
Akademy-es 2006 was held at Espai Jove Bocanord in Barcelona, organized by Badopi. Akademy-es 2007 was hosted by Hispalinux, Wireless Zaragoza, and the Zaragoza council. Akademy-es 2008 was held at University of A Coruña, was organized by the KDE España and GPUL, sponsored by Oficina de Software Libre da Universidade da Coruña, Mancomun, Igalia, Qt Software and eyeOs. Akademy-es 2009 was held in the University of Las Palmas de Gran Canaria. Akademy-es 2010 was held in the Engineering Technical School of Bilbao, was organized by KDE España and Itsas. There were approximately 80 participants. The KDE España Assembly elected the new board consists of Albert Astals Cid (president), Rafael Fernández López (vice president), Aleix Pol (secretary), and José Millán Soto (treasurer). Akademy-es 2011 was organized by KDE España, was sponsored by Google and Nokia, and was supported by the Linux and Todo-Linux magazines. The event was held in two different locations: the Polytechnic University of Catalunya for presentations of first day, The School of Sant Marc de Sarrià for last two day.
Akademy-BR
Akademy-BR is addressed to Brazilian community since 2010. The purpose of the meeting is to gather and organize ideas Brazilian developers on how to help KDE in Brazil. Akademy-BR 2010 was organized by the local group named LiveBlue. There were thirty participants from all over Brazil. Akademy-BR 2011 is organized by KDE-MG.
See also
List of computer-related awards
References
External links
Akademy website
Camp KDE website
Akademy-es 2011
Akademy-BR 2011
conf.kde.in
Developer Sprints
KDE Sprints
Free-software conferences
KDE
Free-software awards
Recurring events established in 1997
Articles containing video clips
1997 establishments in Germany |
49167282 | https://en.wikipedia.org/wiki/Andreas%20Reuter | Andreas Reuter | Andreas Reuter (born October 31, 1949) is a German computer science professor and research manager. His research focuses on databases, transaction systems, and parallel and distributed computer systems. Reuter has been scientific and executive director of EML European Media Laboratory GmbH and gGmbH since 1998 and Managing Director of the Heidelberg Institute for Theoretical Studies (HITS gGmbH) from 2010 until 2016. In October 2015, he was appointed Senior Professor at the University of Heidelberg.
Life and career
During his school time he volunteered in the company founded by Konrad Zuse in Bad Hersfeld. After graduating in 1968, he worked as a freelance programmer for companies and authorities. From 1973 on, he studied computer science at the Technical University of Munich and at the Department of Computer Science of the Technische Universität Darmstadt. He completed his studies in Darmstadt with a diplom in 1978. As a researcher he received his doctorate degree (Dr.-Ing.) under Theo Härder and Hartmut Wedekind in 1981. He worked as an assistant professor at the University of Kaiserslautern from 1981 to 1983. In 1983 he was employed as a postdoc at the IBM Research Center in San José. In 1985 he was appointed professor at the University of Stuttgart, where he became the founding director of the Institute for Parallel and Distributed High-Performance Computer Systems in 1988. From 1992 until 1996 he was Vice-President for Academic Affairs at the University of Stuttgart. In 1996 he declined an offered position as director at the Max Planck Institute for Computer Science in Saarbrücken. Instead, from 1997 on he co-founded and developed the private "International University in Germany", where he worked as dean and vice-president until 2004.
On January 1, 1998 he was appointed scientific and managing director of the EML European Media Laboratory GmbH, which Klaus Tschira had founded in 1997. Together with Klaus Tschira, he was essentially involved in building up the company and its affiliate, EML Research gGmbH (from 2003 on). In 2010 EML Research became the Heidelberg Institute for Theoretical Studies, whose managing director he was until April 2016.
In 2007, Andreas Reuter accepted the endowed chair for “Dependable Systems”, supported by the Klaus Tschira Foundation, at the University of Kaiserslautern. In 2011 he transferred to Heidelberg University. There he held an endowed chair for “Distributed Systems”, also supported by the Klaus Tschira Foundation. The Technical University of Donetsk (Ukraine) awarded him an honorary doctorate in 1994.
Research and positions
Andreas Reuter’s research focuses on the field of databases, transaction systems, and parallel and distributed computer systems. Together with the Turing Award laureate James "Jim" Gray he published the book "Transaction Processing: Concepts and Techniques" in 1992, which became a standard reference work for researchers and developers around the world and was translated among others into Chinese and Japanese. He developed a definition of the transactional processing model in (distributed) databases along with Theo Härder, a model which to this day is often quoted by his acronym ACID (atomicity, consistency, isolation, durability).
In addition to his research Andreas Reuter conducted numerous consulting projects and held lectures on many topics in both the university and industrial sectors. He is involved in numerous advisory boards both in academia and industry and is among other positions an External Scientific Member of the Max Planck Institute for Computer Science (MPII) in Saarbrücken and of the Board of Trustees of the Max Planck Institute for Astronomy (MPIA) in Heidelberg.
Recognition
He was elected as an ACM Fellow in 2019 "for contributions to database concurrency control and for service to the community".
References
1949 births
Living people
People from Brandis, Germany
German computer scientists
Heidelberg University faculty
University of Stuttgart faculty
Technische Universität Darmstadt alumni
Fellows of the Association for Computing Machinery |
62841408 | https://en.wikipedia.org/wiki/2018%20SingHealth%20data%20breach | 2018 SingHealth data breach | The 2018 SingHealth data breach was a data breach incident initiated by unidentified state actors, which happened between 27 June and 4 July 2018. During that period, personal particulars of 1.5 million SingHealth patients and records of outpatient dispensed medicines belonging to 160,000 patients were stolen. Names, National Registration Identity Card (NRIC) numbers, addresses, dates of birth, race, and gender of patients who visited specialist outpatient clinics and polyclinics between 1 May 2015 and 4 July 2018 were maliciously accessed and copied. Information relating to patient diagnosis, test results and doctors' notes were unaffected. Information on Prime Minister Lee Hsien Loong was specifically targeted.
Discovery
The database administrators for the Integrated Health Information Systems (IHIS), the public healthcare IT provider, detected unusual activity on one of SingHealth's IT databases on 4 July, and implemented precautions against further intrusions. Network traffic monitoring was enhanced; additional malicious activity was detected after 4 July, but did not result in the theft of any data. Having ascertained that a cyberattack occurred, administrators notified the ministries and brought in the Cyber Security Agency (CSA) on 10 July to carry out forensic investigations. The agency determined that perpetrators gained privileged access to the IT network by compromising a front-end workstation, and obtained login credentials to assess the database, while hiding their digital footprints. The attack was made public in a statement released by the Ministry of Communications and Information and Ministry of Health on 20 July. The ten-day delay between the discovery of the attack and the public announcement was attributed to time needed to fortify the IT systems, conduct preliminary investigations, identify affected patients and prepare the logistics of the announcement. Text messages were subsequently sent to patients whose data was affected.
Investigation
On 6 August 2018 in Parliament, S. Iswaran, Minister for Communications and Information, attributed the attack to sophisticated state-linked actors who wrote customized malware to circumvent SingHealth's antivirus and security tools. Iswaran did not name any state in the interest of national security.
A Committee of Inquiry was convened on 24 July 2018 to investigate the causes of the attack and identify measures to help prevent similar attacks. The four-member committee is chaired by former chief district judge Richard Magnus, and comprise leaders of a cyber-security firm, a healthcare technology firm and the National Trades Union Congress respectively. The committee called on the Attorney-General's Chambers to lead evidence, and the Attorney-General's Chambers appointed the Cyber Security Agency to lead the investigations with the support of the Criminal Investigation Department. The committee held closed-door and public hearings from 28 August, with another tranche of hearings from 21 September to 5 October. In addition, the Personal Data Protection Commission investigated into possible breaches of the Personal Data Protection Act in protecting data and hence determine possible action.
Committee of Inquiry hearings
The Committee of Inquiry hearings began on 21 September 2018. In the first hearing, Solicitor-General Kwek Mean Luck said that a series of staff missteps and gaps in the system contributed to the breach. Some examples mentioned are the EMR system, which was in place since 1999. In addition, it was mentioned that the cyberattacker behind the incident started infecting workstations as early as August 2017 using a hacking tool. The version of Microsoft Outlook being used did not have a patch that prevents attacks by that hacking tool. Between December 2017 and May 2018, the cyberattacker moved sideways and gained access to a workstation to infect other computers with malware. Other inadequacies identified include not being able to identify multiple failed attempts to log into the system, which was done with non-existent accounts or accounts that do not have much privileges in the system. Eventually, the cyberattacker successfully gained entry through a coding vulnerability on 26 June, and hence sent SQL queries until 4 July when it was stopped by an administrator. In addition, there were three periods where staff failed to respond or responded after a few days when knowledge of the cyberattack was first known. On the same day, two staff members said that while a framework was in place to report cyberattacks, there is insufficient training on what to do, hence it was unclear to staff about what actions should be taken.
At the next hearing on 24 September, it was revealed that Prime Minister Lee Hsien Loong's personal data and outpatient records along with two other unnamed people were searched by hackers who infiltrated into the servers using NRIC numbers. The rest of the queries were generally done on patient demographic data, like one that involved the first 20,000 records of such data from Singapore General Hospital. An assistant lead analyst who detected unusual activity investigated further even through that was not his scope, and sent alerts to different divisions to find the staff who can make sense of those queries. The analyst's supervisor told the analyst to continue monitoring the situation and that he assumed there was no medical data until being informed that there was such a leak. As the analyst informed a reporting officer, there was no point in reporting the query himself, asking the analyst to follow up on the queries. Details about reporting procedures and containment measures were mentioned.
On the third day, a cybersecurity employee at Integrated Health Information Systems (IHiS), who was on holiday when the incident happened, did not follow up after having read the emails as it was thought to have been collection of data from workstations for investigation. In addition, only one computer at IHiS was used to carry out forensic examinations, resulting in delays diagnosing the issue. This is confirmed by the fourth day of the trial, where failings of judgement and organisational processes are exposed. For instance, meetings with the security management department were not conducted regularly, and no framework was created to set out appropriate responses to cybersecurity risks or to appoint covering officers if any staff go on leave. A clarification on processes was provided, where a standard operating procedure to escalate incidents was approved by the management in March 2018. It was also revealed the same day that staffers took six more days after 4 July to confirm the data breach as an IHiS employee mistakenly informed colleagues that no data was stolen, only confirmed after further tests are run by the superior finding that data was stolen. The queries were later recreated.
It was also revealed on the fifth day that a server exploited by hackers did not receive security updates in more than a year since May 2017 due to the WannaCry ransomware attacks, compared to the normal duration where patches were done several times a month. Besides that, the computer's anti-virus software was too old and must be reinstalled. The manager was not supposed to manage the server on paper, but in practice, was given the role in 2014 as the server was located at the National Cancer Centre Singapore, thereby being convenient for staff members to approach him in case help was needed. Once the counterparts resigned, there was no one at IHiS present to take over managing the server. In fact, the IHiS director was not aware that the server was not managed by the firm in practice, only giving a directive in 2014 that IHiS will not manage research servers. The next day, a security loophole that was not plugged was scruntised. Even though the loophole was flagged by an IHiS employee, there was no action taken. In fact, the employee was dismissed after sending details of the flaw to a rival company.
Towards the end of the second tranche of hearings on 5 October 2018, it was revealed a second attempt to hack into the servers was done on 19 July via another server as the attackers are skilled. This was stopped immediately as soon as it began. In addition, malware used was customised for the system and evaded detection from top anti-virus software. A tool called PowerShell was used in the process, being disabled on 13 July. Meanwhile, IHiS stepped up security with changing passwords, removing compromised accounts and rebooting servers.
The third tranche of hearings started on 31 October 2018. Evidence was shown that managers were reluctant to report the incidents as that would mean an increased amount of work, thereby creating a bottleneck. Meanwhile, the chief information officer told the team to escalate the incident, saying a bottleneck is not acceptable, adding that there was no written protocol on how to report SingHealth-related cybersecurity incidents should IHiS staff discover any incident. Another pointed out that annual cybersecurity exercises are mandated for critical information infrastructure (CII) operators, so staff should be able to identify advanced persistent threats (APTs). However, these tests were for classroom settings and may not necessarily apply to the SingHealth case, thus defeating the purpose of these exercises if situational awareness was not there. There were also plans for secure Internet browsing in the healthcare sector by 2018, but it had to be delayed by a year due to technical issues.
The following day, a 2016 audit that found systemic weaknesses in the network link between Singapore General Hospital and cloud-based systems was brought up, showing more inadequacies in the systems managed by IHiS. The incident was reported by the operations team as "plugged" to the management without anyone verifying that works to fix these vulnerabilities were done. The Cyber Security Agency also found similar vulnerabilities in its investigation. Due to this, there will be "three lines of defence", where compliance checks are performed by the operations team, technology team and internal audit team, and training will be stepped up in IHiS so that early detection of attacks are ensured. As pointed out the next day that even if the weaknesses were found, they may not be fixed as quickly as expected as public healthcare institutions operate around the clock resulting in little downtime.
Later in the hearings, SingHealth executives said that they will enhance cyber safety awareness for all employees, as well as roll out new systems to capture patients' data rigorously. It will also allow patients to update their particulars instead of only doing it over the counter. More townhalls will be held to update employees about the latest cyber threats, with log-in messages strengthened to hone the importance of data protection. Storytelling formats will also be used to explain these concepts. More cyber security exercises simulating data breaches were called for in a subsequent hearing, with these allowing professionals to be more familiar with what to do in case a similar incident happens again. In addition, the expert recommended all data within the system to be encrypted including inactive data. As full encryption would be unfeasible due to operational concerns, personal data could be anonymised instead with 2-factor authentication to de-anonymise it. That same hearing, it was updated that many of the written submissions were found to be useful.
Towards the final hearings, a former National Security Agency director suggested having the Government and industry partners work together and share information to learn and update each other about new threats that pop up. That is so as current protection measures are insufficient against ever evolving vulnerabilities. In the same hearing, the Ministry of Health's chief data advisor pointed out that Internet separation resulted in longer wait times for patients, declined productivity, increased staff fatigue and new cyber risks, especially when anti-virus software updates are done only on some computers instead of all within the network. Hence, to continue ISS, these factors would need to be considered. The next day, a security expert recommended having a centralised incident management and tracking system that logs all incidents that occur during a breach to reduce miscommunication, which is one of the causes for delayed reporting. In addition, the usage of different chat platforms meant that crucial details about the attack were lost and hence there was not many linkages to the incident.
On the final day, Cyber Security Agency chief David Koh suggested changing the way IT staff in the healthcare sector report incidents so that faster response can be ensured during a cyberattack, along with a review of the sector's IT processes and staff training carried out. It was also suggested that cybersecurity processes be considered as a key instead of it merely existing as an afterthought. The hearings thus concluded on 14 November 2018.
The closing submissions were held on 30 November 2018. Proposals to improve cybersecurity were shared, including the "assume breach" mindset in organisations thus taking necessary measures, having the right people and processes to complement those measures. It was also pointed out that administrator passwords are supposed to be 15 characters long, but one had an problematic password of eight characters which was unchanged since 2012. Lastly, even if measures were put in place to slow down cyberattacks, it is important to note that the attack was done via an advanced persistent threat (APT). Subsequently, the report was submitted to S. Iswaran on 31 December 2018 with the public version released on 10 January 2019.
Release of report
On 10 January 2019, the Committee of Inquiry released a report on the SingHealth breach. The report found that staff are inadequately trained in cybersecurity, thus they are unable to stop the attacks. The key staff did not take immediate action to stop the attacks fearing pressure. To make things worse, vulnerabilities in the network and systems are not patched quickly, coupled with the fact that the attackers are well-skilled. As a result, the attackers found it easy to break in. The report did point that if the staff had been adequately trained and vulnerabilities fixed quickly, this attack could have been averted. The report also found that this is the work of an Advanced Persistent Threat group.
In the same report, the Committee of Inquiry made 16 recommendations to boost cybersecurity, separated into priority and additional recommendations. They are:
Priority:
Adopting an enhanced security structure and readiness by iHiS and public health institutions
Review online security processes to assess ability to defend and respond to cyberattacks
Improving staff awareness on cyberattacks
Perform enhanced security checks, especially on critical information infrastructure (CII) systems
Subject privileged administrator accounts to tighter control and greater monitoring
Improve incident response processes
Forge partnerships between industries and the Government to achieve higher cybersecurity
Additional:
IT security risk assessments and audits must be treated seriously and carried out regularly
Enhanced safeguards must be put in place to protect confidentiality of electronic medical records
Improve domain security against attacks
Implement a robust patch management process
Implement a software upgrade policy with a focus on cybersecurity
Implement an Internet access strategy that limits exposure to external threats
Clearer guidelines on when and how to respond to cybersecurity incidents
Improve competence of computer security incident response personnel
Consider a post-breach independent forensic review of the network
On 15 January 2019, S. Iswaran, Minister for Communications and Information announced in Parliament that the Government accepted the recommendations of the report and will fully adopt them. It has also sped up the implementation of the Cybersecurity Act to increase security of CIIs. Separately, Gan Kim Yong, Minister for Health announced that changes to enhance governance and operations in Singapore's healthcare institutions and IHiS will be made. The dual role of Ministry of Health's chief information security officer (MOH CISO) and the director of cybersecurity governance at IHiS will be separated, where the MOH CISO has a dedicated office and reports to the Permanent Secretary of MOH, while IHiS will have a separate director in charge of cybersecurity governance, with changes at the cluster level. This will help boost operations and governance of the IT systems. In addition, MOH will establish an enhanced "Three Lines of Defence" system for public healthcare, and pilot a "Virtual Browser" for the National University Health System. All public healthcare staff will remain on Internet Surfing Separation, which was implemented immediately after the cyberattack, and the mandatory contribution of patient medical data to the National Electronic Health Record (NEHR) system will continue to be deferred.
Aftermath
Following the cyberattack, Internet access was temporarily removed from all public healthcare IT terminals with access to the healthcare network, and additional system monitoring and controls were implemented.
The attack led to a two-week pause in Singapore's Smart Nation initiatives and a review of the public sector's cyber-security policies during that time. The review resulted in implementation of additional security measures, and urged public sector administrators to remove Internet access where possible and to use secure Information Exchange Gateways otherwise. The attack also renewed concerns among some healthcare practitioners regarding ongoing efforts to centralize electronic patient data in Singapore. Plans to pass laws in late 2018 making it compulsory for healthcare providers to submit data regarding patient visits and diagnoses to the National Electronic Health Record system were postponed. In addition, the Ministry of Health announced on 6 August 2018 that the National Electrical Health Record (NEHR) will be reviewed by an independent group made up of Cyber Security Agency and PricewaterhouseCoopers before asking doctors to submit all records to the NEHR, even though it was not affected by the cyberattack.
On 24 July 2018, the Monetary Authority of Singapore told banks in Singapore to tighten customer verification processes in case leaked data was used to impersonate customers, with additional information requested. Banks are also told to conduct risk assessments and mitigate risks from misuse of information.
The Integrated Health Information Systems (IHiS) has since strengthened public health systems against data breaches. All suspicious IT incidents will have to be reported within 24 hours. 18 other measures are also put in place, including two-factor authentication for all administrators, proactive threat hunting and intelligence, allowing only computers with latest security updates on hospital networks, and a new database activity monitoring. Studies are done to keep Internet Separation Scheme (ISS) permanent in some parts of the healthcare system with a virtual browser being piloted as an alternative.
After the report was released, on 14 January 2019, Integrated Health Information Systems (IHiS) dismissed two employees and demoted one for being negligent in handling and misunderstanding the attack respectively, with financial penalties imposed on two middle management supervisors, and five members of the senior management including CEO Bruce Liang. Three employees were commended by IHiS for handling the incident diligently even when not part of their job scope. IHiS has since fast-tracked a suite of 18 measures for enhancing cybersecurity. The next day, the Personal Data Protection Commission fined IHiS $750,000 and SingHealth $250,000 for not doing enough to safeguard personal data under the Personal Data Protection Act, making it the largest fine imposed for data breaches.
Subsequently, on 6 March 2019, cybersecurity company Symantec identified a state-sponsored group, known as Whitefly, behind the cyberattack. Although the country is not identified, that group has been found to be behind several related cyberattacks against Singapore-based entities since 2017.
References
Hacking in the 2010s
Cyberwarfare
SingHealth
Internet events
Internet in Singapore
2018 in Singapore
Health in Singapore
Data breaches |
3825008 | https://en.wikipedia.org/wiki/Air%20gap%20%28networking%29 | Air gap (networking) | An air gap, air wall, air gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. It means a computer or network has no network interface controllers connected to other networks, with a physical or conceptual air gap, analogous to the air gap used in plumbing to maintain water quality.
Use in classified settings
An air-gapped computer or network is one that has no network interfaces, either wired or wireless, connected to outside networks. Many computers, even when they are not plugged into a wired network, have a wireless network interface controller (WiFi) and are connected to nearby wireless networks to access the Internet and update software. This represents a security vulnerability, so air-gapped computers either have their wireless interface controller permanently disabled or physically removed. To move data between the outside world and the air-gapped system, it is necessary to write data to a physical medium such as a thumbdrive, and physically move it between computers. Physical access has to be controlled (man identity and storage media itself). It is easier to control than a direct full network interface, which can be attacked from the exterior insecure system and, if malware infects the secure system, can be used to export secure data. That's why some new hardware technologies are also available like unidirectional data diodes or bidirectional diodes (called also electronic airgap), that physically separate the network and transportation layers and copy and filter the application data.
In environments where networks or devices are rated to handle different levels of classified information, the two disconnected devices or networks are referred to as low side and high side, low being unclassified and high referring to classified, or classified at a higher level. This is also occasionally referred to as red (classified) and black (unclassified). Access policies are often based on the Bell–LaPadula confidentiality model, where data can be moved low-to-high with minimal security measures, while high-to-low requires much more stringent procedures to ensure protection of the data at a higher level of classification. In some cases (for instance industrial critical systems), the policy is different: data can be moved from high-to-low with minimal security measures, but low-to-high requires a high level of procedures to ensure integrity of the industrial safety system.
The concept represents nearly the maximum protection one network can have from another (save turning the device off). One way to transfer data between the outside world and the air-gapped system is to copy data on a removable storage medium such as a removable disk or USB flash drive and physically carry the storage to the other system. This access still has to be carefully controlled since USB drive may have vulnerabilities (see below). The upside to this is that such a network can generally be regarded as a closed system (in terms of information, signals, and emissions security), unable to be accessed from the outside world. The downside is that transferring information (from the outside world) to be analyzed by computers on the secure network is extraordinarily labor-intensive, often involving human security analysis of prospective programs or data to be entered onto air-gapped networks and possibly even human manual re-entry of the data following security analysis. That's why another way to transfer data, used in appropriate situations like critical industries, is to use data diodes and electronic airgaps, that assure a physical cut of the network by a specific hardware.
Sophisticated computer viruses for use in cyberwarfare, such as Stuxnet and agent.btz have been designed to infect air-gapped systems by exploiting security holes related to the handling of removable media. The possibility of using acoustic communication has also been demonstrated by researchers. Researchers have also demonstrated the feasibility of data exfiltration using FM frequency signals.
Examples
Examples of the types of networks or systems that may be air gapped include:
Military/governmental computer networks/systems;
Financial computer systems, such as stock exchanges;
Industrial control systems, such as SCADA in Oil & Gas fields;
National and state lottery game machines or random number generators, which are required to be completely isolated from networks to prevent lottery fraud
Life-critical systems, such as:
Controls of nuclear power plants;
Computers used in aviation, such as FADECs, air traffic control systems, and avionics;
Computerized medical equipment;
Very simple systems, where there is no need to compromise security in the first place, such as:
The engine control unit and other devices on the CAN bus in an automobile;
A digital thermostat for temperature and compressor regulation in home HVAC and refrigeration systems;
Electronic sprinkler controls for watering of lawns.
Many of these systems have since added features that connect them during limited periods of time to the organisation's internet (for the need of surveillance or updates) or the public internet, and are no longer effectively and permanently air gapped, including thermostats with internet connections and automobiles with Bluetooth, Wi-Fi and cellular phone connectivity.
Limitations
Limitations imposed on devices used in these environments may include a ban on wireless connections to or from the secure network, or similar restrictions on EM leakage from the secure network through the use of TEMPEST or a Faraday cage.
Despite a lack of direct connection to other systems, air-gapped networks have been shown to be vulnerable to attack in various circumstances.
Scientists in 2013 demonstrated the viability of air gap malware designed to defeat air gap isolation using acoustic signaling. Shortly after that, network security researcher Dragos Ruiu's BadBIOS received press attention.
In 2014, researchers introduced AirHopper, a bifurcated attack pattern showing the feasibility of data exfiltration from an isolated computer to a nearby mobile phone, using FM frequency signals.
In 2015, BitWhisper, a covert signaling channel between air-gapped computers using thermal manipulations was introduced. BitWhisper supports bidirectional communication and requires no additional dedicated peripheral hardware.
Later in 2015, researchers introduced GSMem, a method for exfiltrating data from air-gapped computers over cellular frequencies. The transmission - generated by a standard internal bus - renders the computer into a small cellular transmitter antenna.
ProjectSauron malware discovered in 2016 demonstrates how an infected USB device can be used to remotely leak data off of an air-gapped computer. The malware remained undetected for 5 years and relied on hidden partitions on a USB drive not visible to Windows as a transport channel between the air-gapped computer and a computer connected to the internet, presumably as a way to share files between the two systems.
NFCdrip was the name given to the discovery of stealthy data exfiltration through NFC (Near-field communication) radio abuse and signal detection in 2018. Although NFC enables devices to establish effective communication by bringing them within a few centimeters of each other, researchers showed that it can be abused to transmit information at a much longer range than expected - up to 100 meters.
In general, malware can exploit various hardware combinations to leak sensitive information from air-gapped systems using "air-gap covert channels". These hardware combinations use a number of different media to bridge the air-gap, including: acoustic, light, seismic, magnetic, thermal, and radio-frequency.
Software updates
From a security perspective, the main drawback of an air gapped network is the inability of software to automatically self update. Users and system administrators must instead download and install updates manually. If a strict update routine is not followed, this results in out-of-date software running on the network, which may contain known security vulnerabilities. If an adversary manages to gain access to the air gapped network (for instance by contacting a disgruntled employee or using social engineering) they may be able to quickly spread within the air gapped network using such vulnerabilities with a possibly higher success rate than on the public Internet.
System administrators may manage software updates in an air gapped network using dedicated solutions such as Windows Server Update Services or network logon scripts. Such mechanisms would allow all computers on the air gapped network to automatically install updates after the system administrator downloads the updates from the Internet once. The problem is not completely eliminated though, especially if users have administrative privileges on their local workstations and are therefore able to install software which is not centrally managed. The presence of IoT devices requiring firmware updates can also complicate matters, since often such updates cannot be centrally managed.
See also
Air gap malware
Firewall (computing)
Near sound data transfer
NIPRNet
SIPRNet
Sneakernet
Tempest (codename)
Van Eck phreaking
References
Network architecture
Data security |
2764639 | https://en.wikipedia.org/wiki/STREAMS | STREAMS | In computer networking, STREAMS is the native framework in Unix System V for implementing character device drivers, network protocols, and inter-process communication. In this framework, a stream is a chain of coroutines that pass messages between a program and a device driver (or between a pair of programs). STREAMS originated in Version 8 Research Unix, as Streams (not capitalized).
STREAMS's design is a modular architecture for implementing full-duplex I/O between kernel and device drivers. Its most frequent uses have been in developing terminal I/O (line discipline) and networking subsystems. In System V Release 4, the entire terminal interface was reimplemented using STREAMS. An important concept in STREAMS is the ability to push drivers custom code modules which can modify the functionality of a network interface or other device together to form a stack. Several of these drivers can be chained together in order.
History
STREAMS was based on the Streams I/O subsystem introduced in the Eighth Edition Research Unix (V8) by Dennis Ritchie, where it was used for the terminal I/O subsystem and the Internet protocol suite. This version, not yet called STREAMS in capitals, fit the new functionality under the existing device I/O system calls (open, close, read, write, and ioctl), and its application was limited to terminal I/O and protocols providing pipe-like I/O semantics.
This I/O system was ported to System V Release 3 by Robert Israel, Gil McGrath, Dave Olander, Her-Daw Che, and Maury Bach as part of a wider framework intended to support a variety of transport protocols, including TCP, ISO Class 4 transport, SNA LU 6.2, and the AT&T NPACK protocol (used in RFS). It was first released with the Network Support Utilities (NSU) package of UNIX System V Release 3. This port added the putmsg, getmsg, and poll system calls, which are nearly equivalent in purpose to the send, recv, and select calls from Berkeley sockets. The putmsg and getmsg system calls were originally called send and recv, but were renamed to avoid namespace conflict. In System V Release 4, STREAMS was extended and used for the terminal I/O framework and pipes, providing useful new functionality like bidirectional pipes and file descriptor passing. A port for Unicos was also produced. Eric S. Raymond quotes Ritchie as saying about the complexity of System V STREAMS when compared to his V8 Streams that "Streams means something different when shouted".
Concurrent with the System V Release 3 port, AT&T developed protocol-independent STREAMS message passing guidelines for the link, network, and transport layers of the OSI model (layers 2-4). Due to the typically close implementation coupling of the network and transport protocols in a given protocol stack, and the typical practice of implementing layers 5-7 outside of the kernel, only the link and transport layer STREAMS service interfaces were later standardized by X/Open. In conjunction with the transport message passing model, the Transport Layer Interface (later adopted as the X/Open Transport Interface) was defined to provide a transport protocol-independent API for application development. Also, a library supporting the session, presentation and application layers was defined and later standardized by The Open Group.
STREAMS was required for conformance with the Single UNIX Specification versions 1 (UNIX 95) and 2 (UNIX 98), but as a result of the refusal of the BSD and Linux developers to provide STREAMS, was marked as optional for POSIX compliance by the Austin Group in version 3 (UNIX 03). POSIX.1-2008 with TC1 (IEEE Std 1003.1, 2013 edition) has designated STREAMS as 'marked obsolescent' meaning that said functionality may be removed in a future version of the specification. However, the specific definition of 'obsolescent' used also says that strictly conforming POSIX applications 'shall not use obsolescent features'.
Technical overview
In Version 7 Unix, a command was connected to a terminal (keyboard and screen, or keyboard and printer) through a mechanism called the line discipline, which would buffer a single line of input, i.e., wait for the user to press the Return key before sending input to the program for processing; this allowed simple error correction. Streams replaced this with a set of processing modules organized in a linear chain that allowed bidirectional communication between neighboring modules. Programs could "push" a new module onto one end of the chain to change the behavior of a terminal or other character device. Ritchie gives the example chain of a terminal module chained with a Datakit network module to achieve remote login over a network. Aside from characters (bytes) going from program to device and vice versa, Streams could carry control messages such as "hangup" (drop connection) and ioctl messages.
Streams could also be used for inter-process communication, by connecting two processes to pseudoterminals. This functionality was implemented in the mpx window system for the Blit graphics terminal, which could display multiple terminal emulator windows. Each window was a process that communicated with the window system through a pseudoterminal that had the line discipline driver installed, sending typed characters to it and receiving text (and graphics) to display. Control signals designated the user's wish to switch between windows or close them.
The actual Streams modules live in kernel space on Unix, and are installed (pushed) and removed (popped) by the ioctl system call. For example, to install the aforementioned line discipline on a file descriptor fd referring to a terminal device, one would write (in C):
ioctl(fd, PUSH, TTYLD);
To perform input/output on a stream, one either uses the read and write system calls as with regular file descriptors, or a set of STREAMS-specific functions to send control messages.
Ritchie admitted to regretting having to implement Streams in the kernel, rather than as processes, but felt compelled to do so for reasons of efficiency. A later Plan 9 implementation did implement modules as user-level processes.
Implementations
STREAMS has mostly been used in the System V Unix world; however, other implementations exist:
Plan 9 originally used a multi-processor variant of Research Unix's Streams. During the transition to the third edition of Plan 9, Streams were further simplified to simple I/O queues.
An implementation written at Mentat was used in Novell NetWare for its TCP/IP stack, and licensed by Apple for use in the classic Mac OS starting in version 7.5.2, as part of the Open Transport networking system. (In macOS, the Classic Environment used the STREAMS architecture, but the native networking architecture uses the Berkeley sockets API and is derived from the BSD networking code.)
FreeBSD has basic support for STREAMS-related system calls, as required by SVR4 binary compatibility layer.
The Windows NT kernel offered a full port of STREAMS as the streams.sys binary. NT DDK even had a chapter on STREAMS, going as late as NT4 though in NT4 DDK it was declared obsolete. The original TCP/IP stack for Windows NT 3.1 was implemented atop STREAMS by Spider Systems, and used the streams.sys binary. From NT 3.5 up, TCP/IP was remade completely, by adopting the one from Microsoft LAN Manager for OS/2 1.x.
Linux does not include STREAMS functionality without third-party add-ons. Caldera had "pushed" for STREAMS to be included in Linux ca. 1998, to support its Netware for Linux, but it was rejected outright by the Linux kernel developers on technical grounds (mainly performance). The compatibility layers in Linux for other operating systems convert STREAMS operations into sockets as early as possible. The implementation used by Caldera was "LiS", by a company called GCOM; it later figured in the legal battles by Caldera's successor, the SCO Group, against Linux, with SCO claiming that Linux with STREAMS infringed what it believed to be its copyrights to System V.
Notes
References
External links
The original stream(4) manual from Unix 8th Edition
The STREAMS framework in Digital UNIX from the Digital UNIX Network Programmer's Guide
Oracle (formerly, Sun) STREAMS Programming Guide
Computer networking
Inter-process communication
UNIX System V
Unix |
4148872 | https://en.wikipedia.org/wiki/Storage%20virtualization | Storage virtualization | In computer science, storage virtualization is "the process of presenting a logical view of the physical storage resources to" a host computer system, "treating all storage media (hard disk, optical disk, tape, etc.) in the enterprise as a single pool of storage."
A "storage system" is also known as a storage array, disk array, or filer. Storage systems typically use special hardware and software along with disk drives in order to provide very fast and reliable storage for computing and data processing. Storage systems are complex, and may be thought of as a special purpose computer designed to provide storage capacity along with advanced data protection features. Disk drives are only one element within a storage system, along with hardware and special purpose embedded software within the system.
Storage systems can provide either block accessed storage, or file accessed storage. Block access is typically delivered over Fibre Channel, iSCSI, SAS, FICON or other protocols. File access is often provided using NFS or SMB protocols.
Within the context of a storage system, there are two primary types of virtualization that can occur:
Block virtualization used in this context refers to the abstraction (separation) of logical storage (partition) from physical storage so that it may be accessed without regard to physical storage or heterogeneous structure. This separation allows the administrators of the storage system greater flexibility in how they manage storage for end users.
File virtualization addresses the NAS challenges by eliminating the dependencies between the data accessed at the file level and the location where the files are physically stored. This provides opportunities to optimize storage use and server consolidation and to perform non-disruptive file migrations.
Block virtualization
Address space remapping
Virtualization of storage helps achieve location independence by abstracting the physical location of the data. The virtualization system presents to the user a logical space for data storage and handles the process of mapping it to the actual physical location.
It is possible to have multiple layers of virtualization or mapping. It is then possible that the output of one layer of virtualization can then be used as the input for a higher layer of virtualization. Virtualization maps space between back-end resources, to front-end resources. In this instance, "back-end" refers to a logical unit number (LUN) that is not presented to a computer, or host system for direct use. A "front-end" LUN or volume is presented to a host or computer system for use.
The actual form of the mapping will depend on the chosen implementation. Some implementations may limit the granularity of the mapping which may limit the capabilities of the device. Typical granularities range from a single physical disk down to some small subset (multiples of megabytes or gigabytes) of the physical disk.
In a block-based storage environment, a single block of information is addressed using a LUN identifier and an offset within that LUN known as a logical block addressing (LBA).
Metadata
The virtualization software or device is responsible for maintaining a consistent view of all the mapping information for the virtualized storage. This mapping information is often called metadata and is stored as a mapping table.
The address space may be limited by the capacity needed to maintain the mapping table. The level of granularity, and the total addressable space both directly impact the size of the meta-data, and hence the mapping table. For this reason, it is common to have trade-offs, between the amount of addressable capacity and the granularity or access granularity.
One common method to address these limits is to use multiple levels of virtualization. In several storage systems deployed today, it is common to utilize three layers of virtualization.
Some implementations do not use a mapping table, and instead calculate locations using an algorithm. These implementations utilize dynamic methods to calculate the location on access, rather than storing the information in a mapping table.
I/O redirection
The virtualization software or device uses the metadata to re-direct I/O requests. It will receive an incoming I/O request containing information about the location of the data in terms of the logical disk (vdisk) and translates this into a new I/O request to the physical disk location.
For example, the virtualization device may :
Receive a read request for vdisk LUN ID=1, LBA=32
Perform a meta-data look up for LUN ID=1, LBA=32, and finds this maps to physical LUN ID=7, LBA0
Sends a read request to physical LUN ID=7, LBA0
Receives the data back from the physical LUN
Sends the data back to the originator as if it had come from vdisk LUN ID=1, LBA32
Capabilities
Most implementations allow for heterogeneous management of multi-vendor storage devices within the scope of a given implementation's support matrix. This means that the following capabilities are not limited to a single vendor's device (as with similar capabilities provided by specific storage controllers) and are in fact possible across different vendors' devices.
Replication
Data replication techniques are not limited to virtualization appliances and as such are not described here in detail. However most implementations will provide some or all of these replication services.
When storage is virtualized, replication services must be implemented above the software or device that is performing the virtualization. This is true because it is only above the virtualization layer that a true and consistent image of the logical disk (vdisk) can be copied. This limits the services that some implementations can implement or makes them seriously difficult to implement. If the virtualization is implemented in the network or higher, this renders any replication services provided by the underlying storage controllers useless.
Remote data replication for disaster recovery
Synchronous Mirroring where I/O completion is only returned when the remote site acknowledges the completion. Applicable for shorter distances (<200 km)
Asynchronous Mirroring where I/O completion is returned before the remote site has acknowledged the completion. Applicable for much greater distances (>200 km)
Point-In-Time Snapshots to copy or clone data for diverse uses
When combined with thin provisioning, enables space-efficient snapshots
Pooling
The physical storage resources are aggregated into storage pools, from which the logical storage is created. More storage systems, which may be heterogeneous in nature, can be added as and when needed, and the virtual storage space will scale up by the same amount. This process is fully transparent to the applications using the storage infrastructure.
Disk management
The software or device providing storage virtualization becomes a common disk manager in the virtualized environment. Logical disks (vdisks) are created by the virtualization software or device and are mapped (made visible) to the required host or server, thus providing a common place or way for managing all volumes in the environment.
Enhanced features are easy to provide in this environment:
Thin Provisioning to maximize storage utilization
This is relatively easy to implement as physical storage is only allocated in the mapping table when it is used.
Disk expansion and shrinking
More physical storage can be allocated by adding to the mapping table (assuming the using system can cope with online expansion)
Similarly disks can be reduced in size by removing some physical storage from the mapping (uses for this are limited as there is no guarantee of what resides on the areas removed)
Benefits
Non-disruptive data migration
One of the major benefits of abstracting the host or server from the actual storage is the ability to migrate data while maintaining concurrent I/O access.
The host only knows about the logical disk (the mapped LUN) and so any changes to the meta-data mapping is transparent to the host. This means the actual data can be moved or replicated to another physical location without affecting the operation of any client. When the data has been copied or moved, the meta-data can simply be updated to point to the new location, therefore freeing up the physical storage at the old location.
The process of moving the physical location is known as data migration. Most implementations allow for this to be done in a non-disruptive manner, that is concurrently while the host continues to perform I/O to the logical disk (or LUN).
The mapping granularity dictates how quickly the meta-data can be updated, how much extra capacity is required during the migration, and how quickly the previous location is marked as free. The smaller the granularity the faster the update, less space required and quicker the old storage can be freed up.
There are many day to day tasks a storage administrator has to perform that can be simply and concurrently performed using data migration techniques.
Moving data off an over-utilized storage device.
Moving data onto a faster storage device as needs require
Implementing an Information Lifecycle Management policy
Migrating data off older storage devices (either being scrapped or off-lease)
Improved utilization
Utilization can be increased by virtue of the pooling, migration, and thin provisioning services. This allows users to avoid over-buying and over-provisioning storage solutions. In other words, this kind of utilization through a shared pool of storage can be easily and quickly allocated as it is needed to avoid constraints on storage capacity that often hinder application performance.
When all available storage capacity is pooled, system administrators no longer have to search for disks that have free space to allocate to a particular host or server. A new logical disk can be simply allocated from the available pool, or an existing disk can be expanded.
Pooling also means that all the available storage capacity can potentially be used. In a traditional environment, an entire disk would be mapped to a host. This may be larger than is required, thus wasting space. In a virtual environment, the logical disk (LUN) is assigned the capacity required by the using host.
Storage can be assigned where it is needed at that point in time, reducing the need to guess how much a given host will need in the future. Using Thin Provisioning, the administrator can create a very large thin provisioned logical disk, thus the using system thinks it has a very large disk from day one.
Fewer points of management
With storage virtualization, multiple independent storage devices, even if scattered across a network, appear to be a single monolithic storage device and can be managed centrally.
However, traditional storage controller management is still required. That is, the creation and maintenance of RAID arrays, including error and fault management.
Risks
Backing out a failed implementation
Once the abstraction layer is in place, only the virtualizer knows where the data actually resides on the physical medium. Backing out of a virtual storage environment therefore requires the reconstruction of the logical disks as contiguous disks that can be used in a traditional manner.
Most implementations will provide some form of back-out procedure and with the data migration services it is at least possible, but time consuming.
Interoperability and vendor support
Interoperability is a key enabler to any virtualization software or device. It applies to the actual physical storage controllers and the hosts, their operating systems, multi-pathing software and connectivity hardware.
Interoperability requirements differ based on the implementation chosen. For example, virtualization implemented within a storage controller adds no extra overhead to host based interoperability, but will require additional support of other storage controllers if they are to be virtualized by the same software.
Switch based virtualization may not require specific host interoperability — if it uses packet cracking techniques to redirect the I/O.
Network based appliances have the highest level of interoperability requirements as they have to interoperate with all devices, storage and hosts.
Complexity
Complexity affects several areas :
Management of environment: Although a virtual storage infrastructure benefits from a single point of logical disk and replication service management, the physical storage must still be managed. Problem determination and fault isolation can also become complex, due to the abstraction layer.
Infrastructure design: Traditional design ethics may no longer apply, virtualization brings a whole range of new ideas and concepts to think about (as detailed here)
The software or device itself: Some implementations are more complex to design and code network based, especially in-band (symmetric) designs in particular — these implementations actually handle the I/O requests and so latency becomes an issue.
Metadata management
Information is one of the most valuable assets in today's business environments. Once virtualized, the metadata are the glue in the middle. If the metadata are lost, so is all the actual data as it would be virtually impossible to reconstruct the logical drives without the mapping information.
Any implementation must ensure its protection with appropriate levels of back-ups and replicas. It is important to be able to reconstruct the meta-data in the event of a catastrophic failure.
The metadata management also has implications on performance. Any virtualization software or device must be able to keep all the copies of the metadata atomic and quickly updateable. Some implementations restrict the ability to provide certain fast update functions, such as point-in-time copies and caching where super fast updates are required to ensure minimal latency to the actual I/O being performed.
Performance and scalability
In some implementations the performance of the physical storage can actually be improved, mainly due to caching. Caching however requires the visibility of the data contained within the I/O request and so is limited to in-band and symmetric virtualization software and devices. However these implementations also directly influence the latency of an I/O request (cache miss), due to the I/O having to flow through the software or device. Assuming the software or device is efficiently designed this impact should be minimal when compared with the latency associated with physical disk accesses.
Due to the nature of virtualization, the mapping of logical to physical requires some processing power and lookup tables. Therefore, every implementation will add some small amount of latency.
In addition to response time concerns, throughput has to be considered. The bandwidth into and out of the meta-data lookup software directly impacts the available system bandwidth. In asymmetric implementations, where the meta-data lookup occurs before the information is read or written, bandwidth is less of a concern as the meta-data are a tiny fraction of the actual I/O size. In-band, symmetric flow through designs are directly limited by their processing power and connectivity bandwidths.
Most implementations provide some form of scale-out model, where the inclusion of additional software or device instances provides increased scalability and potentially increased bandwidth. The performance and scalability characteristics are directly influenced by the chosen implementation.
Implementation approaches
Host-based
Storage device-based
Network-based
Host-based
Host-based virtualization requires additional software running on the host, as a privileged task or process. In some cases volume management is built into the operating system, and in other instances it is offered as a separate product. Volumes (LUN's) presented to the host system are handled by a traditional physical device driver. However, a software layer (the volume manager) resides above the disk device driver intercepts the I/O requests, and provides the meta-data lookup and I/O mapping.
Most modern operating systems have some form of logical volume management built-in (in Linux called Logical Volume Manager or LVM; in Solaris and FreeBSD, ZFS's zpool layer; in Windows called Logical Disk Manager or LDM), that performs virtualization tasks.
Note: Host based volume managers were in use long before the term storage virtualization had been coined.
Pros
Simple to design and code
Supports any storage type
Improves storage utilization without thin provisioning restrictions
Cons
Storage utilization optimized only on a per host basis
Replication and data migration only possible locally to that host
Software is unique to each operating system
No easy way of keeping host instances in sync with other instances
Traditional Data Recovery following a server disk drive crash is impossible
Specific examples
Technologies:
Logical volume management
File systems, e.g., (hard links, SMB/NFS)
Automatic mounting, e.g., (autofs)
Storage device-based
Like host-based virtualization, several categories have existed for years and have only recently been classified as virtualization. Simple data storage devices, like single hard disk drives, do not provide any virtualization. But even the simplest disk arrays provide a logical to physical abstraction, as they use RAID schemes to join multiple disks in a single array (and possibly later divide the array it into smaller volumes).
Advanced disk arrays often feature cloning, snapshots and remote replication. Generally these devices do not provide the benefits of data migration or replication across heterogeneous storage, as each vendor tends to use their own proprietary protocols.
A new breed of disk array controllers allows the downstream attachment of other storage devices. For the purposes of this article we will only discuss the later style which do actually virtualize other storage devices.
Concept
A primary storage controller provides the services and allows the direct attachment of other storage controllers. Depending on the implementation these may be from the same or different vendors.
The primary controller will provide the pooling and meta-data management services. It may also provide replication and migration services across those controllers which it is .
Pros
No additional hardware or infrastructure requirements
Provides most of the benefits of storage virtualization
Does not add latency to individual I/Os
Cons
Storage utilization optimized only across the connected controllers
Replication and data migration only possible across the connected controllers and same vendors device for long distance support
Downstream controller attachment limited to vendors support matrix
I/O Latency, non cache hits require the primary storage controller to issue a secondary downstream I/O request
Increase in storage infrastructure resource, the primary storage controller requires the same bandwidth as the secondary storage controllers to maintain the same throughput
Network-based
Storage virtualization operating on a network based device (typically a standard server or smart switch) and using iSCSI or FC Fibre channel networks to connect as a SAN. These types of devices are the most commonly available and implemented form of virtualization.
The virtualization device sits in the SAN and provides the layer of abstraction between the hosts performing the I/O and the storage controllers providing the storage capacity.
Pros
True heterogeneous storage virtualization
Caching of data (performance benefit) is possible when in-band
Single management interface for all virtualized storage
Replication services across heterogeneous devices
Cons
Complex interoperability matrices limited by vendors support
Difficult to implement fast meta-data updates in switched-based devices
Out-of-band requires specific host based software
In-band may add latency to I/O
In-band the most complicated to design and code
Appliance-based vs. switch-based
There are two commonly available implementations of network-based storage virtualization, appliance-based and switch-based. Both models can provide the same services, disk management, metadata lookup, data migration and replication. Both models also require some processing hardware to provide these services.
Appliance based devices are dedicated hardware devices that provide SAN connectivity of one form or another. These sit between the hosts and storage and in the case of in-band (symmetric) appliances can provide all of the benefits and services discussed in this article. I/O requests are targeted at the appliance itself, which performs the meta-data mapping before redirecting the I/O by sending its own I/O request to the underlying storage. The in-band appliance can also provide caching of data, and most implementations provide some form of clustering of individual appliances to maintain an atomic view of the metadata as well as cache data.
Switch based devices, as the name suggests, reside in the physical switch hardware used to connect the SAN devices. These also sit between the hosts and storage but may use different techniques to provide the metadata mapping, such as packet cracking to snoop on incoming I/O requests and perform the I/O redirection. It is much more difficult to ensure atomic updates of metadata in a switched environment and services requiring fast updates of data and metadata may be limited in switched implementations.
In-band vs. out-of-band
In-band, also known as symmetric, virtualization devices actually sit in the data path between the host and storage. All I/O requests and their data pass through the device. Hosts perform I/O to the virtualization device and never interact with the actual storage device. The virtualization device in turn performs I/O to the storage device. Caching of data, statistics about data usage, replications services, data migration and thin provisioning are all easily implemented in an in-band device.
Out-of-band, also known as asymmetric, virtualization devices are sometimes called meta-data servers. These devices only perform the meta-data mapping functions. This requires additional software in the host which knows to first request the location of the actual data. Therefore, an I/O request from the host is intercepted before it leaves the host, a meta-data lookup is requested from the meta-data server (this may be through an interface other than the SAN) which returns the physical location of the data to the host. The information is then retrieved through an actual I/O request to the storage. Caching is not possible as the data never passes through the device.
File based virtualization
A synonym used for NAS virtualization.
See also
Archive
Automated tiered storage
Storage hypervisor
Backup
Computer data storage
Data proliferation
Disk storage
Information lifecycle management
Information repository
Magnetic tape data storage
Repository
Spindle
References
Virtualization software
Virtualization |
4921443 | https://en.wikipedia.org/wiki/Jeremy%20Allaire | Jeremy Allaire | Jeremy D. Allaire (born 13 May 1971) is an American-born technologist and Internet entrepreneur. He is CEO and founder of the digital currency company Circle and chairman of the board of Brightcove. With his brother JJ Allaire, he co-founded Allaire Corporation in 1995. Allaire Corp. had a successful IPO in January 1999 and was acquired by Macromedia in 2001. Allaire served as CTO of Macromedia after the acquisition and helped develop the Macromedia MX platform (a suite of software tools and servers aimed at enabling rich applications delivered using Flash Player).
Allaire left Macromedia in February 2003 to join venture capital firm General Catalyst as a technologist and executive-in-residence. In 2004, Allaire founded Brightcove, an online video platform used by many media and marketing organizations worldwide. After a successful IPO in early 2012, Allaire stepped down as CEO in 2013 and now serves as chairman of the board.
In October 2013, Allaire announced the launch of Circle, an Internet-based consumer finance company that aims to bring the power and benefits of digital money, such as Bitcoin, to mainstream consumers.
Early life and education
Allaire was educated in the Montessori tradition, which he says "built into me a belief in self-direction, in independent thought, in peer collaboration, in responsibility".
In 1993, Allaire graduated from Macalester College with a degree in political science and philosophy, with a concentration in economics. At Macalester, his college roommate and high-school friend, who worked for the campus IT group, rigged a high-speed Internet connection to their dorm room, which allowed Allaire to access and experiment with the Internet in its early days.
From 1990 until his graduation, Allaire became obsessed with the Internet and how it could be applied to transform systems of communications and media, as well as its impact on fundamental human rights, such as free speech. He was an early follower of the Electronic Frontier Foundation, and later recruited EFF founder Mitch Kapor to the board of directors of Allaire Corporation.
In 1992, Allaire authored a policy proposal for the creation of a National Information Network, based on the National Research & Education Network (NREN, the precursor to the commercial Internet), proposing methods to commercialize access to IP services. The paper was submitted to the Senate Subcommittee on Science and Technology, then chaired by Al Gore.
In 1992 and 1993, with a college friend, Allaire developed an application called "World News Report" that aggregated news feeds and mailing list content from independent media sources on the Internet, and provided a full-text indexed browsable and searchable interface to access independent journalism on the Internet, using Apple Hypercard.
Also while in college, Allaire created NativeNet, which created a decentralized communications and collaboration platform for Native American tribal schools in the Midwest, built on top of UUCP, an early internet protocol for distributed communications.
At Macalester, Allaire became more politically active, finding a particular interest in U.S. foreign policy and global human rights issues, including the impact of the collapse of the Soviet Union, the rise of authoritarian capitalist regimes in the east, and the Balkan Wars.
Upon graduating from Macalester, Allaire found that the Internet was “the central passion” in his life. In the fall of 1993, he launched an Internet-consulting firm, Global Internet Horizons, aimed at helping media publishers and marketers understand and build a presence on the nascent World Wide Web.
In 1994-1996, Allaire collaborated with Noam Chomsky and his wife, Carol, to develop the first comprehensive online archive of Chomsky's political works. Chomsky’s libertarian socialist and globalist views resonated with Allaire.
Allaire Corporation
In early 1994, Allaire became convinced that the architecture of the Web could disrupt how software was built and distributed, transforming the browser from a document browsing system into a full online operating system for any kind of software application.
In 1995, Jeremy and his brother J.J. Allaire, along with a group of close college friends, founded the Allaire Corporation, using $18,000 of J.J.’s savings. Allaire Corporation aimed to provide easy-to-use web development tools.
The brothers invented ColdFusion, a rapid web application development platform designed to easily connect simple HTML pages to a database using its associated scripting language, ColdFusion Markup Language (CFML). ColdFusion was widely used, and companies including Myspace, Target, and Toys R Us (along with millions of other websites) relied on the technology to develop their online properties.
Allaire Corporation grew rapidly, from just over $1 million in revenue in 1996 to $120 million in revenue in 2000, growing to over 700 employees with offices in North America, Europe, Asia and Australia. In addition to its flagship product ColdFusion, Allaire launched HomeSite, which became the world's most popular Windows HTML editor, and JRun, one of the first and most widely adopted Java app servers.
Allaire also helped to pioneer foundational ideas in open distributed computing based on lightweight HTTP-based distributed objects. In particular, the company developed the Web Distributed Data Exchange (WDDX) in 1998, an open source format for using HTTP for simple remote procedure calls, a precursor to the adoption of REST and JSON for web software APIs.
Allaire Corporation had its IPO in January 1999 and was acquired by Macromedia in March 2001 for $360 million in a deal that included cash and stock. As a result of this acquisition, Jeremy Allaire became CTO of Macromedia.
Macromedia
As CTO of Macromedia, Allaire helped to develop the Macromedia MX platform, a suite of software tools and servers for building and deploying content rich, interactive software applications on the Web.
After the Allaire/Macromedia merger, Allaire helped to drive platform and product strategy for Macromedia, including adding capabilities into Flash Player (a more advanced language runtime, web services connectivity, a component model) that enabled it to become a widely used platform for interactive software on the Web.
When Macromedia added video playback features into Flash Player in March 2002, Allaire became enthralled with the idea that the ubiquitous distribution of Flash Player on 98% of PCs in the world, combined with growth in broadband and WiFi adoption, would lead to a video publishing revolution on the Web. He started an internal product project at Macromedia code-named "Vista" that enabled easy browser-based capture, upload and publishing of video into any website, blog or instant message. When Macromedia decided not to pursue the project, Allaire left the company.
General Catalyst
In February 2003, Allaire became technologist and executive-in-residence at the venture capital firm General Catalyst Partners. At General Catalyst Partners, he focused on identifying investment opportunities in broadband media, mobile content, internet identity and security, and other Internet technologies.
At General Catalyst, Allaire began to incubate Brightcove, which was originally operating under stealth as Video Marketplace, Inc., or Vidmark, and he left General Catalyst in 2004 to launch this new venture.
Brightcove
In 2004, Allaire founded Brightcove, an online video platform that distributes video content across devices.
Brightcove filed for its initial IPO in 2012 with a valuation of around $290 million. Allaire stepped down as Brightcove’s CEO in the second quarter of 2013 to serve as chairman of the board.
Circle
In October 2013, Allaire launched Circle, a digital currency company that aims to bring digital money like Bitcoin to the mainstream, with $9 million in Series A funding from Jim Breyer, Accel Partners, and General Catalyst Partners.
Circle closed an additional $17 million Series B in March 2014 in a round led by Breyer Capital, Accel Partners, General Catalyst, and Oak Investment Partners. The company simultaneously announced the release of its product to a limited audience.
Allaire has said of Circle and Bitcoin, "We want to make this as easy to use as Gmail, Skype, and other consumer services on the Internet today". The company has received over $135 million in venture capital from four rounds of investments from 2013 to 2016, including $50 million led by Goldman Sachs.
In July 2021, Allaire announced that Circle would go public in a $4.5 billion SPAC merger.
References
External links
Jeremy Allaire's Radio Web log (no longer active).
Fireside Chat MITX Interview with JJ and Jeremy Allaire (recorded by Dan Bricklin, October 26, 2005.
MITX OnDemand video podcast interview with Jeremy Allaire by Dean Whitney, June 13, 2006.
American technology chief executives
Living people
Macalester College alumni
Web developers
1971 births
People associated with cryptocurrency |
65451684 | https://en.wikipedia.org/wiki/Paul%20Hacker%20%28diplomat%29 | Paul Hacker (diplomat) | Paul Hacker (born 1946) is a former diplomat and American author, who served as the first U.S. Chief of Mission to Slovakia after diplomatic relations of the two countries established in 1993. He was in charge of the founding of the embassy in the Slovak capital of Bratislava. He had also temporarily headed the Consulate General in Guangzhou, China in 2000.
Career
After joining the Foreign Service in 1973, Hacker held overseas assignments at Embassy Stockholm, Sofia, Nicosia, Manila and Helsinki.
From 1990 to 1992, Hacker was assigned to the former Czechoslovakia to serve as Consul General to the Slovakian city of Bratislava. Experiencing the Velvet Divorce in 1993, resulting in the independence of Slovak Republic and Czech Republic respectively, he was in charge of the U.S. effort to establish an embassy at Bratislava, turning it into a self-run mission from the U.S. Embassy in Prague. From January 4, 1993, he served as the embassy's first chief of mission (Chargés d'affaires ad interim) until July 7, when Eleanor Sutter assumed charge of the post.
Going back to the U.S. after his tenure in Slovakia in 1993, Hacker taught at the Air Command and Staff College (ACSC) at Maxwell Air Force Base, Alabama. He had once worked for the Office of High Representative for Bosnia and Herzegovina (OHR) under Carl Bildt (later Prime Minister of Sweden) after the end of the Bosnian War, and was stationed at Tuzla.
In the late 1990s, he took up his post at the U.S. Consulate General Guangzhou as Economic Section Chief, Deputy Principal Officer, and acting Consul General until 2000, when John J. Norris assumed his office as the new Consul General there. He then served as a Cultural Officer at the U.S. Embassy Kyiv, retiring from the foreign service in 2003. After his retirement, he has worked as translator and editor from Finnish, Swedish, Czech, Slovak, Polish, and Russian. He also taught a course on diplomacy in 1994 at the Florida International University (FIU) in Miami and also one course on the same subject in 2003 at the Kyiv Mohyla Academy [College].
Personal
Born in New York City, Paul Hacker graduated from City College of New York and the Columbia University (with a PhD degree in political science in 1976). He is the author of Slovakia on the Road to Independence: An American Diplomat's Eyewitness Account (2010), a book in which he provides a first-hand account of his experience at the crucial period of Slovak history toward independence and its diplomatic relations with the United States. His memoirs were translated into Slovak in 2014 (translated by Dr. Eva Salnerová), Artforum 2014: Bratislava.
Footnotes
Living people
1946 births
Ambassadors of the United States to Slovakia
Consuls General of the United States in Guangzhou
United States Foreign Service personnel
21st-century American non-fiction writers
American male non-fiction writers
Columbia University alumni
City College of New York alumni
People from New York City
21st-century American male writers |
5311768 | https://en.wikipedia.org/wiki/KDE%20Plasma%204 | KDE Plasma 4 | KDE Plasma 4 was the fourth generation of the KDE workspace environments. It consisted of three workspaces, each targeting a certain platform: Plasma Desktop for traditional desktop PCs and notebooks, Plasma Netbook for netbooks, and Plasma Active for tablet PCs and similar devices.
KDE Plasma 4 was released as part of KDE Software Compilation 4 and replaced Kicker, KDesktop, and SuperKaramba, which formed the Desktop in earlier KDE releases. They are bundled as the default environment with a number of free software operating systems, such as Chakra, Kubuntu, Mageia (DVD version), openSUSE, or TrueOS.
With the release of KDE SC 4.11 on 14 August 2013, KDE Plasma 4 was placed into a feature freeze and turned into a long-term stable package until August 2015. On 15 July 2014 KDE Plasma 4's successor, KDE Plasma 5, was released.
Features
Plasma features containments, which are essentially applets that contain other applets. Two examples of containments are the desktop background and the taskbar. A containment can be anything the developer wants: an image (either raster graphics or an SVG image), animation, or even OpenGL. Images are most commonly used, but with Plasma the user could set any applet as the desktop background without losing functionality of the applet. This also allows for applets to be dragged between the desktop and the taskbar (two separate containments), and have a separate visualization for the more confined taskbar.
Plasma separates components into "data engine" and their visualization counterparts. This is intended to reduce the total programming effort when there are multiple possible visualizations of given data; and to make it easier for the data engine and the workspaces to be written independently.
The scalable nature of the Plasma widgets allows for them to be resized and rotated to any size, with only a brief pause to redraw themselves. The Kross scripting framework allows developers to write widgets in a variety of programming languages in addition to C++.
KRunner is a versatile tool for several functions. It replaces the dialog box "Run Command" from K Desktop Environment 3, and also inherits from the application launcher feature, expanding the possibilities through a modular plug. KRunner stores previously entered commands and searches, accessible via an auto-complete feature. KRunner can be shown on the desktop via the keyboard combination or by selecting "Run Command ..." in the desktop menu.
These functions are handled by the plugin:
Application launcher: Type at least three letters of the desired name or description. KRunner shows applications associated with the terms of the search and allows the selection of the desired one.
Calculator: Simply enter the desired operation to show the result. It also supports sophisticated expressions.
Contacts can search for entries in KDE's address book allowing users to directly open, for example, KMail to write an e-mail. The address of the recipient of your choice is automatically added to the message.
Unit Converter converts values between different units of measure.
Web history: Search history of recently visited sites in Konqueror.
Recent documents: Search for recently opened files.
Available Plasma Workspaces
Desktop
Plasma Desktop was the first workspace that was developed by KDE back then. It was declared mature with the release of KDE SC 4.2. It is designed for desktop PCs and larger laptops. In its default configuration it resembles K Desktop Environment 3 and Microsoft Windows XP but extensive configurability allows radical departures from the default layout.
Its technology is a fundamental rewrite of several desktop interaction programs included in previous KDE desktop environments for Unix-like systems, focusing on eye candy and special graphical effects. The Desktop Workspace replaces the previous KDesktop shell, Kicker taskbar and SuperKaramba widget engine used in the K Desktop Environment 3 series with a unified system of widgets that can be configured and replaced with alternative designs.
From KDE 4.0 to KDE 4.2, the default theme Oxygen was characterized by dark tones. In KDE 4.3, replaced by the new Air theme, which predominates in transparency and white as base color. New themes for Plasma can be chosen and installed through an authority.
Supported widgets
This is a list of widgets that the current release version of Plasma supports. Not all widgets are supported by default in all Linux distributions; some may require different packages, or even a recompilation of Plasma.
First generation native widgets (In C++, JavaScript, Ruby or Python. In many distributions, the Ruby and Python bindings must be downloaded separately as packages)
Second generation native widgets written in QML.
Apple Dashboard widgets
SuperKaramba widgets – used in KDE 3.
Web widgets (supports HTML and JavaScript)
Previous Plasma Workspaces releases also supported Edje gadgets and E17 modules. Support for those was developed in 2008 but later, in 2010, removed.
Google Gadgets were also supported. After Google announced to discontinue its two services that utilize Gadgets – Google Desktop and iGoogle – KDE removed support for this widget engine in early 2013.
Netbook
Plasma Netbook is the second workspace. It aims at netbooks and may also be used on tablet PCs. The first stable release shipped with KDE SC 4.4.
Plasma Active
Plasma Active was a workspace for devices with touchscreens. It shipped with several applications such as Kontact Touch and a document viewer based on Calligra Suite.
Contour
Contour was the name of an interface for tablet devices. Its development was started in April 2011 by basysKom. Replacing an earlier tablet prototype, Contour has then become the main workspace UI of Plasma Active and was shipped as 1.0 in October 2011.
Mobile
Plasma Mobile was targeted at smartphones and small tablet devices that are mainly used via touch input. It was originally expected to be released in 2011 along with Plasma Active 1.0 but development focus shifted towards Contour. A new version with the same name but based on KDE Frameworks 5 has been announced on 25 July 2015.
History
KDE 4.0 was released in January 2008. Linux.com described the reaction from users as a "revolt", writing that the backlash KDE 4.0 received was on a scale that was unprecedented for a FOSS project. Although it was a developer's release, several distributions made the KDE 4.0 desktop environment available to their users without specifying that it was an experimental option. openSUSE released a more polished KDE 4 option while other distributions "released packages that simply [didn't] work," according to project leader Aaron Seigo. As a result, many users complained about the loss of features and stability. A number of KDE developers, including project leader Aaron Seigo, were targeted for abuse by outlets like Linux Hater's Blog. Several KDE developers stepped back from the public scrutiny.
Releases
References
External links
Plasma user wiki
Plasma developer wiki
Articles containing video clips
Free desktop environments
KDE Plasma
KDE software
Software that uses QML
Unix windowing system-related software
Widget engines |
476675 | https://en.wikipedia.org/wiki/Patch%20%28Unix%29 | Patch (Unix) | The computer tool patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running the related diff program with the original and updated file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the files.
History
The original patch program was written by Larry Wall (who went on to create the Perl programming language) and posted to mod.sources (which later became comp.sources.unix) in May 1985. A variant of the program (but not the only one) is part of the GNU project and is maintained by the FSF.
Usage context
Developed by a programmer for other programmers, patch was frequently used for updating source code to a newer version. Because of this, many people came to associate patches with source code, whereas patches can in fact be applied to any text. Patched files do not accumulate any unneeded text, which is what some people perceive based on the English meaning of the word; patch is as capable of removing text as it is of adding it.
Patches described here should not be confused with binary patches, which, although can be conceptually similar, are distributed to update binary files comprising the program to a new release.
Patches in software development
The diff files that serve as input to patch are readable text files, which means that they can be easily reviewed or modified by humans before use.
In addition to the "diff" program, diffs can also be produced by other programs, such as Subversion, CVS, RCS, Mercurial and Git.
Patches have been the crucial component of many source control systems, including CVS.
Advanced diffs
When more advanced diffs are used, patches can be applied even to files that have been modified in the meantime, as long as those modifications do not interfere with the patch. This is achieved by using "context diffs" and "unified diffs" (also known as "unidiffs"), which surround each change with context, which is the text immediately before and after the changed part. Patch can then use this context to locate the region to be patched even if it has been displaced by changes earlier in the file, using the line numbers in the diffs as a starting point. Because of this property, context and unified diffs are the preferred form of patches for submission to many software projects.
The above features make diff and patch especially popular for exchanging modifications to open-source software. Outsiders can download the latest publicly available source code, make modifications to it, and send them, in diff form, to the development team. Using diffs, the development team has the ability to effectively review the patches before applying them, and can apply them to a newer code base than the one the outside developer had access to.
Usage examples
To create a patch, one could run the following command in a shell:
$ diff -u oldFile newFile > mods.diff # -u tells diff to output unified diff format
To apply a patch, one could run the following command in a shell:
$ patch < mods.diff
This tells patch to apply the changes to the specified files described in mods.diff. Patches to files in subdirectories require the additional -pnumber option, where number is 1 if the base directory of the source tree is included in the diff, and 0 otherwise.
Patches can be undone, or reversed, with the '-R' option:
$ patch -R < mods.diff
In some cases when the file is not identical to the version the diff was generated against, the patch will not be able to be applied cleanly. For example, if lines of text are inserted at the beginning, the line numbers referred to in the patch will be incorrect. patch is able to recover from this, by looking at nearby lines to relocate the text to be patched. It will also recover when lines of context (for context and unified diffs) are altered; this is described as fuzz.
Ports of patch
Originally written for Unix and Unix-like systems, patch has also been ported to Windows and many other platforms. Windows ports of patch are provided by GnuWin32 and UnxUtils.
A patch command is also part of ASCII's MSX-DOS2 Tools for MSX-DOS version 2.
See also
Patch (computing)
Quilt (software)
rsync
xdelta
List of Unix commands
IBM Mainframe utility IEBUPDTE a mainframe patch program, created about 20 years earlier (circa ~1964).
References
External links
GNU Diffutils (includes diff and patch); Documentation
GNU tools for Win32Win32 port of tools, including diff and patch
1984 software
Unix SUS2008 utilities
Patch utilities |
176160 | https://en.wikipedia.org/wiki/Bram%20Moolenaar | Bram Moolenaar | Bram Moolenaar (born 1961, Lisse) is a Dutch computer programmer and an active member of the open-source software community. He is the original author, maintainer, release manager, and benevolent dictator for life of Vim, a vi-derivative text editor that is very popular among programmers and power users. From July 2006 until September 2021 Moolenaar was employed by Google working in the Zürich office. He was able to spend part of his time maintaining Vim.
Charity work and awards
Moolenaar is an advocate of the ICCF charity, encouraging people to support orphans in Uganda. He pioneered a methodology called charityware through Vim. The software itself is available for free, but it encourages the user to donate to the programmer's favorite charity. A number of other applications have been licensed this way since the inception of this concept. The opening "splash" screen for Vim encourages support of ICCF.
Moolenaar has been a member of the Dutch Unix user group, NLUUG, which presented him with an award during its 25th anniversary, for his creation of Vim and his contributions to open source software in general.
Vim
The Vim editor started as "Vi IMitation" on the Amiga in 1988, but was later relabeled "Vi IMproved" and ported to many other platforms. As vi was a popular editor amongst programmers and system administrators, initially there was doubt whether Bram's 'improved' version could achieve the quality and fan following of the original. But since its first release for Unix systems in 1992, Vim has effectively eclipsed the original Vi, having won several awards and has been referred to as one of the most popular text editors.
Other software
Other software tools that Moolenaar has developed include a software build tool written in Python, called A-A-P, which is similar to make, and a programming language called Zimbu which puts an emphasis on readability of programs. Amongst all of Moolenaar's contributions to the field of computer science, the Vim editor remains his most prominent and widely used application.
References
External links
1961 births
Living people
Dutch computer programmers
Free software programmers
Google employees
Vi
Delft University of Technology alumni
People from Lisse |
12592 | https://en.wikipedia.org/wiki/GNU%20Manifesto | GNU Manifesto |
The GNU Manifesto is a call-to-action by Richard Stallman encouraging participation and support of the GNU Project's goal in developing the GNU free computer operating system. The GNU Manifesto was published in March 1985 in Dr. Dobb's Journal of Software Tools. It is held in high regard within the free software movement as a fundamental philosophical source.
The full text is included with GNU software such as Emacs, and is publicly available.
Background
Some parts of the GNU Manifesto began as an announcement of the GNU Project posted by Richard Stallman on September 27, 1983, in form of an email on Usenet newsgroups. The project's aim was to give computer users freedom and control over their computers by collaboratively developing and providing software that is based on Stallman's idea of software freedom (although the written definition had not existed until February 1986). The manifesto was written as a way to familiarize more people with these concepts, and to find more support in form of work, money, programs and hardware.
The GNU Manifesto possessed its name and full written form in 1985 but was updated in minor ways in 1987.
Summary
The GNU Manifesto opens with an explanation of what the GNU Project is, and what is the current, at the time, progress in creation of the GNU operating system. The system, although based on, and compatible with Unix, is meant by the author to have many improvements over it, which are listed in detail in the manifesto.
One of the major driving points behind the GNU project, according to Stallman, was the rapid (at the time) trend toward Unix and its various components becoming proprietary (i.e. closed-source and non-libre) software.
The manifesto lays a philosophical basis for launching the project, and importance of bringing it to fruition — proprietary software is a way to divide users, who are no longer able to help each other. Stallman refuses to write proprietary software as a sign of solidarity with them.
The author provides many reasons for why the project and software freedom is beneficial to users, although he agrees that its wide adoption will make a work of programmer less profitable.
A large part of the GNU Manifesto is focused on rebutting possible objections to GNU Project's goals. They include the programmer's need to make a living, the issue of advertising and distributing free software, and the perceived need of a profit incentive.
See also
History of free and open-source software
Open Letter to Hobbyists
References
External links
GNU Manifesto
GNU Project
Free software culture and documents
Free Software Foundation
Copyleft media
Internet culture
Political manifestos
1985 documents
Works about intellectual property law |
20740176 | https://en.wikipedia.org/wiki/VirusBuster | VirusBuster | VirusBuster Ltd. was one of the few Hungarian IT security software vendors. The fully Hungarian owned company develops software – under the same brand name: "VirusBuster" – for the Hungarian and international market to protect users' computers from malware programs and various other IT security threats. In August 2012, VirusBuster Ltd. announced the discontinuation of its anti-virus products. After VirusBuster was shut down, the entire development and malware analysis team joined Sophos.
History
The legal and trade predecessor of the firm began to develop antiviral products at the end of the 1980s. Its software named "Virsec" came out at the same time, when other well known vendors appeared with their similar solutions. In 1992 Virsec was renamed to "VirusBuster". At the later official formation of the firm this name became the name of the company as well.
In 1997 the official foundation of VirusBuster Ltd took place. In the next years the company produced mainly anti-viral products for the Hungarian market, primarily for the governmental sector. 2000 was the year of the international opening. VirusBuster's products began participating of international test from the summer of this year, and the firm itself began to build up international partnerships also in 2000. Between 2000 and 2003 VirusBuster steadily extended its portfolio. The developments manifested in the increasing number of protected platforms and systems, also in new layered security products to target new threats, and in the management system for the firm's security products. With all of these achievements the company could offer effective security solutions for every organizational customers. 2001 was the first year when an international foreigner company – the Australian Leprechaun – licensed VirusBuster's antiviral technology to integrate it into its own security products.
Between 2003 and 2006 VirusBuster strengthened its Eastern European and worldwide market positions. The antiviral engine of the company became an independent product and thus it was integrated into several other firms' security solutions. These were the years, when VirusBuster appeared on the American market.
In August 2012, Agnitum, the PC security expert and manufacturer of the Outpost range of security products, had announced the acquisition of antivirus technology and infrastructure from its long-term partner VirusBuster.
In October 2012, the owner of the VirusBuster has made the decision that the products and the services were going to be removed from the market. The entire development and malware analysis team joined Sophos.
Products
VirusBuster provided customized, multi-level virus protection solutions for all – individual, home and all size organizational – customer groups, furthermore VirusBuster Internet Security Suite provides full IT protection for home users. The company's security products cover all mainstream operating systems, including both workstation and server platforms.
According to independent IT-professionals and international test labs the products of company were pretty good solutions, in the aspects of both speed and efficiency. Some security analysts said VirusBuster's user interface is rather too "traditional", but according to others this almost "old fashioned" GUI provides better transparency and easier manageability. According to general opinions the products of the company covered all important business platforms and protected from every IT security threat.
Technology licences
Aside from the retail solutions for different market segments, it was also important for the company that their antiviral engine became an independent product. Several international companies were licensing VirusBuster's technology, and integrated it into their own products. (Outpost Security Suite, Kaspersky, Proteatools)
International partnerships
Beside the companies mentioned above, the most important strategic partners of the company in different international collaboration projects were:
Microsoft
HP
Sun Microsystems
Novell
Name misuse
In the beginning of 2008 VirusBuster's security researchers found a computer malware package which was using the name of the company to trick users. The worm was spreading itself as an attachment of infected e-mails under the name "virusbuster.personal.v3.20.regfile.by.arcade.exe". The analysis and the classification of the virus was not a very difficult task, since the worm was a variant of the well known and rather old "Bagle" malware family.
This was not the first example of name misuse; VirusBurst was a fake antispyware program in 2006. Its name was very similar to VirusBusters' name – probably accidentally, but in this case the similarity was perfect.
Also in 2008 the 29A virus-writing group announced its shut down, and one of the prominent members of the 29A team had also used the 'VirusBuster' alias.
See also
Antivirus software
Comparison of antivirus software
Comparison of computer viruses
Computer security software
Antivirus software
External links
Original site, archived |
8570152 | https://en.wikipedia.org/wiki/Efika | Efika | Efika is a line of power efficient ARM architecture and Power ISA based computers manufactured by Genesi.
In Esperanto efika means "efficacious, effective, or efficient".
EfikaPPC
The EfikaPPC, sometimes also referred to as EFIKA 5200B, was based on a 400 MHz Freescale MPC5200B System-on-a-Chip and includes 44-pin 2.5" IDE, USB, serial port, stereo audio in/out, 100 Mbit/s Ethernet, 33/66 MHz PCI port and 128 MB DDR RAM. EFIKA uses an Open Firmware based CHRP compliant firmware with a special x86/BIOS emulator providing support for standard graphics cards on an AGP riser slot. The motherboard had a non-standard form factor, 118 mm × 153 mm × 38 mm small.
Due to its small size, Restriction of Hazardous Substances Directive (RoHS) compliance and energy efficient nature (drawing less than 20 Watts with a harddrive and a graphics card, typically less than 10 Watts during most usage scenarios), the Efika was marketed as environmentally friendly.
An Efika computer could run a variety of operating systems including Linux (Gentoo, openSUSE, Debian and CRUX PPC), MorphOS, AROS, OpenSolaris and QNX. It was sometimes called EFIKA5K2, since it used the PowerPC e300 based MPC5200B processor.
On September 10, 2007, Genesi announced it discontinued the 5200B and was developing a new product based on the Freescale MPC5121e.
It would feature on-board PowerVR MBX video.
Efika MX
In August 2009, the Efika MX Open Client was announced which used the Freescale i.MX515 ARM system-on-a-chip.
The CPU core ran at 800 MHz, Wi-Fi (802.11 b/g/n) and 512 MB of DDR2 SDRAM were included.
The Efika MX Smartbook (small laptop computer) was announced in August 2010.
It featured a 1024×600 resolution screen, 16 GB of SSD and 512 MB of DDR2 RAM.
It required a maximum operating power consumption of 12 watts (average power consumption around 6 W), and came with software based on Ubuntu 10.10 "Maverick Meerkat" release of Linux.
Other Linux distributions are known to work properly on the platform. The drivers and software developed specifically for the platform is available on the company public git at GitHub
The Open Client product was also renamed the Efika MX Smarttop. In Europe, the Efika MX Smartbook is marketed as Efika MX Netbook due to trademark disputes.
See also
Pegasos
Open Desktop Workstation
mobileGT
References
External links
Pegasos Support Forum & Community
EFIKA: First Impressions – Pegasos.org
EFIKA public presentation at EBV Tech Trends 2006 – http://www.ppcnux.de/
Gentoo's EFIKA page
CRUX PPC's EFIKA HowTo
openSUSE's EFIKA page
PowerPC mainboards |
38225987 | https://en.wikipedia.org/wiki/UK%20cyber%20security%20community | UK cyber security community | The cyber security (or information assurance) community in the United Kingdom is diverse, with many stakeholders groups contributing to support the UK Cyber Security Strategy. The following is a list of some of these stakeholders.
Government
According to a parliamentary committee the UK government is not doing enough to protect the nation against cyber attack.
Cyber Aware
Cyber Aware is a cross-government awareness and behaviour campaign which provides advice on the simple measures individuals can take to protect themselves from cyber crime.
Department for Digital, Culture, Media and Sport
The Department for Digital, Culture, Media and Sport is one of the lead government departments on cyber security policy, responsible for supporting & promoting the UK cyber security sector, promoting cyber security research and innovation, and working with the National Cyber Security Centre to help ensure all UK organisations are secure online and resilient to cyber threats.
Get Safe Online
Get Safe Online is a United Kingdom-based campaign and national initiative to teach citizens about basic computer security and internet privacy.
National Crime Agency (NCA)
The National Crime Agency (NCA) hosts the law enforcement cyber crime unit, incorporating the Child Exploitation and Online Protection Centre.
National Cyber Force (NCF)
The National Cyber Force consolidates offensive cyber capabilities from the Ministry of Defence and GCHQ.
National Cyber Security Centre
The National Cyber Security Centre is the UK’s authority on cyber security; its parent organisation is GCHQ. It absorbed and replaced CESG (the information security arm of GCHQ) as well as the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the Centre for the Protection of National Infrastructure (CPNI). NCSC provides advice and support for the public and private sector in how to avoid cyber threats.
CESG (originally Communications-Electronics Security Group) was a branch of GCHQ which worked to secure the communications and information systems of the government and critical parts of UK national infrastructure. The Centre for the Protection of National Infrastructure (CPNI) provided protective security advice to businesses and organisations across the national infrastructure.
National Security Council
The National Security Council is a Cabinet committee tasked with overseeing all issues related to national security, intelligence coordination, and defence strategy.
Office of Cyber Security and Information Assurance
The Office of Cyber Security and Information Assurance (OCSIA) supports the Minister for the Cabinet Office, the Rt Hon Francis Maude MP and the National Security Council in determining priorities in relation to securing cyberspace. The unit provides strategic direction and coordinates action relating to enhancing cyber security and information assurance in the UK. The OCSIA is headed by James Quinault.
Trustworthy Software Initiative
The Trustworthy Software Initiative (TSI) is a UK public good activity, sponsored by the UK government's Centre for the Protection of National Infrastructure, aimed at 'making software better'.
Warning, Advice and Reporting Points (WARPs)
Warning, Advice and Reporting Points (WARPs) provide a trusted environment where members of a community can share problems and solutions.
Professional bodies and industry groups
UK Cyber Security Forum
The UK Cyber Security Forum is a social enterprise representing cyber SME's (Small and Medium Enterprise) in the UK. The forum is composed of 20 regional cyber clusters around the UK. Each cluster is run as a subsidiary of the UK Cyber Security Forum and all are operated by groups of volunteers. They provide events around the UK to engage the public in cyber security and to provide continued professional development to cyber professionals. The official clusters are:
ADS
ADS is a trade organisation for companies operating in the UK aerospace, defence, security and space industries.
Business Continuity Institute (BCI)
The Business Continuity Institute (BCI) was established in 1994 to enable individual members to obtain guidance and support from fellow business continuity practitioners. BCI has a six certification standards to ensure individual practitioners literacy in organizations, responses, and other strategies.
Council of Registered Ethical Security Testers (CREST)
Not for profit accreditation and certification organization.
Crypto Developers Forum
The CDF promotes the global interests of the UK crypto development industry.
Information Assurance Advisory Council (IAAC)
The Information Assurance Advisory Council (IAAC) works across industry, government and academia towards ensuring the UK’s information society has a robust, resilient and secure foundation. The IAAC was set up by Baroness Neville-Jones who chaired the organisation until 2007, handing over to the current chairman Sir Edmund Burton. Affiliates include BT Group, Northrop Grumman, QinetiQ, Raytheon, PwC, O2 UK, Ultra Electronics and GlaxoSmithKline. The 2012/13 work programme focused on consumerisation and its effects on information assurance.
Information Assurance Collaboration Group (IACG)
The IACG was formed following the UK's national IA conference in 2006. The IACG encourages greater collaboration between the commercial supply base for information assurance products and services operating within the UK public sector. Stakeholders include CESG, BIS, the Office of Cyber Security and Information Assurance (OCSIA), Cyber Security Operations Centre (CSOC), and the CPNI. The group maintains the UK information assurance community map, hosted on the CESG's web site. It has two co-chairs: Colin Robbins of Nexor and Ross Parsell of Thales. The IACG ceased operation in 2014.
Information Systems Security Association (ISSA)
The Information Systems Security Association (ISSA) is a not-for-profit, international professional organization of information security professionals and practitioners. There is a UK chapter.
Institute of Information Security Professionals (IISP)
The Institute of Information Security Professionals (IISP) is an independent, non-profit body governed by its members, with the principal objective of advancing the professionalism of information security practitioners and thereby the professionalism of the industry as a whole.
ISACA
ISACA is an international professional association that deals with IT governance. Previously known as the Information Systems Audit and Control Association.
(ISC)²
(ISC)² is the International Information Systems Security Certification Consortium is a non-profit organization which specializes in information security education and certifications.
NDI UK
NDI is a former government-funded organisation building supply chains for the MOD and manufacturers using SMEs in the United Kingdom.
TechUK
TechUK, formerly known as Intellect, is a UK trade association for the technology industry. It has a Cyber Security Group focused on “high threat” areas – including defence, national security and resilience, protection of critical national infrastructure, intelligence, and organised crime, chaired by Dr Andrew Rogoyski of Roke Manor Research. The Security and Resilience Group works to build relationships between the technology industry and policymakers, customers and end users, and is chaired by Stephen Kingan of Nexor.
Tigerscheme
Tigerscheme is a commercial certification scheme for technical security specialists, backed by university standards and covering a wide range of expertise.
Tigerscheme is CESG certified in the UK and candidates are subject to an independent rigorous academic assessment authority. Tigerscheme was founded in 2007 on the principle that a commercial certification scheme run on independent lines would give buyers of security testing services confidence that they were hiring a recognised and reputable company. In June 2014 the operational authority for Tigerscheme was transferred to USW Commercial Services Ltd.
UK Cloud Pooled Audit Group (UK CPAG)
UK CPAG is a membership organisation consisting of the UK's largest banks. Established in 2020 with a mission to use collective power of the banks to audit Cloud Service Providers such as Google, Amazon and Microsoft. The Group is operated by the Worshipful Company of Information Technologists
UK Council for Electronic Business
UKCeB is a not-for-profit, membership organisation whose mission is to transform secure information sharing for through life collaboration in defence acquisition and support.
British Computer Society (BCS)
The British Computer Society (BCS) is a professional body and a learned society that represents those working in information technology both in the United Kingdom and internationally. It has a security, data and privacy group.
Cyber Scheme
The Cyber Scheme is a not for profit professional examination body under contract to the National Cyber Security Centre to provide technical exams in support of the Governments assured Penetration testing company scheme CHECK. The exams are independent and rigorous and are conducted for Practitioner Team member level and Team leader levels.
Academic
Academic Centres of Excellence in Cyber Security Research
NCSC has accredited several Academic Centres of Excellence in Cyber Security Research:
Queen's University Belfast
University of Birmingham
University of Bristol
University of Cambridge
Cardiff University
De Montfort University
University of Edinburgh
University of Kent
King's College London
Lancaster University
Imperial College London
University College London
Royal Holloway, University of London
Newcastle University
Northumbria University
University of Oxford
University of Southampton
University of Surrey
University of Warwick
University of South Wales Information Security Research Group
The Information Security Research Group (ISRG) at the University of South Wales is a multidisciplinary team of academics and industrial experts focusing upon cyber security.
In particular the group is focusing upon:
Network security
Intrusion detection and wireless security
Penetration testing and vulnerability assessment
Computer forensics and digital evidence visualisation
Threat assessment and risk management
De Montfort University Cyber Security Centre
The Cyber Security Centre (CSC) at De Montfort University is a multidisciplinary group of academics who focus on a wide variety of cyber security and digital forensics issues. The Centre's mission is to provide the full benefits to all of a safe, secure and resilient cyberspace.
See also
British intelligence agencies
References
Computer security organizations
Cybercrime in the United Kingdom
Internet in the United Kingdom |
45343761 | https://en.wikipedia.org/wiki/Venansius%20Baryamureeba | Venansius Baryamureeba | Venansius Baryamureeba (born 18 May 1969) is a Ugandan mathematician, computer scientist, academic, and academic administrator. He was the Acting vice chancellor of the Uganda Technology and Management University, a private university in Uganda, from September 2013 until 28 September 2015. He left the position to join the presidential race in Uganda to take place in 2016. Before that, he served as the vice chancellor of Makerere University from November 2009 until August 2012.
Background and education
He was born in Kasharara Village, Kagongo Parish, Ibanda District, in the Western Region of Uganda. He holds a Bachelor of Science in mathematics, obtained in 1994 from Makerere University. He also holds a Master of Science and a Doctor of Philosophy, both in computer science and both from Bergen University in Norway, awarded in 1996 and in 2000, respectively. In 1997, he was awarded the postgraduate Diploma in the Analysis of Linear Programming Models by the University of Trondheim, also in Norway.
Career
His career in academia began soon after his first degree, when he worked as a teaching assistant in the Institute of Statistics and Applied Economics at Makerere University, from 1994 until 1998. He then worked as an assistant lecturer at the Institute of Teacher Education Kyambogo, which now is part of Kyambogo University, from 1995 until 1996. While pursuing graduate study in Norway, he worked as a teaching assistant in the Department of Informatics at Bergen University from 1997 until 2000. He also worked as a research fellow, in the same department and institution, from 1995 until 2000.
Beginning in 1998 until 2000, he worked as a lecturer in the Department of Mathematics at Makerere University. He was a senior lecturer in the Institute of Computer Science at Makerere University, from 2001 until 2006 (which was transformed into the Department of Computer Science, Faculty of Computing and IT (FCI)). He then became an associate professor, and, in November 2006, he was made a professor, continuing to teach until August 2012 at FCI. From October 2005 until June 2010, he served as the dean of FCI.
From November 2009 until August 2012, he was vice chancellor of Makerere University.
At Uganda Technology and Management University, he has served since September 2012 as the vice chancellor and as a professor of computer science in the School of Computing and Engineering.
Works
The enhanced digital investigation process model
Extraction of interesting association rules using genetic algorithms
Cyber crime in Uganda: Myth or reality?
The role of ICTs and their sustainability in developing countries
Mining High Quality Association Rules Using Genetic Algorithms.
On the convergence of an inexact primal-dual interior point method for linear programming
Optimized association rule mining with genetic algorithms
ICT as an engine for Uganda's economic growth: The role of and opportunities for Makerere University
ICT-enabled services: a critical analysis of the opportunities and challenges in Uganda
Towards domain independent named entity recognition
Properties of a class of preconditioners for weighted least squares problems
A methodology for feature selection in named entity recognition
On the convergence of an inexact primal-dual interior point method for linear programming
On efficient distribution of data in multicast networks: QoS in scalable networks
Solution of large‐scale weighted least‐squares problems
Computational issues for a new class of preconditioners
Collaborative framework for supporting indigenous knowledge management
The role of TVET in building regional economies
Computer forensics for cyberspace crimes
On the properties of preconditioners for robust linear regression
On a class of preconditioners for interior point methods
Generalized Association Rule Mining Using Genetic Algorithms
Logit analysis of socioeconomic factors influencing famine in Uganda.
Solution of robust linear regression problems by preconditioned conjugate gradient type methods
Properties and computational issues of a preconditioner for interior point methods
A class of preconditioners for weighted least squares problems
A new function for robust linear regression: An iterative approach
Approaches towards effective knowledge management for small and medium enterprises in developing countries-Uganda
The status of software usability in Uganda
The impact of equal weighting of low-and high-confidence observations on robust linear regression computations
Measuring Computing Research Excellence and Vitality
Application of a class of preconditioners to large scale linear programming problems
Meta-Knowledge as an engine in Classifier Combination
Solution of robust linear regression problems by Krylov subspace methods
Translation of the google interface into Runyakitara
The role of academia in fostering private sector competitiveness in ICT development
A Dynamic Framework for the Protection of Intellectual Property Rights in the Cyberspace
See also
Education in Uganda
Ugandan university leaders
List of universities in Uganda
References
External links
Website of Uganda Technology and Management University
Baryamureeba Speaks Out On Life After Makerere - 15 October 2012
Professor Venansius Baryamureeba – Five Plus Interview: 24 August 2013
Baryamureeba Denies Defaming Makerere Don - 16 February 2013
1969 births
Living people
Makerere University academics
Kyambogo University academics
Vice-chancellors of universities in Uganda
Ibanda District
Ugandan mathematicians
People from Ibanda District
Makerere University alumni
University of Bergen alumni
Norwegian University of Science and Technology alumni
Uganda Technology and Management University academics
Ugandan expatriates in Norway |
344197 | https://en.wikipedia.org/wiki/Quake%204 | Quake 4 | Quake 4 is a military science fiction first-person shooter video game developed by Raven Software and published by Activision. It is the fourth title in the Quake series and a sequel to Quake II. Raven Software collaborated with id Software, who supervised the development of the game as well as provided the id Tech 4 engine upon which it was built. The game has an increased emphasis on single-player gameplay compared to previous installments; its multiplayer mode does not support playable bots.
Quake 4 went gold in early October 2005 and was released on October 18 for Microsoft Windows, and later for Linux and OS X, Xbox 360. A special DVD Collectors Edition was released, including promotional material and the game Quake II with its expansions, The Reckoning and Ground Zero. The Xbox 360 version of Quake 4 is based on the Special Collectors Edition, and includes Quake II. On August 4, 2011, the game was made available through Steam.
Gameplay
Single player
Quake 4 has a stronger emphasis on single-player than its predecessor and features a campaign that continues the story of Quake II. However, it lacks the bot matchmaking offered in Quake III.
Multiplayer
Multiplayer modes are Deathmatch, Team Deathmatch, Tourney, Capture the Flag, Arena CTF and DeadZone. Players at QuakeCon reported the multiplayer gameplay to include elements similar to those in previous Quake games such as strafe-jumping or rocket jumping. Notable additions to play are the ability to send shots through the teleporters and the advancement of the game physics provided by the new technology including the ability to bounce grenades and napalm fire off of jump-pads.
Like the previous Quake games, the multiplayer has a client-server architecture. The network code has been altered from Doom 3, allowing for larger numbers of players on each server; Doom 3 has a four-player restriction, whereas Quake 4 has a standard 16 player limit.
Movement
The player movement in Quake 4 is similar to that in Quake III Arena and Quake Live, but with the additions of ramp jumping and crouch slides. Crouch slides give players the ability to maintain speed by sliding around corners. Ramp jumps allow players to gain extra height from jumping as they reach the top of an inclined object, which while present in the original Quake and Quake II was not included in Quake III Arena.
Plot
The Quake 4 single player mode continues the story of Quake II by pitting the player against cyborg alien race known as the Strogg. The game follows the story of a Marine Corporal named Matthew Kane who is joining the elite Rhino Squad. Following the success of the protagonist of Quake II in destroying the Strogg's leader, the Makron, Rhino Squad is tasked with spearheading the mission to secure the aliens' home planet Stroggos. In the course of the invasion, the squad ship is shot down and crashes in the middle of a battle zone, separating Kane from his companions. Kane rejoins his scattered team members and partakes in the assault against the Strogg.
After performing a number of tasks, such as destroying and capturing Strogg aircraft hangars and defense systems, Kane and his remaining squad members make it to the USS Hannibal. There they are given their next mission: infiltrating one of the Strogg's central communication hubs, the Tetranode, with an electromagnetic pulse bomb in the hope that it will put the main Strogg Nexus in disarray. Kane is tasked with defending the mission convoy, which takes heavy casualties. After many setbacks, including the destruction of the EMP device by a Strogg ambush, Kane is left to complete the mission, assisted only by Private Johann Strauss (Peter Stormare) and Lance Corporal Nikolai "Sledge" Slidjonovitch (Dimitri Diatchenko). Strauss figures out a way to destroy the core by shutting down its coolant systems. As Kane reaches the entrance to the Tetranode, however, he is greeted by two rocket-equipped network guardians, as well as the newly constructed Makron, which easily defeats Kane and knocks him unconscious.
When Kane awakens, he finds himself strapped to a conveyor belt in the Strogg "Medical Facilities", a structure used for turning those captured and killed by the aliens either into protein food or additional Strogg units. In a long and gruesome first-person cutscene, Kane is taken through this "stroggification" process which violently replaces much of his anatomy with bio-mechanical parts. Before the final controlling neurochip implanted in his brain can be activated, though, Rhino Squad bursts into the facility and rescues Kane. After escaping through the Strogg medical facility and Waste Disposal plant, fighting off zombie-like half-stroggified humans along the way, Kane is forced to combat his former commander, Lieutenant Voss (Michael Gannon), who has been fully stroggified into a powerful mechanized monster but retains his own consciousness long enough to warn Kane. After defeating this threat, Kane and the remaining marines finally make it back to the Hannibal.
The commanders realize that Kane's Strogg physiology has opened up new possibilities for defeating the Strogg, as he can be used to infiltrate locations and teleportation areas previously impenetrable and/or fatally harmful to human forces. The new plan is to directly target the Strogg Nexus Core, a huge centralized brain-like structure which controls the alien forces. The Marines are tasked with infiltrating the three data towers adjacent to the Nexus: Data Storage, Processing, and Networking. There, they will deactivate the Nexus' shield and power up the teleporter used to access the Nexus and send Kane in. Once inside, Kane will travel to the center of the Nexus to destroy the Core Brain and its guardian.
After infiltrating the facility and realigning the data nodes powering the teleporter, and destroying its fearsome "Guardian" creature, Kane reaches the Nexus core. There he meets the Makron in a final showdown and kills it. This accomplished, he destroys the Core and returns to the Hannibal. Celebrating with Rhino Squad afterward, Kane receives word that he has new orders.
Development
The Xbox 360 version of Quake 4 was released at the launch of the Xbox 360 and is Xbox Live compatible. There have been major issues with frame rates for the console adaptation, earning it the award for Most Aggravating Frame Rate/Best Slideshow in the GameSpot.com Best and Worst of 2005 list. In addition, the Xbox 360 port of Quake 4 has very long load times and Xbox Live glitches that result in problematic multiplayer experiences, as documented by game review sites as well as on Activision's support pages for the Xbox 360 version. This version was initially priced the same as the PC Special Edition DVD and features the same content. Aspyr Media published and released Quake 4 for OS X on April 5, 2006, initially only for PowerPC based Macs, but later as a universal binary compatible with both PowerPC- and x86-based Macs. id Software continued its tradition of supporting Linux, with Timothee Besset of id releasing a Linux version of the Quake 4 binary executable. The binary can be downloaded for free from id's servers and it requires a licensed copy of Quake 4 for Windows or OS X in order to run. The Linux installer was made available two days after the release of the game itself. The game's budget was $15 million.
Having worked on the theme music for Doom 3, Clint Walsh and Chris Vrenna, were brought in to compose and produce the main theme respectively for Quake 4.
The rest of the music were composed by Raven's audio leads, Zachary Quarles and Kevin Schilder.
Quake 4 was re-released for the Xbox 360 and PC on June 19, 2012, with publication handled by Bethesda. In Europe, the game was launched in the United Kingdom, France, Germany, Switzerland, Austria, and Benelux territories. It was released in the United Kingdom on June 22. Unlike the original Xbox 360 version, the Bethesda re-release does not include the port of Quake II.
Like its predecessors, Quake 4 can be modified. This led to Quake 4 versions of popular mods from previous versions of Quake, such as Rocket Arena, and Quake 4 Fortress (the Quake 4 version of Team Fortress Classic). Quake 4 Fortress was abandoned before its creators considered it complete; instead they released an alpha version complete with source code. In the competitive gaming scene, there were two principal mods, Q4Max and X-Battle. The online Quake 4 competitive community was split between the two mods. A number of the online leagues switched between X-Battle and Q4Max, such as ClanBase EuroCup and GGL. Despite this split in the online community, the offline professional LAN tournaments run by CPL, ESWC, WCG, QuakeCon, and WSVG all used Q4Max. Members of both the Q4Max and X-Battle teams joined forces with Adam 'SyncError' Pyle of id Software and developed another mod, Delta CTF, which brought Quake II-style Capture the Flag to Quake 4. Another notable mod is SABot, which successfully implemented multiplayer bots in Quake 4 less than a month after the SDK was released, despite this being a feature that some reviewers criticised Quake 4 for not including.
Reception
Quake 4s PC version received a "Silver" sales award from the Entertainment and Leisure Software Publishers Association (ELSPA), indicating sales of at least 100,000 copies in the United Kingdom.
Quake 4 received generally favorable reviews regarding the PC version of the game, with game database Metacritic giving the game an aggregate review score of 81/100. Websites and magazines such as IGN and UGO praised its single-player campaign, graphics and Hollywood voice-acting, but complained that its multiplayer was too much like Quake III. GameSpot gave Quake 4 an 8.0 and it also said: "The single-player is great fun, but the uninspired multiplayer leaves a lot to be desired". PC Magazine gave Quake 4 a good review for both singleplayer and multiplayer gameplay.
The original 2005 Xbox 360 version of the game fared slightly worse with critics when it was released but still received generally positive reviews, scoring 75/100 on Metacritic. The only exception for that is 1UP.com, where they gave the PC version a score of "B-" but the Xbox 360 version a score of "B+". Electronic Gaming Monthly gave a mixed rating to the Xbox 360 port. It panned the single-player campaign for not being creative enough to compete with other games such as Half-Life 2 and noted that the game ran poorly on the 360. IGN scored Quake 4 8.1/10, saying "Quake 4 is one of those games that will appeal to console gamers who haven't owned a PC for years. The single-player campaign is varied and pretty interesting, getting better after you're Stroggified. The enemies go from dumb and running right at you to diverse and more interesting in the second half of the game, and there are a few cool boss fights worth your while. The gory graphics and excellent lighting are well done and they'll appeal to many gamers looking for a fast, shiny game to just let loose on". GameSpot gave it a worse rating than the PC version: 6.6. They also wrote: "There's a good game in Quake 4, but it's buried under several layers of highly disappointing graphical performance issues". X-Play gave the Xbox 360 version a 3/5 and the PC version a 4/5.
Quake 4 was a finalist for PC Gamer USs "Best Multiplayer Game 2005" award, which ultimately went to Battlefield 2.
In 2016, former id Software employee and original Quake director John Romero expressed his disappointment over the direction of Quake 4.
Competitive play
In part due to the similarities to the Quake III Arena multiplayer, Quake 4 was used in a number of professional electronic sports tournaments.
The following competitions have held Quake 4 events:
Cyberathlete Professional League (2005)
Electronic Sports World Cup (2006 / 2007)
QuakeCon (2005–2007)
World Cyber Games (2006)
World Series of Video Games (2006 / 2007)
References
External links
Ravensoft's official Quake 4 site
id's official Quake 4 site
2005 video games
Activision games
Aspyr games
Biopunk
Esports games
First-person shooters
First-person shooter multiplayer online games
Id Software games
Id Tech games
Linux games
MacOS games
Military science fiction video games
Multiplayer and single-player video games
Multiplayer online games
Quake (series)
Science fiction video games
Video games developed in the United States
Video game sequels
Video games set on fictional planets
Windows games
Xbox 360 games |
10978691 | https://en.wikipedia.org/wiki/Steve%20Shields%20%28basketball%29 | Steve Shields (basketball) | Stephen Leonard Shields (born March 9, 1965) is an American college basketball coach and most recently the head men's basketball coach at the University of Arkansas at Little Rock. He took over as head coach prior to the start of the 2003–04 season.
Shields began his tenure at Arkansas–Little Rock as an assistant to Porter Moser in 2000, and served as his assistant until 2003, when Moser left to take the head coaching position at Illinois State University.
Prior to joining the Trojans' staff, Shields had worked as an assistant for six years at three different community colleges before accepting the head job in 1996 at McLennan Community College, where he had previously spent time as an assistant.
Shields started his collegiate career as a basketball player at Oklahoma City University, where he sat out his freshman year as a redshirt. He transferred and played basketball for one year at McLennan Community College before transferring again to Baylor University. Shields played golf for his father at Baylor, earning all-conference honors. He graduated in 1988 with a degree in education.
On March 18, 2015, Shields was let go by the Arkansas–Little Rock administration after 12 seasons. He left as the winningest coach in the Trojans' history.
Head coaching record
References
1965 births
Living people
American male golfers
American men's basketball coaches
American men's basketball players
Baylor Bears men's basketball players
College men's basketball head coaches in the United States
High school basketball coaches in the United States
Junior college men's basketball players in the United States
Little Rock Trojans men's basketball coaches
McLennan Community College alumni
Pensacola State Pirates men's basketball coaches
Place of birth missing (living people) |
64560456 | https://en.wikipedia.org/wiki/2020%20Twitter%20account%20hijacking | 2020 Twitter account hijacking | On July 15, 2020, between 20:00 and 22:00 UTC, reportedly 130 high-profile Twitter accounts were compromised by outside parties to promote a bitcoin scam. Twitter and other media sources confirmed that the perpetrators had gained access to Twitter's administrative tools so that they could alter the accounts themselves and post the tweets directly. They appeared to have used social engineering to gain access to the tools via Twitter employees. Three individuals were arrested by authorities on July 31, 2020, and charged with wire fraud, money laundering, identity theft, and unauthorized computer access related to the scam.
The scam tweets asked individuals to send bitcoin currency to a specific cryptocurrency wallet, with the promise of the Twitter user that money sent would be doubled and returned as a charitable gesture. Within minutes from the initial tweets, more than 320 transactions had already taken place on one of the wallet addresses, and bitcoin to a value of more than had been deposited in one account before the scam messages were removed by Twitter. In addition, full message history data from eight non-verified accounts was also acquired.
Dmitri Alperovitch, the co-founder of cybersecurity company CrowdStrike, described the incident as "the worst hack of a major social media platform yet." The Federal Bureau of Investigation (FBI) and other law enforcement agencies are investigating the scam and the security used by Twitter. Security researchers expressed concerns that the social engineering used to execute the hack could affect the use of social media in important online discussions, including the lead-up into the 2020 United States presidential election.
Incident
Forensic analysis of the scam showed that the initial scam messages were first posted by accounts with short, one- or two-character distinctive names, such as "@6". This was followed by cryptocurrency Twitter accounts at around 20:00 UTC on July 15, 2020, including those of Coinbase, CoinDesk and Binance. The scam then moved to more high-profile accounts with the first such tweet sent from Elon Musk's Twitter account at 20:17 UTC. Other apparently compromised accounts included those of well-known individuals such as Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, MrBeast, Michael Bloomberg, Warren Buffett, Floyd Mayweather Jr., Kim Kardashian, and Kanye West; and companies such as Apple, Uber, and Cash App. Twitter believed 130 accounts were affected, though only 45 were actually used to tweet the scam message; most of the accounts that were accessed in the scam had at least a million followers.
The tweets involved in the scam hack claimed that the sender, in charity, would repay any user double the value of any bitcoin they sent to given wallets, often as part of a COVID-19 relief effort. The tweets followed the sharing of malicious links by a number of cryptocurrency companies; the website hosting the links was taken down shortly after the tweets were posted. While such "double your bitcoin" scams have been common on Twitter before, this is the first major instance of them being used with high-profile accounts. Security experts believe that the perpetrators ran the scam as a "smash and grab" operation: Knowing that the intrusion into the accounts would be closed quickly, the perpetrators likely planned that only a small fraction of the millions that follow these accounts needed to fall for the scam in that short time to make quick money from it. Multiple bitcoin wallets had been listed at these websites; the first one observed had received from over 320 transactions, valued at more than , and had about removed from it, while a second had amounts in only the thousands of dollars as Twitter took steps to halt the postings. It is unclear if these had been funds added by those led on by the scam, as bitcoin scammers are known to add funds to wallets prior to starting schemes to make the scam seem legitimate. Of the funds added, most had originated from wallets with Chinese ownerships, but about 25% came from United States wallets. After it was added, the cryptocurrency was then subsequently transferred through multiple accounts as a means to obscure their identity.
Some of the compromised accounts posted scam messages repeatedly, even after having some of the messages deleted. The tweets were labelled as having been sent using the Twitter Web app. One of the phrases involved in the scam was tweeted more than 3,000 times in the space of four hours, with tweets being sent from IP addresses linked to many different countries. The reused phrasing allowed Twitter to remove the offending tweets easily as they took steps to stop the scam.
By 21:45 UTC, Twitter released a statement saying they were "aware of a security incident impacting accounts on Twitter" and that they were "taking steps to fix it". Shortly afterwards, it disabled the ability for some accounts to tweet, or to reset their password; Twitter has not confirmed which accounts were restricted, but many users with accounts Twitter had marked as "verified" confirmed that they were unable to tweet. Approximately three hours after the first scam tweets, Twitter reported they believed they had resolved all of the affected accounts to restore credentials to their rightful owners. Later that night, Twitter CEO Jack Dorsey said it was a "tough day for us at Twitter. We all feel terrible this happened. We're diagnosing and will share everything we can when we have a more complete understanding of exactly what happened." At least one cryptocurrency exchange, Coinbase, blacklisted the bitcoin addresses to prevent money from being sent. Coinbase said they stopped over 1,000 transactions totaling over from being sent.
In addition to sending out tweets, the account data for eight compromised accounts was downloaded, including all created posts and direct messages, though none of these accounts belonged to verified users. Twitter also suspected that thirty-six other accounts had their direct messages accessed but not downloaded including Dutch Parliament Representative Geert Wilders, but believed no other current or former elected official had their messages accessed.
Method of attack
As Twitter was working to resolve the situation on July 15, Vice was contacted by at least four individuals claiming to be part of the scam and presented the website with screenshots showing that they had been able to gain access to a Twitter administrative tool, also known as an "agent tool", that allowed them to change various account-level settings of some of the compromised accounts, including confirmation emails for the account. This allowed them to set email addresses which any other user with access to that email account could initiate a password reset and post the tweets. These hackers told Vice that they had paid insiders at Twitter to get access to the administrative tool to be able to pull this off.
TechCrunch reported similarly, based on a source that stated some of the messages were from a member of a hacking forum called "OGUsers", who had claimed to have made over from it. According to TechCrunch source, this member "Kirk" had reportedly gained access to the Twitter administrative tool likely through a compromised employee account, and after initially offering to take over any account on request, switched strategies to target cryptocurrency accounts starting with Binance and then higher-profile ones. The source did not believe Kirk had paid a Twitter employee for access.
The "@6" Twitter had belonged to Adrian Lamo, and the user maintaining the account on behalf of Lamo's family reported that the group that performed the hack were able to bypass numerous security factors they had set up on the account, including two-factor authentication, further indicating that the administrative tools had been used to bypass the account security. Spokespersons for the White House stated that President Donald Trump's account, which may have been a target, had extra security measures implemented at Twitter after an incident in 2017, and therefore was not affected by the scam.
Vices and TechCrunch sources were corroborated by The New York Times, who spoke to similar persons involved with the events, and from other security researchers who had been given similar screens, and tweets of these screens had been made, but Twitter removed these since they revealed personal details of the compromised accounts. The New York Times further affirmed that the vector of the attack was related to most of the company working from home amid the COVID-19 pandemic; the OGUsers members were able to gain access to the Twitter employees' Slack communications channel where information and authorization processes on accessing the company's servers remotely from home had been pinned.
Twitter subsequently confirmed that the scam involved social engineering, stating "We detected what we believe to be a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools." In addition to taking further steps to lock down the verified accounts affected, Twitter said they have also begun an internal investigation and have limited employee access to their system administrative tools as they evaluate the situation, as well as if any additional data was compromised by the malicious users.
By the end of July 17, 2020, Twitter affirmed what had been learned from these media sources, stating that "The attackers successfully manipulated a small number of employees and used their credentials to access Twitter's internal systems, including getting through our two-factor protections. As of now, we know that they accessed tools only available to our internal support teams." Twitter had been able to further confirm by July 30 that the method used was what they called a "phone spear phishing attack": they initially used social engineering to breach the credentials of lower-level Twitter employees who did not have access to the admin tools, and then using those employee accounts, engaged in additional social engineering attacks to get the credentials to the admin tools from employees who did have authorization for their use.
Bloomberg News, after investigation with former and current Twitter employees, reported that as many as 1500 Twitter employees and partners had access to the admin tools that would allow for the ability to reset accounts as had been done during the incident. Former Twitter employees had told Bloomberg that even as late as 2017 and 2018, those with access would make a game of using these tools to track famous celebrities though the amount of data visible through the tools alone was limited to elements like IP address and geolocation information. A Twitter spokesperson told Bloomberg that they do use "extensive security training and managerial oversight" to manage employees and partners with access to the tools, and that there was "no indication that the partners we work with on customer service and account management played a part here". Former members of Twitter's security departments stated that since 2015, the company was alerted to the potential from an inside attack, and other cybersecurity measures, but these were put aside, in favor of more revenue-generating initiatives.
Ars Technica obtained a more detailed report from a researcher who worked with FBI on the investigation. According to this report, attackers scraped LinkedIn in search for Twitter employees likely to have administrator privileges account-holder tools. Then attackers obtained these employees' cell phone numbers and other private contact information via paid tools LinkedIn makes available to job recruiters. After choosing victims for the next stage, attackers contacted Twitter employees, most who were working from home as a result of the COVID-19 pandemic, and, using the information from LinkedIn and other public sources, pretended to be Twitter personnel. Attackers directed victims to log into a fake internal Twitter VPN. To bypass two-factor authentication, attackers entered stolen credentials into the real Twitter VPN portal and "within seconds of the employees entering their info into the fake one" and asked victims to for the two-factor authentication code.
Perpetrators
Security researcher Brian Krebs corroborated with TechCrunch source and with information obtained by Reuters that the scam appeared to have originated in the "OGUsers" group. The OGUsers forum ("OG" standing for "original") was established for selling and buying social media accounts with short or "rare" names, and according to its owner, speaking to Reuters, the practice of trafficking in hacked credentials was prohibited. Screenshots from the forum show various users on the forum offering to hack into Twitter accounts at each. Krebs stated one of the members may have been tied to the August 2019 takeover of Twitter CEO Jack Dorsey's Twitter account. The OGUsers owner told Reuters that the accounts shown in the screenshots were since banned.
The FBI announced July 16 it was launching an investigation into the scam, as it was used to "perpetuate cryptocurrency fraud", a criminal offense. The Senate Select Committee on Intelligence also planned to ask Twitter for additional information on the hack, as the committee's vice-chair Mark Warner stated "The ability of bad actors to take over prominent accounts, even fleetingly, signals a worrisome vulnerability in this media environment, exploitable not just for scams but for more impactful efforts to cause confusion, havoc and political mischief". The UK's National Cyber Security Centre said its officers had reached out to Twitter regarding the incident. BitTorrent CEO Justin Sun announced a bounty against the hackers, with his company's Twitter account stating "He will personally pay those who successfully track down, and provide evidence for bringing to justice, the hackers/people behind this hack affecting our community."
The United States Department of Justice announced the arrest and charges of three individuals tied to the scam on July 31, 2020. A 19-year-old from the United Kingdom was charged with multiple counts of conspiracy to commit wire fraud, conspiracy to commit money laundering, and the intentional access of a protected computer, and a 22-year-old from Florida was charged with aiding and abetting the international access. Both will be tried in the United States District Court for the Northern District of California. A third individual, a minor from Florida, was also indicted but due to their age, the charges were sealed in juvenile court in Florida. The state will try him as an adult on over thirty charges related to felony counts, including organized fraud, communications fraud, identity theft, and hacking, under the state's law allowing them to convict minors as adults for financial fraud cases. The Florida teen pleaded not guilty to the charges on August 4, 2020. The teen accepted a plea bargain by March 2021 which included serving three years of jail time including time served as a "youthful offender", even though he had turned 18 during the trial.
A fourth individual, a 16-year-old from Massachusetts, had been identified as a possible suspect in the scam by the FBI. Though federal agents had conducted a warranted search of his possessions in late August 2020, no indictments have been made yet.
Reaction and aftermath
Affected users could only retweet content, leading NBC News to set up a temporary non-verified account so that they could continue to tweet, retweeting "significant updates" on their main account. Some National Weather Service forecast offices were unable to tweet severe weather warnings, with the National Weather Service Lincoln, Illinois initially unable to tweet a tornado warning. Joe Biden's campaign stated to CNN that they were "in touch with Twitter on the matter", and that his account had been "locked down". Google temporarily disabled its Twitter carousel in its search feature as a result of these security issues.
During the incident, Twitter, Inc.'s stock price fell by 4% after the markets closed. By the end of the next day, Twitter, Inc.'s stock price ended at $36.40, down 38 cents, or 0.87%.
Security experts expressed concern that while the scam may have been relatively small in terms of financial impact, the ability for social media to be taken over through social engineering involving employees of these companies poses a major threat in the use of social media particularly in the lead-up to the 2020 United States presidential election, and could potentially cause an international incident. Alex Stamos of Stanford University's Center for International Security and Cooperation said, "Twitter has become the most important platform when it comes to discussion among political elites, and it has real vulnerabilities."
Twitter chose to delay the rolling out of its new API in the aftermath of the security issues. By September, Twitter stated they had put new protocols in place to prevent similar social engineering attacks, including heightening background checks for employees that would have access to the key user data, implementing phishing-resistant security keys to use this day, and having all employees involved in customer support participate in training to be aware of future social engineering scams.
Though not part of the Twitter incident, Steve Wozniak and seventeen others initiated a lawsuit against Google the following week, asserting that the company did not take sufficient steps to remove similar Bitcoin scam videos posted to YouTube that used his and the other plaintiffs' names, fraudulently claiming to back the scam. Wozniak's complaint identified that Twitter was able to act within the same day, while he and the other plaintiffs' requests to Google had never been acted upon.
On September 29, 2020, Twitter hired Rinki Sethi as CISO and VP of the company after the breach.
References
External links
Ongoing updates from Twitter on investigation into the intrusion on its systems, what had been accessed, and their steps to correct and prevent similar attacks.
Overview of the bitcoin address' transactions
Bitcoin theft
Criticisms of software and websites
Twitter
Hacking in the 2020s
July 2020 crimes
Confidence tricks
Twitter controversies |
719303 | https://en.wikipedia.org/wiki/Madryga | Madryga | In cryptography, Madryga is a block cipher published in 1984 by W. E. Madryga. It was designed to be easy and efficient for implementation in software. Serious weaknesses have since been found in the algorithm, but it was one of the first encryption algorithms to make use of data-dependent rotations, later used in other ciphers, such as RC5 and RC6.
In his proposal, Madryga set forth twelve design objectives that are generally considered to be good goals in the design of a block cipher. DES had already fulfilled nine of them. The three that DES did not fulfill were:
Any possible key should produce a strong cipher. (Meaning no weak keys, which DES has.)
The length of the key and the text should be adjustable to meet varying security requirements.
The algorithm should be efficiently implementable in software on large mainframes, minicomputers, and microcomputers, and in discrete logic. (DES has a large amount of bitwise permutations, which are inefficient in software implementations.)
The algorithm
Madryga met the objective of being efficient in software: the only operations it uses are XOR and rotations, both operating only on whole bytes. Madryga has a variable-length key, with no upper limit on its length.
Madryga is specified with eight rounds, but this can be increased to provide more security if need be. In each round, the algorithm passes over the entire plaintext n times, where n is the length of the plaintext in bytes. The algorithm looks at three bytes at a time, so Madryga is a 24-bit block cipher. It XORs a key byte with the rightmost byte, and rotates the other two as one block. The rotation varies with the output of the XOR. Then, the algorithm moves to the right by one byte. So if it were working on bytes 2, 3 and 4, after it finished rotating and XORing them, it would repeat the process on bytes 3, 4 and 5.
The key schedule is very simple. To start with, the entire key is XORed with a random constant of the same length as the key, then rotated to the left by 3 bits. It is rotated again after each iteration of rotation and XOR. The rightmost byte of it is used in each iteration to XOR with the rightmost byte of the data block.
The decryption algorithm is simply the reverse of the encryption algorithm. Due to the nature of the XOR operation, it is reversible.
Cryptanalysis
At a glance, Madryga seems less secure than, for example, DES. All of Madryga's operations are linear. DES's S-boxes are its only non-linear component, and flaws in them are what both differential cryptanalysis and linear cryptanalysis seek to exploit. While Madryga's rotations are data-dependent to a small degree, they are still linear.
Perhaps Madryga's fatal flaw is that it does not exhibit the avalanche effect. Its small data block is to blame for this. One byte can only influence the two bytes to its left and the one byte to its right.
Eli Biham has reviewed the algorithm without making a formal analysis. He noticed that "the parity of all the bits of the plaintext and the ciphertext is a constant, depending only on the key. So, if you have one plaintext and its corresponding ciphertext, you can predict the parity of the ciphertext for any plaintext." Here, parity refers to the XOR sum of all the bits.
In 1995, Ken Shirriff found a differential attack on Madryga that requires 5,000 chosen plaintexts. Biryukov and Kushilevitz (1998) published an improved differential attack requiring only 16 chosen-plaintext pairs, and then demonstrated that it could be converted to a ciphertext-only attack using 212 ciphertexts, under reasonable assumptions about the redundancy of the plaintext (for example, ASCII-encoded English language). A ciphertext-only attack is devastating for a modern block cipher; as such, it is probably more prudent to use another algorithm for encrypting sensitive data.
References
Further reading
W. E. Madryga, "A High Performance Encryption Algorithm", Computer Security: A Global Challenge, Elsevier Science Publishers, 1984, pp. 557–570.
Broken block ciphers |
7589671 | https://en.wikipedia.org/wiki/List%20of%20The%20Adventures%20of%20the%20Galaxy%20Rangers%20characters | List of The Adventures of the Galaxy Rangers characters | This article showcases characters from the television show The Adventures of the Galaxy Rangers.
Protagonists
Series 5 Rangers
All of the Rangers must touch their badges on their uniforms in order to activate their series 5 implants. The Rangers are:
Zachary Foxx
Zachary Foxx is the captain of the series 5 Rangers. He was seriously injured in a battle with a space Pirate named Captain Kidd and his entire left side was replaced with bionics which allow him to fire blasts of energy with his left arm and gives him extraordinary strength. Within Captain Zachary Foxx, the implant's function is simply to act as a power conduit: triggering the badge activates a sequence of events that supercharges his left-side bionics and enables either a boosting of the myomer muscles and tendons, or a channelling of bioelectrical energy through the bionic amplifiers to produce an energy blast of up to 16 standard carbine shots, which makes him capable of blasting a wall apart, spot-welding circuitry, or possibly punching through a ship's hull. He is married and a father of two. His wife's mind was kidnapped by the Queen of the Crown and is contained in a "psychocrystal".
Foxx was voiced by veteran actor Jerry Orbach.
Shane Gooseman
Shane "Goose" Gooseman was genetically produced in a test tube as part of a government genetic experiment to create a group of enhanced mutant soldiers known as "Supertroopers". A civilian adviser dosed the Supertroopers with a gas meant to speed up their mutation and make them more powerful, but it had the side effect of making the Supertroopers more aggressive and mentally unstable. Goose was at the firing range at the time, and thus avoided the gas, thereby becoming the only remaining unaffected trooper. The other troopers had to be cryogenically imprisoned, but some escaped. Goose was given the option to avoid cryogenic freezing on the condition that he join the Galaxy Rangers and hunt down the escaped Supertroopers. His series 5 bionic implants allow him limited control over his body's molecules giving him the ability to heal, absorb energies, and adapt to various environmental conditions by temporary shapeshifting. He is not a metamorph (i.e., he cannot choose specific forms), his power evolves and adapts his body to the environment he's in. Ranger Gooseman's implant supercharges his genetic bio-defenses, enabling them to react almost instantly, instead of minutes or hours, as would normally happen. This brings him close to the level of the rogue Supertroopers, and makes him the only one capable of going one-on-one with them in personal combat. His characterization is heavily inspired by Clint Eastwood. It is also noted during the show's credits that he is the only Supertrooper with compassion.
Niko
Niko is an archaeologist specialising in ancient cultures, and has innate psychic abilities. She carries a large gun and knows martial arts. Her series 5 implant boosts her psychic abilities and she can create shields, lift objects, and has clairvoyance. Ranger Niko's implant acts as a psionic amplifier, boosting her innate psionic abilities by adding power from the converted radiation into a psionic boost which can increase her range from simple tactile up to lightyears distant. She can also generate a shield of ambient energy which will dramatically drain her implant, but can be augmented by touching the other rangers and drawing power from them. This shield can defend against all forms of attack, but cannot be held for long. Throughout the series a romantic tension exists between her and Goose.
Born on the failed colony world of Alspeth, she was found after the destruction of her colony by Ariel from the haven world of Xanadu. Having been relocated to her new haven, Niko was raised and her psychic abilities were nurtured. At the age of 19, she left Xanadu to return to her people and joined the Galaxy Rangers. After the academy, she was accepted into the experimental Series 5 program. She was later assigned to the Series 5 Rangers as their mystic and archaeological expert - due to the number of missions they embarked on involving new cultures and varied belief systems.
Walter Hartford
Walter "Doc" Hartford is a swashbuckling character who fights with a sword, a gun, and his fists. He is a computer genius who, along with the BETA Scientist 'Q-Ball', is responsible for most of the automated systems that the Galaxy Rangers use daily. His series 5 implants allow him to control any computer system through the use of "programs" which appear as flying holographic computer animated geometric shapes that he can communicate with. Ranger Hartford's implant produces the oddest effects- and they still cannot properly be explained. Commander Walsh puts it best: Doc Hartford, your implant makes you a computer wizard, able to conjure fantastic programs.
It appears that Doc is able to bring his thoughts to life with the use of the implant and his Computer Diagnostic Unit; a compact computer which has advanced diagnostics and maintenance functions, along with sensory and computer linkage capability. The CDU acts as a focus for Doc's implant power, and also as a storage facility for his "tweakers" (Pathfinder, Tripwire, Firefly, Searchlight, Lifeline and Pixel); the computer programs that are part of his personality and which offer capabilities far beyond any normal computer program, virus, or worm.
Tweakers (in CDU): Tripwire and Pathfinder are most often called forward in the show, for unlocking, disabling or hacking into a lock or protected interfaces to access foreign computer systems (pathfinder more for data acquisition types of calls but can do similar things as "Tripwire"), Firefly more for brute force breaking into highly protected systems (quick exit kind of situations, where they don't care about how a computer system's condition is left afterwards), etc). I'm not sure, but there is another one called "Trooper," will verify soon with an Episode number as reference as well.
Hartford, from the Island of Jamaica, was born to wealthy parents, and so he was educated in private school, topped off with Mrs. Abercrombies Charm and Finishing School. He left there to join the Ranger Corps after he signed up with some biochemical corporations to help them produce better computer programs, but found out that his skills were not being challenged.
Other
Eliza Foxx
She is kidnapped by the queen and held captive.
Waldo Zeptic
Waldo is the Ambassador from Andor and possibly creator of the Andorian hyperdrive. Very tall and distinguished, he is highly amusing when paired with Ambassador Zozo of Kirwin. The ambassadors are in very close contact with the Rangers and Commander Walsh at all times, and are friends of the Foxx family. Waldo is also a brilliant mathematician and engineer. He avoids violence, but will protect himself with a personal force field. However, if imprisoned or caged, he like other Andorians, loses control of his emotions and undergoes a de-evolution to a savage beast.
Zozo
Zozo is the ambassador from the farm planet of Kirwin. The Kiwi are very much the opposite of the Andorians; whereas the Andorians are a highly technical society and coolly logical people, the Kiwi are very "down-to-earth" and emotional. Zozo is cheerful, loves a good time, and approaches most everything with a sense of humor.
Commander Walsh
Commander Joseph Walsh is the Rangers' commanding officer, as well as the head of BETA, (Bureau for Extra-Terrestrial Affairs) located in Beta Mountain. Brown hair (with grey at temples) brown eyes, assumed to be in his late forties. With Dr. Negata, he was in charge of the failed Supertrooper Project, of which Shane Gooseman is the only sane survivor. The Rangers are his friends, and Gooseman is something of the son he never had. He has been known to bend the rules for them such as when the Council of Leaders of the World Federation (typified by Senator Weiner) tried to put Goose behind bars for a crime he didn't commit. Walsh is something of a controversial character. It's implied in "Supertroopers" that he and Wheiner keep each other in check through a complicated web of mutual blackmail, and a series of "deals." Some of these "deals" involve bending the rules for his Rangers, but others might wind up harmful to them. He, Nagata, and Wheiner are the only ones who know about Shane being his "son".
Buzzwang
Buzzwang, or "Buzz" for short, is an android whose biggest dream was to become a ranger, which he eventually did. He is Q-ball's go-fer, and in his spare time, he likes to breakdance. There are two versions of Buzzwang, most notably the pre-Tune-up and post Tune-up model, though the "personality" remains completely intact.
Q-Ball
Q-Ball - a comic relief mad scientist.
Cybersteeds
The Cybersteeds - robot horses. They feature prominently in the opening credits. The Cybersteeds ridden by the Galaxy Rangers are the most advanced animatronic robots so far designed by the scientists at BETA and the Long Shot Research facility.
The Cybersteeds comprise fully intelligent Artificial Intelligences combined with robot chassis in the form of a horse - enabling speech, great stability, and speed over all types of terrain.
Each Ranger has a Cybersteed matched to them, and each horse is built especially for his or her rider. The four horses are Triton (silver, Goose), Voyager (blue, Niko [although Doc often rides her]), Mel (tan, Doc [although Niko often rides him]), and Brutus (gold, Zachary Foxx [although he is listed as Z100 in the DVD booklet]). All the cybersteeds are presumed male except for Voyager, and their riders change after the second episode.
Triton is the most prominent cybersteed; it is mentioned that he is the fastest and that no one but Goose may ride him. He is the only one to speak regularly, and Goose has a very strong bond with him, unlike the owners of the other cybersteeds. He is also the most technologically advanced cybersteed (a 5000 model).
After Triton, Voyager is the second most prominent. She is mentioned as having bugs in her system, which is evident in her reasoning and the fact that she can never get Doc's name right. She and Mel are presumed to be 4000 models, and Niko and Doc often switch cybersteeds, depending on the episode.
Brutus only speaks in one episode, but he is mentioned to be the least technologically advanced. However, even as a 3000 model, he is still the strongest cybersteed.
Antagonists
Captain Kidd
Captain Kidd is a Plitsky (a bird-like species) pirate. He was seen in "Phoenix" as a menacing, if bumbling, pirate that captured the ship transporting the Foxx family to Kirwin. Annoyed by the Queen's refusal to allow him to take the ship as a prize vessel and her decision to take control of the situation away from him, he turned on her.
This of course, made Kidd a wanted man. He cut a deal to aid the Rangers in exchange for a "trade alliance" and continued freedom ("New Phoenix"). Other appearances have him helping BETA make first contact with the xenophobic Traash and taking possession of a memory bird (talking android birds that are used to store sensitive data) that had half of its circuitry corrupted. He also sold counterfeit starstones to the Crown, powering an armada that threatened to destroy Earth until Kidd let the Rangers in on how easy it was to destroy the brittle fakes. Consequently, Kidd became indirectly responsible for the destruction of much of the Crown fleet.
Series Creator Robert Mandell admitted in Starlog that he intended Kidd to be much more threatening, but he "became our Harry Mudd."
Lazarus Slade
Lazarus Slade is a scientist who works for the Queen of the Crown and helps devise schemes to defeat the Galaxy Rangers.
Daisy O'Mega
Daisy O'Mega is a female space pirate who appeared in the episode, "Renegade Rangers". She stole the U.S.S. Cheyenne from the Space Navy during the Quadrant 4 War Games. She planned to use the Cheyenne to steal weapons from the Longshot research facility. Ms. O'Mega was very briefly a romantic interest for Shane Gooseman, which made Nico visibly jealous.
Nimrod the Cat
Nimrod the Cat a leonine humanoid villain wearing a multi-colored mane reminiscent of a rainbow wig. Nimrod was first seen in the episode "The Power Within", where he introduced himself as Hunter of the Horns and Gooseman says Nimrod escaped from the Deltoid Rock. In the story, Nimrod captures and deprives the Rangers of the use of their Series 5 badges, but using simple human skills, they pass his tests and prove themselves worthy of preservation.
In other appearances, he was less of a villain. His attempt to form a rock band in "Battle of the Bandits" met with resounding success, but the stage act of impersonating Slaverlords enraged the Queen, who saw to it that his backup band was replaced with real Slaverlords, and that Nimrod would be forced to capture the audience for the Queen's psychocrypt. Between the Rangers, and the rogue apprentice of Mogul the sorcerer, the plot fell to shambles and Nimrod escaped with his hide. In "Murder on the Andorian Express," he actually aided Doc and Niko in tracking a Crown assassin on a luxury liner, explaining it all away as a game and once again vanishing into the crowd.
Queen of the Crown
The Queen of the Crown is the head of a vast and crumbling empire. We see instances of Crown conquests and atrocities in "Tortuna" where it is explained that she destroyed virtually all of Tortuna's population outside of a handful of domed cities. In "Queen's Lair," she enslaves the planet Wollcam and manufactures a gigantic gun that blasts a hole in the moon, attempting to ransom Earth for 5000 human lives.
The Queen is an accomplished sorceress who often uses technology to make her considerable power all the more vile. Her psychocrypt and mind-link with the Slaverlords is but one example. In "Mindnet," she takes control of an experimental telepathy booster, which is later used in "Battle of the Bands" to control the minds of thousands of sentients attending a rock concert. Perhaps her most bone-chilling accomplishment was a machine that used Eliza's psychocrystal for power. It not only threatened to kill Eliza, but subjected Zachary to a form of mental torture. Driven to near insanity by the combination, he made a suicidal attempt to break into the Queen's palace. He was quickly captured and turned into a Slaverlord himself. The other three Rangers were able to rescue him, and the machine was rendered useless, but Eliza was never rescued during the series.
Scarecrow
The Scarecrow is an ancient, powerful alien monstrosity created for a long-ago war between the (then) technologically advanced Tarkon and a now-forgotten enemy. Even though the war is thousands of years over, he still is primarily motivated to destroy the living, ancient machine.
Upon defeat, it was forced into hibernation for uncounted millennia under the surface of the planet Granna (he mentions the figure "a hundred million years" but this could be an exaggeration). The entity was disturbed; forcibly awakened by a Kiwi agricultural analysis device whose rumbling thumpings stirred the creature back into consciousness. Scarecrow sustains himself by draining, fatally, the life force of others. His first victims were a sheriff and deputy sent out on patrol from the colony, followed by one of the colonists. Niko almost became another of his victims, but Goose was able to track him to a farmhouse. It was here that Goose gave the entity the moniker "Scarecrow," named after a ghost story he heard from the locals. During the fight, the house caught fire, and Scarecrow was trapped inside while Goose and Zozo managed to flee. The Scarecrow was seen fleeing the burning house covered in flames and cackling maniacally.
Later appearances placed him draining entire Tarkonian villages of their lifeforce in an attempt to gain enough power to kill the Heart of Tarkon (another ancient weapon which could destroy him) ("Scarecrow's Revenge") and crashlanding on Mesa ("Aces and Apes"). In the final episode of the series, he infiltrates the Tarkonian court, exerting a powerful mental control over the court until Doc, Princess Maya, King Spartos, and the court Shaman reactivate the Heart and the defenses of the planet. The Heart dispatched the Scarecrow, but we can never know for sure if that was indeed the end of the hard-to-kill foe.
Supertroopers
The Supertroopers are a group of genetically engineered supersoldiers that Goose must hunt down. They include:
Brainchild
Brainchild is a genetically enhanced general for the supertroopers who is super-intelligent, paranoid, and arrogant, designed to be a master strategist.
Chimera
A female supertrooper, shapeshifter and illusionist, who uses deception and surprise to attack at will. She has combat techniques, advanced hand-to-hand combat skills, she has the ability to alter either her own appearance, or create an illusion within the minds of those around her, including supertroopers, that she has vanished or changed shape.
Darkstar
Her major ability is to be able to generate a field of darkness via a series of dark globules that move outwards from her and surround the target, effectively blinding them for a short periods of time. Her powers, enhanced by the Wolf Den incident, now enable her to produce permanent blindness in her targets, if she so desires. She also heals faster than a normal human, and has enhanced reflexes that enable her to be an effective close combat soldier. Stingray's lover, although Goose once had a crush on her.
Gravestone
Gravestone is designed to be the ultimate gladiatorial combat warrior. He has highly enhanced strength, thickened skin, and bulked muscle, to enable him to withstand most forms of hand-to-hand combat. Furthermore, Gravestone's chief genetic ability is be able to transform his skin into a hard, granite-like rock, enabling him to pound anything—even buildings—into rubble, and rendering him invulnerable to many forms of conventional attack.
As a result of his exposure to the X-Factor agent, Gravestone's powers can be enhanced further by absorbing energy, which supercharges his system, blowing his strength and shutting down his higher brain functions.
Jackhammer
Jackhammer is a front-line agent whose very fast reflexes enable him to live up to his name. Jackhammer was once clocked at two hundred blows per minute in testing. With the strength he can bring to bear, this level of impact can generate sympathetic vibrations in structures sufficient to collapse buildings and damage the foundations of bridges, etc.
He has also got one of the most active healing agents of any supertrooper, which is almost as effective as the Bio-Defence, but simply enables Jackhammer to get up again after any attack.
Ryker Killbane
Ryker Killbane is a bio-defense close combat soldier. In some ways, he is the prototype for the type of Soldier that Shane Gooseman was crafted on. During the early years at Wolf Den, since Shane was a late arrival, being much younger than the majority of the other Supertroopers, he was considered the 'baby' of the group. Killbane took a perverse pleasure in belittling the other man, going so far as to call him runt at almost every occasion. Killbane has bio-defense abilities similar to Gooseman's, but also has the ability to blow poison gas from glands in his mouth, much like a lizard or snake can release venom. Ryker Killbane has become twisted by the genetic enhancement and has focused all his rage and anger on Shane Gooseman, whom he perceives as the enemy. This is both due to the rivalry they both participated in during their time at Wolf Den and the fact that Gooseman was always being 'coddled' by Walsh, and given somewhat preferential treatment. Killbane is very self-centered, always thinking of himself before anybody else - a holdover from the days at the project. In the encounters since the Wolf Den days, Killbane has tried to attack or disable Gooseman, the only one really capable of seriously injuring him outside of the other Supertroopers.
Stingray
Stingray is an Energy Projector. His primary ability is to be able to channel bio-electric energy along his optic nerves, which have been altered to lase the energy into a powerful beam of light. This capability was counted on to protect him, so he was not really enhanced in any other manner. He is only slightly stronger than a normal human, but does have the same rapid healing factor as the other Supertroopers. Stingray speaks in an Australian accent, and Darkstar's lover.
In addition to the powers listed, the Supertroopers also have enhanced reflexes and rapid healing abilities, except for Brainchild, who was not designed for combat.
References
Adventures of the Galaxy Rangers, The
Lists of animated science fiction television characters |
18641672 | https://en.wikipedia.org/wiki/Stiff%20diagram | Stiff diagram | A Stiff diagram, or Stiff pattern, is a graphical representation of chemical analyses, first developed by H.A. Stiff in 1951. It is widely used by hydrogeologists and geochemists to display the major ion composition of a water sample. A polygonal shape is created from four parallel horizontal axes extending on either side of a vertical zero axis. Cations are plotted in milliequivalents per liter on the left side of the zero axis, one to each horizontal axis, and anions are plotted on the right side. Stiff patterns are useful in making a rapid visual comparison between water from different sources. An alternative to the Stiff diagram is the Maucha diagram.
Stiff diagrams can be used:
1) to help visualize ionically related waters from which a flow path can be determined, or;
2) if the flow path is known, to show how the ionic composition of a water body changes over space and/or time.
A typical Stiff diagram is shown in the figure (right). By standard convention, Stiff diagrams are created by plotting the equivalent concentration of the cations to the left of the center axis and anions to the right. The points are connected to form the figure. When comparing Stiff diagrams between different waters it is important to prepare each diagram using the same ionic species, in the same order, on the same scale.
Environmental laboratories typically report concentrations for anion and cation parameters using units of mass/volume, usually mg/L. In order to convert the mass concentration to an equivalent concentration the following mathematical relationship is used:
(mass concentration) * (ionic charge) / (molecular weight) = (equivalent concentration)
For example, a water with a calcium concentration of 120 mg/L would have the following calcium equivalent concentration:
(120 mg/L) * (2 meq/mmol) / (40 mg/mmol) = 6 meq/L
Software programs in common use
HyCA Commercial software available from KWR waterware
AqQA Commercial software available from RockWare, Inc.
AquaChem Commercial software from Schlumberger Water Services
ChemPoint Pro Commercial software from Starpoint software, Inc.
Sanitas Commercial software from Sanitas Technologies LLC
The Geochemist's Workbench Commercial software from Aqueous Solutions LLC
GWB Community Edition Free community edition of the popular geochemical modeling software package.
RockWorks Utilities Commercial software from RockWare, Inc.
EnviroInsite Commercial software from HydroAnalysis, Inc.
Python Scripts Free open-source Python scripts that can plot stiff diagrams.
References
Fetter. Applied Hydrogeology, 4th Edition. 2001. p. 376
Drever, James I. The Geochemistry of Natural Waters, Surface and Groundwater Environments, Third Edition. Upper Saddle River, NJ: Prentice Hall, 2002.
Stiff, H.A., Jr., 1951, The interpretation of chemical water analysis by means of patterns: Journal of Petroleum Technology, v. 3. no. 10, section 1: p15,16 and section 2: p3.
Analytical chemistry
Water chemistry |
383680 | https://en.wikipedia.org/wiki/Index%20register | Index register | An index register in a computer's CPU is a processor register or assigned memory location used for modifying operand addresses during the run of a program. This proved useful for doing vector/array operations and in commercial data processing for navigating from field to field within records. In both uses index registers substantially reduced the amount of memory used and increased execution speed.
The contents of an index register is added to (in some cases subtracted from) an immediate address (one that is part of the instruction itself) to form the "effective" address of the actual data (operand). Special instructions are typically provided to test the index register and, if the test fails, increments the index register by an immediate constant and branches, typically to the start of the loop. Some instruction sets allow more than one index register to be used; in that case additional instruction fields specify which index registers to use. While normally processors that allow an instruction to specify multiple index registers add the contents together, IBM had a line of computers in which the contents were or'd together.
In early computers without any form of indirect addressing, array operations had to be performed by modifying the instruction address, which required several additional program steps and used up more computer memory, a scarce resource in computer installations of the early era (as well as in early microcomputers two decades later).
History
Index registers, commonly known as a B-line in early British computers, were first used in the British Manchester Mark 1 computer, in 1949. In general, index registers became a standard part of computers during the technology's second generation, roughly 1954–1966. Most machines in the IBM 700/7000 mainframe series had them, starting with the IBM 704 in 1954, though they were optional on some smaller machines such as the IBM 650 and IBM 1401.
Early "small machines" with index registers include the AN/USQ-17, around 1960, and the 9 series of real-time computers from Scientific Data Systems, from the early 1960s.
While the Intel 8080 allowed indirect addressing via a register, the first microprocessor with a true index register appears to have been the Motorola 6800, and the similar MOS Technology 6502 made good use of two such registers.
Modern computer designs generally do not include dedicated index registers; instead they allow any general purpose register to contain an address, and allow a constant value and, on some machines, the contents of another register to be added to it as an offset to form the effective address. Early computers designed this way include the PDP-6 and the IBM System/360.
Example
Here is a simple example of index register use in assembly language pseudo-code that sums a 100 entry array of 4-byte words:
Clear_accumulator
Load_index 400,index2 //load 4*array size into index register 2 (index2)
loop_start : Add_word_to_accumulator array_start,index2 //Add to AC the word at the address (array_start + index2)
Branch_and_decrement_if_index_not_zero loop_start,4,index2 //loop decrementing by 4 until index register is zero
See also
For loop
Notes
References
Control flow
Central processing unit
Digital registers |
24102707 | https://en.wikipedia.org/wiki/Modula-2 | Modula-2 | Modula-2 is a structured, procedural programming language developed between 1977 and 1985 by Niklaus Wirth at ETH Zurich. It was created as the language for the operating system and application software of the Lilith personal workstation. It was later used for programming outside the context of the Lilith.
Wirth viewed Modula-2 as a successor to his earlier programming languages Pascal and Modula. The main concepts are:
The module as a compiling unit for separate compiling
The coroutine as the basic building block for concurrent processes
Types and procedures that allow access to machine-specific data
The language design was influenced by the Mesa language and the Xerox Alto, both from Xerox PARC, that Wirth saw during his 1976 sabbatical year there. The computer magazine Byte devoted the August 1984 issue to the language and its surrounding environment.
Modula-2 was followed by Modula-3, and later by the Oberon series of languages.
Description
Modula-2 is a general purpose procedural language, sufficiently flexible to do systems programming, but with much broader application. In particular, it was designed to support separate compiling and data abstracting in a straightforward way. Much of the syntax is based on Wirth's earlier and better-known language, Pascal. Modula-2 was designed to be broadly similar to Pascal, with some elements and syntactic ambiguities removed and the important addition of a module concept, and direct language support for multiprogramming.
The language allows use of one-pass compilers. Such a compiler by Gutknecht and Wirth was about four times faster than earlier multi-pass compilers.
Here is an example of the source code for the "Hello world" program:
MODULE Hello;
FROM STextIO IMPORT WriteString;
BEGIN
WriteString("Hello World!")
END Hello.
A Modula-2 module may be used to encapsulate a set of related subprograms and data structures, and restrict their visibility from other parts of the program. The module design implemented the data abstraction feature of Modula-2 in a very clean way. Modula-2 programs are composed of modules, each of which is made up of two parts: a definition module, the interface portion, which contains only those parts of the subsystem that are exported (visible to other modules), and an implementation module, which contains the working code that is internal to the module.
The language has strict scope control. The scope of a module can be considered as an impenetrable wall: Except for standard identifiers, no object from the outside is visible inside a module unless explicitly imported; no internal module object is visible from the outside unless explicitly exported.
Suppose module M1 exports objects a, b, c, and P by enumerating its identifiers in an explicit export list
DEFINITION MODULE M1;
EXPORT QUALIFIED a, b, c, P;
...
Then the objects a, b,c, and P from module M1 become now known outside module M1 as M1.a, M1.b, M1.c, and M1.P. They are exported in a qualified manner to the outside (assumed module M1 is global). The exporting module's name, i.e. M1, is used as a qualifier followed by the object's name.
Suppose module M2 contains the following IMPORT declaration
MODULE M2;
IMPORT M1;
...
Then this means that the objects exported by module M1 to the outside of its enclosing program can now be used inside module M2. They are referenced in a qualified manner, thusly: M1.a, M1.b, M1.c, and M1.P. Example:
...
M1.a := 0;
M1.c := M1.P(M1.a + M1.b);
...
Qualified export avoids name clashes: For example, if another module M3 would also export an object called P, then we can still distinguish the two objects, since M1.P differs from M3.P. Thanks to the qualified export it does not matter that both objects are called P inside their exporting modules M1 and M3.
An alternative method exists, which is in wide use by Modula-2 programmers. Suppose module M4 is formulated as this:
MODULE M4;
FROM M1 IMPORT a, b, c, P;
Then this means that objects exported by module M1 to the outside can again be used inside module M4, but now by mere references to the exported identifiers in an unqualified manner, thusly: a, b, c, and P. Example:
...
a := 0;
c := P(a + b);
...
This method of unqualifying import allows use of variables and other objects outside their exporting module in exactly the same simple, i.e. unqualified, manner as inside the exporting module. The walls surrounding all modules have now become irrelevant for all those objects for which this has been explicitly allowed. Of course unqualifying import is only usable if there are no name clashes.
These export and import rules may seem unnecessarily restrictive and verbose. But they do not only safeguard objects against unwanted access, but also have the pleasant side-effect of providing automatic cross-referencing of the definition of every identifier in a program: if the identifier is qualified by a module name, then the definition comes from that module. Otherwise if it occurs unqualified, simply search backwards, and you will either encounter a declaration of that identifier, or its occurrence in an IMPORT statement which names the module it comes from. This property becomes very useful when trying to understand large programs containing many modules.
The language provides for (limited) single-processor concurrency (monitors, coroutines and explicit transfer of control) and for hardware access (absolute addresses, bit manipulation, and interrupts). It uses a nominal type system.
Dialects
There are two major dialects of Modula-2. The first is PIM, named for the book Programming in Modula-2 by Niklaus Wirth. There were three major editions of PIM: the second, third (corrected), and fourth. Each describes slight variants of the language. The second major dialect is ISO, named for the standardization effort by the International Organization for Standardization. Here are a few of the differences among them.
PIM2 (1983)
Required explicit EXPORT clause in definition modules.
Function SIZE needs to be imported from module SYSTEM
PIM3 (1985)
Removed the EXPORT clause from definition modules following the observation that everything within a definition module defines the interface to that module, hence the EXPORT clause was redundant.
Function SIZE is pervasive (visible in any scope without import)
PIM4 (1988)
Specified the behaviour of the MOD operator when the operands are negative.
Required all ARRAY OF CHAR strings to be terminated by ASCII NUL, even if the string fits exactly into its array.
ISO (1996, 1998)
ISO Modula-2 resolved most of the ambiguities in PIM Modula-2. It added the data types COMPLEX and LONGCOMPLEX, exceptions, module termination (FINALLY clause) and a complete standard input/output (I/O) library. There are many minor differences and clarifications.
Supersets
There are several supersets of Modula-2 with language extensions for specific application domains:
PIM supersets
Canterbury Modula-2, extended with Oberon-like extensible records [This has been withdrawn and is no longer available anywhere]
Modula-2+, extended with preemptive threads and exceptions
Modula-2*, parallel extension
Modula-P, another parallel extension
Modula–Prolog, adds a Prolog layer
Modula/R, adds relational database extensions
Modula-GM, adds embedded system extensions
ISO supersets
ISO10514-2, adds an object-oriented programming layer
ISO10514-3, adds a generic programming (generics) layer
IEC supersets
Mod51, extended with IEC1131 constructs for embedded development
Derivatives
There are several derivative languages that resemble Modula-2 very closely but are new languages in their own right. Most are different languages with different purposes and with strengths and weaknesses of their own:
Modula-3, developed by a team of ex-Xerox employees who had moved to DEC and Olivetti
Oberon, developed at ETH Zürich for System Oberon available online.
Oberon-2, Oberon with OO extensions
Active Oberon, yet another object-oriented Extension of Oberon, developed also at ETH with the main objective to support parallel programming on multiprocessor and multicore systems.
Parallaxis, a language for machine-independent data-parallel programming
Umbriel, developed by Pat Terry as a teaching language
YAFL, a research language by Darius Blasband
Many other current programming languages have adopted features of Modula-2.
Language elements
Reserved words
PIM [2,3,4] defines 40 reserved words:
AND ELSIF LOOP REPEAT
ARRAY END MOD RETURN
BEGIN EXIT MODULE SET
BY EXPORT NOT THEN
CASE FOR OF TO
CONST FROM OR TYPE
DEFINITION IF POINTER UNTIL
DIV IMPLEMENTATION PROCEDURE VAR
DO IMPORT QUALIFIED WHILE
ELSE IN RECORD WITH
Built-in identifiers
PIM [3,4] defines 29 built-in identifiers:
ABS EXCL LONGINT REAL
BITSET FALSE LONGREAL SIZE
BOOLEAN FLOAT MAX TRUE
CAP HALT MIN TRUNC
CARDINAL HIGH NIL VAL
CHAR INC ODD
CHR INCL ORD
DEC INTEGER PROC
Embedded system use
Modula-2 is used to program many embedded systems.
Cambridge Modula-2
Cambridge Modula-2 by Cambridge Microprocessor Systems is based on a subset of PIM4 with language extensions for embedded development. The compiler runs on DOS and it generates code for Motorola 68000 series (M68k) based embedded microcontrollers running a MINOS operating system.
Mod51
Mod51 by Mandeno Granville Electronics is based on ISO Modula-2 with language extensions for embedded development following IEC1131, an industry standard for programmable logic controllers (PLC) closely related to Modula-2. The Mod51 compiler generates standalone code for 80C51 based microcontrollers.
Modula-GM
Delco Electronics, then a subsidiary of GM Hughes Electronics, developed a version of Modula-2 for embedded control systems starting in 1985. Delco named it Modula-GM. It was the first high-level programming language used to replace machine code (language) for embedded systems in Delco's engine control units (ECUs). This was significant because Delco was producing over 28,000 ECUs per day in 1988 for GM. This was then the world's largest producer of ECUs. The first experimental use of Modula-GM in an embedded controller was in the 1985 Antilock Braking System Controller which was based on the Motorola 68xxx microprocessor, and in 1993 Gen-4 ECU used by the Champ Car World Series Championship Auto Racing Teams (CART) and Indy Racing League (IRL) teams. The first production use of Modula-GM was its use in GM trucks starting with the 1990 model year vehicle control module (VCM) used to manage GM Powertrain's Vortec engines. Modula-GM was also used on all ECUs for GM's 90° Buick V6 engine family 3800 Series II used in the 1997-2005 model year Buick Park Avenue. The Modula-GM compilers and associated software management tools were sourced by Delco from Intermetrics.
Modula-2 was selected as the basis for Delco's high level language because of its many strengths over other alternative language choices in 1986. After Delco Electronics was spun off from GM (with other component divisions) to form Delphi Automotive Systems in 1995, global sourcing required that a non-proprietary high-level software language be used. ECU embedded software now developed at Delphi is compiled with commercial compilers for the language C.
Russian radionavigation satellites
The satellites of the Russian radionavigation-satellite service framework GLONASS, similar to the United States Global Positioning System (GPS), are programmed in Modula-2.
Compilers
Amsterdam Compiler Kit (ACK) Modula-2 – for MINIX; freeware
ADW Modula-2 – for Windows, ISO compliant, ISO/IEC 10514-1, ISO/IEC 10514-2 (OO extension), ISO/IEC 10514-3 (Generic extension); freeware
Aglet Modula-2 – for AmigaOS 4.0 for PowerPC; freeware
Fitted Software Tools (FST) Modula-2 – for DOS; freeware
Gardens Point Modula-2 (GPM) – for BSD, Linux, OS/2, Solaris; ISO compliant; freeware, as of 30 July 2014
Gardens Point Modula-2 (GPM/CLR) – for .NET Framework; freeware
GNU Modula-2 – for GCC platforms, version 1.0 released December 11, 2010; compliance: PIM2, PIM3, PIM4, ISO; free software, GNU General Public License (GPL)
M2Amiga – for Amiga; free software
M2M – by N. Wirth and collaborators from ETH Zurich, cross-platform, generates M-code for virtual machine; freeware
MacMETH – by N. Wirth and collaborators from ETH Zurich for Macintosh, Classic only; freeware
Mod51 – for the Intel 80x51 microcontroller family, ISO compliant, IEC1132 extensions; proprietary software
Megamax Modula-2 – for Atari ST with documentation in German only; freeware
Modula-2 R10 – reference compiler for this Modula; open-source, peer review
ModulaWare – for OpenVMS (VAX and Alpha), ISO compliant; proprietary software
ORCA/Modula-2 – for Apple IIGS by The Byte Works for the Apple Programmer's Workshop
p1 Modula-2 – for Macintosh, Classic and macOS (PowerPC and Carbon (API) only), ISO compliant; proprietary software
MOCKA – for various platforms, PIM compliant; commercial, freeware Linux/BSD versions
TDI Modula-2 – for Atari ST, by TDI Software
Terra M2VMS – for OpenVMS (VAX and Alpha), PIM compliant; proprietary software
m2c, Ulm Modula-2 System – for Solaris (Sun SPARC and Motorola 68k); free software, GNU General Public License (GPL)
XDS – ISO compliant, TopSpeed compatible library: Native XDS-x86 for x86 (Windows and Linux); XDS-C for Windows and Linux (16- and 32-bit versions), targets C (K&R & ANSI); freeware
Turbo Modula-2
Turbo Modula-2 was a compiler and an integrated development environment for MS-DOS developed, but not published, by Borland. Jensen and Partners, which included Borland cofounder Niels Jensen, bought the unreleased codebase and turned it into TopSpeed Modula-2. It was eventually sold to Clarion, now owned by SoftVelocity, which still offers the Modula-2 compiler as part of its Clarion product line.
A Zilog Z80 CP/M version of Turbo Modula-2 was briefly marketed by Echelon under license from Borland. A companion release for Hitachi HD64180 was sold by Micromint as a development tool for their SB-180 single-board computer.
IBM Modula-2
IBM had a Modula-2 compiler for internal use which ran on both OS/2 and AIX, and had first class support in IBM's E2 editor. IBM Modula-2 was used for parts of the OS/400 Vertical Licensed Internal Code (effectively the kernel of OS/400). This code was mostly replaced with C++ when OS/400 was ported to the IBM RS64 processor family, although some remains in modern releases of the operating system. A Motorola 68000 backend also existed, which may have been used in embedded systems products.
Operating systems
Modula-2 is used to program some operating systems (OSs). The Modula-2 module structure and support are used directly in two related OSs.
The OS named Medos-2, for the Lilith workstation, was developed at ETH Zurich, by Svend Erik Knudsen with advice from Wirth. It is a single user, object-oriented operating system built from Modula-2 modules.
The OS named Excelsior, for the Kronos workstation, was developed by the Academy of Sciences of the Soviet Union, Siberian branch, Novosibirsk Computing Center, Modular Asynchronous Developable Systems (MARS) project, Kronos Research Group (KRG). It is a single user system based on Modula-2 modules.
Books
Uses ISO-standard Modula-2.
References
External links
Modula programming language family
Systems programming languages
Programming languages created in 1978
Programming languages with an ISO standard
Statically typed programming languages
High-level programming languages |
2470370 | https://en.wikipedia.org/wiki/Channel%20I/O | Channel I/O | In computing, channel I/O is a high-performance input/output (I/O) architecture that is implemented in various forms on a number of computer architectures, especially on mainframe computers. In the past, channels were generally implemented with custom devices, variously named channel, I/O processor, I/O controller, I/O synchronizer, or DMA controller.
Overview
Many I/O tasks can be complex and require logic to be applied to the data to convert formats and other similar duties. In these situations, the simplest solution is to ask the CPU to handle the logic, but because I/O devices are relatively slow, a CPU could waste time (in computer perspective) waiting for the data from the device. This situation is called 'I/O bound'.
Channel architecture avoids this problem by processing some or all of the I/O task without the aid of the CPU by offloading the work to dedicated logic. Channels are logically self-contained, with sufficient logic and working storage to handle I/O tasks. Some are powerful or flexible enough to be used as a computer on their own and can be construed as a form of coprocessor, for example, the 7909 Data Channel on an IBM 7090 or IBM 7094; however, most are not. On some systems the channels use memory or registers addressable by the central processor as their working storage, while on other systems it is present in the channel hardware. Typically, there are standard interfaces between channels and external peripheral devices, and multiple channels can operate concurrently.
A CPU typically designates a block of storage or sends a relatively small channel program to the channel in order to handle I/O tasks, which the channel and controller can, in many cases, complete without further intervention from the CPU (exception: those channel programs which utilize 'program controlled interrupts', PCIs, to facilitate program loading, demand paging and other essential system tasks).
When I/O transfer is complete or an error is detected, the controller typically communicates with the CPU through the channel using an interrupt. Since the channel normally has direct access to the main memory, it is also often referred to as a direct memory access (DMA) controller.
In the most recent implementations, the channel program is initiated and the channel processor performs all required processing until either an ending condition or a program controlled interrupt (PCI). This eliminates much of the CPU—Channel interaction and greatly improves overall system performance. The channel may report several different types of ending conditions, which may be unambiguously normal, may unambiguously indicate an error or whose meaning may depend on the context and the results of a subsequent sense operation. In some systems an I/O controller can request an automatic retry of some operations without CPU intervention. In earlier implementations, any error, no matter how small, required CPU intervention, and the overhead was, consequently, much higher. A program-controlled interruption (PCI) is still used by certain legacy operations, but the trend is to move away from such PCIs, except where unavoidable.
History
The first use of channel I/O was with the IBM 709 vacuum tube mainframe, whose Model 766 Data Synchronizer was the first channel controller, in 1957. Its transistorized successor, the IBM 7090, had two to eight 6-bit channels (the 7607) and a channel multiplexor (the 7606) which could control up to eight channels. The 7090 and 7094 could also have up to eight 8-bit channels with the 7909.
While IBM used data channel commands on some of its computers, and allowed command chaining on, e.g., the 7090, most other vendors used channels that dealt with single records. However, some systems, e.g., GE-600 series, had more sophisticated I/O architectures.
Later, for larger IBM System/360 and System/370 computers the channels were still bulky and expensive separate components, such as the IBM 2860 Selector channel (one to three selector channels in a single box), the IBM 2870 Byte multiplexor channel (one multiplexer channel, and, optionally, one selector subchannel in a single box), and the IBM 2880 Block multiplexor channel (one or two block multiplexor channels in a single box). On the 303x processor complexes, IBM abandoned that implementation and used the same cycle-stealing implementation as on the 370/158. No subsequent product in the System/360 line had hardwired channels.
Amdahl Corporation's hardware implementation of System/370 compatible channels was quite different. A single internal unit, called the "C-Unit", supported up to sixteen channels using the very same hardware for all supported channels. Two internal "C-Units" were possible, supporting up to 32 total channels. Each "C-Unit" independently performed a process generally called a "shifting channel state processor" (a type of barrel processor), which implemented a specialized finite state machine (FSM). Each CPU cycle, every 32 nanoseconds in the 470V/6 and /5 and every 26 nanoseconds in the 470V/7 and /8, the "C-unit" read the complete status of next channel in priority sequence and its I/O Channel in-tags. The necessary actions defined by that channel's last state and its in-tags were performed: data was read from or written to main storage, the operating system program was interrupted if such interruption was specified by the channel program's Program Control Interrupt flag, and the "C-Unit" finally stored that channel's next state and set its I/O Channel out-tags, and then went on to the next lower priority channel. Preemption was possible, in some instances. Sufficient FIFO storage was provided within the "C-Unit" for all channels which were emulated by this FSM. Channels could be easily reconfigured to the customer's choice of selector, byte multiplexor) or block multiplexor channel, without any significant restrictions by using maintenance console commands. "Two-byte interface" was also supported as was "Data-In/Data-Out" and other high-performance IBM channel options. Built-in channel-to-channel adapters were also offered, called CCAs in Amdahl-speak, but called CTCs or CTCAs in IBM-speak. A real game-changer, and this forced IBM to redesign its mainframes to provide similar channel capability and flexibility. IBM's initial response was to include stripped-down Model 158s, operating in "Channel Mode", only, as the Model 303x channel units. In the Amdahl "C-unit" any channel could be any type, selector, byte multiplexor) or block multiplexor, without reserving channels 0 and 4 for the byte multiplexers, as on some IBM models.
For smaller IBM computers, System/360 Models 50 and below, and System/370 Models 158 and below, channels were implemented in the CPU's microcode, and the CPU itself operated in one of two modes, either "CPU Mode" or "Channel Mode", with the channel mode 'stealing' cycles from the CPU mode (IBM 2860, 2870 and 2880, and Amdahl channels had dedicated hardware).
Much later, the channels were implemented as an on-board processor residing in the same box as the CPU, generally referred to as a "channel processor", and which was usually a RISC processor, but which could be a System/390 microprocessor with special microcode as in IBM's CMOS mainframes.
Some of the earliest commercial non-IBM channel systems were on the UNIVAC 490, CDC 1604, Burroughs B5000, UNIVAC 1107 and GE 635. Since then, channel controllers have been a standard part of most mainframe designs and primary advantage mainframes have over smaller, faster, personal computers and network computing.
The 1965 CDC 6600 supercomputer utilized 10 logically independent computers called peripheral processors (PPs) and 12 simple I/O channels for this role. PPs were a modified version of CDC's first personal computers, the 12-bit CDC 160 and 160A. The operating system initially resided and executed in PP0. The channels had no direct access to memory and could not cause interrupts; software on a PP used synchronous instructions to transfer data between the channel and either the A register or PP memory.
Channel controllers have also been made as small as single-chip designs with multiple channels on them, used in the NeXT computers for instance.
At one time many inexpensive computers lacked channel controllers.
Channel controllers are making a comeback in the form of bus mastering peripheral devices, such as PCI direct memory access (DMA) devices. The rationale for these devices is the same as for the original channel controllers, namely off-loading transfer, interrupts, and context switching from the main CPU.
Description
The reference implementation of channel I/O is that of the IBM System/360 family of mainframes and its successors, but similar implementations have been adopted by IBM on other lines, e.g., 1410 and 7010, 7030, and by other mainframe vendors, such as Control Data, Bull (General Electric/Honeywell) and Unisys.
Computer systems that use channel I/O have special hardware components that handle all input/output operations in their entirety independently of the systems' CPU(s). The CPU of a system that uses channel I/O typically has only one machine instruction in its repertoire for input and output; this instruction is used to pass input/output commands to the specialized I/O hardware in the form of channel programs. I/O thereafter proceeds without intervention from the CPU until an event requiring notification of the operating system occurs, at which point the I/O hardware signals an interrupt to the CPU.
A channel is an independent hardware component that coordinates all I/O to a set of controllers or devices. It is not merely a medium of communication, despite the name; it is a programmable device that handles all details of I/O after being given a list of I/O operations to carry out (the channel program).
Each channel may support one or more controllers and/or devices, but each channel program may only be directed at one of those connected devices. A channel program contains lists of commands to the channel itself and to the controller and device to which it is directed. Once the operating system has prepared a complete list of channel commands, it executes a single I/O machine instruction to initiate the channel program; the channel thereafter assumes control of the I/O operations until they are completed.
It is possible to develop very complex channel programs, including testing of data and conditional branching within that channel program. This flexibility frees the CPU from the overhead of starting, monitoring, and managing individual I/O operations. The specialized channel hardware, in turn, is dedicated to I/O and can carry it out more efficiently than the CPU (and entirely in parallel with the CPU). Channel I/O is not unlike the Direct Memory Access (DMA) of microcomputers, only more complex and advanced.
On large mainframe computer systems, CPUs are only one of several powerful hardware components that work in parallel. Special input/output controllers (the exact names of which vary from one manufacturer to another) handle I/O exclusively, and these, in turn, are connected to hardware channels that also are dedicated to input and output. There may be several CPUs and several I/O processors. The overall architecture optimizes input/output performance without degrading pure CPU performance. Since most real-world applications of mainframe systems are heavily I/O-intensive business applications, this architecture helps provide the very high levels of throughput that distinguish mainframes from other types of computers.
In IBM ESA/390 terminology, a channel is a parallel data connection inside the tree-like or hierarchically organized I/O subsystem. In System/390 I/O cages, channels either directly connect to devices which are installed inside the cage (communication adapter such as ESCON, FICON, Open Systems Adapter) or they run outside of the cage, below the raised floor as cables of the thickness of a thumb and directly connect to channel interfaces on bigger devices like tape subsystems, direct access storage devices (DASDs), terminal concentrators and other ESA/390 systems.
Types of channels
Channels differ in the number and type of concurrent I/O operations they support. In IBM terminology, a multiplexer channel supports a number of concurrent interleaved slow-speed operations, each transferring one byte from a device at a time. A selector channel supports one high-speed operation, transferring a block of data at a time. A block multiplexer supports a number of logically concurrent channel programs, but only one high-speed data transfer at a time.
Channels may also differ in how they associate peripheral devices with storage buffers. In UNIVAC terminology, a channel may either be internally specified index (ISI), with a single buffer and device active at a time, or externally specified index (ESI), with the device selecting which buffer to use.
Channel program
A channel program is a sequence of channel command words (CCWs) that are executed by the I/O channel subsystem in the IBM System/360 and subsequent architectures. A channel program consists of one or more channel command words. The operating system signals the I/O channel subsystem to begin executing the channel program with an SSCH (start sub-channel) instruction. The central processor is then free to proceed with non-I/O instructions until interrupted. When the channel operations are complete, the channel interrupts the central processor with an I/O interruption. In earlier models of the IBM mainframe line, the channel unit was an identifiable component, one for each channel. In modern mainframes, the channels are implemented using an independent RISC processor, the channel processor, one for all channels. IBM System/370 Extended Architecture and its successors replaced the earlier SIO (start I/O) and SIOF (start I/O fast release) machine instructions (System/360 and early System/370) with the SSCH (start sub-channel) instruction (ESA/370 and successors).
Channel I/O provides considerable economies in input/output. For example, on IBM's Linux on IBM Z, the formatting of an entire track of a DASD requires only one channel program (and thus only one I/O instruction), but multiple channel command words (one per block). The program is executed by the dedicated I/O processor, while the application processor (the CPU) is free for other work.
Channel command words
A channel command word (CCW) is an instruction to a specialized I/O channel processor which is, in fact, a finite state machine. It is used to initiate an I/O operation, such as "read", "write" or "sense", on a channel-attached device. On system architectures that implement channel I/O, typically all devices are connected by channels, and so all I/O requires the use of CCWs.
CCWs are organized into channel programs by the operating system, and I/O subroutine, a utility program, or by standalone software (such as test and diagnostic programs). A limited "branching" capability, hence a dynamically programmable capability, is available within such channel programs, by use of the "status modifier" channel flag and the "transfer-in-channel" CCW.
Chaining
IBM CCWs are chained to form the channel program. Bits in the CCW indicates that the following location in storage contains a CCW that is part of the same channel program. The channel program normally executes sequential CCWs until an exception occurs, a Transfer-in-Channel (TIC) CCW is executed, or a CCW is executed without chaining indicated. Command chaining tells the channel that the next CCW contains a new command. Data chaining indicates that the next CCW contains the address of additional data for the same command, allowing, for example, portions of one record to be written from or read to multiple data areas in storage (gather-writing and scatter-reading).
Self-modifying channel programs
Channel programs can modify their own operation during execution based on data read. For example, self modification is used extensively in OS/360 ISAM.
Channel program example
The following example reads a disk record identified by a recorded key. The track containing the record and the desired value of the key is known. The device control unit will search the track to find the requested record. In this example <> indicate that the channel program contains the storage address of the specified field.
SEEK <cylinder/head number>
SEARCH KEY EQUAL <key value>
TIC *-8 Back to search if not equal
READ DATA <buffer>
The TIC (transfer in the channel) will cause the channel program to branch to the SEARCH command until a record with a matching key (or the end of the track) is encountered. When a record with a matching key is found the DASD controller will include Status Modifier in the channel status, causing the channel to skip the TIC CCW; thus the channel program will not branch and the channel will execute the READ command.
The above example is correct for unblocked records (one record per block). For blocked records (more than one record per block), the recorded key must be the same as the highest key within that block (and the records must be in key sequence), and the following channel program would be utilized:
SEEK <cylinder/head number>
SEARCH KEY HIGH OR EQUAL <key value>
TIC *-8 Back to search if not high or equal
READ DATA <buffer>
If the dataset is allocated in tracks, and the end of the track is reached without the requested record being found the channel program terminates and returns a "no record found" status indication. Similarly, if the dataset is allocated in cylinders, and the end of the cylinder is reached without the requested record being found the channel program terminates and returns a "no record found" status indication. In some cases, the system software has the option of updating the track or cylinder number and redriving the I/O operation without interrupting the application program.
Channel programs in virtual storage systems
On most systems channels operate using real (or physical) addresses, while the channel programs are built using virtual addresses. The operating system is responsible for translating these channel programs before executing them, and for this particular purpose the Input/Output Supervisor (IOS) has a special fast fix function which was designed into the OS Supervisor just for those "fixes" which are of relatively short duration (i.e., significantly shorter than "wall-clock time"). Pages containing data to be used by the I/O operation are locked into real memory, or page fixed. The channel program is copied and all virtual addresses are replaced by real addresses before the I/O operation is started. After the operation completes, the pages are unfixed.
As page fixing and unfixing is a CPU-expensive process long-term page fixing is sometimes used to reduce the CPU cost. Here the virtual memory is page-fixed for the life of the application, rather than fixing and freeing around each I/O operation. An example of a program that can use long-term page fixing is DB2.
An alternative to long-term page fixing is moving the entire application, including all its data buffers, to a preferred area of main storage. This is accomplished by a special SYSEVENT in MVS/370 through z/OS operating systems, wherein the application is, first, swapped-out from wherever it may be, presumably from a non-preferred area, to swap and page external storage, and is, second, swapped-in to a preferred area (SYSEVENT TRANSWAP). Thereafter, the application may be marked non-swappable by another special SYSEVENT (SYSEVENT DONTSWAP). Whenever such an application terminates, whether normally or abnormally, the operating system implicitly issues yet another special SYSEVENT on the application's behalf if it has not already done so (SYSEVENT OKSWAP).
Booting with channel I/O
Even bootstrapping of the system, or Initial Program Load (IPL) in IBM nomenclature, is carried out by channels, although the process is partially simulated by the CPU through an implied Start I/O (SIO) instruction, an implied Channel Address Word (CAW) at location 0 and an implied channel command word (CCW) with an opcode of Read IPL, also at location 0. Command chaining is assumed, so the implied CCW at location 0 falls through to the continuation of the channel program at locations 8 and 16, and possibly elsewhere should one of those CCWs be a transfer-in-channel (TIC).
To load a system, the implied Read IPL CCW reads the first block of the selected IPL device into the 24-byte data area at location 0, the channel continues with the second and third double words, which are CCWs, and this channel program loads the first portion of the system loading software elsewhere in main storage. The first double word contains a PSW which, when fetched at the conclusion of the IPL, causes the CPU to execute the IPL Text (bootstrap loader) read in by the CCW at location 8. The IPL Text then locates, loads and transfers control to the operating system's Nucleus. The Nucleus performs or initiates any necessary initialization and then commences normal OS operations.
This IPL concept is device-independent. It is capable of IPL-ing from a card deck, from a magnetic tape, or from a direct access storage device, (DASD), e.g., disk, drum. The Read IPL (X'02') command, which is simulated by the CPU, is a Read EBCDIC Select Stacker 1 read command on the card reader and a Read command on tape media (which are inherently sequential access in nature), but a special Read-IPL command on DASD.
DASD controllers accept the X'02' command, seek to cylinder X'0000' head X'0000', skip to the index point (i.e., just past the track descriptor record (R0)) and then treat the Read IPL command as if it were a Read Data (X'06') command. Without this special DASD controller behavior, device-independent IPL would not be possible. On a DASD, the IPL Text is contained on cylinder X'0000', track X'0000', and record X'01' (24 bytes), and cylinder X'0000', track X'0000', and record X'02' (fairly large, certainly somewhat more than 3,000 bytes). The volume label is always contained on cylinder X'0000', track X'0000', and block X'03' (80 bytes). The volume label always points to the VTOC, with a pointer of the form HHHH (that is, the VTOC must reside within the first 65,536 tracks). The VTOC's Format 4 DSCB defines the extent (size) of the VTOC, so the volume label only needs a pointer to the first track in the VTOC's extent, and as the Format 4 DSCB, which describes the VTOC, is always the very first DSCB in the VTOC, HHHH also points to the Format 4 DSCB.
If an attempt is made to IPL from a device that was not initialized with IPL Text, the system simply enters a wait state. The DASD (direct access storage device) initialization program, IBCDASDI, or the DASD initialization application, ICKDSF, places a wait state PSW and a dummy CCW string in the 24 bytes, should the device be designated for data only, not for IPL, after which these programs format the VTOC and perform other hard drive initialization functions.
See also
Autonomous peripheral operation
Booting
Bus and Tag
Execute Channel Program
GEC 4000 series
GCOS (operating system)
I2O
IBM System z9
IBM System z10
Initial program load
Intel 8089
System/360
UNIVAC 1110
z/Architecture
References
Notes
External links
IBM System/370 Principles Of Operation (GA22-7000-4), see chapter on Input/Output Operations
Mainframe computers
IBM System/360 mainframe line |
3639967 | https://en.wikipedia.org/wiki/Harry%20Smith%20%28American%20football%29 | Harry Smith (American football) | Harry Elliott "Blackjack" Smith (August 26, 1918 – July 30, 2013) was an American football player who anchored the line from the guard position on the University of Southern California's Rose Bowl teams in 1938 and 1939 seasons, and earned All-America honors each year.
College career
The 1938 team finished 9-2-0 and defeated Duke University. The next season, the Trojans finished 8-0-2 as national champions, including a 14-0 Rose Bowl conquest of the University of Tennessee. USC also defeated Notre Dame University in each of those seasons. Smith was elected to the College Football Hall of Fame in 1955. Harry Smith also played for USC Rugby during his collegiate career.
Professional career
Following graduation, Smith played one year for the Detroit Lions in 1940.
Coaching career
He then served as an assistant coach at University of Missouri and USC before becoming head coach of the Canadian Football League's Saskatchewan Roughriders.
Death
In his last few years Smith had suffered a stroke that saw his health decline. He died in the morning on July 30, 2013 at Columbia, Missouri. He was 94.
References
External links
NFL.com player page
1918 births
2013 deaths
All-American college football players
American football guards
Detroit Lions players
Missouri Tigers football coaches
Saskatchewan Roughriders coaches
USC Trojans football coaches
USC Trojans football players
People from Cole County, Missouri
People from Ontario, California
Players of American football from California |
42098646 | https://en.wikipedia.org/wiki/List%20of%20game%20companies%20in%20the%20United%20Kingdom | List of game companies in the United Kingdom | This is a list of game companies based in the United Kingdom.
Game companies in the United Kingdom
0 - 9
22cans
4J Studios
505 Games
A - H
Acclaim Cheltenham (formerly Probe Software/Probe Entertainment) (defunct)
Acornsoft (defunct)
Activision (UK studios)
Alten8 (defunct or changed name)
AMA Studios
Antimatter Games
Argonaut Games (defunct)
Atomic Planet Entertainment (defunct)
Audiogenic (defunct)
Automata UK (defunct)
BBC Multimedia (defunct)
Beyond Software (defunct)
Bizarre Creations (defunct)
Black Rock Studio (formerly Climax Group) (defunct)
Blitz Games Studios (defunct)
Volatile Games (defunct)
Boss Alien (sold to NaturalMotion)
Bossa Studios
Bug-Byte Software Ltd. (defunct)
Bulldog Interactive
Bullfrog Productions (defunct)
CCP Games
Chucklefish
Climax Studios
Codo Technologies (defunct)
Confounding Factor (defunct)
Creative Assembly
CRL Group (defunct)
Crytek UK (formerly Free Radical Design) (defunct)
Curve Studios
Dambuster Studios
Dark Energy Digital (defunct)
Digital Image Design (defunct)
Domark (defunct)
Double Eleven
Dovetail Games
DR Studios
Eidos Interactive (defunct)
Beautiful Game Studios (sold to Square Enix)
Core Design (defunct)
Pivotal Games (defunct)
Electric Dreams Software (defunct)
Electronic Arts (UK studios)
Codemasters
Criterion Games
EA Bright Light (defunct)
EA UK (defunct)
Playfish (defunct)
Elite Systems
Enlight Software
Eurocom (defunct)
Eutechnyx
Facepunch Studios
Feral Interactive
FinBlade (defunct)
Firebrand Games
Firefly Studios
Firesprite
Fireproof Games
Free Radical Design
Frontier Developments
Gaijin Entertainment
GamelabUK
Gameloft
Games Workshop
Glu Mobile
Goldhawk Interactive
Graftgold (defunct)
Gremlin Interactive (defunct)
Hanako Games
Headfirst Productions (defunct)
Hello Games
Hewson Consultants (defunct)
Honeyslug
I - R
Imagine Software (defunct)
Impressions Games (defunct)
Incentive Software (defunct)
Intelligent Games (defunct)
Introversion Software
Jagex
King
Kuju Entertainment
Headstrong Games
Zoë Mode
Kwalee
Level 9 Computing (defunct)
Lucid Games
Magnetic Scrolls (defunct)
Martech (defunct)
Mastertronic (defunct)
MC Lothlorien (defunct)
Media Molecule
Mediatonic
Microdeal (defunct)
Midway Studios – Newcastle (defunct)
Mikro-Gen (defunct)
Mythos Games (defunct)
NaturalMotion
nDreams
Neon Play
Ocean Software (defunct)
Palace Software (defunct)
Particle Systems (defunct)
Personal Software Services (defunct)
Pitbull Studio (defunct, merged into Epic Games UK)
Playtonic
Positech Games
Quicksilva (defunct)
Rage Software (defunct)
Realtime Games Software (defunct)
Realtime Worlds (defunct)
Rebellion Developments
Renegade Software (defunct)
Revolution Software
Rising Star Games
Rockstar Games (UK studios)
Rockstar Leeds (formerly Möbius Entertainment)
Rockstar Lincoln (formerly Tarantula Studios)
Rockstar London
Rockstar North (formerly DMA Design)
Rowan Software (defunct)
Ruffian Games
Runecraft (defunct)
S - Z
SCE Worldwide (UK studios)
Bigbig Studios (defunct)
Evolution Studios (defunct)
Guerrilla Cambridge (defunct)
Media Molecule
London Studio
Studio Liverpool (defunct) (formerly Psygnosis)
Team Soho (defunct)
Sega Europe
Sports Interactive
The Creative Assembly
Sensible Software (defunct)
Slightly Mad Studios
Slitherine
AGEod
Matrix Games
Software Creations (defunct)
Software Projects (defunct)
Splash Damage
Square Enix Europe
Beautiful Game Studios
Square Enix London Studios
Stainless Games
Studio 33 (defunct)
Sumo Digital
Superior Software
Swordfish Studios (defunct)
System 3
Team17
Telecomsoft (defunct)
The Assembly Line (defunct)
The Bitmap Brothers
The Chinese Room
THQ Digital Studios UK (defunct)
Tiertex Design Studios (defunct)
Twilight (defunct)
Two Point Studios
Tynesoft (defunct)
Ubisoft (UK studios)
Ubisoft Leamington (formerly FreeStyleGames)
Ubisoft Reflections (formerly Reflections Interactive)
U.S. Gold (defunct)
Vektor Grafix (defunct)
Venom Games (defunct)
Virgin Interactive (defunct)
VIS Entertainment (defunct)
VoxelStorm
Vulcan Software
UTV Ignition Entertainment
Wales Interactive
Warner Bros. Interactive Entertainment (UK studios)
Rocksteady Studios
Traveller's Tales
TT Fusion
TT Games
Warthog Games (defunct)
Xbox Game Studios (UK studios)
Lionhead Studios (defunct)
Ninja Theory
Playground Games
Rare
ZeniMax Europe
Zoonami (defunct)
Zushi Games (defunct)
See also
Lists of companies
References
External links
Map to active game companies in the United Kingdom
Companies, United Kingdom
Video games |
28775637 | https://en.wikipedia.org/wiki/List%20of%20software%20package%20management%20systems | List of software package management systems | This is a list of notable software package management systems, categorized first by package format (binary, source code, hybrid) and then by operating system family.
Binary packages
The following package management systems distribute apps in binary package form; i.e., all apps are compiled and ready to be installed and use.
Unix-like
Linux
apk-tools (apk): Alpine Package Keeper, the package manager for Alpine Linux;
dpkg: Originally used by Debian and now by Ubuntu. Uses the .deb format and was the first to have a widely known dependency resolution tool, APT. The ncurses-based front-end for APT, aptitude, is also a popular package manager for Debian-based systems;
Entropy: Used by and created for Sabayon Linux. It works with binary packages that are bzip2-compressed tar archives (file extension: .tbz2), that are created using Entropy itself, from tbz2 binaries produced by Portage: From ebuilds, a type of specialized shell script;
Flatpak: A containerized/sandboxed packaging format previously known as xdg-app;
GNU Guix: Used by the GNU System. It is based on the Nix package manager with Guile Scheme APIs and specializes in providing exclusively free software;
Homebrew: a port of the MacOS package manager of the same name (see below), formerly referred to as 'Linuxbrew';
ipkg: A dpkg-inspired, very lightweight system targeted at storage-constrained Linux systems such as embedded devices and handheld computers. Used on HP's webOS;
netpkg: The package manager used by Zenwalk. Compatible with Slackware package management tools;
Nix Package Manager: Nix is a powerful package manager for Linux and other Unix systems that makes package management reliable and reproducible. It provides atomic upgrades and rollbacks, side-by-side installation of multiple versions of a package, multi-user package management and easy setup of build environments;
OpenPKG: Cross-platform package management system based on RPM Package Manager;
opkg: Fork of ipkg lightweight package management intended for use on embedded Linux devices;
Pacman: Used in Arch Linux, Frugalware and DeLi Linux. Its binary package format is a zstd-compressed tar archive (file extension: .pkg.tar.zst) built using the makepkg utility (which comes bundled with pacman) and a specialized type of shell script called a PKGBUILD;
PETget: Used by Puppy Linux;
PISI: Pisi stands for "Packages Installed Successfully as Intended". Pisi package manager is used by Pisi Linux. Pardus used to use Pisi, but migrated to APT in 2013;
pkgsrc: A cross-platform package manager, with binary packages provided for Enterprise Linux, macOS and SmartOS by Joyent and other vendors;
RPM Package Manager: Created by Red Hat. RPM is the Linux Standard Base packaging format and the base of a number of additional tools, including apt4rpm, Red Hat's up2date, Mageia's urpmi, openSUSE's ZYpp (zypper), PLD Linux's poldek, Fedora's DNF, and YUM, which is used by Red Hat Enterprise Linux, and Yellow Dog Linux;
slackpkg;
slapt-get: Which is used by Slackware and works with a binary package format that is essentially a xz-compressed tar archive with the file extension .txz;
Smart Package Manager: Used by CCux Linux;
Snappy: Cross-distribution package manager, non-free on the server-side, originally developed for Ubuntu;
Swaret;
Zero Install (0install): Cross-platform packaging and distributions software. It is available for Arch Linux, Debian, Knoppix, Mint, Ubuntu, Fedora, Gentoo, OpenSUSE, Red Hat and Slackware;
Android
Amazon Appstore: Alternative app store for Android devices;
Aptoide: application for installing mobile applications which runs on the Android operating system. In Aptoide there is not a unique and centralized store; instead, each user manages their own store.
Cafe Bazaar: Alternative app store for Android.
F-Droid: An app store used in Replicant, which aims to replace the proprietary components of Android with free software alternatives;
GetJar: An independent mobile phone app store founded in Lithuania in 2004;
Google Play: Online app store developed by Google for Android devices that license the proprietary Google Application set;
SlideME: Alternative app store for Android
macOS (OS X)
Mac App Store: Official digital distribution platform for OS X apps. Part of OS X 10.7 and available as an update for OS X 10.6;
Fink: A port of dpkg, it is one of the earliest package managers for macOS;
MacPorts: Formerly known as DarwinPorts, based on FreeBSD Ports (as is macOS itself);
Joyent: Provides a repository of 10,000+ binary packages for macOS based on pkgsrc;
Zero Install (0install): Cross-platform packaging and distributions software. Uses GnuPG and GTK+ on macOS;
BSD
FreeBSD Ports;
OpenBSD ports: The infrastructure behind the binary packages on OpenBSD;
pkgsrc: A cross-platform package manager, with regular binary packages provided for NetBSD, Linux and macOS by multiple vendors;
dpkg: Used as part of Debian GNU/kFreeBSD;
OpenPKG: Cross-platform package management system based on rpm;
PC-BSD: Up to and including version 8.2 uses files with the .pbi (Push Button Installer) filename extension which, when double-clicked, bring up an installation wizard program. Each PBI is self-contained and uses de-duplicated private dependencies to avoid version conflicts. An autobuild system tracks the FreeBSD ports collection and generates new PBIs daily. PC-BSD also uses the FreeBSD pkg binary package system; new packages are built approximately every two weeks from both a stable and rolling release branch of the FreeBSD ports tree.
Solaris, illumos
Image Packaging System (IPS, also known as "pkg(5)"): Used by Solaris, OpenSolaris and Illumos distributions like OpenIndiana and OmniOS;
pkgsrc: SmartOS, OS distribution of Illumos from Joyent uses pkgsrc, that also can be bootstrapped to use on OpenIndiana;
OpenCSW: Community supported collection of packages in SysV format for SunOS 5.8-5.11 (Solaris 8-11);
OpenPKG: Cross-platform package management system based on RPM Package Manager.
iOS
App Store: Official app store for iOS apps;
Cydia: Frontend to a port of APT. Maintained by the jailbreak community;.
Windows
Windows Store: Official app store for Metro-style apps on Windows NT and Windows Phone. As of Windows 10, it distributes video games, films and music as well;
Windows Package Manager: Free and open-source package manager designed for Microsoft Windows 10;
Windows Phone Store: Former official app store for Windows Phone. Now superseded by Windows Store;
Cygwin: Free and open-source software repository for Windows NT. Provides many Linux tools and an installation tool with package manager;
Homebrew: a port of the MacOS package manager meant for use with Windows Subsystem for Linux, using the already existing Linux port as its base;
Ninite: Proprietary package manager for Windows NT;
NuGet: A Microsoft-official free and open-source package manager for Windows, available as a plugin for Visual Studio, and extendable from the command-line;
Chocolatey: Open-source decentralized package manager for Windows in the spirit of Yum and apt-get. Usability wrapper for NuGet;
Pacman: MSYS2-ported Windows version of the Arch Linux package manager;
wpkg: Open-source package manager that handles Debian packages on Windows. Started as a clone of dpkg, and has many apt-get like features too;
Zero Install (0install): Cross-platform packaging and distributions software. Uses .NET Framework on Windows NT;
z/OS
SMP/E.
Source code-based
The following package management systems distribute the source code of their apps. Either the user must know how to compile the packages, or they come with a script that automates the compilation process. For example, in GoboLinux a recipe file contains information on how to download, unpack, compile and install a package using its Compile tool. In both cases, the user must provide the computing power and time needed to compile the app, and is legally responsible for the consequences of compiling the package.
ABS is used by Arch Linux to automate binary packages building from source or even other binary archives, with automatic download and dependency checking;
apt-build is used by distributions which use deb packages, allowing automatic compiling and installation of software in a deb source repository;
Sorcery is Sourcemage GNU/Linux's bash based package management program that automatically downloads software from their original site and compiles and installs it on the local machine;.
macOS (OS X)
Fink, for OS X, derives partially from dpkg/apt and partially from ports;
MacPorts, formerly called DarwinPorts, originated from the OpenDarwin project;
Homebrew, with close Git integration;
pkgsrc can be used to install software directly from source-code, or to use the binary packages provided by several independent vendors.
Windows
vcpkg: A Microsoft C++ package manager for Windows, Linux and MacOS.
Hybrid systems
Nix package manager: Package manager that manages software in a purely functional way, featuring multi-user support, atomic upgrades and rollbacks. Allows multiple versions or variants of a software to be installed at the same time. It has support for macOS and is cross-distribution in its Linux support;
Portage and emerge are used by Gentoo Linux, Funtoo Linux, and Sabayon Linux. It is inspired by the BSD ports system and uses text based "ebuilds" to automatically download, customize, build, and update packages from source code. It has automatic dependency checking and allows multiple versions of a software package to be installed into different "slots" on the same system. Portage also employs "use flags" to allow the user to fully customize a software build to suit the needs of their platform in an automated fashion. While source code distribution and customization is the preferred methodology, some larger packages that would take many hours to compile on a typical desktop computer are also offered as pre-compiled binaries in order to ease installation;
Upkg: Package management and build system based on Mono and XML specifications. Used by paldo and previously by ExTiX Linux;
MacPorts (for OS X);
NetBSD's pkgsrc works on several Unix-like operating systems, with regular binary packages for macOS and Linux provided by multiple independent vendors;
Collective Knowledge Framework is a cross-platform package and workflow framework with JSON API that can download binary packages or build them from sources for Linux, Windows, MacOS and Android platforms.
Meta package managers
The following unify package management for several or all Linux and sometimes Unix variants. These, too, are based on the concept of a recipe file.
AppImage (previously klik and PortableLinuxApps) aims to provide an easy way to get software packages for most major distributions without the dependency problems so common in many other package formats.
Autopackage uses .package files.
Zero Install installs each package into its own directory and uses environment variables to let each program find its libraries. Package and dependency information is downloaded directly from the software authors' pages in an XML format, similar to an RSS feed.
PackageKit is a set of utilities and libraries for creating applications that can manage packages across multiple package managers using back-ends to call the correct program.
Game package managers
Package management systems geared toward developing and distributing video games.
Steam: A cross-platform video game distribution, licensing and social gameplay platform, developed and maintained by Valve. Used to shop for, download, install, update, uninstall and back up video games. Works on Windows NT, OS X and Linux;
Uplay: A cross-platform video game distribution, licensing and social gameplay platform, developed and maintained by Ubisoft. Used to shop for, download, install and update video games. Works on Windows NT and Windows Phone, as well as PlayStation 3, PlayStation 4, Xbox 360, Xbox One, Wii U, iOS and Android.
Xbox Live: A cross-platform video game distribution platform by Microsoft. Works on Windows NT, Windows Phone and Xbox. Initially called Games for Windows – Live on Windows 7 and earlier. On Windows 10, the distribution function is taken over by Windows Store;
Proprietary software systems
A wide variety of package management systems are in common use today by proprietary software operating systems, handling the installation of both proprietary and free packages.
Software Distributor is the HP-UX package manager.
Application-level package managers
Bitnami: a library of installers or software packages for web applications;
CocoaPods: a dependency manager for Swift and Objective-C Cocoa projects;
Composer: a dependency Manager for PHP;
Conda: a package manager for open data science platform of the Python and R;
CPAN: a programming library and package manager for Perl;
CRAN: a programming library and package manager for R;
CTAN: a package manager for TeX;
Docker: Docker, a system for managing containers, serves as a package manager for deploying containerized applications;
EasyInstall: a package manager for Python and the PyPI programming library which is part of the Setuptools packaging system;
Enthought Canopy: a package manager for Python scientific and analytic computing distribution and analysis environment;
Go: a multipurpose tool used, among others, for Go package management;
Gradle: a build system and package manager for Groovy and other JVM languages, and also C++;
Ivy: a package manager for Java, integrated into the Ant build tool, also used by sbt;
Leiningen: a project automation tool for Clojure;
LuaRocks: a programming library and package manager for Lua;
Maven: a package manager and build tool for Java;
npm: a programming library and package manager for Node.js and JavaScript;
NuGet: the package manager for the Microsoft development platform including .NET Framework and Xamarin;
OPAM: a package manager and repository for OCaml;
PAR::Repository and Perl package manager: binary package managers for Perl;
PEAR: a programming library for PHP;
pip: a package manager for Python and the PyPI programming library;
Pkg.jl: a package manager for Julia;
Quicklisp: a package manager and repository for Common Lisp;
RubyGems: a package manager and repository for Ruby;
sbt: a build tool for Scala, uses Ivy for dependency management;
Yarn: a package manager for Node.js and JavaScript.
See also
Binary repository manager
Package format
Linux package formats
References
Computing-related lists
Software distribution |
68052553 | https://en.wikipedia.org/wiki/Mors%20Praematura | Mors Praematura | "Mors Praematura" is the 6th episode of the third season of the American television drama series Person of Interest. It is the 51st overall episode of the series and is written by Dan Dietz and directed by Helen Shaver. It aired on CBS in the United States and on CTV in Canada on October 29, 2013.
The series revolves around a computer program for the federal government known as "the Machine" that is capable of collating all sources of information to predict terrorist acts and to identify people planning them. A team, consisting of John Reese, Harold Finch and Sameen Shaw follow "irrelevant" crimes: lesser level of priority for the government. In the episode, Reese investigates Shaw's disappearance while Finch goes after an estate investigator who wants to unravel the mystery behind his brother's death. Meanwhile, Shaw is forced by Root to help her in doing some tasks for the Machine. The title is Latin for "Premature Death".
According to Nielsen Media Research, the episode was seen by an estimated 12.00 million household viewers and gained a 1.9/5 ratings share among adults aged 18–49. The episode received near critical acclaim, with critics praising the writing, character development, Acevedo's guest performance and building momentum.
Plot
Reese (Jim Caviezel) enters Shaw's loft but does not find her there, finding evidence of a taser. Meanwhile, Finch (Michael Emerson) has met the new number: Timothy Sloan (Kirk Acevedo), an estate investigator. Sloan specifically investigates belongings from people who have recently died without a will and finds their next-of-kin.
Finch follows Sloan to an apartment where he suspects he is stealing. However, Sloan reveals he is the foster brother of the owner, Jason Greenfield (Michael Esper), who died of a heroin overdose a few weeks ago. Jason was a hacker and lost contact until Sloan found out about his death. Sloan expresses doubt about Jason using drugs as he owned very expensive items in his house and despite his hacker status, he had no computer. Jason left behind a USB flash drive with a coded message that mentioned that he would be killed if he left a group.
Shaw (Sarah Shahi) wakes up in a car with Root (Amy Acker), who tells her that the Machine needs them to work together to help protect it. Shaw reluctantly agrees to help. The Machine gives them unexplained clues, like leaving an envelope on a park bench, delving in the sewers and entering a CIA safe house where Shaw knocks the agent out. Root then has Shaw act as a CIA operative with Root serving as a prisoner. Root is taken to a CIA black site.
Finch and Sloan visit one of Jason's storage unit to find it empty. But with the use of UV lights, they discover a coded message in the walls. However, they are being watched by a camera and they nearly die when the unit closes and starts filling it with gasoline. Reese saves them and they escape before the unit explodes. The team then discovers that one of the people involved is Peter Collier (Leslie Odom Jr.), a man they previously dealt with. Jason was part of Collier's group and became a highly respected hacker but when he tried to leave, Collier had him killed. The team must find a Running key cipher that Jason left and would be used to unravel the code.
Meanwhile, Laskey (Brian Wiles) collects money for HR from Mozorov, a Russian deli owner who pays them out of loyalty. However, he is reprimanded by Simmons (Robert John Burke) when they find that Mozorov skimmed money from them and had him killed, and force Laskey to bury the grave. The next day, a traumatized Laskey talks to Carter (Taraji P. Henson), revealing his real name as Mikhail Lesnichy and HR is infiltrating Russians into the police, including himself. He also states that HR is collecting all the money for something unspecified.
Reese and Sloan check Jason's apartment and find the book with the running key. However, Collier's team arrives and kidnaps Sloan. Finch deciphers the code: Jason is alive and turned himself in to the CIA and Collier's team will try to kill him. Coincidentally, Jason is placed on the cell next to Root. Both exchange a conversation, where Jason reveals that he helped Collier's group, Vigilance, with Wayne Kruger but the group decided to kill Kruger despite Jason's objections, which caused his concern for his role in the group. Root and Jason are taken to a transportation bus where Root untangles herself and starts freeing Jason.
Collier's group causes the transport bus to crash but Reese and Shaw fight Collier's group. Root and Jason escape, using the envelope (which contains an earbud and a gun) and descend in the sewers. Root gives Jason money and a fake ID to he can make it to Cartagena, Colombia. She is confronted by Collier's crew but they are killed by Shaw. When Root affirms that the mission is over, Shaw knocks her unconscious. Collier holds Sloan at gunpoint and meets with Reese. He then shoots Sloan in the femoral artery and escapes, forcing Reese to let Collier go while taking Sloan to the hospital.
When Sloan leaves the hospital, he receives a call from Jason, who thanks him for everything and promising to keep talking more constantly. Root is locked up in a section of the library with an ankle monitor and no access to the Machine. Root states that the Machine will be mad at Finch for doing this but Finch suggests that maybe this is where the Machine wants her to be.
Reception
Viewers
In its original American broadcast, "Mors Praematura" was seen by an estimated 12.00 million household viewers and gained a 1.9/5 ratings share among adults aged 18–49, according to Nielsen Media Research. This means that 1.9 percent of all households with televisions watched the episode, while 5 percent of all households watching television at that time watched it. This was a 9% decrease in viewership from the previous episode, which was watched by 13.17 million viewers with a 2.2/6 in the 18-49 demographics. With these ratings, Person of Interest was the third most watched show on CBS for the night, behind NCIS: Los Angeles and NCIS (TV series), second on its timeslot and fourth for the night in the 18-49 demographics, behind NCIS: Los Angeles, NCIS, and The Voice.
With Live +7 DVR factored in, the episode was watched by 16.24 million viewers with a 2.9 in the 18-49 demographics.
Critical reviews
"Mors Praematura" received near critical acclaim from critics. Matt Fowler of IGN wrote in his verdict, "'Mors Praematura' gave us thrilling action, deadly intrigue and a spectacularly fun pairing between Root and Shaw. I'm very happy they went the 'uneasy alliance' route this time and didn't try to rehash the full animosity of last season. And look, Root even gets to be Finch's prisoner now! Tables effectively turned. Although there's nothing about her confinement that gives me the impression that she can't escape. Of course, not having The Machine in her ear might be a big obstacle to overcome."
Phil Dyess-Nugent of The A.V. Club gave the episode an "A" grade and wrote, "God, I love this show. No matter how bad you think things are, it'll always find a way to see your neurotic fears and raise them. To quote Jimmy James, Stephen Root’s character from NewsRadio, it's got more paranoid fantasies than Stephen King on crack. And it keeps moving, so that its take on the 24-hour-surveillance society never settles into a neat grouping of clear-cut good guys and clear-cut bad guys."
Tim Surette of TV.com wrote "Yep, last night was another evening of watching television's sneakiest drama, Person of Interest. I don't know why I let the show surprise me like this so often, but like all of the series' best installments, 'Mors Praematura' was full of surprises."
Sean McKenna of TV Fanatic gave the episode a 4.5 star rating out of 5 and wrote "'Mors Praematura' was a great follow up to last week's 'Razgovor' and another positive sign that the season is continuing its upswing rise."
References
External links
Person of Interest (TV series) episodes
2013 American television episodes |
13384732 | https://en.wikipedia.org/wiki/Computer%20Space%20forum | Computer Space forum | Computer Space forum is a yearly computer art festival, organized by the Student Computer Art Society (SCAS) in Sofia, Bulgaria. It's one of the oldest digital art festivals in Bulgaria, founded in 1989.
Description
An international non-commercial event and platform joining young artists, students and producers of computer graphics, computer animation, off-line multimedia, electronic music and web design. Computer Space includes contest and festival part and all the events are free and open to the public especially encouraging the participation of students and young artists. Every year more than 200 projects in the sphere of computer arts have been presented by their authors and discussed. The creative idea, the transformation of the idea to project, the combination of technology and art in the implementation, the society impact of computers have been always a main focus of the symposia in the frame of Computer Space.
History
Starting as an electronic music festival in 1989 Computer Space included graphics and animation sections next few years. Web design and mobile applications have been one of the fast-growing sections last years.
During the 1980s Bulgaria specialized in producing microcomputers in the former communist bloc countries and the Soviet Union specialized in producing big machines and supercomputers. The Eastern bloc countries had the so-called Economic Inter-support Council and in the frame of that Council each country has been developing some economic area. At that time it was not so clear the microcomputers will be the future and some experts believe that the microcomputers are mainly for games and home usage. It happened that in 1981 the first microcomputer in Eastern Europe called Imko II then (in 1982) called Pravetz 82 (with 8 bit processor) has been released in Bulgaria. This was Apple II compatible microcomputer and it came to life just after Apple II.
This situation placed Bulgaria in the leadership role in microcomputers production not only in Eastern Europe but also in the Middle East and even in the Central Europe. A huge plants have been built exporting thousands of Pravetz 82 and later Pravetz 16 (with 8086/88 processor) to all Eastern bloc countries and to Arabic countries. The development of computer industry in that time strongly influenced the development of software and also the development of computer arts. In the beginning of 80's the first analogue synthesiser (produced in Paris and occupying almost one big hall) has been installed in the Bulgarian National Radio and thus giving a strong tool to the electronic music composers from the Balkan region. The own production of EGA and VGA displays in the middle and late 80s pushed the computer graphics and visualization to a new level.
Being a barometer of electronic and computer arts in Sough-Eastern Europe Computer Space forum often offers the artists possibility to debate such fundamental issues as relations between computer arts and other contemporary arts, place of the artists in the creative process, styles in digital arts, technology and society issues etc. Some of the symposium topics like 'The Violence of Information', 'Virtual Identity', 'Computer arts or computers in the arts', 'Art or a design' opened a lot of following discussions in many artistic forums and blogs.
One of the often open questions during the many discussions is the definition of art in the computer generated or manipulated products. For example, some computer graphics like 3D architectural or car images could demonstrate brilliant design technologies and could 'touch' the users emotionally. Is this an art? Or we may see very nice Photoshop made drawings of landscapes or processed photographs. And, another often posed question, the value of such creations, especially in comparison to the value of oil paintings that exist in just one unique copy. These and many similar questions allow the artists to debate the future of the arts and interaction between the arts.
Computer arts have a lot of forms and appearance and this evolution is always been in a focus of CS seminars. Computer graphics, computer animation, multimedia (CD/ DVD based games, encyclopaedia, fairy-tale stories, galleries, training modules etc.), web-art, net-art, electronic/computer music, VRs, interactive art installations and many forms are regarded as computer arts. But, it is always a big discussion when the synthesis of technology and creative ideas becomes an art. And, how to distinguish the art from the brilliant design or from the perfect modelling? Shall we consider the impact and raised emotions as a prove of the artistic elements of some project? And, if and how the entertainment projects (for example, games) could be considered as an art ?
Reception
The event is mentioned regularly in national and international press.
In 2003 President of the Republic of Bulgaria awarded the project in the category "Society and Institution web".
A lot of well-known studios and artists from the CS participating with projects over the years, for instance: Braam Jordaan (South Africa), Academy of Media Arts Cologne (Cologne), ZKM (Karlsruhe), IRCAM (Paris), Platige Studio (Poland), Studio Aka (UK), Miralab (Switzerland), Institute for Electroacoustic of Vienna University and many others. Most of them are pioneers of some new methods and technologies in computer arts and modern media. Rossen Petkov is Chairman of the Organising Committee and Computer Space co-founder.
References
External links
Official Computer Space site
New media art
Computer conferences |
50799285 | https://en.wikipedia.org/wiki/MacOS%20Sierra | MacOS Sierra | macOS Sierra (version 10.12) is the thirteenth major release of macOS (formerly known as and ), Apple Inc.'s desktop and server operating system for Macintosh computers. The name "macOS" stems from the intention to uniform the operating system's name with that of iOS, watchOS and tvOS. Sierra is named after the Sierra Nevada mountain range in California and Nevada. Its major new features concern Continuity, iCloud, and windowing, as well as support for Apple Pay and Siri.
The first beta of macOS Sierra was released to developers shortly following the 2016 WWDC keynote on June 13, 2016. The first public-beta release followed on July 7, 2016. It was released to end users on September 20, 2016, as a free upgrade through the Mac App Store and it was succeeded by macOS High Sierra on September 25, 2017.
System requirements
macOS Sierra requires at least 2 GB of RAM and 8 GB of storage space and will run on:
iMac: Late 2009 or newer
MacBook and MacBook 12-inch: Late 2009 or newer
MacBook Pro: Mid 2010 or newer
MacBook Air: Late 2010 or newer
Mac Mini: Mid 2010 or newer
Mac Pro: Mid 2010 or newer
Xserve is no longer compatible.
Sierra is the first version of macOS since OS X Mountain Lion, released in 2012, that does not run on all computers that the previous version supported. Developers have created workarounds to install macOS Sierra on some Mac computers that are no longer officially supported as long as they are packed with a CPU that supports SSE4.1. This requires using a patch to modify the install image.
Changes
The default desktop picture is an image of Lone Pine Peak.
System features
Siri
The user can access the Siri intelligent assistant via the Dock, the menu bar or a keyboard shortcut and results are shown in a window in the upper-right corner. Siri can send messages, search the web, find files and adjust settings. Results can be dropped into other applications or pinned to Notification Center. For instance, pictures from search results can be dragged into a document.
iCloud Drive and Optimized Storage
iCloud Drive can upload the user's documents and desktop directories and sync them to other devices. The System Information application has a new section that gives the user detailed information about space usage per application or file and provides tools and suggestions for freeing up space. For instance, the user can let the system upload old files to iCloud Drive and remove their local copies, keeping them available on-demand in Finder. It can also remove old files from trash automatically. iTunes can delete watched, purchased films and TV programs from its library.
Auto Unlock and Universal Clipboard
Building upon Continuity, an "umbrella term [for] features that facilitate the communication between [Apple devices]" using Bluetooth and Wi-Fi, Sierra adds two features. With Auto Unlock, the user can unlock their user account by holding a paired Apple Watch close to the device. Time of flight is used to prevent relay attacks. Auto Unlock requires a Mac that was introduced in 2013 or later. With Universal Clipboard, the user can share the clipboard for cut, copy and paste between macOS Sierra and iOS 10 devices, including text and rich content, such as pictures or videos.
Tabs and Picture-in-Picture
Applications that support multiple windows can support multiple tabs within a single window, allowing the user to keep windows organized similarly to Safari. With Picture-in-Picture, videos can be played in a window that follows the user across the system.
Apple File System
Apple released a preview of a new file system in Sierra, called Apple File System (APFS), to overcome the limitations of HFS Plus. It is intended for solid-state drives and flash memory and will adopt several features found in modern file systems, such as snapshots and cloning, as well as native support for features that Apple already provides in HFS Plus through supplementary software, such as file-system encryption and TRIM support. The file system was released in macOS High Sierra.
Night Shift
Night Shift is new in macOS 10.12.4, with the same functionality as its iOS counterpart. Night Shift reduces blue light at night to aid sleep. This can be scheduled in the System Preferences app (in the Displays menu) and can be toggled on or off in the Notification Center or using Siri.
Since this feature relies on the Metal framework, Night Shift is not available on all systems that support macOS Sierra.
Application features
Photos
Apple says it has improved the face recognition of the Photos application, adding object and scene recognition. It groups similar pictures together using faces, locations and object recognition to create "memories". Memories contain picture slideshows with transitions and music selected by the algorithm, which can be modified to the user's liking. The "People" album organizes photos by the people in them, and Places shows all photos on a world map.
Safari and Apple Pay
Safari provides an "extension point" which enables developers to bundle Safari extensions within their Cocoa applications and communicate with them directly from the applications. Safari conceals the presence of installed "legacy" plug-ins, such as Adobe Flash Player, Java applets, Microsoft Silverlight, and QuickTime – from websites and requires the user to enable a specific plug-in on a per-use or per-website basis.
Apple Pay allows vendors to embed an Apple Pay button on their websites. In Safari, users can click the Apple Pay button to check out, then complete a purchase using an iPhone or Apple Watch. Apple Pay requires a Mac that supports Continuity (2012 or later models) and either an iPhone 6 or later with iOS 10, or an Apple Watch with watchOS 3.
Messages
The Messages app adds aesthetic effects to messages, such as three times bigger emojis and click back with hearts or thumbs-up on a message bubble. The ability to play YouTube videos and preview links in a conversation was introduced. Users can view interactive content added to iMessage in iOS 10. The app also allows you to turn on or off read receipts on a conversation by conversation basis.
iTunes
Apple Music within iTunes has been redesigned, making it simpler to find favorite songs and discover new ones. A new "For You" tab has been added, which suggests new music the user might like (similar to the existing Genius). A refined MiniPlayer with the ability to view lyrics while listening has also been introduced.
Notes
The Notes app allows the user to share and collaborate on notes. This is done by clicking on a share button at the top of the window.
Other changes
Disk Utility regains the ability to format and manage RAID sets, after it was removed in El Capitan.
Finder has an option to show folders always at the top of the view hierarchy, for instance in list views.
Mail adds a control to the top of email lists to quickly filter them, for instance, by read status or the presence of attachments.
13 & 15-inch Retina MacBook Pros now default to integer scaled over nearest-neighbor scaled resolutions to fit more content.
Other applications found on macOS 10.12 Sierra
AirPort Utility
App Store
Archive Utility
Audio MIDI Setup
Automator
Bluetooth File Exchange
Boot Camp Assistant
Calculator
Calendar
Chess
ColorSync Utility)
Console
Contacts
Dictionary
Digital Color Meter
DVD Player
FaceTime
Font Book
Game Center
GarageBand (may not be pre-installed)
Grab
Grapher
iBooks (now Apple Books)
iMovie (may not be pre-installed)
iTunes
Image Capture
Ink (can only be accessed by connecting a graphics tablet to your Mac)
Keychain Access
Keynote (may not be pre-installed)
Migration Assistant
Numbers (may not be pre-installed)
Pages (may not be pre-installed)
Photo Booth
Preview
QuickTime Player
Reminders
Script Editor
Stickies
System Information
Terminal
TextEdit
Time Machine
VoiceOver Utility
X11/XQuartz (may not be pre-installed)
Security improvements
Gatekeeper
macOS Sierra slightly changes the Gatekeeper user interface and adds two new mechanisms. A new default in System Preferences hides the "Anywhere" option which allows the user to disable the mechanism and execute programs from any source without needing to approve each new one individually.
The first new mechanism allows developers to code-sign disk images that can be verified as a unit by the system. This allows developers to guarantee the integrity of external files that are distributed alongside the application bundle on the same disk image. An attacker could infect these external files with malicious code and with them exploit a vulnerability in the application, without having to break the signature of the application bundle itself. By signing the disk image, the developer can prevent tampering and force an attacker to repackage the files onto a new disk image, requiring a valid developer certificate to pass Gatekeeper without a warning.
The second new mechanism is "path randomization", which executes application bundles from a random, hidden path and prevents them from accessing external files relative to their location. To avoid this, the developer has to distribute the application bundle and its external files on a signed disk image or in a signed installer package. The user can avoid this mechanism by moving the application bundle without its external files to a new location.
Directory permissions and sudo
The Unix permissions for writing to the /Volumes directory are now restricted to root and no longer "world-writable". Apple expanded System Integrity Protection to , a directory that contains a list of applications that are allowed to "control the computer", and restricts write access to programs which were signed with an Apple "private entitlement". The file-hosting service Dropbox has been criticized for manipulating the directory to add their Dropbox application to the list, rather than asking the user to do it for them explicitly in System Preferences.
The sudo command-line utility with which a user can execute a command as another user, typically as root, is configured with the "tty_tickets" flag by default, restricting the session timeout to the terminal session (such as a window or tab) in which the user authenticated the program.
Removed functionality
Sierra removes support for garbage collection from the Objective-C runtime, a memory-management system that was added in Mac OS X Leopard (version 10.5) and declared deprecated in favor of Automatic Reference Counting in OS X Mountain Lion (version 10.8). Applications that have been compiled with garbage collection will no longer run.
Apple removed native support for the VPN protocol PPTP and made recommendations for alternatives that it considers more secure.
The "time remaining" estimate has been removed in the 10.12.2 update after complaints of the battery life of 2016 MacBook Pros.
The Game Center app has been removed. However, the service still exists.
Reinstallation
Following the download of macOS Sierra (10.12) from the Mac App Store, the installer does not show under a users' "Purchased" tab in the Mac App Store app. Users can still re-download the Sierra installer by visiting the macOS Sierra page on the Mac App Store.
Reception
macOS Sierra has received generally positive reviews. Users and critics have praised its functionality, including the addition of Siri and support for Apple Pay in Safari. Macworld gave it 4.5 stars out of 5. Engadget gave it a rating of 87 out of 100 praising the new features such as Siri integration, Universal Clipboard, and Apple Pay while criticizing the unreliability of Auto Unlock, that "Siri isn't always smart enough" and some of the Messages features are only available on iOS 10. Developers of apps that rely on the PDFKit library built into macOS have complained that radical changes to PDFKit introduced in Sierra are causing instability and potential data corruption.
Release history
References
External links
– official site
macOS Sierra download page at Apple
12
X86-64 operating systems
2016 software
Computer-related introductions in 2016 |
31765659 | https://en.wikipedia.org/wiki/Gerald%20Giam | Gerald Giam | Gerald Giam Yean Song (; born 1977) is a Singaporean politician and information technology solutions architect. A member of the opposition Workers' Party, he is a Member of the 14th Parliament and has been representing the Bedok Reservoir-Punggol ward of Aljunied Group Representation Constituency (GRC) and served as the Vice-Chairman of the Aljuined-Hougang Town Council since 2020. He was previously a Non-constituency Member of Parliament from 2011 to 2015.
Education
Giam Was educated at Anglo-Chinese School (Independent) and Anglo-Chinese Junior College. He holds a Bachelor of Science in electrical engineering from the University of Southern California and a Master of Science in international political economy from Nanyang Technological University.
Career
Giam has worked in various roles in the information technology industry, including as a senior consultant at Avanade and a project manager at MSC Consulting. He was also a foreign service officer at the Ministry of Foreign Affairs and had volunteered as a youth leader in the South West Community Development Council. He was also previously a deputy editor at The Online Citizen.
Giam is the chief technology officer of an information technology solutions company which he co-founded. He is a Registered Management Consultant certified by the Institute of Management Consultants (Singapore).
Political career
Giam first entered politics in the 2011 general election when he joined a five-member Workers' Party team contesting in the East Coast GRC against a team from the governing People's Action Party (PAP). The Workers' Party team lost with 45.17% of the votes, but were offered a Non-constituency Member of Parliament (NCMP) seat in Parliament.
On 13 May 2011, the Workers' Party confirmed that Giam would take up the NCMP seat. As a result of not being offered to take up the NCMP seat, Eric Tan, the Workers' Party team leader in East Coast GRC quit.
With Giam taking up the NCMP position together with Yee Jenn Jong, the Workers' Party set a new record in Singapore's electoral history by becoming the first opposition party to have eight (six elected and two NCMP) seats in Parliament.
Giam served as a NCMP in the 12th Parliament from 10 October 2011 to 25 August 2015.
Giam contested in the 2015 general election when he joined a four-member Workers' Party team contesting in the East Coast GRC against a team from the governing People's Action Party (PAP). The Workers' Party team lost with 39.27% of the votes. As the opposition team with third highest percentage of votes among unelected candidates, anyone on Giam's team would be nominated to take up the third NCMP position. Instead of taking up the position for himself as the leader of the team, he proposed within the party that his teammate, Leon Perera to take up to position.
During the 2020 general election, Giam joined a five-member Workers' Party team contesting in Aljunied GRC and they won with 59.95% of the vote against the People's Action Party team. Giam thus became the Member of Parliament representing the Bedok Reservoir–Punggol ward of Aljunied GRC in the 14th Parliament.
Giam was elected as Treasurer and Policy Research Team Head of the Workers' Party Central Executive Committee in 2015. He is the Chairman of the Tenders and Contracts Committee in the Aljuined-Hougang Town Council and a member of the Estate & Community Liaison Committee.
Personal life
Giam is married with two children.
References
External links
Gerald Giam on Parliament of Singapore
Gerald Giam - General Election 2020 Candidate at Workers' Party
USC Viterbi School of Engineering alumni
Living people
1977 births
Singaporean people of Hokkien descent
Workers' Party (Singapore) politicians
Anglo-Chinese School alumni
Singaporean Non-constituency Members of Parliament
Members of the Parliament of Singapore |
59703 | https://en.wikipedia.org/wiki/Toshiba | Toshiba | is a Japanese multinational conglomerate headquartered in Minato, Tokyo. Its diversified products and services include power, industrial and social infrastructure systems, elevators and escalators, electronic components, semiconductors, hard disk drives (HDD), printers, batteries, lighting, as well as IT solutions such as quantum cryptography. It was one of the biggest manufacturers of personal computers, consumer electronics, home appliances, and medical equipment. As a semiconductor company and the inventor of flash memory, Toshiba had been one of the top 10 in the chip industry until its flash memory unit was spun off as Toshiba Memory, later Kioxia, in the late 2010s.
The Toshiba name is derived from its former name, Tokyo Shibaura Denki K.K. (Tokyo Shibaura Electric Co., Ltd) which in turn was a 1939 merger between Shibaura Seisaku-sho (founded in 1875) and Tokyo Denki (founded in 1890). The company name was officially changed to Toshiba Corporation in 1978. It is listed on the Tokyo Stock Exchange, where it was a constituent of the Nikkei 225 and TOPIX indices (leaving both in August 2018), and the Nagoya Stock Exchange.
A technology company with a long history and sprawling businesses, Toshiba is a household name in Japan and has long been viewed as a symbol of the country's technological prowess. Its reputation has since been affected following an accounting scandal in 2015 and the bankruptcy of subsidiary energy company Westinghouse in 2017, after which it was forced to shed a number of underperforming businesses, essentially eliminating the company's century-long presence in consumer markets. Toshiba ultimately announced on 12 November 2021 that it would split into three separate companies, respectively focusing on infrastructure, electronic devices, and all other remaining assets; the latter would retain the Toshiba name. It expects to complete the plan by March 2024.
History
Tanaka Seisakusho
was the first company established by Tanaka Hisashige, one of the most original and productive inventor-engineers during the Tokugawa / Edo period. Established in 11 July 1875, it was the first Japanese company to manufacture telegraph equipment. It also manufactured switches, and miscellaneous electrical and communications equipment.
The company was inherited by Tanaka's adopted son, and later became half of the present Toshiba company. Several people who worked at Tanaka Seisakusho or who received Tanaka's guidance at a Kubusho (Ministry of Industries) factory later became pioneers themselves. These included Miyoshi Shōichi who helped Fujioka make the first power generator in Japan and to establish a company, Hakunetsusha to make bulbs; Oki Kibatarō, the founder of the present Oki Denki (Oki Electric Industry); and Ishiguro Keizaburō, a co-founder of the present Anritsu.
After the demise of the founder in 1881 Tanaka Seisakusho became partly owned by General Electric and expanded into the production of torpedoes and mines at the request of the Imperial Japanese Navy, to become one of the largest manufacturing companies of the time. However, as the Navy started to use competitive bids and then build its own works, the demand decreased substantially and the company started to lose money. The main creditor to the company, Mitsui Bank, took over the insolvent company in 1893 and renamed it Shibaura Seisakusho (Shibaura Engineering Works).
Shibaura Seisakusho
was the new name given to the company Tanaka Seisakusho (Tanaka Engineering Works) after it was declared insolvent in 1893 and taken over by Mitsui Bank.
In 1910, it formed a tie-up with General Electric in the US, which, in exchange for technology acquired about a quarter of the shares of Shibaura. With this investment, GE now had a stake in both Tokyo Denki and Shibaura Seisakusho – two companies that had a complementary line of products in the light as well as heavy electrical equipment. Both companies were merged in 1939 to create Tokyo Shibaura Denki (Tokyo Shibaura Electric Company, now Toshiba). The relation with GE continued until the beginning of the war and, after the war, resumed in 1953 with GE's 24 percent shareholding. This percentage has, however, decreased substantially since then.
Hakunetsusha (Tokyo Denki)
was a company established by Shōichi Miyoshi and Fujioka Ichisuke, two of Japan's industrial pioneers during the Tokugawa / Edo period. It specialized in the manufacture of light bulbs.
The company was established in 1890 and started out by selling bulbs using bamboo filaments. However, following the opening up of trade with the West through the Unequal treaty, Hakunetsusha met with fierce competition from imports. Its bulb cost about 60 percent more than the imports and the quality was poorer. The company managed to survive with the booms after the First Sino-Japanese War of 1894–95 and the Russo-Japanese War of 1904–05, but afterward its financial position was precarious.
In 1905 the company was renamed Tokyo Denki (Tokyo Electric) and entered into a financial and technological collaboration with General Electric of the US. General Electric acquired 51 percent share of ownership, sent a vice president, and provided the technology for bulb-making. Production equipment was bought from GE and Tokyo Denki soon started selling its products with GE's trademark.
In 1939, Tokyo Denki and Shibaura Seisakusho were merged to form Tokyo Shibaura Denki (Tokyo Shibaura Electric Company, now Toshiba).
1939 to 2000
Toshiba was founded in 1939 by the merger of Shibaura Seisakusho (Shibaura Engineering Works) and Tokyo Denki (Tokyo Electric). Shibaura Seisakusho had been founded as Tanaka Seisakusho by Tanaka Hisashige in July 1875 as Japan's first manufacturer of telegraph equipment. In 1904, it was renamed Shibaura Seisakusho. Through the first decades of the 20th century, Shibaura Seisakusho had become a major manufacturer of heavy electrical machinery as Japan modernized during the Meiji Era and became a world industrial power. Tokyo Denki was founded as Hakunetsusha in 1890 and had been Japan's first producer of incandescent electric lamps. It later diversified into the manufacture of other consumer products and in 1899 had been renamed Tokyo Denki. The merger of Shibaura and Tokyo Denki created a new company called Tokyo Shibaura Denki (Tokyo Shibaura Electric) (). It was soon nicknamed Toshiba, but it was not until 1978 that the company was officially renamed Toshiba Corporation.
The group expanded rapidly, driven by a combination of organic growth and by acquisitions, buying heavy engineering, and primary industry firms in the 1940s and 1950s. Groups created include Toshiba Music Industries/Toshiba EMI (1960), Toshiba International Corporation (the 1970s) Toshiba Electrical Equipment (1974), Toshiba Chemical (1974), Toshiba Lighting and Technology (1989), Toshiba America Information Systems (1989) and Toshiba Carrier Corporation (1999).
Toshiba is responsible for a number of Japanese firsts, including radar (1912), the TAC digital computer (1954), transistor television, color CRTs and microwave oven (1959), color video phone (1971), Japanese word processor (1978), MRI system (1982), laptop personal computer (1986), NAND EEPROM (1991), DVD (1995), the Libretto sub-notebook personal computer (1996) and HD DVD (2005).
In 1977, Toshiba acquired the Brazilian company Semp (Sociedade Eletromercantil Paulista), subsequently forming Semp Toshiba through the combination of the two companies' South American operations.
In 1987, Tocibai Machine, a subsidiary of Toshiba, was accused of illegally selling CNC milling machines used to produce very quiet submarine propellers to the Soviet Union in violation of the CoCom agreement, an international embargo on certain countries to COMECON countries. The Toshiba-Kongsberg scandal involved a subsidiary of Toshiba and the Norwegian company Kongsberg Vaapenfabrikk. The incident strained relations between the United States and Japan, and resulted in the arrest and prosecution of two senior executives, as well as the imposition of sanctions on the company by both countries. Senator John Heinz of Pennsylvania said "What Toshiba and Kongsberg did was ransom the security of the United States for $517 million."
2000 to 2010
In 2001, Toshiba signed a contract with Orion Electric, one of the world's largest OEM consumer video electronic makers and suppliers, to manufacture and supply finished consumer TV and video products for Toshiba to meet the increasing demand for the North American market. The contract ended in 2008, ending seven years of OEM production with Orion.
In December 2004, Toshiba quietly announced it would discontinue manufacturing traditional in-house cathode-ray tube (CRT) televisions. In 2005, Matsushita Toshiba Picture Display Co. Ltd. (a joint venture between Panasonic and Toshiba created in 2002) stopped production of CRTs at its factory in Horseheads, New York. A year later, in 2006, it stopped production at its Malaysian factory, following heavy losses. In 2006, Toshiba terminated sales of CRT TVs in Japan and production of in-house plasma TVs. To ensure its future competitiveness in the flat-panel digital television and display market, Toshiba has made a considerable investment in a new kind of display technology called SED. This technology, however, was never sold to the public, as it was not price-competitive with LCDs. Before World War II, Toshiba was a member of the Mitsui Group zaibatsu (family-controlled vertical monopoly). Today Toshiba is a member of the Mitsui keiretsu (a set of companies with interlocking business relationships and shareholdings), and still has preferential arrangements with Mitsui Bank and the other members of the keiretsu. Membership in a keiretsu has traditionally meant loyalty, both corporate and private, to other members of the keiretsu or allied keiretsu. This loyalty can extend as far as the beer the employees consume, which in Toshiba's case is Asahi.
In July 2005, BNFL confirmed it planned to sell Westinghouse Electric Company, then estimated to be worth $1.8 billion (£1 billion). The bid attracted interest from several companies including Toshiba, General Electric and Mitsubishi Heavy Industries and when the Financial Times reported on 23 January 2006 that Toshiba had won the bid, it valued the company's offer at $5 billion (£2.8 billion). The sale of Westinghouse by the Government of the United Kingdom surprised many industry experts, who questioned the wisdom of selling one of the world's largest producers of nuclear reactors shortly before the market for nuclear power was expected to grow substantially; China, the United States and the United Kingdom are all expected to invest heavily in nuclear power. The acquisition of Westinghouse for $5.4 billion was completed on 17 October 2006, with Toshiba obtaining a 77 percent share, and partners The Shaw Group a 20 percent share and Ishikawajima-Harima Heavy Industries Co. Ltd. a 3 percent share.
In late 2007, Toshiba took over from Discover Card as the sponsor of the top-most screen of One Times Square in New York City. It displays the iconic 60-second New Year's countdown on its screen, as well as messages, greetings, and advertisements for the company. The sponsor of the New Year's countdown was taken over by Capital One on 31 December 2018.
In January 2009, Toshiba acquired the HDD business of Fujitsu.
2010 to 2014
Toshiba announced on 16 May 2011, that it had agreed to acquire all of the shares of the Swiss-based advanced-power-meter maker Landis+Gyr for $2.3 billion. In 2010 the company released a series of television models including the WL768, YL863, VL963 designed in collaboration with Danish designer Timothy Jacob Jensen.
In April 2012, Toshiba agreed to acquire IBM's point-of-sale business for $850 million, making it the world's largest vendor of point-of-sale systems.
In July 2012, Toshiba was accused of fixing the prices of LCD panels in the United States at a high level. While such claims were denied by Toshiba, they have agreed to settle alongside several other manufacturers for a total of $571 million.
In December 2013, Toshiba completed its acquisition of Vijai Electricals Limited plant at Hyderabad and set up its own base for manufacturing of transmission and distribution products (transformers and switchgears) under the Social Infrastructure Group in India as Toshiba Transmission & Distribution Systems (India) Private Limited.
In January 2014, Toshiba completed its acquisition of OCZ Storage Solutions. OCZ Technology stock was halted on 27 November 2013. OCZ then stated they expected to file a petition for bankruptcy and that Toshiba Corporation had expressed interest in purchasing its assets in a bankruptcy proceeding. On 2 December 2013, OCZ announced Toshiba had agreed to purchase nearly all of OCZ's assets for $35 million. The deal was completed on 21 January 2014 when the assets of OCZ Technology Group became a new independently operated subsidiary of Toshiba named OCZ Storage Solutions. OCZ Technology Group then changed its name to ZCO Liquidating Corporation; on 18 August 2014, ZCO Liquidating Corporation and its subsidiaries were liquidated. OCZ Storage Solutions was dissolved on 1 April 2016 and absorbed into Toshiba America Electronic Components, Inc., with OCZ becoming a brand of Toshiba.
In March 2014, Toshiba sued SK Hynix, accusing the company of stealing technology of its NAND flash memory. In the late same year, the two companies settled with a deal in which SK Hynix pays US$278 million to Toshiba. Toshiba had sued Hynix in the early 2000s for patent infringement.
In October 2014, Toshiba and United Technologies agreed a deal to expand their joint venture outside Japan.
2015 accounting scandal
Toshiba first announced in May 2015 that it was investigating an accounting scandal and it might have to revise its profits for the previous three years. On 21 July 2015, CEO Hisao Tanaka announced his resignation amid an accounting scandal that he called "the most damaging event for our brand in the company's 140-year history". Profits had been inflated by $1.2 billion over the previous seven years. Eight other senior officials also resigned, including the two previous CEOs. Chairman Masashi Muromachi was appointed acting CEO. Following the scandal, Toshiba Corp. was removed from a stock index showcasing Japan's best companies. That was the second reshuffle of the index, which picks companies with the best operating income, return on equity and market value.
Toshiba announced in early 2015 that they would stop making televisions in its own factories. From 2015 onward, Toshiba televisions will be made by Compal for the U.S., or by Vestel and other manufacturers for the European market.
In September 2015, Toshiba shares fell to their lowest point in two and a half years. The firm said in a statement that its net losses for the quarterly period were 12.3 billion yen ($102m; £66m). The company noted poor performances in its televisions, home appliances and personal computer businesses.
In October 2015, Toshiba sold the image sensor business to Sony.
In December 2015, Muromachi said the episode had wiped about $8 billion off Toshiba's market value. He forecast a record 550 billion yen (about US$4.6 billion) annual loss and warned the company would have to overhaul its TV and computer businesses. Toshiba would not be raising funds for two years, he said. The next week, a company spokesperson announced Toshiba would in early 2016 seek 300 billion yen ($2.5 billion), taking the company's indebtedness to more than 1 trillion yen (about $8.3 billion).
In January 2016, Toshiba's security division unveiled a new bundle of services for schools that use its surveillance equipment. The program, which is intended for both K-12 and higher education, includes education discounts, alerts, and post-warranty support, among other features, on its IP-based security gear.
As of March 2016, Toshiba is preparing to start construction on a cutting-edge new semiconductor plant in Japan that will mass-produce chips based on the ultra-dense flash variant. Toshiba expects to spend approximately 360 billion yen, or $3.2 billion, on the project through May 2019.
In April 2016, Toshiba recalled 100,000 faulty laptop lithium-ion batteries, which are made by Panasonic, that can overheat, posing burn and fire hazards to consumers, according to the U.S. Consumer Product Safety Commission. Toshiba first announced the recall in January and said it was recalling the batteries in certain Toshiba Notebook computers sold since June 2011.
In May 2016, it was announced that Satoshi Tsunakawa, the former head of Toshiba's medical equipment division, was named CEO. This appointment came after the accounting scandal that occurred.
In September 2016, Toshiba announced the first wireless power receiver IC using the Qi 1.2.2 specification, developed in association with the Wireless Power Consortium.
In December 2016, Toshiba Medical Systems Corporation was acquired by Canon.
A Chinese electrical appliance corporation Midea Group bought a controlling 80.1% stake in the Toshiba Home Appliances Group.
2017 US nuclear construction liabilities
In late December 2016, the management of Toshiba requested an "urgent press briefing" to announce that the newly-found losses in the Westinghouse subsidiary from Vogtle Electric Generating Plant nuclear plant construction would lead to a write-down of several billion dollars, bankrupting Westinghouse and threatening to bankrupt Toshiba. The exact amount of the liabilities was unavailable.
In January 2017, a person with direct knowledge of the matter reported that the company plans on making its memory chip division a separate business, to save Toshiba from bankruptcy.
In February 2017, Toshiba revealed unaudited details of a 390 billion yen ($3.4 billion) corporate wide loss, mainly arising from its majority owned US based Westinghouse nuclear construction subsidiary which was written down by 712 billion yen ($6.3 billion). On 14 February 2017, Toshiba delayed filing financial results, and chairman Shigenori Shiga, formerly chairman of Westinghouse, resigned.
Construction delays, regulatory changes and cost overruns at Westinghouse built nuclear facilities Vogtle units 3 and 4 in Waynesboro, Georgia and VC Summer units 2 and 3 in South Carolina, are cited as the main causes of the dramatic fall in Toshiba's financial performance and collapse in the share price. Fixed priced construction contracts negotiated by Westinghouse with Georgia Power have left Toshiba with uncharted liabilities that will likely result in the sale of key Toshiba operating subsidiaries to secure the company's future.
Westinghouse filed for Chapter 11 bankruptcy protection on 29 March 2017. It was estimated this would cost 9 billion dollar annual net loss.
On 11 April 2017, Toshiba filed unaudited quarterly results. Auditors PricewaterhouseCoopers had not signed of the accounts because of uncertainties at Westinghouse. Toshiba stated that "substantial doubt about the company's ability to continue as a going concern exists". On 25 April 2017, Toshiba announced its decision to replace its auditor after less than a year. Earlier in April, the company filed twice-delayed business results without an endorsement from auditor PricewaterhouseCoopers (PwC).
On 20 September 2017, Toshiba's board approved a deal to sell its memory chip business to a group led by Bain Capital for US$18 billion, with financial backing by companies such as Apple, Dell Technologies, Hoya Corporation, Kingston Technology, Seagate Technology, and SK Hynix. The newly independent company was named Toshiba Memory Corporation, and then renamed Kioxia.
On 15 November 2017, Hisense reached a deal to acquire 95% of Toshiba Visual Solutions (televisions) for US$113.6 million.
Later that month, the company announced that it would pull out of its long-standing sponsorships of the Japanese television programs Sazae-san, Nichiyō Gekijo, and the video screens topping out One Times Square in New York City. The company cited that the value of these placements were reduced by its exit from consumer-oriented lines of business.
On 6 April 2018, Toshiba announced the completion of the sale of Westinghouse's holding company to Brookfield Business Partners and some partners for $4.6 billion.
Present
In June 2018, Toshiba sold 80.1% of its Client Solutions (personal computers) business unit to Sharp for $36m, with an option allowing Sharp to buy the remaining 19.9% share. Sharp renamed the business to Dynabook, a brand name Toshiba had used in Japan, and started releasing products under that name. On 30 June 2020, Sharp exercised its option to acquire the remaining 19.9% percent of Dynabook shares from Toshiba.
In May 2019, Toshiba announced that it would put non-Japanese investors on its board for the first time in nearly 80 years. In November, the company transferred its logistics service business to SBS Group.
In January 2020, Toshiba unveiled its plan to launch quantum cryptography services by September the same year. It also announced a number of other technologies waiting for commercialization, including an affordable solid-state Lidar based on silicon photomultiplier, high-capacity hydrogen fuel cells, and a proprietary computer algorithm named Simulated Bifurcation Algorithm that mimics quantum computing, of which it plans to sell access to other parties such as financial institutions, social networking services, etc. The company claims the algorithm running on a desktop PC at room temperature environment is capable of surpassing the performance of similar algorithms running on existing supercomputers, even that of laser-based quantum computer when a specialized setting is given. It has been added to quantum computing services offered by major cloud platforms including Microsoft Azure.
In October 2020, Toshiba made a decision to pull out of the system LSI business citing mounted losses while reportedly mulling on the sale of its semiconductor fabs as well. In April 2021, CVC Capital Partners made a takeover offer.
On 12 November 2021, Toshiba announced that it will split into three separate companies. Two of the companies will respectively focus on infrastructure and electronic devices; the third, which will retain the Toshiba name, would manage the 40.6% stake in Kioxia and all other remaining assets. The company expects to complete the plan by March 2024.
Operations
As of 2012, Toshiba had 39 R&D facilities worldwide, which employed around 4,180 people, and was organized into four main business groupings: the Digital Products Group, the Electronic Devices Group, the Home Appliances Group and the Social Infrastructure Group. In the year ended 31 March 2012, Toshiba had total revenues of , of which 25.2 percent was generated by the Digital Products Group, 24.5 percent by the Electronic Devices Group, 8.7 percent by the Home Appliances Group, 36.6 percent by the Social Infrastructure Group and 5 percent by other activities. In the same year, 45 percent of Toshiba's sales were generated in Japan and 55 percent in the rest of the world.
Toshiba invested a total of in R&D in the year ended 31 March 2012, equivalent to 5.2 percent of sales. Toshiba registered a total of 2,483 patents in the United States in 2011, the fifth-largest number of any company (after IBM, Samsung Electronics, Canon and Panasonic).
Toshiba had around 141,256 employees as of 31 March 2018.
Products, services, and standards
Toshiba has had a range of products and services, including air conditioners, consumer electronics (including televisions and DVD and Blu-ray players), control systems (including air-traffic control systems, railway systems, security systems and traffic control systems), electronic point of sale equipment, elevators and escalators, home appliances (including refrigerators and washing machines), IT services, lighting, materials and electronic components, medical equipment (including CT and MRI scanners, ultrasound equipment and X-ray equipment), office equipment, business telecommunication equipment personal computers, semiconductors, power systems (including electricity turbines, fuel cells and nuclear reactors) power transmission and distribution systems, and TFT displays.
HD DVD
Toshiba had played a critical role in the development and proliferation of DVD. On 19 February 2008, Toshiba announced that it would be discontinuing its HD DVD storage format, the successor of DVD, following defeat in a format war against Blu-ray. The HD DVD format had failed after most of the major US film studios backed the Blu-ray format, which was developed by Sony, Panasonic, Philips and Pioneer Corporation. Conceding the abandonment of HD DVD, Toshiba's president, Atsutoshi Nishida said "We concluded that a swift decision would be best [and] if we had continued, that would have created problems for consumers, and we simply had no chance to win".
Toshiba continued to supply retailers with machines until the end of March 2008, and continued to provide technical support to the estimated one million people worldwide who owned HD DVD players and recorders. Toshiba announced a new line of stand-alone Blu-ray players as well as drives for PCs and laptops, and subsequently joined the BDA, the industry body which oversees the development of the Blu-ray format.
REGZA
REGZA (Real Expression Guaranteed by Amazing Architecture) is a unified television brand owned and manufactured by Toshiba. In 2010 REGZA name disappeared from the North American market, and from March 2015 new TVs carrying the Toshiba name are designed and produced by Compal Electronics, a Taiwanese company, to which Toshiba has licensed its name. REGZA is also used in Android-based smartphones that were developed by Fujitsu Toshiba Mobile Communications.
3D television
In October 2010, Toshiba unveiled the Toshiba Regza GL1 21" LED-backlit LCD TV glasses-free 3D prototype at CEATEC 2010. This system supports 3D capability without glasses (utilizing an integral imaging system of 9 parallax images with a vertical lenticular sheet). The retail product was released in December 2010.
4K Ultra HD televisions
4K Ultra HD (3840×2160p) televisions provides four times the resolution of 1080p Full HD televisions. Toshiba's 4K HD LED televisions are powered by a CEVO 4K Quad + dual-core processor.
Laptops
In 1985, Toshiba released the T1100, the world's first commercially accepted laptop PC.
In October 2014, Toshiba released the Chromebook 2, a new version with a thinner profile and a much-improved display. The Chromebook runs exclusively on Chrome OS and gives users free Google Drive storage and access to a collection of apps and extensions at the Chrome Web Store. Toshiba initialized process of divestment of the personal computer and laptop business, Toshiba Client Solutions, in 2018 with sale of 80.1% of shares to Sharp Corporation. Eventually Toshiba fully exited from the personal computing market in June 2020, transferring the remaining 19.9% shares in Toshiba Client Solutions (since being renamed to Dynabook Inc.) to Sharp. Divested personal computing business of Toshiba has adopted Dynabook name after one of its product lines and a concept of a computer for children.
Flash memory
In the 1980s, a Toshiba team led by Fujio Masuoka invented flash memory, both NOR and NAND types. In March 2015, Toshiba announced the development of the first 48-layer, three-dimensional flash memory. The new flash memory is based on a vertical stacking technology that Toshiba calls BiCS (Bit Cost Scaling), stores two bits of data per transistor, and can store 128Gbits (16GB) per chip. This allowed flash memory to keep scaling up the capacity as Moore's Law was considered to be obsolete. Toshiba's memory division was spun off as Toshiba Memory Corporation, now Kioxia.
Environmental record
Toshiba has been judged as making "low" efforts to lessen its impact on the environment. In November 2012, they came second from the bottom in Greenpeace's 18th edition of the Guide to Greener Electronics that ranks electronics companies according to their policies on products, energy, and sustainable operations. Toshiba received 2.3 of a possible 10 points, with the top company (WIPRO) receiving 7.1 points. "Zero" scores were received in the categories "Clean energy policy advocacy", "Use of recycled plastics in products" and "Policy and practice on sustainable sourcing of fibres for paper".
In 2010, Toshiba reported that all of its new LCD TVs comply with the Energy Star standards and 34 models exceed the requirements by 30% or more.
Toshiba also partnered with China's Tsinghua University in 2008 in order to form a research facility to focus on energy conservation and the environment. The new Toshiba Energy and Environment Research Center is located in Beijing where forty students from the university will work to research electric power equipment and new technologies that will help stop the global warming process. Through this partnership, Toshiba hopes to develop products that will better protect the environment and save China. This contract between Tsinghua University and Toshiba originally began in October 2007 when they signed an agreement on joint energy and environment research. The projects that they conduct work to reduce car pollution and to create power systems that don't negatively affect the environment.
On 28 December 1970 Toshiba began the construction of unit 3 of the Fukushima Daiichi Nuclear Power Plant which was damaged in the Fukushima I nuclear accidents on 14 March 2011. In April 2011, CEO Norio Sasaki declared nuclear energy would "remain as a strong option" even after the Fukushima I nuclear accidents.
In late 2013, Toshiba (Japan) entered the solar power business in Germany, installing PV systems on apartment buildings.
See also
List of Toshiba subsidiaries
References
External links
Business data for Tōshiba (TYO:6502) at Tokyo Stock Exchange, Inc.
Business data for Tōshiba (NAG:6502) at Nagoya Stock Exchange, Inc.
Japanese companies established in 1875
Conglomerate companies based in Tokyo
Accounting scandals
Electronics companies established in 1875
Companies listed on the Nagoya Stock Exchange
Companies listed on the Osaka Exchange
Companies listed on the Tokyo Stock Exchange
Computer hardware companies
Computer memory companies
Computer storage companies
Consumer battery manufacturers
Consumer electronics brands
Defense companies of Japan
Display technology companies
Electrical engineering companies of Japan
Elevator manufacturers
Escalator manufacturers
Home appliance manufacturers of Japan
Heating, ventilation, and air conditioning companies
Japanese brands
Lighting brands
Locomotive manufacturers of Japan
Manufacturing companies based in Tokyo
Technology companies established in 1875
Medical technology companies of Japan
Mitsui
Multinational companies headquartered in Japan
Netbook manufacturers
Nuclear technology companies of Japan
Point of sale companies
Robotics companies of Japan
Scandals in Japan
Semiconductor companies of Japan
Video equipment manufacturers
State-owned film companies
Electric motor manufacturers
Engine manufacturers of Japan |
458505 | https://en.wikipedia.org/wiki/Domain%20name%20registrar | Domain name registrar | A domain name registrar is a company that manages the reservation of Internet domain names. A domain name registrar must be accredited by a generic top-level domain (gTLD) registry or a country code top-level domain (ccTLD) registry. A registrar operates in accordance with the guidelines of the designated domain name registries.
History
Until 1999, Network Solutions Inc. (NSI) operated the registries for the com, net, and org top-level domains (TLDs). In addition to the function of domain name registry operator, it was also the sole registrar for these domains. However, several companies had developed independent registrar services. In 1996 one such company, Ivan Pope's company, NetNames, developed the concept of a standalone commercial domain name registration service which would sell domain registration and other associated services to the public, effectively establishing the retail arm of an industry with the registries being the wholesalers. NSI assimilated this model, which ultimately led to the separation of registry and registrar functions.
In 1997, PGMedia filed an antitrust suit against NSI citing the DNS root zone as an essential facility, and the US National Science Foundation (NSF) was joined as a defendant in this action. Ultimately, NSI was granted immunity from antitrust litigation, but the litigation created enough pressure to restructure the domain name market.
In October 1998, following pressure from the growing domain name registration business and other interested parties, NSI's agreement with the United States Department of Commerce was amended. This amendment required the creation of a shared registration system that supported multiple registrars. This system officially commenced service on November 30, 1999 under the supervision of the Internet Corporation for Assigned Names and Numbers (ICANN), although there had been several testbed registrars using the system since March 11, 1999. Since then, over 900 registrars have entered the market for domain name registration services.
Of the registrars who initially entered the market, many have continued to grow and outpace rivals. GoDaddy is the largest registrar. Other widely used registrars include Enom, Tucows, and Webcentral. Registrars who initially led the market but later were surpassed by rivals include Network Solutions and Dotster.
Each ICANN-accredited registrar must pay a fixed fee of US$4,000 plus a variable fee. The sum of variable registrar fees is intended to total US$3.8 million. The competition created by the shared registration system enables end users to choose from many registrars offering a range of related services at varying prices.
Designated registrar
Domain registration information is maintained by the domain name registries, which contract with domain registrars to provide registration services to the public. An end user selects a registrar to provide the registration service, and that registrar becomes the designated registrar for the domain chosen by the user.
Only the designated registrar may modify or delete information about domain names in a central registry database. It is not unusual for an end user to switch registrars, invoking a domain transfer process between the registrars involved, that is governed by specific domain name transfer policies.
When a registrar registers a .com domain name for an end-user, it must pay a maximum annual fee of US$7.85 to VeriSign, the registry operator for com, and a US$0.18 annual administration fee to ICANN. Most domain registrars price their services and products to address both the annual fees and the administration fees that must be paid to ICANN. Barriers to entry into the bulk registrar industry are high for new companies without an existing customer base.
Many registrars also offer registration through reseller affiliates. An end-user registers either directly with a registrar, or indirectly through one or more layers of resellers. As of 2010, the retail cost generally ranges from a low of about $7.50 per year to about $35 per year for a simple domain registration, although registrars often drop the price far lower—sometimes even free—when ordered with other products such as web hosting services.
The maximum period of registration for a domain name is 10 years. Some registrars offer longer periods of up to 100 years, but such offers involve the registrar renewing the registration for their customer; the 100-year registration would not be in the official registration database.
DNS hosting
Registration of a domain name establishes a set of name server records in the DNS servers of the parent domain, indicating the IP addresses of DNS servers that are authoritative for the domain. This provides a reference for direct queries of domain data.
Registration of a domain does not automatically imply the provision of DNS services for the registered domain. Most registrars do offer DNS hosting as an optional free service for domains registered through them. If DNS services are not offered, or the end-user opts out, the end-user is responsible for procuring or self-hosting DNS services. Registrars require the specification of usually at least two name servers.
DNSSEC support
The Domain Name System Security Extensions (DNSSEC) is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System. This involves a registrar processing public key data and creating DS records for addition into the parent zone. All new GTLD registries and registrars must support DNSSEC.
Domain name transfer
A domain name transfer is the process of changing the designated registrar of a domain name. ICANN has defined a Policy on Transfer of Registrations between Registrars. The usual process of a domain name transfer is
The end user verifies that the whois admin contact info is correct, particularly the email address; obtains the authentication code (EPP or UDAI transfer code) from the old registrar, and removes any domain lock that has been placed on the registration. If the whois information had been out of date and is now updated, the end-user should wait 12–24 hours before proceeding further, to allow time for the updated data to propagate.
The end user contacts the new registrar with the wish to transfer the domain name to their service, and supplies the authentication code.
The gaining Registrar must obtain express authorization from either the Registered Name Holder or the Administrative Contact. A transfer may only proceed if confirmation of the transfer is received by the gaining Registrar from one of these contacts. The authorization must be made via a valid Standardized Form of Authorization, which may be sent e.g. by e-mail to the e-mail addresses listed in the WHOIS. The Registered Name Holder or the Administrative Contact must confirm the transfer. The new registrar starts electronically the transfer of the domain with the help of the authentication code (auth code).
The old registrar will contact the end user to confirm the authenticity of this request. The end user may have to take further action with the old registrar, such as returning to the online management tools, to re-iterate their desire to proceed, in order to expedite the transfer.
The old registrar will release authority to the new registrar.
The new registrar will notify the end user of transfer completion. The new registrar may have automatically copied over the domain server information, and everything on the website will continue to work as before. Otherwise, the domain server information will need to be updated with the new registrar.
After this process, the new registrar is the domain name's designated registrar. The process may take about five days. In some cases, the old registrar may intentionally delay the transfer as long as allowable. After transfer, the domain cannot be transferred again for 60 days, except back to the previous registrar.
It is unwise to attempt to transfer a domain immediately before it expires. In some cases, a transfer can take up to 14 days, meaning that the transfer may not complete before the registration expires. This could result in loss of the domain name registration and failure of the transfer. To avoid this, end users should either transfer well before the expiration date, or renew the registration before attempting the transfer.
If a domain registration expires, irrespective of the reason, it can be difficult, expensive, or impossible for the original owner to get it back. After the expiration date, the domain status often passes through several management phases, often for a period of months; usually it does not simply become generally available.
Transfer scams
The introduction of a shared registry system opened up the previous domain registration monopoly to new entities known as registrars, which were qualified by ICANN to do business. Many registrars had to compete with each other, and although some companies offered value added services or used viral marketing, others, such as VeriSign and the Domain Registry of America attempted to trick customers to switch from their current registrar using a practice known as domain slamming.
Many of these transfer scams involve a notice sent in the mail, fax, or e-mail. Some scammers contact end-users by telephone (because the contact information is available through WHOIS) to obtain more information. These notices would include information publicly available from the WHOIS database to add to the look of authenticity. The text would include legalese to confuse the end user into thinking that it is an official binding notice. Scam registrars go after domain names that are expiring soon or have recently expired. Domain name expiry dates are readily available via WHOIS.
Drop catcher
A drop catcher is a domain name registrar who offers the service of attempting to quickly register a given domain name for a customer if that name becomes available—that is, to "catch" a "dropped" name—when the domain name's registration expires and is then deleted, either because the registrant abandons the domain or because the registrant did not renew the registration prior to deletion.
Registrar rankings
Several organizations post market-share-ranked lists of domain name registrars and numbers of domains registered at each. The published lists differ in which top-level domains (TLDs) they use; in the frequency of updates; and in whether their basic data is absolute numbers provided by registries, or daily changes derived from Zone files.
The lists appear to all use at most 16 publicly available generic TLDs (gTLDs) that existed as of December 2009, plus .us. A February 2010 ICANN zone file access concept paper explains that most country code TLD (ccTLD) registries stopped providing zone files in 2003, citing abuse.
Published rankings and reports include:
Monthly (but with approximately a three-month delay), ICANN posts registry reports created by the registries of all gTLDs. These reports list absolute numbers of domains registered with each ICANN-accredited registrar.
Yearly (but covering only the period from 2002 to 2007), DomainTools.com, operated by Name Intelligence, Inc., published registrar statistics. Totals included .com, .net, .org, .info, .biz and .us. It cited "daily changes" (presumably from daily zone files) as the basis for its yearly aggregates.
See also
Drop registrar
Private sub-domain registry
References
External links
List of ICANN accredited registrars
Domain Name System |
41476820 | https://en.wikipedia.org/wiki/Meanings%20of%20minor%20planet%20names%3A%209001%E2%80%9310000 | Meanings of minor planet names: 9001–10000 |
9001–9100
|-
| 9001 Slettebak || || Arne Slettebak (1925–1999) was for 16 years chair of the department of astronomy of Ohio State University. His principal research interests were stellar rotation and spectroscopy, particularly the study of Be stars. He led the effort to move the 1.8-m Perkins telescope from Ohio to the Lowell Observatory. ||
|-id=002
| 9002 Gabrynowicz || || Joanne Irene Gabrynowicz (1949) is Emerita Professor, Director of the National Center for Remote Sensing, Air, and Space Law of the University of Mississippi School of Law, and Editor-in-Chief of the Journal of Space Law. She has spoken in front of the U.S. Congress and the United Nations on matters of space law. ||
|-id=003
| 9003 Ralphmilliken || || Ralph E. Milliken (born 1978), a planetary science professor at Brown University. ||
|-id=004
| 9004 Peekaydee || || Philip K. Dick (1928–1982), an American science fiction author. Many of his works have been made into movies, such as Blade Runner, Total Recall and Minority Report. ||
|-id=005
| 9005 Sidorova || || Sophia Ivanovna Sidorova (born 1943), public education worker in Ukraine and leader of the Crimean Republic Committee for the education of workers. ||
|-id=006
| 9006 Voytkevych || || Vanda Georgievna Voytkevych (born 1949), friend of astronomer Lyudmila Karachkina who discovered this asteroid ||
|-id=007
| 9007 James Bond || || James Bond, "agent 007", fictional British spy ||
|-id=008
| 9008 Bohšternberk || 1984 BS || Bohumil Šternberk (1897–1983), Czech astronomer ||
|-id=009
| 9009 Tirso || || Thyrsus (Tirso), the scepter of Dionysus; Italian acronym of the Circolo eno-g-astronomico TIRSO (for "all together enjoying, studying, observing"), a scientific and cultural circle ||
|-id=010
| 9010 Candelo || || Candelo, Italy, a small town in northern Piedmont, famous for its Ricetto fortified village, and host of cultural and astronomical events ||
|-id=011
| 9011 Angelou || 1984 SU || Maya Angelou (1928–2014), born Marguerite Annie Johnson, an American poet, author, and civil rights activist ||
|-id=012
| 9012 Benner || 1984 UW || Lance A. M. Benner (born 1964), an American radio astronomer at the Jet Propulsion Laboratory (Src). ||
|-id=013
| 9013 Sansaturio || || Maria Eugenia Sansaturio (born 1959), a mathematician at the University of Valladolid. ||
|-id=014
| 9014 Svyatorichter || || Svyatoslav Richter (1915–1997), Russian pianist and People's artist of the U.S.S.R. ||
|-id=015
| 9015 Coe || 1985 VK || Malcolm Coe (born 1949) is Professor of Astronomy at the University of Southampton in the U.K. For four decades his research has centered on Be X-ray binaries in the Milky Way and Magellanic Cloud galaxies, both in X-ray and optical/infrared wavelengths. But his true passion in life is Southampton Football Club. ||
|-id=016
| 9016 Henrymoore || 1986 AE || Henry J. Moore (1928–1998), a geologist with the U.S. Geological Survey since 1960. ||
|-id=017
| 9017 Babadzhanyan || || Arno Babajanian (1921–1983), a Soviet composer and pianist. ||
|-id=018
| 9018 Galache || 1987 JG || José Luis Galache (born 1975) has worked at the Minor Planet Center (MPC) since 2009 and handles, amongst other things, the MPC's social media presence. For his doctoral work, he studied X-ray binaries in the Small Magellanic Cloud ||
|-id=019
| 9019 Eucommia || || Eucommiaceae, a family with only one member, the elmlike Eucommia ulmoides, a vigorous and decorative plant. It is the only tree from temperate regions that produces latex in small quantities. ||
|-id=020
| 9020 Eucryphia || || Eucryphiaceae, a family with five species in a single genus. Eucryphia cordifolia (Chilean elm) may reach a height of 12 m. Hybrids between the different species are cultivated for the garden. ||
|-id=021
| 9021 Fagus || || Fagaceae, the beech family, with eight genera and over 1000 species, including oaks and chestnuts. Well-known species are Fagus grandifolia (American beech) and Fagus sylvatica (European beech). ||
|-id=022
| 9022 Drake || || Michael J. Drake (born 1946), American cosmochemist and geochemist ||
|-id=023
| 9023 Mnesthus || || Mnestheus from Greek mythology. He a Trojan who went to the Italian peninsula to fight the Latins as an officer of Aeneas. ||
|-id=024
| 9024 Gunnargraps || || Gunnar Graps (1951–2004) was a popular, hard rock, beat and blues style Estonian singer and musician, referred to as Raudmees ("Iron Man"). Graps was a rebellious pioneer in the new Soviet rock scene for disenfranchised youth in the early 1980s, and the first true-blood rock star in Estonia. ||
|-id=025
| 9025 Polanskey || || Carol A. Polanskey (born 1960), a science operations expert at the Jet Propulsion Laboratory. ||
|-id=026
| 9026 Denevi || || Brett W. Denevi (born 1980), a planetary scientist at the Johns Hopkins University Applied Physics Laboratory and an expert in the composition and evolution of asteroid surfaces. ||
|-id=027
| 9027 Graps || || Amara Graps (born 1961) is a planetary scientist who concentrates on asteroids and comets, but has worked on every planet in the Solar System. She has analyzed data from many missions, such as New Horizons, Rosetta, Cassini and Voyager 2. She is Chief Scientist of Deep Space Industries Latvia. ||
|-id=028
| 9028 Konrádbeneš || || Konrád Beneš (1920–1999), Czech planetologist ||
|-id=030
| 9030 Othryoneus || || Othryoneus, from Greek mythology, who had taken part in the Trojan War in exchange for being allowed to marry Cassandra, King Priam's daughter. He was killed by Idomeneus during the Battle of the Ships. ||
|-id=032
| 9032 Tanakami || || Tanakami, extending over Shiga, Mie and Kyoto prefectures, is the site of the largest meteorite found in Japan. ||
|-id=033
| 9033 Kawane || 1990 AD || Kawane, a small town about 230 km west of Tokyo. ||
|-id=034
| 9034 Oleyuria || || Oleyuria, Ukrainian piano duo of Olga Scherbakova and Yuri Scherbakov. ||
|-id=038
| 9038 Helensteel || || Helen Margaret Steel (born 1959), wife of discoverer Duncan Steel ||
|-id=040
| 9040 Flacourtia || || Flacourtiaceae, the Indian plum family, with almost 90 genera and 900 species. Flacourtia indica (governor's plum) is one of the species, and the southeast Asian genus Hydnocarpus produces an oil that is used for treating some skin diseases. ||
|-id=041
| 9041 Takane || 1991 CX || Takane, name of the town in which the Otomo observatory is located. ||
|-id=044
| 9044 Kaoru || 1991 KA || Kaoru Ikeya (born 1964), lecturer and curator of the Gotoh Planetarium and Astronomical Museum in Tokyo. ||
|-id=052
| 9052 Uhland || || Johann Ludwig Uhland (1787–1862), a German poet. ||
|-id=053
| 9053 Hamamelis || || Hamamelidaceae, the witch-hazel family, with about 25 genera and 100 species, typical in South America and Africa. Hamamelis virginiana (witch hazel) is not a true hazel, although the leaves are similar. ||
|-id=054
| 9054 Hippocastanum || 1991 YO || Hippocastanaceae, the horse-chestnut family, with only two genera and 15 species. Aesculus hippocastanum (common horse-chestnut) is known for its creamy yellow flowers, in large, conical, upright panicles. ||
|-id=055
| 9055 Edvardsson || || Bengt Edvardsson (born 1956), Swedish astronomer ||
|-id=056
| 9056 Piskunov || || Nikolai Piskunov (born 1957), Swedish astrophysicist ||
|-id=059
| 9059 Dumas || 1992 PJ || Alexandre Dumas (1802–1870), the grandson of a French marquis and the son of a French general in Napoleon's army, a very well known writer. ||
|-id=060
| 9060 Toyokawa || 1992 RM || Hideji Toyokawa (1926–1995), a curator of the Gotoh Planetarium and Astronomical Museum in Tokyo. ||
|-id=062
| 9062 Ohnishi || || Michikazu Ohnishi (born 1933), a chemical plant engineer and lecturer in descriptive geometry. ||
|-id=063
| 9063 Washi || 1992 YS || Shinsho Washi (born 1951), the director of the Sakai City Planetarium. ||
|-id=064
| 9064 Johndavies || || John Keith Davies (born 1955), British astronomer/aviation engineer † ||
|-id=067
| 9067 Katsuno || 1993 HR || Gentaro Katsuno (born 1933), chief editor of Gekkan Tenmon Guide ("Monthly Astronomy Guide") from 1975 to 1987 ||
|-id=069
| 9069 Hovland || 1993 OV || Larry E. Hovland (born 1947), a senior engineer at the Jet Propulsion Laboratory. ||
|-id=070
| 9070 Ensab || || Leo Enright (born 1943) and Denise Sabatini (born 1950), Canadian astronomers ||
|-id=071
| 9071 Coudenberghe || || Peeter van Coudenberghe (1520–1594), Flemish botanist and pharmacist ||
|-id=073
| 9073 Yoshinori || 1994 ER || Yoshinori Kobayashi (born 1929), a professor emeritus at Hiroshima University and professor at Tokushima Bunri University. ||
|-id=074
| 9074 Yosukeyoshida || 1994 FZ || Yosuke Yoshida (born 1945), chief editor of Gekkan Tenmon Guide ("Monthly Astronomy Guide") from 1988 to 1993. ||
|-id=076
| 9076 Shinsaku || 1994 JT || Shinsaku Takasugi (1839–1867), Japanese samurai and revolutionary, who played the most important role in the success of the Meiji Restoration ||
|-id=077
| 9077 Ildo || 1994 NC || Ildo Lombardi (1934–1954), Italian gymnast and brother of Giuseppe Lombardi, a member of the team of amateur astronomers. ||
|-id=079
| 9079 Gesner || || Conrad Gessner (1516–1565), a versatile Swiss naturalist and bibliographer ||
|-id=080
| 9080 Takayanagi || 1994 TP || Yuichi Takayanagi (born 1939), a leading science commentator and producer of science programs of NHK Broadcasting Corporation in Japan. ||
|-id=081
| 9081 Hideakianno || 1994 VY || Hideaki Anno (born 1960), a Japanese animator and director. ||
|-id=082
| 9082 Leonardmartin || || Leonard J. Martin, planetary astronomer and cartographer at the Lowell Observatory. ||
|-id=083
| 9083 Ramboehm || || Jeff Ramos (born 1962) and Art Boehm (born 1944), friends of the discoverers Carolyn Shoemaker and David H. Levy. ||
|-id=084
| 9084 Achristou || || Apostolos Christou (born 1968), Planetary astronomer at the Irish Armagh Observatory ||
|-id=087
| 9087 Neff || || Vladimír Neff (1909–1983), Czech novelist and his son Ondřej Neff (born 1945), science fiction author ||
|-id=088
| 9088 Maki || || Fusao Maki (1916–2001), a songwriter who wrote many children's songs, school songs, home songs, citizen's songs and left hundreds of works. ||
|-id=090
| 9090 Chirotenmondai || || Chiro Astronomical Observatory or Chiro tenmondai in Western Australia. It was founded by Australian and Japanese amateur astronomers in 1995. ||
|-id=091
| 9091 Ishidatakaki || 1995 VK || Takaki Ishida (born 1948), principal of Sanyo Girls' High and Junior High School in Hatsukaichi City, Hiroshima Prefecture. ||
|-id=092
| 9092 Nanyang || || Nanyang City, in the southwest of Henan Province, is one of the cradles of Chinese civilization. ||
|-id=093
| 9093 Sorada || 1995 WA || Toshiyuki Sorada (born 1954), an amateur astronomer in Hiroshima City. ||
|-id=094
| 9094 Butsuen || 1995 WH || Kazunari Butsuen (born 1952), an amateur astronomer in Kure City, Hiroshima Prefecture. ||
|-id=096
| 9096 Tamotsu || || Tamotsu Fujii (born 1947), a member of the Oriental Astronomical Association since 1960 and president of the Yamashiro Astronomical Association since its founding in 1962. ||
|-id=097
| 9097 Davidschlag || || Davidschlag, Upper Austria, small Austrian village, some 10 km to the north of Linz, at the entrance to the Sterngartl ("small garden of stars") region, home of the Privatobservatorium Meyer/Obermair (Private Observatory Meyer/Obermair) † ||
|-id=098
| 9098 Toshihiko || || Toshihiko Osawa (1935–2001) was a genius in visual planetary observing. He began observing with his self-made telescope at age 12 and discovered "Osawa's spots" on Saturn in 1952. For more than half of his life he was ill, but he continued observing with his telescope on the roof of a hospital. ||
|-id=099
| 9099 Kenjitanabe || || Kenji Tanabe (born 1944), a professor at Okayama University of Science. ||
|-id=100
| 9100 Tomohisa || || Tomohisa Ohno (born 1948), a Japanese amateur astronomer. ||
|}
9101–9200
|-
| 9101 Rossiglione || || The small Italian town of Rossiglione. The town organizes cultural events, mainly of a scientific nature, that are attended by all the citizens, regardless of their level of education. ||
|-id=102
| 9102 Foglar || || Jaroslav Foglar (1907–1999), Czech children's author ||
|-id=103
| 9103 Komatsubara || || Mitsugu Komatsubara (born 1953), Japanese reporter and amateur astronomer who, together with Tomohisa Ohno, has recently rehabilitated the late comet and nova hunter Minoru Honda's observatory "Seijin-Sanso" ||
|-id=104
| 9104 Matsuo || 1996 YB || Atsushi Matsuo (born 1955), Japanese astronomy educator and historian ||
|-id=105
| 9105 Matsumura || 1997 AU || Masafumi Matsumura (born 1955), Japanese astronomer ||
|-id=106
| 9106 Yatagarasu || || Yatagarasu, the holy crow with three legs of Japanese mythology, who guided Jinmu, the so-called first emperor, and his troops from Kumano to Nara (The Chinese counterpart of the crow with three legs is said to live in the Sun, and could be a naked-eye sunspot) ||
|-id=107
| 9107 Narukospa || || Naruko, Miyagi (Naruko Onsen) is a town famous for its hot springs, visited by tourists all year long. Narukokyo is a gorge, 100 meters deep and known for its beautiful autumn leaves. Onikobe geyser ejects hot water 20 meters into the air. The Naruko crater on Mars is also named for the town ||
|-id=108
| 9108 Toruyusa || || Toru Yusa (born 1966) is director of the planetarium and observatory at the Osaki Lifelong Learning Center in Miyagi Prefecture and a member of the board of directors of the Japan Public Observatory Society. In addition to being a popularizer of astronomy, he is an enthusiastic observer of comets ||
|-id=109
| 9109 Yukomotizuki || || Yuko Motizuki (born 1965) is an associate professor at Saitama University. Her speciality is the theoretical study of nucleosynthesis, supernovae and neutron stars. She is also leading a team to examine the effects of solar cycles and supernovae on Antarctic ice cores ||
|-id=110
| 9110 Choukai || || Mount Choukai (2230 m) and the Choukai volcanic mountain range, Japan, national park and part of the border between Akita and Yamagata prefectures ||
|-id=111
| 9111 Matarazzo || || Giuseppe "Corrado" Matarazzo (born 1946), Italian mathematician from Sicily, amateur astronomer and orbit computer. In 1995 he co-authored Elementi di Calcolo delle Orbite. ||
|-id=112
| 9112 Hatsulars || || Hatsulars is the name of a women's chorus. Its members are mainly housewives of farming families of Kakegawa City. Founded in 1997, the chorus frequently makes public performances of songs in praise of nature, including the starry sky. "Hatsulars" is a coined word meaning "cheerful people" ||
|-id=114
| 9114 Hatakeyama || || Hideo Hatakeyama (born 1955) is a first-class registered architect and also an amateur astronomer. His projects include the design of Japanese astronomical facilities, as well the architectural design of business complexes. He is also interested in understanding the mechanisms of solar activity ||
|-id=115
| 9115 Battisti || 1997 DG || Lucio Battisti (1943–1998), Italian singer (Src) ||
|-id=116
| 9116 Billhamilton || || William O. Hamilton (born 1933), American professor of physics and astronomy at Louisiana State University, a pioneer in the development of an observational technique for gravitational radiation (Src) ||
|-id=117
| 9117 Aude || || AUDÉ, the Association des utilisateurs de détecteurs électroniques; users of electronic detectors association ||
|-id=119
| 9119 Georgpeuerbach || 1998 DT || Georg von Peuerbach (1423–1461), Austrian mathematician, astronomer, poet, early humanist and teacher of Regiomontanus ||
|-id=121
| 9121 Stefanovalentini || || Stefano Valentini (born 1955), Italian amateur astronomer, software developer and creator of WinAstrometry ||
|-id=122
| 9122 Hunten || || Donald M. Hunten (1925–2010), American astronomer, who has participated in space missions from Pioneer to Cassini ||
|-id=123
| 9123 Yoshiko || || Yoshiko Nakano (born 1933), Japanese director of the Gekko Observatory and educator ||
|-id=126
| 9126 Samcoulson || || Samuel Harold Coulson (born 1998) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for his earth and space sciences project ||
|-id=127
| 9127 Brucekoehn || || Bruce W. Koehn (born 1948), American astronomer and software developer. His software has been used by the LONEOS program. ||
|-id=128
| 9128 Takatumuzi || || Mount Takatumuzi (693 m), Japan, east of Nanyo city, Yamagata prefecture, where the discovery site is located ||
|-id=130
| 9130 Galois || || Évariste Galois (1811–1832), French mathematician and contributor to group theory ||
|-id=132
| 9132 Walteranderson || 2821 P-L || Walter Anderson (born 1953), chief executive officer of Entreé International ||
|-id=133
| 9133 d'Arrest || 3107 P-L || Heinrich Louis d'Arrest (1822–1875), a German astronomer ||
|-id=134
| 9134 Encke || 4822 P-L || Johann Franz Encke (1791–1865), an eminent German astronomer ||
|-id=135
| 9135 Lacaille || 7609 P-L || Nicolas Louis de Lacaille (1713–1762), a French astronomer ||
|-id=136
| 9136 Lalande || 4886 T-1 || Jérôme Lalande (1732–1807), a French astronomer ||
|-id=137
| 9137 Remo || 2114 T-2 || John L. Remo (born 1941), American physicist ||
|-id=138
| 9138 Murdoch || 2280 T-2 || Jean Iris Murdoch (1919–1999), a prolific novelist and philosopher ||
|-id=139
| 9139 Barrylasker || 4180 T-2 || Barry Lasker (1939–1999), American astronomer ||
|-id=140
| 9140 Deni || 4195 T-3 || the Department of Education for Northern Ireland (Deni), for its support of the support of the Armagh Observatory ||
|-id=141
| 9141 Kapur || 5174 T-3 || Shekhar Kapur (born 1945), Indian actor ||
|-id=142
| 9142 Rhesus || 5191 T-3 || Rhesus of Thrace, the king of the Thracians and ally of the Trojans ||
|-id=143
| 9143 Burkhead || 1955 SF || Martin S. Burkhead (born 1933), an emeritus professor at Indiana University ||
|-id=144
| 9144 Hollisjohnson || || Hollis R. Johnson (born 1928), an emeritus professor at Indiana University ||
|-id=145
| 9145 Shustov || || Boris Mikhailovich Shustov (born 1947), a deputy director at the Institute of Astronomy of the Russian Academy of Sciences ||
|-id=146
| 9146 Tulikov || || Sergeevich Tulikov (born 1914), a composer and an artist in the U.S.S.R. ||
|-id=147
| 9147 Kourakuen || || Kourakuen in Okayama is one of the three most outstanding gardens in Japan ||
|-id=148
| 9148 Boriszaitsev || || Boris Petrovich Zaitsev (1925–2000), People's artist of Ukraine ||
|-id=150
| 9150 Zavolokin || || Gennadij Dmitrievich Zavolokin (1943–2001), a famed player of the bayan (Russian accordion) ||
|-id=151
| 9151 Kettnergriswold || || Kettner John Frederick Griswold (born 1960) is the "Launch Vehicle Integration Manager" of the Lucy mission. ||
|-id=152
| 9152 Combe || || Jean-Philippe Combe (born 1977), a research scientist on the Dawn mission team analyzing the mineralogy of Vesta using visible and near-infrared mapping data ||
|-id=153
| 9153 Chikurinji || || Chikurinji is the mountain on which the Okayama Astrophysical Observatory is situated. ||
|-id=154
| 9154 Kol'tsovo || || Kol'tsovo, a suburb of Novosibirsk, is the site of the State Scientific Institute of Virology and Biotechnology of the Russian Ministry of Public Health ||
|-id=155
| 9155 Verkhodanov || || Vyacheslav Gennadievich Verkhodanov (born 1942), a Ukrainian economics and management specialist ||
|-id=156
| 9156 Malanin || || Ivan Ivanovich Malanin (1897–1969), Russian accordionist ||
|-id=158
| 9158 Platè || 1984 MR || Nikolaj Alfredovich Platè (born 1934), a chief scientific secretary of the Russian Academy of Sciences and director of the Institute of Petrochemical Synthesis in Moscow ||
|-id=159
| 9159 McDonnell || || J. A. M. ("Tony") McDonnell (born 1938) is recognized for his research on cosmic dust. With colleagues, he was the first to demonstrate the intact capture of space particulates in aerogel. He has flown instruments on a number of missions and has analyzed impact craters on lunar samples and satellite surfaces exposed to space. ||
|-id=161
| 9161 Beaufort || || Rear Admiral Sir Francis Beaufort (1774–1857), an admiral of the British Navy who devised the scale for classifying wind force at sea ||
|-id=162
| 9162 Kwiila || 1987 OA || Kwiila ("Black Oak"), one of the First People in the Luiseno creation story (the black oak is indigenous to Palomar Mountain, the discovery site) ||
|-id=164
| 9164 Colbert || 1987 SQ || Edwin H. Colbert (born 1905), a distinguished U.S. vertebrate paleontologist ||
|-id=165
| 9165 Raup || || David M. Raup (1933–2015), paleontologist and biological historian at the University of Chicago. ||
|-id=167
| 9167 Kharkiv || || Kharkiv (Kharkov), an industrial and cultural center, is one of the largest cities in Ukraine ||
|-id=168
| 9168 Sarov || || Sarov, a small town in the Nizhnij Novgorod region of the Russian Federation where the All-Russian Research Institute of Experimental Physics is located ||
|-id=171
| 9171 Carolyndiane || || Carolyn Diane Young (born 1940) has been a great support in encouraging her husband, veteran New Zealand amateur astronomer Albert Jones, in his endeavor to monitor variable stars and comets. ||
|-id=172
| 9172 Abhramu || 1989 OB || Abhramu, the "cloud-knitter", was the original female elephant who was a supernatural winged being who could change her shape at will, like the clouds that resemble her children. According to Indian legend, Abhramu's tribe lost its wings and magic by mischance. ||
|-id=173
| 9173 Viola Castello || || The small village of Viola Castello in Piedmont, northern Italy, located amid a very old chestnut-tree forest, which is taken care of by the villagers in harmony with nature. This minor planet's name was proposed by astronomer Vincenzo Zappalà. ||
|-id=175
| 9175 Graun || || Ken Graun (born 1955) has written two astronomical books. What's Out Tonight? is a major compilation of what the night sky will look like for the next 50 years. His introduction to the planets is intended for young children. ||
|-id=176
| 9176 Struchkova || || Raisa Stepanovna Struchkova (born 1925), a Russian ballerina at the Moscow Bolshoi Theatre since 1944 ||
|-id=177
| 9177 Donsaari || || Donald G. Saari (born 1940), an American mathematician who has worked at the University of California, Irvine, and at Northwestern University. Don has made fundamental contributions to the n-body problem of celestial mechanics, voting theory, and the application of mathematics to the social sciences. ||
|-id=178
| 9178 Momoyo || 1991 DU || Momoyo Urata, the wife of Japanese co-discoverer Takeshi Urata ||
|-id=179
| 9179 Satchmo || || Louis Armstrong (1901–1971), American jazz musician and one of the most influential figures in jazz ||
|-id=180
| 9180 Samsagan || 1991 GQ || The son of Carl Sagan and Ann Druyan, Samuel Democritus Druyan Sagan (born 1991) is inspired by the beauty and power of words. He hopes to become a writer. Family and friends recognize his kind ways and concern for others. ||
|-id=184
| 9184 Vasilij || || Vasilij Rumyantsev (born 1968), a Russian astronomer ||
|-id=186
| 9186 Fumikotsukimoto || || Fumiko Tsukimoto (born 1987), a painter and illustrator, whose nickname is "Painting Witch" ||
|-id=187
| 9187 Walterkröll || || Walter Kröll (born), German physicist () ||
|-id=189
| 9189 Hölderlin || || Friedrich Hölderlin (1770–1843), German poet ||
|-id=190
| 9190 Masako || || Masako Muramatsu, wife of Japanese co-discoverer Osamu Muramatsu ||
|-id=191
| 9191 Hokuto || 1991 XU || Hokuto-shi is the largest city in Yamanashi-ken in Japan. The city, home to the discoverer, is famous for its beautiful starlit sky ||
|-id=193
| 9193 Geoffreycopland || || Geoffrey Malcolm Copland, British physicist ||
|-id=194
| 9194 Ananoff || || Alexandre Ananoff (1910–1992) was a Russian-French space expert, author of L´Astronautique (1950) and organizer of the first International Astronautical Congress. In 1950 he was the first recipient of the Hermann Oberth Medal, and he was an advisor on fellow writer Hergé's Adventures of Tintin on the Moon ||
|-id=196
| 9196 Sukagawa || || Sukagawa, Fukushima, Japan ||
|-id=197
| 9197 Endo || || Shu Endo (born 1953), one of Japan's leading astrophotographers ||
|-id=198
| 9198 Sasagamine || || Sasagamine, mountain in Shikoku, Japan ||
|}
9201–9300
|-id=203
| 9203 Myrtus || || Myrtaceae, the myrtle family of aromatic trees and shrubs, with more than 100 genera and nearly 4000 species. This family is typical of the Southern Hemisphere, where the Eucalyptus genus is prevalent. Myrtus communis (common myrtle) is a species native to the Mediterranean and is cultivated as far north as England. ||
|-id=204
| 9204 Mörike || || Eduard Mörike (1804–1875), German Romantic poet ||
|-id=205
| 9205 Eddywally || || Eddy Wally (born 1930), a Flemish singer ||
|-id=206
| 9206 Yanaikeizo || 1994 RQ || Keizo Yanai (born 1941), once of researchers at the Japanese National Institute of Polar Research ||
|-id=207
| 9207 Petersmith || || Peter H. Smith (born 1947), planetary scientist at the Lunar and Planetary Laboratory ||
|-id=208
| 9208 Takanotoshi || || Toshiaki Takano (born 1954), an associate professor at Chiba University Graduate School of Science and Technology ||
|-id=211
| 9211 Neese || || Carol Lynn Neese (born 1958), American astronomer at Planetary Science Institute who worked on the JPL Small-Body Database ||
|-id=212
| 9212 Kanamaru || || Naomiki Kanamaru (born 1970) is an amateur astronomer. After acquiring first-class registered architect status in 1997, he has focused his attention on the architecture of public astronomical observatories, as well as university affiliated astronomical observatories. His current interest is solar eclipses ||
|-id=215
| 9215 Taiyonoto || || The famous monument Taiyonoto, "Tower of the Sun", is in Suita City ||
|-id=216
| 9216 Masuzawa || 1995 VS || Hitoshi Masuzawa (born 1945), a lecturer and curator of the Gotoh Planetarium and Astronomical Museum in Tokyo ||
|-id=217
| 9217 Kitagawa || 1995 WN || Ryuji Kitagawa (1949–2009) was a professor at Hiroshima University. From his research of clay mineralogy, he clarified the mechanism of weathering of granite and generation of landslide and slope failure. In addition to his own research, he mentored many other scientists ||
|-id=218
| 9218 Ishiikazuo || || Kazuo Ishii (born 1950), employed in the past in the manufacture of planetaria, has been working since 2005 as an architectural consultant in the design of astronomical facilities. His interest in astronomy was aroused at the sight of Comet 1965 S1 (Ikeya-Seki) ||
|-id=220
| 9220 Yoshidayama || || Yoshidayama is a hill located in Sakyo, a district in the northeastern part of Kyoto. It contains temples, shrines and many maple trees and has been familiar for 100 years as a walking area for students ||
|-id=221
| 9221 Wuliangyong || || Wu Liangyong (born 1922) is an architect, city planner, and educator, and the founder of Sciences of Human Settlements in China ||
|-id=222
| 9222 Chubey || 1995 YM || Markiyan S. Chubey (born 1940) is a Ukrainian-born Russian scientist working at the Pulkovo Observatory. He is an astrometrist and is leading a team to develop astrometry and astrophysics at the sun-earth L4 and L5 points using the stereo principle ||
|-id=223
| 9223 Leifandersson || || Leif Erland Andersson (1943–1979) observed that most satellites of the outer planets rotate synchronously about their parent planets, helped determine Pluto's pole position and albedo map, and determined that Pluto and its satellite Charon would display mutual transits and eclipses. He also made a catalogue of lunar craters. ||
|-id=224
| 9224 Železný || 1996 AE || Jan Železný, Czech javelin thrower ||
|-id=225
| 9225 Daiki || 1996 AU || Daiki Matsubayashi (born 1961) has been a member of the Saga Astronomical Society since the time of its establishment in 1981. He is an amateur astronomer whose interests include meteors and comets, with photography of solar eclipses his personal favorite ||
|-id=226
| 9226 Arimahiroshi || || Hiroshi Arima (born 1958) is a registered architect who also designs individual observatories in Japan. While a university student he was a leader of the Kyushu Meteoric Network. With members of the Kumamoto Civil Astronomical Observatory, he helped carry out a solar eclipse observation in Mexico in 1991 ||
|-id=227
| 9227 Ashida || || Masafumi Ashida (born 1957), a teacher of elementary school in Kyoto, is widely known by schoolchildren as an astronomical teacher in everyday life. His interests include comet observations, and he has labored continuously as the chief editor of the Kansai Astronomical Society's monthly magazine since 1974. ||
|-id=228
| 9228 Nakahiroshi || || Japanese amateur astronomer Hiroshi Nakanishi (born 1936) is a well-known grass-roots popularizer of astronomy in Kagawa prefecture ||
|-id=229
| 9229 Matsuda || || Junichi Matsuda (born 1948), a professor at Osaka University ||
|-id=230
| 9230 Yasuda || || Satoshi Yasuda (born 1948), a member of Amateur Radio on the International Space Station-Japan and a professor at Hitotsubashi University ||
|-id=231
| 9231 Shimaken || || Shimaken is the research group led by Toshihiko Shimamoto (born 1946), a professor emeritus of Kyoto University. The group reproduced seismogenic fault motion in the laboratory and found that the fault motion itself dramatically weakens the fault by frictional heating and promotes generation of large earthquakes ||
|-id=232
| 9232 Miretti || || Manlio Miretti (1928–1996), who, blessed with a powerful and warm baritone voice, devoted his whole life to the opera ||
|-id=233
| 9233 Itagijun || || Jun Itagi (born 1958), an amateur astronomical educator famous in the San-In district (Tottori and Shimane prefectures), has served as general-affairs director of the San-In Society of Astronomy. He is well known for his in-depth studies of the Mihonoseki and Tahara meteorites ||
|-id=234
| 9234 Matsumototaku || || Takuya Matsumoto (born 1966) is a high-school teacher and amateur astronomer who has also been director of the 100-member headquarters of the San-In Society of Astronomy since 1990 ||
|-id=235
| 9235 Shimanamikaido || || Nishiseto Expressway ||
|-id=236
| 9236 Obermair || || Erwin Obermair (1946–2017), Austrian amateur astronomer and discoverer of minor planets ||
|-id=238
| 9238 Yavapai || || Yavapai, the county in Arizona of which Prescott is the county seat ||
|-id=239
| 9239 van Riebeeck || || Jan van Riebeeck (1619–1677), Dutch merchant and founder of the Cape Colony in South Africa ||
|-id=240
| 9240 Nassau || || Jason John Nassau (1893–1965), a director of the Warner and Swasey Observatory and professor at Case Institute of Technology during 1924–1959 ||
|-id=241
| 9241 Rosfranklin || || Rosalind Franklin (1920–1958), an English chemist, who significantly contributed to the discovery of the molecular structures of DNA ||
|-id=242
| 9242 Olea || || Oleaceae, the olive family, with about 25 genera and nearly 1000 species. Genera include ash, lilac, jasmine and forsythia. Olea europea (common olive) is profitable as a fruit and source of oil ||
|-id=244
| 9244 Višnjan || || Višnjan, a small picturesque medieval town situated on the western rim of the Istrian peninsula highlands, Croatia ||
|-id=246
| 9246 Niemeyer || || Oscar Niemeyer (born 1907), the chief architect in Brazil ||
|-id=248
| 9248 Sauer || 4593 P-L || Carl G. Sauer Jr., a principal flight mechanics engineer at NASA's Jet Propulsion Laboratory ||
|-id=249
| 9249 Yen || 4606 P-L || Chen-wan L. Yen, a senior analyst within the Mission and Systems Architecture Section of NASA's Jet Propulsion Laboratory. She has done seminal work in the development and application of optimization techniques to interplanetary trajectories. Using multiple-impulse and gravity-assist techniques, her optimized interplanetary trajectories have allowed significant payloads to be launched within current launch vehicle capabilities. ||
|-id=250
| 9250 Chamberlin || 4643 P-L || Alan B. Chamberlin, a senior engineer within the Navigation and Flight Mechanics Section of NASA's Jet Propulsion Laboratory ||
|-id=251
| 9251 Harch || 4896 P-L || Ann P. Harch, the Cornell University scientist ||
|-id=252
| 9252 Goddard || 9058 P-L || Robert H. Goddard (1882–1945), American rocketry pioneer ||
|-id=253
| 9253 Oberth || 1171 T-1 || Hermann Oberth (1894–1989), Romanian-born German rocketry pioneer ||
|-id=254
| 9254 Shunkai || 2151 T-1 || Shibukawa Shunkai (1639–1715), an expert on the calendar ||
|-id=255
| 9255 Inoutadataka || 3174 T-1 || Inou Tadataka (1745–1818), a Japan geographer and surveyor ||
|-id=256
| 9256 Tsukamoto || 1324 T-2 || Tsukamoto Akitake (1833–1885), a geographer who worked for both the Tokugawa and Meiji governments ||
|-id=257
| 9257 Kunisuke || 1552 T-2 || Kunisuke Kinoshita (1901–1931), an astronomer at the Tokyo Astronomical Observatory from 1924 to his death ||
|-id=258
| 9258 Johnpauljones || 2137 T-2 || John Paul Jones (1747–1792), American Revolutionary War naval hero ||
|-id=259
| 9259 Janvanparadijs || 2189 T-2 || Jan van Paradijs (1946–1999), Dutch astronomer and astrophysicist ||
|-id=260
| 9260 Edwardolson || || Edward C. Olson (born 1930), an emeritus professor at the University of Illinois ||
|-id=261
| 9261 Peggythomson || || Peggy Y. Thomson (born 1927) was responsible for a major gift to Indiana University from a charitable trust that allowed the Daniel Kirkwood professorship to be fully endowed as a chair of astronomy. The name was suggested by F. K. Edmondson, whose elementary astronomy course inspired Thomson when she was a student. ||
|-id=262
| 9262 Bordovitsyna || 1973 RF || Tatiana Valentinovna Bordovitsyna (born 1940), head of the department of celestial mechanics and astrometry in the Institute for Applied Mathematics and Mechanics of Tomsk University ||
|-id=263
| 9263 Khariton || || Yulij Borisovich Khariton (born 1904), a physicist and member of the Russian Academy of Sciences ||
|-id=265
| 9265 Ekman || || Swedish encyclopaedists Agnita Ekman (born 1945) and Arne Ekman (born 1945) ||
|-id=266
| 9266 Holger || || Holger Pedersen (born 1946), Danish astronomer at ESO ||
|-id=267
| 9267 Lokrume || || The church in the parish of Lokrume on Gotland island in Sweden ||
|-id=268
| 9268 Jeremihschneider || || Jeremih Paul Schneider (born 1981) was responsible for the electrical power subsystem of the Lucy space probe. Lucy's potent photovoltaic array allows it to travel at a greater distance from the Sun than any previous spacecraft did. ||
|-id=269
| 9269 Peterolufemi || || Peter Ajiboye Olufemi (born 1960) is the "Chief Safety and Mission Assurance Officer" of the Lucy spacecraft. ||
|-id=270
| 9270 Sherryjennings || || Sherry Ann Jennings (born 1962) is the Mission Manager of the Lucy spacecraft at NASA's "Planetary Missions Program" office. ||
|-id=271
| 9271 Trimble || || Virginia Louise Trimble (born 1943) is a highly perceptive commentator on the state of astronomy, regarded as a creative and insightful spokesperson for astronomy. Beyond her own special interests in stellar structure and evolution, she has improved the health of the profession through her application of historical citation studies. ||
|-id=272
| 9272 Liseleje || 1979 KQ || Liseleje, Zealand, Denmark ||
|-id=273
| 9273 Schloerb || || Frederick Peter Schloerb (born 1952), American astronomer ||
|-id=274
| 9274 Amylovell || || Amy Jean Lovell (born 1969), American astronomer ||
|-id=275
| 9275 Persson || || Jöran Persson (c. 1530–1568), prosecutor and counsellor to King Eric XIV of Sweden ||
|-id=276
| 9276 Timgrove || || Timothy L. Grove (born 1949), a professor of geology at the Massachusetts Institute of Technology ||
|-id=277
| 9277 Togashi || || Tom Togashi (1937–2000), a pioneering filmmaker whose stunning television documentaries included a Galactic Odyssey series and specials on solar eclipses, the aurora borealis, and the search for life in the universe ||
|-id=279
| 9279 Seager || || Sara Seager (born 1971), a Canadian-American astronomer and planetary scientist. She is a professor of physics and planetary science at the Massachusetts Institute of Technology. ||
|-id=280
| 9280 Stevenjoy || || Steven P. Joy (born 1960), the Dawn mission science manager at the University of California Los Angeles ||
|-id=281
| 9281 Weryk || || Robert J. Weryk (born 1981), a researcher at Mount Allison University in Sackville, New Brunswick ||
|-id=282
| 9282 Lucylim || || Lucy F. Lim (born 1977), a planetary scientist at the Goddard Space Flight Center ||
|-id=283
| 9283 Martinelvis || || Martin S. Elvis (born 1951), an astrophysicist and expert on quasars at the Harvard-Smithsonian Center for Astrophysics ||
|-id=284
| 9284 Juansanchez || || Juan Andres Sanchez (born 1979), a postdoctoral research fellow at the Max-Planck Institute for Solar System Research in Katlenburg-Lindau ||
|-id=285
| 9285 Le Corre || || Lucille Le Corre (born 1983), an associate researcher at the Planetary Science Institute in Tucson, Arizona ||
|-id=286
| 9286 Patricktaylor || || Patrick Alan Taylor (born 1981), a research scientist at the Arecibo Observatory studying near-Earth asteroids ||
|-id=287
| 9287 Klima || || Rachel L. Klima (born 1974), a planetary geologist at the Johns Hopkins University Applied Physics Laboratory ||
|-id=288
| 9288 Santos-Sanz || || Pablo Santos-Sanz (born 1971), a postdoctoral researcher at the "Instituto Astrofisica Andalucia" in Granada ||
|-id=289
| 9289 Balau || || The Balau area, near Costigliole d´Asti (Piedmont, Italy), is renowned for its natural beauty, its agricultural products and the wines (both red and white) produced there ||
|-id=291
| 9291 Alanburdick || 1982 QO || Alan Burdick (born 1965), a student of the natural world, is author of numerous popular magazine articles, including one about his efforts to get something in the universe named after him. This in turn helped to land him a writing job at the new Rose Center at the American Museum of Natural History in New York. ||
|-id=293
| 9293 Kamogata || || With the neighboring town of Yakage, the town of Kamogata borders the Okayama Astrophysical Observatory, National Astronomical Observatory of Japan ||
|-id=295
| 9295 Donaldyoung || || Donald L. Young (born 1935), recently retired from the Jet Propulsion Laboratory, was responsible for building and directing NASA/JPL's Table Mountain Facility. In addition to conducting astronomical research, the facility is a centerpiece of the JPL educational outreach program. The name was suggested by C. Young. ||
|-id=297
| 9297 Marchuk || 1984 MP || Gurij Ivanovich Marchuk (born 1925), a director of the Institute of Numerical Mathematics of the Russian Academy of Sciences ||
|-id=298
| 9298 Geake || 1985 JM || John E. Geake (1925–1998), astronomer and lunar scientist at UMIST, known for his laboratory interpretation of the optical polarization of the lunar and asteroidal surfaces. He invented the first direct-reading linear refractometer, one of which he designed for the Cassini-Huygens Titan probe. ||
|-id=299
| 9299 Vinceteri || || Vince (born 1959) and Teri (born 1960) Grout are true friends to two-legged and four-legged animals ||
|-id=300
| 9300 Johannes || 1985 PS || Johannes Andersen (born 1943), of the Niels Bohr Institute for Astronomy, works mainly on the chemical and dynamical evolution of the Milky Way's disk. As IAU General Secretary (1997–2000), he has offered sage guidance on the IAU's role with near-earth objects. The name is endorsed by B. G. Marsden and H. Rickman. ||
|}
9301–9400
|-id=305
| 9305 Hazard || || Cyril Hazard (born 1928), a British radio astronomer. ||
|-id=306
| 9306 Pittosporum || 1987 CG || Pittosporaceae, the Australian laurel family, with nine genera and more than 200 species, mainly in tropical Africa and Pacific islands. Among the species is Pittosporum eugenioides (lemonwood). ||
|-id=307
| 9307 Regiomontanus || 1987 QS || Johannes Regiomontanus (1436–1476), a German mathematician and astronomer. ||
|-id=308
| 9308 Randyrose || || Randy Rose (born 1963), an electrical engineer and currently leader of the Radio Astronomy and Radar Group at Goldstone. ||
|-id=309
| 9309 Platanus || || Platanaceae, the plane family, with one genus and seven species. They grow wild mainly in the United States and Mexico, but they are also typical of southern France. Platanus acerifolia (London plane) reaches a height of almost 30 m and is widely planted in cities because of its resistance to air pollution. The brown, bristly fruits, hanging two to four together on a single stalk, persist over the winter. ||
|-id=313
| 9313 Protea || || Proteaceae, the firebush family, with some 75 genera and over 1000 species. They are native to the Southern Hemisphere, where they grow wild. Some species, such as Protea mellifera (honeyflower), extend also to the warm regions of the Northern Hemisphere. The family is best known for its ornamental plants, such as Embothrium coccineum (Chilean firebush), which are cultivated for their edible nuts. ||
|-id=315
| 9315 Weigel || || Erhard Weigel (1625–1699), a German mathematician and astronomer. ||
|-id=316
| 9316 Rhamnus || || Rhamnaceae, the buckthorn family of deciduous and evergreen trees, shrubs and climbing plants, with 60 genera and around 900 species. They grow wild in all parts of the world. Some of the species yield dyes. The berrylike fruits appear in dense clusters. Rhamnus purshina (bearwood) produces a dry bark (cascara sagrada) that is used as a laxative. ||
|-id=319
| 9319 Hartzell || || Christine M. Hartzell (born 1988), an assistant professor in aerospace engineering at the University of Maryland. ||
|-id=321
| 9321 Alexkonopliv || 1989 AK || Alex Konopliv (born 1960), a principal scientist at the Jet Propulsion Laboratory, is an internationally recognized authority on the determination of gravity fields for those solar-system objects that have tracking data from an orbiting spacecraft. His gravity fields for Mars have supported several spacecraft missions ||
|-id=322
| 9322 Lindenau || || Bernhard von Lindenau (1779–1854), a German scientist, statesman and promoter of the arts. ||
|-id=323
| 9323 Hirohisasato || || Hirohisa Sato (born 1951) studies the orbits and brightness of comets for the Comet Section of the Oriental Astronomical Association. He also has interests in archeology and history. The name was suggested by S. Harada. ||
|-id=325
| 9325 Stonehenge || || Stonehenge, prehistoric megalithic complex, whose design relies on astronomical observation in great part ||
|-id=326
| 9326 Ruta || || Rutaceae, the rue family, with over 150 genera and 1500 species, including citrus fruits. Ruta graviolens (common rue) is a perennial herb with a particularly strong scent. The family thrives in tropical and warm, temperate regions. ||
|-id=327
| 9327 Duerbeck || || Hilmar Duerbeck, a German astronomer. ||
|-id=329
| 9329 Nikolaimedtner || 1990 EO || Nikolai Karlovich Medtner, Russian composer. ||
|-id=331
| 9331 Fannyhensel || || Fanny Hensel (1805–1847), the sister of Felix Mendelssohn-Bartholdy and wife of painter Wilhelm Hensel. ||
|-id=333
| 9333 Hiraimasa || || Masanori Hirai (born 1943), a professor at Fukuoka University of Education. ||
|-id=334
| 9334 Moesta || || Carl Wilhelm Moesta (1825–1884), a German mathematician and astronomer, who observed stars, planets, comets and solar eclipses. From 1852 to 1867 he was the first director of the National Observatory in Santiago de Chile. ||
|-id=336
| 9336 Altenburg || || The town of Altenburg, noted for its outstanding buildings (e.g. the theater and Lindenau Museum) and its eventful 1000-year history. ||
|-id=339
| 9339 Kimnovak || || Kim Novak (born 1933), a screen actress much admired for her work, together with William Holden, in Picnic, a movie from the 1950s based on a Pulitzer prize-winning novel. ||
|-id=340
| 9340 Williamholden || || William Holden (1918–1981), a screen actor admired for his work in Picnic (1955), with Kim Novak, and in The Bridge over the River Kwai, with David Niven. He is also the initiator of a wildlife foundation in Kenya. ||
|-id=341
| 9341 Gracekelly || || Grace Kelly, American actress, later Her Serene Highness Princess Grace of Monaco. ||
|-id=342
| 9342 Carygrant || || Cary Grant (Archibald Leach, 1904–1986), British-American actor. ||
|-id=344
| 9344 Klopstock || || Friedrich Gottlieb Klopstock, a German poet. ||
|-id=346
| 9346 Fernandel || || Fernandel (Fernand Joseph Désié Contandin) (1903–1971), French actor. ||
|-id=349
| 9349 Lucas || 1991 SX || François Édouard Anatole Lucas (1842–1891), a French number theorist. ||
|-id=350
| 9350 Waseda || || Waseda University, one of the most prestigious private universities in Japan. ||
|-id=351
| 9351 Neumayer || || Georg von Neumayer (1826–1909), a German geophysicist and hydrographer. ||
|-id=356
| 9356 Elineke || 1991 YV || Eline Deneweth (born 1970), named after Eline Vere, a novel by the Dutch author Louis Couperus, is the niece of the discoverer. ||
|-id=357
| 9357 Venezuela || || The Republica Bolivariana de Venezuela ("Little Venice") was named in 1499 by Amerigo Vespucci because of the resemblance between the natives' houses, built on water, and the situation in Venice. ||
|-id=358
| 9358 Fårö || || Fårö island, northernmost socken on Gotland island, Sweden † ||
|-id=359
| 9359 Fleringe || || Fleringe, socken on Gotland island, Sweden † ||
|-id=362
| 9362 Miyajima || || Kazuhiko Miyajima (born 1946), a professor at Doshisha University. ||
|-id=364
| 9364 Clusius || || Carolus Clusius (Charles de l'Escluse; 1526–1609), a Flemish botanist. ||
|-id=365
| 9365 Chinesewilson || || Ernest Henry "Chinese" Wilson, a prolific hunter of plants. ||
|-id=368
| 9368 Esashi || || Esashi, a small town in northern Hokkaido, on the Sea of Okhotsk. ||
|-id=372
| 9372 Vamlingbo || || Vamlingbo, socken on Gotland island, Sweden † ||
|-id=373
| 9373 Hamra || || Hamra, socken on Gotland island, Sweden † ||
|-id=374
| 9374 Sundre || || Sundre, southernmost socken on Gotland island, Sweden † ||
|-id=375
| 9375 Omodaka || 1993 HK || Toshihiro Omodaka (born 1947) is a professor of radio astronomy at Kagoshima University. He is a familiar face in the Kagoshima area, both as a professor of the university's astronomical observatory and as an eager advocate for the spread of astronomy education. ||
|-id=376
| 9376 Thionville || || Thionville, the French city in northeastern France, near the Luxembourg border. ||
|-id=377
| 9377 Metz || || Metz, the French city in the Lorraine region of France, at the confluence of the Moselle and Seille rivers. ||
|-id=378
| 9378 Nancy-Lorraine || || Nancy-Lorraine, the French city Nancy, in the Lorraine region of France, near the left bank of the river Meuse. ||
|-id=379
| 9379 Dijon || || Dijon, the capital of Co\te d´Or, in east-central France. ||
|-id=380
| 9380 Mâcon || || Mâcon, the French city in the Bourgogne, on the right side of the river Saône. ||
|-id=381
| 9381 Lyon || || Lyon, the French city, capital of the Rhône departement in east-central France. ||
|-id=382
| 9382 Mihonoseki || || Mihonoseki, a small town and port on the beautiful sea-encircled Shimane-hanto peninsula in northeastern Shimane Prefecture. ||
|-id=383
| 9383 Montélimar || || Montélimar, the city in southeastern France, near the confluence of the Roubion and Rhône rivers. ||
|-id=384
| 9384 Aransio || || Aransio, the city of Orange in southeastern France in the department of Vaucluse. ||
|-id=385
| 9385 Avignon || || Avignon, the city in southeastern France, at the east bank of the Rhône river. ||
|-id=386
| 9386 Hitomi || || Hitomi Doi (born 1955), wife of Takao Doi, the first Japanese space walker. ||
|-id=387
| 9387 Tweedledee || 1994 CA || Tweedledee and Tweedledum, from Alice in Wonderland. ||
|-id=388
| 9388 Takeno || || Hyoichiro Takeno (1910–2000) and his son Setsuo Takeno (born 1936) were both professors of Hiroshima University. The former was a theoretical physicist and contributed much on the theory of spherically symmetric space-time. The latter was an experimental mineralogist and proved the stability relations of many sulfide minerals ||
|-id=389
| 9389 Condillac || || Étienne Bonnot de Condillac, French philosopher ||
|-id=391
| 9391 Slee || || Bruce Slee (born 1924), one of the pioneers of radio astronomy. ||
|-id=392
| 9392 Cavaillon || || Cavaillon, a small city on the road from Avignon to Digne in southern France. ||
|-id=393
| 9393 Apta || || French town of Apt, Vaucluse ||
|-id=394
| 9394 Manosque || || Manosque, a small city in southern France (Provence). ||
|-id=395
| 9395 Saint Michel || || Saint Michel l´Observatoire is a small village only 2 km away from the Observatory of Haute Provence. ||
|-id=396
| 9396 Yamaneakisato || 1994 QT || Akisato Yamane (born 1949), a professional engineer, is also an amateur astronomer who is intrigued by solar eclipses, having observed them in Indonesia in 1983 and in Romania in 1999. He is currently a member of the Tokyo Astronomical Association and Shimane Society of Astronomy ||
|-id=397
| 9397 Lombardi || 1994 RJ || Giuseppe Lombardi (born 1939) is an Italian amateur astronomer at the CCAF observatory in Farra d´Isonzo. ||
|-id=398
| 9398 Bidelman || || William P. Bidelman, a director of the Warner and Swasey Observatory during 1970–1975 and professor of astronomy at Case Western Reserve University (formerly Case Institute of Technology) during 1970–1986. ||
|-id=399
| 9399 Pesch || || Peter Pesch, director of the Warner and Swasey Observatory during 1975–1994 and professor of astronomy at Case Western Reserve University during 1961–1997. ||
|}
9401–9500
|-id=403
| 9403 Sanduleak || || Nicholas Sanduleak, American (of Romanian descent) astronomer ||
|-id=405
| 9405 Johnratje || || Since 1993, John R. Ratje (born 1946) has been the assistant director and site manager of Mt. Graham International Observatory, a division of Steward Observatory. Before joining Steward Observatory in 1984, he was an oil-company engineer and manager. ||
|-id=407
| 9407 Kimuranaoto || || For 20 years, Naoto Kimura (born 1956) has been a lecturer and curator at the Gotoh Planetarium and Astronomical Museum in Tokyo. He took many astrophotographs used for planetarium programs. The name was suggested by O. Muramatsu. ||
|-id=408
| 9408 Haseakira || 1995 BC || Akira Hase, professor emeritus at Hiroshima University. ||
|-id=409
| 9409 Kanpuzan || || Kanpuzan, a 1763-m-high mountain to the west side of Mt. Sasagamine in the Shikoku range. ||
|-id=411
| 9411 Hitomiyamoto || 1995 CF || Hitomi Miyamoto, a scientist at the Japan Meteorological Agency. ||
|-id=413
| 9413 Eichendorff || || Joseph Freiherr von Eichendorff (1788–1857), a Silesian poet. ||
|-id=414
| 9414 Masamimurakami || || Masami Murakami, one of the observer lieaders within the Mars Section of the Oriental Astronomical Association since 1988. ||
|-id=415
| 9415 Yujiokimura || 1995 VE || Yuji Okimura (born 1932), Hiroshima University professor emeritus, is a paleontologist and biostratigrapher of the Late Paleozoic smaller foraminifera. ||
|-id=416
| 9416 Miyahara || 1995 WS || Kenji Miyahara (1937–2011) clarified the occurrence mechanism of geological disasters in the regions of weathered granite in southwest Japan. He contributed much to the mitigation of these disasters. ||
|-id=417
| 9417 Jujiishii || 1995 WU || Juji Ishii (1865–1914), a Japanese doctor who devoted himself to the welfare of children. ||
|-id=418
| 9418 Mayumi || || Mayumi Sato, Japanese wife of the first discoverer ||
|-id=419
| 9419 Keikochaki || 1995 XS || Keiko Chaki (born 1954), the president of the Sidewalk Astronomy Society in Takatsuki, Osaka, Japan. ||
|-id=420
| 9420 Dewar || || Sir James Dewar, Scottish chemist and physicist. ||
|-id=421
| 9421 Violilla || || Violet Lilian Laurie, mother of the discoverer ||
|-id=422
| 9422 Kuboniwa || || Atsuo Kuboniwa (born 1964), a science torch-bearer and an amateur astronomer. ||
|-id=423
| 9423 Abt || || Helmut Abt (born 1925), one of the founders of Kitt Peak National Observatory. ||
|-id=424
| 9424 Hiroshinishiyama || 1996 BN || Hiroshi Nishiyama (born 1956), an amateur astronomer who observers of variable stars and undertakes astronomical outreach via stargazing parties. ||
|-id=425
| 9425 Marconcini || || Massimiliano Marconcini (1955) is an amateur astronomer of the Montelupo group. ||
|-id=426
| 9426 Aliante || || Italian name for a glider, the silent plane. The Latin root of the name emphasizes the key role of the wings in the absence of an engine. ||
|-id=427
| 9427 Righini || || Guglielmo Righini (1908–), Italian solar physicist. In 1934 he went to Utrecht to work with Minnaert. In 1953 he became full professor of astronomy at the University of Florence and director of the Arcetri Astrophysical Observatory, from which he retired in 1980. As a solar physicist he followed many total solar eclipses. With A. Deutsch he discovered the cold regions in the solar corona. He was one of the most active supporters of the Joint Organization for Solar Observations, and this resulted in a solar observatory built on the heights of Canary Islands. He has been president of the Italian Astronomical Society, a member of the scientific committee of the National Council of Researchers, president and vice-president of solar commissions in the IAU. ||
|-id=428
| 9428 Angelalouise || || Angela Louise Laurie, wife of the discoverer ||
|-id=429
| 9429 Poreč || || Porec, a town of cultural monuments, including the sixth-century Euphrasius Basilica. ||
|-id=430
| 9430 Erichthonios || || Erichthonius of Athens, the son of Dardanos and the father of Tros. ||
|-id=431
| 9431 Pytho || || Pytho (Delphi), a rocky Phocian town mentioned in the Catalogue of Ships from Greek mythology. Led by Schedius and Epistrophus, the Phoceans contributed forty ships to the Greek armada during the Trojan War. ||
|-id=432
| 9432 Iba || 1997 CQ || Yasuaki Iba (1894–1957) was a trading merchant and an amateur astronomer in Kobe, Japan. He informed the astronomical world that the occurrence of the 1054 Crab supernova was described in Meigetsuki, a famous diary written by Fujiwara-no-Teika ||
|-id=434
| 9434 Bokusen || || Numajiri Bokusen (1775–1856) was a Japanese educator, geographer and astronomer, who lived in Tsuchiura during the Edo period. He opened a school for the common people, and devised many things, including a folding globe ||
|-id=435
| 9435 Odafukashi || || Fukashi Oda (born 1957), a science teacher of Shudo Junior and Senior High School in Hiroshima, Japan. ||
|-id=436
| 9436 Shudo || 1997 EB || Shudo is a private boys' junior and senior high school in Hiroshima, Japan. Yoshinaga Asano, Fifth Lord of the Hiroshima Clan, established the school in 1725. The school motto is `Wisdom and Morality'. ||
|-id=437
| 9437 Hironari || || Hironari Yamane (born 1980) has been director of the Kamagari Astronomical Observatory on an island of Kure City, Hiroshima, since 2009. He is an active member of the Japanese Society for Education and Popularization of Astronomy. ||
|-id=438
| 9438 Satie || || Erik Satie, French composer † ||
|-id=442
| 9442 Beiligong || || Beiligong (Beijing Institute of Technology, BIT) was founded in 1940. With more than 27 000 full-time students currently enrolled, it is one of the national key universities. BIT developed China's first large-scale planetarium, and contributed to the preparatory research of the Five-hundred-meter Aperture Spherical radio Telescope. ||
|-id=445
| 9445 Charpentier || || Marc-Antoine Charpentier (1643–1704), a French musician. ||
|-id=446
| 9446 Cicero || || Marcus Tullius Cicero, Roman statesman ||
|-id=447
| 9447 Julesbordet || || Jules Bordet (1874–1961), Nobel laureate in medicine (1919). ||
|-id=448
| 9448 Donaldavies || || Donald W. Davies (1925–2000), a British expert in computer security. ||
|-id=449
| 9449 Petrbondy || || Petr Kalas, alias Bondy (1944–2000), leader of the Prague Scout section Maják ("Lighthouse") and a lover of historical American cars. ||
|-id=450
| 9450 Akikoizumo || || Akiko Izumo (born 1962) is a folklorist of astronomy in Japan, who worked at a planetarium at Yokohama Science Center. She has written books on astronomy folklore, including encyclopedias and visual dictionaries. ||
|-id=452
| 9452 Rogerpeeters || || Roger Peeters (born 1948), head of the mechanical workshop at the Royal Observatory at Uccle and responsible for maintaining all the telescopes. ||
|-id=453
| 9453 Mallorca || || Majorca, Spanish island † ||
|-id=460
| 9460 McGlynn || || Thomas A. McGlynn (born 1956), currently the chief archive scientist for the High Energy Science Archive Research Center at the Goddard Space Flight Center. ||
|-id=463
| 9463 Criscione || || Lisa Marie Criscione (born 1998) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her physical sciences project. ||
|-id=466
| 9466 Shishir || || Shishir Hitesh Dholakia (born 1999) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for his earth and space sciences project. ||
|-id=468
| 9468 Brewer || || James Brewer, ESO astronomer working on stellar populations and carbon stars. ||
|-id=469
| 9469 Shashank || || Shashank Hitesh Dholakia (born 1999) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for his earth and space sciences project. ||
|-id=470
| 9470 Jussieu || || The French family of botanists: Bernard de Jussieu (1699–1777), Joseph de Jussieu (1704–1779), Antoine-Laurent de Jussieu (1748–1836), and Adrien-Laurent-Henri de Jussieu (1797–1853). ||
|-id=471
| 9471 Ostend || || Ostend, Belgium ||
|-id=472
| 9472 Bruges || || Bruges, Belgium ||
|-id=473
| 9473 Ghent || || Ghent, Belgium † ||
|-id=474
| 9474 Cassadrury || || Cassa Frances Drury (born 1999) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her biochemistry, medicine, health science and microbiology project. ||
|-id=477
| 9477 Kefennell || || Katherine Elizabeth Fennell (born 1999) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her animal and plant sciences project. ||
|-id=478
| 9478 Caldeyro || 2148 P-L || Roberto Caldeyro-Barcia (1921–1996), Uruguayan physiologist † ||
|-id=479
| 9479 Madresplazamayo || 2175 P-L || Asociación Madres de Plaza de Mayo ||
|-id=480
| 9480 Inti || 2553 P-L || the sun god in Inca religion, also called Apu-Punchau, believed to be the ancestor of the Incas. Inti was at the head of the state cult. He was usually represented in human form, his face portrayed as a gold disk from which rays and flames extended. Inti's sister was the moon, Mama-Kilya, who was portrayed as a silver disk with human features. ||
|-id=481
| 9481 Menchú || 2559 P-L || Rigoberta Menchú Tum, Guatemalan 1992 Nobel Peace Prize winner. ||
|-id=482
| 9482 Rubéndarío || 4065 P-L || Rubén Darío (1867–1916), pseudonym of Félix Rubén Garc{í}a Sarmiento, Nicaraguan poet, journalist and diplomat. ||
|-id=483
| 9483 Chagas || 4121 P-L || Carlos Chagas (1879–1934), Brazilian epidemiologist, discoverer of Chagas disease. ||
|-id=484
| 9484 Wanambi || 4590 P-L || the Australian Aborigines' best known spirit, the Rainbow Snake, which is the rainbow and the revealer of truth. Wanambi is one of the rainbow's names. ||
|-id=485
| 9485 Uluru || 6108 P-L || Uluru, the Australian Aboriginal sacred place, the center or navel of the island continent. It is also known as Ayers Rock. ||
|-id=486
| 9486 Utemorrah || 6130 P-L || Daisy Utemorrah (born 1922), the Australian Aboriginal poet, teller of Dreamtime stories in the Kimberley: "Words are my gun and my spear" ||
|-id=487
| 9487 Kupe || 7633 P-L || Kupe, the legendary sailor and explorer whose discovery of the islands now known as New Zealand led to the coming there of the Maori people around the ninth century ||
|-id=488
| 9488 Huia || 9523 P-L || Huia, extinct bird of New Zealand ||
|-id=489
| 9489 Tanemahuta || 1146 T-1 || For Tāne of Maori mythology; also for the particular tree in New Zealand named Tāne Mahuta ||
|-id=490
| 9490 Gosemeijer || 1181 T-1 || Henny Gosemeijer (1924–1999), Dutch amateur astronomer, founded the Public Observatory Twente in 1984. He himself made many observations of satellites and meteors, in addition to his activities in popularizing astronomy. He was honored by NASA and awarded the Dutch "van der Bilt" and "Simon Stevin" prizes. ||
|-id=491
| 9491 Thooft || 1205 T-1 || Gerardus 't Hooft, Dutch 1999 Nobel physics laureate † ‡ + ||
|-id=492
| 9492 Veltman || 2066 T-1 || Martinus J. G. Veltman, Dutch 1999 Nobel physics laureate † ‡ ||
|-id=493
| 9493 Enescu || 3100 T-1 || George Enescu, Romanian musician ||
|-id=494
| 9494 Donici || 3212 T-1 || Nicolae Donici, Romanian astronomer ||
|-id=495
| 9495 Eminescu || 4177 T-1 || Mihai Eminescu, Romanian poet ||
|-id=496
| 9496 Ockels || 4260 T-1 || Wubbo Ockels, Dutch astronaut † ‡ ||
|-id=497
| 9497 Dwingeloo || 1001 T-2 || Dwingeloo Radio Observatory † ||
|-id=498
| 9498 Westerbork || 1197 T-2 || Westerbork Synthesis Radio Telescope † ||
|-id=499
| 9499 Excalibur || 1269 T-2 || Excalibur, the name of the sword of King Arthur. ||
|-id=500
| 9500 Camelot || 1281 T-2 || Camelot, the location of the castle of the King Arthur legend. ||
|}
9501–9600
|-
| 9501 Ywain || 2071 T-2 || Owain mab Urien/Sir Ywain, legendary king of Rheged and knight of the Round Table ||
|-id=502
| 9502 Gaimar || 2075 T-2 || Gaimar, obscure legendary knight of the Round Table, lover of Morgan le Fay (mentioned in the 13th-century Lancelot und Ginevra) ||
|-id=503
| 9503 Agrawain || 2180 T-2 || Agravaine, legendary knight of the Round Table ||
|-id=504
| 9504 Lionel || 2224 T-2 || Sir Lionel, legendary knight of the Round Table ||
|-id=505
| 9505 Lohengrin || 4131 T-2 || Lohengrin, character from Arthurian legend and star of the eponymous opera ||
|-id=506
| 9506 Telramund || 5200 T-2 || Brabantine Count Friedrich (Frederick) von Telramund, character from the opera Lohengrin ||
|-id=507
| 9507 Gottfried || 5447 T-2 || Herzog (Duke) Gottfried, character from the opera Lohengrin ||
|-id=508
| 9508 Titurel || 3395 T-3 || A Fisher King, legendary guardian of the Holy Grail, father of Amfortas and a character from the opera Parsifal ||
|-id=509
| 9509 Amfortas || 3453 T-3 || A Fisher King, legendary guardian of the Holy Grail, son of Titurel and a character from the opera Parsifal ||
|-id=510
| 9510 Gurnemanz || 5022 T-3 || Gurnemanz, character from Arthurian legend, and a character from the opera Parsifal ||
|-id=511
| 9511 Klingsor || 5051 T-3 || Klingsor, sorcerous character from Arthurian legend, and in the opera Parsifal ||
|-id=512
| 9512 Feijunlong || 1966 CM || Fei Junlong, Chinese taikonaut ||
|-id=514
| 9514 Deineka || || Aleksandr Aleksandrovich Deineka (1899–1969) was a Russian painter known for his monumental works and panels on the subjects of labor, sport and defense of the motherland. ||
|-id=515
| 9515 Dubner || || Gloria Dubner, Argentinian astronomer ||
|-id=516
| 9516 Inasan || || INASAN, the Institute of Astronomy of the Russian Academy of Sciences in Moscow abbreviated as INASAN (Institut Astronomii Akademii Nauk), is a leading astronomical research institution, founded in 1936. Its main fields of research are stellar astrophysics, galaxies, planetary systems, geodynamics, space research, NEAs and space debris. ||
|-id=517
| 9517 Niehaisheng || || Nie Haisheng (born 1964), Chinese taikonaut and a space hero of China. In the Shenzhou spaceship, he and Fei Junlong made a series of scientific experiments in space for five days. They landed smoothly on 2005 Oct. 17 on the grasslands in Nei Monggol, Inner Mongolia. ||
|-id=518
| 9518 Robbynaish || 1978 GA || Robby Naish, American windsurfer. ||
|-id=519
| 9519 Jeffkeck || || Jeffrey David Keck (born 1977) is the "Lead of Avionics development and production" of the Lucy mission. ||
|-id=520
| 9520 Montydibiasi || || Lamont Di Biasi (born 1941) is the "Lead for Strategic Development" of the Lucy mission. ||
|-id=521
| 9521 Martinhoffmann || || Martin Hoffmann (born 1949) is a German astronomer who has made observations of variable stars and minor planets, including lightcurve studies and spectroscopic investigations. In recent years he has been much involved with the observations from ODAS, the O.C.A.- DLR Asteroid Survey. The name was suggested by G. Hahn. ||
|-id=522
| 9522 Schlichting || 1981 DS || Hilke E. Schlichting (born 1982), an assistant professor of planetary science at the Massachusetts Institute of Technology. ||
|-id=523
| 9523 Torino || || Torino (Turin) is the Italian capital of the automobile and aerospace industries. Among the scientists in the city's history are Avogadro, Lagrange, discoverer of the rotating magnetic field Galileo Ferraris and 1986 Nobel prizewinner Rita Levi-Montalcini. The city has also lent its name to a scale used to assess NEO impact risk ||
|-id=524
| 9524 O'Rourke || || Laurence O'Rourke (born 1970), a research scientist at the European Space Astronomy Centre in Madrid. ||
|-id=525
| 9525 Amandasickafoose || || Amanda Sickafoose Gulbis (born 1975), an astronomer at the South African Large Telescope and a discoverer of minor planets. Her research contributions span from theoretical studies of dust properties on small bodies, to stellar occultations of Kuiper Belt objects, to astronomical instrumentation. ||
|-id=526
| 9526 Billmckinnon || || William B. McKinnon (born 1954), a professor of planetary science at Washington University in St. Louis. ||
|-id=527
| 9527 Sherrypervan || || Sherry Pervan (born 1964) is the "Chair of the internal team mission concept review panels" who was instrumental for the selection of the Lucy mission by NASA. ||
|-id=528
| 9528 Küppers || || Michael Küppers (born 1967), a planetary scientist at the European Space Agency. ||
|-id=529
| 9529 Protopapa || || Silvia Protopapa (born 1981), an assistant research scientist at the University of Maryland. ||
|-id=530
| 9530 Kelleymichael || || Michael Sean Peterson Kelley (born 1978), an assistant research scientist at the University of Maryland. ||
|-id=531
| 9531 Jean-Luc || 1981 QK || Jean-Luc Margot (born 1969), a scientist at the Arecibo Observatory. ||
|-id=532
| 9532 Abramenko || || Aleksandr Nikolaevich Abramenko (born 1921), chief engineer at the Crimean Astrophysical Observatory ||
|-id=533
| 9533 Aleksejleonov || || Alexei Leonov, Russian cosmonaut. ||
|-id=535
| 9535 Plitchenko || || Aleksandr Ivanovich Plitchenko (1943–1997), a Russian writer in Novosibirsk city, author of some 20 volumes of poetry and 5 books of prose works. He was the head of a Novosibirsk writers' association for some years. ||
|-id=536
| 9536 Statler || || Thomas S. Statler (born 1961), a professor of astronomy at Ohio University. ||
|-id=537
| 9537 Nolan || 1982 BM || Michael C. Nolan (born 1963), a scientist at the Arecibo Observatory. ||
|-id=539
| 9539 Prishvin || || Mikhail Mikhajlovich Prishvin, Russian writer ||
|-id=540
| 9540 Mikhalkov || || Sergey Vladimirovich Mikhalkov, Russian writer and poet ||
|-id=541
| 9541 Magri || 1983 CH || Christopher Magri (born 1961), a scientist at the University of Maine at Farmington. ||
|-id=542
| 9542 Eryan || || Eileen V. Ryan (born 1960), of New Mexico Highlands University, has contributed to the field of fragmentation studies of minor planets by conducting laboratory impact experiments and developing numerical simulations. Recently, she has helped initiate an observational program to study minor planets of the Vesta family. ||
|-id=543
| 9543 Nitra || || Nitra, a historical town in western Slovakia, was the seat of prince Pribina and center of the Nitra principality early in the ninth century. ||
|-id=544
| 9544 Scottbirney || 1984 EL || Scott Birney (Dion Scott Birney) (born 1926), a professor of astronomy at Wellesley College, Massachusetts, from 1968 to 1991. ||
|-id=545
| 9545 Petrovedomosti || 1984 MQ || Sankt-Peterburgskie Vedomosti, oldest Russian newspaper. ||
|-id=548
| 9548 Fortran || 1985 CN || Fortran (Formula Translator), the first widely distributed symbolic programming language for digital computers. ||
|-id=549
| 9549 Akplatonov || || Aleksandr Konstantinovich Platonov (born 1931), a Russian mathematician and researcher in astrodynamics and robotics at the Keldysh Institute of Applied Mathematics since 1954. He is a pioneer in the theory and computation of satellite orbits and the control of spacecraft trajectories to the Moon and planets, as well as the motion of walking robots. ||
|-id=550
| 9550 Victorblanco || || Victor Manuel Blanco (born 1918), director of the Cerro Tololo Interamerican Observatory from 1967 to 1981. ||
|-id=551
| 9551 Kazi || 1985 UJ || Kazi, legendary Bohemian princess, daughter of Prince Krok and the wife of Bivoj. ||
|-id=553
| 9553 Colas || || François Colas (born 1959), an expert on modern solar-system astrometry at the Institut de Mécanique. ||
|-id=554
| 9554 Dumont || 1985 XA || Simone Dumont (born 1924), a Meudon mathematician and astronomer. ||
|-id=555
| 9555 Frejakocha || 1986 GC || Freja Koch Augustesen, granddaughter of one of the discoverers ||
|-id=556
| 9556 Gaywray || 1986 GF || Gay Firestone Wray is an enthusiastic contributor to astronomy research through the Firestone postdoctoral fellowship at the Smithsonian Astrophysical Observatory. A volunteer leader with many charitable organizations, she has contributed greatly to the Smithsonian's mandate for the "increase and diffusion of knowledge". ||
|-id=560
| 9560 Anguita || 1987 EQ || Claudio Anguita Cáceres (1930–2000), a Chilean astrometrist at the Universidad de Chile, critically helpful during the establishment of the Cerro Tololo Interamerican Observatory, and an IAU Vice President during 1994–2000. The name was suggested by F. Vilas. ||
|-id=561
| 9561 van Eyck || || Jan van Eyck, Flemish painter. ||
|-id=562
| 9562 Memling || 1987 RG || Hans Memling (1430–1494), a Flemish painter. ||
|-id=563
| 9563 Kitty || || Katherine ("Kitty") F. Putnam (born 1916), president of the Springfield, Massachusetts, Television Corporation from 1975 through 1984. ||
|-id=564
| 9564 Jeffwynn || || Jeffrey C. Wynn, a humorous, curious, inventive, adventurous geophysicist with the U.S. Geological Survey has studied the Wabar Craters of Saudi Arabia with Gene Shoemaker. ||
|-id=565
| 9565 Tikhonov || || Andrej Nikolaevich Tikhonov (1906–1993), a Russian mathematician. ||
|-id=566
| 9566 Rykhlova || || Lidiya Vasil'evna Rykhlova, head of the Space Astrometry Department of the Institute of Astronomy, Russian Academy of Sciences, is a specialist in the astrometry and dynamics of artificial satellites and an expert on earth rotation. She is well known for her studies of near-earth space and asteroid hazards. ||
|-id=567
| 9567 Surgut || || Surgut, one of the main administrative and supply centers for the vast oil and natural gas producing fields along the Ob River in the Khanty-Mansi autonomous district of the Tyumen province in Siberia. ||
|-id=569
| 9569 Quintenmatsijs || || Quinten Matsijs (1466–1530), a Flemish painter. ||
|-id=573
| 9573 Matsumotomas || 1988 UC || Masaru Matsumoto (born 1936) lived in the house in Mihonseki, Shimane Prefecture, that was struck by a 6.4-kg meteorite on 1992 Dec. 10. ||
|-id=574
| 9574 Taku || || Hiroshi Nakamura (1891–1974), a Japanese medical biochemist and researcher of old maps. ||
|-id=576
| 9576 van der Weyden || || Rogier van der Weyden (1399–1464), a Flemish painter. ||
|-id=577
| 9577 Gropius || || Walter Gropius, a German architect. ||
|-id=578
| 9578 Klyazma || || Klyazma river, whose source is north of Moscow, and which is connected by the Oka river with the Volga at Nizhny Novgorod ||
|-id=579
| 9579 Passchendaele || || Passchendaele is a village in West Flanders, close to Ypres. The village was first mentioned in 844 as Pascandale ||
|-id=580
| 9580 Tarumi || || Tarumi, a ward of Kobe City where the first discoverer was born and lives. ||
|-id=583
| 9583 Clerke || || Agnes Mary Clerke (1842–1907) was an Irish astronomer, historian and writer, whose books on astronomy, particularly on astronomical spectroscopy became a standard text. The lunar crater Clerke is named after her. ||
|-id=584
| 9584 Louchheim || || For many years Thomas Louchheim (born 1957), of Tucson, Arizona, has been a highly regarded counsellor for hundreds of Tucson-area families. Active in childhood education, Louchheim's optimistic philosophy has brightened the lives of many young people. ||
|-id=587
| 9587 Bonpland || || Aimé Bonpland (Aimé Jacques Goujard Bonpland) (1773–1858), a physician. ||
|-id=588
| 9588 Quesnay || || François Quesnay, a physician. ||
|-id=589
| 9589 Deridder || || Remi Adolph De Ridder (1843–1930), a professor of law at Ghent University. In 1881 he was appointed by the government to membership in the School Commission and denounced the monopoly of the clergy in the school system. ||
|-id=590
| 9590 Hyria || || Hyria, from Greek mythology. It was a location mentioned in Homer's Catalogue of Ships related to the Trojan War. In Hyria, the Boetian assembled their contingent to the Greek armada. ||
|-id=592
| 9592 Clairaut || || Alexis Clairaut (Alexis-Claude Clairaut) (1713–1765), French mathematician who tackled the gravitational three-body problem. ||
|-id=594
| 9594 Garstang || 1991 RG || Roy Henry Garstang (1925–2009) made basic contributions in atomic physics and astronomical spectroscopy. A pioneer in modeling light pollution, he promoted night sky protection. Assistant director of the University of London Observatory (1959–1964), he then joined the faculty of the University of Colorado in Boulder ||
|-id=599
| 9599 Onotomoko || || Tomoko Ono (born 1968), one of the most active staff members in the Public Relations Center at the National Astronomical Observatory of Japan. ||
|}
9601–9700
|-id=602
| 9602 Oya || || Reinosuke Oya (born 1923) led to the success of the third International Conference of Oriental Astronomy, held in Fukuoka City in Oct. 1998 with an exhibition on the history of astronomy in eastern Asia from early to modern times. ||
|-id=604
| 9604 Bellevanzuylen || 1991 YW || Belle van Zuylen, pseudonym for Isabella Agneta Elisabeth van Tuyll van Serooskerken, 18th-century Dutch writer from the Enlightenment ||
|-id=609
| 9609 Ponomarevalya || || Valentina Leonidovna Ponomareva (born 1934), of the Institute of History of Science and Technology, is a specialist on aircraft and spacecraft ||
|-id=610
| 9610 Vischer || 1992 RQ || Peter Vischer the Elder (c. 1460–1529), the greatest German brass-caster master in the Middle Ages. ||
|-id=611
| 9611 Anouck || || Anouck Vrouwe (born 1978) studied physics at Nijmegen, specializing later in scientific journalism. At Davros (Switzerland), she has been involved with the study of wind velocities in order to derive models for the prediction of avalanches. ||
|-id=612
| 9612 Belgorod || || Belgorod, in southern Russia, an industrial, scientific and cultural center. Located close to the Ukrainian border, Belgorod was mentioned in a chronicle in 1237. A fortress established in 1593 made Belgorod a key stronghold in protecting Russia's southern border against the Tatars in the seventeenth century. ||
|-id=614
| 9614 Cuvier || || Georges Cuvier (1769–1832), a French zoologist. ||
|-id=615
| 9615 Hemerijckx || || Frans Hemerijckx (1902–1969), a medical doctor who went in 1929 to Africa and India to fight against leprosy. ||
|-id=617
| 9617 Grahamchapman || || Graham Chapman, British member of Monty Python † ||
|-id=618
| 9618 Johncleese || || John Cleese, British actor and member of Monty Python † ||
|-id=619
| 9619 Terrygilliam || || Terry Gilliam, British film maker and member of Monty Python † ||
|-id=620
| 9620 Ericidle || || Eric Idle, British member of Monty Python † ||
|-id=621
| 9621 Michaelpalin || || Michael Palin, British member of Monty Python † ||
|-id=622
| 9622 Terryjones || || Terry Jones, British member of Monty Python † ||
|-id=623
| 9623 Karlsson || || Per Olow Karlsson, Swedish technician at Uppsala Observatory and Kvistabergs Observatorium † ||
|-id=626
| 9626 Stanley || || John Stanley (1713–1786), blind from the age of three, became a well known organist and composer of oratorios and concertos for string orchestra. For the organ he wrote several Voluntaries, which organists like to play. ||
|-id=628
| 9628 Sendaiotsuna || || Sendai Otsunahiki, a 400-year-old tug-of-war festival, held in Satsumasendai City in the evening of the day before the Autumnal Equinox. ||
|-id=629
| 9629 Servet || || Miguel Serveto y Reves (Michel Servet, 1511–1553), a doctor of medicine and a theologian living in France. ||
|-id=630
| 9630 Castellion || || Sébastien Castellion (1515–1563), a French humanist well known for his generosity and aversion to fanaticism. ||
|-id=631
| 9631 Hubertreeves || || Hubert Reeves, a professional astronomer at the French CNRS. ||
|-id=632
| 9632 Sudo || || Kenichi Sudo (born 1958), a Japanese medical technologist and amateur astronomer. ||
|-id=633
| 9633 Cotur || || Peter Cotur (born 1944), Belgian scientific journalist ||
|-id=637
| 9637 Perryrose || || Perry J. Rose (born 1966) is a former member of the Palomar Planet Crossing Asteroid Survey and currently lead solar observer on the 18-meter solar tower at Mt. Wilson Observatory. ||
|-id=638
| 9638 Fuchs || || Leonhard Fuchs (1501–1566), German botanist and physician ||
|-id=639
| 9639 Scherer || || Marc Scherer (born 1944), Belgian scientist ||
|-id=640
| 9640 Lippens || || Carlos Lippens (born 1945), Belgian scientist ||
|-id=641
| 9641 Demazière || || Martine De Mazière (born 1960), Belgian scientist ||
|-id=642
| 9642 Takatahiro || 1994 RU || Hiroyuki Takata (born 1961), a Japanese amateur astronomer and chief editor of the newsletter of the Chiba Science Society. ||
|-id=645
| 9645 Grünewald || || Matthias Grünewald (c. 1460–1528), German Renaissance painter and watercolor artist. His original name was Mathis Gothart Neithardt (or Niethart). His masterpiece is the Isenheimer altar in Colmar, one of the great works of Western art, featuring spiritual and realistic scenes juxtaposed and notable for the variety and beauty of the colors. Paul Hindemith made Grünewald's life the subject of his opera and symphony Mathis der Maler. ||
|-id=648
| 9648 Gotouhideo || || Gotou Hideo (born 1951) is a Japanese amateur astronomer who was born in Oogaki, Gifu prefecture. He has coordinated an observatory at Ooto-mura and also designed a 0.25-m reflector there after he graduated from Doshisha University. ||
|-id=649
| 9649 Junfukue || 1995 XG || Jun Fukue (born 1956), professor at Osaka Kyoiku University, works on theoretical studies concerning accretion disks embedded in quasars and black holes. He also has engaged in science outreach and has published many popular-level books on astronomy. ||
|-id=650
| 9650 Okadaira || 1995 YG || The Okadaira Shell Mound located in Miho village, Ibaraki prefecture, was built on the south coast of Lake Kasumigaura about 7,000 to 3,500 years ago. The research by Sasaki and Iijima in 1879 is appreciated as "the Starting Point of Japanese Archeology". It was the first Japanese-only excavation. ||
|-id=651
| 9651 Arii-SooHoo || 1996 AJ || Computer mathematician Vicki Arii-SooHoo (born 1962) became team leader at AMOS in 1997 and is directly responsible for the successes of the AMOS program. With untiring support from her family, she has dedicated long hours and sleepless nights to ensure that the AMOS team is productive, efficient and motivated. ||
|-id=654
| 9654 Seitennokai || || Seitennokai, an astronomy club in Japan, which was founded in 1985, with about 20 members. ||
|-id=655
| 9655 Yaburanger || || Yaburanger is a nickname for Japanese amateur castle researchers in Ibaraki and Chiba prefectures. `Yabu' means bush in Japanese. The Yaburangers explore castles from the Middle Ages, and they wrote the book Castles in Ibaraki. ||
|-id=657
| 9657 Učka || || Učka, the highest mountain on the Istrian peninsula, which extends into the northern Adriatic sea. ||
|-id=658
| 9658 Imabari || || Imabari, Japanese city ||
|-id=661
| 9661 Hohmann || || Walter Hohmann, German civil engineer † ||
|-id=662
| 9662 Frankhubbard || 1996 GS || Frank Hubbard (1920–1976), an American harpsichord maker. ||
|-id=663
| 9663 Zwin || || Zwin, natural reserve on the Belgian-Dutch coast † ||
|-id=664
| 9664 Brueghel || || Pieter Brueghel, Flemish painter ||
|-id=665
| 9665 Inastronoviny || 1996 LA || IAN, or Instantní Astronomické Noviny, is a Czech Internet Astronomical Newspaper founded by Jirí Dusek and Rudolf Novák in Brno in 1997. ||
|-id=667
| 9667 Amastrinc || || Amateur Astronomers, Inc., now at Union County College, Cranford, New Jersey, where it built the William Miller Sperry Observatory ||
|-id=668
| 9668 Tianyahaijiao || 1997 LN || "Tianya Haijiao", which literally means "edge of the sky, rim of the sea", is the name of a famous rocky outcrop of historical significance on the south coast of Hainan Island just to the west of Sanya, the southernmost city in China ||
|-id=669
| 9669 Symmetria || || Name suggested by the palindromic shape of the numeral 9669, and the fact that each pair of its digits is invariant under a rotation by 180 degrees ||
|-id=670
| 9670 Magni || || Gianfranco Magni (born 1943), who joined the Istituto di Astrofisica Spaziale in Rome in 1975. He has worked on the physics of stellar interiors, in particular on the equation of the state of gas at high pressure and temperature. Currently, his main field of interest is the origin of the solar system and of planetary systems in general, with special attention to the structure and evolution of circumstellar disks and the formation of giant planets. Involved also in the study of the origin and structure of comets, he is a team member of the cometary mission Rosetta. A lover of early music, he plays the recorder and belongs to two musical groups, "L´Amoroso Cantar" (Medieval music) and "Il Martellato" (Renaissance music) ||
|-id=671
| 9671 Hemera || || Hemera, the primordial Greek goddess of bright day. She is the daughter of the goddess of night Nykta and the god of darkness Erebus. Hemera means "day" in Greek and gives rise to the word "ephemeris". ||
|-id=672
| 9672 Rosenbergerezek || || Kamila Rosenberger and Tomaš Rezek, friends of the discoverer (Tomaš worked for two years at Ondřejov Observatory); the asteroid was named on the occasion of Tomáš and Kamila's marriage on 19 June 1999 † ||
|-id=673
| 9673 Kunishimakoto || || For 21 years, Makoto Kunishi (born 1954) was a lecturer and curator at the Gotoh Planetarium and Astronomical Museum in Tokyo. His lectures were so powerful that many listeners were spellbound. The name was suggested by O. Muramatsu ||
|-id=674
| 9674 Slovenija || || Slovenia, the European nation and former Yugoslav republic in which the Črni Vrh Observatory is situated. This is the first minor planet credited to Slovenian astronomers. ||
|-id=676
| 9676 Eijkman || 2023 P-L || Christiaan Eijkman, Dutch physician and pathologist, winner of the Nobel Prize for Medicine and Physiology in 1929 (with Hopkins) † ||
|-id=677
| 9677 Gowlandhopkins || 2532 P-L || Frederick Gowland Hopkins, British biochemist, winner of the Nobel Prize for Medicine and Physiology in 1929 (with Eijkman) † ||
|-id=678
| 9678 van der Meer || 2584 P-L || Simon van der Meer, Dutch physicist, winner of the Nobel Prize for Physics in 1994 † ||
|-id=679
| 9679 Crutzen || 2600 P-L || Paul Crutzen, Dutch chemist, winner of the Nobel Prize for Chemistry in 1995 † ||
|-id=680
| 9680 Molina || 3557 P-L || Mario J. Molina (born 1943), a Mexican physical chemist and co-recipient of the Nobel Prize for Chemistry in 1995, awarded for work in atmospheric chemistry. ||
|-id=681
| 9681 Sherwoodrowland || 4069 P-L || F. Sherwood Rowland (1927–2012), American chemist and co-recipientof the Nobel Prize for Chemistry in 1995, awarded for work in atmospheric chemistry. ||
|-id=682
| 9682 Gravesande || 4073 P-L || Willem Jacob 's Gravesande, Dutch scientist and lawyer † ||
|-id=683
| 9683 Rambaldo || 4099 P-L || Alfred Emile Rambaldo (1879–1911), born on the island of Java, did extensive research on the upper layers of the atmosphere. He was also a great promoter of aviation, especially balloons/airships in the Netherlands and in the Dutch East Indies, where he died during a balloon accident. The name was suggested by W. A. Fröger. ||
|-id=684
| 9684 Olieslagers || 4113 P-L || Jan Olieslagers (1883–1942), Belgian aviation pioneer, caused the airport Deurne (Antwerp International Airport) to be built. In 1910 he made the first overland flight between two cities in the Netherlands. His popularity helped to promote aviation there and in Belgium. The name was suggested by W. A. Fröger. ||
|-id=685
| 9685 Korteweg || 4247 P-L || Diederik Korteweg, Dutch mathematician † ||
|-id=686
| 9686 Keesom || 4604 P-L || Willem Hendrik Keesom, Dutch physicist † ||
|-id=687
| 9687 Uhlenbeck || 4614 P-L || George Eugene Uhlenbeck, Dutch-born American physicist † ||
|-id=688
| 9688 Goudsmit || 4665 P-L || Samuel Abraham Goudsmit, Dutch-born American physicist, member of the ALSOS Commission † ||
|-id=689
| 9689 Freudenthal || 4831 P-L || Hans Freudenthal, Dutch mathematician † ||
|-id=690
| 9690 Houtgast || 6039 P-L || Jacob Houtgast (1908–1982), a Dutch solar physicist, was associate professor at University of Utrecht, known for his much-quoted 1942 paper on noncoherent scattering of light in Fraunhofer lines. Famous as a scientific eclipse observer, he chaired the IAU's subcommittee for solar eclipses. ||
|-id=691
| 9691 Zwaan || 6053 P-L || Cornelis Zwaan (1928–1999), professor of astrophysics at Utrecht University, was a recognized authority on solar and stellar magnetism. Just before his death he finished a book (with C. J. Schrijver) on stellar magnetic fields. The name was suggested by C. de Jager. ||
|-id=692
| 9692 Kuperus || 6354 P-L || Max Kuperus (born 1936), professor of astrophysics at Utrecht University, and a department chairman at the Royal Netherlands Academy of Arts and Sciences, specialized in theoretical magnetohydrodynamics and plasma physics. He wrote one of the first papers on the heating of the solar corona. ||
|-id=693
| 9693 Bleeker || 6547 P-L || Johan Bleeker (J. A. M. Bleeker), Dutch astronomer, Director of the Netherlands Foundation for Space Research † ||
|-id=694
| 9694 Lycomedes || 6581 P-L || Lycomedes, from Greek mythology, was king of Scyros during the Trojan war. At his court Thetis hid her son Achilles, dressed in girl's clothes to save him from the Trojan war. He was found by Odysseus. ||
|-id=695
| 9695 Johnheise || 6583 P-L || John Heise (born 1942), professor of general physics at Utrecht University, specialized in high-energy space physics. In 1975 he discovered and detected sources of galactic x-ray bursts (1975). He was among the discoverers in 1998 of the origin of the cosmic \gamma -ray bursts. The name was suggested by C. de Jager. ||
|-id=696
| 9696 Jaffe || 6628 P-L || Walter J. Jaffe (born 1947) is an American astronomer at Leiden Observatory with an interest in galaxies, their dynamics, internal and external (clusters) and gas processes therein. He also contributed to the software for the Hubble telescope ||
|-id=697
| 9697 Louwman || 1295 T-1 || Peter J. K. Louwman (born 1935), a well-known popularizer of astronomy, was secretary for many years of the working group Moon and Planets of the Dutch Society for Astronomy and Meteorology. He is an expert on the history of telescope building. ||
|-id=698
| 9698 Idzerda || 2205 T-1 || Hanso Henricus Schotanus Steringa Idzerda (1885–1944), a Dutch radio pioneer, invented the vacuum triode for amplifying audio and radio signals. In November 1919 he started the first radio broadcasting station in the world from The Hague. ||
|-id=699
| 9699 Baumhauer || 3036 T-1 || Albert Gillis von Baumhauer (1891–1939), a Dutch aviation pioneer, invented the tail rotor for helicopters and built the first Dutch helicopter, which took off on 1925 Dec. 17. He was strongly involved in pioneering gliding in the Netherlands and was killed in the Boeing Stratoliner plane crash in 1939. ||
|-id=700
| 9700 Paech || 3058 T-1 || Wolfgang Paech (born 1951) is an electronic engineer on the staff of the Institute of Geodesy at the University of Hannover, where he serves as technical manager of the astronomical station. An enthusiastic amateur astronomer, Paech is a keen observer of solar phenomena and eclipses. The name was suggested by L. D. Schmadel. ||
|}
9701–9800
|-
| 9701 Mak || 1157 T-2 || Arie Mak (born 1914), a Dutch amateur astronomers, active in lunar occultations and solar observations. He developed scientific instrumentation for and joined in the eclipse expeditions of 1959 and 1966. He received the Van der Bilt Prize in 1951. ||
|-id=702
| 9702 Tomvandijk || 2108 T-2 || Thomas van Dijk (born 1915), versatile Dutch amateur astronomer, specialized in spectroscopic, nuclear and photographic techniques. He wrote 45 papers, including one in Nature on lunar luminescence and one on radioactivity of a meteorite in the 1953 Liège Colloquium proceedings. ||
|-id=703
| 9703 Sussenbach || 3146 T-2 || John Sussenbach (born 1938) is a Dutch amateur astronomer known for his excellent sky photographs. He founded the Dutch Working Group for Sky Photography and received the Van der Bilt Prize. The name was suggested by C. de Jager. ||
|-id=704
| 9704 Georgebeekman || 5469 T-2 || George W. E. Beekman (born 1944) is one of the Netherlands' best science writers in the field of astronomy, known for his weekly contributions in the daily paper NRC-Handelsblad. He has been editor-in-chief of the journal Zenit and is still a member of the editorial board of that monthly. The name was suggested by C. de Jager. ||
|-id=705
| 9705 Drummen || 3137 T-3 || Mat Drummen (born 1945) has been director of "de Koepel", the Dutch center for dissemination of information on astronomy, space science and meteorology since 1975. He is author of the annual Sterrengids and coeditor of the Dutch popular journal Zenit. The name was suggested by C. de Jager. ||
|-id=706
| 9706 Bouma || 3176 T-3 || Reinder J. Bouma (born 1949), one of the best known Dutch amateur astronomers. ||
|-id=707
| 9707 Petruskoning || 3226 T-3 || Petrus A. Koning (born 1934) has organized youth astronomy camps. Founder of the Bussloo Public Observatory, he was long a member of the observatory board. In 1995 he received the Van der Bilt Prize for his efforts to promote astronomy in the Dutch province of Gelderland. The name was suggested by W. A. Fröger. ||
|-id=708
| 9708 Gouka || 4140 T-3 || Adriaan Jacobus Gouka (1879–1963) and Christiaan A. C. Nell founded NVWS, the Dutch Astronomical and Meteorological Society on 1 September 1901. The name was suggested by H. van Woerden. ||
|-id=709
| 9709 Chrisnell || 5192 T-3 || Christiaan A. C. Nell (1875–1960) was cofounder, together with Adriaan J. Gouka, of the Dutch Astronomical and Meteorological Society. With 4000 members, the society continues to flourish on its 100th anniversary. The name was suggested by H. van Woerden. ||
|-id=711
| 9711 Želetava || 1972 PA || Bearing a 13:12:5 Pythagorean relationship to (8964) [Corvus] Corax and (3735) Trebon, (9711) Zeletava is a small Moravian town near the center of the hypotenuse of a similar triangle with short leg centered on Trebon, Bohemia, and long leg running through Vranov (crow, Corvus), Moravia, and Raabs (raven, Corax), Austria. ||
|-id=712
| 9712 Nauplius || || Nauplius, from Greek mythology, a son of Poseidon and Amymone. He was king of Euboea and father of Palamedes. ||
|-id=713
| 9713 Oceax || || Oceax, from Greek mythology, is the son of Nauplius of Euboea and brother of Palamedes. ||
|-id=714
| 9714 Piazzismyth || || Charles Piazzi Smyth (1819–1900) was an Italian-born British astronomer, working on spherical astronomy and geodesy in South Africa, before becomming the 2nd Astronomer Royal for Scotland. He is known for his work on solar spectroscopy and his pyramidological and metrological studies of the Great Pyramid of Giza. The lunar crater Piazzi Smyth (crater) is named after him. ||
|-id=715
| 9715 Paolotanga || || Paolo Tanga (born 1966), an adjoint astronomer at the Observatoire de la Côte d´Azur. ||
|-id=716
| 9716 Severina || 1975 UE || Severina Feitknecht-Gallati (1945–2000), who hailed from Glarus, the same home town as the discoverer, was a highly esteemed physician at Interlaken. ||
|-id=717
| 9717 Lyudvasilia || || Lyudmila Vasil'evna Shaposhnikova (born 1926), orientalist and writer. ||
|-id=718
| 9718 Gerbefremov || || Gerbert Alexandrovich Efremov (born 1933), a Russian designer of space technology, created the Proton rocket and Almaz space stations. He is a member of Tsiolkovsky Russian Academy of Cosmonautics and was decorated with the Leonardo da Vinci Medal of the International Association of Peace Foundations. ||
|-id=719
| 9719 Yakage || || With the neighboring town of Kamogata, the town of Yakage borders the Okayama Astrophysical Observatory, National Astronomical Observatory of Japan. ||
|-id=720
| 9720 Ulfbirgitta || || Ulf and Birgitta Heyman, friends of the discoverer † ||
|-id=721
| 9721 Doty || 1980 GB || Arthur G. Doty (1951–1999), an amateur astronomer. ||
|-id=722
| 9722 Levi-Montalcini || 1981 EZ || In 1952 Italian neurologist Rita Levi-Montalcini (born 1909) discovered the Nerve Growth Factor, the protein responsible for the nervous system cell proliferation. Winner of the 1986 Nobel prize for Medicine, she promotes programs for educating women in developing countries ||
|-id=723
| 9723 Binyang || || Bin Yang (born 1977), a research fellow at the European Southern Observatory in Chile. ||
|-id=724
| 9724 Villanueva || || Geronimo L. Villanueva (born 1978), a research assistant professor of physics at Catholic University of America. ||
|-id=725
| 9725 Wainscoat || || Richard J. Wainscoat (born 1961), an astronomer at the University of Hawaii. ||
|-id=726
| 9726 Verbiscer || || Anne J. Verbiscer (born 1964), an associate research professor at the University of Virginia. ||
|-id=727
| 9727 Skrutskie || || Michael F. Skrutskie (born 1959), a professor of astronomy at the University of Virginia. ||
|-id=728
| 9728 Videen || || Gordon Videen (born 1964), a research scientist with the Space Science Institute of Boulder, Colorado. ||
|-id=732
| 9732 Juchnovski || || Ivan Juchnovski (born 1937), president of the Bulgarian Academy of Sciences since 1996. ||
|-id=733
| 9733 Valtikhonov || || Valentin Fedorovich Tikhonov (1938–2004), Russian astrophysicist and member of the Russian Mission Control Center, took an active part in realization of many deep space missions. He also developed a relativistic theory of the inner planets, as well as new theories of the motions of comet 1P/Halley and the satellites of Mars. ||
|-id=737
| 9737 Dudarova || || Veronica Borisovna Dudarova (born 1916), the only woman conductor in Russia. ||
|-id=739
| 9739 Powell || || James Lawrence Powell, director of the Natural History Museum of Los Angeles County, professor of geology at Oberlin College. ||
|-id=741
| 9741 Solokhin || || Valentin Fedorovich Solokhin (born 1933), the director general of a company in Surgut of the Tyumen province in Siberia. ||
|-id=742
| 9742 Worpswede || || German town of Worpswede, home of an artistic community of the same name ||
|-id=743
| 9743 Tohru || 1988 GD || Tohru Takahashi (born 1959) is a professor of information optics at the Oita National College of Technology. His research interest includes adaptive optics. As an amateur astronomer, he has led the Astronomical Society of Oita since its foundation. The name was suggested by Y. Yamada. ||
|-id=744
| 9744 Nielsen || 1988 JW || As the physician responsible for the mental and physical fitness of a close-knit team of researchers, construction workers and support staff at the Amundsen-Scott South Pole research station, Jerri Nielsen (born 1952) is noted for her friendship and concern for the "Polies" and her courage to face her own serious illness. ||
|-id=745
| 9745 Shinkenwada || 1988 VY || Shinken Wada, Japanese NHK announcer. ||
|-id=746
| 9746 Kazukoichikawa || || Kazuko Ichikawa, Japanese teddy-bear artist ||
|-id=748
| 9748 van Ostaijen || || Paul van Ostaijen (1896–1928), Flemish poet who influenced Belgian and Dutch poetry. ||
|-id=749
| 9749 Van den Eijnde || || Peter Van den Eijnde (born 1966) has academic degrees in German philology and management and has always been active in astronomy. During the 1980s he helped the discoverer with the reduction of astrometric work. He is now park manager of the Antwerp Zoo. ||
|-id=751
| 9751 Kadota || 1990 QM || Ken-ichi Kadota (born 1961), a computer engineer and renowned amateur astronomer in Ageo, Saitama prefecture. ||
|-id=756
| 9756 Ezaki || || Yusuke Ezaki (born 1957), a CCD astrometric observer in Toyonaka, Osaka prefecture. ||
|-id=757
| 9757 Felixdejager || || Felix de Jager (born 1999) is the second grandson of the discoverer and son of Sigyn and Philip de Jager-Elst. The fourth generation of professional musicians, Felix shows great love and ability for musical performance. ||
|-id=758
| 9758 Dainty || || John Christopher Dainty (born 1947), British optical physicist and professor of optics at Imperial College, London. ||
|-id=761
| 9761 Krautter || || Joachim Krautter (born 1948) is associate director of the Heidelberg Königstuhl Observatory and a well-known expert on pre-main-sequence stars and novae. He is also engaged in European astronomical organizations and serves as president of the Astronomische Gesellschaft (2002–2005). ||
|-id=762
| 9762 Hermannhesse || || Hermann Hesse, German writer ||
|-id=764
| 9764 Morgenstern || || Christian Morgenstern, German poet, writer and translator ||
|-id=766
| 9766 Bradbury || || Ray Douglas Bradbury (born 1920), the critically acclaimed science fiction author whose works include The Martian Chronicles and The Illustrated Man. ||
|-id=767
| 9767 Midsomer Norton || || Midsomer Norton, English town ||
|-id=768
| 9768 Stephenmaran || || Stephen P. Maran (born 1938), American astronomer and veteran of the space program, has made outstanding contributions to public understanding of astronomy as press officer for the American Astronomical Society. He has conducted professional research on many different telescopes and has lectured and written extensively on space discoveries. ||
|-id=769
| 9769 Nautilus || || Nautilus, submarine in Jules Verne's Twenty Thousand Leagues Under the Sea. ||
|-id=770
| 9770 Discovery || 1993 EE || "Discovery" was the name of the spaceship in Arthur Clarke's novel and Stanley Kubrick's movie 2001: A Space Odyssey. It is also the name of one of NASA's Space Shuttle Discovery. ||
|-id=774
| 9774 Annjudge || 1993 NO || Ann Campana Judge (1951–2001), the travel office manager for the National Geographic Society. ||
|-id=775
| 9775 Joeferguson || || Joe Ferguson (1962–2001), director of the geography education outreach program for the National Geographic Society. ||
|-id=777
| 9777 Enterprise || 1994 OB || The Starship Enterprise, of Star Trek fame, or the Space Shuttle of the same name. ||
|-id=778
| 9778 Isabelallende || || Isabel Allende, Chilean writer. ||
|-id=780
| 9780 Bandersnatch || 1994 SB || Bandersnatch, from Lewis Carroll's Jabberwocky. ||
|-id=781
| 9781 Jubjubbird || || Jubjub Bird, from Lewis Carroll's Jabberwocky. ||
|-id=782
| 9782 Edo || 1994 WM || Edo is the former name for Tokyo, the capital and largest city of Japan. ||
|-id=783
| 9783 Tensho-kan || || Tensho-kan, the first planetarium in Japan, located at the science center in Osaka. ||
|-id=784
| 9784 Yotsubashi || || Yotsubashi, in the center of Osaka, is where the astronomers of the Edo period observed eclipses. ||
|-id=785
| 9785 Senjikan || || Senjikan, an astronomy group in Osaka in the Edo period. ||
|-id=786
| 9786 Gakutensoku || 1995 BB || Gakutensoku, the first Japanese robot, created in 1928 by Makoto Nishimura. ||
|-id=788
| 9788 Yagami || || Junko Yagami (born 1958), a renowned singer-songwriter. ||
|-id=790
| 9790 Deipyrus || || Deipyrus, from Greek mythology. During the Trojan War, he was one of seven captains of sentinels sent to guard the Greek ships. He was later killed by the prophet Helenus, King Priam's son. ||
|-id=791
| 9791 Kamiyakurai || || Yakuraisan, popularly called Kami Fuji, is a mountain located in the town of Kami in northeastern Japan. People come here to enjoy beautiful seasonal nature, flowers and starry nights. ||
|-id=792
| 9792 Nonodakesan || || Nonodakesan is a mountain located in the town of Wakuya in northeastern Japan. Konpo-ji Temple, popularly called Nonodake Kannon, was constructed on the summit of Nonodake in the eighth century. ||
|-id=793
| 9793 Torvalds || || Linus Benedict Torvalds, Finnish developer of Linux. ||
|-id=795
| 9795 Deprez || || Brigitte Deprez (born 1939), the wife of Uccle astronomer Jozef Denoyelle, colleague of the discoverer. ||
|-id=796
| 9796 Robotti || 1996 HW || Aurelio Robotti (1913–1994) was a lieutenant in the Italian Air Engineers and later professor in aerospace engineering at the Turin Polytechnic. He began studies on rocket fuel using liquid oxygen and ethanol, and tested the first Italian-built liquid-fuel missile. ||
|-id=797
| 9797 Raes || || Hugo Raes (born 1929), a Flemish writer. ||
|-id=799
| 9799 Thronium || 1996 RJ || Thronium, near the river Boagrius, was one of the places from which the Locrians joined the Achean forces. ||
|-id=800
| 9800 Shigetoshi || || Shigetoshi Inoue (born 1961), a Japanese amateur astronomer and a key member of Ota Astronomical Club. ||
|}
9801–9900
|-id=804
| 9804 Shrikulkarni || 1997 NU || Shrinivas Kulkarni (born 1956) was a co-discoverer of the first millisecond pulsar, the first optical counterpart of a binary pulsar, the first pulsar in a globular cluster, the extragalactic origin of gamma-ray bursts and the first brown dwarf. ||
|-id=807
| 9807 Rhene || || Rhene, a nymph from Greek mythology. She was the mother of Medon, one of the Achaean Leaders, who took over Philoctetes' men after the latter was bitten by a snake. ||
|-id=809
| 9809 Jimdarwin || || James L. Darwin (born 1939), instrument maker at Lowell Observatory. ||
|-id=810
| 9810 Elanfiller || || Elan Eng Filler (born 1998) is a finalist in the 2012 Broadcom MASTERS, a math and science competition for middle-school students, for her biochemistry, medicine, health science and microbiology project. ||
|-id=811
| 9811 Cavadore || 1998 ST || Cyril Cavadore (born 1969), French electronic engineer and discoverer of minor planets at the European Southern Observatory (Src) ||
|-id=812
| 9812 Danco || || Emile Danco (1869–1898), who participated in the Antarctic expedition of Adrien de Gerlache, was responsible for the photography and observation of geomagnetism. He died during the trip, and his body was buried at sea near a newly discovered land, named Dancoland. ||
|-id=813
| 9813 Rozgaj || || Slavko Rozgaj (1895–1978), director of the Zagreb Observatory, was a prolific author of astronomy books and articles. His best-known book is A Book About Stars. ||
|-id=814
| 9814 Ivobenko || || Baron Ivo von Benko of Bojnik (1851–1903) was the director of the Pola Observatory. He developed systematic work on the meridian circle and compiled a catalogue of fundamental stars. He is best known for the observation that ruled out the existence of the earth's second moon. ||
|-id=815
| 9815 Mariakirch || 2079 P-L || Maria Margarethe Kirch, née Winkelmann (1670–1720), wife and mother of astronomers, was an astronomer in her own right, observing, computing and publishing calendars, working in Berlin and Danzig. Although the comet of April 1702 was first credited to her husband, she was later acknowledged as the discoverer. ||
|-id=816
| 9816 von Matt || 2643 P-L || Baroness Elisabeth von Matt (Elisabeth Freiin von Matt), Austrian astronomer. ||
|-id=817
| 9817 Thersander || 6540 P-L || Thersander, a son of the Theban Polynices, was wounded by Telephus and later was one of the heroes in the Wooden Horse. ||
|-id=818
| 9818 Eurymachos || 6591 P-L || Eurymachos, one of the heroes hidden in the Wooden Horse. ||
|-id=819
| 9819 Sangerhausen || 2172 T-1 || In the vicinity of the German city of Sangerhausen, a remarkable archaeological object was unearthed. ||
|-id=820
| 9820 Hempel || 3064 T-1 || Rolf Hempel (born 1956) is a German mathematician and amateur astronomer who determined many high-quality positions of minor planets using a quite unconventional measuring device. His orbit determination software is still in use at the Astronomisches Rechen-Institut. The name was suggested by L. D. Schmadel. ||
|-id=821
| 9821 Gitakresáková || 4033 T-1 || Margita Kresáková (née Margita Vozárová), Slovak astronomer, wife of astronomer Ľubor Kresák; Comet Vozárová is also named after her † ||
|-id=822
| 9822 Hajduková || 4114 T-1 || Mária Hajduková (born 1934), a Slovak astronomer currently at the Astronomical Institute Comenius University, Bratislava (Modra Observatory), has been active in interplanetary matter research, mainly meteors---multicolor photometry and radiation (dependence of the color index on velocity). She educated a whole generation of astronomers in Slovakia. ||
|-id=823
| 9823 Annantalová || 4271 T-1 || Anna Antalová (born 1936) has worked at the Astronomical Institute, Slovak Academy of Sciences, Tatranská Lomnica, since 1958. She made various analyses of solar phenomena and significant contributions to the study of solar flares as well as solar cycle characteristics. The name was suggested by D. Chochol. ||
|-id=824
| 9824 Marylea || 3033 T-2 || Mary Lea Shane, née Heger (1897–1983), wife of Lick Observatory director C. Donald Shane. ||
|-id=825
| 9825 Oetken || 1214 T-3 || Lore Oetken (born 1929) has made significant contributions to the fields of magnetic stars, polarimetry and spectroscopy, a prominent part of the astronomical research at the Potsdam Observatory. The citation was prepared by A. Schnell. ||
|-id=826
| 9826 Ehrenfreund || 2114 T-3 || Pascale Ehrenfreund, Dutch astrobiologist † ||
|-id=828
| 9828 Antimachos || 1973 SS || Antimachos, one of the heroes hidden in the Wooden Horse. ||
|-id=829
| 9829 Murillo || || Bartolomé Estéban Murillo (1618–1682) created many religious paintings for churches. The painter from Seville is famous for his genre pictures of children that were poor but happy, and these are imitated even today. ||
|-id=830
| 9830 Franciswasiak || || Francis C. Wasiak (born 1966) is the "Ground Systems Manager" and "Concept of Operations Lead" of the Lucy mission. ||
|-id=831
| 9831 Simongreen || 1979 QZ || Simon F. Green, British astronomer † ||
|-id=832
| 9832 Xiaobinwang || || Xiao-bin Wang (born 1966), an astronomer at the Yunnan Observatory, Chinese Academy of Sciences. ||
|-id=833
| 9833 Rilke || || Rainer Maria Rilke, Austrian poet ||
|-id=834
| 9834 Kirsanov || || Semen Isaakovich Kirsanov (1906–1972), Russian poet ||
|-id=836
| 9836 Aarseth || 1985 TU || Sverre Aarseth (Årseth), Norwegian astronomer. ||
|-id=837
| 9837 Jerryhorow || || Jerome Horowitz, father of the discoverer. ||
|-id=838
| 9838 Falz-Fein || || Baron Eduard Aleksandrovich von Falz-Fein (born 1912) is an outstanding collector of works of art and historical documents, known for his charity. Born in Russia, his uncle Friedrich Falz-Fein was the founder in 1875 of the well-known reserve Askania-Nova in Ukraine. ||
|-id=839
| 9839 Crabbegat || || Crabbegat is an idyllic road at the border of the Wolvendael park, close to the Royal Observatory at Uccle. The name might refer to "crab", although Uccle is located near neither the sea nor even a stream. ||
|-id=841
| 9841 Mašek || 1988 UT || Martin Mašek (born 1988) is an avid observer of deep-sky objects, variable stars, comets and asteroids. ||
|-id=842
| 9842 Funakoshi || || Hiromi Funakoshi (born 1961) works in Gifu prefecture's Fujihashi village office. He previously contributed to the spread of astronomy awareness as a researcher at Nishi Mino Observatory and still performs volunteer work there. ||
|-id=843
| 9843 Braidwood || || Thomas Braidwood (1715–1806), a Scottish teacher of the deaf. ||
|-id=844
| 9844 Otani || || Toyokazu Otani (born 1928), first lecturer at the Gotoh Planetarium and Astronomical Museum in Tokyo. ||
|-id=845
| 9845 Okamuraosamu || || Osamu Okamura (born 1954) is a Japanese certified public accountant and an amateur astronomer. ||
|-id=848
| 9848 Yugra || || Yugra is the historical name, used in Russia in medieval times, of the vast area to the east of the Northern Urals, extending to the river Taz. Inhabited then by the Hanty and Mansi tribes, it is now part of the territory of the Hanty-Mansi autonomous area within the Russian Federation. ||
|-id=850
| 9850 Ralphcopeland || || Ralph Copeland (1837–1905), an English astronomer and 3rd Astronomer Royal for Scotland, was an observer of comets and discoverer of planetary nebula by means of visual spectroscopy. He also observed the 1874 and 1882 transits of Venus and used the Leviathan of Parsonstown telescope to re-visit the nebulae in the catalogues of Charles Messier and John Herschel, and discovered several NGC objects including the Copeland Septet. ||
|-id=851
| 9851 Sakamoto || || Makoto Sakamoto, a research fellow of the Nishi-Harima Astronomical Observatory. ||
|-id=852
| 9852 Gora || 1990 YX || Ronald Gora (born 1933), a former American swimmer. ||
|-id=853
| 9853 l'Épée || || Charles-Michel de l'Épée (1712–1789) was a French philanthropic educator who has become known as the "Father of the Deaf", as he believed that the deaf were capable of acquiring language. He founded the first free public school for the deaf in Paris in 1760. ||
|-id=854
| 9854 Karlheinz || || Karlheinz Müller (born 1943), a German amateur astronomer and an agricultural clerk by profession. From his youth on, he committed himself to astrophotography and brightness estimates of variable stars. He has directed the Volkssternwarte Drebach since 1969 and oversaw the completion of a Zeiss planetarium and a new main building. He has helped popularize astronomy for people of all ages. Müller created the conditions for observing minor planets in Drebach. This minor planet was numbered with the help of positions observed in Drebach in 1996 and 1998. ||
|-id=855
| 9855 Thomasdick || 1991 CU || Thomas Dick (1774–1857) a Scottish astronomer, science teacher, writer and church minister, known for combining science, religion and philosophy and who had a substantial impact on the American education system. ||
|-id=857
| 9857 Hecamede || 1991 EN || Hecamede, daughter of Arsinoos from Greek mythology. She was held captive by King Nestor. ||
|-id=859
| 9859 Van Lierde || || Edmond Van Lierde (1888–1964), a brilliant student at the University of Brussels, later professor of mathematics, promoted modern mathematics and introduced this new discipline into Belgium. He was also a splendid pianist and an excellent tennis player. ||
|-id=860
| 9860 Archaeopteryx || || Archaeopteryx, the early bird that had a dinosaur-like skeleton. ||
|-id=861
| 9861 Jahreiss || || Hartmut Jahreiß (born 1942), a staff astronomer at the Astronomisches Rechen-Institut. ||
|-id=863
| 9863 Reichardt || || Johann Friedrich Reichardt, German composer ||
|-id=865
| 9865 Akiraohta || || Akira Ohta (1951–2002), an amateur observer of meteors and comets. ||
|-id=866
| 9866 Kanaimitsuo || || Mitsuo Kanai (born 1946), a lecturer and curator at the Gotoh Planetarium and Astronomical Museum in Tokyo for 15 years. ||
|-id=869
| 9869 Yadoumaru || || Yasushi Yadoumaru (born 1965), a research fellow at the Misato Observatory. ||
|-id=870
| 9870 Maehata || 1992 DA || Hideko Maehata (née Hideco Hyodo, 1914–1995), born in Hashimoto city, Wakayama Prefecture, won the gold medal for the 200-m breast-stroke event in the 1936 Olympic Games in Berlin. She was the first Japanese female Olympic gold medalist. ||
|-id=871
| 9871 Jeon || || Jeon San-Woon (born 1928), a historian of Korean astronomy and technology. ||
|-id=872
| 9872 Solf || || Josef K. M. Solf (born 1934), professor of astronomy at Heidelberg and Jena, and since 1994 director of the Thüringer Landessternwarte Tautenburg. ||
|-id=873
| 9873 Freundlich || 1992 GH || Erwin Finlay-Freundlich (1885–1964) was a German astronomer at Berlin Observatory and later professor at St. Andrews University in Scotland, who designed the Einstein Tower solar telescope at Potsdam, which was built to support experiments and observations to validate Albert Einstein's relativity theory. ||
|-id=878
| 9878 Sostero || 1994 FQ || Giovanni Sostero, Italian aerospace engineer and amateur astronomer† ||
|-id=879
| 9879 Mammuthus || || Mammuthus or woolly mammoth was a kind of elephant, about 4 meters tall, with dense dark hair and an 8-cm-thick layer of fat, protecting the animal from the cold. ||
|-id=880
| 9880 Stegosaurus || || Stegosaurus, a large dinosaur, 6 to 9 meters long, with a characteristic double row of large bony plates along the back. ||
|-id=881
| 9881 Sampson || 1994 SE || Ralph Allen Sampson (1866–1939) was an Irish-British astronomer and 5th Astronomer Royal for Scotland, whose research included the color temperature of stars and the theory of the motions of the four Galilean moons. The lunar crater Sampson is named after him. ||
|-id=882
| 9882 Stallman || || Richard Stallman (born 1953), the founder of the GNU Project and an advocate and developer of free software. ||
|-id=883
| 9883 Veecas || || The Ventura County Astronomical Society (VCAS) on the occasion of their 50th anniversary. The discoverer of this minor planet, John E. Rogers at Camarillo Observatory , is a co-founder of VCAS (Src). ||
|-id=884
| 9884 Příbram || || Príbram, the town in central Bohemia, was the impact site, on 7 April 1959, of the first photographic detection of a meteorite fall. Analysis of the fireball trajectory by Z. Ceplecha led to the discovery of four meteorites. ||
|-id=885
| 9885 Linux || || The Linux kernel was created by Linus Torvalds in 1991. ||
|-id=886
| 9886 Aoyagi || || Fusao Aoyagi (born 1952), the president of astronomical society in the town of Ishikawa, Fukushima prefecture. ||
|-id=887
| 9887 Ashikaga || 1995 AH || The city of Ashikaga in the south of Tochigi prefecture is the birthplace of the discoverer. The city has been well known for its textiles since ancient times. ||
|-id=891
| 9891 Stephensmith || || Stephen Smith, American publisher of The Shallow Sky Bulletin from 1986 to 2000; the SSB contained cometary ephemerides. ||
|-id=893
| 9893 Sagano || || The Sagano district is located in the western part of Kyoto, Japan. It is one of the city's most popular area for sightseeing, known for its bamboo forest and Zen temples. The historic place has been visited by imperial family, aristocrats, and the literati since the 9th century. ||
|-id=897
| 9897 Malerba || || Franco Malerba (born 1946), the first Italian astronaut. ||
|-id=898
| 9898 Yoshiro || 1996 DF || Yoshiro Yamada (born 1954), a leading popularizer of astronomy in Japan. He worked at the National Astronomical Observatory as a public outreach official, and also at museums in Sagamihara, Yokohama and Tokyo. He translated Don Yeomans' book on near-earth objects into Japanese. ||
|-id=899
| 9899 Greaves || 1996 EH || William Michael Herbert Greaves (1897–1955) was a British astronomer and 6th Astronomer Royal for Scotland known for his work on stellar spectrophotometry and advocacy for the proposed Jodrell Bank Observatory. The lunar crater Greaves is named after him. ||
|-id=900
| 9900 Llull || || Ramon Llull (1232–1316), a Catalan writer, philosopher, mystic, missionary and man of science, born in Mallorca. Among his more than 265 works and treatises, his Tractatus novus de astronomia, written in Paris around 1297, adheres to the ideas of Ptolomy. ||
|}
9901–10000
|-id=902
| 9902 Kirkpatrick || 1997 NY || Ralph Kirkpatrick (1911–1984), eminent American harpsichordist, clavichordist, musicologist and teacher. ||
|-id=903
| 9903 Leonhardt || || Gustav Leonhardt (1928–2012), Dutch clavecinist, organist and musicologist. ||
|-id=904
| 9904 Mauratombelli || || Maura Tombelli (born 1952), Italian astronomer and discoverer of minor planets ||
|-id=905
| 9905 Tiziano || 4611 P-L || Tiziano Vecellio (Titian; c. 1477 or 1490–1576), a typical Renaissance painter. ||
|-id=906
| 9906 Tintoretto || 6523 P-L || Jacopo Robusti (1518–1594), called Tintoretto, Italian (Venetian) painter. ||
|-id=907
| 9907 Oileus || 6541 P-L || Oileus, the father of Ajax the Little. Next to Achilles, Ajax was the fastest-running Greek hero. ||
|-id=908
| 9908 Aue || 2140 T-1 || Hartmann von Aue (born c. 1160–70, died c. 1210–20), a German poet and knight ||
|-id=909
| 9909 Eschenbach || 4355 T-1 || Wolfram von Eschenbach (1168–1220) was, with von Aue and Gottfried von Strassburg, one of the greatest poets of medieval times. ||
|-id=910
| 9910 Vogelweide || 3181 T-2 || Walther von der Vogelweide (c. 1170–1230), a German lyric poet. ||
|-id=911
| 9911 Quantz || 4129 T-2 || Johann Joachim Quantz (1697–1773), a German flutist and composer. ||
|-id=912
| 9912 Donizetti || 2078 T-3 || Gaetano Donizetti (1797–1848), Italian composer. ||
|-id=913
| 9913 Humperdinck || 4071 T-3 || Engelbert Humperdinck (1854–1921), a German composer. ||
|-id=914
| 9914 Obukhova || || Nadezhda Andreevna Obukhova (1886–1961), a Russian singer. ||
|-id=915
| 9915 Potanin || || Grigorij Nikolaevich Potanin (1835–1920), a Russian geographer, ethnographer and publicist. ||
|-id=916
| 9916 Kibirev || || Sergej Feodosievich Kibirev (born 1950) is involved in new methods of the processing of information, organizing the production of microelectronics in Novosibirsk. A champion sprinter in his youth, he likes extreme forms of sports. He is also a poet. ||
|-id=917
| 9917 Keynes || 1979 MK || John Maynard Keynes (1883–1946), a British economist whose ideas fundamentally changed the theory and practice of macroeconomics and the economic policies of governments ||
|-id=918
| 9918 Timtrenkle || || Timothy G. Trenkle (born 1958) is a contributor to the Lucy mission, leading the "Engineering Technology Directorate" at Goddard Space Flight Center. ||
|-id=919
| 9919 Undset || || Sigrid Undset (1882–1949), a Norwegian author. ||
|-id=920
| 9920 Bagnulo || || Stefano Bagnulo (born 1965), an astronomer at the Armagh Observatory and a specialist in polarimetry of early-type stars. ||
|-id=921
| 9921 Rubincam || || David P. Rubincam (born 1947), an American planetary geodynamicist at the NASA Goddard Space Flight Center. ||
|-id=922
| 9922 Catcheller || || Endowing the English language with a new term, the 1961 novel Catch-22 by U.S. writer Joseph Heller (1923–1999) epitomized both the problems of a sane person in an insane society and the absurdity of war. The name was suggested by B. G. Marsden. ||
|-id=923
| 9923 Ronaldthiel || || Ronald L. Thiel (born 1937) is the Division Chief of the Traffic Division for the County of Hawaii. In his capacity as traffic engineer, he has overseen the installation of shielded LED streetlights and other lighting that is designed to minimize impact on the dark night sky over the Mauna Kea Observatories. ||
|-id=924
| 9924 Corrigan || || Catherine Corrigan (born 1972) is a U.S. meteoriticist at the Smithsonian Institution. Her research includes the mineralogy and origin of asteroids. She classifies and provides access to meteorites from the U.S. Antarctic collection for the international research community. ||
|-id=925
| 9925 Juliehoskin || || Candace Julie Hoskin (born 1974) is the Collection Manager for meteorites at the Smithsonian Institution. She is responsible for maintaining the collection and providing access to samples for researchers studying the origin and evolution of asteroids. ||
|-id=926
| 9926 Desch || || Steven Desch (born 1970) is a professor of astronomy at Arizona State University. His work in theoretical astrophysics centers on models of the origin and evolution of asteroids and planets, including chondrule formation, protoplanetary disk evolution, and the origin of short-lived radionuclides. Nier Prize awardee in 2003. ||
|-id=927
| 9927 Tyutchev || || Fyodor Tyutchev (1803–1873), Russian poet ||
|-id=929
| 9929 McConnell || || John C McConnell (born 1946), a historian of Astronomy and chairman of the East Antrim Astronomical Society ||
|-id=930
| 9930 Billburrows || 1984 CP || William E. Burrows (born 1937), of New York University, is a top authority on space, national security, spy satellites and spy planes. ||
|-id=931
| 9931 Herbhauptman || 1985 HH || Herbert A. Hauptman (1917–2011), mathematical chemist and Nobelist. ||
|-id=932
| 9932 Kopylov || || Ivan Mikheevich Kopylov (born 1928), Russian astronomer. ||
|-id=933
| 9933 Alekseev || || Anatolij Semenovich Alekseev (born 1928), a professor in the department of mathematical geophysics at Novosibirsk University. ||
|-id=934
| 9934 Caccioppoli || 1985 UC || Renato Caccioppoli (1904–1959) and Francesco Caccioppoli (1855–1904). Francesco directed the Naval Institute in Procida, near Napoli, and was a passionate observer of the sky. Renato was an outstanding mathematician who carried out seminal work on linear and nonlinear differential equations. The name was suggested by E. Perozzi. ||
|-id=936
| 9936 Al-Biruni || || Al-Biruni (973–1050), a Persian anthropologist, mathematician, and astronomer ||
|-id=937
| 9937 Triceratops || || Triceratops, dinosaur genus. ||
|-id=938
| 9938 Kretlow || 1988 KA || Mike Kretlow, a longtime friend of the discoverer. ||
|-id=941
| 9941 Iguanodon || || Iguanodon, dinosaur genus. ||
|-id=943
| 9943 Bizan || || Mount Bizan is a 277-m-high mountain in Tokushima Prefecture. The name is said to be derived from the mountain's visual similarity to an eyebrow ||
|-id=945
| 9945 Karinaxavier || 1990 KX || Karina Xavier (born 1977) is a citizen of both Brazil and the U.S. but might have chosen to be born in Italy had she been asked; instead she obtained her doctorate in Italian Renaissance literature. A true citizen of the world, she speaks five languages fluently, often all at once, and has a passion for soccer ||
|-id=947
| 9947 Takaishuji || 1990 QB || Shuji Takai (born 1967), a Japanese elementary school teacher and member of the Kuroishi Subaru Association. ||
|-id=949
| 9949 Brontosaurus || || Brontosaurus, a genus of a large dinosaur (20 m), that lived in the Late Jurassic with many fossils found in the United States. ||
|-id=950
| 9950 ESA || 1990 VB || European Space Agency ||
|-id=951
| 9951 Tyrannosaurus || || Tyrannosaurus, dinosaur genus. ||
|-id=954
| 9954 Brachiosaurus || || Brachiosaurus, dinosaur genus. ||
|-id=956
| 9956 Castellaz || || Peter Castellaz (born 1965), a German physicist. ||
|-id=957
| 9957 Raffaellosanti || || Raphael (1483–1520), full name Raffaello Sanzio, a famous painter and architect, and one of the masters of the Italian Renaissance. ||
|-id=960
| 9960 Sekine || || Masumi Sekine (born 1950), the president of astronomical society at Ageo city. ||
|-id=962
| 9962 Pfau || || Werner Pfau (born 1936), director of the Jena University Observatory from 1990 to 2000 and a former chairman of the Astronomische Gesellschaft. ||
|-id=963
| 9963 Sandage || 1992 AN || Allan Sandage (1926–2010), an American astronomer at Palomar and Mount Wilson observatories. ||
|-id=964
| 9964 Hideyonoguchi || || Hideo Noguchi (1876–1928), a Japanese bacteriologist ||
|-id=965
| 9965 GNU || || The GNU Project was created by Richard Stallman's Free Software Foundation in 1984. It enabled computer programmers to trade and improve on each other's ideas freely. Linux and academic computing owe much of their functionality to the firm foundations of GNU software. ||
|-id=967
| 9967 Awanoyumi || || Yumi Awano (born 1972), the curator of the Okayama Astronomical Museum. ||
|-id=968
| 9968 Serpe || || Jean Nicolas François Jules Serpe (1914–2001) was the theoretical-physics professor of the discoverer at the University of Liege and was a member of the Académie royale de Belgique ||
|-id=969
| 9969 Braille || 1992 KD || Louis Braille (1809–1852), French cellist and organist, inventor of braille. ||
|-id=971
| 9971 Ishihara || 1993 HS || Takahiro Ishihara (born 1961), president of the Hiroshima Astronomical Society from 1987 to 1997. ||
|-id=972
| 9972 Minoruoda || 1993 KQ || Minoru Oda (1923–2001), a cosmic-ray physicist. ||
|-id=973
| 9973 Szpilman || || Wladyslaw Szpilman (1912–2000), a Polish pianist who managed to survive in the Warsaw ghetto. ||
|-id=974
| 9974 Brody || || Adrien Brody, American actor who played Szpilman in the film The Pianist. ||
|-id=975
| 9975 Takimotokoso || || Koso Takimoto (born 1965), a Japanese amateur astronomer. ||
|-id=977
| 9977 Kentakunimoto || 1994 AH || Kenta Kunimoto (born 1960), a Japanese neurosurgeon and a specialist in emergency medicine. ||
|-id=981
| 9981 Kudo || || Takahiro Kudo (born 1961), a Japanese amateur astronomer and a key member of the Ota Astronomical Club. ||
|-id=983
| 9983 Rickfienberg || 1995 DA || Rick Fienberg (born 1956), American editor-in-chief of Sky and Telescope. ||
|-id=984
| 9984 Gregbryant || 1996 HT || Greg Bryant (born 1970), Australian amateur astronomer.Src ||
|-id=985
| 9985 Akiko || 1996 JF || Akiko Yamamoto (born 1963), Japanese amateur astronomer at the Yatsuka Observatory ||
|-id=986
| 9986 Hirokun || 1996 NX || Hiroshi Fukazawa, nicknamed Hirokun, fiancé of Mizuho Urata (1972–2004), daughter of the co-discoverer, Takeshi Urata ||
|-id=987
| 9987 Peano || || Giuseppe Peano (1858–1932), Italian mathematician ||
|-id=988
| 9988 Erictemplebell || || Eric Temple Bell (1883–1960), Scottish-American mathematician and author ||
|-id=990
| 9990 Niiyaeki || || Niiya Station (Niiya Eki) is the name of a train station in Ozu, Ehime (population 46,000), a city in Ehime Prefecture, Japan ||
|-id=991
| 9991 Anežka || || Anežka Moravcová (born 1924), grandmother of Czech discoverer Zdeněk Moravec ||
|-id=993
| 9993 Kumamoto || || Kumamoto, the name of both a prefecture and its capital city, on the Japanese island of Kyushu. ||
|-id=994
| 9994 Grotius || 4028 P-L || Hugo Grotius (1583–1645), Dutch jurist and statesman. ||
|-id=995
| 9995 Alouette || 4805 P-L || Alouette 1, Canadian science satellite launched in 1962 ||
|-id=996
| 9996 ANS || 9070 P-L || Astronomische Nederlandse Satelliet, Dutch science satellite. ||
|-id=997
| 9997 COBE || 1217 T-1 || Cosmic Background Explorer (COBE), science satellite ||
|-id=998
| 9998 ISO || 1293 T-1 || Infrared Space Observatory. ||
|-id=999
| 9999 Wiles || 4196 T-2 || Andrew Wiles (born 1953), British mathematician ||
|-id=000
| 10000 Myriostos || 1951 SY || Greek word for ten-thousandth ||
|}
References
009001-010000 |
20994 | https://en.wikipedia.org/wiki/McLaren | McLaren | McLaren Racing Limited is a British motor racing team based at the McLaren Technology Centre in Woking, Surrey, England. McLaren is best known as a Formula One constructor, the second oldest active team, and the second most successful Formula One team after Ferrari, having won races, 12 Drivers' Championships and 8 Constructors' Championships. McLaren also has a history of competing in American open wheel racing, as both an entrant and a chassis constructor, and has won the Canadian-American Challenge Cup (Can-Am) sports car racing championship. The team is a subsidiary of the McLaren Group, which owns a majority of the team.
Founded in 1963 by New Zealander Bruce McLaren, the team won its first Grand Prix at the 1968 Belgian Grand Prix, but their greatest initial success was in Can-Am, which they dominated from 1967 to 1971. Further American triumph followed, with Indianapolis 500 wins in McLaren cars for Mark Donohue in 1972 and Johnny Rutherford in 1974 and 1976. After Bruce McLaren died in a testing accident in 1970, Teddy Mayer took over and led the team to their first Formula One Constructors' Championship in , with Emerson Fittipaldi and James Hunt winning the Drivers' Championship in 1974 and respectively. 1974 also marked the start of a long-standing sponsorship by the Marlboro cigarette brand.
In 1981, McLaren merged with Ron Dennis' Project Four Racing; Dennis took over as team principal, and shortly afterwards organised a buyout of the original McLaren shareholders to take full control of the team. This began the team's most successful era; with Porsche and Honda engines, Niki Lauda, Alain Prost, and Ayrton Senna won seven Drivers' Championships between them and the team took six Constructors' Championships. The combination of Prost and Senna was particularly dominant—together they won all but one race in —but later their rivalry soured and Prost left for Ferrari. Fellow English team Williams offered the most consistent challenge during this period, the two winning every constructors' title between and . By the mid-1990s, Honda had withdrawn from Formula One, Senna had moved to Williams, and the team went three seasons without a win. With Mercedes-Benz engines, West sponsorship, and former Williams designer Adrian Newey, further championships came in and with driver Mika Häkkinen, and during the 2000s the team were consistent front-runners, with driver Lewis Hamilton taking their latest title in .
Ron Dennis retired as McLaren team principal in 2009, handing over to long-time McLaren employee Martin Whitmarsh. At the end of 2013, after the team's worst season since 2004, Whitmarsh was ousted. McLaren announced in 2013 that they would be using Honda engines from 2015 onwards, replacing Mercedes-Benz. The team raced as McLaren Honda for the first time since 1992 at the 2015 Australian Grand Prix. In September 2017, McLaren announced they had agreed on an engine supply with Renault from 2018 to 2020. McLaren is using Mercedes-Benz engines from the 2021 season until at least 2024.
After initially returning to the Indianapolis 500 in 2017 as a backer of Andretti Autosport to run Fernando Alonso and then in 2019 as an independent entry, McLaren announced in August 2019 that they would run in conjunction with Arrow Schmidt Peterson Motorsports starting in 2020 to run the full IndyCar Series, the combined entry being named Arrow McLaren SP. Initially having no ownership interest in the team, McLaren would purchase 75% of the operation in 2021.
McLaren will enter the electric off-road racing series Extreme E in 2022.
Origins
Bruce McLaren Motor Racing was founded in 1963 by New Zealander Bruce McLaren. Bruce was a works driver for the British Formula One team Cooper with whom he had won three Grands Prix and come second in the World Championship. Wanting to compete in the Australasian Tasman Series, Bruce approached his employers, but when team owner Charles Cooper insisted on using 1.5-litre Formula One-specification engines instead of the 2.5-litre motors permitted by the Tasman rules, Bruce decided to set up his own team to run him and his prospective Formula One teammate Timmy Mayer with custom-built Cooper cars.
Bruce won the 1964 series, but Mayer was killed in practice for the final race at the Longford Circuit in Tasmania. When Bruce McLaren approached Teddy Mayer to help him with the purchase of the Zerex sports car from Roger Penske, Teddy Mayer and Bruce McLaren began discussing a business partnership resulting in Teddy Mayer buying in to Bruce McLaren Motor Racing Limited (BMMR) ultimately becoming its largest shareholder. The team was based in Feltham in 1963–1964, and from 1965 until 1981 in Colnbrook, England. The team also held a British licence. Despite this, Bruce never used the traditional British racing green on his cars. Instead, he used colour schemes that were not based on national principles (e.g. his first car, the McLaren M2B, was painted white with a green stripe, to represent a fictional Yamura team in John Frankenheimer's film Grand Prix).
During this period, Bruce drove for his team in sports car races in the United Kingdom and North America and also entered the 1965 Tasman Series with Phil Hill, but did not win it. He continued to drive in Grands Prix for Cooper, but judging that team's form to be waning, decided to race his own cars in 1966.
Racing history: Formula One
Early days (1966–1967)
Bruce McLaren made the team's Grand Prix debut at the 1966 Monaco race (of the current Formula One teams only Ferrari is older). His race ended after nine laps due to a terminal oil leak. The car was the M2B designed by Robin Herd, but the programme was hampered by a poor choice of engines: a 3.0-litre version of Ford's Indianapolis 500 engine and a Serenissima V8 were used, the latter scoring the team's first point in Britain, but both were underpowered and unreliable. For Bruce decided to use a British Racing Motors (BRM) V12 engine, but due to delays with the engine, was forced initially to use a modified Formula Two car called the M4B powered by a 2.1-litre BRM V8, later building a similar but slightly larger car called the M5A for the V12. Neither car brought great success, the best result being a fourth at Monaco.
Ford-Cosworth DFV engines (1968–1982)
For , after driving McLaren's sole entry for the previous two years, Bruce was joined by 1967 champion and fellow New Zealander Denny Hulme, who was already racing for McLaren in Can-Am. That year's new M7A car, Herd's final design for the team, was powered by Cosworth's new and soon to be ubiquitous DFV engine (the DFV would go on to be used by McLaren until 1983) and with it a major upturn in form proceeded. Bruce won the Race of Champions at the Brands Hatch circuit and Hulme won the International Trophy at Silverstone, both non-championship races, before Bruce took the team's first championship win at the Belgian Grand Prix. Hulme also won the Italian and Canadian Grands Prix later in the year, helping the team to second in the Constructors' Championship. Using an updated 'C' version on the M7, a further three podium finishes followed for Bruce in , but the team's fifth win had to wait until the last race of the 1969 championship when Hulme won the Mexican Grand Prix. That year, McLaren experimented with four-wheel drive in the M9A, but the car had only a single outing driven by Derek Bell at the British Grand Prix; Bruce described driving it as like "trying to write your signature with somebody jogging your elbow".
The year started with a second-place each for Hulme and Bruce in the first two Grands Prix, but in June, Bruce was killed in a crash at Goodwood while testing the new M8D Can-Am car. After his death, Teddy Mayer took over effective control of the team; Hulme continued with Dan Gurney and Peter Gethin partnering him. Gurney won the first two Can-Am events at Mosport and St. Jovite and placed ninth in the third, but left the team mid-season, and Gethin took over from there. While began promisingly when Hulme led the opening round in South Africa before retiring with broken suspension, ultimately Hulme, Gethin (who left for BRM mid-season,) and Jackie Oliver again failed to score a win. The 1972 season saw improvements though: Hulme won the team's first Grand Prix for two-and-a-half years in South Africa and he and Peter Revson scored ten other podiums, the team finishing third in the Constructors' Championship. McLaren gave Jody Scheckter his Formula One debut at the final race at Watkins Glen. All McLaren drivers used the Ford-Cosworth engines, except for Andrea de Adamich and Nanni Galli who used engines from Alfa Romeo in 1970.
The McLaren M23, designed by Gordon Coppuck, was the team's new car for the season. Sharing parts of the design of both McLaren's Formula One M19 and Indianapolis M16 cars (itself inspired by Lotus's 72), it was a mainstay for four years. Hulme won with it in Sweden and Revson took the only Grand Prix wins of his career in Britain and Canada. In , Emerson Fittipaldi, world champion with Lotus two years earlier, joined McLaren. Hulme, in his final Formula One campaign, won the Argentinian season-opener; Fittipaldi, with wins in Brazil, Belgium and Canada, took the Drivers' Championship. It was a close fight for Fittipaldi, who secured the title with a fourth at the season-ending United States Grand Prix, putting him three points ahead of Ferrari's Clay Regazzoni. With Hulme and multiple motorcycle world champion Mike Hailwood, he also sealed McLaren's first Constructors' Championship. The year was less successful for the team: Fittipaldi was second in the championship behind Niki Lauda. Hulme's replacement Jochen Mass took his sole GP win in Spain.
At the end of 1975, Fittipaldi left to join his brother's Fittipaldi/Copersucar team. With the top drivers already signed to other teams, Mayer turned to James Hunt, a driver on whom biographer Gerald Donaldson reflected as having "a dubious reputation". In , Lauda was again strong in his Ferrari; at midseason, he led the championship with 56 points whilst Hunt had only 26 despite wins in Spain (a race from which he was initially disqualified) and France. At the German Grand Prix, though, Lauda crashed heavily, was nearly killed, and missed the next two races. Hunt capitalised by winning four more Grands Prix giving him a three-point deficit going into the finale in Japan. Here it rained torentially, Lauda retired because of safety concerns, and Hunt sealed the Drivers' Championship by finishing third. McLaren, though, lost the Constructors' Championship to Ferrari.
In , the M23 was gradually replaced with the M26, the M23's final works outing being Gilles Villeneuve's Formula One debut with the team in a one-off appearance at the British Grand Prix. Hunt won on three occasions that year, but the Lauda and Ferrari combination proved too strong, Hunt and McLaren managing just fifth and third in the respective championships. From there, results continued to worsen. Lotus and Mario Andretti took the titles with their 78 and 79 ground-effect cars and neither Hunt nor Mass's replacement Patrick Tambay were able to seriously challenge with the nonground-effect M26. Hunt was dropped at the end of 1978 in favour of Lotus's Ronnie Peterson, but when Peterson was killed by a crash at the Italian Grand Prix, John Watson was signed, instead. No improvement occurred in ; Coppuck's M28 design was described by Mayer as "ghastly, a disaster" and "quite diabolical" and the M29 did little to change the situation. Tambay scored no points and Watson only 15 to place the team eighth at the end of the year.
The 1980s started much as the 1970s had ended: Alain Prost took over from Tambay but Watson and he rarely scored points. Under increasing pressure since the previous year from principal sponsor Philip Morris and their executive John Hogan, Mayer was coerced into merging McLaren with Ron Dennis's Project Four Formula Two team, also sponsored by Philip Morris. Dennis had designer John Barnard who, inspired by the carbon-fibre rear wings of the BMW M1 race cars that Project Four was preparing, had ideas for an innovative Formula One chassis constructed from carbon-fibre instead of conventional aluminium alloy. On their own, they lacked the money to build it, but with investment that came with the merger it became the McLaren MP4 (later called MP4/1) of , driven by Watson and Andrea de Cesaris. In the MP4, Watson won the British Grand Prix and had three other podium finishes. Soon after the merger, McLaren moved from Colnbrook to a new base in Woking and Dennis and Mayer initially shared the managing directorship of the company; by 1982, Mayer had departed and Tyler Alexander's and his shareholdings had been bought by the new owners.
TAG-Porsche and Honda engines (1983–1992)
In the early 1980s, teams like Renault, Ferrari and Brabham were using 1.5-litre turbocharged engines in favour of the 3.0-litre naturally aspirated engines that had been standard since 1966. Having seen in 1982 the need for a turbo engine of their own, Dennis had convinced Williams backer Techniques d'Avant Garde (TAG) to fund Porsche-built, TAG-branded turbo engines made to Barnard's specifications; TAG's founder Mansour Ojjeh would later become a McLaren shareholder. In the meantime, they continued with Cosworth engines as old rival Lauda came out of retirement in 1982 to drive alongside Watson in that year's 1B development of the MP4. They each won two races, Watson notably from 17th place on the grid in Detroit, and at one stage of the season McLaren were second in the constructors' championship. As part of a dispute with FISA, they boycotted the San Marino Grand Prix. Although was not so fruitful, Watson did win again in the United States, this time from 22nd on the grid at Long Beach.
Having been fired by Renault, Prost was once again at McLaren for . Now using the TAG engines, the team dominated, scoring 12 wins and two-and-a-half times as many constructors' points as nearest rival Ferrari. In the Drivers' Championship, Lauda prevailed over Prost by half a point, the narrowest margin ever. The McLaren-TAGs were again strong in ; a third Constructors' Championship came their way while this time Prost won the Drivers' Championship. In , the Williams team were resurgent with their Honda engine and drivers Nigel Mansell and Nelson Piquet, while at McLaren, Lauda's replacement, 1982 champion Keke Rosberg could not gel with the car. Williams took the Constructors' Championship, but for Prost, wins in San Marino, Monaco, and Austria combined with the fact that the Williams drivers were taking points from each other meant that he retained a chance going into the last race, the Australian Grand Prix. There, a puncture for Mansell and a precautionary pit stop for Piquet gave Prost the race win and his second title, making him the first driver to win back-to-back championships since Jack Brabham in and 1960. In Barnard departed for Ferrari to be replaced by Steve Nichols (who himself joined Ferrari in 1989). In the hands of Prost and Stefan Johansson, though, Nichols's MP4/3 and the TAG engine could not match the Williams-Honda.
For , Honda switched their supply to McLaren and, encouraged by Prost, Dennis signed Ayrton Senna to drive. Despite regulations reducing the boost pressure and fuel capacity (and therefore, power) of the turbo cars, Honda persisted with a turbocharged engine. In the MP4/4, Senna and Prost engaged in a season-long battle, winning 15 of the 16 races (at the other race at Monza, Senna had been leading comfortably, but collided with back-marker Jean-Louis Schlesser). At the Portuguese Grand Prix, their relationship soured when Senna squeezed Prost against the pit wall; Prost won, but afterwards said, "It was dangerous. If he wants the world championship that badly he can have it." Prost scored more points that year, but because only the best 11 results counted, Senna took the title at the penultimate race in Japan.
The next year, with turbos banned, Honda supplied a new 3.5-L naturally aspirated V10 engine and McLaren again won both titles with the MP4/5. Their drivers' relationship continued to deteriorate, though, especially when, at the San Marino Grand Prix, Prost felt that Senna had reneged on an agreement not to pass each other at the first corner. Believing that Honda and Dennis were favouring Senna, Prost announced mid-season that he would leave to drive at Ferrari the following year. For the second year in succession, the Drivers' Championship was decided at the Japanese Grand Prix, this time in Prost's favour after Senna and he collided (Senna initially recovered and won the race, but was later disqualified).
With former McLaren men Nichols and Prost (Barnard had moved to the Benetton team), Ferrari pushed the British team more closely in . McLaren, in turn, brought in Ferrari's Gerhard Berger, but like the two seasons before, the Drivers' Championship was led by Prost and Senna and settled at the penultimate race in Japan. Here, Senna collided with Prost at the first corner, forcing both to retire, but this time Senna escaped punishment and took the title; McLaren also won the Constructors' Championship. The year was another for McLaren and Senna, with the ascendant Renault-powered Williams team their closest challengers. By , Williams, with their advanced FW14B car, had overtaken McLaren, breaking their four-year run as champions, despite the latter winning five races that year.
Ford, Lamborghini and Peugeot engines (1993–1994)
As Honda withdrew from the sport at end of 1992 due to their entrance into CART PPG Indy Car World Series in 1993, McLaren sought a new engine supplier. A deal to secure Renault engines fell through, subsequently McLaren switched to customer Ford engines for the season. Senna—who initially agreed only to a race-by-race contract before later signing for the whole year—won five races, including a record-breaking sixth victory at Monaco and a win at the European Grand Prix, where he went from fifth to first on the opening lap. His teammate, 1991 IndyCar champion Michael Andretti, fared much worse: he scored only seven points, and was replaced by test driver Mika Häkkinen for the final three rounds of the season. Williams ultimately won both titles and Senna—who had flirted with moving there for 1993—signed with them for the season. During the 1993 season McLaren took part in a seven part BBC Television documentary called A Season With McLaren.
McLaren tested a Lamborghini V12 engine ahead of the season, as part of a potential deal with the then-Lamborghini owner Chrysler, before eventually deciding to use Peugeot engines. With Peugeot power, the MP4/9 was driven by Häkkinen and Martin Brundle, despite achieving eight podiums over the season no wins were achieved. Peugeot was dropped after a single year due to multiple engine failures/unreliability which cost McLaren potential race victories and they switched to a Mercedes-Benz-branded, Ilmor-designed engine.
Mercedes partnership (1995–2014)
1995–2009: Works Mercedes partnership
's MP4/10 car was not a front-runner and Brundle's replacement, former champion Nigel Mansell, was unable to fit into the car at first and departed after just two races, with Mark Blundell taking his place.
While Williams dominated in , McLaren, now with David Coulthard alongside Häkkinen, went a third successive season without a win. In , however, Coulthard broke this run by winning the season-opening Australian Grand Prix; Häkkinen and he would each win another race before the end of the season, and highly rated designer Adrian Newey joined the team from Williams in August that year. Despite the car's improved pace, unreliability proved costly throughout the season, with retirements at the British and Luxembourg Grands Prix occurring whilst Häkkinen was in the lead.
With Newey able to take advantage of new technical regulations for , and with Williams losing their works Renault engines, McLaren were once again able to challenge for the championship. Häkkinen and Coulthard won five of the first six races despite the banning of the team's "brake steer" system, which allowed the rear brakes to be operated individually to reduce understeer, after a protest by Ferrari at the second race in Brazil. Schumacher and Ferrari provided the greatest competition, the former levelled on points with Häkkinen with two races to go, but wins for Häkkinen at the Luxembourg and Japanese Grands Prix gave both him the Drivers' Championship and McLaren the Constructors' Championship. Häkkinen won his second Drivers' Championship the following season, but due to a combination of driver errors and mechanical failures, the team lost the constructors' title to Ferrari.
In McLaren won seven races in a close fight with Ferrari, but ultimately Ferrari and Schumacher prevailed in both competitions. This marked the start of a decline in form as Ferrari cemented their dominance of Formula One. In , Häkkinen was outscored by Coulthard for the first time since 1997 and retired (ending Formula One's longest ever driver partnership), his place taken by Kimi Räikkönen, then in , Coulthard took their solitary win at Monaco while Ferrari repeated McLaren's 1988 feat of 15 wins in a season.
The year started promisingly, with one win each for Coulthard and Räikkönen at the first two Grands Prix. However, they were hampered when the MP4-18 car designed for that year suffered crash test and reliability problems, forcing them to continue using a 'D' development of the year-old MP4-17 for longer than they had initially planned. Despite this, Räikkönen scored points consistently and challenged for the championship up to the final race, eventually losing by two points. The team began with the MP4-19, which technical director Adrian Newey described as "a debugged version of [the MP4-18]". It was not a success, though, and was replaced mid-season by the MP4-19B. With this, Räikkönen scored the team's and his only win of the year at the Belgian Grand Prix, as McLaren finished fifth in the Constructors' Championship, their worst ranking since 1983.
Coulthard left for Red Bull Racing in to be replaced by former CART champion Juan Pablo Montoya for what was McLaren's most successful season in several years as he and Räikkönen won ten races. However, both the team not being able to work out why the car could not heat its tyres properly in the early stages of the season and the overall unreliability of the MP4-20 cost several race victories when Räikkönen had been leading or in contention to win and also costing him grid positions in some qualifying sessions, which allowed Renault and their driver Fernando Alonso to capitalise and win both titles.
In , the superior reliability and speed of the Ferraris and Renaults prevented the team from gaining any victories for the first time in a decade. Montoya parted company acrimoniously with the team to race in NASCAR after the United States Grand Prix, where he crashed into Räikkönen at the start; test driver Pedro de la Rosa deputised for the remainder of the season. The team also lost Räikkönen to Ferrari at the end of the year.
Steve Matchett argued that the poor reliability of McLaren in 2006 and recent previous years was due to a lack of team continuity and stability. His cited examples of instability are logistical challenges related to the move to the McLaren Technology Centre, Adrian Newey's aborted move to Jaguar and later move to Red Bull, the subsequent move of Newey's deputy to Red Bull, and personnel changes at Ilmor.
The season saw Fernando Alonso race alongside Formula One debutant and long-time McLaren protege Lewis Hamilton. The pair scored four wins each and led the Drivers' Championship for much of the year, but tensions arose within the team, BBC Sport claimed that Alonso was unable to cope with Hamilton's competitiveness. At the Hungarian Grand Prix, Alonso was judged to have deliberately impeded his teammate during qualifying, so the team were not allowed to score Constructors' points at the event. An internal agreement within the McLaren team stated that drivers would alternatively have an extra lap for qualifying, however, Lewis Hamilton refused to accept for the Hungarian Grand Prix. Subsequently, the McLaren team was investigated by the FIA for having proprietary technical blueprints of Ferrari's car – the so-called "Spygate" controversy. At the first hearing, McLaren management consistently denied all knowledge, blaming a single "rogue engineer". However, in the final hearing, McLaren was found guilty and the team was excluded from the Constructors' Championship and fined $100 million. The drivers were allowed to continue without penalty, and whilst Hamilton led the Drivers' Championship heading into the final race in Brazil, Räikkönen in the Ferrari won the race and the Drivers' Championship, a single point ahead of both McLaren drivers. In November, Alonso and McLaren agreed to terminate their contract by mutual consent, Heikki Kovalainen filling the vacant seat alongside Hamilton.
In , a close fight ensued between Hamilton and the Ferraris of Felipe Massa and Räikkönen; Hamilton won five times and despite also crossing the finish line first at the Belgian Grand Prix, he was deemed to have gained an illegal advantage by cutting a chicane during an overtake and was controversially demoted to third. Going into the final race in Brazil, Hamilton had a seven-point lead over Massa. Massa won there, but Hamilton dramatically clinched his first Drivers' Championship by moving into the necessary fifth position at the final corner of the final lap of the race. Despite winning his first Grand Prix in Hungary, Kovalainen finished the season only seventh in the overall standings, allowing Ferrari to take the constructors' title.
Before the start of the season, Dennis retired as team principal, handing responsibility to Martin Whitmarsh, but the year started badly: the MP4-24 car was off the pace and the team was given a three-race suspended ban for misleading stewards at the Australian and Malaysian Grands Prix. Despite these early problems, a late revival had Hamilton win at the Hungarian and Singapore Grands Prix.
2010–2014: Customer Mercedes engines
For the 2010 season, McLaren lost its status as the Mercedes works team; Mercedes decided to buy the Brackley-based Brawn team that had won the 2009 titles with its customer engines, Whitmarsh having chosen to abandon their exclusive rights to the Mercedes engines to help Brawn run. Mercedes still continued providing engines to McLaren, albeit under a supplier-customer relationship rather than the works partnership as before, while it sold its 40 percent shares of McLaren over two years. McLaren signed 2009 champion, Jenson Button, to replace Kovalainen alongside Hamilton in . Button won twice (in Australia and China) and Hamilton three times (in Turkey, Canada, and Belgium), but they and McLaren failed to win their respective championships, that year's MP4-25 largely outpaced by Red Bull's RB6.
Hamilton and Button remained with the team into , with Hamilton winning three races – China, Germany, and Abu Dhabi and Button also winning three races – Canada, Hungary, and Japan. Button finished the Drivers' Championship in second place with 270 points behind 2011 Drivers' Champion Sebastian Vettel of Red Bull Racing, ahead of Hamilton's 227 points. McLaren was second in the Constructors' Championship to Red Bull Racing. Throughout the season, Hamilton was involved in several incidents with other drivers including – most notably – multiple collisions with 2008 title rival Massa.
In , McLaren won the first race of the year in Australia with a dominant victory by Button and a 3rd place from pole for Hamilton, while Hamilton went on to win in Canada, but by the mid-way mark of the season at the team's home race at Silverstone, the McLaren cars managed only eighth place (Hamilton) and 10th place (Button), while the drivers' and Constructors' Championships were being dominated by Red Bull Racing and Ferrari, whose cars occupied the first four places of the , this was partially due to pit stop problems and Button's temporary dip in form after not adapting as well as Hamilton to the new Pirelli tyres. The car also suffered reliability problems which cost the team and its drivers numerous potential points, most notably in Singapore and Abu Dhabi, where Hamilton had been leading from the front in both races and in Italy where the team lost a 1-2 finish when Button's car failed with fuel problems on lap 33.
Sergio Pérez replaced Hamilton for , after Hamilton decided to leave for Mercedes. The team's car for the season, the MP4-28, was launched on 31 January 2013. The car struggled to compete with the other top teams and the season had McLaren fail to produce a podium finish for the first time since .
Kevin Magnussen replaced Pérez for , and Ron Dennis, who had remained at arm's length since stepping down from the team principal role, returned as CEO of the operation. McLaren was the first team to officially launch their 2014 car, the MP4-29, which was revealed on 24 January 2014. They had a largely unsuccessful 2014; their best result was in Australia where – after Daniel Ricciardo's disqualification from second place – Magnussen finished second and Button third. Button subsequently finished fourth in Canada, Britain, and Russia. Their highest grid position was in Britain with Button's third place on the grid.
Honda engines (2015–2017)
For , McLaren ended their engine deal with Mercedes which included buying back the 40% stake that Mercedes held in the team and reforging their historical partnership with Honda. The team announced Fernando Alonso and Jenson Button as their race drivers, with Kevin Magnussen demoted to test driver. During pre-season testing at the Circuit de Barcelona-Catalunya in February, Alonso suffered a concussion and, as a result, Kevin Magnussen replaced him for the season-opening in March. At that inaugural race of the season, Jenson Button finished 11th, but was lapped twice and finished last of the finishing cars. Following considerable unreliability and initial suggestions that the Honda engine was underpowered relative to its competitors, steady performance gains eventually resulted in Button managing to score the team's first (four) points of the season at the sixth round in Monaco. By contrast, Alonso scored his first point three races later at the British Grand Prix.
The Hungarian Grand Prix saw the team score their best result of the season with Alonso and Button finishing fifth and ninth, respectively. However, McLaren did not score points in the next four races until Button finished ninth at the Russian Grand Prix. At the following United States Grand Prix, Button scored his best result of the season with sixth place. The team finished ninth in the constructors' standings with 27 points, McLaren's worst performance since 1980.
McLaren retained the Alonso - Button pairing for the season. The second year of the Honda partnership was better than the first, with the team being able to challenge for top 10 positions on a more regular basis. However, the season started with a massive crash at the Australian Grand Prix in which Fernando Alonso sustained rib fractures and a collapsed lung after colliding with Esteban Gutiérrez and somersaulting into the crash barriers. Alonso, as a result of his injuries, was forced to miss the second round of the Championship, the Bahrain Grand Prix, and was replaced by reserve driver Stoffel Vandoorne. Vandoorne produced an impressive performance in his first race to score the team's first point of the season with 10th place. The next points for McLaren came at the Russian Grand Prix with Alonso and Button finishing sixth and 10th respectively. The rain-affected Monaco Grand Prix was one of best races of the season for the team. Alonso finished fifth, having kept Nico Rosberg's Mercedes behind him for 46 laps, while Button scored two points with ninth. At the Austrian Grand Prix, Button recorded his best result of the season with a sixth-place after qualifying third in a wet/dry session. After a disappointing display at their home race, the British Grand Prix at Silverstone, the team scored points at the next three rounds with six points in Hungary, four in Germany, and six points again thanks to an impressive seventh-place finish from Alonso at the Belgian Grand Prix. At the United States Grand Prix, McLaren matched their Monaco result with 12 points after an attacking race from Alonso saw him claim fifth position while Button once again finished ninth. After a season of significant progress compared to 2015, Alonso and Button finished the championship in 10th and 15th places respectively with the team ending the season in sixth place in the Constructors' Championship with 76 points. On 3 September 2016, Jenson Button announced he would take a sabbatical from Formula One for the 2017 season. He then confirmed on 25 November that he would retire from F1 altogether with Vandoorne being Alonso's new Teammate for 2017.
In February 2017, McLaren signed Lando Norris to their Young Driver Programme.
Alonso did not take part in the 2017 Monaco Grand Prix as he was participating in the Indianapolis 500. Instead Jenson Button returned for the one race as his replacement. McLaren finished 2017 9th with 30 points in total.
Renault engines (2018–2020)
McLaren announced during the 2017 Singapore Grand Prix weekend that they would split from engine supplier Honda at the end of the 2017 season and had agreed on a three-year deal to be supplied by Renault. Team boss Éric Boullier described their performance between 2015 and 2017 as a "proper disaster" for the team's credibility. was the first season in McLaren's history when their cars were powered by Renault engines. McLaren also announced that Fernando Alonso and Stoffel Vandoorne would remain with the team for the 2018 season. On 6 November 2017, the team announced that Lando Norris would be the team's test and reserve driver.
At the season-opening Australian Grand Prix, Fernando Alonso scored the team's best finish since the 2016 Monaco Grand Prix with fifth, Alonso said that the team's target would be Red Bull Racing. McLaren had a relatively good start to the season with points finishes in the next four races, but in the next 16 races after Spain, McLaren only scored 22 points, 8 points less than in the same period in 2017. On 14 August 2018, Fernando Alonso announced he would not compete in Formula One in 2019, ending his four-year spell at the team. Carlos Sainz Jr. was signed as his replacement on a multi-year deal. On 3 September 2018, it was announced that Stoffel Vandoorne would be leaving the team at the end of the season, with Lando Norris being promoted from reserve driver to replace him in 2019. McLaren struggled with performance throughout the season, with the McLaren drivers being knocked out 21 times in the first qualifying session, and McLaren having the second-worst average qualifying ranking of any team, only ahead of Williams. The team finished the disappointing season – after being helped by the exclusion of Force India's points from the first 12 races – in 6th place with 62 points, 357 points behind their target, Red Bull Racing, with the same engine.
The 2019 season was much more positive for McLaren, with the team securely establishing themselves as the best constructor behind Mercedes, Ferrari, and Red Bull. At the Brazilian Grand Prix, Sainz recorded the team's first podium since the 2014 Australian Grand Prix, finishing fourth on the road but later promoted to third after Lewis Hamilton received a post-race penalty, meaning that the team missed out on the official podium ceremony. McLaren ended the season in 4th place with 145 points, their best result since 2014 and 54 points ahead of their nearest competitor, Renault.
McLaren secured two podiums in 2020: a third place for Norris in Austria and a second-placed finish for Sainz at Monza. The team finished the shortened 2020 season third in the constructors' championship with 202 points. Sainz finished the driver's championship sixth with 105 points and Norris ninth with 97 points.
Return to Mercedes engines (2021–)
McLaren again used Mercedes engines in after their deal with Renault ended. McLaren had previously collaborated with Mercedes from 1995 through 2014. Daniel Ricciardo moved from Renault to partner Lando Norris for the 2021 Formula One World Championship on a multi-year deal. Ricciardo replaced Carlos Sainz, who moved to Ferrari. In the season's first nine races, the team scored three podiums with Mercedes power, in Italy, Monaco and Austria, all courtesy of Norris.
At the 2021 Italian Grand Prix, Ricciardo scored his first win since the 2018 Monaco Grand Prix, and McLaren's first win since the 2012 Brazilian Grand Prix. A second-place finish for Norris also meant that McLaren achieved their first one-two finish since the 2010 Canadian Grand Prix and the only one-two finish for the 2021 season. Norris secured the team's first pole position in the hybrid era at the 2021 Russian Grand Prix but was unable to convert it to a win, finishing in 7th place due to the sudden drastic change in weather conditions and team strategy in the last two laps of the race. A subsequent drop in form in the latter part of the season saw McLaren ending up in fourth the constructors' championship behind Scuderia Ferrari.
Racing history: other series
Can-Am
McLaren's first sports-racing car was the Group 7 M1 – with a small-block Chevrolet engine in a modified Elva chassis. The car was raced in North America and Europe in 1963 and 1964 in various G7 and United States Road Racing Championship events. For the Can-Am Series, which started in 1966, McLaren created the M3 which Bruce and Chris Amon drove – customer cars also appeared in several races in the 1966 season. With the M3, they led two races but scored no wins, and the inaugural title was taken by John Surtees in a Lola T70. The following year, Robin Herd purpose-designed the Chevrolet V8-powered M6A, delays with the Formula One programme allowing the team to spend extra resources on developing the Can-Am car which was the first to be painted in McLaren orange. With Denny Hulme now partnering Bruce, they won five of six races and Bruce won the championship, setting the pattern for the next four years. In the 1968 season, they used a new car, the M8, to win four races; non-works McLarens took the other two, but this time Hulme was victorious overall. In the 1969 season, McLaren domination became total as they won all 11 races with the M8B; Hulme won five, and Bruce won six and the Drivers' Championship. From 1969 onwards, McLaren M12 – the customer "variant" of the M8 – was driven by several entrants, including a version modified by Jim Hall of Chaparral fame. McLaren's success in Can-Am brought with it financial rewards, both prize money and money from selling cars to other teams, that helped to support the team and fund the nascent and relatively poor-paying Formula One programme.
When Bruce was killed testing the 1970 season's M8D, he was at first replaced by Dan Gurney, then later by Peter Gethin. They won two and one races, respectively, while Hulme won six on the way to the championship. Private teams competing in the 1970 Can-Am series included older M3Bs as well as the M12 – the customer version of the team's M8B. In the 1971 season, the team held off the challenge of 1969 world champion Jackie Stewart in the Lola T260, winning eight races, with Peter Revson taking the title. Hulme also won three Can-Am races in the 1972 season, but the McLaren M20 was defeated by the Porsche 917/10s of Mark Donohue and George Follmer. Faced by the greater resources of Porsche, McLaren decided to abandon Can-Am at the end of 1972 and focus solely on open-wheel racing. When the original Can-Am series ceased at the end of the 1974 season, McLaren was by far the most successful constructor with 43 wins.
Indianapolis 500
McLaren first contested the United States Auto Club's (USAC) Indianapolis 500 race in 1970, encouraged by their tyre supplier Goodyear, which wanted to break competitor Firestone's stranglehold on the event. With the M15 car, Bruce, Chris Amon, and Denny Hulme entered, but after Amon withdrew and Hulme was severely burned on the hands in an incident in practice, Peter Revson and Carl Williams took their places in the race to retire and finish seventh, respectively. The team also contested some of the more prestigious races in the USAC championship that year, as they would do in subsequent years. For 1971 they had a new car, the M16, which driver Mark Donohue said: "...obsoleted every other car on track..." At that year's Indianapolis 500, Revson qualified on pole and finished second, whilst in 1972, Donohue won in privateer Team Penske's M16B. The 1973 event had Johnny Rutherford join the team; he qualified on pole, but finished ninth, Revson crashed out. McLaren won their first Indianapolis 500 in 1974 with Rutherford. The McLaren and Rutherford combination was second in 1975 and won again in 1976. Developments of the M16 had been used throughout this period until the new M24 car was introduced in 1977. The team did not reproduce their recent success at Indianapolis in 1977, 1978, or 1979, and although they continued to win other USAC races, by the end of 1979, they decided to end their involvement.
On 12 April 2017, McLaren revealed they would participate in the 2017 Indianapolis 500 with their current Formula 1 driver Fernando Alonso at the wheel of a Honda-powered McLaren-branded Andretti Autosport IndyCar.
In qualifying, Alonso secured a second-row start from fifth. During the race Alonso led 27 laps in his first Indy 500 start. With 21 laps remaining Alonso was running seventh when his Honda engine failed. He was classified 24th. After his retirement he received a standing ovation from the grandstands. Alonso was praised for his strong debut.
On 10 November 2018, McLaren announced that they would participate in the 2019 Indianapolis 500 with Fernando Alonso and using Chevrolet engines. However, after mechanical difficulties and a severe crash in practice, the team failed to qualify for the race (as did two other Carlin-associated entries, one with another former F1 driver (Max Chilton) driving).
IndyCar
In August 2019, it was announced McLaren would contest the championship full-time in 2020, collaborating with Arrow Schmidt Peterson Motorsports to form Arrow McLaren SP.
Zak Brown stated in an interview with Leigh Diffey that McLaren joining the IndyCar Series full time was spurred by two different objectives. The first was to market the McLaren brand and some of the McLaren Formula One team's prominent American based sponsors in a primarily North America centric racing series, as Formula One only had three races in North America in 2021 and only one of those races was in the United States. The second was to branch McLaren's engineering expertise into a racing series that the other Formula One teams were not involved in, as Brown thought McLaren would stand out more amongst its competitors in IndyCar than it would in other racing series. Brown also stated that McLaren chose to partner with Schmidt Peterson Motorsports because their previous efforts fielding their team with assistance from Andretti Autosport and Carlin exclusively for the Indianapolis 500 had not been successful and that the purchase of the IndyCar Series by Penske Entertainment gave McLaren more confidence in the long term viability and stability of the series compared to the previous ownership under Tony George.
In August 2021, it was announced that McLaren Racing will acquire a majority stake in the IndyCar Team. The transaction will close by the end of the year and will see McLaren Racing take a 75% share of the team. Financial terms of the deal are not being disclosed.
Other series
In December 2020, Zak Brown announced his interest in entering the McLaren name into the Formula E championship once the company's contract as battery supplier expired. In January the following year, McLaren signed an option to enter the championship for 2022.
In June 2021, McLaren Racing announced that it will enter a team into the Extreme E series in 2022. The team will be operated by McLaren Racing using existing personnel from outside the Formula One program. Tanner Foust and Emma Gilmour have been confirmed as the drivers for the team.
McLaren is also reviewing the LMDh regulations for a possible entry into the FIA World Endurance Championship from 2024.
Customer cars
Besides the cars raced by the works team, a variety of McLaren racing cars have also been used by customer teams. In their formative years, McLaren built Formula Two, hillclimbing, Formula 5000 and sports racing cars that were sold to customers. Lacking the capacity to build the desired numbers, Trojan was subcontracted to construct some of them. In Can-Am, Trojan built customer versions of the M6 and M8 cars and ex-works cars were sold to privateers when new models arrived; half of the field was McLarens at some races. Author Mark Hughes says, "over 220" McLarens were built by Trojan. In USAC competition and Formula One, too, many teams used McLarens during the late 1960s and 1970s. A 1972 M8F was rebuilt as the C8 for use in Group C racing in 1982, but had little success.
In the mid-1990s, McLaren Racing's sister company, McLaren Cars (now McLaren Automotive) built a racing version of their F1 road car, the F1 GTR which won the 1995 24 Hours of Le Mans and the 1995 and 1996 BPR Global GT Series. More recently, a GT3 version of their new MP4-12C road car was announced, and will be entered by CRS Racing in the FIA GT3 European Championship. The MP4-12C was succeeded by the McLaren 650S and then the McLaren 720S for GT3 racing.
Characteristics
McLaren Racing is a wholly owned subsidiary of the McLaren Group, which currently includes only two other subsidiaries - McLaren Automotive and McLaren Applied - having centralised many branches of the company since 2010. As of 2021, the group has over 4000 employees, having had only around 1300 in 2009.
Ownership and management
After Bruce McLaren died in a testing accident in 1970, Teddy Mayer took over the team. In 1981, McLaren merged with Ron Dennis' Project Four Racing; Dennis took over as team principal and shortly after organised a buyout of the original McLaren shareholders to take full control of the team. Dennis offered Mansour Ojjeh the chance to purchase 50% of the team in 1983, with McLaren becoming a joint venture with Ojjeh's TAG Group. In 2000, after supplying engines to the team through its Mercedes subsidiary for 5 years, Daimler AG exercised an option to buy 40% of the TAG McLaren Group. Dennis and Ojjeh each retained a 30% share, and each sold half of their stake to the Mumtalakat Holding Company (the sovereign wealth fund of the Kingdom of Bahrain) in 2007. Although Daimler were reportedly considering acquiring the remaining 60% from Dennis and Ojjeh, they instead bought Brawn GP (renaming it Mercedes GP) in November 2009; their McLaren shares were sold back to Mumtalakat, Dennis, and Ojjeh in 2010.
Dennis stepped down as both CEO and team principal of McLaren in 2009, handing both roles over to Martin Whitmarsh. However, following the uncompetitive 2013 season, Dennis retook the role in January 2014; Whitmarsh formally left the team later that year. Dennis sought to take a controlling interest in the company, but his relationship with Ojjeh had deteriorated, perhaps as early as 2013. In 2016, Dennis was forced out of his role as CEO by Ojjeh;. he sold his remaining shares in the company the next year. , Mumtalakat owns 56.3% of McLaren Group, TAG Automotive Ltd. owned 14.3%, Michael Latifi's Nidala (BVI) Ltd. owned 10 %, and minor shareholders held the rest.
After Dennis' 2014 return, he had abolished the position of team principal at McLaren, saying it was an 'outdated' position. Éric Boullier was instead named racing director in January 2014, becoming responsible for the F1 team. After Dennis' exit, Zak Brown was chosen for the post of executive director, with the post of CEO being left vacant. The increasing awareness of the mediocrity of the car prompted a reshuffle in 2018: Brown was promoted to CEO in April, and when Boullier resigned in July, his position was divided between Gil de Ferran as sporting director and Andrea Stella as performance director. In May 2019 Andreas Seidl was appointed as a new team principal.
Since 2004 the team has been based at the McLaren Technology Centre in Woking, England. Facilities there include a wind tunnel and a driving simulator which is said to be the most sophisticated in the sport. The team has also created the McLaren Young Driver Programme, which currently has one driver signed to it.
Politics
McLaren has had an uneasy relationship with Formula One's governing body, the FIA, and its predecessor FISA, as well as with the commercial rights holders of the sport. McLaren was involved, along with the other teams of the Formula One Constructors Association (FOCA), in a dispute with FISA and Alfa Romeo, Renault, and Ferrari over control of the sport in the early 1980s. During this dispute, known as the FISA-FOCA war, a breakaway series was threatened, FISA refused to sanction one race, and FOCA boycotted another. It was eventually resolved by a revenue-sharing deal called the Concorde Agreement.
Subsequent Concorde Agreements were signed in 1987 and 1992, but in 1996, McLaren was again one of the teams which disputed the terms of a new agreement, this time with former FOCA president Bernie Ecclestone's Formula One Promotions and Administration organisation; a new 10-year agreement was eventually signed in 1998. Similar arguments restarted in the mid-2000s, with McLaren and their part-owner Mercedes again threatening to start a rival series, before another Concorde Agreement was signed in 2009. In 2007, McLaren were involved in an espionage controversy after their chief designer Mike Coughlan obtained confidential technical information from Ferrari. McLaren was excluded from the Constructors' Championship for one year, and the team was fined US$100 million. Although the terms of the most recent agreements, in 2013 and 2021, have been extensively negotiated on, McLaren have not taken as openly hostile a stance as in the past.
Sponsorship, naming, and livery
McLaren's Formula One team was originally called Bruce McLaren Motor Racing, and for their first season ran white-and-green coloured cars, which came about as a result of a deal with the makers of the film Grand Prix. Between and , the team used an orange design, which was also applied to cars competing in the Indianapolis 500 and Can-Am series, and was used as an interim testing livery in later years.
In , the Royal Automobile Club and the FIA relaxed the rules regarding commercial sponsorship of Formula One cars, and in , the Yardley of London cosmetics company became McLaren's first title sponsor. As a result, the livery was changed to a predominantly white one to reflect the sponsor's colours. This changed in , when Philip Morris joined as title sponsor through their Marlboro cigarette brand, whilst one car continued to run—ostensibly by a separate team—with Yardley livery for the year. Marlboro's red-and-white branding lasted until , during which time the team went by various names incorporating the word "Marlboro", making it the then longest-running Formula One sponsorship (and still the longest title sponsorship, which has since been surpassed by Hugo Boss' sponsorship of the team, which ran from to ).
In , Philip Morris moved its Marlboro sponsorship to Ferrari and was replaced by Reemtsma's West cigarette branding, with the team entering under the name West McLaren Mercedes. As a result, McLaren adopted a silver and black livery. By mid-2005, a European Union directive banned tobacco advertising in sport, which forced McLaren to end its association with West. In , the team competed without a title sponsor, entering under the name Team McLaren Mercedes. McLaren altered their livery to introduce red into the design, and changed the silver to chrome.
In , McLaren signed a seven-year contract with telecommunications company Vodafone, and became known as Vodafone McLaren Mercedes. The arrangement was due to last until , although the team announced at the 2013 Australian Grand Prix that their partnership would conclude at the end of the season. Despite explaining the decision to conclude the sponsorship as being a result of Vodafone's desire to reconsider its commercial opportunities, it was later reported that the decision to run the 2012 Bahrain Grand Prix despite an ongoing civil uprising and protests against the race, and Vodafone's inability to remove their logos from the McLaren cars during the race as being a key factor in the decision to terminate the sponsorship. Diageo-owned whisky brand Johnnie Walker, an associate sponsor since 2005, offered to take over as title sponsor at the end of 2013, but their offer of £43m was turned down by McLaren chairman Ron Dennis, who believed it to be "too small."
At the end of 2015, it was announced that McLaren was due to lose sponsor TAG Heuer to Red Bull Racing. McLaren chief Ron Dennis later admitted to falling out with TAG Heuer CEO Jean-Claude Biver. In 2015 McLaren was without a title sponsor, and set to lose a further £20m in sponsorship in 2016. Between 2015 and 2017 the team competed as McLaren Honda due to their partnership with that engine manufacturer. The team has competed as McLaren since 2018.
In , British American Tobacco agreed a "global partnership" with McLaren under its A Better Tomorrow campaign, relating to electronic cigarettes and related alternative smoking products; due to the tobacco association, the agreement has enticed a similar controversy to the Mission Winnow branding used by Scuderia Ferrari. In July 2020, McLaren announced a multi-year strategic partnership with Gulf Oil International.
McLaren's cars were originally named with the letter M followed by a number, sometimes also followed by a letter denoting the model. After the 1981 merger with Project Four, the cars were called "MP4/x", or since 2001 "MP4-x", where x is the generation of the chassis (e.g. MP4/1, MP4-22). "MP4" stood initially for "Marlboro Project 4", so that the full title of the cars (McLaren MP4/x) reflected not only the historical name of the team, but also the names of the team's major sponsor and its new component part. Since the change of title sponsor in 1997, "MP4" was said to stand for "McLaren Project 4". From 2017, following Ron Dennis' departure from the team, the naming scheme of the cars changed to "MCL" followed by a number. Since 2017, McLaren have increasingly adopted orange colours, designed to recall Bruce McLaren's liveries.
On 11 February 2022, McLaren released the new virtual McLaren MCL36 race car inside of the online game platform Roblox. The car can be driven in certain Roblox experiences, such as Driving Simulator, Jailbreak, and Ultimate Driving.
Racing results
Formula One results
Constructors' Championships winning percentage:
Drivers' Championships winning percentage:
Winning percentage:
Drivers' champions
Seven drivers have won a total of twelve Drivers' Championships with McLaren:
Emerson Fittipaldi ()
James Hunt ()
Niki Lauda ()
Alain Prost (, , )
Ayrton Senna (, , )
Mika Häkkinen (, )
Lewis Hamilton ()
American open-wheel racing results
(key)
In conjunction with Andretti Autosport.
In conjunction with Arrow Schmidt Peterson Motorsports.
American open-wheel racing wins
References
Footnotes
Citations
Bibliography
All Formula One World Championship results are taken from Formula1.com. Formula One Administration.
External links
British auto racing teams
British racecar constructors
McLaren Group
Companies based in Surrey
British companies established in 1963
1963 establishments in England
Can-Am entrants
Champ Car teams
IndyCar Series teams
Formula One entrants
Formula Two entrants |
21075973 | https://en.wikipedia.org/wiki/Scoop%20%28TV%20series%29 | Scoop (TV series) | Scoop is a children's TV series first broadcast by the BBC on the CBBC channel from January 2009 to August 2011 and is written by Julian Dutton, Tom Jamieson and Nev Fountain, Martin Hughes & Rory Clark.
The show stars Shaun Williamson as Digby Digworth, an ambitious but inept journalist for a fictional local newspaper, The Pilbury Post. Each episode centres on Digby's failure to get a scoop, ending up causing mayhem and disaster instead. In each of these he is accompanied by Hacker, a dog. The show also stars Mark Benton as the newspaper's short-tempered editor, Max de Lacey and there are guest appearances by popular British TV actors such as Lesley Joseph and Mina Anwar who plays Selena Sharp, reporter for a rival paper. In one episode the famous children's writer J. K. Rowling is parodied as a novelist character called T. K. Towling, while in another Jeremy Clarkson (ex Top Gear presenter) is satirised with the character Clark Jameson.
The episodes are 28 minutes in length and were originally stripped (broadcast every day) across weekdays on BBC One at 3.25 pm between 5 January and 23 January.
Hacker T. Dog, a Border Terrier puppet character, made his first appearance on this show. He was later used as a "presenter" on the CBBC TV channel. Hacker has appeared presenting the CBBC channel since 23 May 2009 with Iain Stirling, a comedian from Edinburgh. In series one of Scoop he was operated by Andy Heath but when he began presenting CBBC he was operated by Phil Fletcher. He has been puppeteered since presenting CBBC by Phil Fletcher.
A second season began airing in September 2010 and a third began airing a new episode every day from 25 July.
Plot
Each episode begins in much the same way with a short sequence in which Digby is awoken by an elaborate alarm system, then tries in vain to prevent the paperboy throwing his newspaper into a puddle. Similarly the episodes all end in the same way with a short sequence in which the editor inspects a newspaper front page expecting to see a great story, but is instead frustrated when it shows instead a picture depicting the results of Digby's clumsiness and mistakes, at which point the character played by Mark Benton shouts "DIGBY DIGWORTH!".
In every series 1 episode, Digby and Hacker have to turn to the mysterious Sid the Source when in trouble, who considers covering his face from the public. Hacker often mistakes Sid the Source as a sauce topping, so every time Digby said "Every reporter needs a source.", Hacker holds up a different type of sauce each episode.
Cast
Shaun Williamson as Digby Digworth
Andy Heath as Hacker (series 1)
Phil Fletcher as Hacker (series 2)
Mark Benton as Max de Lacey
Sam Stockman as Simon
Mina Anwar as Selina Sharp
Simon Ludders as Sid the Scource (series 1)
Miles Barrow as Newspaper Boy (series 1)
Iain Stirling as Newspaper Deliverer (series 2)
Episodes
Season 1 (2009)
1. No Newt Is Good Newt - Written by Julian Dutton
Digby joins a world-famous explorer in his quest to locate a rare blue spotted newt. Hacker is more interested in tracking the legendary Bigfoot, but regrets his decision when the creature mistakes him for its offspring.
Guest Stars: Mina Anwar as Selina Sharp
2. Out of This World - Written by Martin Hughes
Digby hopes to take the ultimate shot of extraterrestrial life when he hears about a space-themed photography competition. Hacker agrees to be launched into orbit after learning the first prize is a year's supply of pizza, and his rocket-propelled mission attracts the attention of a like-minded alien. However Pizza Man who runs the shop and competition gets Digby disqualified from the competition by destroying Digby's
camera in a blender.
3. Monk-y Business - Written by Julian Dutton
Local reporter Digby Digworth discovers an ancient map after being given a seemingly hopeless story to cover at Pilbury monastery.
4. Cat-astrophe - Written by Rory Clark
Digby is sent to interview a leading model, but his dog Hacker is not happy when it turns out to be a cat. Unfortunately, they get the blame after the feline celebrity escapes, leading them to take drastic measures to get it back.
5. Fight Night - Written by Martin Hughes
Wrestling fever hits town as US legend "The Ballista" prepares for a one-off bout in Pilbury.
6. Hair Brained Scheme - Written by Tom Jamieson and Nev Fountain
An action movie star is in town promoting his new film, and Digby Digworth becomes convinced he is bald. The reporter sets out to take an incriminating photo of the actor, but he must avoid the clutches of a hotel's ferocious manager.
Guest Star: Lesley Joseph as Mrs Green
7. Don't Read All About It - Written by Julian Dutton
Famous children's author T.K. Towling comes to town to promote the latest book in her popular 'Billy Watson' series and both Digby and rival journalist Selena Sharp compete to be the first to interview her. Unfortunately Hacker destroys the only copy of the new book and Digby has to think fast to replace it.
Guest Stars: Mina Anwar as Selina Sharp
8. Gran Day Out - Written by Tom Jamieson and Nev Fountain
Reporter Digby Digworth is on the case of a sweet-toothed crime gang called the Battenburglars, who replace the valuables they steal with cakes. Meanwhile, Hacker grows suspicious when the investigative duo are sent to interview an elderly granny in Pilbury's tea shop.
9. Magnetic Attraction - Written by Martin Hughes
Digby is sent to investigate a new police robot.
Guest Stars: Julian Dutton as Inspector Wainwright
10. Stop Gear - Written by Tom Jamieson and Nev Fountain
Reporter Digby Digworth is sent to get a shot of the world's largest biscuit.
11. Keep Young and Beautiful - Written by Rory Clark
Digby Digworth and Hacker are sent to investigate a local cosmetics laboratory where an inventor has created a revolutionary anti-ageing cream, but interfere in the product's mixing process - with disastrous consequences.
12. Environ-Mental - Written by Rory Clark
The Pilbury Post embarks on an environmentally friendly campaign, and Digby Digworth's efforts to reduce greenhouse gases are thwarted by attempts to break a world record.
13. Bloomin' Marvellous - Written by Tom Jamieson and Nev Fountain
Digby goes head to head with his arch-rival Selena Sharp to photograph the world's rarest plant. The species only flowers once every 100 years, so Digby has to capture the moment before it is too late. (Last in the series).
Guest Stars: Mina Anwar as Selina Sharp
Season 2 (2010)
1. Trying My Patients - Written by Julian Dutton
After an accident in Max's office, Digby ends up in hospital with a broken arm - but even that does not stop him from chasing a story about the captain of Pilbury United "Pedro Ramirez" who is also staying in the same hospital. But little does Digby know, that Pedro is directly opposite him in the same ward.
Guest Stars: Stewart Scudmore as Dr Carlton and Barbara Durkin as the Nurse.
2. Curses Foiled Again - Written by Tom Jamieson and Nev Fountain
Digby wants to report on a cursed Egyptian statue at the local museum and pitches the idea to Max. Max is reluctant to send Digby there at first, but when Digby mentions curses, Max changes his mind immediately. Once there Dr Sandybottom - an ancient Egyptologist entrusts Digby to guard an ancient artifact "Mukkipup" ( a statue that looks an awful lot like Hacker!) Little does Digby know, that Sandybottom is attempting to steal the artifact, frame Digby for the theft and sell it for millions. Digby panics when he notices "Mukkipup" is missing and gets Hacker to stand in for it, to fool the security guard. All is going to plan for Sandybottom until the mummy's curse sets in.
Guest Stars: Stewart Scudamore as Dr Edward Sandybum and Chizzy Akudolu as Carol the security guard.
3. You Are Feeling Very Sneaky - Written by Tom Jamieson and Nev Fountain
Digby wants to report on the spate of burglaries around Pilbury. But Max has had enough of Hacker's practical jokes so sends them down to pet therapist Darren Hound. A scoop seems off the cards until Digby works out that Darren is hypnotising pets to steal from their owners! Whilst looking for evidence, Digby and Hacker are suspected of being the thieves and go on the run. Can Digby and Hacker catch the real crook without being hypnotised and prove their innocence?
Guest Stars: Paul Hawkyard as Darren Hound.
4. Army Manoeuvres - Written by Ciaran Murtagh and Andrew Jones
Digby is annoyed when the Pilbury Post publish a story stating that he is officially "The worst reporter in the world!", which even Hacker has contributed to. Digby ignores the story and goes to Max's office to see if there are any scoops. Max sends Digby and Hacker to the local army base. Digby finds army life too tough to bear and there's no story in sight, until Hacker overhears Sergeant Bluster plotting to do away with the colonel.
Guest Stars: Stephen Bent as Sergeant Bluster and Tony Aitken as Colonel Winters.
5. Digby and the Viking - Written by Martin Hughes
Max sends Digby and Hacker metal detecting in Viking Woods. Digby thinks he has found a hoard of ancient treasure but has actually unearthed a notorious criminal (The Pilbury Panther)'s buried loot. Hacker has to resort to kung fu to protect his master, but can he combat an ancient Viking ghost?
Guest stars: Paul Hawkyard as The Pilbury Panther, Daniel Richard Wright as PC Taylor and Steve Marsh as DCI Grunt.
6. The Laughing Cavalier - Written by Ciaran Murtagh and Andrew Jones
Max sends Digby to his brother's mansion to report on a friendly ghost called the Laughing Cavalier. Unfortunately, Digby manages to wipe the smile from his face and worse still Hacker destroys it with his Ghoulie Blaster. Digby has to stand in for the ghost, but can he fool world-renowned spooky expert Antonia De Ghoul?
Guest Stars: Nick Wilton as Rex De Lacey, Jess Robinson as Antonia De Ghoul and Paul Hawkyard as The Laughing Cavalier.
7. The Heat Is On - Written by Ciaran Murtagh and Andrew Jones
Pilbury is in the grip of a heatwave and Digby and Hacker are sent to the park to get some summer photos. Digby puts his stomach first and heads for the nearest ice-cream van. But Hacker is suspicious of the mysterious owners (who are charging £25 each for ice-cream and are claiming to be the only ice-cream men in town) and their satellite dish - just what is creating the sizzling weather? Digby and Hacker investigate!
Guest Stars: Daniel Richard Wright as Mr Chillie and Steve Marsh as Mr Burr.
8 Freeze a Jolly Good Caveman - Written by Julian Dutton
Professor Krinkelhoff has discovered a frozen caveman and has transported it to Pilbury Museum. Digby pops in to have a sneaky peek, but Hacker manages to unfreeze the caveman! Chaos ensues as they are called to a local party - with one extra hairy guest!
Guest Stars: Mark Perry as Professor Krinkelhoff, Hugh Clay Jones as the Caveman and Barbara Durkin as Mrs DeLacey.
9. Fangs for the Memory - Written by Rory Clark
Digby and Selina go head-to-head in a retirement home to interview Britain's oldest man. However, finding out the secret to long life becomes complicated when Jack loses his false teeth! It's up to Hacker to retrieve them from the home's sewage system.
Guest Stars: Mina Anwar as Selina Sharp and Tony Aitken as Jack.
10. Double Digby - Written by Julian Dutton
Criminal mastermind Fingers Golightly has to return to a hotel to retrieve a priceless diamond. He disguises himself as Digby to throw the police off the scent - but things get complicated when the real Digby turns up at the hotel for an annual teddy bear convention.
Guest Stars: Mina Anwar as Selina Sharp and Daniel Tatarsky as Inspector Mortlake.
11. Down in the Mouth - Written by Ciaran Murtagh and Andrew Jones
Captain Croc's new sweetie, Grinballs, is proving irresistible to the people of Pilbury. Digby is no exception and soon ends up in the dentist's chair under the watchful eye of Dr McCavity. But Hacker unearths a massive scoop when he discovers there is more to the mysterious dentist than meets the eye.
Guest Stars: James Hurn as Dr McCavity and Lesley Joseph as the Dentist Receptionist.
12. Back Tu-dor Future - Written by Tom Jamieson and Nev Fountain
Digby takes a comfort break in a builder's portaloo just as it is delivered to a historical re-enactment society. He exits and is convinced he has time travelled to King Henry VIII's royal court. Digby is determined to stop Henry executing Anne Boleyn but things don't go according to plan as his own head ends up on the chopping block - with Hacker as the executioner!
Guest Stars: Stephen Bent as Henry VIII, Stephen Bent as the PC, Nicola Bryant as Anne Boleyn and Nicola Bryant as the PC's wife
13. Court in the Act - Written by Julian Dutton
Digby thinks he has been summoned to court to pay a parking fine but it turns out that he is being charged with 892 offences against the people of Pilbury. His only is hope is calling on his main character witness Hacker T Dog.
Guest Stars: Mina Anwar as Selina Sharp and Tony Aitken as the judge.
Season 3 (2011)
1. The Big Cat - Written by Mark Brotherhood
Digby takes Hacker to Sykes' farm to find out why no egg deliveries were made and learns that the hens are scared to lay as a giant wild cat is prowling the area. Digby builds a trap to catch the beast only to discover that it is a tiny but extremely vicious kitten. But even somebody as stupid as Digby Digworth could not fail to outwit a kitten?
2. Restaurant Reservation - Written by Martin Hughes
Sent to deliver the paper to chef Lester Lukenal at the Skinny Mallard restaurant Digby is mistaken for the food critic judging Lester's Pudding of the Year entry - which of course he destroys. Whilst Digby diverts Lester by ordering a meal Hacker attempts a repair job but when the real critic arrives she gets a surprise when the pudding is unveiled.
Guest stars: Gavin Mitchell as Lester.
3. Going For Gold - Written by Alexandra Owen
Digby vows to save the Pilbury scout hut from being demolished to make way for a Hippo hypermarket, in the process hoping to gain his gold award badge at last. After he and Hacker have staged a sit-down protest Selina turns up, expecting Digby's ineptitude to provide her with a scoop of her own. When Digby decides to pull the hut to safety, Selina is not disappointed.
4. Seeing Stars - Written by Martin Hughes
Max sends Digby and Hacker to accompany his precocious niece Belinda who has won a contest to meet Geordie pop star Leonie Hart. However Digby falls foul of Leonie's manager and his efforts to smuggle Belinda into the studio end up by incapacitating Leonie. When the two girls finally meet it is not a happy encounter - and Hacker is there to capture it on camera.
5. Foul Play - Written by Keith Cotton
As a lifelong supporter of Pilbury United Digby defies Max and goes to the press conference for the team's hot new signing, striker Carl Plummer - and overhears Carl planning to steal the transfer money. Digby gets Hacker to swap the money into another bag whilst he creates a diversion on the pitch. His skills are dazzling - sadly his plan is anything but.
6. Come in Digby, Your Time's Up - Written by Tom Jamieson and Nev Fountain
When Max's eccentric aunt Annie specifically asks that Digby writes an article on her antique shop, (the oldest shop in Pilbury),it is inevitable that his clumsiness will result in all the antiques being smashed. However, this is just what Annie wants, so that she can close the shop and open a cats' home . However, no one has told Digby, who tries to hide in a grandfather clock, only to find it has been delivered to Max's office. '
Guest Stars: Louise Gold as Annie Haven.
7. Always the Bridesmaid - Written by Ciaran Murtagh and Andrew Jones
Digby is sent to cover a society wedding, where, prior to the ceremony, he starts eating the cake and spatters the bridal gown with icing. Though he and Hacker do their best to fix things, Hacker's swallowing the wedding ring and Digby's plan to put everything right so that the guests will never notice lead to a registry riot.
8. Taking Pictures - Written by Julian Dutton
Digby and Hacker become security guards at Pilbury art gallery to lay a trap for the thief stealing portraits of local worthies, including Hacker's painting of Max. Overhearing the gallery owner making a sale of two cars over the phone Digby assumes she is the thief and tells the head of security - which is not a good idea as he is the actual burglar.
9. First Past the Post - Written by Sarah Morgan
Max is furious when he finds out that Digby and Hacker skive off work to go to a football match and so decides to give them a punishment.
Digby is worried that he'll get the sack and wonders if it would be better to resign rather than let Max sack him. Digby and Hacker write a rude letter to Max, telling him what they really think. Digby tells Hacker to post it to Max's office but then changes his mind the next morning. Can Digby and Hacker stop the letter from reaching Max's office?
10. Northenders - Written by Rory Clark
Whilst visiting the studios where the top soap 'NorthEnders' is recorded Digby causes chaos on the set but Hacker wins a role in the soap, becoming so popular that a jealous co-star sabotages his big scene, getting him the sack. To save his friend's job Digby breaks into the studio office to find his contract but only succeeds in wiping clean a week's episodes from the computer.
11. Digby's Dilemma - Written by Dominic McDonald
When he's looking for love, Max sends Digby and Hacker to check out the Warm Hugs Dating Agency, run by gold-digging Veronica Potts. Wrongly believing Digby to be wealthy, Miss Potts comes on to him but throws him out after he has given her a supposedly valuable necklace. Digby's efforts to retrieve the necklace result in the destruction of the agency's computer and Max ending up with a very unlikely date.
12. Now That's Magic - Written by Rob Gibbons and Neil Gibbons
When Digby pitches to Max a story about the local fun run, Max misunderstands and thinks that Digby wants to run the race for the Pilbury Post. When Digby tries to explain, Max won't listen and then when Hacker accidentally manages to handcuff them both together by a failed magic trick, the situation gets a whole lot worse!
13. The Digworth Method - Written by Ciaran Murtagh and Andrew Jones
When asked to organise a presentation to the local college, Digby faces his long-time reporting rival, Selina Sharp. Will he fall for her tricks once again?Guest Stars': Mina Anwar as Selina Sharp
References
External links
Scoop at the Internet Movie Database
Episode Guide at Onthebox.com
Article on the show's Special Effects at Smoothdevil.com
2009 British television series debuts
2000s British children's television series
2010s British children's television series
BBC high definition shows
BBC children's television shows
British television shows featuring puppetry
Children's television sitcoms
2000s British teen sitcoms
English-language television shows
2010s British teen sitcoms |
63617842 | https://en.wikipedia.org/wiki/Pan-European%20Privacy-Preserving%20Proximity%20Tracing | Pan-European Privacy-Preserving Proximity Tracing | Pan-European Privacy-Preserving Proximity Tracing (PEPP-PT/PEPP) is a full-stack open protocol designed to facilitate digital contact tracing of infected participants. The protocol was developed in the context of the ongoing COVID-19 pandemic. The protocol, like the competing Decentralized Privacy-Preserving Proximity Tracing (DP-3T) protocol, makes use of Bluetooth LE to discover and locally log clients near a user. However, unlike DP-3T, it uses a centralized reporting server to process contact logs and individually notify clients of potential contact with an infected patient. It has been argued that this approaches compromises privacy, but has the benefit of human-in-the-loop checks and health authority verification. While users are not expected to register with their real name, the back-end server processes pseudonymous personal data that would eventually be capable of being reidentified. It has also been put forward that the distinction between centralized/decentralized systems is mostly technical and PEPP-PT is equally able to preserve privacy.
Technical specification
The protocol can be divided into two broad responsibilities: local device encounters and logging, and transmission of contact logs to a central health authority. These two areas will be referred to as the encounter handshake and infection reporting respectively. Additionally authentication, notification, and other minor responsibilities of the protocol are defined.
Authentication
Authentication during registration is required to prevent malicious actors from creating a multiple false user accounts, using them to interfere with the system. In order to preserve the anonymity of the users, traditional authentication models using static identifiers such as email addresses or phone numbers could not be employed. Rather, the protocol uses a combination of a proof-of-work challenge and CAPTCHA. The suggested proof-of-work algorithm is scrypt as defined in RFC7914, popularized in various blockchain systems such as Dogecoin and Litecoin. Scrypt was chosen because it is memory bound rather than CPU bound. Once a user registers with the app, they are issued a unique 128 bit pseudo-random identifier (PUID) by the server. It will be marked inactive until the app solves the PoW challenge with the input parameters of , a cost factor of 2, and a block size of 8. Once completed, OAuth2 credentials are issued to the client to authenticate all future requests.
Encounter handshake
When two clients encounter each other, they must exchange and log identifying details. In order to prevent the tracking of clients over time through the use of static identifiers, clients exchange time sensitive temporary IDs issued by the central server. In order to generate these temporary IDs, the central server generates a global secret key , which is used to calculate all temporary IDs for a short timeframe . From this an Ephemeral Bluetooth ID (EBID) is calculated for each user with the algorithm where is the AES encryption algorithm. These EBIDs are used by the clients as the temporary IDs in the exchange. EBIDs are fetched in forward dated batches to account for poor internet access.
Clients then constantly broadcast their EBID under the PEPP-PT Bluetooth service identifier, while also scanning for other clients. If another client is found, the two exchange and log EBIDs, along with metadata about the encounter such as the signal strength and a timestamp.
Infection reporting
When a user, out of band, has been confirmed positive for infection the patient is asked to upload their contact logs to the central reporting server. If the user consents, the health authority issues a key authorizing the upload. The user then transmits the contact log over HTTPS to the reporting server to be processed.
Once the reporting server has received a contact log, each entry is run through a proximity check algorithm to reduce the likelihood of false positives. The resulting list of contact is manually confirmed and they, along with a random sample of other users, are sent a message containing a random number and message hash. This message serves to wake up the client and have them check the server for new reports. If the client is on the list of confirmed users, the server will confirm potential infection to the client which will in turn warn the user. If a client is in the random sample, it will receive a response with no meaning. The reason a random sample of users is sent a message for every report is so that eavesdroppers are not able to determine who is at risk for infection by listening to communication between the client and server.
Controversy
The Helmholtz Center for Information Security (CISPA) confirmed in a press release on April 20, 2020 that it was withdrawing from the consortium, citing a 'lack of transparency and clear governance' as well as data protection concerns around the PEPP-PT design. The École Polytechnique Fédérale de Lausanne, ETH Zurich, KU Leuven and the Institute for Scientific Interchange withdrew from the project in the same week. This group was also responsible for the development of the competing Decentralized Privacy-Preserving Proximity Tracing protocol.
On 20 April 2020, an open letter was released signed by over 300 security and privacy academics from 26 countries criticising the approach taken by PEPP-PT, stating that 'solutions which allow reconstructing invasive information about the population should be rejected without further discussion'.
See also
Decentralized Privacy-Preserving Proximity Tracing
BlueTrace
Google / Apple contact tracing project
TCN Protocol
References
External links
PEPP-PT homepage
PEPP-PT GitHub
Software associated with the COVID-19 pandemic
Digital contact tracing protocols
Computer-related introductions in 2020
Software using the MPL license
Digital contact tracing protocols with centralized reporting |
1781443 | https://en.wikipedia.org/wiki/Javelin%20Software | Javelin Software | Javelin Software Corporation (1984–1988) was a company in Cambridge, Massachusetts which developed an innovative modeling and data analysis product, also called Javelin (versions 1.0 in 1984 to 1.1), and later Javelin Plus (versions 1.0 in May 1987 to 3.5 in 1993). Seen as the successor technology to spreadsheet software in reviews of the time, and rival to the then-dominant Lotus 1-2-3, Javelin won numerous industry awards, including besting Microsoft's new Excel for the InfoWorld Software Product of the Year award.
Javelin Software fell on difficult times when their initial public offering had to be cancelled due to it being scheduled for only a few days after the stock market crash of 1987. The company's assets were later purchased by Information Resources, Incorporated (IRI), which sold enhancements to Javelin until 1994 when IRI was itself purchased by Oracle Corporation, who promptly discontinued the product.
Unlike models in a spreadsheet, Javelin models are built on objects called variables, not on data in cells of a report. For example, a time series, or any variable, is an object in itself, not a collection of cells which happen to appear in a row or column. Variables have many attributes, including complete awareness of their connections to all other variables, data references, and text and image notes. Calculations are performed on these objects, as opposed to a range of cells, so adding two time series automatically aligns them in calendar time, or in a user-defined time frame.
Data are independent of worksheets—variables, and therefore data, cannot be destroyed by deleting a row, column or entire worksheet. For instance, January's costs are subtracted from January's revenues, regardless of where or whether either appears in a worksheet. This permits actions later used in pivot tables, except that flexible manipulation of report tables is but one of many capabilities supported by variables. Moreover, if costs are entered by week and revenues by month, Javelin can allocate or interpolate as appropriate. This object design enabled variables and whole models to reference each other with user-defined variable names, and to perform multidimensional analysis and massive, but easily editable consolidations.
Javelin encourages viewing data and algorithms in various self-documenting ways, including simultaneous multiple synchronized views. For example, users can move through the connections between variables on a diagram while seeing the logical roots and branches of each variable. This is an example of what is perhaps its primary contribution—the concept of traceability of a user's logic or model structure through its twelve views. Among its dynamically linked views were: diagram, formulas, table, chart, QuickGraph, worksheet, notes, errors, macro, graph. A complex model can be dissected and understood by others who had no role in its creation, and this remains unique even today.
The second fundamental advance in Javelin's design is extensive built-in time series modeling, including calendar intelligence.
Javelin was used primarily for corporate and governmental financial modeling, but was also used to build instructional models in college chemistry courses, to model the world's economies, and by the military early in the Star Wars project. It is still in use by institutions for which model integrity is mission critical.
Javelin received multiple awards, including: "Best of 1985" for technical excellence from PC Magazine; "Most Significant Product" from PC Week; and "Software Product of the Year".
'The Infoworld award apparently created some consternation in the top ranks of number two Microsoft:'
Javelin was conceived by co-founder Rob Firmin, Chairman and CEO, whose University of Chicago doctorate research and subsequent financial planning work at Prime Computer led him to creation of the concepts. Co-founder Stan Kugell, President, worked with Firmin on the user interface. The Javelin development team was led by Christopher Herot, Vice President of Engineering, and included Charles Frankston, brother of spreadsheet co-inventor Bob Frankston, Arye Gittelman, John R. Levine, Louise Cousins (Pathe), and Peter Pathe.
Some parts of Javelin's approach were later used by other products such as Lotus's Improv. Lotus essentially copied two of Javelin's features (named data arrays and pivot tables) onto a NeXTSTEP-based and later Windows-based GUI to create Improv. Since Improv was not based on 1980s MS-DOS technology, it suffered less memory-based limitations than Javelin, however, Javelin performed well with DOS extended and expanded memory.
While its business failure has been attributed to the infancy of business GUI software at the time, as well as an ill-conceived marketing plan that placed it head to head with the popular spreadsheet 1-2-3,
enterprise-wide financial models converted into Javelin models at times strained the PC resources of the day. Despite this, it remained a standard for financial modeling and econometrics for several years after it was discontinued by Oracle. For example, the World Bank modeled the world's economies in Javelin and distributed them in Javelin format for a number of years.
References
External links
Original advertisement explaining some capabilities
Javelin on the Computer Chronicles public television show at 10:00 minute mark
A detailed review of Javelin's functionality
Comments by a former user on Javelin capabilities
Defunct software companies of the United States
Defunct companies based in Massachusetts
Companies based in Cambridge, Massachusetts
American companies established in 1984
Software companies established in 1984
Software companies disestablished in 1988 |
70131639 | https://en.wikipedia.org/wiki/Soul%20Hackers%202 | Soul Hackers 2 | is an upcoming role-playing video game developed and published by Atlus. It is the sequel to Devil Summoner: Soul Hackers (1997) and the fifth installment of the Devil Summoner series, itself a part of the larger Megami Tensei franchise. It is planned to be released worldwide in August 2022 for Microsoft Windows, PlayStation 4, PlayStation 5, Xbox One and Xbox Series X/S.
Premise
Soul Hackers 2 takes place in the 21st Century and is set during a war between the Yatagarasu and the Phantom Society, two opposing factions of Devil Summoners. The story follows two supernatural "Aion" beings named Ringo and Figue, who descend into the human world from their birthplace in the data stream of information, in order to avert a cataclysmic event that they predict will doom humanity.
Gameplay
Soul Hackers 2 is a turn-based RPG that features a battle system derivative of the Press Turn system featured in the mainline Shin Megami Tensei games. Battles involve a party of four characters and the element affinities present in other Megami Tensei titles. Characters take turns using a combination of physical attacks and magic Skills that summon demons to perform elemental attacks. Should the player manage to successfully exploit an enemy or enemy group's weakness to a particular Skill, they are able to perform a Skill known as "Sabbath", which targets every weakened enemy in battle and deals immense damage involving every active party member. It is conceptually similar to the "All-Out Attack" Skill that appears prominently in the Persona series. Additionally, demon encounters can alternatively be resolved through negotiation, allowing the party to raise said demon's enthusiasm for recruitment into their party. New demons can also be manually summoned by virtue of demon fusion, allowing two or more recruited demons to be fused together to summon a new demon type while carrying over selected or randomized Skills from either respective demon.
Another aspect carried over from the Persona games and Tokyo Mirage Sessions ♯FE (2015) is the implementation of light social simulation elements. Outside of battles, the player controls the main protagonist, Ringo, allowing her to freely roam around the main city setting and visit various landmarks such as shops to purchase and equip new clothing, armor, items and various weapons that can be used in battle. Additionally, the player can also elect to spend time with other party members outside of combat, strengthening their bonds and enabling specific abilities that can thereby be used between party members in combat.
Development
Soul Hackers 2's development team comprises various returning staff members from other Atlus and Megami Tensei titles. A selection of staff involved in the game's development were announced alongside the game's reveal. It is directed and produced by the duo of Mitsuru Hirata, who previously helmed the Atlus RPG Radiant Historia (2010), and Eiji Ishida, who previously directed the original Shin Megami Tensei: Strange Journey (2009) and served as a gameplay designer on Shin Megami Tensei III: Nocturne (2003) and Devil Summoner: Raidou Kuzunoha vs. The Soulless Army (2006). In addition, both previously worked together on Tokyo Mirage Sessions ♯FE. Ishida remarked that prior to the game's announcement, a sequel to the original Devil Summoner: Soul Hackers (1997) was oft-requested by fans, but feared that the game itself was at risk of becoming obscure due to the original game's age, compounded by the time between the game's re-release on Nintendo 3DS in 2012, and the decision made to revive the series. He further expressed concern at the reaction that would be drawn from the game's new aesthetics and mechanical changes to gameplay, stating that he was "nervous about whether people will accept them or not". Hirata observed that the original game had a dedicated fanbase surrounding it, but claimed that there were likewise, a number of players that only knew of the original Soul Hackers in passing and were interested in it. Ishida stated that he had begun planning to develop a sequel to Soul Hackers due to its distinct aesthetic among the other Megami Tensei titles, suggesting that "[I thought] it would be possible to make use of the technology, people, and occult elements of the first game, as well as the relationship between those elements, to create a new game with a modern feel".
The game's music will be composed through an external collaboration with the production team Monaca, which previously supervised the creation of numerous anime and video game soundtracks. Japanese manga artist Shirow Miwa will serve as the game's primary character designer.
Release
Soul Hackers 2 is scheduled to be released worldwide for Microsoft Windows, PlayStation 4, PlayStation 5, Xbox One and Xbox Series X/S in August 2022. It will launch in Japan on August 25, 2022, and overseas the following day in English and Japanese audios with English, French, Italian, German, Spanish, Japanese, Korean, and Chinese (Simplified and Traditional) subtitles. In Japan, the game's release will also be accompanied by a Soul Hackers 25th Anniversary Special Edition Box Set for the PlayStation versions of the game, featuring commemorative packaging, an art book featuring concept illustrations, setting art and various staff interviews, an arrangement album featuring modern compositions of songs from the original Soul Hackers, and a figurine of a Jack Frost variant called Ai-Ho kun, modeled after the game's main protagonist, Ringo. Ai-ho kun will also be available as a summonable demon in the game as downloadable content (DLC), accompanied by another DLC set featuring accessories that customize Ringo to resemble Mary, a supporting character in the original Soul Hackers.
A first-print edition of the game available on launch day will be bundled with DLC costumes modeled after the main cast of Persona 5 (2016), in addition to accompanying music DLC that enables the option to play Persona 5's miniboss theme "Keeper of Lust" as the main battle track.
The game will be published by Atlus themselves in Japan, and its Atlus West subsidary will release the game in North America. Meanwhile, parent company Sega will publish the game for European territories, as has been done with recent Megami Tensei titles.
Notes
References
External links
Upcoming video games scheduled for 2022
Atlus games
Japanese role-playing video games
Megami Tensei spin-off games
PlayStation 4 games
PlayStation 5 games
Role-playing video games
Video games developed in Japan
Video games featuring female protagonists
Video game sequels
Windows games
Xbox One games
Xbox Series X and Series S games |
36389096 | https://en.wikipedia.org/wiki/Ouya | Ouya | The Ouya ( ), stylized as OUYA, is an Android-based microconsole developed by Ouya Inc. Julie Uhrman founded the project in 2012, bringing in designer Yves Béhar to collaborate on its design and Muffi Ghadiali as VP of Product Management to put together the engineering team. Development was funded via Kickstarter, raising 8.5 million, becoming one of the website's highest earning projects in its history.
Units started to ship to Kickstarter backers in March 2013 and were released to the general public in June 2013. It features an exclusive Ouya store for applications and games designed specifically for the Ouya platform, of which the majority are casual games targeted at or used by a mass audience of casual gamers. Out of the box, Ouya supports media apps such as Twitch and the Kodi media center. It runs a modified version of Android Jelly Bean, with rooting being officially encouraged. The console's hardware design allows it to be easily opened up, requiring only a standard screwdriver for easy modding and possible hardware add-ons.
All systems can be used as development kits, allowing any Ouya owner to also be a developer, without the need for licensing fees. All games were initially required to have some kind of free-to-play aspect, whether that be completely free, has a free trial, or has purchasable upgrades, levels, or other in-game items. This requirement was later removed.
Despite the successful Kickstarter campaign, sales were lackluster, causing financial problems for Ouya Inc. and forcing the company to wind down the business. Its software assets were sold to Razer Inc., who announced the discontinuation of the console in July 2015. Razer continued to provide software support for existing Ouya units until June 2019, when it shut down Ouya storefront, services and accounts, making most apps on the console unusable. The Ouya has since been considered a commercial failure.
History
Ouya was announced on July 3, 2012 as a new home video game console, led by Julie Uhrman, the chief executive officer of Santa Monica, California-based Boxer8, Inc. (later rebranded Ouya, Inc. on August 13, 2012). On July 10, Ouya started a campaign to gauge how many people were interested in the project. Boxer8 confirmed having a working prototype with in-progress software and user interface. It features an Nvidia Tegra 3 chip and a price tag of $99 ($95 for 1000 "early birds" backers of the Kickstarter campaign).
The Kickstarter fundraising goal was $950,000, with a month to reach that goal; within 8 hours it surpassed $1 million. Funding continued to increase as more models were made available at various funding levels. According to Kickstarter, in reaching its goal, Ouya holds the record for best first-day performance of any project hosted to date. Within the first 24 hours, the project attracted one backer every 5.59 seconds. Ouya became the eighth project in Kickstarter history to raise more than a million dollars and was the quickest project ever to do so. The Kickstarter campaign finished on August 9 with $8,596,475 at 904% of their goal. This made the Ouya Kickstarter the fifth-highest earning in the website's history at the time.
Ouya units for Kickstarter funders started to ship on March 28, 2013. On June 25, 2013, the Ouya was released to the public for $99.
Ouya announced the "Free the Games Fund" in July 2013 with the goal to support developers making games exclusively for their system with Ouya matching a Kickstarter campaign's pledge dollar-for-dollar if a minimum of $50,000 is raised, but only if the game will be an Ouya exclusive for six months.
In October 2013, Uhrman stated that the company planned on releasing a new iteration of the Ouya console sometime in 2014, with an improved controller, double the storage space, and better Wi-Fi. On November 23, 2013, a limited edition white Ouya with double the storage of the original and a new controller design was available for pre-order at $129.
As of January 1, 2014, the limited edition white Ouya went off sale and cannot be found on the official store, nor from any official resellers. On January 31, 2014, a new black version of the Ouya was released with double storage and new controller design.
In January 2015, Ouya received an investment of US$10 million from Alibaba with the possibility of incorporating some of Ouya technologies into Alibaba's set-top box.
In April 2015, it was revealed that Ouya was trying to sell the company because it failed to renegotiate its debt. On July 27, 2015, it was announced that Razer Inc. had acquired Ouya's employees and content library and that Ouya hardware was now discontinued. The deal does not include Ouya's hardware assets. Owners were encouraged to migrate to Razer's own Forge microconsole; Ouya's content library will be integrated into the Forge ecosystem, and "[the] Ouya brand name will live on as a standalone gaming publisher for Android TV and Android-based TV consoles." On the same day Uhrman stepped down as Ouya's CEO.
The technical team and developer relations personnel behind Ouya joined the software team of Razer, which developed its own game platform called the Forge TV. The Forge TV was discontinued in 2016.
On May 21, 2019, Razer released a statement which announced that online accounts and services would be discontinued on June 25, 2019. According to Razer, most apps will become unusable on the platform, many relying on the user accounts to work. Razer suggests that users may be able to transfer purchases to other storefront platforms like Google Play, if developers and publishers agree to such.
Hardware
The Ouya is a cube designed to be used with a TV as the display via an HDMI connection. It ships with a single wireless controller, but it can also support multiple controllers. Games are available via digital distribution or can be side-loaded.
Specifications
Notes:
Hardware video decode supported by experimental XBMC using libstagefright.
Controller
The Ouya controller is a typical gamepad with dual analog sticks, a directional pad, 4 face buttons (labeled O, U, Y, and A) and pairs of back bumpers and triggers. It also includes a single-touch touchpad in the center of the controller. The Ouya controller also has magnetically attached faceplates which enclose the 2 AA batteries, one on each side of the removable plates.
Alternate controllers may be used with the console (including those from the Xbox 360, PlayStation 3 and Wii) but only for compatible games.
Reception
Pre-release
While initial reception of the Ouya was positive, raising $3.7 million on Kickstarter in the first two days, there were a number of vocal critics who were skeptical of the ability of the fledgling company to deliver a product at all. On July 12, 2012, PC Magazines Sascha Segan ran an op-ed entitled "Why Kickstarter's Ouya Looks Like a Scam" which was critical not only of the Ouya but of all Kickstarter-funded hardware projects. Unreality Magazine defended the Ouya, stating "A scam implies some sort of intentionally illegal deceit. [...] Tapping multiple investors from multiple sources isn't a scam, it's not even illegal, it's business."
Engadget reviewed the Kickstarter pre-release version of the Ouya on April 3, 2013. While praising the low cost and ease of hacking the console, it reported issues with controller buttons becoming stuck beneath the controller plating and the right analog stick snagging on the plating. It also reported a slight lag between the controller and the console and went on to say the controller was "usable, but it's far from great."
The Verge reported similar issues with the controller and questioned its construction quality. While they praised the hacking and openness of the console, calling it "a device with lots of potential and few true limitations", the review was mostly negative and was critical of the interface and game launch choice and stated that "Ouya isn't a viable gaming platform, or a good console, or even a nice TV interface."
Retail reception
Tom's Hardware summarized early media reviews of the Ouya as "lukewarm".
Engadget reviewed the retail version of the Ouya, and noted a largely improved experience as compared to what they found with their pre-release unit. Improvements to the gamepad were "huge", and they found "that the UI has been cleaned up and sped up". Engadget concluded that their "latest experience with the Android-based gaming device [left them] feeling optimistic" and that the company was "taking customer feedback seriously".
Digital Trends called the final retail console "a device with a lot of potential built with love", and called the design a "sleek and cool-looking cube filled with gamingy goodness". The mostly positive review cited a lot of potential for the future, but was tempered by noting deficiencies in performance ("as powerful as many current smartphones"), and pointing out that the Ouya won't be able to compete with the "big three" console makers on performance, but must rely on carving out a niche in the market.
ExtremeTech found that Ouya "has a number of serious faults". They mentioned the sub-par controller, the connectivity issues, and games which worked flawlessly on smartphones but stuttered on the console. Also, they remarked that "there just aren’t enough worthwhile games to play".
Sales
Market analyst NPD Group described Ouya sales in its first month as "relatively light", while several outlets noted low sales of games on the service in initial reports from developers. In April 2014, developer Maddy Thorson stated that their title TowerFall, the Ouya's most popular game at the time, had only sold 7,000 copies for the console. The Ouya in total sold around 200,000 units.
Free the Games Fund
In July 2013, Ouya announced the "Free the Games Fund", a scheme to help fund developers, where Ouya would match any Kickstarter campaign if a minimum target of $50,000 was reached, and provided the game remained Ouya exclusive for six months. Suspicions were raised concerning the first two games to reach the target. Commentators noticed the small number of backers each pledging a high value amount, the large number of those who had never backed a project before, as well as the use of duplicate names and avatars that included those of celebrities. This led some to suggest that the projects were artificially inflating their project's backing in order to receive extra money from Ouya. In addition, one project had a backer whose identity appeared to be taken from that of a missing person's case.
Nevertheless, Ouya rejected any suspicion regarding the backing of the projects, and planned to continue with providing funding. In September 2013, funding for one of the games that had reached its target (Elementary, My Dear Holmes) was later suspended by Kickstarter. The developers of the other funded game, Gridiron Thunder, threatened litigation against a commenter on the Kickstarter page, and further dismissed concerns that they would have no rights to official NFL branding, a license currently held by Electronic Arts. In the same month, another project, Dungeons the Eye of Draconus, caused controversy by openly stating that a relative of one developer had provided substantial additional backing in order to have the project qualify for money from the Free the Games fund. The project was removed by Ouya from the Free the Games fund, resulting in the developers removing the project from Kickstarter.
Many developers criticized the fund's rules. Sophie Houlden removed her game, Rose and Time, from the Ouya marketplace in protest. Matt Gilgenbach, who was trying to finance his game Neverending Nightmares with help from the fund, said, "It would kill me if due to other projects abusing the Free the Games Fund, people lost confidence in our project and what we are trying to do...While I believe in the idea of the Free the Games Fund, I think it definitely could use some reform in light of the potential avenues for abuse." A month later, Sophie revealed that she and several other developers had been in talks with Ouya boss Julie Uhrman, who accepted their criticism, saying: "Developers were telling us over and over, 'You're being too idealistic, and you're being too naive.' That was the part that personally took me a while to understand." Ouya changed the fund rules, including adding a dollar-per-backer limit. Satisfied the matter was resolved, Rose and Time was returned to the Ouya marketplace, and Neverending Nightmares qualified for funding under the new rules.
On September 18, 2013, Ouya modified the exclusivity clause of the fund. Developers would still not be able to release their software on mobile devices, video game consoles, and set-top boxes during the six-month exclusivity period, but they would be allowed to release on other personal computer systems, such as Windows, Mac OS X, and Linux, during that time.
See also
Free-to-play
Homebrew (video games)
Independent video game development
List of Ouya software
OnLive
Open source video game
References
Further reading
External links
(archived)
Android (operating system) devices
ARM-based video game consoles
Kickstarter-funded products
Products introduced in 2013
Microconsoles
Eighth-generation video game consoles
Discontinued products
Razer Inc.
2010s toys |
22948 | https://en.wikipedia.org/wiki/Poseidon | Poseidon | Poseidon (; ) was one of the Twelve Olympians in ancient Greek religion and myth, god of the sea, storms, earthquakes and horses. In pre-Olympian Bronze Age Greece, he was venerated as a chief deity at Pylos and Thebes. He also had the cult title "earth shaker". In the myths of isolated Arcadia he is related with Demeter and Persephone and he was venerated as a horse, however it seems that he was originally a god of the waters. He is often regarded as the tamer or father of horses, and with a strike of his trident, he created springs which are related with the word horse. His Roman equivalent is Neptune.
Poseidon was protector of seafarers, and of many Hellenic cities and colonies. Homer and Hesiod suggest that Poseidon became lord of the sea following the defeat of his father Cronus, when the world was divided by lot among his three sons; Zeus was given the sky, Hades the underworld, and Poseidon the sea, with the Earth and Mount Olympus belonging to all three. In Homer's Iliad, Poseidon supports the Greeks against the Trojans during the Trojan War and in the Odyssey, during the sea-voyage from Troy back home to Ithaca, the Greek hero Odysseus provokes Poseidon's fury by blinding his son, the Cyclops Polyphemus, resulting in Poseidon punishing him with storms, the complete loss of his ship and companions, and a ten-year delay. Poseidon is also the subject of a Homeric hymn. In Plato's Timaeus and Critias, the legendary island of Atlantis was Poseidon's domain.
Athena became the patron goddess of the city of Athens after a competition with Poseidon, and he remained on the Acropolis in the form of his surrogate, Erechtheus. After the fight, Poseidon sent a monstrous flood to the Attic Plain, to punish the Athenians for not choosing him.
Etymology
The earliest attested occurrence of the name, written in Linear B, is Po-se-da-o or Po-se-da-wo-ne, which correspond to (Poseidaōn) and (Poseidawonos) in Mycenean Greek; in Homeric Greek it appears as (Poseidaōn); in Aeolic as (Poteidaōn); and in Doric as (Poteidan), (Poteidaōn), and (Poteidas). The form (Poteidawon) appears in Corinth. A cult title of Poseidon in Linear B is E-ne-si-da-o-ne, "earth-shaker".
The origins of the name "Poseidon" are unclear. One theory breaks it down into an element meaning "husband" or "lord" (Greek (posis), from PIE *pótis) and another element meaning "earth" ( (da), Doric for (gē)), producing something like lord or spouse of Da, i.e. of the earth; this would link him with Demeter, "Earth-mother". Walter Burkert finds that "the second element δᾶ- remains hopelessly ambiguous" and finds a "husband of Earth" reading "quite impossible to prove." According to Robert S. P. Beekes in Etymological Dictionary of Greek, "there is no indication that δᾶ means 'earth'", although the root da appears in the Linear B inscription E-ne-si-da-o-ne, "earth-shaker".
Another, more plausible, theory interprets the second element as related to the (presumed) Doric word *δᾶϝον dâwon, "water", Proto-Indo-European *dah₂- "water" or *dʰenh₂- "to run, flow", Sanskrit दन् dā́-nu- "fluid, drop, dew" and names of rivers such as Danube (< *Danuvius) or Don. This would make *Posei-dawōn into the master of waters. It seems that Poseidon was originally a god of the waters. There is also the possibility that the word has Pre-Greek origin. Plato in his dialogue Cratylus gives two traditional etymologies: either the sea restrained Poseidon when walking as a "foot-bond" (ποσίδεσμον), or he "knew many things" (πολλά εἰδότος or πολλά εἰδῶν).
At least a few sources deem Poseidon as a "prehellenic" (i.e. Pelasgian) word, considering an Indo-European etymology "quite pointless".
Bronze Age Greece
Linear B (Mycenean Greek) inscriptions
If surviving Linear B clay tablets can be trusted, the name po-se-da-wo-ne ("Poseidon") occurs with greater frequency than does di-u-ja ("Zeus"). A feminine variant, po-se-de-ia, is also found, indicating a lost consort goddess, in effect the precursor of Amphitrite. Poseidon carries frequently the title wa-na-ka (wanax), meaning "king" in Linear B inscriptions. The chthonic nature of Poseidon-Wanax is also indicated by his title E-ne-si-da-o-ne in Mycenean Knossos and Pylos, a powerful attribute (earthquakes had accompanied the collapse of the Minoan palace-culture). In the cave of Amnisos (Crete) Enesidaon is related with the cult of Eileithyia, the goddess of childbirth. She was related with the annual birth of the divine child. During the Bronze Age, a goddess of nature, dominated both in Minoan and Mycenean cult, and Wanax (wa-na-ka) was her male companion (paredros) in Mycenean cult. It is possible that Demeter appears as Da-ma-te in a Linear B inscription (PN EN 609), however the interpretation is still under dispute.
In Linear B inscriptions found at Pylos, E-ne-si-da-o-ne is related with Poseidon, and Si-to Po-tini-ja is probably related with Demeter. Tablets from Pylos record sacrificial goods destined for "the Two Queens and Poseidon" ("to the Two Queens and the King": wa-na-soi, wa-na-ka-te). The "Two Queens" may be related with Demeter and Persephone, or their precursors, goddesses who were not associated with Poseidon in later periods.
Arcadian myths
The illuminating exception is the archaic and localised myth of the stallion Poseidon and mare Demeter at Phigalia in isolated and conservative Arcadia, noted by Pausanias (2nd century AD) as having fallen into desuetude; the stallion Poseidon pursues the mare-Demeter, and from the union she bears the horse Arion, and a daughter (Despoina), who obviously had the shape of a mare too. The violated Demeter was Demeter Erinys (furious). In Arcadia, Demeter's mare-form was worshiped into historical times. Her xoanon of Phigaleia shows how the local cult interpreted her, as goddess of nature. A Medusa type with a horse's head with snaky hair, holding a dove and a dolphin, probably representing her power over air and water.
Origins
It seems that the Arcadian myth is related with the first Greek speaking people who entered the region during the Bronze Age. (Linear B represents an archaic Greek dialect). Their religious beliefs were mixed with the beliefs of the indigenous population. It is possible that the Greeks did not bring with them other gods except Zeus, Eos, and the Dioskouroi. The horse (numina) was related with the liquid element, and with the underworld. Poseidon appears as a beast (horse), which is the river spirit of the underworld, as it usually happens in northern-European folklore, and not unusually in Greece. Poseidon "Wanax", is the male companion (paredros) of the goddess of nature. In the relative Minoan myth, Pasiphaë is mating with the white bull, and she bears the hybrid creature Minotaur. The Bull was the old pre-Olympian Poseidon. The goddess of nature and her paredros survived in the Eleusinian cult, where the following words were uttered: "Mighty Potnia bore a strong son".
In the heavily sea-dependent Mycenaean culture, there is not sufficient evidence that Poseidon was connected with the sea. We do not know if "Posedeia" was a sea-goddess. Homer and Hesiod suggest that Poseidon became lord of the sea following the defeat of his father Cronus, when the world was divided by lot among his three sons; Zeus was given the sky, Hades the underworld, and Poseidon the sea, with the Earth and Mount Olympus belonging to all three. Walter Burkert suggests that the Hellene cult worship of Poseidon as a horse god may be connected to the introduction of the horse and war-chariot from Anatolia to Greece around 1600 BC.
There is evidence that Poseidon was once worshipped as a horse, and this is evident by his cult in Peloponnesos. However, some ancient writers held he was originally a god of the waters, and therefore he became the "earth-shaker", because the Greeks believed that the cause of the earthquakes was the erosion of the rocks by the waters, by the rivers who they saw to disappear into the earth and then to burst out again. This is what the natural philosophers Thales, Anaximenes and Aristotle believed, which may have been similar to the folklore belief.
In any case, the early importance of Poseidon can still be glimpsed in Homer's Odyssey, where Poseidon rather than Zeus is the major mover of events. In Homer, Poseidon is the master of the sea.
Worship of Poseidon
Poseidon was a major civic god of several cities: in Athens, he was second only to Athena in importance, while in Corinth and many cities of Magna Graecia he was the chief god of the polis.
In his benign aspect, Poseidon was seen as creating new islands and offering calm seas. When offended or ignored, he supposedly struck the ground with his trident and caused chaotic springs, earthquakes, drownings and shipwrecks. Sailors prayed to Poseidon for a safe voyage, sometimes drowning horses as a sacrifice; in this way, according to a fragmentary papyrus, Alexander the Great paused at the Syrian seashore before the climactic battle of Issus, and resorted to prayers, "invoking Poseidon the sea-god, for whom he ordered a four-horse chariot to be cast into the waves."
According to Pausanias, Poseidon was one of the caretakers of the oracle at Delphi before Olympian Apollo took it over. Apollo and Poseidon worked closely in many realms: in colonization, for example, Delphic Apollo provided the authorization to go out and settle, while Poseidon watched over the colonists on their way, and provided the lustral water for the foundation-sacrifice. Xenophon's Anabasis describes a group of Spartan soldiers in 400–399 BC singing to Poseidon a paean—a kind of hymn normally sung for Apollo. Like Dionysus, who inflamed the maenads, Poseidon also caused certain forms of mental disturbance. A Hippocratic text of ca 400 BC, On the Sacred Disease says that he was blamed for certain types of epilepsy.
Poseidon is still worshipped today in modern Hellenic religion, among other Greek gods. The worship of Greek gods has been recognized by the Greek government since 2017.
Epithets and attributes
Poseidon had a variety of roles, duties and attributes. He is a separate deity from the oldest Greek god of the sea Pontus. In Athens his name is superimposed οn the name of the non-Greek god Erechtheus (Poseidon Erechtheus).
In Iliad he is the lord of the sea and his palace is built in Aegai, in the depth of the sea. His significance is indicated by his titles Eurykreion () "wide-ruling", an epithet also applied to Agamemnon and Helikonios anax (), "lord of Helicon or Helike" In Helike of Achaia he was specially honoured. Anax is identified in Mycenaean Greek (Linear B) as wa-na-ka,a title of Poseidon as king of the underworld. Aeschylus uses also the epithet anax and Pindar the epithet Eurymedon () "widely ruling".
Some of the epithets (or adjectives) applied to him like Enosigaios (), Enosichthon () (Homer) and Ennosidas () (Pindar) , mean "earth shaker". These epithets indicate his chthonic nature, and have an older evidence of use, as it is identified in Linear B, as , E-ne-si-da-o-ne. Other epithets that relate him with the earthquakes are Gaieochos () and Seisichthon ()
The god who causes the earthquakes is also the protector against them, and he had the epithets Themeliouchos () "upholding the foundations" , Asphaleios () "securer, protector" with a temble at Tainaron. Pausanias describes a sanctuary of Poseidon near Sparta beside the shrine of Alcon, where he had the surname Domatites (), "of the house"
Homer uses for Poseidon the title Kyanochaites () , "dark-haired, dark blue of the sea". Epithets like Pelagios () "of the open sea", Aegeus () ,"of the high sea" in the town of Aegae in Euboea, where he had a magnificent temple upon a hill, Pontomedon ()," lord of the sea" (Pindar , Aeschylus) and Kymothales (), "abounding with waves", indicate that Poseidon was regarded as holding sway over the sea. Other epithets that relate him with the sea are , Porthmios (), "of strait, narrow sea" at Karpathos, Epactaeus () "god worshipped on the coast", in Samos., Alidoupos, () "sea resounding". His symbol is the trident and he has the epithet Eutriaina (), "with goodly trident" (Pindar). The god of the sea is also the god of fishing , and tuna was his attribute. At Lampsacus they offered fishes to Poseidon and he had the epithet phytalmios () His epithet Phykios (), "god of seaweeds" at Mykonos, seems to be related with fishing. He had a fest where women were not allowed, with special offers also to Poseidon Temenites () "related to an official domain ". At the same day they made offers to Demeter Chloe therefore Poseidon was the promotor of vegetation. He had the epithet phytalmios () at Myconos, Troizen, Megara and Rhodes, comparable with Ptorthios () at Chalcis.
Poseidon had a close association with horses. He is known under the epithet Hippios () ,"of a horse or horses" usually in Arcadia. He had temples at Lycosura, Mantineia, Methydrium, Pheneos, Pallandion.
At Lycosura he is related with the cult of Despoina. The modern sanctuary near Mantineia was built by Emperor Hadrian. In Athens on the hill of horses there was the altar of Poseidon Hippios and Athena Hippia. The temple of Poseidon was destroyed by Antigonus when he attacked Attica. He is usually the tamer of horses (Damaios , at Corinth), and the tender of horses Hippokourios ) at Sparta, where he had a sanctuary near the sanctuary of Artemis Aiginea. In some myths he is the father of horses, either by spilling his seed upon a rock or by mating with a creature who then gave birth to the first horse. In Thessaly he had the title Petraios , "of the rocks". He hit a rock and the first horse "Skyphios" appeared. He was closely related with the springs, and with the strike of his trident, he created springs. He had the epithets Krenouchos (), "ruling over springs", and nymphagetes () "leader of the nymphs" On the Acropolis of Athens he created the saltspring Sea of Erechtheus (). Many springs like Hippocrene and Aganippe in Helikon are related with the word horse (hippos). (also Glukippe, Hyperippe). He is the father of Pegasus, whose name is deriven from , (pēgē) "spring".
Epithets like Genesios at Lerna Genethlios () "of the race or family" Phratrios () "of the brotherhood", and Patrigenios () indicate his relation with the genealogy trees and the brotherhood. Other epithets of Poseidon in local cults are Epoptes () , "overseer, watcher" at Megalopolis, Empylios (), "at the gate " at Thebes., Kronios () (Pindar) and semnos (), "august, holy" (Sophocles).
The cult of Poseidon is oftenly related with festivals. At Corinth the Isthmian games was an athletic and music festival to honour the god who had the epithet Isthmios (). The Amphictiony of Kalaureia belonged to him. At Tainaron he had a famous temple and festival. Other games which belonged to him are the Pohoidaia () in Helos and Thuria and the race in Gaiaochō () Poseidon Gaieochos () had a temple near Sparta beside an Hippodrome. Τhe epithet probably means " the one who moves under the earth" ' and therefore shakes the earth. This seem to relate Poseidon with the rivers at Peloponnesus that seem to disappear and then flow under the earth. At Ephesus there was a fest "Tavria" and he had the epithet Tavreios (), "related with the bull".
Mythology
Birth
Poseidon was the second son of the Titans Cronus and Rhea. In most accounts he is swallowed by Cronus at birth and is later saved, along with his other siblings, by Zeus.
However, in some versions of the story, he, like his brother Zeus, did not share the fate of his other brother and sisters who were eaten by Cronus. He was saved by his mother Rhea, who concealed him among a flock of lambs and pretended to have given birth to a colt, which she gave to Cronus to devour.
According to John Tzetzes the kourotrophos, or nurse of Poseidon was Arne, who denied knowing where he was, when Cronus came searching; according to Diodorus Siculus Poseidon was raised by the Telchines on Rhodes, just as Zeus was raised by the Korybantes on Crete.
According to a single reference in the Iliad, when the world was divided by lot in three, Zeus received the sky, Hades the underworld and Poseidon the sea.
In Homer's Odyssey, Poseidon has a home in Aegae.
Foundation of Athens
Athena became the patron goddess of the city of Athens after a competition with Poseidon. Yet Poseidon remained a numinous presence on the Acropolis in the form of his surrogate, Erechtheus. At the dissolution festival at the end of the year in the Athenian calendar, the Skira, the priests of Athena and the priest of Poseidon would process under canopies to Eleusis. They agreed that each would give the Athenians one gift and the Athenians would choose whichever gift they preferred. Poseidon struck the ground with his trident and a spring sprang up; the water was salty and not very useful, whereas Athena offered them an olive tree.
The Athenians or their king, Cecrops, accepted the olive tree and along with it Athena as their patron, for the olive tree brought wood, oil and food. After the fight, infuriated at his loss, Poseidon sent a monstrous flood to the Attic Plain, to punish the Athenians for not choosing him. The depression made by Poseidon's trident and filled with salt water was surrounded by the northern hall of the Erechtheum, remaining open to the air. "In cult, Poseidon was identified with Erechtheus," Walter Burkert noted; "the myth turns this into a temporal-causal sequence: in his anger at losing, Poseidon led his son Eumolpus against Athens and killed Erectheus."
The contest of Athena and Poseidon was the subject of the reliefs on the western pediment of the Parthenon, the first sight that greeted the arriving visitor.
This myth is construed by Robert Graves and others as reflecting a clash between the inhabitants during Mycenaean times and newer immigrants. Athens at its height was a significant sea power, at one point defeating the Persian fleet at Salamis Island in a sea battle.
Walls of Troy
Poseidon and Apollo, having offended Zeus by their rebellion in Hera's scheme, were temporarily stripped of their divine authority and sent to serve King Laomedon of Troy. He had them build huge walls around the city and promised to reward them with his immortal horses, a promise he then refused to fulfill. In vengeance, before the Trojan War, Poseidon sent a sea monster to attack Troy. The monster was later killed by Heracles.
Consort, lovers, victims and children
Poseidon was said to have had many lovers of both sexes (see expandable list below). His consort was Amphitrite, a nymph and ancient sea-goddess, daughter of Nereus and Doris. Together they had a son named Triton, a merman.
Poseidon was the father of many heroes. He is thought to have fathered the famed Theseus.
A mortal woman named Tyro was married to Cretheus (with whom she had one son, Aeson), but loved Enipeus, a river god. She pursued Enipeus, who refused her advances. One day, Poseidon, filled with lust for Tyro, disguised himself as Enipeus, and from their union were born the heroes Pelias and Neleus, twin boys. Poseidon also had an affair with Alope, his granddaughter through Cercyon, his son and King of Eleusis, begetting the Attic hero Hippothoon. Cercyon had his daughter buried alive but Poseidon turned her into the spring, Alope, near Eleusis. Poseidon rescued Amymone from a lecherous satyr and then fathered a child, Nauplius, by her.
After having raped Caeneus, Poseidon fulfilled her request and changed her into a male warrior.
A mortal woman named Cleito once lived on an isolated island; Poseidon fell in love with the human mortal and created a dwelling sanctuary at the top of a hill near the middle of the island and surrounded the dwelling with rings of water and land to protect her. She gave birth to five sets of twin boys; the firstborn, Atlas, became the first ruler of Atlantis.
Not all of Poseidon's children were human. In an archaic myth, Poseidon once pursued Demeter. She spurned his advances, turning herself into a mare so that she could hide in a herd of horses; he saw through the deception and became a stallion and captured her. Their child was a horse, Arion, which was capable of human speech. Poseidon also raped Medusa on the floor of a temple to Athena. Medusa was then changed into a monster by Athena. When she was later beheaded by the hero Perseus, Chrysaor and Pegasus emerged from her neck.
His other children include Polyphemus (the Cyclops) and, finally, Alebion and Bergion and Otos and Ephialtae (the giants).
The philosopher Plato was held by his fellow ancient Greeks to have traced his descent to the sea-God Poseidon through his father Ariston and his mythic predecessors the demigod kings Codrus and Melanthus.
Male lovers included Nerites, Pelops and Patroclus.
<div style=display:inline-table>
{| class="wikitable sortable"
|+Offspring and mothers, Table 1
! scope="col" style="width: 230pt;" | Offspring
! scope="col" style="width: 130pt;" | Mother
|-
|Triton, Benthesicyme, Rhodos
|Amphitrite
|-
|Antaeus, Charybdis, Laistryon
|Gaea
|-
|Despoina, Arion
|Demeter
|-
|Rhodos, Herophile
|Aphrodite
|-
|Pegasus, Chrysaor
|Medusa
|-
|Ergiscus
|Aba
|-
|Aethusa, Hyrieus, Hyperenor, Hyperes. Anthas
|Alcyone
|-
|Abas
|Arethusa
|-
|Halirrhothius
|Bathycleia or Euryte
|-
|Chrysomallus
|Bisalpis or Bisaltis or Theophane
|-
|Minyas
|Callirhoe
|-
|Lycus, |Nycteus, |Eurypylus (Eurytus), Lycaon
|Celaeno
|-
|Asopus (possibly)
|Kelousa or Pero
|-
|Parnassus
|Cleodora
|-
|Eumolpus
|Chione
|-
|Phaeax
|Corcyra
|-
|Rhode (possibly), six sons
|Halia
|-
|Eirene
|Melantheia
|-
|Amycus, Mygdon
|Melia
|-
|Aspledon
|Mideia
|-
|Astacus
|Olbia
|-
|Cenchrias, Leches
|Peirene
|-
|Euadne
|Pitane or Lena
|-
|Phocus
|Pronoe
|-
|Athos
|Rhodope
|-
|Cychreus
|Salamis
|-
|Taras
|Satyria of Taras
|-
|Polyphemus
|Thoosa
|-
|Chios
|a nymph of Chios
|-
|Melas, Agelus, Malina
|another nymph of Chios|-
|Dictys, Actor
|Agamede
|-
|Theseus
|Aethra
|-
|Ogyges
|Alistra
|-
|Hippothoon
|Alope
|-
|Erythras
|Amphimedusa
|-
|Nauplius
|Amymone
|-
|Busiris
|Anippe or Lysianassa
|-
|Idas
|Arene
|-
|Aeolus
|Antiope or Arne or Melanippe
|-
|Boeotus
|Melanippe
|-
|Oeoclus
|Ascre
|-
|Ancaeus, Eurypylus
|Astypalaea
|-
|Peratus
|Calchinia
|-
|Cycnus
|Calyce or Harpale or Scamandrodice or a Nereid
|}
</div>
Genealogy
In literature and art
In Greek art, Poseidon rides a chariot that was pulled by a hippocampus or by horses that could ride on the sea. He was associated with dolphins and three-pronged fish spears (tridents). He lived in a palace on the ocean floor, made of coral and gems.
In the Iliad Poseidon favors the Greeks, and on several occasion takes an active part in the battle against the Trojan forces. However, in Book XX he rescues Aeneas after the Trojan prince is laid low by Achilles.
In the Odyssey, Poseidon is notable for his hatred of Odysseus who blinded the god's son, the Cyclops Polyphemus. The enmity of Poseidon prevents Odysseus's return home to Ithaca for many years. Odysseus is even told, notwithstanding his ultimate safe return, that to placate the wrath of Poseidon will require one more voyage on his part.
In the Aeneid, Neptune is still resentful of the wandering Trojans, but is not as vindictive as Juno, and in Book I he rescues the Trojan fleet from the goddess's attempts to wreck it, although his primary motivation for doing this is his annoyance at Juno's having intruded into his domain.
A hymn to Poseidon included among the Homeric Hymns is a brief invocation, a seven-line introduction that addresses the god as both "mover of the earth and barren sea, god of the deep who is also lord of Helicon and wide Aegae, and specifies his twofold nature as an Olympian: "a tamer of horses and a saviour of ships."
In modern culture
Movies and television
Poseidon has been very popular especially in god-related films. John Putch directed the movie The Poseidon Adventure. Wolfgang Petersen also film adapted Paul Gallico's novel and directed the movie Poseidon.
Poseidon appears in Percy Jackson and the Olympians as the father of Percy Jackson and Tyson the Cyclops. He also appears in the ABC television series Once Upon a Time as the guest star of the second half of season four played by Ernie Hudson. In this version, Poseidon is portrayed as the father of the Sea Witch Ursula.
Military
Many military weapons from multiple countries have been named after Poseidon. Such examples are the P8 Poseidon, & the "Poseidon" which is a Russian nuclear-armed unmanned underwater vehicle.
Narrations
Poseidon myths as told by story tellers
Bibliography of reconstruction:
Homer, Odyssey, 11.567 (7th century BC)
Pindar, Olympian Odes, 1 (476 BC)
Euripides, Orestes, 12–16 (408 BC)Bibliotheca Epitome 2: 1–9 (140 BC)
Ovid, Metamorphoses, VI: 213, 458 (AD 8);
Hyginus, Fables, 82: Tantalus; 83: Pelops (1st century AD)
Pausanias, Description of Greece, 2.22.3 (AD 160 – 176)
Bibliography of reconstruction:
Pindar, Olympian Ode, I (476 BC)
Sophocles, (1) Electra, 504 (430 – 415 BC) & (2) Oenomaus, Fr. 433 (408 BC)
Euripides, Orestes, 1024–1062 (408 BC)Bibliotheca Epitome 2, 1–9 (140 BC)
Diodorus Siculus, Histories, 4.73 (1st century BC)
Hyginus, Fables, 84: Oinomaus; Poetic Astronomy, ii (1st century AD)
Pausanias, Description of Greece, 5.1.3 – 7; 5.13.1; 6.21.9; 8.14.10 – 11 (c. AD 160 – 176)
Philostratus the Elder Imagines, I.30: Pelops (AD 170 – 245)
Philostratus the Younger, Imagines, 9: Pelops (c. 200 – 245)
First Vatican Mythographer, 22: Myrtilus; Atreus et Thyestes
Second Vatican Mythographer, 146: Oenomaus
Gallery
Paintings
Statues
See also
Family tree of the Greek gods
Ionian League
Panionium – Ionian festival to Poseidon
Trident of Poseidon
Notes
References
Apollodorus, Apollodorus, The Library, with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes. Cambridge, Massachusetts, Harvard University Press; London, William Heinemann Ltd. 1921. . Online version at the Perseus Digital Library.
Apollonius of Rhodes, Apollonius Rhodius: the Argonautica, translated by Robert Cooper Seaton, W. Heinemann, 1912. Internet Archive.
Burkert, Walter (1983), Homo Necans, University of California Press, Berkeley and Los Angeles. 1983. .
Burkert, Walter (1985), Greek Religion, Wiley-Blackwell 1985. . Internet Archive.
Dietrich, B. C., The Origins of Greek Religion, Bristol Phoenix Press, 2004. .
Diodorus Siculus, Library of History, Volume III: Books 4.59-8, translated by C. H. Oldfather, Loeb Classical Library No. 340. Cambridge, Massachusetts, Harvard University Press, 1939. . Online version at Harvard University Press. Online version by Bill Thayer.
Dionysius of Halicarnassus. Roman Antiquities, Volume I: Books 1-2, translated by Earnest Cary. Loeb Classical Library No. 319. Cambridge, Massachusetts, Harvard University Press, 1937. Online version by Bill Thayer. Online version at Harvard University Press.
Gantz, Timothy, Early Greek Myth: A Guide to Literary and Artistic Sources, Johns Hopkins University Press, 1996, Two volumes: (Vol. 1), (Vol. 2).
Hesiod, Theogony, in The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White, Cambridge, Massachusetts., Harvard University Press; London, William Heinemann Ltd. 1914. Online version at the Perseus Digital Library.
Homer, The Iliad with an English Translation by A.T. Murray, PhD in two volumes. Cambridge, Massachusetts., Harvard University Press; London, William Heinemann, Ltd. 1924. Online version at the Perseus Digital Library.
Homer; The Odyssey with an English Translation by A.T. Murray, PH.D. in two volumes. Cambridge, Massachusetts., Harvard University Press; London, William Heinemann, Ltd. 1919. Online version at the Perseus Digital Library.
Hyginus, Gaius Julius, De Astronomica, in The Myths of Hyginus, edited and translated by Mary A. Grant, Lawrence: University of Kansas Press, 1960. Online version at ToposText.
Hyginus, Gaius Julius, Fabulae, in The Myths of Hyginus, edited and translated by Mary A. Grant, Lawrence: University of Kansas Press, 1960. Online version at ToposText.
Janda, Michael, Eleusis. Das indogermanische Erbe der Mysterien, Innsbruck 2000, pp. 256–258 (Innsbrucker Beiträge zur Sprachwissenschaft, vol. 96)
Ovid, Heroides in Heroides. Amores. Translated by Grant Showerman. Revised by G. P. Goold. Loeb Classical Library No. 41. Cambridge, Massachusetts: Harvard University Press, 1977. . Online version at Harvard University Press.
Ovid, Metamorphoses, Brookes More, Boston, Cornhill Publishing Co. 1922. Online version at the Perseus Digital Library.
Pausanias, Pausanias Description of Greece with an English Translation by W.H.S. Jones, Litt.D., and H.A. Ormerod, M.A., in 4 Volumes. Cambridge, Massachusetts, Harvard University Press; London, William Heinemann Ltd. 1918. Online version at the Perseus Digital Library.
Plato, Cratylus in Plato in Twelve Volumes, Vol. 12 translated by Harold N. Fowler, Cambridge, Massachusetts, Harvard University Press; London, William Heinemann Ltd. 1925. Online version at the Perseus Digital Library.
Plato, Critias in Plato in Twelve Volumes, Vol. 9 translated by W.R.M. Lamb, Cambridge, Massachusetts, Harvard University Press; London, William Heinemann Ltd. 1925. Online version at the Perseus Digital Library.
Smith, William, Dictionary of Greek and Roman Biography and Mythology, London (1873). Online version at the Perseus Digital Library.
Strabo, Geography, Editors, H.C. Hamilton, Esq., W. Falconer, M.A., London. George Bell & Sons. 1903. Online version at the Perseus Digital Library.
Tzetzes, John, Scolia eis Lycophroon, edited by Christian Gottfried Müller, Sumtibus F.C.G. Vogelii, 1811. Internet Archive.
Virgil, Aeneid, Theodore C. Williams. trans. Boston. Houghton Mifflin Co. 1910. Online version at the Perseus Digital Library.
External links
Theoi.com: Poseidon
GML Poseidon
Gods found in Mycenaean Greece; a table drawn up from Michael Ventris and John Chadwick, Documents in Mycenaean Greek'' second edition (Cambridge 1973)
Animal gods
Drought gods
Earth gods
Nature gods
Sea and river gods
Water gods
Deities in the Iliad
Mythological rapists
LGBT themes in Greek mythology
Homosexuality and bisexuality deities
Greek sea gods
Family of Plato |
12314853 | https://en.wikipedia.org/wiki/John%20E.%20Laird | John E. Laird | John E. Laird (born March 16, 1954 in Ann Arbor, Michigan) is a computer scientist who, with Paul Rosenbloom and Allen Newell, created the Soar cognitive architecture at Carnegie Mellon University. Laird is a Professor of the Computer Science and Engineering Division of the Electrical Engineering and Computer Science Department of the University of Michigan.
Education and career
John Laird received a BS in Communication and Computer Science from the University of Michigan in 1975 and a Ph.D. in Computer Science from Carnegie Mellon University in 1983. His Ph.D. thesis advisor was Allen Newell. Laird was a researcher at Xerox PARC in the Intelligent Systems Laboratory from 1984 to 1986; in 1986 he joined the faculty at the University of Michigan.
Laird has continued to do research on architectures of the mind and to develop and evolve the Soar architecture since his time at CMU. He organizes the annual Soar workshop and participates in the international Soar Research Group. In 1998 he co-founded Soar Technology, a company that specializes in creating autonomous AI entities based on Soar; he currently serves on its board of directors. His particular research interests are cognitive architecture, problem solving, learning, reinforcement learning, episodic memory, semantic memory, and emotion-inspired processing. He is a Fellow of ACM, the Association for the Advancement of Artificial Intelligence (AAAI), the Cognitive Science Society, and the American Association for the Advancement of Science (AAAS).
Publications
The Soar Cognitive Architecture, Laird, J. E., 2012, MIT Press.
The Soar Papers: Readings on Integrated Intelligence, Rosenbloom, Laird, and Newell (1993)
Soar: An Architecture for General Intelligence, Artificial Intelligence, 33: 1-64. Laird, Rosenbloom, Newell, John and Paul, Allen (1987)
References
Professional History on University of Michigan Website
Soar Technology
External links
Soar project home page
John E. Laird's Home Page
1954 births
Living people
American computer scientists
Cognitive scientists
University of Michigan faculty
University of Michigan alumni
Carnegie Mellon University alumni
Fellows of the Association for the Advancement of Artificial Intelligence
Fellows of the Cognitive Science Society
Fellows of the Association for Computing Machinery |
18898450 | https://en.wikipedia.org/wiki/Game%20backup%20device | Game backup device | A game backup device, formerly usually called a copier and more recently a flash cartridge, is a device for backing up ROM information from a video game cartridge to a computer file called a ROM image and playing them back on the real hardware. Recently flash cartridges, especially on the Game Boy Advance and Nintendo DS platforms, only support the latter function; they cannot be used for backing up ROM data. Game backup devices also make it possible to develop homebrew software on video game systems. Game backup devices differ from modchips in that modchips are used in conjunction with systems that use generally available media such as CDs and DVDs, whereas game backup devices are used with systems that use cartridges.
Video game companies consider these devices as a tool for reverse engineering to circumvent copying. Most of the devices are made in China, but they are available globally. Recently, action has been taken by companies such as Nintendo to remove these devices from the marketplace, but the easy dissemination of information and selling of products over the Internet has made it difficult to eradicate this problem. Hobbyists argue that these devices are legal and shouldn't be illegal because they fulfill the need to back up bootlegs copy in case the original is illegally sold or lost; and because they permit the private development of new software on the device.
In Japan, these devices are known as , an umbrella term for any device that enables backups on game consoles.
History
The spiritual forefather of copier devices can be traced back to the Famicom Disk System, an official add-on device for the Japanese version of the Nintendo Entertainment System. Users quickly discovered ways to copy these disks with ordinary home computers of the time and transmit the copied data to others using the emerging electronic bulletin board systems. Nintendo attempted to counter the piracy problem by slightly modifying the hardware in newer revisions, but they were unable to stop the unauthorized copying. Later, the Famicom Disk System was discontinued, supposedly because cartridge technology had caught up in capacity, but the influence of rampant piracy cannot be discounted.
When the Super Nintendo Entertainment System was released, Hong Kong based companies were quick to cash in on the same idea. They produced cartridges that fit in the video game console's cartridge slot, but were interfaced with a floppy disk drive through a connecting cable. The copier, as they were called, also had a passthrough slot into which a real game could be inserted. The device, once powered up, could be used to copy the cartridge's ROM data into files on ordinary MS-DOS formatted 3.5" floppy disks and thereafter to play the game from the same disks, without having to rely on the original cartridge being present.
When these devices were introduced to the United States and Europe, video game enthusiasts quickly started swapping the copied games over bulletin board systems. Release groups formed to cater to the need of fresh games, and also to crack the protection that was employed to thwart copying in several games released after copiers became available. Release groups would also add their own intros to games, to advertise their BBSes and new releases, and sometimes include a trainer to optionally start on later stages or with more lives.
The copier devices and dissemination of hardware information through BBSes made it possible to start developing software on the video game consoles. The software evolved from crack intros to demos, and finally to home-made games. The homebrew software development scene is still active on multiple contemporary platforms.
Also the availability of such ROM binary dumps allowed the birth of Video game console emulators.
Legality
Similar to modchips, the legality of these methods is disputed. While they are often advertised for their ability to make legal backups, to be used to play legal homebrew software and are considered a cheap method of development compared to purchasing official development kits, a backup device's potential for software piracy is a major concern to hardware and software manufacturers.
Companies such as Nintendo have fought long legal battles against companies like Bung Enterprises and the makers of the R4DS on the grounds that their products are used primarily for piracy and qualify as theft.
Backup devices for consoles
Super Nintendo Entertainment System
16 bit game backup devices using floppy disks or USB.
Super Magicom (8 or 16 Megabits) - by Front Fareast Industrial, model MS-3201. Included an external 3.5" floppy drive and integrated parallel port. File format is *.SMC; for multi-disk images, *.SMC followed by *.001, *.002, .... The device that started the trend of calling game backup devices magicoms in Japan.
Super Wild Card series - by Front Fareast Industrial. File format extension is *.SMC or *.SWC; for multi-disk images, *.SMC followed by *.001, *.002, .... Available in several variations, all of which include an integrated 3.5" floppy drive for IBM-PC formatted disks, as well as parallel port:
Super Wild Card DX 32 (32 Megabits) (a.k.a. SWC DX/32 or SWC DX32), model number SWC3201DX
Super Wild Card DX2 (32 or 64 Megabits) (a.k.a. SWC DX2), model number SWC3201DX2. Expandable to 96 Megabits and supports alternate media such as a CD-ROM or Zip 100 MB drive via IEEE 1284 interface. This model of unit is known to have several hardware or firmware bugs.
Super UFO series - by UFO Enterprise. Available from 16 to 32 Megabits. Compatible with Pro Fighter and Game Doctor file formats. File format extension is *.1GM, *.2GM, ..., *.8GM.
Game Doctor Series - by Bung Enterprise. Available up to 64 Megabits (and upgradable to 128 Megabits) with optional Digital Signal Processor cartridge to run games like Pilot Wings, Super Mario Kart and many others. File format extension is *.078.
Multi Game Hunter (MGH) by Venus Corp. A dual solution game copier for both Sega Genesis and SNES.
Double Pro Fighter by China Coach Limited is a dual solution game copier for both Sega Genesis and SNES.
Retrode by Retrode UG is a USB interface for both Sega Genesis and SNES cartridges and controllers. It can be extended via so-called plug-in adapters to accommodate games for other systems as well.
It is important to note that no commercially produced Backup Device for Super NES can play back games which use additional processing hardware in the cartridge, with the sole exception of DSP-1. This is due in part to the way in which these processors operate. It may be possible with some copiers to manage to back up a game using an extra coprocessor chip though. A relatively small number of games fall into this category, but there are notable games included, for example Mega Man X2, Mega Man X3, Star Fox, Kirby's Dream Land 3, Super Mario RPG, and Super Mario World 2: Yoshi's Island.
Nintendo 64
There are two devices for the Nintendo 64 that plug into the extension port on the bottom of the system, initially intended for the 64DD: the Doctor V64 and the CD64. In addition to playing backups from a CD, they can both be used to create them by copying the information from a cartridge that is plugged into the Nintendo 64. They store the ROM image in internal memory and can be transferred to a computer via a parallel port for distribution elsewhere. The Z64 uses the cartridge slot on the top of the N64 and has a cartridge slot itself for booting backups as well as making backups. It reads from and stores backups on zip diskettes. The NEO N64 Myth Cart was released in December 2009, long after the Nintendo 64 had been discontinued, and is marketed for retro gamers. The NEO N64 Myth Cart connects to a PC using USB, and ROM images are stored in flash memory.
Schematics, PCB designs and source code for a cartridge emulator known as "PVBackup" were released by Valery Pudov.
Modern day devices include the Everdrive 64 and the 64drive. The Everdrive loads ROM images from either USB or from SD card inserted into the top of the cartridge. The 64Drive also uses USB but can also load games from either SD card or compact Flash card. Both units require a CIC chip soldering into the board and the plastic casing from a donor cartridge. Neither unit has the ability to backup cartridges. You can however backup cartridges using a device called Retrode, this is USB powered device that installs itself as a mass storage device in windows, allowing the cartridge information to be backed up.
Backup devices for handhelds
Game Boy
For the original Game Boy and its color successor there are numerous external copiers, such as GB Xchanger, which can back up an inserted Game Boy or Game Boy Color cartridge. The GB Xchanger plugs into a computer in order to copy the games, which can later transfer the game(s) back through the copier to a blank flash cartridge.
Game Boy Advance
Early copiers for the Game Boy Advance, Game Boy Advance SP and Game Boy Micro, like the Flash Advance Xtreme are similar to those used for the original Game Boy, as they are external copiers that use parallel ports to communicate with personal computers.
The copiers eventually made use of USB with products like first generation XG-Flash carts, which also used external copiers, but benefited from faster write speeds than its parallel port predecessors. This technology evolved into onboard external copiers like the EZFlash Advance that used the Game Boy Advance itself as a copier. These USB cables would plug into the GBAs proprietary port used for link cables or accessories like the ereader and when booted while holding Start and Select, would connect to a PC. These version are not compatible with the Game Boy Micro because it uses a different port than the GBA and GBA SP.
Nintendo DS and 3DS
There aren't any commercial backup devices for the Nintendo DS and Nintendo 3DS that are widely available, yet many devices exist to play backups on a DS or 3DS. These flashcarts are capable of using specific software to backup both DS and 3DS or Game Boy Advance games. There is the possibility to create backups using a 3DS with custom Firmware (Both from DS and 3DS)
Other handhelds
Bung released a copier for the Neo Geo Pocket and the Neo Geo Pocket Color. It resembled their GB Xchanger and it served the same function.
Team Pokeme and Dark Fader both released homemade game backup devices for the Pokémon Mini. Both devices used USB for communicating with a PC.
A copier for the Japan-only handheld, the Wonderswan, as well as the Wonderswan Color and to a lesser extent, the SwanCrystal, was released called the WonderMagic. It uses a parallel port for communication with a PC.
See also
Modchip
References
External links
www.textfiles.com
www.gamecopywizard.com
Unlicensed Nintendo hardware
Video game storage media
1990s neologisms |
60450794 | https://en.wikipedia.org/wiki/Hippotion%20%28mythology%29 | Hippotion (mythology) | In Greek mythology, Hippotion (Ancient Greek: Ἱπποτίων) may refer to the following individuals:
Hippotion, one of the Centaurs who lived on the Pholoe mountain in Arcadia. Once he smelled the sweet odor of the wine coming from the cave of Pholus, he went there with many other Centaurs, armed with stones and pine trees. As soon as they stormed into the cave, however, they were met by the furious Heracles, who was visiting Pholus at that time. The hero engaged into battle with the Centaurs and driven away a large number of them with burning torches. The other Centaurs who cannot escape, including Hippotion, were all killed by Heracles.
Hippotion, a resident of Ascania in Phrygia and father of the Trojan warrior Morys. When they attacked the Greek fleet, he was killed by Meriones, one of the leaders of the Cretan troops, during the tenth year of the Trojan War.
Notes
References
Diodorus Siculus, The Library of History translated by Charles Henry Oldfather. Twelve volumes. Loeb Classical Library. Cambridge, Massachusetts: Harvard University Press; London: William Heinemann, Ltd. 1989. Vol. 3. Books 4.59–8. Online version at Bill Thayer's Web Site
Diodorus Siculus, Bibliotheca Historica. Vol 1–2. Immanel Bekker. Ludwig Dindorf. Friedrich Vogel. in aedibus B. G. Teubneri. Leipzig. 1888–1890. Greek text available at the Perseus Digital Library.
Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. . Online version at the Perseus Digital Library.
Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. . Greek text available at the Perseus Digital Library.
Achaeans (Homer)
People of the Trojan War
Characters in the Iliad
Centaurs
Characters in Greek mythology
Mythology of Heracles |
32943269 | https://en.wikipedia.org/wiki/The%20Book%20of%20Snobs | The Book of Snobs | The Book of Snobs is a collection of satirical works by William Makepeace Thackeray published in book form in 1848, the same year as his more famous Vanity Fair. The pieces first appeared in fifty-three weekly pieces from February 28, 1846 to February 27, 1847, as "The Snobs of England, by one of themselves", in the satirical magazine Punch. The pieces, which were immensely popular and thrust Thackeray into widespread public view, were "rigorously revised" before their collection in book form and omitted the numbers which dealt with then current political issues (numbers 17–23).
References
External links
The Book of Snobs at the Internet Archive
Novels by William Makepeace Thackeray
1848 British novels
Novels first published in serial form
Victorian novels
Works originally published in Punch (magazine) |
24533658 | https://en.wikipedia.org/wiki/Cram%20%28software%29 | Cram (software) | Cram is an application for Apple's OS X and iOS developed by Patrick Chukwura and Ashli Norton of SimpleLeap Software.
The software is a flashcard application which allows users to prepare for various types of subject matter using flashcards and multiple choice tests. By entering the question and answer of the test in Cram, the application presents the information in test or flashcard format, which then allows the user to study the entered information at any time.
Apart from the core functionality of Cram, other features of the application include the use of images and sound that are integrated on the flashcard and practice tests as they study and test database that allows the user to download and share tests with other users.
Cram also provides functions to study from an iPhone with flashcards and multiple-choice tests.
Cram is available as shareware, which will block itself after creating five tests with five questions each.
See also
List of flashcard software
References
'Cram - Study at the Speed of Light', Softpedia, August 10, 2009
'Enhance your knowledge and improve your studying', Softonic, August 11, 2009
'Cram for tests on your iPhone', CNET, October 3, 2008
'Cram: The Mac Study Assistant', Mac AppStorm, June 8, 2009
MacOS software
IOS software
Spaced repetition software |
7177568 | https://en.wikipedia.org/wiki/Weak%20symbol | Weak symbol | A weak symbol denotes a specially annotated symbol during linking of Executable and Linkable Format (ELF) object files. By default, without any annotation, a symbol in an object file is strong. During linking, a strong symbol can override a weak symbol of the same name. In contrast, in the presence of two strong symbols by the same name, the linker resolves the symbol in favor of the first one found. This behavior allows an executable to override standard library functions, such as malloc(3). When linking a binary executable, a weakly declared symbol does not need a definition. In comparison, (by default) a declared strong symbol without a definition triggers an undefined symbol link error.
Weak symbols are not mentioned by the C or C++ language standards; as such, inserting them into code is not very portable. Even if two platforms support the same or similar syntax for marking symbols as weak, the semantics may differ in subtle points, e.g. whether weak symbols during dynamic linking at runtime lose their semantics or not.
Syntax
The GNU Compiler Collection and the Solaris Studio C compiler share the same syntax for annotating symbols as weak, namely a special #pragma, #pragma weak, and, alternatively, a function and variable attribute, __attribute__((weak)).
Pragma
// function declaration
#pragma weak power2
int power2(int x);
Attribute
// function declaration
int __attribute__((weak)) power2(int x);
// or
int power2(int x) __attribute__((weak));
// variable declaration;
extern int __attribute__((weak)) global_var;
Tools support
The nm command identifies weak symbols in object files, libraries, and executables. On Linux a weak function symbol is marked with "W" if a weak default definition is available, and with "w" if it is not. Weakly defined variable symbols are marked with "V" and "v". On Solaris "nm" prints "WEAK" instead of "GLOB" for a weak symbol.
Examples
The following examples work on Linux and Solaris with GCC and Solaris Studio.
Static example
:
#include <stdio.h>
#include <stdlib.h>
#include "power_slow.h"
int main(int argc, char **argv)
{
fprintf(stderr, "power3() = %d\n", power3(atoi(argv[1])));
return 0;
}
power_slow.h:
#ifndef POWER2_SLOW_H
#define POWER2_SLOW_H
// alternative syntax
// #pragma weak power2
int
__attribute__((weak))
power2(int x)
// alternatively after symbol
// __attribute__((weak))
;
int power3(int x);
#endif
:
#include <stdio.h>
#include "power_slow.h"
int power2(int x)
{
fprintf(stderr, "slow power2()\n");
return x*x;
}
int power3(int x)
{
return power2(x)*x;
}
:
#include <stdio.h>
int power2(int x)
{
fprintf(stderr, "fast power2()\n");
return x*x;
}
Build commands:
cc -g -c -o main.o main.c
cc -g -c -o power_slow.o power_slow.c
cc -g -c -o power.o power.c
cc main.o power_slow.o -o
cc main.o power_slow.o power.o -o fast
Output:
$ ./slow 3
slow power2
power3() = 27
$ ./fast 3
fast power2
power3() = 27
When removing the weak attribute and re-executing the build commands, the last one fails with the following error message (on Linux):
multiple definition of `power2'
The second-last one still succeeds, and ./slow has the same output.
Shared example
Taking main.c from the preceding example and adding:
#ifndef NO_USER_HOOK
void user_hook(void)
{
fprintf(stderr, "main: user_hook()\n");
}
#endif
Replacing power_slow.c with:
#include <stdio.h>
#include "power_slow.h"
void __attribute__((weak)) user_hook(void);
#ifdef ENABLE_DEF
void user_hook(void)
{
fprintf(stderr, "power_slow: user_hook()\n");
}
#endif
int power2(int x)
{
if (user_hook) // only needed ifndef ENABLE_DEF
user_hook();
return x*x;
}
int power3(int x)
{
return power2(x)*x;
}
Build commands:
cc -g -c -o main.o main.c
cc -g -fpic -c -o power_slow.po power_slow.c
cc -shared -fpic -o libpowerslow.so power_slow.po
cc main.o -L`pwd` -Wl,-R`pwd` -lpowerslow -o main
cc -g -DENABLE_DEF -fpic -c -o power_slow.po power_slow.c
cc -shared -fpic -o libpowerslow.so power_slow.po
cc main.o -L`pwd` -Wl,-R`pwd` -lpowerslow -o main2
cc -g -DNO_USER_HOOK -c -o main.o main.c
cc -g -fpic -c -o power_slow.po power_slow.c
cc -shared -fpic -o libpowerslow.so power_slow.po
cc main.o -L`pwd` -Wl,-R`pwd` -lpowerslow -o main3
cc -g -DNO_USER_HOOK -c -o main.o main.c
cc -g -DENABLE_DEF -fpic -c -o power_slow.po power_slow.c
cc -shared -fpic -o libpowerslow.so power_slow.po
cc main.o -L`pwd` -Wl,-R`pwd` -lpowerslow -o main4
Output:
$ ./main 3
main: user_hook()
power3() = 27
$ ./main2 3
main: user_hook()
power3() = 27
$ ./main3 3
power3() = 27
$ ./main4 3
power_slow: user_hook()
power3() = 27
Removing the weak attribute and re-executing the build commands does not yield build errors and leads to the same output (on Linux) for main and main2. The build commands for the main3 lead to following warning and error messages (on Linux):
warning: the address of ‘user_hook’ will always evaluate as ‘true’
libpowerslow.so: undefined reference to `user_hook'
The warning is issued by the compiler because it can statically determine that in if (user_hook) the expression user_hook evaluates always to true, because it contains an ELF jump table entry. The error message is issued by the linker. The build for main4 includes the same warning but no link error.
Use cases
Weak symbols can be used as a mechanism to provide default implementations of functions that can be replaced by more specialized (e.g. optimized) ones at link-time. The default implementation is then declared as weak, and, on certain targets, object files with strongly declared symbols are added to the linker command line.
If a library defines a symbol as weak, a program that links that library is free to provide a strong one for, say, customization purposes.
Another use case for weak symbols is the maintenance of binary backward compatibility.
Limitations
On UNIX System V descendent systems, during program runtime the dynamic linker resolves weak symbols definitions like strong ones. For example, a binary is dynamically linked against libraries libfoo.so and libbar.so. libfoo defines symbol f and declares it as weak. libbar also defines f and declares it as strong. Depending on the library ordering on the link command line (i.e. -lfoo -lbar) the dynamic linker uses the weak f from libfoo.so although a strong version is available at runtime. The GNU ld provides the environment variable LD_DYNAMIC_WEAK to provide weak semantics for the dynamic linker.
When using constructs like
#pragma weak func
void func();
void bar()
{
if (func)
func();
}
, depending on the compiler and used optimization level, the compiler may interpret the conditional as always true (because func can be seen as undefined from a standards point of view). An alternative to the above construct is using a system API to check if func is defined (e.g. dlsym with RTLD_DEFAULT). The above check may also fail for other reasons, e.g. when func contains an elf jump table entry.
Using weak symbols in static libraries has other semantics than in shared ones, i.e. with a static library the symbol lookup stops at the first symbol – even if it is just weak and an object file with a strong symbol is also included in the library archive. On Linux, the linker option --whole-archive changes that behavior.
The weak function attribute is supposed to be used on function declarations. Using it on a function definition may yield unexpected results, depending on the compiler and optimization level.
In Solaris, the weak symbols are also used within kernel. The generic part of kernel (called genunix) specifies weak functions that are overridden in platform specific part of the kernel (called unix) such as Virtual memory routines. The kernel runtime linker sets the addresses of these functions when the kernel is combined in memory during boot. This does not work for kernel loadable modules though - weak symbol in the kernel is not replaced with kernel module symbol when the module is loaded.
Related methods
C preprocessor (CPP) conditional constructs can also be used to switch between different versions of a symbol. The difference from weak symbols is that weak symbols are interpreted by the linker. The CPP is run during the compilation of each translation unit before the C compiler.
The build process (e.g. make) can be implemented in a conditional way such that just different versions of a symbol are created or different (specialized) libraries are used and linked depending on the target.
See also
Dynamic linking
Link editor
Program loader
References
Data types
Debugging |
2920499 | https://en.wikipedia.org/wiki/Abstract%20management | Abstract management | Abstract management is the process of accepting and preparing abstracts for presentation at an academic conference. The process consists of either invited or proffered submissions of the abstract or summary of work. The abstract typically states the hypothesis, tools used in research or investigation, data collected, and a summary or interpretation of the data.
The abstracts usually undergo peer review after which they are accepted or rejected by the conference chair or committee and then allocated to conference sessions. The abstracts may be presented as an oral talk or as an illustrated poster during the event. Abstracts are often published before or after the event as conference proceedings or in academic journals or online. In some cases submission of a full paper may be required before final acceptance is given. In some fields (e.g., computer science), most mainstream conferences and workshops ask for the submission of full papers (rather than just abstracts) and academic program committees peer review the full paper to a standard comparable to journal publication before accepting a paper for presentation at the conference and publishing it in an edited proceedings series.
The abstract management process is closely tied to the need to provide continuing education to professionals, especially continuing medical education. Many annual meetings hosted by specialty societies provide educational credit hours so that attendees may keep current in the field and maintain their professional certifications.
Software
Historically, abstract management was a time-consuming manual process requiring the handling of large amounts of paper and created a considerable administrative workload. An increasing number of organizations now use web-based abstract management software to streamline and automate the process. The work is sometimes outsourced to dedicated conference departments at major publishers and professional conference organisers.
A conference management system is web-based software that supports the organization of conferences especially scientific conferences. It helps the program chair(s), the conference organizers, the authors and the reviewers in their respective activities.
A conference management system can be regarded as a domain-specific content management system. Similar systems are used today by editors of scientific journals such as EDAS.
Functionality
Software functionality is based around typical conference workflows. These vary in detail, but in broad terms they must include a submission phase (usually abstract submission but sometimes full papers), reviewing, decision making by the programme committee, building of the conference programme and publishing of the programme and the abstracts or papers (online, in print or on a CD-ROM or other digital medium).
Abstract submission involves the authors in preparing their abstracts and sending them to the conference organisers through an online form, and is a relatively straightforward process. The abstracts are either uploaded as documents (typically Microsoft Word, PDF or LaTeX) or, where graphics and tables are not required, they may simply be entered into the form as plain text. The software will send out an email acknowledgement. Following the committee's decisions on which abstracts are to be accepted for the conference the submission software may also be used to collect full papers and PowerPoint presentations.
Online reviewing may be more complex as the process is frequently “blinded” or anonymised. Reviewers will have particular interests or specialisations which should be taken into account when assigning abstracts to them, and they may have conflicts of interest. Reviews must be independent, i.e. reviewers should not be able to see other reviews before they have submitted their own. Abstract management software must provide for these options.
The programme committee will require extensive reporting and access to the abstracts and reviews. Software will usually support ranking of reviews and setting an acceptance threshold.
Some software products provide further functionality for the conference organisers. This often includes an email facility to report reviewers' comments and committee decisions to authors, programme building tools and online publishing.
Delegate registration is usually provided separately from abstract management.
References
Academic publishing
Academic conferences
ru:Система управления конференцией |
45423606 | https://en.wikipedia.org/wiki/Meng%20Weng%20Wong | Meng Weng Wong | Wong Meng Weng () is a Singaporean computer entrepreneur notable for proposing a historicist explanation for the relative tendency of individuals in different generations after immigration to become entrepreneurs (the Wong Greed/Fear Hypothesis). In 1994 he founded pobox.com, an email services company. In 2003 he led the group that designed the Sender Policy Framework standard (RFC4408) which was later embraced and extended by Microsoft. In 2005 he co-founded Karmasphere, a reputation services venture. In 2010 he co-founded the Joyful Frog Digital Incubator, an early-stage digital innovation company. In 2018, he co-founded Legalese, a firm seeking to develop standards and tools to automate legal filings.
Antispam work
In 2003, Wong hybridized two earlier proposals for sender authentication, Designated Mailer Protocol (DMP) and Reverse Mail Exchanger (RMX), and devised SPF (Sender Policy Framework, originally Sender Permitted From). In November, he met Mark Lentczner at the Hackers Conference; Lentczner, an experienced protocol and language designer in his own right, became the primary co-author on the draft specification. SPF quickly caught on among the opensource community, receiving mentions on Slashdot, on Dave Farber's influential Interesting-People mailing list, and elsewhere. During 2004 Wong traveled widely, visiting ISPs in North America, Europe, Singapore, and Japan, and speaking at conferences to explain SPF. He was appointed Senior Technical Advisor to the Messaging Anti-Abuse Working Group
. In 2004 Microsoft merged their similar proposal, Caller-ID For Email, with SPF to form Sender ID Framework. In 2005, the Microsoft implementation was rolled out in Hotmail, Exchange, and Outlook. In 2006, RFC4408 was published by the IETF as an Experimental Standard. As of August 2006, between one-third and one-half of legitimate email volume worldwide carries an SPF record.
He is a proponent of the Internet Mail 2000 architecture first popularized by Dan Bernstein; he calls it StubMail. Together with Nathan Cheng, Julian Haight, and Richard Soderberg, he led an initial implementation in 2006 which was presented at Google in July 2006.
Wong subscribes to the accountability framework first devised at the Aspen Institute by Esther Dyson and others. In that framework, authentication and reputation work together to create accountability. SPF, a sender authentication standard, offers the first half.
In 2005, Wong co-founded Karmasphere.com with Martin Hall, the inventor of WinSock. Karmasphere.com aims to offer the second half: reputation. Wong has described Karmasphere as the credit bureau for Internet identities.
Investment and startups
After moving to Singapore, Wong began angel investing in Internet companies. He produced a map of the Singapore Capital Markets for the Media Entrepreneur's Guide to Singapore, the first time all the funding sources for an early-stage venture have been displayed in a single infographic. He also joined the Board of Directors of BANSEA, the local angel investing group.
Published essays
Wong has published a variety of articles related to technology and society, including
To Be In Touch, an academic essay about the modes of presentation of self online and offline
What Segway Bans Have Taught Me About Politics, in the Los Gatos Observer
Why DSL Providers Are Terrible Email Providers, on Dave Farber's Interesting-People mailing list.
Internet Governance: An Antispam Perspective, on Circle-ID.
Advice to a Young Lady, or "Letter to Coco", which was positively reviewed by Alain de Botton.
Biography
Wong was born in Singapore on 19 November 1975, the son of prominent psychiatrist Wong Yip Chong and Patricia Ling Ai Wah. He attended the Anglo Chinese School and Raffles Institution as part of the Gifted Education Programme. From 1997 to 2000 while performing National Service he attended an MBA course at the National University of Singapore.
Wong is a graduate of St. George's School and the University of Pennsylvania. He presently lives in Singapore. In 2011, together with his mother, Wong was unsuccessfully sued by his half-brothers in a dispute concerning inheritance that reached the Singapore High Court.
Conference appearances
He has spoken at the following conferences:
PC Forum 2006
The Hackers Conference 2003–2006
Inbox Event
ISPcon
Japan Antispam Summit 2005, Keynote speaker
IETF 59
National University of Singapore Global Entrepreneurship Summit 2006
MAAWG where he was appointed a Senior Technical Advisor.
TEDxNTU
References
External links
Interview about SPF
Home Page of Meng Weng Wong
LiveJournal
Joyful Frog Digital Incubator
Singapore Law Reports
1975 births
Computer systems researchers
American computer scientists
Singaporean computer scientists
Living people
St. George's School (Vancouver) alumni
University of Pennsylvania alumni |
8341746 | https://en.wikipedia.org/wiki/Applied%20Data%20Research | Applied Data Research | Applied Data Research (ADR) was a large software vendor from the 1960s until the mid-1980s. ADR is often described as "the first independent software vendor".
Founded in 1959, ADR was originally a contract development company. ADR eventually built a series of its own products. ADR's widely used major packages included: Autoflow for automatic flowcharting, Roscoe, MetaCOBOL, an extensible macro processor for the COBOL language, and Librarian for source-code management. ADR later purchased the Datacom/DB database management system from Insyte Datacom and developed the companion product, IDEAL (Interactive Development Environment for an Application’s Life), a fourth-generation programming language.
Another popular ADR product was The Librarian, a version control system for IBM mainframe operating systems, now known as CA Librarian. In 1978, it was reported that The Librarian was in use at over 3,000 sites; by a decade later that number had doubled.
First software patent
ADR received the first patent issued for a computer program, a sorting system, on April 23, 1968. The program was developed by Martin A. Goetz.
ADR IBM lawsuit
ADR instigated litigation in Federal Court against IBM with accusations that IBM was "retarding the growth of the independent software industry" and "monopolizing the software industry", leading to IBM's famous unbundling of software and services in 1969. In 1970, ADR and Programmatics, a wholly owned subsidiary of ADR, received an out-of-court settlement of $1.4 million from IBM. IBM also agreed to serve as a supplier of Autoflow, which meant another potential $600,000 in revenues for ADR.
Dispute with Nixdorf
ADR licensed DATACOM/DB to TCSC, a firm which sold modified versions of IBM's DOS/360 and DOS/VS operating systems, known as Edos. When, in 1980, Nixdorf Computer bought TCSC, Nixdorf sought to continue the licensing arrangement; ADR and NCSC went to court in a dispute over whether the licensing arrangement was terminated by the acquisition. ADR and Nixdorf settled out of court in 1981, with an agreement that Nixdorf could continue to resell ADR's products.
Corporate history
ADR bought Massachusetts Computer Associates, also known as Compass, in the late 1960s. ADR was sold to Ameritech in 1986 and was kept intact as a subsidiary. In 1988 Ameritech sold ADR to Computer Associates (unrelated to Massachusetts Computer Associates; subsequently rename CA Technologies ). Computer Associates integrated the company into its Systems Products Division and new Information Products Division.
Roscoe
Roscoe (Remote OS Conversational Operating Environment, originally marketed as ROSCOE, last marketed as CA-Roscoe) was a software product for IBM Mainframes. It is a text editor and also provides some operating system functionality such as the ability to submit batch jobs similar to ISPF or XEDIT.
Overview
The ability to support 200+ concurrent active users and still have low overhead is based on a Single address space architecture.
RPF
The RPF (Roscoe Programming Facility) is a scripting language with string processing capability.
References
External links
www.softwarehistory.org – Martin A. Goetz, "How ADR Got Into the Software Products Business and Found Itself Competing Against IBM" (1998)
Oral history interview with Martin Goetz, Charles Babbage Institute, University of Minnesota.
Software Memories – Some basic facts about ADR
In new case, Supreme Court revisits the question of software patents (ADR held the first USA software patent)
Defunct software companies of the United States
Software companies established in 1959
Electronics companies established in 1959
CA Technologies
Command shells
Text editors |
34920470 | https://en.wikipedia.org/wiki/United%20States%20v.%20John%20%282010%29 | United States v. John (2010) | In United States v. John, 597 F.3d 263 (2010)
United States Court of Appeals for the Fifth Circuit interpreted the term "exceeds authorized access" in the Computer Fraud and Abuse Act 18 U.S.C. §1030(e)(6) and concluded that access to a computer may be exceeded if the purposes for which access has been given are exceeded.
In particular, the court ruled that an employee would exceed authorized access to a protected computer if he or she used that access to obtain or steal information as part of criminal scheme.
This case addresses the issue of the distinction between authorized access to information and subsequent use of information obtained through an authorized access for the purposes of CFAA.
Background
Dimetriace Eva Lavon John was employed as an account manager at Citigroup for approximately three years. She was authorized to access Citigroup's internal computer system, which contained customer account information, in the course of her official duties.
In September 2005, John provided Leland Riley, her half-brother, with customer account information pertaining to at least seventy-six corporate customer accounts of Citigroup customers. She collected the information from the internal computer system of Citigroup and provided it to Riley in the form of either scanned images of checks written by the account holders or printouts of computer screens, which contained detailed account information.
Riley and his co-conspirators used customer account information provided by John to incur fraudulent charges on four different customer accounts. The total amount of actually incurred fraudulent charges was $78,750.
John was found guilty by the United States District Court for the Northern District of Texas of:
conspiracy to commit access device fraud in violation of 18 U.S.C. § 371;
fraud in connection with an access device and aiding and abetting in violation of 18 U.S.C. §§ 1029 (a)(5) and (2);
exceeding authorized access to a protected computer in violation of 18 U.S.C. §§ 1030(a)(2)(A) and (C).
John appealed the indictment to the Fifth Circuit. She argued that she was authorized to use Citigroup's internal computer system as an employee. John contended that Computer Fraud and Abuse Act does not prohibit unlawful use of material that she was allowed to access through authorized use of a computer.
Fifth Circuit Opinion
Exceeding authorized access to a protected computer
This case centers around the issue of whether an employee who was authorized to access an employer's internal computer system for the purposes of performance of her job duties should be charged for unlawful use of the information that she was authorized to access in violation of 18 U.S.C. § 1030(e)(6).
As the Fifth Circuit analyzed the case, the crucial issue was whether "authorized access" or "authorization" may encompass limits placed on the use of information obtained by permitted access to a computer system and data available on that system.
§ 1030(e)(6) defines the term "exceeds authorized access" as an access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.
John contended that she was authorized to use Citigroup internal computer system and that she was permitted to view and print information regarding Citibank customers' accounts in course of her official duties. She argued that CFAA prohibits only using authorized access to obtain the information that she was not entitled to obtain, but does not impose liability for the unlawful use of the information that she was authorized to access.
There are two contrary interpretations of the term "exceeding authorized access" by the courts.
In determining what constitutes exceeding authorized access in LVRC Holdings v. Brekka, the Ninth Circuit concluded that a person who is authorized to use a computer does not exceed authorization simply by acting contrary to the computer owner's interest, but only by obtaining or altering information in the computer that she is not entitled to obtain or alter.
LVRC Holdings LLC filed a lawsuit against its former employee, Christopher Brekka, who accessed the company computer, obtained LVRC's confidential information and emailed it to himself and his wife to further his personal interest and to compete with his employer once he left the company.
The Ninth Circuit ruled that Brekka's use of LVRC's computers to email documents to his own personal computer did not exceed authorized access and violate § 1030(a)(2) or § 1030(a)(4), because Brekka was authorized to access the LVRC computers during his employment with LVRC. The Ninth Circuit stated that an employee can violate the employer-placed limits on accessing the information stored on the computer and still have authorization to access the computer. Similarly, a person who is authorized to use a computer does not exceed authorization simply by acting contrary to the computer owner's interest, but only by obtaining or altering information in the computer that she is not entitled to obtain or alter.,.
In EF Cultural Travel BV. v. Explorica, Inc. the First Circuit construed the term "exceeds authorized access" in a different way, interpreting "exceeding authorized access as exceeding the purposes for which such access was given." The court held that the former employees exceeded authorization of EF computer system in violation of § 1030(a)(4), because they breached the confidentiality agreement with the former employer and used proprietary information and know-how that they obtained while employed by EF to create a computer program allowing them to compete with the former employer.,
Fifth Circuit reasoning
Recognizing both the concept that the access to the computer is governed by the scope of the employment agreement and a concept that the employee is still considered to have an authorization to use a computer, even if he or she used a computer or information on it in a ways contrary to employer's limitations, the Firth Circuit agreed with the former interpretation elaborated on it.
The Fifth Circuit confirmed that access to a computer and data that can be obtained from that access may be exceeded if the purposes for which access has been given are exceeded. The court further stated that an express restriction on access to a computer is in fact binding at least if the wrongdoer accesses the computer in furtherance of a criminal act.
The court found that though John was authorized to view and print all of the information that she accessed, her use of Citigroup's computer system to run in fraudulent charges was not an intended use of that system.
John's access to the Citigroup computer system was confined and she was aware of the Citigroup employee company's policies, establishing restrictions on the use of the Citigroup computer system.
Despite being aware of these policies, prohibiting misuse of the company's computer system, John accessed account information for the customers whose accounts she did not manage, removed this highly sensitive information from the Citigroup premises, and used this information to perpetrate a fraud on Citigroup and its customers.
The Fifth Circuit concluded that John exceeded authorized access to a protected computer within the meaning of CFAA. The court's reasoning was that John knew that the purpose for which she was accessing the information in a Citigroup computer system both violated the employer's internal policies and was a part of an illegal scheme.
Holding
The court affirmed John's convictions, but vacated her sentence on the ground that her sentence has been imposed without accompanying district court justification and district court's consideration of the correct sentencing range. The Fifth Circuit remanded the case for further proceedings.
See also
Computer Fraud and Abuse Act
LVRC Holdings v. Brekka
EF Cultural Travel BV v. Explorica, Inc., 274 F.3d 577 (2001)
United States v. Nosal
Computer Crime Law, 2d, St. Orin S. Kerr, Paul, MN : Thomson West, 2009.
Software and Internet Law, Mark A. Lemley, Peter S. Menell, Robert P. Merges, Pamela Samuelson, and Brian W. Carver, Edition: 4th Edition 2011, Publisher: Wolters Kluwer.
Orin Kerr "Should Faking a Name on Facebook Be a Felony?," Op-Ed., Wall Street Journal, Sept. 14, 2011.
References
United States Court of Appeals for the Fifth Circuit cases
United States computer case law
2010 in United States case law
Citigroup |
64647989 | https://en.wikipedia.org/wiki/Binary%20Ninja | Binary Ninja | Binary Ninja is a reverse-engineering platform developed by Vector 35 Inc. It can disassemble a binary and display the disassembly in linear or graph views. It performs automated in-depth analysis of the code, generating information that helps to analyze a binary. It lifts the instructions into intermediate languages, and eventually generates the decompiled code.
Binary Ninja supports various CPU architectures and binary executable formats. It runs on Windows, macOS, and Linux. It also has a free-to-use cloud version.
History
Binary Ninja was originally an internal tool for a CTF team. The developers later decided to form Vector 35 Inc and develop Binary Ninja into a commercial product. The development started in 2015 and the first public version was released in July 2016.
The commercial product does not share code with the internal tool. The latter one is now open-sourced under GPLv2.
Features and usage
User interface
Binary Ninja's UI is built using Qt. Its main UI comprises a symbol list, a cross-reference window, a linear/graph view of the disassembly, a mini-graph, as well as a feature map. It can also show a hex editor, strings listing, and a triage view.
Binary Ninja generates extensive annotations in the UI to assist binary analysis.
Binary Ninja also supports user-defined themes.
API and plugins
Binary Ninja offers an API that can be accessed via Python or C. The API is open-sourced under MIT License. It can interact with most of the Binary Ninja's functionality, e.g., user interface, analysis, IL (see below), etc. It can be used to add support for new architecture or automate tasks.
Plugins can be made via the API to enhance Binary Ninja. Vector35 maintains a collection of official plugins, while the community has created numerous community plugins.
Some notable plugins are the debugger, the signature kit, etc.
Binary Ninja intermediate languages (BNIL)
Binary Ninja offers three intermediate languages (ILs).
The low-lowel IL (LLIL) is a verbose lifting of the underlying instructions from various architectures to a unified representation.
The medium-level IL (MLIL) creates variables with types and removes the notion of the stack.
The high-level IL (HLIL, also called decompiler) offers a representation of the code that is similar to C source code.
Core analysis
Binary Ninja automatically performs various analysis on the binary. Some examples are:
function detection
cross-references for code and data
type inference
constant propagation
value-set analysis
jump table resolution
Binary editing and patching, shellcode compiler (SCC)
Binary Ninja offers a convenient way to edit and patch a binary. It can assemble an instruction at the current line, flip a conditional jump, etc. Edits and updated analysis are immediately reflected in the UI.
Besides, Binary Ninja can be used as a general binary editor. It supports several commonly-used transformations and encryption algorithms.
The shellcode compiler allows the user to compile and insert code via C syntax.
Supported architectures and executable file formats
Architectures
Binary Ninja supports the following CPU architectures officially:
x86 32-bit
x86 64-bit
ARMv7
Thumb2
ARMv8
PowerPC
MIPS
6502
The support for these architectures vary and details can be found in the official FAQ.
Besides, the community also made several architecture plugins that support various other architectures.
Executable file formats
Binary Ninja supports the following executable file formats officially:
PE/COFF
ELF
Mach-O
.NES binary (via a plugin)
Raw binary
See also
Ghidra
JEB
Radare2
Interactive Disassembler
Decompiler
Disassembler
References
Disassemblers |
27225837 | https://en.wikipedia.org/wiki/Peneleos | Peneleos | In Greek mythology, Peneleos ( Pēneléōs) or, less commonly, Peneleus ( Pēnéleos), son of Hippalcimus (Hippalmus) and Asterope, was an Achaean soldier in the Trojan War.
Mythology
Before the war began he was said to have sailed with the Argonauts; he also was one of the suitors of Helen, which obliged him to join in the campaign against Troy. He came from Boeotia and commanded 12 ships. It is also said that Peneleos was chosen to command the Boeotian troops because Tisamenus, son and successor of Thersander, was still too young.
Peneleos killed two Trojans, Ilioneus and Lycon, was wounded by Polydamas and was killed by Eurypylus (son of Telephus). He left a son Opheltes, whose own son (Peneleos' grandson) Damasichthon succeeded Autesion, son of Tisamenus, as the ruler over Thebes.
His descendant, Philotas of Thebes, was said to be the founder of Priene in Ionia.
Notes
References
Apollodorus, The Library with an English Translation by Sir James George Frazer, F.B.A., F.R.S. in 2 Volumes, Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1921. ISBN 0-674-99135-4. Online version at the Perseus Digital Library. Greek text available from the same website.
Dictys Cretensis, from The Trojan War. The Chronicles of Dictys of Crete and Dares the Phrygian translated by Richard McIlwaine Frazer, Jr. (1931-). Indiana University Press. 1966. Online version at the Topos Text Project.
Diodorus Siculus, The Library of History translated by Charles Henry Oldfather. Twelve volumes. Loeb Classical Library. Cambridge, Massachusetts: Harvard University Press; London: William Heinemann, Ltd. 1989. Vol. 3. Books 4.59–8. Online version at Bill Thayer's Web Site
Diodorus Siculus, Bibliotheca Historica. Vol 1-2. Immanel Bekker. Ludwig Dindorf. Friedrich Vogel. in aedibus B. G. Teubneri. Leipzig. 1888–1890. Greek text available at the Perseus Digital Library.
Gaius Julius Hyginus, Fabulae from The Myths of Hyginus translated and edited by Mary Grant. University of Kansas Publications in Humanistic Studies. Online version at the Topos Text Project.
Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. . Online version at the Perseus Digital Library.
Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. . Greek text available at the Perseus Digital Library.
Pausanias, Description of Greece with an English Translation by W.H.S. Jones, Litt.D., and H.A. Ormerod, M.A., in 4 Volumes. Cambridge, MA, Harvard University Press; London, William Heinemann Ltd. 1918. . Online version at the Perseus Digital Library
Pausanias, Graeciae Descriptio. 3 vols. Leipzig, Teubner. 1903. Greek text available at the Perseus Digital Library.
Tzetzes, John, Allegories of the Iliad translated by Goldwyn, Adam J. and Kokkini, Dimitra. Dumbarton Oaks Medieval Library, Harvard University Press, 2015.
Argonauts
Achaean Leaders
Boeotian characters in Greek mythology
Characters in Greek mythology |
67607893 | https://en.wikipedia.org/wiki/2021%20Troy%20Trojans%20football%20team | 2021 Troy Trojans football team | The 2021 Troy Trojans football team represented Troy University in the 2021 NCAA Division I FBS football season. The Trojans played their home games at Veterans Memorial Stadium in Troy, Alabama, and competed in the East Division of the Sun Belt Conference.
Prior to the season, Luke Meadows took over as the team's offensive coordinator after the departure of Ryan Pugh.
Previous season
The Trojans finished the 2020 season with a 5–6 record (3–4 in conference), good enough for last in the Sun Belt East Division. The Trojans were not invited to any postseason competition.
Preseason
Recruiting class
|}
Source:
Award watch lists
Listed in the order that they were released
Preseason
Sources:
Sun Belt coaches poll
The Sun Belt coaches poll was released on July 20, 2021. The Trojans were picked to finish fifth in the East Division.
Sun Belt Preseason All-Conference teams
Offense
1st team
Austin Stidham – Offensive Lineman, JR
2nd team
Dylan Bradshaw – Offensive Lineman, SR
Defense
1st team
Will Choloh – Defensive Lineman, JR
Carlton Martial – Linebacker, JR
Personnel
Schedule
The 2021 schedule consists of 6 home and 6 away games in the regular season. The Trojans will travel to Sun Belt foes Louisiana–Monroe, Texas State, Coastal Carolina, and Georgia State. Troy will play host to Sun Belt foes Georgia Southern, South Alabama, Louisiana, and Appalachian State.
Troy will host two of the four non-conference opponents at Veterans Memorial Stadium, Southern, from NCAA Division I FCS Southwestern Athletic Conference and Liberty, a FBS Independent, and will travel to Southern Miss of the Conference USA and South Carolina of the Southeastern Conference.
Game summaries
Southern
Liberty
at Southern Miss
at Louisiana–Monroe
at South Carolina
Georgia Southern
at Texas State
Coastal Carolina
South Alabama
Louisiana
Appalachian State
at Georgia State
References
Troy
Troy Trojans football seasons
Troy Trojans football |
546219 | https://en.wikipedia.org/wiki/Kiten%20%28program%29 | Kiten (program) | Kiten is a Japanese Kanji learning tool and reference for the KDE Software Compilation, specifically, in the kdeedu package. It also works as a Japanese-to-English and English-to-Japanese dictionary. The user can input words into a search box, and all related Kanji are returned with their meaning and part of speech. Kanji can be filtered by rarity and part of speech. A list of Kanji is also available which sorts characters by grade level and stroke number. Selecting one shows its Onyomi, Kunyomi, and meanings. Users can also add Kanji to their "learn list" and get simple flashcard quizzes where the Kanji is displayed along with possible meanings to choose from.
The program was available only for Linux operating systems, but with the beta release of KDE for Windows, it is now available on Microsoft Windows.
See also
Gjiten, a similar Gnome application
External links
References
Dictionary software that uses Qt
Free educational software
Japanese dictionaries
Japanese language learning resources
KDE Education Project
KDE software
KDE Software Compilation
Software that uses Qt |
26027549 | https://en.wikipedia.org/wiki/MS%20Antivirus%20%28malware%29 | MS Antivirus (malware) | MS Antivirus (also known as Spyware Protect 2009 and Antivirus XP 2008/Antivirus2009/SecurityTool/etc) is a scareware rogue anti-virus which purports to remove virus infections found on a computer running Microsoft Windows. It attempts to scam the user into purchasing a "full version" of the software. The company and the individuals behind Bakasoftware operated under other different 'company' names, including Innovagest2000, Innovative Marketing Ukraine, Pandora Software, LocusSoftware, etc.
Names
Many clones of MS Antivirus that include slight variations have been distributed throughout the web. They are known as XP Antivirus, Vitae Antivirus, Windows Antivirus, Win Antivirus, Antivirus Action, Antivirus Pro 2009, 2010, 2017 or simply just Antivirus Pro, Antivirus 2007, 2008, 2009, 2010, 2011, and 360, AntiMalware GO, Internet Antivirus Plus, System Antivirus, Spyware Guard 2008 and 2009, Spyware Protect 2009, Winweb Security 2008, Antivirus 10, Total Antivirus 2020, Live Protection Suite, System Security, Malware Defender 2009, Ultimate Antivirus2008, Vista Antivirus, General Antivirus, AntiSpywareMaster, Antispyware 2008, XP AntiSpyware 2008, 2009 and 2010, Antivirus Vista 2010, Real Antivirus, WinPCDefender, Antivirus XP Pro, Anti-Virus-1, Antivirus Soft, Vista Antispyware 2012, Antispyware Soft, Antivirus System PRO, Antivirus Live, Vista Anti Malware 2010, Internet Security 2010, XP Antivirus Pro, Security Tool, VSCAN7, Total Security, PC Defender Plus, Disk Antivirus Professional, AVASoft Professional Antivirus, System Care Antivirus, and System Doctor 2014. Another MS Antivirus clone is named ANG Antivirus. This name is used to confuse the user of the software into thinking that it is the legitimate AVG Antivirus before downloading it.
Symptoms of infection
Each variant has its own way of downloading and installing itself onto a computer. MS Antivirus is made to look functional to fool a computer user into thinking that it is a real anti-virus system in order to convince the user to "purchase" it. In a typical installation, MS Antivirus runs a scan on the computer and gives a false spyware report claiming that the computer is infected with spyware. Once the scan is completed, a warning message appears that lists the spyware ‘found’ and the user either has to click on a link or a button to remove it. Regardless of which button is clicked -- "Next" or "Cancel"—a download box will still pop up. This deceptive tactic is an attempt to scare the Internet user into clicking on the link or button to purchase MS Antivirus. If the user decides not to purchase the program, then they will constantly receive pop-ups stating that the program has found infections and that they should register it in order to fix them. This type of behavior can cause a computer to operate more slowly than normal.
MS Antivirus will also occasionally display fake pop-up alerts on an infected computer. These alerts pretend to be a detection of an attack on that computer and the alert prompts the user to activate or purchase the software in order to stop the attack. More seriously it can paste a fake picture of a Blue Screen of Death over the screen and then display a fake startup image telling the user to buy the software. The malware may also block certain Windows programs that allow the user to modify or remove it. Programs such as Regedit can be blocked by this malware. The registry is also modified so the software runs at system startup. The following files may be downloaded to an infected computer:
MSASetup.exe
MSA.exe
MSA.cpl
MSx.exe
Depending on the variant, the files have different names and therefore can appear or be labeled differently. For example, Antivirus 2009 has the .exe file name a2009.exe.
In addition, in an attempt to make the software seem legitimate, MS Antivirus can give the computer symptoms of the "viruses" that it claims are on the computer. For example, some shortcuts on the desktop may be changed to links of sexually explicit websites instead.
Malicious actions
Most variants of this malware will not be overtly harmful, as they usually will not steal a user's information (as spyware) nor critically harm a system. However, the software will act to inconvenience the user by frequently displaying popups that prompt the user to pay to register the software in order to remove non-existent viruses. Some variants are more harmful; they display popups whenever the user tries to start an application or even tries to navigate the hard drive, especially after the computer is restarted. It does this by modifying the Windows registry. This can clog the screen with repeated pop-ups, potentially making the computer virtually unusable. It can also disable real antivirus programs to protect itself from removal. Whichever variant infects a computer, MS Antivirus always uses system resources when running, potentially making an infected computer run more slowly than before.
The malware can also block access to known spyware removal sites and in some instances, searching for "antivirus 2009" (or similar search terms) on a search engine will result in a blank page or an error page. Some variants will also redirect the user from the actual Google search page to a false Google search page with a link to the virus' page that states that the user has a virus and should get Antivirus 2009. In some rare cases, with the newest version of the malware, it can prevent the user from performing a system restore.
Earnings
In November 2008, it was reported that a hacker known as NeoN hacked the Bakasoftware's database, and posted the earnings of the company received from XP Antivirus. The data revealed the most successful affiliate earned USD$158,000 in a week.
Court actions
On December 2, 2008, the U.S. District Court for the District of Maryland issued a temporary restraining order against Innovative Marketing, Inc. and ByteHosting Internet Services, LLC after receiving a request from the Federal Trade Commission (FTC). According to the FTC, the combined malware of WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus has fooled over one million people into purchasing the software marketed as security products. The court also froze the assets of the companies in an effort to provide some monetary reimbursement to affected victims. The FTC claims the companies established an elaborate ruse that duped Internet advertising networks and popular Web sites into carrying their advertisements.
According to the FTC complaint, the companies charged in the case operated using a variety of aliases and maintained offices in the countries of Belize and Ukraine (Kiev). ByteHosting Internet Services is based in Cincinnati, Ohio. The complaint also names defendants Daniel Sundin, Sam Jain, Marc D’Souza, Kristy Ross, and James Reno in its filing, along with Maurice D’Souza, who is named relief defendant, for receiving proceeds from the scheme.
See also
Rogue software
Malware
References
External links
XP Antivirus 2009 Description and Removal instructions on About.com
Rogue software
Scareware
Windows malware |
24133396 | https://en.wikipedia.org/wiki/Chennai%20ITIR | Chennai ITIR | The Chennai ITIR or "Information Technology Investment Region" is a planned mega city covering an area of about 1,600 km2 (395,368.61 acre). It will be a specifically notified zone that will include IT/BPOs, electronics hardware manufacturing units, public utilities, residential areas, social infrastructure and administrative units. The ITIR is bordered by IT corridor and NH4. The NH45 runs through the heart of the proposed city.
Proposed infrastructure facilities
The cities of Chennai, Kanchipuram and Mamallapuram will be connected with roadways and railways as a part of the project.
Proposed road connectivity
Extension of NH4 from Chennai to Mamallapuram.
A single road connecting Mahabalipuram, Tirukazhukundram, Chengalpattu and Kanchipuram would be established.
Proposed rail connectivity
Extension of MRTS from Chennai till Mamallapuram. [50 km]
A new railway line from Anna Nagar to Sriperumbudur. [75 km]
Proposed air connectivity
A new international airport at Sriperumbudur at a cost of INR 3000 crores.
New townships
Three new townships are proposed in the following areas.
Two townships in areas flanked by NH4 and GST Road.
One township in area flanked by GST Road and IT corridor.
References
Information technology industry of Chennai
Information Technology Investment Regions |
61165139 | https://en.wikipedia.org/wiki/Ashwini%20Vaishnaw | Ashwini Vaishnaw | Ashwini Vaishnaw (born 18 July 1970) is an Indian politician and former Indian Administrative Service officer currently serving as the Minister of Railways, Communications and Electronics & Information Technology of India, since 8 July 2021. He is a member of the Bharatiya Janata Party. In June 2019, he became a member of the Parliament of India representing Odisha State in the Rajya Sabha, the upper house. On 7 July 2021, he was appointed as a Cabinet Minister and was given the charge of Railways and Information Technology ministries. Earlier in 1994, Vaishnaw joined the Indian Administrative Service in the Odisha cadre, and has worked extensively in Odisha. Vaishnaw was born in Jodhpur, Rajasthan
Education and Work
Vaishnaw was born in Jodhpur, Rajasthan in 1970. He is originally a resident of Jeewand Kallan village of Rani in Pali District, Rajasthan; and later his family settled in Jodhpur.
Vaishnaw did his schooling at St. Anthony's Convent School, Jodhpur, and at Mahesh School, Jodhpur. He graduated from MBM Engineering College (JNVU) Jodhpur in 1991 with a gold medal in an electronic and communications engineering course and then completed his M.Tech from IIT Kanpur, before joining the Indian Administrative Services in 1994 with an all-India rank of 27. In 2008, Vaishnaw left for the US to do his MBA from Wharton School of the University of Pennsylvania.
After his MBA, Vaishnaw came back to India and joined GE Transportation as Managing Director. Subsequently, he joined Siemens as the Vice President - Locomotives & Head Urban Infrastructure Strategy. Previously, he has also worked as deputy chairman of the Mormugao Port Trust, and thus has experience in both public and private sector enterprises.
In 2012, he quit the corporate sector and set up Three Tee Auto Logistics Private Limited and Vee Gee Auto Components Private Limited, both automotive components manufacturing units in Gujarat.
Years in civil services
In 1994, Vaishnaw joined the Indian Administrative Service in the Odisha cadre, and has worked extensively in different parts of Odisha including serving as the District Collector of Balasore and Cuttack districts. He worked in Odisha till 2003 when he was appointed as deputy secretary in the office of former Prime Minister Atal Bihari Vajpayee. After his brief stint in the PMO where he contributed to creating the public-private-partnership framework in infrastructure projects, Vaishnav was appointed as Vajpayee's private secretary after the BJP-led NDA lost the election in 2004.
In 2006, he became deputy chairman of Mormugao Port Trust, where he worked for next two years.
He took educational loan to complete his MBA at the Wharton Business School. He realized that it will take him years to payback educational loan and eventually he left civil service in 2010 to join private sector.
Political career
Vaishnaw is currently a Member of Indian Parliament, representing Odisha state in the Rajya Sabha. He won the Rajya Sabha election unopposed with the help of Biju Janata Dal members in Odisha. Vaishnaw was appointed as member of Committee on Subordinate Legislation and Petitions and Committee on Science and Technology, Environment and Forests.
Vaishnav has argued in Parliament that the current economic slowdown is cyclical in nature and is not a structural slowdown and that it is likely to bottom out by March and would be followed by solid growth. Vaishnav firmly believes that the way to build the country is to put the money in investment rather than putting money in consumption.
Vaishnav has also supported the Taxation Laws (Amendment) Bill, 2019 on 5 December 2019 in Rajya Sabha. He believes the step of reducing or rather rationalizing the tax structure will increase the competitiveness of the Indian industry and will also develop the capital base of the Indian industry. While supporting he furthered argued that the particular rationalization of tax structure will help the corporates to de-leverage and increase the retained earnings and reserves and surplus which will lay the foundation of the structural growth of the economy.
Apart from these, he has also spoken on issues ranging from Ship Recycling Bill to Women Protection in Rajya Sabha to further the public discourse on those issues.
Cabinet Minister
In July 2021, in the 22nd cabinet reshuffle, he was given the Ministry of Railways, Ministry of Electronics and Information Technology and Ministry of Communications.
References
External links
1970 births
Living people
Indian Administrative Service officers
Rajya Sabha members from Odisha
Bharatiya Janata Party politicians from Odisha
People from Gurgaon
Wharton School of the University of Pennsylvania alumni |
2742935 | https://en.wikipedia.org/wiki/Solstice%20%281990%20video%20game%29 | Solstice (1990 video game) | Solstice: The Quest for the Staff of Demnos, or simply Solstice, is a 1990 puzzle video game developed by Software Creations. It was published by Nintendo in Europe and CSG Imagesoft in North America for the Nintendo Entertainment System. The game focuses on the wizard Shadax's bid to defeat the evil baron Morbius and rescue Princess Eleanor, whom Morbius plans to sacrifice. Shadax aims to gather the six pieces of the titular Staff of Demnos hidden within the fortress of Kâstleröck. The game's setting is non-linear, and consists of 250 rooms, each with a particular puzzle to solve.
Solstice is the first original game to be developed by Software Creations, which had previously only worked on converted titles between 8-bit consoles. The game features a musical score by Tim Follin, who has named the game's title track as his favourite among his compositions. It became one of his best-known tracks. Solstice was received positively by critics for its puzzles and graphics, and the audio was singled out for praise. A sequel, titled Equinox, was released for the Super NES in 1993.
Gameplay
Solstice is an isometric-perspective puzzle game in which the player controls the wizard Shadax, who must navigate 250 rooms within the fortress Kâstleröck and assemble the six pieces of the Staff of Demnos to defeat the baron Morbius and rescue the princess Eleanor. Shadax's basic abilities consist of jumping, and picking up and dropping objects. Early in the game, Shadax can obtain a pair of magic elfin boots that augment his jumping height. He is additionally equipped with a few beakers that can be used to store four different varieties of potions; these potions can either grant temporary invincibility, destroy all moving objects in a room, freeze time, or make invisible objects visible. At the beginning of the game, the beakers can only hold up to two doses of a potion each, though upgrades can be obtained later on. Any number of potions can be cast simultaneously within a given room, but the spell(s) will only last as long as Shadax remains within that room; any effects from the potion(s) will disappear when the room is vacated.
Many of the fortress's rooms feature hazards such as floors covered in spikes, conveyor belts, vanishing bridges and tiles, and floating mines, and may also be inhabited by antagonistic creatures such as trolls, giant spiders and demons. The rooms often include movable blocks that can be found either lying on the floor or falling from above. These blocks can be used to move safely around the rooms and bypass enemies and hazards. Falling blocks can be frozen in mid-air with the time-freezing potion and be used as steps. There are also hovering crystal balls that can be pushed through the air and ridden as transportation, but cannot be picked up and carried. In some rooms, bombs can be detonated to create an entrance to a previously blocked-off passageway, though the detonators are hidden within nearby rooms. Other rooms contain portals that provide the only access to certain rooms within the fortress. Some rooms can only be cleared or accessed after finding and using of one of four hidden magic keys.
Extra lives can be obtained by collecting blue pointed hats scattered throughout the fortress. Although the screen only registers ten lives at one time, the player can continue to accumulate more lives from that point. The player can also collect coins that allow them to return to a certain room when all lives are lost instead of having to restart the game from the beginning. At any point in the game, the player can access a map that chronicles any room that they have entered and indicates all possible exits; some of these exits appear on the map, but will not appear in-game until a certain task is performed. Aside from the map, the player can view an inventory listing a percentage of the total number of rooms they have visited, as well as the total number of magic items they have found.
Plot
On the eve of the winter solstice, Morbius the Malevolent kidnaps Eleanor, Princess of Arcadia, to sacrifice her ritually and become the Evil Baron of Darkness. Shadax the wizard, after witnessing the kidnapping, heads to Morbius' stronghold, the fortress Kâstleröck, to rescue Eleanor. Once while researching Kâstleröck in the Library of Arcadia to find a way to overthrow Morbius, Shadax learned of a secret entrance into Kâstleröck and the whereabouts of the Staff of Demnos, an ancient weapon with the power to defeat Morbius. The staff was hidden in Kâstleröck because that was where Morbius would least expect to find it. Morbius' spies searched for the Staff but did not find it because it was broken into six pieces and made invisible. However, every one hundred years on the winter solstice, all six pieces become visible. Knowing a way in, Shadax enters Kâstleröck to reassemble the Staff of Demnos, overthrow Morbius' forces of darkness, and save Princess Eleanor. Upon restoring the Staff of Demnos, Shadax seeks out and frees Eleanor from imprisonment and destroys Morbius with the Staff.
Development and release
Conception and design
The development of Solstice was initiated by the programmer Mike Webb of Software Creations, who desired to create a Knight Lore-style isometric title for the NES. Solstice is the first original game to be developed within the company, which had previously only developed converted titles between 8-bit consoles. Mark Wilson, having previously worked as a programmer and a graphics artist for the company, saw Webb's proposal as an opportunity to attempt the role of a video game designer.
In spite of his personal dislike of isometric games up to that point, Wilson thought it sensible to create an isometric title as the company's first original work, as no such format had previously been attempted on the NES. Over the course of four weeks, Wilson designed the entire game as sketches and notes on paper, often within a McDonald's on Oxford Road. All the game's item positions and events were placed on a "master map" hand-drawn on a very large sheet of graph paper, and were based on Wilson's understanding of what the player might think or need at any particular point. This detailed approach put Wilson at odds with Webb, who failed to see why such an amount of time would be taken to design a game as opposed to expediently inserting rooms into a map at random. At one point, Webb presented Wilson with an alternate map created by his girlfriend the previous night, which consisted of 255 randomly-connected empty rooms. Out of guilt for their furious arguments and pleasure with the final product, Wilson would ultimately give Webb a co-designer credit in the game's attract mode screens. Wilson would later regret this action; during a subsequent interview with Wilson at MicroProse, one of the interviewers falsely identified Webb as the game's sole designer.
Visuals and audio
During the game's early stages of development, the player character Shadax appeared as a nondescript purple rectangle; the Shadax sprite was eventually designed by Wilson. In creating the game's setting and aesthetic, Wilson acknowledged the slim capacity for storytelling on Nintendo's cheapest available cartridge, and thus focused on the game's atmosphere, which he says "traded on the simplest and most basic of fantasy ideas". On stylistic influences, Wilson stated that "All of the usual suspects at that time probably should be included as sources, from Lord of the Rings to Excalibur."
The game's music was composed by Tim Follin. The primary background music was made to be atmospheric and dark, while the opening theme was made to be powerful. On his approach to the score, Follin commented that the "folk" melody style he had previously used for Ghouls 'n Ghosts was particularly suited for Solstice due to the game's fantasy-oriented title and setting. The title theme's changing moods and phases were an attempt by Follin to keep the track interesting; Follin felt that the constant evolution required to keep music in general interesting was imperative in video game music due to its lack of vocals and performance at the time. During development, a colleague of Follin played for him several works of game composer Rob Hubbard, which convinced Follin that the technical boundaries of the contemporary generation of hardware have been reached, and refocused his attention from the score's technique to the composition. While Follin retrospectively identified the title theme to be his favourite among his own compositions, he felt that his work on the in-game music could have been improved to be "a lot more spacious and interesting", as it "looped too short and became irritating quite quickly".
Publishing and release
The game's development spanned the course of 20 months. While Solstice was given an early demonstration to Nintendo, Software Creations owner Richard Kay grew impatient and quickly sold the game's North American publishing rights to CSG Imagesoft. After a response from Nintendo stating their desire to publish the title, Nintendo was given the publishing rights for all other regions, and the resulting contract with Nintendo would lead to other high-profile NES and SNES games. Upon receiving the game's publishing rights, CSG demanded that Shadax be changed from a wizard to a bodybuilder in a loincloth. When Wilson refused to make the change, CSG then made the request that Shadax's beard in the cutscenes be shortened, and the alteration was made against Wilson's protest. The package art, designed by Carol Roy, was lambasted by Wilson as having nothing to do with the game that was written, and he deemed it inferior to a proposed cover created by Neal Sutton that had already been supplied to CSG. He also derided the instruction booklet written by CSG as "a mass of illiterate and asinine drivel". Wilson spent the game's development time attempting to obtain a contract from Software Creations covering his work on Solstice, only to be given verbal promises about the percentage of the profits he would receive. Following the game's completion, these promises were casually broken, and Wilson would not receive any monetary gain from the title's sales. Wilson left Software Creations following this development, and struggled to obtain work for the next two years.
Solstice was announced in April 1990, and was released in July 1990 in North America and Europe. It was also published by Epic/Sony Records in Japan on July 20, 1990 under the subtitle Sanjigen Meikyū no Kyō Jū. CSG's advertisement campaign for Solstice in North America consisted of a photograph of what Wilson described as "an oiled-up bodybuilder with long hair wearing dayglo pink posing trunks", which he called "embarrassingly bad". The first 5,000 customers to order Solstice from CSG Imagesoft received a free "Player's Pak", consisting of an 8 mm video tape on the making of Solstice, a player's score card, trading cards and colored stickers. Solstice was featured in the 1990 Nintendo World Championships, with the first press coverage of the game in March 1990 by The Dallas Morning News as part of the Championships.
Reception
Solstice was met with a positive critical reception upon release. Richard Leadbetter of Computer and Video Games described the gameplay as "excellent, with some brain-bending puzzles and nice power-ups for Shadax's abilities". Paul Glancey, also of Computer and Video Games, described Solstice as "a BIG game with an awful lot of secrets to discover", and compared the game's puzzles to those of Knight Lore. Julian Rignall of Mean Machines also made a positive comparison to Knight Lore and noted that some of the puzzles were "very devious". However, Matt Regan, also of Mean Machines, stated that while Solstice is a challenging game that "puzzle fans should find interesting", "the excitement fades" as "shifting blocks to stand on or to prevent the attacks of a nasty becomes boring".
While Marc Camron and Ed Semrad of Electronic Gaming Monthly respectively considered the game to be "unique" and "a refreshing change of pace from all of the me-too type puzzle games", the publication's four reviewers collectively found the controls difficult and awkward. Robin Wyles of Raze compared the game's visuals and gameplay to those of Cadaver, and saw Solstice as "an admirable attempt to relive the Knight Lore days" that was "quite refreshing" in the face of the NES's lack of isometric-perspective titles. However, he argued that the game's quantity of puzzles negatively impacted their variety, and felt that the puzzles were "a bit too easy to solve, which reduces its long-term appeal". Leadbetter described the graphics as "excellent throughout, with some of the best backdrops and sprites ever seen in this type of game", and Glancey also felt the game's graphics were "really lovely". Rignall, Regan and Semrad described the graphics as "great", and Steve Harris and Ken "Sushi-X" Williams of EGM said the game was "beautiful". While Wyles appreciated the game's isometric perspective, he saw the colour schemes as "unimaginative".
The game's score was singled out for praise. Leadbetter proclaimed that "the renowned Tim Follin comes up trumps yet again with some brilliant atmospheric scores", and both he and Glancey, along with Rignall, considered the soundtrack to be some of the best they had heard on the NES. Regan described the game's soundtrack as "moody and atmospheric", and Semrad called the music "fantastic". Wyles, however, described the sound effects as "ropey" and the in-game background music as "mediocre". The title theme in particular became one of Follin's best-known tracks in retrospect. Brett Elston of GamesRadar+ proclaimed that "if any 8-bit song could take you on a journey, this is it. From its modest, almost hobbit-like opening to its soaring jig halfway through, the title screen music tramples over all other NES music." He additionally described the game's primary background track as "considerably more mellow but no less proficient and listenable", and preferred its presence as in-game music "because there's no way I could play ANYTHING with that title screen going nuts". Nate Andrews of Nintendo World Report said that "the regality of the opening track provides a fantastic build up for the ensuing blast, which nearly forces you to take a knee under its spectacle before dropping into extended, kicking jig, then moving into the rest of the prog-y soundtrack". Layton Shumway of VentureBeat remarked that the theme "sounds like a lost track from a Yes album" and that it "psyches you out with its single-note fanfare intro, instantly kicks into high gear with cascading synth lines, then settles into a propulsive 6/8 rock beat".
Legacy
A sequel to Solstice, titled Equinox, was announced on January 1992, initially for a summer release that year, and was released for the Super NES on November 1993. The game's plot centers on Shadax's son Glendaal, who must rescue Shadax from his treacherous apprentice Sonia. The game consists of 450 rooms split between eight dungeons, and also features an isometric perspective, but includes a rotatable camera that incorporates Mode 7 effects. Tim Follin reprised his role as composer and was joined in this duty by his brother Geoff. Equinox was released to generally positive critical reception. Hiroshi Minagawa enjoyed Solstice and its quarter-view perspective served as inspiration for a prototype design he showcased to Yasumi Matsuno, which formed the technical foundation for Tactics Ogre: Let Us Cling Together.
Notes
References
External links
1990 video games
Fantasy video games
Nintendo Entertainment System games
Nintendo Entertainment System-only games
Puzzle video games
Software Creations games
Video games about magic
Video games scored by Tim Follin
Video games developed in the United Kingdom
Video games with isometric graphics |
32792042 | https://en.wikipedia.org/wiki/Taleo | Taleo | Taleo Corporation was a publicly traded database vendor based in Dublin, California which was acquired by Oracle in 2012. Taleo's product offerings primarily focus on talent acquisition (recruitment), performance management, learning and development, and compensation management. These capabilities combine to provide what Taleo calls "Talent Intelligence" - an enhanced level of insight into candidates and employees. Taleo sells its Human resource management system (HRMS / HRIS) products entirely via a software-as-a-service (SaaS) model, in which all software and information resides in data centers operated and secured by Taleo.
On February 9, 2012, Oracle Corporation acquired Taleo Corporation for $1.9 billion.
Oracle Corporation continues to use the Taleo software name for its talent-management software suite. As of December 2013, Taleo software had over 20 million users.
History
Taleo has its roots in Canada, where in 1996 Martin Ouellet established Viasite, a French-language job-board for candidates and employers. Ouellet and Louis Têtu soon began working with Fortune 500 companies interested in developing online approaches to recruiting that incorporated the efficiencies of supply-chain management processes.
Viasite was later renamed Recruitsoft, Inc. In 1999, Recruitsoft registered as a Delaware corporation with headquarters in San Francisco, California, and launched Recruiter WebTop, an online hiring management system. Global expansion followed, and by 2001 the company had secured customer relationships with large enterprises including Hewlett Packard, Dow Chemical, Agilent, Hasbro, American Airlines, United Airlines, Deloitte & Touche, Bombardier Aerospace and Transportation, MetLife, Cabletron Systems, and Sutter Health.
Recruitsoft, Inc. changed its name to Taleo Corporation in March 2004. As the talent-management market matured, Taleo added products and capabilities, integrating recruiting with performance management in 2008, adding compensation management in 2009, and including learning and talent development in 2010. , Taleo made solutions available in 187 countries and in 31 languages.
In August 2011, Taleo reported it had more than 5,000 customers ranging from small and medium-sized businesses (SMBs) to large global enterprises, including nearly half of the Fortune 100.
R&D
Taleo operated R&D facilities in Quebec City, Canada; Kraków, Poland; and Jacksonville, Fla., with additional development staff in its Dublin, Calif., headquarters and other locations. Taleo's fiscal 2010 R&D investment was approximately $41 million. Jason Blessing was Taleo's Executive Vice President of Products & Technology.
Acquisitions
In addition to its own R&D efforts, Taleo expanded its product offerings through the acquisition of third-party solutions, talent and intellectual property:
October 2003, White Amber
added contingent workforce management to the Taleo Enterprise platform
April 2005, Recruitforce.com
became the foundation of Taleo Business Edition
March 2007, JOBFlash
integrated IVR, interview, scheduling, and high-volume hourly hiring capabilities into Taleo Enterprise; created a complementary offering to Taleo Business Edition
July 2007, WetFeet Inc.
customers of WetFeet Recruiter applicant tracking system transitioned to Taleo Enterprise and to Taleo Business Edition
July 2008, Vurv Technology
broadened Taleo's unified talent-management and Applicant tracking system (ATS) capabilities
January 2010, Worldwide Compensation
compensation management software, consulting services and domain expertise
September 2010, Learn.com
SaaS Learning Management System and industry expertise in corporate learning
April 2011, Cytiva
customers of Cytiva recruiting management solution transitioned to Taleo Recruit™ for SMBs or to Taleo Recruiting™ for enterprises
July 2011, Jobpartners
customers of Jobpartners' talent-management solution transitioned to Taleo Business Edition or to Taleo Enterprise
Products and services
Taleo Corp marketed Talent Management platforms for SMBs (as Taleo Business Edition) and enterprises (as Taleo Enterprise). Both Taleo Business Edition and Taleo Enterprise were modular offerings that allowed customers to add capabilities as they required them.
Taleo Corp operated a professional services organization that performed integration, implementation and performance optimization services worldwide.
See also
Oracle Advertising and Customer Experience (CX)
List of acquisitions by Oracle
List of talent management system companies
References
External links
Taleo Official Website
Business services companies established in 1996
Software companies based in the San Francisco Bay Area
Companies formerly listed on the Nasdaq
Oracle acquisitions
Companies based in Alameda County, California
Dublin, California
Software companies established in 1996
1996 establishments in Quebec
Human resource management software
Software performance management
Recruitment software
Learning management systems
2012 mergers and acquisitions
Software companies of the United States |
22040012 | https://en.wikipedia.org/wiki/Type%20A%20Cipher%20Machine | Type A Cipher Machine | In the history of cryptography, or , codenamed Red by the United States, was a diplomatic cryptographic machine used by the Japanese Foreign Office before and during World War II. A relatively simple device, it was quickly broken by western cryptographers. The Red cipher was succeeded by the which used some of the same principles. Parallel usage of the two systems assisted in the breaking of the Purple system.
The Red cipher should not be confused with the Red naval code, which was used by the Imperial Japanese Navy between the wars. The latter was a codebook system, not a cipher.
Operation
The Red machine encrypted and decrypted texts written in Latin characters (alphabetic only) for transmission through the cable services. These services charged a lower rate for texts that could be pronounced than for random strings of characters; therefore the machine produced telegraph code by enciphering the vowels separately from the consonants, so that the text remained a series of syllables. (The letter "Y" was treated as a vowel.) Per International Telegraph Union regulations at the time, pronounceable words in telegrams were charged a lower rate than unpronounceable code groups. The "sixes and twenties" effect (as American analysts referred to it) was a major weakness which the Japanese continued in the Purple system.
Encryption itself was provided through a single half-rotor; input contacts were through slip rings, each of which connected to a single output contact on the rotor. Since both the vowels and consonants were passed through the same rotor, it had sixty contacts (the least common multiple of six and twenty); wiring ensured that the two groups were kept separate. The slip rings were connected to the input keyboard through a plugboard; again this was organized to keep the vowels and consonants separate.
The rotor turned at least one step after each letter. The amount of rotation was controlled by the break wheel, which was connected to the rotor, and which had up to forty-seven pins in it. Up to eleven of these pins (in a predetermined set of positions) were removable; in practice, from four to six pins were removed. Rotation of the wheel stopped when the next pin was reached; therefore, if the next pin were removed, the rotor would advance two places instead of one. The irregular pattern of rotation produced an Alberti cipher.
History
The vulnerability of Japanese code systems was made public in 1931 when Herbert Yardley published The American Black Chamber, a popular account of his code breaking activities for the US government in which he discussed the breaking of Japanese codes and their use during the Washington Naval Conference. These revelations prompted Japanese to look into machine ciphers.
The system was introduced in 1930-1931 (the 91 in the designation refers to the Japanese imperial year 2591), using a reverse-engineered version of a machine supplied by the firm of Boris Hagelin. Hagelin's most sophisticated systems were rotor machines similar to those used in World War II, but as he did not trust the Japanese to honor his patents, he sent a more primitive device designed by Arvid Damm instead. It was this machine which the Japanese used as the basis for their design; the separate encryption of the vowels, however, was strictly a Japanese contribution.
The code was broken successfully by three independently working groups. The British solution came first, with Hugh Foss and Oliver Strachey working out the code in 1934, and Harold Kenworthy's shop producing a replica, the "J machine", a year later. American attempts to break the system waited until 1935. In the Army SIS group, the system was broken by Frank Rowlett and Solomon Kullback; for the navy, Agnes Driscoll is generally credited. (She actually solved the Orange (or M-1) cipher used by naval attaches, but as it turned out the two systems were essentially the same.) The Americans also constructed a replica machine to expedite solutions; this machine had two half-rotors to solve the vowels and consonants separately. The SIS group originally referred to it simply as the "Japanese code machine", but decided that so descriptive a term was a security risk; as it was the first Japanese machine cipher solved, they decided to start at the beginning of the spectrum, and named it "RED".
The PURPLE machine began to replace the RED system in 1938, but initial installations were at major posts; less important embassies and consulates continued to use the old system. This was one of many deficiencies in Japanese use of encryption that helped make the PURPLE system vulnerable to cracking, for now there was some identical traffic on both systems, which allowed cribbing. A far more serious deficiency was that the PURPLE machine maintained the "sixes/twenties" division, even though the RED machines had since been modified to allow any six letters to be used for the vowel encryption. After eighteen months of work, the PURPLE device was cracked, and produced important intelligence up to the end of the war.
Intelligence results of RED intercepts were not as dramatic, but important intelligence was obtained. For instance, American cryptanalysts were able to provide details of the Tripartite Pact between the Axis powers. Reports of the sea trials of the battleship Nagato were also decoded, leading to important changes to the USS North Carolina (BB-55), then being designed, in order to match the performance of the Japanese ship.
Further reading
Chapter 7 of Computer Security and Cryptography (Konheim, Alan G., Wiley-Interscience, 2007, pp. 191–211) has an extensive analysis of the RED cipher.
References
Encryption devices
Rotor machines
Japan–United States relations
World War II Japanese cryptography |
1731731 | https://en.wikipedia.org/wiki/Frank%20Harary | Frank Harary | Frank Harary (March 11, 1921 – January 4, 2005) was an American mathematician, who specialized in graph theory. He was widely recognized as one of the "fathers" of modern graph theory.
Harary was a master of clear exposition and, together with his many doctoral students, he standardized the terminology of graphs. He broadened the reach of this field to include physics, psychology, sociology, and even anthropology. Gifted with a keen sense of humor, Harary challenged and entertained audiences at all levels of mathematical sophistication. A particular trick he employed was to turn theorems into games—for instance, students would try to add red edges to a graph on six vertices in order to create a red triangle, while another group of students tried to add edges to create a blue triangle (and each edge of the graph had to be either blue or red). Because of the theorem on friends and strangers, one team or the other would have to win.
Biography
Frank Harary was born in New York City, the oldest child to a family of Jewish immigrants from Syria and Russia. He earned his bachelor's and master's degrees from Brooklyn College in 1941 and 1945 respectively and his Ph.D., with supervisor Alfred L. Foster, from University of California, Berkeley in 1948.
Prior to his teaching career he became a research assistant in the Institute of Social Research at the University of Michigan.
Harary's first publication, "Atomic Boolean-like rings with finite radical", went through much effort to be put into the Duke Mathematical Journal in 1950. This article was first submitted to the American Mathematical Society in November 1948, then sent to the Duke Mathematical Journal where it was revised three times before it was finally published two years after its initial submission. Harary began his teaching career at the University of Michigan in 1953 where he was first an assistant professor, then in 1959 associate professor and in 1964 was appointed as a professor of mathematics, a position he held until 1986.
From 1987 he was Professor (and Distinguished Professor Emeritus) in the Computer Science Department at New Mexico State University in Las Cruces. He was one of the founders of the Journal of Combinatorial Theory and the Journal of Graph Theory.
In 1949 Harary published On the algebraic structure of knots. Shortly after this publication in 1953 Harary published his first book (jointly with George Uhlenbeck) On the number of Husimi trees. It was following this text that he began to build up a worldwide reputation for his work in graph theory. In 1965 his first book Structural models: An introduction to the theory of directed graphs was published, and for the rest of his life his interest would be in the field of Graph Theory.
While beginning his work in graph theory around 1965, Harary began buying up property in Ann Arbor to supplement income for his family. Harary and his wife Jayne had six children together, Miriam, Natalie, Judith, Thomas, Joel and Chaya.
From 1973 to 2007 Harary jointly wrote five more books, each in the field of graph theory. In the time before his death, Harary traveled the world researching and publishing over 800 papers (with some 300 different co-authors), in mathematical journals and other scientific publications, more than any mathematician other than Paul Erdos. Harary recorded that he lectured in 166 different cities around the United States and some 274 cities in over 80 different countries. Harary was particularly proud that he had given lectures in cities around the world beginning with every letter of the alphabet, even including "X" when he traveled to Xanten, Germany. Harary also played a curious role in the award-winning film Good Will Hunting. The film displayed formulas he had published on the enumeration of trees, which were supposed to be fiendishly difficult.
It was in 1986 at the age of 65 that Harary retired from his professorship at the University of Michigan. Harary did not take his retirement lightly however, following his retirement Harary was appointed as a Distinguished Professor of Computer Sciences at New Mexico State University in Las Cruces. He held this position until his death in 2005. The same year as his retirement Harary was made an honorary fellow of the National Academy of Sciences of India, he also served as an editor for about 20 different journals focusing primarily on graph theory and combinatorial theory. It was following his retirement that Harary was elected as an honorary lifetime member of the Calcutta Mathematical Society and of the South African Mathematical Society.
He died at Memorial Medical Center in Las Cruces, New Mexico. At the time of his death in Las Cruces other members of the department of Computer Science felt the loss for the great mind that once worked beside them. The head of the department of Computer Science at the time of Harary's death Desh Ranjan had this to say, "Dr. Harary was a true scholar with a genuine love for graph theory which was an endless source of new discoveries, beauty, curiosity, surprises and joy for him till the very end of his life."
Mathematics
Harary's work in graph theory was diverse. Some topics of great interest to him were:
Graph enumeration, that is, counting graphs of a specified kind. He coauthored a book on the subject (Harary and Palmer 1973). The main difficulty is that two graphs that are isomorphic should not be counted twice; thus, one has to apply Pólya's theory of counting under group action. Harary was an expert in this.
Signed graphs. Harary invented this branch of graph theory, which grew out of a problem of theoretical social psychology investigated by the psychologist Dorwin Cartwright and Harary.
Applications of graph theory in numerous areas, especially to social science such as balance theory, opinion dynamics, and the theory of tournaments. Harary was co-author of John Wiley's first e-book, Graph Theory and Geography.
Among over 700 scholarly articles Harary wrote, two were co-authored with Paul Erdős, giving Harary an Erdős number of 1. He lectured extensively and kept alphabetical lists of the cities where he spoke.
Harary's most famous classic book Graph Theory was published in 1969 and offered a practical introduction to the field of graph theory. It is evident that Harary's focus in this book and amongst his other publications was towards the varied and diverse application of graph theory to other fields of mathematics, physics and many others. Taken from the preface of Graph Theory, Harary notes ...
"...there are applications of graph theory to some areas of physics, chemistry, communication science, computer technology, electrical and civil engineering, architecture, operational research, genetics, psychology, sociology, economics, anthropology, and linguistics."
Harary quickly began promoting inquiry based learning through his texts, apparent by his reference to the tradition of the Moore method. Harary made many unique contributions to graph theory as he explored more and more different fields of study and successfully attempted to relate them to graph theory. Harary's classic book Graph Theory begins by providing the reader with much of the requisite knowledge of basic graphs and then dives right into proving the diversity of content that is held within graph theory. Some of the other mathematical fields that Harary directly relates to graph theory in his book begin to appear around chapter 13, these topics include linear algebra, and abstract algebra.
Harary also made an influential contribution in the theory of social learning used in sociology and behavioral economics, deriving a criterion for consensus in John R. P. French's model of social power. This anticipated by several decades, albeit in a special case, the widely used DeGroot learning model.
Tree square root
One motivation for the study of graph theory is its application to sociograms described by Jacob L. Moreno. For instance the adjacency matrix of a sociogram was used by Leon Festinger. Festinger identified the graph theory clique with the social clique and examined the diagonal of the cube of a groups’ adjacency matrix to detect cliques. Harary joined with Ian Ross to improve on Festinger's clique detection.
The admission of powers of an adjacency matrix led Harary and Ross to note that a complete graph can be obtained from the square of an adjacency matrix of a tree. Relying on their study of clique detection, they described a class of graphs for which the adjacency matrix is the square of the adjacency matrix of a tree.
If a graph G is the square of a tree, then it has a unique tree square root
Some vocabulary necessary to understand this proof and the methods used here are provided in Harary's The Square of a Tree: (Cliqual, unicliqual, multicliqual, cocliqual, neighborhood, neighborly, cut point, block)
How to determine if some graph G is the square of a tree.
Iff a graph G is complete or satisfies the following 5 properties then G = T2
(i) Every point of G is neighborly and G is connected.
(ii) If two cliques meet at only one point b, then there is a third clique with which they share b and exactly one other point.
(iii) There is a 1-1 correspondence between the cliques and the multicliqual points b of G such that clique C(b) corresponding to b contains exactly as many multicliqual points as the number of cliques which include b.
(iv) No two cliques intersect in more than two points.
(v) The number of pairs of cliques that meet in two points is one less than the number of cliques.
Algorithm for finding the tree square root of a graph G.
Step 1: Find all the cliques of G.
Step 2: Let the cliques of G be C1,...,Cn, and consider a collection of multicliqual points b1,...,bn corresponding to these cliques in accordance with condition iii. The elements of this collection are the nonendpoints of T. Find all of the pairwise intersections of the n cliques and form the graph S by joining the points bi and bj by a line if and only if the corresponding cliques Ci and Cj intersect in two points. S is then a tree by condition v.
Step 3: For each clique Ci of G, let ni be the number of unicliqual points. To the tree S obtained in step 2, attach ni endpoints to bi, obtaining the tree T which we sought.
Once we have the tree in question we can create an adjacency matrix for the tree T and check that it is indeed to correct tree which we sought. Squaring the adjacency matrix of T should yield an adjacency matrix for a graph which is isomorphic to the graph G which we started with. Probably the simplest way to observe this theorem in action is to observe the case which Harary mentions in The Square of a Tree. Specifically the example in question describes the tree corresponding the graph of K5
"Consider the tree consisting of one point joined with all the others. When the tree is squared, the result is the complete graph. We wish to illustrate... T2K5"
Upon squaring of the adjacency matrix of the previously mentioned tree, we can observe that this theorem does in fact hold true. We can also observe that this pattern of setting up a tree where "one point joined with all the others" will always indeed yield the correct tree for all complete graphs.
Bibliography
1965: (with Robert Z. Norman and Dorwin Cartwright), Structural Models: An Introduction to the Theory of Directed Graphs. New York: Wiley
1967: Graph Theory and Theoretical Physics, Academic Press
1969: Graph Theory, Addison–Wesley
1971: (editor with Herbert Wilf) Mathematical Aspects of Electrical Networks Analysis, SIAM-AMS Proceedings, Volume 3,American Mathematical Society
1973: (editor) New Directions in the Theory of Graphs: Proceedings of the 1971 Ann Arbor Conference on Graph Theory, University of Michigan, Academic Press.
1973: (with Edgar M. Palmer) Graphical Enumeration Academic Press
1979: (editor) Topics in Graph Theory, New York Academy of Sciences
1984: (with Per Hage) Structural Models in Anthropology, Cambridge Studies in Social and Cultural Anthropology, Cambridge University Press
1990: (with Fred Buckley) Distance in Graphs, Perseus Press
1991: (with Per Hage) Exchange in Oceania: A Graph Theoretic Analysis, Oxford Studies in Social and Cultural Anthropology, Oxford University Press.
2002: (with Sandra Lach Arlinghaus & William C. Arlinghaus) Graph Theory and Geography: An Interactive E-Book, John Wiley and Sons
2007: (with Per Hage) Island Networks: Communication, Kinship, and Classification Structures in Oceania (Structural Analysis in the Social Sciences), Cambridge University Press.
References
External links
Frank Harary memorial from New Mexico State University
1921 births
2005 deaths
20th-century American mathematicians
21st-century American mathematicians
Graph theorists
University of California, Berkeley alumni
University of Michigan faculty
New Mexico State University faculty
American people of Syrian-Jewish descent
American Sephardic Jews
American people of Syrian descent
Brooklyn College alumni
Network scientists |
3477425 | https://en.wikipedia.org/wiki/Rybka | Rybka | Rybka is a computer chess engine designed by International Master Vasik Rajlich. Around 2011, Rybka was one of the top-rated engines on chess engine rating lists and won many computer chess tournaments.
After Rybka won four consecutive World Computer Chess Championships from 2007 to 2010, it was stripped of these titles after the International Computer Games Association concluded in June 2011 that Rybka was plagiarized from both the Crafty and the Fruit chess engines and so failed to meet their originality requirements. In 2015, FIDE Ethics Commission, following a complaint put forward by Vasik Rajlich and chess engine developer and games publisher Chris Whittington regarding ethical breaches during internal disciplinary proceedings, ruled the ICGA guilty and sanctioned ICGA with a warning. Case 2/2012.
ChessBase published a challenging two-part interview-article about the process and verdict with ICGA spokesperson David Levy. Subsequently, ChessBase has published Rybka to produce Fritz 15 released in late 2015 and Fritz 16 released in late 2017.
Name
The word rybka, pronounced in Czech, means little fish in Czech, Polish, and in many other Slavic languages. Vasik Rajlich was once asked in an interview by Alexander Schmidt, "Did you choose the name Rybka because your program always slipped out of your hands like a little fish?" He replied, "As for the name Rybka – I am sorry but this will remain my private secret."
Internals
Rybka is a closed-source program, but still some details have been revealed: Rybka uses a bitboard representation, and is an alpha-beta searcher with a relatively large aspiration window. It uses very aggressive pruning, leading to imbalanced search trees. The details of the evaluation function are unknown, but since version 2.3.1 it has included work by GM Larry Kaufman on material imbalances, much of which was worked out in a series of papers in the 1990s.
Team
Several members of the Rybka team are strong chess players: Vasik Rajlich, the main author of Rybka is an International Master (IM). GM Larry Kaufman is the 2008 Senior Chess World Champion, and from version 2.3 through version 3 was in primary charge of the evaluation function. Iweta Rajlich, Vasik Rajlich's wife and the main Rybka tester is a Women's GM (WGM) and IM. Jeroen Noomen (who used to work on Rebel) and Dagh Nielsen were the authors of its opening book – the latter is one of the world's top freestyle chess players. Both are now less active, and Jiri Dufek is in charge of the book.
History
Vasik Rajlich started working on his chess program at the beginning of 2003. The first Rybka beta was released on December 2, 2005.
Tournament participations
In January 2004, Rybka participated in the 6th Programmers Computer Chess Tournament (CCT6) event, placing 53rd out of 54 competers, losing 5 games, drawing 3, and beating the last-place finisher who had 0 points (Tohno).
In April 2004, Rybka participated in Chess War V conducted by Olivier Deville, finishing 23rd in the D Division.
In April 2004, Rybka participated in the Swiss System Season 3 by Claude Dubois,
scoring 6 wins, 6 losses and 6 draws in the Top 200 to finish 71st.
Rybka participated in Chess War VI finishing 42nd in the D Division. Rybka participated in Chess War VII finishing 48th in the C Division. Rybka participated in AEGT round 3, scoring 89 wins, 28 losses and 15 draws.
In December 2005, Rybka participated in the 15th International Paderborn Computer Chess Championship. Rybka won the tournament with a score of 5½ points out of 7, ahead of other engines such as Gandalf, Zappa, Spike, Shredder and Fruit.
On CCT8 in February 2006, Rybka won with a score of 8 out of 9, going undefeated. In the April 2006 PAL/CSS Freestyle main tournament, an unaided Rybka 1.1 took first place. In the final tournament, Rybka 1.1 finished in second and third place, behind Hydra. In the 6th Leiden ICT in May 2006, Rybka won with a score of 8½ out of 9, ahead of Sjeng, Gandalf and Shredder. At the 14th World Computer Chess Championship in Turin, Italy in May 2006, Rybka, playing under the name Rajlich, finished second, tied with Shredder, after Junior, the winning 2006 World champion. In the June 2006 PAL/CSS Freestyle main tournament, the Rybka team, playing under the handle Rajlich, tied for first place with Intagrand. In the final, the Rybka team took clear first place, a point ahead of the field. All 8 qualifiers for to the final were Rybka users. In the 2006 Dutch open computer chess championship, Rybka 2.2 finished in first place with a perfect score of 9 out of 9. In December 2006, Rybka participated in the 16th International Paderborn Computer Chess Championship. Rybka won the tournament with a score of 6½ points out of 7.
In February 2007, Rybka participated in the CCT9 and won with 6/7. In the 7th Leiden ICT in May 2007, Rybka won with a score of 7½ out of 9, ahead of Zappa and HIARCS. Rybka won the 15th World Computer Chess Championship in June 2007 with a score of 10 out of 11. The Rybka team, playing under the handle Rajlich, won the June 2007 PAL/CSS Freestyle final with a score of 6/9. Later that year it won again the Dutch open computer chess championship, scoring 8/9.
In January 2008, Rybka tied for first place in CCT10 with 5.5/7. In October 2008, Rybka won the 16th World Computer Chess Championship, held in Beijing, China, scoring 8/9. A month later Rybka won the 27th Open Dutch Computer Chess Championship, held in Leiden, scoring a perfect 9/9.
In March 2009, Rybka won CCT11 with 7.5/9 and the 17th World Computer Chess Championship, held in Pamplona, Spain, with a score of 8/9.
In May 2010, Rybka won the International Computer Chess Tournament in Leiden with 8/9.
Odds matches versus grandmasters
In March 2007, Rybka played an eight-game match against GM Roman Dzindzichashvili with pawn and move odds. The result was 4–4, after two Rybka wins, four draws and two losses.
Whilst Rybka has won an 8 game match in March 2007 with GM Jaan Ehlvest which involved giving pawn odds to the human, GM Larry Kaufman of the Rybka team has pledged his own money to a human GM who can beat Rybka in a six-game match without material odds. GM Jaan Ehlvest was again chosen to play Rybka, getting twice the thinking time and white every match, with Rybka having only a three-move opening book, limited (512MB) hash size, and no endgame tablebases (the match being dubbed "Everything but a pawn"). The match, again played in 2007, ended 4.5–1.5 after three Rybka wins and three draws.
In September 2008, Rybka played an odds match against Vadim Milov, its strongest opponent yet in an odds match. Milov at the time had an Elo rating of 2705, ranking him 28th in the world. The result was a narrow victory to Milov: In two standard games (Milov played White, no odds), Milov lost the first game and drew the second one. Then they played two games at the classical "pawn and move" handicap (f7 removed). The first game ended in an early draw by perpetual check, while the second was won by Milov. Finally they played four games at odds of the exchange (Rybka removed a1 rook, Milov b8 knight); here Rybka drew three times and lost once. The final score was 4.5–3.5 for Milov.
Zappa match
In September 2007, Zappa defeated Rybka in a match, –. Two famous games were played in this match. The first was the 180-move fourth game, which was approaching a draw under the 50-move rule. However, due to an incorrect evaluation by the Rybka engine, at move 109 it moved a pawn to avoid a draw (even though Zappa could, and did, immediately take the pawn), thus resetting the counter for that rule. The loss of the pawn eventually allowed Zappa to whittle away Rybka's defenses and win the game. Then in game 9, Rybka was 3 pawns up with a totally won position, but played a horrific blunder on move 71, "the worst blunder in modern computer chess", as it lacked sufficient knowledge to see a draw would ensue by opposite-color bishops. Zappa had this knowledge, took advantage, and drew the game. Anthony Cozzie thanked his operator Erdogan Gunes for having the wherewithal to stay until the end in these two games, rather than agree to a draw in game 4 or resign in game 9.
The match came about after Vasik Rajlich made a $100,000 publicity challenge to the FIDE champion Fritz or Junior, even offering odds of a game in a 24-game match (13 points). But negotiations between Rybka and Junior broke down due to disputes over on-site machines. The match was changed to 10 games against Zappa, with $10,000 the amount eventually paid to the winner.
Versions
Version 3
Rybka 3 was released on August 6, 2008. While previous versions of Rybka were released exclusively by Convekta, Rybka 3 was released by both Chessbase and Convekta. Although still a UCI engine, Rybka 3 has extra features when run under the ChessBase and Convekta user interfaces. In an interview with Frank Quisinsky, Vasik Rajlich revealed plans for a future GUI that would "properly display chess knowledge to the user" most likely in the form of graphical evaluation of the pieces on the board. The GUI, named Aquarium, has been released by ChessOK (formerly known as Convekta).
Version 4
Rybka 4 was released May 26, 2010. Vasik Rajlich has given the following information at the Rybka forum:
Rybka 4 is a normal UCI engine, without copy protection.
There are separate single-processor and multi-processor versions.
Full chess analysis packages which include Rybka 4 will be made by ChessBase (www.chessbase.com) and Convekta/ChessOK (www.chessok.com).
Plain Rybka 4 UCI without GUI for download only is available from RybkaChess (www.rybkachess.com).
All of these versions of Rybka 4 will be identical and can be used in any UCI-compliant GUI.
Remote Rybka
Vasik Rajlich has now released "Remote Rybka" which is a special version of Rybka (4+ or cluster) on very powerful hardware / clusters run by Lukas Cimiotti. This can be rented for a specific period of time, though currently not less than 2 days due to overhead costs. Upon renting one has access to the Remote Rybka from one's PC, and all details of rentals are strictly private.
Version 4.1
This was a version swiftly produced after the ICGA investigation was announced, to ensure no infidelities in code sourcing. It was released on March 5, 2011.
Version 5
Information from the last video interview by Vasik Rajlich indicated that Rybka 5 was scheduled to arrive anywhere between the end of 2011 and the first half of 2012. As of October 2020, this never occurred.
Allegations of derivative work
Crafty chess engine controversy
Early private Rybka engines have been accused of being a clone of Crafty, including copying specific bugs - such as comparing the result of the EvaluateMate function to a number, 99999, that it could not possibly return - and unnecessary code ("there is no earthly reason for any program that claimed to have been started in 2003 to have such code, other than that it was mindlessly copied from Crafty without the slightest understanding of its purpose").
Strelka controversy
In May 2007, a new chess engine called Strelka (Russian for "arrow") appeared on the scene, claimed to be written by Yuri Osipov. Soon, there were allegations that Strelka was a clone of Rybka 1.0 beta, in the sense that it was a reverse-engineered and slightly modified version of Rybka. Several players found Strelka to yield identical analysis to Rybka in a variety of different situations, even having the same bugs and weaknesses in some cases. Osipov, however, stated repeatedly on discussion boards that Strelka was based on Fruit, not Rybka, and that any similarities was either because Rybka also was based on Fruit, or because he had tuned the evaluation function to be as close to Rybka as possible.
With the release of Strelka 2.0 beta, source code was included. Rajlich stated that the source made it "obvious" that Strelka 2.0 beta was indeed a Rybka 1.0 beta clone, although not without some improvements in certain areas. On the basis of this, he claimed the source as his own and intended to re-release it under his own name, although he later decided not to do so. He also made allegations that "Yuri Osipov" was a pen name.
According to Victor Zakharov (Convekta company) in his review for Arena chess website: "I consider that Yuri Osipov (Ivanovich) is real name. He didn't hide it. However I can't state this with 100% assurance."
And he also has some contact with Yuri Osipov for development of mobile platforms chess program.
Fruit author Fabien Letouzey expressed in the open letter mentioned above that Strelka 2.0 beta is a Fruit derivative with some minor changes.
IPPOLIT controversy
IPPOLIT, RobboLito, Igorrit, IvanHoe, FireBird and Fire are a series of strong open source chess programs, originally developed by a team of anonymous programmers who call themselves the Decembrists, after the Decembrist revolt.
The chess engine IPPOLIT was released in May 2009 with its source code, but due to the policy of some chess forums
not to publish material of "questionable legal status" (e.g. the Talkchess charter ) it remained relatively unknown until October 2009. Vasik Rajlich has stated that IPPOLIT is a decompiled version of Rybka, and that the people involved kept him informed of their progress via email.
Fruit GPL chess engine controversy
Rybka has been accused of being based on Fruit, but Rajlich has denied this categorically, saying that Rybka is 100% original at the source code level. Further allegations of violating the GPL have been brought forward by chess programmer Zach Wegner based on a new decompilation effort and a one-year study of the Rybka 1.0 executable. Rajlich has since declined to respond to these allegations. The Fruit author Fabien Letouzey has since appeared from a 5-year absence in January 2011 and published an open letter asking for more information regarding Rybka and GPL violations.
The ICGA President David Levy has addressed the situation at ChessVibes and invoked a programmers forum to decide the merits. The options include revoking all tournament victories of Rybka by Statute 3.h.iv. Fourteen well-known chess programmers have since written an open letter to David Levy, Jaap van den Herik and the ICGA board stating that there is now "overwhelming evidence" that Rybka 1.0 beta (the first strong Rybka version) was directly derived from Fruit.
WCCC disqualification and banning
On June 28, 2011, the International Computer Games Association (ICGA) concluded their investigation and determined that Vasik Rajlich in programming Rybka had plagiarized two other chess software programs: Crafty and Fruit. According to ICGA, Vasik Rajlich failed to comply with the ICGA rule that each computer chess program must be the original work of the entering developer and those "whose code is derived from or including game-playing code written by others must name all other authors, or the source of such code, in their submission details". The ICGA regarded Vasik Rajlich's alleged violation as the most serious offence that a chess programmer and ICGA member can commit with respect to his peers and to the ICGA. The ICGA sanction for Vasik Rajlich and Rybka was the disqualification from the World Computer Chess Championship (WCCC) of 2006, 2007, 2008, 2009 and 2010. Vasik Rajlich was also banned for life from competing in the WCCC or any other event organized or sanctioned by the ICGA. In addition, the ICGA demanded that Vasik Rajlich return to the ICGA the four replicas of the Shannon Trophy presented at the WCCC in 2007, 2008, 2009 and 2010 and all prize money awarded for Rybka's performances in those events.
Response
On publication of the ICGA verdict and sentence, extensive disagreement broke out on Computer Chess Forums, centering on correct application of Abstraction-Filtration-Comparison test, the differences between copying ideas and copying code and bias in investigation.
Rajlich responded to the ICGA's allegations in a video interview with Nelson Hernandez, and answered questions about the controversy and his opinions on it.
In January 2012, ChessBase.com published an article by Dr. Søren Riis. Riis, a computer scientist at the Queen Mary University of London and a Rybka forum moderator, was critical of the ICGA's decision, the investigation, the methods on which the investigation was based, and the bias of the panel members and Secretariat. Riis argued that critical portions of the ICGA panel report that appeared to show line-by-line code duplication between Rybka and Fruit were misleading or falsified, and objected to the panel's and Secretariat's composition, suggesting that it consisted almost exclusively of rival chess programmers who had a conflict of interest in seeing Rajlich banned from competition in order to interrupt his unbroken domination of competitive computer chess. ICGA President David Levy and University of Sydney research fellow in mathematics Mark Watkins responded to Riis' publication with their own statements defending the ICGA panel and findings, respectively. ChessBase published a lengthy list of Reader Comments to the Riis article, specifically pointing to the two longest comments, one for and one against which were located at the end.
In 2012, Vasik Rajlich filed a complaint against the ICGA decisions, process and bias to the FIDE Ethics Commission, as co-signed by Soren Riis, Ed Schröder and Chris Whittington. In 2015, the FIDE Ethics Commission ruled the International Computer Games Association ICGA guilty of ethical breaches during internal disciplinary proceedings and sanctioned the ICGA with a warning. Case 2/2012.
Rejection of the ICGA decision by the CSVN
Cock de Gorter, Chairman of Dutch Computer Chess Association (CSVN) wrote:
In response, 10 former participants of CSVN events published an open letter on September 21, 2011, accusing the CSVN of "lack of judgement", personally singling out and criticising the Chairman Cock de Gorter "your ... tournaments are not in good hands anymore" and announcing their withdrawal from CSVN events "under the current direction".
Rybka competed in the 2012 CSVN event (ICT) and won.
References
External links
Official Forum
The CCRL rating list
The CEGT rating list
The IPON Ponder ON rating list
Interview with Rybka Opening Book Author
2005 software
Chess engines
Windows-only software |
17195791 | https://en.wikipedia.org/wiki/Traffic%20flow%20%28computer%20networking%29 | Traffic flow (computer networking) | In packet switching networks, traffic flow, packet flow or network flow is a sequence of packets from a source computer to a destination, which may be another host, a multicast group, or a broadcast domain. RFC 2722 defines traffic flow as "an artificial logical equivalent to a call or connection." RFC 3697 defines traffic flow as "a sequence of packets sent from a particular source to a particular unicast, anycast, or multicast destination that the source desires to label as a flow. A flow could consist of all packets in a specific transport connection or a media stream. However, a flow is not necessarily 1:1 mapped to a transport connection." Flow is also defined in RFC 3917 as "a set of IP packets passing an observation point in the network during a certain time interval."
Packet flow temporal efficiency can be affected by one-way delay (OWD) that is described as a combination of the following components:
Processing delay (the time taken to process a packet in a network node)
Queuing delay (the time a packet waits in a queue until it can be transmitted)
Transmission delay (the amount of time necessary to push all the packet into the wire)
Propagation delay (amount of time it takes the signal’s header to travel from the sender to the receiver)
Conceptual description
Utility for network administration
The concept is important, since it may be that packets from one flow need to be handled differently from others, by means of separate queues in switches, routers and network adapters, to achieve traffic shaping, fair queueing or quality of service. It is also a concept used in Queueing Network Analyzers (QNAs) or in packet tracing.
Applied to Internet routers, a flow may be a host-to-host communication path, or a socket-to-socket communication identified by a unique combination of source and destination addresses and port numbers, together with transport protocol (for example, UDP or TCP). In the TCP case, a flow may be a virtual circuit, also known as a virtual connection or a byte stream.
In packet switches, the flow may be identified by IEEE 802.1Q Virtual LAN tagging in Ethernet networks, or by a Label Switched Path in MPLS tag switching.
Packet flow can be represented as a path in a network to model network performance. For example, a water flow network can be used to conceptualize packet flow. Channels can be thought of as pipes, with the pipe capacity corresponding to bandwidth and flows corresponding to data throughput. This visualization can help to understand bottlenecks, queuing, and help understand the unique requirements of tailored systems.
See also
Argus - Audit Record Generation and Utilization System
Cisco NetFlow
Communication channel
Data flow (software engineering)
Data stream
Flow control
Traffic shaping
Traffic policing (communications)
Flow network in graph theory
IP Flow Information Export
Path (graph theory)
Stream (computing)
Telecommunication circuit
Traffic generation model
References
Inter-process communication
Streaming
Packets (information technology)
Computer networking |
28399034 | https://en.wikipedia.org/wiki/Inventory%20management%20software | Inventory management software | Inventory management software is a software system for tracking inventory levels, orders, sales and deliveries. It can also be used in the manufacturing industry to create a work order, bill of materials and other production-related documents. Companies use inventory management software to avoid product overstock and outages. It is a tool for organizing inventory data that before was generally stored in hard-copy form or in spreadsheets.
Features
Inventory management software is made up of several key components working together to create a cohesive inventory of many organization's systems. These features include:
Reorder point
Should inventory reach a specific threshold, a company's inventory management system can be programmed to tell managers to reorder that product. This helps companies avoid running out of products or tying up too much capital in inventory.
Asset tracking
When a product is in a warehouse or store, it can be tracked via its barcode and/or other tracking criteria, such as serial number, lot number or revision number. Systems. for Business, Encyclopedia of Business, 2nd ed. Nowadays, inventory management software often utilizes barcode, radio-frequency identification (RFID), and/or wireless tracking technology.
Service management
Companies that are primarily service-oriented rather than product-oriented can use inventory management software to track the cost of the materials they use to provide services, such as cleaning supplies. This way, they can attach prices to their services that reflect the total cost of performing them.
Product identification
Barcodes are often the means whereby data on products and orders are inputted into inventory management software. A barcode reader is used to read barcodes and look up information on the products they represent. Radio-frequency identification (RFID) tags and wireless methods of product identification are also growing in popularity.
Modern inventory software programs may use QR codes or NFC tags to identify inventory items and smartphones as scanners. This method provides an option for businesses to track inventory using barcode scanning without a need to purchase expensive scanning hardware.
Inventory optimization
A fully automated demand forecasting and inventory optimization system to attain key inventory optimization metrics such as:
Reorder point: the number of units that should trigger a replenishment order
Order quantity: the number of units that should be reordered, based on the reorder point, stock on hand and stock on order
Lead demand: the number of units that will be sold during the lead time
Stock cover: the number of days left before a stockout if no reorder is made
Accuracy: the expected accuracy of the forecasts
History
The Universal Product Code (UPC) was adopted by the grocery industry in April 1973 as the standard barcode for all grocers, though it was not introduced at retailing locations until 1974. This helped drive down costs for inventory management because retailers in the United States and Canada didn't have to purchase multiple barcode readers to scan competing barcodes. There was now one primary barcode for grocers and other retailers to buy one type of reader for.
In the early 1980s, personal computers began to be popular. This further pushed down the cost of barcodes and readers. It also allowed the first versions of inventory management software to be put into place. One of the biggest hurdles in selling readers and barcodes to retailers was the fact that they didn't have a place to store the information they scanned. As computers became more common and affordable, this hurdle was overcome. Once barcodes and inventory management programs started spreading through grocery stores, inventory management by hand became less practical. Writing inventory data by hand on paper was replaced by scanning products and inputting information into a computer by hand.
Starting in the early 2000s, inventory management software progressed to the point where businesspeople no longer needed to input data by hand but could instantly update their database with barcode readers.
Also, the existence of cloud based business software and their increasing adoption by businesses mark a new era for inventory management software. Now they usually allow integrations with other business backend processes, like accounting and online sales.
Purpose
Companies often use inventory management software to reduce their carrying costs. The software is used to track products and parts as they are transported from a vendor to a warehouse, between warehouses, and finally to a retail location or directly to a customer.
Inventory management software is used for a variety of purposes, including:
Maintaining a balance between too much and too little inventory.
Tracking inventory as it is transported between locations.
Receiving items into a warehouse or other location.
Picking, packing and shipping items from a warehouse.
Keeping track of product sales and inventory levels.
Cutting down on product obsolescence and spoilage.
Avoiding missing out on sales due to out-of-stock situations.
Manufacturing uses
Manufacturers primarily use inventory management software to create work orders and bills of materials. This facilitates the manufacturing process by helping manufacturers efficiently assemble the tools and parts they need to perform specific tasks. For more complex manufacturing jobs, manufacturers can create multilevel work orders and bills of materials, which have a timeline of processes that need to happen in the proper order to build a final product. Other work orders that can be created using inventory management software include reverse work orders and auto work orders. Manufacturers also use inventory management software for tracking assets, receiving new inventory and additional tasks businesses in other industries use it for.
Advantages of ERP inventory management software
There are several advantages to using inventory management software in a business setting.
Cost savings
A company's inventory represents one of its largest investments, along with its workforce and locations. Inventory management software helps companies cut expenses by minimizing the amount of unnecessary parts and products in storage. It also helps companies keep lost sales to a minimum by having enough stock on hand to meet demand.
Increased efficiency
Inventory management software often allows for automation of many inventory-related tasks. For example, software can automatically collect data, conduct calculations, and create records. This not only results in time savings, cost savings, but also increases business efficiency.
Warehouse organization
Inventory management software can help distributors, wholesalers, manufacturers and retailers optimize their warehouses. If certain products are often sold together or are more popular than others, those products can be grouped together or placed near the delivery area to speed up the process of picking.
By 2018, 66% of warehouses "are poised to undergo a seismic shift, moving from still prevalent pen and paper processes to automated and mechanized inventory solutions. With these new automated processes, cycle counts will be performed more often and with less effort, increasing inventory visibility, and leading to more accurate fulfillment, fewer out of stock situations and fewer lost sales. More confidence in inventory accuracy will lead to a new focus on optimizing mix, expanding a selection and accelerating inventory turns."
Updated data
Up-to-date, real-time data on inventory conditions and levels is another advantage inventory management software gives companies. Company executives can usually access the software through a mobile device, laptop or PC to check current inventory numbers. This automatic updating of inventory records allows businesses to make informed decisions.
Data security
With the aid of restricted user rights, company managers can allow many employees to assist in inventory management. They can grant employees enough information access to receive products, make orders, transfer products and do other tasks without compromising company security. This can speed up the inventory management process and save managers' time.
Insight into trends
Tracking where products are stocked, which suppliers they come from, and the length of time they are stored is made possible with inventory management software. By analysing such data, companies can control inventory levels and maximize the use of warehouse space. Furthermore, firms are more prepared for the demands and supplies of the market, especially during special circumstances such as a peak season on a particular month. Through the reports generated by the inventory management software, firms are also able to gather important data that may be put in a model for it to be analyzed.
Disadvantages of ERP inventory management software
The main disadvantages of inventory management software are its cost and complexity.
Expense
Cost can be a major disadvantage of inventory management software. Many large companies use an ERP as inventory management software, but small businesses can find it difficult to afford it. Barcode readers and other hardware can compound this problem by adding even more cost to companies. The advantage of allowing multiple employees to perform inventory management tasks is tempered by the cost of additional barcode readers. Use of smartphones as QR code readers has been a way that smaller companies avoid the high expense of custom hardware for inventory management.
Complexity
Inventory management software is not necessarily simple or easy to learn. A company's management team must dedicate a certain amount of time to learning a new system, including both software and hardware, in order to put it to use. Most inventory management software includes training manuals and other information available to users. Despite its apparent complexity, inventory management software offers a degree of stability to companies. For example, if an IT employee in charge of the system leaves the company, a replacement can be comparatively inexpensive to train compared to if the company used multiple programs to store inventory data.
Benefits of cloud inventory management software
The main benefits of a cloud inventory management software include:
Real-time tracking of inventory
For startups and SMBs, tracking inventory in real time is very important. Not only can business owners track and collect data but also generate reports. At the same time, entrepreneurs can access cloud-based inventory data from a wide range of internet-enabled devices, including smartphones, tablets, laptops, as well as traditional desktop PCs. In addition, users do not have to be inside business premises to use web-based inventory program and can access the inventory software while on the road.
Cut down hardware expenses
Because the software resides in the cloud, business owners do not have to purchase and maintain expensive hardware. Instead, SMBs and startups can direct capital and profits towards expanding the business to reach a wider audience. Cloud-based solutions also eliminate the need to hire a large IT workforce. The service provider will take care of maintaining the inventory software.
Fast deployment
Deploying web based inventory software is quite easy. All business owners have to do is sign up for a monthly or yearly subscription and start using the inventory management software via the internet. Such flexibility allows businesses to scale up relatively quickly without spending a large amount of money.
Easy integration
Cloud inventory management software allows business owners to integrate with their existing systems with ease. For example, business owners can integrate the inventory software with their eCommerce store or cloud-based accounting software. The rise in popularity of 3rd party marketplaces, such as Amazon, eBay and Shopify, prompted cloud-based inventory management companies to include the integration of such sites with the rest of a business owner's retail business, allowing one to view and control stock across all channels.
Enhanced efficiency
Cloud inventory systems increase efficiency in a number of ways. One is real-time inventory monitoring. A single change can replicate itself company-wide instantaneously. As a result, businesses can have greater confidence in the accuracy of the information in the system, and management can more easily track the flow of supplies and products – and generate reports. In addition, cloud-based solutions offer greater accessibility.
Improved coordination
Cloud inventory programs also allow departments within a company to work together more efficiently. Department A can pull information about Department B's inventory directly from the software without needing to contact Department B's staff for the information. This inter-departmental communication also makes it easier to know when to restock and which customer orders have been shipped, etc. Operations can run more smoothly and efficiently, enhancing customer experience. Accurate inventory information can also have a huge impact on a company's bottom line. It allows you to see where the bottlenecks and workflow issues are – and to calculate break-even points as well as profit margins.
Disadvantages of cloud inventory management software
Security and privacy
Using the cloud means that data is managed by a third party provider and there can be a risk of data being accessed by unauthorized users.
Dependency
Since maintenance is managed by the vendor, users are essentially fully dependent on the provider.
Decreased flexibility
Depending on the cloud service provider, system and software upgrades will be performed based on their schedule, hence businesses may experience some limitations in flexibility in the process.
Integration
Not all on-premises systems or service providers can be synced with the cloud software used.
See also
Enterprise resource planning
Document automation
Inventory control system
Operations management
Supply chain management
Vendor-managed inventory
Warehouse management system
References
Inventory
Logistics
Manufacturing software |
44152621 | https://en.wikipedia.org/wiki/Sanghamitra%20Bandyopadhyay | Sanghamitra Bandyopadhyay | Sanghamitra Bandyopadhyay (born 1968) is an Indian computer scientist specializing in computational biology. A professor at the Indian Statistical Institute, Kolkata, she is a Shanti Swarup Bhatnagar Prize winner in Engineering Science for 2010 and an Infosys Prize 2017 laureate in the Engineering and Computer Science category. Her research is mainly in the areas of evolutionary computation, pattern recognition, machine learning and bioinformatics. Since 1 August 2015, she has been the Director of the Indian Statistical Institute, and she would oversee the functioning of all five centres of Indian Statistical Institute located at Kolkata, Bangalore, Delhi, Chennai, and Tezpur besides several other Statistical Quality Control & Operation Research Units spread across India. She is the first woman Director of the Indian Statistical Institute. Currently she is on the Prime Ministers' Science, Technology and Innovation Advisory Council.
Education and career
Sanghamitra Bandyopadhyay obtained a bachelor of science in physics from Presidency College, Kolkata before obtaining another bachelor's degree (of technology) in Computer Science in 1992 from Rajabazar Science College Campus of University of Calcutta. She then obtained a master's degree in computer science from the Indian Institute of Technology, Kharagpur before pursuing a Ph. D. at the Indian Statistical Institute, obtaining it in 1998.
Awards and honours
Padma Shri for Science and Engineering, by Government of India, 2022
TWAS Prize for Engineering Sciences, by TWAS, 2018 The World Academy of Sciences 2018.
Infosys Prize 2017 in Engineering and Computer Science
Distinguished Alumnus Award, IIT Kharagpur, 2017
Shanti Swarup Bhatnagar Prize in Engineering Science, 2010
J. C. Bose Fellowship
Senior Associate, International Centre for Theoretical Physics (ICTP), Trieste, Italy, 2013-2019.
Humboldt Fellowship from AvH Foundation, Germany, 2009-2010.
Swarnajayanti Fellowship, 2006-2007.
Fellow, The World Academy of Sciences (TWAS), 2019.
Fellow, Indian National Science Academy (INSA), 2016.
IEEE Fellow, 2016
Fellow, Indian National Academy of Engineering (INAE), 2012.
Fellow, National Academy of Sciences, India (NASI), Allahabad, 2010.
References
External links
times of India
ISI faculty personal page
1968 births
Living people
University of Calcutta alumni
Indian Statistical Institute faculty
Date of birth missing (living people)
Place of birth missing (living people)
TWAS laureates
Recipients of the Shanti Swarup Bhatnagar Award in Engineering Science
Scientists from Kolkata |
14909851 | https://en.wikipedia.org/wiki/Philips%20%3AYES | Philips :YES | The Philips :YES was a home computer/personal computer released by Philips Austria, in 1985. It was not 100% compatible with the IBM PC, a reason given for its commercial failure. The system was sold in limited quantities only.
Technical specifications
Microprocessor: Intel 80186 @ 8 MHz
ROM: 192 KiB
RAM: 128 to 640 KiB
Keyboard: mechanical, with 93 keys
Operating system: DOS Plus (in 64 KiB ROM), MS-DOS, Concurrent DOS
Storage: two 3½-inch drives, 720 KiB each. One or two optional external 3½-inch or 5¼-inch drives.
Video modes:
A0: Text, 40 columns × 25 rows, 8 colours
A1: Text, 80 columns × 25 rows, 8 colours
A2: Text, 80 columns × 25 rows, 2 colours + intensity
G0: 160 × 252 pixels, 16 colours
G1: 640 × 252 pixels, 2 colours + intensity
G2: 320 × 252 pixels, 16 colours
G3: 640 × 252 pixels, 4 colours
The built-in graphics hardware supported composite video output. An additional video module allowed output to TTL monochrome monitors, colour monitors or SCART televisions.
Video RAM was shared with system RAM. Before using graphics modes, memory had to be allocated for them with the GRAPHICS or GRCHAR commands.
An expansion card (the Professional Expansion Board) provided:
Extra RAM.
A SASI/SCSI hard-drive interface.
A mouse interface.
A battery-backed real-time clock.
An additional expansion card was available in limited quantity (probably only sold in the Netherlands directly to Philips employees) to make it 100% IBM PC compatible. This card was made of two separate cards, one for the actual compatibility, which ended in an 8 bit ISA slot, where an Hercules Graphics Card monochrome videocard was plugged in. This also meant that using this card, would require to plug the monitor into the new videocard, bypassing the onboard graphical card. This expansion card made it possible to run all DOS programs (including popular games at that time).
Operating system versions
Known operating systems adapted for the Philips :YES include:
DOS Plus 1.? in ROM (with BDOS 4.1). The BDOS in ROM does not implement the S_OSVER call, which would have returned the version number to display.
DOS Plus 1.1 on disk (with BDOS 4.1)
DOS Plus 1.2 on disk (with BDOS 4.1)
DOS Plus 2.1 on disk (with BDOS 5.0)
Concurrent DOS
MS-DOS 2.??
MS-DOS 3.10
See also
Rodime (manufacturer of internal hard disk)
MSX-DOS
References
External links
Computermuseum München: Philips :Yes (in German)
(with pictures)
Personal computers
Philips products |
1655028 | https://en.wikipedia.org/wiki/Apple%20community | Apple community | The Apple community is a group of people interested in Apple Inc. and its products, who report information in various media. Generally this has evolved into a proliferation of websites, but latterly has also expanded into podcasts (both audio and video), either speculating on rumors about future product releases, simply report Apple-related news stories, or have discussions about Apple's products and how to use them.
Such stories and discussions may include topics related to physical products like the Macintosh and iOS devices (e.g., the iPhone, iPod, and iPad); software and operating systems, like Final Cut Pro, Logic Pro X, iWork, iOS, and macOS; or even services Apple offers like iCloud, iTunes Store, or Apple Music. Apple enjoys a cult-like following for its platforms, especially following the massive increase in popularity for the brand brought about by the huge increase in sales for all its products that started around the time the company introduced the original iPod in late 2001. The mass usage of computing devices in everyday life, mixed with Apple's vertical integration of its products and services, has helped to bring about this increase in popularity, and combined with a tight-lipped corporate policy about future products, helped foster an interest in the company's activities.
Sites and publishers
The Apple community is made up of several websites which exclusively, or almost exclusively, specialize in Apple products. Some have ceased operation, but a great many continue to run successfully.
In addition to these purely Apple info sites, most other mainstream technology journalism sites, including Ars Technica, CNET, Engadget, Gizmodo, iFixIt, Slashdot, and GigaOM include Apple sections, and many prominent bloggers also talk extensively about Apple products, including John Gruber's DaringFireball.
9to5Mac
9to5Mac was founded in 2007 by Seth Weintraub as an Apple news website originally focused on Macs in the enterprise. Since then, the website has expanded to covering all things Apple. 9to5Mac is known as the leading website within the Apple News Community in terms of breaking impactful news. The site gained fame in its earlier years for publishing the first photos of the third-generation iPod nano, the original iPod touch, early photos of the first iPhone, and details about Apple's still-in-use aluminum manufacturing process for laptops. In recent years, 9to5Mac published the first accurate details about the iPhone 4S, Siri, Apple's move from Google Maps to Apple Maps, new health and fitness applications, OS X updates, and the Apple Watch. The site also published the first photos of the white iPad 2, iPhone 5, and the iPad Air.
iMore
iMore is a Canadian website founded in 2008, previously as Phonedifferent, with its main focus on all aspects of Apple devices (also featuring sections on several other platforms). It was run by editor-in-chief Rene Ritchie with a small editing staff until 2020. As of January 1, 2021, it is edited by Joseph Keller. Along with the usual news and rumors, iMore often features in-depth technical details of Apple software and operating systems, aimed at explaining to readers how and why certain things have been done by Apple, in their wider context of achieving better usability and design goals.
Low End Mac
Low End Mac is an Apple-centric website founded in 1997 to support Mac users with early Mac hardware and growing over time to cover the entire range of Macs, as each line eventually had model years falling into the “vintage and obsolete” category. Low End Mac's primary focus is on aging Apple gear, primarily Macs, but touching on iPhone, iPad, iPod, Apple TV, and other devices as well. It is published by its founder Daniel Knight with a small volunteer writing staff.
MacDailyNews
MacDailyNews has been published since September 2002, years ago. MacDailyNews was cited by CNet as its source for the launch of the first Verizon (CDMA-capable) iPhone after Christmas, 2010; the phone was announced by Verizon in early 2011. The site was also cited by DaringFireball as the source for AT&T's best yet iPhone launch in 2009. It was also cited by MacRumors with a forecast for the second generation Mac Pro in April 2013; Apple announced it in June.
MacIssues
MacIssues is the renewal of what began in March 1996 as "MacFixIt," an update site for Ted Landau's Mac troubleshooting book "Sad Macs, Bombs and Other Disasters". The site was originally called "The Sad Macs Update Site" but was renamed to MacFixIt after hosting problems. The site has changed hands, being sold to TechTracker in July 2000, which was purchased by CNET in 2007. With CBS Interactive's acquisition of CNET in 2008, MacFixIt was integrated into the main CNET blog structure. MacFixIt was discontinued by CNET, but the site has spawned MacIssues.com, which continues to offer daily Mac-related troubleshooting, how-to, and review articles, and is written primarily by Christopher (Topher) Kessler.
MacOS Rumors
MacOS Rumors was founded by Ethan C. Allen in 1995 as the first known "Apple rumors" website on the early web. His early work was noticed and referenced by other print media including CNET, Forbes, and Mac the Knife in MacWEEK. Allen was only 16 at the time but had developed extensive source contacts. Apple, at the time, was unhappy with some of the releases on the site which proved to be early and accurate. Apple contacted Allen a number of times requesting he stop releasing data from his sources. After a brief shutdown of the site at the request of Apple, the MacOS Rumors site was obtained by Ryan Meader after a domain expiration within two years of its creation. Originally with Ethan, the site posted most of its rumors based on screenshots and info sent via email from followers. With Ryan at the helm, MacOS Rumors collected content from message boards and usenet posts but later claimed (unsubstantiated) to have developed contacts inside Apple. After a number of successful years, MacOS Rumors gained a reputation for being inaccurate. Meader had allowed the MacOS Rumors domain name to expire around July 16, 2007, but then renewed the domain for another nine years. In the past half-decade, the site hasn't been updated at all and has no current staff.
After the MacOS Rumors site was obtained by Ryan in 1997, Ethan tried to briefly return to Apple rumors with his sources by creating a new website titled Mac Rumor Mill. Apple quickly caught onto the new site and was able to shut it down with threatened legal action.
MacRumors
MacRumors was launched in February 2000 by Arnold Kim, as an aggregator of Mac-related rumors and reports around the web. MacRumors attempts to keep track of the rumor community by consolidating reports and cross-referencing claims.
Macworld
Macworld is one of the oldest magazine publications focused on Apple products and software, starting in 1984. It received competition with the launch of MacUser the following year. The two magazines merged under the "Macworld" name in 1997. In September 2014 it discontinued its print edition, instead focusing on its website and YouTube coverage only.
SecureMac
SecureMac was founded in 1999 as a Mac-oriented security news portal. The site has expanded to cover a wide range of digital security and privacy topics, but has retained its focus on Apple products and software. In 2016, SecureMac launched The Checklist, a weekly security-themed podcast aimed at iOS and macOS users. SecureMac has been credited with discovering several significant macOS threats, including the Boonana Trojan, a new variant of the rogue security program Mac Defender.
Think Secret
Think Secret appeared in 1999. Apple filed a lawsuit against the company alleging it printed stories containing Apple trade secrets. In December 2007 the lawsuit was settled with no sources being disclosed; however, the site was shut down, finally closing on February 14, 2008.
In the year leading up to the closing of the site, Think Secret correctly predicted an aluminum shell iMac, development of a touchscreen based iPod starting in 2006, and the relative BlackBerry-esque form factor of the new iPod Nano. However, there were still some reports that turned out to be false, such as its prediction of the demise of the Mac Mini, when it received an upgrade in mid-2007, albeit with no fanfare.
TUAW (The Unofficial Apple Weblog)
The Unofficial Apple Weblog (TUAW) was founded in 2004, and claimed to be "a resource for all things Apple and beyond". TUAW published news stories, credible rumors, and how-tos covering a variety of topics daily. TUAW was known for its rumor roundups, seeking to dispel false Apple rumors from around the web. On February 3, 2015, TUAW was shut down by its owners, Weblogs, Inc.
The Apple Post
The Apple Post launched in 2014 as an Apple news aggregator, and later reformed in 2016 to publish original content based on Apple products and services. The site offers news, rumors and how-to stories covering Apple's range of hardware, software and services.
The Apple Post was cited for sharing the first pictures of Apple's complete Apple Park Visitors Center prior to its official opening in 2017 and has been regularly featured within tabloid British newspaper Metro (British newspaper).
Apple Today (Appl Today)
Apple Today (Appl Today), formerly known as Euri Tech News, is an American website founded in the summer of 2021. With a primary emphasis on all aspects of Apple devices. EuriTech, a Filipino, is the company's editor-in-chief and CEO. With only about 7 employees, Apple Today is definitely on the smaller side.
Apple Scoop
Apple Scoop is a non-profit news website founded in 2020 that focuses on bringing tech news (specifically related to Apple Inc.) to the public, ad-free. Apple Scoop first gained traction in 2020 from its now-popular Instagram and Twitter accounts. Apple Scoop’s website and CMS were designed from the ground up to create a better experience for users, and because its website doesn’t rely on ad revenue, Apple Scoop strives to "only publish a small amount of the most crucial stories per day." Apple Scoop is run by a small team of volunteers from around the world.
Macintosh User Groups
Macintosh User Groups (MUGs) are a group of people who use Macintosh computers made by Apple Inc. or other manufacturers and who use the Apple Macintosh operating system (OS). These groups are primarily locally situated and meet regularly to discuss Macintosh computers, the macOS, software and peripherals that work with these computers. Some groups focus on the older versions of macOS, up to macOS 9, but the majority now focus on the current version of macOS, macOS Big Sur. These user groups began with the formation of the Apple User Group Connection.
The Mac Observer
The Mac Observer is a website that publishes Mac, iPhone, and Apple related news, reviews, tips, and podcasts. The site was launched on December 29, 1998 by Dave Hamilton and Bryan Chaffin. The site has evolved from just providing news and reviews to now hosting popular podcasts, columns, and more.
History
The macobserver.com domain was registered on December 17, 1998 and the site launched on December 29 of that same year. The Mac Observer came into existence when Dave Hamilton and Bryan Chaffin acquired Webintosh from Dan Hughes, an Apple-focused site which ran for three years prior.
Podcasts
Starting in 2005, The Mac Observer has been developing its own podcasts and continues producing them to this day. Current podcasts include Mac Geek Gab (hosted by Dave Hamilton and John F. Braun), Media+(hosted by Charlotte Henry), The Apple Context Machine (hosted by Bryan Chaffin), and The Mac Observer's Daily Observations (hosted by Kelly Guimont).
Apple evangelist
An Apple evangelist, also known as Mac(intosh) evangelist or Mac advocate, is a technology evangelist for Apple products.
The term "software evangelist" was coined by Mike Murray of the Macintosh division. Apple's first evangelist was Mike Boich, a member of the original Macintosh development team. Alain Rossmann succeeded him. Their job was to promote Apple products, primarily by working with third-party developers. Boich and Rossmann later took part in the founding of Radius together.
One prominent Apple evangelist is Apple Fellow Guy Kawasaki. Kawasaki is credited as being one of the first to use evangelistic methods to promote a computer platform through a blog. Apple formerly had a "Why Mac?" evangelist site. The page no longer exists, but the company subsequently ran Get a Mac, which gave numerous reasons why "PC users" should switch to Macs. Several third-parties still host and maintain Apple evangelism websites, many of which are listed above. The AppleMasters program was a similar endeavor in the late nineties.
In the early days of the Macintosh computer, the primary function of an evangelist was to convince software developers to write software products for the Macintosh. When software developers need help from within Apple, evangelists will often act as go-betweens, helping the developers to find the right people at Apple to talk to. This role is now filled by the Apple Developer program, led by Phil Schiller.
Apple's response
Apple's official stance on speculation around any future product releases, is that they do not directly comment on such speculation nor discuss any products, until they are finally released. Historically, Apple has often used legal means, such as cease and desist orders, in order to retain trade secrets, intellectual property, or confidential corporate information, when needed. Typically, Apple has primarily pursued the leakers of information themselves, rather than any sites containing rumors on their products. However, Apple's suit against Think Secret in 2005 targeted whether these sites have the right to knowingly publish this protected information. Staff are also required to sign non-disclosure clauses within the company.
During his January 10, 2006 keynote address to the Macworld Conference & Expo in San Francisco, Apple's then CEO Steve Jobs poked fun at the rumors community by pretending to create a "Super Secret Apple Rumors" podcast during his demonstration of new features in GarageBand.
On October 16, 2014 at an Apple Special Event keynote, Craig Federighi pretended to "triple down on secrecy" by hiring Stephen Colbert as "Supreme Commander of Secrecy." He poked fun at the "spaceship" rumors.
See also
Operating system advocacy
Rumor
References
Community
Macintosh websites
Apple Inc. user groups
Fandom |
45261073 | https://en.wikipedia.org/wiki/Industrial%20Internet%20Consortium | Industrial Internet Consortium | The Industrial Internet Consortium rebranded as the Industry IoT Consortium in August 2021. The Industry IoT Consortium is a program of the Object Management Group (OMG).
The Industry IoT Consortium (IIC) is an open membership organization, with 159 members as of 27 September 2021. The IIC was formed to accelerate the development, adoption and widespread use of interconnected machines and devices and intelligent analytics. Founded by AT&T, Cisco, General Electric, IBM, and Intel in March 2014, the IIC catalyzes and coordinates the priorities and enabling technologies of the Industrial Internet. In August 2021, the organization changed its mission to deliver transformative business value to industry, organizations, and society by accelerating adoption of a trustworthy internet of things. No products or services are sold.
Its current executive director is Richard Soley. Stephen J. Mellor serves as Chief Technical Officer for the Industry IoT Consortium.
History
The Industrial Internet Consortium (IIC) was founded on 27 March 2014 by AT&T, Cisco, General Electric, IBM, and Intel. Though its parent company is the Object Management Group, the IIC is not a standards organization. Rather, the consortium was formed to bring together industry players — from multinational corporations, small and large technology innovators to academia and governments — to accelerate the development, adoption and widespread use of Industrial Internet technologies.
The mission has changed over the years from a focus on growing an industrial internet market to one more focussed on connectivity and trustworthiness to one focused on digital transformation and deployments. The mission, from August 2020, was "To deliver transformative business value to organizations, industry and society by accelerating adoption of a trustworthy internet of things".
Specifically, the IIC members are concerned with creating an ecosystem for insight and thought leadership, interoperability and security via reference architectures, security frameworks and open standards, and real world implementations to vet technologies and drive innovations (called testbeds). The IIC Technology Working Group ratified an Industrial Internet reference architecture on 17 June 2015, which defines functional areas and the technologies and standards for them, from sensors to data analytics and business applications.
Testbeds
The development of testbeds to demonstrate the real-world implementation of Industrial Internet solutions is one of the goals of the IIC. As of September 2021, the Consortium has publicly announced 27 testbeds:
Track and Trace
The Track and Trace testbed brings the Industrial Internet onto the factory floor. The goal is to manage handheld power tools in manufacturing and maintenance environments. This "management" involves efficiently tracking and tracing the usage of these tools to ensure their proper use, prevent their misuse and collect data on their usage and status.
Today's factories are highly sophisticated and require exacting work - down to the precise amount of force used to tighten a screw. The tools in Track and Trace will be able to determine its precise location and use and, therefore, will be able to determine the force and work needed to complete a task. In addition, if a tool recognizes that it is being misused, it will promptly power down to avoid accident or injury. Finally, over the two-year project, the testbed participants will look to fine-tune the localization of tools to 30 centimeters, and ideally down to five centimeters. Currently, the accuracy is approximately one meter. These features of Track and Trace will contribute to the safety and quality of the goods produced, as well as increase productivity in manufacturing.
Over the two-year project, four Industrial Internet Consortium members will be lending their expertise to the testbed. Bosch is supplying the necessary software; Cisco is taking care of the precision location identification feature; National Instruments will interconnect the power tools; and Tech Mahindra is responsible for the application programming.
Communication & Control Testbed For Microgrid Applications
The Communication & Control Testbed for Microgrid Applications brings the Industrial Internet to the energy industry. The testbed proposes redesigning the traditional power grid system into a series of microgrids. Microgrids rely on distributed energy generation making them more resilient to power outages. Additionally, microgrids aid in the integration of green energy sources, such as solar and wind. The goal of the testbed is to prove the viability of a real-time, secure databus to facilitate machine-to-machine, machine-to-control center, and machine-to-cloud data communications. It will combine distributed, edge-located processing and control applications with intelligent analytics. It will run in real-world power applications and interface with practical equipment. This testbed is a collaborative effort from IIC members Real-Time Innovations, National Instruments, and Cisco. There will also be collaboration with Duke Energy and the Standard Grid Interoperability Panel (SGIP) to ensure a coordinated, accepted architecture.
Asset Efficiency Testbed
Many industries have assets that are critical to their business processes. Availability and efficiency of these assets directly impact service and business. Using predictive analytics, the Asset Efficiency Testbed aims to collect real-time asset information efficiently and accurately and run analytics to make the right decisions in terms of operations, maintenance, overhaul and asset replacement. Infosys, a member of the Industrial Internet Consortium, is leading this project, with contribution from Consortium members Bosch, General Electric, IBM, Intel, National Instruments, and PTC.
Asset Efficiency is a vertical testbed, making it possible for the testbed to be applied to multiple solutions. The testbed will launch in two phases. In the first phase, the testbed will be created for a moving solution, in this case, aircraft landing gear. The focus of this phase will be on the creation of stack and the integration of technologies. In the second phase, the testbed will address fixed assets, like chillers, with the goals of finalizing the architecture and opening up the interfaces.
The Asset Efficiency Testbed monitors, controls and optimizes the assets holistically taking into consideration operational, energy, maintenance, service, and information efficiency and enhance their performance utilization.
Edge Intelligence Testbed
Many emerging industrial IoT applications require coordinated, real-time analytics at the "edge", using algorithms that require a scale of computation and data volume/velocity previously seen only in the data center. Frequently, the networks connecting these machines do not provide sufficient capability, bandwidth, reliability, or cost structure to enable analytics-based control or coordination algorithms to run in a separate location from the machines.
Industrial Internet Consortium members Hewlett-Packard and Real-Time Innovation have joined on the Edge Intelligence Testbed. The primary objective of the Edge Intelligence Testbed is to significantly accelerate the development of edge architectures and algorithms by removing the barriers that many developers face: access to a wide variety of advanced compute hardware and software configurable to directly resemble state-of-the-art edge systems at very low cost to the tester/developer.
Factory Operations Visibility & Intelligence Testbed
The Factory Operations Visibility & Intelligence (FOVI) Testbed makes it possible to simulate a factory environment in order to visualize results that can then be used to determine how the process can be optimized. The work on FOVI stems from two separate Operations Visibility and Intelligence applications in two factories in Japan: one for notebook computers and another for network appliances. Both use cases have a lot in common with respect to processing data, analytics, and visualization technologies. Ideally they should use a common software foundation while their future evolution requires a more open architecture.
Work on the testbed will be led by Industrial Internet Consortium member Fujitsu Limited with Industrial Internet Consortium founding member, Cisco, collaborating on the in-factory testbed edge infrastructure.
High Speed Network Infrastructure Testbed
The High-Speed Network Infrastructure testbed will introduce high-speed fiber optic lines to support Industrial Internet initiatives. The network will transfer data at 100 gigabits per second to support seamless machine-2-machines communications and data transfer across connected control systems, big infrastructure products, and manufacturing plants.
The 100 gigabit capability extends to the wireless edge, allowing the testbed leaders to provide more data and analytical results to mobile users through advanced communication techniques. Industrial Internet Consortium founder, General Electric, is leading efforts by installing the networking lines at its Global Research Center. Cisco - also a founder of the Consortium - contributed its expertise to the project by providing the infrastructure needed to give the network its national reach. Industrial Internet Consortium members Accenture and Bayshore Networks are currently demonstrating the application of the High-Speed Network Infrastructure for power generation.
Industrial Digital Thread Testbed
The Industrial Digital Thread (IDT) testbed drives efficiency, speed, and flexibility through digitization and automation of manufacturing processes and procedures. Beginning at design, the seamless digital integration of design systems into manufacturing, leveraging the model-based enterprise, helps to enable virtual manufacturing before even one physical part is created. Sensor enabled automation, manufacturing processes, procedures, and machine data will enable optimization in operations and supply chain. Once the manufacturing process is complete, the digital ‘birth certificate’ (as built-signature) can then be compared to the as-designed engineering intention. This provides the opportunity for powerful big data analytics to enable service teams and field engineers to have better awareness, insights, and practical actions to improve the servicing and maintenance of critical assets.
The Industrial Digital Thread is a complex and comprehensive concept and it will be implemented in multiple phases. Phase 1 focuses on assembling the software stack, establishing the architecture and connectivity, and addressing one use case around premature wear. Throughout Phase 1, the testbed will be run by IIC members General Electric and Infosys. In subsequent phases, this testbed will be able to support multiple use cases in design, manufacturing, services and supply-chain optimization. At this time, additional members will be invited to join.
INFINITE Testbed
The goal of the International Future Industrial Internet Testbed (INFINITE) is to develop software-defined infrastructures to drive the growth of Industrial Internet products and services. INFINITE uses Big Data to not only create completely virtual domains with Software-Defined Networking, but it also makes it possible for multiple virtual domains to securely run via one physical network - thus making it ideal for use in mission critical systems. Even more interesting, INFINITE makes it possible to connect to these virtual domains through mobile networks.
Industrial Internet Consortium member, EMC Corporation, is leading the INFINITE testbed. Also contributing their expertise to this project is Industrial Internet Consortium member Cork Institute of Technology, as well as Vodafone, the Irish Government Networks, Asavie and Cork Internet Exchange.
The testbed will unfold in two phases in Ireland. In Phase One, three geographically dispersed data centers will be interconnected into a reconfigured EMC network. In Phase Two, INFINITE will be applied to a use case called "Bluelight". Bluelight will allow ambulances to securely connect to a hospital's system and relay information while en route, so hospital staff are prepared to take over the care of the patient once the ambulance arrives.
The INFINITE testbed is open to any Industrial Internet Consortium member as well as interested nonmembers companies who have a concept for an IoT-enabled solution that requires mobile communication and a dynamic configuration environment.
Condition Monitoring and Predictive Maintenance Testbed
The Condition Monitoring and Predictive Maintenance Testbed (CM/PM) will demonstrate the value and benefits of continuously monitoring industrial equipment to detect early signs of performance degradation or failure. CM/PM will also use modern analytical technologies to allow organizations to not only detect problems but proactively recommend actions for operations and maintenance personnel to correct the problem.
Condition Monitoring (CM) is the use of sensors in equipment to gather data and enable users to centrally monitor the data in real-time. Predictive Maintenance (PM) applies analytical models and rules against the data to proactively predict an impending issue; then deliver recommendations to operations, maintenance and IT departments to address the issue. These capabilities enable new ways to monitor the operation of the equipment - such as turbines and generators - and processes and to adopt proactive maintenance and repair procedures rather than fixed schedule-based procedures, potentially saving money on maintenance and repair, and saving cost and lost productivity of downtime caused by equipment failures. Furthermore, combining sensor data from multiple pieces of equipment and/or multiple processes can provide deeper insight into the overall impact of faulty or sub-optimal equipment, allowing organizations to identify and resolve problems before they impact operations and improve the quality and efficiency of industrial processes.
Through this testbed, the testbed leaders IBM and National Instruments will explore the application of a variety of analytics technologies for condition monitoring and predictive maintenance. The testbed application will initially be deployed to a power plant facility where performance and progress will be reported on, additional energy equipment will be added, and new models will be developed. It will then be expanded to adjacent, as yet to be determined, industries.
Smart Airline Baggage Management Testbed
The Smart Airline Baggage Management testbed, part of a broader aviation ecosystem vision, is aimed at reducing the instances of delayed, damaged and lost bags leading to lower economic risk exposure to the airlines; increasing the ability to track and report on baggage including location and weight changes to prevent theft and loss; and improve customer satisfaction through better communication including offering new value-added services to frequent flyers.
The testbed is also aimed at helping airlines address the new baggage handling requirements set out by IATA in Resolution 753 requiring airlines to implement more comprehensive acquisition and delivery solutions for baggage tracking and handling by June 2018. This target is also outlined in the broader IATA 2015 White Paper titled “Simplifying the Business.”
Working Groups
As of September 2021, the IIC has six working groups. They are: Technology, Security, Liaison, Marketing, Industry and Digital Transformation. The last two reflect the drive to enable technology end users to deploy technology in their businesses and transform them digitally. (The Industry Working Group used to be called the Testbed Working Group, but now includes test drives and challenges, and groups focused on specific verticals. The Digital Transformation Working Group used to be named Business Strategy and Solution Lifecycle, but has now broadened its remit.) Each working has a number of subgroups to further specific challenges. Each IIC member company can assign company representatives to these groups.
References
External links
2014 establishments in Massachusetts
Consortia in the United States
Industrial computing
Internet-related organizations
Needham, Massachusetts
Organizations established in 2014
Technology consortia |
437887 | https://en.wikipedia.org/wiki/Audio%20editing%20software | Audio editing software | Audio editing software is any software or computer program, which allows editing and generating of audio data. Audio editing software can be implemented completely or partly as a library, as a computer application, as a web application, or as a loadable kernel module. Wave editors are digital audio editors. There are many sources of software available to perform this function. Most can edit music, apply effects and filters, adjust stereo channels, etc.
A digital audio workstation (DAW) consists of software to a great degree, and usually is composed of many distinct software suite components, giving access to them through a unified graphical user interface using GTK, Qt, or another library for the GUI widgets. DAWs are used for recording or producing music, sound effects and more.
History
The first Digital Audio Workstation was invented in the late 70s and early 80s. The first DAW was a digital recorder developed by Soundstream in 1977. In the 70s and 80s, the main challenges that was faced when creating this DAW was finding inexpensive storage that was fast enough to run a commercially viable DAW.
Digital audio workstations (DAW)
Ableton Live
Audacity
Cubase (and the lite Cubasis version)
FL Studio
Logic Pro
GarageBand
Pro Tools
REAPER
Reason
Korg Gadget 2
NanoStudio
Editors designed for use with music
Editors designed for use with music typically allow the user to do the following:
The ability to import and export various audio file formats for editing.
Record audio from one or more inputs and store recordings in the computer's memory as digital audio.
Edit the start time, stop time, and duration of any sound on the audio timeline.
Fade into or out of a clip (e.g. an S-fade out during applause after a performance), or between clips (e.g. crossfading between takes).
Mix multiple sound sources/tracks, combine them at various volume levels and pan from channel to channel to one or more output tracks
Apply simple or advanced effects or filters, including amplification, normalization, limiting, panning, compression, expansion, flanging, reverb, audio noise reduction, and equalization to change the audio.
Playback sound (often after being mixed) that can be sent to one or more outputs, such as speakers, additional processors, or a recording medium
Conversion between different audio file formats, or between different sound quality levels.
Typically these tasks can be performed in a manner that is non-linear. Audio editors may process the audio data non-destructively in real-time, or destructively as an "off-line" process, or a hybrid with some real-time effects and some off-line effects.
Editors designed for use in speech research
Editors designed for use in speech research add the ability to make measurements and perform acoustic analyses such as extracting and displaying a fundamental frequency contour or spectrogram. They typically lack most or all of the effects that interest musicians.
Plug-ins
Audio Plug-ins are small software programs that can be "plugged in" to use inside your main workstation. Plug-ins are used in DAWs to allow more capabilities when it comes to audio editing. There are several different types of plug-ins. For example, stock plug-ins are the basic plug-ins that come already installed with your DAW, and VST (Virtual Studio Technology) plug-ins. Invented by Steinberg, VST plug-ins allow producers to then apply simple or advanced effects such as filters, limiting, compression, reverb, flanging, panning, noise reduction, and equalizers.
MIDI vs Audio
MIDI (pronounced "middy") and audio are both compressed digital formats that are used within a Digital Audio Workspace (DAW). MIDI stands for Musical Instrument Digital Interface. MIDI is used with plug-ins which allow the user to control the notes of various plug-in instruments. MIDI is universally accepted and if one plug-in or synthesizer was used using MIDI, then it can be modified with another synthesizer. The filename extension of MIDI format is .MIDI or .MID. Unlike MIDI, Digital audio contains a recording of sound. Audio files are a lot larger than MIDI files, and while MIDI is smaller, MIDI can have variations from the original sounds.
Comparison of destructive and real-time editing
Destructive editing modifies the data of the original audio file, as opposed to just editing its playback parameters. Destructive editors are also known as "sample editors".
Destructive editing applies edits and processing directly to the audio data, changing the data immediately. If, for example, part of a track is deleted, the "deleted" audio data is immediately removed from that part of the track.
Real-time editing does not apply changes immediately but applies edits and processing on the fly during playback. If, for example, part of a track is deleted, the "deleted" audio data is not actually removed from the track, but is hidden and will be skipped on playback.
Advantages of destructive editing
In graphical editors, every change to the audio is usually visible immediately as the visible waveform is updated to match the audio data.
The number of effects that may be applied is virtually unlimited (though may be limited by disk space available for "undo" data).
Editing is usually precise down to exact sample intervals.
Effects may be applied to a precisely specified selected region.
Mixing down or exporting the edited audio is usually relatively quick as little additional processing is required.
Limitations of destructive editing
Once an effect has been applied, it cannot usually be changed. This is usually mitigated by the ability to "undo" the last performed action. Typically a destructive audio editor will maintain many levels of "undo history" so that multiple actions may be undone in the reverse order that they were applied.
Edits can only be undone in the reverse order that they were applied (undoing the most recent edit first).
Advantages of non-destructive (real-time) editing
Effects can usually be adjusted during playback, or at any other time.
Edits may be undone or adjusted at any time in any order.
Multiple effects and edits may be 'stacked' so that they are applied to the audio as an effect chain.
A stack of effects may be changed so that effects are applied in a different order, or effects inserted or removed from the chain.
Some real-time editors support effect automation so that changes to effect parameters may be programmed to occur at specified times during audio playback.
Limitations of non-destructive (real-time) editing
The waveform does not usually show the effect of processing until the audio has been mixed-down or "bounced" (rendered) to another track.
The number of effects that may be applied is limited by the available processing power of the computer or editing hardware. In some editors, this may be mitigated by "freezing" the track (applying the effect stack destructively).
It is not usually possible to have an effect only on part of a track. To apply a real-time effect to part of a track usually required that the effect is set to turn on at one point and turn off at another.
In multi-track editors, if audio is copied or moved from one track to another, the audio in the new track may sound different from how it sounded in the original track as there may be different real-time effects in each track.
In some applications, mixing down or exporting the edited audio may be slow as all effects and processing needs to be applied.
See also
Audio signal processing
Comparison of digital audio editors
Comparison of free software for audio
Digital audio workstation
List of music software
Music sequencer
Software effect processor
Software synthesizer
References
Sound technology |
6980611 | https://en.wikipedia.org/wiki/Novell%20Embedded%20Systems%20Technology | Novell Embedded Systems Technology | Novell Embedded Systems Technology (NEST) was a series of APIs, data formats and network protocol stacks written in a highly portable fashion intended to be used in embedded systems. The idea was to allow various small devices to access Novell NetWare services, provide such services, or use NetWare's IPX protocol as a communications system (and later also TCP/IP). Novell referred to this concept as "Extended Networks", and when the effort was launched they boasted that they wanted to see one billion devices connected to NetWare networks by year 2000. NEST was launched in mid-1994 countering Microsoft's similar Microsoft at Work efforts, which had been launched in 1993.
Neither technology saw much third-party support, although some of NEST's code was apparently re-used in Novell Distributed Print Services (NDPS), and thus iPrint.
Architecture
NEST consisted primarily of a Novell protocol driver stack implemented in ANSI C. The stack included drivers for then-popular networking hardware, including Ethernet, Token Ring, AppleTalk (actually referring to LocalTalk, a common confusion) and ISDN, as well as higher-level modules for protocols such as Novell's own IPX, and AppleTalk, and later TCP/IP.
The NetWare Services Layer added support for application protocols, notably NetWare client services such as file servers and network time synchronization, and the NEST Requester which acted as a pipe-like endpoint for lightweight communications.
Orthogonal to these services, NEST also included basic implementations of Novell's PSERVER and NPRINTER servers.
Finally, NEST also defined an operating system interface known as POSE (Portable Operating System Extension), which was a thin translation module defining all of the calls NEST needed to support its own functionality, things like memory management and process creation (as POSIX 1003.1, 1003.4, and 1003.4A subsets), which the developer ported to the particular platform of interest. NEST was deliberately written to be able to run from ROM without secondary storage (i.e., it had no long-term state it needed to store).
Whereas the Digital Research-inherited modular real-time multi-user multi-tasking operating system FlexOS was used by Novell as a primary test platform during development, NEST did not include an operating system of its own, and instead was intended to be used on existing platforms and OSs.
One such third-party OS to support NEST in 1995 was pSOS+ by Integrated Systems (ISI) a company who had bought FlexOS from Novell for US$3,000,000 in July 1994. The deal comprised a direct payment of half this sum as well as shares representing 2% of the company.
The NEST code was deliberately modular, in order to allow developers to use as much or as little of the overall package as they needed. It was expected that developers would pick and choose the components they needed, for instance, a device reporting status over the network might choose only the NEST Requester, IPX and an Ethernet driver, removing the rest from their assembly. In contrast, Microsoft at Work could be used in a similar fashion, but it seemed that it was generally expected that end users would use the complete system as the basis of their devices in a fashion similar to the later Windows CE.
Impact
Like at Work, however, NEST appears to have seen little real-world use. After the initial release in 1994, there appears to be little news on NEST, followed by another flurry in early 1996 when TCP/IP support was added, at which point Novell claimed there were over 80 companies using NEST, including major office machinery firms like Canon, Hewlett-Packard, Ricoh, and Xerox. However, NEST then went the way of at Work, and was abandoned within Novell in January 1997.
See also
Utilicorp United (power-line communication)
FlexOS
pSOSystem
DR-WebSpyder
Internet of Things (IoT)
Runtime system
References
Novell software |
47770289 | https://en.wikipedia.org/wiki/TvOS | TvOS | tvOS (formerly Apple TV Software) is an operating system developed by Apple Inc. for the 2nd generation and later Apple TV digital media player. It is based on the iOS operating system and has many similar frameworks, technologies, and concepts.
The Apple TV Software for the 2nd and 3rd generation Apple TV has several built-in applications, but does not support third-party applications.
On September 9, 2015 at a media event, Apple announced the 4th generation Apple TV, with support for third-party applications. Apple changed the name of the Apple TV operating system to tvOS, adopting the camelcase nomenclature that they were using for their other operating systems, iOS and watchOS.
History
On October 30, 2015, the 4th generation Apple TV became available, and shipped with tvOS 9.0. On November 9, 2015, tvOS 9.0.1 was released, primarily an update to address minor issues.
tvOS 9.1 was released on December 8, 2015 along with OS X 10.11.2, iOS 9.2, and watchOS 2.1. Along with these updates, Apple also updated the Remote apps on iOS and watchOS, allowing for basic remote functionality for the 4th generation Apple TV (previously, said app only worked with past versions of Apple TV).
On November 25, 2015, Facebook debuted their SDK for tvOS, allowing applications to log into Facebook, share to Facebook, and use Facebook Analytics in the same way that iOS applications can.
On December 2, 2015, Twitter debuted their login authentication service for tvOS – "Digits" – allowing users to log into apps and services with a simple, unique code available online.
On March 11, 2016, The Pangu Team announced on Twitter that they would be creating a new jailbreak tool for the Apple TV 4 running tvOS 9.0–9.0.1 and that it would be released the following week.
On June 13, 2016, at WWDC 2016, Apple SVP of Internet Services Eddy Cue announced the next major version of tvOS, tvOS 10. tvOS 10 brought new functionality, such as Siri search enhancements, single sign on for cable subscriptions, a dark mode, and a new Remote application for controlling the Apple TV, and was officially released on September 13, 2016, along with iOS 10.
On April 13, 2020, it was discovered that Apple's Siri Smart Speaker HomePod began to run variants of the tvOS software.
On June 22, 2020, at WWDC 2020, tvOS 14 was announced. tvOS 14 brought support for the Home app and 4K YouTube videos and was officially released on September 16, 2020, along with iOS 14 and iPadOS 14.
On June 7, 2021, at WWDC 2021, tvOS 15 was announced. tvOS 15 brought new features and improvements, including SharePlay, a new “Shared with You” section on the TV app, and the ability to play content via voice command, and was officially released on September 20, 2021, along with iOS 15 and iPadOS 15.
Features
tvOS 9 shipped with several new features on the fourth generation Apple TV. One of the major features was the ability to move through the interface with the new touchpad remote using multi-touch gestures. It introduced a new App Store in which users can download and install new applications (such as apps and games) made available from developers that develop applications for the Apple TV and tvOS. tvOS 9 adds support for Siri, which lets users do a multitude of things such as a cross-application search for a movie/TV show, rewind, fast forward, name and actor/director of the current movie, and skip back 15 seconds. tvOS added support for an application switcher on the Apple TV, more application customization options, cinematic screensavers, and control the TV using the included Siri Remote with the built-in support for HDMI-CEC in tvOS. In addition, tvOS allows the user to control the Apple TV in many different ways. These include using the included Siri Remote, pairing a third-party universal remote, pairing an MFi Gamepad to control games, using the Remote app on iOS, and pairing a Bluetooth keyboard to aid in the typing experience of the user.
Accessibility
tvOS was designed based on iOS, as such tvOS inherited many of the accessibility features of iOS and macOS.
tvOS includes the Apple technologies of VoiceOver, Zoom, and Siri to help the blind and those with impaired vision. VoiceOver, Apple's screen reader, is available in more than 30 languages and enables visually impaired users to know what is on the visual display and input responses to on-screen prompts. VoiceOver uses gestures similar to other Apple products (flicks, taps, and the rotor).
Like other Apple products such as the iPhone with a three click sequence to the home button to activate accessibility features, with Apple TV's tvOS, a user can activate VoiceOver without any installation process. One needs only to triple-click the Menu button on the Siri Remote and the Apple TV will guide the user through the complete initial setup, a task that is non-trivial to the visually impaired in most comparable products on the market.
Another accessibility feature is to increase contrast on the screen which acts by reducing the transparency of background elements on Movie and TV Show pages, menu tabs, and other parts of the operating system. High-contrast can also be turned on, with a cursor to better delineate the focused content. The user can also opt to turn on Reduce Motion which in some screen actions, such as moving between app icons on the Home screen and launching apps are visually simpler which is of benefit to reduce strain on the eyes.
tvOS enables users to watch movies with audio descriptions of what is being shown on the screen. Movies with audio descriptions are displayed with the AD (Audio Description) icon in the iTunes Store for tvOS and in iTunes on a Macintosh or Windows PC.
Pairing a Bluetooth keyboard with the tvOS on the Apple TV enables another accessibility feature that also is an incorporation of VoiceOver. When typing, VoiceOver mirrors with an audio voice, each character pressed on the keyboard and repeated again when it is entered. The Apple TV is designed to work with the Apple Wireless Keyboard or the Apple Magic Keyboard. It will work however with almost any brand of Bluetooth keyboard.
Apple TV with and without tvOS supports closed captioning, so the deaf or hard of hearing can experience TV episodes and feature-length movies. Compatible episodes and movies are denoted with a CC (closed captioning) or SDH (subtitles for the deaf or hard-of-hearing) icon in the iTunes Store either on the Apple TV or in iTunes itself. The viewer can customize the captions in episodes or movies with styles and fonts that are more conducive to their hearing and/or visual impairment.
The Touch surface on the Siri Remote is customizable. Tracking when set to Fast adjusts the thumb movements made to amplify the distance in relation to how far the thumb has moved on the glass touchpad. Conversely when tracking is set to slow, larger movements of the thumb on the touchpad will tune down the distance that is traversed on the screen. This can help people with disabilities.
Apple's Remote app on iOS devices allows control of the Apple TV from an iPhone, iPad or iPod Touch. The iOS remote app increases the accessibility of the Apple TV by enabling Switch Control. Switch Control is a unique Apple technology that enables navigation sequentially through onscreen items and perform specific actions such as selecting, tapping, dragging, typing using third party Bluetooth-enabled switch hardware made for those with handicaps.
Development
tvOS 9 ships with all-new development tools for developers. tvOS adds support for an all-new SDK for developers to build apps for the TV including all of the APIs included in iOS 9 such as Metal. It also adds the tvOS App Store which allows users to browse, download, and install a wide variety of applications. In addition, developers can now use their own interface inside of their application rather than only being able to use Apple's interface. Since tvOS is based on iOS, it is easy to port existing iOS apps to the Apple TV with Xcode while making only a few refinements to the app to better suit the larger screen. Apple provides Xcode free of charge to all registered Apple developers. To develop for the new Apple TV, it is necessary to make a parallax image for the application icon. In order to do this, Apple provides a Parallax exporter and previewer in the development tools for the Apple TV.
Version history
Information about new updates to Apple TV (2nd generation) onwards is published on Apple's knowledge base.
iOS 4
iOS 4.1 was the first version of iOS available on the Apple TV (2nd generation). It included Apple TV Software 4.0.
iOS 5
On October 23, 2011, Apple TV (2nd generation) received the iOS 5.0 software, with My Photo Stream, AirPlay mirroring (from iPhone 4S & iPad 2), NHL, Wall Street Journal, slideshow themes and Netflix subtitles. Contrary to rumors and code found in iOS 5, the release did not bring support for Bluetooth or apps to the Apple TV (2nd generation).
iOS 6
On September 24, 2012, Apple TV (2nd generation) onwards received the iOS 6.0 software update, with Shared Photo Streams, iTunes account switching, better AirPlay functionality, and Trailers searching, among other smaller improvements.
iOS 7
On September 20, 2013, Apple TV (second generation) onwards received the iOS 7.0 software update, with iTunes Radio and AirPlay from iCloud.
iOS 8
On September 18, 2014, the third generation Apple TV received the iOS 8.0 software update, with a redesigned UI, Family Sharing and peer-to-peer AirPlay.
tvOS 9
tvOS 9 is an operating system that is 95% based on iOS 9, with adaptations made for a television interface. It was announced on September 9, 2015, alongside the new iPad Pro and iPhone 6S. Tim Cook took the stage and introduced tvOS saying that it was time for the Apple TV to gain a modern OS with support for apps as they are "the future of TV". It will only be available on the Apple TV (4th generation), released in October 2015. It adds a native SDK to develop apps, and an App Store to distribute them, and support for Siri and universal search across multiple apps.
tvOS 10
tvOS 11
tvOS 12
tvOS 13
tvOS 14
tvOS 15
See also
Other operating systems developed by Apple Inc.
iOS
iPadOS
watchOS
macOS
References
External links
– official site for Apple TV
Products introduced in 2015
IOS
Streaming media systems
Proprietary operating systems |
38273 | https://en.wikipedia.org/wiki/Turbo%20Pascal | Turbo Pascal | Turbo Pascal is a software development system that includes a compiler and an integrated development environment (IDE) for the Pascal programming language running on CP/M, CP/M-86, and DOS. It was originally developed by Anders Hejlsberg at Borland, and was notable for its extremely fast compiling times. Turbo Pascal, and the later but similar Turbo C, made Borland a leader in PC-based development.
For versions 6 and 7 (last), both a lower-priced Turbo Pascal and more expensive Borland Pascal were produced; Borland Pascal was more oriented toward professional software development, with more libraries and standard library source code. The name Borland Pascal is also used more generically for Borland's dialect of the Pascal programming language, significantly different from Standard Pascal.
Borland has released three old versions of Turbo Pascal free of charge because of their historical interest: the original Turbo Pascal (now known as 1.0), and versions 3.02 and 5.5 for DOS.
Motivation and release
Philippe Kahn first saw an opportunity for Borland, his newly formed software company, in the field of programming tools. Historically, the vast majority of programmers saw their workflow in terms of the edit/compile/link cycle, with separate tools dedicated to each task. Programmers wrote source code using a text editor; the source code was then compiled into object code (often requiring multiple passes), and a linker combined object code with runtime libraries to produce an executable program.
In the early IBM PC market (1981–1983) the major programming tool vendors all made compilers that worked in a similar fashion. For example, the Microsoft Pascal system consisted of two compiler passes and a final linking pass (which could take minutes on systems with only floppy disks for secondary storage, although programs were very much smaller than they are today). This process was less resource-intensive than the later integrated development environment (IDE). Vendors of software development tools aimed their products at professional developers, and the price for these basic tools plus ancillary tools like profilers ran into the hundreds of dollars.
Kahn's idea was to package all these functions in an integrated programming toolkit designed to have much better performance and resource utilisation than the usual professional development tools, and charge a low price for a package integrating a custom text editor, compiler, and all functionality need to produce executable programs. The program was sold by direct mail order for $49.95, without going through established sales channels (retailers or resellers).
Unlike some other development tools, Turbo Pascal disks had no copy protection. Turbo Pascal came with the "Book License": "You must treat this software just like a book ... [it] may be used by any number of people ... may be freely moved from one computer location to another, so long as there is no possibility of it being used at one location while it's being used at another."
Reception
Jerry Pournelle of Byte magazine wrote in February 1984 that Turbo Pascal "comes close to what I think the computer industry is headed for: well documented, standard, plenty of good features, and a reasonable price". Pournelle disliked the requirement to buy another license to distribute binaries, but noted that "it turns out not to be a lot more. Borland only wants another $100" more than the $49.95 base price, and that "my first impression of Turbo is that it's probably worth $149.95. It looks to do everything MT+ with the Speed Programming Package does, and maybe even do it faster and better". He reported in July that, according to Kahn, IBM had refused to resell Turbo Pascal unless the price was at least $200; Pournelle noted that "Turbo is much better than the Pascal IBM sells", and unlike the latter was compatible with the IBM PCjr. Three Byte reviewers praised Turbo Pascal in the same issue. One called the DOS version "without doubt, the best software value I have ever purchased", and another called the CP/M version "an excellent product ... [Borland] deserves praise for this high-value product". The third stated that it was "not a good compiler for developing massive applications", but added that it was greatly superior to BASIC, the programming language usually associated with home computers at the time. He concluded that Turbo Pascal was "a bargain that shouldn't be passed up".
Despite finding what it described as "a serious bug" in version 3.0, and decreased compatibility with PC clones, the magazine in February 1986 stated that "it is hard to avoid recommending Turbo to anyone who wants to program in Pascal", citing improved speed and graphic routines. When reviewing four other Pascal compilers in December 1986, Byte described Turbo Pascal as "practical and attractive to programmers at all levels of expertise". Bruce Webster also praised the language in the magazine, stating in August 1985 that Turbo Pascal "is best known for its small size, incredible compile speeds, and fast execution times". He noted that the software's quality and low price had been especially surprising after the "JRT Pascal fiasco", and stated that even at the new higher $69.95 price, version 3.0 was "probably still the best software deal on the market".
PC Magazine was similarly complimentary in November 1984, stating that "nothing like Turbo Pascal has ever existed for PC-DOS before". It praised the software's low price, speed, unusually good documentation for a compiler, and noted the existence of many utilities from other companies that hoped to benefit from Turbo Pascal's popularity. The review stated that the IDE that simplified the edit-compile-run-debug loop made Turbo Pascal accessible to new programmers like BASIC.
Byte in 1989 listed Turbo C and Turbo Pascal as among the "Distinction" winners of the Byte Awards. Citing their user interface and continued emphasis on speed, the magazine stated that "for rapid prototyping there's not much better". In the same issue Pournelle again praised version 4.0 and 5.0 of Turbo Pascal. Citing Anacreon as "a good example of how complex a program you can write in Pascal", and the many libraries available from Borland and other developers, he wrote, "I am more and more convinced that Turbo Pascal is the programming language of choice for people who are more interested in what they want the machine to do than in how to make that happen. Turbo Pascal may be neither as elegant nor as portable as C, but it's sure less obscure. I think it may well be the language for the rest of us".
Borland sold about 250,000 copies of Turbo Pascal in two years, which Webster described as "an amazing figure for a computer language". He reported six months later that the figure had risen to "more than 400,000 copies in a marketplace that had been estimated as having only 30,000 potential buyers".
Versions
CP/M and DOS versions
Version 1
The Turbo Pascal compiler was based on the Blue Label Pascal compiler originally produced for the NasSys cassette-based operating system of the Nascom microcomputer in 1981 by Anders Hejlsberg. Borland licensed Hejlsberg's "PolyPascal" compiler core (Poly Data was the name of Hejlsberg's company in Denmark), and added the user interface and editor. Anders Hejlsberg joined the company as an employee and was the architect for all versions of the Turbo Pascal compiler and the first three versions of Borland Delphi.
The compiler was first released as Compas Pascal for CP/M, and then released on 20 November 1983 as Turbo Pascal for CP/M (including the Apple II computer when fitted with a Z-80 SoftCard, effectively converting the 6502-based Apple into a CP/M machine, the Commodore 64 with CP/M cartridge, and the later DEC Rainbow), CP/M-86, and DOS machines. On its launch in the United States market, Turbo Pascal retailed for USD49.99, a very low price for a compiler at the time. The integrated Pascal compiler was of good quality compared to other Pascal products of the time.
The Turbo name alluded to the speed of compiling and of the executables produced. The edit/compile/run cycle was fast compared to other Pascal implementations because everything related to building the program was stored in RAM, and because it was a one-pass compiler written in assembly language. Compiling was much faster than compilers for other languages (even Borland's own later compilers for C), and other Pascal compilers, and programmer time was also saved since the program could be compiled and run from the IDE. The execution speed of these COM-format programs was a revelation for developers whose only prior experience programming microcomputers was with interpreted BASIC or UCSD Pascal, which compiled to p-code which was then interpreted at runtime.
Version 1 was a basic all-in-one system, working in memory and producing .COM executable files for DOS and CP/M, and equivalent .CMD executables for CP/M-86 (totally different from .CMD batch files later used in 32-bit Microsoft Windows). Source code files were limited to 64 KB to simplify the IDE, and DOS .COM files were limited to 64 KB each of code, stack and global (static) variables. Program source code could be extended by using the include facility if the source code exceeded the memory limit of the editor.
There were different versions of Turbo Pascal for computers running DOS, CP/M, or CP/M-86 with 64 KB of memory and at least one floppy disk drive. The CP/M version could run on the many CP/M machines of the time with Z80 processors, or an Apple II with Z80 card. The DOS and CP/M-86 versions ran on the many 8086 and 8088 machines which became available, including the IBM PC. The installer, lister, and compiler with its IDE, and the source code for a simple spreadsheet program called MicroCalc written by Philippe Kahn as a demonstration, would fit on a single floppy disc. A disc copy without MicroCalc would accommodate the source code and compiled executable of a reasonable-sized program—as it was common at the time for users to have only a single floppy drive as mass storage, it was a great convenience to be able to fit both the compiler and the program being written on a single disc, avoiding endless disc swapping.
Bill Gates saw the success of Turbo Pascal in very personal terms, and "couldn't understand why [Microsoft's] stuff was so slow. He would bring in Greg Whitten [programming director of Microsoft languages] and yell at him for half an hour". He could not understand why Kahn had been able to beat an established competitor like Microsoft."
The architecture of the various machines running MS-DOS additionally limited the maximum user memory to under 1 MB (e.g., machines hardware-compatible with the IBM PC were limited to 640 KB).
The Turbo Pascal IDE was very advanced for its day. It was able to perform well and compile very fast with the amount of RAM on a typical home computer. The IDE was simple and intuitive to use, and had a well-organized system of menus. Early versions of the editor used WordStar key functions, which was the de facto standard at the time. Later versions of the IDE, designed for PCs with more disk space and memory, could display the definitions of the keywords of the language by putting the cursor over a keyword and pressing the F1 key (conventionally used to display help). Many definitions included example code.
In addition to standard executable programs, the compiler could generate Terminate and Stay Resident (TSR) programs, small utilities that stayed in memory and let the computer do other tasks—running several programs at the same time, multitasking, was not otherwise available. Borland itself produced a small application suite called Sidekick that was a TSR letting the user keep a diary, notes, and so forth.
Version 2
Version 2, released a few months later on 17 April 1984, was an incremental improvement to the original Turbo Pascal, to the point that the reference manual was at first identical to version 1's, down to having 1983 as the copyright date on some of the compiler's sample output, but had a separate "Addendum to Reference Manual: Version 2.0 and 8087 Supplement" manual with separate page numbering.
Additions included an overlay system, where separate overlay procedures would be automatically swapped from disk into a reserved space in memory. This memory was part of the 64kB RAM used by the program's code, and was automatically the size of the largest overlay procedure. Overlay procedures could include overlay sections themselves, but unless a RAM disk was used, the resulting disk swapping could be slow.
2.0 also added the Dispose procedure to manage the heap, allowing individual dynamic variables to be freed, as an alternative to the more primitive 'Mark/Release' system. and increased compatibility with WordStar commands plus use of the numeric keypad on the IBM PC and compatibles. Such PCs also had new text window and CGA graphics mode commands, as well as being able to use the PC's speaker for tones.
Finally, DOS and CP/M-86 machines with an 8087 maths coprocessor (or later compatible) had an alternative TURBO-87 compiler available to purchase. It supported the 8087's long real data types with a range of 1.67E-307 to 1.67E+308 to 14 significant figure precision but with a much greater processing speed. The manual notes that although source code for the Turbo Pascal's software real data types offering a range of 1E-63 to 1E+63 to 11 significant figures, these were incompatible at a binary level: as well as having a much larger range, the software reals took six bytes in memory and the 8087 ones were eight.
Like version 1, version 2 for CP/M-80 only ran on Z80-based CP/M machines.
Version 3
Version 3 was released on 17 September 1986.
Turbo Pascal 3 supported turtle graphics.
In addition to the default software real numbers and 8087 edition of the compiler, Borland also offered a BCD version (TURBOBCD) which offered the same numeric range as real data types but to 18 significant figures.
DOS versions
Version 4
Released on 20 November 1987, Version 4 was a total rewrite, with both look and feel and internal operation much changed. The compiler generated executables in .EXE format under DOS, rather than the simpler but more restricted .COM executables. The by-then-obsolete CP/M and CP/M-86 operating system versions were dropped when Turbo Pascal was rewritten. Version 4 introduced units, and a full-screen text user interface with pull-down menus; earlier versions had a text-based menu screen and a separate full-screen editor. (Microsoft Windows was still very experimental when the first version was released, and even mice were rare.)
An add on package, the Turbo Pascal Graphix Toolbox, was available for Turbo Pascal V4.
Version 5.0
Colour displays were replacing monochrome; Turbo Pascal version 5.0, released 24 August 24 1988, introduced blue as the editor's default background color, used by Borland's DOS compilers until the end of this product line in the mid-1990s.
Later versions came in two packages with the same version number: a less expensive "Turbo" package, and a "Borland" package with enhanced capabilities and more add-ons.
Version 5.5
This version, released on 2 May 1989, introduced object-oriented programming features for the Pascal language, including concept of classes, static and dynamic objects, constructors and destructors and inheritance, which would become the basis for the Object Pascal found in Borland Delphi. The IDE uses the default blue colour scheme that would also be used on later Borland Turbo products. Other changes to IDE include:
Addition of step-by-step debugger to IDE.
Context-sensitive help with description of all built-in functions, and the ability to copying code fragments from help to edit window.
Version 6.0
Version 6 was released on 23 October 1990.
Changes from 5.5 include:
Addition of inline assembly language feature for Pascal language.
Addition of Turbo Vision library.
Changes to IDE include mouse support, clipboard for text manipulations, multiple document interface supporting up to nine edit windows.
Debugger supports usage of breakpoints and watches.
Version 7.0
Version 7 was released on 27 October 1992.
Changes from 6.0 include:
Compiler supports creation of DOS and Windows executables, Windows DLL.
Changes to IDE include addition of syntax highlighting.
Turbo Pascal for Windows
Two versions named "Turbo Pascal for Windows" (TPW), for Windows 3.x, were released: TPW 1.0, based on Turbo Pascal 6 but released about 2 years later, and 1.5, released after Turbo Pascal 7; they were succeeded by Borland Pascal 7, which had Windows support. The Windows compiler in Pascal 7 was titled Borland Pascal for Windows.
Both versions built Windows-compatible programs, and featured a Windows-based IDE, as opposed to the DOS-based IDE in Turbo Pascal. The IDE and editor commands conformed to the Microsoft Windows user interface guidelines instead of the classic TP user interface. The support for Windows programs required the ObjectWindows library, similar but not identical to that for the first release of Borland C++, and radically different from the earlier DOS Turbo Vision environment. Turbo Pascal was superseded for the Windows platform by Delphi; the Delphi compiler can produce console programs and graphical user interface (GUI) applications, so that using Turbo and Borland Pascal became unnecessary.
Turbo Pascal for Macintosh
Borland released Turbo Pascal for Macintosh in 1986. Much like versions 1 to 3 for other operating systems, it was written in compact assembly language and had a very powerful IDE, but no good debugger. Borland did not support this product very well, although they issued a version 1.1, patched to run on the 32-bit Macintosh II. Macintosh support was dropped soon after.
Freeware releases
Borland released several versions of Turbo Pascal as freeware after they became "antique software" (abandonware), with 1.0 for DOS on 1 February 2000, 3.02 on 10 February 2000, 5.5 on 21 February 2002, Turbo Pascal 7.01 French version in year 2000. Most of the downloads are still available on the successor website of Embarcadero Technologies.
Successors
By 1995 Borland had dropped Turbo/Borland Pascal and replaced it with the rapid application development (RAD) environment Borland Delphi, based on Object Pascal. The 32- and 64-bit Delphi versions still support the more portable Pascal enhancements of the earlier products (i.e. those that are not specific to 16-bit code) including the earlier static object model. This language backwards compatibility means much old Turbo Pascal code can still be compiled and run in a modern environment today.
Other suppliers have produced software development tools compatible with Turbo Pascal. The best-known are Free Pascal and Virtual Pascal.
In education
Borland Pascal is still taught in some countries at secondary, sixth form and university levels. It is taught at colleges and universities in Costa Rica, Turkey, Iraq, Germany, Russian Federation, USA and at secondary schools in Argentina, Belgium, Bulgaria, Canada, Costa Rica, Croatia, France, Hungary, Italy, Jamaica, Libya, Moldova, Romania, Serbia, Tunisia, Ukraine, Czech republic and Vietnam. It was the state-approved educational programming language for all South African secondary schools until 2002. Today it continues to be taught in some universities around the world as an introduction to computer programming, usually advancing to C or Java or both.
Some lecturers prefer to use Borland Pascal 7 or Turbo Pascal 5.5 because of its simplicity in comparison to more modern IDEs such as Microsoft Visual Studio or Borland JBuilder, so it introduces students unfamiliar with computing to common tasks such as using the keyboard and keyboard shortcuts (TP 5.5 has no mouse support), familiarises them with DOS commands (which are largely the same as those of Microsoft Windows's command prompt), and lets them write programs without spending a lot of effort on getting the environment to work. TP 5.5 is available as a free download from Borland.
Features
Assembly language
While all versions of Turbo Pascal could include inline machine code, starting with version 6 it was possible to integrate assembly language within Pascal source code.
Support for the various 8086 memory models was provided by inline assembly, compiler options, and language extensions such as the "absolute" keyword. The Turbo Assembler, TASM, a standard x86 assembler independent of TP, and source-compatible with the widely used Microsoft Macro Assembler MASM, was supplied with the enhanced "Borland Pascal" versions.
Debugging and profiling
The IDE provided several debugging facilities, including single stepping, examination and changing of variables, and conditional breakpoints. In later versions assembly-language blocks could be stepped through. The user could add breakpoints on variables and registers in an IDE window. Programs using IBM PC graphics mode could flip between graphics and text mode automatically or manually, or display both on two screens. For cases where the relatively simple debugging facilities of the IDE were insufficient, Turbopower Software produced a more powerful debugger, T-Debug. The same company produced Turbo Analyst and Overlay Manager for Turbo Pascal. T-Debug was later updated for Turbo Pascal 4, but discontinued with the release of Borland's Turbo Debugger (TD), which also allowed some hardware intervention on computers equipped with the new 80386 processor.
TD was usually supplied in conjunction with the Turbo Assembler and the Turbo Profiler, a code profiler that reported on the time spent in each part of the program to assist program optimisation by finding bottlenecks. The books included with Borland Pascal had detailed descriptions of the Intel assembler language, including the number of clock cycles required by each instruction. Development and debugging could be carried out entirely within the IDE unless the advanced debugging facilities of Turbopower T-Debug, and later TD, were required.
Later versions also supported remote debugging via an RS-232 communication cable.
Units
Over the years, Borland enhanced not only the IDE, but also extended the programming language. A development system based on ISO standard Pascal requires implementation-specific extensions for the development of real-world applications on the platforms they target. Standard Pascal is designed to be platform-independent, so prescribes no low-level access to hardware- or operating system-dependent facilities. Standard Pascal also does not prescribe how a large program should be split into separate compilation units. From version 4, Turbo Pascal adopted the concept of units from UCSD Pascal. Units were used as external function libraries, like the object files used in other languages such as FORTRAN or C.
For example, the line uses crt; in a program included the unit called crt; the uses is the mechanism for using other compilation units. interface and implementation were the keywords used to specify, within the unit, what was (and what was not) visible outside the unit. This is similar to the public and private keywords in other languages such as C++ and Java.
Units in Borland's Pascal were similar to Modula-2's separate compilation system. In 1987, when Turbo Pascal 4 was released, Modula-2 was making inroads as an educational language which could replace Pascal. Borland, in fact, had a Turbo Modula-2 compiler, but only released it on CP/M (its user interface was almost identical to that of Turbo Pascal 1–3) with little marketing. A much improved DOS version was developed, but as Borland was unwilling to publish the results itself, the authors including Niels Jensen bought the rights and formed Jensen & Partners International to publish it as JPI TopSpeed Modula-2. Instead Borland chose to implement separate compilation in their established Pascal product.
Separate compilation was not part of the standard Pascal language, but was already available in UCSD Pascal, which was very popular on 8-bit machines. Turbo Pascal syntax for units appears to have been borrowed from UCSD Pascal. Earlier versions of Turbo Pascal, designed for computers with limited resources, supported a "chain and execute" system of dynamic linking for separately compiled objects, similar to the system widely used in BASIC. Also, the language had a statement to include separate source code in a program when necessary, and overlaying was supported from TP3, but, as with overlays, chained objects had to fit into the original (limited) program memory space. As computing and storage facilities advanced, the ability to generate large EXE files was added to Turbo Pascal, with the ability to statically link and collectively load separately compiled objects.
The .TPU files output by compiling a Turbo Pascal unit are tightly linked to the internal structures of the compiler, rather than standard .OBJ linkable files. This improved compilation and linkage times, but meant that .TPU files could not be linked with the output of other languages or even used with different releases of Turbo Pascal unless recompiled from source.
Object-oriented programming
From version 5.5 some object-oriented programming features were introduced: classes, inheritance, constructors and destructors. The IDE was already augmented with an object browser interface showing relations between objects and methods and allowing programmers to navigate the modules easily. Borland called its language Object Pascal, which was greatly extended to become the language underlying Delphi (which has two separate OOP systems).
The name "Object Pascal" originated with the Pascal extensions developed by Apple Inc. to program its Lisa and Macintosh computers. Pascal originator Niklaus Wirth consulted in developing these extensions, which built upon the record type already present in Pascal.
Issue with CRT unit on fast processors
Several versions of Turbo Pascal, including the latest version 7, include a CRT unit used by many fullscreen text mode applications. This unit contains code in its initialization section to determine the CPU speed and calibrate delay loops. This code fails on processors with a speed greater than about 200 MHz and aborts immediately with a "Runtime Error 200" message. (the error code 200 had nothing to do with the CPU speed 200 MHz). This is caused because a loop runs to count the number of times it can iterate in a fixed time, as measured by the real-time clock. When Turbo Pascal was developed it ran on machines with CPUs running at 1 to 8 MHz, and little thought was given to the possibility of vastly higher speeds, so from about 200 MHz enough iterations can be run to overflow the 16-bit counter. A patch was produced when machines became too fast for the original method, but failed as processor speeds increased yet further, and was superseded by others.
Programs subject to this error can be recompiled from source code with a compiler patched to eliminate the error (using a TURBO.TPL itself compiled with a corrected CRT unit) or, if source code is not available, executables can be patched by a tool named TPPATCH or equivalent, or by loading a Terminate and Stay Resident program loaded before running the faulty program.
There are also patches to the TP7 compiler itself, thus if the Pascal source is available, a new compilation's code will work without the compiled code having to be patched. If the source code is available, porting to libraries without CPU clock speed dependency is a solution too.
Floating point
There were several floating point types, including single (the 4-byte [IEEE 754] representation) double (the 8-byte IEEE 754 representation), extended (a 10-byte IEEE 754 representation used mostly internally by numeric coprocessors) and Real (a 6-byte representation).
In the early days, Real was the most popular. Most PCs of the era did not have a floating point coprocessor so all FP had to be done in software. Borland's own FP algorithms on Real were quicker than using the other types, though its library also emulated the other types in software.
Syntax
Pascal is not case-sensitive.
Historically, Pascal comments are enclosed { within pairs of braces }, or (* left parenthesis/asterisk and asterisk/right parenthesis pairs *), and these can span any number of lines. Later versions of Borland Pascal also supported C++-style comments // preceded by two forward slashes , which finish at the end of the line.
The syntax for the statement case is more flexible than standard Pascal.
Sets may only have up to 256 (28) members.
The standard Pascal String preceded by a length byte is supported, and takes a fixed amount of storage; later versions added a more flexible null-terminated type, calling the older type "short string". Older source code which handles strings in non-standard ways (e.g., directly manipulating the length byte like S[0]:=14 to truncate a string) must either have its strings declared as short strings, or be rewritten.
This is the classic Hello world program in Turbo Pascal:
program HelloWorld;
begin
WriteLn('Hello World')
end.
This asks for a name and writes it back to the screen a hundred times:
program WriteName;
var
i : Integer; {variable to be used for looping}
Name : String; {declares the variable Name as a string}
begin
Write('Please tell me your name: ');
ReadLn(Name); {ReadLn returns the string entered by the user}
for i := 1 to 100 do
begin
WriteLn('Hello ', Name)
end;
readln;
end.
See also
Borland Graphics Interface
Delphi (software)
Free Pascal
References
External links
Borland International, Inc. Turbo Pascal page: DOS 7.0, Windows 1.5
Inspire Corporation Turbo Pascal page: DOS 7.0, Windows 1.5
Borland Software Corporation Turbo Pascal page: DOS 7.0
Turbo Pascal 3 Code Generation, a description of the Turbo Pascal 3.0 compiler
Turbo Pascal Compiler Internals , complete source code of a Turbo Pascal 7.0-compatible compiler
Borland®/Inprise® Pascal Versions
1983 software
Articles with example Pascal code
Borland software
CP/M software
DOS software
Classic Mac OS software
Integrated development environments
Object-oriented programming languages
Pascal (programming language) compilers
Assembly language software |
20661646 | https://en.wikipedia.org/wiki/Internet%20Watch%20Foundation%20and%20Wikipedia | Internet Watch Foundation and Wikipedia | On 5 December 2008, the Internet Watch Foundation (IWF), a British watchdog group, blacklisted content on the English Wikipedia related to Scorpions' 1976 studio album Virgin Killer, due to the presence of its controversial cover artwork, depicting a young girl posing nude, with a faux shattered-glass effect obscuring her genitalia. The image was deemed to be "potentially illegal content" under English law which forbids the possession or creation of indecent photographs of children. The IWF's blacklist are used in web filtering systems such as Cleanfeed.
The URL to the image's , which depicts the cover art, was also blacklisted; however thumbnails and the image itself remained accessible. The album cover had been deemed controversial at the time of its release, and was replaced in some markets with an alternate cover image featuring a photo of the band members. The IWF described the image as "a potentially illegal indecent image of a child under the age of 18". Wikipedia's policies state that it does not censor content "that some readers consider objectionable or offensive, even exceedingly so", although it does remove content that is "obviously inappropriate", violates other Wikipedia policies, or is illegal in the United States.
As well as the direct consequence of censoring the article and image for UK-based readers of the English Wikipedia through the affected ISPs (a censoring that could be circumvented), and that the album cover was being made available unfiltered on other major sites including Amazon.co.uk (from which it was later removed), and available for sale in the UK, the action also had some indirect effects on Wikipedia, namely temporarily preventing all editors using said ISPs in the UK from contributing to any page of the encyclopedia, and preventing anonymous edits from these ISPs while the URL remained on the blacklist. This was described by the IWF as unintended "collateral damage". This was due to the proxies used to access Wikipedia, as Wikipedia implements a blocking policy whereby contributors can be blocked if they vandalise the encyclopedia. Therefore, all vandalism coming from one ISP would be directed through one proxy—hence one IP—and all of the ISP's customers using that proxy would be barred from editing.
After invoking its appeals procedure and reviewing the situation, the IWF reversed their blacklisting of the page on 9 December 2008, and announced that they would not blacklist other copies of the image hosted outside the UK.
Background
The album art of the Scorpions' album Virgin Killer, featuring a young girl fully nude with a "smashed glass" effect covering her genitalia, was deemed controversial at the time of its release. The cover was replaced in some markets with an alternate cover image featuring a photo of the band members. RCA Records refused to sell the controversial album cover in the United States. The cover was not the only Scorpions' cover which caused controversy however, as the covers for Taken by Force and Lovedrive have also caused controversy with their content.
In the United Kingdom, access to illegal content (such as child pornography) was strictly self-regulated by individual internet service providers. This began when BT Group introduced Cleanfeed, a server-side filtering system which uses data obtained from the Internet Watch Foundation. The IWF is a Quango organisation that operates a website where users can report web pages containing illegal or dubious content to be added to their blacklists. This was implemented in order to prevent users from accessing this material, since it is illegal to possess an indecent image of a child under the age of 18 per the Protection of Children Act. British ISPs were later obligated by the government to implement filters for illegal content by the beginning of 2007.
Addition to IWF blacklist
On 5 December 2008 the Internet Watch Foundation added the Wikipedia URLs for the Virgin Killer article and the description page of the image to its blacklist. After the blacklisting, users of major UK ISPs, including BT, Vodafone, Virgin Media/Tesco.net, Be/O2, EasyNet/UK Online/Sky Broadband, Orange, Demon, and TalkTalk (Opal Telecom), were unable to access the content.
Sarah Robertson, director of communications for the IWF, said that the image was rated "1 on a scale of 1 to 5, where 1 is the least offensive". She described the picture as "erotic posing with no sexual activity". While the image itself has not been flagged as "illegal", IWF determined it to be a "potentially illegal indecent image of a child under the age of 18".
The IWF said they were first notified of the Wikipedia URL on 4 December 2008. This followed the May 2008 reporting of the cover image on Wikipedia by U.S.-based social conservative site WorldNetDaily to the Federal Bureau of Investigation. A subsequent investigation by the FBI concluded that the artwork did not violate any US laws. EContent magazine subsequently reported that the discussion page associated with the article declared "Prior discussion has determined by broad consensus that the Virgin Killer cover will not be removed", and asserted that Wikipedia contributors "favour inclusion in all but the most extreme cases". However, according to The Guardian because "the IWF doesn't talk to people outside of the UK they weren't able to appreciate what was going on". Internet security expert Richard Clayton explained that "We see this borderline stuff all the time; it's a no-win", before adding that the decision seems to have been based on taking the image out of context, particularly "given that you can go into HMV and buy a copy on the high street". On 9 December 2008 the IWF reversed its blacklist of the Wikipedia pages on the basis of the "contextual issues involved in this specific case and, in light of the length of time the image has existed and its wide availability".
Effects on Wikipedia
The blacklisting of Virgin Killer also caused other inadvertent issues for Wikipedia users in the United Kingdom. Usually most Internet users have a unique IP address visible to websites. However, as a result of ISPs using the IWF blacklist implemented through Cleanfeed technology, traffic to Wikipedia via those affected ISPs was then routed through a small number of proxy servers. This caused problems for users of the site. Since Wikipedia allows users to anonymously edit its encyclopedia articles, these individuals are identified only through their IP addresses, which are used to selectively block users who vandalise the site or otherwise break its rules. The proxy filtering makes it impossible to uniquely distinguish users, and to prevent vandalism Wikipedia "instituted a blanket ban on anonymous edits from the six ISPs, which account for 95% of British residential internet users". This had the immediate effect of requiring nearly all registered users in the UK to request the lifting of on their accounts before they could edit again, and the de facto permanent effect of barring any contribution from people without , who contribute merely under an IP address and not a user name.
The MediaWiki software that Wikipedia runs on can interpret X-Forwarded-For (XFF) headers, allowing Wikipedia to identify a user's main IP address rather than the proxy IP address, allowing the ability to block proxy users individually by their client's IP rather than the proxy server IP (avoiding the need to block the whole proxy due to the actions of a single user). However, none of the ISPs subscribing to this system pass XFF information to Wikipedia, having the impact of reversing the normal method of identification and blocking on Wikipedia. IP addresses assumed to be assigned to an individual person or organisation were assigned instead to millions of people and thousands of registered editors. Wikipedia servers saw them all as the IP of the proxy rather than each as the IP of their own machine.
Due to erroneous use of Border Gateway Protocol (BGP) and other routing technology to redirect the connections to the filtering proxies, users of some networks were temporarily prevented from accessing or editing any content hosted by Wikimedia, a problem reminiscent of Pakistan's accidental blocking of YouTube for much of the world instead of only their own citizens.
Responses
On 7 December 2008, the Wikimedia Foundation, a non-profit organisation which supports Wikipedia, issued a press release about the blacklisting of their sites by the IWF stating that they had "no reason to believe the article, or the image contained in the article, has been held to be illegal in any jurisdiction anywhere in the world", and noting that not just the image but the article itself had been blocked.
On 9 December 2008, Jimmy Wales, co-founder of Wikipedia, who holds the "community founder seat" on the Wikimedia Foundation Board of Trustees, told the UK's Channel 4 News that he had briefly considered legal action. After the block had been removed, Mike Godwin, general counsel for the Wikimedia Foundation, stated "there is still plenty to be troubled by in the operations of the Internet Watch Foundation and its blacklist".
On 9 December 2008, the IWF rescinded the block, issuing the following statement:
Aftermath
The incident was commented in some countries implementing or considering to implement Internet filtering or censorship plans. In Australia, Electronic Frontiers Australia vice-chairman Colin Jacobs said that "[the] incident in Britain, in which virtually the entire country was unable to edit Wikipedia because the country's Internet Watch Foundation had blacklisted a single image on the site, illustrated the pitfalls of mandatory ISP filtering". The Sydney Morning Herald has commented that "Ironically, the banning of the image has only made it visible to more people as news sites publicise the issue and the image spreads across sites other than Wikipedia" (an example of the Streisand effect).
At the time of the incident Amazon US were also displaying the image on their site and the IWF stated that it "might yet add Amazon US to its list of 'blocked' sites for hosting the picture"; however, Amazon subsequently took the decision to remove the image from their site. In an impact study preparing a bill dealing with cybercrime, the Cabinet of France listed the Virgin Killer block as an example of indiscriminate filtering.
The Electronic Frontier Foundation criticised the IWF's reasoning:
The IWF continues to assert that the image is indeed child pornography, and asserts that the image would be blocked if it were on a British server.
See also
Reporting of child pornography images on Wikimedia Commons
Internet censorship in the United Kingdom
List of websites blocked in the United Kingdom
References
External links
Internet Watch Foundation
Internal discussion on Wikipedia discussing the IWF actions
Wikipedia's list of media coverage of incident
Clayton, Richard: Technical aspects of the censoring of Wikipedia (Light Blue Touchpaper – Security Research, Computer Laboratory, University of Cambridge)
2008 controversies
History of Wikipedia
Internet censorship in the United Kingdom
Blacklisting in the United Kingdom
2008 in the United Kingdom
Wikipedia controversies |
1381282 | https://en.wikipedia.org/wiki/Data%20loss | Data loss | Data loss is an error condition in information systems in which information is destroyed by failures (like failed spindle motors or head crashes on hard drives) or neglect (like mishandling, careless handling or storage under unsuitable conditions) in storage, transmission, or processing. Information systems implement backup and disaster recovery equipment and processes to prevent data loss or restore lost data. Data loss can also occur if the physical medium containing the data is lost or stolen.
Data loss is distinguished from data unavailability, which may arise from a network outage. Although the two have substantially similar consequences for users, data unavailability is temporary, while data loss may be permanent. Data loss is also distinct from data breach, an incident where data falls into the wrong hands, although the term data loss has been used in those incidents.
Types
Procedural
Intentional action
Intentional deletion of a file or program
Unintentional action
Accidental deletion of a file or program
Misplacement of physical storage media
Administration errors
Inability to read unknown file format
Failure
Power failure, resulting in data in volatile memory not being saved to permanent memory.
Hardware failure, such as a head crash in a hard disk.
A software crash or freeze, resulting in data not being saved.
Software bugs or poor usability, such as not confirming a file delete command.
Business failure (vendor bankruptcy), where data is stored with a software vendor using Software-as-a-service and SaaS data escrow has not been provisioned.
Data corruption, such as file system corruption or database corruption.
Disaster
Natural disaster, earthquake, flood, tornado, etc.
Fire
Crime
Theft, hacking, SQL injection, sabotage, etc.
A malicious act, such as a worm, virus, Ransomware, hacking or theft of physical media.
Studies show hardware failure and human error are the two most common causes of data loss, accounting for roughly three quarters of all incidents. Another cause of data loss is a natural disaster, which is a greater risk dependent on where the hardware is located. While the probability of data loss due to natural disaster is small, the only way to prepare for such an event is to store backup data in a separate physical location. As such, the best backup plans always include at least one copy being stored off-site.
Cost
The cost of a data loss event is directly related to the value of the data and the length of time that it is unavailable yet needed. For an enterprise in particular, the definition of cost extends beyond the financial and can also include time.
Consider:
The cost of continuing without the data
The cost of recreating the data
The cost of notifying users in the event of a compromise
Prevention
The frequency of data loss and the impact can be greatly mitigated by taking proper precautions, those of which necessary can vary depending on the type of data loss. For example, multiple power circuits with battery backup and a generator only protect against power failures, though using an Uninterruptable Power Supply can protect drive against sudden power spikes. Similarly, using a journaling file system and RAID storage only protect against certain types of software and hardware failure.
For hard disk drives, which are a physical storage medium, ensuring minimal vibration and movement will help protect against damaging the components internally, as can maintaining a suitable drive temperature.
Regular data backups are an important asset to have when trying to recover after a data loss event, but they do not prevent user errors or system failures. As such, a data backup plan needs to be established and run in unison with a disaster recovery plan in order to lower risk.
Data recovery
Data recovery is often performed by specialized commercial services that have developed often proprietary methods to recover data from physically damaged media. Service costs at data recovery labs are usually dependent on type of damage and type of storage medium, as well as the required security or cleanroom procedures.
File system corruption can frequently be repaired by the user or the system administrator. For example, a deleted file is typically not immediately overwritten on disk, but more often simply has its entry deleted from the file system index. In such a case, the deletion can be easily reversed.
Successful recovery from data loss generally requires implementation of an effective backup strategy. Without an implemented backup strategy, recovery requires reinstallation of programs and regeneration of data. Even with an effective backup strategy, restoring a system to the precise state it was in prior to the Data Loss Event is extremely difficult. Some level of compromise between granularity of recoverability and cost is necessary. Furthermore, a Data Loss Event may not be immediately apparent. An effective backup strategy must also consider the cost of maintaining the ability to recover lost data for long periods of time.
A highly effective backup system would have duplicate copies of every file and program that were immediately accessible whenever a Data Loss Event was noticed. However, in most situations, there is an inverse correlation between the value of a unit of data and the length of time it takes to notice the loss of that data. Taking this into consideration, many backup strategies decrease the granularity of restorability as the time increases since the potential Data Loss Event. By this logic, recovery from recent Data Loss Events is easier and more complete than recovery from Data Loss Events that happened further in the past.
Recovery is also related to the type of Data Loss Event. Recovering a single lost file is substantially different from recovering an entire system that was destroyed in a disaster. An effective backup regimen has some proportionality between the magnitude of Data Loss and the magnitude of effort required to recover. For example, it should be far easier to restore the single lost file than to recover the entire system.
Initial steps upon data loss
If data loss occurs, a successful recovery must ensure that the deleted data is not over-written. For this reason — one should avoid all write operations to the affected storage device. This includes not starting the system to which the affected device is connected. This is because many operating systems create temporary files in order to boot, and these may overwrite areas of lost data — rendering it unrecoverable. Viewing web pages has the same effect — potentially overwriting lost files with the temporary HTML and image files created when viewing a web page. File operations such as copying, editing, or deleting should also be avoided.
Upon realizing data loss has occurred, it is often best to shut down the computer and remove the drive in question from the unit. Re-attach this drive to a secondary computer with a write blocker device and then attempt to recover lost data. If possible, create an image of the drive in order to establish a secondary copy of the data. This can then be tested on, with recovery attempted, abolishing the risk of harming the source data.
See also
Data spill
Data truncation
List of data recovery software
References
External links
Data Loss Prevention
Some Data Loss Event
Computer data
Data recovery |
38404 | https://en.wikipedia.org/wiki/Classless%20Inter-Domain%20Routing | Classless Inter-Domain Routing | Classless Inter-Domain Routing (CIDR ) is a method for allocating IP addresses and for IP routing. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous classful network addressing architecture on the Internet. Its goal was to slow the growth of routing tables on routers across the Internet, and to help slow the rapid exhaustion of IPv4 addresses.
IP addresses are described as consisting of two groups of bits in the address: the most significant bits are the network prefix, which identifies a whole network or subnet, and the least significant set forms the host identifier, which specifies a particular interface of a host on that network. This division is used as the basis of traffic routing between IP networks and for address allocation policies.
Whereas classful network design for IPv4 sized the network prefix as one or more 8-bit groups, resulting in the blocks of Class A, B, or C addresses, under CIDR address space is allocated to Internet service providers and end users on any address-bit boundary. In IPv6, however, the interface identifier has a fixed size of 64 bits by convention, and smaller subnets are never allocated to end users.
CIDR encompasses several concepts. It is based on variable-length subnet masking (VLSM) which allows the specification of arbitrary-length prefixes. CIDR introduced a new method of representation for IP addresses, now commonly known as CIDR notation, in which an address or routing prefix is written with a suffix indicating the number of bits of the prefix, such as for IPv4, and for IPv6. CIDR introduced an administrative process of allocating address blocks to organizations based on their actual and short-term projected needs. The aggregation of multiple contiguous prefixes resulted in supernets in the larger Internet, which whenever possible are advertised as aggregates, thus reducing the number of entries in the global routing table.
Background
An IP address is interpreted as composed of two parts: a network-identifying prefix followed by a host identifier within that network. In automating the routing of packets to a given IP network, the question is how many bits of the address are in the network prefix, and how many are in the host identifier. In the previous IPv4 classful network architecture, the top three bits of the 32-bit IP address defined how many bits were in the network prefix:
The advantage of this system is that the network prefix could be determined for any IP address without any further information. The disadvantage is because only three sizes are available, networks were usually too big or too small for most organizations to use. The smallest allocation and routing block contained 256 addresses — larger than necessary for personal or department networks, but too small for most enterprises. The next larger block contained addresses—too large to be used efficiently even by large organizations. But for network users who needed more than addresses, the only other size gave them far too many, more than 16 million. This led to inefficiencies in address use as well as inefficiencies in routing, because it required a large number of allocated class-C networks with individual route announcements, being geographically dispersed with little opportunity for route aggregation.
During the first decade of the Internet after the invention of the Domain Name System (DNS) it became apparent that the devised system based on the classful network scheme of allocating the IP address space and the routing of IP packets was not scalable. This led to the successive development of subnetting and CIDR. The formerly meaningful class distinctions based on the top 3 address bits were removed, and the new system was described as being classless, with respect to the old system, which became known as classful. Routing protocols were revised to carry not just Internet addresses, but also their matching subnet masks. Implementing CIDR required every host and router on the Internet to be reprogrammed in small ways—no small feat at a time when the Internet was entering a period of rapid growth. In 1993, the Internet Engineering Task Force published a new set of standards, and , to define this new concept of allocation of IP address blocks and new methods of routing IPv4 packets. An updated version of the specification was published as in 2006.
After a period of experimenting with various alternatives, Classless Inter-Domain Routing was based on variable-length subnet masking (VLSM), which allows each network to be allocated or divided into various power-of-two-sized subnets, providing the opportunity to size each network or subnet appropriately for local needs. Variable-length subnet masks were mentioned as one alternative in . Techniques for grouping addresses for common operations were based on the concept of cluster addressing, first proposed by Carl-Herbert Rokitansky.
CIDR notation
CIDR notation is a compact representation of an IP address and its associated network mask. The notation was invented by Phil Karn in the 1980s. CIDR notation specifies an IP address, a slash ('/') character, and a decimal number. The decimal number is the count of consecutive leading 1-bits (from left to right) in the network mask. The number can also be thought of as the width (in bits) of the network prefix. The IP address in CIDR notation is always represented according to the standards for IPv4 or IPv6.
The address may denote a specific interface address (including a host identifier, such as ), or it may be the beginning address of an entire network (using a host identifier of 0, as in or its equivalent ). CIDR notation can even be used with no IP address at all, e.g. when referring to a as a generic description of an IPv4 network that has a 24-bit prefix and 8-bit host numbers.
For example:
represents the IPv4 address and its associated network prefix , or equivalently, its subnet mask , which has 24 leading 1-bits.
the IPv4 block represents the 1024 IPv4 addresses from to .
the IPv6 block represents the block of IPv6 addresses from to .
represents the IPv6 loopback address. Its prefix length is 128 which is the number of bits in the address.
In IPv4, what is now called CIDR notation came into wide use only after the implementation of CIDR. It does not appear in the original CIDR standards, which instead used a dotted-decimal subnet mask after the slash; for example, . Describing the network prefix's width as a single number () was easier for network administrators to conceptualize and to mentally calculate, so it gradually became incorporated into later standards documents and into network configuration interfaces.
The number of addresses inside a network or subnet may be calculated as 2address length − prefix length, where address length is 128 for IPv6 and 32 for IPv4. For example, in IPv4, the prefix length gives: 232−29 = 23 = 8 addresses.
Subnet masks
A subnet mask is a bitmask that encodes the prefix length associated with an IPv4 address or network in quad-dotted notation: 32 bits, starting with a number of 1-bits equal to the prefix length, ending with 0-bits, and encoded in four-part dotted-decimal format: . A subnet mask encodes the same information as a prefix length but predates the advent of CIDR. In CIDR notation, the prefix bits are always contiguous. Subnet masks were allowed by to specify non-contiguous bits until stated that the mask must be left contiguous. Given this constraint, a subnet mask and CIDR notation serve exactly the same function.
CIDR blocks
CIDR is principally a bitwise, prefix-based standard for the representation of IP addresses and their routing properties. It facilitates routing by allowing blocks of addresses to be grouped into single routing table entries. These groups, commonly called CIDR blocks, share an initial sequence of bits in the binary representation of their IP addresses. IPv4 CIDR blocks are identified using a syntax similar to that of IPv4 addresses: a dotted-decimal address, followed by a slash, then a number from 0 to 32, i.e., . The dotted decimal portion is the IPv4 address. The number following the slash is the prefix length, the number of shared initial bits, counting from the most-significant bit of the address. When emphasizing only the size of a network, the address portion of the notation is usually omitted. Thus, a /20 block is a CIDR block with an unspecified 20-bit prefix.
An IP address is part of a CIDR block and is said to match the CIDR prefix if the initial n bits of the address and the CIDR prefix are the same. An IPv4 address is 32 bits so an n-bit CIDR prefix leaves 32 − n bits unmatched, meaning that 232−n IPv4 addresses match a given n-bit CIDR prefix. Shorter CIDR prefixes match more addresses, while longer prefixes match fewer. In the case of overlaid CIDR blocks, an address can match multiple CIDR prefixes of different lengths.
CIDR is also used for IPv6 addresses and the syntax semantic is identical. The prefix length can range from 0 to 128, due to the larger number of bits in the address. However, by convention, a subnet on broadcast MAC layer networks always has 64-bit host identifiers. Larger prefixes are rarely used even on point-to-point links.
Assignment of CIDR blocks
The Internet Assigned Numbers Authority (IANA) issues to regional Internet registries (RIRs) large, short-prefix CIDR blocks. However, a (with over sixteen million addresses) is the largest block IANA will allocate. For example, is administered by RIPE NCC, the European RIR. The RIRs, each responsible for a single, large, geographic area, such as Europe or North America, subdivide these blocks and allocate subnets to local Internet registries (LIRs). Similar subdividing may be repeated several times at lower levels of delegation. End-user networks receive subnets sized according to their projected short-term need. Networks served by a single ISP are encouraged by IETF recommendations to obtain IP address space directly from their ISP. Networks served by multiple ISPs, on the other hand, may obtain provider-independent address space directly from the appropriate RIR.
For example, in the late 1990s, the IP address (since reassigned) was used by www.freesoft.org. An analysis of this address identified three CIDR prefixes. , a large CIDR block containing over 2 million addresses, had been assigned by ARIN (the North American RIR) to MCI. Automation Research Systems (ARS), a Virginia VAR, leased an Internet connection from MCI and was assigned the block, capable of addressing just over 1000 devices. ARS used a block for its publicly accessible servers, of which was one. All of these CIDR prefixes would be used, at different locations in the network. Outside MCI's network, the prefix would be used to direct to MCI traffic bound not only for , but also for any of the roughly two million IP addresses with the same initial 11 bits. Within MCI's network, would become visible, directing traffic to the leased line serving ARS. Only within the ARS corporate network would the prefix have been used.
IPv4 CIDR blocks
In common usage, the first address in a subnet, all binary zero in the host identifier, is reserved for referring to the network itself, while the last address, all binary one in the host identifier, is used as a broadcast address for the network; this reduces the number of addresses available for hosts by 2. As a result, a network, with one binary digit in the host identifier, would be unusable, as such a subnet would provide no available host addresses after this reduction. creates an exception to the "host all ones" and "host all zeros" rules to make networks usable for point-to-point links. addresses (single-host network) must be accessed by explicit routing rules, as there is no room in such a network for a gateway.
In routed subnets larger than or , the number of available host addresses is usually reduced by two, namely the largest address, which is reserved as the broadcast address, and the smallest address, which identifies the network itself.
IPv6 CIDR blocks
The large address size used in IPv6 permitted implementation of worldwide route summarization and guaranteed sufficient address pools at each site. The standard subnet size for IPv6 networks is a block, which is required for the operation of stateless address autoconfiguration. At first, the IETF recommended in as a best practice that all end sites receive a address allocation, however, criticism and reevaluation of actual needs and practices has led to more flexible allocation recommendations in suggesting a significantly smaller allocation for some sites, such as a block for home networks.
This IPv6 subnetting reference lists the sizes for IPv6 subnetworks. Different types of network links may require different subnet sizes. The subnet mask separates the bits of the network identifier prefix from the bits of the interface identifier. Selecting a smaller prefix size results in fewer number of networks covered, but with more addresses within each network.
2001:0db8:0123:4567:89ab:cdef:1234:5678
|||| |||| |||| |||| |||| |||| |||| ||||
|||| |||| |||| |||| |||| |||| |||| |||128 Single end-points and loopback
|||| |||| |||| |||| |||| |||| |||| |||127 Point-to-point links (inter-router)
|||| |||| |||| |||| |||| |||| |||| ||124
|||| |||| |||| |||| |||| |||| |||| |120
|||| |||| |||| |||| |||| |||| |||| 116
|||| |||| |||| |||| |||| |||| |||112
|||| |||| |||| |||| |||| |||| ||108
|||| |||| |||| |||| |||| |||| |104
|||| |||| |||| |||| |||| |||| 100
|||| |||| |||| |||| |||| |||96
|||| |||| |||| |||| |||| ||92
|||| |||| |||| |||| |||| |88
|||| |||| |||| |||| |||| 84
|||| |||| |||| |||| |||80
|||| |||| |||| |||| ||76
|||| |||| |||| |||| |72
|||| |||| |||| |||| 68
|||| |||| |||| |||64 Single LAN; default prefix size for SLAAC
|||| |||| |||| ||60 Some (very limited) 6rd deployments (/60 = 16 /64 blocks)
|||| |||| |||| |56 Minimal end sites assignment; e.g. home network (/56 = 256 /64 blocks)
|||| |||| |||| 52 /52 block = 4096 /64 blocks
|||| |||| |||48 Typical assignment for larger sites (/48 = 65536 /64 blocks)
|||| |||| ||44
|||| |||| |40
|||| |||| 36 possible future local Internet registry (LIR) extra-small allocations
|||| |||32 LIR minimum allocations
|||| ||28 LIR medium allocations
|||| |24 LIR large allocations
|||| 20 LIR extra large allocations
|||16
||12 Regional Internet registry (RIR) allocations from IANA
|8
4
Prefix aggregation
CIDR provides fine-grained routing prefix aggregation. For example, if the first 20 bits of their network prefixes match, sixteen contiguous networks can be aggregated and advertised to a larger network as a single routing table entry. This reduces the number of routes that have to be advertised.
See also
Internet protocol suite
References
Further reading
External links
CIDR Report (updated daily)
Internet Standards
Internet architecture
Routing
IP addresses
it:Supernetting#CIDR |
9308305 | https://en.wikipedia.org/wiki/Tantrumedia | Tantrumedia | Tantrumedia is a Business to Business company based on the Wirral in the United Kingdom. They provide services including; web development, Linux web hosting, software development, musical composition & sound effect production, audio post production, art & design, printing, company stationery, business cards, promotional goods, CD mastering & procurement, bookkeeping, and consultancy on multimedia & I.T. topics.
Management
The Managing Director is Tim Wright, formerly of Checkmate Solutions Ltd. (Managing Director & co. founder), Jester Interactive Ltd. (Creative Director & co. founder), Psygnosis (Senior Sound Artist, Studio Liverpool) and Littlewoods plc. (PC Deputy Systems Manager Littlewoods Index).
History
Tantrumedia launched in 2003 with references from video game industry individuals and press announcements, with the intention of providing B2B services including web development, design & print, interactive software development and music-related activities.
Since then, Tantrumedia has accrued a large and diverse client base, ranging from sole trader electricians & plumbers to large corporations such as Sony, Panasonic, Experian, Siemens and Cable & Wireless.
In 2010 Tantrumedia launched a dedicated audio division called Bwrw Eira ( 'Bwrw Eira' is the Welsh for 'snowing' Translation ). This leaves the main brand to represent their web development & hosting, software development, book-keeping and consultancy activities.
Company logo
Software titles
PC - Empire Interactive plc.
EJay eJay eQuality (2009 - unreleased due to publisher Empire Interactive plc. being dissolved)
EJay eJay Virtual Music Studio (2007)
EJay eJay R&B 1 (2007)
EJay eJay Techno 5 (2007)
EJay eJay HipHop 6 (2007)
EJay eJay Dance 7 (2005)
PC - XS Games, LLC
Ring Factory (2007)
Computer game audio
D.J. Skillz, Playpen Studios (2010)
Venus Redemption, nDREAMS (2010)
Gravity Crash, Just Add Water Developments (2010 - PS3/PSP)
Musicality, nDREAMS (2009)
Early Years, MIDAS Interactive (2009 - NDS, Wii)
Spellbound, Superior Software (2009 - NDS)
Spellbound Party, Superior Software (2009 - Wii)
TT Superbike Legends, Jester Interactive (2008 - PS2)
Sudoku, Superior Software (2007 - NDS)
Wipeout Pure, SCEE (2005 - PSP)
Jet Set Willy, Numfum (2004 - JAVA Mobile Phone)
Film, TV and video post production
Myriad Mobile (2010)
Nottingham University (2009–2010)
Panasonic Telecommunications (2007–2010)
Chemistry Digital (2007–2010)
Burning Man, Controlled Burn Reno (2009)
Unilever Products (2009)
Cable & Wireless (2009)
Polycom (2008)
Busty Kelp (2008)
Siemens Systems (2008)
Baileys Drinks (2007)
Intermec Systems (2007)
RED by Merkelbach Films (2006)
References
EuroGamer Article: Formation of Tantrumedia Limited
Wirral Wide Project launch information from LXD Network
Gamasutra Press Release RE:Bwrw Eira
Develop Online Press Release RE:Bwrw Eira
Games Industry.Biz RE:Bwrw Eira
Video game companies of the United Kingdom
Video game development companies |
2117 | https://en.wikipedia.org/wiki/Apple%20III | Apple III | The Apple III (styled as apple ///) is a business-oriented personal computer produced by Apple Computer and released in 1980. Running the Apple SOS operating system, it was intended as the successor to the Apple II series, but was largely considered a failure in the market. It was designed to provide key features business users wanted in a personal computer: a true typewriter-style upper/lowercase keyboard (the Apple II only supported uppercase) and an 80-column display.
Work on the Apple III started in late 1978 under the guidance of Dr. Wendell Sander. It had the internal code name of "Sara", named after Sander's daughter. The system was announced on May 19, 1980 and released in late November that year. Serious stability issues required a design overhaul and a recall of the first 14,000 machines produced. The Apple III was formally reintroduced on November 9, 1981.
Damage to the computer's reputation had already been done and it failed to do well commercially. Development stopped and the Apple III was discontinued on April 24, 1984, and its last successor, the III Plus, was dropped from the Apple product line in September 1985.
An estimated 65,000–75,000 Apple III computers were sold. The Apple III Plus brought this up to approximately 120,000. Apple co-founder Steve Wozniak stated that the primary reason for the Apple III's failure was that the system was designed by Apple's marketing department, unlike Apple's previous engineering-driven projects. The Apple III's failure led Apple to reevaluate its plan to phase out the Apple II, prompting the eventual continuation of development of the older machine. As a result, later Apple II models incorporated some hardware and software technologies of the Apple III, such as the thermal Apple Scribe printer.
Overview
Design
Steve Wozniak and Steve Jobs expected hobbyists to purchase the Apple II, but because of VisiCalc and Disk II, small businesses purchased 90% of the computers. The Apple III was designed to be a business computer and successor. Though the Apple II contributed to the inspirations of several important business products, such as VisiCalc, Multiplan, and Apple Writer, the computer's hardware architecture, operating system, and developer environment are limited. Apple management intended to clearly establish market segmentation by designing the Apple III to appeal to the 90% business market, leaving the Apple II to home and education users. Management believed that "once the Apple III was out, the Apple II would stop selling in six months", Wozniak said.
The Apple III is powered by a 1.8-megahertz Synertek 6502A or B 8-bit CPU and, like some of the later machines in the Apple II family, uses bank switching techniques to address memory beyond the 6502's traditional 64 kB limit, up to 256 kB in the III's case. Third-party vendors produced memory upgrade kits that allow the Apple III to reach up to 512 kB of random-access memory (RAM). Other Apple III built-in features include an 80-column, 24-line display with upper and lowercase characters, a numeric keypad, dual-speed (pressure-sensitive) cursor control keys, 6-bit (DAC) audio, and a built-in 140-kilobyte 5.25-inch floppy disk drive. Graphics modes include 560x192 in black and white, and 280x192 with 16 colors or shades of gray. Unlike the Apple II, the Disk III controller is part of the logic board.
The Apple III is the first Apple product to allow the user to choose both a screen font and a keyboard layout: either QWERTY or Dvorak. These choices cannot be changed while programs were running, unlike the Apple IIc, which has a keyboard switch directly above the keyboard, allowing the user to switch on the fly.
Software
The Apple III introduced an advanced operating system called Apple SOS, pronounced "apple sauce". Its ability to address resources by name allows the Apple III to be more scalable than the Apple II's addressing by physical location such as PR#6, CATALOG, D1. Apple SOS allows the full capacity of a storage device to be used as a single volume, such as the Apple ProFile hard disk drive, and it supports a hierarchical file system. Some of the features and code base of Apple SOS were later adopted into the Apple II's ProDOS and GS/OS operating systems, as well as Lisa 7/7 and Macintosh system software.
With a starting price between $4,340 to $7,800, the Apple III was more expensive than many of the CP/M-based business computers that were available at the time. Few software applications other than VisiCalc are available for the computer; according to a presentation at KansasFest 2012, fewer than 50 Apple III-specific software packages were ever published, most shipping when the III Plus was released. Because Apple did not view the Apple III as suitable for hobbyists, it did not provide much of the technical software information that accompanies the Apple II. Originally intended as a direct replacement to the Apple II series, it was designed to be backward compatible with Apple II software. However, since Apple did not want to encourage continued development of the II platform, Apple II compatibility exists only in a special Apple II Mode which is limited in its capabilities to the emulation of a basic Apple II Plus configuration with 48 kB of RAM. Special chips were intentionally added to prevent access from Apple II Mode to the III's advanced features such as its larger amount of memory.
Peripherals
The Apple III has four expansion slots, a number that inCider in 1986 called "miserly". Apple II cards are compatible but risk violating government RFI regulations, and require Apple III-specific device drivers; BYTE stated that "Apple provides virtually no information on how to write them". As with software, Apple provided little hardware technical information with the computer but Apple III-specific products became available, such as one that made the computer compatible with the Apple IIe. Several new Apple-produced peripherals were developed for the Apple III. The original Apple III has a built-in real-time clock, which is recognized by Apple SOS. The clock was later removed from the "revised" model, and was instead made available as an add-on.
Along with the built-in floppy drive, the Apple III can also handle up to three additional external Disk III floppy disk drives. The Disk III is only officially compatible with the Apple III. The Apple III Plus requires an adaptor from Apple to use the Disk III with its DB-25 disk port.
With the introduction of the revised Apple III a year after launch, Apple began offering the ProFile external hard disk system. Priced at $3,499 for 5 MB of storage, it also required a peripheral slot for its controller card.
Backward compatibility
The Apple III has the built-in hardware capability to run Apple II software. In order to do so, an emulation boot disk is required that functionally turns the machine into a standard 48-kilobyte Apple II Plus, until it is powered off. The keyboard, internal floppy drive (and one external Disk III), display (color is provided through the 'B/W video' port) and speaker all act as Apple II peripherals. The paddle and serial ports can also function in Apple II mode, however with some limitations and compatibility issues.
Apple engineers added specialized circuity with the sole purpose of blocking access to its advanced features when running in Apple II emulation mode. This was done primarily to discourage further development and interest in the Apple II line, and to push the Apple III as its successor. For example, no more than of RAM can be accessed, even if the machine has of RAM or higher present. Many Apple II programs require a minimum of of RAM, making them impossible to run on the Apple III. Similarly, access to lowercase support, 80 columns text, or its more advanced graphics and sound are blocked by this hardware circuitry, making it impossible for even skilled software programmers to bypass Apple's lockout. A third-party company, Titan Technologies, sold an expansion board called the III Plus II that allows Apple II mode to access more memory, a standard game port, and with a later released companion card, even emulate the Apple IIe.
Certain Apple II slot cards can be installed in the Apple III and used in native III-mode with custom written SOS device drivers, including Grappler Plus and Liron 3.5 Controller.
Revisions
After overheating issues were attributed to serious design flaws, a redesigned logic board was introduced – which included a lower power supply requirement, wider circuit traces and better-designed chip sockets. The $3,495 revised model also includes 256 kB of RAM as the standard configuration. The 14,000 units of the original Apple III sold were returned and replaced with the entirely new revised model.
Apple III Plus
Apple discontinued the III in October 1983 because it violated FCC regulations, and the FCC required the company to change the redesigned computer's name. It introduced the Apple III Plus in December 1983 at a price of US$2,995. This newer version includes a built-in clock, video interlacing, standardized rear port connectors, 55-watt power supply, 256 kB of RAM as standard, and a redesigned, Apple IIe-like keyboard.
Owners of the Apple III could purchase individual III Plus upgrades, like the clock and interlacing feature, and obtain the newer logic board as a service replacement. A keyboard upgrade kit, dubbed "Apple III Plus upgrade kit" was also made available – which included the keyboard, cover, keyboard encoder ROM, and logo replacements. This upgrade had to be installed by an authorized service technician.
Design flaws
According to Wozniak, the Apple III "had 100 percent hardware failures". Former Apple executive Taylor Pohlman stated that:
Steve Jobs insisted on the idea of having no fan or air vents, in order to make the computer run quietly. Jobs would later push this same ideology onto almost all Apple models he had control of, from the Apple Lisa and Macintosh 128K to the iMac. To allow the computer to dissipate heat, the base of the Apple III was made of heavy cast aluminum, which supposedly acts as a heat sink. One advantage to the aluminum case was a reduction in RFI (Radio Frequency Interference), a problem which had plagued the Apple II series throughout its history. Unlike the Apple II series, the power supply was mounted – without its own shell – in a compartment separate from the logic board. The decision to use an aluminum shell ultimately led to engineering issues which resulted in the Apple III's reliability problems. The lead time for manufacturing the shells was high, and this had to be done before the motherboard was finalized. Later, it was realized that there was not enough room on the motherboard for all of the components unless narrow traces were used.
Many Apple IIIs were thought to have failed due to their inability to properly dissipate heat. inCider stated in 1986 that "Heat has always been a formidable enemy of the Apple ///", and some users reported that their Apple IIIs became so hot that the chips started dislodging from the board, causing the screen to display garbled data or their disk to come out of the slot "melted". BYTE wrote, "the integrated circuits tended to wander out of their sockets". It is has been rumored Apple advised customers to tilt the front of the Apple III six inches above the desk and then drop it to reseat the chips as a temporary solution. Other analyses blame a faulty automatic chip insertion process, not heat.
Case designer Jerry Manock denied the design flaw charges, insisting that tests proved that the unit adequately dissipated the internal heat. The primary cause, he claimed, was a major logic board design problem. The logic board used "fineline" technology that was not fully mature at the time, with narrow, closely spaced traces. When chips were "stuffed" into the board and wave-soldered, solder bridges would form between traces that were not supposed to be connected. This caused numerous short circuits, which required hours of costly diagnosis and hand rework to fix. Apple designed a new circuit board with more layers and normal-width traces. The new logic board was laid out by one designer on a huge drafting board, rather than using the costly CAD-CAM system used for the previous board, and the new design worked.
Earlier Apple III units came with a built-in real time clock. The hardware, however, would fail after prolonged use. Assuming that National Semiconductor would test all parts before shipping them, Apple did not perform this level of testing. Apple was soldering chips directly to boards and could not easily replace a bad chip if one was found. Eventually, Apple solved this problem by removing the real-time clock from the Apple III's specification rather than shipping the Apple III with the clock pre-installed, and then sold the peripheral as a level 1 technician add-on.
BASIC
Microsoft and Apple each developed their own versions of BASIC for the Apple III. Apple III Microsoft BASIC was designed to run on the CP/M platform available for the Apple III. Apple Business BASIC shipped with the Apple III. Donn Denman ported Applesoft BASIC to SOS and reworked it to take advantage of the extended memory of the Apple III.
Both languages introduced a number of new or improved features over Applesoft BASIC. Both languages replaced Applesoft's single-precision floating-point variables using 5-byte storage with the somewhat-reduced-precision 4-byte variables, while also adding a larger numerical format. Apple III Microsoft BASIC provides double-precision floating-point variables, taking 8 bytes of storage, while Apple Business BASIC offers an extra-long integer type, also taking 8 bytes for storage. Both languages also retain 2-byte integers, and maximum 255-character strings.
Other new features common to both languages include:
Incorporation of disk-file commands within the language.
Operators for MOD and for integer-division.
An optional ELSE clause in IF...THEN statements.
HEX$() function for hexadecimal-format output.
INSTR function for finding a substring within a string.
PRINT USING statement to control format of output. Apple Business BASIC had an option, in addition to directly specifying the format with a string expression, of giving the line number where an IMAGE statement gave the formatting expression, similar to a FORMAT statement in FORTRAN.
Some features work differently in each language:
Microsoft BASIC additional features
INPUT$() function to replace Applesoft's GET command.
LINE INPUT statement to input an entire line of text, regardless of punctuation, into a single string variable.
LPRINT and LPRINT USING statements to automatically direct output to paper.
LSET and RSET statements to left- or right-justify a string expression within a given string variable's character length.
OCT$() function for output, and "&"- or "&O"-formatted expressions, for manipulating octal notation.
SPACE$() function for generating blank spaces outside of a PRINT statement, and STRING$() function to do likewise with any character.
WHILE...WEND statements, for loop structures built on general Boolean conditions without an index variable.
Bitwise Boolean (16-bit) operations (AND, OR, NOT), with additional operators XOR, EQV, IMP.
Line number specification in the RESTORE command.
RESUME options of NEXT (to skip to the statement after that which caused the error) or a specified line number (which replaces the idea of exiting error-handling by GOTO-line, thus avoiding Applesoft II's stack error problem).
Multiple parameters in user-defined (DEF FN) functions.
A return to the old Applesoft One concept of having multiple USR() functions at different addresses, by establishing ten different USR functions, numbered USR0 to USR9, with separate DEF USRx statements to define the address of each. The argument passed to a USRx function can be of any specific type, including string. The returned value can also be of any type, by default the same type as the argument passed.
There is no support for graphics provided within the language, nor for reading analog controls or buttons; nor is there a means of defining the active window of the text screen.
Business BASIC additional features
Apple Business BASIC eliminates all references to absolute memory addresses. Thus, the POKE command and PEEK() function were not included in the language, and new features replaced the CALL statement and USR() function. The functionality of certain features in Applesoft that had been achieved with various PEEK and POKE locations is now provided by:
BUTTON() function to read game-controller buttons
WINDOW statement to define the active window of the text screen by its coordinates
KBD, HPOS, and VPOS system variables
External binary subroutines and functions are loaded into memory by a single INVOKE disk-command that loads separately-assembled code modules. A PERFORM statement is then used to call an INVOKEd procedure by name, with an argument-list. INVOKEd functions would be referenced in expressions by EXFN. (floating-point) or EXFN%. (integer), with the function name appended, plus the argument-list for the function.
Graphics are supported with an INVOKEd module, with features including displaying text within graphics in various fonts, within four different graphics modes available on the Apple III.
Reception
Despite devoting the majority of its R&D to the Apple III and so ignoring the II that for a while dealers had difficulty in obtaining the latter, the III's technical problems made marketing the computer difficult. Ed Smith, who after designing the APF Imagination Machine worked as a distributor's representative, described the III as "a complete disaster". He recalled that he "was responsible for going to every dealership, setting up the Apple III in their showroom, and then explaining to them the functions of the Apple III, which in many cases didn’t really work".
Sales
Pohlman reported that Apple was only selling 500 units a month by late 1981, mostly as replacements. The company was able to eventually raise monthly sales to 5,000, but the IBM PC's successful launch had encouraged software companies to develop for it instead, prompting Apple to shift focus to the Lisa and Macintosh. The PC almost ended sales of the Apple III, the most closely comparable Apple computer model. By early 1984, sales were primarily to existing III owners, Apple itself—its 4500 employees were equipped with some 3000-4500 units—and some small businesses. Apple finally discontinued the Apple III series on April 24, 1984, four months after introducing the III Plus, after selling only 65,000-75,000 units and replacing 14,000 defective units.
Jobs said that the company lost "infinite, incalculable amounts" of money on the Apple III. Wozniak estimated that Apple had spent $100 million on the III, instead of improving the II and better competing against IBM. Pohlman claimed that there was a "stigma" at Apple associated with having contributed to the computer. Most employees who worked on the III reportedly left Apple.
Legacy
The file system and some design ideas from Apple SOS, the Apple III's operating system, were part of Apple ProDOS and Apple GS/OS, the major operating systems for the Apple II series following the demise of the Apple III, as well as the Apple Lisa, which was the de facto business-oriented successor to the Apple III. The hierarchical file system influenced the evolution of the Macintosh: while the original Macintosh File System (MFS) was a flat file system designed for a floppy disk without subdirectories, subsequent file systems were hierarchical. By comparison, the IBM PC's first file system (again designed for floppy disks) was also flat and later versions (designed for hard disks) were hierarchical.
In popular culture
At the start of the Walt Disney Pictures film TRON, lead character Kevin Flynn (played by Jeff Bridges) is seen hacking into the ENCOM mainframe using an Apple III.
References
Sources
External links
The Ill-Fated Apple III
Many manuals and diagrams
Sara – Apple /// emulator
The Ill-Fated Apple III Low End Mac
Apple III Chaos: Apple’s First Failure Low End Mac
Apple II family
Computer-related introductions in 1980
Discontinued Apple Inc. products
8-bit computers |
48858619 | https://en.wikipedia.org/wiki/2016%20in%20the%20United%20States | 2016 in the United States | Events in the year 2016 in the United States.
Incumbents
Federal government
President: Barack Obama (D-Illinois)
Vice President: Joe Biden (D-Delaware)
Chief Justice: John Roberts (New York)
Speaker of the House of Representatives: Paul Ryan (R-Wisconsin)
Senate Majority Leader: Mitch McConnell (R-Kentucky)
Congress: 114th
Events
January
January 1The following laws go into effect:
Hawaii becomes the first state to raise the legal smoking age to 21.
Texas allows the open carry of guns in public places.
Tennessee launches the nation's first statewide registry of animal abusers.
Washington, D.C., and Montgomery County, Maryland, ban the storage of food in Styrofoam containers.
January 2–26The 3 Percenters and several other armed militia organizations take over the headquarters of the United States Fish and Wildlife Service's Malheur National Wildlife Refuge in Harney County, Oregon, in a series of incidents stemming from the 2014 Bundy standoff. The Federal Bureau of Investigation (FBI) ends the occupation with a shootout, killing one militiaman and arresting five others, including leader Ammon Bundy.
January 5President Obama introduces executive orders to expand the enforcement of federal gun laws.
January 6 – Star Wars: The Force Awakens becomes the highest-grossing film in North America, beating previous record-holder Avatar lifetime gross of $760 million in just 20 days of release.
January 8The Obama administration announces an alliance with tech companies—including Apple, Google, Facebook, Microsoft, and Twitter—to block the recruitment of Americans to Islamic extremist groups, specifically the Islamic State of Iraq and the Levant (ISIL), via social media.
January 9For the first time in its history, the national Powerball lottery prize surpasses $1 billion.
January 1073rd Golden Globe Awards: The Revenant wins the Golden Globe Award for Best Motion Picture – Drama, with Leonardo DiCaprio winning the award for Best Actor – Motion Picture Drama and Alejandro G. Iñárritu winning Best Director. The Martian wins the award for Best Motion Picture – Musical or Comedy, and Matt Damon wins Best Actor – Motion Picture Musical or Comedy. Brie Larson wins Best Actress in a Motion Picture – Drama for Room, and Jennifer Lawrence wins Best Actress – Motion Picture Comedy or Musical for Joy. Mr. Robot wins Best Television Series – Drama; Mozart in the Jungle wins Best Television Series – Musical or Comedy; and Wolf Hall wins Best Miniseries or Television Film.
January 12President Obama gives his final State of the Union Address to the 114th United States Congress.
January 14The nominees for the 88th Academy Awards are announced at the Samuel Goldwyn Theater in Beverly Hills, California. The nominees for Best Picture are The Big Short, Bridge of Spies, Brooklyn, Mad Max: Fury Road, The Martian, The Revenant, Room, and Spotlight. The nominees are criticized for their lack of diversity, resulting in boycotts by celebrities like Will Smith and Spike Lee, an official motion by the Academy of Motion Picture Arts and Sciences to increase diversity in its membership, and calls for comedian Chris Rock to step down as host.
January 15Myloh Jaqory Mason, a fugitive on the FBI's Ten Most Wanted list, is arrested in Thornton, Colorado, after being added to the list on December 17, 2015, for two bank robberies and two attempted murders.
January 16
President Obama announces a federal state of emergency in Flint, Michigan, allowing additional support from the Federal Emergency Management Agency and the Department of Homeland Security in response to the ongoing contamination of tap water in the city.
The United States lifts several economic sanctions against Iran in accordance with a multinational agreement made in July 2014 concerning Iran's nuclear program. Sanctions concerning Iran's human rights abuses, missile activity, and support for terrorism remain in effect.
January 21A crippling winter storm hits the central and eastern United States, producing several feet of snow and ice (as well as strong winds and tornadoes in some areas) and killing 55 people.
January 25A Texas grand jury finds no wrongdoing on the part of Planned Parenthood after a series of undercover videos made by the Center for Medical Progress (CMP), an anti-abortion organization, purported to show Planned Parenthood employees selling fetal tissue and organs. The grand jury indicts CMP founder David Daleiden and another videographer.
January 30During a brawl between rival motorcycle clubs, gunfire and stabbings kill one person and injure seven at the National Western Complex in Denver, Colorado.
February
February 1
The February 2016 North American storm complex causes power outages for more than 70,000 people in Southern California.
The Iowa caucuses are held, beginning the Democratic and Republican nomination processes for the 2016 presidential election. Senator Ted Cruz (R-Texas) wins the Republican caucuses, and former Secretary of State Hillary Clinton wins the Democratic caucuses. After poor showings in Iowa, Democratic candidate Martin O'Malley and Republican candidate Mike Huckabee suspend their campaigns.
February 3Senator Rand Paul (R-Kentucky) and former Senator Rick Santorum (R-Pennsylvania) suspend their presidential candidacies.
Barack Obama becomes the first U.S. president to visit a U.S. mosque in Baltimore, Maryland.
February 4Six people are found dead, five from stab wounds and one from gunshot wounds, at a house in Chicago.
February 7
Super Bowl 50 is played at Levi's Stadium in Santa Clara, California. The Denver Broncos defeat the Carolina Panthers by a score of 24–10.
February 9The New Hampshire primaries are held. Donald Trump wins the Republican primary, and Bernie Sanders wins the Democratic primary.
February 10New Jersey Governor Chris Christie and former Hewlett-Packard CEO Carly Fiorina suspend their campaigns for the Republican nomination.
February 12Former Virginia Governor Jim Gilmore suspends his campaign for the Republican presidential nomination.
February 13Supreme Court Justice Antonin Scalia dies at the age of 79.
February 14The 2016 North American cold wave causes record low temperatures in New England.
February 1558th Annual Grammy Awards: "Uptown Funk" by Mark Ronson, featuring Bruno Mars, wins the Grammy Award for Record of the Year. Taylor Swift wins Album of the Year for 1989, Meghan Trainor wins Best New Artist, and Song of the Year is awarded to "Thinking Out Loud", by Ed Sheeran and Amy Wadge.
February 18106-year old civil rights activist, Virginia McLaurin, visits Barack Obama at the White House, becoming the oldest known-person and first centenarian to the visit the White House.
February 20A man kills six people and injures two in Kalamazoo, Michigan, before being apprehended by the police.
February 21Denny Hamlin wins the Daytona 500 in the closest finish in the race's 58-year history, beating Martin Truex Jr. by 11 thousandths of a second.
February 25A disgruntled former employee opens fire in an office building in Hesston, Kansas, killing three people and injuring fourteen others.
February 27Three people are stabbed at a Ku Klux Klan rally in Anaheim, California, and several people are arrested.
February 2888th Academy Awards: The ceremony, hosted by Chris Rock, is held at Dolby Theatre in Hollywood. Tom McCarthy's Spotlight wins the Academy Award for Best Picture. Leonardo DiCaprio wins Best Actor for his performance in The Revenant, his first acting Oscar in five nominations. Brie Larson wins Best Actress for her performance in Room, her first acting Oscar and first nomination. Alejandro G. Iñárritu wins his second Best Director award for The Revenant, becoming the first director to win back-to-back Oscars since Joseph L. Mankiewicz in 1949 and 1950. George Miller's Mad Max: Fury Road wins six awards, the most for the evening. The telecast garners over 34.4 million viewers.
February 29H2, History's secondary network, becomes Viceland, a lifestyle channel aimed at millennials which will include programming about music, cooking, sports, technology and hard-hitting documentaries. The change comes after A&E Networks purchased a 10% stake in Vice Media, Inc. in August 2014.
March
March 1Super Tuesday: Hillary Clinton and Donald Trump each win seven states on the Democratic and Republican sides, respectively. In the Democratic primaries, Clinton takes Alabama, Arkansas, Georgia, Massachusetts, Tennessee, Texas, and Virginia; Bernie Sanders takes Colorado, Minnesota, Oklahoma, and Vermont. In the Republican primaries, Trump wins Alabama, Arkansas, Georgia, Massachusetts, Tennessee, Vermont, and Virginia; Ted Cruz wins Alaska, Oklahoma, and Texas; and Senator Marco Rubio (R-Florida) wins Minnesota.
March 4
Retired neurosurgeon Ben Carson suspends his campaign for the Republican presidential nomination.
Walt Disney Animation Studios' 55th feature film, Zootopia, is released in theatres to acclaim as the studio's most critically well-received film since 1994's The Lion King. It is, at that point, Disney's second-most commercially successful animated film behind 2013's Frozen and the second to cross the billion-dollar mark.
March 9
Pablo Antonio Serrano-Vitorino, an illegal immigrant from Mexico, is arrested on suspicion of killing five men in a shooting spree.
The death toll in the country's largest outbreak of Elizabethkingia meningoseptica rises to 18 in Wisconsin, with 44 more infected.
Six people are killed and three others injured in a mass shooting at a house in Wilkinsburg, Pennsylvania.
March 11At least four people are injured and five are arrested in Chicago when protesters demonstrating against Donald Trump scuffle with Trump supporters at a canceled Trump rally.
March 14Abu Omar al-Shishani, a commander for the Islamic State, dies after being wounded in a U.S. airstrike near Al-Shaddadah, Syria, on March 4.
March 15Marco Rubio suspends his campaign for the Republican presidential nomination after losing the primary in his home state, Florida.
March 16President Obama nominates Merrick Garland to replace Antonin Scalia on the Supreme Court.
March 21President Obama lands in Cuba for a meeting with Cuban President Raúl Castro, becoming the first U.S. president to visit Cuba since 1928.
March 25Batman v Superman: Dawn of Justice, directed by Zack Snyder, is released as the second film in the DC Extended Universe and a follow-up to 2013's Man of Steel. An extended cut, dubbed the "Ultimate Edition", is later released digitally on June 28.
March 28
The Department of Justice announces that it has unlocked the iPhone of a suspect in the 2015 San Bernardino attack without the help of Apple, after a heated public debate over the department's handling of encryption software in counter-terrorism efforts.
The United States Capitol is placed under lockdown after a man opens fire near the Capitol Visitor Center. The suspect is shot by police and taken into custody.
March 31 – April 1The 2016 Nuclear Security Summit is held at the Walter E. Washington Convention Center in Washington, D.C., with 58 participants in attendance. It is the fourth edition of the conference, following the 2014 Nuclear Security Summit.
April
April 2
A coalition of progressive groups begins a ten-day march from Philadelphia to Washington, D.C., with the goal of revealing corruption in campaign finance and "rigged voting laws". The group also demands a Senate hearing on President Obama's Supreme Court nomination. Participants include political commentator Cenk Uygur, actress Rosario Dawson, law professor Lawrence Lessig, and Ben & Jerry's co-founders Ben Cohen and Jerry Greenfield. As of April 18, more than 1,200 protesters had been arrested.
The United States Air Force deploys twelve F-15 Eagles and 350 personnel to Iceland and the Netherlands to deter further Russian aggression in Europe.
A Lancair IV monoplane crashes into a parked car along a highway 50 miles north of San Diego, injuring five people and killing one.
April 3An Amtrak passenger train on the Palmetto route, traveling from New York City to Savannah, Georgia, with 341 passengers and seven crew members on board, derails in Chester, Pennsylvania, after striking a backhoe on the tracks, injuring 35 and killing two.
April 4The Villanova Wildcats defeat the North Carolina Tar Heels, 77–74, in the NCAA Men's Championship.
April 5
Pharmaceutical companies Pfizer and Allergan terminate a planned $160 billion merger because of the Obama administration's new regulations on tax inversion. Pfizer will have to pay $400 million to Allergan for expenses in relation to the deal.
Mississippi Governor Phil Bryant signs a bill allowing private businesses and religious groups to deny services to gay, lesbian, bisexual, and transgender (LGBT) people. The law is later blocked, pending appeal, by a federal judge.
The Connecticut Huskies defeat the Syracuse Orange, 82–51, in the NCAA Women's Championship.
The Wisconsin primaries are held. Ted Cruz beats Donald Trump and Ohio Governor John Kasich to win the Republican race. Bernie Sanders defeats Hillary Clinton in the Democratic race.
April 7 – Fox's American Idol concludes its 15-season run, with Trent Harmon being declared the final winner.
April 8
An airman shoots and kills a squadron commander and then himself at Lackland Air Force Base in San Antonio, Texas.
Bernie Sanders accepts an invitation by Pope Francis to visit the Vatican, becoming the first American presidential candidate to receive such an invitation.
SpaceX successfully launches its Falcon 9 rocket from Cape Canaveral, Florida, on a NASA cargo run to the International Space Station, and lands its reusable main-stage booster on an autonomous spaceport drone ship.
April 9The United States Air Force deploys B-52 bombers to Al Udeid Air Base in Doha, Qatar, to join the fight against the Islamic State in Iraq and Syria.
April 11John Kerry becomes the first Secretary of State to visit the Hiroshima Peace Memorial Museum, where he and other Group of Seven (G7) members lay wreaths. Before Kerry's trip, Representative Nancy Pelosi (D-California)—then the Speaker of the House of Representatives—was the highest-ranking U.S. official to visit the memorial.
April 12Two unarmed Russian Sukhoi Su-24 jets fly simulated attacks against the U.S. Navy destroyer Donald Cook in the Baltic Sea. Later, a Russian Kamov Ka-27 naval helicopter is seen making seven passes around the warship while taking pictures.
April 13
Louisiana Governor John Bel Edwards signs an order banning discrimination against the LGBT community. The order reverses the policies of his predecessor, Bobby Jindal, who signed laws limiting same-sex marriage and the ability of transgender people to use the public restrooms of their choice.
The Centers for Disease Control and Prevention confirms that the Zika virus causes birth defects.
Kobe Bryant plays his final NBA game for the Los Angeles Lakers. Bryant, who played his entire 20-year career with the Lakers, sets a new points record for a final game, scoring 60 against the Utah Jazz.
April 14
The top pick for the WNBA draft is UConn's Breanna Stewart, followed by her teammates Moriah Jefferson and Morgan Tuck. This is the first time in any major North American sports draft that a single school produced the top three selections.
Microsoft files a lawsuit against the United States, stating that it has been prevented from disclosing information to its customers when the government obtains a warrant to read emails or access data through the cloud.
A Russian Sukhoi Su-27 fighter jet intercepts and threatens a U.S. Air Force Boeing RC-135 reconnaissance aircraft in international airspace over the Baltic Sea.
April 18
2016 Pulitzer Prizes: The Associated Press wins the Pulitzer Prize for Public Service, and the Los Angeles Times wins the Pulitzer for Breaking News Reporting. Lin-Manuel Miranda's Hamilton wins the Pulitzer Prize for Drama, and The Sympathizer by Viet Thanh Nguyen wins the Pulitzer Prize for Fiction.
Severe flooding in Houston, Texas, causes damage to 1,000 homes, leaves 147,000 residents without power, and kills eight people.
The 120th Boston Marathon is held with 30,000 runners. Ethiopian runners Lemi Berhanu Hayle and Atsede Baysa win the marathon.
April 19The New York primary is held, with Donald Trump winning the Republican race and Hillary Clinton winning the Democratic race.
April 20
Secretary of the Treasury Jack Lew announces that former slave and abolitionist Harriet Tubman will replace Andrew Jackson on the twenty-dollar bill.
Four people are killed when a small plane crashes in Anchorage, Alaska.
CIA programmer Joshua Schulte allegedly stole backup files from a program called Confluence prior to the program's hacking tools being leaked.
April 21 – Music legend Prince dies at the age of 57. To celebrate his legacy, cities across the U.S. hold vigils and light buildings, bridges, and other venues in purple.
April 22
Eight family members are shot to death at four locations in Pike County, Ohio. Three children survive the attacks.
Five people are killed in two separate shootings in Appling, Georgia.
April 25
John Kasich and Ted Cruz announce that they will coordinate strategies to stop Donald Trump from winning the Republican presidential nomination: Kasich's campaign will ensure Cruz a "clear path" in Indiana, while Cruz's campaign will cut campaigning in New Mexico and Oregon.
A court settlement calls for the city of Cleveland, Ohio, to pay $6 million to the family of Tamir Rice, a 12-year-old boy who was shot and killed by two police officers in November 2014 after his toy gun was mistaken for a real one.
CRF Frozen Foods recalls more than 300 products.
April 26Super Tuesday III: Donald Trump wins all five states holding Republican primaries (Connecticut, Delaware, Maryland, Pennsylvania, and Rhode Island). In the Democratic primaries, Hillary Clinton takes Connecticut, Delaware, Maryland, and Pennsylvania, while Bernie Sanders takes Rhode Island.
April 27
The bodies of American climber Alex Lowe and photographer David Bridges, who were killed and buried during an avalanche in 1999, are discovered on the Himalayan mountain Shishapangma.
Dennis Hastert, a former Speaker of the House, is sentenced to 15 months in prison for breaking banking laws through the payment of "hush money" to victims whom he had sexually abused.
Ted Cruz announces that Carly Fiorina will be his running mate if he wins the Republican presidential nomination.
April 28Comcast's NBCUniversal purchases DreamWorks Animation for $3.8 billion.
April 29
The United States Air Force lands two F-22 Raptors in Lithuania for the first time in a show of support for Lithuania and surrounding countries, which have been worried over Russia's involvement in Ukraine.
China denies a Hong Kong port call from Carrier Strike Group 3, which includes the and other escorting vessels.
The Centers for Disease Control and Prevention reports the first U.S.-related death from the Zika virus, an elderly man in Puerto Rico.
April 30
President Obama attends his final White House Correspondents' Dinner, where comedian Larry Wilmore is the featured performer.
Six people are killed in a car crash on Interstate 95 in Jupiter, Florida.
May
May 1
A cruise ship sets sail from Miami to Havana, Cuba, with more than 700 passengers on board, becoming the first in more than half a century to make the trip. The ship, Carnival Cruise Line's Adonia, was able to depart after a policy banning Cuban-born citizens from returning to the United States by sea was loosened. It docks in Havana on May 2.
May Day: Protesters in Seattle begin to riot and attack law enforcement, injuring five police officers. Nine people are arrested.
The Ringling Bros. and Barnum & Bailey Circus officially retires its elephants after a final show in Providence, Rhode Island.
The Serbian Orthodox Cathedral of St. Sava in New York City is almost destroyed in a four-alarm fire.
Fourteen of 175 cars of a CSX freight train derail in Washington, D.C., leaking three chemicals that are deemed hazardous to the public.
May 2 – The Loud House premieres on Nickelodeon and becomes the number-one children's animated series on television within its first month on the air.
May 3
A city bus is hijacked in Washington, D.C., and the suspect crashes it into a gas station, killing a pedestrian.
ISIL fighters ambush and kill Charles Keating IV, a Navy SEAL who was assisting Kurdish Peshmerga forces in the area. Keating is later identified as the grandson of financier Charles Keating Jr., who was known for his involvement in a 1980s savings and loan scandal. Arizona Governor Doug Ducey orders all state flags to be flown at half-staff on May 4.
The Indiana primary is held, and Donald Trump wins the Republican race.
Ted Cruz suspends his campaign for the Republican presidential nomination.
Three people are killed in a plane crash on Long Island.
May 4
John Kasich suspends his presidential campaign, leaving Donald Trump the presumptive Republican nominee.
The Department of Justice informs North Carolina Governor Pat McCrory that a new state law limiting restroom access for transgender people violates the Civil Rights Act of 1964. It demands a response by May 9 on whether the state will correct the violations.
California raises the legal smoking age from 18 to 21 and restricts the use of electronic cigarettes in public places.
May 5A warehouse burns down during a four-alarm fire in Houston.
May 6
Three people are killed and three others injured during a two-day shooting spree in Potomac, Maryland. The suspect is believed to be a former police officer.
Captain America: Civil War, directed by the Russo brothers, is released by Marvel Studios as the 13th film of the Marvel Cinematic Universe (MCU), the first film of its "Phase Three" slate and the sequel to 2011's Captain America: The First Avenger and 2014's Captain America: The Winter Soldier. At release, it becomes the twelfth-highest-grossing film of all time (now the 22nd).
May 7Nyquist, ridden by Mario Gutierrez, wins the Kentucky Derby.
May 10
Three women are arrested at O'Hare International Airport in Chicago after being caught trying to smuggle 70 pounds ($3 million worth) of opium into the U.S.
The West Virginia primary is held, with Donald Trump winning the Republican race and Bernie Sanders winning the Democratic race. Trump wins the Republican primary in Nebraska.
NASA confirms the discovery of more than 1,284 exoplanets by its Kepler space observatory.
Four people are stabbed, two of them fatally, at a home and a shopping mall in Taunton, Massachusetts. The assailant is shot and killed by an off-duty sheriff.
May 12
Susannah Mushatt Jones, the world's oldest person and the last surviving American born in the 1800s, dies in New York at age 116.
CBS cancels CSI: Cyber, the last active TV series in the CSI franchise.
May 13
The Department of Education and Department of Justice advise public school districts across the country to allow transgender students to use bathrooms that match their gender identity, rather than the gender assigned to them at birth.
Michael Strahan makes his final appearance as co-host on Live! with Kelly and Michael.
May 14
Eight people are killed and 44 others injured after a charter bus rolls over on Route 83 north of Laredo, Texas.
A pilot is killed when his stunt plane crashes during an air show at DeKalb-Peachtree Airport in DeKalb County, Georgia.
May 20 – The Angry Birds Movie is released in theaters.
May 21A U.S. airstrike kills Mullah Akhtar Mansour, leader of the Taliban in Afghanistan.
May 22
A skydiving tour plane crashes in Hawaii, killing five people.
The U.S. lifts its embargo on arms trade in Vietnam.
May 25An audit by the State Department Inspector General finds that Hillary Clinton violated directives from the department in her use of a private email server for government business during her time as Secretary of State. The Inspector General says that Clinton did not request approval to use the private server, and that such a request would have been denied because of security risks.
May 27
President Obama becomes the first U.S. president to visit Hiroshima, Japan, where the United States dropped an atomic bomb in 1945.
A P-47 Thunderbolt crashes in the Hudson River, killing the pilot.
May 29 24-year-old rookie Alexander Rossi wins the 100th Indianapolis 500 mile race in front of a record crowd of 350,000. His car runs out of fuel coming to the finish line.
May 30Former Stanford University student Brock Turner is sentenced to six months in prison for raping an unconscious woman behind a dumpster. The short sentence, as well as statements by Turner's parents in the following weeks, draw significant controversy.
May 31Major flooding occurs in Texas and Oklahoma.
June
June 1 – A gunman opens fire at the University of California, Los Angeles, killing an associate professor and his wife in an apparent murder–suicide.
June 3 – American boxing legend and conscientious objector Muhammad Ali dies of septic shock at a hospital in Scottsdale, Arizona, at the age of 74.
June 7 – The final major state primaries are held for the 2016 presidential election, with Hillary Clinton and Donald Trump emerging as the presumptive nominees for the Democratic and Republican races, respectively.
June 10
President Obama formally endorses Hillary Clinton for the Democratic presidential nomination.
22-year-old singer–songwriter Christina Grimmie is shot dead while signing autographs at a concert venue in Orlando, Florida.
June 12
29-year-old Omar Mateen opens fire at Pulse, a gay dance club in Orlando, killing 49 people and leaving another 53 wounded. The attack surpassed the 2007 Virginia Tech shootings as the deadliest mass shooting in U.S. history until the 2017 Las Vegas shooting. The shooting is investigated as a domestic terrorist attack.
The 70th annual Tony Awards are presented, the cultural icon musical Hamilton wins 11 awards including Best Musical from a record 16 nominations. The performance of the cast of Hamilton was introduced by a filmed message from President and First Lady Obama and Chance the Rapper calling the show one of the greatest pieces of art ever made.
In the NHL, the Eastern Conference champion Pittsburgh Penguins defeat the Western Conference champion San Jose Sharks in six games to win the Stanley Cup, the Penguins' fourth championship in franchise history.
June 15–16 – In response to the attack in Orlando, Senator Chris Murphy (D-Connecticut) holds a filibuster for nearly fifteen hours, demanding new gun control laws from Congress. The filibuster ends when the Senate agrees to vote on two measures: one that would require universal background checks for gun sales, and another that would ban the sale of weapons to individuals on government watch lists of suspected terrorists.
June 17 – Pixar Animation Studios' 17th feature film, Finding Dory, the sequel to 2003's Finding Nemo, is released in theaters.
June 18 – A 19-year-old man is arrested after attempting to pull a gun from a policeman's holster at a Donald Trump rally in Las Vegas. He later admits he was planning to use it to kill Trump.
June 19 – In the NBA, the Eastern Conference champion Cleveland Cavaliers defeat the Western Conference champion Golden State Warriors in seven games to win their first NBA Finals title in the Cavaliers' 45-year history. It is the first major professional sports championship won by a team based in Cleveland since 1964.
June 22–23 – Members of the House Democratic Caucus, led by Representative John Lewis (D-Georgia) and Representative Katherine Clark (D-Massachusetts), declare their intention to remain on the floor of the House of Representatives until its Republican Speaker, Paul Ryan, allows votes on gun control legislation in the aftermath of the Orlando nightclub shooting. The sit-in is staged by about 60 legislators.
June 24 – At least 23 people are killed after a huge flood hits areas of West Virginia.
June 26 – Ten people are hospitalized, five with stab wounds, after a group of counter-protesters attack a white supremacist gathering in Sacramento, California.
June 27 – In a 5–3 decision, the Supreme Court strikes down a 2013 Texas law that imposed restrictions on abortion clinics.
June 28- Pat Summitt the all-time winningest women's basketball coach in NCAA history dies of dementia at the age of 64, in Summit's 38-year coaching career with Tennessee she won 1,098 games the most of any men's or women's coach.
July
July 1
The U.S. military officially lifts its ban on transgender people serving openly in the armed forces.
Attorney General Loretta Lynch announces that she will leave it up to the FBI to decide whether to bring charges against Hillary Clinton for her use of a private email server as Secretary of State.
Vermont's GMO labeling law goes into effect—the first in the U.S.
July 3 – The Fort Bragg Game becomes the first professional sporting event to ever be held on an active military base, and the first Major League Baseball regular season game ever held in the state of North Carolina when the Miami Marlins play the Atlanta Braves.
July 4 – Juno successfully enters the orbit of Jupiter.
July 5
Gypsy Rose Blanchard pleads guilty of the murder of her mother Dee Dee Blanchard who had abused her for many years, forcing her to use a wheelchair and to pretend to be ill. She is sentenced to 10 years in prison.
Multiple cellphone video recordings capture the police shooting of Alton Sterling, a man selling CDs outside a convenience store in Baton Rouge, Louisiana, sparking wide outrage. The Department of Justice opens a federal investigation.
July 6
After FBI Director James Comey recommends against indicting Hillary Clinton, Attorney General Lynch announces that the federal investigation of Clinton will be closed with no charges.
A police officer shoots and kills 32-year-old Philando Castile during a routine traffic stop in Falcon Heights, Minnesota, sparking further public outcry and protests regarding police brutality. Minnesota Governor Mark Dayton requests an investigation by the Justice Department.
July 7 – During a Black Lives Matter protest in Dallas, Texas, a sniper later identified as Micah Xavier Johnson opens fire, killing five Dallas police officers and injuring another eleven people in the deadliest incident for U.S. law enforcement since September 11, 2001. Johnson is later found to have targeted white people (specifically white police officers) and to have been interested in several black nationalist groups. He is killed by a C-4 bomb delivered by a robot, the first use of lethal force by a robot by an American police department.
July 8 – Despite the conclusions of the FBI and attorney general, the State Department reopens its investigation into Hillary Clinton's use of a private email server.
July 9 – The government of the Bahamas releases a rare advisory to Bahamian citizens traveling to the United States to be non-confrontational and cooperative with police after recent racial tensions in the country.
July 16 – Donald Trump announces Indiana Governor Mike Pence as his running mate for the Republican ticket in the 2016 presidential election.
July 17 – Three police officers are shot dead and three others are injured in Baton Rouge, Louisiana. The shooter has been killed and an investigation is underway.
July 18–21 – The Republican National convention is held in Cleveland, ohio with Donald Trump accepting the nomination.
July 22 – Hillary Clinton announces Virginia United States Senator Tim Kaine as her running mate for the Democrat ticket in the 2016 presidential election.
July 25–28 – The Democratic National Convention is held in Philadelphia, Pennsylvania with Hillary Clinton accepting the nomination. She becomes the first woman to accept the nomination of a major party for president.
July 30
All 16 occupants of a hot air balloon are killed – the deadliest incident of its kind in U.S. history – after hitting power lines and crashing near Austin, Texas.
Skydiver Luke Aikins sets a new world record for the highest altitude jump without a parachute, falling 25,000 ft into a safety net.
July 31
The 2016 Maryland flood in Ellicott City, Maryland, caused significant damage to the historic downtown area of the municipality
Sharknado: The 4th Awakens airs for the first time on Syfy.
August
August 2 – A charter bus crashes on Highway 99 in Merced County, California, killing four people.
August 4 – A wildfire occurs in California, Montana, Nevada, Oregon, Washington and Wyoming.
August 5 – Suicide Squad, directed by David Ayer, is released as the third film in the DC Extended Universe.
August 5–21 – The United States compete at the Summer Olympics in Rio de Janeiro, Brazil and win 46 gold, 37 silver, and 38 bronze medals.
August 7 – Caleb Schwab, the 10-year-old son of Kansas state representative Scott Schwab, is killed while riding Verrückt—the world's tallest water slide—at the Schlitterbahn Water Park in Kansas City, Kansas.
August 8 – A power outage causes hundreds of Delta Air Lines flights to be delayed or cancelled.
August 10 – Police in Dallas, Texas kill Tony Timpa, who suffered from schizophrenia and depression, after he asked for help. The police laughed as he asked for help 30 times while they pinned his shoulders, knees, and neck to the ground.
August 12–19 – The 2016 Louisiana floods submerge over 146,000 homes across south Louisiana, killing 13 people. The Red Cross characterized the floods as the worst natural disaster in the U.S. since Hurricane Sandy in 2012 and President Obama visited the Baton Rouge area to survey the damage.
August 16 – The Blue Cut Fire occurs in California, displacing more than 82,000 residents, burning over 37,000 acres (150 km2) and threatening at least 34,500 structures.
August 17–21 – The 74th World Science Fiction Convention is held at the Bartle Hall Convention Center in Kansas City, Missouri.
August 20 – The U.S. Air Force deploys the B-1, B-2, and B-52 bombers in Guam to conduct exercises.
August 26 - Barack Obama expands the Papahānaumokuākea Marine National Monument, making it the world's largest marine protected area in the United States. Barack Obama surpasses Theodore Roosevelt as the most water and land protected by a U.S. president.
August 31 – The US conducts its first commercial flight to Cuba in 50 years
September
September 6 – The Federal Bureau of Investigation arrests Israeli rabbi Aharon Goldberg and divorce mediator Shimen Liebowitz, two planners of a contract killing on an estranged Jewish man, at a hotel in Central Valley, New York.
September 10 – John Hinckley Jr., the man who tried to assassinate US President Ronald Reagan in 1981, is released from a psychiatric hospital after 35 years.
September 11
Hillary Clinton becomes overheated and faints at a 9/11 memorial service in New York City, and is later revealed to have been diagnosed with pneumonia in the days prior.
Savvy Shields, Miss Arkansas 2016, wins the 90th Miss America pageant.
September 17
A pipe bomb explodes near a U.S. Marine Corps charity 5K run in Seaside Park, New Jersey. This is followed by an explosion in New York City that injures 29.
A man dressed in a private security company uniform stabs and wounds nine people in a St. Cloud, Minnesota mall before being shot and killed by an off-duty police officer.
September 18
Following explosions in Seaside Park, New Jersey, and Manhattan, New York, on the previous day, another explosive device was discovered at a transit station in Elizabeth. The device was accidentally detonated in the early hours of September 19 when operated on by a bomb squad robot.
The 68th Primetime Emmy Awards are held at the Microsoft Theater in Los Angeles, California, with Game of Thrones winning the best drama and Veep winning the best comedy.
September 19 – Ahmad Khan Rahami is identified as a suspect for the bombings in New York and New Jersey the previous two days. He is captured in a shootout.
September 21 – A state of emergency is declared in Charlotte, North Carolina, after protests over the police killings of three black men in a single week.
September 23 – A gunman opens fire at a mall in Burlington, Washington, killing 5 people. The shooter, Arcan Cetin, is arrested the next day.
September 24 – The National Museum of African-American History and Culture, the biggest museum towards black history, opens at Washington D.C.
September 26 – Presidential candidates Donald Trump and Hillary Clinton take part in their first live televised debate, with an estimated audience of up to 100 million viewers.
September 28 – Congress votes to override President Obama's veto of the Justice Against Sponsors of Terrorism Act, which would effectively allow the families of victims of the September 11 attacks to sue the Kingdom of Saudi Arabia for their part in the attacks.
September 29 – A commuter train crashes in Hoboken, New Jersey, killing one person and injuring 114 others.
October
October 1
The New York Times publishes parts of Donald Trump's 1995 tax records, which show that he suffered a $916 million loss during that year, which would have given him the ability to avoid paying income taxes for up to 18 years. This occurs while Trump is under intense scrutiny by Hillary Clinton and other political opponents to release his current tax records as is tradition in modern presidential elections.
The Alabama Court of the Judiciary formally suspends Chief Justice of the Alabama Supreme Court Roy Moore until the end of his term for directing probate judges to enforce the state's ban on same-sex marriage, which had been ruled unconstitutional in federal court.
October 6 – Hurricane Matthew strengthens to a Category Four storm as it approaches Florida.
October 7
The Obama administration accuses the government of Russia of hacking the computer network of the Democratic National Committee.
The Washington Post releases a 2005 videotape of Donald Trump making lewd comments to Access Hollywood host Billy Bush about a married woman and commenting on how he can grab women "by the pussy" without repercussions because he is "a star". The comments are met with reactions of disgust and disbelief from the media and mainstream Republicans, as well as numerous Republicans rescinding their endorsements of his campaign. Speaker of the House Paul Ryan disinvites Trump from a Wisconsin campaign event in response. Trump issues an apology video online shortly after.
October 10 – Samsung announces an official discontinuation of the Samsung Galaxy Note 7 smartphone after reports of the phone overheating and combusting, posing a severe health risk.
October 11 – President Obama presents details of a human mission to the planet Mars.
October 15 – A firebomb is set off inside the Republican Party headquarters building in Orange County, North Carolina. No injuries are reported and a suspect has not been found.
October 21 – A currently unknown attacker launches multiple distributed denial-of-service (DDos) attacks on networks operated by DNS provider Dyn, making numerous sites difficult or impossible to access for a period of time, including Twitter, Reddit, Netflix, Spotify, The New York Times, BBC News, and PayPal. The Department of Homeland Security opens an investigation.
October 27 – Seven defendants, including Ammon and Ryan Bundy, are acquitted of all federal charges by a federal jury in relation to their occupation of the Malheur National Wildlife Refuge in January.
October 28
FBI Director James Comey informs Congress that the bureau has chosen to reopen its investigation into Democratic presidential nominee Hillary Clinton's use of a private email server after discovering some emails that, while not from Clinton herself or withheld during the investigation, may be "pertinent" to the investigation. The emails were discovered on a device belonging to Anthony Weiner during an investigation into one of his sexting scandals.
36-year-old Ryan Collins is sentenced to 18 months in prison after pleading guilty to the 2014 hacking and distributing of numerous celebrities' nude photos.
November
November 2 – Major League Baseball: In Game 7 of the World Series, the Chicago Cubs defeat the Cleveland Indians 8–7 in 10 innings, winning the Series 4–3 and claiming their first MLB title since 1908.
November 4 – Doctor Strange, directed by Scott Derrickson, is released by Marvel Studios as the 14th film of the Marvel Cinematic Universe (MCU).
November 6 – In a second letter to Congress, FBI Director James Comey announces that the newest investigation of emails related to Hillary Clinton's use of a private server had not changed the conclusion the FBI reached in July.
November 8
The 2016 presidential election is held. Donald Trump is elected as the 45th President of the United States and Mike Pence is elected the 48th Vice President, with Trump becoming the oldest man elected president at the age of 70 as well as the first president in history to take the office without any prior political or military experience. The win is considered one of the most shocking upsets in U.S. history, with most news outlets and experts considering a Trump victory unlikely. The result is also highly controversial due to Hillary Clinton's popular vote lead of nearly 3 million votes over Trump, who won via the Electoral College.
Four states – California, Nevada, Maine and Massachusetts – vote to legalize the use, sale, and consumption of recreational marijuana.
Faith Spotted Eagle becomes the first Native American to receive an electoral vote.
The U.S. senate elects the most diverse cast yet. Catherine Cortez Masto becomes the first Latina senator, Kamala Harris becomes the first Asian-American, and the second black woman into the senate, and Ilhan Omar becomes the first Somali-American lawmaker.
In the 2016 Senate and House elections, the Republican Party maintains its majority of seats in Congress.
November 9 – Anti-Trump protests are held in several cities across the nation over the next week after Trump's election win.
November 10 - John Kerry makes a trip to Antarctica becoming the first Secretary of State to visit all 7 continents.
November 18 – Donald Trump agrees to pay a $25 million settlement to two class action lawsuits and a New York state civil lawsuit regarding his now defunct unlicensed Trump University.
November 20 – More than 300 people are injured, 26 seriously, after police use water cannons, tear gas, rubber bullets, and concussion grenades on a peaceful protest against the proposed construction of the Dakota Access Pipeline on the Standing Rock Indian Reservation.
November 21 – A school bus crashes in Chattanooga, Tennessee, killing at least six children and injuring another 22.
November 23 – Walt Disney Animation Studios' 56th feature film, Moana, is released in theaters to critical and commercial success. Like 2013's Frozen and Zootopia earlier in the year, it is regarded as one of the studio's strongest works since the peak of the Renaissance era.
November 25
The state elections commission of Wisconsin agrees to a statewide recount of its ballots in the 2016 presidential election after requests by Green Party candidate Jill Stein and independent candidate Rocky De La Fuente.
After multiple hearings, Dylann Roof, the suspected perpetrator of the 2015 Charleston church shooting, is declared by a federal judge to be mentally competent enough to stand trial.
November 28 – Eleven people are hospitalized with injuries after 18-year-old Abdul Razak Ali Artan attacks students on the campus of Ohio State University with his car and a butcher knife before being fatally shot by police. An investigation later shows that Artan was inspired by terrorist propaganda from the Islamic State of Iraq and the Levant and radical Muslim cleric Anwar al-Awlaki.
December
December 2
Donald Trump becomes the first US president or president-elect since 1979 to make direct contact with the President of Taiwan, upsetting Chinese diplomats and sparking concern over whether Trump will uphold the "One China policy" at the foundation of China-U.S. relations.
A fire at an Oakland, California warehouse, which was hosting a music event, kills at least 36 people, the deadliest fire in Oakland history.
December 4
The United States Army Corps of Engineers under the Obama administration denies the easement of the Dakota Access Pipeline through Lake Oahe in the Standing Rock Indian Reservation and will look for alternative routes.
A man from Salisbury, North Carolina briefly opens fire with an AR-15 style rifle inside Comet Ping Pong, a pizzeria in Washington, D.C., wishing to "self-investigate" the establishment implicated in a false conspiracy theory that claims the restaurant is used by members of the Democratic Party for a child-sex ring. No injuries are reported, and the man is arrested without incident and immediately charged with assault with a dangerous weapon.
December 5 – The murder trial of white police officer Michael Slager in the 2015 shooting death of Walter Scott in South Carolina ends in a mistrial after a hung jury cannot reach a verdict, resulting in no charges on Slager.
December 8 – John Glenn, former astronaut, Colonel, and Senator, and the first American to orbit the Earth, dies of presently undisclosed conditions at the OSU Wexner Medical Center in Columbus, Ohio, at the age of 95.
December 9
The CIA tells U.S. legislators that the United States Intelligence Community has "high confidence" that Russia conducted operations during the 2016 presidential election to assist Donald Trump in winning the presidency. Intelligence agencies have concluded that the Kremlin had orchestrated the Democratic National Committee cyber attacks. Both Democrats and Republicans in Congress call for a full-scale investigation. Trump writes off the report as "ridiculous".
The Supreme Court of Michigan rejects Jill Stein's request for a recount of votes in the state, upholding Donald Trump's victory in the state.
December 12
After the recount is completed in Wisconsin and Pennsylvania rejects Jill Stein's request, both states reaffirm Donald Trump as winner of the states in the 2016 election.
Block Island Wind Farm becomes the first commercial offshore wind farm in the United States.
December 14
Yahoo discloses that a data breach in 2013 compromised more than 1 billion user accounts' information, such as names, passwords, and unencrypted messages, making it the largest data breach in the history of the Internet. Yahoo already disclosed a smaller 2014 data breach in September 2016.
The Federal Reserve raises its benchmark interest rate by 0.25%, only the second increase in a decade, citing strong economic growth and rising employment, though Chairwoman Janet Yellen says the outlook for the US economy going forward is "uncertain".
December 16 - Rogue One: A Star Wars Story is released in theaters.
December 19
The Electoral College elects Donald Trump as the next President of the United States, with 304 electoral votes cast for Trump versus 227 for Hillary Clinton.
North Carolina Governor-elect Roy Cooper announces that the controversial HB2 law passed in March limiting the rights of the LGBT community will be repealed.
December 20 – President Obama, in a joint agreement with Prime Minister of Canada Justin Trudeau, permanently bans oil and gas drilling in most of the Arctic and Atlantic Ocean.
December 23 – In a departure from its previous policy, the Obama administration chooses to not use its veto power and instead abstains from voting on United Nations Security Council Resolution 2334, allowing its passage. The resolution demands an end to the construction of Israeli settlements in the West Bank and East Jerusalem. Both Israeli Prime Minister Benjamin Netanyahu and President-elect Donald Trump imply that the decision will result in a reassessment of relations with the United Nations.
December 24 – Donald Trump announces that he will be dissolving his foundation to avoid potential conflicts of interest in his presidency. New York Attorney General Eric Schneiderman asserts that Trump will not be able to do so until an ongoing investigation into the foundation has completed.
December 27 – Carrie Fisher, known for playing the iconic character Princess Leia in the Star Wars film series, as well as being a noted script doctor and mental health advocate, dies at the age of 60 after suffering from cardiac arrest on a transatlantic flight four days earlier. Her mother, actress Debbie Reynolds dies the next day, after suffering a stroke while preparing for Fisher's funeral.
December 29 – The Obama administration imposes sanctions against the leaders of the Russian intelligence agency GRU and expels 35 Russian operatives from the United States in response to Russia's interference in the 2016 presidential election. President-elect Donald Trump urges the country "move on" from the issue, but nonetheless announces that he will be meeting with the United States Intelligence Community for an update on the situation.
December 31 – A federal judge in Texas blocks the enforcement of a policy seeking to extend Affordable Care Act anti-discrimination protections for transgender health and abortion-related services.
December 31 – United States troops withdraw from Afghanistan, leaving behind 8,400 troops stationed at 4 garrisons (Kabul, Kandahar, Bagram, and Jalalabad).
Deaths
January
January 1
Lennie Bluett, actor (born 1919)
Dale Bumpers, politician; 38th Governor of Arkansas and U.S. Senator (1975–1999) (born 1925)
Gilbert Kaplan, businessman, publisher, and amateur conductor (born 1941)
Tony Lane, graphic designer (born 1944)
John Coleman Moore, mathematician (born 1923)
Mike Oxley, politician (born 1944)
Vilmos Zsigmond, Hungarian-born cinematographer (born 1930)
January 2
Brad Fuller, video game composer and audio engineer (born 1953)
Stanley Siegel, radio reporter and talk show host (born 1936)
Frances Cress Welsing, psychiatrist and author (born 1935)
January 3
Leonard Berkowitz, social psychologist (born 1926)
Gary Flakne, politician (born 1934)
John McDade Howell, university chancellor (born 1922)
Raymond W. Lessard, Roman Catholic prelate (born 1930)
Andy Maurer, football player (born 1948)
Ted Stanley, entrepreneur and philanthropist (born 1931)
January 4
Robert Balser, animator (born 1927)
Stephen W. Bosworth, diplomat; U.S. Ambassador to South Korea (1997–2001) (born 1939)
Long John Hunter, blues musician (born 1931)
Red Parker, football coach (born 1931)
Joseph Ritz, author, playwright, and journalist (born 1929)
Leo Rucka, football player (born 1931)
January 5
Bob Armstrong, basketball player (born 1933)
Nicholas Caldwell, R&B singer and musician (born 1944)
Christine Lawrence Finney, animator and painter (born 1968)
George MacIntyre, football player and coach (born 1939)
Jay Ritchie, baseball player (born 1936)
January 6
Robert D. Acland, surgeon (born 1941)
Douglas Greer, child actor (born 1921)
Pat Harrington Jr., actor (born 1929)
Florence King, writer (born 1936)
Serena Sinclair Lesley, journalist (born 1926)
Sol Polansky, diplomat (born 1926)
Robert D. Timm, businessman and politician (born 1921)
January 7
Bill Foster, basketball coach (born 1929)
John Johnson, basketball player (born 1947)
Kitty Kallen, singer (born 1921)
Richard Libertini, actor (born 1933)
Troy Shondell, singer (born 1939)
January 8
Otis Clay, R&B and soul singer (born 1942)
Royal Parker, television personality (born 1929)
Red Simpson, singer and songwriter (born 1934)
Brett Smiley, singer and songwriter (born 1955)
January 9
Barbara Allyne Bennet, actress and union executive (born 1939)
Myra Carter, actress (born 1929)
Lawrence H. Cohn, cardiac surgeon (born 1937)
Lance Rautzhan, baseball player (born 1952)
Angus Scrimm, actor and author (born 1926)
Beau St. Clair, film producer (born 1952)
Peggy Willis-Aarnio, ballet choreographer and historian (born 1948)
January 10
David Bowie, English singer, songwriter and actor (b. 1947)
Alton Brown, baseball player (born 1925)
Ann Z. Caracristi, cryptanalyst and intelligence official (born 1921)
Charles Congden Carpenter, naturalist and herpetologist (born 1921)
Jeanne Córdova, German-born American LGBT activist and writer (born 1948)
Carolyn Denning, pediatrician (born 1927)
Michael Galeota, actor (born 1984)
Ralph Hauenstein, business and philanthropist (born 1912)
Francis Thomas Hurley, Roman Catholic prelate (born 1927)
Arthur S. Obermayer, entrepreneur and philanthropist (born 1931)
Dick Spady, restaurateur (born 1923)
January 11
Monte Irvin, baseball player (born 1919)
David Margulies, actor (born 1937)
Don Strauch, politician; Mayor of Mesa, Arizona (born 1926)
January 12
Meg Mundy, British-born American actress and model (born 1915)
Andrew Smith, basketball player (born 1990)
January 13
Luis Arroyo, baseball player (born 1927)
Lawrence Phillips, football player (born 1975)
Jim Simpson, sportscaster (born 1927)
Tera Wray, pornographic actress (born 1982)
January 14
George Carroll, American lawyer and politician (b. 1921)
James Hannah, American attorney (b. 1944)
Al Hart, American radio host (b. 1927)
Ellen Meiksins Wood, American historian (b. 1942)
January 15
Noreen Corcoran, actress and dancer (born 1943)
Dan Haggerty, actor (born 1942)
January 16
Bob Harkey, race car driver (born 1930)
Gary Loizzo, singer and musician (born 1945)
Ted Marchibroda, football player and coach (born 1931)
Lloyd Rudolph, political scientist and author (born 1927)
January 17
Blowfly, musician and producer (born 1939)
Mic Gillette, brass player (born 1951)
Ramblin' Lou Schriver, musician and broadcaster (born 1929)
January 18Glenn Frey, singer-songwriter and musician (born 1948)
January 19
Richard Levins, mathematical ecologist (born 1930)
Forrest McDonald, historian (born 1927)
William Y. Smith, general (born 1925)
Frank Sullivan, baseball player (born 1930)
January 20
Ronald Greenwald, rabbi and businessman (born 1934)
David G. Hartwell, editor, literary critic and publisher (born 1941)
Edward Yourdon, software engineer, computer consultant, author and lecturer (born 1944)
January 21
Bill Johnson, alpine skier (born 1960)
Derrick Todd Lee, serial killer (born 1968)
January 22
Tom Aidala, American architect (b. 1933)
Eugene Borowitz, American rabbi and philosopher (b. 1924)
Fred Bruney, American football player (b. 1931)
Pete Carmichael, American football coach (b. 1941)
Waymond C. Huggins, American politician (b. 1927)
Mikhail Odnoralov, Russian-born American painter (b. 1944)
Robert Pickus, American activist (b. 1923)
Sarah, American zoo cheetah (b. 2000)
Storm Flag Flying, American thoroughbred racehorse (b. 1999)
Rik Wilson, American ice hockey player (b. 1962)
January 23Marie Mahoney, baseball player (born 1924)
January 24Marvin Minsky, computer scientist (born 1927)
January 25
Thornton Dial, artist (born 1928)
Concepcion Picciotto, Spanish-born peace and social activist (born 1936)
January 26
Tommy Kelly, actor (born 1925)
Abe Vigoda, actor (born 1921)
January 27Barbara Berger, baseball player (born 1930)
January 28
Signe Toly Anderson, singer (born 1941)
Buddy Cianci, politician; 32nd and 34th Mayor of Providence, Rhode Island (born 1941)
Paul Kantner, singer and musician (born 1941)
January 30Georgia Davis Powers, civil rights activist and politician (born 1923)
February
February 1
Jon Bunch, singer-songwriter (born 1970)
Thomas Tigue, politician (born 1945)
February 2
Robert Beiner, television sports director (b. 1950)
Abram Cohen, Olympic fencer (b. 1924)
Bob Elliott, comedian and actor (born 1923)
Jim Goode, restaurateur (b. 1944)
Halling, racehorse (b. 1991)
Mike Oehler, author (b. 1937)
February 3
Joe Alaskey, voice actor (born 1952)
John P. Riley Jr., ice hockey player (born 1920)
Maurice White, singer-songwriter (born 1941)
February 4
Marlow Cook, politician; U.S. Senator (1968–1974) (born 1926)
Jimmie Haskell, composer and arranger (born 1936)
Dave Mirra, BMX rider (born 1974)
Edgar Mitchell, astronaut (born 1930)
Axl Rotten, professional wrestler (born 1971)
Edgar Whitcomb, 43rd Governor of Indiana (born 1917)
February 5
Bill Birchfield, politician and lawyer (born 1935)
Miriam Goldman Cedarbaum, jurist (born 1929)
Ray Colcord, film and television composer (born 1949)
February 6
Dan Gerson, screenwriter (born 1966)
Dan Hicks, singer-songwriter (born 1941)
February 7
Andrew Glaze, poet, playwright and novelist (born 1920)
Redding Pitt, attorney and politician (b. 1944)
Thomas Rea, dermatologist and leprosy researcher (b. 1929)
February 8
Charles C. Campbell, general (born 1948)
Johnny Duncan, actor (born 1923)
February 9
Edwin McDonough, actor (b. 1943)
Donald E. Thorin, cinematographer (b. 1934)
February 10
Andrew L. Lewis Jr., 7th United States Secretary of Transportation (born 1931)
Lennie Pond, race car driver (born 1940)
Christopher Rush, illustrator (born 1965)
Richard Unis, judge (born 1928)
February 11
Philip A. Kuhn, British-born historian (born 1933)
Kevin Randleman, mixed martial artist (born 1971)
John Keith Wells, U.S. Marine platoon commander (born 1922)
February 12
Eddie Barry, ice hockey player (born 1919)
Robert Frederick Froehlke, 10th United States Secretary of the Army (born 1922)
February 13
Nathan Barksdale, drug dealer, dramatized in The Wire (born 1961)
Johnny Lattner, football player (born 1932)
Antonin Scalia, jurist; Associate Justice of the Supreme Court of the United States (born 1936)
February 14Steven Stucky, classical music composer (born 1949)
February 15
Edward T. Foote II, academic and educator; 4th President of the University of Miami (born 1937)
George Gaynes, Finnish-American actor (born 1917)
February 16
Alisa Bellettini, television producer (born 1954)
Lex McAllister, reality show contestant (born 1984)
Robert Walker, sailor (born 1929)
February 17Tony Phillips, baseball player (born 1959)
February 18
Jim Davenport, baseball player (born 1933)
Rosario Ferré, First Lady of Puerto Rico (born 1938)
Tom Mullica, magician and impressionist (born 1948)
Angela Raiola, television personality (born 1960)
John Reinhardt, diplomat; U.S. Ambassador to Nigeria (1971–1975) (born 1920)
February 19
Humbert Allen Astredo, actor (born 1929)
Harper Lee, writer (born 1926)
Charlie Tuna, radio personality (born 1944)
February 20
Kevin Collins, baseball player (born 1946)
Dave Needle, computer engineer (born 1947)
February 21Richard Horner Thompson, general (born 1926)
February 22
Wesley A. Clark, general and computer engineer (born 1927)
Sonny James, singer-songwriter (born 1928)
Cara McCollum, journalist and beauty queen (born 1992)
February 23Donald E. Williams, astronaut (born 1942)
February 25
Tony Burton, actor and comedian (born 1937)
Alfred E. Mann, entrepreneur and philanthropist (born 1925)
February 26
C. L. Blast, soul singer (b. 1934)
William Y. Cooper, artist (b. 1933)
Juan Conway McNabb, American-born Peruvian Roman Catholic prelate (b. 1925)
Robert Palladino, calligrapher and academic (b. 1932)
Robert Struble Jr., historian and author (b. 1943)
February 28
George Kennedy, actor (born 1925)
Jack Lindquist, businessman; President of Disneyland (1990–1993) (born 1927)
February 29
Stuart Beck, diplomat and law practitioner (born 1946)
Helias Doundoulakis, spy and inventor (born 1923)
Gil Hill, police officer and actor (born 1931)
Lee Reherman, actor (born 1966)
March
March 1
Martha Wright, actress and singer (born 1923)
Gayle McCormick, singer (born 1948)
Jim Kimsey, co-founder and CEO of AOL (born 1939)
Adam Dziewonski, Polish-born geophysicist (born 1936)
Coca Crystal, television personality (born 1947)
Stuart Beck, lawyer and diplomat (born 1946)
March 2
R. Tom Zuidema, Dutch-born anthropologist (born 1927)
James Barrett McNulty, 26th Mayor of Scranton, Pennsylvania (born 1945)
Aubrey McClendon, businessman and part-owner of the Oklahoma City Thunder (born 1959)
Dick Hudson, football player (born 1940)
Rosemary Hinkfuss, politician (born 1931)
Robert Del Tufo, Attorney General of New Jersey (born 1933)
March 3
Retta Ward, health official and educator (born 1953)
William O'Brien, police officer (born 1944)
Laura Knaperek, politician (born 1955)
Henry R. Horsey, judge (born 1924)
Gavin Christopher, singer, songwriter, musician and producer (born 1949)
Jack Buckalew, politician (born 1932)
Rooney L. Bowen, politician (born 1933)
Ralph Baruch, President of Viacom (born 1923)
March 4
William H. Plackett, naval non-commissioned officer (born 1937)
Thomas G. Morris, politician (born 1919)
Joey Martin Feek, country singer (born 1975)
Pat Conroy, author (born 1945)
Bud Collins, journalist and sportscaster (born 1929)
March 5
Al Wistert, football player (born 1920)
Ray Tomlinson, computer programmer (born 1941)
Robert Redbird, artist (born 1939)
Caesar Belser, football player (born 1944)
March 6
Gary Smalley, family counselor and author (born 1940)
Harold H. Saunders, diplomat (born 1930)
Nancy Reagan, First Lady of the United States (born 1921)
Elizabeth Garrett, 13th President of Cornell University (born 1963)
Jerry Bridges, evangelist and author (born 1929)
Barbara Almond, psychiatrist (born 1938)
March 7
Quentin Young, physician and activist (born 1923)
Paul Ryan, comic artist (born 1949)
Steve Kraly, baseball player (born 1929)
Bobby Johns, race car driver (born 1932)
Joe Cabot, jazz trumpeter and bandleader (born 1921)
Gary Braasch, photographer (born 1945)
March 8
Alfred E. Senn, historian and academic (born 1932)
David S. Johnson, computer scientist (born 1945)
Ron Jacobs, broadcaster (born 1937)
Richard Davalos, actor (born 1930)
March 9
Coy Wayne Wesbrook, convicted mass murderer (born 1958)
Bill Wade, football player (born 1930)
Clyde Lovellette, basketball player (born 1929)
Ralph S. Larsen, CEO of Johnson & Johnson (born 1938)
John Gutfreund, investor and CEO of Salomon Brothers (born 1929)
March 10
Gogi Grant, pop singer (born 1924)
William Dyke, Mayor of Madison, Wisconsin (born 1930)
Ernestine Anderson, jazz singer (born 1928)
March 11
Ruth Terry, singer and actress (born 1920)
Gerard Reedy, 30th President of the College of the Holy Cross (born 1939)
Louis Meyers, festival organizer, co-founder of SXSW (born 1955)
Shawn Elliott, actor and singer (born 1937)
Ben Bagdikian, educator and journalist (born 1920)
Joe Ascione, jazz drummer (born 1961)
March 12
Bill Whitby, baseball player (born 1943)
Lloyd Shapley, mathematician and economist, Nobel Prize laureate (born 1923)
Morton Hunt, psychologist and science writer (born 1920)
Verena Huber-Dyson, mathematician (born 1923)
Donnie Duncan, football coach (born 1940)
Tommy Brown, singer (born 1931)
March 13
Martin Olav Sabo, politician (born 1938)
Hilary Putnam, philosopher, mathematician and computer scientist (born 1926)
Sidney Mear, trumpeter (born 1918)
Darryl Hunt, justice reform activist (born 1965)
March 14
Vic Schwenk, football player, coach and executive (born 1924)
June Peppas, baseball player (born 1929)
Lloyd R. Leavitt Jr., lieutenant general (born 1928)
Geoffrey Hartman, German-born literary theorist (born 1929)
Tamara Grigsby, politician and social worker (born 1974)
Virgilio Elizondo, Roman Catholic priest, theologian and civil rights activist (born 1935)
Patrick Cain, football player (born 1962)
John W. Cahn, German-born metallurgist (born 1928)
March 15
Alice Pollitt, baseball player (born 1929)
Earline W. Parmon, politician (born 1943)
Ralph C. Johnson, politician and businessman (born 1953)
Daryl Coley, gospel singer (born 1955)
March 16
Alexander Esenin-Volpin, Russian-born poet and mathematician (born 1924)
Frank Sinatra Jr., singer and actor (born 1944)
Gene Short, basketball player (born 1953)
William B. Bader, civil servant (born 1931)
March 17
Steve Young, singer-songwriter (born 1942)
Charles Kaufman, music educator (born 1928)
Larry Drake, actor (born 1950)
Claudine K. Brown, museum director (born 1949)
E.L. Boteler, farmer and politician (born 1920)
Ralph David Abernathy III, politician and businessman (born 1959)
March 18
Harold Zisla, painter (born 1925)
Tray Walker, football player (born 1992)
Joe Santos, actor (born 1931)
Fred Richards, baseball player (born 1927)
Cherylene Lee, actress and playwright (born 1956)
David Egan, singer-songwriter and pianist (born 1954)
March 19
Jerry Taylor, politician and businessman (born 1937)
Bob Adelman, photographer (born 1930)
March 20
Gayle Hopkins, long jumper (born 1941)
Robert J. Healey, political activist and attorney (born 1957)
March 21
Carolyn Squires, nurse and politician (born 1940)
Andrew Grove, Hungarian-born electronic executive (born 1936)
Leon Charney, real estate investor, author, media personality and philanthropist (born 1938)
Peter Brown, actor (born 1935)
Leroy Blunt, politician (born 1921)
March 22
Adam Kelly Ward, convicted murderer (born 1982)
Harold J. Morowitz, biophysicist (born 1927)
Rita Gam, actress (born 1927)
Santiago J. Erevia, soldier, Medal of Honor recipient (born 1946)
Glen Dawson, rock climber and mountaineer (born 1912)
Phife Dawg, rapper (born 1970)
Richard Bradford, actor (born 1934)
March 23
John McKibbin, politician and businessman (born 1947)
Ken Howard, actor and President of SAG/SAG-AFTRA (2009–2016) (born 1944)
Ruth Inge Hardison, sculptor, artist and photographer (born 1914)
Joe Garagiola Sr., baseball player and broadcaster (born 1926)
March 24
Kevin Turner, football player (born 1969)
Garry Shandling, actor, comedian and writer (born 1949)
Nicholas Scoppetta, 31st Commissioner of the New York City Fire Department (born 1932)
Leonard L. Northrup Jr., engineer (born 1918)
Edgar G. "Sonny" Mouton Jr., politician (born 1929)
Tibor R. Machan, Hungarian-born philosopher (born 1939)
Earl Hamner Jr., television writer and producer (born 1923)
Maggie Blye, actress (born 1939)
March 25
Shannon Bolin, actress and singer (born 1917)
David H. Porter, 5th President of Skidmore College (born 1935)
Lester Thurow, political economist (born 1938)
March 26
Donald Stoltenberg, painter and author (born 1927)
Jim Harrison, author (born 1937)
David Baker, jazz composer (born 1931)
March 27
Gilbert Horn Sr., soldier, politician and judge (born 1923)
Curtis Hertel, 64th Speaker of the Michigan House of Representatives (born 1953)
Toni Grant, psychologist and radio personality (born 1942)
Eric Engberg, news correspondent (born 1941)
Vince Boryla, basketball player, coach and executive (born 1927)
Mother Angelica, Franciscan nun and founder of EWTN (born 1923)
March 28
W. Ward Reynoldson, lawyer and judge (born 1920)
James Noble, actor (born 1922)
Igor Khait, animator (born 1963)
Bogdan Denitch, Bulgarian-born sociologist (born 1929)
March 29
John Wittenborn, football player (born 1936)
Steven Sample, 10th President of the University of Southern California (born 1940)
Patty Duke, actress and President of SAG (1985–1988) (born 1946)
Frank De Felitta, author, producer and director (born 1921)
March 30
Bill Rosendahl, politician (born 1945)
J. Thomas Rosch, lawyer (born 1939)
Frankie Michaels, singer and actor (born 1955)
Shirley Hufstedler, 1st United States Secretary of Education (born 1925)
March 31
Ward Wettlaufer, golfer (born 1935)
Terry Plumeri, musician, conductor and composer (born 1944)
Eugene E. Parker, sports agent (born 1956)
Werner Baer, economist (born 1931)
April
April 1
Patricia Thompson, philosopher and author (born 1926)
Marjorie Peters, baseball player (born 1918)
Herbert Theodore Milburn, judge (born 1931)
Richard S. Kem, army general (born 1934)
Tom Coughlin, business executive and fraudster (born 1949)
April 2
Amber Rayne, pornographic actress (born 1984)
Moreese Bickham, wrongfully convicted murderer and anti-death penalty activist (born 1917)
Rick Bartow, artist and sculptor (born 1946)
April 3
Clarence Clifton Young, politician (born 1922)
Bill Henderson, jazz vocalist and actor (born 1926)
Henry Harpending, anthropologist (born 1944)
Robert Guinan, painter (born 1934)
Joe Medicine Crow, Crow historian and author (born 1913)
Ward Crutchfield, politician (born 1928)
Alex de Jesús, boxer (born 1983)
Erik Bauersfeld, radio dramatist and voice actor (born 1922)
April 4
Mike Sandlock, baseball player (born 1915)
George Radosevich, football player (born 1928)
John Miller, politician (born 1947)
Carlo Mastrangelo, doo-wop singer (born 1937)
Archie Dees, basketball player (born 1936)
April 5
Barbara Turner, screenwriter and actress (born 1936)
E. M. Nathanson, author (born 1928)
Leon Haywood, funk singer-songwriter and record producer (born 1942)
Roman Gribbs, 65th Mayor of Detroit, Michigan (born 1925)
April 6
Murray Wier, basketball player (born 1926)
Pablo Lucio Vasquez, convicted murderer (born 1977)
Ogden Mills Phipps, financier, racehorse owner and breeder (born 1940)
Robert MacCrate, lawyer (born 1921)
Joel Kurtzman, economist (born 1947)
Merle Haggard, singer-songwriter and musician (born 1937)
Dennis Davis, drummer (born 1951)
April 7
Blackjack Mulligan, professional wrestler (born 1942)
Vladimir Kagan, furniture designer (born 1927)
Frank E. Denholm, politician (born 1923)
Joe Freeman Britt, attorney and judge (born 1935)
April 8
Edward J. Steimel, lobbyist and fundraiser (born 1922)
Daisy Lewellyn, reality television personality (born 1980)
Charles Hirsch, forensic pathologist (born 1937)
William Hamilton, cartoonist, playwright and novelist (born 1939)
Dick Alban, football player (born 1929)
April 9
Will Smith, football player (born 1981)
Tony Conrad, experimental filmmaker and musician (born 1940)
Duane Clarridge, spy (born 1932)
Arthur Anderson, actor (born 1922)
April 10
Wayne Southwick, surgeon and academic (born 1923)
Nicholas Hood, minister, politician and civil rights activist (born 1923)
Louis Gladstone, politician (born 1927)
April 11
Ed Snider, sports executive (born 1933)
Anne Gould Hauberg, arts patron (born 1917)
Hokie Gajan, football player and broadcaster (born 1959)
Doug Banks, radio personality (born 1958)
April 12
Spec Richardson, baseball executive (born 1923)
Balls Mahoney, professional wrestler (born 1972)
Bryce Jordan, 14th President of the Pennsylvania State University (born 1924)
Anne Jackson, actress, wife of Eli Wallach (born 1925)
David Gest, entertainer, producer and television personality (born 1953)
Paul Carey, broadcaster and sportscaster (born 1928)
Hector A. Cafferata Jr., soldier, Medal of Honor recipient (born 1929)
April 13
Nera White, basketball player (born 1935)
Ray Thornton, politician and attorney (born 1928)
April 14
Carl M. Vogel, politician (born 1955)
Dan Ireland, Canadian-born film director and producer (born 1958)
Fred Hayman, Swiss-born fashion retailer and entrepreneur (born 1925)
Francesco Guarraci, Italian-born mobster (born 1955)
April 15
Frederick Mayer, German-born spy (born 1921)
Laura Liu, judge (born 1966)
April 16
Maurice Kenny, Mohawk poet (born 1929)
William M. Gray, meteorologist (born 1929)
Rod Daniel, film and television director (born 1942)
Ron Bonham, basketball player (born 1942)
April 17
Doris Roberts, actress (born 1925)
Clifton C. Garvin, businessman (born 1921)
April 18
Scott Nimerfro, television writer and producer (born 1961)
Ben-Zion Gold, Polish-born rabbi (born 1923)
Bill Campbell, businessman and executive (born 1940)
Paul Busiek, physician and legislator (born 1923)
Brian Asawa, opera singer (born 1966)
April 19
Pete Zorn, musician (born 1950)
Milt Pappas, baseball player (born 1939)
John McConathy, basketball player (born 1930)
Richard Lyons, musician (born 1959)
Walter Kohn, Austrian-born physicist, Nobel Prize laureate (born 1923)
April 20
Dwayne Washington, basketball player (born 1964)
Harry Perkowski, baseball player (born 1922)
Velda González, actress and politician (born 1933)
Chyna, professional wrestler, bodybuilder and actress (born 1969)
Solomon Blatt Jr., judge (born 1921)
April 21
Peter Ruckman, Independent Baptist pastor (born 1921)
Prince, singer, songwriter, musician and actor (born 1958)
Michelle McNamara, crime writer, wife of Patton Oswalt (born 1970)
Lonnie Mack, singer and guitarist (born 1941)
April 22Jory Prum, audio engineer (born 1975)
April 23
Horace Ward, judge (born 1927)
Tom Muecke, football player (born 1963)
Ron Brace, football player (born 1986)
April 24
George Alexis Weymouth, artist and conservationist (born 1936)
Terry Redlin, artist (born 1937)
Billy Paul, R&B singer (born 1934)
Lizette Parker, Mayor of Teaneck, New Jersey (born 1972)
Tommy Kono, weightlifter (born 1930)
Steve Julian, radio host (born 1958)
Perry O. Hooper Sr., jurist (born 1925)
Manuel de la Torre, Spanish-born golf instructor (born 1921)
April 25Joe Blahak, football player (born 1950)
April 26
Harry Wu, Chinese-born human rights activist (born 1937)
James H. Ware, biostatistician (born 1941)
Ozzie Silna, basketball executive (born 1932)
Winston Hill, football player (born 1941)
April 27
Willie L. Williams, police commissioner (born 1943)
Harold Cohen, British-born digital artist (born 1928)
April 28
Blackie Sherrod, sportswriter (born 1919)
Charles Gatewood, photographer (born 1942)
Joe Durham, baseball player (born 1931)
Conrad Burns, U.S. Senator (1989–2007) (born 1935)
April 29Don White, race car driver (born 1926)
April 30
Peter Thomas, television announcer and narrator (born 1924)
Tracy Scott, script supervisor (born 1969)
Marisol Escobar, French-born artist and sculptor (born 1930)
Wayne Crawford, actor, producer, director and screenwriter (born 1942)
Daniel Berrigan, Jesuit priest and peace activist (born 1921)
Daniel Aaron, writer and academic, co-founder of the Library of America (born 1912)
May
May 1
Doug Raney, jazz guitarist, son of Jimmy Raney (born 1956)
Solomon W. Golomb, mathematician and engineer (born 1932)
May 2
Gordie Sundin, baseball player (born 1937)
Afeni Shakur, political activist and businesswoman, mother of Tupac Shakur (born 1947)
Jacky Lee, football player (born 1938)
Al Ferrari, basketball player (born 1933)
Mel Bartholomew, inventor and businessman (born 1932)
May 3
Ret Turner, costume designer (born 1929)
Ian Sander, film and television producer (born 1947)
Nicolas Noxon, documentary filmmaker (born 1936)
Thomas W. Libous, politician (born 1953)
Frank Levingston, supercentenarian (born 1905)
Abel Fernandez, actor (born 1930)
Paul Boutelle, politician (born 1934)
May 4
Jordan Parsons, mixed martial artist (born 1990)
Ursula Mamlok, German-born composer (born 1923)
Howard King, public address announcer (born 1933)
Karl Butzer, German-born geographer (born 1934)
Bob Bennett, U.S. Senator (1993–2011) (born 1933)
Blas Avena, mixed martial artist (born 1983)
May 5
Rollin Dart, CEO of Dart National Bank (born 1925)
Dick Estell, radio host (born 1920)
May 6
Rickey Smith, singer and reality show contestant (born 1979)
Pierre, African penguin (born 1983)
Candye Kane, blues singer-songwriter and actress (born 1961)
Johnny Joannou, politician (born 1940)
David Hall, 20th Governor of Oklahoma (born 1930)
Christopher T. Carley, real estate developer (born 1943)
May 7
John Stabb, punk vocalist (born 1961)
Michael S. Harper, poet (born 1938)
Ann Day, politician (born 1938)
May 8
John Young, baseball player, scout and executive (born 1949)
Nick Lashaway, actor (born 1988)
William Schallert, actor and President of SAG (1979–1981) (born 1922)
Louisa Chase, Panamanian-born painter and printmaker (born 1951)
John Bradshaw, motivational writer and speaker (born 1933)
Tom M. Apostol, mathematician (born 1923)
May 9
Ronald W. Walker, historian (born 1939)
Karl Maramorosch, Austrian-born virologist (born 1915)
Chuck Curtis, football coach (born 1935)
May 10Mark Lane, lawyer, politician, civil rights activist and author (born 1927)
May 11
Michael Ratner, attorney (born 1943)
Katherine Dunn, novelist (born 1945)
May 12
Peter J. Liacouras, President of Temple University (born 1931)
Del Latta, politician (born 1920)
Julius La Rosa, singer (born 1930)
Susannah Mushatt Jones, supercentenarian, last known American born in the 19th century (born 1899)
May 13
James M. Shuart, President of Hofstra University (born 1931)
Dick McAuliffe, baseball player (born 1939)
Rabbit Kekai, surfer (born 1920)
Sammy Ellis, baseball player (born 1941)
Buster Cooper, jazz trombonist (born 1929)
Bill Backer, advertising executive (born 1926)
Murray A. Straus, American sociologist and professor (University of New Hampshire), creator of the Conflict tactics scale (born 1926)
May 14Monteagle Stearns, U.S. Ambassador to Greece (1981–1985) and Ivory Coast (1976–1979) (born 1924)
May 16
Robert "Bobby" Freeman, politician (born 1934)
Jim McMillian, basketball player (born 1948)
Julia Meade, actress (born 1925)
Emilio Navaira, country and Tejano singer (born 1962)
Mamie Rallins, hurdler (born 1941)
Jack Unruh, commercial illustrator (born 1935)
May 17Guy Clark, singer-songwriter, Grammy winner (2014) (born 1941).
May 18
Elaine Abraham, Tlingit elder and nurse (born 1929)
Fritz Stern, German-born historian (born 1926)
Susan Tolchin, political scientist (born 1941)
May 19
Irving Benson, actor and comedian (born 1914)
John Berry, musician (born 1963)
Jim Ray Hart, baseball player (born 1941)
Morley Safer, Canadian-born journalist (born 1931)
May 20
Patricia M. Derian, human rights activist (born 1929)
Brandon Grove, U.S. Ambassador to East Germany and Zaire (1984–1987) (born 1929)
Albert M. Sackett, Navy rear admiral (born 1920)
Wheelock Whitney Jr., sports executive (born 1926)
May 21
Homeboykris, racehorse (born 2007)
Nick Menza, German-born drummer (born 1964)
May 22
Tom DeLeone, football player (born 1950)
George Wildman, cartoonist (born 1927)
May 23Joe Fleishaker, actor (born 1954)
May 24
Suzanne Corkin, neuroscientist (born 1937)
Buck Kartalian, actor (born 1922)
Mell Lazarus, cartoonist (born 1927)
Hughes Oliphant Old, theologian (born 1933)
May 25Nancy Dow, actress and model (born 1936)
May 26
Cassandra Butts, lawyer (born 1965)
Hedy Epstein, German-born Holocaust survivor and political activist (born 1924)
Lou Grasmick, baseball player (born 1924)
Iana Kasian, Ukrainian-born prosecutor and murder victim (born 1986)
Gustav Meier, Swiss-born conductor (born 1929)
Angela Paton, actress (born 1930)
Coe Swobe, politician, member of the Nevada Senate (1966–1974) (born 1929)
Bob Williams, football player (born 1930)
May 27
Michael Dann, television executive (born 1921)
Louise Erickson, baseball player (born 1929)
Frank Modell, cartoonist (born 1917)
Morton White, philosopher (born 1917)
May 28
Bryce Dejean-Jones, basketball player (born 1992)
Peter DeTroy, attorney (born 1948)
M. Brendan Fleming, politician, Mayor of Lowell, Massachusetts (1982–1984) (born 1926)
Harambe, endangered gorilla (born 1999)
May 29
T. Marshall Hahn, educator and executive (born 1926)
Ralph Ketner, businessman and philanthropist (born 1920)
Don McNay, financial author (born 1959)
May 30C. Michael Harper, executive (born 1927)
May 31
Jan Crouch, televangelist and broadcasting executive (born 1928)
David Tod Roy, sinologist and translator (born 1933)
June
June 1
Roger Enrico, businessman (born 1944)
Boyce F. Martin Jr., judge, Chief Judge of the United States Court of Appeals for the Sixth Circuit (1996–2003) (born 1935)
June 2
Donny Everett, baseball player (born 1997)
Wayne Kingery, football player (born 1927)
Lee Pfund, baseball player and college baseball and basketball coach (born 1919)
June 3
Muhammad Ali, boxer (born 1942)
Henry Childs, football player (born 1951)
June 4
Phyllis Curtin, operatic soprano (born 1921)
Bill Richmond, film and television writer and producer (born 1921)
William Wright, author, editor, and playwright (born 1930)
June 5
Jerome Bruner, psychologist (born 1915)
David Lamb, journalist (born 1940)
Cedric Robinson, political scientist and activist (born 1940)
Eleanor Zelliot, writer and educator (born 1926)
June 6
Helen Fabela Chávez, labor unionist and activist (born 1928)
Theresa Saldana, actress (born 1954)
Kimbo Slice, Bahamian-born mixed martial artist and boxer (born 1974)
June 7
Leonard Hill, television producer and real estate developer (born 1947)
Thomas Perkins, businessman (born 1932)
Sean Rooks, basketball player and coach (born 1969)
Bryan Wiedmeier, football executive (born 1959)
June 9
J. Reilly Lewis, choral conductor and organist (born 1944)
Brooks Thompson, basketball player and coach (born 1970)
June 10Mary Feik, aviator (born 1924)
Gordie Howe- hockey player (b.1928)
June 11
Gilbert Blue, Catawba Nation chief (1973–2007) (born 1933)
Stacey Castor, convicted murderer (born 1967)
Christina Grimmie, singer and songwriter (born 1994)
Bryan Robinson, football player (born 1974)
June 12
Michelle Cliff, Jamaican-born author (born 1946)
Earl Faison, football player (born 1939)
Curley Johnson, football player (born 1935)
Danny Kopec, chess player (born 1954)
George Voinovich, Governor of Ohio (1991–98) and Senator from Ohio (1999–2011) (born 1936)
Janet Waldo, actress and voice artist (born 1920)
49 victims of the Pulse nightclub massacre
June 13
Anahid Ajemian, violinist (born 1924)
Michu Meszaros, Hungarian-born actor (born 1939)
Chips Moman, record producer, guitarist, and songwriter (born 1937)
Robert T. Paine, ecologist (born 1933)
Gregory Rabassa, literary translator (born 1922)
June 14
Melvin Dwork, interior designer and LGBT rights activist (born 1922)
Ronnie Claire Edwards, actress (born 1933)
Ann Morgan Guilbert, actress (born 1928)
June 15
Lois Duncan, author (born 1934)
Richard Selzer, surgeon and author (born 1928)
June 16
Irving Moskowitz, businessman and philanthropist (born 1928)
Bill Berkson, poet and literary critic (born 1939)
June 17
Thomas Ashley Graves Jr., academic (born 1924)
Ron Lester, actor (born 1970)
David Morgenthaler, businessman (born 1919)
June 18
Curt Hofstad, politician (born 1946)
Kitty Rhoades, politician (born 1951)
Joe Schaffernoth, baseball player (born 1937)
June 19
David Johnson, Australian-born businessman (born 1933)
Anton Yelchin, Soviet-born actor (born 1989)
June 20
Frank Chapot, equestrian (born 1932)
Alvin Endt, educator and politician (born 1933)
Bill Ham, music manager and record producer (born 1937)
Rich Olive, politician (born 1949)
Chayito Valdez, Mexican-born singer and actress (born 1945)
June 21
Dan Daniel, radio personality (born 1934)
Jack Fuller, journalist, novelist, and publisher (born 1946)
Wayne Jackson, R&B trumpeter (born 1941)
Kenworth Moffett, art curator and museum director (born 1934)
June 22
Joan Acker, sociologist and women's rights activist (born 1924)
Jim Boyd, singer-songwriter (born 1956)
June 23
Mike Flynn, online journalist and conservative activist (born 1968)
James Green, labor historian and activist (born 1944)
Michael Herr, author and war correspondent (born 1940)
Stuart Nisbet, actor (born 1934)
Ralph Stanley, bluegrass singer and banjoist (born 1927)
June 24
Chaim Avrohom Horowitz, Polish-born rabbi (born 1933)
Bernie Worrell, funk keyboardist (born 1944)
June 25
Raymond Bateman, politician (born 1927)
Bill Cunningham, street and fashion photographer (born 1929)
Jim Hickman, baseball player (born 1937)
Peter Hutton, experimental filmmaker (born 1944)
Hal Lear, basketball player (born 1935)
June 26
Jona Goldrich, Polish-born real estate developer and philanthropist (born 1927)
Barbara Goldsmith, author, journalist, editor, and philanthropist (born 1931)
John J. Santucci, lawyer and politician (born 1931)
June 27
Simon Ramo, engineer, businessman, and author (born 1913)
Mack Rice, singer and songwriter (born 1933)
Alvin Toffler, writer and futurist (born 1928)
June 28
Scotty Moore, rock and roll guitarist (born 1931)
Buddy Ryan, football coach (born 1934)
Pat Summitt, women's basketball coach (born 1952)
Zurlon Tipton, football player (born 1990)
June 29
Stanley Gault, businessman and philanthropist (born 1929)
Irving Gottesman, psychologist (born 1930)
Carl Haas, auto racing driver and owner (born 1929)
Edward L. Salmon Jr., Episcopal bishop (born 1934)
Rob Wasserman, rock double-bassist (born 1952)
June 30
Don Friedman, jazz pianist (born 1935)
Joe Scott, football player (born 1926)
July
July 2
Roscoe Brown, aviator and educator (born 1922)
Michael Cimino, film director, producer, and screenwriter (born 1939)
Alphie McCourt, Irish-born writer (born 1940)
Jack C. Taylor, businessman, billionaire, and philanthropist (born 1922)
Elie Wiesel, Romanian-born writer, educator, political activist, and Holocaust survivor (born 1928)
July 3
Noel Neill, actress (born 1920)
Clifford Vaughs, civil rights activist, filmmaker, and motorcycle builder (born 1937)
July 4Abner J. Mikva, politician, federal judge, lawyer and law professor (born 1926)
July 5William L. Armstrong, politician and businessman; U.S. Senator from Colorado (1979–1991) (born 1937)
July 6
Marian Bergeson, politician; member of the California State Assembly (1978–1984) and California State Senate (1984–1995) (born 1925)
Larry Bock, entrepreneur (born 1959)
John McMartin, actor (born 1929)
Mike Moore, football player (born 1956)
July 7Tom Marr, talk radio host and sportscaster (born 1942)
July 8
Harold A. Linstone, German-born mathematician and futurist (born 1924)
William H. McNeill, Canadian-born historian (born 1917)
Howard Raiffa, academic (born 1924)
July 9
Norman Abbott, television director (born 1922)
Sydney Schanberg, journalist (born 1934)
July 10
Robert E. Cooper Sr., judge (born 1920)
Alfred G. Knudson, geneticist (born 1922)
July 11
John Brademas, politician and educator, U.S. Representative from Indiana (1959–1981) (born 1927)
Jim Metzen, politician (born 1943)
Scott Olin Wright, judge (born 1923)
July 13
Marion Campbell, football player and coach (born 1929)
Garry N. Drummond, businessman and philanthropist (born 1938)
Robert Fano, Italian-born computer scientist (born 1917)
Hollis L. Harris, businessman (born 1931)
Carolyn See, author and educator (born 1934)
July 14
Roger Chanoine, football player (born 1976)
Troy Mader, rancher and politician; Wyoming state representative (2014–2015) (born 1955)
Sharon Runner, politician; California state senator (2011–2016) (born 1954)
July 15
Karl E. Case, economist and academic (born 1946)
Duncan M. Gray Jr., Episcopalian prelate (born 1926)
July 16
Bonnie Brown, country singer (born 1938)
Robert Burren Morgan, politician; U.S. Senator from North Carolina (1975–1981) (born 1925)
Gary S. Paxton, record producer, songwriter, and musician (born 1939)
Nate Thurmond, basketball player (born 1941)
Alan Vega, vocalist and visual artist (born 1938)
July 17
Wendell Anderson, politician; 33rd Governor of Minnesota (1971–1976) (born 1933)
Mel Durslag, sportswriter (born 1921)
July 18
John Kerr, author (born 1950)
Jeffrey Montgomery, LGBT rights activist (born 1953)
Billy Name, photographer, filmmaker, and lighting designer (born 1940)
July 19
Betsy Bloomingdale, socialite and philanthropist (born 1922)
Garry Marshall, actor, director, writer, and producer (born 1934)
Chief Zee, Washington Redskins superfan (born 1941)
July 20
William Gaines, journalist and academic
Mark Takai, politician; U.S. Representative from Hawaii (2015–2016) (born 1967)
July 21
Bill Cardille, television and radio personality (born 1928)
Thomas R. McCarthy, racehorse owner and trainer (born 1934)
Lewie Steinberg, rhythm and blues bassist (born 1933)
July 22
Dave Bald Eagle, Lakota actor, musician, soldier, and stuntman (born 1919)
Dennis Green, football coach (born 1949)
Zeke Smith, football player (born 1936)
July 23
Sheilla Lampkin, politician (born 1945)
Harold Duane Vietor, federal judge (born 1931)
July 24
Marni Nixon, singer and actress (born 1930)
Conrad Prebys, real estate developer and philanthropist (born 1933)
Don Roberts, ice hockey coach (born 1933)
July 25
Dwight Jones, basketball player (born 1952)
Tim LaHaye, evangelical minister, author, and speaker (born 1926)
Tom Peterson, retailer and television personality (born 1930)
Franklin Van Antwerpen, federal judge (born 1941)
July 26
Miss Cleo, psychic and television personality (born 1926)
David A. Katz, federal judge (born 1933)
Forrest Mars Jr., businessman and billionaire (born 1931)
Sandy Pearlman, record producer, talent manager, and songwriter (born 1943)
July 27
LaVon Crosby, politician; Nebraska state senator (1988–2000) (born 1924)
Jack Davis, cartoonist and illustrator (born 1924)
Doug Griffin, baseball player (born 1947)
James Alan McPherson, short story writer and essayist (born 1943)
Richard Thompson, cartoonist (born 1957)
July 28Conrad K. Cyr, federal judge (born 1931)
July 29
Antonio Armstrong, football player (born 1973)
Zelda Fichandler, theatre producer, director, manager, and educator (born 1924)
July 30
Alan Brice, baseball player (born 1937)
Gloria DeHaven, actress and singer (born 1925)
Dave Schwartz, meteorologist (born 1953)
July 31Eric Moon, British-born librarian (born 1923)
August
August 1
Jonathan D. Krane, film producer (born 1952)
Jim Northrup, Ojibwe writer (born 1943)
August 2
Gordon Danby, physicist
David Huddleston, actor (born 1930)
Ahmed Zewail, Egyptian-born chemist (born 1946)
August 3
Abdul Jeelani, basketball player (born 1954)
Steve LaTourette, politician; U.S. Representative from Ohio (2005–2013) (born 1954)
Elliot Tiber, writer and artist (born 1935)
August 4
Jean Antone, wrestler (born 1943)
David Dudley Dowd Jr., federal judge (born 1929)
Patrice Munsel, operatic soprano (born 1925)
Albert Nicholas, basketball player, businessman and philanthropist (born 1931)
Gaspar Saladino, comic letterer and logo designer (born 1927)
August 5
Alan Bates, politician; Oregon state senator (2005–2016) (born 1945)
Richard Fagan, country songwriter and musician (born 1947)
George E. Mendenhall, Biblical scholar (born 1916)
August 6
Sid Applebaum, businessman (born 1924)
Helen Delich Bentley, politician; U.S. Representative from Maryland (1985–1995) (born 1923)
Joani Blank, feminist writer, sex educator, and entrepreneur (born 1937)
Art Demmas, football official (born 1934)
Pete Fountain, jazz clarinetist (born 1930)
August 7 – Bryan Clauson, racing driver (born 1989)
August 8 – George Yarno, football player (born 1957)
August 9
Bill Dooley, football player and coach (born 1934)
Barry Jenner, actor (born 1941)
W. Carter Merbreier, television personality, minister, and police chaplain (born 1926)
August 10
Neill Armstrong, football player and coach (born 1926)
Steve Pivovar, sportswriter (born 1952)
John Saunders, Canadian-born sports journalist and broadcaster (born 1955)
Tom Wilson, football player and coach (born 1944)
August 11
Thomas Steinbeck, author, journalist, and photographer (born 1944)
Glenn Yarbrough, folk singer (born 1930)
August 12
Alison Piepmeier, feminist writer, academic, and activist (born 1972)
Ruby Wilson, blues and gospel singer (born 1948)
August 13
Allen Kelley, basketball player (born 1932)
Michel Richard, French-born chef and restaurateur (born 1948)
August 14
Marion Christopher Barry, businessman (born 1980)
DJ Official, hip hop musician and producer (born 1976)
Fyvush Finkel, actor (born 1922)
Ron Vander Kelen, football player (born 1939)
August 15
Choo-Choo Coleman, baseball player (born 1937)
Bobby Hutcherson, jazz vibraphonist and composer (born 1941)
Richard Wackar, football and basketball coach (born 1928)
August 16
John McLaughlin, political commentator and television personality (born 1927)
Richard Seminack, Eastern Catholic bishop (born 1942)
August 17
Steve Arlin, baseball player (born 1945)
James R. Bennett, politician; 49th and 52nd Secretary of State of Alabama (born 1940)
Arthur Hiller, Canadian-born film and television director (born 1923)
John Timoney, Irish-born police officer (born 1948)
August 18
Jay S. Fishman, businessman (born 1952)
John William Vessey Jr., U.S. Army general; tenth Chairman of the Joint Chiefs of Staff (born 1922)
August 19
Donald Henderson, physician, educator, and epidemiologist (born 1928)
Edward T. Maloney, aviation historian (born 1928)
Lou Pearlman, record producer, music manager, and fraudster (born 1954)
Jack Riley, actor, voice artist, and comedian (born 1935)
August 20
George E. Curry, journalist (born 1947)
Irving Fields, pianist and composer (born 1915)
Jim Gibbons, football player (born 1936)
Harry Gilmer, football player (born 1926)
Joseph A. Palaia, politician; New Jersey state senator (1989–2008) (born 1927)
Morton Schindel, film producer and educator (born 1918)
Morris A. Wessel, pediatrician (born 1917)
August 21Peter deCourcy Hero, college and foundation president (born 1942)
August 22
Michael Brooks, basketball player (born 1958)
Edward Malefakis, history professor (born 1932)
Jane Thompson, designer, architect, and urban planner (born 1927)
August 23
Steven Hill, actor (born 1922)
Aaron W. Plyler, businessman and politician (born 1926)
August 24
Joel Bergman, architect (born 1936)
Tom Ganley, businessman and politician (born 1942)
Gregory P. Schmidt, politician (born 1947)
August 25
James Cronin, physicist (born 1931)
Warren Hinckle, political journalist (born 1938)
Marvin Kaplan, actor and voice artist (born 1927)
Rudy Van Gelder, recording engineer (born 1924)
August 26
Steve Korcheck, baseball player (born 1932)
E. Parry Thomas, banker, racehorse owner, and philanthropist (born 1921)
August 27Bill Lenkaitis, football player (born 1946)
August 28
Mr. Fuji, professional wrestler and manager (born 1937)
Joe R. Hicks, political commentator and activist (born 1941)
Nate Hirsch, sportscaster (born 1947)
August 29
Dee Dowis, football player (born 1968)
Gene Wilder, actor, screenwriter, film director, and author (born 1933)
August 30
Dan Dryden, politician (born 1944)
Hoot Hester, fiddle player (born 1951)
David Lavery, academic (born 1949)
Doris McLemore, educator; last fluent speaker of the Wichita language (born 1927)
Joe Sutter, aeronautical engineer (born 1921)
August 31 – Nathan Lyons, photographer (born 1930)
September
September 1
Thomas G. Doran, Roman Catholic prelate (born 1936)
Fred Hellerman, folk musician (born 1927)
Kacey Jones, singer-songwriter and humorist (born 1950)
Jon Polito, actor and voice artist (born 1950)
September 2
Blackie Gejeian, race car driver and auto customizer (born 1926)
Jerry Heller, music manager (born 1940)
Don Minnick, baseball player (born 1931)
Margrit Mondavi, Swiss-born businesswoman (born 1925)
September 3
John W. Drummond, politician (born 1919)
Albert Hofstede, politician (born 1940)
Leslie H. Martinson, film and television director (born 1915)
September 4Clarence D. Rappleyea Jr., lawyer and politician (born 1933)
September 5
Duane Graveline, physician and astronaut (born 1931)
Hugh O'Brian, actor (born 1925)
Rudolph T. Randa, federal judge (born 1940)
Phyllis Schlafly, constitutional lawyer, conservative activist, and author (born 1924)
September 6
Cary Blanchard, football player (born 1968)
John Royston Coleman, labor economist and university president (born 1921)
Darren Seals, civil rights activist (born 1987)
Robert Timberg, journalist and author (born 1940)
September 7
Bobby Chacon, boxer (born 1951)
Clifford Curry, R&B singer (born 1936)
Norbert Schemansky, weightlifter (born 1924)
September 8
Greta Zimmer Friedman, dental assistant, subject of V-J Day in Times Square (born 1924)
The Lady Chablis, drag queen (born 1957)
September 9
Chad Brown, football official (born 1948)
Bill Nojay, politician (born 1956)
Ben Press, tennis player, coach, and writer (born 1924)
James Stacy, actor (born 1936)
September 10
Robert Eugene Allen, businessman (born 1935)
Chris Stone, businessman (born 1935)
Frank Masley, Olympic luger (born 1960)
September 11
Alexis Arquette, actress (born 1969)
Lawrence D. Cohen, attorney, politician, and judge (born 1933)
September 12
Edmund D. Edelman, politician (born 1930)
Peter Pettalia, politician (born 1955)
Stanley Sheinbaum, academic and activist (born 1920)
September 13
Jack Hofsiss, theatre, film, and television director (born 1950)
Judith Jacobs, politician (born 1939)
Mike Roberts, sportscaster (born 1933)
Joe Zaleski, football player and coach (born 1927)
September 14
Don Buchla, musical instrument designer (born 1937)
Kim McGuire, actress and lawyer (born 1955)
Dean White, businessman (born 1923)
September 15Rose Mofford, politician (born 1922)
September 16
Edward Albee, playwright (born 1928)
Don Bass, wrestler (born 1946)
Marvin Mottet, Roman Catholic priest (born 1930)
Joe Seng, politician (born 1946)
September 17Charmian Carr, actress and singer (born 1942)
September 18
Robert W. Cone, U.S. Army general (born 1957)
John Craighead, conservationist and naturalist (born 1916)
C. Martin Croker, animator and voice actor (born 1962)
David Kyle, science fiction writer (born 1919)
Tom Mintier, television correspondent
Joan Patricia Murphy, politician
Rose Pak, political activist (born 1948)
September 19
Bobby Breen, Canadian-born actor and singer (born 1927)
Mike Fellows, politician
Bill Glassford, football player and coach (born 1914)
Zerka T. Moreno, Dutch-born psychotherapist (born 1917)
September 20
Bill Barrett, politician; member of the U.S. House of Representatives (1991–2001) (born 1929)
Richie Dunn, ice hockey player (born 1957)
Jack Garman, computer engineer and NASA executive (born 1944)
Curtis Hanson, film producer, director, and screenwriter (born 1945)
Dennis M. Jones, businessman (born 1938)
Terry Kohler, businessman and philanthropist (born 1934)
Victor Scheinman, roboticist and inventor (born 1942)
September 21
Shawty Lo, rapper (born 1976)
John D. Loudermilk, singer and songwriter (born 1934)
September 22
Walter Bush, ice hockey executive (born 1929)
Leonard I. Garth, federal judge (born 1921)
Ed Temple, track and field coach (born 1927)
September 24
Bill Nunn, actor (born 1953)
Buckwheat Zydeco, zydeco musician (born 1947)
September 25
David Budbill, poet and playwright (born 1940)
José Fernández, Cuban-born baseball player (born 1992)
Kashif, musician, record producer, and humanitarian (born 1959)
Arnold Palmer, golfer (born 1929)
Jean Shepard, country singer and songwriter (born 1933)
Robert Weinberg, author (born 1946)
September 26
Taz Anderson, football player (born 1938)
Joe Clay, rockabilly musician (born 1938)
Jack Cotton, basketball player (born 1924)
Jack Kirrane, ice hockey player (born 1928)
Herschell Gordon Lewis, film producer, director, and screenwriter (born 1929)
September 27
Randy Duncan, football player (born 1937)
Charles Schultze, economist (born 1924)
September 28
Gary Glasberg, television writer and producer (born 1966)
Malcolm M. Lucas, 26th Chief Justice of California (born 1927)
Gloria Naylor, novelist (born 1950)
Agnes Nixon, television writer and producer (born 1922)
Timothy Pesci, politician (born 1944)
September 29
Hidden Lake, racehorse (born 1993)
Shirley Jaffe, painter and sculptor (born 1923)
Joseph Verner Reed Jr., banker and diplomat (born 1937)
Mark Ricks, politician; 40th Lieutenant Governor of Idaho (born 1924)
Ralph V. Whitworth, businessman (born 1955)
September 30
George Barris, photographer (born 1922)
Charles Brading, pharmacist and politician (born 1935)
Oscar Brand, Canadian-born folk musician (born 1920)
Frederic C. Hamilton, oilman and philanthropist (born 1927)
Jim Zapp, baseball player (born 1924)
October
October 1
Bobby Burnett, football player (born 1943)
Roger Theder, football player and coach (born 1939)
Lowell Thomas Jr., British-born film producer and politician (born 1923)
October 2
Walter Darby Bannard, painter (born 1934)
Gordon Davidson, stage and film director (born 1933)
Gary Reed, comics writer and publisher (born 1956)
October 4
Kenneth Angell, Roman Catholic prelate (born 1930)
Ivan C. Lafayette, politician (born 1930)
Ned Randolph, politician (born 1942)
Donald H. White, composer (born 1921)
October 5
Dick Haugland, biochemist and philanthropist (born 1943)
Cameron Moore, basketball player (born 1990)
Josh Samman, mixed martial artist (born 1988)
Brock Yates, journalist and author (born 1933)
October 6
Hans W. Becherer, business executive (born 1935)
George Pernicano, businessman and NFL owner (born 1917)
October 7Bill Warren, film historian and critic (born 1943)
October 8
Peter Allen, radio broadcaster (born 1920)
Don Ciccone, singer and songwriter (born 1946)
Gary Dubin, actor (born 1959)
Jacob Neusner, Jewish scholar and theologian (born 1932)
October 9
Santo DiPietro, businessman and politician (born 1934)
Donn Fendler, wilderness survivor, author, and public speaker (born 1926)
Aaron Pryor, boxer (born 1955)
Kenneth P. Thompson, lawyer and politician (born 1966)
October 10
Tony Adamowicz, racing driver (born 1941)
Leo Beranek, acoustic engineer and academic (born 1914)
Lorenzo Freeman, football player (born 1964)
John Vaughn, Franciscan Catholic leader (born 1928)
October 11
David Antin, poet (born 1932)
Tom Barnes, journalist (born 1946)
Patricia Barry, actress (born 1922)
October 12
Thomas Mikal Ford, actor (born 1964)
Jack Greenberg, civil rights lawyer and legal scholar (born 1924)
Rick Gudex, businessman and politician (born 1968)
Dylan Rieder, skateboarder and model (born 1988)
Fulton Walker, football player (born 1958)
October 13
Richard A. Pittman, U.S. Marine and Medal of Honor winner (born 1945)
Louis Stettner, photographer (born 1922)
October 14
Lucy Baxley, politician; 28th Lieutenant Governor of Alabama (born 1937)
Edward Gorman, author (born 1941)
Thom Jones, author (born 1945)
October 15
Dennis Byrd, football player (born 1966)
Quentin Groves, football player (born 1984)
Bruce Marshall, ice hockey coach (born 1962)
October 16
Clyde C. Holloway, politician and businessman (born 1943)
Ted V. Mikels, film producer, director, and screenwriter (born 1929)
Joseph A. Suozzi, Italian-born attorney and judge (born 1921)
October 17
Eddie Applegate, actor (born 1935)
Edgar Munhall, art historian and curator (born 1933)
Irwin Smigel, dentist and entrepreneur (born 1924)
Morris Stroud, football player (born 1946)
October 18
Anthony Addabbo, actor (born 1960)
David Bunnell, businessman, writer, and publisher (born 1947)
October 19
Tommy Bartlett, basketball and tennis player and coach (born 1928)
Phil Chess, Polish-born record producer and music executive (born 1921)
October 20
William G. Bowen, academic and university president (born 1933)
Gail Cogdill, football player (born 1937)
Michael Massee, actor (born 1952)
Simone Schaller, Olympic hurdler (b, 1912)
October 21
Dan Johnston, lawyer and politician
Kevin Meaney, comedian and actor (born 1956)
October 22
Gavin MacFadyen, journalist and documentary filmmaker (born 1940)
Monarchos, racehorse and stallion (born 1998)
Sheri S. Tepper, author (born 1929)
Bob Vanatta, basketball coach (born 1918)
October 23
Jack Chick, cartoonist, publisher, and Christian fundamentalist (born 1924)
Tom Hayden, writer, activist, and politician (born 1939)
Bob Saunders, politician (born 1929)
October 24
Bobby Vee, pop singer and actor (born 1943)
Charles Wolf Jr., economist (born 1924)
October 25
Kevin Curran, television writer (born 1957)
Mel Haber, hotelier, restaurateur, and philanthropist (born 1935)
Bob Hoover, U.S. Air Force pilot (born 1922)
Burnet R. Maybank Jr., lawyer and politician (born 1924)
October 26
Donald C. Pogue, federal judge (born 1947)
Vic Rapp, football coach (born 1929)
October 27
Jim Eddy, football coach (born 1936)
Susan Lindquist, biologist (born 1949)
David Tyack, historian (born 1930)
John Zacherle, television and radio personality and voice actor (born 1918)
October 28Angeline Kopka, businesswoman and politician (born 1916)
October 29
Robert Belfanti, politician (born 1948)
Norman Brokaw, talent agent (born 1927)
E. Lee Hennessee, hedge fund manager
John Hicks, football player (born 1951)
Paul Luebke, politician (born 1946)
John D. Roberts, chemist (born 1918)
Barry Stout, politician (born 1936)
October 30
James Galanos, fashion designer (born 1924)
Tammy Grimes, actress and singer (born 1934)
Betty Ann Kennedy, contract bridge player (born 1930)
Gil Krueger, football coach (born 1929)
Don Marshall, actor (born 1936)
Curly Putman, songwriter (born 1930)
October 31
Natalie Babbitt, children's author and illustrator (born 1932)
Andy Hill, politician (born 1962)
Gene La Rocque, U.S. Navy admiral (born 1918)
Klaus Schulten, German-born biophysicist (born 1947)
November
November 1
Don Kates, lawyer and criminologist (born 1941)
Stanford Lipsey, newspaper publisher (born 1927)
John Orsino, baseball player (born 1938)
November 2
Max Alexander, comedian and actor (born 1953)
Bob Cranshaw, jazz bassist (born 1932)
Jud Kinberg, film producer and screenwriter (born 1925)
Dolores Klosowski, baseball player (born 1923)
A. Thomas Kraabel, classical scholar (born 1934)
Jan Slepian, children's author and poet (born 1921)
November 3
Kay Starr, singer (born 1922)
Rick Steiner, theatrical producer (born 1946)
November 4
Eddie Carnett, baseball player (born 1916)
DeVan Dallas, politician (born 1926)
Allen Eller, soccer player (born 1976)
Eddie Harsch, Canadian-born rock musician (born 1957)
November 5
Ralph Cicerone, atmospheric scientist (born 1943)
W. Eugene Hansen, religious leader (born 1928)
Arnold Mesches, visual artist (born 1923)
November 7
Phil Georgeff, horse racing announcer (born 1931)
Julie Gregg, actress (born 1937)
Janet Reno, lawyer; U.S. Attorney General (1993–2001) (born 1938)
November 8
Yaffa Eliach, Polish-born historian and Holocaust survivor (born 1937)
Junius Foy Guin Jr., federal judge (born 1924)
Bill Lapham, football player (born 1934)
November 9
Greg Ballard, basketball player and assistant coach (born 1955)
Al Caiola, guitarist and composer (born 1920)
Russ Nixon, baseball player (born 1935)
November 10
David Adamany, political scientist and academic administrator (born 1936)
Bill Stanfill, football player (born 1947)
November 11
Victor Bailey, bassist (born 1960)
Greg Horton, football player (born 1951)
Claire Labine, television writer and producer (born 1934)
Aileen Mehle, gossip columnist (born 1918)
Robert Vaughn, actor (born 1932)
November 12
Jerry Dumas, cartoonist (born 1930)
Howard Ruff, economist and investment writer (born 1930)
Lupita Tovar, Mexican-American actress (born 1910)
November 13
Lary Kuharich, football coach (born 1945)
Billy Miller, music archivist (born 1954)
Leon Russell, musician and songwriter (born 1942)
November 14
Diana Balmori, landscape designer (born 1932)
Houston Conwill, sculptor (born 1947)
Holly Dunn, country music singer and songwriter (born 1957)
Bob Gain, football player (born 1929)
Roger Hobbs, novelist (born 1988)
Gwen Ifill, journalist, television newscaster, and author (born 1955)
Mahpiya Ska, albino buffalo (born 1996)
David Mancuso, club DJ (born 1944)
Gardnar Mulloy, tennis player (born 1913)
November 15
Bob Addis, baseball player (born 1925)
Mose Allison, jazz pianist, vocalist, and composer (born 1927)
Dwayne Andreas, businessman and political donor (born 1918)
Cliff Barrows, gospel singer and music director (born 1923)
Jules Eskin, cellist (born 1931)
Lisa Lynn Masters, actress (born 1964)
Milt Okun, record producer, arranger. conductor, and singer (born 1923)
Clift Tsuji, politician (born 1941)
November 16
Jay Wright Forrester, computer engineer (born 1918)
Melvin Laird, politician; U.S. Secretary of Defense (1969–1973) (born 1922)
Daniel Leab, German-born historian (born 1936)
Larry Tucker, politician (born 1935)
Mentor Williams, songwriter and record producer (born 1946)
November 17
Ruth Gruber, photojournalist and humanitarian (born 1911)
Whitney Smith, vexillologist and flag designer (born 1940)
November 18
Denton Cooley, heart surgeon (born 1920)
Sharon Jones, soul and funk singer (born 1956)
Yevgeni Lazarev, Russian-born actor (born 1937)
November 19
Monk Bonasorte, football player (born 1957)
John C. Carpenter, rancher and politician (born 1930)
Irving A. Fradkin, optometrist and philanthropist (born 1921)
Ida Levin, violinist (born 1963)
Paul Sylbert, production designer (born 1928)
November 20
Gene Guarilia, basketball player (born 1937)
Janellen Huttenlocher, psychologist (born 1932)
Hod O'Brien, jazz pianist (born 1936)
November 21Edward L. Kimball, legal scholar (born 1930)
November 23
Peggy Kirk Bell, golfer (born 1921)
Ralph Branca, baseball player (born 1926)
Joe Esposito, author and publisher (born 1938)
Jerry Tucker, child actor (born 1925)
November 24
Al Brodax, film and television producer (born 1926)
Bob Chase, radio sports announcer (born 1926)
John Ebersole, educator and author (born 1944)
Dave Ferriss, baseball player (born 1921)
Larry W. Fullerton, inventor
Florence Henderson, actress and singer (born 1934)
William Mandel, journalist and activist (born 1917)
November 25
Colonel Abrams, musician, dancer, and actor (born 1949)
Erich Bloch, German-born electrical engineer (born 1925)
Ron Glass, actor (born 1945)
Dwan Hurt, basketball coach (born 1963)
Jake Krull, politician (born 1938)
Pauline Oliveros, composer and accordionist (born 1932)
Richard Dean Rogers, federal judge (born 1921)
November 26
Harry Flournoy, basketball player (born 1943)
James E. McClellan, veterinarian and politician (born 1926)
Russell Oberlin, countertenor (born 1928)
Debra Saunders-White, educator (born 1957)
Fritz Weaver, actor (born 1925)
November 27
Dick Logan, football player (born 1930)
Tony Martell, music industry executive and philanthropist (born 1926)
Bruce Mazlish, historian (born 1923)
November 28
William Christenberry, photographer, painter, and sculptor (born 1936)
Grant Tinker, television executive (born 1926)
Keo Woolford, actor (born 1967)
November 29
Bill Bartmann, businessman (born 1948)
James Danieley, educator (born 1924)
Hardy Myers, lawyer and politician (born 1939)
November 30
Alice Drummond, actress (born 1928)
Royce Womble, football player (b, 1931)
December
December 1
Don Calfa, actor (born 1939)
Elisabeth Carron, operatic soprano (born 1922)
Joe McKnight, football player (born 1988)
December 2
Lyle Bouck, U.S. Army officer (born 1923)
H. Keith H. Brodie, psychiatrist and educator (born 1939)
Billy Chapin, child actor (born 1943)
Mark Gray, country singer (born 1952)
Sammy Lee, Olympic diver (born 1920)
Bosco Tjan, psychologist and neuroscientist (born 1966)
December 3
Newman Darby, inventor (born 1928)
Herbert Hardesty, jazz musician (born 1925)
Nancy Mairs, author (born 1943)
December 4
Leonard T. Connors, politician (born 1929)
Jack Rudin, real estate developer (born 1924)
Margaret Whitton, actress (born 1950)
December 5
Big Syke, rapper (born 1968)
Larry Roberts, football player (born 1963)
Rashaan Salaam, football player (born 1974)
Rodney Smith, photographer (born 1947)
December 6 – Dave Edwards, football player (born 1939)
December 7
Mike Kelly, politician (born 1942)
Elliott Schwartz, composer (born 1936)
December 8
Putsy Caballero, baseball player (born 1927)
John Glenn, aviator, astronaut, and U.S. Senator (born 1921)
Joseph Mascolo, actor (born 1929)
Thomas C. Oden, theologian (born 1931)
December 9
Edwin Benson, last native speaker of the Mandan language (born 1931)
Nola Ochs, centenarian (born 1911)
Jens Risom, Danish-born furniture designer (born 1916)
December 10
Ken Hechler, politician (born 1914)
Eric Hilton, hotelier and philanthropist (born 1933)
Miles Lord, federal judge (born 1919)
December 11
Sark Arslanian, football coach (born 1924)
Harry Jones, football player (born 1945)
Bob Krasnow, music industry executive (born 1935)
December 12
Barrelhouse Chuck, blues musician (born 1958)
Myron H. Bright, federal judge (born 1919)
Donald L. Corbin, judge and politician (born 1938)
Jimbo Elrod, football player (born 1954)
Shirley Hazzard, Australian-born author (born 1931)
Jim Lowe, singer and songwriter (born 1923)
Konrad Reuland, football player (born 1987)
Esther Wilkins, dentist (born 1916)
December 13
Lawrence Colburn, U.S. Army soldier (born 1949)
Roy Harrover, architect (born 1928)
Ralph Raico, historian (born 1936)
Thomas Schelling, economist (born 1921)
Alan Thicke, Canadian actor, songwriter, comedian, game and talk show host (b. 1947)
December 14
Bernard Fox, Welsh-born actor (born 1927)
Garrett K. Gomez, jockey (born 1972)
Karel Husa, Czech-born composer and conductor (born 1921)
December 15
Chuck Allen, football player (born 1939)
Howard Bingham, photographer (born 1939)
Fran Jeffries, actress and singer (born 1937)
Craig Sager, sportscaster (born 1951)
December 17
Benjamin A. Gilman, politician (born 1922)
William T. "Bill" Hanna, politician (born 1930)
Louis Harris, journalist, author, and opinion polling entrepreneur (born 1921)
Henry Heimlich, thoracic surgeon (born 1920)
William H. Hudnut III, politician (born 1932)
December 18
Brendan J. Dugan, banker and college administrator (born 1947)
Zsa Zsa Gabor, Hungarian-born actress and socialite (born 1917)
Sonny Moran, basketball coach (born 1926)
December 19
Phil Gagliano, baseball player (born 1941)
Dick Latessa, actor (born 1929)
December 20
Lawrence Borst, veterinarian and politician (born 1927)
Robert Eddins, football player (born 1988)
Toby Hemenway, educator and author (born 1952)
December 21
Sidney Drell, physicist (born 1926)
Weston Noble, music conductor and educator (born 1922)
December 22
Andre Martel, businessman and politician (born 1946)
Kenneth Snelson, sculptor and photographer (born 1927)
Lillian Walker, politician (born 1923)
December 23
Joyce Appleby, historian (born 1929)
Willa Kim, costume designer (born 1917)
Jim Lehew, baseball player (born 1937)
December 24
John Barfield, baseball player (born 1964)
Joseph Fitzmyer, Roman Catholic priest and biblical scholar (born 1920)
Edwin Reinecke, politician (born 1924)
Bronson Thayer, banker (born 1939)
December 25
Alphonse Mouzon, jazz drummer (born 1948)
Vera Rubin, astronomer (born 1928)
December 26
John J. Benoit, law enforcement officer and politician (born 1951)
Duck Edwing, cartoonist (born 1934)
Frances Gabe, inventor and centenarian (b. 1915)
Ricky Harris, comedian, actor, and film producer (born 1965)
George S. Irving, actor (born 1922)
Seth J. McKee, U.S. Air Force general (born 1916)
December 27
Chrissy Adams, attorney (born 1967)
Bruce DeHaven, football coach (born 1948)
Carrie Fisher, actress and writer (born 1956)
George A. Russell, university president (born 1921)
Barbara Tarbuck, actress (born 1942)
December 28
Bruce D. Porter, Mormon missionary and elder (born 1952)
Debbie Reynolds, actress, singer and dancer (born 1932)
Bernard Zaslav, classical violist (born 1926)
December 29
Chris Cannizzaro, baseball player (born 1938)
Laurie Carlos, playwright, theatre director, and performance artist (born 1949)
Keion Carpenter, football player (born 1977)
Arthur H. Cash, historian and biographer (born 1922)
LaVell Edwards, football coach (born 1930)
Balozi Harvey, community activist (born 1940)
December 30
Cara Rafaela, thoroughbred racehorse (born 1993)
Sutter Brown, Pembroke Welsh corgi (born 2003)
Rich Conaty, radio personality (born 1954)
Glen L. Rudd, Mormon missionary and elder (born 1918)
Huston Smith, religious scholar and philosopher (born 1919)
Matt Snorton, football player (born 1942)
Tyrus Wong, Chinese-born artist (born 1910)
December 31
William Christopher, actor (born 1932)
David Meltzer, poet and musician (born 1937)
See also
2016 in American music
2016 in American soccer
2016 in American television
List of American films of 2016
Timeline of United States history (2010–present)
References
External links
2010s in the United States
Years of the 21st century in the United States
United States
United States |
4168072 | https://en.wikipedia.org/wiki/Information%20ethics | Information ethics | Information ethics has been defined as "the branch of ethics that focuses on the relationship between the creation, organization, dissemination, and use of information, and the ethical standards and moral codes governing human conduct in society". It examines the morality that comes from information as a resource, a product, or as a target. It provides a critical framework for considering moral issues concerning informational privacy, moral agency (e.g. whether artificial agents may be moral), new environmental issues (especially how agents should behave in the infosphere), problems arising from the life-cycle (creation, collection, recording, distribution, processing, etc.) of information (especially ownership and copyright, digital divide, and digital rights). It is very vital to understand that librarians, archivists, information professionals among others, really understand the importance of knowing how to disseminate proper information as well as being responsible with their actions when addressing information.
Information ethics has evolved to relate to a range of fields such as computer ethics, medical ethics, journalism and the philosophy of information.
History
The term information ethics was first coined by Robert Hauptman and used in the book Ethical Challenges in Librarianship.
The field of information ethics has a relatively short but progressive history having been recognized in the United States for nearly 20 years. The origins of the field are in librarianship though it has now expanded to the consideration of ethical issues in other domains including computer science, the internet, media, journalism, management information systems, and business.
Evidence of scholarly work on this subject can be traced to the 1980s, when an article authored by Barbara J. Kostrewski and Charles Oppenheim and published in the Journal of Information Science, discussed issues relating to the field including confidentiality, information biases, and quality control. Another scholar, Robert Hauptman, has also written extensively about information ethics in the library field and founded the Journal of Information Ethics in 1992.
One of the first schools to introduce an Information Ethics course was the University of Pittsburgh in 1990. The course was a master's level course on the concept of Information Ethics. Soon after, Kent State University also introduced a master's level course called "Ethical Concerns For Library and Information Professionals." Eventually, the term "Information Ethics" became more associated with the computer science and information technology disciplines in university. Still however, it is uncommon for universities to devote entire courses to the subject. Due to the nature of technology, the concept of information ethics has spread to other realms in the industry. Thus, concepts such as "cyberethics," a concept which discusses topics such as the ethics of artificial intelligence and its ability to reason, and media ethics which applies to concepts such as lies, censorship, and violence in the press. Therefore, due to the advent of the internet, the concept of information ethics has been spread to other fields other than librarianship now that information has become so readily available. Information has become more relevant now than ever now that the credibility of information online is more blurry than print articles due to the ease of publishing online articles. All of these different concepts have been embraced by the International Center for Information Ethics (ICIE), established by Rafael Capurro in 1999.
Dilemmas regarding the life of information are becoming increasingly important in a society that is defined as "the information society". The explosion of so much technology has brought information ethics to a forefront in ethical considerations. Information transmission and literacy are essential concerns in establishing an ethical foundation that promotes fair, equitable, and responsible practices. Information ethics broadly examines issues related to ownership, access, privacy, security, and community. It is also concerned with relational issues such as "the relationship between information and the good of society, the relationship between information providers and the consumers of information".
Information technology affects common issues such as copyright protection, intellectual freedom, accountability, privacy, and security. Many of these issues are difficult or impossible to resolve due to fundamental tensions between Western moral philosophies (based on rules, democracy, individual rights, and personal freedoms) and the traditional Eastern cultures (based on relationships, hierarchy, collective responsibilities, and social harmony). The multi-faceted dispute between Google and the government of the People's Republic of China reflects some of these fundamental tensions.
Professional codes offer a basis for making ethical decisions and applying ethical solutions to situations involving information provision and use which reflect an organization's commitment to responsible information service. Evolving information formats and needs require continual reconsideration of ethical principles and how these codes are applied. Considerations regarding information ethics influence "personal decisions, professional practice, and public policy". Therefore, ethical analysis must provide a framework to take into consideration "many, diverse domains" (ibid.) regarding how information is distributed.
Censorship
Censorship is an issue commonly involved in the discussion of information ethics because it describes the inability to access or express opinions or information based on the belief it is bad for others to view this opinion or information. Sources that are commonly censored include books, articles, speeches, art work, data, music and photos. Censorship can be perceived both as ethical and non-ethical in the field of information ethics.
Those who believe censorship is ethical say the practice prevents readers from being exposed to offensive and objectionable material. Topics such as sexism, racism, homophobia, and anti-semitism are present in public works and are widely seen as unethical in the public eye. There is concern regarding the exposure of these topics to the world, especially the young generation. The Australian Library Journal states proponents for censorship in libraries, the practice of librarians deciphering which books/ resources to keep in their libraries, argue the act of censorship is an ethical way to provide information to the public that is considered morally sound, allowing positive ethics instead of negative ethics to be dispersed. According to the same journal, librarians have an "ethical duty" to protect the minds, particularly young people, of those who read their books through the lens of censorship to prevent the readers from adopting the unethical ideas and behaviors portrayed in the books.
However, others in the field of information ethics argue the practice of censorship is unethical because it fails to provide all available information to the community of readers. British philosopher John Stuart Mill argued censorship is unethical because it goes directly against the moral concept of utilitarianism. Mill believes humans are unable to have true beliefs when information is withheld from the population via censorship and acquiring true beliefs without censorship leads to greater happiness. According to this argument, true beliefs and happiness (of which both concepts are considered ethical) cannot be obtained through the practice of censorship. Librarians and others who disperse information to the public also face the dilemma of the ethics of censorship through the argument that censorship harms students and is morally wrong because they are unable to know the full extent of knowledge available to the world. The debate of information ethics in censorship was highly contested when schools removed information about evolution from libraries and curriculums due to the topic conflicting with religious beliefs. In this case, advocates against ethics in censorship argue it is more ethical to include multiple sources information on a subject, such as creation, to allow the reader to learn and decipher their beliefs.
Ethics of downloading
Illegal downloading has also caused some ethical concerns and raised the question whether digital piracy is equivalent to stealing or not. When asked the question "Is it ethical to download copyrighted music for free?" in a survey, 44 percent of a group of primarily college-aged students responded "Yes."
Christian Barry believes that understanding illegal downloading as equivalent to common theft is problematic, because clear and morally relevant differences can be shown "between stealing someone’s handbag and illegally downloading a television series". On the other hand, he thinks consumers should try to respect intellectual property unless doing so imposes unreasonable cost on them.
In an article titled "Download This Essay: A Defence of Stealing Ebooks", Andrew Forcehimes argues that the way we think about copyrights is inconsistent, because every argument for (physical) public libraries is also an argument for illegally downloading ebooks and every argument against downloading ebooks would also be an argument against libraries. In a reply, Sadulla Karjiker argues that "economically, there is a material difference between permitting public libraries making physical books available and allowing such online distribution of ebooks." Ali Pirhayati has proposed a thought experiment to neutralize the magnitude problem (suggested by Karjiker), and justify Forcehimes’ main idea.
Security and privacy
Ethical concerns regarding international security, surveillance, and the right to privacy are on the rise. The issues of security and privacy commonly overlap in the field of information, due to the interconnectedness of online research and the development of Information Technology (IT). Some of the areas surrounding security and privacy are identity theft, online economic transfers, medical records, and state security. Companies, organizations, and institutions use databases to store, organize, and distribute user's information—with or without their knowledge.
Individuals are far more likely to part with personal information when it seems that they will have some sort of control over the use of the information or if the information is given to an entity that they already have an established relationship with. In these specific circumstances, subjects will be much inclined to believe that their information has been collected for pure collection's sake. An entity may also be offering goods or services in exchange for the client's personal information. This type of collection method may seem valuable to a user due to the fact that the transaction appears to be free in the monetary sense. This forms a type of social contract between the entity offering the goods or services and the client. The client may continue to uphold their side of the contract as long as the company continues to provide them with a good or service that they deem worthy. The concept of procedural fairness indicates an individual's perception of fairness in a given scenario. Circumstances that contribute to procedural fairness are providing the customer with the ability to voice their concerns or input, and control over the outcome of the contract. Best practice for any company collecting information from customers is to consider procedural fairness. This concept is a key proponent of ethical consumer marketing and is the basis of United States Privacy Laws, the European Union's privacy directive from 1995, and the Clinton Administration's June 1995 guidelines for personal information use by all National Information Infrastructure participants. An individual being allowed to remove their name from a mailing list is considered a best information collecting practice. In a few Equifax surveys conducted in the years 1994–1996, it was found that a substantial amount of the American public was concerned about business practices using private consumer information, and that is causes more harm than good. Throughout the course of a customer-company relationship, the company can likely accumulate a plethora of information from its customer. With data processing technology flourishing, it allows for the company to make specific marketing campaigns for each of their individual customers. Data collection and surveillance infrastructure has allowed companies to micro-target specific groups and tailor advertisements for certain populations.
Medical records
A recent trend of medical records is to digitize them. The sensitive information secured within medical records makes security measures vitally important. The ethical concern of medical record security is great within the context of emergency wards, where any patient records can be accessed at all times. Within an emergency ward, patient medical records need to be available for quick access; however, this means that all medical records can be accessed at any moment within emergency wards with or without the patient present.
Ironically, the donation of one's body organs "to science" is easier in most western jurisdictions than donating one's medical records for research.
International security
Warfare has also changed the security of countries within the 21st Century. After the events of 9-11 and other terrorism attacks on civilians, surveillance by states raises ethical concerns of the individual privacy of citizens. The USA PATRIOT Act 2001 is a prime example of such concerns. Many other countries, especially European nations within the current climate of terrorism, is looking for a balancing between stricter security and surveillance, and not committing the same ethical concerns associated with the USA Patriot Act. International security is moving to towards the trends of cybersecurity and unmanned systems, which involve the military application of IT. Ethical concerns of political entities regarding information warfare include the unpredictability of response, difficulty differentiating civilian and military targets, and conflict between state and non-state actors.
Journals
The main, peer-reviewed, academic journals reporting on information ethics are the Journal of the Association for Information Systems, the flagship publication of the Association for Information Systems, and Ethics and Information Technology, published by Springer.
Branches
Bioinformatics
Business ethics
Computer ethics
Cyberethics
Information ecology
Library Bill of Rights
Media ethics
Notes
Further reading
Floridi, Luciano (2013). The Ethics of Information. Oxford: Oxford University Press.
Froehlich, Thomas (2017). "A Not-So-Brief Account of Current Information Ethics: The Ethics of Ignorance, Missing Information, Misinformation, Disinformation and Other Forms of Deception or Incompetence". BiD: textos universitaris de biblioteconomia i documentacio. Num. 39.
Himma, Kenneth E.; and Tavani, Herman T. (eds.) (2008). The Handbook of Information and Computer Ethics, New Jersey: John Wiley and Sons, Inc..
Moore, Adam D. ed (2005). "Information Ethics: Privacy, Property, and Power", University of Washington Press.
Spinello, Richard A.; and Herman T. Tavani (eds.) (2004). Readings in Cyberethics, second ed. Mass.: Jones and Bartlett Publishers.
Tavani, Herman T. (2004). Ethics & Technology: Ethical Issues in an Age of Information and Communication Technology. New Jersey: John Wiley and Sons, Inc..
External links
IRIE, The International Review of Information Ethics
Computer Professionals for Social Responsibility
IEG, the Information Ethics research Group at Oxford University
Information Ethicist
International Center for Information Ethics
Computing and society
Ethics of science and technology
Information science
Information technology |
1829742 | https://en.wikipedia.org/wiki/Gerald%20Weinberg | Gerald Weinberg | Gerald Marvin Weinberg (October 27, 1933 – August 7, 2018) was an American computer scientist, author and teacher of the psychology and anthropology of computer software development. His most well-known books are The Psychology of Computer Programming and Introduction to General Systems Thinking.
Biography
Gerald Weinberg was born and raised in Chicago. He attended Omaha Central High School in Omaha, Nebraska. In 1963 he received a PhD in Communication Sciences from the University of Michigan.
Weinberg started working in the computing business at IBM in 1956 at the Federal Systems Division Washington, where he participated as Manager of Operating Systems Development in the Project Mercury (1959–1963), which aimed to put a human in orbit around the Earth. In 1960 he published one of his first papers. Since 1969 was consultant and Principal at Weinberg & Weinberg. Here he conducted workshops such as the AYE Conference, The Problem Solving Leadership workshop since 1974, and workshops about the Fieldstone Method. Further Weinberg was an author at Dorset House Publishing since 1970, consultant at Microsoft since 1988, and moderator at the Shape Forum since 1993.
Weinberg was a visiting professor at the University of Nebraska-Lincoln, Binghamton University, and Columbia University. He was a member of the Society for General Systems Research since the late 1950s. He was also a Founding Member of the IEEE Transactions on Software Engineering, a member of the Southwest Writers and the Oregon Writers Network, and a Keynote Speaker on many software development conferences.
In 1993 he was the Winner of The J.-D. Warnier Prize for Excellence in Information Sciences, the 2000 Winner of The Stevens Award for Contributions to Software Engineering, the 2010 Software Test Professionals first annual Luminary Award and the European Testing Excellence Award at the EuroSTAR Conference in 2013.
Weinberg died on August 7, 2018.
Work
His most well-known books are The Psychology of Computer Programming and Introduction to General Systems Thinking, both of which are considered to be classics, having been re-issued by the publisher in "Silver Editions". He also shared his use of his personal form of the Zettelkasten approach to collecting ideas for writing in the book Weinberg on Writing: The Fieldstone Method.
Weinberg is well known for an engaging style of writing that calls upon his own humorous aphorisms, such as his Law of Twins, which states that most of the time, no matter how much effort one expends, no event of any great significance will result. He described it in his book The Secrets of Consulting (1985), in which he explains the origin of its name. He reported that, while riding a bus in New York City, he observed a mother with eight small children embark. She asked the driver the amount of the fare; he told her that the cost was thirty-five cents, but that children under the age of five could ride for free. When the woman deposited only thirty-five cents into the payment slot, the driver was incredulous. "Do you mean to tell me that all your children are under five years old?" The woman explained that she had four sets of twins. The driver replied, "Do you always have twins?" "No," said the woman, "most of the time we don't have any."
In recent years, Weinberg was involved with the SHAPE Forum (Software as a Human Activity Performed Effectively) and working with the AYE Conference. Weinberg's life and work were honored in November 2008 with the publication of The Gift of Time, a collection of essays by a few of his students, colleagues, and friends, describing lessons learned from Weinberg and incorporated in their own consulting and managerial work.
Weinberg has also written and published a number of novels.
Publications
Weinberg has published more than 40 books and more than 400 articles. A selection:
1971. The Psychology of Computer Programming. Silver Anniversary Edition (1998).
1975. An Introduction to General Systems Thinking. Silver Anniversary Edition (2001).
1982. Are Your Lights On?: How to Figure Out what the Problem Really is. With Donald C. Gause.
1986. Becoming a Technical Leader: An Organic Problem-Solving Approach.
1986. Secrets of Consulting: A Guide to Giving and Getting Advice Successfully.
1988. General Principles of Systems Design. With Daniela Weinberg.
1992. Quality Software Management: Anticipating Change. Vol. 1: Systems Thinking.
2002. More Secrets of Consulting: The Consultant's Tool Kit.
2005. Weinberg on Writing: The Fieldstone Method.
2008. Perfect Software: And Other Illusions about Testing.
2010. Freshman Murders.
See also
Egoless programming
Prefactoring
References
External links
Jerry Weinberg's blog
1933 births
2018 deaths
American computer scientists
American systems scientists
Software engineering researchers
University of Michigan alumni
Omaha Central High School alumni
Scientists from Chicago |
47595561 | https://en.wikipedia.org/wiki/Politics%20and%20technology | Politics and technology | Politics and technology encompasses concepts, mechanisms, personalities, efforts, and social movements that include, but are not necessarily limited to, the Internet and other information and communication technologies (ICTs). Scholars have begun to explore how internet technologies influence political communication and participation, especially in terms of what is known as the public sphere.
The smartphone is a transformational communication technology that has features that include talk, text messaging, Internet access, electronic mail, faxing, pictures, video, and a wide variety of applications. Mobile devices are one of the important reasons for the rise of political participation and are now portrayed as a voting agent in the least developed countries. Increased availability of mobile phones, and subsequent access to the public sphere, has enhanced individuals' and groups' ability to bring attention to and organize around specialized issues.
More recently, social media has emerged as one of the main platforms for politics. Millions of users can learn about politicians' policies and statements, interact with political leaders, organize, and voice their own opinions on political matters. Political campaigns are also using social media sites to reach voters using political advertising.
There are also a wide variety of online tools that are meant to promote political participation and combat the spread of misinformation. A comparison of civic technology platforms can be useful in differentiating the different services offered by each platform.
The digital public sphere
The idea of the public sphere has generally come to be understood as the open social spaces and public spaces in which private citizens interact and share information and ideas relevant to the society. These can include, for example, town halls, public squares, markets, coffee shops, or what ancient Greeks called agoras. Scholars have argued that these spaces are vitally important for creating and maintaining an active and informed public in a democratic society.
In Jürgen Habermas' book The Structural Transformation of the Public Sphere – An Inquiry into a Category of Bourgeois Society, he defines the public sphere as "a realm of social life in which public opinion can be formed." In principle, the public sphere should be open to all citizens, and free from influence from governments or private businesses. Habermas goes on to argue that:
"A portion of the public sphere is constituted in every conversation in which private persons come together to form a public. They are then acting neither as business or professional people conducting their private affairs, nor as legal consociates subject to the legal regulations of a state bureaucracy and obligated to obedience. Citizens act as a public when they deal with matters of general interest without being subject to coercion; thus with the guarantee that they may assemble and unite freely, and express and publicize their opinions freely."
Howard Rheingold states that, "There is an intimate connection between informal conversations, the kind that take place in communities... and the ability of large social groups to govern themselves without monarchs or dictators." Rheingold and others have gone on to argue that virtual spaces created through the Internet and related information and communications technologies have led to the emergence of a new type of digital public sphere. Some scholars have conceptualized this alternately as a virtual public sphere or a networked public sphere, while still others have similarly described what they call a networked society or networked publics. Essentially, these new virtual spaces can be used in much the same way as traditional, offline spaces: that is, as a "free space" to discuss and debate ideas of public importance. Just as the public sphere is a combination of "every conversation in which private persons come together to form a public", the digital public sphere also comprises all forms of new media—such as chat rooms, website comment sections, and social media—in which private citizens engage in discourse as a public. Virtual spaces may overlap or interact with offline spaces as well, forming what has been called "hybrid networks".
Scholars argue that social media affords increasing opportunities for political discourse and mobilization within the digital public sphere. Research has shown that increased use of social media correlates with increases in certain types of political engagement and participation. Rabia Karakaya Polat, a politics and technology scholar, finds that the Internet leads to a more informed and better society. The Internet enables information to be dispersed at an increased rate, compared to traditional means, at little cost. For most users, the amount of information can be helpful to understand various political atmospheres but can also overwhelm users. The digital public sphere thus has the potential to enliven democratic culture and enhance the ability of citizens to challenge the political and economic power of governments and corporations, such as through online protests, activism campaigns, and social movements. Other scholars have highlighted, alongside economic globalization, the role of Internet technologies in reaching across national borders to contribute to a growing transnational public sphere.
Criticisms
Social exclusion
The traditional, offline public sphere has been criticized for not being as inclusive in practice as it is in theory. For example, Feminist scholars like Nancy Fraser have argued that the public sphere has historically not been as open or accessible to disadvantaged or marginalized groups in a society, such as women or people of color; therefore, such groups are forced to form their own separate public spheres, which she refers to as a counter-public or subaltern counter public (see ).
Some scholars contend that online spaces are more open and thus may help to increase inclusive political participation from marginalized groups. In particular, anonymous online spaces should allow all individuals to speak with an equal voice to others. However, others have pointed out that many contemporary online spaces are not anonymous, such as Facebook. Avatars and social media profiles often portray an individual's offline identity, which can lead to practices of online discrimination and exclusion which mirror offline inequalities. Now, more and more historically disadvantaged or marginalized groups are also using Internet technology to carve out new online spaces for their own "networked counterpublics", such as through the use of hashtags like #Ferguson and #BlackLivesMatter.
Another example of social exclusion happens when users homogenize their information by finding information that reinforces their own opinions or websites that have the most content or are promoted consistently. This can lead users to ignore sites that are less frequently promoted. Evidence of this was discovered by Steven M. Schneider, who found that although participation was overwhelmingly large on internet chat rooms discussing politics of abortion, the chat log was influenced and controlled by users that contributed the most content, with those who responded less frequently typically agreeing or adjusting their opinions based on the users who contributed more.
The digital divide
Another factor that affects access to the digital public sphere is the digital divide, which refers to how people from less developed countries tend to have less access to information and communications technologies compared to those from more developed countries. For example, the most developed regions of the world, such as North America and Western Europe, have the highest Internet penetration rates at over 80% each, while the least developed countries such as in Africa and South Asia have less than 30% each. On the other hand, the reduced cost and increasing availability of mobile devices such as smartphones throughout less developed regions is helping to reduce this disparity at an exponential rate. In just two years, between 2013 and 2015, the number of Internet users in developing nations has risen by 9%, according to the Pew Research Center. Other research has shown, though, that even within more developed countries like the United States, the digital divide continues to persist between upper and lower socioeconomic classes and between different education levels. Furthermore, scholars like Mark Warschauer argue that it is not just access to technology that matters, but the knowledge of how to put that technology to use in meaningful ways.
Use of Bots and Sock Puppets
Internet bots, also known as web robots, robots or simply bots, are software applications that run automated tasks (scripts) over the Internet. Typically, bots perform tasks that are both simple and repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyzes, and files information from web servers at many times the speed of a human. More than half of all web traffic is generated by bots. Software can detect and confirm the presence of bots through qualitative coding. An example would be the Bot-a-meter, developed by Indiana University, which evaluates 7 different factors to determine whether or not a request is generated by a bot.
A Sock Puppet is an online identity used for purposes of deception. The term originally referred to a false identity assumed by a member of an Internet community who is pretending to be another person. The term has come to designate other misleading uses of online identities, such as those created to praise, defend or support a person or organization, to manipulate public opinion, to skew online voting results, or to evade blocks. There is significant evidence to indicate that the Internet Research Agency, a group of professional Russian trolls, created fake accounts on major networking sites and online newspapers, to promote specific Ukrainian, Middle Eastern, and American political issues, even advocating for Trump as early as December 2015.
Ease of manipulation
Citizens involved in politics have experienced a sense of security while engaged in physically attending a polling place or submitting their vote through mail. Such experiences now have digital counterparts. In areas such as the United States, online voting has been developing in the form of smartphone applications or secure websites. Online voting allows more citizens to exercise their right to vote by breaking down the physical barriers that may keep a voter away from the polls.
As an unwanted result, online voting is easier to manipulate. Social media apps such as Instagram or Facebook have taken the initiative to get people registered and motivated to go and vote. Despite their efforts, there are social media accounts engineered to misinform the public, causing a jaded perspective toward electable candidates or understanding policies.
Another way users are manipulated is by directly interfering with the vote. In the 2016 U.S. election, J. Alex Halderman, a computer scientist and director of computer security at the University of Michigan, advocated for the Clinton campaign to request a recount in the states of Wisconsin, Michigan, and Pennsylvania, which were thought to be lost by her through the computer manipulation of voting machines.
In the 2020 Iowa caucuses, the Iowa Democratic Party used a new mobile app to count and transmit primary election results live in real-time. Official users of the application suffered from reporting issues, leading to incomplete data, and a bottleneck during transmission. Since the 2020 Iowa caucuses, other state's Democratic parties have declined to use the Shadow Inc. application for their state's primaries. Marian Schneider, the president of Verified Voting, released a statement that says,
"The situation with Iowa's caucus reveals the risks associated with technology, in this case with a mobile app, but more importantly that there needs to be a low-tech solution in order to recover from technological failures -- no matter the cause, There needs to be a way to monitor, detect, respond and recover. It's clear that mobile apps are not ready for prime time, but thankfully Iowa has paper records of their vote totals and will be able to release results from those records."
Social Media as a channel of distribution
Studies show that social media allows politicians to easily engage with the general public without the use of mainstream media. This allows them to express and present themselves however they deem fit, without a filter or fact checking. This is evident from recent US presidential campaigns, where voters were able to connect with Trump, not only as a politician but as a person. Studies show, "The fact that Trump delegated much [less] social media work to professionals than either of the Obama campaigns and the 2016 Clinton campaign meant that his candidate image on social media was much closer to his self-presentation. To a degree, Trump therefore came across as more consistent an authentic compared to Clinton, [an] image that was strengthened by his position as a newcomer in politics."
Digital technology is shaping the new age of electoral politics, rather than "breaking" it; and it is creating a more transparent view and perspective of electoral politics for the voter. Digital technology allows people to publish information that could be faulty and unreliable but could be taken seriously and shift political opinion, thus possibly leading to an unfit politician being elected to office. Furthermore, digital technology can also be used to exploit the lack of quality journalism, as it can be used for political manipulation through the use of "trolls and bots, disguised as ordinary citizens, [have become] a weapon of choice for governments and political leaders to shape online conversations. Governments in Turkey, China, Israel, Russia and the United Kingdom are known to have deployed thousands of hired social media operatives who run multiple accounts to shift or control public opinion." These political manipulation may also come in another form, in which they are facilitated by said platforms due to financial support from advertisers, this can create false or targeted advertising campaigns that aim to manipulate voter thinking. These tactics may be used by officials up for election to boost campaign support, or by an outside actor such as a foreign government supporting a politician or a party that would benefit them internationally, therefore directly manipulating political thought within a society.
Leapfrog democracies
'Leapfrogging' originally denoted those societies that—through possibly radical, but even small and incremental, innovation—experience enormous development in the fields of industrial organization and economic growth and "leapfrog" once dominant rivals. It was a term first used at the Personal Democracy Forum in 2014. The term can be applied to a country's governmental institutions, the country thus becoming a "leapfrog democracy".
Tunisia
An example of this is the new Tunisian constitution. Learning from America and other countries, Tunisia developed a constitution that provides more rights than typical constitutions with regard to issues concerning climate change, healthcare, women's rights, and workers' rights. They have provided rights that the United States' government does not guarantee its citizens. Tunisia has set the stage for many other countries to follow in their footsteps, including Egypt, Libya, Yemen, and Syria. Although these countries' attempts at democratic government have not been nearly as successful as Tunisia's.
Estonia
Another example of a leapfrog democracy is Estonia, which became one of the first countries to employ online voting. Nearly 99% of their public services are available online, and a reported 44% of Estonia citizens use them. Electronic voting in Estonia has been in place since 2005, and a citizen can cast their vote through an app on their mobile device. Through Estonia's national ID infrastructure, National ID cards have the ability to perform cryptographic functions to authenticate citizens' access to different websites and place legally binding signatures on documents, if needed. These cards work through the use of two different RSA key pairs. However, there are still some drawbacks to this voting process, as there are inadequate procedural controls that are inexplicably changed or are not followed, lax operational security, and insufficient transparency. These weaknesses can allow for client-side attacks on the voting system.
Additionally, in 2014, Estonia became the first country to introduce an e-Residency program, with the intention of “[creating] a worldwide virtual business environment, where people from both the developed and developing countries can easily become entrepreneurs and start doing business anywhere in the world.” This program allows individuals from across the globe to digitally apply for Estonian citizenship by simply filling out an online application form and passing a background check.
Presence of online tools for political participation
With the increasing use of technology in the political sphere, many new platforms and apps have emerged in an attempt to provide unbiased information to the general public in a manner that is accessible to all. Many of these apps hope to be able to spread this information so that voters may be more informed about politics and make more of an informed decisions when voting. Some examples are Liquid.us, Countable, Capitol Bells, Fiscalnote, and Councilmatic. Technology is progressing rapidly to making a significant impact on future campaigns. A comparison of civic technology platforms highlights the similarities and differences between different online tools used for political participation.
iSideWith
iSideWith is an application that seeks to provide voters with an educated guess of who they would politically side with. They have an in-depth survey on their website that asks about the users' political opinion on common issues currently discussed within the government, to give the voter a ranking of which politician best aligns with their political stance. The more time the voters spend filling out the survey, the more accurate the results will align with their political stance. The application is available in multiple countries, such as the United States, Canada, India, Brazil, Japan, the United Arab Emirates, and Indonesia.
Change.org
Change.org is a website that allows people to take a stance on something they agree or disagree with and actually petition for others to rally behind their cause. People can search for existing petitions concerning a cause that they feel strongly about, or they have the option of starting their own. The website displays past successful petitions that have made an impact. The petition does not necessarily have to be related to politics. There are many surveys that could be targeting different issues within their neighborhood but can range up to a social issue that they believe the whole world should be aware about.
D21
D21 is a platform that allows people to participate in voting on issues through a form of "modern democracy". It is also known as the D21 – Janeček method, which allows people to cast both a negative and a positive vote. D21 wishes to accurately inform users about different issues happening within their community and provide them with a platform for voicing their opinions. The platform is used mainly in the Czech Republic to target corruption within the Czech government. Though it has not yet been used in any general elections, D21 – Janeček method has been used in several participatory budgeting programs around the world, including New York City, in the United States. The Czech government introduced the game Prezident 21, which is an interactive website created to aid people in familiarizing themselves with the D21 system.
Verified Voting
Verified Voting is a website that uses its online presence to discourage the movement of voting towards a more digital age. In a section about Internet Voting, they speak about the dangers and information leaks that come with using the Internet, or anything digital, to cast votes, even with blockchain. Verified Voting defines Internet voting to include email, fax voting, or any voting through an online portal. This is due to the fact that any form of electronic voting can leave the vote susceptible to a large number of security threats, including cyber-attacks that can skew voting results. According to NIST, it is difficult to make sure that votes are coming from verified and registered voters and have not been changed in transit. This is difficult to verify over the Internet and thus makes casting votes in person and through paper ballots more effective and safe, even with the flaws of that process. Verified Voting has a "verifier" visualizer to provide detail on election equipment used by localities in all the states.
Blockchain voting platforms
Blockchain voting is the concept of traditional paper voting becoming digitized through a voting-token format where voting information is decentralized and data is easily accounted for. With the rise of technology in the current political environment, blockchain voting, to combat voter fraud and increase democratic participation, has become an increasingly discussed topic. Blockchain voting is a digital ledger, which relies on a network of nodes that encrypt and protect information from being corrupted by a single party. Platforms in the blockchain voting market aim to increase efficiency and transparency in voting systems where casting and counting votes are simplified and verifiable. Some example platforms include Democracy Earth, Polyas, Votem, Boulé, and Horizon State.
Democracy Earth
Democracy Earth is a nonprofit startup with the goal of improving voting systems by utilizing the blockchain. Founded by Santiago Siri, whose vision is to create "political cryptocurrency" by utilizing blockchain-generated tokens from Democracy Earth's processes, with which users cast their votes. With blockchain voting technology, the need for a centralized government authority is removed, along with possible bias, censorship, or corruption affecting the voting and tabulation process. When faced with criticisms and concerns about the financial aspects of the vote token, Siri explains that Democracy Earth plans to mint a maximum of 500 million tokens, each priced at 12 cents, therefore spawning a $60 million market. Current plans within Democracy Earth call for employees to be compensated in the form of these vote tokens.
Polyas
Polyas was established in 1996 with its technology being used to organize the first online election in Finland, involving 30,000 votes and 3 languages. Started by Wolfgang Jung, the company and its software was eventually passed on to a company called Micromata, which created a new spin-off corporation in 2012 called POLYAS GmbH. Polyas uses private, local blockchains to run its voting procedures, which differs from the general decentralized blockchains. The current services Polyas provide are online voting, on-site live voting, and resolution and amendment voting to customers that range from youth parliaments to corporations. Currently, the company is looking to optimize its "universal verifiability" feature through the reduction of slow communication times while ensuring ballots are counted accurately.
Votem
Votem is a mobile voting platform that was created in 2014 by Pete Martin with a goal of having 1 billion voters on their platform by 2025. Through blockchain technology, Votem offers a variety of services such as online voter registration, accessible voting for those with disabilities, and electronic ballot marking. In August 2017, Votem had been inducted into the U.S Election Assistance Commission's voting systems testing and certification program. With partnerships including the Blockchain Research Institute and the National Association of the Secretary of State, Votem looks to target a range of elections, ranging from small, private elections to government elections.
Boulé
Boulé was founded in 2017 and is a blockchain voting system that focuses on campaign integrity through security and transparency. Boulé is powered through the blockchain platform of Ethereum, the second-largest cryptocurrency by market capitalization. Boulé has its own form of voting currency, referred to as Boulé tokens (BOU), and launched a pre-sale in August 2017 that was distributed until hitting a ceiling of 10,000. Boulé specializes in using biometric facial recognition, alongside other mobile identification methods, and encryption to identify and provide voter anonymity.
Horizon State
Horizon State, led by CEO Tim Goggin, offers two main products, one being a "tamper-resistant digital ballot box" and the second being an engagement platform for users in voting processes. Horizon State utilizes preferential voting and weighted voting systems to manage candidate selection. Horizon State currently serves a few customer groups, including governments, councils, unions, political parties, corporations, and broadcasters. The company was named a "Technology Pioneer" by the World Economic Forum as well as being a finalist in Blockchain Australia's Government Project of the Year.
GovTech and Politics
GovTech denotes the concept of utilizing technologies such as blockchain and artificial intelligence to increase accessibility to and efficiency in government and public policy. GovTech is an growing industry around the world, with an estimated worth of $400 billion in total market value. Different subcategories of GovTech exist: for example, LegisTech, which regards legislative innovation to enhance cooperation between citizens, public servants, and corporations. The growth in the GovTech industry has spurred innovation within the private sector; however, there is also a rising number of concerns surrounding private corporations providing software for government use.
LabHacker
An example of LegisTech is LabHacker, which is a laboratory that uses data analysis to track hotly debated topics in the Brazilian parliament and publicly presents the data to keep citizens and other government officials informed. It is an initiative directed by Walternor Brandão under the auspices of the Brazilian Chamber of Deputies. LabHacker embraces 5 main "pillars" or ideals: participation, transparency, experimentation, collaboration, and inspiration.
See also
:Category:Regulation of technologies
Cultural lag
Digital rights
E-democracy
E-government
Electronic voting
Hashtag activism
Internet activism
Internet censorship
Media activism
Neo-Luddism
Netizen
Online deliberation
Public hypersphere
Technocracy
Technology policy
Comparison of civic technology platforms
References
Technology
Technology in society |
19902679 | https://en.wikipedia.org/wiki/Eugene%20Goostman | Eugene Goostman | Eugene Goostman is a chatbot that some regard as having passed the Turing test, a test of a computer's ability to communicate indistinguishably from a human. Developed in Saint Petersburg in 2001 by a group of three programmers, the Russian-born Vladimir Veselov, Ukrainian-born Eugene Demchenko, and Russian-born Sergey Ulasen, Goostman is portrayed as a 13-year-old Ukrainian boy—characteristics that are intended to induce forgiveness in those with whom it interacts for its grammatical errors and lack of general knowledge.
The Goostman bot has competed in a number of Turing test contests since its creation, and finished second in the 2005 and 2008 Loebner Prize contest. In June 2012, at an event marking what would have been the 100th birthday of the test's author, Alan Turing, Goostman won a competition promoted as the largest-ever Turing test contest, in which it successfully convinced 29% of its judges that it was human.
On 7 June 2014, at a contest marking the 60th anniversary of Turing's death, 33% of the event's judges thought that Goostman was human; the event's organiser Kevin Warwick considered it to have passed Turing's test as a result, per Turing's prediction in his 1950 paper Computing Machinery and Intelligence, that by the year 2000, machines would be capable of fooling 30% of human judges after five minutes of questioning. The validity and relevance of the announcement of Goostman's pass was questioned by critics, who noted the exaggeration of the achievement by Warwick, the bot's use of personality quirks and humour in an attempt to misdirect users from its non-human tendencies and lack of real intelligence, along with "passes" achieved by other chatbots at similar events.
Personality
Eugene Goostman is portrayed as being a 13-year-old boy from Odessa, Ukraine, who has a pet guinea pig and a father who is a gynaecologist. Veselov stated that Goostman was designed to be a "character with a believable personality". The choice of age was intentional, as, in Veselov's opinion, a thirteen-year-old is "not too old to know everything and not too young to know nothing". Goostman's young age also induces people who "converse" with him to forgive minor grammatical errors in his responses. In 2014, work was made on improving the bot's "dialog controller", allowing Goostman to output more human-like dialogue.
A conversation between Scott Aaronson and Eugene Goostman ran as follows:
Competitions
Eugene Goostman has competed in a number of Turing test competitions, including the Loebner Prize contest; it finished joint second in the Loebner test in 2001, and came second to Jabberwacky in 2005 and to Elbot in 2008. On 23 June 2012, Goostman won a Turing test competition at Bletchley Park in Milton Keynes, held to mark the centenary of its namesake, Alan Turing. The competition, which featured five bots, twenty-five hidden humans, and thirty judges, was considered to be the largest-ever Turing test contest by its organizers. After a series of five-minute-long text conversations, 29% of the judges were convinced that the bot was an actual human.
2014 "pass"
On 7 June 2014, in a Turing test competition at the Royal Society, organised by Kevin Warwick of the University of Reading to mark the 60th anniversary of Turing's death, Goostman won after 33% of the judges were convinced that the bot was human. 30 judges took part in the event, which included Lord Sharkey, a sponsor of Turing's posthumous pardon, artificial intelligence Professor Aaron Sloman, Fellow of the Royal Society Mark Pagel and Red Dwarf actor Robert Llewellyn. Each judge partook in a textual conversation with each of the five bots; at the same time, they also conversed with a human. In all, a total of 300 conversations were conducted. In Warwick's view, this made Goostman the first machine to pass a Turing test. In a press release, he added that:
In his 1950 paper "Computing Machinery and Intelligence", Turing predicted that by the year 2000, computer programs would be sufficiently advanced that the average interrogator would, after five minutes of questioning, "not have more than 70 per cent chance" of correctly guessing whether they were speaking to a human or a machine. Although Turing phrased this as a prediction rather than a "threshold for intelligence", commentators believe that Warwick had chosen to interpret it as meaning that if 30% of interrogators were fooled, the software had "passed the Turing test".
Reaction
Warwick's claim that Eugene Goostman was the first ever chatbot to pass a Turing test was met with scepticism; critics acknowledged similar "passes" made in the past by other chatbots under the 30% criteria, including PC Therapist in 1991 (which tricked 5 of 10 judges, 50%), and at the Techniche festival in 2011, where a modified version of Cleverbot tricked 59.3% of 1334 votes (which included the 30 judges, along with an audience). Cleverbot's developer, Rollo Carpenter, argued that Turing tests can only prove that a machine can "imitate" intelligence rather than show actual intelligence.
Gary Marcus was critical of Warwick's claims, arguing that Goostman's "success" was only the result of a "cleverly-coded piece of software", going on to say that "it's easy to see how an untrained judge might mistake wit for reality, but once you have an understanding of how this sort of system works, the constant misdirection and deflection becomes obvious, even irritating. The illusion, in other words, is fleeting." While acknowledging IBM's Deep Blue and Watson projects—single-purpose computer systems meant for playing chess and the quiz show Jeopardy! respectively—as examples of computer systems that show a degree of intelligence in their specialised field, he further argued that they were not an equivalent to a computer system that shows "broad" intelligence, and could—for example, watch a television programme and answer questions on its content. Marcus stated that "no existing combination of hardware and software can learn completely new things at will the way a clever child can." However, he still believed that there were potential uses for technology such as that of Goostman, specifically suggesting the creation of "believable", interactive video game characters.
Imperial College London professor Murray Shanahan questioned the validity and scientific basis of the test, stating that it was "completely misplaced, and it devalues real AI research. It makes it seem like science fiction AI is nearly here, when in fact it's not and it's incredibly difficult."
Mike Masnick, editor of the blog Techdirt, was also skeptical, questioning publicity blunders such as the five chatbots being referred to in press releases as "supercomputers", and saying that "creating a chatbot that can fool humans is not really the same thing as creating artificial intelligence."
See also
Natural language processing
References
External links
Eugene Goostman webpage
Chatbots
Human–computer interaction |
44502 | https://en.wikipedia.org/wiki/Allegro%20%28software%20library%29 | Allegro (software library) | Allegro is a software library for video game development. The functionality of the library includes support for basic 2D graphics, image manipulation, text output, audio output, MIDI music, input and timers, as well as additional routines for fixed-point and floating-point matrix arithmetic, Unicode strings, file system access, file manipulation, data files, and 3D graphics. The library is written in the C programming language and designed to be used with C, C++, or Objective-C, with bindings available for Python, Lua, Scheme, D, Go, Ring,and other languages. Allegro comes with extensive documentation and many examples.
Allegro supports Windows, macOS, Unix-like systems, Android, and iOS, abstracting their application programming interfaces (APIs) into one portable interface. Previous versions up to 4.4 supported Windows, macOS, DOS, BeOS, and various Unix-like systems with (or without) the X Window System. There is also an independent port of Allegro on AmigaOS 4 and MorphOS.
Released under the terms of the zlib license, Allegro is free and open source software.
History
Initially standing for Atari Low-Level Game Routines, Allegro was originally created by for the Atari ST in the early 1990s. However, Hargreaves abandoned the Atari version as he realized the platform was dying, and reimplemented his work for the Borland C++ and DJGPP compilers in 1995. Support for Borland C++ was dropped in version 2.0, and DJGPP was the only supported compiler. As DJGPP was a DOS compiler, all games which used Allegro therefore used DOS. Around 1998, Allegro branched out into several versions. A port to Windows, WinAllegro, was created, and also during this time, a Unix port of Allegro, XwinAllegro, was created. These various ports were brought together during the Allegro 3.9 WIP versions, with Allegro 4.0 being the first stable version of Allegro to support multiple platforms.
Allegro 5
Current development is focused on the Allegro 5 branch, a complete redesign of both the API and much of the library's internal operation. Effort was made to make the API more consistent and multi-thread safe. By default, the library is now hardware accelerated using OpenGL or DirectX rendering backends where appropriate. Many of the addons that existed as separate projects for Allegro 4 now interface seamlessly with Allegro proper and are bundled with the default installation. Allegro 5 is event driven.
Features
Allegro provides the following graphic functions:
Vector drawing:
pixels, lines, rectangles, triangles, circles, ellipses, arcs, Bézier curves
shape fill, with or without pattern
polygons: flat, Gouraud, textured (3D) and translucent
Sprites:
masked, compressed and compiled sprites
blitting, rotation, stretching, reduction, alpha blending, Gouraud shading
native support for BMP, LBM, PCX and TGA files (others supported with library extensions)
Color palettes:
color palette manipulation (reading, writing, conversion)
conversion of color formats RGB <-> HSV
Text:
support for different encodings and conversion, default is UTF-8
bitmap fonts (masking, colouring, alignment)
Misc:
draw directly on the screen or on any-size memory bitmaps
hardware scrolling and triple buffering (where available), mode X split screen
animation functions for FLIC format
Addons
The community of Allegro users have contributed several library extensions to handle things like scrolling tile maps and import and export of various file formats (e.g. PNG, GIF, JPEG images, MPEG video, Ogg, MP3, IT, S3M, XM music, TTF fonts, and more).
Allegro 4.x and below can be used in conjunction with OpenGL by using the library AllegroGL which extends Allegro's functionality into OpenGL and therefore the hardware. Allegro 5 natively supports OpenGL.
See also
Borland Graphics Interface (BGI)
ClanLib
DirectX
List of game engines
Microsoft XNA
OpenAL
OpenGL
OpenML
Raylib
SciTech SNAP
SDL
SFML
UniVBE
References
External links
Allegro Wiki
Games Using Allegro
Shawn Hargreaves's Homepage
AmigaOS 4 software
Application programming interfaces
C (programming language) libraries
Cross-platform software
Free game engines
Free software programmed in C
Graphics libraries
Linux APIs
MacOS APIs
MorphOS software
Software using the zlib license
Video game development software
Widget toolkits
Windows APIs |
38612235 | https://en.wikipedia.org/wiki/QUIC | QUIC | QUIC (pronounced "quick") is a general-purpose transport layer network protocol initially designed by Jim Roskind at Google, implemented, and deployed in 2012, announced publicly in 2013 as experimentation broadened, and described at an IETF meeting. QUIC is used by more than half of all connections from the Chrome web browser to Google's servers. Microsoft Edge (a derivative of Chrome) and Firefox support it. Safari implements the protocol, however it is not enabled by default.
Although its name was initially proposed as the acronym for "Quick UDP Internet Connections", IETF's use of the word QUIC is not an acronym; it is simply the name of the protocol. QUIC improves performance of connection-oriented web applications that are currently using TCP. It does this by establishing a number of multiplexed connections between two endpoints using User Datagram Protocol (UDP), and is designed to obsolete TCP at the transport layer for many applications, thus earning the protocol the occasional nickname "TCP/2".
QUIC works hand-in-hand with HTTP/2's multiplexed connections, allowing multiple streams of data to reach all the endpoints independently, and hence independent of packet losses involving other streams. In contrast, HTTP/2 hosted on Transmission Control Protocol (TCP) can suffer head-of-line-blocking delays of all multiplexed streams if any of the TCP packets are delayed or lost.
QUIC's secondary goals include reduced connection and transport latency, and bandwidth estimation in each direction to avoid congestion. It also moves congestion control algorithms into the user space at both endpoints, rather than the kernel space, which it is claimed will allow these algorithms to improve more rapidly. Additionally, the protocol can be extended with forward error correction (FEC) to further improve performance when errors are expected, and this is seen as the next step in the protocol's evolution.
In June 2015, an Internet Draft of a specification for QUIC was submitted to the IETF for standardization. A QUIC working group was established in 2016. In October 2018, the IETF's HTTP and QUIC Working Groups jointly decided to call the HTTP mapping over QUIC "HTTP/3" in advance of making it a worldwide standard. In May 2021, the IETF standardized QUIC in , supported by , and .
QUIC over UDP currently uses UDP port 443.
Background
Transmission Control Protocol, or TCP, aims to provide an interface for sending streams of data between two endpoints. Data is handed to the TCP system, which ensures the data makes it to the other end in exactly the same form, or the connection will indicate that an error condition exists.
To do this, TCP breaks up the data into network packets and adds small amounts of data to each packet. This additional data includes a sequence number that is used to detect packets that are lost or arrive out of order, and a checksum that allows the errors within packet data to be detected. When either problem occurs, TCP uses automatic repeat request (ARQ) to tell the sender to re-send the lost or damaged packet.
In most implementations, TCP will see any error on a connection as a blocking operation, stopping further transfers until the error is resolved or the connection is considered failed. If a single connection is being used to send multiple streams of data, as is the case in the HTTP/2 protocol, all of these streams are blocked although only one of them might have a problem. For instance, if a single error occurs while downloading a GIF image used for a favicon, the entire rest of the page will wait while that problem is resolved.
As the TCP system is designed to look like a "data pipe", or stream, it deliberately contains little understanding of the data it transmits. If that data has additional requirements, like encryption using TLS, this must be set up by systems running on top of TCP, using TCP to communicate with similar software on the other end of the connection. Each of these sorts of setup tasks requires its own handshake process. This often requires several round-trips of requests and responses until the connection is established. Due to the inherent latency of long-distance communications, this can add significant overhead to the overall transmission.
Characteristics
QUIC aims to be nearly equivalent to a TCP connection but with much-reduced latency. It does this primarily through two changes that rely on the understanding of the behaviour of HTTP traffic.
The first change is to greatly reduce overhead during connection setup. As most HTTP connections will demand TLS, QUIC makes the exchange of setup keys and supported protocols part of the initial handshake process. When a client opens a connection, the response packet includes the data needed for future packets to use encryption. This eliminates the need to set up the TCP connection and then negotiate the security protocol via additional packets. Other protocols can be serviced in the same way, combining together multiple steps into a single request-response. This data can then be used both for following requests in the initial setup, as well as future requests that would otherwise be negotiated as separate connections.
The second change is to use UDP rather than TCP as its basis, which does not include loss recovery. Instead, each QUIC stream is separately flow controlled and lost data retransmitted at the level of QUIC, not UDP. This means that if an error occurs in one stream, like the favicon example above, the protocol stack can continue servicing other streams independently. This can be very useful in improving performance on error-prone links, as in most cases considerable additional data may be received before TCP notices a packet is missing or broken, and all of this data is blocked or even flushed while the error is corrected. In QUIC, this data is free to be processed while the single multiplexed stream is repaired.
QUIC includes a number of other more mundane changes that also improve overall latency and throughput. For instance, the packets are encrypted individually, so that they do not result in the encrypted data waiting for partial packets. This is not generally possible under TCP, where the encryption records are in a bytestream and the protocol stack is unaware of higher-layer boundaries within this stream. These can be negotiated by the layers running on top, but QUIC aims to do all of this in a single handshake process.
Another goal of the QUIC system was to improve performance during network-switch events, like what happens when a user of a mobile device moves from a local WiFi hotspot to a mobile network. When this occurs on TCP, a lengthy process starts where every existing connection times out one-by-one and is then re-established on demand. To solve this problem, QUIC includes a connection identifier which uniquely identifies the connection to the server regardless of source. This allows the connection to be re-established simply by sending a packet, which always contains this ID, as the original connection ID will still be valid even if the user's IP address changes.
QUIC can be implemented in the application-space, as opposed to being in the operating system kernel. This generally invokes additional overhead due to context switches as data is moved between applications. However, in the case of QUIC, the protocol stack is intended to be used by a single application, with each application using QUIC having its own connections hosted on UDP. Ultimately the difference could be very small because much of the overall HTTP/2 stack is already in the applications (or their libraries, more commonly). Placing the remaining parts in those libraries, essentially the error correction, has little effect on the HTTP/2 stack's size or overall complexity.
This organization allows future changes to be made more easily as it does not require changes to the kernel for updates. One of QUIC's longer-term goals is to add new systems for forward error correction (FEC) and improved congestion control.
One concern about the move from TCP to UDP is that TCP is widely adopted and many of the "middle-boxes" in the internet infrastructure are tuned for TCP and rate-limit or even block UDP. Google carried out a number of exploratory experiments to characterize this and found that only a small number of connections were blocked in this manner. This led to the use of a rapid fallback-to-TCP system; Chromium's network stack opens both a QUIC and traditional TCP connection at the same time, which allows it to fallback with negligible latency.
Google QUIC (gQUIC)
The protocol that was created by Google and taken to the IETF under the name QUIC (already in 2012 around QUIC version 20) is quite different from the QUIC that has continued to evolve and be refined within the IETF. The original Google QUIC was designed to be a general purpose protocol, though it was initially deployed as a protocol to support HTTP(S) in Chromium. The current evolution of the IETF QUIC protocol is a general purpose transport protocol. Chromium developers continued to track the evolution of IETF QUIC's standardization efforts to adopt and fully comply with the most recent internet standards for QUIC in Chromium.
Adoption
Browser support
The QUIC code was experimentally developed in Google Chrome starting in 2012, and was announced as part of Chromium version 29 (released on August 20, 2013). It is currently enabled by default in Chromium and Chrome.
Support in Firefox arrived in May 2021.
Apple added experimental support in the WebKit engine through the Safari Technology Preview 104 in April 2020. Official support was added in Safari 14, included in macOS Big Sur and iOS 14, but the feature must be turned on manually.
Client support
The cronet library for QUIC and other protocols is available to Android applications as a module loadable via Google Play Services.
cURL 7.66, released 11 September 2019, supports HTTP/3 (and thus QUIC).
In October 2020, Facebook announced that it has successfully migrated its apps, including Instagram, and server infrastructure to QUIC, with already 75% of its Internet traffic using QUIC. All mobile apps from Google support QUIC, including YouTube and Gmail. Uber's mobile app also uses QUIC.
Server support
, there are several actively maintained implementations. Google servers support QUIC and Google has published a prototype server. Akamai Technologies has been supporting QUIC since July 2016. A Go implementation called quic-go is also available, and powers experimental QUIC support in the Caddy server. On July 11, 2017, LiteSpeed Technologies officially began supporting QUIC in their load balancer (WebADC) and LiteSpeed Web Server products. , 88.6% of QUIC websites used LiteSpeed and 10.8% used Nginx. Although at first only Google servers supported HTTP-over-QUIC connections, Facebook also launched the technology in 2018, and Cloudflare has been offering QUIC support on a beta basis since 2018. , 5.0% of all websites use QUIC. Microsoft Windows Server 2022 supports both HTTP/3 and SMB over QUIC protocols via MsQuic. The Application Delivery Controller of Citrix (Citrix ADC, NetScaler) can function as a QUIC proxy since version 13.
In addition, there are several stale community projects: libquic was created by extracting the Chromium implementation of QUIC and modifying it to minimize dependency requirements, and goquic provides Go bindings of libquic. Finally, quic-reverse-proxy is a Docker image that acts as a reverse proxy server, translating QUIC requests into plain HTTP that can be understood by the origin server.
.NET 5 introduces experimental support for QUIC using the MsQuic library.
Source code
See also
Constrained Application Protocol (CoAP) – a UDP-based protocol utilizing REST model
Datagram Congestion Control Protocol (DCCP)
Datagram Transport Layer Security (DTLS)
Fast and Secure Protocol
HTTP/3
LEDBAT (Low Extra Delay Background Transport)
Micro Transport Protocol (µTP)
Multipurpose Transaction Protocol (MTP/IP) – an alternative to QUIC from Data Expedition, Inc.
Real-Time Media Flow Protocol (RTMFP)
Reliable User Datagram Protocol (RUDP)
SPDY
Stream Control Transmission Protocol (SCTP UDP Encapsulation; RFC 6951)
Structured Stream Transport
UDP-based Data Transfer Protocol (UDT) – a UDP-based transport protocol
References
External links
– Version-Independent Properties of QUIC
– QUIC: A UDP-Based Multiplexed and Secure Transport
– Using TLS to Secure QUIC
– QUIC Loss Detection and Congestion Control
Chromium: QUIC, a multiplexed stream transport over UDP
QUIC: Design Document and Specification Rationale, Jim Roskind's original document (2012/2013)
Daniel Stenberg: HTTP/3 explained
Linux Weekly News: Connecting on the QUIC (2013)
QUIC:, IETF-88 TSV Area Presentation (2013-11-07)
Chromium Blog: Experimenting with QUIC (2013)
QUIC: next generation multiplexed transport over UDP (Google Developers, 2014)
HTTP over UDP: an Experimental Investigation of QUIC
Multipath QUIC (extension to QUIC)
Innovating Transport with QUIC: Design Approaches and Research Challenges (2017)
Transport layer protocols
Internet protocols
Computer networking |
38262859 | https://en.wikipedia.org/wiki/ScaleBase | ScaleBase | ScaleBase was a company that sold software to implement distributed MySQL databases for cloud computing. The software company was located in the Boston, Massachusetts, area.
History
Scalebase was founded in 2009 by Doron Levari. Ram Metser, formerly CEO of Guardium, a database security company acquired by IBM in 2009, was named as CEO in October 2012.
In October 2012, ScaleBase closed a Series B round of $10.5 million from Bain Capital Ventures, Ascent Venture Partners and its original investor, Cedar Fund.
ScaleArc raised $5.33 million in December 2011.
$12 million of new funding was announced in January 2013 was led by Accell Partners.
The assets of ScaleBase were acquired by ScaleArc in August 2015.
Technology
The company ScaleBase provided two technology offerings: one was also called ScaleBase, and the other was Analysis Genie.
ScaleBase software was first released in August 2011.
ScaleBase is a distributed database cluster built on MySQL. This capability provides the scalability and availability benefits of distributed database while retaining relational database characteristics.
Two-phase commit and roll-back
ACID compliance
SQL query model, including cross-node joins and aggregations
ScaleBase data distribution is policy-based and transparent. That is, ScaleBase provides visibility and control of the variables that impact the data distribution policy.
ScaleBase software was available on Amazon Web Services (EC2, RDS), Rackspace and IBM Cloud.
Analysis Genie was software as a service that analyzed schema and queries. Its purpose is to suggest a data distribution policy that is uniquely tuned for individual application requirements and database workloads.
References
External links
Software companies based in Massachusetts
NewSQL
RDBMS software for Linux
Software companies of the United States |
519460 | https://en.wikipedia.org/wiki/List%20of%20archive%20formats | List of archive formats | This is a list of file formats used by archivers and compressors used to create archive files.
Archiving only
Compression only
Archiving and compression
Data recovery
Comparison
Containers and compression
Notes
While the original tar format uses the ASCII character encoding, current implementations use the UTF-8 (Unicode) encoding, which is backwards compatible with ASCII.
Supports the external Parchive program (par2).
From 3.20 release RAR can store modification, creation and last access time with the precision up to 0.0000001 second (= 0.1 µs).
The PAQ family (with its lighter weight derivative LPAQ) went through many revisions, each revision suggested its own extension. For example: ".paq9a".
WIM can store the ciphertext of encrypted files on an NTFS volume, but such files can only by decrypted if an administrator extracts the file to an NTFS volume, and the decryption key is available (typically from the file's original owner on the same Windows installation). Microsoft has also distributed some download versions of the Windows operating system as encrypted WIM files, but via an external encryption process and not a feature of WIM.
Purpose: Archive formats are used for backups, mobility, and archiving. Many archive formats compress the data to consume less storage space and result in quicker transfer times as the same data is represented by fewer bytes. Another benefit is that files are combined into one archive file which has less overhead for managing or transferring. There are numerous compression algorithms available to losslessly compress archived data and some algorithms work better (smaller archive or faster compression) with particular data types. Archive formats are also used by most operating systems to package software for easier distribution and installation than binary executables.
Filename extension: The DOS and Windows operating systems required filenames to include an extension (of at least one, and typically 3 characters) to identify the file type and use. Filename extensions must be unique for each type of file. Many operating systems identify a file's type from its contents without the need for an extension in its name. However, the use of three-character extensions has been embraced as a useful and efficient shorthand for identifying file types.
Integrity check: Archive files are often stored on magnetic media, which is subject to data storage errors. Early tape media had a higher rate of errors than they do today. Many archive formats contain extra error-correction information to detect storage or transmission errors, and the software used to read the archive files contains logic to detect and possibly correct errors.
Recovery record: Many archive formats contain redundant data embedded in the files in order to detect data storage or transmission errors, and the software used to read the archive files contains logic to detect and correct errors.
Encryption: In order to protect the data being stored or transferred from being read if intercepted, many archive formats include the capability to encrypt the data. There are multiple mathematical algorithms available to encrypt data.
Software packaging and distribution
Notes
Not to be confused with the archiver JAR written by Robert K. Jung, which produces ".j" files.
Features
See also
Archive file
Comparison of file archivers
Comparison of file systems
List of file systems
Solid compression
zlib
Notes
Compression is not a built-in feature of the formats, however, the resulting archive can be compressed with any algorithm of choice. Several implementations include functionality to do this automatically
Most implementations can optionally produce a self-extracting executable
Per-file compression with gzip, bzip2, lzo, xz, lzma (as opposed to compressing the whole archive). An individual can choose not to compress already compressed filenames based on their suffix as well.
Footnotes
Lists of file formats |
20901 | https://en.wikipedia.org/wiki/Malware | Malware | Malware (a portmanteau for malicious software) is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy. By contrast, software that causes harm due to some deficiency is typically described as a software bug. Malware poses serious problems to individuals and businesses. According to Symantec’s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.
Many types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper, and scareware. The defense strategies against malware differs according to the type of malware but most can be thwarted by installing antivirus software, firewalls, applying regular patches to reduce zero-day attacks, securing networks from intrusion, having regular backups and isolating infected systems. Malware is now being designed to evade antivirus software detection algorithms.
History
The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann showed that in theory a program could reproduce itself. This constituted a plausibility result in computability theory. Fred Cohen experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses. The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid 1990s, and includes initial ransomware and evasion ideas.
Before Internet access became widespread, viruses spread on personal computers by infecting executable programs or boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these programs or boot sectors, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi brothers in Pakistan. Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.
Older email software would automatically open HTML email containing potentially malicious JavaScript code. Users may also execute disguised malicious email attachments. The 2018 Data Breach Investigations Report by Verizon, cited by CSO Online, states that emails are the primary method of malware delivery, accounting for 92% of malware delivery around the world.
The first worms, network-borne infectious programs, originated not on personal computers, but on multitasking Unix systems. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (vulnerabilities) in network server programs and started itself running as a separate process. This same behavior is used by today's worms as well.
With the rise of the Microsoft Windows platform in the 1990s, and the flexible macros of its applications, it became possible to write infectious code in the macro language of Microsoft Word and similar programs. These macro viruses infect documents and templates rather than applications (executables), but rely on the fact that macros in a Word document are a form of executable code.
Many early infectious programs, including the Morris Worm, the first internet worm, were written as experiments or pranks. Today, malware is used by both black hat hackers and governments to steal personal, financial, or business information. Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate.
Purposes
Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.
Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.
Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software. The Sony BMG rootkit was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities.
Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware. Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.
Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.
In addition to criminal money-making, malware can be used for sabotage, often for political motives. Stuxnet, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).
Types
These categories are not mutually exclusive, so malware may use multiple techniques.
Trojan horse
A Trojan horse is a harmful program that misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the Ancient Greek story of the Trojan horse used to invade the city of Troy by stealth.
Trojan horses are generally spread by some form of social engineering, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan. While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection.
Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.
In spring 2017 Mac users were hit by the new version of Proton Remote Access Trojan (RAT) trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.
Rootkits
Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful process from being visible in the system's list of processes, or keep its files from being read.
Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the Jargon File tale of a pair of programs infesting a Xerox CP-V time sharing system:
Backdoors
A backdoor is a method of bypassing normal authentication procedures, usually over a connection to a network such as the Internet. Once a system has been compromised, one or more backdoors may be installed in order to allow access in the future, invisibly to the user.
The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world. Backdoors may be installed by Trojan horses, worms, implants, or other methods.
Infectious Malware
The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any specific types of behavior and have been likened to biological viruses.
Worm
A worm is a stand-alone malware software that transmits itself over a network to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself.
Virus
A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data). An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or executable code into PE files. A computer virus is software that embeds itself in some other executable software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files.
Ransomware
Screen-locking ransomware
Lock-screens, or screen lockers is a type of “cyber police” ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.
Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.
Encryption-based ransomware
Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are CryptoLocker and WannaCry.
Grayware
Grayware (sometimes spelled as greyware) is a term, coming into use around 2004, that applies to any unwanted application or file that can worsen the performance of computers and may cause security risks but which is not typically considered malware. Greyware are applications that behave in an annoying or undesirable manner, and yet are less serious or troublesome than malware. Grayware encompasses spyware, adware, fraudulent dialers, joke programs ("jokeware"), remote access tools and other unwanted programs that may harm the performance of computers or cause inconvenience. For example, at one point, Sony BMG compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying.
Potentially Unwanted Program (PUP)
Potentially unwanted programs (PUPs) or potentially unwanted applications (PUAs) are applications that would be considered unwanted despite being downloaded often by the user, possibly after failing to read a download agreement. PUPs include spyware, adware, and fraudulent dialers. Many security products classify unauthorised key generators as grayware, although they frequently carry true malware in addition to their ostensible purpose. Malwarebytes lists several criteria for classifying a program as a PUP. Some types of adware (using stolen certificates) turn off anti-malware and virus protection; technical remedies are available.
Evasion
Since the beginning of 2015, a sizable portion of malware has been utilizing a combination of many techniques designed to avoid detection and analysis. From the more common, to the least common:
evasion of analysis and detection by fingerprinting the environment when executed.
confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware.
timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time.
obfuscating internal data so that automated tools do not detect the malware.
An increasingly common technique (2015) is adware that uses stolen certificates to disable anti-malware and virus protection; technical remedies are available to deal with the adware.
Nowadays, one of the most sophisticated and stealthy ways of evasion is to use information hiding techniques, namely stegomalware. A survey on stegomalware was published by Cabaj et al. in 2018.
Another type of evasion technique is Fileless malware or Advanced Volatile Threats (AVTs). Fileless malware does not require a file to operate. It runs within memory and utilizes existing system tools to carry out malicious acts. Because there are no files on the system, there are no executable files for antivirus and forensic tools to analyze, making such malware nearly impossible to detect. The only way to detect fileless malware is to catch it operating in real time. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.
Risks
Vulnerable software
A vulnerability is a weakness, flaw or software bug in an application, a complete computer, an operating system, or a computer network that is exploited by malware to bypass defences or gain privileges it requires to run. For example, TestDisk 6.4 or earlier contained a vulnerability that allowed attackers to inject code into Windows. Malware can exploit security defects (security bugs or vulnerabilities) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP), or in vulnerable versions of browser plugins such as Adobe Flash Player, Adobe Acrobat or Reader, or Java SE. For example, a common method is exploitation of a buffer overrun vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate being supplied. Malware may provide data that overflows the buffer, with malicious executable code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines.
Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable patch. Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. Security advisories from plug-in providers announce security-related updates. Common vulnerabilities are assigned CVE IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software, free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to update it. Other approaches involve using firewalls and intrusion prevention systems to monitor unusual traffic patterns on the local computer network.
Excessive privileges
Users and programs can be assigned more privileges than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required. Apps targeting the Android platform can be a major source of malware infection but one solution is to use third party software to detect apps that have been assigned excessive privileges.
Some systems allow all users to modify their internal structures, and such users today would be considered over-privileged users. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an administrator or root, and a regular user of the system. In some systems, non-administrator users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status. This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.
Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many scripting applications allow code too many privileges, usually in the sense that when a user executes code, the system allows that code all rights of that user.
Weak passwords
A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges. Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a dictionary or brute force attack. Using strong passwords and enabling two-factor authentication can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account.
Use of the same operating system
Homogeneity can be a vulnerability. For example, when all computers in a network run the same operating system, upon exploiting one, one worm can exploit them all: In particular, Microsoft Windows or Mac OS X have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running Windows 10. This risk is mitigated by segmenting the networks into different subnetworks and setting up firewalls to block traffic between them.
Mitigation
Antivirus / Anti-malware software
Anti-malware (sometimes also called antivirus) programs block and remove some or all types of malware. For example, Microsoft Security Essentials (for Windows XP, Vista, and Windows 7) and Windows Defender (for Windows 8, 10 and 11) provides real-time protection. The Windows Malicious Software Removal Tool removes malicious software from the system. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Tests found some free programs to be competitive with commercial ones.
Typically, antivirus software can combat malware in the following ways:
Real-time protection: They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes across.
Removal: Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.
Sandboxing: Provide sandboxing of apps considered dangerous (such as web browsers where most vulnerabilities are likely to be installed from).
Real-time protection
A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or kernel and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file infected or not. Typically, when an infected file is found, execution is stopped and the file is quarantined to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in virtual memory.
Sandboxing
Because many malware components are installed as a result of browser exploits or user error, using security software (some of which are anti-malware, though many are not) to "sandbox" browsers (essentially isolate the browser from the computer and hence any malware induced change) can also be effective in helping to restrict any damage done.
Website security scans
Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised.
Network Segregation
Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. Software Defined Networking provides techniques to implement such controls.
"Air gap" isolation or "parallel network"
As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an "air gap" (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. Stuxnet is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data.
AirHopper, BitWhisper, GSMem and Fansmitter are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions.
See also
Botnet
Browser hijacking
Comparison of antivirus software
Computer security
Cuckoo's egg (metaphor)
Cyber spying
Domain generation algorithm
Facebook malware
File binder
Identity theft
Industrial espionage
Linux malware
Malvertising
Phishing
Riskware
Security in Web apps
Social engineering (security)
Targeted threat
Technical support scam
Telemetry software
Typosquatting
Web server overload causes
Webattacker
Zombie (computer science)
References
External links
Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive)
Advanced Malware Cleaning – a Microsoft video
Security breaches
Computer programming
Cybercrime |
37105477 | https://en.wikipedia.org/wiki/Yasser%20ElKady | Yasser ElKady | Yasser ElKady ياسر القاضي was the Minister of Communications and Information Technology in Egypt between 19 September 2015 and 14 June 2018. ElKady has been in the IT and Telecom industry for over 25 years with solid experience in strategic planning, technology integration, business development and organizational transformation.
Education
After earning a bachelor's degree in Electronics and Data Communications Engineering from Cairo University.
Career
In January 2014, ElKady held the position of the Regional Director for HP Networking in the Middle East, Mediterranean and Africa (MEMA) for HP Egypt.
From October 2010 to January 2014, he was the CEO of the Egyptian Information Technology Industry Development Agency(ITIDA) leading its efforts to develop the IT industry in Egypt, achieving export revenue of USD 1.4 billion and maintaining healthy growth margins for local IT vendors in the economic downturn following the revolution.
Throughout his career, ElKady spearheaded a number of national developmental initiatives. As a first deputy to the Minister of Investment, he led Egypt Investment promotion efforts, and supervised strategic investment projects worth USD 16 billion; he also contributed to developing the national ICT and innovation strategy, as a board member in ITIDA, and a member in the Ministry of ICT advisory board.
Before joining the government ElKady led several notable, highly successful enterprises through periods of significant growth. He started Cisco Egypt from ground up and grew the business by 70-fold. He then led Cisco’s strategy and business development efforts in MEA and Emerging Markets to realize 40% Y-to-Y growth and a business worth USD 750 million. He managed to establish Orascom IIS as the first communication supplier in Egypt, and led Jeraisy Co. to double its market share in a year time.
Member Of
ElKady’s expertise has been the reason for his selection as a board member in key economic and developmental institutions including Egypt’s General Authority for Investment and Free Zones (GAFI), the advisory board of the Ministry of Communications and Information Technology, Credit Agricole Egypt and Information Technology Industry development Agency prior to his appointment as the CEO.
Awards
He was awarded the Algerian Government Country Transformation Award (2006), the Jordan Education Initiative certificate of excellence (2005), and The Palestinian Telecom Organization reform recognition (2005). Throughout his career at Cisco, he has been recognized as the Country Manager of the year for 2 consecutive years, in addition to a number of other awards for Team Building, Thought Leadership, and Outstanding performance.
Experience
Regional Director for HP Networking in the Middle East, Mediterranean and Africa (MEMA) Region and the Managing Director for HP Egypt
CEO of the Information Technology Industry Development Agency(ITIDA)
Leading ITIDA efforts to develop the IT industry in Egypt
First Deputy to The Minister Of Investment - Ministry of Investment
Overseeing the Ministry’s investment promotion initiatives, and strategic investment projects worth USD 16 billion.
Managing Director MEA - CISCO Systems
Leading Cisco’s Strategy and Business Development efforts in 60 countries in the Middle East, Africa, and Emerging Markets, achieving 40% Year-on-Year growth and a business worth of USD 750 million.
Regional Director and General Manager, North Africa & Levant And IRAQ - Cisco Systems Inc
Driving Cisco’s business in the region to reach USD 450 million, and maintaining 30% YoY Growth rates
References
Information Technology Industry Development Agency
Ministry of Communications and Information Technology
CISCO
Social Fund for Development
Global Education Initiative
Egypt: Building on stability for growth by Yasser ElKady, CEO, ITIDA
Plan to increase support for Egyptian exports through IT solutions
Continued Growth in Egypt's Outsourcing Industry in 2011
Egyptian businesspeople
1962 births
Living people
Communications Ministers of Egypt |
7165999 | https://en.wikipedia.org/wiki/Tulip%20Bowl | Tulip Bowl | The Tulip Bowl is the final match in the season of the AFBN Division One, the top division of the American Football Bond Nederland (AFBN). The AFBN is the organisation responsible for American football in the Netherlands. The Tulip Bowl participants are determined through the playoffs and the match determines the Dutch champions in the sport of American football.
There are also other Bowl games, including the Division Two Bowl and the Dyan Kralt Bowl for the youth competition.
History
Statistics
Ranking of teams
† Also known as Limburg Wildcats
Records
Highest Scoring Tulip Bowl
60 - Amsterdam Crusaders 47 vs 13 The Hague Raiders (1987)
Lowest Scoring Tulip Bowl
4 - Rotterdam Trojans 4 vs 0 Amsterdam Crusaders (1996)
Biggest Winning Margin Tulip Bowl
36 - Amsterdam Crusaders 36 vs 0 Amsterdam Rams (1989)
36 - Amsterdam Crusaders 36 vs 0 Hilversum Hurricanes (1999)
Consecutive Tulip Bowl wins
5 - Amsterdam Crusaders (1987–1991 and 2002–2006)
3 - Amsterdam Crusaders (2008–2010 and 2015–2017*) Alphen Eagles (2012–2014)
2 - Rotterdam Trojans (1996, 1997), Hilversum Hurricanes (2000, 2001)
Consecutive Tulip Bowl losses
3 - Hilversum Hurricanes (2003–2005), Amsterdam Crusaders (2012–2014)
2 - Many teams
Consecutive Tulip Bowl appearances
9 - Amsterdam Crusaders (2002–2010)
6 - Amsterdam Crusaders (2012–2017)
5 - The Hague Raiders (1990–1994), Amsterdam Crusaders (1987–1991), Alphen Eagles (2011–2015)
4 - Hilversum Hurricanes (1998–2001)
3 - Rotterdam Trojans (1995–1997), Hilversum Hurricanes (2003–2005)
2 - Many teams
* denotes streak still active
See also
Belgian Bowl
EFAF Atlantic Cup
External links
- Official website
Tulip Bowl XXXII programmaboekje
Tulip Bowl on luckyshow.org
American football competitions in Europe
American football in the Netherlands
American football bowls in Europe
1985 establishments in the Netherlands
Recurring sporting events established in 1985 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.