id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
53447348 | https://en.wikipedia.org/wiki/Acuant | Acuant | Acuant is an identity verification, document authentication and fraud prevention technology services provider headquartered in Los Angeles, with engineering and development centers in New Hampshire and Israel.
Products include ID capture and auto-fill software, ID authentication, biometric facial recognition, facial image matching, and CHIP/RFID reading. The company's partners include start-ups, Fortune 500 and FTSE 350 organizations.
Acuant's applications address regulations such as AML, KYC, and PII, and are in use by organizations in such industries as hospitality, healthcare, automotive, security, and financial services.
Company
Acuant was founded in 1999 in Los Angeles, California, by Danny and Iuval Hatzav, as Card Scanning Solutions, which was incorporated in 2003 and later rebranded in 2014 as Acuant. Yossi Zekri was named CEO & President in 2008.
In May 2016, Acuant acquired Assure-Tec Technologies, a provider of identity document authentication and data capture solutions.
In 2017, Acuant acquired Ozone® from Mount Airy Group.
In 2018, Audax Private Equity completed an investment in Acuant to support the continued growth initiatives of the company. Audax acquired a controlling interest in Acuant from Insight Venture Partners, Lightview Capital and Egis Capital Partners.
In 2020, Acuant announced the acquisition of the former strategic partner IdentityMind, creator of Trusted Digital Identities.
On November 18, 2021, UK-based GB Group announced it was acquiring Acuant for $736 million (£547 million).
See also
Multi-factor authentication
Automatic identification and data capture
References
External links
Companies based in Los Angeles
1999 establishments in California |
33838727 | https://en.wikipedia.org/wiki/Pat%20Villani | Pat Villani | Pasquale "Pat" J. Villani (18 April 1954 – 27 August 2011) was an American computer programmer, author, and advocate of free software, best known for his creation of DOS-C, a DOS emulator written in the C language and subsequently adapted as the kernel of the FreeDOS operating system and a number of other projects including DOSEMU for Linux. He used to sign his edits with siglum "patv".
FreeDOS involvement
Villani had already been working on a DOS-like operating system for use in embedded systems for some while before the advent of FreeDOS.
His efforts started when he developed an MS-DOS 3.1-compatible interface emulator to write device drivers in the C high-level language instead of in assembly language, as was the usual approach at that time. This interface emulator grew into a minimal operating system named XDOS around 1988.
He added an IPL to set up a boot environment before loading the actual operating system and developed an MS-DOS-compatible frontend API to applications. In contrast to MS-DOS, which is not designed to be reentrant, the system calls of his operating system were, which is often a requirement for multitasking and real-time applications in embedded systems. This system was named NSS-DOS and also offered commercially.
When one potential contractor sought to use the OS in a system equipped with Motorola 680x0 processors instead of Intel x86 processors, for which the system was designed originally and which utilize different instruction sets and memory models, Villani was able to redesign his system to become portable across a range of different compilers and target environments. This move to a completely different target platform, while losing binary compatibility with existing applications, would have required a complete rewrite from scratch had his system not been written in a high-level language such as C, which allowed him to reuse large parts. His new DOS/NT used a microkernel architecture with logical separation of file system, memory and task manager.
Villani joined the FreeDOS project in 1994 after reading Jim Hall's announcement of a "PD-DOS" on comp.os.msdos.misc.apps. In response to Hall's announcement, Villani devised a derivative of DOS/NT named DOS-C with a monolithic kernel and an architecture more similar to the non-multitasking MS-DOS, and in 1995 he made it available for dual-use under a GPL open-source license to become the kernel component of the new "Free-DOS" operating system, as "PD-DOS" was called at this time.
In 1996, Villani wrote the book FreeDOS Kernel, which describes the design of the DOS-C / FreeDOS kernel and the original FreeDOS COMMAND.COM command line interpreter. The name of the operating system was subsequently officially changed to FreeDOS to reflect the spelling used in the book.
Internally, the FreeDOS kernel was still significantly different from MS-DOS, which, while no problem for embedded applications specifically written for FreeDOS, caused various compatibility issues in conjunction with misbehaving DOS applications. Villani and other contributors analyzed and addressed many of these issues over the years for FreeDOS to become much more MS-DOS compatible.
With some breaks Villani remained active with the FreeDOS project, including preparations for the release of FreeDOS 1.1. Since 2009 he had also held the role of the project coordinator, but he had to step down in April 2011 for health reasons. The FreeDOS 1.1 release, published on 2 January 2012, is dedicated to him.
Biography
Villani was born in Nocera Inferiore near Naples, Italy, grew up in Brooklyn, New York, USA, and moved to Freehold Township, New Jersey, in 1990.
In 1976 he received his BSEE degree from Polytechnic Institute of Brooklyn and in 1981 an MSEE degree in electrical engineering from Polytechnic Institute of New York. In 2008 he also received a master's certificate in Project Management from George Washington University and he was an adjunct professor at Brookdale Community College beginning in 2010.
He previously worked for Stratus Computers, Inc. on their Continuum fault-tolerant product line and also as a consultant for AT&T Bell Laboratories. At Digital Equipment Corporation / Compaq he worked as a principal software engineer on the OSF1 / Digital UNIX / Tru64 UNIX operating system beginning in 1995, and since 2006 had been Acting Director of Communications Infrastructure and Software Architect for Vonage.
He was a member of M.A.R.S., A.R.R.L., and IEEE.
Bibliography
US patent application number: 12/779,489, publication number: US 2010/0290455 A1, filing date: 2010-05-13, Method and apparatus for communication termination routing, ().
US patent application number: 12/897,405, publication number: US 2011/0081009 A1, filing date: 2010-10-04, Method and apparatus for providing an identifier for a Caller ID function in a telecommunication system, ().
References
External links
Original DOS-C GPLed release on SourceForge
The FreeDOS project
1954 births
2011 deaths
Free software programmers
American computer programmers
FreeDOS people
People from Brooklyn
American people of Italian descent
People from Nocera Inferiore
Polytechnic Institute of New York University alumni |
11517715 | https://en.wikipedia.org/wiki/Avant%20Window%20Navigator | Avant Window Navigator | Avant Window Navigator (abbreviated AWN or Awn) is a dock-like bar for Linux, which sits on an edge of a user's screen and tracks open windows. Instead of representing open windows as buttons or segments on a bar, it uses large icons on a translucent background to increase readability and add visual appeal. The program was created by Neil J. Patel.
Both the appearance and functionality of Avant Window Navigator may be customized, and plugins and applets are available, such as to display the progress of a download in Mozilla Firefox or to control a music player like Rhythmbox. The plugins use the D-Bus IPC system, and applets can be written in C, Python or Vala. A sister project, AWN Extras, is a collection of community-contributed applets and plugins. Releases are usually kept in sync with AWN.
One of the major requirements to run older versions of Avant Window Navigator is a compositing window manager. At least version 0.4.0-2 in the Debian repos has either Metacity, xcompmgr, Compiz, xfwm4, KWin or Mutter as a dependency.
Therefore, the user was required to install a compositor, which could tax performance on low-end systems. Some alternatives were to use a lightweight desktop environment such as Xfce, which has a compositing manager since version 4.2.0, or to enable compositing in Metacity when using GNOME. However, support for non-composited environments is available in version 0.4.0.
See also
Dock (computing)
Docky
Kicker (KDE)
GNOME Panel
References
Notes
Jack Wallen (12 Aug 2009) Avant Window Navigator: OS X-like dock on Linux desktop, ghacks.net
Dmitri Popov (Jan 30, 2009) Managing Tasks with Avant Window Navigator, Linux Magazine online
Jonathan Roberts (21 July 2007) Gnome Panel Mania, Free Software Magazine column
External links
- Home of AWN project - Maintained by Povilas Kanapickas (reporting of bugs and issues not permitted, last activity 2014-06-11)
- Project moved to GitHub
AWN Wiki contains, among other things, installation instructions and a list of FAQs - Site Unknown (as of 2014-12-13)
AWN Forums - Access to server forbidden (as of 2014-12-13)
Avant Window Navigator (AWN) Mac OS like Dock in openSUSE at susegeek.com (posting dated 2008-08-02)
Neil J. Patel's Blog - Blog no longer active (last entry dated 2011-06-12)
Planet AWN, an aggregation of the developers' weblogs - Site Unknown (as of 2014-12-13)
Application launchers
Applications using D-Bus
Beta software
Free software programmed in C
Free software programmed in Python
Free software programmed in Vala
Graphical shells that use GTK
Software that uses PyGTK |
1208810 | https://en.wikipedia.org/wiki/Stratus%20VOS | Stratus VOS | Stratus VOS (Virtual Operating System) is a proprietary operating system running on Stratus Technologies fault-tolerant computer systems. VOS is available on Stratus's ftServer and Continuum platforms. VOS customers use it to support high-volume transaction processing applications which require continuous availability. VOS is notable for being one of the few operating systems which run on fully lockstepped hardware.
During the 1980s, an IBM version of Stratus VOS existed and was called the System/88 Operating System.
History
VOS was designed from its inception as a high-security transaction-processing environment tailored to fault-tolerant hardware. It incorporates much of the design experience that came out of the MIT/Bell-Laboratories/General-Electric (later Honeywell) Multics project.
In 1984, Stratus added a UNIX System V implementation called Unix System Facilities (USF) to VOS, integrating Unix and VOS at the kernel level.
In recent years, Stratus has added POSIX-compliance, and many open source packages can run on VOS.
Like competing proprietary operating systems, VOS has seen its market share shrink steadily in the 1990s and early 2000s.
Development
Programming for VOS
VOS provides compilers for PL/I, COBOL, Pascal, FORTRAN, C (with the VOS C and GCC compilers), and C++ (also GCC). Each of these programming languages can make VOS system calls (e.g. s$seq_read to read a record from a file), and has extensions to support varying-length strings in PL/I style. Developers typically code in their favourite VOS text editor, or offline, before compiling on the system; there are no VOS IDE applications.
In its history, Stratus has offered hardware platforms based on the Motorola 68000 microprocessor family ("FT" and "XA" series), the Intel i860 microprocessor family ("XA/R" series), the HP PA-RISC processor family ("Continuum" series), and the Intel Xeon x86 processor family ("V Series"). All versions of VOS offer compilers targeted at the native instruction set, and some versions of VOS offer cross-compilers.
Stratus added support for the POSIX API in VOS Release 14.3 (on Continuum), and added support for the GNU C/C++ compiler, GNU gdb debugger, and many POSIX commands in VOS Release 14.4. Each additional release of VOS has added more POSIX.1 capabilities, to the point where many user-mode open-source packages can now be successfully built. For this reason, beginning with Release 17.0, Stratus renamed VOS to OpenVOS.
Stratus offers supported ports of Samba, OpenSSL, OpenSSH, GNU Privacy Guard, OpenLDAP, Berkeley DB, MySQL Community Server, Apache, IBM WebSphere MQ, and the community edition of Java.
Numeric values in VOS are always big endian, regardless of the endianness of the underlying hardware platform. On little endian servers with x86 processors, the compilers do a byte swap before reading or writing values to memory to transform the data to or from the native little endian format.
Command Macro Language
VOS has a fairly complete command macro language which can be used to create menu systems, automate tasks etc. VOS command macros accept arguments on the command-line or via a user interface "form". Arguments are defined at the beginning of the command macro in a "parameters" section. The language supports a range of statements, including if/then/else, boolean operations, "while" loops, "goto" and excellent error reporting. The command macro language can be executed in interactive and non-interactive (batch or started process) modes. It can be used to automate programs, capturing prompts and sending appropriate responses. This has led Stratus to limit the capabilities of the command macro language.
The macro language lacks support for user-defined functions and does not easily support include files. The string handling is prone to errors, especially with embedded control characters.
Overview
VOS was coded mainly in PL/I with a small amount of assembly language before it was migrated to ftServer series. As of 1991, the system was written in PL/I and C, with only 3% in assembly.
Its overall structure has much in common with Multics, and many of the system's features can be traced back to Multics to varying degrees. The system exposes a number of fundamental abstractions to the software designer or programmer, most notable being
Processes
Devices
Hard Disks
Various IPC mechanisms
Tasks
A process is the scheduled entity in VOS and each process has a set of attributes that govern how it is manipulated by the system. For example, processes have a user name and process name. The former is used by VOS to determine the process's access rights to external devices and items with the file system. Of fundamental significance is a process's privileged flag, which is a binary attribute. Privileged processes may perform privileged operations. This mechanism is used to restrict certain potentially powerful operations that can have system wide consequences (e.g. shutting down the system, dismounting a hard disk etc.).
Distribution
VOS is distributed only by Stratus Technologies. The distribution media is a 3.5 mm DAT tape for Continuum, and an SDLT tape for early V Series platforms. As of OpenVOS Release 17.0, Stratus offers support for distributing OpenVOS on a DVD or by downloading a release file. Software installations may be done by the Stratus Field Engineer or by the customer's system administrator.
Interface
The command-line interface is the main, and most powerful, user interface for a VOS system.
Users may be locked into "form" based sub-system by command macro scripts if required, although a skilled user would be able to break out of this and get command-line access. (It is, in fact, possible for a Stratus system administrator to set up a user's account such that an attempt to break out of FMS—the Stratus Forms Management System—to the command line results in the user being logged out.)
Command macros and programs can be invoked with an argument to display a form listing all the available parameters, which the user can navigate using the "tab" key. Each parameter is generally restricted to control what the user can input. This includes lists of valid values, numeric-only, text-only, etc. Parameters can also be hidden using a "secret" tag, or made mandatory.
All commands in VOS are defined in full with underbars to separate words. For example, changes the working directory. The VOS help system uses this convention to assist users who are looking for a subset of possible commands; for instance, those referring to "change" are found by .
Users may customize their command interface by means of a file that contains abbreviations for commands. Command abbreviations are conventionally named after the first letters of the command they represent, so may be expanded to .
Applications
System applications
VOS is used on Continuum and ftServer systems, both of which are designed to be highly fault-tolerant. As such, these systems are typically used in safety-critical or mission-critical applications, typically banks, hospitals, telecommunications and transaction processing companies.
Communications
VOS supports the following protocols
TCP/IP
X.25
SNA
SDLC/QLLC
Async
Bisync
LAPB
Poll/Select
RJE/HASP
ALC/SLC
Visa, S.W.I.F.T., NASDAQ, FAS, CHIPS, AMEX
MQ Series
Older versions of VOS implemented a non-OSI standard TCP/IP known as OS TCP/IP (Operating System TCP/IP.) VOS since version 14.x has implemented OSI-compliant Streams-TCP. Older applications using OS TCP/IP have to be ported in order to use STCP. This can mean a loss of functionality as OS TCP/IP supported several functions that are not OSI-compliant and have therefore been abandoned. The ftServer hardware that V Series runs on only supports TCP/IP and X.25 (X.25 only when equipped with the optional NIO.) Websphere MQ 6.0 (a.k.a. MQ Series) is TCP/IP based; so, that is also supported by ftServer hardware. Devices supporting the legacy protocols run on the Continuum hardware and may be accessed from current hardware over the Open StrataLINK network.
Fault tolerance
Fault tolerance is built into VOS from the bottom up. On a hardware level, major devices are run in lockstepped duplex mode, meaning that there are two identical devices performing the same action at the same time. (In addition, each device, or board, is also duplexed in order to identify internal board failures at a hardware level, which is why Stratus hardware can be defined as "lock stepped".) These boards are actively monitored by the operating system which can correct any minor inconsistencies (such as bad disk-writes or reads). Any boards which report an unacceptable number of faults are removed from service by the system; the duplexed board will continue operation until the problem is resolved via a hot-fix. This includes CPUs, disk drives, and any other device that can logically be duplexed (which by definition, excludes communications devices). The system will continue processing as normal and will automatically raise a fault ticket with Stratus Customer Service via RSN (the Remote Service Network). Stratus Customer Service will then dial into the system using RSN to investigate the problem and dispatch replacement parts.
The operating system is designed to avoid crashes due to a simplexed hardware failure.
File system
VOS supports a number of unique file types:
Stream files: a stream of binary data, corresponding directly with the concept of a file on other operating systems.
Fixed files: a sequence of records of a fixed size.
Relative files: a sequence of records of a fixed file supporting random access
Sequential files: a sequence of records of variable size
Queue files: file-system based backup for message queues
Pipes: named pipes for inter-process communication
Transaction files: these provide support for journal based rollback
The VOS API allows the creation of multiple indexes per file, sorting according to the contents of a record, or an external key, or an internal key, or a well-defined set of multiple keys. A VOS file with one or more indexes can be used as a C-ISAM database table.
VOS uses a proprietary file naming syntax which includes the system name, module name, disk number, and directory, with components separated by the ">" symbol. Typically the system disk will be housed in the same module as the CPU, #m1, so a system file for a VOS cluster would be referenced as
(%system)#m1_d01>system>devices.table
VOS disk allocation and memory is organised in "blocks", each block being 4,096 bytes. Memory takes the form of RAM or paging. VOS systems support paging partitions and paging files. In modern versions of VOS, paging files can be created dynamically by the SysAdmin (but not removed without a reboot). These paging files can in theory consist of more than one extent (which is viewed by the kernel as a mini-paging partition) which may or may not be contiguous. However, non-contiguous extents are NOT recommended as they greatly increase disk activity. Admin should create the largest possible extent for the paging files as early as possible after the system has been booted.
File system security
VOS supports write, read, execute, and null (no) access to all files, directories and devices (although directories and files have slightly different access lists). Access can be assigned to users, groups, or the world. Only read access is required to run an executable program, provided that the user has "status" access for the directory in which that program resides.
VOS inherited access control lists from Multics and also implements directory access control lists. If a file does not have an access control list, the containing directory's default access control list applies.
Access to devices is typically controlled by creating a file which is linked to the device by the administrator. (This may be true in OpenVOS, but does not apply to the original operating system.) Access is then given to this file, and this sets the access on the device.
Open StrataLINK
VOS has always been a network-aware operating system. Virtually every system call in the native API has a parameter that determines what computer the operation affects. If the operation isn't local, it is redirected to the target computer via remote subroutine call. For example, file names are parsed to indicate which computer the file resides on.
The StrataLINK networking model has a two level hierarchy for naming computers: Each computer is called a module and modules are aggregated into systems. Each system is administered as a unit. In other words, all of the modules in a system are aware of all the disks and hardware devices on that system. The result of this is that a file name that begins with the system name refers to files on other computers and can be opened without the need for any special networking. The same is true for devices. Other system entities, such as processes, are referenced using module names which are written %system#module. The VOS system and module names have no defined relationship with IP addresses or domain names—The VOS API was developed in late 1980—before the Internet was widely adopted and long before URLs were even invented.
Historically, StrataLINK was a proprietary 10Mb CSMA/CD ring network which allowed high performance (for the time) with very low memory overhead and CPU utilization. This was never developed beyond 10Mb and was dropped in favor of using TCP/IP because Ethernet became the dominant networking standard and because memory and CPU processing got cheaper.
Open StrataLINK can also use X.25 for wide area communications. Using the Open StrataLINK protocols for wide area communications is also referred to as StrataNET.
See also
Comparison of command shells
Tandem Computers
References
External links
Official OpenVOS website
Comp.Sys.Stratus
Stratus Public FTP Server
Stratus Documentation Site
Proprietary operating systems
Fault-tolerant computer systems
Multics-like |
1191526 | https://en.wikipedia.org/wiki/Linux-VServer | Linux-VServer | Linux-VServer is a virtual private server implementation that was created by adding operating system-level virtualization capabilities to the Linux kernel. It is developed and distributed as open-source software.
The project was started by Jacques Gélinas. It is now maintained by Herbert Pötzl. It is not related to the Linux Virtual Server project, which implements network load balancing.
Linux-VServer is a jail mechanism in that it can be used to securely partition resources on a computer system (such as the file system, CPU time, network addresses and memory) in such a way that processes cannot mount a denial-of-service attack on anything outside their partition.
Each partition is called a security context, and the virtualized system within it is the virtual private server. A chroot-like utility for descending into security contexts is provided. Booting a virtual private server is then simply a matter of kickstarting init in a new security context; likewise, shutting it down simply entails killing all processes with that security context. The contexts themselves are robust enough to boot many Linux distributions unmodified, including Debian and Fedora.
Virtual private servers are commonly used in web hosting services, where they are useful for segregating customer accounts, pooling resources and containing any potential security breaches. To save space on such installations, each virtual server's file system can be created as a tree of copy-on-write hard links to a "template" file system. The hard link is marked with a special filesystem attribute and when modified, is securely and transparently replaced with a real copy of the file.
Linux-VServer provides two branches, stable (2.2.x), and devel (2.3.x) for 2.6-series kernels and a single stable branch for 2.4-series. A separate stable branch integrating the grsecurity patch set is also available.
Advantages
Virtual servers share the same system call interface and do not have any emulation overhead.
Virtual servers do not have to be backed by opaque disk images, but can share a common file system and common sets of files (through copy-on-write hard links). This makes it easier to back up a system and to pool disk space amongst virtual servers.
Processes within the virtual server run as regular processes on the host system. This is somewhat more memory-efficient and I/O-efficient than whole-system emulation, although memory ballooning and modern VMs allow returning unused memory and sharing disk cache with the host and other virtual servers.
Processes within the virtual server are queued on the same scheduler as on the host, allowing guest's processes to run concurrently on SMP systems. This is not trivial to implement with whole-system emulation.
Networking is based on isolation rather than virtualization, so there is no additional overhead for packets.
Smaller plane for security bugs. Only one kernel with small additional code-base compared to 2+ kernels and large interfaces between them.
Rich Linux scheduling features such as real-time priorities.
Disadvantages
Requires that the host kernel be patched.
No clustering or process migration capability is included, so the host kernel and host computer is still a single point of failure for all virtual servers.
Networking is based on isolation, not virtualization. This prevents each virtual server from creating its own internal routing or firewalling setup.
Some system calls (mostly hardware-related: e.g. real-time clock) and parts of the /proc and /sys filesystems are left unvirtualized.
Does not allow disk I/O bandwidth to be allocated on a per-virtual server basis.
See also
Comparison of platform virtualization software
Operating system-level virtualization
External links
Official releases
Implementation paper
Linux security software
Linux kernel features
Free virtualization software
Linux-only free software
Virtualization-related software for Linux |
304873 | https://en.wikipedia.org/wiki/Internet%20caf%C3%A9 | Internet café | An Internet café (also known as a cybercafé) is a café (or a convenience store or a fully dedicated Internet access business) that provides Internet access to the public. The fee for using a computer is generally charged as a time-based rate. The first Internet café was opened in South Korea.
Precursors
The early history of public access online networking sites is largely unwritten and undocumented. There are many experiments that can lay claim to being among the first online cafés.
In March 1988, the Electronic Café was opened Hongik University in Seoul, South Korea by Ahn Sang-Su and Keum Nuri. Two 16bit computers connected to Online service networks through telephone lines. Offline meetings were held in the café, which served as a place that connected online and offline activities.
In July 1991, the SFnet Coffeehouse Network was opened in San Francisco, United States by Wayne Gregori. Gregori installed coin-operated computer terminals in coffeehouses throughout the San Francisco Bay Area. The terminals dialed into a 32 line Bulletin Board System that offered an array of electronic services including FIDOnet mail and, in 1992, Internet mail.
Internet cafés
The concept of a café with full Internet access (and the name Cybercafé) was invented in early 1994 by Ivan Pope. Commissioned to develop an Internet event for an arts weekend at the Institute of Contemporary Arts (ICA) in London, and inspired by the SFnet terminal based cafes, Pope wrote a proposal outlining the concept of a café with Internet access. For the event Seduced and Abandoned: The Body in the Virtual World. Over the weekend of March 12 - 13 in the theatre at the ICA, Pope ran a Cybercafe which consisted of multiple Apple Mac computers on cafe style tables with menus of available services.
Around June 1994, The Binary Cafe, Canada's first Internet café, opened in Toronto, Ontario.
Inspired partly by the ICA event and associated with an Internet provider startup, EasyNet, in the same building, a commercial Internet café called Cyberia opened on September 1, 1994, in London, England.
The first public, commercial American Internet café was conceived and opened by Jeff Anderson and Alan Weinkrantz in August 1994, at Infomart in Dallas, Texas, and was called The High Tech Cafe.
A bar called CompuCafé was established in Helsinki, Finland in 1994 featuring both Internet access and a robotic beer seller.
In January 1995, the CB1 Café in Cambridge installed an Internet connection. It was the longest running Internet Café in the UK, ultimately closing down in 2015.
The Scottish Bar in French-speaking Switzerland was started on June 27, 1995 by Pierre Hemmer.
In June 1995, three Internet cafés opened in the East Village neighborhood of New York City: Internet Cafe, opened by Arthur Perley, the @Cafe, and the Heroic Sandwich. In 1996, the Internet café Surf City opened in downtown Anchorage, Alaska.
Characteristics
Internet cafés offer the use of computers with high bandwidth Internet access on the payment of a fee. Usage is generally charged by the minute or part of hour. An Internet cafe will generally also offer refreshments or other services such as phone repair. Internet cafes are often hosted within a shop or other establishment. They are located worldwide, and many people use them when traveling to access webmail and instant messaging services to keep in touch with family and friends. Apart from travelers, in many developing countries Internet cafés are the primary form of Internet access for citizens as a shared-access model is more affordable than personal ownership of equipment and/or software. Internet cafés are a natural evolution of the traditional café. Cafés started as places for information exchange, and have always been used as places to read the paper, send postcards home, play traditional or electronic games, chat to friends, find out local information. As Internet access is in increasing demand, many pubs, bars and cafés have terminals, so the distinction between the Internet café and normal café is eroded. In some, particularly European countries, the number of pure Internet cafés is decreasing since more and more normal cafés offer the same services.
While most Internet cafés are private businesses many have been set up to help bridge the 'digital divide', providing computer access and training to those without home access. There are also Internet kiosks, Internet access points in public places like public libraries, airport halls, sometimes just for brief use while standing.
Many hotels, resorts, and cruise ships offer Internet access for the convenience of their guests; this can take various forms, such as in-room wireless access, or a web browser that uses the in-room television set for its display (usually in this case the hotel provides a wireless keyboard on the assumption that the guest will use it from the bed), or computer(s) that guests can use, either in the lobby or in a business center. As with telephone service, in the US most mid-price hotels offer Internet access from a computer in the lobby to registered guests without charging an additional fee, while fancier hotels are more likely to charge for the use of a computer in their "business center."
For those traveling by road in North America, many truck stops have Internet kiosks, for which a typical charge is around 20 cents per minute.
Internet cafés come in a wide range of styles, reflecting their location, main clientele, and sometimes, the social agenda of the proprietors. In the early days they were important in projecting the image of the Internet as a 'cool' phenomenon.
A variation on the Internet café business model is the LAN gaming center, used for multiplayer gaming. These cafés have several computer stations connected to a LAN. The connected computers are custom-assembled for gameplay, supporting popular multiplayer games. This is reducing the need for video arcades and arcade games, many of which are being closed down or merged into Internet cafés. The use of Internet cafés for multiplayer gaming is particularly popular in certain areas of Asia like India, China, Taiwan, Hong Kong, South Korea and the Philippines. In some countries, since practically all LAN gaming centers also offer Internet access, the terms net cafe and LAN gaming center have become interchangeable. Again, this shared-access model is more affordable than personal ownership of equipment and/or software, especially since games often require high end and expensive PCs.
In Asia, gaming is very popular at the Internet cafés. This popularity has helped create a strong demand and a sustainable revenue model for most Internet cafés. With growing popularity, there also comes with this a responsibility as well. In fighting for competitive market share, the Internet cafés have started charging less and hence are adopting alternate means to maximize revenue. This includes selling food, beverages, game and telephone cards to its patrons.
Legal issues
In 2003 the EasyInternetcafé chain was found liable for copyright infringement occurring when customers used its CD-burning service to burn illegally downloaded music to their own CDs.
In 2005 Italy began requiring entities such as Internet cafés to collect photocopies of the passports of Internet, phone, or fax-using customers as a result of anti-terrorism legislation passed in July of that year.
By 2010, a variation of the Internet café known as a "sweepstakes parlor" had become widespread in certain regions of the United States. These facilities offered entries in a contest to customers who purchase Internet usage. Sweepstakes parlors faced scrutiny by local governments, who argued that sweepstakes parlors are a form of illegal gambling. A large number of these locations faced raids by officials, while a number of states enacted laws to ban them.
There are European countries where the total number of publicly accessible terminals is also decreasing. An example of such a country is Germany. The cause of this development is a combination of complicated regulation, relatively high Internet penetration rates, the widespread use of notebooks, tablets and smartphones and the relatively high number of wireless internet hotspots. Many pubs, bars and cafés in Germany offer wireless Internet, but no terminals since the Internet café regulations do not apply if no terminal is offered. Additionally, the use of Internet cafés for multiplayer gaming is very difficult in Germany since the Internet café regulations and a second type of regulations which was originally established for video arcade centres applies to this kind of Internet cafés. It is, for example, forbidden for people under the age of 18 to enter such an Internet café, although particularly people under 18 are an important group of customers for this type of Internet café.
Venues
Australia
Netcafe opened in St Kilda at the Deluxe Café on April 4, 1995, inspired by the Internet café phenomenon that was going on in Seattle. As Australia's first Internet café, founders included Gavin Murray, Rita Arrigo and Christopher Beaumont. Direct from London's Cyberia they were joined by Kathryn Phelps and partnerships with Adam Goudie of Standard Computers for hardware and Michael Bethune from Australia Online, Australia's first ISP for of course their Internet access. In 1995 it was delivered via a standard analogue phone line using a 9600-Baud US Robotics Modem. Cafe.on.net also opened on Rundle Street in Adelaide in 1995, with the support of Internode's Simon Hackett. The Cafe was founded by John Ruciak, and was notable because of its 100Mb ethernet connection.
Brazil
In Brazil, the initial concept brought by Monkey Paulista was based on the business model used by Internet cafés in South Korea, since this was the first house LAN to exist in Brazil, inaugurated in São Paulo, starting its activities in 1998. The company closed in 2010. However, just a week later for reasons of bureaucracy, the company Lan Game @ The House was opened and today is the first LAN house of Brazil in activity. Today it is seen as the country as a way to test new technologies and demonstration of games and products.
Mainland China
According to the "Survey of China Internet Café Industry" by the People's Republic of China Ministry of Culture in 2005, Mainland China has 110,000 Internet cafés, with more than 1,000,000 employees contributing 18,500,000,000 yuan to P.R. China's GDP. More than 70% of Internet café visitors are from 18 to 30 years old. 90% are male, 65% are unmarried, and 54% hold a university degree. More than 70% of visitors play computer games. 20% of China's Internet users go to Internet cafés.
Internet cafes allow individuals to go about the Internet anonymous, faster, and cheaper than at home. Large Internet cafes of major cities in China are expensive and heavily regulated by Government officials. Large Internet cafes are used by wealthy elite for business transactions and social gatherings. The majority of Internet cafes are small privately owned cafes comprising 90% of the market. (China Tightening Control, 2003) The majority of Internet cafes are unregistered because they do not meet the requirements of government standards or they do not want to go through the lengthy process of registering. According to Hong and Huang only 200 out of 2,400 cafes are registered in Beijing. The Chinese government is cracking down on the number of unregistered Internet cafes because some users spread propaganda, slander, allow pornography, and allow underage users. Crack downs by Chinese Government Officials banned 17,488 Internet Cafes in 2002 and another 27,000 were banned in 2003. (J. Hong, L. Huang) Internet cafes that are getting closed are being replaced with government approved businesses. These pre-approved businesses monitor patrons’ activities and help the government crackdown on offending users. (Xiao, 2003; Qiu 2003)
Milestones:
Before 1995 – An Internet café called 3C+T appeared in Shanghai, probably the first in China. The price was 20 yuan per hour ($2.50 per hour)
1995–1998 – China's Internet cafés proliferate. Playing unconnected games is the main purpose of café users. The average price was 15~20 yuan per hour.
After 2002 – Heavy censorships were imposed, including real-name registration. At the end of 2004, more than 70,000 Internet cafés were closed in a nationwide campaign.
2008 – Microsoft attempts to make Internet cafés profitable in Asia and other emerging markets. After discussions with the governments of these countries, it helps to establish safe Internet cafés.
India
In India, Internet cafés used by traveling people and business are declining since the arrival of widespread mobile Internet usage. A set of other services are also offered, such as printing of documents or webpages. Operators also help computer illiterates through some government processes (as a part of e-governance in India ). Low speed of mobile Internet and these services offered by Internet cafés help its survival. In India a positive government ID is compulsory for Internet café users in most states.
In 2008, there were 180,000 cyber cafes in India but by 2017, it declined to 50,000, one of primary reasons for decline was rules of IT Act, which caused licensing issues and other restrictions.
Indonesia
According to APWKomitel (Association of Community Internet Center), there are 5,000 Internet cafés in urban Indonesian cities in 2006 providing computer/printer/scanner rentals, training, PC gaming and Internet access/rental to people without computer or internet access. The website also contains a directory listing some of these warnet/telecenter/gamecenter in Indonesia. In urban areas, the generic name is warnet (or warung Internet) and in rural areas the generic name is telecenter. Warnets/netcafes are usually privately owned as bottom-up initiatives, while telecenters in rural villages are typically government or donor-funded as top-down financing. Information on netcafe/warnet in Indonesia can also be found in a book titled: Connected for Development: Indonesian Case study.
Currently, no special license is required to operate an Internet café or warnet in Indonesia, except for the ordinary business license applicable to cafes or small shops. Because of hype and poor business planning, many net cafes have closed down. Although the number of Internet cafes are growing, associations such as APWKomitel urge new Internet café owners to do a feasibility study before planning to open an Internet café, and provide a business model called multipurpose community Internet center or "MCI Center" to make the business more sustainable and competitive. Hourly usage rate varies between Rp 2500-15000 ($0,27 - 1,60)
Japan
Japan has a strong Internet cafe culture, with most serving a dual purpose as joint Internet-manga cafes. Most chains (like Media Cafe Popeye and Jiyū Kūkan) allow offer customers a variety of seating options, including normal chair, massage chair, couch, and flat mat. Customers are then typically given unlimited access to soft drinks, manga, magazines, Internet, online video games, and online pornography. Most offer food and shower services for an additional fee. In fact, many purchase "night packs" and shower/sleep in the cafes, giving rise to a phenomenon known as "net cafe refugee" or "net cafe homeless".
Kenya
Internet cafés are prevalent in the city of Mombasa, as poverty and unreliable infrastructure do not make personal Internet a viable option for many citizens. The cafés are often combined with a variety of other businesses, such as chemists, manicurists, repair shops, and convenience stores. Video gaming has become particularly profitable in Internet cafés in Kenya in recent years.
Philippines
In the Philippines, Internet cafés or better known as computer shops are found on almost every street in major cities and there is at least one in most municipalities or towns. There are also Internet cafés in coffee shops and malls. High-end restaurants and fast food chains also provide free broadband to diners. Rates range from P10 ($0.20) on streets, up to P100 ($2) in malls.
In some major cities with existing ordinances regulating Internet cafés (e.g. Valenzuela, Marikina, Davao, Lapu-lapu and Zamboanga), students who are below 18 years of age are prohibited from playing computer games during regular class hours. Depending on the city, regulations varies on their exact details and implementation. Such city ordinances usually also requires Internet café owners to:
Install filtering software to block adult oriented sites
Prohibit the sales of alcoholic drinks and cigarettes inside their establishment
Allow open view of rented computers (i.e. no closed cubicles)
Front wall panel is 50% transparent to allow a clear view of the interior of the establishment
Adequate lighting both inside and outside of the establishment to allow a clear view of the interior at all times
Sometimes installs a CCTV for increased security
Poland
The first Internet café in Poland was opened in 1996. Such establishments soon became very popular among the Polish population, especially young people, who at the time still rarely had access to computers with high-speed Internet at home. They were commonly used to play games like Icy Tower or Counter-Strike, as well as for instant messaging on the Gadu-Gadu client. Internet cafés began losing popularity after Telekomunikacja Polska launched the ADSL Neostrada service in 2001, providing home Internet access to many Poles, and most establishments were shut down by the 2010s.
Slovakia
In Slovakia, the first Internet café was opened officially in the city of Košice on July 17, 1996, providing services such as e-mail, Gopher, News, Telnet, WWW, Talk and others to the general public.
South Korea
In South Korea, Internet cafés are called PC bangs. They are ubiquitous in South Korean cities, numbering over 20,000. PC bangs mostly cater to online game playing for the younger generation. On average and mode, use of a PC bang computer is priced at around 1,000 won per hour (about $0.88 USD).
Taiwan
Internet cafés are omnipresent in Taiwan, and especially concentrated in major cities, namely Taipei and Kaohsiung.
The Internet café is called a "網咖" (Wǎng kā) in traditional Chinese. The first character literally means "net" and the second character is the first syllable of "café."The rate is consistent at about NT$10~20 in the most part, but prominent districts, such as the Eastern District of Taipei, can charge users up to NT$35 per hour. With the growth of smartphone ownership and free Wi-Fi networks in all major public attractions, the Internet cafés now primarily cater to gamers, and some even provide food and drinks.
Vietnam
In Vietnam, almost every Internet cafés advertises themselves as game centers. Many Internet cafés charges a fairly cheap fee, usually $0.1 - $0.25 an hour. Services such as food and drink are also often available.
Internet café in Vietnamese is quán net or tiệm net (quán or tiệm means store and net is Internet).
United States
Reputedly, the first kosher cybercafe was the IDT Cafe in New York City's diamond district, opened in the spring of 1997.
Internet cafés were typical in the 90's but began to decline in popularity due to the expansion of home based email and internet access points.
In popular culture
Popular movies like The Beach feature an Internet café.
See also
Capsule hotel
Kiosk software
Public computer
Notes
References
China Tightening Control Over Internet Cafes, 2003. Reuters, June 10.
Hong, J. and L. Huang (2006). "A split and swaying approach to building information society: The case of Internet cafes in China." Telematics and Informatics 22(4): 377-393.
John Flinn (1991). "High-Tech Small Talk at City's cafes", The San Francisco Examiner, Front Page.
Katherine Bishop (1992). "The Electronic Coffeehouse", New York Times.
John Boudreau (1993). "A Cuppa and a Computer", Washington Post, Front Page.
Marian Salzman (1995). "SFnet Leads Cyber Revolution", San Francisco Examiner.
SFnet.org, Press Archive.
Madanmohan Rao(1999), Bringing the Net to the Masses: cybercafes in Latin America
Connected for development-Information Kiosks & Sustainability - UN ICT TaskForce Series 4
ITU 'Global Indicators Workshop on Community Access to ICTs' di Mexico City, 16-19 November 2004
Here's to the Techies Who Lunch, New York Times, August 27, 1994
report on Yahoo's best cafes, 2004.
Xiao, Q., 2003. China's Internet Revolution. USC Annenberg Online Journalism Review.
External links
World of Internet Cafes
Types of coffeehouses
South Korean inventions
Coffee culture
Hotel types |
853219 | https://en.wikipedia.org/wiki/Icecast | Icecast | Icecast is a streaming media project released as free software maintained by the Xiph.Org Foundation. It also refers specifically to the server program which is part of the project. Icecast was created in December 1998/January 1999 by Jack Moffitt and Barath Raghavan to provide an open-source audio streaming server that anyone could modify, use, and tinker with. Version 2, a ground-up rewrite aimed at multi-format support (initially targeting Ogg Vorbis) and scalability, was started in 2001 and released in January 2004.
History
Icecast was originally developed by Moffitt in 1998 for SMU's radio station. At the time, the station was constantly losing its FCC license and was at the time only able to reach listeners in the same building. Given that all of the dorms throughout campus had Ethernet connectivity, using streaming audio to broadcast was a natural solution, but currently available audio streaming software, such as RealAudio, was too expensive. Moffitt created Icecast, allowing the station to easily reach everwhere on campus without the necessity of FCC licensing or a transmitter upgrade. Initially developed to support mp3's, Vorbis support was added shortly after.
Technical details
The Icecast server is capable of streaming audio content as Opus or Vorbis over standard HTTP, video as WebM or Theora over HTTP, and MP3, AAC, and NSV over the SHOUTcast protocol. Theora, AAC, and NSV are only supported in version 2.2.0 and newer.
Icecast requires external programs, called "source clients", to originate the streams, and the Icecast project includes a source client program known as IceS. The source runs typically in the place where the audio is generated (e.g., a studio) and the Icecast server where a high-bandwidth connection is available (e.g., a colocation centre). Since version 2.4.0 source clients can use plain HTTP standard PUT requests instead of the custom SOURCE method.
Supported file formats
See also
List of streaming media systems
SHOUTcast
Peercasting
Edcast
References
External links
article in Streaming Media magazine: The Birth of Icecast
Free audio software
Internet radio software
Xiph.Org projects
Streaming software
1999 software |
20155029 | https://en.wikipedia.org/wiki/CyberArk | CyberArk | CyberArk is a publicly traded information security company offering identity management. The company's technology is utilized primarily in the financial services, energy, retail, healthcare and government markets. CyberArk is headquartered in U.S. headquarters located in Newton, Massachusetts. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.
History
CyberArk was founded in 1999 by Alon N. Cohen and current CEO Udi Mokady who assembled a team of security engineers who implemented the digital vault technology ().
In June 2014, CyberArk filed for an Initial public offering (IPO) with the Securities and Exchange Commission, listing 2013 revenues of $66.2 million. CyberArk became a public company the same year, trading on the NASDAQ as CYBR. In the years following its IPO, CyberArk made a string of security acquisitions.
2015: CyberArk acquired the private Massachusetts-based company Viewfinity, which specialized in privilege management and application control software, for $39.5 million.
2017: CyberArk acquired Massachusetts-based cybersecurity company Conjur Inc., which secured access for software development and IT teams that are building cloud-based software, for $42 million.
2018: CyberArk acquired assets of Boston-based cloud security provider Vaultive. Twenty Vaultive employees, most from the company's research and development team, joined CyberArk.
2019: CyberArk acquired identity startup Idaptive for $70 million.
In February 12, 2020 CyberArk said it had over 5,300 customers.
References
Companies listed on the Nasdaq
Computer companies of the United States
Software companies based in Massachusetts
Software companies of Israel
Software companies of the United States
1999 establishments in the United States
1999 establishments in Massachusetts
Software companies established in 1999
Companies established in 1999
Companies based in Massachusetts |
29589750 | https://en.wikipedia.org/wiki/Satellite%20television%20by%20region | Satellite television by region | Satellite television varies in the different regions around the world.
Africa
South African-based Multichoice's DStv is the main digital satellite television provider in sub-Saharan Africa, broadcasting principally in English, but also in Portuguese, German and Afrikaans. Multichoice's DStv had 6 million paid subscribers on 30 September 2016.
CanalSat Afrique, owned by France's Canal+ and Vivendi, is the main provider in French-speaking Africa. Another entrant into the satellite television circuit in Africa is MyTv Africa, a subsidiary of Dubai-based Strong Technologies.
The launch of Free2view has made satellite TV available to the masses in Africa. Free2view currently broadcasts MSNBC as its exclusive news channel and is about to roll out additional channels.
GTV (Gateway TV) - to differentiate from Ghana Television (GTV)-, a British-based company, became the next contender in sub-saharan Africa providing digital satellite television. But on January 30. 2009, the Board of Directors of Gateway Broadcast Services (GBS) approved plans to liquidate the company which was later shut down. GBS was the operator behind GTV, a popular, if niche Direct to Home (DTH) satellite Pay-TV service present in 22 African markets. The collapse of GBS was sudden for its employees, its customers and those who have long believed that there is mass-market potential in African pay-TV.
Star DTV, a Chinese company which launched in 2009 has managed to reach about 800,000 households in October 2011.
In 2010, ZAP launched in Angola, providing digital satellite television mainly for Portuguese speaking countries in sub-Saharan Africa.
Satellite television has been far more successful in Africa than cable, primarily because the infrastructure for cable television does not exist and would be expensive to install owing to the living style of most Africans who live in rural areas. Furthermore, maintaining a cable network is expensive due to the need to cover larger and more sparsely populated areas though there are some terrestrial pay-TV and MMDS services.
Nigeria
Traditionally DStv had held a large market share in Nigeria's Satellite television sector but several companies, HiTV, MyTV, Trend TV, ACTV, Consat, Daarsat, Metrodigital, Montage cable network and StarTimes also compete in this sector.
Sudan
Sudan TV, the government-owned national network, is available by satellite as well as broadcast.
America
United States
Currently, there are two primary satellite television providers of subscription based service available to United States consumers: DirecTV, and Dish Network.
Canada
Currently, there are two primary satellite television providers of subscription based service available to Canadian consumers: Bell Satellite TV and Shaw Direct. The CRTC has refused to license American satellite services, but nonetheless hundreds of thousands (up to a million by some estimates) of Canadians access or have accessed American services — usually these services have to be billed to an American address and are paid for in U.S. dollars, although some viewers receive American signals through "pirate decryption". Whether such activity is grey market or black market is the source of often heated debate between those who would like greater choice and those who argue that the protection of Canadian firms and Canadian culture is more important. In October 2004, Quebec Judge Danièle Côté ruled Canada's Radiocommunication Act to be in direct violation of the Canadian Charter of Rights and Freedoms, in so far as it bans reception of unlicensed foreign television services. The judgment gave the federal government a one-year deadline to remedy this breach of the Constitution. However, this contradicts prior Supreme Court of Canada decisions and was overturned on appeal. A Supreme Court of Canada decision in the case of Bell ExpressVu v. Richard Rex, made on April 26, 2002, confirms that provisions in the Radiocommunication Act forbid the illegal decoding of satellite television programming.
Although there are no official statistics, the use of American satellite services in Canada appears to be declining as of 2004. Some would claim that this is probably due to a combination of increasingly aggressive police enforcement and an unfavourable exchange rate between the Canadian and U.S. currencies. As the U.S. dollar has been declining as of 2005 versus other international currencies, the decline in DirecTV viewership in Canada may well be related not to a cost difference as much as to the series of smart card swaps which have rendered the first three generations of DirecTV access cards (F, H and HU) all obsolete. Bell underwent a period of phasing out satellite receivers in urban areas, replacing it with IPTV transmitted over regular telephone lines.
Hispanic America
Hispanic America's main satellite systems are SKY México with 3 million subscribers and Dish México with 2.2 million subscribers and Vrio, which provides service to the rest of the Americas, with a total of approximately 1.3 million subscribers.
Chile
There are several satellite providers in Chile. The main ones are listed below:
DirecTV
Movistar TV
Claro TV
TuVes HD
Entel (Chile)
Brazil
There are about 10 million subscribers of satellite TV in Brazil; the main satellite system is SKY Brasil with approximately 1.4 million subscribers; other satellite TV operators are Vivo TV, Claro TV and Oi TV. A major problem are pirate receivers (usually using card sharing systems to cheat the conditional access systems) which amount to an unknown quantity of users.
The service offered in Brazil includes Digital TV with full Dolby Digital surround support, mts and multiple subtitle options, a first for the Brazilian market. A recent update to Sky's services in Brazil is Sky+ which allows the customer to record a program while watching another one and also Sky HD which currently provides up to 29 high definition channels. Services are however relatively expensive, therefore market penetration is still limited.
Asia
Bangladesh
All privately owned television channels in Bangladesh broadcast via satellite television, and terrestrial television signals are only used by state-owned Bangladesh Television. There is only one satellite providers in Bangladesh, Akash DTH.
India
Over 1340 TV Satellite channels are broadcast in India. This includes channels from the state-owned Doordarshan, News Corporation owned STAR TV, Sony owned Sony Entertainment Television, Sun Network and Zee TV. Major satellite television providers in India are DD Direct Plus, Dish TV, Airtel digital TV, Reliance Digital TV, Videocon d2h, Sun Direct and Tata Sky. Most of them have already started their premium HDTV services.
These services are provided by locally built satellites from ISRO such as [15] INSAT 4CR, INSAT 4A, INSAT-2E, INSAT-3C and INSAT-3E as well as private satellites such as the Dutch-based SES, Global-owned NSS 6, Thaicom-2 and Telstar 10.
Indonesia
The first satellite television provider in Indonesia, Indovision (currently MNC Vision), was established on 16 January 1994; initially utilizing Palapa B2P satellite. Today there are a bunch of satellite television providers as well as satellite channels, both free-to-air and pay. Satellite television providers, other than MNC Vision, include K-Vision (also owned by MNC Vision), Nex Parabola, and Transvision. Satellite channels include IDX Channel and SEA Today.
Japan
The medium-scale Broadcasting Satellite for Experimental Purposes (BSE) was planned by Ministry of Posts and Telecommunications (MOPT) and developed by the National Space Development Agency of Japan (NASDA) since 1974. After that, the first Japanese experimental broadcasting satellite, called BSE or Yuri, was launched in 1978. NHK started experimental broadcasting of TV program using BS-2a satellite in May 1984.
The satellite BS-2a was launched in preparation for the start of full scale 2-channel broadcasts. Broadcasting Satellite BS-2a was the first national DBS (direct broadcasting satellite), transmitting signals directly into the home of TV viewers. Attitude control of the satellite was conducted using the 3 axial method (zero momentum), and design life was 5 years. The TV transponder units are designed to sufficiently amplify transmitted signals to enable reception by small, 40 or 60 cm home-use parabolic antennas. The satellite was equipped with 3 TV transponders (including reserve units). However, one transponder malfunctioned 2 months after launch (March 23, 1984) and a second transponder malfunctioned 3 months after launch (May 3, 1984). So, the scheduled satellite broadcasting had to be hastily adjusted to test broadcasting on a single channel.
Later, NHK started regular service (NTSC) and experimental HDTV broadcasting using BS-2b in June 1989. Some Japanese producers of home electronic consumer devices began to deliver TV sets, VCRs and even home acoustic systems equipped by built-in satellite tuners or receivers. Such electronic goods had a specific BS logo.
In April 1991, Japanese company JSB started pay TV service while BS-3 communication satellite was in use. In 1996 total number of households that receive satellite broadcasting exceeded 10 million.
The modern two satellite systems in use in Japan are BSAT and JCSAT; the modern WOWOW Broadcasting Satellite digital service uses BSAT satellites, while other system of digital TV broadcasting SKY PerfecTV! uses JCSAT satellites.
Kazakhstan
The first satellite TV channel in Kazakhstan, CaspioNet, was launched by the Khabar news agency in 2002.
Malaysia
Malaysia's sole satellite television operator, Measat Broadcast Network Systems (a subsidiary of Astro All Asia Networks plc) launched Astro in 1996. It currently holds exclusive rights from the Malaysian government to offer satellite television broadcasting services in the country through the year 2017.
Mongolia
The Naran station (aka Orbit Station) is first satellite television in Mongolia. In 1991, Naran Station broadcast one channel, which is MNB. In 2005, Naran station extended the channel list up to 4 FTA channels. In 2010 they stopped television broadcast. Government has decided to allow private company does the service in 2008. DDishTV broadcast 18 channels, including 15 local channels and 3 foreign channels since 2008. DDishTV LLC is the satellite television operator in Mongolia.
Pakistan
In the recent years, there has been a lot of investment in television industry in Pakistan. There are more than 34 Satellite channels operating directly inside Pakistan and about 10 operating their broadcasting from Dubai, Thailand, Bangkok and UK.
Philippines
Satellite TV in the Philippines began in 2001 when the first pay DTH service Dream Satellite TV was launched. In 2009, both Cignal and G Sat were launched on the NSS 11 broadcasting satellite. Later, these satellite TV providers began offering HD. However, G Sat HD has different channels than Cignal HD. Later in 2012, Cignal began to move their programming to SES-7 for similar coverage. These are the main satellite TV providers in the Philippines:
Dream Satellite TV is a pay DTH service of Philippine Multimedia Service Inc. (PMSI)
Cignal is a pay DTH service of Mediascape Inc.
G Sat is a pay DTH service of FUBC.
Sky Direct is a pay DTH service of Sky.
Sri Lanka
Satellite TV in Sri Lanka began in 2005 as CBNsat. However, it was later acquired by the island's mobile GSM Operator, Dialog and was relaunched as Dialog TV. In 2015 Dish TV India started their operations in Sri Lanka in a joint venture with Satnet (Pvt) Ltd, as Dish TV Lanka which is now the 2nd largest DTH Operator in the island.
Thailand
TrueVisions is the leading pay TV service of Thailand which operate cable TV in Bangkok and satellite TV across the country. TrueVisions is owned by True Corporation. VIet Nam sat is just launched in 4/2008 and GMM Grammy is the second pay TV service of Thailand.
Oceania
Australia
Satellite television in Australia has proven to be a far more feasible option than cable television, due to the vast distances between population centres. The first service to come online in Australia was Galaxy, which was later taken over by Cable Television giant Foxtel, which now operates both cable and satellite services to all state capital cities (except Darwin and Hobart) and the whole of Western Australia. Its main metropolitan rival was Optus Vision, while rural areas are served by Austar, both of which just rebroadcast Foxtel as of 2005. In 2006 SelecTV began operating, aiming at providing comparatively low cost packages and catering to specialised market segments. In 2010, SelecTV ceased operation and handed over all of their English-language content customers to Foxtel.
New Zealand
In New Zealand, SKY Network Television offers multichannel digital satellite TV, and once offered non-digital terrestrial UHF service which was shut down progressively during the first half of 2010. The newly released Freeview service is also available on the Optus D1 satellite, as well as a High Definition digital terrestrial service.
Europe
Continental Western Europe
In Europe, DBS satellite services are found mainly on SES Astra and Eutelsat Hotbird fleets. Sky Group, owned by Comcast, operates with his subsidiaries in the United Kingdom, in the Republic of Ireland, in Italy, in Germany, in Austria and in Switzerland. Canal Digitaal and UPC are the main providers in the Netherlands and Central Europe, respectively. Vivendi's owned Canal+ is the main provider in France.
The overall market share of DBS satellite services in 2004 was 21.4% of all TV homes, however this highly varies from country to country. For example, in Germany, with many free-to-air TV-stations, DBS market share is almost 40%, and in Belgium and the Netherlands, it's only about 7%, due to the widespread cable networks with exclusive content.
From about Lyon south through France and all of Spain Portugal and Morocco there are many English Language TV channels on Arabsat and Nilesat. These include BBC News, MBC, Fox Movies, many sport channels from the Near East and Egypt. A 90 cm dish is enough but twist the LNB slightly clockwise as you go south. Try first Arabsat 26 degrees east, a bit higher that Astra 2. 11919 H should get you MBC Action. Nilesat is a bit to the right and has mostly the same channels.
Portugal
In Portugal, satellite television is received mostly through the free-to-air tuning of Eutelsat Hot Bird satellites through private parabolic antennas.
Spain
Spain's company Hispasat operates satellites for free channels and several payment platforms.
However, the most common operator Movistar+, broadcast via Astra and lately push their clients to use their own fiber internet network, if it's available.
United Kingdom and Ireland
The first commercial DBS service in the United Kingdom, Sky Television, was launched in 1989 and used the newly launched SES Astra 1A satellite, providing 4 analogue TV channels. The channels and subsequent VideoCrypt video encryption system used the existing PAL broadcast standard. This gave Sky a distinct advantage over the winner of the UK state DBS licence, BSB.
In the following year, after many delays, BSB was launched, broadcasting five channels (Now, Galaxy, The Movie Channel, The Power Station and The Sports Channel) in D-MAC format and using the EuroCypher video encryption system which was based heavily on the General Instruments VideoCipher system used in the US. While the BSB's broadcast standard and system was technologically more advanced than the PAL based Sky system and one of the main selling points of the BSB offering was the Squarial, an expensive flat plate antenna and LNB. Sky's system used conventional cheap dish and LNB technology. The BSB system used an integrated receiver / decoder whereas the Sky system had standalone decoders and integrated receiver decoders. This allowed Sky to market directly to an audience that already had satellite TV systems.
The competition between the two companies was fierce and bidding wars over the UK rights to movies. Sky kept costs to a bare minimum, operating from an industrial park in Isleworth in West London. BSB had expensive offices in London (Marco Polo House). The two services subsequently merged to form British Sky Broadcasting (BSkyB) though the new BSkyB was really Sky. The technologically more advanced BSB D-MAC/EuroCypher system was gradually replaced with Sky's VideoCrypt video encryption system.
In 1994 17% of the group was floated on the London Stock Exchange (with ADRs listed on the New York Stock Exchange), and Rupert Murdoch's News Corporation owns a 35% stake.
By 1999, following the launch of several more satellites (at 19.2°E by SES), the number of channels had increased to around 60 and BSkyB launched the first subscription-based digital television platform in the UK, offering a range of 300 channels broadcast from the SES Astra satellites at 28.2°E under the brand name Sky Digital. BSkyB's analogue service was discontinued on 31 December 2001 and all customers have migrated to Sky Digital.
In May 2008, a free-to-air satellite service from the BBC and ITV was launched under the brand name Freesat, carrying a variety of channels, including some content in HD formats.
Comcast, the largest cable TV provider in the US, outbid 21st Century Fox and its backer, Disney, on September 22, 2018 in an auction for control of Sky UK. Its shareholders have until October 11, 2018 to accept or reject the offer.
Russian Federation
The first Soviet communication satellite, called Molniya (Молния, or "Lightning"), was launched in 1965. By November 1967, the national system of satellite television, called Orbita, was deployed. The Communist party considered propaganda as the very important task, and the only allowed (later two) TV channel of the central government had to be delivered to regions on a huge territory, and, if possible, abroad. The system consisted of three highly elliptical Molniya satellites, Moscow-based ground uplink facilities and about 20 downlink stations, located in cities and towns of remote regions of Siberia and the Far East. Each station had a 12-meter receiving parabolic antenna and transmitters for re-broadcasting TV signal to local householders.
However, a large part of Soviet central regions were still not covered by transponders of Molniya satellites.
By 1976, Soviet engineers developed a relatively simple and inexpensive system of satellite television (especially for Central and Northern Siberia). It included geostationary satellites called Ekran equipped with powerful 300 W UHF transponders, a broadcasting uplink station and various simple receiving stations located in various towns and villages of Siberian region. The typical receiving station, also called Ekran, represented itself as a home-use analog satellite receiver equipped with simple Yagi-Uda antenna. Later, Ekran satellites were replaced by more advanced Ekran-M series satellites.
In 1979 Soviet engineers developed Moskva (or Moscow) system of broadcasting and delivering of TV signal via satellites. New type of geostationary communication satellites, called Gorizont, were launched. They were equipped by powerful on-board transponders, so the size of receiving parabolic antennas of downlink stations was reduced to 4 and 2.5 meters (in comparison of early 12-meter dishes of standard orbital downlink stations).
By 1989 an improved version of Moskva system of satellite television has been called Moskva Global'naya (or Moscow Global). The system included a few geostationary Gorizont and Express type of communication satellites. TV signal from Moscow Global's satellites could be received in any country of planet except Canada and North-West of the US.
Modern Russian satellite broadcasting services based on powerful geostationary buses such as Gals, Ekspress, USP and Eutelsat which provide a large quantity of free-to-air television channels to millions of householders. Pay-TV is growing in popularity amongst Russian TV viewers. The NTV Russia news company, owned by Gazprom, broadcasts the NTV Plus package to 560,000 households, reaching over 1.5 million viewers.
Tricolor TV (Russian: Триколор ТВ) the biggest satellite television operator. It broadcasts a pack of TV channels in the European part of Russia and most of Siberian, Ural and Far East regions. Broadcasting in the European part has been held since December 2005 from esv Eutelsat W4. Broadcasting in the Eastern regions began in December 2007.
The principal difference between Tricolor TV and other Russian satellite TV operators is a pack of free channels broadcasts by Tricolor TV. There are 12 federal channels including "Pervy", "Rossiya", "NTV", "STS", "Bibigon" and others in the free "Basic" pack. Except these, there are 19 more TV channels for the whole family. The budget pack of satellite channels turned to be very popular among Russian viewers. The number of Tricolor TV's subscribers is the largest in Russia. In December 2009, the audience of Tricolor TV reached 6,000,000 households.
Turkey
Turkey's first satellite television channel called TRT launched Intelsat satellite in 1987. On March 1, 1989, Turkey's first private TV channel Star TV (previous Magic Box or Star1) test transmission Eutelsat I F-5 satellite in Germany. In 1990, Star1 channel terrestrial TV transmitter with receive satellite on Turkey.
In 1994, Türksat 1B first television channel such as Kent Medya, Kanal E, CTV, BTV, Dokuz TV, KTV, HBB, Süper Kanal, Best TV, Medya Teknik Servisler, UBA, Yavuz RTV, Özdil TV or MNG TV.
In 1995, Eutelsat satellite transmitted four Turkish TV channel TRT int, atv, TGRT or Interstar.
In 1996, Turkey's first digital satellite television channel is Meltem TV. Türksat 1C first television channel such as TRT 1, TRT 2/GAP, TRT 3, TRT 4, TRT int, TRT int-Avrasya, atv, atv int, Kanal D, Euro D, Show TV, Kanal 6, Kanal 7, Samanyolu TV, HBB, Cine5, Maxi TV / Supersport TV, Flash TV, Prima TV, Genç TV, Eko TV, Number One TV, TV1 Azerbaijan, Sun TV, Mesaj TV, Meltem TV, Discovery Channel Turkey, Nickelodeon Turkey, Süper TV or Cumhuriyet TV.
In 2018, Turkey's watches commonly satellite % 80 penetration.
Analogue satellite broadcasting has been discontinued TRT since February 2006.
Turkey's satellite TV is majority Türksat satellite over 300+ free-to-air television or radio channel.
Nordic countries
The first satellite service specifically set to the Nordic region was TV3 which launched in 1987. With the launch of Astra 1A, getting the TV3 channel got easier. The first Nordic-specific satellite, Tele-X, was launched in 1989. The services directed at Scandinavia were then scattered among several satellites. In 1993, the former BSB satellites were bought by a Swedish and a Norwegian company, respectively. These two satellites were renamed Thor 1 and Sirius 1, moved to new positions and started broadcasting services intended for people in the Nordic region. With the launch of additional Thor and Sirius satellites later in the 1990s, Astra and other satellites were abandoned by the Nordic services with almost all Nordic satellite television migrating to the Sirius and Thor satellites.
Initially the basic channels were free-to-air. This caused several rights problems since viewers throughout Europe were able to see very much acquired English language programming as well as sports for free on the Nordic channels, although the channels only held broadcasting rights for specific countries. One way of avoiding that was to switch from PAL to the D2-MAC standard, hardly used anywhere outside the Nordic region. An unencrypted channel could still be seen in all the Nordic satellite homes, so eventually all channels went encrypted (several of them only being available in one country).
There are two competing satellite services: Canal Digital (Norwegian Telenor) and Viasat (Kinnevik). Canal Digital launched in 1997 and was digital from the start, broadcasting from Thor. Kinnevik had been operating an analogue subscription service since the late 1980s, but waited until the year 2000 before launching a digital service. All analogue services from Thor and Sirius will have ceased in 2006, when the three remaining Danish channels go digital-only. The competition between Viasat and Canal Digital has caused some homes in Scandinavia to have to buy two set-top boxes and have two subscriptions to get the full range of channels. Viasat doesn't provide their own channels (TV3, TV3+, ZTV, TV1000 and the Viasat-branded channels) on the Canal Digital platform. Canal Digital does however have exclusive distribution of channels from SBS Broadcasting, Discovery, TV2 Denmark and Eurosport; for several years the Swedish SVT and TV4 channels were also exclusive to Canal Digital.
Middle East and North Africa
The Middle East has a high penetration of homes receiving TV channels via DTH satellite. One of the pioneers of free-to-air digital satellite television is considered to be MBC, which began broadcasting in C band through Arabsat and is the first network in the world to offer a free-to-air Western based English language movie channel to the Middle East audience via its spinoff channel MBC 2. Its direct rival is considered to be Dubai, UAE based Dubai One, earlier called Ch33 then One TV, which was the first channel in the Middle East and North Africa to provide English language general entertainment programing for both Arabs and the expatriate community.
Nourmina Channel is the first satellite channel owned by a Jordanian national of the private sector, which broadcasts on Nile Sat reluctantly 12303H, which covers all the Arab countries, Africa and most parts of Europe
- The first digital DTH pay-TV network to provide Indian Entertainment was Orbit Satellite Television and Radio Network broadcasting via Eurobird 2 (Ku band).
Arab Radio and Television Network (ART) is an Arabic-language television network characterized by its multitude of channels. It is based in Jeddah, Saudi Arabia, Founded in 1993.
Showtime Arabia Founded in 1993, a joint venture between Viacom (21% stake) and KIPCO (79% stake) started broadcasting.
beIN Sports is a popular sports channel launched in November 2003 as Al Jazeera Sport,
beIN Sports also owns the exclusive broadcasting rights in the Arab Middle East for the most important sporting events.
In a year 2009 advertise incorporation Between Orbit and Showtime Arabia to become under the name OSN.
In the same year rise beIN Sports buying ART sport channels which it had owned the rights fifa world cup. The news sparked uproar in the Arab countries, ART has sold broadcast channels remained to OSN, to announce the death of ART Network.
Israel
In Israel, the satellite television provider yes was founded in 2000. It broadcasts multichannel TV and VOD services via satellites Amos-3 and Amos-7. It also offers DVR capabilities (similar in function to the TiVo) and 4K support.
References
Satellite television |
345508 | https://en.wikipedia.org/wiki/System%207%20%28disambiguation%29 | System 7 (disambiguation) | System 7 or System/7 may refer to:
Computing
IBM System/7, a minicomputer developed by IBM; premiered in 1971
Operating systems:
Macintosh System 7, the Apple operating system introduced in 1991
Operating System/7, the UNIVAC operating system introduced in 1974
System Manager 7, a successor to Multiuser DOS by Datapac
Version 7 Unix, otherwise known as (Unix Time Sharing) System 7; released in 1979
Other
System 7 (album), eponymous, debut studio album of System 7; released in 1991
System 7 (band), a British electronic music duo
Signalling System 7, telephony signaling protocols
System 7 Napoleonics, tabletop miniatures wargaming
STS-7 (Space Transportation System-7), the Space Shuttle mission
See also
Series 7 (disambiguation) |
4583603 | https://en.wikipedia.org/wiki/HRS-100 | HRS-100 | HRS-100, ХРС-100, GVS-100 or ГВС-100, (see Ref.#1, #2, #3 and #4) (, , ) was a third generation hybrid computer developed by Mihajlo Pupin Institute (Serbia, then SFR Yugoslavia) and engineers from USSR in the period from 1968 to 1971. Three systems HRS-100 were deployed in Academy of Sciences of USSR in Moscow and Novosibirsk (Akademgorodok) in 1971 and 1978. More production was contemplated for use in Czechoslovakia and German Democratic Republic (DDR), but that was not realised.
HRS-100 was invented and developed to study the dynamical systems in real and accelerated scale time and for efficient solving of wide array of scientific tasks at the institutes of the A.S. of USSR (in the fields: Aerospace-nautics, Energetics, Control engineering, Microelectronics, Telecommunications, Bio-medical investigations, Chemical industry etc.).
Overview
HRS-100 was composed of:
Digital computer:
central processor
16 kilowords of 0.9 μs 36-bit magnetic core primary memory, expandable to 64 kilowords.
secondary disk storage
peripheral devices (teleprinters, punched tape reader/punchers, parallel printers and punched card readers).
multiple Analog computer modules
Interconnection devices
multiple analog and digital Peripheral devices
Central processing unit
HRS-100 has a 32-bit TTL MSI processor with following capabilities:
four basic arithmetic operations are implemented in hardware for both fixed point and floating point operations
Addressing modes: immediate/literal, absolute/direct, relative, unlimited-depth multi-level memory indirect and relative-indirect
7 index registers and dedicated "index arithmetic" hardware
32 interrupt "channels" (10 from within the CPU, 10 from peripherals and 12 from interconnection devices and analog computer)
Primary memory
Primary memory was made up of 0.9 μs cycle time magnetic core modules. Each 36-bit word is organized as follows:
32 data bits
1 parity bit
3 program protection bits specifying which program (Operating System and up to 7 running applications) has access
Secondary storage
Secondary storage was composed of up to 8 of the CDC 9432D removable-media disk drive devices. Capacity of one set of disk platters was about 4 million 6-bit words or 768,000 words of HRS-100 computer. Total, combined, capacity of 8 drives is, therefore, 6,144,000 words. Each disk set comprised 6 platters out of which 10 surfaces are used. Data was organized into 100 cylinders and 16 1536-bit sectors (48 HRS-100 words).
Average data access time was 100 ms (max. 165 ms). Maximum seek time was 25 ms. Raw transfer sector write speed was 208,333 characters/s.
Peripherals
Peripherals communicate with the computer using interrupts and full length of HRS-100 words. Each separate unit has its own controller. Following devices were produced or planned:
5 to 8 channel Punched tape reader type PE 1001 (500-1000 characters/s)
5 to 8 channel Tape puncher type PE 4060 (150 characters/s)
IBM 735 teleprinter (88 character set, 7-bit data + 1 parity bit, printing speed: 15 characters/s)
Fast line printer DP 2440 (up to 700 lines/min, 64-character set, 132 characters per line)
Standard 80-column punched card reader DP SR300 (reading up to 300 cards/min)
Interconnection hardware
Interconnection hardware (called simply "Link") connects digital and analog components of HRS-100 into a single unified computer. It comprised:
Control unit for exchange of logic signals
Blocks of A/D and D/A converters
16-bit 100 μs clock generator
Conversion channel relay block
Power supply
Link takes commands from a digital computer component and organizes their execution via 2 32-bit data channels, 11 control channels, synchronization signals via 3 channels and 9 interrupt channels. Connection between a digital and analog computers is established through a "common-control panel" and two separate consoles. Communicating digital data with analog consoles is done through 16 control, 16 sensitivity, 16 indicator and 10 functional "lines".
Analog-to-digital conversion is achieved by a single signed 14-bit 70,000 samples/s A/D converter and a 32-channel multiplexer. Digital-to-analog conversion is achieved by 16 independent signed 14-bit D/A converters with double registers. Typical D/A conversion took 2 μs.
Analog computer
Analog component of HRS-100 system is composed of up to seven analog machines all connected to the common-control panel. It contains all elements required to independently solve linear and non-linear differential equations, both directly and iteratively.
Units of analog computer:
linear analog calculation elements
non-linear analog calculation elements
parallel logic elements
electronic potentiometer system
calculation module and parallel logic control system
periodic block
control system
address system
measurement system
exchangeable program board (analog and digital)
reference voltage supply
Linear analog computer elements were designed to facilitate 0.01% precision in static mode and 0.1% in dynamic mode, for signals up to 1kHz. Non-linear elements precision was not required to be better than 0.1%.
Analog component of HRS-100 has its own peripheral units:
multi-channel ultraviolet writer
three-colour oscilloscope
X-Y writer
Development team
HRS-100 was designed and developed by the following team (see Ref.#1, #4, #5, and #6):
Principal Science Researchers: Prof. Boris Yakovlevich Kogan (Institute of Control Sciences - IPU AN.USSR, Moscow), Petar Vrbavac and Georgi Konstantinov (Mihajlo Pupin Institute, Belgrade).
Chief designers:
Digital part: Svetomir Ojdanić, Dušan Hristović (SFRY), A. Volkov, V. Lisikov (USSR)
Analogue part: B.J.Kogan, N. N. Mihaylov (USSR), Slavoljub Marjanović, Pavle Pejović (SFRY)
Link: Milan Hruška, Čedomir Milenković (SFRY), A. G. Spiro (USSR)
Software: E. A. Trahtengerc, S.J.Vilenkin, V. L. Arlazarov (USSR), Nedeljko Parezanović (SFRY).
See also
History of computer hardware in the SFRY
Mihajlo Pupin Institute
List of Soviet computer systems
Reference literature
HRS-100 (Hardware and Design Principles), pp. 3–52, by prof. Boris J.Kogan(Ed), IPU AN.USSR, Moscow, 1974 (in Russian).
HRS-100, Proceedings of Intern. Congress AICA-1973, Prague, pp. 305–324, 27–31.August 1973.
Analog Computing in the Soviet Union, by D. Abramovitch, IEEE Control Systems Magazine, pp. 52–62, June 2005.
Hybrid Computing System HRS-100, by P.Vrbavac, S.Ojdanic, D.Hristovic, M.Hruska, S.Marjanovic, Proc. of the 6. Int. Symp. on Electronics and Automation, pp. 347–356, Herceg Novi, Yugoslavia, 21–27.June 1971.
Development of the Computing Technology in Serbia (Razvoj Racunarstva u Srbiji), by Dušan Hristović, Phlogiston journal, No 18/19, pp. 89–105, Museum of the science and technology (MNT-SANU), Belgrade 2010/2011.
"50 Years of Computing in Serbia"(50 Godina Racunarstva u Srbiji), by D.B.Vujaklija and N.Markovic(Ed),pp. 37–44, DIS,IMP and PC Press, Belgrade 2011. (In Serbian).
Mihajlo Pupin Institute
Analog computers
Soviet Union–Yugoslavia relations
One-of-a-kind computers
Soviet computer systems
1960s in Belgrade
1970s in Belgrade |
19934363 | https://en.wikipedia.org/wiki/UIP%20%28micro%20IP%29 | UIP (micro IP) | The uIP is an open-source implementation of the TCP/IP network protocol stack intended for use with tiny 8- and 16-bit microcontrollers. It was initially developed by Adam Dunkels of the Networked Embedded Systems group at the Swedish Institute of Computer Science, licensed under a BSD style license, and further developed by a wide group of developers.
uIP can be very useful in embedded systems because it requires very small amounts of code and RAM. It has been ported to several platforms, including DSP platforms.
In October 2008, Cisco, Atmel, and SICS announced a fully compliant IPv6 extension to uIP, called uIPv6.
Implementation
uIP makes many unusual design choices in order to reduce the resources it requires. uIP's native software interface is designed for small computer systems with no operating system. It can be called in a timed loop, and the call manages all the retries and other network behavior. The hardware driver is called after uIP is called. uIP builds the packet, and then the driver sends it, and optionally receives a response.
It is normal for IP protocol stack software to keep many copies of different IP packets, for transmission, reception and to keep copies in case they need to be resent. uIP is economical in its use of memory because it uses only one packet buffer. First, it uses the packet buffer in a half-duplex way, using it in turn for transmission and reception. Also, when uIP needs to retransmit a packet, it calls the application code in a way that requests for the previous data to be reproduced.
Another oddity is how uIP manages connections. Most IP implementations have one task per connection, and the task communicates with a task in a distant computer on the other end of the connection. In uIP, no multitasking operating system is assumed. Connections are held in an array. On each call, uIP tries to serve a connection, making a subroutine call to application code that responds to, or sends data. The size of the connection array is a number that can be adjusted when uIP is recompiled.
uIP is fully compliant with the RFCs that define TCP, UDP and IP. It also implements the mandatory maintenance protocol ICMP.
Versions
uIP 0.9 is the version with the least dependence on operating systems, the smallest resource use, and the only version that presents a pure event loop API, but in its original form does not support IP version 6, only the older, more common IPv4. It may be used in embedded systems with very small amounts of resources.
It was delivered with a set of examples of higher-level protocols that also run on an event loop system, including HTTP (a simple web server), SMTP (simple mail transmission protocol), FTP (file transfer protocol), telnet (terminal emulation), and others. Despite the examples and its small size, uIP 0.9 can be difficult to apply because it does not use any form of socket API.
uIP is widely used code with well-known weaknesses. The design minimizes and separates 32-bit arithmetic so that it can be adjusted or optimized for 8 and 16-bit CPUs. Also, 16-bit software timers (common on small microcontrollers) can overflow and cause defective operation. This can be fixed with a timer system that does not overflow (e.g. the timers count down or use modular arithmetic).
Another issue is that its single packet buffer can have substantial throughput problems because a PC host usually delays the "ACK" packet, waiting for more packets. In slow, serial port implementations, the ack-throughput can be fixed by modifying uIP to send every packet as two half-packet fragments. uIP systems with fast ethernet or WiFi can modify the hardware driver to send every packet twice.
Some PCs do not correctly respond to a fast uIP system on a local ethernet, because the uIP system can start a responding packet before the PC is ready to receive it. The solution is to call the uIP system less frequently in the main loop (Windows PCs are designed for a response time of about 1 millisecond). Typical implementations of uIP have a fixed IP address, which can make them impractical in real networks, although some have implemented DHCP.
Later versions of uIP, including the reference version of uIPv6, are integrated with Contiki, an operating system that uses coroutines for cooperative multitasking. Contiki provides the multitasking needed by a simplified socket API, simplifying the use of uIP. These versions may be less popular than 0.9 however. Many examples of embedded code do not use them.
See also
Internet Engineering Task Force
List of TCP and UDP port numbers
lwIP –another TCP/IP stack project (also created by Dunkels), but more fully-featured and aimed at more capable hardware
References
External links
uIP source
uIP port for AVR microcontrollers
uIP-based Webserver using OpenRISC-embedded SoC
Embedded systems
Free network-related software
Software using the BSD license |
1942608 | https://en.wikipedia.org/wiki/WeatherBug | WeatherBug | WeatherBug is a brand owned by GroundTruth, based in New York City, that provides location-based advertising solutions to businesses. WeatherBug consists of a mobile app reporting live and forecast data on hyperlocal weather to consumer users.
History
Originally owned by Automated Weather Source, the WeatherBug brand was founded by Bob Marshall and other partners in 1993. It started in the education market by selling weather tracking stations and educational software to public and private schools and then used the data from the stations on their website. Later, the company began partnering with TV stations so that broadcasters could use WeatherBug's local data and camera shots in their weather reports.
In 2000, the WeatherBug desktop application and website were launched. Later, the company launched WeatherBug and WeatherBug Elite as smartphone apps for iOS and Android, which won an APPY app design award in 2013. The company also sells a lightning tracking safety system that is used by schools and parks in southern Florida and elsewhere.
The company used lightning detection sensors throughout Guinea in Africa to track storms as they develop and has more than 50 lightning detection sensors in Brazil. Earth Networks received The Award for Outstanding Services to Meteorology by a Corporation in 2014 from the American Meteorological Society for "developing innovative lightning detection data products that improve severe-storm monitoring and warnings."
WeatherBug announced in 2004 it had been certified to display the TRUSTe privacy seal on its website. In 2005, Microsoft AntiSpyware flagged the application as a low-risk spyware threat. According to the company, the desktop application is not spyware because it is incapable of tracking users' overall Web use or deciphering anything on their hard drive.
In early 2011, AWS Convergence Technologies, Inc. (formerly Automated Weather Source) changed its name to Earth Networks, Inc.
In April 2013, WeatherBug was the second most popular weather information service on the Internet, behind only The Weather Channel's Web site, and ahead of the sites run by Weather Underground and AccuWeather.
In November 2016, it was announced that xAd acquired WeatherBug from Earth Networks.
Mobile application
The company developed WeatherBug, a mobile application of their service for Android, iOS and Windows Phone platforms. Spark is a component of the WeatherBug app that reports where the nearest lightning strike is to the user based on data from the Total Lightning Network (run by WeatherBug's former owner, Earth Networks) and your phone's GPS location.
WeatherBug is a mobile application created by WeatherBug for Android and iOS platforms. An iPhone version was available in October 2007, and the Android version was released in November 2008/09.
References
External links
Meteorological data and networks
Meteorological companies
Educational software for MacOS
Educational software for Windows
Educational software for Linux
Android (operating system) software
IOS software
Mobile software |
6375501 | https://en.wikipedia.org/wiki/Origin%20%28data%20analysis%20software%29 | Origin (data analysis software) | Origin is a proprietary computer program for interactive scientific graphing and data analysis. It is produced by OriginLab Corporation, and runs on Microsoft Windows. It has inspired several platform-independent open-source clones and alternatives like LabPlot and SciDAVis.
Graphing support in Origin includes various 2D/3D plot types.
Data analyses in Origin include statistics, signal processing, curve fitting and peak analysis. Origin's curve fitting is performed by a nonlinear least squares fitter which is based on the Levenberg–Marquardt algorithm.
Origin imports data files in various formats such as ASCII text, Excel, NI TDM, DIADem, NetCDF, SPC, etc. It also exports the graph to various image file formats such as JPEG, GIF, EPS, TIFF, etc. There is also a built-in query tool for accessing database data via ADO.
Features
Origin is primarily a GUI software with a spreadsheet front end. Unlike popular spreadsheets like Excel, Origin's worksheet is column oriented. Each column has associated attributes like name, units and other user definable labels. Instead of cell formula, Origin uses column formula for calculations.
Recent versions of Origin have introduced and expanded on batch capabilities, with the goal of eliminating the need to program many routine operations. Instead the user relies on customizable graph templates, analysis dialog box Themes which save a particular suite of operations, auto recalculation on changes to data or analysis parameters, and Analysis Templates™ which save a collection of operations within the workbook.
Origin also has a scripting language (LabTalk) for controlling the software, which can be extended using a built-in C/C++-based compiled language (Origin C). Other programming options include an embedded Python environment, and an R Console plus support for Rserve.
Origin can be also used as a COM server for programs which may be written in Visual Basic .NET, C#, LabVIEW, etc.
Origin project files (.OPJ) can be read by the open-source LabPlot or SciDAVis software. The files can also be read by QtiPlot but only with a paid "Pro" version. Finally the liborigin library can also read .OPJ files such as by using the opj2dat script, which exports the data tables contained in the file.
There is also a free component (Orglab) maintained by Originlab that can be used to create (or read) OPJ files. A free Viewer application is also available.
Editions and support
Origin is available in two editions, the regular version Origin and the pricier OriginPro. The latter adds additional data analysis features like surface fitting, short-time Fourier Transform, and more advanced statistics.
Technical support is available to registered users via e-mail, online chat, and telephone.
A user forum is also available.
There are a few version types that have been offered from Origin and OriginPro as personal, academic, government and student versions. However, the student version is not available for Southeast Asian countries such as Singapore, Malaysia, Thailand, Philippines and Laos.
There is an origin file viewer to see data and charts made with origin. The actual software is Version 9.6.5. This software can convert newer OPJU files to older OPJ files for older versions of Origin.
History
Origin was first created for use solely with microcalorimeters manufactured by MicroCal Inc. (acquired by Malvern Instruments in 2014) The software was used to graph the instruments data, and perform nonlinear curve fitting and parameter calculation.
The software was first published for the public in 1992 by Microcal Software, which later was renamed to OriginLab Corporation, located in Northampton, Massachusetts.
Release history
2021/11/16 Origin 2022: Add Notes to Cells, Named Range, Image on Graph as Linked Files, Mini Toolbars on Object Manager, Connect to OneDrive and Google Drive for data.
2021/4/30 Origin 2021b: Mini toolbar for 3D graph, built-in Shapefile support, insert maps to graphs, NetCDF climate data, SQLite import export
2020/10/27 Origin 2021. Fully integrated Python support with new originpro package. New formula bar, color manager, chord diagram. New Apps including TDMS Connector, Import PDF Tables.
2020/4/30 Origin 2020b. Mini toolbar for worksheet & matrix, data connector navigator panel, browser graphs. Worksheet cells no longer showing ####. New Apps such as Canonical Correlation Analysis, Correlation plot etc.
2019/10/25 Origin 2020. Mini toolbars, much faster import and plotting of large dataset. Density dots, color dots, sankey diagram, improved pie and doughnut charts. Copy and Paste plot, Copy and Paste HTML or EMF table.
2019/04/24 Origin 2019b. HTML and Markdown reports. Web Data Connectors for CSV, JSON, Excel, MATLAB. Rug Plots, Split Heatmap Plot. Validation Reports using NIST data. New Apps for Quantile Regression, 2D Correlation, Isosurface Plot, etc.
2018/10/26 Origin 2019. Data Highlighter for data exploration, Windows-like search from Start menu, Conditional formatting of data cells, Violin plot, New apps like Stats Advisor, Image Object Counter, Design of Experiments, etc.
2018/4/24 Origin 2018b. Matrices embedded in workbook, Worksheet/matrix data preview, Dynamic graph preview in analysis, Distributed batch processing on multi-core CPU (app).
2017/11/9 Origin 2018. Cell formula, Unicode, Bridge chart, changed to a more compact file format (OPJU).
2016/11/10 Origin 2017. Trellis Plot, Geology fill patterns, JavaScript support from Origin C.
2015/10/23 Origin 2016. First version to support Apps in Origin, also added R support.
2014/10 Origin 2015 added graph thumbnail previews, project search, heat map, 2D kernel density plot and Python support.
2013/10 Origin 9.1 SR0 added support for Piper diagram, Ternary surface plot etc.
2012/10 Origin 9 with high performance OpenGL 3D Graphing, orthogonal regression for implicit/explicit functions
2011/11 Origin 8.6, first version in 64bit
2011/04 Origin 8.5.1
2010/09 Origin 8.5.0
2009/10 Origin 8.1
2009/08 Origin 8 SR6
2007/12 Origin 8 SR1
2007/10 Origin 8
2006/01 Origin 7.5 SR6
2003/10 Origin 7.5
2002/02 Origin 7.0
2000/09 Origin 6.1
1999/06 Origin 6.0
1997/08 Origin 5.0
1995/02 Origin 4.1
1994/07 Origin 3.5
1993/08 Origin 2.9
1993/?? Origin 2
References
External links
1992 software
Data analysis software
Earth sciences graphics software
Plotting software
Regression and curve fitting software
Windows software |
4215000 | https://en.wikipedia.org/wiki/Cain%20and%20Abel%20%28software%29 | Cain and Abel (software) | Cain and Abel (often abbreviated to Cain) was a password recovery tool for Microsoft Windows. It could recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks.
Cryptanalysis attacks were done via rainbow tables which could be generated with the winrtgen.exe program provided with Cain and Abel.
Cain and Abel was maintained by Massimiliano Montoro and Sean Babcock.
Features
WEP cracking
Speeding up packet capture speed by wireless packet injection
Ability to record VoIP conversations
Decoding scrambled passwords
Calculating hashes
Traceroute
Revealing password boxes
Uncovering cached passwords
Dumping protected storage passwords
ARP spoofing
IP to MAC Address resolver
Network Password Sniffer
LSA secret dumper
Ability to crack:
LM & NTLM hashes
NTLMv2 hashes
Microsoft Cache hashes
Microsoft Windows PWL files
Cisco IOS - MD5 hashes
Cisco PIX - MD5 hashes
APOP - MD5 hashes
CRAM-MD5 MD5 hashes
OSPF - MD5 hashes
RIPv2 MD5 hashes
VRRP - HMAC hashes
Virtual Network Computing (VNC) Triple DES
MD2 hashes
MD4 hashes
MD5 hashes
SHA-1 hashes
SHA-2 hashes
RIPEMD-160 hashes
Kerberos 5 hashes
RADIUS shared key hashes
IKE PSK hashes
MSSQL hashes
MySQL hashes
Oracle and SIP hashes
Status with virus scanners
Some virus scanners (and browsers, e.g. Google Chrome 20.0.1132.47) detect Cain and Abel as malware.
Avast! detects it as "Win32:Cain-B [Tool]" and classifies it as "Other potentially dangerous program", while Microsoft Security Essentials detects it as "Win32/Cain!4_9_14" and classifies it as "Tool: This program has potentially unwanted behavior."
Even if Cain's install directory, as well as the word "Cain", are added to Avast's exclude list, the real-time scanner has been known to stop Cain from functioning. However, the latest version of Avast no longer blocks Cain.
Symantec (the developer of the Norton family of computer security software) identified a buffer overflow vulnerability in version 4.9.24 that allowed for remote code execution in the event the application was used to open a large RDP file, as might occur when using the program to analyze network traffic. The vulnerability had been present in the previous version (4.9.23) as well and was patched in a subsequent release.
See also
Black-hat hacker
White-hat hacker
Hacker (computer security)
Password cracking
Aircrack-ng
Crack
DaveGrohl
Hashcat
John the Ripper
L0phtCrack
Ophcrack
RainbowCrack
References
External links
Windows-only freeware
Password cracking software
Windows security software
Network analyzers
Windows network-related software |
13737932 | https://en.wikipedia.org/wiki/Estimation%20%28project%20management%29 | Estimation (project management) | In project management (e.g., for engineering), accurate estimates are the basis of sound project planning. Many processes have been developed to aid engineers in making accurate estimates, such as
Analogy based estimation
Compartmentalization (i.e., breakdown of tasks)
Cost estimate
Delphi method
Documenting estimation results
Educated assumptions
Estimating each task
Examining historical data
Identifying dependencies
Parametric estimating
Risk assessment
Structured planning
Popular estimation processes for software projects include:
Cocomo
Cosysmo
Event chain methodology
Function points
Planning poker
Program Evaluation and Review Technique (PERT)
Proxy-based estimating (PROBE) (from the Personal Software Process)
The Planning Game (from Extreme Programming)
Weighted Micro Function Points (WMFP)
Wideband Delphi
See also
Estimation in software engineering
Software development effort estimation
Comparison of development estimation software
Cognitive bias
Decision making
Decision making software
Work Breakdown Structure
Project management
List of project management software
Software metric
Wideband Delphi
Guesstimate
Ballpark estimate
Construction Estimating Software
External links
Project Estimation Methods
Estimation chapter from "Applied Software Project Management" (PDF)
The Dynamics of Software Projects Estimation
Estimations in project management
Three types of B2C estimates
Project management
de:Schätzung
hu:Becslés
nl:Schatten
pl:Szacowanie
sr:Процена |
54955 | https://en.wikipedia.org/wiki/Pantone | Pantone | Pantone LLC is a limited liability company headquartered in Carlstadt, New Jersey. The company is best known for its Pantone Matching System (PMS), a proprietary color space used in a variety of industries, notably graphic design, fashion design, product design, printing and manufacturing and supporting the management of color from design to production, in physical and digital formats, among coated and uncoated materials, cotton, polyester, nylon and plastics.
X-Rite, a supplier of color measurement instruments and software, purchased Pantone for US$180 million in October 2007, and was itself acquired by Danaher Corporation in 2012.
Overview
Pantone began in New Jersey in the 1950s as the commercial printing company of brothers Mervin and Jesse Levine, M & J Levine Advertising. In 1956, its founders, both advertising executives, hired recent Hofstra University graduate Lawrence Herbert as a part-time employee. Herbert used his chemistry knowledge to systematize and simplify the company's stock of pigments and production of colored inks; by 1962, Herbert was running the ink and printing division at a profit, while the commercial-display division was US$50,000 in debt; he subsequently purchased the company's technological assets from the Levine Brothers for US$50,000 () and renamed them "Pantone".
The company's primary products include the Pantone Guides, which consist of a large number of small (approximately 6×2 inches or 15×5 cm) thin cardboard sheets, printed on one side with a series of related color swatches and then bound into a small "fan deck". For instance, a particular "page" might contain a number of yellows of varying tints.
The idea behind the PMS is to allow designers to "color match" specific colors when a design enters production stage, regardless of the equipment used to produce the color. This system has been widely adopted by graphic designers and reproduction and printing houses. Pantone recommends that PMS Color Guides be purchased annually, as their inks become yellowish over time. Color variance also occurs within editions based on the paper stock used (coated, matte or uncoated), while interedition color variance occurs when there are changes to the specific paper stock used.
Pantone Color Matching System
The Pantone Color Matching System is largely a standardized color reproduction system, as of 2019 it has 2161 colors. By standardizing the colors, different manufacturers in different locations can all refer to the Pantone system to make sure colors match without direct contact with one another.
One such use is standardizing colors in the CMYK process. The CMYK process is a method of printing color by using four inks—cyan, magenta, yellow, and black. A majority of the world's printed material is produced using the CMYK process, and there is a special subset of Pantone colors that can be reproduced using CMYK. Those that are possible to simulate through the CMYK process are labeled as such within the company's guides.
However, about 30% of the Pantone system's 1114 spot colors (as of year 2000) cannot be simulated with CMYK but with 13 base pigments (14 including black) mixed in specified amounts, called base colors. Those 1114 colors included 387 colors with numbers 100 to 487 from 1975 and some lighter colors from 600 to 732 in 1991. The original 4 digit colors introduced in 1987 were remapped into 3 digits.
The Pantone system also later allowed for many special colors to be produced, such as metallics, fluorescents (neons) and pastels. There are 56 fluorescents from 801 to 814 (first 7 here are base colors, so called Dayglo) and from 901 to 942. Packaging metallics (previously premium metallics) are placed from 10101 to 10454 (54 of those added later, 354 altogether, 2 base colors Silver 10077 and Rose Gold 10412), while normal metallics are placed from 871 to 877 (first 7 here are base colors) and from 8001 to 8965. Pastels are from 9140 to 9163 with base colors being 0131, 0331, 0521, 0631, 0821, 0921 and 0961. While most of the Pantone system colors are beyond the printed CMYK gamut, it was only in 2001 that Pantone began providing translations of their existing system with screen-based colors. Screen-based colors use the RGB color model—red, green, blue—system to create various colors, a lot of colors are outside sRGB. The (discontinued) Goe system has RGB and LAB values with each color and has 10 base colors while only 4 of those new: Bright Red, Pink, Medium Purple and Dark Blue. Other 6 were in the system before: Yellow 012, Orange 021, Rubine Red, Green, Process Blue and Black that in Goe were named Medium Yellow, Bright Orange, Strong Red, Bright Green, Medium Blue and Neutral Black.
Pantone colors are described by their allocated number (typically referred to as, for example, "PMS 130"). PMS colors are almost always used in branding and have even found their way into government legislation and military standards (to describe the colors of flags and seals). In January 2003, the Scottish Parliament debated a petition (reference PE512) to refer to the blue in the Scottish flag as "Pantone 300". Countries such as Canada and South Korea and organizations such as the FIA have also chosen to refer to specific Pantone colors to use when producing flags. US states including Texas have set legislated PMS colors of their flags.
Pantone Goe System
On September 5, 2007, Pantone introduced the Goe System. Goe consisted of 2058 new colors in a new matching and numbering system. In addition to the standard swatch books (now called the GoeGuide), the new system also included adhesive-backed GoeSticks, interactive software, tools, and an online community where users were able to share color swatches and information.
The Goe system was streamlined to use fewer base colors (ten, plus clear coating for reflections, only 4 base colors were new) and accommodate many technical challenges in reproducing colors on a press.
The Pantone Goe system was discontinued in November 2013, but 4 new base colors were added into PMS and some of new colors too, though those 4 base colors are harder to purchase.
Other products
In mid-2006 Pantone, partnering with Vermont-based Fine Paints of Europe, introduced a new line of interior and exterior paints. The color palette uses Pantone's color research and trending and has more than 3,000 colors.
In November 2015, Pantone partnered with Redland London to create a collection of bags inspired from Pantone's authority on color.
Pantone also produced Hexachrome, a patented six-color printing system. In addition to custom CMYK inks, Hexachrome added orange and green inks to expand the color gamut, for better color reproduction. It was therefore also known as a CMYKOG process. Hexachrome was discontinued by Pantone in 2008 when Adobe Systems stopped supporting their HexWare plugin software. In 2015 7-color printing system was developed, adding Violet in CMYKOGV, that can cover 90% of 1114 spot colors, while CMYK only about 60%. 1729 new colors were added, marked XGC (extended gamut coated), some colors do not have a number, like Process Blue XGC or Purple XGC. Base colors of OGV were new mono-pigment inks, pigments PO34, PG7 and PV23 were used respectively with 58°, 180° and 311° hue angles.
Pantone Color Manager allows for users of the Adobe Creative Suite and Creative Cloud as well as other software to import the most up to date information inclusive of L*a*b* numbers as well as CMYK and sRGB representations of all the various palettes (including chromatic adaptation under default D50 or D65 with 2 degree or 10 degree observer or even any ICC profile). L*a*b* numbers allow for the most accurate representation of color in a device-independent manner. Support is being phased out in favour of Pantone Connect plugin from Adobe Exchange of Creative Cloud.
Color of the Year
Since 2000, the Pantone Color Institute has declared a particular color "Color of the Year". Twice a year the company hosts, in a European capital, a secret meeting of representatives from various nations' color standards groups. After two days of presentations and debate, they choose a color for the following year; for example, the color for summer 2013 was chosen in London in the spring of 2012. The color purportedly connects with the zeitgeist; for example, the press release declaring Honeysuckle the color of 2011 said "In times of stress, we need something to lift our spirits. Honeysuckle is a captivating, stimulating color that gets the adrenaline going – perfect to ward off the blues." The results of the meeting are published in Pantone View, which fashion designers, florists, and many other consumer-oriented companies purchase to help guide their designs and planning for future products. In 2016 and 2021, Pantone chose two colors for Color of the Year.
In 2012, the color of the year, Tangerine Tango, was used to create a makeup line, in partnership with Sephora. The product line, named Sephora + Pantone Universe collection, features Tangerine Tango–embellished false lashes, nail lacquers, cream, glitters, and high-pigment lip glosses. 2013 Emerald color was reported to be out of sRGB gamut, but it actually is not, Lab values for D50 white point were used by mistake. Also new Very Peri color of 2022 is present in TCX (dyed cotton reference) and TPG (Textile Paper – “Green”) form, here TCX for sRGB hex values are mentioned.
The person behind Pantone's Color of the Year, executive director of the Pantone Color Institute Leatrice Eiseman, explained in an interview how 2014's Color of the Year, Radiant Orchid, was chosen:
Pantone has said that color "has always been an integral part of how a culture expresses the attitudes and emotions of the times."
Intellectual property
Pantone asserts that their lists of color numbers and pigment values are the intellectual property of Pantone and free use of the list is not allowed. This is frequently held as a reason Pantone colors cannot be supported in open-source software and are not often found in low-cost proprietary software. Pantone has been accused of "being intentionally unclear" about its exact legal claims, but it is acknowledged that "the simplest claim would be trademark misappropriation or dilution towards someone who produced a color palette marketed as compatible with Pantone's".
See also
Color chart – other color systems and charts
CMYK color model
Natural Color System (NCS), Munsell color system, and other proprietary color spaces where most consumers use swatches to make color decisions; unlike Pantone, these systems are based on underlying color models rather than pigment mixtures.
RAL colour standard
Spot color
References
External links
Pantone Connect for Adobe
2007 mergers and acquisitions
Carlstadt, New Jersey
Color organizations
Companies based in Bergen County, New Jersey
Graphic design
Printing |
49139 | https://en.wikipedia.org/wiki/Decentralization | Decentralization | Decentralization or decentralisation is the process by which the activities of an organization, particularly those regarding planning and decision making, are distributed or delegated away from a central, authoritative location or group.
Concepts of decentralization has been applied to group dynamics and management science in private businesses and organizations, political science, law and public administration, economics, money and technology.
History
The word "centralisation" came into use in France in 1794 as the post-Revolution French Directory leadership created a new government structure. The word "décentralisation" came into usage in the 1820s. "Centralization" entered written English in the first third of the 1800s; mentions of decentralization also first appear during those years. In the mid-1800s Tocqueville would write that the French Revolution began with "a push towards decentralization...[but became,] in the end, an extension of centralization." In 1863, retired French bureaucrat Maurice Block wrote an article called "Decentralization" for a French journal that reviewed the dynamics of government and bureaucratic centralization and recent French efforts at decentralization of government functions.
Ideas of liberty and decentralization were carried to their logical conclusions during the 19th and 20th centuries by anti-state political activists calling themselves "anarchists", "libertarians", and even decentralists. Tocqueville was an advocate, writing: "Decentralization has, not only an administrative value but also a civic dimension since it increases the opportunities for citizens to take interest in public affairs; it makes them get accustomed to using freedom. And from the accumulation of these local, active, persnickety freedoms, is born the most efficient counterweight against the claims of the central government, even if it were supported by an impersonal, collective will." Pierre-Joseph Proudhon (1809–1865), influential anarchist theorist wrote: "All my economic ideas as developed over twenty-five years can be summed up in the words: agricultural-industrial federation. All my political ideas boil down to a similar formula: political federation or decentralization."
In the early 20th century, America's response to the centralization of economic wealth and political power was a decentralist movement. It blamed large-scale industrial production for destroying middle-class shop keepers and small manufacturers and promoted increased property ownership and a return to small scale living. The decentralist movement attracted Southern Agrarians like Robert Penn Warren, as well as journalist Herbert Agar. New Left and libertarian individuals who identified with social, economic, and often political decentralism through the ensuing years included Ralph Borsodi, Wendell Berry, Paul Goodman, Carl Oglesby, Karl Hess, Donald Livingston, Kirkpatrick Sale (author of Human Scale), Murray Bookchin, Dorothy Day, Senator Mark O. Hatfield, Mildred J. Loomis and Bill Kauffman.
Leopold Kohr, author of the 1957 book The Breakdown of Nations – known for its statement "Whenever something is wrong, something is too big" – was a major influence on E. F. Schumacher, author of the 1973 bestseller Small Is Beautiful: A Study of Economics As If People Mattered. In the next few years a number of best-selling books promoted decentralization.
Daniel Bell's The Coming of Post-Industrial Society discussed the need for decentralization and a "comprehensive overhaul of government structure to find the appropriate size and scope of units", as well as the need to detach functions from current state boundaries, creating regions based on functions like water, transport, education and economics which might have "different 'overlays' on the map." Alvin Toffler published Future Shock (1970) and The Third Wave (1980). Discussing the books in a later interview, Toffler said that industrial-style, centralized, top-down bureaucratic planning would be replaced by a more open, democratic, decentralized style which he called "anticipatory democracy". Futurist John Naisbitt's 1982 book "Megatrends" was on The New York Times Best Seller list for more than two years and sold 14 million copies. Naisbitt's book outlines 10 "megatrends", the fifth of which is from centralization to decentralization. In 1996 David Osborne and Ted Gaebler had a best selling book Reinventing Government proposing decentralist public administration theories which became labeled the "New Public Management".
Stephen Cummings wrote that decentralization became a "revolutionary megatrend" in the 1980s. In 1983 Diana Conyers asked if decentralization was the "latest fashion" in development administration. Cornell University's project on Restructuring Local Government states that decentralization refers to the "global trend" of devolving responsibilities to regional or local governments. Robert J. Bennett's Decentralization, Intergovernmental Relations and Markets: Towards a Post-Welfare Agenda describes how after World War II governments pursued a centralized "welfarist" policy of entitlements which now has become a "post-welfare" policy of intergovernmental and market-based decentralization.
In 1983, "Decentralization" was identified as one of the "Ten Key Values" of the Green Movement in the United States.
According to a 1999 United Nations Development Programme report:
Overview
Systems approach
Those studying the goals and processes of implementing decentralization often use a systems theory approach, which according to the United Nations Development Programme report applies to the topic of decentralization "a whole systems perspective, including levels, spheres, sectors and functions and seeing the community level as the entry point at which holistic definitions of development goals are
from the people themselves and where it is most practical to support them. It involves seeing multi-level frameworks and continuous, synergistic processes of interaction and iteration of cycles as critical for achieving wholeness in a decentralized system and for sustaining its development."
However, it has been seen as part of a systems approach. Norman Johnson of Los Alamos National Laboratory wrote in a 1999 paper: "A decentralized system is where some decisions by the agents are made without centralized control or processing. An important property of agent systems is the degree of connectivity or connectedness between the agents, a measure global flow of information or influence. If each agent is connected (exchange states or influence) to all other agents, then the system is highly connected."
University of California, Irvine's Institute for Software Research's "PACE" project is creating an "architectural style for trust management in decentralized applications." It adopted Rohit Khare's definition of decentralization: "A decentralized system is one which requires multiple parties to make their own independent decisions" and applies it to Peer-to-peer software creation, writing:
Goals
Decentralization in any area is a response to the problems of centralized systems. Decentralization in government, the topic most studied, has been seen as a solution to problems like economic decline, government inability to fund services and their general decline in performance of overloaded services, the demands of minorities for a greater say in local governance, the general weakening legitimacy of the public sector and global and international pressure on countries with inefficient, undemocratic, overly centralized systems. The following four goals or objectives are frequently stated in various analyses of decentralization.
Participation
In decentralization, the principle of subsidiarity is often invoked. It holds that the lowest or least centralized authority that is capable of addressing an issue effectively should do so. According to one definition: "Decentralization, or decentralizing governance, refers to the restructuring or reorganization of authority so that there is a system of co-responsibility between institutions of governance at the central, regional and local levels according to the principle of subsidiarity, thus increasing the overall quality and effectiveness of the system of governance while increasing the authority and capacities of sub-national levels."
Decentralization is often linked to concepts of participation in decision-making, democracy, equality and liberty from a higher authority. Decentralization enhances the democratic voice. Theorists believe that local representative authorities with actual discretionary powers are the basis of decentralization that can lead to local efficiency, equity and development." Columbia University's Earth Institute identified one of three major trends relating to decentralization: "increased involvement of local jurisdictions and civil society in the management of their affairs, with new forms of participation, consultation, and partnerships."
Decentralization has been described as a "counterpoint to globalization [which] removes decisions from the local and national stage to the global sphere of multi-national or non-national interests. Decentralization brings decision-making back to the sub-national levels". Decentralization strategies must account for the interrelations of global, regional, national, sub-national, and local levels.
Diversity
Norman L. Johnson writes that diversity plays an important role in decentralized systems like ecosystems, social groups, large organizations, political systems. "Diversity is defined to be unique properties of entities, agents, or individuals that are not shared by the larger group, population, structure. Decentralized is defined as a property of a system where the agents have some ability to operate "locally." Both decentralization and diversity are necessary attributes to achieve the self-organizing properties of interest."
Advocates of political decentralization hold that greater participation by better informed diverse interests in society will lead to more relevant decisions than those made only by authorities on the national level. Decentralization has been described as a response to demands for diversity.
Efficiency
In business, decentralization leads to a management by results philosophy which focuses on definite objectives to be achieved by unit results. Decentralization of government programs is said to increase efficiency – and effectiveness – due to reduction of congestion in communications, quicker reaction to unanticipated problems, improved ability to deliver services, improved information about local conditions, and more support from beneficiaries of programs.
Firms may prefer decentralization because it ensures efficiency by making sure that managers closest to the local information make decisions and in a more timely fashion; that their taking responsibility frees upper management for long term strategics rather than day-to-day decision-making; that managers have hands on training to prepare them to move up the management hierarchy; that managers are motivated by having the freedom to exercise their own initiative and creativity; that managers and divisions are encouraged to prove that they are profitable, instead of allowing their failures to be masked by the overall profitability of the company.
The same principles can be applied to the government. Decentralization promises to enhance efficiency through both inter-governmental competitions with market features and fiscal discipline which assigns tax and expenditure authority to the lowest level of government possible. It works best where members of the subnational government have strong traditions of democracy, accountability, and professionalism.
Conflict resolution
Economic and/or political decentralization can help prevent or reduce conflict because they reduce actual or perceived inequities between various regions or between a region and the central government. Dawn Brancati finds that political decentralization reduces intrastate conflict unless politicians create political parties that mobilize minority and even extremist groups to demand more resources and power within national governments. However, the likelihood this will be done depends on factors like how democratic transitions happen and features like a regional party's proportion of legislative seats, a country's number of regional legislatures, elector procedures, and the order in which national and regional elections occur. Brancati holds that decentralization can promote peace if it encourages statewide parties to incorporate regional demands and limit the power of regional parties.
Processes
Initiation
The processes by which entities move from a more to a less centralized state vary. They can be initiated from the centers of authority ("top-down") or from individuals, localities or regions ("bottom-up"), or from a "mutually desired" combination of authorities and localities working together. Bottom-up decentralization usually stresses political values like local responsiveness and increased participation and tends to increase political stability. Top-down decentralization may be motivated by the desire to "shift deficits downwards" and find more resources to pay for services or pay off government debt. Some hold that decentralization should not be imposed, but done in a respectful manner.
Appropriate size
Gauging the appropriate size or scale of decentralized units has been studied in relation to the size of sub-units of hospitals and schools, road networks, administrative units in business and public administration, and especially town and city governmental areas and decision making bodies.
In creating planned communities ("new towns"), it is important to determine the appropriate population and geographical size. While in earlier years small towns were considered appropriate, by the 1960s, 60,000 inhabitants was considered the size necessary to support a diversified job market and an adequate shopping center and array of services and entertainment. Appropriate size of governmental units for revenue raising also is a consideration.
Even in bioregionalism, which seeks to reorder many functions and even the boundaries of governments according to physical and environmental features, including watershed boundaries and soil and terrain characteristics, appropriate size must be considered. The unit may be larger than many decentralist bioregionalists prefer.
Inadvertent or silent
Decentralization ideally happens as a careful, rational, and orderly process, but it often takes place during times of economic and political crisis, the fall of a regime and the resultant power struggles. Even when it happens slowly, there is a need for experimentation, testing, adjusting, and replicating successful experiments in other contexts. There is no one blueprint for decentralization since it depends on the initial state of a country and the power and views of political interests and whether they support or oppose decentralization.
Decentralization usually is a conscious process based on explicit policies. However, it may occur as "silent decentralization" in the absence of reforms as changes in networks, policy emphasize and resource availability lead inevitably to a more decentralized system.
Asymmetry
Decentralization may be uneven and "asymmetric" given any one country's population, political, ethnic and other forms of diversity. In many countries, political, economic and administrative responsibilities may be decentralized to the larger urban areas, while rural areas are administered by the central government. Decentralization of responsibilities to provinces may be limited only to those provinces or states which want or are capable of handling responsibility. Some privatization may be more appropriate to an urban than a rural area; some types of privatization may be more appropriate for some states and provinces but not others.
Measurement
Measuring the amount of decentralization, especially politically, is difficult because different studies of it use different definitions and measurements. An OECD study quotes Chanchal Kumar Sharma as stating: "a true assessment of the degree of decentralization in a country can be made only if a comprehensive approach is adopted and rather than trying to simplify the syndrome of characteristics into the single dimension of autonomy, interrelationships of various dimensions of decentralization are taken into account."
Determinants
The academic literature frequently mentions the following factors as determinants of decentralization:
"The number of major ethnic groups"
"The degree of territorial concentration of those groups"
"The existence of ethnic networks and communities across the border of the state"
"The country's dependence on natural resources and the degree to which those resources are concentrated in the region's territory"
"The country's per capita income relative to that in other regions"
The presence of self-determination movements
Government decentralization
Historians have described the history of governments and empires in terms of centralization and decentralization. In his 1910 The History of Nations Henry Cabot Lodge wrote that Persian king Darius I (550–486 BC) was a master of organization and "for the first time in history centralization becomes a political fact." He also noted that this contrasted with the decentralization of Ancient Greece. Since the 1980s a number of scholars have written about cycles of centralization and decentralizations. Stephen K. Sanderson wrote that over the last 4000 years chiefdoms and actual states have gone through sequences of centralization and decentralization of economic, political and social power. Yildiz Atasoy writes this process has been going on "since the Stone Age" through not just chiefdoms and states, but empires and today's "hegemonic core states". Christopher K. Chase-Dunn and Thomas D. Hall review other works that detail these cycles, including works which analyze the concept of core elites which compete with state accumulation of wealth and how their "intra-ruling-class competition accounts for the rise and fall of states" and their phases of centralization and decentralization.
Rising government expenditures, poor economic performance and the rise of free market-influenced ideas have convinced governments to decentralize their operations, to induce competition within their services, to contract out to private firms operating in the market, and to privatize some functions and services entirely.
Government decentralization has both political and administrative aspects. Its decentralization may be territorial, moving power from a central city to other localities, and it may be functional, moving decision-making from the top administrator of any branch of government to lower level officials, or divesting of the function entirely through privatization. It has been called the "new public management" which has been described as decentralization, management by objectives, contracting out, competition within government and consumer orientation.
Political
Political decentralization signifies a reduction in the authority of national governments over policymaking. This process is accomplished by the institution of reforms that either delegate a certain degree of meaningful decision-making autonomy to subnational tiers of government, or grant citizens the right to elect lower-level officials, like local or regional representatives. Depending on the country, this may require constitutional or statutory reforms, the development of new political parties, increased power for legislatures, the creation of local political units, and encouragement of advocacy groups.
A national government may decide to decentralize its authority and responsibilities for a variety of reasons. Decentralization reforms may occur for administrative reasons, when government officials decide that certain responsibilities and decisions would be handled best at the regional or local level. In democracies, traditionally conservative parties include political decentralization as a directive in their platforms because rightist parties tend to advocate for a decrease in the role of central government. There is also strong evidence to support the idea that government stability increases the probability of political decentralization, since instability brought on by gridlock between opposing parties in legislatures often impedes a government's overall ability to enact sweeping reforms.
The rise of regional ethnic parties in the national politics of parliamentary democracies is also heavily associated with the implementation of decentralization reforms. Ethnic parties may endeavor to transfer more autonomy to their respective regions, and as a partisan strategy, ruling parties within the central government may cooperate by establishing regional assemblies in order to curb the rise of ethnic parties in national elections. This phenomenon famously occurred in 1999, when the United Kingdom's Labour Party appealed to Scottish constituents by creating a semi-autonomous Scottish Parliament in order to neutralize the threat from the increasingly popular Scottish National Party at the national level.
In addition to increasing the administrative efficacy of government and endowing citizens with more power, there are many projected advantages to political decentralization. Individuals who take advantage of their right to elect local and regional authorities have been shown to have more positive attitudes toward politics, and increased opportunities for civic decision-making through participatory democracy mechanisms like public consultations and participatory budgeting are believed to help legitimize government institutions in the eyes of marginalized groups. Moreover, political decentralization is perceived as a valid means of protecting marginalized communities at a local level from the detrimental aspects of development and globalization driven by the state, like the degradation of local customs, codes, and beliefs. In his 2013 book, Democracy and Political Ignorance, George Mason University law professor Ilya Somin argued that political decentralization in a federal democracy confronts the widespread issue of political ignorance by allowing citizens to engage in foot voting, or moving to other jurisdictions with more favorable laws. He cites the mass migration of over one million southern-born African Americans to the North or the West to evade discriminatory Jim Crow laws in the late 19th century and early 20th century.
The European Union follows the principle of subsidiarity, which holds that decision-making should be made by the most local competent authority. The EU should decide only on enumerated issues that a local or member state authority cannot address themselves. Furthermore, enforcement is exclusively the domain of member states. In Finland, the Centre Party explicitly supports decentralization. For example, government departments have been moved from the capital Helsinki to the provinces. The Centre supports substantial subsidies that limit potential economic and political centralization to Helsinki.
Political decentralization does not come without its drawbacks. A study by Fan concludes that there is an increase in corruption and rent-seeking when there are more vertical tiers in the government, as well as when there are higher levels of subnational government employment. Other studies warn of high-level politicians that may intentionally deprive regional and local authorities of power and resources when conflicts arise. In order to combat these negative forces, experts believe that political decentralization should be supplemented with other conflict management mechanisms like power-sharing, particularly in regions with ethnic tensions.
Administrative
Four major forms of administrative decentralization have been described.
Deconcentration, the weakest form of decentralization, shifts responsibility for decision-making, finance and implementation of certain public functions from officials of central governments to those in existing districts or, if necessary, new ones under direct control of the central government.
Delegation passes down responsibility for decision-making, finance and implementation. It involves the creation of public-private enterprises or corporations, or of "authorities", special projects or service districts. All of them will have a great deal of decision-making discretion and they may be exempt from civil service requirements and may be permitted to charge users for services.
Devolution transfers responsibility for decision-making, finance and implementation of certain public functions to the sub-national level, such as a regional, local, or state government.
Divestment, also called privatization, may mean merely contracting out services to private companies. Or it may mean relinquishing totally all responsibility for decision-making, finance and implementation of certain public functions. Facilities will be sold off, workers transferred or fired and private companies or non-for-profit organizations allowed to provide the services. Many of these functions originally were done by private individuals, companies, or associations and later taken over by the government, either directly, or by regulating out of business entities which competed with newly created government programs.
Fiscal
Fiscal decentralization means decentralizing revenue raising and/or expenditure of moneys to a lower level of government while maintaining financial responsibility. While this process usually is called fiscal federalism it may be relevant to unitary, federal and confederal governments. Fiscal federalism also concerns the "vertical imbalances" where the central government gives too much or too little money to the lower levels. It actually can be a way of increasing central government control of lower levels of government, if it is not linked to other kinds of responsibilities and authority.
Fiscal decentralization can be achieved through user fees, user participation through monetary or labor contributions, expansion of local property or sales taxes, intergovernmental transfers of central government tax monies to local governments through transfer payments or grants, and authorization of municipal borrowing with national government loan guarantees. Transfers of money may be given conditionally with instructions or unconditionally without them.
Market
Market decentralization can be done through privatization of public owned functions and businesses, as described briefly above. But it also is done through deregulation, the abolition of restrictions on businesses competing with government services, for example, postal services, schools, garbage collection. Even as private companies and corporations have worked to have such services contracted out to or privatized by them, others have worked to have these turned over to non-profit organizations or associations.
Since the 1970s there has been deregulation of some industries, like banking, trucking, airlines and telecommunications which resulted generally in more competition and lower prices. According to Cato Institute, an American libertarian think-tank, in some cases deregulation in some aspects of an industry were offset by increased regulation in other aspects, the electricity industry being a prime example. For example, in banking, Cato Institute believes some deregulation allowed banks to compete across state lines, increasing consumer choice, while an actual increase in regulators and regulations forced banks to do business the way central government regulators commanded, including making loans to individuals incapable of repaying them, leading eventually to the financial crisis of 2007–2008.
One example of economic decentralization, which is based on a libertarian socialist model, is decentralized economic planning. Decentralized planning is a type of economic system in which decision-making is distributed amongst various economic agents or localized within production agents. An example of this method in practice is in Kerala, India which experimented in 1996 with the People's Plan campaign.
Some argue that government standardisation in areas from commodity market, inspection and testing procurement bidding, building codes, professional and vocational education, trade certification, safety, etc. are necessary. Emmanuelle Auriol and Michel Benaim write about the "comparative benefits" of decentralization versus government regulation in the setting of standards. They find that while there may be a need for public regulation if public safety is at stake, private creation of standards usually is better because "regulators or 'experts' might misrepresent consumers' tastes and needs." As long as companies are averse to incompatible standards, standards will be created that satisfy needs of a modern economy.
Environmental
Central governments themselves may own large tracts of land and control the forest, water, mineral, wildlife and other resources they contain. They may manage them through government operations or leasing them to private businesses; or they may neglect them to be exploited by individuals or groups who defy non-enforced laws against exploitation. It also may control most private land through land-use, zoning, environmental and other regulations. Selling off or leasing lands can be profitable for governments willing to relinquish control, but such programs can face public scrutiny because of fear of a loss of heritage or of environmental damage. Devolution of control to regional or local governments has been found to be an effective way of dealing with these concerns. Such decentralization has happened in India and other third world nations.
Ideological decentralization
Libertarian socialism
Libertarian socialism is a political philosophy that promotes a non-hierarchical, non-bureaucratic society without private property in the means of production. Libertarian socialists believe in converting present-day private productive property into common or public goods. Libertarian socialism is opposed to coercive forms of social organization. It promotes free association in place of government and opposes the social relations of capitalism, such as wage labor. The term libertarian socialism is used by some socialists to differentiate their philosophy from state socialism, and by some as a synonym for left anarchism.
Accordingly, libertarian socialists believe that "the exercise of power in any institutionalized form – whether economic, political, religious, or sexual – brutalizes both the wielder of power and the one over whom it is exercised". Libertarian socialists generally place their hopes in decentralized means of direct democracy such as libertarian municipalism, citizens' assemblies, or workers' councils. Libertarian socialists are strongly critical of coercive institutions, which often leads them to reject the legitimacy of the state in favor of anarchism. Adherents propose achieving this through decentralization of political and economic power, usually involving the socialization of most large-scale private property and enterprise (while retaining respect for personal property). Libertarian socialism tends to deny the legitimacy of most forms of economically significant private property, viewing capitalist property relations as forms of domination that are antagonistic to individual freedom.
Political philosophies commonly described as libertarian socialist include most varieties of anarchism (especially anarcho-communism, anarchist collectivism, anarcho-syndicalism, social anarchism and mutualism) as well as autonomism, communalism, participism, libertarian Marxist philosophies such as council communism and Luxemburgism, and some versions of utopian socialism and individualist anarchism. For Murray Bookchin "In the modern world, anarchism first appeared as a movement of the peasantry and yeomanry against declining feudal institutions. In Germany its foremost spokesman during the Peasant Wars was Thomas Muenzer; in England, Gerrard Winstanley, a leading participant in the Digger movement. The concepts held by Muenzer and Winstanley were superbly attuned to the needs of their time – a historical period when the majority of the population lived in the countryside and when the most militant revolutionary forces came from an agrarian world. It would be painfully academic to argue whether Muenzer and Winstanley could have achieved their ideals. What is of real importance is that they spoke to their time; their anarchist concepts followed naturally from the rural society that furnished the bands of the peasant armies in Germany and the New Model in England." The term "anarchist" first entered the English language in 1642, during the English Civil War, as a term of abuse, used by Royalists against their Roundhead opponents. By the time of the French Revolution some, such as the Enragés, began to use the term positively, in opposition to Jacobin centralisation of power, seeing "revolutionary government" as oxymoronic. By the turn of the 19th century, the English word "anarchism" had lost its initial negative connotation.
For Pierre-Joseph Proudhon, mutualism involved creating "industrial democracy", a system where workplaces would be "handed over to democratically organised workers' associations . . . We want these associations to be models for agriculture, industry and trade, the pioneering core of that vast federation of companies and societies woven into the common cloth of the democratic social Republic." He urged "workers to form themselves into democratic societies, with equal conditions for all members, on pain of a relapse into feudalism." This would result in "Capitalistic and proprietary exploitation, stopped everywhere, the wage system abolished, equal and just exchange guaranteed." Workers would no longer sell their labour to a capitalist but rather work for themselves in co-operatives. Anarcho-communism calls for a confederal form in relationships of mutual aid and free association between communes as an alternative to the centralism of the nation-state. Peter Kropotkin thus suggested that "Representative government has accomplished its historical mission; it has given a mortal blow to court-rule; and by its debates it has awakened public interest in public questions. But to see in it the government of the future socialist society is to commit a gross error. Each economic phase of life implies its own political phase; and it is impossible to touch the very basis of the present economic life-private property – without a corresponding change in the very basis of the political organization. Life already shows in which direction the change will be made. Not in increasing the powers of the State, but in resorting to free organization and free federation in all those branches which are now considered as attributes of the State." When the First Spanish Republic was established in 1873 after the abdication of King Amadeo, the first president, Estanislao Figueras, named Francesc Pi i Margall Minister of the Interior. His acquaintance with Proudhon enabled Pi to warm relations between the Republicans and the socialists in Spain. Pi i Margall became the principal translator of Proudhon's works into Spanish and later briefly became president of Spain in 1873 while being the leader of the Democratic Republican Federal Party. According to George Woodcock "These translations were to have a profound and lasting effect on the development of Spanish anarchism after 1870, but before that time Proudhonian ideas, as interpreted by Pi, already provided much of the inspiration for the federalist movement which sprang up in the early 1860s." According to the Encyclopædia Britannica "During the Spanish revolution of 1873, Pi y Margall attempted to establish a decentralized, cantonalist political system on Proudhonian lines."
To date, the best-known examples of an anarchist communist society (i.e., established around the ideas as they exist today and achieving worldwide attention and knowledge in the historical canon), are the anarchist territories during the Spanish Revolution and the Free Territory during the Russian Revolution. Through the efforts and influence of the Spanish Anarchists during the Spanish Revolution within the Spanish Civil War, starting in 1936 anarchist communism existed in most of Aragon, parts of the Levante and Andalusia, as well as in the stronghold of Anarchist Catalonia before being crushed by the combined forces of the regime that won the war, Hitler, Mussolini, Spanish Communist Party repression (backed by the USSR) as well as economic and armaments blockades from the capitalist countries and the Second Spanish Republic itself. During the Russian Revolution, anarchists such as Nestor Makhno worked to create and defend – through the Revolutionary Insurrectionary Army of Ukraine – anarchist communism in the Free Territory of Ukraine from 1919 before being conquered by the Bolsheviks in 1921. Several libertarian socialists, notably Noam Chomsky among others, believe that anarchism shares much in common with certain variants of Marxism (see libertarian Marxism) such as the council communism of Marxist Anton Pannekoek. In Chomsky's Notes on Anarchism, he suggests the possibility "that some form of council communism is the natural form of revolutionary socialism in an industrial society. It reflects the belief that democracy is severely limited when the industrial system is controlled by any form of autocratic elite, whether of owners, managers, and technocrats, a 'vanguard' party, or a State bureaucracy."
Free market
Free market ideas popular in the 19th century such as those of Adam Smith returned to prominence in the 1970s and 1980s. Austrian School economist Friedrich von Hayek argued that free markets themselves are decentralized systems where outcomes are produced without explicit agreement or coordination by individuals who use prices as their guide. Eleanor Doyle writes that "[e]conomic decision-making in free markets is decentralized across all the individuals dispersed in each market and is synchronized or coordinated by the price system," and holds that an individual right to property is part of this decentralized system. Criticizing central government control, Hayek wrote in The Road to Serfdom:
According to Bruce M. Owen, this does not mean that all firms themselves have to be equally decentralized. He writes: "markets allocate resources through arms-length transactions among decentralized actors. Much of the time, markets work very efficiently, but there is a variety of conditions under which firms do better. Hence, goods and services are produced and sold by firms with various degrees of horizontal and vertical integration." Additionally, he writes that the "economic incentive to expand horizontally or vertically is usually, but not always, compatible with the social interest in maximizing long-run consumer welfare." When it does not, he writes regulation may be necessary.
It is often claimed that free markets and private property generate centralized monopolies and other ills; free market advocates counter with the argument that government is the source of monopoly. Historian Gabriel Kolko in his book The Triumph of Conservatism argued that in the first decade of the 20th century businesses were highly decentralized and competitive, with new businesses constantly entering existing industries. In his view, there was no trend towards concentration and monopolization. While there were a wave of mergers of companies trying to corner markets, they found there was too much competition to do so. According to Kolko, this was also true in banking and finance, which saw decentralization as leading to instability as state and local banks competed with the big New York City firms. He argues that, as a result, the largest firms turned to the power of the state and worked with leaders like United States Presidents Theodore Roosevelt, William H. Taft and Woodrow Wilson to pass as "progressive reforms" centralizing laws like The Federal Reserve Act of 1913 that gave control of the monetary system to the wealthiest bankers; the formation of monopoly "public utilities" that made competition with those monopolies illegal; federal inspection of meat packers biased against small companies; extending Interstate Commerce Commission to regulating telephone companies and keeping rates high to benefit AT&T; and using the Sherman Antitrust Act against companies which might combine to threaten larger or monopoly companies. D. T. Armentano, writing for the Cato Institute, argues that when government licensing, franchises, and other legal restrictions create monopoly and protect companies from open competition, deregulation is the solution.
Author and activist Jane Jacobs's influential 1961 book The Death and Life of American Cities criticized large-scale redevelopment projects which were part of government-planned decentralization of population and businesses to suburbs. She believed it destroyed cities' economies and impoverished remaining residents. Her 1980 book The Question of Separatism: Quebec and the Struggle over Sovereignty supported secession of Quebec from Canada. Her 1984 book Cities and the Wealth of Nations proposed a solution to the problems faced by cities whose economies were being ruined by centralized national governments: decentralization through the "multiplication of sovereignties", meaning an acceptance of the right of cities to secede from the larger nation states that were greatly limiting their ability to produce wealth.
Technological decentralization
Technological decentralization can be defined as a shift from concentrated to distributed modes of production and consumption of goods and services. Generally, such shifts are accompanied by transformations in technology and different technologies are applied for either system. Technology includes tools, materials, skills, techniques and processes by which goals are accomplished in the public and private spheres. Concepts of decentralization of technology are used throughout all types of technology, including especially information technology and appropriate technology.
Technologies often mentioned as best implemented in a decentralized manner, include: water purification, delivery and waste water disposal, agricultural technology and energy technology. Advancing technology may allow decentralized, privatized and free market solutions for what have been public services, such utilities producing and/or delivering power, water, mail, telecommunications and services like consumer product safety, money and banking, medical licensing and detection and metering technologies for highways, parking, and auto emissions. However, in terms of technology, a clear distinction between fully centralized or decentralized technical solutions is often not possible and therefore finding an optimal degree of centralization difficult from an infrastructure planning perspective.
Information technology
Information technology encompasses computers and computer networks, as well as information distribution technologies such as television and telephones. The whole computer industry of computer hardware, software, electronics, internet, telecommunications equipment, e-commerce and computer services are included.
Executives and managers face a constant tension between centralizing and decentralizing information technology for their organizations. They must find the right balance of centralizing which lowers costs and allows more control by upper management, and decentralizing which allows sub-units and users more control. This will depend on analysis of the specific situation. Decentralization is particularly applicable to business or management units which have a high level of independence, complicated products and customers, and technology less relevant to other units.
Information technology applied to government communications with citizens, often called e-Government, is supposed to support decentralization and democratization. Various forms have been instituted in most nations worldwide.
The internet is an example of an extremely decentralized network, having no owners at all (although some have argued that this is less the case in recent years). "No one is in charge of internet, and everyone is." As long as they follow a certain minimal number of rules, anyone can be a service provider or a user. Voluntary boards establish protocols, but cannot stop anyone from developing new ones. Other examples of open source or decentralized movements are Wikis which allow users to add, modify, or delete content via the internet. Wikipedia has been described as decentralized. Smartphones have greatly increased the role of decentralized social network services in daily lives worldwide.
Decentralization continues throughout the industry, for example as the decentralized architecture of wireless routers installed in homes and offices supplement and even replace phone companies' relatively centralized long-range cell towers.
Inspired by system and cybernetics theorists like Norbert Wiener, Marshall McLuhan and Buckminster Fuller, in the 1960s Stewart Brand started the Whole Earth Catalog and later computer networking efforts to bring Silicon Valley computer technologists and entrepreneurs together with countercultural ideas. This resulted in ideas like personal computing, virtual communities and the vision of an "electronic frontier" which would be a more decentralized, egalitarian and free-market libertarian society. Related ideas coming out of Silicon Valley included the free software and creative commons movements which produced visions of a "networked information economy".
Because human interactions in cyberspace transcend physical geography, there is a necessity for new theories in legal and other rule-making systems to deal with decentralized decision-making processes in such systems. For example, what rules should apply to conduct on the global digital network and who should set them? The laws of which nations govern issues of internet transactions (like seller disclosure requirements or definitions of "fraud"), copyright and trademark?
Centralization and redecentralization of the Internet
The New Yorker reports that although the Internet was originally decentralized, in recent years it has become less so: "a staggering percentage of communications flow through a small set of corporations – and thus, under the profound influence of those companies and other institutions [...] One solution, espoused by some programmers, is to make the Internet more like it used to be – less centralized and more distributed."
Examples of projects that attempt to contribute to the redecentralization of the Internet include ArkOS, Diaspora, FreedomBox, IndieWeb, Namecoin, SAFE Network, twtxt and ZeroNet as well as advocacy group Redecentralize.org, which provides support for projects that aim to make the Web less centralized.
In an interview with BBC Radio 5 Live one of the co-founders of Redecentralize.org explained that:
Blockchain technology
In blockchain, decentralization refers to the transfer of control and decision-making from a centralized entity (individual, organization, or group thereof) to a distributed network. Decentralized networks strive to reduce the level of trust that participants must place in one another, and deter their ability to exert authority or control over one another in ways that degrade the functionality of the network.
Bitcoin is the original implementation of a blockchain where proof-of-work is used as a means of establishing decentralized consensus (aka. Nakamoto consensus), thus enabling the uniqueness of its intrinsic digital asset and utility as a scarce cryptocurrency.
Decentralized protocols, applications, and ledgers (used in Web3) could be more difficult for governments to control, censor, or regulate as has been seen with BitTorrent.
Appropriate technology
"Appropriate technology", originally described as "intermediate technology" by economist E. F. Schumacher in Small Is Beautiful: A Study of Economics As If People Mattered, is generally recognized as encompassing technologies that are small-scale, decentralized, labor-intensive, energy-efficient, environmentally sound, and locally controlled.
Criticism
Factors hindering decentralization include weak local administrative or technical capacity, which may result in inefficient or ineffective services; inadequate financial resources available to perform new local responsibilities, especially in the start-up phase when they are most needed; or inequitable distribution of resources. Decentralization can make national policy coordination too complex; it may allow local elites to capture functions; local cooperation may be undermined by any distrust between private and public sectors; decentralization may result in higher enforcement costs and conflict for resources if there is no higher level of authority. Additionally, decentralization may not be as efficient for standardized, routine, network-based services, as opposed to those that need more complicated inputs. If there is a loss of economies of scale in procurement of labor or resources, the expense of decentralization can rise, even as central governments lose control over financial resources.
Other challenges, and even dangers, include the possibility that corrupt local elites can capture regional or local power centers, while constituents lose representation; patronage politics will become rampant and civil servants feel compromised; further necessary decentralization can be stymied; incomplete information and hidden decision-making can occur up and down the hierarchies; centralized power centers can find reasons to frustrate decentralization and bring power back to themselves.
It has been noted that while decentralization may increase "productive efficiency" it may undermine "allocative efficiency" by making redistribution of wealth more difficult. Decentralization will cause greater disparities between rich and poor regions, especially during times of crisis when the national government may not be able to help regions needing it.
Solutions
The literature identifies the following eight essential preconditions that must be ensured while implementing decentralization in order to avert the "dangers of decentralization":
Social Preparedness and Mechanisms to Prevent Elite Capture
Strong Administrative and Technical Capacity at the Higher Levels
Strong Political Commitment at the Higher Levels
Sustained Initiatives for Capacity-Building at the Local Level
Strong Legal Framework for Transparency and Accountability
Transformation of Local Government Organizations into High Performing Organizations
Appropriate Reasons to Decentralize: Intentions Matter
Effective Judicial System, Citizens' Oversight and Anticorruption Bodies to prevent Decentralization of Corruption
See also
Centralization
Federalism
Subsidiarity
References
Further reading
Aucoin, Peter, and Herman Bakvis. The Centralization-Decentralization Conundrum: Organization and Management in the Canadian Government (IRPP, 1988),
Campbell, Tim. Quiet Revolution: Decentralization and the Rise of Political Participation in Latin American Cities (University of Pittsburgh Press, 2003), .
Faguet, Jean-Paul. Decentralization and Popular Democracy: Governance from Below in Bolivia, (University of Michigan Press, 2012), .
Fisman, Raymond and Roberta Gatti (2000). Decentralization and Corruption: Evidence Across Countries, Journal of Public Economics, Vol.83, No.3, pp. 325–45.
Frischmann, Eva. Decentralization and Corruption. A Cross-Country Analysis, (Grin Verlag, 2010), .
Miller, Michelle Ann, ed. Autonomy and Armed Separatism in South and Southeast Asia (Singapore: ISEAS, 2012).
Miller, Michelle Ann. Rebellion and Reform in Indonesia. Jakarta's Security and Autonomy Policies in Aceh (London and New York: Routledge, 2009).
Rosen, Harvey S., ed.. Fiscal Federalism: Quantitative Studies National Bureau of Economic Research Project Report, NBER-Project Report, (University of Chicago Press, 2008), .
Taylor, Jeff. Politics on a Human Scale: The American Tradition of Decentralism (Lanham, Md.: Lexington Books, 2013), .
Richard M. Burton, Børge Obel, Design Models for Hierarchical Organizations: Computation, Information, and Decentralization, Springer, 1995,
Merilee Serrill Grindle, Going Local: Decentralization, Democratization, And The Promise of Good Governance, Princeton University Press, 2007,
Daniel Treisman, The Architecture of Government: Rethinking Political Decentralization, Cambridge University Press, 2007,
Sharma, Chanchal Kumar(2014, Nov.12). Governance, Governmentality and Governability: Constraints and Possibilities of Decentralization in South Asia. Keynote Address, International Conference on Local Representation of Power in South Asia, Organized by Department of Political Science, GC University, Lahore (Pakistan) Nov. 12–14.
Schakel, Arjan H. (2008), Validation of the Regional Authority Index, Regional and Federal Studies, Routledge, Vol. 18 (2).
Decentralization, article at the "Restructuring local government project" of Dr. Mildred Warner, Cornell University includes a number of articles on decentralization trends and theories.
Robert J. Bennett, ed., Decentralization, Intergovernmental Relations and Markets: Towards a Post-Welfare Agenda, Clarendon, 1990, pp. 1–26.
External links
Organizational theory
Cyberpunk themes |
47364850 | https://en.wikipedia.org/wiki/MulticoreWare | MulticoreWare | MulticoreWare Inc is a software development company, offering products and services related to HEVC video compression, machine learning (specifically, convolutional neural networks), compilers for heterogeneous computing, and software performance optimization services. MulticoreWare's customers include AMD, Microsoft, Google, Qualcomm and Telestream. MulticoreWare was founded in 2009 and today has offices in 3 countries – USA, China and India.
MulticoreWare was placed at 110 on the Inc. 5000 list of fastest growing private companies in America for the year 2014. St. Louis, Missouri based technology start-up accelerator ITEN listed the company in its list of top ten tech startups in the St. Louis area for three consecutive years (2012–2014). MulticoreWare was ranked the 22nd fastest growing private company in Silicon Valley by Silicon Valley Business Journal in October 2014. In July 2014, MulticoreWare was named to EE Times Silicon 60, a list of hot startups to watch. MulticoreWare Inc. was a Tie50 Awards Finalist at TiEcon2014.
In May 2020, MulticoreWare entered the AMD embedded platform ecosystem with its AI technologies that address workloads for machine learning, neural networks, image and video processing applications to serve market segments such as: medical diagnostics, sports analytics, security & surveillance, robotics, and augmented reality.
Products
x265
MulticoreWare leads the development of the x265 HEVC encoder. x265 is based on the x264 H.264/MPEG-4 AVC encoder with a similar command-line syntax and feature set. x265 is offered under either the GNU General Public License (GPL) 2 license or a commercial license. In February 2014, Telestream's Vantage Transcode Multiscreen became the first commercial product to introduce x265 encoding technology. In October 2015, the Video Group at Moscow State University identified x265 as having the highest overall efficiency (i.e. the lowest bit rate at any target quality level) in its first comparison of HEVC encoders.
LipSync
LipSync is a tool that automatically detects audio-video synchronization errors in video. By using machine learning and deep learning technologies, errors can be detected without digital fingerprinting or watermarking in the source video. It requires an Nvidia GPU, an AMD64 capable CPU, 16GB of RAM and a Windows or Linux operating system.
UHDcode
MulticoreWare offers the UHDcode HEVC video decoder API, available on x86, ARM, Xbox 360 and PS3. It has been OpenCL accelerated and supports HEVC Main/ Main10 profiles.
x265 HEVC Upgrade
In March 2015 MulticoreWare launched x265 HEVC Upgrade, which includes the x265 Encoder application and the UHDcode DirectShow filter, allowing HEVC video playback on 64-bit Windows Media Player.
Multicore Cross Platform Architecture
Multicore Cross Platform Architecture (MxPA) is a heterogeneous computing stack based on the LLVM framework, capable of supporting OpenCL, RenderScript, CUDA and C++ AMP.
HCC C++
HCC is an open source parallel C++ compiler for HSA and OpenCL 1.2. HCC provides compiler frontends for C++AMP, C++ source with parallel STL and OpenMP.
Software development services
MulticoreWare has one of the world's largest heterogeneous computing teams across the globe and offers accelerated software development services. MulticoreWare is a Contributor Member of the Khronos Group and is active on several standards. Its full range of services include:
GPU-accelerated software development
Multicore CPU application development
CUDA acceleration services for Nvidia GPUs
C++ AMP software development services
RenderScript Android acceleration
Xilinx Alliance Partner services
Convolutional neural networks
References
External links
MulticoreWare website
John Stratton discusses "Heterogeneous Performance with OpenCL™ and MxPA" at ARM TechCon 2013
Inc.com Profile: MulticoreWare
Business software companies
Companies based in California
Technology companies established in 2009
Software companies of the United States
Technology companies of the United States
Web service providers |
4894615 | https://en.wikipedia.org/wiki/Debian%20Pure%20Blend | Debian Pure Blend | A Debian Pure Blend is a project completely inside of Debian targeting a server or a desktop installation in very broad and general terms.
A Debian Pure Blend aims to cover interests of specialised users, who might be children, lawyers, medical staff, visually impaired people, certain academic fields, etc. The common goal of those is to make installation and administration of computers for their target users as easy as possible, and to serve in the role as the missing link between software developers and users well.
Idea
The ideas behind Debian Pure Blends are
providing an out-of-the-box working solution (i.e. some useful collection of software from the Debian pool for the designated target group of specialists) for end-users
providing a frame in which specialists can better channelize their efforts of sustaining a software ecosystem for their field
The Debian 8 "Jessie" release consists of approximately 43,000 software packages. Therefore, without knowing the specific name of a given application, it can be difficult for a user to find packages matching their needs. This is particularly an issue when the name of the software doesn't make its function clear.
Technical
Linux distribution that is configured to support a particular target group out-of-the-box. All changes and improvements are integrated to the official Debian repositories. A Debian Pure Blend can contain multiple flavors (or profiles) (e.g., Debian Edu has flavors for main-server, workstation, and thin-client-server).
Technically a Debian Pure Blend builds a set of metapackages and provides an overview about the packages which are included and which are on the todo list for further inclusion. Both pages are rendered from the information inside the tasks files in an SVN.
Most of the distributions based on Debian, like for example Knoppix or Sacix, are not Debian Pure Blends, and Ubuntu is not even binary compatible with Debian. Linux Mint Debian Edition is binary compatible with Debian, but is also not a Debian Pure Blend.
Existing Debian Pure Blends
Debian Junior: Debian for children "from 1 to 99"
Debian-Med: Debian in Health Care
Debian Edu: Debian for Education
Debian GIS: Debian with many geographic information system-Packages, e.g. GRASS GIS, QGIS, GPSPrune, QLandkarteGT, et al.
Debian Astro: Debian for professional and amateur astronomers
DebiChem: Debian for chemists
Hamradio: Debian for radio amateurs
Debian Accessibility
Debian Science
Debian Accessibility Project
FreedomBox
Debian-Med
The Debian Med project is a Debian Pure Blend created to provide a co-ordinated operating system and collection of available free software packages that are well-suited for the requirements for medical practices and medical research. Debian Med does not create or program software, but integrates software available under a license conforming to the DFSG into Debian and also extends Debian to be a better platform for this field of interest. The Debian Software Repositories contain over 51,000 packages. Debian Med serves as a magnifying lens to categorize all those packages, that as suited for the field of medicine.
Categories
Debian includes over 51,000 packages, many of those being the focus of Debian Med. These are being summarized into categories called tasks:
Medical practice and Patient management
Molecular Biology and Medical Genetics
Medical imaging
Drug databases
Psychology
and several others
See also
Fedora Robotics
Robotics suite
For medical records:
Electronic health record
Health informatics
Fastra II
Ubuntu-Med
References
External links
Detailed paper about Debian Pure Blends
Debian Wiki Blends article
Blends mailing list
Debian-med
Debian Med talks
Wiki page with further information for users and developers.
Debian-based distributions
Linux distributions |
48514595 | https://en.wikipedia.org/wiki/MAI%20Systems | MAI Systems | MAI Systems Corporation, or simply MAI, was a United States-based computer company best known for its Basic/Four product and the customized computer systems that ran it. It was later known for its computer reservation systems.
The company formed in 1957 as a consulting firm, Management Assistance Inc.. In the early 1960s they created a profitable niche leasing IBM mainframes and grew to have income in the millions. When the System/360 was announced the company was left with hundreds of millions of dollars worth of suddenly outdated equipment, and by 1971 the company was almost insolvent. The company re-launched that year starting several new subsidiaries. Among these was Basic/Four Corporation which sold customized minicomputers running their version of Business Basic, Genesis One that bought and sold obsolete equipment, and Sorbus, which performed servicing on computer equipment. Genesis One was never very successful, and while Sorbus was modestly profitable, by 1975 two-thirds of MAI's income was from Basic/Four.
By the mid-1980s, the introduction of the IBM PC was shaking up the entire computer market and MAI was once again losing money. Asher Edelman began a proxy war to take over the company, and on achieving this in 1985, immediately began liquidation. Sorbus was sold to Bell Atlantic and Basic/Four sold to Bennett S. LeBow. Basic/Four took over the MAI marque, and the product, now running on the Unix-like UCOS system, became MAI Basic Four, Inc. This was re-launched in 1990 as Open BASIC on the PC, becoming MAI Systems at that time. Using the money LeBow organized during the leveraged buyout, the company purchased a number of other companies in an effort to diversify. Among these was Computerized Lodging Systems, who made booking systems for hotels.
The Business BASIC market disappeared, and the company was declared bankrupt in 1993. They emerged from Chapter 11 later that year, focused on the hotel software market, the division now named Hotel Information Systems. In this form they continued until the early 2000s, until being purchased by Appian Corporation in 2005.
History
Leasing business
Walter Oreamuno, an immigrant to the United States from Costa Rica, won a problem-solving contest run by IBM. Using the winnings, he formed Management Assistance Inc. in 1955 with fellow Costa Rican, Jorge González-Martén, performing computer consulting in areas underserved by IBM, like Costa Rica and the Philippines, and then Europe and Canada.
In 1956, IBM entered a consent decree with the Department of Justice that forced them to sell their mainframe computers, not just lease them. Oreamuno and González-Martén saw an opportunity; they offered companies that had recently purchased an IBM system to buy the system and lease it back to them at a rate lower than IBM would. This meant the company did not have to use its own capital to buy the systems, and their first customers were mainly banks who could easily arrange the required financing.
IBM depreciated its systems very rapidly and this led to a large market for used machines at very low costs. Using the profits from their early leasing arrangements, the company began buying systems of their own. In 1961 the company went public, raising $300,000 (). The company began a rapid expansion and by 1966 had amassed about $200 million in systems () and its shares soared to $55 a share.
In 1965, IBM introduced the System/360. This immediately rendered almost every other computer obsolete overnight. MAI had two-year contracts for their systems, and customers began cancelling them as they purchased new ones that worked with the 360. Oreamuno continued purchasing older systems to lease to customers who did not need the 360, but this proved unwise. MAI attempted a merger with Transamerica Corporation in 1967, but this fell apart. Oreamuno resigned as Chief Executive Officer was replaced by Luther Schwalm, formerly of IBM.
Under Schwalm, the company stopped purchasing punch card and related systems that were now outdated, and began purchasing newer systems like hard disk drives. In spite of these corrective measures, in 1967 they had a $17 million write-down of their older hardware. The company's fortunes quickly soured; in 1970 they had $60 million in revenue but $140 million in debt with a total net worth of negative $28 million.
Reorganization and Basic/Four
In 1969, González-Martén went to the board of directors with a new proposal; for $6.5 million he proposed to develop a new minicomputer that would use computer terminals as its primary input and thereby leave behind the punch card-based workflows of the mainframe systems. Shortly after having made the proposal, González-Martén returned to Costa Rica. In 1970, MAI president Sol Gordon asked him to return, setting up a new division, Basic/Four in Santa Ana, California.
In 1971, chief financial officer Raymond Kurshan took over as president and González-Martén returned to Costa Rica. Kurshan reorganized the firm into three divisions, Basic/Four Corporation continued development of their new platform, Genesis One took over the existing leasing business with an eye to selling off the equipment, and Sorbus was a new service organization formed from the service side of MAI's leasing business. The new systems were introduced with four models in June 1972 at the Commodore Hotel in San Francisco. The key concept behind the platform was its use of Business Basic, which offered COBOL-like record handing in the BASIC computer language and multi-user account handling. The systems were an immediate success, and by 1975, sales had grown $43 million, two-thirds of MAI's income.
Suddenly profitable again, the company began expanding their product line. In 1977, the company bought Wordstream Corporation and sold their word processing systems that ran on IBM terminals. They also introduced a number of applications written in Business Basic, including EASY, a reporting system, and Business Data statistics software. In 1979 they introduced the DataWord II, which operated both as a word processing system and a terminal. However, new entrants into the standalone word processing market, especially Wang, quickly rendered their products unprofitable and they exited that market in 1980.
By 1980, they announced the sale of their 10,000th system, but profitability was once again dropping significantly. To stem the loss of customers, in 1983 they introduced the MAI 8000, a supermini capable of supporting 96 simultaneous users. However, by this point the 1981 introduction of the IBM PC was gaining momentum, and the margins continued to contract. They company then began a diversification process, entering niche business like pharmaceutical firms, sewing-goods companies, and non-profit agencies. This was not successful, and for the year the Basic/Four division reported a loss of $10.2 million.
Breakup and the new MAI
In 1984, Asher Edelman purchased 12% of MAI's outstanding shares, and began a proxy war for control of the company. This led to him placing four of the ten seats on the board of directors. He gained outright control in August, causing Kurshan to resign his positions as chairman, president and CEO. Edelman immediately began liquidating the company. Sorbus was sold to a Bell Atlantic subsidiary and Basic/Four was purchased in a $100 million leveraged buyout by Bennett S. LeBow.
LeBow renamed the company as MAI Basic Four, Inc., now privately held. He immediately sold the Canadian division to Bell Atlantic for $23 million. LeBow brought in William Patton to turn around the fortunes of the rest of the company, which they did by focussing on their existing 27,000 strong customer base, and narrowing future sales to eight key markets where they were well represented. In September 1986, the company reported a $17 million profit on sales of $281 million, and the company was once again taken public.
In 1986 the company introduced the MAI 3000 midrange system, and in 1987, the expandable MAI 4000. Although the company represented only about 1% of the minicomputer market, these models were nevertheless successful and the next year was among the company's best, with $22.8 million profits from sales of $321 million. With this cash, the company re-purchased MAI Canada and portions of Sorbus, along with twenty-five smaller software firms aimed at specific industries. In 1988 they had their record year, with $24.5 million profits on $420 million in sales.
1989 downturn and reorganization as MAI Systems
Sales began to slip in the second half of 1988, and LeBow put his shares up for sale. No one expressed an interest, so instead, in November 1988 LeBow decided to use MAI as the basis for a takeover/merger of Prime Computer. By early 1989 the United States computer market had a sudden downturn and sales plummeted. In June, Patton resigned as president. The takeover attempt failed in June, having cost $25 million and generating considerable ill-will among MAI's customer base. In August 1989, LeWow-controlled Brooke Partners invested $55 million and became the largest shareholder. LeBow resigned control positions, and Fred Anderson became the president and chief operating officer while William Weksel became the CEO and chair.
In April 1990 the company purchased Computerized Lodging Systems, who produced a series of software systems for the hotel industry. They also released Open BASIC, a version of Business Basic that ran on a variety of operating systems. The company name was changed to MAI Systems later that year. In 1991 the company began winding down its manufacturing and became a reseller of commercial off the shelf systems. The company continued to lose money, and reported a loss of $182 million for fiscal 1992.
In March 1993 a group of European banks took control of MAI's European operations, and the rest of the company entered Chapter 11. They emerged from Chapter 11 in 1993 as a much smaller company focussed mainly on their niche market software systems like hotel booking and food services (through the Sextant division). The company continued to retrench through the 1990s and the remaining hotel unit was sold to Appian Corporation in 2005.
See also
MAI Systems Corp. v. Peak Computer, Inc.
References
Citations
Bibliography
American companies established in 1957
Software companies of the United States
American companies disestablished in 2005
Leasing companies |
2491736 | https://en.wikipedia.org/wiki/Test%20%28Unix%29 | Test (Unix) | test is a command-line utility found in Unix, Plan 9, and Unix-like operating systems that evaluates conditional expressions. test was turned into a shell builtin command in 1981 with UNIX System III and at the same time made available under the alternate name [.
Overview
The test command in Unix evaluates the expression parameter. In most recent shell implementations, it is a shell builtin, even though the external version still exists. In the second form of the command, the [ ] (brackets) must be surrounded by blank spaces (this is because [ is a program and POSIX compatible shells require a space between the program name and its arguments). One must test explicitly for file names in the C shell. File-name substitution (globbing) causes the shell script to exit.
The test command is not to be confused with the [[ reserved word that was introduced with ksh88. The latter is not a command but part of the ksh88 syntax and does not apply file-name substitution to glob expressions.
The version of test bundled in GNU coreutils was written by Kevin Braunsdorf and Matthew Bradburn. The command is available as a separate package for Microsoft Windows as part of the UnxUtils collection of native Win32 ports of common GNU Unix-like utilities. The command has also been ported to the IBM i operating system.
Syntax
test expression
or
[ expression ]
Arguments
The following arguments are used to construct this parameter:
-e FileName - FileName exists
All remaining arguments return true if the object (file or string) exists, and the condition specified is true.
-b Filename - Returns a True exit value if the specified FileName exists and is a block special file
-c FileName - FileName is a character special file
-d FileName - FileName is a directory
-f FileName - FileName is a regular file
-g FileName - FileName's Set Group ID bit is set
-h FileName - FileName is a symbolic link
-k FileName - FileName's sticky bit is set
-L FileName - FileName is a symbolic link
-p FileName - FileName is a named pipe (FIFO)
-r FileName - FileName is readable by the current process
-s FileName - FileName has a size greater than 0
-t FileDescriptor - FileDescriptor is open and associated with a terminal
-u FileName - FileName's Set User ID bit is set
-w FileName - FileName's write flag is on. However, the FileName will not be writable on a read-only file system even if test indicates true
-x FileName - FileName's execute flag is on
If the specified file exists and is a directory, the True exit value indicates that the current process has permission to change cd into the directory.
Non standard Korn Shell extensions:
file1 -nt file2 - file1 is newer than file2
file1 -ot file2 - file1 is older than file2
file1 -ef file2 - file1 is another name for file2 - (symbolic link or hard link)
String arguments
In Perl, these sections are reversed: eq is a string operator and == is a numerical operator, and so on for the others.
-n String1 - the length of the String1 variable is nonzero
-z String1 - the length of the String1 variable is 0 (zero)
String1 = String2 - String1 and String2 variables are identical
String1 != String2 - String1 and String2 variables are not identical
String1 - true if String1 variable is not a null string
Number arguments
Integer1 -eq Integer2 - Integer1 and Integer2 variables are algebraically equal
-ne - not equal
-gt - greater than
-ge - greater or equal
-lt - less than
-le - less or equal
Operators
test arguments can be combined with the following operators:
! - Unary negation operator
-a - Binary AND operator
-o - Binary OR operator (the -a operator has higher precedence than the -o operator)
\(Expression\) - Parentheses for grouping must be escaped with a backslash \
The -a and -o operators, along with parentheses for grouping, are XSI extensions and are therefore not portable. In portable shell scripts, the same effect may be achieved by connecting multiple invocations of test together with the && and || operators and parentheses.
Exit status
This command returns the following exit values:
0 - The Expression parameter is true
1 - The Expression parameter is false or missing
>1 - An error occurred
Examples
1. To test whether a file is nonexistent or empty, type:
if test ! -s "$1"
then
echo $1 does not exist or is empty.
fi
If the file specified by the first positional parameter to the shell procedure, $1, does not exist or is of size 0, the test command displays the message. If $1 exists and has a size greater than 0, the test command displays nothing.
Note: There must be a space between the -s function and the file name.
The quotation marks around $1 ensure that the test works properly even if the value of $1 is a null string. If the quotation marks are omitted and $1 is the empty string, the test command displays the error message:
test: argument expected.
2. To do a complex comparison, type:
if [ "$#" -lt 2 ] || ! [ -e "$1" ]
then
exit
fi
If the shell procedure is given fewer than two positional parameters or the file specified by $1 does not exist, then the shell procedure exits. The special shell variable $# represents the number of positional parameters entered on the command line that starts this shell procedure.
See also
List of Unix commands
Unix shell
find (Unix)
References
Further reading
(free download)
External links
Unix SUS2008 utilities
Plan 9 commands
Conditional constructs |
685521 | https://en.wikipedia.org/wiki/Rhythmbox | Rhythmbox | Rhythmbox is a free and open-source audio player software, tag editor and music organizer for digital audio files on Linux and Unix-like systems.
Rhythmbox is designed to work well under GNOME, but can function on other desktop environments. It is very scalable, able to handle libraries with tens of thousands of songs with ease. It provides a full feature set including full support for Unicode, fast but powerful tag editing, and a variety of plug-ins.
Rhythmbox is the default audio player on many Linux distributions including Fedora, Ubuntu since v12.04 LTS, and Linux Mint as of version 18.1.
Features
Rhythmbox offers a significant number of features, including:
Music playback
Playback from a variety of digital music sources is supported. The most common playback is music stored locally as files on the computer (the 'Library'). Rhythmbox supports playing streamed Internet radio and podcasts as well. The ReplayGain standard is also supported. Rhythmbox also supports searching of music in the library.
Playlists may be created to group and order music. Users may also create 'smart playlists,' ones that are automatically updated (like a database query) based on a customized rule of selection criteria rather than an arbitrary list of tracks. Music may be played back in shuffle (random) mode or repeat mode.
Track ratings are supported and used by the shuffle mode algorithm to play higher-rated tracks more often.
Gapless playback
Enabling the crossfading backend option with a duration of 0.0 switches Rhythmbox into gapless playback mode for music formats that support it. Gapless playback is not enabled by default.
Music importing
Audio CD ripping
Comprehensive audio format support through GStreamer
iPod support
Android support
Audio CD burning
Since the 0.9 release, Rhythmbox can create audio CDs from playlists.
Album cover display
Since the 0.9.5 release, Rhythmbox can display cover art of the currently playing album. The plugin can search the internet to find corresponding artwork, and as of 0.12.6, can read artwork from ID3 tags. If an image file is saved in the same directory as the audio track this is used instead.
SoundCloud
Rhythmbox can browse and play sounds from SoundCloud, via built-in SoundCloud plugin.
Song lyrics display
Since the 0.9.5 release, Rhythmbox can provide song lyrics of the currently playing song by pressing [ctrl + L], as long as the lyrics are stored in a lyrics database.
Audio scrobbling
Rhythmbox can submit played songs info to a remote scrobbling service. This information is used by the remote service to provide user specific music recommendations. Rhythmbox currently supports 3 scrobbling services:
Last.fm
Libre.fm, the open-source drop-in replacement
ListenBrainz
Music can be scrobbled to all services at the same time.
DAAP music sharing
Rhythmbox supports sharing music and playing shared music on local network via DAAP sharing plugin. The plugin uses libdmapsharing to provide this feature.
Devices
Rhythmbox uses the Linux udev subsystem to detect player devices.
Podcasting
Rhythmbox can subscribe to podcasts from the iTunes Store, Miroguide.com or by manually providing a podcast feed URL. Subsequently, new podcasts are automatically downloaded and available from the Library under the section Podcasts.
Web remote control
Rhythmbox can be controlled remotely with a Web browser, via inbuilt Web remote control plugin.
Plug-ins
Rhythmbox has a plug-in API for C, Python, or Vala.
There are nearly 50 third party plug-ins for Rhythmbox. including a 10 Band audio Equalizer, and many official plug-ins including:
Cover art search
Audio CD Player
Last.fm / Libre.fm / Listenbrainz
DAAP Music Sharing
FM Radio
Grilo media browser
IM Status
Internet Radio Streaming
Song Lyrics
Magnatune Store
Media Player Keys
Portable Players (generic, iPod)
Android devices (via MTP)
Notification
Power Manager
Python Console (for debugging)
LIRC
Send tracks
Replay Gain
MediaServer2 D-Bus interface
MPRIS D-Bus interface
Browser to integrate Rhythmbox with iTunes
CD/DVD burning based on Brasero
Integration
Rhythmbox has been extensively integrated with a number of external programs, services and devices including:
Built-in support for Multimedia Keys on keyboard
Nautilus file manager context-menu integration, "hover mode" playback in Nautilus
XChat, via an XChat plugin.
Pidgin-Rhythmbox automatically updates the Pidgin user profile with details of the currently playing track
Gajim and Pidgin include options for automatically updating the user status with details of currently playing track
aMSN and emesene can change the user's personal message to current track via the "music" plugin (aMSN) and the "CurrentSong" plugin (emsene), similar to Messenger Plus! Live
Music Applet (previously known as the Rhythmbox Applet), a GNOME panel applet that provides Rhythmbox playback controls from within the panel. Music Applet has since been superseded by Panflute
Rhythmlet, another gDesklet that retrieves album art locally or from Amazon.com, has configurable display strings, playback controls, editable ratings and a seek bar
SideCandyRhythmbox, a gDesklet-based Rhythmbox control and SideCandy display
Rhythmbox XSLT allows the music library to be viewed as a web page
Drivel inserts the name of the track Rhythmbox is currently playing into a LiveJournal blog entry
Rhythmbox Tune Publisher publishes the currently playing Rhythmbox track to XMPP via the User Tune protocol (used by the Jabber World Map)
FoxyTunes, a Mozilla Firefox extension that provides Rhythmbox playback controls from within the web browser
Plugins for browsing and listening to Creative Commons licensed albums from Jamendo ( via grilo plugin ) and Magnatune.
Rhythmbox Remote helps to remotely control Rhythmbox through an Android powered device.
Rhythmbox WebMenu is a fully personalizable plugin that integrates Rhythmbox with several music websites.
Version history
See also
Software audio players (free and open-source)
List of feed aggregators
Comparison of feed aggregators
References
External links
Rhythmbox website
2001 software
Applications using D-Bus
Audio player software that uses GTK
Free audio software
Free media players
Free software programmed in C
GNOME Applications
Jukebox-style media players
Linux media players
Online music database clients
Software that uses GStreamer
Tag editors for Linux
Tag editors that use GTK |
44346380 | https://en.wikipedia.org/wiki/Elm%20information%20security | Elm information security | Elm is a Saudi Joint Stock Company owned by the Public Investment Fund (PIF), which is the investment arm of the Saudi Ministry of Finance. Elm services are provided to all forms of beneficiaries, including government, corporate sector and individuals.
Sectors
Elm services are:
Ready made solutions
Customs solutions
Outsourcing services
Consulting services
Elm history
1988: Elm was established as Al-Elm Research and Development Company. At that time, the company role was to localize and transfer knowledge and information technology to the Kingdom of Saudi Arabia, in addition to some research initiatives benefiting the Ministry of Interior.
2002: The Company began its commercial activities and changed its name to Al-Elm Information Security Company. Its services at that time included everything that had to do with information security starting from designing secure structures for companies, to performing penetration testing. The first E-government service started in the following years piloted by the Saudi Omrah Portal.
2004:Elm switched its business focus from Information Security to providing Secure e-Services. In the years to come, everyone was talking about e-Government; Elm was already living it. The company continued providing all sorts of different secure e-Services until it managed to produce the Electronic exit/re-entry travel visa for expatriates residing within the country, such an achievement was considered to be the first fully interactive Saudi e-Government service that applies all qualifications of an e-Service.
2007: the Ministerial Cabinet approved the decree to transform the company to be owned by the Public Investment Fund and also became a closed joint stock company.
2010: The company has launched its strategic plan to grow and contract with government sectors to implement optimizing, outsourcing and information technology projects.
2012: Launched the new Elm identity.
2014: The company continued its strategy to grow and started providing its services directly to the private sector in addition to government contracts to implement strategic projects for the country.
2016: Elm started offering its services to the global market.
References
Company website
External links
Company website
Service companies of Saudi Arabia
Software companies established in 1988
Companies based in Riyadh |
779220 | https://en.wikipedia.org/wiki/Mission%20control%20center | Mission control center | A mission control center (MCC, sometimes called a flight control center or operations center) is a facility that manages space flights, usually from the point of launch until landing or the end of the mission. It is part of the ground segment of spacecraft operations. A staff of flight controllers and other support personnel monitor all aspects of the mission using telemetry, and send commands to the vehicle using ground stations. Personnel supporting the mission from an MCC can include representatives of the attitude control system, power, propulsion, thermal, attitude dynamics, orbital operations and other subsystem disciplines. The training for these missions usually falls under the responsibility of the flight controllers, typically including extensive rehearsals in the MCC.
NASA's Mission Control Center
United States missions are, prior to liftoff, controlled from the Launch Control Center (LCC) located at NASA's Kennedy Space Center on Merritt Island, Florida. Responsibility for the booster and spacecraft remains with the Launch Control Center until the booster has cleared the launch tower.
After liftoff, responsibility is handed over to NASA's Mission Control Center in Houston, Texas (abbreviated MCC-H, full name Christopher C. Kraft Jr. Mission Control Center), at the Lyndon B. Johnson Space Center.
NASA's Mission Control Center in Houston also manages the U.S. portions of the International Space Station (ISS).
RKA Mission Control Center
The Mission Control Center of the Russian Federal Space Agency (), also known by its acronym ЦУП ("TsUP") is located in Korolyov, near the RKK Energia plant. It contains an active control room for the ISS. It also houses a memorial control room for the Mir where the last few orbits of Mir before it burned up in the atmosphere are shown on the display screens.
ISRO Mission Control Centre
The Mission Control Center of the Indian Space Research Organisation is located at Satish Dhawan Space Centre, Sriharikota, India.
European Space Operations Centre
European Space Operations Centre (ESOC) is responsible for ESA's satellites and space probes. It is located in Darmstadt, Germany.
German Space Operations Center
German Space Operations Center (GSOC) is responsible for DLR's satellites and other customer's missions. It is located in Oberpfaffenhofen near Munich, Germany.
The Columbus Control Centre (Col-CC) at the German Aerospace Center (DLR) in Oberpfaffenhofen, Germany. It is the mission control center for the European Columbus research laboratory at the International Space Station.
The Galileo Control Center (GCC) at the German Aerospace Center (DLR) in Oberpfaffenhofen, Germany. It is one of the mission control centers for the European Galileo Navigation System.
French Space Operations Center
The French National Centre for Space Studies (CNES) ATV Control Centre (ATV-CC) is located at the Toulouse Space Centre (CST) in Toulouse, France. It is the mission control center for the European Automated Transfer Vehicles, that regularly resupply ISS.
Beijing Aerospace Command and Control Center
Beijing Aerospace Command and Control Center is a command center for the Chinese space program which includes the Shenzhou missions. The building is inside a complex nicknamed Aerospace City. The city is located in a suburb northwest of Beijing.
Spaceflight Operations Facility
The Jet Propulsion Laboratory (JPL) in Pasadena, California manages all of NASA's uncrewed spacecraft outside Earth's orbit and several research probes within along with the Deep Space Network from the Space Flight Operations Facility.
Other significant centers
America
Boeing Satellite Development Center (SDC) Mission Control Center in El Segundo, California, US. In charge of several military satellites.
Goddard Space Flight Center in Greenbelt, Maryland provides mission control for the Hubble Space Telescope.
Lockheed Martin A2100 Space Operations Center (ASOC) in Newtown, Pennsylvania, US. In charge of several military satellites.
Mercury Control Center was located on the Cape Canaveral Air Force Station and was used during Project Mercury. One of its still standing buildings now serves as a makeshift bunker for the media if a rocket explodes near the ground.
Mobile Servicing System Control and Training at Saint-Hubert, Quebec, Canada. Supports Canadarm2 and "dextre" robotics operations.
Space Systems/Loral Mission Control Center in Palo Alto, California, US.
The MESSENGER and New Horizons missions were controlled from the Applied Physics Laboratory near Baltimore, Maryland.
SpaceX’s Mission Control Center (MCC-X) in Hawthorne, California
Multi-Mission Operations Center at the Ames Research Center
Payload Operations and Integration Center at the Marshall Spaceflight Center in Huntsville, Alabama where science activities aboard the International Space Station are monitored around the clock.
Asia
JEM Control Center and the HTV Control Center at the Tsukuba Space Center (TKSC) in Tsukuba, Japan manages operations aboard JAXA's Kibo ISS research laboratory and the resupply flights of the H-II Transfer Vehicle. JAXAs satellite operations are also based here.
Europe
The ATV Control Centre (ATV-CC) is located at the Toulouse Space Centre (CST) in Toulouse, France. It is the mission control center for the European Automated Transfer Vehicles, that regularly resupply ISS.
The Columbus Control Center (Col-CC) at the German Aerospace Center (DLR) in Oberpfaffenhofen, Germany. It is the mission control center for the European Columbus research laboratory at the International Space Station.
The Rover Operations Control Centre (ROCC) is located in Turin, Italy. It will be the mission control center for the ExoMars rover Rosalind Franklin.
Titov Main Test and Space Systems Control Centre, mission control center in Krasnoznamensk, Russia.
See also
Control room
Ground segment
Launch status check
References
External links
Mission Control Centre for the Russian Federal Space Agency
Space flight - Mission Control Center (English)
Goddard Space Flight Center
Jet Propulsion Laboratory
Columbus Control Centre
Automated Transfer Vehicle Control Centre
European Space Operations Center
Control center
Rooms
Spaceflight technology
Command and control |
21327519 | https://en.wikipedia.org/wiki/Stanley%20Zdonik | Stanley Zdonik | Stanley Zdonik ( ) is a computer scientist specializing in database management systems. He is a tenured professor of computer science at Brown University. Zdonik has lived in the Boston area his entire life. After completing two bachelor’s and two master's degrees at MIT, he then earned a PhD in database management under Michael Hammer.
In the mid-seventies, Zdonik worked on the Prophet data management system for pharmacologists at Bolt Beranek and Newman Inc. After becoming a professor at Brown University during the early 1980s, Zdonik became a leading researcher in object-oriented databases. He has over one hundred peer-reviewed papers in the database field and was named an ACM Fellow in 2006. He has been involved in the development of several notable database projects with other researchers, including Michael Stonebraker and Sam Madden. These projects include the Aurora and Borealis stream processing engines, the C-Store column store database, and the H-Store parallel, main memory OLTP system. He has also served as a member of the VLDB Board of Trustees and has been the general chair for several major database conferences.
Outside of academia, Zdonik is a co-founder for both the StreamBase and Vertica companies, as well as being a technical advisor for Attivio. Episode 2035 of Car Talk (approximately 35m) refers to his stint as an instructor in novice automobile maintenance.
Education
Zdonik has received a number of non-honorary degrees during his career, all from MIT.
Ph.D., Computer Science, June 1983. Massachusetts Institute of Technology
M.S., Computer Science, 1980. Massachusetts Institute of Technology
M.S., Electrical Engineering, 1980. Massachusetts Institute of Technology
B.S., Computer Science, 1970. Massachusetts Institute of Technology
B.S., Electrical Engineering, 1970. Massachusetts Institute of Technology
References
External links
Personal web page
Brown Database Group home page
Living people
American computer scientists
Fellows of the Association for Computing Machinery
Database researchers
MIT School of Engineering alumni
Brown University faculty
Year of birth missing (living people) |
68313148 | https://en.wikipedia.org/wiki/Victor%20Acevedo | Victor Acevedo | Victor Acevedo (born Victor Carl Acevedo on May 19, 1954, in Los Angeles, California) is an American artist best known for his digital work involving printmaking and photography. He was introduced to computer graphics (in 1980) while attending Gene Youngblood's survey class
(based on his book Expanded Cinema) at Art Center College of Design in Pasadena, California.
Career
Since 2007 his primary focus has been working with video and producing (electronic) visual music works. As part of his ongoing practice, he also selects still images from the videos and issues them as signed limited edition prints. His hybrid imagery tends to combine figuration with geometrical abstraction and sometimes it's pure abstraction.
Acevedo is considered a desktop computer art pioneer as he was an early adopter of pre-Windows personal computer software to create fine art in the early 1980s. He has shown his work in over 130 group and solo art exhibitions in the U.S. and Internationally since 1982.
The arc of Acevedo’s career is noteworthy in that it begins in his student phase in 1977 with analog media painting and drawing and then shifts starting in 1983 over a 4-year period to exclusively digital media.
To date, the three main periods of Victor Acevedo’s oeuvre could be described as the
following:
1977 to 87: Analog Art: traditional media, painting, drawing and film
1983 to 2007: Digital Art: archival ink jet and photo prints
2007 to present: Visual Music: Digital Video and Digital Prints
Early Influences
Acevedo's early influences were Cézanne, Picasso, M.C. Escher, Salvador Dalí and R. Buckminster Fuller. A deep study of their work and ideas, led him to the genesis of his space-frame & polyhedral graphical metaphor. It was a kind of 'geometrical Surrealism' and it was quite evident in his early period analog media work. This interplay of geometry and a kind of Neo-Surrealism content carries over to both his digital print and video work.
In 1979, Acevedo was inspired by his reading of Fritjof Capra's book The Tao of Physics, which explores the parallels between modern physics and Eastern mysticism. In the chapter called Emptiness and Form there is a discussion of the ‘void’. It is a domain which is totally empty yet simultaneously full and brimming over with the potentiality of being. This mirrors the behavior of sub-atomic particles or wave phenomena in relation to an underlying field as described in Western physics. With this understanding, Acevedo would use in his images, periodic geometrical structure as a metaphor for this field as a substrate for his figurative subjects. He would call this metaphor the ‘void matrix.’
Acevedo's graphic visualization of this 'void matrix' structural field metaphor in some of his early work was achieved by his adoption of various geometrical structures which are detailed in R. Buckminster Fuller's book called Synergetics: Explorations in the Geometry of Thinking. The primary polyhedral net or space-frame he used is the isotropic vector matrix (IVM). It is an all-space filling network made up of alternating octahedra and tetrahedra.
Digital Prints/Digital Photography
"Victor Acevedo creates pictures that are extremely complex in their spatial organization. Basing his images on scanned photographs of people in interiors, Acevedo works into the scene with three-dimensional modeling, opening the space to add non-cubical polyhedral elementals in various sizes and further modifying these texture and reflections. In this way Acevedo builds a space with interpenetrating three-dimensional events. Some of the pleasurable unease experienced in looking at this densely packed work came to be in finding one-self to be everywhere at once in a kind of doubling virtual reality and finding one's power to discriminate between 'reality' and virtuality directly challenged." - Isabelle Anderson
"Being liberated with the computer graphic tools at hand, the image virtually assembles itself, over many iterations", says computer artist Victor Acevedo. "It's only after the intuitive flow (subsides) that I can stand back and figure out what the image means. The picture appears to be a snapshot of the sacrament of non-ordinary reality. It's like being able to see the fluid connective tissue resonating on an adjacent metaphysical bandwidth."
Initially the main intent of Acevedo's work was to explore the structure of space by re-visioning pictures taken from everyday life. In that, there is a metaphorical juxtaposition between everyday human activities or events and 'extra-sensory' non-anthropomorphic and crystalline energetic flow as represented by polyhedra and polyhedral nets (space frames). The use of this geometry and the graphical tension achieved by combining it with photographic data is an opportunity to represent spatial field phenomena in a way that is non-cubical and non-cubist and something other than the isolated abstract phenomenology of color contrast and resonance (color field).
Acevedo's work has been described by Christian Jacquemart, an art and technology writer as “a visual memoir of 'everyday cymatic precessional resonance', that is to say there is an intent to make visible the ephemeral crystallization of 'localized psychic energy networks' which exist in non-parallel association with people and their environment."
"Victor's work is instantly recognizable as a secular imposition of high-tech geometry into soft-centered photographs. The pairings he made in his pre-dig(ital) work. Escher being a dominant influence. The effect he achieves is like a suspended moment." - James Faure Walker
Acevedo: "My work uses photography but is computer based, as the final images are created and developed in the digital realm. Moreover, it is the computer-generated component that in fact drives the work's primary purpose. My intention is to carry forth in the tradition of metaphoric and graphic spatial representation evident at the heart of the history of painting."
Acevedo's first important digital prints were presented as the Ectoplasmic Kitchen series produced in 1987 and exhibited for the first time in a gallery at the Brand Library in Glendale, California the following year.
However the true public debut of the Ectoplasmic Kitchen series was during an outdoor audio-visual performance featuring the Math Band at California State University, Los Angeles on September 30, 1987. In this context, Acevedo's computer graphic images were projected as 35mm slides.
From 1985 to 1990 Acevedo worked off and on with the PC-based Cubicomp 3D modeling and animation system. The images called Tell Me the Truth and 6.26.27.86 are key examples of his Cubicomp 3D/Targa (TIPS) paint system work from this period. His earliest video works which included computer animation were produced in 1985.
As described in the 1991 Prix Ars Electronica catalogue and the online Ars Electronica Archive "Acevedo is interested in the implications of how micro and macrocosmic structuring principles might operate or be mirrored in human perception. Each image is a scene from everyday life, however charged with a subjective and emotional aura. Into (some) images is introduced a semi-spherical enclosure which alters the viewer's perceptual and depth cues in a way which is both Non-Euclidean and Non-Cubist. With the study of Synergetics Geometry and the use of computers, Acevedo hopes to contribute to the exploration of "uncharted" graphical language in fine art."
EZTV/Art 1990
EZTV was a pioneer in independent desktop video production, microcinema, self-distribution, artist-based curating, public practice, multimedia live performance and the use of video projection in exhibition settings. It created what were among the world's first theaters dedicated to video and among the world's first art galleries dedicated to digital art.
In 1989 Victor Acevedo approached Michael J. Masucci (Founding Member and co-director of EZTV since 1979) about having EZTV host a major group show of leading computer artists, to be curated by art historian Patric Prince and co-sponsored by LA-ACM SIGGRAPH. Masucci, who among other functions at EZTV oversaw programming the wall and performance art exhibitions, immediately agreed. He decided to schedule the show to be staged during the run of the 1990 LA Festival and its affiliated Fringe Festival/Los Angeles as an official participant. Some press attention was achieved, including a segment on actor/art collector Vincent Price's television program on art collecting.
Of the literally hundreds of screenings, exhibitions, performances, and lectures presented at EZTV's West Hollywood space, a few stand apart as among those that resulted in the ultimate trajectory of the space and its unique artistic community. There was perhaps one show which more than any other, re-defined EZTV and pointed to the direction that it would take moving forward and become the model for its continuation to this day. That show was simply called ART 1990.
Cyberspace Gallery
Because of the success of the exhibition ART 1990, Michael J. Masucci and historian/curator Patric Prince co-founded the CyberSpace Gallery. This was done with the help of Acevedo and other key persons including Kim McKillip (aka ia Kamandalu), Lisa Tripp, and Michael Ragsdale Wright. In 1992, CybersSpace Gallery formally opened as an important subspace for EZTV. It was dedicated to electronic art, however, with a more focused curatorial mandate toward digital work.
CyberSpace Gallery was clearly among the world's first galleries dedicated to digital art. A logical extension of EZTV's almost decade-long commitment to a true curatorial discourse and presentation on computer art, it became an instant focal point for a greater public awareness and recognition of the desktop digital revolution.
The Digilantes
In the mid-1980s and into the 90s, Acevedo was a founding member of a group of Los Angeles artists who embraced digital technology. “Digital art in Los Angeles took root and flourished in a scene that was built by the artists themselves. These artists secured the venues, mounted the shows..and self-promoted a series of exhibitions that are historic, because their legacy is not, an alternative to some other series of artist-produced Los Angeles digital art exhibits. In fact, there weren't any others.”
Pioneer Digital artist Michael Ragsdale Wright, as an in-joke with Victor Acevedo, referred to this aforementioned group of art activists as the "Digilantes". These individuals were instrumental in establishing the digital art scene in Los Angeles. This group included artists Wright and Acevedo, Dona Geib, Michael Masucci, Mason Lyte, David Glynn, and art historian Patric Prince, whose art historical focus is art and technology. "Digilantes" is a play on words named after the self-organized 19th century 'law men' in the American West who were alert, watchful, and advocated the taking of action into one's own hands.
1993 to 1999
In 1993 Acevedo began using the software Softimage 3D and began his distinct "silver geometry period" producing such works as Skull and Suit on the Phone as well as his underground collaborations with Andy Warhol associate, Billy Name Linich in 1997.
In early 1995 Victor moved to New York City and became a digital artist in residence in the BFA Computer Art Department at the School of Visual Arts. He joined the faculty there in 1997 and later moved to the Masters level (MFA CA) program three years later.
In 1996 he created one of his most well known images called The Lacemaker, which he named after the same-titled painting by Johannes Vermeer (1665). This piece was later featured in the ACM SIGGRAPH produced 1999 documentary called The Story of Computer Graphics. In 1998 it was exhibited in Touchware, which was the art show for ACM SIGGRAPH 1998. Also in 1996, Acevedo began experimenting with video works that were based on looped animated computer graphic polyhedral structures. In June 1998 an event that proved a validation of his early (1979–85) traditional media artwork and concepts, Acevedo was one of 13 artists invited to exhibit work alongside Escher's at the M.C. Escher Centennial Congress in Rome. Examples of both his analog and digital art work were presented there. These were the graphite drawing, Four-fold Rotational Wasp and his early digital print called Ectoplasmic Kitchen. He was also awarded a Medal of Distinction by the M.C. Escher Foundation for his video documentary work of the congressional proceedings.
21st Century
In 2001 Acevedo’s works, David in Orense, Eric in Orense, and A Glass of Wine with Harry were included in the digital art exhibition called Silent Motion It was a group show curated by artist and scholar James Faure Walker at the Stanley Picker Gallery at Kingston University, Surrey, England. It was inspired by and included the experimental photography of Eadweard Muybridge (1830–1904). As quoted from the show catalogue, "Silent Motion is an exhibition that looks at contemporary digital art – internet art, digital photography, plotter drawings, murals - alongside Muybridge's photographs of figures in motion. Muybridge was a native of Kingston upon Thames."
In 2002 Acevedo's essay, Space Time with M.C. Escher and R. Buckminster Fuller was published in the book Escher's Legacy: A Centennial Celebration, edited by Doris Schattschneider and Michelle Emmer (Springer-Verlag, 2002).
In 2003 his essay entitled Why Digital Prints matter was published in the ACM SIGGRAPH conference art show catalogue and visual proceedings. The art show that year was called CG03 and was curated by Michael Ragsdale Wright. Acevedo debuted two medium format prints Davis Acevedo and Nu Cynthesis.
In 2005, Acevedo's print called Tell Me the Truth (1991) was acquired by the Victoria & Albert Museum in London, as part of their acquisition of the Patric Prince Computer Art Collection. “Over a period of years Ms. Prince amassed one of the most extensive collections of computer art, consisting of around 200 original art works, and a substantial archive charting
the rise of computer-generated arts” As quoted from the V&A Museum website
In November 2005, Acevedo was invited to exhibit some of his prints and give a lecture about the development of his work at an international symposium called Synergetics in the Arts at the Isamu Noguchi Museum, in Long Island City, NY. The 2-day event was co-produced by the Synergetic Collaborative (SNEC). Acevedo's talk, Art of the Void Matrix, addressed the ongoing conceptual connection between his work and that of R. Buckminster Fuller's synergetic geometry.
To date, three of Acevedo's 30”x40" archival ink-jet prints have been acquired and entered into the Anne + Michael Spalter Digital Art Collection. The prints are, The Violist and NYC 83–85 in 2007 and more recently the Sunburst Couple in 2018.[
Acevedo's work has been featured in several (digital) art history books. The first of which is called Art of the Digital Age, edited by Bruce Wands (Thames and Hudson 2006). The piece reproduced in this book is called Eric in Orense (2000).
In 2007 his work was cited in the ACM/SIGGRAPH's online digital art history archive. That same year Acevedo's work was discussed at length in an important and influential book called From Technological to Virtual Art, written by art historian Frank Popper, (MIT Press 2007).
Acevedo's image called Springside Cynthesis and a descriptive blurb about his work was included in Wolf Lieser's Digital Art (Ullmann/Tandem, 2009) and also in the large format 'coffee table' edition this book, re titled The World of Digital Art (h.f. Ullman, 2010)
Electronic Visual Music EVM
Following the natural evolution of his work, in 2007-09 Acevedo shifted his primary attention to producing digital video works. Exploring the implications of synesthesia and cymatics as well as the use of computer animation based on Buckminster Fuller's Synergetics, much of his video work investigates the intersection of electronic music and audio synthesis as in drone or glitch works, harmonic noise and dynamic geometrical structure. Later he began integrating a real-time video mix work-flow into his audio-visual (AV) studio practice. Acevedo initially positioned himself inside the genre called Visual Music.
In 2011 he joined Los Angeles Video Artists (LAVA) and started attending their monthly meetings. Within that community he learned how to perform and project live mix video via apps that can run on a MacBook Pro. For a couple of years (2012–2014) he explored applying his motion graphic work to real-time live visuals for underground or non-mainstream EDM events (Drum and Bass and Dubstep). In doing so he combined his interest in contemporary electronic bass music with concepts in Digital Cinema and Synergetic Geometry. His music video work and live visual (VJ) performances were informed by a synthesis of both these traditions, disciplines, and resultant phenomenologies.
In 2013 Acevedo coined the term electronic visual music. Its acronym is EVM. It was a play on EDM and an update of the genre called Visual Music. He first attached it to a Drum and Bass monthly that he was planning but the events were put on hold. The first time he used the term publicly was for an AV performance event at Los Angeles Center for Digital Art in May 2019.
Since 2014, Acevedo has been exploring the realm of pure abstraction to a greater degree. Thus, establishing a new body of work in parallel to his oeuvre which addresses figurative subjects. In late 2015, slipping easily back into the fine-art community, he began showing fairly regularly at the [[Los
Angeles Center for Digital Art]] (LACDA) in Downtown Los Angeles. Acevedo's ongoing collaboration and dialogue with design scientist Thomas Miller and architect Fabiano Cavichioli has been an enormous influence on his current practice, especially in the application of Miller's ground breaking work known as New Tools Geometry which is based on Buckminster Fuller's Synergetics.
While Acevedo will occasionally project visuals for live abstract music, circuit bending or modular synthesis shows, he has taken a step back to revisit his 'life-time' of work in order to convey its story and evolution as a whole. This period of time included his 2017 career survey artist talk and his 2019 retrospective exhibition, both at LACDA and then soon thereafter his video retrospective at Digital Debris gallery in early 2020.
In November 2021 a 43-year career survey called Acevedo in Context is scheduled to be published.
NFTs
In early 2021 Acevedo began to make some of his work available in the burgeoning NFT digital art space.
Publications
Books
Computer Graphics Art Work (To. Nagata, Graphic-sha, 1992)
Cyber Arts: Exploring Art & Technology (L. Jacobson ed., Miller Freeman Inc. 1992)
Escher's Legacy: A Centennial Celebration (D. Schattschneider & M. Emmer eds., Springer-Verlag 2002)
Art of the Digital Age (Bruce Wands, Thames and Hudson, 2006)
From Technological to Virtual Art ( Frank Popper, MIT Press 2007)
Digital Art (Wolf Lieser, Ullman /Tandem 2009)
The World of Digital Art (Wolf Lieser, h.f.Ullman, 2010)
Moving Innovation: A History of Computer Animation (Tom Sito, MIT Press 2013)
Catalogues
1990: SIGGRAPH: LA. ART 1990 - LA Chapter of ACM|SIGGRAPH
1991: Prix Ars Electronica 1991: International Compendium of the Computer Arts - Dr. Hannes Leopoldseder / ORF Landesstudio
1993 Art LA ‘93 8th International Los Angeles Art Fair Acevedo's work was included with the EZTV/Cyberspace booth Los Angeles Convention Center Dec. 2-5
1993: FISEA 4th International Symposium on Electronic Art MCAD Minneapolis, MN
1994: Computer Kunst '94 Golden Plotter 1994 Gladbeck, DE
1994: 2nd Annual Digital Salon 1994 School of Visual Arts New York City, NY
1996: 4th Annual Digital Salon 1996 School of Visual Arts New York City, NY Leonardo Journal Vol. 29 No. 5
1998: Homage to Escher - Group exhibition with Escher @ The M.C. Escher Centennial Congress in Rome - Museo Labortorio D' Arte Contemporanea
1998: Touchware: ACM|SIGGRAPH98 electronic art and animation catalogue - Computer Graphics annual conference series - ACM|SIGGRAPH
2001: Catalogue for SILENT MOTION a Digital Art group show was curated by artist and scholar James Faure Walker @ Stanley Picker Gallery at Kingston University, Surrey, England. Works include David in Orense, Eric in Orense, and A Glass of Wine with Harry. In July, 'Silent Motion' traveled to the Colville Place Gallery hosted by Keith Watson in London W1T 2BG
2003: CG03: SIGGRAPH 2003 electronic art and animation. This includes Acevedo's essay called "Why Digital Prints Matter"
References
20th-century American male artists
21st-century American male artists
1954 births
Living people
American conceptual artists
American digital artists
Digital artists
Artists from Los Angeles
New media artists
Postmodern artists
Computer art |
49078996 | https://en.wikipedia.org/wiki/Austerlitz%20%28video%20game%29 | Austerlitz (video game) | Austerlitz is a turn-based strategy video game developed by Personal Software Services and published by Mirrorsoft. It was released in the United Kingdom and Germany for the Amiga, Atari ST and MS-DOS home computers in 1989. It was also re-released in France for Amiga home computers by Mirror Image in 1991. The game is set during the Battle of Austerlitz of the Napoleonic Wars and revolves around Napoleon's forces defending the Austrian village of Austerlitz from the invading army of Alexander I of Russia.
The game was developed by Peter Turcan, who also developed similar turn-based strategies such as Waterloo and Borodino for home computers in the 1980s. Austerlitz is presented in a 3D perspective over a battlefield; however, it features no sound. The game received mostly positive reviews upon release. Critics praised the graphics and presentation; however, some were divided over the historical accuracy of the battle and lack of sound.
Gameplay
The game is a turn-based strategy and revolves around Battle of Austerlitz, in which the forces under the command of Napoleon must defend the Austrian village of Austerlitz from the invading Austro-Russian army, led by Tsar Alexander. In the game, the battle itself begins at 7am on 2 December 1805 and is played out in a series of turns. A turn lasts fifteen minutes and a total number of eight orders must be issued before the end of the turn. The player may choose either French or Russian forces to control throughout the game. In order to move a unit, the player must select them and point their cursor over the desired location; however, movement is restricted within a turn. At the start of a movement phase, the player can issue a command to one of their units. Orders include move, attack, defend, shell, stay in reserve, retreat and report.
Rotating the map using a compass is essential for ensuring an army moves in the desired direction. The order of a moving unit will not be carried out until the unit has reached its destination or if they have been killed before arriving there. Each order carried out is announced through the game's command box, which is situated at the bottom of the screen. Actions such as battles and unit losses are also announced. In order to attack the enemy from a distance, the player is able to order a unit to commence shelling, which will neutralise an enemy unit if successful. The game features no sound.
Background
Personal Software Services was founded in Coventry, England, by Gary Mays and Richard Cockayne in November 1981. The company was known for creating games that revolved around historic war battles and conflicts, such as Theatre Europe, Bismarck and Falklands '82. The company had a partnership with French video game developer ERE Informatique, and published localised versions of their products to the United Kingdom. The Strategic Wargames series was conceptualised by software designer Alan Steel in 1984. During development of these titles, Steel would often research the topic of the upcoming game and pass on the findings to other associates in Coventry and London. Some games of the series were met with controversy upon release, such as Theatre Europe. In 1983, the company received recognition for being "one of the top software houses" in the United Kingdom, and was a finalist for BBC Radio 4's New Business Enterprise Award for that year. Austerlitz was developed by Peter Turcan, who also developed similar turn-based strategies, such as Waterloo and Borodino for the Atari ST. The game was previewed in an issue of Crash in July 1989.
In 1986, Cockayne took a decision to alter their products for release on 16-bit consoles, as he found that smaller 8-bit consoles, such as the ZX Spectrum, lacked the processing power for larger strategy games. The decision was falsely interpreted as "pulling out" from the Spectrum market by video game journalist Phillipa Irving. Following years of successful sales throughout the mid 1980s, Personal Software Services experienced financial difficulties, in what Cockayne admitted in a retrospective interview that "he took his eye off the ball". The company was acquired by Mirrorsoft in February 1987, and was later dispossessed by the company due to strains of debt.
Reception
The game received mostly positive reviews upon release. John Highcliffe of The Games Machine praised the historical accuracy of the game, stating that gamers with an interest with the era would enjoy the game. However, Highcliffe expressed concern over the slow pace of the game. Alain Huyghes-Lacour of Tilt praised the game's graphics and 3D presentation of the battle, stating that it exceeded the benchmark set by other wargames. Mark Higham of ST Format questioned the historical accuracy, stating that during the real battle French forces used smoke grenades frequently, and criticised the lack of this inclusion in the game. However, Higham heralded the game as the best, saying that there is "no other wargame like it".
Mark Patterson of ACE praised the smooth animation and impressive graphics; however, he criticised the game's lack of sound as uninspiring. Higham considered Austerlitz superior to other games released by the developer, suggesting that it offered a higher state of realism. Lucinda Orr of Amiga Computing stated that the graphics were "wonderful" and opinionated that the game was the best Napoleon warfare simulation of its kind. A reviewer of Amiga Format said that the 3D graphics were "great", but declared that the lack of sound was the "last thing" a player would need in a serious wargame. Jonathan Davies of Amiga Power praised the graphics as the only "plus side" aspect of the game, however he criticised the slow pace of gameplay, stating that it would take hours and a lot of patience to type out orders. A reviewer of Australian Commodore and Amiga review asserted that Austerlitz was designed for serious gamers, stating that the complexity of the game would make "seasoned wargamers happy as pigs in mud".
References
1989 video games
Amiga games
Atari ST games
DOS games
Napoleonic Wars video games
Single-player video games
Turn-based strategy video games
Video games developed in the United Kingdom
Personal Software Services games |
924771 | https://en.wikipedia.org/wiki/The%20Naked%20Gun%202%C2%BD%3A%20The%20Smell%20of%20Fear | The Naked Gun 2½: The Smell of Fear | The Naked Gun : The Smell of Fear is a 1991 American comedy film. It is the sequel to the 1988 film The Naked Gun: From the Files of Police Squad! and the second installment in The Naked Gun film series. The film stars Leslie Nielsen as the comically bumbling Police Lt. Frank Drebin of Police Squad!. Priscilla Presley plays the role of Jane, with O. J. Simpson as Nordberg and George Kennedy as police captain Ed Hocken. The film also features Robert Goulet (who previously made a "special guest star" appearance on Police Squad!) as the villainous Quentin Hapsburg and Richard Griffiths as renewable fuel advocate Dr. Albert S. Meinheimer (as well as his evil double, Earl Hacker). Zsa Zsa Gabor, Mel Tormé and members of the Chicago Bears have cameo roles.
David Zucker returns from the first entry as director and screenwriter of the film. Jim Abrahams and Jerry Zucker serve as executive producers for the film and receive writing credit due to their contributions to the first entry of the series and the Police Squad! television series. However, neither contributed to the screenplay for the film.
A third installment in the series, Naked Gun : The Final Insult, was released in 1994.
Plot
Frank Drebin is honored at the White House, where President George H. W. Bush announces that he will base his recommendation for the country's energy program on Dr. Albert Meinheimer's advice, which will be revealed during the doctor's speech at the National Press Club dinner the following week. The heads of the coal and oil (fossil fuel) and nuclear industries are distressed by this fact, as Dr. Meinheimer is an advocate for renewable energy. Jane Spencer, now separated from Frank and working for Dr. Meinheimer, is working late at Meinheimer's research institute when she spots a man leaving in a van. A maintenance worker discovers a clock with dynamite attached and takes it to the security guards, who accidentally trigger it.
The next morning, Frank reacquaints himself with Jane as he interviews her about the explosion. He is shown around the institute and meets Jane's boyfriend, Hexagon Oil executive Quentin Hapsburg, of whom he becomes exceedingly jealous. Frank's boss, Ed Hocken, finds him and Jane at a lonely blues bar, where Frank promptly blows a chance to make up with her. Meanwhile, at a meeting of the "energy" industry leaders, Hapsburg reveals that he has kidnapped Dr. Meinheimer and found an exact double for him, Earl Hacker, who will endorse fossil and nuclear fuels at the Press Club Dinner.
Police Squad tracks down the van driver, Hector Savage. Once he discovers the police are onto him, Savage holes up in a house, demanding money and a car. Frank drives a SWAT tank into and through the house, inadvertently allowing Savage to escape, and causes more damage when he loses control of the tank and crashes into the city zoo, allowing the animals to escape. At a party that evening, Frank notices that Dr. Meinheimer does not instantly remember him, despite Jane telling him that Meinheimer had a photographic memory. Frank confronts her with this at her apartment following the party, but is dismissed. Moments later, Savage enters the home and tries to kill Jane. Frank becomes aware of Savage and kills him by sticking a fire hose into his mouth and turning it on full blast. Jane realizes that Frank was right, and the two rekindle their romance.
The next day, Police Squad stakes out Hexagon Oil's headquarters where Dr. Meinheimer is being held. Frank tries to go undercover into the building, but instead is discovered and tied up by Hapsburg's henchmen. Frank and Dr. Meinheimer are eventually freed, and Police Squad proceeds to the Press Club Dinner. Finding their only way in locked, Frank, Ed, Nordberg, and Dr. Meinheimer commandeer a mariachi band's costumes and head inside, where Hacker is eventually intercepted, allowing Meinheimer to give his speech. Hapsburg flees the dinner and takes Jane with him. After a shootout on the roof of the building, Hapsburg informs Frank that he has rigged the building with a small nuclear device which will kill everyone in there except for him and render Dr. Meinheimer's speech useless. After a fight, Frank attempts to learn the bomb's disarming code from Hapsburg, but Ed enters and throws Hapsburg out a window. Hapsburg hits an awning below and is able to come to the sidewalk unscathed, but is immediately killed by an escaped lion from the zoo.
Frank and Jane attempt to disarm the bomb while Ed and Nordberg go back into the ballroom to evacuate it. After several failed attempts, Frank finally manages to disarm the bomb at the last second by tripping over its power cord, unplugging it. Frank is commended by the President, who offers him a special post as head of the Federal Bureau of Police Squad. Frank declines, instead asking Jane to marry him, which she accepts.
Cast
Leslie Nielsen as Lieutenant Frank Drebin
Priscilla Presley as Jane Spencer
George Kennedy as Captain Ed Hocken
O. J. Simpson as Detective Nordberg
Robert Goulet as Quentin Hapsburg
Richard Griffiths as Dr. Albert S. Meinheimer/Earl Hacker
Jacqueline Brookes as Commissioner Anabell Brumford
Anthony James as Hector Savage
Lloyd Bochner as Terence Baggett
Tim O'Connor as Donald Fenswick
Peter Mark Richman as Arthur Dunwell
Ed Williams as Ted Olsen
John Roarke as President George H. W. Bush
Margery Ross as First Lady Barbara Bush
Peter Van Norden as Chief of Staff John Sununu
Gail Neely as Winnie Mandela
Colleen Fitzpatrick as Blues Singer at Blue Note Club
Sally Rosenblatt as Mrs. Redmond
Alexander Folk as Crackhouse cop
"Weird Al" Yankovic as Police Station Thug
Gina Mastrogiacomo as Sex Shop Worker
Music
As with the first Naked Gun film, the original music for the second installment was composed and orchestrated by veteran soundtrack composer Ira Newborn, including the familiar big-band/blues theme for the Naked Gun/Police Squad! franchise.
Several of the orchestral movements revolve around two other Newborn pieces: "Drebin - Hero!" (used at the top of the pre-credit sequence, from the Paramount-logo animation onward) and the romantic "Thinking of Him" (immediately after the credits).
Seasoned Broadway and film singer/actress Colleen Fitzpatrick plays a saloon singer at a sad-sack restaurant called the Blue Note, to which a depressed Detective Lieutenant Drebin repairs after seeing his former girlfriend Jane Spencer being wooed by the villain Quentin Hapsburg. This role has frequently been attributed to singer Vitamin C who happens to share the same name, but this is incorrect.
Other non-Newborn pieces are heard in this Naked Gun installment. They include the standards "Tangerine" and "Satin Doll" and The Righteous Brothers' recordings of "Unchained Melody" (featured in Jerry Zucker's drama Ghost) and "Ebb Tide." Nielsen himself voices the Latin-flavored pop standard "Bésame Mucho" at the Press Club dinner.
Soundtrack
In conjunction with the second Naked Gun film, Varèse Sarabande released a soundtrack combining the best Newborn compositions from the first two films. The full scores for The Naked Gun trilogy, along with source music and alternate cues as bonus material, was released in 2014 by La-La-Land Records.
Track listing
Reception
Box office
The Naked Gun : The Smell of Fear knocked Robin Hood: Prince of Thieves from the top spot at the box office. It grossed $86.9 million in the United States and Canada and did even better internationally, grossing $105 million for a worldwide total of $192 million against a reported budget of $23 million. It was the 10th best performing movie of 1991 in the United States.
Critical response
On Rotten Tomatoes, the film holds an approval rating of 57% based on 42 reviews, with an average rating of 5.9/10. The website's critical consensus reads, "Naked Gun : The Smell of Fear delivers a handful of moderate laughs, but overall, its strained antics pale in comparison to its gut-busting predecessor." On Metacritic, the film holds a weighted average score of 65 out of 100, based on 21 critics, indicating "generally favorable reviews".
Owen Gleiberman of Entertainment Weekly awarded it a B+, but observed that in some ways, it was "the most predictable of the ZAZ films. Even the inconsistent Top Secret! (1984), a demented hybrid of Elvis movies and World War II espionage thrillers, had far wilder passages. Yet I'll take lesser ZAZ over most of the competition any day. Their comedies don't just get you laughing. They put you inside a new, cracked-mirror world — a world where no detail is too small for ridicule, and where Leslie Nielsen (bless him) can be a movie star." Kenneth Turan wrote in the Los Angeles Times that one should "consider The Naked Gun : The Smell of Fear. The title is funny enough, so are the credits ("Un Film de David Zucker"), and the key art, showing fearless Lt. Frank Drebin spread-eagled on a pair of speeding bullets, is good for a chuckle as well. But that's where the laughter ends, pal. Because the only thing about The Naked Gun that won't make you laugh is the film itself."
References
External links
The Naked Gun
1991 films
1990s parody films
1990s police comedy films
1990s screwball comedy films
American screwball comedy films
American slapstick comedy films
American films
1990s English-language films
Films about the Federal Bureau of Investigation
Films directed by David Zucker (director)
American sequel films
Paramount Pictures films
Films set in Washington, D.C.
Films scored by Ira Newborn
Cultural depictions of George H. W. Bush
Films with screenplays by David Zucker (filmmaker)
Films with screenplays by Pat Proft
1991 comedy films |
145578 | https://en.wikipedia.org/wiki/DEF%20CON | DEF CON | DEF CON (also written as DEFCON, Defcon or DC) is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking wargames). Contests held during the event are extremely varied, and can range from creating the longest Wi-Fi connection (aircrack-ng) to finding the most effective way to cool a beer in the Nevada heat.
Other contests, past and present, include lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as red team exercises).
Federal law enforcement agents from the FBI, DoD, United States Postal Inspection Service, DHS via us-cert.gov and other agencies regularly attend DEF CON.
History
DEF CON was founded in 1993, by then 18-year-old Jeff Moss as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a FidoNet protocol based hacking network from Canada. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.
The term DEF CON comes from the movie WarGames, referencing the U.S. Armed Forces defense readiness condition (DEFCON). In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a telephone keypad, a reference to phreakers. Any variation of the spelling, other than "DEF CON", could be considered an infringement of the DEF CON brand. The official name of the conference includes a space in-between DEF and CON.
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success. In 2019, an estimated 30,000 people attended DEF CON 27.
For DEF CON's 20th Anniversary, a film was commissioned entitled DEFCON: The Documentary. The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.
In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to COVID-19.
In 2020, due to safety concerns over COVID-19 the DEF CON 28 in-person Las Vegas event was cancelled and replaced with DEF CON Safe Mode, a virtual event planned for the same August 6–9 dates as DC 28.
Black Badge
The Black Badge is the highest award DEF CON gives to contest winners of certain events. Capture the flag (CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.
In April 2017, a DEF CON Black Badge was featured in an exhibit in the Smithsonian Institution's National Museum of American History entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System, the winner of the DARPA 2016 Cyber Grand Challenge at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
Fundraising
Since DEF CON 11, fundraisers have been conducted for the Electronic Frontier Foundation (EFF). The first fundraiser was a dunk tank and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
Trivia
Badges
A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), with LED's, or sometimes being a non-electronic badge such as a vinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the Konami Code in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEFCON Badges do not (generally) identify attendees by name, however the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018 the evolution of this came with what was termed "shitty addon's" or SAO's. These were miniature (usually) PCB's that connected to the official and other badges that may extend functionality or were just collected.
Workshops
Workshops are dedicated classes on various topics related to information security and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking IoT devices, playing with RFID, and attacking smart devices.
Villages
Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTF's, or labs. Some villages include the IoT Village, Recon, Biohacking, lockpicking, ham radio, and the well known Social Engineering and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.
Use of handles
Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder Jeff Moss's handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the con and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.
Cons within DEF CON
DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
Queercon (meetup of LGBTQ community)
Linecon (any long line has the potential to turn into a con)
QuietCon (a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the con)
Skytalks
DEF CON Groups
DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the 2600 meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online. DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US. Examples include DC801 and DC201. DEF CON Groups may seek permission to make a logo that includes the official DEF CON logo with approval.
Relationship to other hacker cons
DEF CON is considered the "world's largest" hacker con. It is also considered one of the core conferences, with organizers and attendees using it as a model for other conferences.
Notable incidents
High-profile issues which have garnered significant media attention.
Entertainment references
DEF CON was also portrayed in The X-Files episode "Three of a Kind" featuring an appearance by The Lone Gunmen. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention.
A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by Winn Schwartau, demonstrates some of the early DEF CON culture.
A trip to DEF CON for a hacker showdown figures into the plot of The Signal. Director William Eubank came to Las Vegas and screened the film at DEF CON Movie Night.
A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of Jason Bourne, the fifth film of the Bourne film series. The primary antagonist of the film, a fictionalized CIA director (played by Tommy Lee Jones), is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker, NSA director Keith B. Alexander.
In the Mr. Robot Season 3 opener "eps3.0_power-saver-mode.h" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations.
Famed documentarian Werner Herzog included DEF CON in his 2016 film Lo and Behold, Reveries of the Connected World, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives".
Venues, dates, and attendance
Each conference venue and date has been extracted from the DC archives for easy reference.
See also
Black Hat Briefings
Chaos Communication Congress (C3)
Electronic voting
Hack-Tic, a quadrennial European convention
Hackers on Planet Earth (HOPE)
Security BSides. A community supported conference with locations across the globe
Summercon. The first American hacker conference, organized by members of Phrack
ToorCon, a yearly hacker conference held in San Diego, California since 1999
References
Further reading
"DefCon's Moss: Undercover Reporter Damages 'Neutral Zone'." Information Week. August 6, 2007.
Mills, Elinor. "NSA director finally greets Defcon hackers." CNET. July 27, 2012.
Newman, Lily Hay "To Fix Voting Machines, Hackers Tear Them Apart" WIRED August 1, 2017
External links
DEF CON
Official FAQ
DEF CON Groups
DEF CON v3 Tor .onion addresses
Multimedia
DEF CON: The Documentary
DEF CON: The Documentary on IMDb
A first ever look inside the DEF CON NOC (2008)
The Story of DEF CON – video interview with Jeff Moss, a.k.a. Dark Tangent, the founder of DEF CON
Transcript, audio, video of Jess Moss describing DEF CON's inception
Las Vegas Valley conventions and trade shows
Annual events in Nevada
Hacker conventions
Recurring events established in 1993
1993 establishments in Nevada |
4328040 | https://en.wikipedia.org/wiki/Spruce%20Creek%20High%20School | Spruce Creek High School | Spruce Creek High School is a public secondary school located in the city of Port Orange, Florida. It is the largest IB high school in North America and is one of Newsweek's Top 100 High Schools. Spruce Creek High School is part of the Volusia County Schools system, which encompasses eight other high schools and 80 schools total. The one-story campus is dominated by a single, contiguous main building, with a separate, smaller Multi-purpose building and several portable classroom buildings (a total of 48 as of 2016), which are spread out across the campus. The school has been named a Blue Ribbon School of Excellence, as well as a Florida Music Demonstration School several years in a row. Ranked 1st in North America and 3rd in the world for the number of IB exams administered.
Academics
Spruce Creek High School has a long-standing tradition of academic excellence and has a program of studies that includes International Baccalaureate, Advanced Placement, and Honors courses. More than $6,400,000 in scholarship monies were earned by 2011 graduates.
IB Program
Spruce Creek offers the International Baccalaureate Diploma Programme. As of the 2009-2010 school year, it is the largest IB school in North America, and number 3 in the world, based on the number of IB exams administered.
Academy of Finance
The Academy of Finance exposes students to the financial services industry. Students should be comfortable with numbers and have a strong desire to excel. People who are good game players and are willing to adhere to high ethical and moral standards are well suited for business and financial professions. Through enrollment in the Academy of Finance students are prepared with the analytical, mathematical and verbal skills needed in higher education and the financial services industry.
The Academy of Information Technology and Robotics
The Academy of Information Technology and Robotics is designed to introduce high school students to the rapidly expanding digital and technological workplace and to the wide variety of career opportunities that it offers. Students take courses in programming, database administration, web design, digital design, PC repair and networking. Also offered are courses in Game and Simulation Design and Engineering.
The AITR Academy acts as its own 'school inside of a school.' There are no bells, and students are allowed to roam between the Academy classrooms to visit specific teachers for help in any specific subject area. Students participate in group challenges divided into hexmesters, which encompass core subjects. Students use the mornings to focus on their core work, and spend the afternoons working on their technology class, one of the courses listed above. Also available is a Robotics program. The AITR is the sponsor of FIRST Robotics Competition Team 2152.
Business Cooperative Education
Business Cooperative Education is a training program for students planning careers in business and/ or office occupations. Students go to school in the morning and work each afternoon on the job for an average of 15−25 hours per week. It is a cooperative effort between the school, parents, the student and the employer. All cooperate to assist the student-trainee in applying on the job what her or she is learning in class. BCE helps prepare students not only for his or her career upon graduation, but also for college business courses and for college expenses.
Ryan Lochte, US Olympic gold medalist swimmer attended Spruce Creek. In Lochte's junior year at Spruce Creek the swimming team won the Class 3A Florida State Boys' Swimming Championship coached by his father Steve Lochte and Brad Richdale.
As of the 2015−2016 school year, the Spruce Creek boys' weightlifting team has won 26 Florida State Weightlifting Championships, and has 80+ individual Florida State Weightlifting Champions. They also hold the record for the longest streak of consecutive championships at 11, from 1994 to 2004. Since their streak ended, Creek has added another title in 2006, came in 3rd place in 2007, and won championships in 2008, 2013, and 2016. The Creek girls' weightlifting team won Florida State Championships in 2004, 2005, 2006, 2007, 2008, 2009, 2011 and 2012.
In 2012, the Creek varsity baseball team won the Class 8A state championship against Miami Christopher Columbus 7−1.
Music and Performing Arts
The Spruce Creek Musical Performing Arts department has received numerous awards and invitations to events across the country and around the world. Such events have included the Tournament of Roses Parade in Pasadena, California, and at venues abroad in France, Germany, the Netherlands, England, China, and Ireland. It is the annual co-host of Port Orange's annual Lakeside Jazz Festival along with Atlantic High School's music program. In 2008 it was announced that the Band and Orchestra would be traveling to Europe in 2010. This trip included visits to Germany, Austria, and the Netherlands, where they performed at various venues.
The marching band and color guard have also marched in the Inaugural Parade for Florida's governor, Rick Scott in 2011. The band and color guard have received straight superiors at all marching competitions for the past 26 years. In November of the 2011−2012 school year it was announced that all of Spruce Creek's bands (three jazz bands, two concert bands, one full orchestra, and a marching band of over 200 members) and color guard had been invited to do a nine-day performance tour across Ireland which would include performing in the annual St. Patrick's Day Parade in Dublin in 2013, where they won the award for best overall band.
In addition to the music program, Spruce Creek has an accomplished theatre program. The Drama department has traveled to Scotland, and received superiors from the District and State level thespian festivals. The program has included many Honor and National thespians.
Notable alumni
Perry Baker, professional rugby player with the United States national rugby sevens team
Tony Gibson, NASCAR Champion Crew Chief of the 2017 Daytona 500 for winning driver Kurt Busch
Austin Hays, MLB outfielder for the Baltimore Orioles
Ryan Lochte, American competitive swimmer and a twelve-time Olympic medalist
Ed Lucas, former professional baseball player (Miami Marlins)
Pavlina Osta, news personality
Preston Pardus, racing driver
Nick Regilio, former professional baseball player (Texas Rangers)
Zac Veen, 9th overall pick to Colorado Rockies in 2020 MLB Draft
References
External links
Official Spruce Creek High School Site
SCHS National Honors Society Home Page
Academy of Information Technology and Robotics website
Official Spruce Creek Band Site
Official Spruce Creek Color Guard Site
Official Spruce Creek JROTC Site
High schools in Volusia County, Florida
Public high schools in Florida
Buildings and structures in Port Orange, Florida
1975 establishments in Florida
Educational institutions established in 1975 |
4930731 | https://en.wikipedia.org/wiki/Software%20audit | Software audit | Software audit may refer to:
Software licensing audit, where a user of software is audited for license compliance
Software quality assurance, where a piece of software is audited for quality
Software audit review, where a group of people external to a software development organisation examines a software product
Physical configuration audit
Functional configuration audit |
42946389 | https://en.wikipedia.org/wiki/Swift%20%28programming%20language%29 | Swift (programming language) | Swift is a general-purpose, multi-paradigm, compiled programming language developed by Apple Inc. and the open-source community. First released in 2014, Swift was developed as a replacement for Apple's earlier programming language Objective-C, as Objective-C had been largely unchanged since the early 1980s and lacked modern language features. Swift works with Apple's Cocoa and Cocoa Touch frameworks, and a key aspect of Swift's design was the ability to interoperate with the huge body of existing Objective-C code developed for Apple products over the previous decades. It is built with the open source LLVM compiler framework and has been included in Xcode since version 6, released in 2014. On Apple platforms, it uses the Objective-C runtime library, which allows C, Objective-C, C++ and Swift code to run within one program.
Apple intended Swift to support many core concepts associated with Objective-C, notably dynamic dispatch, widespread late binding, extensible programming and similar features, but in a "safer" way, making it easier to catch software bugs; Swift has features addressing some common programming errors like null pointer dereferencing and provides syntactic sugar to help avoid the pyramid of doom. Swift supports the concept of protocol extensibility, an extensibility system that can be applied to types, structs and classes, which Apple promotes as a real change in programming paradigms they term "protocol-oriented programming" (similar to traits).
Swift was introduced at Apple's 2014 Worldwide Developers Conference (WWDC). It underwent an upgrade to version 1.2 during 2014 and a major upgrade to Swift 2 at WWDC 2015. Initially a proprietary language, version 2.2 was made open-source software under the Apache License 2.0 on December 3, 2015, for Apple's platforms and Linux.
Through version 3.0 the syntax of Swift went through significant evolution, with the core team making source stability a focus in later versions. In the first quarter of 2018 Swift surpassed Objective-C in measured popularity.
Swift 4.0, released in 2017, introduced several changes to some built-in classes and structures. Code written with previous versions of Swift can be updated using the migration functionality built into Xcode. Swift 5, released in March 2019, introduced a stable binary interface on Apple platforms, allowing the Swift runtime to be incorporated into Apple operating systems. It is source compatible with Swift 4.
Swift 5.1 was officially released in September 2019. Swift 5.1 builds on the previous version of Swift 5 by extending the stable features of the language to compile-time with the introduction of module stability. The introduction of module stability makes it possible to create and share binary frameworks that will work with future releases of Swift.
Swift 5.5, officially announced by Apple at the 2021 WWDC, significantly expands language support for concurrency and asynchronous code, notably introducing a unique version of the actor model.
History
Development of Swift started in July 2010 by Chris Lattner, with the eventual collaboration of many other programmers at Apple. Swift took language ideas "from Objective-C, Rust, Haskell, Ruby, Python, C#, CLU, and far too many others to list". On June 2, 2014, the Apple Worldwide Developers Conference (WWDC) application became the first publicly released app written with Swift. A beta version of the programming language was released to registered Apple developers at the conference, but the company did not promise that the final version of Swift would be source code compatible with the test version. Apple planned to make source code converters available if needed for the full release.
The Swift Programming Language, a free 500-page manual, was also released at WWDC, and is available on the Apple Books Store and the official website.
Swift reached the 1.0 milestone on September 9, 2014, with the Gold Master of Xcode 6.0 for iOS. Swift 1.1 was released on October 22, 2014, alongside the launch of Xcode 6.1. Swift 1.2 was released on April 8, 2015, along with Xcode 6.3. Swift 2.0 was announced at WWDC 2015, and was made available for publishing apps in the App Store in September 21, 2015. Swift 3.0 was released on September 13, 2016. Swift 4.0 was released on September 19, 2017. Swift 4.1 was released on March 29, 2018.
Swift won first place for Most Loved Programming Language in the Stack Overflow Developer Survey 2015 and second place in 2016.
On December 3, 2015, the Swift language, supporting libraries, debugger, and package manager were open-sourced under the Apache 2.0 license with a Runtime Library Exception, and Swift.org was created to host the project. The source code is hosted on GitHub, where it is easy for anyone to get the code, build it themselves, and even create pull requests to contribute code back to the project.
In December 2015, IBM announced its Swift Sandbox website, which allows developers to write Swift code in one pane and display output in another. The Swift Sandbox was deprecated in January 2018.
During the WWDC 2016, Apple announced an iPad exclusive app, named Swift Playgrounds, intended to teach people how to code in Swift. The app is presented in a 3D video game-like interface which provides feedback when lines of code are placed in a certain order and executed.
In January 2017, Chris Lattner announced his departure from Apple for a new position with Tesla Motors, with the Swift project lead role going to team veteran Ted Kremenek.
During WWDC 2019, Apple announced SwiftUI with Xcode 11, which provides a framework for declarative UI structure design across all Apple platforms.
Official downloads for the Ubuntu distribution of Linux have been available since Swift 2.2, with more distros added since Swift 5.2.4, CentOS and Amazon Linux. There is an unofficial SDK and native toolchain package for Android too.
Platforms
The platforms Swift supports are Apple's operating systems (Darwin, iOS, iPadOS, macOS, tvOS, watchOS), Linux, Windows, and Android.
Version history
Features
Swift is an alternative to the Objective-C language that employs modern programming-language theory concepts and strives to present a simpler syntax. During its introduction, it was described simply as "Objective-C without the baggage of C".
By default, Swift does not expose pointers and other unsafe accessors, in contrast to Objective-C, which uses pointers pervasively to refer to object instances. Also, Objective-C's use of a Smalltalk-like syntax for making method calls has been replaced with a dot-notation style and namespace system more familiar to programmers from other common object-oriented (OO) languages like Java or C#. Swift introduces true named parameters and retains key Objective-C concepts, including protocols, closures and categories, often replacing former syntax with cleaner versions and allowing these concepts to be applied to other language structures, like enumerated types (enums).
Closure support
Swift supports closures (known as lambdas in other languages). Closures are self-contained blocks of functionality that can be passed around and used in your code. Closures can be thought of as an unnamed function. Here is an example:
// Closure type, defined by its input and output values, can be specified outside the closure:
let closure1: (Int, Int) -> Int = { arg1, arg2 in
return arg1 + arg2
}
// …or inside it:
let closure2 = { (arg1: Int, arg2: Int) -> Int in
return arg1 + arg2
}
// In most cases, closure's return type can be inferred automatically by the compiler.
// However, this functionality may not work for too complex expressions.
let closure3 = { arg1: Int, arg2: Int in
return arg1 + arg2
}
Swift has a trailing closure syntax like this:
// This function takes a closure which receives no input parameters and returns an integer,
// evaluates it, and uses the closure's return value (an Int) as the function's return value.
func foo(closure bar: () -> Int) -> Int {
return bar()
}
// Without trailing closure syntax:
foo(closure: { return 1 })
// With trailing closure syntax:
foo { return 1 }
Starting from version 5.3, Swift supports multiple trailing closures:
// This function passes the return of the first closure as the parameter of the second,
// and returns the second closure's result:
func foo(bar: () -> Int, baz: (Int) -> Int) -> Int {
return baz(bar())
}
// With no trailing closures:
foo(bar: { return 1 }, baz: { x in return x + 1 })
// With 1 trailing closure:
foo(bar: { return 1 }) { x in return x + 1 })
// With 2 trailing closures (note that only the first closure's argument name is omitted):
foo { return 1 } baz: { x in return x + 1 }
Here are the criteria for the trailing closure syntax:
If the last arguments of a function are closures you can use the trailing closure syntax.
The parameter name of the first trailing closure must be omitted.
The parameter names of the remaining trailing closures must not be omitted.
If all the arguments given to a function are trailing closures, you may omit the parentheses after the function's name.
Calls to a function with trailing closures must be parenthesized if used in a guard statement.
String support
Under the Cocoa and Cocoa Touch environments, many common classes were part of the Foundation Kit library. This included the NSString string library (using Unicode, UTF-8 in Swift 5, changed from UTF-16), the NSArray and NSDictionary collection classes, and others. Objective-C provided various bits of syntactic sugar to allow some of these objects to be created on-the-fly within the language, but once created, the objects were manipulated with object calls. For instance, in Objective-C concatenating two NSStrings required method calls similar to this:
NSString *str = @"hello,";
str = [str stringByAppendingString:@" world"]; In Swift, many of these basic types have been promoted to the language's core, and can be manipulated directly. For instance, strings are invisibly bridged to NSString (when Foundation is imported) and can now be concatenated with the + operator, allowing greatly simplified syntax; the prior example becoming:
var str = "hello,"
str += " world"
Access control
Swift supports five access control levels for symbols: , , , , and . Unlike many object-oriented languages, these access controls ignore inheritance hierarchies: indicates that a symbol is accessible only in the immediate scope, indicates it is accessible only from within the file, indicates it is accessible within the containing module, indicates it is accessible from any module, and (only for classes and their methods) indicates that the class may be subclassed outside of the module.
Optionals and chaining
An important new feature in Swift is option types, which allow references or values to operate in a manner similar to the common pattern in C, where a pointer may refer to a value or may be null. This implies that non-optional types cannot result in a null-pointer error; the compiler can ensure this is not possible.
Optional types are created with the Optional mechanism—to make an Integer that is nullable, one would use a declaration similar to var optionalInteger: Optional<Int>. As in C#, Swift also includes syntactic sugar for this, allowing one to indicate a variable is optional by placing a question mark after the type name, var optionalInteger: Int?. Variables or constants that are marked optional either have a value of the underlying type or are nil. Optional types wrap the base type, resulting in a different instance. String and String? are fundamentally different types, the latter has more in common with Int? than String.
To access the value inside, assuming it is not nil, it must be unwrapped to expose the instance inside. This is performed with the ! operator:
let myValue = anOptionalInstance!.someMethod()
In this case, the ! operator unwraps anOptionalInstance to expose the instance inside, allowing the method call to be made on it. If anOptionalInstance is nil, a null-pointer error occurs. This can be annoying in practice, so Swift also includes the concept of optional chaining to test whether the instance is nil and then unwrap it if it is non-null:
let myValue = anOptionalInstance?.someMethod()
In this case the runtime calls someMethod only if anOptionalInstance is not nil, suppressing the error. Normally this requires the programmer to test whether myValue is nil before proceeding. The origin of the term chaining comes from the more common case where several method calls/getters are chained together. For instance:
let aTenant = aBuilding.tenantList[5]
let theirLease = aTenant.leaseDetails
let leaseStart = theirLease?.startDate
can be reduced to:
let leaseStart = aBuilding.tenantList[5].leaseDetails?.startDate
The ? syntax circumvents the pyramid of doom.
Swift 2 introduced the new keyword guard for cases in which code should stop executing if some condition is unmet:
guard let leaseStart = aBuilding.TenantList[5]?.leaseDetails?.startDate else
{
//handle the error case where anything in the chain is nil
//else scope must exit the current method or loop
}
//continue, knowing that leaseStart is not nil
Using guard has three benefits. While the syntax can act as an if statement, its primary benefit is inferring non-nullability. Where an if statement requires a case, guard assumes the case based on the condition provided. Also, since guard contains no scope, with exception of the else closure, leaseStart is presented as an unwrapped optional to the guard's super-scope. Lastly, if the guard statement's test fails, Swift requires the else to exit the current method or loop, ensuring leaseStart never is accessed when nil. This is performed with the keywords return, continue, break, or throw, or by calling a function returning a Never (e.g. fatalError()).
Objective-C was weakly typed and allowed any method to be called on any object at any time. If the method call failed, there was a default handler in the runtime that returned nil. That meant that no unwrapping or testing was needed, the equivalent statement in Objective-C:
leaseStart = [[[aBuilding tenantList:5] leaseDetails] startDate]
Would return nil, and this could be tested. However, this also demanded that all method calls be dynamic, which introduces significant overhead. Swift's use of optionals provides a similar mechanism for testing and dealing with nils, but does so in a way that allows the compiler to use static dispatch because the unwrapping action is called on a defined instance (the wrapper), versus occurring in the runtime dispatch system.
Value types
In many object-oriented languages, objects are represented internally in two parts. The object is stored as a block of data placed on the heap, while the name (or "handle") to that object is represented by a pointer. Objects are passed between methods by copying the value of the pointer, allowing the same underlying data on the heap to be accessed by anyone with a copy. In contrast, basic types like integers and floating-point values are represented directly; the handle contains the data, not a pointer to it, and that data is passed directly to methods by copying. These styles of access are termed pass-by-reference in the case of objects, and pass-by-value for basic types.
Both concepts have their advantages and disadvantages. Objects are useful when the data is large, like the description of a window or the contents of a document. In these cases, access to that data is provided by copying a 32- or 64-bit value, versus copying an entire data structure. However, smaller values like integers are the same size as pointers (typically both are one word), so there is no advantage to passing a pointer, versus passing the value. Also, pass-by-reference inherently requires a dereferencing operation, which can produce noticeable overhead in some operations, typically those used with these basic value types, like mathematics.
Similarly to C# and in contrast to most other OO languages, Swift offers built-in support for objects using either pass-by-reference or pass-by-value semantics, the former using the class declaration and the latter using struct. Structs in Swift have almost all the same features as classes: methods, implementing protocols and using the extension mechanisms. For this reason, Apple terms all data generically as instances, versus objects or values. Structs do not support inheritance, however.
The programmer is free to choose which semantics are more appropriate for each data structure in the application. Larger structures like windows would be defined as classes, allowing them to be passed around as pointers. Smaller structures, like a 2D point, can be defined as structs, which will be pass-by-value and allow direct access to their internal data with no dereference. The performance improvement inherent to the pass-by-value concept is such that Swift uses these types for almost all common data types, including Int and Double, and types normally represented by objects, like String and Array. Using value types can result in significant performance improvements in user applications as well.
To ensure that even the largest structs do not cause a performance penalty when they are handed off, Swift uses copy on write so that the objects are copied only if and when the program attempts to change a value in them. This means that the various accessors have what is in effect a pointer to the same data storage. So while the data is physically stored as one instance in memory, at the level of the application, these values are separate and physical separation is enforced by copy on write only if needed.
Protocol-oriented programming
A key feature of Objective-C is its support for categories, methods that can be added to extend classes at runtime. Categories allow extending classes in-place to add new functions with no need to subclass or even have access to the original source code. An example might be to add spell checker support to the base NSString class, which means all instances of NSString in the application gain spell checking. The system is also widely used as an organizational technique, allowing related code to be gathered into library-like extensions. Swift continues to support this concept, although they are now termed extensions, and declared with the keyword extension. Unlike Objective-C, Swift can also add new properties accessors, types, and enums to extant instances .
Another key feature of Objective-C is its use of protocols, known in most modern languages as interfaces. Protocols promise that a particular class implements a set of methods, meaning that other objects in the system can call those methods on any object supporting that protocol. This is often used in modern OO languages as a substitute for multiple inheritance, although the feature sets are not entirely similar. A common example of a protocol in Cocoa is the NSCopying protocol, which defines one method, copyWithZone, that implements deep copying on objects.
In Objective-C, and most other languages implementing the protocol concept, it is up to the programmer to ensure that the required methods are implemented in each class. Swift adds the ability to add these methods using extensions, and to use generic programming (generics) to implement them. Combined, these allow protocols to be written once and support a wide variety of instances. Also, the extension mechanism can be used to add protocol conformance to an object that does not list that protocol in its definition.
For example, a protocol might be declared called StringConvertible, which ensures that instances that conform to the protocol implement a toString method that returns a String. In Swift, this can be declared with code like this:
protocol StringConvertible
{
func toString() -> String
}
This protocol can now be added to String, with no access to the base class's source:
extension String: StringConvertible
{
func toString() -> String
{
self
}
}
In Swift, like many modern languages supporting interfaces, protocols can be used as types, which means variables and methods can be defined by protocol instead of their specific type:
var someSortOfPrintableObject: StringConvertible
...
print(someSortOfPrintableObject.toString())
It does not matter what sort of instance someSortOfPrintableObject is, the compiler will ensure that it conforms to the protocol and thus this code is safe. This syntax also means that collections can be based on protocols also, like let printableArray = [StringConvertible].
As Swift treats structs and classes as similar concepts, both extensions and protocols are extensively used in Swift's runtime to provide a rich API based on structs. For instance, Swift uses an extension to add the Equatable protocol to many of their basic types, like Strings and Arrays, allowing them to be compared with the == operator. A concrete example of how all of these features interact can be seen in the concept of default protocol implementations:
func !=<T : Equatable>(lhs: T, rhs: T) -> Bool
This function defines a method that works on any instance conforming to Equatable, providing a not equals function. Any instance, class or struct, automatically gains this implementation simply by conforming to Equatable. As many instances gain Equatable through their base implementations or other generic extensions, most basic objects in the runtime gain equals and not equals with no code.
This combination of protocols, defaults, protocol inheritance, and extensions allows many of the functions normally associated with classes and inheritance to be implemented on value types. Properly used, this can lead to dramatic performance improvements with no significant limits in API. This concept is so widely used within Swift that Apple has begun calling it a protocol-oriented programming language. They suggest addressing many of the problem domains normally solved through classes and inheritance using protocols and structs instead.
Libraries, runtime and development
On Apple systems, Swift uses the same runtime as the extant Objective-C system, but requires iOS 7 or macOS 10.9 or higher. It also depends on Grand Central Dispatch. Swift and Objective-C code can be used in one program, and by extension, C and C++ also. In contrast to C, C++ code cannot be used directly from Swift. An Objective-C or C wrapper must be created between Swift and C++. In the case of Objective-C, Swift has considerable access to the object model, and can be used to subclass, extend and use Objective-C code to provide protocol support. The converse is not true: a Swift class cannot be subclassed in Objective-C.
To aid development of such programs, and the re-use of extant code, Xcode 6 and higher offers a semi-automated system that builds and maintains a bridging header to expose Objective-C code to Swift. This takes the form of an additional header file that simply defines or imports all of the Objective-C symbols that are needed by the project's Swift code. At that point, Swift can refer to the types, functions, and variables declared in those imports as though they were written in Swift. Objective-C code can also use Swift code directly, by importing an automatically maintained header file with Objective-C declarations of the project's Swift symbols. For instance, an Objective-C file in a mixed project called "MyApp" could access Swift classes or functions with the code #import "MyApp-Swift.h". Not all symbols are available through this mechanism, however—use of Swift-specific features like generic types, non-object optional types, sophisticated enums, or even Unicode identifiers may render a symbol inaccessible from Objective-C.
Swift also has limited support for attributes, metadata that is read by the development environment, and is not necessarily part of the compiled code. Like Objective-C, attributes use the @ syntax, but the currently available set is small. One example is the @IBOutlet attribute, which marks a given value in the code as an outlet, available for use within Interface Builder (IB). An outlet is a device that binds the value of the on-screen display to an object in code.
On non-Apple systems, Swift does not depend on an Objective-C runtime or other Apple system libraries; a set of Swift "Corelib" implementations replace them. These include a "swift-corelibs-foundation" to stand in for the Foundation Kit, a "swift-corelibs-libdispatch" to stand in for the Grand Central Dispatch, and an "swift-corelibs-xctest" to stand in for the XCTest APIs from Xcode.
As of 2019, with Xcode 11, Apple has also added a major new UI paradigm called SwiftUI. SwiftUI replaces the older Interface Builder paradigm with a new declarative development paradigm.
Memory management
Swift uses Automatic Reference Counting (ARC) to manage memory. Apple used to require manual memory management in Objective-C, but introduced ARC in 2011 to allow for easier memory allocation and deallocation. One problem with ARC is the possibility of creating a strong reference cycle, where objects reference each other in a way that you can reach the object you started from by following references (e.g. A references B, B references A). This causes them to become leaked into memory as they are never released. Swift provides the keywords weak and unowned to prevent strong reference cycles. Typically a parent-child relationship would use a strong reference while a child-parent would use either weak reference, where parents and children can be unrelated, or unowned where a child always has a parent, but parent may not have a child. Weak references must be optional variables, since they can change and become nil.
A closure within a class can also create a strong reference cycle by capturing self references. Self references to be treated as weak or unowned can be indicated using a capture list.
Debugging and other elements
A key element of the Swift system is its ability to be cleanly debugged and run within the development environment, using a read–eval–print loop (REPL), giving it interactive properties more in common with the scripting abilities of Python than traditional system programming languages. The REPL is further enhanced with playgrounds, interactive views running within the Xcode environment that respond to code or debugger changes on-the-fly. Playgrounds allow programmers to add in Swift code along with markdown documentation. If some code changes over time or with regard to some other ranged input value, the view can be used with the Timeline Assistant to demonstrate the output in an animated way. In addition, Xcode has debugging features for Swift development including breakpoints, step through and step over statements, as well as UI element placement breakdowns for app developers.
Apple says that Swift is "an industrial-quality programming language that's as expressive and enjoyable as a scripting language".
Performance
Many of the features introduced with Swift have well-known performance and safety trade-offs. Apple has implemented optimizations that reduce this overhead.
Comparisons to other languages
Swift is considered a C family programming language and is similar to C in various ways:
Most C operators are used in Swift, but there are some new operators, for example to support integer operations with overflow (see under differences).
Curly braces are used to group statements.
Variables are assigned using an equals sign, but compared using two consecutive equals signs. A new identity operator, ===, is provided to check if two data elements refer to the same object.
Control statements while, if, and switch are similar, but have extended functions, e.g., a switch that takes non-integer cases, while and if supporting pattern matching and conditionally unwrapping optionals, for uses the syntax.
Square brackets are used with arrays, both to declare them and to get a value at a given index in one of them.
It also has similarities to Objective-C:
Basic numeric types (Int, UInt, Float, Double)
Class methods are inherited, like instance methods; self in class methods is the class the method was called on.
Similar for...in enumeration syntax.
Differences from Objective-C include:
Statements do not need to end with semicolons (;), though these must be used to allow more than one statement on a line.
No header files.
Uses type inference.
Generic programming.
Functions are first-class objects.
Enumeration cases can have associated data (algebraic data types).
Operators can be redefined for classes (operator overloading), and new operators can be defined.
Strings fully support Unicode. Most Unicode characters can be used in either identifiers or operators.
No exception handling. Swift 2 introduces a different and incompatible error-handling model.
Several features of earlier C-family languages that are easy to misuse have been removed:
Pointers are not exposed by default. There is no need for the programmer to keep track of and mark names for referencing or dereferencing.
Assignments return no value. This prevents the common error of writing i = 0 instead of i == 0 by throwing a compile-time error.
No need to use break statements in switch blocks. Individual cases do not fall through to the next case unless the fallthrough statement is used.
Variables and constants are always initialized and array bounds are always checked.
Integer overflows, which result in undefined behavior for signed integers in C, are trapped as a run-time error in Swift. Programmers can choose to allow overflows by using the special arithmetical operators &+, &-, &*, &/ and &%. The properties min and max are defined in Swift for all integer types and can be used to safely check for potential overflows, versus relying on constants defined for each type in external libraries.
The one-statement form of if and while, which allows for the omission of braces around the statement, is unsupported.
C-style enumeration for (int i = 0; i < c; i++), which is prone to off-by-one errors, is unsupported (from Swift 3 onward).
The pre- and post- increment and decrement operators (i++, --i ...) are unsupported (from Swift 3 onward), more so since C-style for statements are also unsupported from Swift 3 onward.
Development and other implementations
Since the language is open-source, there are prospects of it being ported to the web. Some web frameworks have already been developed, such as IBM's Kitura, Perfect and Vapor.
An official "Server APIs" work group has also been started by Apple, with members of the Swift developer community playing a central role.
A second free implementation of Swift that targets Cocoa, Microsoft's Common Language Infrastructure (.NET), and the Java and Android platform exists as part of the Elements Compiler from RemObjects Software.
By combining toolchains from LLVM and Macintosh Programmer's Workshop, it is possible to run a very small subset of the language on Mac OS 9.
See also
Comparison of programming languages
Objective-C
Kotlin (programming language)
Python (programming language)
Nim (programming language)
References
External links
Swift at Apple Developer
Swift Example
Server-side Swift - The Vapor Framework
Apple Inc. software
Computer-related introductions in 2014
Object-oriented programming languages
Pattern matching programming languages
Programming languages
Programming languages created in 2014
Software using the Apache license
Statically typed programming languages
Systems programming languages
Declarative programming |
57957001 | https://en.wikipedia.org/wiki/DISTED%20College | DISTED College | DISTED College is a private college within George Town, the capital city of the Malaysian state of Penang. It was established in 1987 as the first Penang-based private tertiary institution. The college provides various pre-university, diploma and degree courses, some of which are twinned with foreign universities.
The DISTED Heritage campus is on Macalister Roadin close vicinity to downtown George Town, a UNESCO World Heritage Site. The college is wholly owned by Wawasan Open University.
History
DISTED College was the brainchild of three educationists - Gajaraj Dhanarajan, Hulman Sinaga and Sharom Ahmat - who in 1985 formed DISTED Services Sdn Bhd, a private limited company. The name DISTED is the acronym for Distance Education, which suited the original intention of the trio - to provide adults an alternate route to tertiary education; it was felt that, compared to high school leavers, adults had more limited prospects of obtaining higher education.
However, due to the high costs of tertiary courses abroad, the trio soon had to alter their direction to cater to the youth. By 1987, contracts were signed with the British Columbia Open University, TAFE South Australia, Murdoch University and the Warrnambool Institute of Advanced Education to provide off-campus courses to Penangites. Within the same year, DISTED College was registered with Malaysia's Ministry of Higher Education.
DISTED took in its first cohort of students in 1988. At the time, it was housed inside a bungalow at Hargreaves Road in George Town. The lack of space forced the college to relocate to RECSAM within the suburb of Gelugor, and then to the St. Joseph's Novitiate at Kelawei Road (now part of Gurney Paragon).
In 1995, DISTED College finally moved into its current premises at Macalister Road, occupying a mansion formerly owned by a prominent 19th century tycoon, Yeap Chor Ee. The campus was expanded in 1997. In year 2012 DISTED College's shares were entirely acquired by Wawasan Open University.
Academic programmes
Pre-university
GCE A-Level (provided by Cambridge Assessment International Education)
South Australian Certificate of Education
Foundation in Arts
Diploma
Diploma in Accounting
Diploma in Business Information Technology
Diploma in Business Studies
Diploma in Computer Science
Diploma in Creative Multimedia Production
Diploma in Electrical and Electronic Engineering
Diploma in Food and Beverage Management
Diploma in Hotel Management
Transfer programmes
Students who have graduated with a diploma from DISTED College will have the option of undergoing any one of the transfer programmes with foreign universities.
Japan
Diploma in Computer Science
Diploma in Electrical and Electronic Engineering
Taiwan
I-Shou University
Diploma in Business Studies
Diploma in Creative Multimedia Production
Diploma in Hotel Management
United Kingdom
University of Gloucestershire
Diploma in Business Studies + Business and Technology Education Council Higher National Diploma
Diploma in Computer Science + Business and Technology Education Council Higher National Diploma
Diploma in Business Information Technology + Business and Technology Education Council Higher National Diploma
Diploma in Creative Multimedia Production + Business and Technology Education Council Higher National Diploma
Birmingham City University
Diploma in Business Studies + Business and Technology Education Council Higher National Diploma
Diploma in Accounting + Business and Technology Education Council Higher National Diploma
Middlesex University
Diploma in Hospitality Business Management + Business and Technology Education Council Higher National Diploma
Diploma in Computer Science + Business and Technology Education Council Higher National Diploma
Diploma in Business Information Technology + Business and Technology Education Council Higher National Diploma
Solent University
Diploma in Creative Multimedia Production + Business and Technology Education Council Higher National Diploma
Degrees
HELP University
Psychology
Staffordshire University
Accounting & Finance
International Business Management
Marketing Management
Other certificates
Other courses offered by DISTED include:
Chartered Certified Accountant (ACCA) from the Association of Chartered Certified Accountants
Pearson Test of English Academic
Ratings
DISTED College was awarded a five-star rating in the Malaysian Quality Evaluation System (MyQUEST) 2014/2015, which was conducted by Malaysia's Ministry of Higher Education.
References
Colleges in Malaysia
Universities and colleges in Penang
Buildings and structures in George Town, Penang
Educational institutions established in 1987
1987 establishments in Malaysia |
6150221 | https://en.wikipedia.org/wiki/I%20Spy%20%28Scholastic%29 | I Spy (Scholastic) | I Spy is a children's book series with text written by Jean Marzollo, photographs by Walter Wick, and published by Scholastic Press. Each page contains a photo with objects in it, and the riddles (written in dactylic tetrameter rhyme) accompanying the photo state which objects have to be found.
Although the first I Spy book contains unrelated pages of still life pictures, subsequent books are more thematic.
Several video games based on the I Spy books are available for Windows PC, Nintendo DS, Wii, iOS, Leapster, and Game Boy Advance, including I Spy Spooky Mansion, I Spy Treasure Hunt, and I Spy Fantasy. These served as early examples of an increasingly popular hidden object game genre.
I Spy merchandise has been sold in at least 31 countries worldwide.
Wick stated in a 1997 news article, "My career can really be put into two categories: before I Spy and after I Spy... The success of the books has been really nice. I never got that lucky break in my commercial career, but all of that hard work ... was usable for I Spy."
Authors
Jean Marzollo is the award-winning author of over 100 books, including Help Me Learn Numbers 0-20, Help Me Learn Addition, Help Me Learn Subtraction, Pierre the Penguin, Soccer Sam, Happy Birthday Martin Luther King, The Little Plant Doctor, In 1776, Mama Mama/Papa Papa, and I Am Water, as well as books for parents and teachers such as The New Kindergarten.
Walter Wick is the author and photographer of the best-selling series Can You See What I See?.
Carol Carson Devine, the book designer for the first I Spy books, is art director at Alfred A. Knopf Publishers. She has designed covers for books by John Updike, Joan Didion, Alice Munro, Bill Clinton and Pope John Paul II.
Book list
For All Ages
Classics
I Spy: A Book of Picture Riddles (1992)
I Spy Christmas (1992)
I Spy Fun House (1993)
I Spy Mystery (1993)
I Spy Fantasy (1994)
I Spy School Days (1995)
I Spy Spooky Night (1996)
I Spy Treasure Hunt (1999)
Challengers
I Spy Super Challenger! (1997)
I Spy Gold Challenger! (1998)
I Spy Extreme Challenger! (2000)
I Spy Year-Round Challenger! (2001)
I Spy Ultimate Challenger! (2003)
I Spy Super Extreme Challenger! (2009)
For Beginning Readers
Paperback Readers
I Spy Funny Teeth (2003)
I Spy a Dinosaur's Eye (2003)
I Spy a School Bus (2003)
I Spy a Scary Monster (2004)
I Spy a Candy Cane (2004)
I Spy Lightning in the Sky (2005)
I Spy a Pumpkin (2005)
I Spy a Penguin (2005)
I Spy Santa Claus (2005)
I Spy a Balloon (2006)
I Spy a Butterfly (2007)
I Spy Merry Christmas (2007)
I Spy I Love You (2009)
I Spy a Skeleton (2010)
I Spy an Egg in a Nest (2011)
I Spy an Apple (2011)
I Spy Thanksgiving (2011)
I Spy School (2012)
Phonics and More
I Spy Phonics Fun Boxset (2007)
I Spy A to Z (2009)
For Babies & Preschoolers
Board Books
I Spy Little Book (2002)
I Spy Little Animals (2002)
I Spy Little Wheels (2003)
I Spy Little Numbers (2003)
I Spy Little Christmas (2003)
I Spy Little Letters (2004)
I Spy Little Bunnies (2004)
I Spy Little Hearts (2004)
I Spy Little Learning Box (2004)
I Spy Little Toys (2005)
Square Paperbacks
I Spy Letters (2006)
I Spy Numbers (2006)
I Spy Animals (2006)
I Spy a Funny Frog (2007)
I Spy Hearts (2007)
I Spy Bunnies (2008)
Other Books
Sticker Books
I Spy Sticker Book & Picture Riddles (2012)
Novelty Books
I Spy a Christmas Tree (2012)
Special Books
I Spy Spectacular (2011)
Game adaptations
PC and Mac
I Spy (1997)
I Spy Junior (1999)
I Spy Spooky Mansion (1999)
I Spy School Days (2000)
I Spy Junior Puppet Playhouse (2000)
I Spy Treasure Hunt (2001)
I Spy Fantasy (2003)
I Spy Spooky Mansion Deluxe (2004)
I Spy Mystery (2006)
I Spy Fun House (2008)
I Spy Challenger (2014)
I Spy Pirate Ship (2015)
Nintendo DS
I Spy Fun House (2007)
I Spy Universe (2010)
I Spy Castle (2011)
I Spy Game Pack (compilation of I Spy Universe and I Spy Fun House, 2012)
Wii
Ultimate I Spy (2008)
I Spy Spooky Mansion (2010)
I Spy Game Pack (compilation of Ultimate I Spy and I Spy Spooky Mansion, 2012)
iPhone Apps
I Spy Riddle Race (2009)
I Spy Spooky Mansion (2009)
I Spy Arcade: Critter Craze (2013)
I Spy Arcade: Fine Line (2013)
I Spy Arcade: Match Attack (2013)
I Spy Arcade: Spy Squares (2013)
Leapster
I Spy Challenger (2011)
I Spy Super Challenger (2012)
I Spy Treasure Hunt (2012)
I Spy Spooky Mansion (2012)
Game Boy Advance
I Spy Challenger (2002)
DVD Games
I Spy Treasure Hunt (2012)
I Spy Spooky Mansion (2012)
I Spy Fantasy (2012)
I Spy (2014)
Flash
I Spy Bingo (2009)
I Spy Puzzler (2009)
I Spy Mystery Match (2009)
I Spy The Library (2010)
I Spy City (2010)
I Spy The View from Duck Pond Inn (2013)
I Spy Rhyme Time (2013)
I Spy Riddle Round-Up (2013)
I Spy Catch 'em if you Can (2013)
I Spy Make a Picture Online (2014)
I Spy Write a Riddle Online (2014)
Tag
I Spy Imagine That! (2010)
Awards
The I Spy series has won numerous awards :
Books
I Spy: A Book of Picture Riddles (HC)
California Children's Media Award, Honorable Mention
NYPL 100 Titles for Reading and Sharing
"Definitely fun, and educational, too; this is a true eye-opener." — Los Angeles Times
I Spy Christmas (HC)
Parents' Magazine Best Book
"Features gorgeously styled, full-spread color photos of many objects."—Publishers Weekly, starred review
I Spy Fun House (HC)
Publishers Weekly Best Book of the Year
"Sumptuously styled.... A lot of mirror mazes and magic tricks."—Publishers Weekly
I Spy Mystery (HC)
Publishers Weekly Best Book of the Year, National Parenting Publication Award Honorable Mention
I Spy Spooky Night
American Bookseller Pick of the Lists
"A must, in multiple copies, for any Halloween collection." — School Library Journal, starred review,
"Spectacularly eerie pictures chock full of hidden objects."— Booklist
I Spy Treasure Hunt
2001 Parent's Choice Award
"Intricate and ingenious."—Booklist
"Marzollo's structured rhymes provide the clues while Wick's stunningly detailed miniature village provides the hidden answers for readers to seek out." — School Library Journal
I Spy Phonics Fun Boxset
2008 Oppenheim Toy Portfolio Platinum Award Winner
Interactive adaptation
I Spy Treasure Hunt (CD-ROM)
2001 Parents’ Choice Software Recommended Award
Best Selling PC Games PlayDate 2001
2001 Parent's Guide to Children's Media Award
The National Parenting Center's Seal of Approval
Choosing Children's Software Best Picks Award
The #1 Best-Selling Educational Title October 2001, NPD Intelect
Kids First! Endorsement
2001/2002 BESSIE (Best Educational Software) Award
2002 Distinguished Achievement Award Finalist, Association of Educational Publishers
2002 Parenting Magazine's Software of the Year Award
I Spy Fantasy (CD-ROM)
Top Choice Software Award, Museum of Science Boston
All Star Software, Children's Software & New Media Revue - 4.9 Rating
The National Parenting Center Seal of Approval
Child Magazine Best Software & Video Games of 2003
Parent & Child Teacher's Pick Best Tech 2003
Best Educational Software, Review Corner
2004 BESSIE (Best Educational Software) Award
2004 Parents’ Choice Gold Award
2004 Distinguished Achievement Award "Best Graphics", Association of Educational Publishers
I Spy Spooky Mansion Deluxe (CD-ROM)
National Parenting Publications Awards (NAPPA) Gold Award Winner 2004
All Star Software, Children's Software & New Media Revue - 5.0 Rating
2004 Parents’ Choice Recommended Award
2004 Top Choice Software Award, Museum of Science Boston
I Spy Mystery (CD-ROM)
Dr. Toy's 100 Best Children's Products for 2006
Dr. Toy's 10 Best Software//CD-ROM/High-Tech Products for 2006
Best Interactive Games of 2006, Child Magazine
Best of 2006 Technology, Parent & Child Magazine
2006 Best Video Games for Kids, Best PC Puzzler – Nick Jr. Magazine
Editor's Choice, Children's Technology Revue
I Spy Fun House (CD-ROM)
National Parenting Center Seal of Approval
I Spy Treasure Hunt (Leapster)
National Parenting Center Seal of Approval
Parents’ Choice Silver Award
I Spy Fun House (Nintendo DS)
The National Parenting Center's 2008 Seal of Approval
Kids First! Endorsement
Parents’ Choice Recommended
Ultimate I Spy (Wii)
iParenting Media Award
Parents’ Choice Gold Award
TV adaptation
I Spy TV Series
2004 USA Film Festival – Finalist
Telly Awards – Finalist
Parent's Choice Award – Silver Honor Award
Chicago International Television Award – Certificate of Merit
2003 Chicago International Children's Film Festival – Certificate of Merit
Chicago International Television Award – Certificate of Merit – Program
Chicago International Television Award – Certificate of Merit – Series
Daytime Emmy Award – Winner – Individual Animation (Pete Sluszka)
International Film & Video Festival – Screening & 3rd Place certificate
Literacy in Media Awards – Finalist
Parent's Choice Award – Silver Medal
Shenandoah University Parent's Guide – Recommended
USA Film Festival – Finalist
Game & Puzzle adaptations
I Spy Preschool Game
1998 Canadian Toy Testing Council Three Stars
Oppenheim Toy Portfolio Gold Seal Award
Parents Choice Approved
2002 PlayDate Top-Selling Board Game
I Spy Flip 5
2009 Oppenheim Toy Portfolio Gold Seal Award
Oppenheim Toy Portfolio Platinum Award
I Spy Ready, Set, Silhouette
2009 Oppenheim Toy Portfolio Gold Seal Award
I Spy Bingo Game
2003 Oppenheim Toy Portfolio Gold Seal Award
Canadian Toy Testing Council Three Stars
Creative Child Magazine "Preferred Choice"
I Spy Memory Game
1995 Dr. Toy's 100 Best Children's Products
Duracell Kids Choice National Toy Award
Learning Magazine Teacher's Choice Award
National Parenting Publication, Honors Award
Oppenheim Toy Portfolio Platinum Seal Award
Parenting Magazine Best Toys of the Year
Parents Choice Gold Seal of Excellence
Parents Magazine Best Toys & Games
Working Mother Magazine
The Right Toys for the Right Age
1997 Specialty Retailer Top Toys
2004 Dr. Toy's Best Classic Products
I Spy Travel Game
2003 Dr. Toy's 100 Best Vacation Products
2002 Parents Choice Gold Seal of Excellence
I Spy 3D
2008 Oppenheim Toy Portfolio Platinum Seal Award
2007 Dr. Toy's Best Vacation Products
iParenting Media Award
sCanadian Toy Council 2 Stars
I Spy Eagle Eye Game
2006, Dr. Toy's 10 Best Games
Dr. Toy's 100 Best Children's Products
National Parenting Center Seal of Approval
National Parenting Publications
Honors, Creative Child Magazine "Preferred Choice"
iParenting Media Award
Canadian Toy Testing Council Three stars
2007 Learning Express Best Game
I Spy Private Eye
2008 National Parenting Seal of Approval Award
Creative Child Preferred Choice Award
Dr. Toy's 100 Best Children's Products
Dr. Toy's Top 10 Games
NAPPA Award Winners
I Spy Spooky Night
2004 Canadian Toy Testing Council Award Three Stars
Creative Child Magazine Preferred Choice
Educational Games
Dr. Toy's Best Smart Play/Smart Toy Products
Dr. Toy's 100 Best Children's Products
iParenting Media Award
Nick Jr. Family Magazine Top 50
I Spy Monster Workshop Puzzle (63 Pc)
1998 Working Mother Magazine
The Right Toys for the Right Age
I Spy 1,2,3 Floor Puzzle
1998 Oppenheim Toy Portfolio Gold Seal Award
I Spy Go Fish Card Game
1999 Canadian Toy Testing Council Award Three Stars
Crayola Kids Magazine "The Years Best Toys"
Women's Day "Top Toys Under $10"
I Spy Snap Card Game
1999 Canadian Toy Testing Council Award Three Stars
Crayola Kids Magazine's "The Years Best Toys"
2000 Southeastern Wisconsin "Big Cheese" Toy Test
External links
Jean Marzollo Website I Spy Page
Walter Wick Website I SPY Page
Scholastic I SPY Page
References
Series of children's books |
44969722 | https://en.wikipedia.org/wiki/Series%2030%2B | Series 30+ | Series 30+ (abbreviated as S30+) is a software platform and application user interface used for Nokia-branded mobile devices. The platform was introduced by Nokia in September 2013, first appearing on the Nokia 108, and has been the main Nokia feature phone operating system after the end of the Series 30 and Series 40 platforms in 2014. Despite the similar name and user interface, S30+ is technically completely different and unrelated to S30.
Many S30+ devices only support MAUI Runtime Environment (MRE), developed by MediaTek, but some later devices have included support for J2ME applications. Even for models that don't support Java J2ME applications, some are still capable of running something. Some S30+ models also come with an online shop that would allow downloading new apps and games.
List of devices
The following feature phones use the Series 30+ platform and are all available as both single and Dual SIM models.
Made by Nokia
Nokia 108 released in 2013 is a Series 30+ based device with support for camera, video and Bluetooth technology.
Nokia 220 was released in 2014 with 2.4-inch display and having Nokia Xpress browser and GPRS data connection (2.5G).
Nokia 225, released in 2014, is similar to the 220 but has a larger 2.8-inch display.
Made by Microsoft
Nokia 130 is a smaller device with a 1.8-inch display, also released in 2014.
Nokia 215 was announced in January 2015. Like the 220, the 215 has a 2.4-inch display, has GPRS – EDGE connectivity and only has a VGA camera.
Nokia 105 (2015) is a device announced in June 2015, it notably had increased storage and could store over 2.000 contacts and last 35 days on standby, and is advertised as a backup telephone for smartphone users.
Nokia 222 is a device announced in August 2015. The differentiation from its predecessors is that it comes with Skype's GroupMe application preinstalled, supports J2ME applications.
Nokia 230 launched in November 2015. This device features front facing and main camera both with LED flash.
Nokia 216 was announced in September 2016 and released in October 2016 (first released in India and Vietnam, later in the United Kingdom in January 2017). It is identical in features to the Nokia 215 with the main difference being the front facing camera and a slight redesign.
Microsoft-branded phone with a part number RM-1182 was reportedly developed in 2015. Photos surfaced in 2018 showed a redesigned user interface, featuring elements of Windows 10 Mobile design language and Microsoft Account integration.
Made by HMD
Nokia 150 was launched on 13 December 2016. It looks like a Nokia 216 but excludes a front camera and flash, uses a different processor, only has 6 ringtones in Tones, and has a matte finish around the keypad (as opposed to the glossy finish around the keypad on the Nokia 216). It still features Bluetooth, but lacks the ability to access the internet.
Nokia 3310 (2017) in 2G was announced on 26 February 2017. The Series 30+ is integrated only on the 2G version.
Nokia 105 (2017) was announced on 17 July 2017.
Nokia 130 (2017) was announced on 17 July 2017.
Nokia 106 (2018) was announced on 14 November 2018.
Nokia 210 (2019) was announced on 25 February 2019.
Nokia 105 (2019) was announced on 24 July 2019.
Nokia 110 (2019) was announced on 5 September 2019.
Nokia 5310 (2020) was announced on 19 March 2020.
Nokia 125 was announced on 12 May 2020.
Nokia 150 (2020) was announced on 12 May 2020.
Nokia 215 4G (2020) was announced on 10 October 2020.
Nokia 225 4G (2020) was announced on 10 October 2020.
Nokia 6310 (2021) was announced on 26 July 2021.
Multimedia support
Maximum accepted video resolution is 854×480.
Accepted video containers: AVI, MP4, 3GP, 3G2
Accepted video codecs: DivX 4, DivX 5, XviD, H.263, MJPEG
Accepted audio containers and codecs: MP3, WAV (PCM and ADPCM variants only), AAC, AAC+ (poor), eAAC+ (poor), AMR-NB, MIDI (no larger than 20 KB for old versions)
Accepted photo formats: JPEG, GIF, PNG, BMP
See also
Series 20
Series 30
Series 40
Series 60
Series 80
Series 90
References
Nokia platforms
Mobile software
Mobile operating systems
Embedded operating systems |
5095261 | https://en.wikipedia.org/wiki/Bob%20Sabiston | Bob Sabiston | Bob Sabiston (born 1967) is an American film art director, computer programmer, and creator of the Rotoshop software program for computer animation. Sabiston began developing software as an undergraduate and then graduate researcher in the MIT Media Lab from 1986 to 1991. While at MIT, and also after moving to Austin, Texas, in 1993, Sabiston used his 2D/3D software to create several short films, including God's Little Monkey (1994), "Beat Dedication" (1988), and "Grinning Evil Death" (1990). "Grinning Evil Death" was widely seen on the first episode of MTV's "Liquid Television" show. "God's Little Monkey" won the Prix Ars Electronica Golden Nica award for 1994.
In 1997, he developed his interpolating rotoscope program, Rotoshop, for an animation contest sponsored by MTV. The software was used to produce a series of 25 30-second interstitials in New York, collectively entitled "Project Incognito." He moved back to Austin in 1998 and with the help of local artists made the short film "RoadHead." This was followed in 1999 by short "Snack and Drink" in collaboration with Tommy Pallotta. "Snack and Drink" won several film festival awards and resides in the MOMA video collection. The shorts collection "Figures of Speech" followed in late 1999, for PBS. In 2000, Sabiston hired thirty graphic artists in the Austin area to help make Richard Linklater's film Waking Life.
After Waking Life Sabiston spent several years making more rotoscoped short films, including "Yard", "Earthlink Sucks", "Grasshopper". He directed a series of shorts for the PBS show "Life360". In 2003 he directed a short segment for the Lars von Trier film The Five Obstructions. Both "Grasshopper" and "The Five Obstructions" were shown at the Sundance Film Festival in 2004.
In 2004 Sabiston was hired as Head of Animation for Richard Linklater's A Scanner Darkly. He modified the software substantially for the film. Since 2005 he has also directed the "Talk to Chuck" campaign of animated advertisements for Charles Schwab.
Sabiston developed Rotoshop as a means to make rotoscoping easier for artists by automating the interpolation of hand-drawn shapes and lines over video. The software is proprietary and currently not available for use outside of Sabiston's production company, Flat Black Films.
Sabiston is also the creator of Inchworm Animation, a paint and animation program for the Nintendo DSi. It was released on April 25, 2011 in North America and subsequently in Europe, Australia, and Japan. A follow-up successor to the app, Butterfly: Inchworm Animation II was announced in October 2016 for the Nintendo 3DS. It was released the same month via the North American Nintendo eShop. A European and Japanese release is set to follow suit. The new app supports new raster and animation tools, sounds effects, and has native online sharing functions.
Since 2008 Sabiston has developed several apps for iOS: the 3d mind-mapping app Headspace, the modeling/3D-printing app Voxel, the video game Retroid, and a drawing keyboard, Jot Keyboard. In 2015, he released Lowlander, a tribute to Richard Garriott's classic video game Ultima II.
References
External links
Flat Black Films
"Anatomy of a Scene" for Waking Life at SundanceChannel.com
A Scanner Darkly’s head of animation talks about the film’s hellish production
Inchworm Animation
Computer programmers
Massachusetts Institute of Technology alumni
Living people
1967 births |
3385603 | https://en.wikipedia.org/wiki/Grab%20%28software%29 | Grab (software) | Grab is a utility program in macOS for taking screenshots. It supports capturing a marquee selection, a whole window, and the whole screen, as well as timed screenshots.
The program originated in OPENSTEP and NeXTSTEP, and continued to be preinstalled by Apple on macOS until version 10.13 (High Sierra). It was replaced by the utility Screenshot in macOS 10.14 (Mojave).
macOS
On macOS versions 10.13 and earlier, Grab is found in the folder Utilities, which is a subdirectory of Applications. It may be quickly opened by using the Spotlight function when entering grab, or by pressing and typing /Applications/Utilities/Grab.app in Finder. It was previously also found in the Finder menu under Services > Grab. As of Mac OS X v10.4, Preview had a Grab submenu in the File menu, with selection, window, and timed screen. The menu was renamed to Take Screenshot in more recent versions of macOS.
Grab saves screenshots in the Tagged Image File Format (TIFF). In macOS, it is also possible to save screenshots directly to the Desktop in PDF format (earlier versions of macOS) or PNG format (later versions), using keystrokes shown below. For DRM reasons, it is not possible to use this software while DVD Player is open.
Grab helps determine the size of an element on the screen. After using the selection feature and capturing the screen, one can select Inspector from the menu or press (or ); a dialog box will appear with the dimensions of the selected area.
Capture options
Selection - takes a picture of a part of the screen that you select.
Window - takes a picture of a window you select.
Screen - takes a picture of the entire screen.
Timed - screen lets user start a timer and activate part of the screen (such as a menu), and then takes a picture of the screen.
Shortcuts
References
MacOS
Screenshot software |
5324533 | https://en.wikipedia.org/wiki/System%20monitor | System monitor | A system monitor is a hardware or software component used to monitor system resources and performance in a computer system.
Among the management issues regarding use of system monitoring tools are resource usage and privacy.
Overview
Software monitors occur more commonly, sometimes as a part of a widget engine. These monitoring systems are often used to keep track of system resources, such as CPU usage and frequency, or the amount of free RAM. They are also used to display items such as free space on one or more hard drives, the temperature of the CPU and other important components, and networking information including the system IP address and current rates of upload and download. Other possible displays may include the date and time, system uptime, computer name, username, hard drive S.M.A.R.T. data, fan speeds, and the voltages being provided by the power supply.
Less common are hardware-based systems monitoring similar information. Customarily these occupy one or more drive bays on the front of the computer case, and either interface directly with the system hardware or connect to a software data-collection system via USB. With either approach to gathering data, the monitoring system displays information on a small LCD panel or on series of small analog or LED numeric displays. Some hardware-based system monitors also allow direct control of fan speeds, allowing the user to quickly customize the cooling in the system.
A few very high-end models of hardware system monitor are designed to interface with only a specific model of motherboard. These systems directly utilize the sensors built into the system, providing more detailed and accurate information than less-expensive monitoring systems customarily provide.
Software monitoring
Software monitoring tools operate within the device they're monitoring.
Hardware monitoring
Unlike software monitoring tools, hardware measurement tools can either located within the device being measure, or they can be attached and operate from an external location.
A hardware monitor is a common component of modern motherboards, which can either come as a separate chip, often interfaced through I2C or SMBus, or as part of a Super I/O solution, often interfaced through Low Pin Count (LPC). These devices make it possible to monitor temperature in the chassis, voltage supplied to the motherboard by the power supply unit and the speed of the computer fans that are connected directly to one of the fan headers on the motherboard. Many of these hardware monitors also have fan controlling capabilities. System monitoring software like SpeedFan on Windows, lm_sensors on Linux, envstat on NetBSD, and sysctl hw.sensors on OpenBSD and DragonFly can interface with these chips to relay this environmental sensor information to the user.
Privacy
When an individual user is measuring the performance of a single-user system, whether it is a standalone box or a virtual machine on a multi-user system, access does not impede the privacy of others. Privacy becomes an issue when someone other than the end-user, such as a system manager, has legitimate need to access data about other users.
Resource usage
When events occur faster than a monitor can record them, a workaround is needed, such as replacing event recording with simple counting.
Another consideration is not having major impact on the CPU and storage available for useful work. While a hardware monitor will usually have less impact than a software monitor, there are data items, such as "some descriptive information, such as program names" that must involve software.
A further consideration is that a bug in this domain can have severe impact: an extreme case would be "cause the OS to crash."
List of software monitors
Single system:
Activity Monitor
AIDA64
CPU-Z
GPU-Z
Conky
htop
hw.sensors on OpenBSD and DragonFly BSD
iftop
iostat
KDE System Guard (KSysguard)
lm_sensors
monit
Monitorix
Motherboard Monitor
Netdata
nmon
ntop
Process Explorer
Resource Monitor (resmon)
Samurize
Sar in UNIX
SpeedFan
sysmon/envsys on NetBSD
systat
System Monitor (sysmon)
top
Vigilo NMS (Community Edition)
vmstat
Windows Desktop Gadgets
Windows Task Manager
Distributed:
Argus (monitoring software)
Collectd
Ganglia
GKrellM
HP SiteScope
monit (paid version M/monit)
NMIS
Munin
Nagios
NetCrunch
Opmantek
Pandora FMS
Performance Monitor (perfmon)
Prometheus (software)
symon
Vigilo NMS (Enterprise Editions)
Zenoss Core
See also
Application performance management (APM)
Application service management (ASM)
I2C and SMBus
Network monitoring
Mean time between failures (MTBF)
Intelligent Platform Management Interface (IPMI)
System profiler
Website monitoring
References
External links
Monitoring a Linux System with X11/Console/Web-Based Tools
Computer peripherals
Liquid crystal displays
System administration
Utility software types |
54753764 | https://en.wikipedia.org/wiki/Kronos%20%28malware%29 | Kronos (malware) | Kronos was a type of banking malware first reported in 2014. It was sold for $7,000.
It was developed as a followup to the UPAS Kit which has been released in 2012.
Similar to Zeus, it was focused on stealing banking login credentials from browser sessions via a combination of keylogging and web injection. In 2015, its attacks were focused on British banks.
In August 2017, British security researcher Marcus Hutchins (aka 'MalwareTech'), previously notable for his involvement stopping the May 2017 WannaCry ransomware attack, was arrested by the FBI whilst visiting the United States. He was alleged to have created the software in 2014, and to have sold it in 2015 via the AlphaBay forums. Hutchins later admitted to being paid to work on Kronos and its predecessor UPAS Kit (named after the toxic Upas tree) as the main developer between 2011 and spring 2015.
References
Rootkits
Trojan horses
Windows trojans
Malware toolkits
Hacking in the 2010s
Banking crimes |
64066578 | https://en.wikipedia.org/wiki/Olive%20%28software%29 | Olive (software) | Olive is a free and open-source cross-platform video editing application for Linux, Windows and macOS. It is currently in alpha.
It is released under GNU General Public License version 3. It is written in C++ and uses Qt for its graphical user interface, FFmpeg for its multimedia functions, OpenImageIO library, OpenColorIO for color management and CMake build system for configuring.
The plan of the development team is to combine complete color management, a fast and high-fidelity half-float/float-based render pipeline, node-based compositing and audio mixing, and a highly efficient automated disk cache all together in the one program. According to the development team, this batch of features is one "no other NLE - not even commercial - has tried to do".
Features
History
Olive 0.1 was in development for a year before it was published. The original author said that the program itself was his first C++ and his first large-scale programming project. Due to being inexperienced the author says that a lot of programming and video handling mistakes were made. Since the code base of 0.1 wouldn't allow planned features and because the development team saw that the "codebase was full of problems that made it unsustainable", the program had to be rewritten from the ground up.
Version 0.2 (unofficial title The Rewrite) is planned to provide the solid base for the planned features. Even though 0.2 is not officially released yet, nightly builds can be downloaded and tested. It is also planned to add support for OpenTimelineIO.
The far future version 0.3 is planned to improve project management features allowing users to pre-cache only the parts of a video needed. It is also planned to improve the integration of multiple projects making collaborative work easier as well as improving the render pipeline for network rendering to allow multiple computers working together rendering the same project for preview caching and for export.
Release history
See also
Comparison of video editing software
List of video editing software
List of video editing free software
Non-linear editing system
References
External links
Video editing software
Free video software
Video editing software for Linux
Video editing software for Windows
MacOS multimedia software
Software that uses Qt |
2239759 | https://en.wikipedia.org/wiki/The%20Laundry%20Files | The Laundry Files | The Laundry Files is a series of novels by British writer Charles Stross. They mix the genres of Lovecraftian horror, spy thriller, science fiction, and workplace humour. Their main character for the first five novels is "Bob Howard" (a pseudonym taken for security purposes), a one-time I.T. consultant turned occult field agent. Howard is recruited to work for the Q-Division of SOE, otherwise known as "the Laundry", the British government agency which deals with occult threats. "Magic" is described as being a branch of applied computation (mathematics), therefore computers and equations are just as useful, and perhaps more potent, than classic spellbooks, pentagrams, and sigils for the purpose of influencing ancient powers and opening gates to other dimensions. These occult struggles happen largely out of view of the public, as the Laundry seeks to keep the methods for contacting such powers under wraps. There are also elements of dry humour and satirisation of bureaucracy.
While the stories are partially inspired by the Cthulhu mythos universe created by H. P. Lovecraft and others, they are not set in Lovecraft's universe. In Stross's world, the greatest magicians are the scientists who closely study the phenomena; it features a secret history of historical thinkers who also dabbled in or stumbled upon occult uses of their work.
The Concrete Jungle and Equoid both won the Hugo Award for Best Novella, and "Overtime" was a nominee for best novelette. The series as a whole was nominated for the Hugo Award for Best Series in 2019.
The Atrocity Archives
The Atrocity Archives is the first collection of Laundry stories by British author Charles Stross. It is set in 2002–3 and was published in 2006. It includes the short novel The Atrocity Archive (originally serialised in Spectrum SF in Spectrum SF, #7 November 2001) and The Concrete Jungle, which won the 2005 Hugo Award for Best Novella.
The protagonist of both stories is computer expert Bob Howard, who re-discovers certain mathematical equations that contact other worlds. The Laundry detects the disturbance and swoops in to give him a mandatory job offer. ("I thought I was just generating weird new fractals; they knew I was dangerously close to landscaping Wolverhampton with alien nightmares.") From his position in the Laundry, a secret British occult intelligence organisation, Howard is allowed to learn something of the secret history of the world, as well as the various modern counter-measures the Laundry has adopted to deal with these threats. Despite the nature of the work, the Laundry is an efficient and low-key modern organization; more cubicle-jockeying than stately mansion towers and hidden volcano lairs, in other words. A tag-line used for the books by publisher Ace Books was "Saving the world is Bob Howard's job. There are a surprising number of meetings involved."
In The Atrocity Archive, Howard is given work as a field agent in finding and protecting Irish Professor of Logic Dominique "Mo" O'Brien, as her work – dangerously close to the point of bending reality – has triggered the Laundry's person-of-interest checks. There, Howard must contend with the Black Chamber, which in this setting was never actually disbanded, but merely went underground as the US government's equivalent of the Laundry. Howard and Mo eventually head to Amsterdam and deal with Middle Eastern terrorists also on the hunt for Mo's work. They also research the Atrocity Archive, a classified record of German efforts in World War II. In this universe, the Thule Society, a pagan and occult group formed during the defeat of Germany in World War I, actually achieved results; they were absorbed by the Ahnenerbe, which became the occult branch of the SS, and who used German mathematician David Hilbert's research (unwillingly) to attempt to gain an edge for the Nazis. The Wannsee Conference was thus an attempt to harness the occult via mass human sacrifice in the Holocaust, but it ultimately failed after Allied interference. Mo is captured by the terrorists and sent via wormhole to an alternate universe where the Nazis did succeed – although not in a manner they'd have preferred. In this alternate universe, the Nazis summoned a frost giant out of Germanic/Norse legend, which was actually an elder being that fed on heat and who proceeded to destroy Earth. Bob and a team of SAS agents open their own gate, infiltrate the frozen universe, rescue Mo, and leave a nuclear bomb to 'sanitise' the scene. Bob belatedly realises that the nuclear bomb is a counterproductive trap; the frost giant intends to use its power to propel it into their reality, which has far more heat to eat. Bob manages to stop the device from exploding before escaping back to his original universe.
In The Concrete Jungle, Bob Howard is called in for an emergency: there are too many Concrete Cows in Milton Keynes. Howard reads classified files on the presumed cause: gorgonism, which has been banned by treaty for military use, and has been researched by various scientists over time – Lavoisier, Geiger, and Rutherford. Alarmingly, the government has built a network to artificially emulate gorgons in FPGAs, then planned a network of cameras that could be hooked into this emulation – the CCTV network of anti-crime cameras deployed across Britain in the late 90s and early 2000s. This network was intended as a defense if the Old Ones were to rise and attack; however, someone has subverted a CCTV camera to stone a cow, then deposited it with the other concrete cows. As unauthorised use of the CCTV-basilisk network could hold the entire nation at hostage, this is an incredible risk. In an unrelated event, Howard is informed that he is being negligent about preparing for a meeting about a Business Software Alliance audit for the Laundry's software; Howard strongly opposes the audit, as the BSA invariably installs "spyware" to snoop for unauthorised installations.
Howard, with the assistance of Detective Inspector Josephine Sullivan of Milton Keynes, investigates the incident, which soon expands to the murder of humans as well as cows. They attempt to track who could possibly have had access to the gorgon-emulation software and installed it. Meanwhile, a ransom note is received demanding the software be uninstalled. Their investigation eventually leads them to the developers of the software, who are mostly dead from their own cameras, and an agent named "McLuhan" ("the medium is the message"). Howard discovers that the whole incident was inter-department wrangling gone wrong; a rival manager had been seeking to show that Angleton (Howard's manager) was incompetent and letting his own secret programs leak, and her minions had covered their tracks more bloodily than necessary. The "BSA audit" had been an excuse to install the gorgon-software into the Laundry's own internal cameras while Angleton was distracted. Howard and Sullivan infiltrate the Laundry to pull its Internet connection, while Angleton attends the meeting where he might be deposed. Howard comes upstairs to find Angleton victorious; it seems that his rival did not understand who Angleton truly reported to in the matrix management of the Laundry before launching her attempt to have him dismissed. His position as head of Counter-Possession Unit was actually secondary to his position as Private Secretary, and that position's manager went all the way to the top.
Publishers Weekly was somewhat mixed in their review saying "though the characters all tend to sound the same, and Stross resorts to lengthy summary explanations to dispel confusion, the world he creates is wonderful fun." The Washington Post called it "a bizarre yet effective yoking of the spy and horror genres."
Stross states that his inspiration for the spy in these novels is closer to the out-of-place bureaucrats of Len Deighton than to the James Bond model. He also mentions that when he began writing the series in 1999, he chose as villains "an obscure but fanatical and unpleasant gang who might, conceivably, be planning an atrocity on American soil"; but that by the time the novel was to be published in late 2001, Al-Qaeda was no longer obscure, so he chose a different group to use in the novella.
In the afterword to the Science Fiction Book Club 2-in-1 edition of The Atrocity Archives and The Jennifer Morgue, Stross notes that friends warned him against reading the novel Declare while he was working on The Atrocity Archives due to the strong parallels between the two works. Stross also mentioned the similarities between the novel and the Delta Green role-playing game, similarities referenced in the short story "Pimpf" included with The Jennifer Morgue; Delta Green is also about elite government conspiracies working against villains who attempt to wield power derived from the Mythos, as well as rival conspiracies.
The Jennifer Morgue
The Jennifer Morgue is the second collection of Laundry stories by British author Charles Stross. It is set in 2005 and published in 2006. It contains the title novel The Jennifer Morgue, the short story "Pimpf", and an essay titled "The Golden Age of Spying". The collection is a sequel to the stories published in The Atrocity Archives. Billington, the billionaire antagonist of the book, intends to repeat a 1975 CIA attempt to raise a sunken Soviet submarine in order to access the Jennifer Morgue, an occult device that allows communication with the dead, in spite of the hazard of awakening the Great Old Ones. Bob Howard thwarts this attempt with the added help of "Mo" O'Brien, now his wife. She plays a violin able to kill demons and undo bindings.
Where 2004's The Atrocity Archives is written in the idiom of Len Deighton, The Jennifer Morgue is a pastiche of Ian Fleming's James Bond novels and refers to the real-life Project Azorian (incorrectly named by the press as Project Jennifer); Stross also uses footnotes and narrative causality, two literary devices common in the novels of Terry Pratchett. Stross plays with expectations by having Ramona, one of H. P. Lovecraft's "Deep Ones", known as "Blue Hades" in Laundry speak, serve as the "bad" Bond girl, but Billington's identification of Bob with 007 proves to be wrong. Bob plays the "good" Bond girl's role until Mo intervenes as the real 007 character.
The Jennifer Morgue was nominated for the Locus Award for Best Fantasy Novel in 2007.
The Fuller Memorandum
The Fuller Memorandum is the third novel in the Laundry series of novels. It is set in 2008 and published in 2010. As in the previous novels, the protagonist is Bob Howard, an agent for the intelligence agency known as the Laundry.
Where The Atrocity Archives was written in the idiom of Len Deighton and The Jennifer Morgue was a pastiche of Ian Fleming's James Bond novels, The Fuller Memorandum is a homage of sorts to Anthony Price's Dr David Audley/Colonel Jack Butler series of spy thrillers, and features two minor characters named Roskill and Panin, names which appeared as recurring characters in Price's series. The title is derived from General J. F. C. Fuller, military theorist, right-wing intellectual occultist, and an associate of Aleister Crowley, and also a reference to the film The Quiller Memorandum (Stross has noted that his original intention was to pastiche Adam Hall's Quiller novels, but that he changed the plan part way through the writing).
The plot of the book revolves around an eponymous document which describes a supernatural entity, the Eater of Souls. The document and Howard's boss James Angleton go missing, and Howard must locate them. Angleton turns out to be involved in a struggle with cultist double agents inside the Laundry loyal to Nyarlathotep, who capture Howard and plan to bind the Eater of Souls into Howard's body in order to advance their goals. This fails because the Eater of Souls was already bound into Angleton's body decades ago by the predecessors of the Laundry; it has "gone native", aligning itself with the Laundry's goals and British values. Howard uses magic to raise the dead, using them to overcome the cultists.
The Apocalypse Codex
The Apocalypse Codex is the fourth novel in the Laundry series. It is set in 2010 and published in 2012. In this novel, the protagonist Bob Howard, an agent for the intelligence agency known as the Laundry, is tasked with investigating American Televangelist Raymond Schiller, who seeks to gain influence in Britain. Bob finds out that Schiller, who preaches a quiverfull prosperity gospel, is serving a supremely dangerous supernatural entity and trying to bring about the end of the world. The book introduces new allies for Bob: Persephone Hazard, a freelancing witch and secret agent, and Peter Wilson, a vicar and expert in biblical apocrypha.
According to Stross, while the first three books in the series were written in the style of Len Deighton, Ian Fleming and Anthony Price, respectively, the fourth installment is written in the style of a Peter O'Donnell (Modesty Blaise) novel. For future installments, Stross feels that "the series has acquired an identity and feel of its own", and does not intend to continue the pastiche motif.
The Rhesus Chart
The Rhesus Chart is the fifth novel in the Laundry series. It is set in spring 2013 and published in 2014. The novels follow the protagonist Bob Howard, an agent for the intelligence agency known as the Laundry.
The Rhesus Chart plot describes an investigation into what appears to be vampire activity, despite the fact that people are almost suspiciously resistant to the idea that vampires could exist or be involved, which complicates the investigation. It transpires that elder vampires have been subtly mind controlling Laundry staff to convince them that vampires do not exist. A group of recently created vampires join the Laundry, and the two elder vampires in the book are destroyed, at the cost of the life of James Angleton, Howard's boss.
The Rhesus Chart received a Kirkus Reviews starred review.
The Annihilation Score
The Annihilation Score is the sixth novel in the Laundry series. It is set in summer/autumn 2013 and published in 2015. The protagonist is Dr. Dominique "Mo" O'Brien, the wife of Bob Howard, the protagonist of previous books in the series and also an agent for the intelligence agency known as the Laundry.
As the world lurches toward the potentially apocalyptic forces that will probably bring about CASE NIGHTMARE GREEN (the Laundry's codeword for an inevitable worldwide awakening of Lovecraftian horrors, "the stars coming right"), regular humans have started developing superpowers. Mo is promoted to management, tasked to create an inter-agency department to coordinate between The Laundry and the police; two of the Laundry personnel assigned to her team are Ramona (from The Jennifer Morgue) and Mhari (The Rhesus Chart), women who have history with her estranged husband Bob Howard. She is also the holder of the powerful magical Erich Zahn bone violin that she calls Lecter. Lecter is increasingly asserting its power, including induced dreams that relate to The King in Yellow. She is unwillingly compelled to act in a police plot to control the minds of the British public in the interests of law and order, which it becomes clear will backfire, releasing the King in Yellow; she overcomes it with the help of her staff, destroying Lecter in the process.
The Nightmare Stacks
The Nightmare Stacks is the seventh novel in the Laundry series. It is set in March–April 2014 and published in 2016. The protagonist is Alex Schwartz, a vampire (or PHANG in Laundry terminology) working for the Laundry, who was introduced in The Rhesus Chart.
On a parallel-universe Earth, a species called Elves or alfar have evolved to be expert magic users. They have visited Earth in the past, from which comes a great deal of folklore. Civil war has left the Elves' home world uninhabitable and they plan to magically invade the Earth and make it their new home. To scout ahead, they send Agent First of Spies and Liars, the eldest living daughter of the Elven King, who takes over the human identity of a student named Cassie. The Elves invade Leeds and threaten the British heartland with their powerful magic, but they are defenseless against non-magical human weapons and are defeated in a fashion which leaves Cassie inheriting the absolute rulership of the elves present. Cassie immediately surrenders to the British military, declares the Elves to be refugees who cannot go home for fear of their lives, and requests asylum under the Immigration, Asylum and Nationality Act 2006.
The Delirium Brief
The Delirium Brief is the eighth book in the Laundry Files series. It is set in May–June 2014 and was released on 11 July 2017. The Delirium Brief is set about a month after The Nightmare Stacks. Unlike Books 6 and 7, the narrative viewpoint shifts back to Bob Howard. After the invasion of the Elves in which thousands of people perished, the existence of the Laundry has become public knowledge, and the agency faces a new threat, this time not supernatural but political; the Prime Minister uses the Laundry as a scapegoat and dissolves it, to be replaced with a public–private partnership. The mastermind behind this plan turns out to be an old antagonist from The Apocalypse Codex, Raymond Schiller, still trying to bring about the end of the world. The rump of the Laundry executes a coup in cooperation with the surviving cultists from The Fuller Memorandum, bringing Britain under the rule of Nyarlathotep as a lesser evil.
The Delirium Brief is published by Tor. According to Stross, the book was somewhat delayed due to the Brexit referendum, as the pro-Brexit result required a large rewrite to reconcile the politics portrayed in the book with the real-world developments.
The Labyrinth Index
The Labyrinth Index is the ninth book in the Laundry Files series. It is set in Winter 2014/early 2015 and was released on 30 October 2018. Mhari Murphy is the protagonist. She has been elevated to the House of Lords (taking the title "Baroness Karnstein") and serves under the new Prime Minister following the Laundry-engineered overthrow of the Government described in the previous book. The new Prime Minister Fabian Everyman (an alias of Nyarlathotep) sends Mhari to the United States on a mission to discover what has happened to the now-missing President and who is running America in his stead.
There she finds that the Black Chamber has made the citizenry forget the very existence of the President and have taken over the US Government. The Black Chamber's plan, echoing the Laundry's UK plan in the previous book, is to install a Lovecraftian entity (Cthulhu in this case) as the head of the US Executive and thus survive and fight the crisis caused by CASE NIGHTMARE GREEN, which is well underway at this point.
Mhari and her team try to evade the deputy director (nicknamed DeeDee) and her agents, and despite fatalities manage to free the President to broadcast a reminder of his existence to the populace. Mhari and the survivors of her team then return to the UK, leaving the President behind as he struggles, and eventually fails, to reassert his authority. But the struggle occupies US forces and so buys time for the United Kingdom, which was of course the Prime Minister's plan in the first place. Mhari keeps her job and is congratulated, and the novel ends with her contemplating her future with her fiancé in the new nightmarish world unfolding before them.
Dead Lies Dreaming
Dead Lies Dreaming was marketed as the tenth book in the Laundry Files series but does not concern itself with the titular agency or its members apart from an occasional cameo. More accurately, it is the start of a separate trilogy set in the same world the author refers to as "Tales of the New Management". It is set in December 2016 and was released on 27 October 2020. This novel is clearly based on the story of 'Peter Pan', and suggests that the author is back in a pastiche role again.
Escape from Yokai Land
Escape from Yokai Land (originally titled Escape from Puroland) is a novella in the Laundry Files series. It is set in March/April 2014 and will be released on 1 March 2022. The story takes place at the same time as The Nightmare Stacks and just before The Delirium Brief. The protagonist is Bob Howard, an intelligence agent for the Laundry. It is intended to explain why he wasn't in the UK during the events of The Nightmare Stacks.
Following the death of his boss Angleton in The Rhesus Chart, Laundry agent Bob Howard is promoted to replace him and has to take over Angleton's ongoing projects. One of those projects is overseeing the wards that lock down magical sites outside the United Kingdom. Consequently, Bob has to travel to Tokyo on an overseas liaison mission with the Miyamoto Group to police the Yōkai: a class of supernatural entities and spirits in Japan now growing more active as CASE NIGHTMARE GREEN progresses.
Novellas, spin-offs, and related works
Stross' short stories Down on the Farm, Overtime, and Equoid are within the same Laundry continuity. Down on the Farm and Equoid both take place between the second and third novels (2007 in the setting); Overtime takes place between the third and fourth novels (2009 in setting). Equoid won the 2014 Hugo Award for best novella, and Overtime was a shortlist nominee for the 2010 Hugo Award for best novelette.
Stross's 2000 short story "A Colder War" also mixes elements of Lovecraft and espionage, and is perhaps a precursor to the Laundry stories; however, the fictional background and assumptions are different, and it is its own distinct setting (as the world is destroyed at the end of it, the Laundry series is clearly not a sequel).
Cubicle 7 published The Laundry, a role-playing game based on the Laundry stories in July 2010.
Stross published a short non-canonical work set in the Laundry Files universe on a fanfiction website, "The Howard/O'Brien Relate Counseling Session Transcripts – Part 1".
Audiobook versions
Audiobook versions of the novels in the Laundry Files series have been narrated by Gideon Emery, Jack Hawkins, Caroline Guthrie, and Bianca Amato.
See also
Declare, by Tim Powers
The Spiraling Worm, by David Conyers and John Sunseri
Delta Green role-playing game
The Laundry role-playing game
References
External links
The Laundry Files series timeline:
Original version at 2016/04,
Latest version at 2020/10
James Bond Vs. Cthulhu
"Crib Sheet: The Fuller Memorandum", an essay by Charles Stross
"Crib Sheet: The Rhesus Chart", essay by Charles Stross
"Crib Sheet: The Annihilation Score", essay by Charles Stross
"Crib Sheet: The Nightmare Stacks", essay by Charles Stross
"Crib Sheet: The Delirium Brief", essay by Charles Stross
Down on the Farm, a 2008 short fiction work in the series, free with full content online
Overtime, a 2009 short fiction work in the series, free with full content online
Equoid, a 2013 short fiction work in the series, free with full content online
Book series introduced in 2004
2004 British novels
2006 British novels
2010 British novels
2012 British novels
2014 British novels
2015 British novels
2016 British novels
2017 British novels
Cthulhu Mythos novels
Hugo Award for Best Novella winning works
Novels by Charles Stross
Novels first published in serial form
Science fiction book series
Science fantasy novels
British spy novels
Special Operations Executive in fiction
Cold War in popular culture
Bureaucracy in fiction
Novels about parallel universes |
11140935 | https://en.wikipedia.org/wiki/Honeywell%20316 | Honeywell 316 | The Honeywell 316 was a popular 16-bit minicomputer built by Honeywell starting in 1969. It is part of the Series 16, which includes the Models 116 (1965, discrete), 316 (1969), 416 (1966), 516 (1966) and DDP-716 (1969). They were commonly used for data acquisition and control, remote message concentration, clinical laboratory systems, Remote Job Entry and time-sharing. The Series-16 computers are all based on the DDP-116 designed by Gardner Hendrie at Computer Control Company, Inc. (3C) in 1964.
The 516 and later the 316 were used as Interface Message Processors (IMP) for the American ARPANET and the British NPL Network.
History
Computer Control Company developed a computer series named Digital Data Processor, of which it built two models:
DDP-116 - the first of the Series 16
DDP-124 - part of a trio of 24-bit systems: DDP-24, 124, 224.
Honeywell bought the company after the 24 trio, and built the balance of the Series 16.
The H-316 was used by Charles H. Moore to develop the first complete, stand-alone implementation of Forth at NRAO. The Honeywell 516 was used in the NPL network, and the 516 and later the 316 were used as Interface Message Processors (IMP) for the ARPANET. It could also be configured as a Terminal IMP (TIP), which added support for up to 63 teletype machines through a multi-line controller.
The original Prime computers were designed to be compatible with the Series-16 minicomputers.
The Honeywell 316 also had industrial applications. A 316 was used at Bradwell nuclear power station in Essex as the primary reactor temperature-monitoring computer until summer 2000, when the internal 160k disk failed. Two PDP-11/70s, which had previously been secondary monitors, were moved to primary.
Hardware description
The 316 succeeded the earlier DDP-516 model and was promoted by Honeywell as suitable for industrial process control, data-acquisition systems, and as a communications concentrator and processor. The computer processor was made from small-scale integration DTL monolithic silicon integrated circuits. Most parts of the system operated at 2.5 MHz, and some elements were clocked at 5 MHz. The computer was a bitwise-parallel 2's complement system with 16-bit word length. The instruction set was a single-address type with an index register. Initially released with a capacity of 4096 through 16,384 words of memory, later expansion options allowed increasing memory space to 32,768 words. Memory cycle time was 1.6 microseconds; an integer register-to-register "add" instruction took 3.2 microseconds. An optional hardware arithmetic option was available to implement integer multiply and divide, double-precision load and store, and double-precision (31-bit) integer addition and subtraction operations. It also provided a normalization operation, assisting implementation of software floating-point operations.
The programmers' model of the H-316 consisted of the following registers:
The 16-bit A register was the primary arithmetic and logic accumulator.
The 16-bit B register was used for double-length arithmetic operations.
The 16-bit program counter holds the address of the next instruction.
A carry flag indicated arithmetic overflow.
A 16-bit X index register was also provided for modification of the address of operands.
The instruction set had 72 arithmetic, logic, I/O and flow-control instructions.
Input/output instructions used the A register and separate input and output 16-bit buses. A 10-bit I/O control bus, consisting of 6 bits of device address information and 4 bits of function selection, was used. The basic processor had a single interrupt signal line, and an option provided up to 48 interrupts.
In addition to a front-panel display of lights and toggle switches, the system supported different types of input/output devices. A Teletype Model 33 ASR teleprinter could be used as a console I/O device and (in the most basic systems) to load and store data to paper tape. Smaller systems typically used a high-speed paper-tape reader and punch for data storage. The Honeywell family of peripherals included card readers and punches, line printers, magnetic tape, and both fixed-head and removable hard disk drives.
A rack-mounted configuration weighed around and used 475 watts of power. Honeywell advertised the system as the first minicomputer selling for less than $10,000.
The Honeywell 316 has the distinction of being the first computer displayed at a computer show with semiconductor RAM memory. In 1972, a Honeywell 316 was displayed with a semiconductor RAM memory board (they used core memory previously). It was never placed into production, as DTL was too power-hungry to survive much longer. Honeywell knew that the same technology that enabled the production of RAM spelled the end of DTL computers, and wanted to show that the company was cutting edge.
System software
Honeywell provided up to 500 software packages that could run on the H-316 processor. A FORTRAN IV compiler was available, as well as an assembler, real-time disk operating systems and system utilities and libraries.
Kitchen Computer
The Honeywell Kitchen Computer, or H316 pedestal model, of 1969 was a short-lived product offered by Neiman Marcus as one of a continuing series of extravagant gift ideas. It was offered for US$10,000 (), weighed over 100 pounds (over 45 kg) and was advertised as useful for storing recipes. The imagined uses of the Honeywell Kitchen Computer also included assistance with meal planning and balancing the family checkbook – the marketing of which included highly traditional and patronizing representations of housewives. Reading or entering these recipes would have been nearly impossible for the average intended user, since the user interface required the user to complete a two-week course just to learn how to program the device, using only toggle-switch input and binary-light output. It had a built-in cutting board and had a few recipes built in. No evidence has been found that any Honeywell Kitchen Computers were ever sold.
The full text of the Neiman-Marcus Advertisement reads:
Although a fantasy gift, the Kitchen Computer represented the first time a computer was offered as a consumer product.
See also
SIMH
Honeywell 200
Honeywell 6000 series
Honeywell 800
References
External links
Honeywell Series 16
Honeywell Minicomputer Simulation
Honeywell H316 Kitchen Computer on www.old-computers.com
Honeywell 316 technical data
Honeywell computers
Minicomputers
16-bit computers |
28695319 | https://en.wikipedia.org/wiki/PlayStation%203%20Jailbreak | PlayStation 3 Jailbreak | PlayStation 3 Jailbreak was the first USB (Universal Serial Bus) chipset that allowed unauthorized execution of code, similar to homebrew, on the PlayStation 3. It works by bypassing a system security check using a memory exploit (heap overflow) which occurs with USB devices that allows the execution of unsigned code. One of the most popular pieces of homebrew software used with the device is Backup Manager, which allows users to copy game titles from the optical media to the hard drive of the PlayStation 3. Backup Manager can also be used to run homebrew applications that are created to run in the console's native mode.
Multiple devices to perform code execution exist, such as the open sourced versions (e.g. PSgroove, PSfreedom). Most of these only work on PlayStation 3 system software v3.41 or lower as PlayStation's System Software v3.42 patches the mod chip exploit on the console. The creators of PS3 Jailbreak also released PSDowngrade which enables downgrading of PlayStation 3's System Software to v3.41 (Or lower) from v3.42, v3.50, and v3.55.
Present and future support
In August, 2011, information about hardware that was downgrading PlayStations on system software v3.70 was being released. These hardware mods were NAND/NOR chip flashers that would either be soldered or clipped onto the PlayStation's chips on NAND/NOR chip located on the PlayStation's motherboard. It would then flash the memory off the chip and backup the PlayStation's firmware, downgrading the console when the hard-drive was formatted. These flashers still work on the latest system software version and can be purchased online.
In September 2011, Lulzsec Cody Kretsinger was arrested for attacking Sony pictures website that had previously been taken offline by a DDOS attack lasting over 2 months, Kretsinger had found and released level 0 security codes that could be used to run unauthorized firmware known as CFW ("Custom Firmware"). These were the same keys that would have allowed a Chinese hacking group known as "BlueDisk" to release a purchasable CFW (custom firmware) for 4.21 and above. Shortly after, a well-known PlayStation 3 developer, "Rogero," released his free of charge 4.21 CFW. There are now different developers releasing CFWs for the latest versions of PlayStation 3's firmware. These custom firmware render the PlayStation Jailbreak obsolete. They cannot, however, be installed unless the PlayStation 3 is on system software version 3.55 or below.
On June 26, 2013, the 3.60+ loader keys were released to the public by "The Great Unicorns" and on the same day hard-drive encryption for PHAT consoles were released by a developer called "flatz." Following this the Lv1ldr crypto keys were released for 4.21-4.46.
As of December, 2020, websites such as PSX-PLACE are still working on exploiting the vulnerabilities to install CFW on super slim consoles. They are able to run homebrew applications on any version of Playstation 3 by exploiting some vulnerabilities in official firmware of the console.
Inner workings
The PS3JailBreak effectively exploits the PS3 by using a heap overflow. When the dongle is plugged into a PS3 (all models-"Fat" and "Slim) its device descriptors notify the PS3 that it is a 6-port USB hub. After memory is allocated for the device the "6-port USB hub", the PS3JailBreak then tells the PS3 that a USB device has been plugged into port 1 of the hub. This device contains the payload that will run after the exploit is complete. This device has normal device descriptors for a typical USB device. After memory has been allocated for the payload USB device on port 1, the PS3JailBreak then tells the PS3 that another USB device has been plugged into port 2. This "device" does not hold any data related to the exploit and has typical device descriptors. Next, the PS3JailBreak says that another device has been plugged into port 3. This device is very important as it causes a heap exploit later in the process. The port 3 "device" contains unusually large device descriptors. After memory has been allocated for the port 3, the PS3JailBreak then tells the PS3 that the device in port 2 has been removed. This frees up the memory that was used to allocate the device descriptors. After this, another "device" is plugged into port 4 which holds 3 configuration descriptors with the third holding PowerPC shellcode (which is used to exploit the system and forces the system to run the payload in port 1). In port 5 another "device" is plugged in which emulates the "PS3 Service Jig", a device used to recover corrupted or non-functional PS3's at Sony factories. This device matches device descriptors and configuration descriptors as the real "Jig" When the PS3 tries to allocate memory to check if the "Jig" is authentic, it fails as a heap overflow occurs - the 64 bytes that has to be allocated points to the next free memory address which is actually not free as it was overwritten earlier in the process. This means that the shellcode gets sent to the CPU to be executed (this exploit passed the unsigned code check) and starts executed as soon as the PS3 detects removal of "devices" in the "USB hub". The shellcode then tells the CPU to read and execute the payload on the first port which effectively allows unsigned code to run on the system.
Legality
Sony had taken a few steps to prevent the jailbreak of the PlayStation 3, and has associated the action as a form of copyright infringement.
The cases listed below are lawsuits Sony filed in courts to prohibit the sales and imports of circumvention devices that would jailbreak the system.
PS3 Jailbreak was outlawed in Australia as it was considered to be in violation of copyright law. The ban states that PSJailbreak cannot be imported, distributed to another person or offered to the public.
Sony lost a lawsuit in December 2010 in Barcelona against the seller of PSJailbreak. The sales and imports of the product were therefore deemed legal to use within Spain, and Sony were ordered to pay damages for trying to block the sales and imports.
In January 2011, Sony had filed a lawsuit against George Hotz for leaking the encryption keys for the PlayStation 3. The case was settled in April of that year, where Hotz agreed to a permanent injunction to never circumvent a Sony product again. The Court had also approved that Sony's lawyers could obtain the IP addresses of anyone who visited Hotz's website.
See also
PlayStation 3 homebrew
Game backup device
Modchip
Privilege escalation
George Hotz
PlayStation 3 system software
References
Hardware restrictions
Jailbreak
Video game hardware |
36293904 | https://en.wikipedia.org/wiki/Teri%20McKeever | Teri McKeever | Teri McKeever (born c. 1962) is an American college and Olympic swimming coach. She has been the head coach of the California Golden Bears women's swimming team at the University of California, Berkeley for the last twenty seasons. Her Cal Bears teams have won three NCAA national championships. McKeever has twice previously served as an assistant coach for the United States Olympic women's swimming team, and she served as the head coach of the 2012 U.S. Olympic women's swim team that competed at the 2012 Summer Olympics.
Early years
McKeever was born in 1962. She was the oldest child in a family of ten children. Her father, Mike McKeever, and her father's twin brother, Marlin McKeever, both attended the University of Southern California, and were both first-team All-American linemen for the USC Trojans football team in 1959. Her father died in 1967 from head injuries received in a 1965 car accident, after twenty-two months in a coma. Her mother later remarried, had seven more children with her second husband. The family athletic influence remained strong, with all of her nine siblings participating in a variety of sports. Her sisters Kristi and Kelli were members of the U.S. national field hockey team.
College career
McKeever attended the University of Southern California (USC), where she swam for the USC Trojans women's swimming and diving team from 1980 to 1983 and joined international women's fraternity Alpha Gamma Delta in 1981. She competed in four NCAA national championship and contributed to the Trojans' four straight national top-ten finishes. She received All-America honors in 1980 and 1981, and following her 1983 senior season, she was recognized as the university's outstanding student-athlete. She graduated from USC with a bachelor's degree in education in 1983, and later earned a master's degree in athletic administration in 1987.
Coaching career
McKeever began coaching as an assistant coach at USC from 1984 to 1987. She has been the head coach of the California Golden Bears women's swimming team at the University of California, Berkeley since 1992–93. Since 1996–97 (her fifth season as head coach), her California Bears swim teams have consistently finished among the top ten Division I college teams in the nation. The Bears women have won three out of the last four Pac-12 Conference team championships (2009, 2011, 2012), and three of the last four NCAA national championships (2009, 2011, 2012). She has been named Pacific-10 Conference Coach of the Year five time, and the NCAA Coach of the Year three times.
After USC and before going to the Cal Bears, McKeever was the head coach of the Women's swimming team at Fresno State University in Fresno, California.
McKeever's Cal Bears program has produced several members of the U.S. Olympic team, including Natalie Coughlin, Haley Cope, Jessica Hardy, Caitlin Leverenz, Emily Silver, Missy Franklin, Rachel Bootsma, and Dana Vollmer. She previously served as an assistant coach for the United States Olympic women's swimming team at the 2004 Summer Olympics in Athens, Greece, and the 2008 Summer Olympics in Beijing, China.
In December 2010, she was selected as the head coach of the 2012 U.S. Olympic women's swim team that competed at the 2012 Summer Olympics in London. She is the first woman to serve as the head coach of a U.S. women's national swim team at the Olympics. She previously served as the head coach the U.S. women's national team for the 2010 Pan Pacific Swimming Championships.
Personal
McKeever married Jerry Romani in 2007, after they met at a California Golden Bears football game. They live in El Cerrito, California.
See also
California Golden Bears
List of University of Southern California people
USC Trojans
References
External links
Teri McKeever – University of California coach profile at CalBears.com
1962 births
Living people
American Olympic coaches
American swimming coaches
California Golden Bears swimming coaches
USC Trojans women's swimmers
USC Rossier School of Education alumni
USC Trojans swimming coaches
Fresno State Bulldogs swimming coaches |
356369 | https://en.wikipedia.org/wiki/List%20of%20DOS%20commands | List of DOS commands | This article presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list.
In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
Command processing
The command interpreter for DOS runs when no application programs are running. When an application exits, if the transient portion of the command interpreter in memory was overwritten, DOS will reload it from disk. Some commands are internal—built into COMMAND.COM; others are external commands stored on disk. When the user types a line of text at the operating system command prompt, COMMAND.COM will parse the line and attempt to match a command name to a built-in command or to the name of an executable program file or batch file on disk. If no match is found, an error message is printed, and the command prompt is refreshed.
External commands were too large to keep in the command processor, or were less frequently used. Such utility programs would be stored on disk and loaded just like regular application programs but were distributed with the operating system. Copies of these utility command programs had to be on an accessible disk, either on the current drive or on the command path set in the command interpreter.
In the list below, commands that can accept more than one file name, or a filename including wildcards (* and ?), are said to accept a filespec (file specification) parameter. Commands that can accept only a single file name are said to accept a filename parameter. Additionally, command line switches, or other parameter strings, can be supplied on the command line. Spaces and symbols such as a "/" or a "-" may be used to allow the command processor to parse the command line into filenames, file specifications, and other options.
The command interpreter preserves the case of whatever parameters are passed to commands, but the command names themselves and file names are case-insensitive.
Many commands are the same across many DOS systems, but some differ in command syntax or name.
DOS commands
A partial list of the most common commands for MS-DOS and IBM PC DOS follows below.
APPEND
Sets the path to be searched for data files or displays the current search path.
The APPEND command is similar to the PATH command that tells DOS where to search for program files (files with a .COM, . EXE, or .BAT file name extension).
The command is available in MS-DOS versions 3.2 and later.
ASSIGN
The command redirects requests for disk operations on one drive to a different drive. It can also display drive assignments or reset all drive letters to their original assignments.
The command is available in MS-DOS versions 3 through 5 and IBM PC DOS releases 2 through 5.
ATTRIB
Attrib changes or views the attributes of one or more files. It defaults to display the attributes of all files in the current directory. The file attributes available include read-only, archive, system, and hidden attributes. The command has the capability to process whole folders and subfolders of files and also process all files.
The command is available in MS-DOS versions 3 and later.
BACKUP and RESTORE
These are commands to backup and restore files from an external disk. These appeared in version 2, and continued to PC DOS 5 and MS-DOS 6 (PC DOS 7 had a deversioned check). In DOS 6, these were replaced by commercial programs (CPBACKUP, MSBACKUP), which allowed files to be restored to different locations.
BASIC and BASICA
An implementation of the BASIC programming language for PCs. Implementing BASIC in this way was very common in operating systems on 8- and 16-bit machines made in the 1980s.
IBM computers had BASIC 1.1 in ROM, and IBM's versions of BASIC used code in this ROM-BASIC, which allowed for extra memory in the code area. BASICA last appeared in IBM PC DOS 5.02, and in OS/2 (2.0 and later), the version had ROM-BASIC moved into the program code.
Microsoft released GW-BASIC for machines with no ROM-BASIC. Some OEM releases had basic.com and basica.com as loaders for GW-BASIC.EXE.
BASIC was dropped after MS-DOS 4, and PC DOS 5.02. OS/2 (which uses PC DOS 5), has it, while MS-DOS 5 does not.
BREAK
This command is used to instruct DOS to check whether the and keys have been pressed before carrying out a program request.
The command is available in MS-DOS versions 2 and later.
CALL
Starts a batch file from within another batch file and returns when that one ends.
The command is available in MS-DOS versions 3.3 and later.
CD and CHDIR
The CHDIR (or the alternative name CD) command either displays or changes the current working directory.
The command is available in MS-DOS versions 2 and later.
CHCP
The command either displays or changes the active code page used to display character glyphs in a console window. Similar functionality can be achieved with MODE CON: CP SELECT=.
The command is available in MS-DOS versions 3.3 and later.
CHKDSK
CHKDSK verifies a storage volume (for example, a hard disk, disk partition or floppy disk) for file system integrity. The command has the ability to fix errors on a volume and recover information from defective disk sectors of a volume.
The command is available in MS-DOS versions 1 and later.
CHOICE
The CHOICE command is used in batch files to prompt the user to select one item from a set of single-character choices. Choice was introduced as an external command with MS-DOS 6.0; Novell DOS 7 and PC DOS 7.0. Earlier versions of DR-DOS supported this function with the built-in switch command (for numeric choices) or by beginning a command with a question mark. This command was formerly called ync (yes-no-cancel).
CLS
The CLS or CLRSCR command clears the terminal screen.
The command is available in MS-DOS versions 2 and later.
COMMAND
Start a new instance of the command interpreter.
The command is available in MS-DOS versions 1 and later.
COMP
Show differences between any two files, or any two sets of files.
The command is available in MS-DOS versions 3.3 through 5 and IBM PC DOS releases 1 through 5.
COPY
Makes copies of existing files.
The command is available in MS-DOS versions 1 and later.
CTTY
Defines the terminal device (for example, COM1) to use for input and output.
The command is available in MS-DOS versions 2 and later.
DATE
Displays the system date and prompts the user to enter a new date. Complements the TIME command.
The command is available in MS-DOS versions 1 and later.
DBLBOOT
(Not a command: This is a batch file added to DOS 6.X Supplemental Disks to help create DoubleSpace boot floppies.)
DBLSPACE
A disk compression utility supplied with MS-DOS version 6.0 (released in 1993) and version 6.2.
DEBUG
A very primitive assembler and disassembler.
DEFRAG
The command has the ability to analyze the file fragmentation on a disk drive or to defragment a drive. This command is called DEFRAG in MS-DOS/PC DOS and diskopt in DR-DOS.
The command is available in MS-DOS versions 6 and later.
DEL and ERASE
DEL (or the alternative form ERASE) is used to delete one or more files.
The command is available in MS-DOS versions 1 and later.
DELTREE
Deletes a directory along with all of the files and subdirectories that it contains. Normally, it will ask for confirmation of the potentially dangerous action. Since the RD (RMDIR) command can not delete a directory if the directory is not empty (except in Windows NT & 10), the DELTREE command can be used to delete the whole directory.
The deltree command is included in certain versions of Microsoft Windows and MS-DOS operating systems. It is specifically available only in versions of MS-DOS 6.0 and higher, and in Microsoft Windows 9x. In Windows NT, the functionality provided exists but is handled by the command or which has slightly different syntax. This command is not present in Windows 7 and 8. In Windows 10, the command switch is or .
DIR
The DIR command displays the contents of a directory. The contents comprise the disk's volume label and serial number; one directory or filename per line, including the filename extension, the file size in bytes, and the date and time the file was last modified; and the total number of files listed, their cumulative size, and the free space (in bytes) remaining on the disk. The command is one of the few commands that exist from the first versions of DOS. The command can display files in subdirectories. The resulting directory listing can be sorted by various criteria and filenames can be displayed in a chosen format.
DISKCOMP
A command for comparing the complete contents of a floppy disk to another one.
The command is available in MS-DOS versions 3.2 and later and IBM PC DOS releases 1 and later.
DISKCOPY
A command for copying the complete contents of a diskette to another diskette.
The command is available in MS-DOS versions 2 and later.
DOSKEY
A command that adds command history, macro functionality, and improved editing features to the command-line interpreter.
The command is available in MS-DOS versions 5 and later.
DOSSIZE
Displays how much memory various DOS components occupy.
DRVSPACE
A disk compression utility supplied with MS-DOS version 6.22.
ECHO
The ECHO command prints its own arguments back out to the DOS equivalent of the standard output stream. (Hence the name, ECHO) Usually, this means directly to the screen, but the output of echo can be redirected, like any other command, to files or devices. Often used in batch files to print text out to the user.
Another important use of the echo command is to toggle echoing of commands on and off in batch files. Traditionally batch files begin with the @echo off statement. This says to the interpreter that echoing of commands should be off during the whole execution of the batch file, thus resulting in a "tidier" output (the @ symbol declares that this particular command (echo off) should also be executed without echo.)
The command is available in MS-DOS versions 2 and later.
EDIT
EDIT is a full-screen text editor, included with MS-DOS versions 5 and 6, OS/2 and Windows NT to 4.0 The corresponding program in Windows 95 and later, and Windows 2000 and later is Edit v2.0. PC DOS 6 and later use the DOS E Editor and DR-DOS used editor up to version 7.
EDLIN
DOS line-editor. It can be used with a script file, like debug, this makes it of some use even today. The absence of a console editor in MS-DOS/PC DOS 1–4 created an after-market for third-party editors.
In DOS 5, an extra command "?" was added to give the user much-needed help.
DOS 6 was the last version to contain EDLIN; for MS-DOS 6, it's on the supplemental disks, while PC DOS 6 had it in the base install. Windows NT 32-bit, and OS/2 have Edlin.
EMM386
The EMM386 command enables or disables EMM386 expanded-memory support on a computer with an 80386 or higher processor.
The command is available in MS-DOS versions 5 and later.
ERASE
See: DEL and ERASE
EXE2BIN
Converts an executable (.exe) file into a binary file with the extension .com, which is a memory image of the program.
The size of the resident code and data sections combined in the input .exe file must be less than 64 KB. The file must also have no stack segment.
The command is available in MS-DOS versions 1 through 5. It is available separately for version 6 on the Supplemental Disk.
EXIT
Exits the current command processor. If the exit is used at the primary command, it has no effect unless in a DOS window under Microsoft Windows, in which case the window is closed and the user returns to the desktop.
The command is available in MS-DOS versions 2 and later.
EXPAND
The Microsoft File Expansion Utility is used to uncompress one or more compressed cabinet files (.CAB). The command dates back to 1990 and was supplied on floppy disc for MS-DOS versions 5 and later.
FAKEMOUS
FAKEMOUS is an IBM PS/2 mouse utility used with AccessDOS. It is included on the MS-DOS 6 Supplemental Disk.
AccessDOS assists persons with disabilities.
FASTHELP
Provides information for MS-DOS commands.
FASTOPEN
A command that provides accelerated access to frequently-used files and directories.
The command is available in MS-DOS versions 3.3 and later.
FC
Show differences between any two files, or any two sets of files.
The command is available in MS-DOS versions 2 and later – primarily non-IBM releases.
FDISK
The FDISK command manipulates hard disk partition tables. The name derives from IBM's habit of calling hard drives fixed disks. FDISK has the ability to display information about, create, and delete DOS partitions or logical DOS drive. It can also install a standard master boot record on the hard drive.
The command is available in MS-DOS versions 3.2 and later and IBM PC DOS 2.0 releases and later.
FIND
The FIND command is a filter to find lines in the input data stream that contain or don't contain a specified string and send these to the output data stream. It may also be used as a pipe.
The command is available in MS-DOS versions 2 and later.
FINDSTR
The FINDSTR command is a GREP-oriented FIND-like utility. Among its uses is the logical-OR lacking in FIND.
would find all TXT files with one or more of the above-listed words YES, NO, MAYBE.
FOR
Iteration: repeats a command for each out of a specified set of files.
The FOR loop can be used to parse a file or the output of a command.
The command is available in MS-DOS versions 2 and later.
FORMAT
Deletes the FAT entries and the root directory of the drive/partition, and reformats it for MS-DOS. In most cases, this should only be used on floppy drives or other removable media. This command can potentially erase everything on a computer's drive.
The command is available in MS-DOS versions 1 and later.
GOTO
The Goto command transfers execution to a specified label. Labels are specified at the beginning of a line, with a colon ().
The command is available in MS-DOS versions 2 and later.
Used in Batch files.
GRAFTABL
The GRAFTABL command enables the display of an extended character set in graphics mode.
The command is available in MS-DOS versions 3 through 5.
GRAPHICS
A TSR program to enable the sending of graphical screen dump to printer by pressing <Print Screen>.
The command is available in MS-DOS versions 3.2 and later and IBM PC DOS releases 2 and later.
HELP
Gives help about DOS commands.
The command is available in MS-DOS versions 5 thru Windows XP. Full-screen command help is available in MS-DOS versions 6 and later. Beginning with Windows XP, the command processor "DOS" offers builtin-help for commands by using (e.g. )
IF
IF is a conditional statement, that allows branching of the program execution. It evaluates the specified condition, and only if it is true, then it executes the remainder of the command line. Otherwise, it skips the remainder of the line and continues with next command line.
Used in Batch files.
The command is available in MS-DOS versions 2 and later.
INTERSVR and INTERLNK
In MS-DOS; filelink in DR-DOS.
Network PCs using a null modem cable or LapLink cable. The server-side version of InterLnk, it also immobilizes the machine it's running on as it is an active app (As opposed to a TSR app) which must be running for any transfer to take place. DR-DOS' filelink is executed on both the client and server.
New in PC DOS 5.02, MS-DOS 6.0.
JOIN
The JOIN command attaches a drive letter to a specified directory on another drive. The opposite can be achieved via the SUBST command.
The command is available in MS-DOS versions 3 through 5. It is available separately for versions 6.2 and later on the Supplemental Disk.
KEYB
The KEYB command is used to select a keyboard layout.
The command is available in MS-DOS versions 3.3 and later.
From DOS 3.0 through 3.21, there are instead per-country commands, namely KEYBFR, KEYBGR, KEYBIT, KEYBSP and KEYBUK.
LABEL
Changes the label on a logical drive, such as a hard disk partition or a floppy disk.
The command is available in MS-DOS versions 3.1 and later and IBM PC DOS releases 3 and later.
LINK4
Microsoft 8086 Object Linker
LOADFIX
Loads a program above the first 64K of memory, and runs the program. The command is available in MS-DOS versions 5 and later. It is included only in MS-DOS/PC DOS. DR-DOS used memmax, which opened or closed lower, upper, and video memory access, to block the lower 64K of memory.
LOADHIGH and LH
A command that loads a program into the upper memory area.
The command is available in MS-DOS versions 5 and later.
It is called hiload in DR-DOS.
MD or MKDIR
Makes a new directory. The parent of the directory specified will be created if it does not already exist.
The command is available in MS-DOS versions 2 and later.
MEM
Displays memory usage. It is capable of displaying program size and status, memory in use, and internal drivers. It is an external command.
The command is available in MS-DOS versions 4 and later.
MEMMAKER
Starting with version 6, MS-DOS included the external program MemMaker which was used to free system memory (especially Conventional memory) by automatically reconfiguring the AUTOEXEC.BAT and CONFIG.SYS files. This was usually done by moving TSR programs and device drivers to the upper memory. The whole process required two system restarts. Before the first restart the user was asked whether to enable EMS Memory, since use of expanded memory required a reserved 64KiB region in upper memory. The first restart inserted the SIZER.EXE program which gauged the memory needed by each TSR or Driver. MemMaker would then calculate the optimal Driver and TSR placement in upper memory and modify the AUTOEXEC.BAT and CONFIG.SYS accordingly, and reboot the second time.
MEMMAKER.EXE and SIZER.EXE were developed for Microsoft by Helix Software Company and were eliminated starting in MS-DOS 7 (Windows 95); however, they could be obtained from Microsoft's FTP server as part of the OLDDOS.EXE package, alongside other tools.
PC DOS uses another program called RamBoost to optimize memory, working either with PC DOS's HIMEM/EMM386 or a third-party memory manager. RamBoost was licensed to IBM by Central Point Software.
MIRROR
The MIRROR command saves disk storage information that can be used to recover accidentally erased files.
The command is available in MS-DOS version 5. It is available separately for versions 6.2 and later on Supplemental Disk.
MODE
Configures system devices. Changes graphics modes, adjusts keyboard settings, prepares code pages, and sets up port redirection.
The command is available in MS-DOS versions 3.2 and later and IBM PC DOS releases 1 and later.
MORE
The MORE command paginates text, so that one can view files containing more than one screen of text. More may also be used as a filter. While viewing MORE text, the return key displays the next line, the space bar displays the next page.
The command is available in MS-DOS versions 2 and later.
MOVE
Moves files or renames directories.
The command is available in MS-DOS versions 6 and later.
DR-DOS used a separate command for renaming directories, rendir.
MSAV
A command that scans the computer for known viruses.
The command is available in MS-DOS versions 6 and later.
MSBACKUP
The MSBACKUP command is used to backup or restore one or more files from one disk to another.
The New York Times said that MSBACKUP "is much better and faster than the old BACKUP command used in earlier versions of DOS, but it does lack some of the advanced features found in backup software packages that are sold separately. There is another offering, named MWBACKUP, that is GUI-oriented. It was introduced for Windows for Workgroups (3.11).
The MSBACKUP command is available in MS-DOS versions 6 and later.
MSCDEX
MSCDEX is a driver executable which allows DOS programs to recognize, read, and control CD-ROMs.
The command is available in MS-DOS versions 6 and later.
MSD
The MSD command provides detailed technical information about the computer's hardware and software. MSD was new in MS-DOS 6; the PC DOS version of this command is QCONFIG. The command appeared first in Word2, and then in Windows 3.10.
MSHERC
The MSHERC.COM (also QBHERC.COM) was a TSR (Terminate and Stay Resident) graphics driver supplied with Microsoft QuickC, QuickBASIC, and the C Compiler, to allow use of the Hercules adapter high-resolution graphics capability (720 x 348, 2 colors).
NLSFUNC
Loads extended Nationalization and Localization Support from COUNTRY.SYS, and changed the codepage of drivers and system modules resident in RAM.
In later versions of DR-DOS 6, NLSFUNC relocated itself into the HiMem area, thereby freeing a portion of the nearly invaluable lower 640KiB that constituted the ”conventional” memory available to software.
The command is available in MS-DOS versions 3.3 and later.
PATH
Displays or sets a search path for executable files.
The command is available in MS-DOS versions 2 and later.
PAUSE
Suspends processing of a batch program and displays the message , if not given other text to display.
The command is available in MS-DOS versions 1 and later.
PING
Allows the user to test the availability of a network connection to a specified host. Hostnames are usually resolved to IP addresses.
It is not included in many DOS versions; typically ones with network stacks will have it as a diagnostic tool.
POWER
The POWER command is used to turn power management on and off, report the status of power management, and set levels of power conservation. It is an external command implemented as POWER.EXE.
The command is available in MS-DOS versions 6 and later.
PRINT
The PRINT command adds or removes files in the print queue. This command was introduced in MS-DOS version 2. Before that there was no built-in support for background printing files. The user would usually use the copy command to copy files to LPT1.
PRINTFIX
PROMPT
The command allows the user to change the prompt in the command screen. The default prompt is (i.e. ), which displays the drive and current path as the prompt, but can be changed to anything. , displays the current system date as the prompt. Type in the cmd screen for help on this function.
The command is available in MS-DOS versions 2 and later and IBM PC DOS releases 2.1 and later.
PS
A utility inspired by the UNIX/XENIX ps command. It also provides a full-screen mode, similar to the top utility on UNIX systems.
QBASIC
An integrated development environment and BASIC interpreter.
The command is available in MS-DOS versions 5 and later.
RD or RMDIR
Remove a directory (delete a directory); by default the directories must be empty of files for the command to succeed.
The command is available in MS-DOS versions 2 and later.
The deltree command in some versions of MS-DOS and all versions of Windows 9x removes non-empty directories.
RECOVER
A primitive filesystem error recovery utility included in MS-DOS / IBM PC DOS.
The command is available in MS-DOS versions 2 through 5.
REM
Remark (comment) command, normally used within a batch file, and for DR-DOS, PC/MS-DOS 6 and above, in CONFIG.SYS. This command is processed by the command processor. Thus, its output can be redirected to create a zero-byte file. REM is useful in logged sessions or screen-captures. One might add comments by way of labels, usually starting with double-colon (::). These are not processed by the command processor.
REN
The REN command renames a file. Unlike the move command, this command cannot be used to rename subdirectories, or rename files across drives. Mass renames can be accomplished by the use of the wildcards characters asterisk (*) and question mark (?).
The command is available in MS-DOS versions 1 and later.
REPLACE
A command that is used to replace one or more existing computer files or add new files to a target directory.
The command is available in MS-DOS versions 3.2 and later.
RESTORE
See: BACKUP and RESTORE
SCANDISK
Disk diagnostic utility. Scandisk was a replacement for the chkdsk utility, starting with MS-DOS version 6.2 and later. Its primary advantages over chkdsk is that it is more reliable and has the ability to run a surface scan which finds and marks bad clusters on the disk. It also provided mouse point-and-click TUI, allowing for interactive session to complement command-line batch run.
chkdsk had surface scan and bad cluster detection functionality included, and was used again on Windows NT-based operating systems.
SELECT
The SELECT command formats a disk and installs country-specific information and keyboard codes.
It was initially only available with IBM PC DOS. The version included with PC DOS 3.0 and 3.1 is hard-coded to transfer the operating system from A: to B:, while from PC DOS 3.2 onward you can specify the source and destination, and can be used to install DOS to the harddisk.
The version included with MS-DOS 4 and PC-DOS 4 is no longer a simple command-line utility, but a full-fledged installer.
The command is available in MS-DOS versions 3.3 and 4 and IBM PC DOS releases 3 through 4.
This command is no longer included in DOS Version 5 and later, where it has been replaced by SETUP.
SET
Sets environment variables.
The command is available in MS-DOS versions 2 and later.
cmd.exe in Windows NT 2000, 4DOS, 4OS2, 4NT, and a number of third-party solutions allow direct entry of environment variables from the command prompt. From at least Windows 2000, the set command allows for the evaluation of strings into variables, thus providing inter alia a means of performing integer arithmetic.
SETUP
The command is available in MS-DOS versions 5 and later.
This command does a computer setup. With all computers running DOS versions 5 and
later, it runs the computer setup, such as Windows 95 setup and Windows 98 setup.
SETVER
SetVer is a TSR program designed to return a different value to the version of DOS that is running. This allows programs that look for a specific version of DOS to run under a different DOS.
The command is available in MS-DOS versions 5 and later.
SHARE
Installs support for file sharing and locking capabilities.
The command is available in MS-DOS versions 3 and later.
SHIFT
The SHIFT command increases number of replaceable parameters to more than the standard ten for use in batch files.
This is done by changing the position of replaceable parameters. It replaces each of the replacement parameters with the subsequent one (e.g. with , with , etc.).
The command is available in MS-DOS versions 2 and later.
SIZER
The external command SIZER.EXE is not intended to be started directly from the command prompt. Is used by MemMaker during the memory-optimization process.
SMARTDRV
The command is available in MS-DOS versions 6 and later.
SORT
A filter to sort lines in the input data stream and send them to the output data stream. Similar to the Unix command sort. Handles files up to 64k. This sort is always case insensitive.
The command is available in MS-DOS versions 2 and later.
SUBST
A utility to map a subdirectory to a drive letter. The opposite can be achieved via the JOIN command.
The command is available in MS-DOS versions 3.1 and later.
SYS
A utility to make a volume bootable. Sys rewrites the Volume Boot Code (the first sector of the partition that SYS is acting on) so that the code, when executed, will look for IO.SYS. SYS also copies the core DOS system files, IO.SYS, MSDOS.SYS, and COMMAND.COM, to the volume. SYS does not rewrite the Master Boot Record, contrary to widely held belief.
The command is available in MS-DOS versions 1 and later.
TELNET
The Telnet Client is a tool for developers and administrators to help manage and test network connectivity.
TIME
Display the system time and waits for the user to enter a new time. Complements the DATE command.
The command is available in MS-DOS versions 1 and later.
TITLE
Enables a user to change the title of their MS-DOS window.
TREE
It is an external command, graphically displays the path of each directory and sub-directories on the specified drive.
The command is available in MS-DOS versions 3.2 and later and IBM PC DOS releases 2 and later.
TRUENAME
Internal command that expands the name of a file, directory, or drive, and display its absolute pathname as the result. It will expand relative pathnames, SUBST drives, and JOIN directories, to find the actual directory.
For example, in DOS 7.1, if the current directory is C:\WINDOWS\SYSTEM, then
The argument does not need to refer to an existing file or directory: TRUENAME will output the absolute pathname as if it did. Also TRUENAME does not search in the PATH.
For example, in DOS 5, if the current directory is C:\TEMP, then TRUENAME command.com will display C:\TEMP\COMMAND.COM (which does not exist), not C:\DOS\COMMAND.COM (which does and is in the PATH).
This command displays the UNC pathnames of mapped network or local CD drives. This command is an undocumented DOS command. The help switch "/?" defines it as a "Reserved command name". It is available in MS-DOS version 5.00 and later, including the DOS 7 and 8 in Windows 95/98/ME. The C library function realpath performs this function. The Microsoft Windows NT command processors do not support this command, including the versions of command.com for NT.
TYPE
Displays a file. The more command is frequently used in conjunction with this command, e.g. type long-text-file | more. TYPE can be used to concatenate files (); however this won't work for large files—use copy command instead.
The command is available in MS-DOS versions 1 and later.
UNDELETE
Restores file previously deleted with del. By default all recoverable files in the working directory are restored; options are used to change this behavior. If the MS-DOS mirror TSR program is used, then deletion tracking files are created and can be used by undelete.
The command is available in MS-DOS versions 5 and later.
UNFORMAT
The UNFORMAT command is used to undo the effects of formatting a disk.
The command is available in MS-DOS versions 5 and later.
VER
An internal DOS command, that reports the DOS version presently running, and since MS-DOS 5, whether DOS is loaded high.
The command is available in MS-DOS versions 2 and later.
VERIFY
Enables or disables the feature to determine if files have been correctly written to disk. If no parameter is provided, the command will display the current setting.
The command is available in MS-DOS versions 2 and later.
VOL
An internal command that displays the disk volume label and serial number.
The command is available in MS-DOS versions 2 and later.
VSAFE
A TSR program that continuously monitors the computer for viruses.
The command is available in MS-DOS versions 6 and later.
XCOPY
Copy entire directory trees. Xcopy is a version of the copy command that can move files and directories from one location to another.
XCOPY usage and attributes can be obtained by typing in the DOS Command line.
The command is available in MS-DOS versions 3.2 and later.
See also
:Category:Windows commands
Command-line interface
List of CONFIG.SYS directives
Timeline of DOS operating systems
References
Further reading
External links
Command-Line Reference : Microsoft TechNet Database "Command-Line Reference"
The MS-DOS 6 Technical Reference on TechNet contains the official Microsoft MS-DOS 6 command reference documention.
DR-DOS 7.03 online manual
MDGx MS-DOS Undocumented + Hidden Secrets
There are several guides to DOS commands available that are licensed under the GNU Free Documentation License:
The FreeDOS Spec at SourceForge is a plaintext specification, written in 1999, for how DOS commands should work in FreeDOS
MS-DOS commands
Reference for windows commands with examples
A Collection of Undocumented and Obscure Features in Various MS-DOS Versions
DOS commands
DOS commands |
32114140 | https://en.wikipedia.org/wiki/List%20of%20moths%20of%20Senegal | List of moths of Senegal | Moths of Senegal represent about 190 known moth species. The moths (mostly nocturnal) and butterflies (mostly diurnal) together make up the taxonomic order Lepidoptera.
This is a list of moth species which have been recorded in Senegal.
Arctiidae
Acantharctia lacteata Rothschild, 1933
Acantharctia nivea Aurivillius, 1900
Afrowatsonius marginalis (Walker, 1855)
Aloa moloneyi (Druce, 1887)
Alpenus affiniola (Strand, 1919)
Alpenus maculosa (Stoll, 1781)
Amata lateralis (Boisduval, 1836)
Amerila fennia (Druce, 1887)
Amerila pannosa (Grünberg, 1908)
Amerila puella (Fabricius, 1793)
Amerila vitrea Plötz, 1880
Apisa subcanescens Rothschild, 1910
Automolis subulva (Mabille, 1884)
Epilacydes scita (Walker, 1865)
Estigmene flaviceps Hampson, 1907
Estigmene laglaizei Rothschild, 1910
Estigmene senegalensis Rothschild, 1933
Estigmene testaceoflava Rothschild, 1933
Estigmene unilinea Rothschild, 1910
Euchromia folletii (Guérin-Méneville, 1832)
Euchromia lethe (Fabricius, 1775)
Logunovium nigricosta (Holland, 1893)
Micralarctia punctulatum (Wallengren, 1860)
Spilosoma castelli Rothschild, 1933
Spilosoma occidens (Rothschild, 1910)
Spilosoma quadrilunata (Hampson, 1901)
Spilosoma rava (Druce, 1898)
Teracotona rhodophaea (Walker, 1865)
Teracotona senegalensis Rothschild, 1933
Thyretes negus Oberthür, 1878
Trichaeta parva Aurivillius, 1910
Utetheisa pulchella (Linnaeus, 1758)
Cosmopterigidae
Anatrachyntis risbeci (Ghesquière, 1940)
Cosmopterix luteoapicalis Sinev, 2002
Cossidae
Azygophleps psyche Le Cerf, 1919
Eremocossus senegalensis Le Cerf, 1919
Crambidae
Euclasta varii Popescu-Gorj & Constantinescu, 1973
Nomophila noctuella ([Denis & Schiffermüller], 1775)
Pleuroptya balteata (Fabricius, 1798)
Synclera traducalis (Zeller, 1852)
Drepanidae
Negera natalensis (Felder, 1874)
Geometridae
Erastria albosignata (Walker, 1863)
Euproutia aggravaria (Guenée, 1858)
Idaea prionodonta (Prout, 1932)
Isturgia inaequivirgaria (Mabille, 1890)
Neromia propinquilinea Prout, 1920
Orbamia octomaculata (Wallengren, 1872)
Orbamia renimacula (Prout, 1926)
Scopula paradelpharia Prout, 1920
Thalassodes albifimbria Warren, 1897
Zamarada acrochra Prout, 1928
Zamarada anacantha D. S. Fletcher, 1974
Zamarada bicuspida D. S. Fletcher, 1974
Zamarada crystallophana Mabille, 1900
Zamarada dilucida Warren, 1909
Zamarada emaciata D. S. Fletcher, 1974
Zamarada euerces Prout, 1928
Zamarada nasuta Warren, 1897
Zygophyxia relictata (Walker, 1866)
Gracillariidae
Stomphastis thraustica (Meyrick, 1908)
Lasiocampidae
Beralade bistrigata Strand, 1909
Chrysopsyche imparilis Aurivillius, 1905
Euphorea ondulosa (Conte, 1909)
Lasiocampa bilineata (Mabille, 1884)
Leipoxais proboscidea (Guérin-Méneville, 1832)
Mimopacha rotundata Hering, 1941
Pallastica meloui (Riel, 1909)
Streblote bakeri (Riel, 1911)
Theophasida cardinalli (Tams, 1926)
Lecithoceridae
Torodora hybrista (Meyrick, 1922)
Limacodidae
Latoia colini Mabille, 1881
Latoia privativa Hering, 1928
Lymantriidae
Aroa achrodisca Hampson, 1910
Dasychira colini (Mabille, 1893)
Metarbelidae
Kroonia carteri Lehmann, 2010
Lebedodes wichgrafi (Grünberg, 1910)
Salagena discata Gaede, 1929
Salagena inversa Gaede, 1929
Salagena nigropuncta Le Cerf, 1919
Noctuidae
Acantholipes aurea Berio, 1966
Acantholipes semiaurea Berio, 1966
Achaea catella Guenée, 1852
Acontia basifera Walker, 1857
Acontia buchanani (Rothschild, 1921)
Acontia citrelinea Bethune-Baker, 1911
Acontia fastrei Hacker, Legrain & Fibiger, 2010
Acontia hampsoni Hacker, Legrain & Fibiger, 2008
Acontia imitatrix Wallengren, 1856
Acontia insocia (Walker, 1857)
Acontia porphyrea (Butler, 1898)
Acontia stassarti Hacker, Legrain & Fibiger, 2010
Acontia transfigurata Wallengren, 1856
Acontia wahlbergi Wallengren, 1856
Aegocera rectilinea Boisduval, 1836
Agoma trimenii (Felder, 1874)
Amazonides tabida (Guenée, 1852)
Aspidifrontia hemileuca (Hampson, 1909)
Aspidifrontia senegalensis Berio, 1966
Aspidifrontia villiersi (Laporte, 1972)
Audea paulumnodosa Kühne, 2005
Brevipecten calimanii (Berio, 1939)
Calliodes appollina Guenée, 1852
Cerocala albicornis Berio, 1966
Chasmina tibialis (Fabricius, 1775)
Chasmina vestae (Guenée, 1852)
Clytie tropicalis Rungs, 1975
Crypsotidia maculifera (Staudinger, 1898)
Crypsotidia mesosema Hampson, 1913
Crypsotidia remanei Wiltshire, 1977
Ctenusa pallida (Hampson, 1902)
Dysmilichia flavonigra (Swinhoe, 1884)
Euclidia limbosa Guenée, 1852
Gesonia nigripalpa Wiltshire, 1977
Gnamptonyx innexa (Walker, 1858)
Helicoverpa assulta (Guenée, 1852)
Hypena obacerralis Walker, [1859]
Hypotacha isthmigera Wiltshire, 1968
Iambia jansei Berio, 1966
Masalia albiseriata (Druce, 1903)
Masalia bimaculata (Moore, 1888)
Masalia cheesmanae Seymour, 1972
Masalia decorata (Moore, 1881)
Masalia flaviceps (Hampson, 1903)
Masalia galatheae (Wallengren, 1856)
Masalia nubila (Hampson, 1903)
Masalia rubristria (Hampson, 1903)
Masalia terracottoides (Rothschild, 1921)
Matopo selecta (Walker, 1865)
Melanephia nigrescens (Wallengren, 1856)
Misa memnonia Karsch, 1895
Mitrophrys magna (Walker, 1854)
Mitrophrys menete (Cramer, 1775)
Mocis mayeri (Boisduval, 1833)
Mythimna languida (Walker, 1858)
Ophiusa mejanesi (Guenée, 1852)
Ozarba corniculantis Berio, 1947
Ozarba leptocyma Hampson, 1914
Ozarba rubrivena Hampson, 1910
Pandesma muricolor Berio, 1966
Pericyma mendax (Walker, 1858)
Phaegorista agaristoides Boisduval, 1836
Phaegorista leucomelas (Herrich-Schäffer, 1855)
Plecopterodes moderata (Wallengren, 1860)
Polydesma umbricola Boisduval, 1833
Rhabdophera clathrum (Guenée, 1852)
Rhabdophera hansali (Felder & Rogenhofer, 1874)
Rhynchina leucodonta Hampson, 1910
Saalmuellerana media (Walker, 1857)
Schausia gladiatoria (Holland, 1893)
Spodoptera exempta (Walker, 1857)
Thiacidas kanoensis Hacker & Zilli, 2007
Thiacidas meii Hacker & Zilli, 2007
Thiacidas mukim (Berio, 1977)
Thiacidas stassarti Hacker & Zilli, 2007
Thiacidas submutata Hacker & Zilli, 2007
Thyas parallelipipeda (Guenée, 1852)
Timora senegalensis (Guenée, 1852)
Nolidae
Blenina chloromelana (Mabille, 1890)
Notodontidae
Anaphe stellata Guérin-Méneville, 1844
Epanaphe vuilleti (de Joannis, 1907)
Psychidae
Eumeta rotunda Bourgogne, 1965
Melasina murifica Meyrick, 1922
Pyralidae
Pempelia morosalis (Saalmüller, 1880)
Saturniidae
Bunaeopsis hersilia (Westwood, 1849)
Epiphora bauhiniae (Guérin-Méneville, 1832)
Gonimbrasia occidentalis Rothschild, 1907
Holocerina angulata (Aurivillius, 1893)
Imbrasia senegalensis (Olivier, 1792)
Micragone nenia (Westwood, 1849)
Micragone nenioides Rougeot, 1979
Pseudimbrasia deyrollei (J. Thomson, 1858)
Pseudobunaea irius (Fabricius, 1793)
Sesiidae
Metasphecia vuilleti Le Cerf, 1917
Sphingidae
Leucophlebia afra Karsch, 1891
Neopolyptychus spurrelli (Rothschild & Jordan, 1912)
Nephele accentifera (Palisot de Beauvois, 1821)
Nephele peneus (Cramer, 1776)
Platysphinx phyllis Rothschild & Jordan, 1903
Pseudoclanis boisduvali (Aurivillius, 1898)
Pseudoclanis molitor (Rothschild & Jordan, 1912)
Pseudoclanis rhadamistus (Fabricius, 1781)
Rufoclanis rosea (Druce, 1882)
Theretra perkeo Rothschild & Jordan, 1903
Thyrididae
Amalthocera tiphys Boisduval, 1836
Tineidae
Agnathosia byrsinopa (Meyrick, 1933)
Ceratophaga tragoptila (Meyrick, 1917)
Endromarmata lutipalpis (Meyrick, 1922)
Hapsifera luteata Gozmány, 1965
Hapsifera niphoxantha Gozmány, 1965
Syncalipsis optania (Meyrick, 1908)
Tortricidae
Eccopsis wahlbergiana Zeller, 1852
References
External links
African Moths
Senegal
Moths
Senegal |
25220329 | https://en.wikipedia.org/wiki/Nicol%C3%B2%20Cesa-Bianchi | Nicolò Cesa-Bianchi | Nicolò Cesa-Bianchi () is a computer scientist and Professor of Computer Science at the Department of Computer Science of the University of Milan.
He is a researcher in the field of machine learning, and co-author of the books "Prediction, Learning, and Games" with Gabor Lugosi and "Regret analysis of stochastic and nonstochastic multi-armed bandit problems"
Research
His research contributions focus on the following areas:
design and analysis of machine learning algorithms, especially in online machine learning
algorithms for multi-armed bandit problems, with applications to recommender systems and online auctions
graph analytics, with applications to social networks and bioinformatics
Education
1988: MS in Computer Science, University of Milan.
1993: Ph.D. in Computer Science, University of Milan.
References
Living people
1963 births
Italian computer scientists |
17004764 | https://en.wikipedia.org/wiki/Monoculture%20%28computer%20science%29 | Monoculture (computer science) | In computer science, a monoculture is a community of computers that all run identical software. All the computer systems in the community thus have the same vulnerabilities, and, like agricultural monocultures, are subject to catastrophic failure in the event of a successful attack.
Overview
With the global trend of increased usage and reliance on computerized systems, some vendors supply solutions that are used throughout the industry (such as Microsoft Windows) - this forms algorithmic monocultures. Monocultures form naturally since they utilize economies of scale, it is cheaper to manufacture and distribute a single solution. Furthermore, by being used by a large community bugs are discovered relativity fast.
Like agricultural monocultures, algorithmic monocultures are not diverse, thus susceptible to correlated failures - a failure of many parts participating in the monoculture. In complete non-monocultures, where the outcome of all components are mutually independent thus un-correlated, the chance of catastrophic event (failure of all the parts in the monoculture) is the multiplication of each component failure probability (exponentially decreasing).
On the other end, perfect monocultures are completely correlated, thus have a single point of failure. This means that the chance of a catastrophic event is constant - the failure probably of the single component.
Examples
Since operating systems are used in almost every workstation they form monocultures. For example Dan Geer has argued that Microsoft is a monoculture, since a majority of the overall number of workstations connected to the Internet are running versions of the Microsoft Windows operating system, many of which are vulnerable to the same attacks.
Large monocultures can also arise from software libraries, for example the Log4Shell exploit in the popular Log4j library estimated to affect hundreds of millions of devices.
Internet applications have also been shown to suffer from software monoculture.
Individual level concerns
The concept is significant when discussing computer security and viruses, the main threat is exposure to security vulnerabilities. Since monocultures are not diverse, any vulnerability found exists in all the individual members of the monoculture increasing the risk of exploitation. An example to that is exploit Wednesday in which after Windows security patches are released there is an increase exploitation events on not updated machines.
Clifford Stoll wrote in 1989 after dealing with the Morris worm:
Another main concern is increased spread of algorithmic bias. In the light of increased usage of machine learning there is a growing awareness of the biases introduced by algorithms. The nature of monocultures exacerbate this problem since it makes the bias systemic and spreading unfair decisions.
Social level concerns
Monocultures may lead to Braess's like paradoxes in which introducing a "better option" (such as a more accurate algorithm) leads to suboptimal monocultural convergence - a monoculture whose correlated nature results in degraded overall quality of the decisions. Since monocultures form in areas of high-stakes decisions such as credit scoring and automated hiring, it is important to achieve optimal decision making.
This scenario can be studied throw the lens of mechanism design, in which agents are choosing between a set of algorithms, some of which return correlated outputs. The overall impact of the decision making is measured by social welfare.
Suboptimal monocultures convergence in automated hiring
This section demonstrates the concern of suboptimal monoculture convergence using automated hiring as a case study. Hiring is the process of ranking a group of candidates and hiring the top-valued. In recent years automated hiring (automatically ranking candidates based on their interaction with an AI powered system) became popular.
As shown by Kleinberg, under some assumptions, suboptimal automated hiring monocultures naturally form, namely, choosing the correlated algorithm is a dominant strategy, thus converging to monoculture that leads suboptimal social welfare.
Framework
In this scenario we will consider two firms and a group of candidate with hidden utilities of . For hiring process - each firm will produce a noisy-ranking of the candidates, then each firm (in a random order) hires the first available candidate in their ranking. Each firm can choose to use either an independent human rankers or use a common algorithmic ranking.
The ranking algorithm is modeled as a noisy distribution above permutations of parametrized by an accuracy parameter .
In order for to make sense it should satisfy these conditions:
Differentiability: The probability of each permutation is continues and differentiable in
Asymptotic optimality: For the true ranking :
Monotonicity: The expected utility of the top-ranked candidate gets better as increases, even if any subset of is removed.
These conditions state that a firm should always prefer higher values of , even if it is not first in the selection order.
Both the algorithmic and human ranking methods are of the form of and differ by the accuracy parameters . The algorithmic ranking output is corotated - it always outputs the same permutation. In contrast, a human ranked premutation is drawn from independently for each of firms.
For strategies of the first and second firm, Social welfare is defied as the sum of utilities of the hired candidates.
Conditions to suboptimal convergence
The Braess's like paradox in this framework is suboptimal monocultures converges. That is, using the algorithmic ranking is dominant strategy thus converging toward monoculture yet it yields suboptimal welfare (welfare in a world without algorithmic ranking is higher).
The main theorem proved by Kleinberg of this model is that for any and any noisy ranking family that satisfy these conditions:
Preference for the first position: For all if then .
Preference for weaker competition: For all .
there exists a such that both firms prefer using the sherd algorithmic ranking even though the social welfare is higher when both use the human evaluators. In other words - regardless of the accuracy of the human rankers there exists a more accurate algorithm whose introduction leads to suboptimal monoculture convergence.
The implications of this theorem is that under these conditions, firms will chose to use the algorithmic ranking even though that the correlated nature of algorithmic monocultures degrades total social welfare. Even though algorithmic rankings are more accurate.
The first condition on (Preference for the first position) is equivalent to a preference of firms to have independent ranking (in our setting - non algorithmic). This means that a firm should prefers independent ranking methods given all else is equal.
The intuition behind preference for weaker competition is that when a candidate is removed (hired by a different firm), the best remaining candidate is better in expectation when the removed candidate is chosen based on a less accurate ranking. Thus, a firm should always prefer that its competitors would be less accurate.
These conditions are met for that is the Mallows Model distributions and some types of random utility models (Gaussian or Laplacian noise).
See also
Comparison of DOS operating systems
Domination of the clones
History of computing hardware (1960s–present)
IBM PC compatible
Open architecture
PC DOS
Software diversity
Timeline of DOS operating systems
Wintel
Researcher lecture about suboptimal monocultures convergence
References
Computer network security
Mechanism design |
1674195 | https://en.wikipedia.org/wiki/Ariolasoft | Ariolasoft | Ariolasoft GmbH, later known as United Software, was a German video game developer, publisher and distributor. It started in 1983 as the software subsidiary of Ariola Records, itself the record division of Germany's large Bertelsmann empire. From 1985-1988 Stephen Molyneux, formerly Head of Software at Atari International GmbH in Hamburg, held the position of Head of Software with responsibility for international negotiations and licensing of software at its headquarters in Munich. Ariolasoft also had a British subsidiary, Ariolasoft UK, which was run by Ashley Gray (later replaced by Willie Carminke) and Frank Brunger.
The company released games for the ZX Spectrum, Commodore 64, MS-DOS, Atari 8-bit, Atari ST and Amiga systems. It was also the German publisher for Activision games developed for the Atari 2600, and the European publisher for Electronic Arts and Broderbund games, before those companies set up their own European offices. Ariolasoft also developed the cassette ports of those titles, and also developed original games. In addition to software activities, they were also the German distributor of the Master System between approximately 1987 and 1988.
In 1990, the company was renamed United Software, which in 1993 was taken over by MicroProse Germany.
Original games
Collaborations
''Cavelord with Atari Germany
References
Defunct video game companies of Germany
Video game companies established in 1983
Video game companies disestablished in 1993
Video game development companies
Video game publishers
1983 establishments in West Germany
German companies established in 1983
MicroProse
German companies disestablished in 1993 |
70342 | https://en.wikipedia.org/wiki/Direct%20Connect%20%28protocol%29 | Direct Connect (protocol) | Direct Connect (DC) is a peer-to-peer file sharing protocol. Direct Connect clients connect to a central hub and can download files directly from one another. Advanced Direct Connect can be considered a successor protocol.
Hubs feature a list of clients or users connected to them. Users can search for files and download them from other clients, as well as chat with other users.
History
NeoModus was started as a company funded by the adware "Direct Connect" by Jon Hess in November, 1999 while he was in high school.
The first third-party client was called "DClite", which never fully supported the file sharing aspects of the protocol. Hess released a new version of Direct Connect, requiring a simple encryption key to initiate a connection, locking out third-party clients. The encryption key was cracked, and the author of DClite released a new version of DClite compatible with the new software from NeoModus. Some time after, DClite was rewritten as Open Direct Connect with the purpose of having an MDI user interface and using plug-ins for file sharing protocols (similar to MLDonkey). Open Direct Connect also did not have complete support for the full file sharing aspects of the protocol, but a port to Java, however, did. Later on, other clients such as DCTC (Direct Connect Text Client) and DC++ became popular.
The DCDev archive contains discussions of protocol changes for development of DC in the years 2003–2005.
Protocol
The Direct Connect protocol is a text-based computer protocol, in which commands and their information are sent in clear text, without encryption in original NeoModus software (encryption is available as a protocol extension). As clients connect to a central source of distribution (the hub) of information, the hub requires a substantial amount of upload bandwidth available.
There is no official specification of the protocol, meaning that every client and hub (besides the original NeoModus client and hub) has been forced to reverse engineer the information. As such, any protocol specification this article may reference is likely inaccurate and/or incomplete.
The client-server (as well as client-client, where one client acts as "server") aspect of the protocol stipulates that the server respond first when a connection is being made. For example, when a client connects to a hub's socket, the hub is first to respond to the client.
The protocol lacks a specified default character encoding for clients or hubs. The original client and hub use ASCII encoding instead of that of the Operating system. This allows migration to UTF-8 encoding in newer software.
Port 411 is the default port for hubs, and 412 for client-to-client connections. If either of these ports are already in use, the port number is incremented until the number of a free port is found for use. For example, if 411, 412 and 413 are in use, then port 414 will be used.
Hub addresses are in the following form: dchub://example.com[:411], where 411 is an optional port.
There is no global identification scheme; instead, users are identified with their nickname on a hub-to-hub basis.
An incoming request for a client-client connection cannot be linked with an actual connection.
A search result cannot be linked with a particular search.
The ability to kick or move (redirect) a user to another hub is supported by the protocol. If a user is kicked, the hub is not required to give that user a specific reason, and there is no restriction on where a user can be redirected to. However, if another client in power instructs the hub to kick, that client may send out a notification message before doing so. Redirecting a user must be accompanied by a reason. There is no HTTP referer equivalent.
Hubs may send out user commands to clients. These commands are only raw protocol commands and are used mostly for making a particular task simpler. For example, the hub cannot send a user command that will trigger the default browser to visit a website. It can, however, add the command "+rules" (where '+' indicates to the hub that it's a command - this may vary) to display the hub's rules.
The peer-to-peer part of the protocol is based on a concept of "slots" (similar to number of open positions for a job). These slots denote the number of people that are allowed to download from a user at any given time and are controlled by the client.
In client-to-client connections, the parties generate a random number to see who should be allowed to download first, and the client with the greater number wins.
Transporting downloads and connecting to the hub requires TCP, while active searches use UDP.
There are two kinds of modes a user can be in: either "active" or "passive" mode. Clients using active mode can download from anyone else on the network, while clients using passive mode users can only download from active users. In NeoModus Direct Connect, passive mode users receive other passive mode users' search results, but the user will not be able to download anything. In DC++, users will not receive those search results. In NeoModus Direct Connect, all users will be sent at most five search results per query. If a user has searched, DC++ will respond with ten search results when the user is in active mode and five when the user is in passive mode. Passive clients will be sent search results through the hub, while active clients will receive the results directly.
Protocol delimiters are "$", "|", and . Protocol have for them (and few others) escape sequence and most software use them correctly in login
(Lock to Key) sequence. For some reason that escape sequence was ignored by DC++ developers and they use HTML equivalent if these characters are to be viewed by the user.
Continued interest exists in features such as ratings and language packs. However, the authors of DC++ have been actively working on a complete replacement of the Direct Connect protocol called Advanced Direct Connect.
One example of an added feature to the protocol, in comparison with the original protocol, is the broadcasting of Tiger-Tree Hashing of shared files (TTH). The advantages of this include verifying that a file is downloaded correctly, and the ability to find files independently of their names.
Hublists
Direct Connect used for DDoS attacks
As the protocol allows hubs to redirect users to other hubs, malicious hubs have redirected users to places other than real Direct Connect hubs, effectively causing a Distributed Denial of Service attack. The hubs may alter the IP in client to client connections, pointing to a potential victim.
The CTM Exploit surfaced in 2006–2007, during which period the whole Direct Connect network suffered from DDoS attacks. The situation prompted developers to take security issues more seriously.
As of February 2009, an extension for clients was proposed in order for the attacked party to find out the hub sending the connecting users.
Direct Connect Network Foundation
The Direct Connect Network Foundation (DCNF) is a non-profit organization registered in Sweden that aims to improve the DC network by improving software, protocols and other services in the network.
Articles and papers
The DCNF maintains a list of articles, papers and more documentation that relate to DC.
See also
Comparison of Direct Connect software
References
External links
NMDC Protocol Wiki (Mirror)
NMDC Protocol Document
NMDC Protocol
Direct Connect network
File sharing networks |
1248884 | https://en.wikipedia.org/wiki/Yopy | Yopy | The Yopy was the name of a series of Personal Digital Assistants (PDA) made by GMate Corporation, also used as a popular PDA Phone in Korea and based on the Linux operating system. The Linux Documentation Project considers the Yopy series to be "true Linux PDAs" because their manufacturers install Linux-based operating systems on them by default.
Overview
At the CeBIT 2000, GMate introduced the YDK1000, the Yopy Development Kit. Without a physical keyboard this device looked very different from later versions. It came with an embedded Linux operating system and the W Window System. Later also precompiled versions of the X Window System and the IceWM window manager became available.
The first official model in the Yopy line of PDAs was the YP3000. It introduced the clam shell design with a full-Qwerty keyboard, and featured a 3.5 inch TFT screen. It also came with the X Window System and IceWM.
One of the features of the YP3500 is a CDMA module, so it can be used as a mobile phone. In 2003, Wi-Fi was widely used in Korea, and so the YP3700 targeted this environment with an additional Wi-Fi module.
By March 2005 Gmate had stopped producing and selling the Yopy PDA and closed down its official web sites.
Yopy models
YDK1000, the Yopy Development Kit
YP3000, the first official model of the Yopy
YP3500, CDMA module was added in YP3500
YP3700, Wi-Fi module was added in YP3700
Yopy software
Because it used the Linux operating system, the Yopy was capable of running a variety of open source software.
References
External links
Official Yopy site (offline)
Yopy User Group (in Korean)
The unofficial YopyWiki, find and share information about Yopy PDAs
UK Based Re-seller for Europe (offline)
UK Based Yopy User Group
Gmate Yopy PDA review (offline)
Mac OS X USB driver for Zaurus and Yopy
Yopytheque: Yopy FAQs and how-tos in French @ Tuxmedia.com (offline)
Personal digital assistants
Linux-based devices
Embedded Linux |
22642115 | https://en.wikipedia.org/wiki/Middleware%20analyst | Middleware analyst | Middleware analysts are computer software engineers with a specialization in products that connect two different computer systems together. These products can be open-source or proprietary. As the term implies, the software, tools, and technologies used by Middleware analysts sit "in-the-middle", between two or more systems; the purpose being to enable two systems to communicate and share information.
Roles and Responsibilities
Middleware analysts look at the system of systems. They solve technical problems which involve large scale inter-disciplinary objectives with multiple, heterogeneous, distributed systems that are embedded in networks at multiple levels.
Middleware analysts hold and maintain proficiency in middleware technologies. Middleware is computer software that connects software components or applications. A central theme in most middleware analyst roles is being able to articulate why Service Oriented Architecture (SOA) is important to the business.
Best practices for implementations
Middleware best practices promote usability and maintainability among the systems served. A few examples of best practices are included here to provide some insight as to how middleware addresses key principles of standards-based computing.
One common problem for middleware is the manner in which user-defined applications are configured so that queue references bypass queue alias definitions referring directly to the queue local or queue remote definition. Such a bypass of queue alias deviates best practices and should be corrected when the administrator and/or programmer can correct it within time and scope parameters. All references from user-defined applications should point to queue aliases. Then the queue aliases should point to the defined queue local or queue remote.
Queue aliases allow flexibility for middleware administrators to resolve or relieve production problems quickly. By using queue aliases, middleware administrators can redirect message flow, in the event of a service problem, without changes to the user-defined application. For example, if a queue local were overflowing, a middleware admin could change the queue alias to point to a temporary queue local, thereby allowing the user-defined application to continue its processing without interruption while the underlying root cause is corrected.
By pointing all user-defined application references to queue aliases, it preserves the flexibility that middleware admins would have to help with production issues that may occur. If the best practice of queue aliases were not followed, the ability of a middleware admin to help with a production outage would be hindered.
Skills
Message queuing (“MQ”) is a middleware technology that greatly simplifies communication between the nodes of a system and between the nodes that connect systems together. Information system consultants use message queuing as their skill base. Upon this base, information system consultants add workflow management, message brokering, and J2EE implementations using java virtual machines (JVMs) and Message Driven Beans (MDBs).
Arguably the most important skill a middleware analyst uses is not technical, it is surely cultural. SOA does require people to think of business and technology differently. Instead of thinking of technology first, middleware analysts must first think in terms of business functions, or services. It is expected that adoption of SOA will change business IT departments, creating service-oriented (instead of technology-oriented) IT organizations. Middleware analysts perform crucial evangelization of this concept.
The enterprise service bus is a core element of any SOA. ESBs provide the "any to any" connectivity between services within a company, and beyond that company to connect to the company's trading partners. Therefore, middleware analysts need to be skilled in SOA and enterprise service bus concepts first and foremost. Middleware analysts rely on an SOA reference architecture to lay out an SOA environment that meets the company's needs and priorities. The ESB is part of this reference architecture and provides the backbone of an SOA but is not considered an SOA by itself.
Security concerns
Generic common practices
Because middleware is a cross-platform tool, the sophistication of your middleware analysts are expected to be acute. People that are designing and implementing the middleware message flow need to fully understand how the security model on each target platform works. This may include Windows, Unix, z/OS or IBM i.
Middleware protects data in transit through PKI and SSL technology. Security certificates are procured from a certification authority and regularly deployed and updated on servers. This protects data while it is in transit as it leaves one Server and arrives on the next server in the chain. It does not protect data while data is at rest.
Supplemental transmission security can augment the primary SSL measures that exist on your server. These are SSL client authentication, DN filtering, CRL check by LDAP, and cryptographic hardware (IPSEC-level encryption). This type of security is called "border-level security" because it only protects the data from when it leaves your borders until it gets to your trading partner's borders. It does not protect data once data has entered the border. IPSEC is the most efficient and least costly protection method. SSL is the middle ground, with a balance between flexibility, resource consumption, and transmission time.
When data is at rest in queues, it is not protected by MQ. That is, data is in "plain text". Therefore, if the data contained in messages is sensitive, then it is essential that application-level data encryption be used. Examples of data which could be protected by this strategy include banking data (account numbers, banking transactions, etc.) Application-level transaction security is the most secure form of protection but also the most costly in terms of CPU and I/O bandwidth consumption of both the sending and receiving servers. It is also the least efficient.
Middleware data channels can be set up to provide varying degrees of protection. A sender/receiver channel pair could be configured to provide IPSEC transport-level security not using SSL. A second sender/receiver pair could be configured to provide SSL border-to-border level security not using IPSEC. A third sender/receiver channel pair could be set up to provide application-level encryption. Using this scheme, you provision a wide selection of protection mechanisms from which your applications can choose at runtime. This offers applications the ability to achieve best security when needed or more efficient security when data is not quite so sensitive.
HIPAA-specific considerations
If your enterprise handles HIPAA ePHI data, then your middleware analysts need to know and understand the requirements set forth by law. Failure to protect data at-rest may subject your organization to fines and penalties levied by the Federal government or other authority. This requires application-level data encryption prior to delivering the data to the queuing system for transport.
System administrators, including middleware analysts, are not permitted to view unprotected ePHI data. Therefore, whenever ePHI data is present in any information system, it must be protected from the ability of an administrator to view it. It is not permissible to allow ePHI data to be kept in a queue unprotected.
See also
Event-driven SOA
Enterprise service bus
IBM WebSphere MQ
IBM WebSphere Message Broker
References
Occupations |
19879147 | https://en.wikipedia.org/wiki/List%20of%20phylogenetic%20tree%20visualization%20software | List of phylogenetic tree visualization software | This list of phylogenetic tree viewing software is a compilation of software tools and web portals used in visualizing phylogenetic trees.
Online software
Desktop software
1 "All" refers to Microsoft Windows, Apple OSX and Linux; L=Linux, M=Apple Mac, W=Microsoft Windows
Libraries
See also
List of phylogenetics software
Phylogenetics
References
External links
A 'comprehensive list' of Tree Editors
List of Tree Editors
Bioinformatics software
Computational phylogenetics
Genetics databases
Phylog
Phylogenetics
Phylogenetics
Visualization software |
198669 | https://en.wikipedia.org/wiki/Avid%20Technology | Avid Technology | Avid Technology is an American technology and multimedia company based in Burlington, Massachusetts, and founded in August 1987 by Bill Warner. It specialises in audio and video; specifically, digital non-linear editing (NLE) systems, video editing software, audio editing software, music notation software, management and distribution services.
Avid products are now used in the television and video industry to create television shows, feature films, and commercials. Media Composer, a professional non-linear editing system, is Avid's flagship product.
History
Avid was founded by Bill Warner, a marketing manager from Apollo Computer. A prototype of their first non-linear editing system, the Avid/1 Media Composer, was shown at the National Association of Broadcasters (NAB) convention in April 1988. The Avid/1 was based on an Apple Macintosh II computer, with special hardware and software of Avid's own design installed.
The Avid/1 was "the biggest shake-up in editing since Melies played with time and sequences in the early 1900s". By the early 1990s, Avid products began to replace such tools as the Moviola, Steenbeck, and KEM flatbed editors, allowing editors to handle their film creations with greater ease. The first feature film edited using the Avid was Let's Kill All the Lawyers in 1992, directed by Ron Senkowski. The film was edited at 30fps NTSC rate, then used Avid MediaMatch to generate a negative cutlist from the EDL. The first feature film edited natively at 24fps with what was to become the Avid Film Composer was Emerson Park. The first studio film to be edited at 24fps was Lost in Yonkers, directed by Martha Coolidge. By 1994 only three feature films used the new digital editing system. By 1995 dozens had switched to Avid, and it signaled the beginning of the end of cutting celluloid. In 1996 Walter Murch accepted the Academy Award for editing The English Patient (which also won best picture), which he cut on the Avid. This was the first Editing Oscar awarded to a digitally edited film (although the final print was still created with traditional negative cutting).
In 1994 Avid introduced Open Media Framework (OMF) as an open standard file format for sharing media and related metadata. In recent years the company has extended its business expertise through several acquisitions and internal investments towards the full palette of multimedia generation products including those to store and manage media files. In 2006 Avid launched new products such as Avid Interplay and Unity Isis. Avid used to be considered just a "video editing" company, but now has consolidated a well-rounded multimedia generation technology company.
In the past, Avid released Avid Free DV, a free edition of Media Composer with limited functionality; Xpress DV, a consumer edition of Media Composer; and Xpress Pro, a prosumer edition of Media Composer. These editions were discontinued in 2008 as the flagship Media Composer has been lowered in price.
On March 29, 1999, Avid Technology, Inc. adjusted the amount originally allocated to IPR&D and restated its third quarter 1998 consolidated financial statements accordingly, considering the SEC's views.
In February 2018, Avid appointed Jeff Rosica as CEO, after terminating Louis Hernandez Jr.,who was accused of workplace misconduct.
Awards
In 1993, the National Academy of Television Arts & Sciences awarded Avid Technology and all of the company's initial employees with a technical Emmy award for Outstanding Engineering Development for the Avid Media Composer video editing system.
On March 21, 1999, at the 71st Academy Awards, Avid Technology Inc. was awarded an Oscar for the concept, system design and engineering of the Avid Film Composer for motion picture editing which was accepted by founder Bill Warner.
Acquisitions
See also
List of music software
List of video editing software
List of scorewriters
References
External links
1987 establishments in Massachusetts
Companies based in Burlington, Massachusetts
Companies listed on the Nasdaq
Electronics companies established in 1987
American companies established in 1987
Audio equipment manufacturers of the United States
Manufacturing companies based in Massachusetts
Software companies based in Massachusetts
Software companies established in 1987
Manufacturers of professional audio equipment
Recipients of the Scientific and Technical Academy Award of Merit
1993 initial public offerings
Software companies of the United States |
15867639 | https://en.wikipedia.org/wiki/TimeSys | TimeSys | Timesys Corporation is a company selling Linux open source software security, engineering services, and development tools, for the embedded software market. They also help software development teams build and maintain a custom Linux platform for embedded processors from integrated circuit manufacturers such as Atmel, Freescale, Intel, Texas Instruments, and Xilinx.
The company was founded in 1995 by principals associated with Carnegie Mellon University and is headquartered in Pittsburgh, Pennsylvania.
The company initially provided the first real-time enhanced embedded Linux distribution, known as Timesys Linux/RT. Timesys joined the OSDL in 2003, and in 2004, was the first to register a carrier-grade Linux distribution.
In 2005, Timesys open-sourced their software. At that time, the company announced LinuxLink, a software development framework that helps embedded software development teams configure, patch, build and maintain an open source Linux platform. It includes a Linux kernel, GNU toolchain, packages and libraries and development tools. Subscribers are provided with regular updates, documentation and support. All Linux platform components and updates are open source and are provided through the LinuxLink Factory custom platform builder. Embedded Linux platforms, developed and maintained through LinuxLink, exist in hundreds of consumer electronics, medical device, industrial automation and networking products. LinuxLink evolved to become a portal for customers to gain access to cybersecurity products and services, development tools, and to ask for help.
Timesys added end-to-end device security in 2019. Vigiles is a vulnerability and mitigation tracker for automatically identifying, monitoring and tracking vulnerabilities specific to a developer's actual product configurations, along with triage and mitigation collaboration tools to fix issues. Timesys provides secure by design services, to implementsecurity features including secure boot, over-the-air updates, device encryption, hardening, and security audits. For long-term support of embedded devices, Timesys a Linux OS board support package maintenance service.
References
External links
Timesys Corporation website
Software companies based in Pennsylvania
Linux companies
Embedded Linux
Computer companies of the United States
Privately held companies based in Pennsylvania
Software companies of the United States |
26408292 | https://en.wikipedia.org/wiki/Nvidia%20Optimus | Nvidia Optimus | Nvidia Optimus is a computer GPU switching technology created by Nvidia which, depending on the resource load generated by client software applications, will seamlessly switch between two graphics adapters within a computer system in order to provide either maximum performance or minimum power draw from the system's graphics rendering hardware.
A typical platform includes both a lower-performance integrated graphics processor by Intel and a high-performance one by Nvidia. Optimus saves battery life by automatically switching the power of the discrete graphics processing unit (GPU) off when it is not needed and switching it on when needed again. The technology mainly targets mobile PCs such as notebooks. When an application is being launched that is determined to benefit from the performance of the discrete GPU, the discrete GPU is powered up and the application is served by a rendering context via that GPU. Otherwise the application is served by a rendering context that uses the integrated GPU. Switching between the graphics processors is designed to be completely seamless and to happen "behind the scenes".
Official supported operating systems by Nvidia are Microsoft Windows and Linux. A project called Bumblebee is an alternative open source implementation of Optimus support for Linux.
Operation
When a user launches an application, the graphics driver tries to determine whether the application would benefit from the discrete GPU. If so, the GPU is powered up from an idle state and is passed all rendering calls. Even in this case, though, the integrated graphics processor (IGP) is used to output the final image. When less demanding applications are used, the IGP takes sole control, allowing for longer battery life and less fan noise. Under Windows the Nvidia driver also provides the option to manually select the GPU in the right-click menu upon launching an executable.
Within the hardware interface layer of the Nvidia GPU driver, the Optimus Routing Layer provides intelligent graphics management. The Optimus Routing Layer also includes a kernel-level library for recognizing and managing specific classes and objects associated with different graphics devices. This Nvidia innovation performs state and context management, allocating architectural resources as needed for each driver client (i.e., application). In this context-management scheme, each application is not aware of other applications concurrently using the GPU.
By recognizing designated classes, the Optimus Routing Layer can help determine when the GPU can be utilized to improve rendering performance. Specifically, it sends a signal to power-on the GPU when it finds any of the following three call types:
DX Calls: Any 3D game engine or DirectX application will trigger these calls
DXVA Calls: Video playback will trigger these calls (DXVA = DirectX Video Acceleration)
CUDA Calls: CUDA applications will trigger these calls
Predefined profiles also assist in determining whether extra graphics power is needed. These can be managed using the Nvidia control panel.
Optimus avoids usage of a hardware multiplexer and prevents glitches associated with changing the display driver from IGP to GPU by transferring the display surface from the GPU frame buffer over the PCI Express bus to the main memory-based framebuffer used by the IGP. The Optimus Copy Engine is a new alternative to traditional DMA transfers between the GPU framebuffer memory and main memory used by the IGP.
Using the IGP to output data from the discrete GPU may become a bottleneck at high framerates. On desktop-replacement or gaming laptops (where performance is prioritized over energy efficiency), Optimus technology has been heavily criticized. Some vendors have provided hardware multiplexer solutions to completely shut off the Optimus architecture. The operation may be hosted in the BIOS, and often require a reboot.
Linux support
The binary Nvidia driver added partial Optimus support May 3, 2013 in the 319.17. As of May 2013, power management for discrete card is not supported, which means it cannot save battery by turning off Nvidia graphic card completely.
The open-source project Bumblebee tries to provide support for graphics-chip switching. As in the Windows implementation, by default all applications run through the integrated graphics processor. one can only run a program with improved graphical performance on the discrete GPU by explicitly invoking it as such: for example, by using the command line or through specially configured shortcut icon. Automatic detection and switching between graphics processors is not yet available.
Work in progress on a graphical interface - bumblebee-ui - aims to allow more convenient starting of programs for improved graphical performance when necessary.
Steam for Linux can be set up to run games using the discrete GPU (Steam Community: Optimus and Steam for Linux).
The Bumblebee Project continues to evolve as more necessary software changes are made to the graphics architecture of Linux. To make most use of it, it is best to use a recent Linux distribution. , Bumblebee software repositories are available for Arch Linux, Debian, Fedora, Gentoo, Mandriva, OpenSuSE and Ubuntu. The source package can be used for other distributions.
An attempt by Nvidia to support Optimus through DMA BUF, a Linux kernel-mechanism for sharing buffers across hardware (potentially GPUs), was rebuffed by kernel developers in January 2012 due to license incompatibility between the GPL-licensed kernel-code and the proprietary-licensed Nvidia blob.
When no software mechanism exists for switching between graphics adapters, the system cannot use the Nvidia GPU at all, even if an installed graphics driver would support it.
Modern Optimus Support
Many linux distributions now support Nvidia offloading, where the nvidia card does all rendering. Since the internal laptop display is physically connected to the intel driver, the nvidia card renders to the intel display memory. To avoid tearing, the xorg server has a mechanism called Prime Synchronization to time these buffer updates to avoid tearing, similar to vsync; the nvidia driver must be loaded as a kernel module for this to work. This is not usually activated by default.
Unlike bumblebee, this offloading solution allows multi-monitor graphics. The disadvantage is that toggling the nvidia card requires a logout.
The leading implementation of this approach is Ubuntu's 'prime-select' package, which has a command line and graphical tool to turn the nvidia card off. Unlike Windows, this is not done dynamically, and the user must restart the login session for the change to take effect.
Ubuntu's prime-select script is available on Ubuntu derivatives, which in some cases add their own graphical tools. The prime-offload approach has been ported or reimplemented in arch and fedora.
In 2016, Nvidia announced GL Vendor Neutral Dispatch, meaning both intel and nvidia drivers can be simultaneously installed. This has greatly simplified the process of switching modes, although it took until 2018 until distributions started taking advantage.
Some older and high-end laptops contain a BIOS setting to manually select the state of the hardware multiplexer to switch output between the two video devices. In this case, a Linux user can place the laptop in hardware configurations where there is only once graphics device. This avoids the complexities of running two graphics drivers, but offers no power savings.
Since driver version 435 the proprietary driver supports render offloading of a single window. It creates a virtual display where the dGPU renders to, which will be displayed in the window on the main screen for offloaded application. As of October 2019 this requires usage of the xorg development branch, since needed modifications are not yet released.
See also
AMD Hybrid Graphics
Notes
References
External links
Nvidia Optimus whitepaper
Nvidia
Graphics hardware |
2197424 | https://en.wikipedia.org/wiki/Harvard%20Mark%20III | Harvard Mark III | The Harvard Mark III, also known as ADEC (for Aiken Dahlgren Electronic Calculator) was an early computer that was partially electronic and partially electromechanical. It was built at Harvard University under the supervision of Howard Aiken for the U.S. Navy.
Technical overview
The Mark III processed numbers of 16 decimal digits (plus sign), each digit encoded as 4-bits, though using a form of encoding that is different to conventional BCD (character encoding) today. Numbers were read and processed serially, meaning one decimal digit at a time, but the 4 bits for the digit were read in parallel. The instruction length, however, was 38 bits, read in parallel.
It used 5,000 vacuum tubes and 1,500 crystal diodes. It weighed . It used magnetic drum memory of 4,350 words. Its addition time was 4,400 microseconds and the multiplication time was 13,200 microseconds (times include memory access time). Aiken boasted that the Mark III was the fastest electronic computer in the world.
The Mark III used nine magnetic drums (one of the first computers to do so). One drum could contain 4,000 instructions and has an access time of 4,400 microseconds; thus it was a stored-program computer. The arithmetic unit could access two other drums – one contained 150 words of constants and the other contained 200 words of variables. Both of these drums also had an access time of 4,400 microseconds. This separation of data and instructions is known as the Harvard architecture. There were six other drums that held a total of 4,000 words of data, but the arithmetic unit couldn't access these drums directly. Data had to be transferred between these drums and the drum the arithmetic unit could access via registers implemented by electromechanical relays. This was a bottleneck in the computer and made the access time to data on these drums long – 80,000 microseconds. This was partially compensated for by the fact that twenty words could be transferred on each access.
The Mark III was finished in September 1949 and delivered to the U.S. Naval Proving Ground at the U.S. Navy base at Dahlgren, Virginia in March 1950. Rebuilding the computer in its new location took the remainder of the year. It became operational in 1951, and was being operated 24 hours a day, 6 days a week by October.
See also
Harvard Mark I
Harvard Mark II
Harvard Mark IV
Howard Aiken
List of vacuum tube computers
References
Further reading
A History of Computing Technology, Michael R. Williams, 1997, IEEE Computer Society Press,
External links
BRL report, 1955 - see ADEC
1950s computers
Computer-related introductions in 1951
Electro-mechanical computers
One-of-a-kind computers
Vacuum tube computers
Harvard University
History of the United States Navy |
6102364 | https://en.wikipedia.org/wiki/The%20Brave%20Little%20Toaster%20to%20the%20Rescue | The Brave Little Toaster to the Rescue | The Brave Little Toaster to the Rescue is a 1997 American animated musical film. It is the sequel to The Brave Little Toaster (1987). The film was released direct-to-video on May 20, 1997, in the United Kingdom and on May 25, 1999, in the United States by Walt Disney Home Video.
A sequel, The Brave Little Toaster Goes to Mars, was released in 1998.
Plot
Rob McGoarty, the owner of the appliances, and the one referred to as "The Master," is in his last days of college while simultaneously working at a veterinary clinic. One night, while finishing his thesis, his computer crashes due to a computer virus. The appliances, along with a rat named Ratso, seek to help Rob by finding and reversing the effects of his computer virus. Meanwhile, Mack, Rob's lab assistant, plots to sell the injured animals Rob had been tending to a Santa Clarita laboratory named "Tartarus Laboratories." The appliances discover an abandoned, old prototype TLW-728 supercomputer named Wittgenstein in the basement. Wittgenstein reveals that he is living on one rare vacuum tube, a WFC-11-12-55, due to being infected by a computer virus. The appliances learn that unless they find a replacement quickly, Wittgenstein's vacuum tube will blow and lead to his death.
In an attempt to return Wittgenstein to his full capacity, Radio and Ratso go to the storage building of the college to find the WFC-11-12-55 tube. However, when Radio and Ratso return with the tube, they accidentally break it during an argument. Wittgenstein does his best to survive, but the virus causes him to blow his remaining tube and he dies. Guilt-ridden over condemning the animals to their doom at Tartarus Laboratories, Radio gives up his own tube, sacrificing himself. The appliances install Radio's tube in Wittgenstein and he wakes up with boosted power that regenerates all of his other tubes and destroys all the viruses within him. The appliances and Wittgenstein alert Rob and his girlfriend, Chris, to Mack's scheme. The appliances create a makeshift vehicle and pursue Mack's truck with Rob and Chris following them. They manage to lure the police to the front of the truck and have Mack arrested. After discovering the appliances in the truck, Rob and Chris assume that Mack had also planned to sell Rob's stuff, but Rob wonders where Radio is. Later, they discover Wittgenstein and Radio in the basement. Chris replaces Radio's tube with a new one she found in Nome, reviving him. Wittgenstein restores Rob's thesis and is later sold to a museum to be upgraded with modern technology. In the end, all of the animals are adopted by new owners except Ratso, who Rob and Chris decide to keep as their pet. Rob proposes to Chris and she accepts. They leave college with their appliances and Ratso, planning to start a new and happy life together.
Voice cast
Deanna Oliver as the Brave Little Toaster, an inspiring pop-up two-slice toaster who is the leader of the clan of small appliances. Toaster is courageous, intelligent, kind, thoughtful, and warmhearted.
Timothy Stack as Lampy Lamp, an easily impressed yet slightly irascible desktop gooseneck lamp. He is bright but tends to be ironically dimwitted, though he has a couple of good points.
Roger Kabler as Chats Radio, a wisecracking dial A.M. radio alarm clock whose personality parodies loud and pretentious announcers.
Eric Lloyd as Blanky Blanket, an electric blanket with an innocent demeanor.
Thurl Ravenscroft as the Kirby Old Vacuum, a very deep-voiced, individualistic upright vacuum cleaner who dons a cynical, cantankerous attitude towards the other appliances.
Brian Doyle-Murray as Wittgenstein "the TLW-278" Radio, a prototype vacuum-tube-based radio supercomputer. He is powered by a very rare cathode radio tube called the WFC-11-12-55. He was outmoded when transistors were invented. By the start of the film, he is infected with a computer virus, causing him to function improperly.
Chris Young as Master Rob Minkoff-McGroarty, a university student, and the original human owner of the five appliances.
Jessica Tuck as Chris Caft, Rob's tomboyish, supportive girlfriend.
Alfre Woodard as Maisie the Cat, she is a sweet cat and protective of her three kittens. Though she initially did not like Ratso, by the end of the film, they become good friends.
Andy Milder as Ratso the Rat, a rat who is initially angry about being kept as a pet by Rob. He is rude to almost everyone, but as the movie progresses, Ratso's heart begins to warm to others.
Jonathan Benair as Jim Bob, the assistant of Mack McCro. He and Mack plan to take the animals to Tartarus Laboratory.
Eddie Bracken as Sebastian the Monkey, an old monkey who was the victim of the cruel experiments of Tartarus Laboratories and as a result has a mutilated and bandaged hand.
Andrew Daly as Murgatroid the Snake, a friendly snake who speaks with a heavy sibilance.
Eddie Deezen as Charlie
Paddi Edwards as Lab Computer
Marc Allen Lewis as Security Guard
Ross Mapletoft as Modem
Kevin Meaney as Computer, a fatherly home computer who lives in Rob's house.
Victoria Jackson as Mouse, a mouse who is Computer's son.
Jay Mohr as Mack McCro, the former assistant of Rob McGroarty. Unlike the latter, he doesn't care about animals' feelings. In fact, he only cares about making money and intends to sell the animals (which Rob has been taking care of) to Tartarus Laboratories.
Danny Nucci as Alberto the Dog, a Chihuahua with a broken leg who speaks with a Mexican accent.
Laurel Green as Campus Student
Neil Ross as Security Camera and Police Man
B.J. Ward as Police Lady
Frank Welker as the Dobermans
Nancy Cartwright as Virus
Aretha Franklin as Homebuilt Computer
Songs
Alexander Janko composed the film's score. In addition to the original songs, I'm Into Something Good by Herman's Hermits is played at the film's opening.
Notes
References
External links
1997 animated films
1997 direct-to-video films
1997 films
1990s American animated films
1990s fantasy adventure films
1990s musical films
American sequel films
American children's animated adventure films
American children's animated comedy films
American children's animated fantasy films
American direct-to-video films
American films
American children's animated musical films
American fantasy adventure films
Direct-to-video animated films
Direct-to-video interquel films
Direct-to-video sequel films
Films set in the 1980s
Buena Vista Home Entertainment direct-to-video films
Hyperion Pictures films
Animated films about rats
Films with screenplays by Willard Carroll
1990s children's animated films
The Brave Little Toaster
Films produced by Donald Kushner
The Kushner-Locke Company films
1990s English-language films |
1691100 | https://en.wikipedia.org/wiki/Steve%20Chen%20%28computer%20engineer%29 | Steve Chen (computer engineer) | Steve Chen (; pinyin: Chén Shìqīng) (born 1944 in Taiwan) is a Taiwanese computer engineer and internet entrepreneur.
Chen was elected to the US National Academy of Engineering in 1991 for leadership in the development of super-computer architectures and their realization.
Life
Chen earned a BS from National Taiwan University in 1966. MS from Villanova University in 1971 and a PhD under David Kuck from the University of Illinois at Urbana-Champaign in 1975.
From 1975 through 1978 he worked for Burroughs Corporation on the design of the Burroughs large systems line of supercomputers.
He is best known as the principal designer of the Cray X-MP and Cray Y-MP multiprocessor supercomputers. Chen left Cray Research in September 1987 after it dropped the MP line.
With IBM's financial support, Chen founded Supercomputer Systems Incorporated (SSI) in January 1988.
SSI was devoted to development of the SS-1 supercomputer, which was nearly completed before the estimated $150 million investment ran out. The Eau Claire, Wisconsin-based company went bankrupt in early 1993, leaving more than 300 employees jobless.
An attempt to salvage the work was made by forming a new company, SuperComputer International (SCI), later that year. SCI was renamed Chen Systems in 1995. It was acquired by Sequent Computer Systems the following year. John Markoff, a technology journalist, wrote in the New York Times that Chen was considered "one of the nation's most brilliant supercomputer designers while working in this country for the technology pioneer Seymour Cray in the 1980s."
In 1999, Chen became founder and CEO of Galactic Computing, a developer of supercomputing blade systems, based in Shenzhen, China.
By 2005 he started to focus on grid computing to model a human brain instead.
By 2010, he was reported to be working on technology to use cloud computing to improve health care in rural China.
In 2011, he founded Information Supergrid Technologies USA.
See also
Taiwanese Americans
References
External links
Galactic Computing
1944 births
Living people
American computer businesspeople
American people of Chinese descent
Cray employees
Businesspeople in information technology
Computer designers
People from Nanping
Supercomputing in China
Taiwanese emigrants to the United States
Grainger College of Engineering alumni
Villanova University alumni |
457192 | https://en.wikipedia.org/wiki/System%206 | System 6 | System 6 (or System Software 6) is a graphical user interface-based operating system for Macintosh computers, made by Apple Computer, Inc. It was released in 1988, and is part of the classic Mac OS series. It is a monolithic operating system, with cooperative multitasking based on an improved MultiFinder. The boxed version cost , and it was included with all new Macintosh computers until 1991, when it was succeeded by System 7.
Features
MacroMaker
The MacroMaker utility was introduced in System 6. It records mouse and keyboard input as macros, and has a unique user interface intended to look and act like a tape recorder. MacroMaker was criticized for its lack of features when compared to Microsoft's AutoMac III, which was already available commercially. As MacroMaker records only the locations of mouse-clicks inside windows and not what is being clicked on or exactly when, it can not be used to automate actions in more sophisticated programs. The pre-recorded clicks miss buttons if the buttons had moved since the recording, or if they failed to appear upon playback. It records the start and end locations of mouse movements, but does not track the precise path of a movement or support pauses. MacroMaker is not compatible with System 7, in which it is succeeded by AppleScript.
Multitasking
Macintosh gained cooperative multitasking in March 1985 with Andy Hertzfeld's Switcher, which can switch between multiple full-screen applications. It was not integrated, and was only sold separately by Apple. Not many programs and features function correctly with Switcher, and it does not share the screen between applications simultaneously. Systems 5 and 6 have MultiFinder instead, which is much more mature and widely used in System 6. With MultiFinder, the Finder does not quit to free resources, and the system behaves as in the still-familiar multitasking fashion, with the desktop and other applications' windows in the background.
Hardware support
System 6 includes support for the Apple ImageWriter LQ and PostScript laser printers. New software drivers allow the ImageWriter LQ to be used on AppleTalk local area networks and supports the use of tabloid or B-size paper (). System 6 includes QuickerGraf (originally QuickerDraw), system software used to accelerate the drawing of color images on the Macintosh II. It was licensed to Apple and Radius Inc by its programmer, Andy Hertzfeld.
Limitations
In comparison to the NeXTSTEP operating system of the time, System 6 does not make much use of sound, and its user interface is limited in file management and window displays. System 6's Apple menu cannot be used to launch applications. The icon in the upper right-hand corner of the menu bar simply shows the open application and is not a menu. System 6 supports 24 bits of addressable RAM (random access memory), which allows for a maximum of 8 megabytes of RAM, with no provision for virtual memory. These limitations were removed in System 7. System 6's version of the HFS file system also has a volume size limit; it supports up to 2 gigabytes (GB) and 65,536 files on any one volume. System 7.5 increased this limit to 4 GB.
The Trash (known as the "Wastebasket" in the British-English version) empties when the Finder terminates. If MultiFinder is not running, this occurs as soon as an application launches. Icons on the Desktop in System 6 are not organized into a single folder, as in later operating systems. Instead, the system records if a file is on the Desktop. This is inefficient and confusing, as the user cannot browse to the Desktop in applications besides the Finder, even within the standard Open and Save As dialog boxes. Furthermore, these dialogs are primitive, and were mostly unchanged since 1984. The lack of aliases, shortcuts to files, is another limitation of file management on System 6, and custom file and folder icons are not supported. These issues were all remedied in System 7.
A maximum of 15 desk accessories may be installed at one time, including the Chooser, Scrapbook, and Control Panel. System 6 uses the Control Panel desk accessory to access all the installed control panels, which imposes severe user-interface limitations. Desk Accessories cannot be installed or removed within the Finder; this requires the Font/DA Mover utility. System 7 also fixed this. Control Panels, however, are contained in separate files.
The interface is not very customizable. The Finder allows each icon to be assigned a color, but the desktop background is limited to an 8x8-pixel color tiled pattern (color patterns were introduced in System 5), and standard window frames are black-and-white. However, many "INIT" extension files exist to add color and customization. System 7 allows the user to change the color of window frames and various other aspects of the user interface. By 1989, the System 6 user interface was in need of a change.
Reception
Initial releases of System 6 are unstable; many third-party developers did not receive advance copies, resulting in widespread compatibility issues. The contemporary versions of many common programs such as Microsoft Excel, Microsoft Works and 4th Dimension were not fully compatible with System 6. There were also software bugs in the Color Manager, Script Manager, and Sound Manager extension files. Apple announced that 66 bugs were fixed with version 6.0.1 update, in September 1988. However, a major bug involving the text-spacing of screen fonts was found, and was fixed in version 6.0.2. Some customers waited longer until moving to System 6 because of its poor reputation.
Compatibility
System 6 was officially supported by Apple for many different machines, some of which shipped with it. Some unsupported Macintosh computers can run it with limitations.
Version history
References
External links
Macintosh: System Software Version History at apple.com
1988 software
Classic Mac OS
Proprietary operating systems
Pascal (programming language) software |
8728576 | https://en.wikipedia.org/wiki/Sybil%20attack | Sybil attack | A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".
Description
The Sybil attack in computer security is an attack wherein a reputation system is subverted by creating multiple identities. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. , evidence showed that large-scale Sybil attacks could be carried out in a very cheap and efficient way in extant realistic systems such as BitTorrent Mainline DHT.
An entity on a peer-to-peer network is a piece of software that has access to local resources. An entity advertises itself on the peer-to-peer network by presenting an identity. More than one identity can correspond to a single entity. In other words, the mapping of identities to entities is many to one. Entities in peer-to-peer networks use multiple identities for purposes of redundancy, resource sharing, reliability and integrity. In peer-to-peer networks, the identity is used as an abstraction so that a remote entity can be aware of identities without necessarily knowing the correspondence of identities to local entities. By default, each distinct identity is usually assumed to correspond to a distinct local entity. In reality, many identities may correspond to the same local entity.
An adversary may present multiple identities to a peer-to-peer network in order to appear and function as multiple distinct nodes. The adversary may thus be able to acquire a disproportionate level of control over the network, such as by affecting voting outcomes.
In the context of (human) online communities, such multiple identities are sometimes known as sockpuppets.
Example
A notable Sybil attack in conjunction with a traffic confirmation attack was launched against the Tor anonymity network for several months in 2014.
There are other examples of Sybil attacks run against Tor network users. This includes the 2020 Bitcoin address rewrite attacks. The attacker controlled a quarter of all Tor exit relays and employed SSL stripping to downgrade secure connections and divert funds to the wallet of the threat actor known as BTCMITM20.
Another notable example is the 2017–2021 attack run by threat actor KAX17. This entity controlled over 900 malicious servers, primarily middle points, in an attempt to deanonymize Tor users.
Prevention
Known approaches to Sybil attack prevention include identity validation, social trust graph algorithms, or economic costs, personhood validation, and application-specific defenses.
Identity validation
Validation techniques can be used to prevent Sybil attacks and dismiss masquerading hostile entities. A local entity may accept a remote identity based on a central authority which ensures a one-to-one correspondence between an identity and an entity and may even provide a reverse lookup. An identity may be validated either directly or indirectly. In direct validation the local entity queries the central authority to validate the remote identities. In indirect validation the local entity relies on already-accepted identities which in turn vouch for the validity of the remote identity in question.
Practical network applications and services often use a variety of identity proxies to achieve limited Sybil attack resistance, such as telephone number verification, credit card verification, or even based on the IP address of a client. These methods have the limitations that it is usually possible to obtain multiple such identity proxies at some cost – or even to obtain many at low cost through techniques such as SMS spoofing or IP address spoofing. Use of such identity proxies can also exclude those without ready access to the required identity proxy: e.g., those without their own mobile phone or credit card, or users located behind carrier-grade network address translation who share their IP addresses with many others.
Identity-based validation techniques generally provide accountability at the expense of anonymity, which can be an undesirable tradeoff especially in online forums that wish to permit censorship-free information exchange and open discussion of sensitive topics. A validation authority can attempt to preserve users' anonymity by refusing to perform reverse lookups, but this approach makes the validation authority a prime target for attack. Protocols using threshold cryptography can potentially distribute the role of such a validation authority among multiple servers, protecting users' anonymity even if one or a limited number of validation servers is compromised.
Social trust graphs
Sybil prevention techniques based on the connectivity characteristics of social graphs can also limit the extent of damage that can be caused by a given Sybil attacker while preserving anonymity. Examples of such prevention techniques include SybilGuard, SybilLimit, the Advogato Trust Metric, SybilRank, and the sparsity based metric to identify Sybil clusters in a distributed P2P based reputation system.
These techniques cannot prevent Sybil attacks entirely, and may be vulnerable to widespread small-scale Sybil attacks. In addition, it is not clear whether real-world online social networks will satisfy the trust or connectivity assumptions that these algorithms assume.
Economic costs
Alternatively, imposing economic costs as artificial barriers to entry may be used to make Sybil attacks more expensive. Proof of work, for example, requires a user to prove that they expended a certain amount of computational effort to solve a cryptographic puzzle. In Bitcoin and related permissionless cryptocurrencies, miners compete to append blocks to a blockchain and earn rewards roughly in proportion to the amount of computational effort they invest in a given time period. Investments in other resources such as storage or stake in existing cryptocurrency may similarly be used to impose economic costs.
Personhood validation
As an alternative to identity verification that attempts to maintain a strict "one-per-person" allocation rule, a validation authority can use some mechanism other than knowledge of a user's real identity – such as verification of an unidentified person's physical presence at a particular place and time as in a pseudonym party – to enforce a one-to-one correspondence between online identities and real-world users. Such proof of personhood approaches have been proposed as a basis for permissionless blockchains and cryptocurrencies in which each human participant would wield exactly one vote in consensus. A variety of approaches to proof of personhood have been proposed, some with deployed implementations, although many usability and security issues remain.
Application-specific defenses
A number of distributed protocols have been designed with Sybil attack protection in mind. SumUp and DSybil are Sybil-resistant algorithms for online content recommendation and voting. Whānau is a Sybil-resistant distributed hash table algorithm.
I2P's implementation of Kademlia also has provisions to mitigate Sybil attacks.
See also
Astroturfing
Ballot stuffing
Social bot
Sockpuppetry
References
External links
A Survey of Solutions to the Sybil Attack
On Network formation: Sybil attacks and Reputation systems
A Survey of DHT Security Techniques by Guido Urdaneta, Guillaume Pierre and Maarten van Steen. ACM Computing surveys, 2009.
An experiment on the weakness of reputation algorithms used in professional social networks: the case of Naymz by Marco Lazzari. Proceedings of the IADIS International Conference e-Society 2010.
Computer network security
Reputation management |
3466995 | https://en.wikipedia.org/wiki/Another%20Century%27s%20Episode | Another Century's Episode | is a 2005 third-person shooter video game published by Banpresto in Japan for the PlayStation 2. The player controls a mech from one of nine different anime robot franchises to destroy opposing forces before they steal a prized energy source for devious purposes. The game is divided into several different missions, where players use their mech and arsenal of weapons to fulfill mission objectives, ranging from destroying enemy machines to protecting a specific target.
Banpresto enlisted the help of FromSoftware, a Japanese developer known for its Armored Core series, to assist in the game's production. As Banpresto held the exclusive video game rights to several popular robot series, it envisioned the idea of a large crossover similar to Konami's Zone of the Enders games. It was designed by Yui Tanimura, who later directed Dark Souls II and co-directed Dark Souls III, and incorporated music performed by songstress Hitomi Shimatani.
Another Century's Episode was released to strong sales, and was one of the year's top-selling video games in Japan. Critics favorably compared its gameplay to Zone of the Enders, and enjoyed its wide selection of mechs and mission objectives. The game's success lead many of the series represented, such as Metal Armor Dragonar, to see a renewal in popularity. It spawned a new franchise that includes soundtrack albums, merchandise, and four sequels.
Gameplay
Another Centurys Episode is a third-person shooter game. Players pilot a mecha from one of nine different anime series, each posing their own unique weapon loadouts and attack styles. Represented series include Aura Battler Dunbine, Mobile Suit Zeta Gundam, Brain Powered, and Blue Comet SPT Layzner, in addition to mechas from other FromSoftware and Banpresto franchises like Armored Core and Super Robot Wars. Its gameplay has been compared to the Zone of the Enders series; players fly their mecha around a large cubic environment and must complete a variety of mission objectives, each increasing in difficulty as they progress through the game. Objectives range from destroying formations of enemy mechas, to protecting a specific building from opposing forces, to clearing out a path of mines for a space shuttle.
Mechas can boost, or "dash", themselves forward. By dashing, players can avoid being hit by obstacles or enemy projectiles, however doing so drains the dash gauge and must recharge before it can be used again. Mechas can carry five different weapons or abilities, such as machine guns and other firearms. Most weapons need to recharge after every use, although some have limited ammunition and cannot be used once they are depleted. By firing the weapon close to a nearby enemy, players can perform a melee attack, which can be used to perform long chain reactions.
Plot
In the future, mankind has rapidly advanced in technology, to the point where colonies orbiting Earth and Mars are constructed. However, political and economical strife have led to a recession that has affected the colonies the hardest. To deal with these issues, the multitude of Earth governments have united under the banner of the United Community of Earth (UCE). The attempted reorganization instead causes the formation of rebel forces, such as White Fang and the United Lunar Empire Gigano. To counter this, the UCE establishes a special task force, the Londo Bell, to eradicate them and similar groups.
During the same time frame, the UCE began the development of a new energy source called "E2", created in response to the global energy crisis affecting the Earth-orbiting colonies. Though powerful, E2 is also highly volatile, with many of the rebelling forces seeking to steal it for their own purposes. This leads to a worldwide war against the opposing groups, with the Londo Bell being sent out to stop them from stealing. The player assumes the role of a squad member working for the Londo Bell, teaming up with others to destroy those that seek to steal E2. In one mission, the Londo Bell destroys a shuttle fleet led by Char Aznable, carrying surplus amounts of E2. Undeterred, Aznable flees to the colonies orbiting Mars as the Londo Bell pursue him. A climactic battle ensues that leads to the destruction of the E2 energy and Aznable's defeat. However, using the refugee ship incident, hardliner Duke Dermail seizes power within the UCE government, replacing the pacifist Relena Peacecraft and foreshadowing the coming of a new war.
Development and release
Another Century's Episode was developed as part of a collaboration between Banpresto and FromSoftware. A subsidiary of Bandai and the holder for the exclusive video game rights to several Japanese mecha franchises, Banpresto conceptualized a large crossover between them following the success of Konami's Zone of the Enders series. In addition to video games, Zone of the Enders expanded into other forms of media such as anime tie-ins, which is believed to have been what persuaded Banpresto to begin production of Another Century's Episode. To assist in the game's development, Banpresto enlisted the help of FromSoftware, a developer known for its Armored Core franchise. It was designed by Yui Tanimura, who would later direct the Dark Souls games, and directed by Tomohiro Shibuya. The game's opening and ending themes were performed by songstress Hitomi Shimatani; she recalled the recording session having "high tension".
Banpresto announced Another Century's Episode on September 1, 2004, and demonstrated it during that year's Tokyo Game Show on September 24. The game was released in Japan on January 27, 2005. To commemorate its release, Enterbrain published a strategy guide that detailed its characters, mechas, and setting. On November 2, it was re-released under the PlayStation the Best budget label.
Reception
Another Century's Episode was a commercial hit for both FromSoftware and Banpresto. In its first week on the market, the game sold over 175,000 copies and became a best-seller for the platform. By the end of 2005, A.C.E. was one of the top-selling video games in Japan, with sales exceeding 254,000. It performed considerably better than FromSoftware's previous licensed game, the negatively-received Spriggan: Lunar Verse for the PlayStation.
The four reviewers from Famitsu magazine complimented the selection of playable mechas, their powerful attacks, and the attention to detail given to them. However, they were critical of the way they controlled, specifically while changing their altitude and orientation. Ollie Barder, a writer for GameSetWatch, likened its gameplay to Sega's Virtual On arcade fighter and its overall concept to Konami's Zone of the Enders series. He wrote that it felt like a spiritual successor to Virtual On in the way it controlled, believing that "in many ways it's a subtle change over Virtual Ons initial implementation and more akin to the anime combat that inspired Sega's real robot franchise in the first place." Barder pointed out the flaws in its combat system, specifically its imperfect hit detection and slow game speed.
Retrospectively in 2012, Hardcore Gaming 101 writer Arshad Abdul-Aal favorably compared the gameplay and style of Another Century's Episode to Zone of the Enders, expressing his appreciation towards the variety of missions and solid selection of mechas. Abdul-Aal believed that the game's negative reputation online, likely due to the declining quality of its sequels, was undeserved, and concluded that it made for a fun and enjoyable game on its own accord.
Legacy
Many of the mecha series represented in Another Century's Episode gained popularity as a result of its commercial success; for instance, Metal Armor Dragonar received a DVD box set and a line of art books after one of its mechas was featured in A.C.E.. This effect has been compared to Banpresto's Super Robot Wars series, which similarly increased the popularity of franchises that were represented in the games.
Another Century's Episode spawned a new franchise, consisting of merchandise, albums, and four sequels. The first of these, Another Century's Episode 2 (2006), continued the story of the original and improved many of its faults, such as a refined melee combat system and faster pacing. Another Century's Episode 3: The Final (2007) was envisioned as the final installment, adding new features such as branching story paths and additional playable mechas. The fourth entry, Another Century's Episode: R (2010), was noticeably more plot-centric than previous installments, focusing primarily on an encompassing storyline and borrowing elements from role-playing games. Another Century's Episode Portable (2011), the last entry, omits the story entirely and instead focuses on completing a series of missions and destroying boss units. R and Portable were published by Namco Bandai Games, which in 2008 reorganized Banpresto into a toy company and absorbed its video game operations (although the games were published under the Banpresto brand).
Notes
References
2005 video games
Action video games
Banpresto games
Bandai Namco Entertainment franchises
Crossover video games
FromSoftware games
Japan-exclusive video games
Video games about mecha
PlayStation 2 games
PlayStation 2-only games
Multiplayer and single-player video games
Video games developed in Japan |
395082 | https://en.wikipedia.org/wiki/Autzen%20Stadium | Autzen Stadium | Autzen Stadium is an outdoor football stadium in the northwest United States, in Eugene, Oregon. Located north of the University of Oregon campus, it is the home field of the Oregon Ducks of the Pac-12 Conference. Opened in 1967, the stadium has undergone several expansions. The official seating capacity is presently 54,000, however, the actual attendance regularly exceeds that figure.
History
Prior to 1967, the Ducks' on-campus stadium was Hayward Field, which they shared with the track and field team. However, by the late 1950s, it had become apparent that Hayward Field was no longer suitable for the football team. It seated only 22,500 people, making it one of the smallest in the University Division (now Division I), and only 9,000 seats were available to the general public. While nearly every seat was protected from the elements, it had little else going for it. The stadium was in such poor condition that coaches deliberately kept prospective recruits from seeing it. As a result, the Ducks only played three home games per year on campus in most years; with the exception of the Civil War, the annual rivalry game with Oregon State, games that were likely to draw big crowds (against schools like Washington and USC) were played north in Portland at the larger Multnomah Stadium. With the recognition that the football team had outgrown the campus facility and with popular support to play the entire home schedule in Eugene for the first time in school history, Oregon athletic director Leo Harris led a campaign to build a new stadium on that the school had acquired for the purpose in the 1950s on his recommendation.
Designed by Skidmore, Owings & Merrill, the stadium was built within an artificial landfill (over the refuse) to eliminate the need for multilevel ramps. As a result, construction took just nine months and cost approximately $2.3 million. $250,000 was contributed by the Autzen Foundation, headed by Thomas E. Autzen (class of 1943), son of Portland lumberman and philanthropist Thomas J. Autzen (1888–1958), for whom the stadium was named. The elder Autzen was ironically an alumnus of Oregon archrival Oregon State University.
In 1967, Oregon hosted Colorado in Autzen Stadium's inaugural game, a 17–13 loss before 27,500 on September 23. Four weeks later on October 21, 16,000 saw Oregon's first win in the new facility; the 31–6 victory over Idaho was the only home win of the season.
The stadium alternates with Oregon State's Reser Stadium as host of the Civil War game.
Autzen hosted the inaugural Pac-12 Conference Championship game on December 2, 2011, as the Pac-12 North champion Ducks defeated the Pac-12 South champion UCLA Bruins.
Playing surface
Opened with natural grass in 1967, the field was switched to AstroTurf and lights were added for its third season in 1969. After seven years, it was replaced with new AstroTurf in 1976. Sand-based OmniTurf was installed in 1984 and 1991, and infilled NeXturf in 2001. The NeXturf was found to be overly slick when wet and lasted only one season, and was transferred to an intramural field. FieldTurf made its debut in Autzen in 2002, and was replaced in 2010.
With up to 8 feet (2.4 m) of gravel fill underneath the field, the original crown of the natural grass field was moderate, with the center of the field approximately one foot (0.30 m) higher than the sidelines. The crown was removed in 2010, and the surface is now flat.
Renovations
In 1982, a $650,000 meeting room complex, the Donald Barker Stadium Club, was opened on the east rim above the end zone. It gave the stadium its first meeting facilities, and was dedicated at the home opener in September.
A proposal to enclose the stadium within a dome was given serious consideration in 1985. New tax laws on contributions altered the feasibility, and the overall project was scaled back. In 1988, a $2.3 million renovation built a new press box on the south side of the stadium and converted the original north side press box to luxury suites. The renovation was designed by architecture firm Ellerbe Becket.
In 1995, the field was named Rich Brooks Field, after the Ducks' coach from 1977 to 1994. Brooks led Oregon to its first outright Pac-10 championship, and its first Rose Bowl appearance in 37 years, in his last season. Brooks left Oregon after the 1994 season to become head coach of the St. Louis Rams of the National Football League.
In 2002, a $90 million facelift and expansion added seating and luxury boxes to the south sideline, bringing the stadium seating capacity up to its current level.
In 2007, the large yellow "O" was added onto the south end of the stadium exterior when ESPN's College GameDay was on location. That season, "Gameday" originated two of its Saturday shows from Eugene.
In 2008, a new, high-definition LED scoreboard and replay screen—known as DuckVision or "Duckvision 2.0"—was installed; it replaced the original video screen installed prior to the 1998–1999 football season. It is the 39th largest video screen in the NCAA.
In 2010, the field was replaced with new FieldTurf that featured the new Pac-12 logo (even before the logo was officially revealed to the public). During the process, the crown was removed to make the field flat. In addition, new paneling was added to the walls surrounding the field.
In 2014, the east end-zone scoreboard was updated to include a digital screen, the addition of 150 flat screen monitors throughout the concessions areas, additional culinary options in the form of food trucks on the north side of the stadium, increased cell phone repeaters and an upgrade to the sound system. Additionally, the sideline wall graphics were updated from the new panels installed in the 2010 season.
Stadium records
The highest attendance at Autzen was 60,055 on October 15, 2011, when the Ducks beat Arizona State, 41–27. This stands as the second largest crowd for a sporting event in the state of Oregon, with the largest being the CART Portland 200 Champ car event in 1993 (63,000).
From 1997 to 2001, the Ducks had a 24-game home winning streak at Autzen Stadium, which ended with a 49–42 loss to Stanford.
In 2011, the USC Trojans defeated the Ducks 38–35, ending a 21-game home winning streak as the Trojans handed Chip Kelly his first loss at Autzen as head coach.
Attendance
Sellout. Conference Championship Game. Attendance Record. 1 – Thursday Night Game. 2 – Friday Night Game. 3 – ESPN's College GameDay.
Location and configuration
The stadium is located just north of the Willamette River, next to Alton Baker Park. Students typically walk to the stadium from the University of Oregon campus over the Autzen Footbridge, which passes over the Willamette, then through Alton Baker Park. The FieldTurf playing field is at an elevation of above sea level and is laid out in a non-traditional east-west orientation, slightly skewed so that players will not have the sun shining in their eyes in late fall.
Crowd noise
Autzen is known for its crowd noise. Due to the stadium's relatively small footprint, the fans are very close to the action, and the field is sunken. These factors contribute to the loudness of the stadium even though it is smaller than other 'noise comparable' stadiums. According to many in the Pac-12, from Oregon's resurgence in the mid-1990s until the most recent expansion in 2002, Autzen was even louder because the noise reverberated all the way up the stadium and bounced back down to the field—the so-called "Autzen bounce." Oregon officials say that any future expansions will trap more noise.
On October 27, 2007, during a 24–17 victory against the USC Trojans, a then-record crowd of 59,277 fans was recorded at 127.2 decibels. A similarly loud 31–27 upset of third-ranked Michigan in 2003 prompted Michigan Daily columnist J. Brady McCollough to write
Michigan coach Lloyd Carr later said that Autzen Stadium was the loudest stadium he'd ever been in.
In 2006, a Sporting News columnist named Autzen the most intimidating college football stadium in the nation.
Lee Corso of ESPN College Gameday frequently says, "Per person Autzen Stadium is the loudest stadium that I have ever been in my entire life!"
Longtime ABC sportscaster Keith Jackson called Autzen "Per square yard, the loudest stadium in the history of the planet."
Jahvid Best, a former starting running back for the Detroit Lions, visited Autzen while playing for the California Golden Bears in 2007. He later said, "The biggest thing I remember about that game is the crowd. The crowd noise is crazy up there. Honestly, any other away game I don't really even hear the crowd. Oregon was the only place where it really got on my nerves."
Following the September 6, 2014 game against the Michigan State Spartans, Michigan sports reporter Mike Griffin of MLive.com accused Oregon of piping in artificial noise that contributed to the Ducks' victory over the Spartans.
Traditions
Since 1990, Don Essig, the stadium's PA announcer since 1968, has declared that "It never rains at Autzen Stadium" before each home game as the crowd chants along in unison. He often prefaces it with the local weather forecast, which quite often includes some chance of showers, but reminds fans that "we know the real forecast..." or "let's tell our friends from (visiting team name) the real forecast..." If rain is actually falling before the game, Essig will often dismiss it as "a light drizzle", or "liquid sunshine" but not actual rain by Oregon standards. Also, because of the use of Autzen Stadium and the University of Oregon campus in National Lampoon's Animal House, the toga party scene of the movie featuring the song "Shout" is played at the end of the third quarter, with the crowd dancing to the song.
Prior to the football team taking the field, a highlight video of previous games is shown on the jumbotron, nicknamed "Duckvision". The last highlight on the clip is almost always Kenny Wheaton's game-clinching 97-yard interception return for a touchdown against the Washington Huskies in 1994. "The Pick" is often seen as the turning point for Oregon football, which went on to the Rose Bowl that year and have enjoyed success for the most part ever since after years of losing records.
After the video, the team takes the field behind a motorcycle with the Oregon Duck riding on back to the strains of Mighty Oregon. This is followed by the north side of the stadium chanting "GO" with the south side chanting "DUCKS!".
After every Duck score and win, a train horn blares. In addition, the Oregon Duck mascot does as many pushups as Oregon has points at that time.
ESPN College Gameday
ESPN's College GameDay program came to Eugene for games played in Autzen Stadium six straight years, from 2009 through 2014, the most of any other school during that period. Recently GameDay returned for a seventh time in 2018 against the Stanford Cardinal. Overall, GameDay has made eleven visits to Oregon, and the Ducks have been a part of 24 GameDay broadcasts, either at Autzen or as a visiting team. Oregon has the tenth most appearances, posting a record.
Other uses
Autzen Stadium is the largest sports arena in the state of Oregon. In 1970, the San Francisco 49ers defeated the Denver Broncos 23-7 in an exhibition game at Autzen Stadium in front of a crowd of 26,238.
State high school football championship games were played at Autzen Stadium until 2006. It also hosts football camps, coaches' clinics, marching band competitions, and musical concerts.
Nitro Circus Live was held at the stadium in 2016 and 2018.
Concerts
The Grateful Dead used the stadium as a tour stop ten times between 1978 and 1994, including a 1987 show with Bob Dylan during which a portion of their collaborative live album entitled Dylan & the Dead was recorded.
In Film
It was also used as the location for the fictional Faber College football stadium in the 1978 movie, National Lampoon's Animal House. There is a well-known geographical error made during a scene set inside the stadium when Pacific-10 conference banners can clearly be seen in the background, even though the fictional Faber College is supposed to be located in Tennessee as shown by the state flag in the hearing room for the Delta House probation case.
Soccer
On July 24, 2016, Autzen Stadium hosted a 2016 International Champions Cup match between Inter Milan and Paris Saint-Germain, which was won by Paris Saint-Germain by a score of 3-1.
See also
List of NCAA Division I FBS football stadiums
References
External links
– Official Autzen Stadium Website
Sports-Venue.com – Autzen Stadium – Info and Photos
Goducks.com – Official Autzen Stadium Information
Building Oregon: Architecture of Oregon and the Pacific Northwest includes images and documentation for University of Oregon buildings
College football venues
Oregon Ducks football venues
University of Oregon buildings
Skidmore, Owings & Merrill buildings
Sports venues in Eugene, Oregon
Sports venues completed in 1967
1967 establishments in Oregon |
57345610 | https://en.wikipedia.org/wiki/Rafay%20Baloch | Rafay Baloch | Rafay Baloch (, born 5 February 1993) is a Pakistani ethical hacker and security researcher known for his discovery of vulnerabilities on the Android operating system. He has been featured and known by both national and international media and publications like Forbes, BBC, The Wall Street Journal, and The Express Tribune. He has been listed among the "Top 5 Ethical Hackers of 2014" by CheckMarx. Subsequently he was listed as one of "The 15 Most Successful Ethical Hackers WorldWide" and among "Top 25 Threat Seekers" by SCmagazine. Baloch has also been added in TechJuice 25 under 25 list for the year 2016 and got 13th rank in the list of high achievers. Reflectiz, a cyber security company, released the list of "Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021" recognizing Rafay Baloch as the top influencer.
Personal life
Rafay Baloch attended Bahria University from which he obtained a Bachelor's degree in Computer Science. Baloch is currently placed in Hall of Fame of Bahria University.
Career
Baloch began his hacking career while he was still doing his bachelor's. He then wrote a book called "Ethical Hacking Penetration Testing Guide". He is the first Pakistani security researcher to be acknowledged by Google, Facebook, PayPal, Apple, Microsoft and many other international organizations. He has also written several papers on information security, namely "HTML5 Modern Day Attack Vectors", "Web Application Firewall Bypass", and "Bypassing Browser Security Policies For Fun And Profit".
Rafay Baloch has also served the Pakistan Telecommunication Authority as Cyber Security Advisor.
Bug bounty programs
Baloch has been active into bug bounty programs and has reported several critical vulnerabilities in several open source web applications as well as in bug bounty programs. Baloch found critical vulnerabilities in PayPal in 2012: he hacked into PayPal servers by exploiting a remote code execution vulnerability. He was rewarded $10,000 and a job offer to work for them as a Security Researcher that he refused as he was still doing his bachelor's at that time. HackRead, a news platform on InfoSec, listed him among “10 Famous Bug Bounty Hunters of All Time”. Baloch has also been awarded $5000 by Google and Firefox for baring the vulnerability in their browsers.
Browser security research
Baloch has actively reported several critical vulnerabilities in browsers. He started by finding Same Origin Policy (SOP) bypass in Android Stock browser which was initially rejected by Google; however, this was later verified by Google after researchers from Rapid7 verified it. This was coined as . Baloch followed by reporting several other SOP bypasses. Researchers at Trend Micro found this bug to be more widespread. It was later reported that hackers had been actively using Baloch's SOP bypass exploits for hacking into Facebook accounts. The SOP bypass bug was elevated by Rapid7 researcher Joe Vennix for conducting a remote code execution. Baloch also found several vulnerabilities affecting WebView which allowed an attacker to read local files as well as steal cookies from the user device. In October 2020, Baloch unveiled several address bar spoofing vulnerabilities affecting Apple Safari, Yandex, Opera Mini, UC Browser, Opera Touch, Bolt Browser and RITS browser. The vulnerability disclosure was coordinated by Rapid7 who gave 60 days timeline for patching vulnerabilities. Upon completion of 60 days, Baloch released the POC exploits of the affected browsers.
Apple Safari address bar spoofing controversy
In 2018, Baloch unveiled a crack in both Safari and Microsoft's Edge browser that paved the way for the URL of a safe website to be shown in the address bar while users were actually being taken to a different, and possibly malicious, website. Rafay Baloch identified the security issue and informed Apple and Microsoft in early June 2018. Microsoft fixed the issue within two months but Apple didn’t respond to Baloch's report despite of the deadline given of 90 days grace period so he made the details public. Rafay Baloch wrote in his article that an address bar can be used to easily breach someone’s privacy without them noticing it. The reason this is possible is because an address bar is the only reliable indicator for security in new browsers, as it displays the site’s URL and other details related to the webpage one is on.
Google no-patch policy discovery
In 2014, after Rafay Baloch and Joe Vennix reported Google about a bug that could allow hackers to dodge the Android Open Source Platform (AOSP) browser’s Same-Origin Policy (SOP), they discovered that Google had already terminated its support for WebView on Android devices running Android 4.3 or older versions, while putting the onus on OEMs and the open source security community to provide patches to users at the same time. Whereas Google’s official stance on WebView for older pre-Android 4.4 devices was as follows: “If the affected version [of WebView] is before 4.4, we generally do not develop the patches ourselves, but welcome patches with the report for consideration. Other than notifying OEMs, we will not be able to take action on any report that is affecting versions before 4.4 that are not accompanied with a patch.” Unfortunately, older versions of Android having unpatched WebView bugs were mainly due to their poor upgraded path, leaving users exposed.
Google then released WebView as a stand-alone application that could be updated separately from the Android version of a device. Simply put, the re-architecting of the WebView would benefit the latest versions of Android, Lollipop 5.0 and Marshmallow 6.0. But this option remains unavailable to anyone on an older version of the operating system.
On Google’s no-patch policy, Baloch shared his views with Zimperium, stating that “Google’s decision to not patch critical security bugs (pre-KitKat) anymore would certainly impact the vast majority of users. Security firms are already seeing attacks in the wild where users are abusing Same Origin Policy (SOP) bypass bug to target Facebook users.”
The Metasploit Framework, owned by Rapid7, contained 11 such WebView exploits that were need to be patched, most of which were contributions from Rafay Baloch and Joe Vennix.
References
Living people
1993 births
Computer security specialists |
39578309 | https://en.wikipedia.org/wiki/SimpleScreenRecorder | SimpleScreenRecorder | SimpleScreenRecorder is a Qt-based screencast software made for Unix operating systems, which was created as a simpler alternative to programs such as ffmpeg/avconv and VLC.
Features
SimpleScreenRecorder can capture a video-audio record of the entire computer screen or part of it, or records OpenGL applications such as video games directly. The program synchronizes the captured video and audio properly, reduces the frame rate of the video if the user's computer is too slow, and is fully multithreaded. Users can pause and resume recording by clicking a button or by pressing a hotkey. The program can also show statistics about the computer's performance during recording. The program allows users to select options for the screen capture such as 'Follow the cursor' and 'Record the cursor'. SimpleScreenRecorder can output video and audio into many final file container formats. These distinct video and audio encodings are also customizable. The resolution and frame rate of the resulting video may be set prior to recording, as may the audio quality of the video.
Comparison to other Screencast software
SimpleScreenRecorder has been described as the Fraps of Linux.
When recording openGL applications or games, SimpleScreenRecorder is capable of interjecting a library command upon launch to facilitate proper screen capture. SimpleScreenRecorder does not require a large disk-cache like glc, where glc requires a two-step process in order to create a final and playable multimedia file. ScreenRecorder encodes on the fly while the screen is being recorded, and a multimedia file can be 'saved' after the user clicks on a 'Save the recording' button.
See also
Comparison of screencasting software
Screencast
References
External links
Recording desktop or gaming audio
Recording Steam games
Project website on Github
Linux software
Screencasting software
Video software that uses Qt |
32411937 | https://en.wikipedia.org/wiki/Dartfish%20%28company%29 | Dartfish (company) | Dartfish is based in Fribourg, Switzerland. The company develops online and offline video software to enable users to view, edit and analyze videos for individual and corporate use. The company was founded in 1999 at the Swiss Institute of Technology EPFL and has offices in Atlanta, Georgia, USA; Sophia Antipolis, France; Sydney, Australia; Tokyo, Japan; and Seoul, Korea.
Products
Dartfish technology enables organizations to capture video, enrich the video content with graphics, text, voiceover, frame selection, data, and display the content to online audience. Products include:
DARTFISH.TV: Interactive WEB 2.0 video-on-demand platform
Breakthrough sport training software solution
Numerous breakthrough apps (IOS and Android)
Exclusive Broadcast footage
History
Dartfish was founded in 1999 as InMotion Technologies, Ltd to commercially develop SimulCamTM and other digital imaging applications. SimulCamTM technology was followed by StroMotionTM, in January 2001.
In February 2001, Dartfish opened an office in Atlanta, Georgia. In November 2001, Dartfish Korea offices opened in Seoul.
In December 2003, Dartfish entered a distribution agreement in Japan and Dartfish Japan was created.
In January 2004, Dartfish entered a distribution agreement with South America in Chile. Five months later, Dartfish launched its third version (3.0) of the Dartfish software. In November 2004, Dartfish created a new subsidiary in France to distribute its software. In June 2005, Dartfish launched version 4.0 of the software.
In October 2006, a Dartfish subsidiary was created in the UK.
In April 2007, Dartfish launched Version 4.5 and Dartfish Connect Plus.
In June 2007, Dartfish entered distribution agreements with Moscow, Russia and Prague, Czech Republic.
In April 2008, Dartfish launched its new content platform DartfishMoves.com. Five months later, Dartfish launched Dartfish.TV-a platform that allows users to film, edit, publish, and share videos.
In January 2009, Dartfish launched version 5.0 of its software, to offer HD video technology. Four months later Dartfish entered a distribution agreement with São Paulo, Brazil. In September 2009, Dartfish launched version 5.5 to enhance publishing on Dartfish.TV, create new video clips and supported new video formats and technical enhancements.
In January 2010, Dartfish entered distribution agreements with Athens, Greece.
In March 2011, Dartfish launched a new version of its Dartfish.TV content platform to enable users to navigate by events or segments and tag events online.
Technical Details
Dartfish.TV is an integrated solution across multiple platforms (software, online, mobile) that allows users to capture videos, tag events real-time, and upload, organize and share the videos via Dartfish TV channel. Tagging enables users to bookmark specific events or series of events in their videos so that users including coaches, athletes and corporate managers can identify specific stats or important moments in the video and directly navigate or share the moments.
Dartfish Software is used by athletic coaches to break down and analyze the movements as well as categorize videos to create an index of events (e.g. pass goal, player, etc.). The software uses digital video graphics to deliver instant visual feedback.
Also, it is reported that it can improve processes and performance, trainings, risk management and HR functions.
Use
Dartfish software supported the athletes who won 400 medals during the Olympic Games in 2012 and helped to prepare the U.S. team in the 2011 Davis Cup. Its network of users includes major league sports teams, Olympic committees from many nations, federations, colleges and universities, high schools, prep schools, branches of military, industry and professionals, as well as athletes and students of all levels in numerous academic fields.
Recognition
2006 winner of the Korean Culture and Sports Ministry competition for identifying innovative, high-value added sports service business with its proposal, Customized Online Prescription of Physiotherapy
2005 Emmy winner for The George Wensel Outstanding Innovative Technical Achievement Award
1999 European IST Prize Winner (InMotion)
References
Software companies of Switzerland
Video software |
18380041 | https://en.wikipedia.org/wiki/Hackerspace | Hackerspace | A hackerspace (also referred to as a hacklab, hackspace, or makerspace) is a community-operated, often "not for profit" (501(c)(3) in the United States), workspace where people with common interests, such as computers, machining, technology, science, digital art, or electronic art, can meet, socialize, and collaborate. Hackerspaces are comparable to other community-operated spaces with similar aims and mechanisms such as Fab Lab, men's sheds, and commercial "for-profit" companies.
History
Hackerspaces with open membership became common throughout Germany in the 1990s in the orbit of the German Chaos Computer Club (CCC), with the c-base being probably an example. The concept, however, was limited to less than a dozen spaces within Germany, and did not spread beyond borders at first. Most likely this was because initial founding costs were prohibitive for small groups without the support of a large organization like the CCC. From 1997, Chicago's Autonomous Zone Infoshop hosted "Unscrew U", an early hacking and repair program that met weekly.
In 2006 Paul Böhm came up with a fundraising strategy based on the Street Performer Protocol to build Metalab in Vienna, Austria, and became its founding director. In 2007 he and others started Hackerspaces.org, a wiki-based website that maintains a list of many hackerspaces and documents patterns on how to start and run them. the community list included 1967 hackerspaces with 1199 active sites and 354 planned sites.
The advent of crowdfunding and Kickstarter (founded 2009) has put the tools required to build hackerspaces within reach of an even wider audience. For example, Bilal Ghalib (who had previously worked on a hackerspace documentary) and others used such tools to bring the hackerspace concept to the Middle East.
Worldwide, a large number of hackerspace or makerspace facilities have been founded. Nicole Lou and Katie Peek reported that from 2006 to 2016 the number of active or planned spaces increased to 1,393, fourteen times as many as in 2006.
The US federal government has started adopting the concept of fully open makerspaces within its agencies , the first of which (SpaceShop Rapid Prototyping Lab) resides at NASA Ames Research Center.
Activities
In general, hackerspaces function as centers for peer learning and knowledge sharing, in the form of workshops, presentations, and lectures. They usually also offer social activities for their members, such as game nights and parties. Hackerspaces can be viewed as open community labs incorporating elements of machine shops, workshops, and/or studios where hackers can come together to share resources and knowledge to build and make things.
Many hackerspaces participate in the use and development of free software, open hardware, and alternative media. They are often physically located in infoshops, social centers, adult education centers, public schools, public libraries, or on university campuses, but may relocate to industrial or warehouse space when they need more room.
Most recent studies of hackerspace in China—where Internet access is heavily censored—suggest that new businesses and organized tech conferences there serve to intervene in the status quo "from within". The first hackerspace in China, Xinchejian, opened in Shanghai in 2010. Thereafter a network of hackerspaces emerged, nourishing an emerging maker culture. By designing open technologies and developing new businesses, Chinese makers make use of the system, make fun of it, altering it and provoking it. DIY makers often bring and align contradictory ideas together, such as copycat and open source, manufacturing and DIY, individual empowerment and collective change. In doing so, they craft a subject position beyond the common rhetoric that Chinese citizens lack creativity. As a site of individual empowerment, hackerspace and DIY making enable people to remake the very societal norms and material infrastructures that undergird their work and livelihood.
Facilities
The specific tools and resources available at hackerspaces vary from place to place. They typically provide space for members to work on their individual projects, or to collaborate on group projects with other members. Hackerspaces may also operate computer tool lending libraries, or physical tool lending libraries, up to and including creative sex toys in some instances.
The building or facility the hackerspace occupies provides physical infrastructure that members need to complete their projects. In addition to, most hackerspaces provide electrical power, computer servers, and networking with Internet connectivity. Well-equipped hackerspaces may provide machine tools, sewing, crafting, art fabrication, audio equipment, video projectors, game consoles, electronic instrumentation (such as oscilloscopes and signal generators), electronic components and raw materials for hacking, and various other tools for electronics fabrication and creating things. Specialized large-format printers, 3D printers, laser cutters, industrial sewing machines, or water jet cutters may be available for members to use. Some hackerspaces provide food storage and food preparation equipment, and may teach courses in basic or advanced cooking.
Organization
The individual character of a hackerspace is determined by its members. There is a lot of variety in how hackerspaces are organised.
Some hackerspaces are governed by elected boards selected by active members in good standing. Elected officers may serve predetermined terms, and help direct decision-making with regards to purchasing new equipment, recruiting new members, formulating policy, conforming to safety requirements, and other administrative issues. London Hackspace, for example, is governed by an elected board of trustees.
Others, such as Open Garage, are led by a single Benevolent Dictator For Life (BDFL). This is a common governance structure for hackerspaces which are founded by a single person on their own property.
There are also more anarchist governance models such as a Do-ocracy, in which people receive the authority over a task by doing it. This model is often combined with other structures such as elected boards or consensus-driven meetings, as is the case in Noisebridge.
Membership fees are usually the main income of a hackerspace, but some also accept external sponsors. Some hackerspaces in the US have 501(c)3 status (or the equivalent in their jurisdiction), while others have chosen to forgo tax exempt status. University-affiliated hackerspaces often do not charge an explicit fee, but are generally limited to students, staff, or alumni, although visiting guests from other hackerspaces are usually welcome. Some hackerspaces accept volunteer labor in lieu of membership fees, especially from financially limited participants. In addition, some hackerspaces earn income from sponsoring and staffing high-tech flea markets, where members of the general public may buy and sell new and used equipment and supplies.
There is a loose, informal tradition at many hackerspaces of welcoming visitors from other similar organizations, whether across town or internationally. Free exchange of ideas, skills, and knowledge are encouraged, especially at periodic gatherings sometimes called "build nights" or "open house" days.
Hackerspaces and makerspaces are increasingly being included as learning spaces in schools, learning commons, and other educational facilities.
Ethic
Hackerspaces are widely defined on hackerspaces.org as “community-operated physical places, where people can meet and work on their projects”. The exact functioning of the space varies from place to place and is determined by its members and while there is no blueprint or set of guidelines to create a hackerspace, they generally follow a “hacker ethic”, which “include freedom, in the sense of autonomy as well as of free access and circulation of information; distrust of authority, that is, opposing the traditional, industrial top-down style of organization; embracing the concept of learning by doing and peer-to-peer learning processes as opposed to formal modes of learning; sharing, solidarity and cooperation”.
Hackerspaces have also been described as physical manifestations of the peer production principles.
Equity and justice-centered making
Large opportunity gaps in science and engineering (STEM) persist for youth growing up in poverty, and in particular for African American and Latino youth, and have become a focus of STEM-rich Making. The evolving maker movement has generated interest for its potential role in opening up access to learning and attainment in STEM, with advocates arguing for its “democratizing effects" – with access to a makerspace, “anyone can make… anyone can change the world”. Makerspaces potentially offer opportunities for young people to engage in STEM knowledge and practices in creative and playful ways, where “learning is and for the making”.
However, an explicit equity-agenda has been fairly absent in the maker movement, especially as it relates to sustained engagement in making. The movement remains an adult, white, middle-class pursuit, led by those with the leisure time, technical knowledge, experience, and resources to make. Even with the growth of community-based makerspaces, users of these spaces tend to be white adult men. The median salary for those involved in the maker movement in the US is $103,000, with 97% of those who go to Maker Faires having college degrees (and 70% have graduate degrees). Only 11% of the contributions to Make Magazine (the periodical credited with launching the Maker Movement) are female. Thus, as the maker movement has become formalized, the powerful knowledge and practices of communities of color or of low-income communities have not yet become central to its discourse.
Emerging research has begun to address how the maker movement might address equity concerns broadly. There is recent research in this area, which is challenging the field to consider new directions in the design of maker spaces, in maker space programming and pedagogies, and in how to make sense of the outcomes of making. These include: 1) Expanding what counts as making; 2) Design of makerspaces that foster an open, flexible and welcoming atmosphere to youth; 3) Maker space programs and pedagogies that support an equitable culture of making, the incorporation of participants’ cultural knowledge and practices, a focus on new literacies; and valuing multiple iterations and failing-forward; and 4) Expanding the outcomes of making to include agency, identity, and the after-life of maker projects. Cutting across these areas are specific attention to gender and computer science, indigenous epistemologies and maker activities, and how makerspaces may ground STEM-rich making in the lived experiences and wisdom of youth of color and their families and communities.
One emerging area of studies examines the production of an equitable culture in making, including in-depth longitudinal cases of youth makers in community settings, how youth and community co-design for equitable learning opportunities and outcomes.
Difficulties and critique
Hackerspaces can run into difficulties with building codes or other planning regulations, which may not be designed to handle their scope of activities. For example, a new hackerspace in Nashua, New Hampshire, was shut down by the city after an inspection in 2011. The main issues involved ventilation of heat and toxic fumes; the space was reopened after improvements were made to the building.
The difficulties with opening hackerspaces and makerspaces within non-profit organizations, such as schools and public libraries include cost, space, liability, and availability of personnel. Many makerspaces struggle to sustain viable business models in support of their missions.
Hackerspace culture may have more demonstrable challenges than the spaces themselves. For more, see: Maker Culture#Criticisms.
In 2009, Johannes Grenzfurthner published the much debated pamphlet "Hacking the Spaces", that dealt with exclusionist tendencies in the hackerspaces movement. Grenzfurther extended his critique through lectures at the 2012 and 2014 Hackers on Planet Earth conferences in New York City.
Notable hackerspaces
Over the years, many hackerspaces have grown significantly in membership, operational budgets, and local media attention. Many have also helped establish other hackerspaces in nearby locations.
c-base (1995) from Berlin is recognized as one of the first independent, stand-alone hackerspaces in the world, not affiliated with a school, university, or company. Wired writes that "European groups, particularly in Germany, have a long tradition of this kind of activity". Another known German hackerspace is RaumZeitLabor, organizer of Trollcon.
The Geek Group, formed in 1994, was a budding nonprofit hackerspace in Grand Rapids, Michigan that had a large following and internet presence. There were various chapters around the United States. Their main focus was as an opensource hackerspace to increase STEM education accessibility and one day become an accredited institution of higher education.
Metalab, founded in 2006, is generally considered to have pioneered the funding principles that enabled rapid spread of the concept.
TechShop was the first chain of commercial hackerspaces. It was launched in October 2006. , there were six TechShop locations in the US: three in California and one each in North Carolina, Michigan, and Texas, the last a partnership with the Lowe's home improvement chain. , the company had declared bankruptcy, with plans for reorganization or liquidation to be announced.
In August 2007, a group of North American hackers visited Europe "to get a sense for the potential of European 'hacker spaces'", and upon their return, the groups NYC Resistor and HacDC were set up in late 2007, with Noisebridge following in fall 2008.
RevSpace is a Dutch hackerspace founded in 2009. A regular of its IRC channel perpetrated a DDoS attack on VISA and MasterCard in 2010.
Dallas Makerspace (DMS) was founded by members of the Dallas Personal Robotics Group (DPRG) in 2010. As of summer of 2017, it has a paying membership base of 1500, "making it one of the largest, if not the largest, nonprofit, volunteer-run makerspaces in the country" according to Dallas Morning News.
The first Chinese hackerspace Xinchejian was established in Shanghai in the fall of 2010. Thereafter hackerspaces have grown in numerous cities including Beijing, Shenzhen, Ningbo, Hangzhou and Guangzhou. Chinese makers became internationally visible when the first Maker Carnival was hosted in Beijing in 2012.
GET City Innovations is a Community-based maker space in Lansing Michigan, where youth work year-round to design and prototype STEM-rich making solutions to local community concerns. The program is free and open to all youth through the community center, and foregrounds youth's rich cultural knowledge and wisdom in their making efforts.
Columbus Idea Foundry moved into a 65,000-square-foot factory in Columbus Ohio on May 22, 2014. By one account, it is "the country's largest such space".
The NASA Ames SpaceShop Rapid Prototyping Lab was developed as the first open makerspace within the US Federal Government. Located at NASA Ames Research Center, the facility has trained thousands of Federal employees on emerging rapid-prototyping equipment.
Artisan's Asylum (Somerville, Massachusetts), was once believed to be the largest makerspace in the world.
the Verstehbahnhof in Fürstenberg (Havel) station is an example of a makerspace in a rural German town with a declining population. Daniel Domscheit-Berg is one of the principal contributors to this space.
Variations
A lot of places share values similar to those purported by hackspaces, whether or not they use that nomenclature. A few examples follow:
Public library hackerspaces
Public Libraries have long been a place to share resources for learning. Lately some have reconsidered their roles to include providing resources for hacking and making. Those generally call themselves Library makerspaces. For example, Chattanooga's 4th floor may have been the first use of a library as laboratory and playground for its community. The User Experience (UX) is another public laboratory and educational facility. Or according to Forbes, the first public library to open a MakerSpace is the Fayetteville Free Library.
Men's sheds
There are over 1,000 active men's sheds in Australia, Scotland, England, Ireland, Finland, and Greece, . Instead of seeing themselves as "hackers" they describe themselves as "shedders" and their activities as "shedding". The Men's Sheds Movement is many ways parallel hackerspaces in their aims; although open to anyone regardless of age or gender, they tend to advertise themselves as "men in sheds". In some ways they can be seen as the flip side of working men's clubs, as their community is drawn from a similar age group and their original aims are similar: to provide recreation and education for working class men and their families.
Feminist hackerspaces
In response to the misogyny allegedly shown by the brogrammer culture that sees hackerspaces as "male" spaces, Seattle Attic was founded in the summer of 2013, as the first Feminist Hackerspace in the United States. They were soon followed by Double Union, in San Francisco. Their founding came as a result of The Ada Initiative, and their AdaCamp conferences. Which has also led to the formation of FouFem in Montreal, the Mz Baltazar's Laboratory, a start-up organization and feminist hackspace in Vienna, the Anarchafeminist Hackerhive in San Francisco, the Hacktory in Philadelphia and the Miss Despionas in Tasmania, Australia, and myriad others.
Public school maker/hackerspaces
Some public schools in the US now also include hackerspaces. The first high school to open a true MakerSpace was in Sebastopol, California, and middle schools followed the trend. For example, White Hill Middle school in Fairfax, California has now opened up their own MakerSpace with a class called "Makers and Hackers". In 2018 Penketh High School became the first school to have a school makerspace in the United Kingdom. "Spark" was designed for students and the community being the first of its kind in the UK.
In Shenzhen, China SteamHead makerspace organized a school makerspace inside Shenzhen American International School in 2014, and SZ DIY makerspace organized a school makerspace inside Harbour School.
Fab labs
Fab labs are spaces (part of a network initiated by MIT's Center for Bits and Atoms) whose goal is to enable people to "make (almost) anything". They focus heavily on digital fabrication tools.
Community spaces
There are many community art spaces share values with hackerspaces. Some, like AS220 and Haystack Mountain School of Crafts have embraced Fab lab structures to expand the range of media represented in their spaces to include digital fabrication tools. There are also community-based makerspaces focused on open-access to allow community members to address community-based problems. From a justice perspective, the open access is important because many makerspaces are pay-to-play. Examples of community-based making spaces include GET City and Mt Elliot, both in Michigan.
University maker/hackerspaces
Universities around the world have at different rates embraced educational possibilities of these spaces. Makerspaces provide colleges and universities with an inspirational environment where innovative connections between technology and curriculum can be utilized for experiential teaching and learning activities MIT has pioneered the Fab lab movement and implementation of similar spaces in universities around the world. Non-Fab-Lab-associated Maker and Hackerspaces are also common. Wheaton College is one school pioneering new Hacker and Maker curriculums and spaces, as is Yale University with spaces like its "CEID". Franklin W. Olin College of Engineering has also pioneered Makerist and Hacker curriculum to great success. The Bioengineering Department at the University of Pennsylvania's School of Engineering and Applied Science combines their educational lab space with an open Bio-MakerSpace in their George H. Stephenson Foundation Educational Laboratory & Bio-MakerSpace (or Biomakerspace), encouraging a free flow of ideas, creativity, and entrepreneurship between Bioengineering students and students throughout the university. William & Mary is rapidly expanding their makerspace resources to include engineering spaces for all undergraduate & graduate degrees as part of their new Coll curricula.
Tool library
Tool libraries generally lack a shared space for making or hacking things, but instead serve as a repository of tools people can borrow for use in their own respective spaces.
Repair cafe / clinic
"Repair cafés" are semipermanent places where people can come together to teach and learn how to fix things. "Repair clinics" are pop-up events without permanent facilities, though they are often sponsored by organizations such as public libraries, schools, or universities. The emphasis is on basic DIY repairs rather than building new things, but there is a similar informal atmosphere of exploration and learning new skills.
Bicycle coops
Bicycle cooperatives are places where people can build or fix bicycles.
Cooking makerspace
A place where anyone can use different professional kitchen equipment and try culinary experiments.
See also
Hacker culture
Hackerspace Global Grid
Maker culture
Maker Faire
Tinkering School
References
External links
HackerspaceWiki – Global hackerspace database and resource
Computer clubs
DIY culture
Educational facilities
Hacker culture |
769273 | https://en.wikipedia.org/wiki/Open%20proxy | Open proxy | An open proxy is a type of proxy server that is accessible by any Internet user.
Generally, a proxy server only allows users within a network group (i.e. a closed proxy) to store and forward Internet services such as DNS or web pages to reduce and control the bandwidth used by the group. With an open proxy, however, any user on the Internet is able to use this forwarding service.
Advantages
An anonymous open proxy is useful to those looking for online anonymity and privacy, as it can help users hide their IP address from web servers since the server requests appear to originate from the proxy server. It makes it harder to reveal their identity and thereby helps preserve their perceived security while browsing the web or using other internet services. Real anonymity and extensive internet security might not be achieved by this measure alone as website operators can use client-side scripts to determine the browser's real IP address and the open proxy may be keeping logs of all connections.
Most public VPNs work through open proxies.
Disadvantages
It is possible for a computer to run as an open proxy server without the computer's owner knowing it. This can result from misconfiguration of proxy software running on the computer, or from infection with malware (viruses, trojans or worms) designed for this purpose. If it is caused by malware, the infected computer is known as a zombie computer.
Testing for access from an open proxy
Because open proxies are often implicated in abuse, a number of methods have been developed to detect them and to refuse service to them. IRC networks with strict usage policies automatically test client systems for known types of open proxies. Likewise, a mail server may be configured to automatically test mail senders for open proxies, using software such as proxycheck.
Groups of IRC and electronic mail operators run DNSBLs publishing lists of the IP addresses of known open proxies, such as AHBL, CBL, NJABL (till 2013), and SORBS (since 2002).
See also
Anonymizing proxy
Open mail relay
References
External links
Internet security
Proxy servers
es:Proxy#Proxy Abierto
pt:Proxy#Proxy abreto |
16476347 | https://en.wikipedia.org/wiki/4832%20Palinurus | 4832 Palinurus | 4832 Palinurus is a Jupiter trojan from the Trojan camp, approximately in diameter. It was discovered on 12 October 1988, by American astronomer Carolyn Shoemaker at the Palomar Observatory in California. The dark D-type asteroid belongs to the 90 largest Jupiter trojans and has a short rotation period of 5.3 hours. It was named after Aeneas' navigator, Palinurus, from Greek mythology.
Orbit and classification
Palinurus is a Jovian asteroid in the so-called Trojan camp, located in the Lagrangian point, 60° behind Jupiter, orbiting in a 1:1 resonance with the Gas Giant . It is also a non-family asteroid of the Jovian background population.
It orbits the Sun at a distance of 4.5–6.0 AU once every 12 years and 1 month (4,416 days; semi-major axis of 5.27 AU). Its orbit has an eccentricity of 0.14 and an inclination of 19° with respect to the ecliptic. The body's observation arc begins at Palomar in September 1988, one month prior to its official discovery observation.
Physical characteristics
In the SDSS-based taxonomy, Palinurus is a dark D-type asteroid. Pan-STARRS' survey has also characterized it as a D-type, which is the most common spectral type among the larger Jupiter trojans. It has a high V–I color index of 1.00.
Rotation period
In July 2010, a rotational lightcurve of Palinurus was obtained during eight consecutive nights by Italian astronomer Stefano Mottola at the Calar Alto Observatory in Spain. Lightcurve analysis gave a rotation period of hours with a brightness variation of 0.09 magnitude ().
In January 2015, photometric observations by Robert Stephens at the Center for Solar System Studies in Landers, California, determined a period of hours with an amplitude of 0.16 magnitude based on a fragmentary lightcurve ().
Diameter and albedo
According to the survey carried out by the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer, Palinurus measures 52.06 kilometers in diameter and its surface has an albedo of 0.071,
while the Collaborative Asteroid Lightcurve Link assumes a standard albedo for a C-type asteroid of 0.057 and calculates a similar diameter of 53.16 kilometers based on an absolute magnitude of 10.1.
Naming
This minor planet was named by the discoverer from Greek mythology after Palinurus, the great helmsman of Aeneas's ship. After the fall of Troy in the Trojan War, he led the rest of the Trojan fleet to Carthage, Sicily, and finally to Italy. The official naming citation was published by the Minor Planet Center on 25 August 1991 ().
Notes
References
External links
Asteroid Lightcurve Database (LCDB), query form (info )
Dictionary of Minor Planet Names, Google books
Discovery Circumstances: Numbered Minor Planets (1)-(5000) – Minor Planet Center
Asteroid 4832 Palinurus at the Small Bodies Data Ferret
004832
Discoveries by Carolyn S. Shoemaker
Minor planets named from Greek mythology
Named minor planets
19881012 |
35906547 | https://en.wikipedia.org/wiki/SIOS%20LifeKeeper | SIOS LifeKeeper | SIOS LifeKeeper (formerly known as SteelEye LifeKeeper) is a high-availability cluster software, for Linux computer systems. It provides application cluster capabilities for nonstop operation and disaster recovery to systems running databases, file sharing on a network, electronic commerce websites, ERP systems or other applications requiring nonstop operation
It was originally designed and developed by AT&T Bell Labs in 1992 to ensure high availability of their worldwide voice network system running on Unix-based Star Servers. After AT&T divested the LifeKeeper division to NCR, SteelEye acquired the technology in 1999. SteelEye was later renamed SIOS Technology Corp. in 2006, after being acquired by SIOS Technology, Inc.
Description
High availability clusters (HAC) improve application availability by failing them over or switching them over in a group of systems—as opposed to High Performance Clusters, which improve application performance by running them on multiple systems simultaneously. SIOS LifeKeeper provides continuous monitoring of the entire application stack and will recover a service or application locally or on another cluster node at the same site or another geographic location. It supports all major Linux distributions and accommodates a wide range of storage architecture. SIOS clustering software synchronizes local storage on all cluster nodes creating a cluster in a cloud where shared storage is not available. SIOS LifeKeeper is SAP-certified for SAP NetWeaver and SAP S/4HANA to monitor the critical services and automatically apply SAP best practices for nonstop operation of critical SAP environments.
Similar products include Fujitsu PRIMECLUSTER, IBM HACMP, HP ServiceGuard, IBM Tivoli System Automation for Multiplatforms (SA MP), Linux-HA, Microsoft Cluster Server (MSCS), NEC ExpressCluster, Red Hat Cluster Suite, Veritas Cluster Server and Sun Cluster.
In 2009, the company launched a program enabling users of HP ServiceGuard, which HP stopped selling that year, to migrate to the LifeKeeper for Linux product. LifeKeeper has won the Best Clustering Solution Award at LinuxWorld on several occasions.
See also
High-availability cluster
Sun Cluster
Computer cluster
References
External links
High-availability cluster computing
Cluster computing
1992 software |
38981712 | https://en.wikipedia.org/wiki/Code%20cave | Code cave | A code cave is a series of unused bytes in a process's memory. The code cave inside a process's memory is often a reference to a section that has capacity for injecting custom instructions.
Common uses
The concept of a code cave is often employed by hackers and reverse engineers to execute arbitrary code in a compiled program. It can be a helpful method to make modifications to a compiled program in the example of including additional dialog boxes, variable modifications or even the removal of software key validation checks. Often using a call instruction commonly found on many CPU architectures, the code jumps to the new subroutine and pushes the next address onto the stack. After execution of the subroutine a return instruction can be used to pop the previous location off of the stack into the program counter. This allows the existing program to jump to the newly added code without making significant changes to the program flow itself.
Advantages
Easy and fast – This means the modification process is fast and easy. When modifying the existing code with tools such as Ollydbg, the added functions can be assembled and tested without any external dependencies.
No need for source – Using code caves can be extremely efficient even if there is no source code provided for the programmer. This allows for the programmer to make adjustments such as adding or removing functions in the code without having to rewrite the entire program or link any external dependencies into an existing project.
Disadvantages
Easy to break the program – In many cases the executable file is modified. This means that there may not be an existing code cave in the existing script for any code injection due to the lack of resources provided in script. Any replacement of the existing script may lead to program failure/crash.
Lack of versatility – Injecting code into an existing script means that the limited space given only allows for simple instruction modifications and the language used is only assembly. This can be mitigated by the use of shared library injectors (DLL injection [Windows] or LD_PRELOAD [Linux]) such that the injected library contains already compiled code and existing instructions in the target binary are simply modified to use it.
Tools
pycave: Simple tool to find code caves in Portable Executable (PE) files.
Ollydbg: a debugger for code analysis. It traces the script calls and executes, as well as displays any iterations in the libraries and binaries. Code can be injected or removed into/from the EXE file directly with this debugger.
PE: Explorer: it allows a user to open and edit executable files called PE files (portable executable files). This includes .EXE, .DLLs and other less common file types.
Cheat Engine: a powerful tool that reads process memory and writes process memory. This means any client-side data values can be changed and edited. It also can display changes in the values.
TSearch: a powerful tool that reads process memory and writes process memory. Like Cheat Engine, it can change client-side values data.
References
External links
Code cave explanation in German
Process (computing)
Threads (computing)
Software cracking |
11802205 | https://en.wikipedia.org/wiki/Patrick%20Chinamasa | Patrick Chinamasa | Patrick Antony Chinamasa (born 25 January 1947) is a Zimbabwean politician who served in the government of Zimbabwe as the minister of various cabinet ministries. Previously he served as the Minister of Finance and Investment Promotion and the Minister of Justice, Legal and Parliamentary Affairs.
On 9 October 2017, he was appointed as Minister of the newly created Ministry of Cyber Security, Threat Detection and Mitigation. On 27 November 2017, Emmerson Mnangagwa, who succeeded Robert Mugabe as President of Zimbabwe following the 2017 Zimbabwean coup d'état, appointed Chinamasa as the nation's acting Finance Minister. He was substantively returned to his portfolio as Minister of Finance and Economic Development in Mnangagwa's first cabinet on 30 November 2017.
He made headlines across Zimbabwe in June 2018 after officially opening a rubbish metal bin fully strapped with ribbons. A move seen by many people as ridiculous.
Political career
A leading member of the ruling ZANU–PF party, Chinamasa became first deputy Agriculture Minister, and then Attorney General of Zimbabwe; he also has held the role of Leader of the Zimbabwean Parliament.
Following his appointment, many Zimbabwean judges resigned, complaining of political pressure. On 9 February 2001 after Chief Justice Anthony Gubbay took early retirement at his suggestion, Chinamasa held meetings with senior Justices Ahmed Ebrahim and Nicholas McNally (the last white justice on the Zimbabwean Court), and told them for their own safety to leave.
In 2002, following what Chinamasa considered lenient conviction of three American citizens caught and convicted of smuggling arms in an aircraft, Zimbabwean High Court judge Fergus Blackie brought successful charges against Chinamasa for a conviction of "scandalising the court." Chinamasa had Blackie immediately arrested on charges of "corruption," on the grounds of having decided the case of a white woman improperly (on the basis of an alleged adulterous relationship and racist bias), and without the support of the other judge that was sitting with him on the matter. After the case closed, Chinamasa declared various NGO's illegal, including leading Human Rights organisation the Amani Trust which provides support to victims of torture; and was reportedly accused of working with the British government to unseat President Robert Mugabe and destabilise the nation.
In 2003, Chinamasa was placed on European Union and United States sanctions lists.
On 17 December 2004, Chinamasa, who had been the Secretary for Legal Affairs of ZANU PF, was removed from the party's Politburo. In 2005, Chinamasa was ejected from his post as Justice Minister; however, six months later he was returned to the post.
In September 2006, Chinamasa was cleared by a judge of trying to pervert the course of justice. Chinamasa was accused of trying to stop a prosecution witness, James Kaunye, from testifying in a case against the Minister of State for National Security, Didymus Mutasa, who had been accused of inciting public violence.
He is among a host of individuals not allowed to travel to the USA because the USA government feels he has worked to undermine democracy in Zimbabwe.
Chinamasa and Labour Minister Nicholas Goche met with Tendai Biti (MDC-T) and Welshman Ncube (MDC-M), Secretaries General of their respective Movement for Democratic Change factions, in Pretoria, South Africa on 16 June 2007. South African President Thabo Mbeki, appointed by the Southern African Development Community, presided over the negotiations which sought to end economic sanctions on Zimbabwe.
Chinamasa was nominated as ZANU–PF's candidate for the House of Assembly seat from Makoni Central in the March 2008 parliamentary election, but he was defeated. Chinamasa received 4 050 votes against 7,060 for John Nyamande of the Movement for Democratic Change (MDC).
Within ZANU-PF, Chinamasa has been seen as an ally of Emmerson Mnangagwa since 2004. As of 2008, Chinamasa is the Chairman of ZANU PF's Information and Publicity Sub-Committee, and in that capacity he acted as spokesman for ZANU PF in the period following the 2008 presidential and parliamentary election. In this respect, he was viewed as taking over the roles of Minister of Information and Publicity Sikhanyiso Ndlovu and ZANU–PF Secretary for Information and Publicity Nathan Shamuyarira.
Along with Goche, Chinamasa was one of the negotiators sent by ZANU–PF to the talks between political parties that began in Pretoria on 10 July 2008, following Mugabe's disputed re-election.
Chinamasa was appointed to the Senate by Mugabe on 25 August 2008. On 7 January 2009, The Herald reported that Chinamasa had been appointed as Acting Minister of Finance following the dismissal of Samuel Mumbengegwi, who no longer held a seat in Parliament. In this position, Chinamasa took a historic step in the ongoing hyperinflation crisis in Zimbabwe, announcing that all Zimbabweans would be allowed to conduct business in any currency as of the end of January 2009.
When the ZANU-PF–MDC national unity government was sworn in on 13 February 2009, Chinamasa was retained as Minister of Justice.
Following Mugabe's victory in the July 2013 presidential election, he moved Chinamasa to the post of Minister of Finance on 10 September 2013.
Later, Patrick Chinamasa was moved to a newly created ministry of Cyber Security in 2017. The Ministry of Cyber Security, Threat Detection and Mitigation was announced and initiated by President Robert Mugabe in October 2017 to address the challenges of new generation of technologies. Patrick was reassigned to the role of Minister of Cyber Security, Threat Detection and Mitigation where he led efforts to ensure cybersecurity through various end points.
In 2017, when Zimbabwe's new president Emmerson Mnangagwa took over, he named Patrick Chinamasa as the acting Finance Minister until the appointment of a new cabinet and minister.
Farms
In February 2003, Chinamasa sent the police to arrest Peter Baker, a white farmer who had refused to vacate his farm, Rocklands, in favour of the Minister, after successfully challenging its seizure in court. Eight months after the seizure, the farm's water supply has been squandered, undermining its future productivity and that of the neighbouring farms.
In September 2003, white farmer Richard Yates was evicted from his 800-hectare tobacco farm Tsukumai Farm at Headlands, located east of Harare. Although Chinamasa paid some compensation, Yates is still awaiting final payment and said that he considers the farm his in an interview with the Daily Telegraph. The following year his wife Monica won the Zimbabwean Tobacco grower of the year award, together with a Z$24million prize and trophy as the 2004/2005 top grower at a ceremony in Harare on 29 July. British MP Kate Hoey, who made a fact-finding visit to Zimbabwe earlier in the year, said the award was shocking: "It is like someone stealing a race horse and winning the Grand National." As a result, London based British American Tobacco came under pressure to stop its Zimbabwean associate company sponsoring the award, which it did the following year.
Personal life
Chinamasa is married to Monica Chinamasa.
His children include:
Chengetai – although banned from travelling into the United States, he gained entry using his mother's maiden surname. He claimed his home location as Worcester, Massachusetts, where he studied and also worked for Keller Williams. He died in November 2007.
Gamuchirai - born 11 November 1991.
References
Living people
1947 births
Finance Ministers of Zimbabwe
Attorneys-General of Zimbabwe
Members of the Senate of Zimbabwe
ZANU–PF politicians
Government ministers of Zimbabwe |
2661966 | https://en.wikipedia.org/wiki/Fly%20%28pentop%20computer%29 | Fly (pentop computer) | The Fly Pentop Computer and FLY Fusion Pentop Computer are personal electronics products manufactured by LeapFrog Enterprises Inc. They are called a "pentop" computer by its manufacturer, because they consist of a pen with a computer inside.
In 2009, LeapFrog discontinued both the manufacture and support of the device and all accessory products, such as notepads and ink refills which are required for continued use. The inventor of the FLY Pentop, Jim Marggraff, left LeapFrog and founded Livescribe in January 2007.
Description
The Fly, released in 2005, is a customizable pen that is intended to assist children with schoolwork. There are several bundled and add-on applications available, including a notepad, calculator, language and writing assistant, and educational games; many of these require the use of a small cartridge that can be inserted into a port built into the rear of the pen. The Fly only works on its own proprietary digital paper, which is lightly printed with a pattern of dots to provide positioning information to the pen via a tiny infrared camera. The ink tip itself can be retracted into the body of the pen when no physical notes are desired.
The pen uses digital paper and pattern decoding technology developed by Anoto to track where the user writes on the page. It uses Vision Objects' MyScript character recognition technology to read what's been written, and can read aloud nearly any word in U.S. English. One notable thing is that the Fly uses only capital letters. To start the main menu of the base pen, the user writes "M" and circles it. After recognizing the circled "M", the pen switches to "menu mode". There are several different circle-letter codes for activating different applications, these codes are officially known as "Fly-Cons."
Once an application is activated, the user uses the pen to draw on the paper to interact with the application. In much of the applications, users are told what to draw, rather than having the freedom to design their own.
Applications and add-ons
LeapFrog sold several different types of paper with which the pen could be used, often in conjunction with a related programming cartridge. The paper may include special instructions for using the pen, as well as cosmetic alterations to the paper reflecting the subject for which it is intended.
Activities available for the Fly included a Spanish language translator, spelling and mathematical software, and a personal journal. Activities for the Fly pen came in packs that include a game pad - a different piece of digital paper - or a cartridge. Using a game pad begins with the user "downloading" the game from the paper by swiping the pen along a Fly Strip, reminiscent of a barcode. Available games include Batman Begins, a "Flyball" baseball game, Harry Potter Interactive Marauder's Map, and a musical DJ game called "Scratch".
Response
Many critics of the computer have pointed out the length of time required for the pen to correctly recognise input from the user. Also, some have criticized the lack of a screen, since audio feedback and lights are the only way to get a response from the devices.
Fly Fusion Pentop Computer
The Digital Pen
The FLY Fusion Pentop Computer is the second and last version of the FLY 1.0 Pentop Computer. This pen, like its predecessor, is included with digitized paper that allows the pen's camera (located near to the pen's tip) to "read" what you write. The pen still uses the familiar "FLYcons" and can play compatible games.
As of 2009, LeapFrog had discontinued both versions of the FLY Pentop Computer. This also included a halt of all support accessories such as notepads and ink refills which are required for continued use of the pen. The inventor of the FLY Pentop, Jim Marggraff, left LeapFrog and founded Livescribe in January 2007.
Differences From the FLY 1.0
The pen is much smaller and thinner than the original FLY 1.0 Pentop Computer. Also, it is now a silver color with dark grey accents. The FLY Fusion can upload and transfer text that was written on paper to a word-processing program, such as Microsoft Word. MP3 music files can also be downloaded to the pen, allowing it to double as an MP3 player. It came with three songs preloaded on it. The calculator application has been updated so the user can tap the "math" FLYcon, and write the problem that they wish to calculate. Also, an English word into Spanish, and vice versa, by writing the word on the digitized paper.
Backwards Compatibility
FLY Fusion pentop chips and accessories will not work in an original FLY 1.0 Pentop Computer. Also, some FLY 1.0 products, such as "Fly through Algebra" contain a chip that will not fit into the FLY Fusion pentop computer's slot, and cannot be used with the updated FLY Fusion.
See also
Digital paper
Digital pen
Pen computing
References
Notes
LeapFrog Fly Fusion Pentop Computer PCmag.com
https://web.archive.org/web/20101225022112/http://www.diraction.ch/livescribe/docs/Livescribe_FAQ_111909.pdf
Microcomputers
Portable media players |
8510006 | https://en.wikipedia.org/wiki/InfraRecorder | InfraRecorder | InfraRecorder is an open-source CD and DVD writing program for Microsoft Windows. First started by Christian Kindahl in the Google Summer of Code 2006, InfraRecorder uses the cdrtools software library to perform the actual burning.
Since 0.46, InfraRecorder is released under the terms of the GNU General Public License 3 and is free software. In November 2007, CNET rated InfraRecorder the best free alternative to commercial DVD burning software.
InfraRecorder is included on the VALO-CD, a collection of open source software for Windows.
Functionality
InfraRecorder supports disk rewriting and dual-layer DVDs. InfraRecorder can also burn a disc from an ISO image file. This program is completely portable on the Windows operating system.
As of version 0.40, InfraRecorder offers features similar to most CD- and DVD-authoring software, including the creation and burning of data and audio disc images, the ability to work with rewritable and multisession discs, and the ability to extract WAV and ISO image files from discs. One can also use the LAME MP3 encoder to save Audio CD tracks.
InfraRecorder is available in a version that will run natively on 64-bit versions of Windows; however, this version doesn't include an Ogg Vorbis decoder or libsnd library due to compilation difficulties with MinGW on the 64-bit Windows platform.
See also
List of optical disc authoring software
List of ISO image software
References
External links
Optical disc authoring software
Free optical disc authoring software
Windows CD/DVD writing software
Free software programmed in C++
Windows-only free software
Portable software
2006 software |
13443417 | https://en.wikipedia.org/wiki/Security%20descriptor | Security descriptor | Security descriptors are data structures of security information for securable Windows objects, that is objects that can be identified by a unique name. Security descriptors can be associated with any named objects, including files, folders, shares, registry keys, processes, threads, named pipes, services, job objects and other resources.
Security descriptors contain discretionary access control lists (DACLs) that contain access control entries (ACEs) that grant and deny access to trustees such as users or groups. They also contain a system access control list (SACLs) that control auditing of object access. ACEs may be explicitly applied to an object or inherited from a parent object. The order of ACEs in an ACL is important, with access denied ACEs appearing higher in the order than ACEs that grant access. Security descriptors also contain the object owner.
Mandatory Integrity Control is implemented through a new type of ACE on a security descriptor.
Files and folder permissions can be edited by various tools including Windows Explorer, WMI, command line tools like Cacls, XCacls, ICacls, SubInACL, the freeware Win32 console FILEACL, the free software utility SetACL, and other utilities. To edit a security descriptor, a user needs WRITE_DAC permissions to the object, a permission that is usually delegated by default to administrators and the object's owner.
Permissions in NTFS
The following table summarizes NTFS permissions and their roles (in individual rows.) The table exposes the following information:
Permission code: Each access control entry (ACE) specifies its permission with binary code. There are 14 codes (12 in older systems.)
Meaning: Each permission code has a meaning, depending on whether it is applied to a file or a folder. For example, code 0x01 on file indicates the permission to read the file, while on a folder indicates the permission to list the content of the folder. Knowing the meaning alone, however, is useless. An ACE must also specify to whom ther permission applies, and whether that permission is granted or denied.
Included in: In addition to individual permissions, an ACE can specify special permissions known as "generic access rights." These special permissions are equivalents of a number individual permissions. For example, GENERIC_READ (or GR) is the equivalent of "Read data", "Read attributes", "Read extended attributes", "Read permissions", and "Synchronize". Because it makes sense to ask for these five at the same time, requesting "GENERIC_READ" is more convenient.
Alias: The two Windows command-line utilities (icacls and cacls) have their own aliases for these permissions.
Most of these permissions are self-explanatory, except the following:
Renaming a file requires the "Delete" permission.
File Explorer doesn't show "Synchronize" and always sets it. Multi-threaded apps like File Explorer and Windows Command Prompt need the "Synchronize" permission to be able to work with files and folders.
Footnotes
See also
Information technology security audit
Authorization
Computer security
Information security
Token (Windows NT architecture)
Windows SID
SDDL
References
External links
CACLS command description on SS64.com
SetACL SourceForge page
Operating system security
Windows NT architecture
Windows components
Microsoft Windows security technology |
22791650 | https://en.wikipedia.org/wiki/1953%E2%80%9354%20USC%20Trojans%20men%27s%20basketball%20team | 1953–54 USC Trojans men's basketball team | The 1953–54 USC Trojans men's basketball team represented the University of Southern California during the 1953–54 NCAA college basketball season. Members of the Pacific Coast Conference, the Trojans were led by fourth-year head coach Forrest Twogood and played their home games off campus at Pan-Pacific Auditorium in Los Angeles, California.
The Trojans were overall in the regular season and in conference play. They won the Southern Division for the first time since 1940 and met Northern Division champion Oregon State in the best-of-three PCC playoff series at Long Beach City College. USC won the first and third games and advanced to the 24-team NCAA Tournament.
At the West Regional at Gill Coliseum in Corvallis, Oregon, the Trojans defeated Idaho State and Santa Clara (in double overtime). At the Final Four in Kansas City, Missouri, the Trojans dropped both games, to Bradley in the semifinals and Penn State in the consolation game.
NCAA tournament
Seeding in brackets
West Regional at Corvallis, Oregon
Southern California 73, Idaho State 59
Southern California 66, Santa Clara 65 (2OT)
Final Four at Kansas City, Missouri
Bradley 74, Southern California 72
Penn State 70, Southern California 61 – (Third Place Game)
Rankings
NBA draft
One Trojan was selected in the 1954 NBA draft
References
External links
Sports Reference – USC Trojans: 1953–54 basketball season
Usc
Usc
USC Trojans men's basketball seasons
NCAA Division I Men's Basketball Tournament Final Four seasons
USC Trojans
USC Trojans |
68804128 | https://en.wikipedia.org/wiki/Delhi%20Skill%20and%20Entrepreneurship%20University | Delhi Skill and Entrepreneurship University | The Delhi Skill and Entrepreneurship University, or DSEU, is a collegiate public state university located in New Delhi, India. It was established in 2020 by an Act of the Legislative Assembly of the National Capital Territory of Delhi. It is recognised as a State University by the University Grants Commission (UGC). DSEU offers 15 diploma, 18 undergraduate and 2 postgraduate courses, and has a total of 13 campus in Delhi. The Lieutenant Governor of Delhi serves as the university chancellor.
History
Delhi Skill and Entrepreneurship University (DSEU) was established as an unitary and teaching university in August 2020 by Government of NCT of Delhi under the provisions of Delhi Skill and Entrepreneurship University Act, 2019. The university is recognised by University Grants Commission (India), under section 12B of the UGC Act.
DSEU was merged with 15 existing government institutes and colleges such as Delhi Institute of Tool Engineering(Wazirpur and Okhla Campus), GB Pant College of Engineering, Integrated Institute of Technology, 10 polytechnics of the Delhi government, and 6 World Class Skill Centres.
Campus
DSEU consists of 13 campuses located across Delhi.
Aryabhatt DSEU Ashok Vihar Campus
DSEU Ashok Vihar campus was formerly known as Aryabhatt Institute of Technology (ABIT) before getting merged with DSEU. ABIT was established in 1962 by Government of NCT of Delhi. This campus is located in Ashok Vihar, North West Delhi.
The courses offered in this campus are Diploma in Architecture, Diploma in Civil Engineering, Diploma in Electrical Engineering, Diploma in Mechanical Engineering, Part-time, Diploma in Civil Engineering, Part-time Diploma in Electrical Engineering, and Part-time Diploma in Mechanical Engineering.
Ambedkar DSEU Shakarpur Campus
Ambedkar Institute of Technology (AIT) after being affiliated to DSEU was renamed to Ambedkar DSEU Shakarpur Campus. AIT was established by Department of Training and Technical Education (DTTE), Government of NCT of Delhi in 1986. It is located in Shakarpur, East Delhi.
The list of courses taught in this campus include Bachelor in Computer Applications, BBA (Banking, Financial Services and Insurance), B.Sc. in Data Analytics, Master in Computer Applications, Diploma in Computer Engineering, and Diploma in Electronics Engineering.
G.B. Pant DSEU Okhla-I Campus
Established in 1961 by Government of NCT of Delhi, Govind Ballabh Pant Institute of Technology was affiliated to DSEU and renamed as G.B. Pant DSEU Okhla-I Campus. It is located in Okhla, South East Delhi.
Since it is an engineering campus, courses offered in this campus are all engineering courses. They are B.Tech. in Mechanical and Automation Engineering, B.Tech. in Electronics & Communication Engineering, and B.Tech. in Computer Science Engineering.
DSEU Okhla-II Campus
Delhi Institute of Tool Engineering (DITE), which was established was 2007 by Government of NCT of Delhi is now the DSEU Okhla-II Campus. It is located in Okhla, South East Delhi.
DITE being an engineering institute, DSEU Okhla-II Campus offers several engineering courses, which are: B.Tech. in Mechanical Engineering, B.Tech. in Tool Engineering, B.Tech. in Mechatronics, Diploma in Mechanical Engineering, Diploma in Tool & Die Making, and M.Tech. (Tool Engineering).
Guru Nanak Dev DSEU Rohini Campus
DSEU Rohini Campus was previously known as Guru Nanak Dev Institute of Technology. Government of NCT of Delhi established it in 1995. It is located in Rohini, North West Delhi.
The various courses offered in Guru Nanak Dev DSEU Rohini Campus are: Diploma in Chemical Engineering, Diploma in Computer Engineering, Diploma in Electrical Engineering, Diploma in Electronics Engineering, and Diploma in Mechanical Engineering.
DSEU Pusa Campus
DSEU Pusa Campus, which was formerly known as Pusa Institute of Technology (PIT), was established in 1962 by Government of NCT of Delhi. The campus is located in Pusa, Central Delhi.
The courses offered in this campus are B.Com. in Business Process Management, BBA in Retail Management, Diploma in Automobile Engineering, Diploma in Civil Engineering, Diploma in Electrical Engineering, Diploma in Electronics Engineering, Diploma in Mechanical Engineering, Diploma in Printing Technology, and Part-time Diploma in Automobile Engineering.
DSEU Dwarka Campus
Integrated Institute of Technology Dwarka (IIT Dwarka) was renamed as DSEU Dwarka Campus after its affiliation to DSEU. IIT Dwarka was established by Government of NCT of Delhi in 2008. It is located in Dwarka, South West Delhi.
Courses offered by this campus are B.A. in Spanish, BBA (Banking, Financial Services and Insurance), BBA in Facilities and Hygiene Management, B.Sc. in Medical Laboratory Technology, Bachelor in Computer Application, Diploma in Computer Engineering, and Diploma in Pharmacy.
DSEU Siri Fort Campus
World Class Skill Centre (WCSC) was changed to DSEU Siri Fort Campus. The WCSC was established by Government of NCT of Delhi in 2013. This campus is located in Siri Fort, South Delhi.
It offers B.A. in Aesthetics & Beauty Therapy and B.A. in Digital Media & Design.
Kasturba DSEU Pitampura Campus
DSEU Pitampura Campus was previously known as Kasturba Institute of Technology for Women and was established in 1986 by Government of NCT of Delhi. It is located in Pitampura, North West Delhi.
These are all the courses offered at this campus: Diploma in Civil Engineering, Diploma in Computer Engineering, Diploma in Electronics Engineering, and Diploma in Fashion Design.
Meerabai DSEU Maharani Bagh Campus
DSEU Maharani Bagh Campus, formerly known as Meerabai Institute of Technology (MIT Delhi), was established in 1962 by Government of NCT of Delhi. It is located at Maharani Bagh, South East Delhi.
The courses offered at Meerabai DSEU Maharani Bagh Campus are B.Sc. in Medical Laboratory Technology, Diploma in Applied Arts, Diploma in Cosmetology & Health, Diploma in Electronics Engineering, Diploma in Interior Design, and Diploma in Pharmacy.
DSEU Rajokri Campus
Rajokari Institute of Technology (RIT) was renamed to DSEU Rajokri Campus after its affiliation to DSEU. It was established by Government of NCT of Delhi in 2016. It is located in Rajokri, New Delhi.
The courses offered at this campus include BMS in e-Commerce Operations, BMS in Land Transportation, and Diploma in Computer Engineering.
DSEU Vivek Vihar Campus
DSEU Vivek Vihar Campus was formerly known as World Class Skill Centre (WCSC) and was established in 2013 by Government of NCT of Delhi. It is located in Vivek Vihar, Shahdara.
The only two courses offered by DSEU Vivek Vihar Campus are B.Com. in Business Process Management and BBA in Retail Management.
DSEU Wazirpur-I Campus
DSEU Wazirpur Campus, formerly known as Delhi Institute of Tool Engineering, was established by Government of NCT of Delhi in 2007. It is located in Wazirpur, North West Delhi.
DSEU Wazirpur-I Campus offers only two courses which are as follows: Diploma in Mechanical Engineering and Diploma in Tool & Die Making.
Organisation and administration
Governance
The governing officials of the university include the Chancellor, the Vice Chancellor, the Pro-Vice Chancellors, the first members of the Court, the Board of Management, the Academic Council and the Finance Committee of the university.
The President of India is the Visitor of the Delhi Skill and Entrepreneurship University. The Lieutenant Governor of Delhi is the Chancellor of the university. The Vice-Chancellor is appointed by the Chancellor. The Chancellor is the nominal head of the university and the Vice-Chancellor is the executive head of the university.
Schools
DSEU has its courses divided over 12 schools which are as follows:
School of Retail Management
School of Engineering Sciences/ Applied Engineering
School of Sustainability
School of Beauty and Wellness
School of Languages
School of Logistics and Supply Chain
School of Innovation and Entrepreneurship
School of Allied Medical Services
School of Creative Economy
School of IT & ITeS
School of Employability and Wholistic Development
School of Banking, Financial Services and Insurance
Courses offered
DSEU offers 15 full-time diploma courses, 4 part-time diploma courses, 14 lateral entry diploma courses, 18 undergraduate courses and 2 postgraduate courses.
Diploma Courses
These are the various diploma courses offered at DSEU:
Full time diploma
Diploma in Applied Arts
Diploma in Architecture
Diploma in Automobile Engineering
Diploma in Chemical Engineering
Diploma in Civil Engineering
Diploma in Computer Engineering
Diploma in Cosmetology & Health
Diploma in Electrical Engineering
Diploma in Electronics Engineering
Diploma in Fashion Design
Diploma in Interior Design
Diploma in Mechanical Engineering
Diploma in Pharmacy
Diploma in Printing Technology
Diploma in Tool and Die Making
Part time diploma
Diploma in Automobile Engineering(Part Time)
Diploma in Civil Engineering(Part Time)
Diploma In Electrical Engineering(Part Time)
Diploma in Mechanical Engineering(Part Time)
Lateral entry diploma
Diploma in Applied Arts (Lateral Entry)
Diploma in Architectural Assistantship (Lateral Entry)
Diploma in Automobile Engineering (Lateral Entry)
Diploma in Chemical Engineering (Lateral Entry)
Diploma in Civil Engineering (Lateral Entry)
Diploma in Computer Engineering (Lateral Entry)
Diploma in Electrical Engineering (Lateral Entry)
Diploma in Electronics & Communication Engineering (Lateral Entry)
Diploma in Fashion Design (Lateral Entry)
Diploma in Interior Design (Lateral Entry)
Diploma in Mechanical Engineering (Lateral Entry)
Diploma in Printing Technology (Lateral Entry)
Diploma in Tool and Die Making (Lateral Entry)
Undergraduate Courses
There are 18 undergraduate courses (3 B.A, 2 B.Sc, B.Com, 3 BBA, 2 BMS, BCA and 6 B.Tech) offered by DSEU. The complete list is as follows:
B.A. (Spanish)
B.A. (Digital Media & Design)
B.A. (Aesthetics and Beauty Therapy)
B.Sc. (Data Analytics)
B.Sc. (Medical Laboratory Technology)
B.Com. (Business Process Management)
BBA (Retail Management)
BBA (Facilities and Hygiene Management)
BBA (Banking, Financial Services and Insurance)
BMS (e-Commerce Operations)
BMS (Land Transportation)
BCA (Bachelor of Computer Application)
B. Tech. (Mechanical & Automation Engineering)
B.Tech. (Electronics & Communication Engineering)
B.Tech. (Computer Science Engineering)
B. Tech. (Mechanical Engineering)
B.Tech. (Tool Engineering)
B.Tech. (Mechatronics Engineering)
Postgraduate Courses
Apart from diploma and undergraduate courses, DSEU also offers two postgraduate courses. These two courses are:
M.Tech (Tool Engineering)
MCA (Masters in Computer Applications)
Sports
On August 12, 2021, Manish Sisodia, Deputy Chief Minister and Education Minister of Delhi, announced on Twitter that Delhi Skill and Entrepreneurship University will organise a skill competition in the city and train the winning candidates for the World Skills Competition, popularly known as the 'Olympics of Skills' to be held at Shanghai in 2022.
He wrote: Delhi Skill and Entrepreneurship University will host the first ever state level Skill Competition in Delhi.
This competition will identify & prepare contenders for World Skill International Competition also known as Olympics of skills to be held in Shanghai 2022
See also
List of institutions of higher education in Delhi
References
External links
Educational institutions established in 2020
Universities and colleges in Delhi
Medical Council of India
Distance education institutions based in India
2020 establishments in Delhi |
54205307 | https://en.wikipedia.org/wiki/NjRAT | NjRAT | njRAT, also known as Bladabindi, is a remote access tool (RAT) or trojan which allows the holder of the program to control the end-user's computer. It was first found in June 2013 with some variants traced to November 2012. It was made by a hacking organization from different countries called Sparclyheason and was often used against targets in the Middle East. It can be spread through phishing and infected drives.
About the program and its whereabouts
A surge of njRAT attacks was reported in India in July 2014. In an attempt to disable njRAT's capabilities, Microsoft took down four million websites in 2014 while attempting to filter traffic through no-ip.com domains.
In March 2016, Softpedia reported that spam campaigns spreading remote access trojans such as njRAT were targeting Discord. In October 2020, Softpedia also reported the appearance of a cracked VMware download that would download njRAT via Pastebin. Terminating the process would crash the computer.
An Islamic State website was hacked in March 2017 to display a fake Adobe Flash Player update download, which instead downloaded the njRAT trojan.
Features
Manipulate files
Open a remote shell, allowing the attacker to use the command line
Open a process manager to kill processes
Manipulate the system registry
Record the computer's camera and microphone
Log keystrokes
Steal passwords stored in web browsers or in other applications
References
Trojan horses
2012 in computing
Windows trojans |
4316761 | https://en.wikipedia.org/wiki/Rosalind%20Picard | Rosalind Picard | Rosalind Wright Picard (born May 17, 1962) is an American scholar and inventor who is Professor of Media Arts and Sciences at MIT, founder and director of the Affective Computing Research Group at the MIT Media Lab, and co-founder of the startups Affectiva and Empatica. In 2005, she was named a Fellow of the Institute of Electrical and Electronics Engineers for contributions to image and video analysis and affective computing. In 2019 she received one of the highest professional honors accorded an engineer, election to the National Academy of Engineering for her contributions on affective computing and wearable computing.
Picard is credited with starting the branch of computer science known as affective computing with her 1997 book of the same name. This book described the importance of emotion in intelligence, the vital role human emotion communication has to relationships between people, and the possible effects of emotion recognition by robots and wearable computers. Her work in this field has led to an expansion into autism research and developing devices that could help humans recognize nuances in human emotions.
Academics
Picard holds a bachelor's degree in electrical engineering with highest honors and a certificate in computer engineering from the Georgia Institute of Technology (1984), and master's (1986) and doctorate degrees (1991), both in electrical engineering and computer science, from MIT. Her thesis was titled Texture Modeling: Temperature Effects on Markov/Gibbs Random Fields. She has been a member of the faculty at the MIT Media Laboratory since 1991, with tenure since 1998 and a full professorship since 2005.
Picard is a researcher in the field of affective computing and the founder and director of the Affective Computing Research Group at the MIT Media Lab. The Affective Computing Research Group develops tools, techniques, and devices for sensing, interpreting, and processing emotion signals that drive state-of-the-art systems that respond intelligently to human emotional states. Applications of their research include improved tutoring systems and assistive technology for use in addressing the verbal communications difficulties experienced by individuals with autism.
She also works with Sherry Turkle and Cynthia Breazeal in the field of social robots, and has published significant work in the areas of digital image processing, pattern recognition, and wearable computers. Picard's former students include Steve Mann, professor and researcher in wearable computers.
Picard is Faculty Chair of the MIT MindHandHeart Initiative, a "coalition of students, faculty, and staff [...] working collaboratively and strategically to strengthen the fabric of [the] MIT community."
Affective computing
While working in the field of affective computing, Picard published Affective Computing. MIT's press release for Picard's textbook states, "According to Rosalind Picard, if we want computers to be genuinely intelligent and to interact naturally with us, we must give computers the ability to recognize, understand, even to have and express emotions".
Picard explains the need to monitor emotional cues and how this is present with humans when she states:
"Whatever his strategy, the good teacher detects important affective cues from the student and responds differently because of them. For example, the teacher might leave subtle hints or clues for the student to discover, thereby preserving the learner's sense of self-propelled discovery. Whether the subject matter involves deliberate emotional expression as is the case with music, or is a "non-emotional" topic such as science, the teacher that attends to a student's interest, pleasure, and distress is perceived as more effective than the teacher that proceeds callously. The best teachers know that frustration usually precedes quitting, and know how to redirect or motivate the pupil at such times. They get to know their student, including how much distress that student can withstand before learning breaks down."
But such emotional cues are not part of robotic intelligence.
In order to portray how such a recognition would alter interactions with robots, Picard gave an example situation:
Imagine your robot entering the kitchen as you prepare breakfast for guests. The robot looks happy to see you and greets you with a cheery "Good morning." You mumble something it does not understand. It notices your face, vocal tone, smoke above the stove, and your slamming of a pot into the sink, and infers that you do not appear to be having a good morning. Immediately, it adjusts its internal state to "subdued," which has the effect of lowering its vocal pitch and amplitude settings, eliminating cheery behavioral displays, and suppressing unnecessary conversation. Suppose you exclaim, "Ow!!" yanking your hand from the hot stove, rushing to run your fingers under cold water, adding "I can't believe I ruined the sauce." While the robot's speech recognition may not have high confidence that it accurately recognized all of your words, its assessment of your affect and actions indicates a high probability that you are upset and maybe hurt.
In such a situation, it is necessary for the robots to understand the emotional aspects of humans in order to better serve their intended purpose.
Her work has influenced many fields beyond computer science, ranging from video games to law. One critic, Aaron Sloman, described the book as having a "bold vision" that will inspire some and irritate others. Other critics emphasize the importance behind the work as it establishes an important framework for the field as a whole. Picard responded to Sloman's review by saying, "I don’t think the review captures the flavor of the book. However, he does raise interesting points, as well as potential misunderstandings, both of which I am grateful for the opportunity to comment on".
In 2009, Picard co-founded Affectiva, along with Rana el Kaliouby, and became the company's chief scientist for the next four years. The company was based on technologies the two began developing at the Affective Computing Research Group within the MIT Media Lab. In April 2014, Picard co-founded Empatica, Inc, a business creating wearable sensors and analytics to help people understand and communicate physiological changes involved in emotion. Her team showed that physiological changes in the emotion system could help identify seizures that might be life-threatening.
Autism research
Besides researching robotic intelligence, Picard has performed research in the field of autism. Her team created an "emotional-social intelligence prosthesis" (ESP), that allowed a person diagnosed with autism to monitor their own facial reactions in order to educate them on social cues in others. This device had a 65% accuracy rate for reading one of eight emotional states from an individual's facial expressions and head movements. She revealed parts of this technology at the 11th Annual International Symposium on Wearable Computers.
Emotion research
Picard has put forward theories to improve the research of emotions through the implementation of new technologies with a focus to gather emotional information outside of a lab setting. With devices that can measure heart-rate, electrodermal activity, and other physiological changes, and that are non-obtrusive and simple to wear (Picard uses an example of the iCalm sensor) emotional responses can be more accurately observed in a real life. She also argues against nomothetic research over idiographic research when it comes to studying emotions claiming that an individualized approach would be more fruitful than just throwing out data when a group correlation is not found. In this way, data from individuals could still be kept and analyzed and then paired (not averaged) with data clusters that were similar.
Religion and science
Picard was raised an atheist, but converted to Christianity as a young adult. She is a practicing Christian and does not believe there is a separation of the "material body and immaterial spirit" but that there is "something else that we haven't discovered yet", and believes "that scientists cannot assume that nothing exists beyond what they can measure". She believes it likely that there is "still something more" to life, beyond what we have discovered, and sees DNA as too complex to have originated through "purely random processes". To her, the complexity of life shows "the mark of intervention", and "a much greater mind, a much greater scientist, a much greater engineer behind who we are". She sees her religious beliefs as playing a role in her work in affective computing, and explains that when "Digging into the models of how the emotions work, I find I feel even greater awe and appreciation for the way we are made, and therefore for the Maker that has brought this about".
Picard is one of the signatories of the Discovery Institute's A Scientific Dissent From Darwinism, a petition which the intelligent design movement used in an effort to cast doubt on evolution as adequate for explaining the complexity of life and saying examination of the evidence should be encouraged. Although her view about the complexity of DNA "sounds similar to the intelligent design debate", reporter Mirko Petricevic writes, "Picard has some reservations about intelligent design, saying it isn't being sufficiently challenged by Christians and other people of faith". She argues that the media has created a false dilemma by dividing everyone into two groups, supporters of intelligent design or evolution. "To simply put most of us in one camp or the other does the whole state of knowledge a huge disservice."
Awards
Georgia Engineering Foundation Fellowship(s) 1980, 81, 82, 83
Society of Women Engineers: “The Outstanding Woman Engineering Student” 1981, 82, 83, 84
National Science Foundation Fellow 1984
AT&T Bell Laboratories “One Year On Campus” Fellow 1984
Georgia Institute of Technology Department of Electrical Engineering Faculty Award 1984
Voted Omicron Delta Kappa, Georgia Tech and Southeast U. S. “Leader of the Year” 1984
AAUW “The Outstanding Georgia Institute of Technology Woman Graduate” 1984
IAPR Pattern Recognition Society Best Paper Prize (with Tom Minka) 1991
GA Tech College of Engineering “Outstanding Young Engineering Alumni Award” 1995
NEC Career Development Chair in Computers and Communications 1992, 96
Assoc. of American Publishers, Inc. Computer Science Book Award, (Hon. Mention) 1997
Senior Member of IEEE 2000
ICALT 2001 Best Theory Paper Prize (with Rob Reilly and Barry Kort) 2001
Creapole’s Committee of Honour (Paris) 2002
Fellow of IEEE 2005
Chamblee High School Hall of Fame 2005
Groden Network Distinguished Honorees, Research Award 2008
New York Times' “Best Ideas of the Year” (w/el Kaliouby) 2006
Popular Science Top Ten Inventions of 2011: A mirror that reads vital signs 2011 (with Ming-Zher Poh and Dan McDuff)
Best Paper of the Decade, 2000-2009 IEEE Transactions on Intelligent Transportation Systems (with Jennifer Healey) 2013
Sigma Xi 2014 Walston Chubb Award for Innovation 2014
Epilepsy Foundation Innovation Seal of Excellence (with Empatica) 2015
CNN’s 7 tech Superheroes to Watch in 2015
30 Most Innovative Women Professors 2016
Red Dot Award, Product Design, Life Science and Medicine (with Empatica) 2016
Association for Psychological Science Fellow 2017
National Academy of Engineering 2019
2021 ACM Fellow
Bibliography
R. W. Picard, F. Liu, R. Zabih, G. Healey, and M. Swain (Eds.) “Content-Based Access of Image and Video Libraries,” Proceedings of IEEE Workshop, IEEE Computer Society. 1997.
J. Tao, T. Tan, and R. W. Picard (Eds.), Affective Computing and Intelligent Interaction 2005, Lecture Notes in Computer Science 3784, 2005. Springer-Verlag, Berlin Heidelberg 2005.
A. Paiva, R. Prada, and R. W. Picard (Eds.), Affective Computing and Intelligent Interaction 2007, Lecture Notes in Computer Science 4738, 2007. Springer-Verlag, Berlin Heidelberg 2007.
Notable articles
T.P. Minka and R.W. Picard (1997), "Interactive Learning Using a 'Society of Models,'" Pattern Recognition, Volume 30, No. 4, pp. 565–581, 1997. (Winner of 1997 Pattern Recognition Society Award)
R.W. Picard, E. Vyzas & J. Healey, (2001), "Toward machine emotional intelligence: Analysis of affective physiological state," IEEE Transactions on Pattern Analysis & Machine Intelligence, (10), 1175-1191.
B. Kort, R. Reilly and R.W. Picard (2001), "An Affective Model of Interplay Between Emotions and Learning: Reengineering educational Pedagogy-Building a Learning Companion," In Proceedings of International Conference on Advanced Learning Technologies (ICALT 2001), August 2001, Madison, WI. (Winner of Best Paper Prize.)
J. Healey and R.W. Picard (2005), "Detecting Stress During Real-World Driving Tasks Using Physiological Sensors," IEEE Trans. on Intelligent Transportation Systems, Volume 6, No. 2, June 2005, pp. 156–166. (Voted "Top 10 best papers of the decade 2000-2009" for the IEEE T. on Intelligent Transportation Systems)
M. E. Hoque, M. Courgeon, J.-C. Martin, B. Mutlu, R. W. Picard, "MACH: My Automated Conversation coacH", 15th International Conference on Ubiquitous Computing (Ubicomp), 8–12 September 2013. (Winner of Best Ubiquitous Computing Paper Award)
Picard, Rosalind W., Matteo Migliorini, Chiara Caborni, Francesco Onorati, Giulia Regalia, Daniel Friedman, and Orrin Devinsky. “Wrist sensor reveals sympathetic hyperactivity and hypoventilation before probable SUDEP.” Neurology 89, no. 6 (2017): 633-635.
Onorati, Francesco, Giulia Regalia, Chiara Caborni, Matteo Migliorini, Daniel Bender, Ming‐Zher Poh, Cherise Frazier et al. “Multicenter clinical assessment of improved wearable multimodal convulsive seizure detectors.” Epilepsia 58, no. 11 (2017): 1870-1879.
Patents
“Method and Apparatus for Relating and Combining Multiple Images of the Same Scene or Object(s)” . Issued January 6, 1998. (With Steve Mann.)
“Sensing and Display of Skin Conductivity” . Issued July 2, 2002. (With Jocelyn Scheirer, Nancy Tilbury and Jonathan Farringdon.)
“System and Method for Determining a Workload Level of a Driver” . Issued Sep 23, 2008 (with Fehr, Gardner and Hansman).
“Washable wearable biosensor” . Issued Mar 20, 2012 (with Williams, Fletcher, Eydgahi, Poh, Wilder-Smith, Kim, Dobson, Lee).
"Methods and apparatus for Monitoring Patients and Delivering Therapeutic Stimuli” . Issued Feb 18, 2014 (with Fletcher, Eydgani and Williams).
“Video recommendation based on affect” . Issued Aug 11, 2015 (with Kaliouby, Bahgat, Sadowsky and Wilder-Smith).
“Using affect within a gaming context” . Issued February 2, 2016 (with Bender, Kaliouby, Picard, Sadowsky, Turcot, Wilder-Smith).
"Methods and Apparatus for Conversation Coach” . Issued Jun 27, 2017 (with Hoque).
"Methods and apparatus for physiological measurement using color band photoplethysmographic sensor" . Issued Jul 24, 2018 (with Gontarek and McDuff).
See also
Affectiva
Affective computing
Autism
Digital image processing
Pattern recognition
Social robots
Wearable computers
References
External links
Affective Computing Group Web Page
Rosalind W. Picard Homepage
MIT Course on Autism Theory and Technology
1962 births
Living people
American computer scientists
Converts to Protestantism from atheism or agnosticism
Intelligent design advocates
American women computer scientists
American electronics engineers
Artificial intelligence researchers
People from Massachusetts
Georgia Tech alumni
Fellow Members of the IEEE
Fellows of the Association for Computing Machinery
MIT Media Lab people
21st-century American women |
43022441 | https://en.wikipedia.org/wiki/Newsbeuter | Newsbeuter |
Newsbeuter was a text-based news aggregator for Unix-like systems. It was originally written by Andreas Krennmair in 2007 and released under the MIT License. The program is aimed at power users and strives to be "" It supports the major feed formats including RSS and Atom and can import and export subscription lists in the OPML format. Newsbeuter (podbeuter) also supports podcasting and synchronization. As of 2017, the project is no longer maintained; the original developers advise users to switch to Newsboat, an actively maintained fork of Newsbeuter.
Name
"Newsbeuter" is a pun on the German word "Wildbeuter", which means "hunter-gatherer". According to Clifford Wolf, who is credited for coming up with the name, "during the stone age, people hunted and gathered their food, and these days, they hunt and gather news and information."
Operation
Newsbeuter is entirely controlled by the keyboard, and its default keybindings resemble those of vi. The program supported synchronization with Google Reader since version 2.2, but this feature was removed when Google discontinued Google Reader. Support for alternatives such as The Old Reader and NewsBlur was introduced in version 2.8.
Configuration
Newsbeuter's appearance and keyboard shortcuts are configured with a single text file.
Reception
Newsbeuter was the most popular news reader among Arch Linux users in 2012, and received 1.8% of votes in the "Best RSS Reader" category in a 2013 survey by Linux Journal. The program is often featured in magazine articles and software lists to demonstrate the power and versatility of the command line interface.
As an alternative to compiling the source files, Newsbeuter can be installed from pre-built binary packages on Debian, Ubuntu, Arch Linux, Gentoo, Slackware, FreeBSD, OpenSUSE, Fedora, Mandriva, PLD Linux, and through the Homebrew package manager.
See also
List of feed aggregators
Comparison of feed aggregators
References
External links
Development blog
Free software programmed in C++
Free news aggregators
Software that uses ncurses
Software using the MIT license
Console applications |
8231166 | https://en.wikipedia.org/wiki/Ryan%20Powdrell | Ryan Powdrell | Ryan Marcus Powdrell (born December 20, 1983) is a former American football fullback. He was signed by the Green Bay Packers as an undrafted free agent in 2007. He played college football at Southern California, and was also a member of the Tampa Bay Buccaneers, Pittsburgh Steelers, and Seattle Seahawks.
Early years
Prior to his HS days Ryan played on some talented Pop Warner teams as a tailback, corner, and punter. Having played numerous positions started but did not stop in his youth days.
Powdrell prepped at powerhouse Mission Viejo High School where he graduated in 2002 playing Middle Linebacker & Fullback. He helped lead Mission Viejo to their first of four consecutive CIF-SS Championship game appearances in his senior season (2001) an 18-9 win over Chino High School. Powdrell also prepped with fellow Trojans Drew Radovich and Mark Sanchez
College career
Powdrell played college football at the University of Southern California after transferring from Saddleback College in Mission Viejo, California. Switched from linebacker to fullback before his first season with USC, Powdrell rushed for 9 yards on 2 carries, and caught 4 passes for 72 yards and a touchdown in USC Trojans' 2006 season opening 50-14 win against the Arkansas Razorbacks but suffered a season-ending injury early in the second game against Nebraska.
Professional career
Green Bay Packers
After going undrafted in the 2007 NFL Draft, Powdrell signed with the Green Bay Packers on May 4, 2007. He spent his rookie season on injured reserve. Powdrell was released by the Packers on August 25, 2008.
Tampa Bay Buccaneers
Powdrell was signed to the practice squad of the Tampa Bay Buccaneers on October 15, 2008. He was released on October 22.
Pittsburgh Steelers
Powdrell was signed by the Pittsburgh Steelers on February 12, 2009. He was released on June 18, 2009.
Seattle Seahawks
Powdrell signed with the Seattle Seahawks on April 15, 2010. Powdrell was released on August 7, 2010 due to a calf injury he sustained in practice.
Omaha Nighthawks
Powdrell was signed by the Omaha Nighthawks of the United Football League on September 2, 2010, but was released by the Nighthawks the next day after Powdrell re-injured his calf.
Personal life
Powdrell currently resides in Wareham, Massachusetts with his wife Taryn, and their two daughters, Rhylen and Kamara. Powdrell currently plays for the Taunton Gladiators, a premier semi-pro football team based out of Taunton, Massachusetts. Powdrell led Taunton to the 2010 Eastern Football League Championship with a 32-21 victory over the Clinton Irish Blizzard.
Powdrell led Taunton back to the EFL Championship Game in 2011, but were defeated 20-9 by their neighboring rival, the Middleboro Cobras. The Middleboro Cobras are considered a powerhouse football team, and are viewed as one of the best semi-pro football organizations in the country.
References
External links
USC Trojans bio
Green Bay Packers bio
Tampa Bay Buccaneers bio
Pittsburgh Steelers bio
1983 births
Living people
Players of American football from New Mexico
Players of American football from California
American football linebackers
American football fullbacks
USC Trojans football players
Green Bay Packers players
Tampa Bay Buccaneers players
Pittsburgh Steelers players
Seattle Seahawks players |
1958312 | https://en.wikipedia.org/wiki/Boris%20Gardiner | Boris Gardiner | Boris Gardiner (born 13 January 1943) is a Jamaican singer, songwriter and bass guitarist. He was a member of several groups during the 1960s before recording as a solo artist and having hit singles with "Elizabethan Reggae" (in 1970), "I Wanna Wake Up with You" and "You're Everything to Me" (both 1986). One of his most notable credits is bass on the influential reggae song "Real Rock."
Career
Born in the Rollington Town area of Kingston, Jamaica, Gardiner attended Franklin Town Government School and St Monica's College, dropping out of education after being diagnosed with tachycardia.
In 1960 he joined Richard Ace's band the Rhythm Aces, which also included Delano Stewart, later of the Gaylads. With the group he recorded "Angella", and the local hits "A Thousand Teardrops" and "C–H–R–I–S–T–M–A–S" (written with his brother Barrington). The group split up and by 1963 Gardiner had joined Kes Chin and The Souvenirs as vocalist, and began learning guitar. He went on to join Carlos Malcolm & the Afro Caribs with whom he started playing bass guitar after the original bassist left, and when that band ended he started his own group, the Broncos, named after the Bronco Club where they had a residency. He later played with Byron Lee's Dragonaires. In the late 1960s and 1970s he worked extensively as a session musician as a member of the Now Generation, The Upsetters, The Aggrovators, and The Crystallites. While working at Studio One he played on hits such as The Heptones' "On Top", Larry and Alvin's "Nanny Goat", and Marcia Griffiths' "Feel Like Jumping".
As a solo artist, Gardiner had a hit with the song "Elizabethan Reggae" in 1970, a version of Ronald Binge's "Elizabethan Serenade". When the single was released in the United Kingdom, the first copies were printed with the label incorrectly identifying Byron Lee (not Gardiner) as the performer. Lee was the producer of the track. The UK Singles Chart printed this error for the first chart entry and the first four weeks of its re-entry into the charts. After 28 February 1970, all printings gave Gardiner credit.
His debut album, Reggae Happening, was also released in 1970 but did not chart. Music journalist Ian McCann said that the album "sold respectably for a reggae LP" in the UK. Gardiner's music continued to be popular in Jamaica, but interest waned in the UK. During the 1970s he continued session work, including several recordings for Lee "Scratch" Perry including Junior Murvin's "Police and Thieves".
The Boris Gardiner Happening recorded a version of "Ain't No Sunshine" in 1973 with Paul Douglas singing lead, and Boris Gardiner playing bass guitar, for the album Is What's Happening.
In 1986, Gardiner recorded the single "I Wanna Wake Up with You", which became a surprise number one hit in the UK. It spent two months in the top ten. The accompanying album, Everything to Me also included the follow-up hit, "You're Everything to Me", which peaked at number 11. The single "The Meaning of Christmas" (a re-recording of "C–H–R–I–S–T–M–A–S") was also released later that year, and was a minor hit. Later, Gardiner signed to RCA Records. In 2002, a 22-track anthology, The Very Best of Boris Gardiner, was issued on CD by Music Club.
In 2015, his song "Every Nigger Is a Star" was sampled on "Wesley's Theory", the opening track of Kendrick Lamar's To Pimp a Butterfly. The song also opens the 2016 film Moonlight.
Discography
Albums
Reggae Happening (1970), Trojan
It's So Nice to Be with You (1970), Steady
Soulful Experience (1971), Dynamic Sounds
For All We Know (1972), Dynamic Sounds
Is What's Happening (1973), Dynamic Sounds
Every Nigger Is a Star OST (1973), Leal Productions
Everything to Me (1986), Revue, AUS No. 45
Lover's Lane (1989), TNT
Let's Take a Holiday (1992), WKS
Next to You (1992), VP
Reggae Songs of Love (Plus) (2008), Encore
Compilations
The Very Best of Boris Gardiner (2002), Music Club
I Want to Wake Up with You: The Best of Boris Gardiner (2004), Sanctuary/Trojan
Singles
References
External links
Trinidad Guardian biography
Reggae Train biography
"I Want to Wake Up with You" story
1943 births
Living people
Musicians from Kingston, Jamaica
Jamaican reggae singers
Jamaican male singers
Jamaican record producers
Jamaican bass guitarists
Trojan Records artists
Male bass guitarists |
20101210 | https://en.wikipedia.org/wiki/LYME%20%28software%20bundle%29 | LYME (software bundle) | LYME and LYCE are software stacks composed entirely of free and open-source software to build high-availability heavy duty dynamic web pages. The stacks are composed of:
Linux, the operating system;
Yaws, the web server;
Mnesia or CouchDB, the database;
Erlang, the functional programming language.
The LYME and LYCE bundles can be and are combined with many other free and open-source software packages such as e.g. netsniff-ng for security testing and hardening, Snort, an intrusion detection (IDS) and intrusion prevention system (IPS), RRDtool for diagrams, or Nagios, Collectd, or Cacti, for monitoring.
Details
Both databases Mnesia and CouchDB as well as Yaws (and also Mochiweb, Misultin, and Cowboy) are written in Erlang, so web applications developed for LYME/LYCE may be run entirely in one Erlang virtual machine. This is in contrast to LAMP where the web server (Apache) and the application (written in PHP, Perl or Python) might be in the same process, but the database is always a separate process. As a result of using Erlang, LYME and LYCE applications perform well under high load and if distribution and fault tolerance is needed.
The query and data manipulation language of Mnesia is also Erlang (rather than SQL), therefore a web-application for LYME is developed using only a single programming language.
Interest in LYME as a stack had begun by August 2005, as was soon cited as a high-performance web application platform that used a single development language throughout. Favorable comparisons to other popular stacks such as Ruby on Rails were soon forthcoming. Comparisons to LAMP have also been favourable, although some have highlighted the difficulties of porting "SQL thinking" to the very different context of Mnesia.
Adoption
A successful user of LYME is the Swedish internet payment-processing company Klarna, who have built their whole architecture on LYME. This is seen as a successful project that demonstrates virtues of both LYME and functional programming in general.
LYME was also covered in the Erlang session at the Software Practice Advancement (SPA) 2008.
Besides Yaws, there are several other web servers written in Erlang, e.g. Mochiweb, Misultin, and Cowboy.
Besides Mnesia and CouchDB, there are a couple of other databases written in Erlang, e.g., Cloudant, Couchbase Server (born as Membase), database management system optimized for storing data behind interactive web applications, Riak, and SimpleDB (part of Amazon Web Services).
See also
LAMP (software bundle)
MEAN (software bundle) a JavaScript software stack for building dynamic web sites and web applications
References
Erlang (programming language)
Free web software
Web frameworks
Web development software
Internet software for Linux |
44221915 | https://en.wikipedia.org/wiki/Lens.com%2C%20Inc.%20v.%201-800%20Contacts%2C%20Inc. | Lens.com, Inc. v. 1-800 Contacts, Inc. | Lens.com, Inc. v. 1-800 Contacts, Inc., 686 F.3d 1376 (Fed. Cir. 2012), is a decision by the United States Court of Appeals for the Federal Circuit which ruled that when software merely acts as a "conduit" for providing services over the internet, and does not have an independent value per se, it does not constitute a "good" being "sold or transported in commerce" for the purposes of establishing whether or not a trademark for "computer software" has been "abandoned" under and (the relevant sections of the federal Lanham Act.)
The case was important because it clarified the Federal Circuit's view of the "use in commerce" requirement for trademarks when a non-traditional use of the trademark was employed. This had implications for trademark holders who held "computer software"-related intellectual property and sold goods over the internet. This also affected trademark holders who used their marks in non-traditional manners, or those whose marks were inappropriately described in the trademark filing.
Background of the case
The parties were both competing retailers of contact lenses and related products. In 2001, Lens.com had attempted to register the trademark LENS in connection with "retail store services featuring contact eyewear products rendered via a global computer network." The United States Patent and Trademark Office (USPTO) rejected the application, citing the prior registration of the same trademark by another company in connection with "computer software featuring programs used for electronic ordering of contact lenses in the field of ophthalmology, optometry and opticianry." Lens.com was eventually assigned this prior-registered trademark by the other company as part of the settlement of a lawsuit. However, Lens.com did not proceed to register the trademark LENS in connection with retail store services as it had previously attempted to do. It continued selling contact lenses to consumers through its website.
In 2008, the appellee/plaintiff 1-800 Contacts filed an application with the Trademark Trial and Appeal Board (TTAB) to cancel the LENS trademark, alleging among other things that the appellant/defendant Lens.com had abandoned the trademark because it had never sold or engaged in the trade of "computer software". In 2010, the TTAB agreed, stating that Lens.com's "software [wa]s merely incidental to its retail sale of contact lenses, and [wa]s not a ‘good in trade,’ i.e., "solicited or purchased in the market place for [its] intrinsic value."
Lens.com's motion for a reconsideration of its decision was denied by the TTAB later in 2010, and the USPTO shortly thereafter proceeded to cancel the trademark. Lens.com appealed the cancellation decision to the Federal Circuit Court, which issued its decision on August 3, 2012.
Decision
The Court found in favour of the appellee/plaintiff, 1-800 Contacts, affirming the decision of the TTAB below it.
The fact that Lens.com did not sell software was not contested in the appeal. Thus, under 15 U.S.C. § 1127(1)(B), the only way in which Lens.com could prove it was using the trademark and had not abandoned it would be to prove that its software was "transported in commerce." Citing In re Shareholders Data, 495 F.2d 1360, 1361 (CCPA 1974), the Court found that an article would not qualify as such when that article is "simply the conduit through which [the applicant] renders services." Further, it recalled the "well-established" principle from Shareholders Data that when an article "has no independent value apart from the services, such article is not likely to be an independent good in trade."
Despite a glut of precedent regarding "goods in trade" used in conjunction with services, the Court noted the lack of precedent in the internet services context on the issue of whether such service providers' software was an "independent good in commerce", and therefore properly the subject of a trademark in its own right, or "merely incidental" to the services over the internet, and therefore not. The Court stated that the case of Planetary Motion, Inc. v. Techsplosion, Inc., 261 F.3d 1188, 1194 (11th Cir. 2001), showed that in some cases the distribution of software over the internet could satisfy the requirement. However, it held that such a determination should be made on a factual, case-by-case basis. The Court also affirmed that the applicable test was "whether the software: (1) is simply the conduit or necessary tool useful only to obtain applicant's services; (2) is so inextricably tied to and associated with the service as to have no viable existence apart there from; and (3) is neither sold separately from nor has any independent value apart from the services".
Applying these principles to the case at hand, the Court found that Lens.com's software was "merely the conduit" for its online retail sales services, and was "inextricably intertwined" with it. The Court found "no evidence" that the software had any "independent value." It distinguished Planetary Motion because the nature of the software at issue, a webmail site called "Coolmail", was different than any "software" used by Lens.com to sell its contact lenses over the internet. In Planetary Motion, consumers associated the mark Coolmail with the software itself, whereas in Lens.com's case, consumers associated the mark LENS with the contact lens service, not the software. Thus, it concluded that Lens.com's trademark was not in "use in commerce" in association with software, thereby affirming the decision of the TTAB below to cancel the trademark.
Finally, the Court did not accede to Lens.com's second avenue of argument, that the TTAB had erroneously relied on only part of Lens.com's application file in making its decision. Based on the record of the decision below, the Court found that the TTAB had properly considered the entire application file.
Subsequent developments
While this case was ongoing, the two parties were also embroiled in other trademark litigation. Approximately one year following this decision, the Court of Appeals for the Tenth Circuit decided another controversy between 1-800 Contacts and Lens.com, this time over the latter's use of its competitor's trademark in Google adwords as a means of redirecting customers to its own website. The Tenth Circuit held that Lens.com did not commit trademark infringement when it purchased search advertising using 1-800 Contacts' federally registered 1800 CONTACTS trademark as a keyword.
In August 2016, the Federal Trade Commission filed an administrative complaint against 1-800 Contacts alleging, among other things, that its search advertising trademark enforcement practices have unreasonably restrained competition in violation of the FTC Act. 1-800 Contacts has denied all wrongdoing and is scheduled to appear before an FTC administrative law judge in April 2017.
See also
1-800 Contacts
References
Further reading
External links
United States Court of Appeals for the Federal Circuit cases
United States trademark case law
2012 in United States case law |
4671396 | https://en.wikipedia.org/wiki/Atomistix%20Virtual%20NanoLab | Atomistix Virtual NanoLab | Atomistix Virtual NanoLab (VNL) is a commercial point-and-click software for simulation and analysis of physical and chemical properties of nanoscale devices. Virtual NanoLab is developed and sold commercially by QuantumWise A/S. QuantumWise was then acquired by Synopsys in 2017.
Features
With its graphical interface, Virtual NanoLab provides a user-friendly approach to atomic-scale modeling. The software contains a set of interactive instruments that allows the user to design nanosystems, to set up and execute numerical calculations, and to visualize the results.
Samples such as molecules, nanotubes, crystalline systems, and two-probe systems (i.e. a nanostructure coupled to two electrodes) are built with a few mouse clicks.
Virtual NanoLab contains a 3D visualization tool, the Nanoscope, where atomic geometries and computed results can be viewed and analyzed. One can for example plot Bloch functions of nanotubes and crystals, molecular orbitals, electron densities, and effective potentials.
The numerical engine that carries out the actual simulations is Atomistix ToolKit, which combines density functional theory and non-equilibrium Green's functions to ab initio electronic-structure and transport calculations. Atomistix ToolKit is developed from the academic codes TranSIESTA and McDCal.
See also
Atomistix ToolKit
NanoLanguage
Atomistix
References
External links
QuantumWise web site
Nanotechnology companies
Computational science
Computational chemistry software
Physics software
Density functional theory software
Software that uses Qt |
46461679 | https://en.wikipedia.org/wiki/OHSAA%20Northeast%20Region%20athletic%20conferences | OHSAA Northeast Region athletic conferences | This is a list of high school athletic conferences in the Northeast Region of Ohio, as defined by the OHSAA. Because the names of localities and their corresponding high schools do not always match and because there is often a possibility of ambiguity with respect to either the name of a locality or the name of a high school, the following table gives both in every case, with the locality name first, in plain type, and the high school name second in boldface type. The school's team nickname is given last.
Akron City Series
Akron Buchtel Griffins (1931-)
Akron East Dragons (1918-)
Akron Ellet Orangemen (1971-)
Akron Firestone Falcons (1963-)
Akron Kenmore-Garfield Golden Rams (2017-)
Akron North Vikings (1915-)
Former members
Akron Central Wildcats (1915-1970, consolidated into Central-Hower)
Akron Central-Hower Eagles (1970-2006, closed)
Akron Garfield Rams (1926-2017, consolidated into Kenmore-Garfield)
Akron Hower Buccaneers (1927-1970, consolidated into Central-Hower)
Akron Kenmore Cardinals (1929-2017, consolidated into Kenmore-Garfield)
Akron South Cavaliers or Big Blue (1915-1980, closed)
Akron West Cowboys (1915-1953, closed)
All-American Conference
Red Division
Austintown-Fitch Falcons (2011- [Football, 2015-])
Youngstown Boardman Spartans (2014- [Football, 2015-])
Canfield Cardinals (2008-)
Warren Howland Tigers (2008-)
Warren G. Harding Raiders (2014- [Football, 2015-])
Former members
Salem Quakers (2008–2011, to Northeastern Buckeye Conference) White Division 2008–11.
Lisbon Beaver Local Beavers (played concurrently in OVAC, 2008–2013, to Buckeye 8 Athletic League) Red Division 2008–11, American Division 2011–13.
Girard Indians (2008-2018, to Northeast 8 Conference)
Hubbard Eagles (2008-2018, to Northeast 8 Conference)
Jefferson Area Falcons (2011-2018, to Northeast 8 Conference)
Cortland Lakeview Bulldogs (2008-2018, to Northeast 8 Conference)
Niles McKinley Red Dragons (2008-2018, to Northeast 8 Conference)
Poland Poland Seminary Bulldogs (2008-2018, to Northeast 8 Conference)
Struthers Wildcats (2008-2018), to Northeast 8 Conference)
Ashtabula Edgewood Warriors (2014-2019, to Chagrin Valley Conference)
Ashtabula Lakeside Dragons (2015-2019, to Chagrin Valley Conference)
Youngstown East Golden Bears (2014-19 [Football, 2015-19], to Steel Valley Conference)
Brookfield Warriors (2014-2020, to Mahoning Valley Athletic Conference)
Campbell Memorial Red Devils (2008-2020, to Mahoning Valley Athletic Conference)
Champion Golden Flashes (2008-2020, to Mahoning Valley Athletic Conference)
Columbiana Crestview Rebels (2019-2020, to Mahoning Valley Athletic Conference)
Leavittsburg LaBrae Vikings (2008-2020, to Mahoning Valley Athletic Conference)
Liberty Leopards (2008-2020, to Mahoning Valley Athletic Conference)
Newton Falls Tigers (2008-2020, to Mahoning Valley Athletic Conference)
Chagrin Valley Conference
Chagrin Division
Chagrin Falls Tigers (1964-)
Ashtabula Edgewood Warriors (2019-)
Geneva Eagles (2015-)
Kirtland Hornets (1996-)
Ashtabula Lakeside Dragons (2019-)
Pepper Pike Orange Lions (1964-1996, 1998-)1
Perry Pirates (1996-)
Chesterland West Geauga Wolverines (1963-1996, 1998-)1
Metro Division
Brooklyn Hurricanes (2019-)
Cuyahoga Heights Redskins (2005-)
Independence Blue Devils (2005-)
Rocky River Lutheran West Longhorns (2019-)
Richmond Heights Spartans (2005-)
Garfield Heights Trinity Trojans (2019-)
Wickliffe Blue Devils (1980-)
Valley Division
Beachwood Bison (2005-)
Burton Berkshire Badgers (1996-)
Middlefield Cardinal Huskies (1996-)
Crestwood Red Devils (2020-)
Orwell Grand Valley Mustangs (1998-2009, 2019-)
Painesville Harvey Red Raiders (2009-)
Gates Mills Hawken Hawks (1996-)
Played 1996–98 in Western Reserve.
Former members
Aurora Greenmen (1964-1983, to East Suburban, 1996–2015, to Suburban)
Chardon Hilltoppers (1964-1980, to East Suburban, 1983–1996, to Premier Athletic Conference 1998)
Fairport Harbor Fairport Harding Skippers (2005-2020)
Bainbridge Kenston Bombers (1964-1996, to Western Reserve, 2005–2015, to Western Reserve)
Newbury Black Knights (1998-2014, to Northeastern Athletic Conference)
Solon Comets (1964-1996, to Western Reserve)
Twinsburg Tigers (1964-1996, to Western Reserve)
Football divisions
Cleveland Senate Athletic League
Cleveland John Adams Rebels (1923–95, 2006-)
Cleveland Jane Addams Executives (1985-, no football)
Cleveland Collinwood Railroaders (1924-)
Cleveland East Technical Scarabs (1908-)
Cleveland Glenville Tarblooders (1905-)
Cleveland Max S. Hayes Lakers (1957-, no football)
Cleveland John F. Kennedy Fighting Eagles (1966-)
Cleveland Martin Luther King, Jr. Crusaders (1972-, no football)
Cleveland Lincoln-West Wolverines (1961-)
Cleveland John Marshall Lawyers (1936-)
Cleveland James F. Rhodes Rams (1936-)
Cleveland John Hay Hornets (1936-)
Former members:
Cleveland Aviation Thunderbirds (1965–95)
Cleveland Benedictine Bengals (1936–72)
Cleveland Cathedral Latin Lions (1936–67)
Cleveland Central Trojans (1904–52)
Cleveland East Blue Bombers (1904-2010)
Parma Heights Holy Name Green Wave (1936–67)
Cleveland Lincoln Wolverines (1936–70)
Cleveland St. Ignatius Wildcats (1936–67)
Cleveland South Flyers (1904-2010)
Cleveland West Cowboys (1904–61)
Cleveland West Technical Warriors (1904–95)
Cleveland Whitney M. Young Warriors (2004-2018)
Crown Conference
Cleveland Heights Beaumont Blue Streaks (2021-)
Mentor Lake Catholic Cougars (2021-)
Chardon Notre Dame-Cathedral Latin Lions (2021-)
Parma Padua Franciscan Bruins (2021-)
Cleveland Villa Angela-St. Joseph Vikings (2021-)
Cuyahoga Falls Walsh Jesuit Warriors (2021-)
Eastern Buckeye Conference
Alliance Aviators (2018-)
Canton South Wildcats (2018-)
Carrollton Warriors (2018-)
Lexington Township Marlington Dukes (2018-)
Minerva Lions (2018-)
Salem Quakers (2018-)
Beloit West Branch Warriors (2018-)
Eastern Ohio Athletic Conference
The Eastern Ohio Athletic Conference league was formed after the Inter-Tri County League split into two separate conferences for the 2017–18 school year.
Columbiana Clippers (2017–)
Lisbon David Anderson Blue Devils (2017–)
East Palestine Bulldogs (2017–)
Leetonia Bears (2017–)
Salineville Southern Local Indians (2017–)
Hanoverton United Golden Eagles (2017–)
Wellsville Tigers (2017–)
Youngstown Valley Christian Eagles (2020–)
Former Members
Toronto Red Knights (2017–2019, concurrent with OVAC)
Federal League
Canton McKinley Bulldogs1 (2003–)
Plain GlenOak Golden Eagles (1975–)
Green Bulldogs (2015-)
Jackson Polar Bears (1964–)
Lake Blue Streaks (1987–)
North Canton Hoover Vikings (1968–)
Perry Panthers (1964–)
Joined for all sports, besides football, in Fall 2003. Joined conference for football in Fall 2004.
Former members
Canton South Wildcats (1964–1990, to Northeastern Buckeye)
Navarre Fairless Falcons (1964–1976, to All-Ohio)
Canton Glenwood Eagles (1964–1975, consolidated into GlenOak)
Lexington Marlington Dukes (1964–1985, to Senate)
Magnolia Sandy Valley Cardinals (1964–1968, to Senate)
Louisville Leopards (1968–1990, to Northeastern Buckeye)
Canton Oakwood Golden Raiders (1968–1975, consolidated into GlenOak)
Alliance Aviators (1983–2003, to Metro Athletic)
New Philadelphia Quakers (1987–1997, to East Central Ohio)
Canton Timken Trojans (1987–1995)
Wooster Generals (1987–2003, to Ohio Cardinal)
Austintown-Fitch Falcons1 (2003–2011, to All-American)
Boardman Spartans1 (2003–2012, football only through 2014 season)
Joined for all sports, besides football, in Fall 2003. Joined conference for football in Fall 2004.
Great Lakes Conference
East Division
Medina Buckeye Bucks (2019-)
Parma Heights Holy Name Green Wave (2015-)
Lakewood Rangers (2020-)
Parma Normandy Invaders (2015-)
Parma Redmen (2015-)
Parma Heights Valley Forge Patriots (2015-)
West Division
Bay Village Bay Rockets (2015-)
Elyria Catholic Panthers (2015-)
Fairview Park Fairview Warriors (2019-)
North Olmsted Eagles (2021-)
Rocky River Pirates (2015-)
Westlake Demons (2021-)
Great Lakes League (ice hockey)
Ice hockey only league. see
Gates Mills Gilmour Academy Lancers
Parma Heights Holy Name Green Wave
Mentor Lake Catholic Cougars
Parma Padua Franciscan Bruins
Shaker Heights Shaker Heights High School Red Raiders
Lakewood St. Edward Eagles
Hunting Valley University School Preppers
Cuyahoga Falls Walsh Jesuit Warriors
Greater Cleveland Conference
This conference has two incarnations. The first version lasted until 1998, and the second was begun by remaining members of the Northeast Ohio Conference in 2015.
Second version
Brunswick Blue Devils (2015-)
Elyria Pioneers (2015-2021, to Southwestern)
Euclid Panthers (2015-)
Medina Bees (2015-)
Mentor Cardinals (2015-)
Shaker Heights Red Raiders (2015-2020, to Lake Erie)
Solon Comets (2015-)
Strongsville Mustangs (2015-)
First version (1950-98)
Bedford Bearcats (1950-1998, to Lake Erie)
Berea Braves (1950-1975, to Lake Erie)
Euclid Panthers (1950-1998, to Lake Erie)
Garfield Heights Bulldogs (1950-1968, to Lake Erie)
Maple Heights Mustangs (1950-1998, to Lake Erie)
Middleburg Heights Midpark Meteors (1950-1975, to Lake Erie)
Willoughby Union Rangers (1950–58, split into Eastlake North and Willoughby South)
Eastlake North Rangers (1958-1998, to Premier)
Mentor Cardinals (1968-1993, to Lake Erie)
Mayfield Wildcats (1968-1998, to Western Reserve)
Willoughby South Rebels (1968-1998, to Premier)
Lyndhurst Brush Arcs (1975-1998, to Western Reserve)
Macedonia Nordonia Knights (1994-1997, to Western Reserve)
Independents
Canton Central Catholic Crusaders
Lyndhurst Brush Arcs
Conneaut Spartans
Willoughby Cornerstone Christian Patriots (no football)
Beachwood Fuchs Mizrachi Mayhem (no football)
Shaker Heights Hathaway Brown School Blazers (no football)
Columbiana Heartland Christian School Lions (no football)
Canton Heritage Christian School Conquerors (no football)
Cleveland Northeast Ohio College Preparatory Knights (no football)
Lakewood St. Edward Eagles
Cleveland St. Ignatius Wildcats
Ashtabula St. John Fighting Heralds
Akron St. Vincent-St. Mary Fighting Irish
Hunting Valley University Preppers
Massillon Washington Tigers
Louisville Leopards
Akron Archbishop Hoban Knights
Cleveland Benedictine Bengals (boys' only)
Cleveland St. Joseph Academy Jaguars (girls' only; no football)
Cleveland Central Catholic Ironmen
Gates Mills Gilmour Academy Lancers
Rocky River Magnificat Blue Streaks (girls' only; no football)
Lake Effect Conference
Willoughby Andrews Osborne Academy Phoenix (2012-)
Elyria First Baptist Christian Sabres (2012-)
Austinburg Grand River Eagles (2012-)
Chagrin Falls Geauga Grizzlies (2012-)
North Olmsted HEARTS for Jesus Christ Guardians (2012-)
Cleveland Horizon Science Dragons (2012-)
North Ridgeville Lake Ridge Academy Royals (2016-)
Sagamore Hills Lawrence Lions (2012-)
Cleveland St. Martin De Porres Lions (2012-)
This conference does not include football. Only Cleveland St. Martin De Porres, Cleveland Horizon Science Academy, North Ridgeville Lake Ridge Academy, and Willoughby Andrews Osborne Academy are current members of the OHSAA.
Lake Erie League
Bedford Bearcats (1998-)
Cleveland Heights Tigers (1928-)
Garfield Heights Bulldogs (1968-2007, to Northeast Ohio [Football 1968–86, 1993-2007])(2020-)
Lorain Titans (2010-)
Maple Heights Mustangs (1998-)
Shaker Heights Red Raiders (1923-2012, to Northeast Ohio, 2020-)
East Cleveland Shaw Cardinals (1928-)
Warrensville Heights Tigers (1993-, [Football 1993–2014, 2016-])
Former members
Cleveland Heights Lutheran East Falcons (2017-2019) (all sports except football)
Elyria Pioneers (1923–54, to Buckeye Conference. 1997–2003, to Pioneer)
Lakewood Rangers (1923-2007, to Northeast Ohio)
Lorain Steelmen (1923–54, to Buckeye Conference)
Rocky River Pirates (1923–37, to Southwestern)
Parma Redmen (1951-2003, to Pioneer)
Lyndhurst Brush Arcs (1962–75, to Greater Cleveland)
Parma Heights Valley Forge Patriots (1962-2003, to Pioneer)
Parma Normandy Invaders (1968-2003, to Pioneer)
Berea Braves (1975–79, to Pioneer)
Middleburg Heights Midpark Meteors (1975–79, to Pioneer)
Mentor Cardinals (1993-2011, to Northeast Ohio)
Euclid Panthers (1998-2015, to Greater Cleveland)
Lorain Admiral King Admirals (2002–10, consolidated into Lorain)
Lorain Southview Saints (2002–10, consolidated into Lorain)
Warren Warren G. Harding Raiders (2010-2013, to All-American, football through 2014 season)
Lorain County League/Conference
Originally began in 1924 as one of the small-school county leagues, the league survived the consolidation wave until 1961, when the schools who weren't already aligned with the Inland Conference joined the Lakeland Conference. The conference revived itself in 1986, as the Lakeland collapsed, and the schools banded together for roughly two decades until the schools split, this time to help form the Patriot Athletic and West Shore conferences. The third and current version of the league formed in 2019 from the remnants of the Patriot Athletic Conference.
Third Version (Lorain County League, 2019-)
Sullivan Black River Pirates (2019-)
Sheffield Brookside Cardinals (2019-)
Lorain Clearview Clippers (2019-)
Columbia Station Columbia Raiders (2019-)
Oberlin Firelands Falcons (2019-)
LaGrange Keystone Wildcats (2019-)
Oberlin Indians (2019-)
Wellington Dukes (2019-)
Second Version (Lorain County Conference, 1986-2005)
Avon Eagles (1986–2005, to West Shore)
Sheffield Brookside Cardinals (1986–2005, to Patriot)
Lorain Clearview Clippers (1986–2005, to Patriot)
Oberlin Firelands Falcons (1986–2005, to West Shore)
LaGrange Keystone Wildcats (1986–2005, to Patriot)
Oberlin Indians (1986–2005, to Patriot)
Wellington Dukes (1986–2005, to Patriot)
Elyria West Wolverines (1986–1996, school closed, consolidated into Elyria)
Grafton Midview Middies (1996–2005, to West SHore)
First Version (Lorain County League, 1924–61)
Avon Eagles1 (1924–61, to Inland)
Avon Lake Shoremen (1924–1961, to Lakeland)
Belden Bees (1924–55, consolidated into Midview)
Brighton Bears (1924–52, consolidated into Wellington)
Sheffield Brookside Cardinals1 (1924–61, to Inland)
Brownhelm Bombers (1924–52, consolidated into Firelands)
Kipton Camden Knights (1924–52, consolidated into Firelands)
Columbia Station Columbia Raiders1 (1924–61, to Inland)
Grafton Eaton Eels (1924–55, consolidated into Midview)
Grafton Comets (1924–55, consolidated into Midview)
Henrietta Hawks (1924–52, consolidated into Firelands)
LaGrange Wildcats (1924–59, consolidated into Keystone)
North Ridgeville Rangers (1924–27, to NOAL, 1933–61, to Lakeland)
Penfield Bombers (1924–59, consolidated into Keystone)
South Amherst Cavaliers1 (1924–61, to Inland)
Wellington Dukes (1924–27, to NOAL)
Lorain Clearview Clippers (1928–38, to NOAL, 1947–53, to Lakeland)
Oberlin Firelands Falcons1 (1952–61, to Inland)
Grafton Midview Middies (1955–61, to Lakeland)
Lagrange Keystone Wildcats2 (1959–61)
Concurrent with Inland Conference 1957–61.
Concurrent with Inland Conference 1959–61.
Division Alignments
Mahoning Valley Athletic Conference
The Mahoning Valley Athletic Conference was formed after the Inter-Tri County League split into two separate conferences for the 2017–18 school year. In 2020, the former Blue tier of the All-American Conference joined to create a new Grey tier.
Grey Tier
Brookfield Warriors (2020-)
Campbell Memorial Red Devils (2020–)
Warren Champion Golden Flashes (2020–)
Columbiana Crestview Rebels (2020–)
Garrettsville Garfield G-Men (2021–)
Leavittsburg LaBrae Vikings (2020–)
Youngstown Liberty Leopards (2020–)
Newton Falls Tigers (2020–)
Scarlet Tier
North Jackson Jackson-Milton Blue Jays (2017–)
Lowellville Rockets (2017–)
McDonald Blue Devils (2017–)
Sebring McKinley Trojans (2017–)
Mineral Ridge Rams (2017–)
New Middletown Springfield Tigers (2017–)
Atwater Waterloo Vikings (2017–)
Berlin Center Western Reserve Blue Devils (2017–)
Metro Athletic Conference
Westfield Township Cloverleaf Colts (2020-)
Coventry Comets (2020-)
Brimfield Field Falcons (2020-)
Norton Panthers (2020-)
Ravenna Ravens (2020-)
Lakemore Springfield Spartans (2020-)
Streetsboro Rockets (2020-)
Cuyahoga Falls Woodridge Bulldogs (2020-)
Northeast 8 Conference
Girard Indians (2018-)
Hubbard Eagles (2018-)
Jefferson Area Falcons (2018-)
Cortland Lakeview Bulldogs (2018-)
Niles McKinley Red Dragons (2018-)
Poland Poland Seminary Bulldogs (2018-)
Canfield South Range Raiders (2018-)
Struthers Wildcats (2018-)
Northeastern Athletic Conference
Ashtabula St. John Fighting Heralds (2002-)(football 2009-)
Kinsman Badger Braves (No football, 2003-)
North Bloomfield Bloomfield Cardinals (No football, 2002-)
Bristolville Bristol Panthers (No football, 2002-)
Southington Chalker Wildcats (2002-)(football 2009-)
Fairport Harbor Fairport Harding Skippers (2020-)
Lordstown Red Devils (No football, 2002-)
Cortland Maplewood Rockets (No football, 2002-)
Vienna Mathews Mustangs (2003-)(football 2009-)
Andover Pymatuning Valley Lakers (2002-)(football 2009-)
Windham Bombers (2013-)
Former Members
Thompson Ledgemont Redskins (2008-2015; school closed following a territory transfer to Berkshire Local Schools in Burton)
Orwell Grand Valley Mustangs (2009-2019; left for Chagrin Valley Conference)
Newbury Black Knights (2014-2020; school closed following a territory transfer to West Geauga Local Schools in Chesterland)
Portage Trail Conference
Lake Township Lake Center Christian Tigers (no football) (2015–)
Mogadore Wildcats (2005–)
Rootstown Rovers (2005–)
Palmyra Southeast Pirates (2005−)
Louisville St. Thomas Aquinas Knights (2020−)
Warren John F. Kennedy Eagles (2020–)
Former members
Garrettsville James A. Garfield G-Men (2005–2021, to Mahoning Valley Athletic)
East Canton Hornets (2005–2013, to Inter-Valley)
Kent Roosevelt Rough Riders (2005–2015, to Suburban League-American)
Atwater Waterloo Vikings (2005–2017, to Mahoning Valley Athletic)
Windham Bombers (2005–2013, to Northeastern Athletic)
Lodi Cloverleaf Colts (2015–2020, to Metro Athletic Conference)
Coventry Comets (2005–2020, to Metro Athletic Conference)
Brimfield Field Falcons (2005–2020, to Metro Athletic Conference)
Norton Panthers (2005–2020, to Metro Athletic Conference)
Ravenna Ravens (2005–2020, to Metro Athletic Conference)
Lakemore Springfield Spartans (2005–2020, to Metro Athletic Conference)
Streetsboro Rockets (2005–2020, to Metro Athletic Conference)
Cuyahoga Falls Woodridge Bulldogs (2005–2020, to Metro Athletic Conference)
Youngstown Valley Christian Eagles (2017–2020, to Eastern Ohio Athletic Conference)
Principals Athletic Conference
Also known as PAC-7/8
Cuyahoga Falls Cuyahoga Valley Christian Royals (2001-)
Navarre Fairless Falcons (1989-)
Loudonville Redbirds (football only, 2017-)
New Franklin Manchester Panthers (1989-)
Lawrence Northwest Indians (2017-)
Orrville Red Riders (2016-)
Wooster Triway Titans (2005-)
Tuscarawas Tuslaw Mustangs (1989-)
Former Members
Coventry Comets (1989–97, to Independent; 2001–05, to Portage Trail-Metro)
East Canton Hornets (1989-2005, to Portage Trail-County)
Gnadenhutten Indian Valley Braves (1992–96, 2007–17, to Inter-Valley Conference)
Magnolia Sandy Valley Cardinals (1989-2001, to Inter-Valley)
Canton Timken Trojans (2005–15, school closed)
Zoarville Tuscarawas Valley Trojans (1989-2017, to Inter-Valley Conference)
Southwestern Conference
Avon Eagles (2015-)
Avon Lake Shoremen (1964-)
Berea-Midpark Titans (2013-)
Elyria Pioneers (2021-)
Grafton Midview Middies (2015-)
North Ridgeville Rangers (2015-)
Olmsted Falls Bulldogs (1954-)
Amherst Marion L. Steele Comets (1947–1958 as Amherst, to Lakeland, 1986-)
Former members
Berea Braves (1937–1950, to Greater Cleveland, 2005–13, consolidated into Berea-Midpark)
Oberlin Indians (1937–1964, to Lakeland)
Rocky River Pirates (1937–2005, to West Shore)
Fairview Warriors (1940–2005, to West Shore)
Lorain Clearview Clippers (1945–1954, to Lakeland)
Wellington Dukes (1945–1954, to Lakeland)
Medina Bees (1947–1986, to Pioneer)
Bay Rockets (1954–2005, to West Shore)
Brecksville-Broadview Heights Bees (2005-2015, to Suburban)
Middleburg Heights and Brook Park Midpark Meteors (2005-2013, consolidated into Berea-Midpark)
Lakewood Rangers (2015-2020, to Great Lakes)
Steel Valley Conference
The original SVC existed from 1949 to 2009. 2019 marks the start of the second incarnation of the Steel Valley Conference.
Youngstown Cardinal Mooney Cardinals (1970-2009, 2019-)
Youngstown Chaney Cowboys (2003–09 [independent in football], 2019-)
Youngstown East Golden Bears (2007–09 [independent in football], 2019-)
Youngstown Ursuline Fighting Irish (1970-2009, 2019-)
Austintown-Fitch Falcons (1949-2003)
Girard Indians (1949–71)
Hubbard Eagles (1949–80)
Niles McKinley Red Dragons (1949–57, 1982–85)
Campbell Memorial Red Devils (1949–80)
Struthers Wildcats (1949–79)
Boardman Spartans (1951-2003)
Brookfield Warriors (1959–68)
Howland Tigers (1975–85)
Warren Western Reserve Raiders (1980–85)
Warren Warren G. Harding Presidents (1982–85, 1991-2009)
Warren John F. Kennedy Eagles (2003–09, Independent in football)
Youngstown Rayen Tigers (2003–07, no football, school closed)
Youngstown Wilson Presidents (2003–07, no football, school closed)
Suburban League
American Division
Aurora Greenmen (2015–)
Barberton Magics (2005–2011, 2015–)
Copley Indians (1949–present)
Cuyahoga Falls Black Tigers (2015–)
Granger Highland Hornets (1976–)
Revere Minutemen (1957–)
Kent Roosevelt Rough Riders (2015–)
Tallmadge Blue Devils (1990–)
National Division
Brecksville Bees (2015–)
Hudson Explorers (1949-1997, 2015–)
Macedonia Nordonia Knights (1947–1973, 2011–)
North Royalton Bears (2015–)
Stow-Munroe Falls Bulldogs (2015–)
Twinsburg Tigers (1957–1964, 2015–)
Wadsworth Grizzlies (1984–)
Former members
Green Bulldogs (1949–2015, to Federal)
New Franklin Manchester Panthers (1949–1976, to All-Ohio)
Mogadore Wildcats (1957–1968, to Portage County)
Cuyahoga Falls Woodridge Bulldogs (1957–1978, to Portage County)
Coventry Comets (1969–1983, to All-Ohio)
Norton Panthers (1972–2005, to Portage Trail-Metro)
Brimfield Field Falcons (1978–1990, to Portage County)
Westfield Cloverleaf Colts (1997–2015, to Portage Trail-Metro)
Wayne County Athletic League
Doylestown Chippewa Chipps (known as Doylestown until 1971; 1924–)
Dalton Bulldogs (1924–)
Jeromesville Hillsdale Falcons (1970–)
West Salem Northwestern Huskies (1951–)
Creston Norwayne Bobcats (1953–)
Rittman Indians (1924–1937, 1961–)
Smithville Smithies (1924–)
Apple Creek Waynedale Golden Bears (1955–)
Former members
Apple Creek Aces (1924–1955, consolidated into Waynedale)
Big Prairie Bobcats (1924–1937, to Holmes County League)
Burbank Bombers (1924–1953, consolidated into Norwayne)
Chester Pups (1924–1951, consolidated into Northwestern)
Congress Senators (1924–1951, consolidated into Northwestern)
Creston Panthers (1924–1951, consolidated into Norwayne)
Fredericksburg Freddies (1924–1955, consolidated into Waynedale)
Marshallville Tigers (1924–1938, consolidated into Dalton, transferred to Smithville 1955)
Mount Eaton Paint Township Pirates (1924–1955, consolidated into Waynedale)
Shreve Trojans (1924–1963, consolidated into Triway)
Sterling Eagles (1924–1953, consolidated into Norwayne)
West Salem Clippers (1924–1951, consolidated into Northwestern)
Wooster Triway Titans (1963–1970, to Chippewa Conference)
Western Reserve Conference
The Western Reserve Conference is the name of four separate conferences (including two that ran simultaneously for a few years) in Northeastern Ohio.
Fourth Version (2015-)
This version was formed as most of the Premier Athletic Conference combined with two schools from the Northeast Ohio Conference, and one from the Chagrin Valley Conference.
Chardon Hilltoppers (2015-)
Auburn/Bainbridge Kenston Bombers (2015-)
Mayfield Wildcats (2015-)
Madison Blue Streaks (2015-)
Eastlake North Rangers (2015-)
Painesville Riverside Beavers (2015-)
Willoughby South Rebels (2015-)
Third Version (1996–2007)
This version was formed in 1996, as the Metro League merged with five schools from the Chagrin Valley Conference. This version of the WRC would combine with the Pioneer Conference to become the Northeast Ohio Conference.
Barberton Magics (1996–2005)
Cuyahoga Falls Black Tigers (1996–2007)
Bainbridge Kenston Bombers (1996–2005)
Pepper Pike Orange Lions (1996–1998)
Ravenna Ravens (1996–2005)
Kent Roosevelt Rough Riders (1996–2005)
Solon Comets (1996–2007)
Stow-Munroe Falls Bulldogs (1996–2007)
Twinsburg Tigers (1996–2007)
Chester West Geauga Wolverines (1996–1998)
Hudson Explorers (1997–2007)
Macedonia Nordonia Knights (1997–2007)
Lyndhurst Brush Arcs (1998–2007)
Mayfield Wildcats (1998–2007)
Second Version (1920s-68)
This version started as the Lake County League in the early 1920s, taking the WRC name in 1948 (despite the first WRC still existing). The league would last another 20 years before folding in 1968.
Fairport Harbor Fairport Harding Skippers (1920s-28, to Lake Shore League, 1948–51, to Northeastern Conference, 1962–68, to Lake Shore League)
Painesville Harvey Red Raiders (1920s-28, to Lake Shore League)
Kirtland Hornets (1920s-60, to Great Lakes Athletic Conference)
Madison Blue Streaks (1920s-68, to Lake Shore League)
Perry Pirates (1920s-68, to Lake Shore League)
Willoughby Union Rangers (1920s-28, to Lake Shore League)
Wickliffe Blue Devils (1920s-57, to Northeastern Conference)
Chardon Hilltoppers (1948–64, to Chagrin Valley Conference)
Painesville Riverside Beavers (1949–51, to NortheasternConference)
Conneaut Trojans (1951–59, to Northeastern Conference)
Ashtabula Harbor Mariners (1951–65, to Northeastern Conference)
Lakeland Rowe Vikings (1951–64, consolidated into Conneaut)
Jefferson Falcons (1954–68, to Northeastern Conference)
Geneva Spencer Wildcats (1957–61, consolidated into Geneva)
Edgewood Warriors (1962–65, to Northeastern Conference)
First Version (1919-51)
This league was originally the Trolley League until 1931, when it took the name, Western Reserve League (Western Reserve Conference).
Cuyahoga Falls Black Tigers (1919–29, 1937–51)
Kenmore Cardinals (1919–29)
Ravenna Ravens (1919–51)
Kent Roosevelt Rough Riders (1919–51)
Kent State Blue Devils (1919–37)
Bedford Bearcats (1921-2?)
Medina Battling Bees (19??-31)
Orrville Red Riders (1920–24, 1926–29, 1932–38)
Ellet Orangemen (1931–37)
Wadsworth Grizzlies (1931–41)
Akron St. Vincent Fighting Irish (1938–48)
Defunct conferences
See also
Ohio High School Athletic Association
Notes and references |
10974710 | https://en.wikipedia.org/wiki/Xmonad | Xmonad | xmonad is a dynamic window manager (tiling) for the X Window System, noted for being written in the functional programming language Haskell.
Window manager
Begun in March 2007, version 0.1 was announced in April 2007 as 500 lines of Haskell. xmonad is a tiling window manager—akin to dwm, larswm, and StumpWM. It arranges windows in a non-overlapping pattern, and enables managing windows without using the mouse. xmonad is packaged and distributed on a wide range of Unix-like operating systems, such as a large number of Linux distributions, and BSD systems.
While originally a clone of dwm (derivative in areas such as default keybindings), xmonad now supports features not available to dwm users such as per-workspace layout, tiling reflection, state preservation, layout mirroring, GNOME support and per-screen status bars; it can be customised by modifying an external configuration file and 'reloaded' while running. xmonad features have begun to influence other tiling window managers: dwm has borrowed "urgency hooks" from xmonad, has also included Xinerama support (for multihead displays) with release 4.8, and patches exist to reimplement xmonad's Fibonacci layout.
Haskell project
In 2007 the man page stated: By utilising the expressivity of a modern functional language with a rich static type system, xmonad provides a complete, featureful window manager in less than 500 lines of code, with an emphasis on correctness and robustness. Internal properties of the window manager are checked using a combination of static guarantees provided by the type system, and type-based automated testing. A benefit of this is that the code is simple to understand, and easy to modify.
Extensions to the core system, including emulation of other window managers, and unusual layout algorithms—such as window tiling based on the Fibonacci spiral—have been implemented by the active community and are available as a library.
In addition to obviating the need for the mouse, the xmonad developers make heavy use of semi-formal methods and program derivation for improving reliability and enabling a total line of code count less than 1200, as of version 0.7; window manager properties (such as the behavior of window focus) are checked through use of QuickCheck. This emphasis makes xmonad unusual in a number of ways; besides being the first window manager written in Haskell, it is also the first to use the zipper data structure for automatically managing focus, and its core has been proven to be safe with respect to pattern matches, contributing further to reliability. The developers write:
xmonad is a tiling window manager for the X Window system, implemented, configured and dynamically extensible in Haskell. This demonstration presents the case that software dominated by side effects can be developed with the precision and efficiency we expect from Haskell by utilising purely functional data structures, an expressive type system, extended static checking and property-based testing. In addition, we describe the use of Haskell as an application configuration and extension language.
The code is separated into side-effect free code, and a thin wrapper for the side-effects. According to Alejandro Serrano Mena, there are two ways of implementing domain-specific languages for actions in Haskell applications and libraries: "developing a combinator library" or "rolling your own monad", with xmonad being a successful example of the latter.
xmonad was regarded as one of the most well known Haskell projects in a 2013 functional programming book.
Reception
Linux Magazine included xmonad in a list of "My Top Resources of 2009". In 2012, How-To Geek described xmonad as having good, but complicated, ability to be configured, and it was included in a 2013 list of eight desktop environments for Linux. Lifehacker wrote that the basic operations of xmonads user interface can be taught using a small set of instructions. A high level of customisation and speed were noted by Network World, and in MakeUseOf xmonad was reviewed positively compared to Openbox.
In 2016 Ars Technica said xmonad and Awesome had more advanced tiling ability than Cinnamon. In 2017 it was described as powerful, with application as a windows manager for big data, while in an article on opensource.com on the other hand, dwm was chosen over xmonad. A TechRadar review of the "Best Linux desktop of 2018" said "If there's one desktop environment that stands out from all the others we have here, it's this one."
Due to the small number of lines of code of the Xmonad application, the use of the purely functional programming language Haskell, and recorded use of a rigorous testing procedure it is sometimes used as a baseline application in other research projects. This has included re-implementation of xmonad using the Coq proof assistant, a determination xmonad is an imperative program, and studies of package management relating to the NixOS linux distribution.
See also
Comparison of X window managers
Formal verification
References
Notes
Association for Computing Machinery archive
Further reading
According to Bryan Lunduke xmonad is an unknown desktop environment written in an unknown programming language, adding "Are xmonad and Haskell failures? Are they dead? No. Because they are unique. They are customizable. They are alive and kicking (and awesome)."
– the use of xmonad and other lightweight window managers
External links
"Taste of Haskell" - OSCON presentation by Simon Peyton Jones on Haskell, using xmonad as an example
First half of talk on YouTube (video)
Second half of talk on YouTube (video)
Free software programmed in Haskell
Free X window managers
Tiling window managers
X window managers extensible by scripting
Software using the BSD license |
11746640 | https://en.wikipedia.org/wiki/ProSyst | ProSyst | ProSyst Software GmbH was founded in Cologne in 1997 as a company specializing in Java software and middleware. ProSyst's first commercial application was a Java EE application server. In 2000, the company sold this server technology and has since focused completely on OSGi solutions.
In 1999 ProSyst was among the first companies to join the OSGi Alliance and since then has made important contributions to the development of each release of OSGi specifications (Release 1–4). ProSyst is a member of the OSGi Alliance board of directors alongside IBM, Nokia, NTT, Siemens, Oracle Corporation, Samsung, Motorola and Telcordia. Additionally, members of ProSyst staff serve in several positions on the OSGi Alliance.
In recent years ProSyst set its focus exclusively on the development of OSGi related software such as Frameworks, Bundles, Remote Management Systems and OSGi tools for developers including a full SDK available for download. ProSyst's OSGi applications are used by SmartHome devices, mobile phone manufacturers, network equipment providers (in CPEs), white goods manufacturers, car manufacturers and in the eHealth market.
ProSyst employs more than 120 Java and OSGi experts and offers OSGi related training, support (SLAs), technical consulting and development services.
As a member, ProSyst contributes to OSGi, Eclipse, Java Community Process, Nokia Forum Pro and the CVTA Connected Vehicle Trade Association.
Prosyst was acquired by Bosch in February 2015 and was merged into Bosch Group's software and systems unit Bosch Software Innovations GmbH.
Notable products
Commercial off-the-shelf products around OSGi mBS
Reduced-size Java client from 1999
References
Companies based in Cologne
Java platform software
Middleware
Software companies of Germany |
67094405 | https://en.wikipedia.org/wiki/Comparison%20of%20user%20features%20of%20operating%20systems | Comparison of user features of operating systems | Comparison of user features of operating systems refers to a comparison of the general user features of major operating systems in a narrative format. It does not encompass a full exhaustive comparison or description of all technical details of all operating systems. It is a comparison of basic roles and the most prominent features. It also includes the most important features of the operating system's origins, historical development, and role.
Overview
An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.
For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer from cellular phones and video game consoles to web servers and supercomputers.
The dominant general-purpose desktop operating system is Microsoft Windows with a market share of around 76.45%. macOS by Apple Inc. is in second place (17.72%), and the varieties of Linux are collectively in third place (1.73%). In the mobile sector (including smartphones and tablets), Android's share is up to 72% in the year 2020. According to third quarter 2016 data, Android's share on smartphones is dominant with 87.5 percent with also a growth rate of 10.3 percent per year, followed by Apple's iOS with 12.1 percent with per year decrease in market share of 5.2 percent, while other operating systems amount to just 0.3 percent. Linux distributions are dominant in the server and supercomputing sectors. Other specialized classes of operating systems (special-purpose operating systems)), such as embedded and real-time systems, exist for many applications. Security-focused operating systems also exist. Some operating systems have low system requirements (i.e. light-weight Linux distribution). Others may have higher system requirements.
Some operating systems require installation or may come pre-installed with purchased computers (OEM-installation), whereas others may run directly from media (i.e. live cd) or flash memory (i.e. usb stick).
MS-DOS
Overview
MS-DOS (acronym for Microsoft Disk Operating System) is an operating system for x86-based personal computers mostly developed by Microsoft. Collectively, MS-DOS, its rebranding as IBM PC DOS, and some operating systems attempting to be compatible with MS-DOS, are sometimes referred to as "DOS" (which is also the generic acronym for disk operating system). MS-DOS was the main operating system for IBM PC compatible personal computers during the 1980s, from which point it was gradually superseded by operating systems offering a graphical user interface (GUI), in various generations of the graphical Microsoft Windows operating system.
IBM licensed and re-released it in 1981 as PC DOS 1.0 for use in its PCs. Although MS-DOS and PC DOS were initially developed in parallel by Microsoft and IBM, the two products diverged after twelve years, in 1993, with recognizable differences in compatibility, syntax, and capabilities.
During its lifetime, several competing products were released for the x86 platform, and MS-DOS went through eight versions, until development ceased in 2000. Initially, MS-DOS was targeted at Intel 8086 processors running on computer hardware using floppy disks to store and access not only the operating system, but application software and user data as well. Progressive version releases delivered support for other mass storage media in ever greater sizes and formats, along with added feature support for newer processors and rapidly evolving computer architectures. Ultimately, it was the key product in Microsoft's development from a programming language company to a diverse software development firm, providing the company with essential revenue and marketing resources. It was also the underlying basic operating system on which early versions of Windows ran as a GUI.
Microsoft Windows
Overview
Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. Active Microsoft Windows families include Windows NT and Windows IoT; these may encompass subfamilies, (e.g. Windows Server or Windows Embedded Compact) (Windows CE). Defunct Microsoft Windows families include Windows 9x, Windows Mobile, and Windows Phone.
Microsoft introduced an operating environment named Windows on 20 November 1985, as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUIs). Microsoft Windows came to dominate the world's personal computer (PC) market with over 90% market share, overtaking Mac OS, which had been introduced in 1984, while Microsoft has in 2020 lost its dominance of the consumer operating system market, with Windows down to 30%, lower than Apple's 31% mobile-only share (65% for desktop operating systems only, i.e. "PCs" vs. Apple's 28% desktop share) in its home market, the US, and 32% globally (77% for desktops), where Google's Android leads.
Apple came to see Windows as an unfair encroachment on their innovation in GUI development as implemented on products such as the Lisa and Macintosh (eventually settled in court in Microsoft's favor in 1993). On PCs, Windows is still the most popular operating system in all countries. However, in 2014, Microsoft admitted losing the majority of the overall operating system market to Android, because of the massive growth in sales of Android smartphones. In 2014, the number of Windows devices sold was less than 25% that of Android devices sold. This comparison, however, may not be fully relevant, as the two operating systems traditionally target different platforms. Still, numbers for server use of Windows (that are comparable to competitors) show one third market share, similar to that for end user use.
, the most recent version of Windows for PCs, tablets and embedded devices is Windows 10, version 20H2. The most recent version for server computers is Windows Server, version 20H2. A specialized version of Windows also runs on the Xbox One video game console.
Windows 95
Windows 95 introduced a redesigned shell based around a desktop metaphor; File shortcuts (also known as shell links) were introduced and the desktop was re-purposed to hold shortcuts to applications, files and folders, reminiscent of Mac OS.
In Windows 3.1 the desktop was used to display icons of running applications. In Windows 95, the currently running applications were displayed as buttons on a taskbar across the bottom of the screen. The taskbar also contained a notification area used to display icons for background applications, a volume control and the current time.
The Start menu, invoked by clicking the "Start" button on the taskbar or by pressing the Windows key, was introduced as an additional means of launching applications or opening documents. While maintaining the program groups used by its predecessor Program Manager, it also displayed applications within cascading sub-menus.
The previous File Manager program was replaced by Windows Explorer and the Explorer-based Control Panel and several other special folders were added such as My Computer, Dial Up Networking, Recycle Bin, Network Neighborhood, My Documents, Recent documents, Fonts, Printers, and My Briefcase among others. AutoRun was introduced for CD drives.
The user interface looked dramatically different from prior versions of Windows, but its design language did not have a special name like Metro, Aqua or Material Design. Internally it was called "the new shell" and later simply "the shell". The subproject within Microsoft to develop the new shell was internally known as "Stimpy".
In 1994, Microsoft designers Mark Malamud and Erik Gavriluk approached Brian Eno to compose music for the Windows 95 project. The result was the six-second start-up music-sound of the Windows 95 operating system, The Microsoft Sound and it was first released as a startup sound in May 1995 on Windows 95 May Test Release build 468.
When released for Windows 95 and Windows NT 4.0, Internet Explorer 4 came with an optional Windows Desktop Update, which modified the shell to provide several additional updates to Windows Explorer, including a Quick Launch toolbar, and new features integrated with Internet Explorer, such as Active Desktop (which allowed Internet content to be displayed directly on the desktop).
Some of the user interface elements introduced in Windows 95, such as the desktop, taskbar, Start menu and Windows Explorer file manager, remained fundamentally unchanged on future versions of Windows.
Windows 10
A new iteration of the Start menu is used on the Windows 10 desktop, with a list of places and other options on the left side, and tiles representing applications on the right. The menu can be resized, and expanded into a full-screen display, which is the default option in Tablet mode. A new virtual desktop system was added. A feature known as Task View displays all open windows and allows users to switch between them, or switch between multiple workspaces. Universal apps, which previously could be used only in full screen mode, can now be used in self-contained windows similarly to other programs. Program windows can now be snapped to quadrants of the screen by dragging them to the corner. When a window is snapped to one side of the screen, Task View appears and the user is prompted to choose a second window to fill the unused side of the screen (called "Snap Assist"). Windows' system icons were also changed.
Charms have been removed; their functionality in universal apps is accessed from an App commands menu on their title bar. In its place is Action Center, which displays notifications and settings toggles. It is accessed by clicking an icon in the notification area, or dragging from the right of the screen. Notifications can be synced between multiple devices. The Settings app (formerly PC Settings) was refreshed and now includes more options that were previously exclusive to the desktop Control Panel.
Windows 10 is designed to adapt its user interface based on the type of device being used and available input methods. It offers two separate user interface modes: a user interface optimized for mouse and keyboard, and a "Tablet mode" designed for touchscreens. Users can toggle between these two modes at any time, and Windows can prompt or automatically switch when certain events occur, such as disabling Tablet mode on a tablet if a keyboard or mouse is plugged in, or when a 2-in-1 PC is switched to its laptop state. In Tablet mode, programs default to a maximized view, and the taskbar contains a back button and hides buttons for opened or pinned programs by default; Task View is used instead to switch between programs. The full screen Start menu is used in this mode, similarly to Windows 8, but scrolls vertically instead of horizontally.
Apple Macintosh
Apple Classic MacOS
Overview
The classic Mac OS (System Software) is the series of operating systems developed for the Macintosh family of personal computers by Apple Inc. from 1984 to 2001, starting with System 1 and ending with Mac OS 9. The Macintosh operating system is credited with having popularized the graphical user interface concept. It was included with every Macintosh that was sold during the era in which it was developed, and many updates to the system software were done in conjunction with the introduction of new Macintosh systems.
Apple released the original Macintosh on 24 January 1984. The first version of the system software, which had no official name, was partially based on the Lisa OS, which Apple previously released for the Lisa computer in 1983. As part of an agreement allowing Xerox to buy shares in Apple at a favorable price, it also used concepts from the Xerox PARC Alto computer, which former Apple CEO Steve Jobs and other Lisa team members had previewed. This operating system consisted of the Macintosh Toolbox ROM and the "System Folder", a set of files that were loaded from disk. The name Macintosh System Software came into use in 1987 with System 5. Apple rebranded the system as Mac OS in 1996, starting officially with version 7.6, due in part to its Macintosh clone program. That program ended after the release of Mac OS 8 in 1997. The last major release of the system was Mac OS 9 in 1999.
Initial versions of the System Software ran one application at a time. With the Macintosh 512K, a system extension called the Switcher was developed to use this additional memory to allow multiple programs to remain loaded. The software of each loaded program used the memory exclusively; only when activated by the Switcher did the program appear, even the Finder's desktop. With the Switcher, the now familiar Clipboard feature allowed cut and paste between the loaded programs across switches including the desktop.
With the introduction of System 5, a cooperative multitasking extension called MultiFinder was added, which allowed content in windows of each program to remain in a layered view over the desktop, and was later integrated into System 7 as part of the operating system along with support for virtual memory. By the mid-1990s, however, contemporary operating systems such as Windows NT, OS/2, and NeXTSTEP had all brought pre-emptive multitasking, protected memory, access controls, and multi-user capabilities to desktop computers, The Macintosh's limited memory management and susceptibility to conflicts among extensions that provide additional functionality, such as networking or support for a particular device, led to significant criticism of the operating system, and was a factor in Apple's declining market share at the time.
After two aborted attempts at creating a successor to the Macintosh System Software called Taligent and Copland, and a four-year development effort spearheaded by Steve Jobs' return to Apple in 1997, Apple replaced Mac OS with a new operating system in 2001 named Mac OS X; the X signifying the underlying Unix system family base shared with Jobs' development of the NeXTSTEP operating systems on the NeXT computer. It retained most of the user interface design elements of the classic Mac OS, and there was some overlap of application frameworks for compatibility, but the two operating systems otherwise have completely different origins and architectures.
The final updates to Mac OS 9 released in 2001 provided interoperability with Mac OS X. The name "Classic" that now signifies the historical Mac OS as a whole is a reference to the Classic Environment, a compatibility layer that helped ease the transition to Mac OS X (now macOS).
Apple MacOS X
Overview
MacOS previously Mac OS X and later OS X) is a series of proprietary graphical operating systems developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop, laptop and home computers, and by web usage, it is the second most widely used desktop OS, after Microsoft Windows.
macOS is the direct successor to the classic Mac OS, the line of Macintosh operating systems with nine releases from 1984 to 1999. macOS adopted the Unix kernel and inherited technologies developed between 1985 and 1997 at NeXT, the company that Apple co-founder Steve Jobs created after leaving Apple in 1985. Releases from Mac OS X 10.5 Leopard and thereafter are UNIX 03 certified. Apple's mobile operating system, iOS, has been considered a variant of macOS.
Mac OS X 10.0 (code named Cheetah) was the first major release and version of macOS, Apple's desktop and server operating system. Mac OS X 10.0 was released on 24 March 2001 for a price of US$129. It was the successor of the Mac OS X Public Beta and the predecessor of Mac OS X 10.1 (code named Puma).
Mac OS X 10.0 was a radical departure from the classic Mac OS and was Apple's long-awaited answer for a next generation Macintosh operating system. It introduced a brand new code base completely separate from Mac OS 9's as well as all previous Apple operating systems, and had a new Unix-like core, Darwin, which features a new memory management system. Unlike releases of Mac OS X 10.2 to 10.8, the operating system was not externally marketed with the name of a big cat.
Apple MacOS Components
The Finder is a file browser allowing quick access to all areas of the computer, which has been modified throughout subsequent releases of macOS. Quick Look has been part of the Finder since version 10.5. It allows for dynamic previews of files, including videos and multi-page documents without opening any other applications. Spotlight, a file searching technology which has been integrated into the Finder since version 10.4, allows rapid real-time searches of data files; mail messages; photos; and other information based on item properties (metadata) and/or content. macOS makes use of a Dock, which holds file and folder shortcuts as well as minimized windows.
Apple added Exposé in version 10.3 (called Mission Control since version 10.7), a feature which includes three functions to help accessibility between windows and desktop. Its functions are to instantly display all open windows as thumbnails for easy navigation to different tasks, display all open windows as thumbnails from the current application, and hide all windows to access the desktop. FileVault is optional encryption of the user's files with the 128-bit Advanced Encryption Standard (AES-128).
Features introduced in version 10.4 include Automator, an application designed to create an automatic workflow for different tasks; Dashboard, a full-screen group of small applications called desktop widgets that can be called up and dismissed in one keystroke; and Front Row, a media viewer interface accessed by the Apple Remote. Sync Services allows applications to access a centralized extensible database for various elements of user data, including calendar and contact items. The operating system then managed conflicting edits and data consistency.
All system icons are scalable up to 512×512 pixels as of version 10.5 to accommodate various places where they appear in larger size, including for example the Cover Flow view, a three-dimensional graphical user interface included with iTunes, the Finder, and other Apple products for visually skimming through files and digital media libraries via cover artwork. That version also introduced Spaces, a virtual desktop implementation which enables the user to have more than one desktop and display them in an Exposé-like interface; an automatic backup technology called Time Machine, which allows users to view and restore previous versions of files and application data; and Screen Sharing was built in for the first time.
In more recent releases, Apple has developed support for emoji characters by including the proprietary Apple Color Emoji font. Apple has also connected macOS with social networks such as Twitter and Facebook through the addition of share buttons for content such as pictures and text. Apple has brought several applications and features that originally debuted in iOS, its mobile operating system, to macOS in recent releases, notably the intelligent personal assistant Siri, which was introduced in version 10.12 of macOS.
Unix and Unix-like systems
Unix
Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
Initially intended for use inside the Bell System, AT&T licensed Unix to outside parties in the late 1970s, leading to a variety of both academic and commercial Unix variants from vendors including University of California, Berkeley (BSD), Microsoft (Xenix), Sun Microsystems (SunOS/Solaris), HP/HPE (HP-UX), and IBM (AIX). In the early 1990s, AT&T sold its rights in Unix to Novell, which then sold its Unix business to the Santa Cruz Operation (SCO) in 1995. The UNIX trademark passed to The Open Group, an industry consortium founded in 1996, which allows the use of the mark for certified operating systems that comply with the Single UNIX Specification (SUS). However, Novell continues to own the Unix copyrights, which the SCO Group, Inc. v. Novell, Inc. court case (2010) confirmed.
Unix systems are characterized by a modular design that is sometimes called the "Unix philosophy". According to this philosophy, the operating system should provide a set of simple tools, each of which performs a limited, well-defined function. A unified filesystem (the Unix filesystem) and an inter-process communication mechanism known as "pipes" serve as the main means of communication, and a shell scripting and command language (the Unix shell) is used to combine the tools to perform complex workflows.
Unix distinguishes itself from its predecessors as the first portable operating system: almost the entire operating system is written in the C programming language, which allows Unix to operate on numerous platforms.
macOS, described above, is a Unix-like system, and, beginning with Mac OS X Leopard, is certified to comply with the SUS.
Linux
Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on 17 September 1991, by Linus Torvalds. Linux is typically packaged in a Linux distribution.
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name "GNU/Linux" to emphasize the importance of GNU software, causing some controversy.
Popular Linux distributions include Debian, Fedora, and Ubuntu. Commercial distributions include Red Hat Enterprise Linux and SUSE Linux Enterprise Server. Desktop Linux distributions include a windowing system such as X11 or Wayland, and a desktop environment such as GNOME or KDE Plasma. Distributions intended for servers may omit graphics altogether, or include a solution stack such as LAMP. Because Linux is freely redistributable, anyone may create a distribution for any purpose.
Linux was originally developed for personal computers based on the Intel x86 architecture, but has since been ported to more platforms than any other operating system. Because of the dominance of the Linux-based Android on smartphones, Linux also has the largest installed base of all general-purpose operating systems. Although it is used by only around 2.3 percent of desktop computers, the Chromebook, which runs the Linux kernel-based Chrome OS, dominates the US K–12 education market and represents nearly 20 percent of sub-$300 notebook sales in the US. Linux is the leading operating system on servers (over 96.4% of the top 1 million web servers' operating systems are Linux), leads other big iron systems such as mainframe computers, and is the only OS used on TOP500 supercomputers (since November 2017, having gradually eliminated all competitors).
Linux also runs on embedded systems, i.e. devices whose operating system is typically built into the firmware and is highly tailored to the system. This includes routers, automation controls, smart home technology (like Google Nest), televisions (Samsung and LG Smart TVs use Tizen and WebOS, respectively), automobiles (for example, Tesla, Audi, Mercedes-Benz, Hyundai, and Toyota all rely on Linux), digital video recorders, video game consoles, and smartwatches. The Falcon 9's and the Dragon 2's avionics use a customized version of Linux.
Linux is one of the most prominent examples of free and open-source software collaboration. The source code may be used, modified and distributed commercially or non-commercially by anyone under the terms of its respective licenses, such as the GNU General Public License.
90% of all cloud infrastructure is powered by Linux including supercomputers and cloud providers. 74% of smartphones in the world are Linux-based.
KDE Plasma 5
KDE Plasma 5 is the fifth and current generation of the graphical workspaces environment created by KDE primarily for Linux systems. KDE Plasma 5 is the successor of KDE Plasma 4 and was first released on 15 July 2014. It includes a new default theme, known as "Breeze", as well as increased convergence across different devices. The graphical interface was fully migrated to QML, which uses OpenGL for hardware acceleration, which resulted in better performance and reduced power consumption.
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular open-source BSD operating system, accounting for more than three-quarters of all installed simply, permissively licensed BSD systems.
FreeBSD has similarities with Linux, with two major differences in scope and licensing: FreeBSD maintains a complete system, i.e. the project delivers a kernel, device drivers, userland utilities, and documentation, as opposed to Linux only delivering a kernel and drivers, and relying on third-parties for system software;and FreeBSD source code is generally released under a permissive BSD license, as opposed to the copyleft GPL used by Linux.
The FreeBSD project includes a security team overseeing all software shipped in the base distribution. A wide range of additional third-party applications may be installed using the pkg package management system or FreeBSD Ports, or by compiling source code.
Much of FreeBSD's codebase has become an integral part of other operating systems such as Darwin (the basis for macOS, iOS, iPadOS, watchOS, and tvOS), TrueNAS (an open-source NAS/SAN operating system), and the system software for the PlayStation 3 and PlayStation 4 game consoles.
Google Chrome OS
'Chrome OS (sometimes styled as chromeOS) is a Gentoo Linux-based operating system designed by Google. It is derived from the free software Chromium OS and uses the Google Chrome web browser as its principal user interface. However, Chrome OS is proprietary software.
Google announced the project in July 2009, conceiving it as an operating system in which both applications and user data reside in the cloud: hence Chrome OS primarily runs web applications. Source code and a public demo came that November. The first Chrome OS laptop, known as a Chromebook, arrived in May 2011. Initial Chromebook shipments from Samsung and Acer occurred in July 2011.
Chrome OS has an integrated media player and file manager. It supports Chrome Apps, which resemble native applications, as well as remote access to the desktop. Reception was initially skeptical, with some observers arguing that a browser running on any operating system was functionally equivalent. As more Chrome OS machines have entered the market, the operating system is now seldom evaluated apart from the hardware that runs it.
Android applications started to become available for the operating system in 2014, and in 2016, access to Android apps in Google Play's entirety was introduced on supported Chrome OS devices. Support for a Linux terminal and applications, known as Project Crostini, was released to the stable channel in Chrome OS 69. This was made possible via a lightweight Linux kernel that runs containers inside a virtual machine.
Chrome OS is only available pre-installed on hardware from Google manufacturing partners, but there are unofficial methods that allow it to be installed in other equipment. Its open-source upstream, Chromium OS, can be compiled from downloaded source code. Early on, Google provided design goals for Chrome OS, but has not otherwise released a technical description.
Other operating systems
See also
Comparison of operating systems
Hypervisor
Interruptible operating system
List of important publications in operating systems
List of operating systems
List of pioneers in computer science
Live CD
Glossary of operating systems terms
Microcontroller
Mobile device
Mobile operating system
Network operating system
Object-oriented operating system
Operating System Projects
System Commander
System image
Timeline of operating systems
Usage share of operating systems
Notes
References
Nav boxes
Operating systems
Operating systems |
17502621 | https://en.wikipedia.org/wiki/RadarSync | RadarSync | RadarSync PC Updater (known as RadarSync) is a driver and application update software program published by RadarSync Ltd. RadarSync's PC Updater offers a free scan and recommendations of updates to device drivers and software applications installed on a computer running Microsoft Windows. RadarSync does not store driver or software files on its servers, instead linking to the hardware or software vendor site for the files.
Like similar competing products which charge a membership fee for downloading the recommended updates, the free version of RadarSync does not download driver updates, a full paid version is required for that functionality. This functionality was initially available in the free version until sometime in 2009, when it was removed.
RadarSync is also known for maintaining a library of free links to drivers for Windows Vista.
Included software
RadarSync's installation offers several free ad-on software, including the Ask toolbar, although it does not require installation of these products to use RadarSync.
Competing Products
RadarSync competes against similar products such as those from DriverAgent, DriversHQ, VersionTracker, PC Pitstop, DriverGuide, Drivermagic, and others.
RadarSync is most similar to VersionTracker in function, in that both products provide updates of software and device drivers.
References
External links
Official Site
pcmag.com
RadarSync Review
Utilities for Windows |
1042717 | https://en.wikipedia.org/wiki/IBM%20System%209000 | IBM System 9000 | The System 9000 (S9000) is a family of microcomputers from IBM consisting of the System 9001, 9002, and 9003. The first member of the family, the System 9001 laboratory computer, was introduced in May 1982 as the IBM Instruments Computer System Model 9000. It was renamed to the System 9001 in 1984 when the System 9000 family name and the System 9002 multi-user general-purpose business computer was introduced. The last member of the family, the System 9003 industrial computer, was introduced in 1985. All members of the System 9000 family did not find much commercial success and the entire family was discontinued on 2 December 1986. The System 9000 was based around the Motorola 68000 microprocessor and the Motorola VERSAbus system bus. All members had the IBM CSOS real-time operating system (OS) stored on read-only memory; and the System 9002 could also run the multi-user Microsoft Xenix OS, which was suitable for business use and supported up to four users.
Features
There were three versions of the System 9000. The 9001 was the benchtop (lab) model, the 9002 was the desktop model without laboratory-specific features, and the 9003 was a manufacturing and process control version modified to be suitable for factory environments. The System 9002 and 9003 were based on the System 9001, which was based on around an 8MHz Motorola 68000, and the Motorola VERSAbus system bus (the System 9000 was one of the few that used the VERSAbus). Input/output ports included three RS-232C serial ports, an IEEE-488 instrument port, and a bidirectional 8-bit parallel port. For laboratory data acquisition, analog-to-digital converters that could be attached to its I/O ports were available. User input could be via a user-definable 10-key touch panel on the integrated CRT display, a 57-key user-definable keypad, or a 83-key Model F keyboard. The touch panel and keypad were designed for controlling experiments.
All System 9000 members had an IBM real-time operating system called CSOS (Computer System Operating System) on 128KB of read-only memory (ROM). This was a multi-tasking operating system that could be extended by loading components from disk. IBM also offered Microsoft Xenix on the System 9002, but this required at least 640KB of main memory and a VERSAbus card containing a memory management unit. The machines shipped with 128KB of main memory as standard, and up to 5MB could be added to the system using memory boards that plugged into the VERSAbus. Each board could contain up to 1MB, which were installed in 256KB increments.
History
The System 9000 was developed by IBM Instruments, Inc., an IBM subsidiary established in 1980 that focused on selling scientific and technical instruments as well as the computer equipment designed to control, log, or process these instruments. It was originally introduced as the IBM Instruments Computer System Model 9000 in May 1982. Its long name led to it being referred to as the Computer System 9000, CS-9000, CS/9000, or CS9000. Originally, the CS9000 was available for scientific instrument users, it was not offered to customers who wanted to use it for other purposes. The CS9000 was unsuccessful in this niche; the cheaper IBM Personal Computer was adequate for many instrumentation tasks, and IBM's larger general-purpose computers were used for more demanding tasks.
In 1983 IBM began encouraging value-added resellers to sell the CS9000 as an alternative to large computers like DEC Professional and Honeywell Level 6. IBM formally repositioned the CS9000 on February 21, 1984 as a family of computers, renaming it to the System 9000, which consisted of the System 9001 and 9002. The 9001 was a renamed CS9000, which retained its focus on the instrumentation market, while the 9002 was a general-purpose business computer that ran the IBM CSOS or Microsoft Xenix operating systems and supported one to four users. The 9002 was unsuccessful in the business market, due to the lack of business application software support from software developers other than IBM. IBM finally introduced a new model, the System 9003, in April 1985 as a computer-aided manufacturing computer, but it was also unsuccessful. As a result, manufacturing of the System 9000 family was stopped in January 1986, and it remained in limited availability until it was discontinued on 2 December 1986. Reasons cited for the failure of the System 9000 were its poor performance and high price, which led to the IBM PC being used where price was of concern, and to other 32-bit microcomputers being used where performance mattered. IBM closed its Instrument division in January 1987, reassigning the approximately 150 employees that had worked for it to other positions.
Reception
Noting the obscurity of its 1982 release, BYTE in January 1983 called the System 9000 "IBM's 'Secret' Computer" and stated that it was "in its quiet way, one of the most exciting new arrivals on today's microcomputer scene". The magazine speculated that with some changes it would be "a natural candidate for a business or general-purpose computer". A later review by a member of Brandeis University's chemistry department criticized several aspects of the hardware and software, but praised the sophisticated BASIC and IBM's customer service. The reviewer concluded that "the CS-9000 is a very fast and powerful laboratory computer [that is] very affordable".
IBM 9000
At least some ads by dealers in 1983 referred to "The IBM 9000: Multi-User Micro," although the name "IBM Computer System 9000" was also advertised.
IBM also sometimes referred to the System 9000 as "IBM 9000" in their own marketing, at least when referring to their C compiler for the system.
References
Further reading
(A book about the System 9000 and how to use it written by a researcher at IBM Research.)
The CS9000 Microcomputer, a SHARE paper on the CS9000 by Marty Sandfelder (IBM)
David J. States, "NUMBER CRUNCHING ON IBM'S NEW S9000. IBM joins with MIT's National Magnet Lab to develop spectrometers for imaging systems" in the BYTE Guide to the IBM PC, fall 1984, pp. 218–230 has a fairly extensive review of S9000 used with CSOS
System 9000
System 9000
68k architecture
32-bit computers |
16445602 | https://en.wikipedia.org/wiki/5130%20Ilioneus | 5130 Ilioneus | 5130 Ilioneus is a dark Jupiter trojan from the Trojan camp, approximately in diameter. It was discovered on 30 September 1989, by American astronomer Carolyn Shoemaker at the Palomar Observatory in California. The assumed C-type asteroid belongs to the 70 largest Jupiter trojans and has a rotation period of 14.8 hours. It was named after Ilioneus from Greek mythology.
Orbit and classification
Ilioneus is a dark Jovian asteroid orbiting in the trailering Trojan camp at Jupiter's Lagrangian point, 60° behind on the Gas Giant's orbit in a 1:1 resonance (see Trojans in astronomy). It is also a non-family asteroid of the Jovian background population.
It orbits the Sun at a distance of 5.2–5.3 AU once every 11 years and 11 months (4,343 days; semi-major axis of 5.21 AU). Its orbit has an eccentricity of 0.01 and an inclination of 16° with respect to the ecliptic. The body's observation arc begins with a precovery taken at Palomar in December 1955, almost 34 years prior to its official discovery observation.
Naming
This minor planet was named by the discover from Greek mythology after Ilioneus, a ship commander and official spokesman under Aeneas. The official naming citation was published by the Minor Planet Center on 4 June 1993 ().
Physical characteristics
Ilioneus is an assumed C-type asteroid. Its V–I color index of 0.96 is typical for most D-type asteroids, the dominant spectral type among the Jupiter trojans.
Rotation period
Photometric observations of Ilioneus were obtained by Stefano Mottola in February 1994. Lightcurve analysis gave a rotation period of hours with a brightness amplitude of 0.16 magnitude ().
Follow-up observations by astronomers at the Palomar Transient Factory in 2013, and by Robert D. Stephens at the Center for Solar System Studies in 2015 and 2017, gave a concurring period determination with an amplitude between 0.18 and 0.34 ().
Diameter and albedo
According to the surveys carried out by the Japanese Akari satellite, the Infrared Astronomical Satellite IRAS, and the NEOWISE mission of NASA's Wide-field Infrared Survey Explorer, Ilioneus measures between 52.49 and 60.71 kilometers in diameter and its surface has an albedo between 0.060 and 0.077. The Collaborative Asteroid Lightcurve Link derives an albedo of 0.0602 and a diameter of 59.40 kilometers based on an absolute magnitude of 9.8.
Notes
References
External links
Lightcurve Database Query (LCDB), at www.minorplanet.info
Dictionary of Minor Planet Names, Google books
Discovery Circumstances: Numbered Minor Planets (5001)-(10000) – Minor Planet Center
Asteroid 5130 Ilioneus at the Small Bodies Data Ferret
005130
Discoveries by Carolyn S. Shoemaker
Minor planets named from Greek mythology
Named minor planets
19890930 |
50014746 | https://en.wikipedia.org/wiki/Hacknet | Hacknet | Hacknet is a 2015 video game that allows the player to perform simulated computer hacking.
Gameplay
The game simulates a Unix-like operating system, with every main element of the game's interface having its own window. Windows are tiled in a fashion highly reminiscent of the i3 window manager. The windows have multiple tiling configurations with their own wallpapers and color schemes, which can be found as files as the game progresses. The main gameplay is done through two large interfaces, a graphical display, and a Unix terminal. Both interfaces are essential for gameplay, though the player can use either as their "main" interface. Along with the terminal, the computers in the game simulate a Unix-like file system, through which the player can explore the computer, and even destroy them by deleting critical system files. The core of the gameplay is to connect to other computers and run dedicated programs to break the security and acquire superuser privileges on the computer. The general procedure is to first run a scan to see what protections the computer has and then run programs matching what the scan revealed. Each program takes up a certain amount of memory, which the player has to manage, as there is only a limited amount of memory to share.
The game notably averts the common trope of bouncing a connection between several intermediary computers before reaching the target computer. Instead, a simplified system of a variable speed countdown is used to force the player to act quickly. If this countdown reaches zero, the player is given one last chance to avoid a game over by hacking their ISP and changing their IP address.
Once superuser privileges have been obtained, the file system of the computer is investigated. The exact task on each computer varies for each mission, but can, in general, be performed by running a specific command to access one or more files on the system.
A few systems have specialized interfaces, such as email systems and databases.
Most computer systems contain text files that can be read. A large majority of the files are quotes from the website bash.org.
Story
The game begins with the player being automatically contacted by a user by the username "Bit". The automated message tells the player that it was sent in the event of Bit's death and asks that the player investigate his death.
Bit then starts to teach you the game mechanics by way of simple missions. Bit will then tell you to join the hacking group Entropy.
After the tutorial, the story largely takes a back seat for open-ended gameplay, with a mission to address Bit's fate. This mission suggests that Bit was involved in some sort of illegal activity.
Naix
One of the missions the player takes on involves an opposing hacker by the alias of "Naix". They take offense to being investigated and attack the player by hacking their system. This attack can be defended against by launching the shell program on the user's computer and using the trap feature to stop the connection. However, this is not explained to users in-game. If the attack is successful, it will result in the game GUI disappearing and the virtual computer rebooting, leaving the player with a minimal console interface. Once the player has recovered their system from the attack, the storyline of the game splits: the player can choose to take revenge on the attacker and as a reward get access to a third faction in the game, or follow the guidance of their mission control and make a statement that such behavior is not acceptable, resulting in the resumption of your missions with the faction you were in (called Entropy) before the attack.
Project Junebug
One late-game mission in the game is called "Project Junebug". While the player can see it right after joining the hacking group that offers it, the mission will remain locked until all other missions have been taken care of. The mission is a request to provide euthanasia for someone terminally ill by hacking their pacemaker.
Finale
As the final story arc of the game, the player breaks into the computers of a computer security software company named "EnTech". As they do so, they are faced with a security system that makes computers invulnerable to the tools currently at the disposal of the player. As the player manages to find alternative ways into the protected systems, they discover that Bit was involved in a project for the company; specifically, the creation of a highly advanced operating system specialized in computer hacking. It is revealed that the plan for the project is to unleash the new operating system to the world in order to cause consumer demand for the protection system.
Bit in particular was a major contributor. As the project was nearing its completion, Bit was starting to question the morality of the project. A project owner asked an anonymous figure to "discourage him." Due to miscommunication, this led to a hit being put on Bit that ended with Bit's assassination, despite the project owner's attempts to stop the murder.
Once all the facts of the story have been revealed to the player, they proceed to eradicate all copies of the Hacknet project. Additionally, by command of Bit himself, they bring down the server at the heart of Porthack, the tool that Bit made. Once this final mission is completed, Bit delivers a few final, voice acted words before the game credits roll.
Development
Hacknet was developed by Matt Trobbiani, the sole developer of Team Fractal Alligator, based in Australia.
Reception
Hacknet received generally positive reviews from critics.
GameSpot gave the game an 8/10, praising the game for its unique presentation puzzle design.
DLC
A DLC expansion for "Hacknet", titled "Hacknet Labyrinths" was announced on August 30, 2016. The expansion was set to come out December 2016; however, development issues delayed release to March 31, 2017.
The expansion features new hacking tools and security systems, as well as a 3- to 4-hour chapter to the game, where the player is recruited by a hacker that goes by the alias "Kaguya" into a small elite hacking team. It includes more secrets, more UI themes and a full new soundtrack, from artists such as synthwave artist OGRE and Rémi Gallego, creator of metal/electronic act "The Algorithm".
Extensions
In May 2017, official mod support for Hacknet titled Hacknet Extensions was released worldwide, in which players can create their own custom stories and campaigns for the game. These extensions can be shared and downloaded from the Steam Workshop. Extensions are separate from the main game, and are accessed from a separate menu from the title screen.
Hacknet Extensions also features extension-exclusive tools and the ability to implement custom music and themes.
References
External links
2015 video games
Linux games
MacOS games
Simulation video games
Single-player video games
Video games developed in Australia
Video games scored by Christopher Larkin (composer)
Windows games
Hacking video games |
936630 | https://en.wikipedia.org/wiki/Port%20knocking | Port knocking | In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are dynamically modified to allow the host which sent the connection attempts to connect over specific port(s). A variant called single packet authorization (SPA) exists, where only a single "knock" is needed, consisting of an encrypted packet.
The primary purpose of port knocking is to prevent an attacker from scanning a system for potentially exploitable services by doing a port scan, because unless the attacker sends the correct knock sequence, the protected ports will appear closed.
Overview
Port knocking is usually implemented by configuring a daemon to watch the firewall log file for connection attempts to certain points, and then to modify the firewall configuration accordingly. It can also be performed on the kernel level (using a kernel-level packet filter such as iptables) or by a userspace process examining packets at a higher level (using packet capture interfaces such as pcap), allowing the use of already "open" TCP ports to be used within the knock sequence.
The port "knock" itself is similar to a secret handshake and can consist of any number of TCP, UDP or even sometimes ICMP and other protocol packets to numbered ports on the destination machine. The complexity of the knock can be anything from a simple ordered list (e.g. TCP port 1000, TCP port 2000, UDP port 3000) to a complex time-dependent, source-IP-based and other-factor-based encrypted hash.
A portknock daemon on the firewall machine listens for packets on certain ports (either via the firewall log or by packet capture). The client user would carry an extra utility, which could be as simple as netcat or a modified ping program or as complicated as a full hash-generator, and use that before they attempted to connect to the machine in the usual way.
Most portknocks are stateful systems in that if the first part of the "knock" has been received successfully, an incorrect second part would not allow the remote user to continue and, indeed, would give the remote user no clue as to how far through the sequence they failed. Usually the only indication of failure is that, at the end of the knock sequence, the port expected to be open is not opened. No packets are sent to the remote user at any time.
While this technique for securing access to remote network daemons has not been widely adopted by the security community, it has been actively used in many rootkits even before year 2000.
Benefits
Defeating port knocking protection requires large-scale brute force attacks in order to discover even simple sequences. An anonymous brute force attack against a three-knock TCP sequence (e.g. port 1000, 2000, 3000) would require an attacker to test every three port combination in the 1–65535 range and then scan each port between attacks to uncover any changes in port access on the target system. Since port knocking is by definition stateful, the requested port would not open until the correct three-port number sequence had been received in the correct order and without receiving any other intervening packets from the source. The average case scenario requires approximately 141 trillion (655353 / 2) packets to determine a correct three-port number. This technique, in combination with knock attempt-limiting, longer or more complex sequences and cryptographic hashes, makes successful port access attempts extremely difficult.
Once the successful port knock sequence is supplied to open a port, firewall rules generally only open the port to the IP address that supplied the correct knock, adding dynamic functionality to firewall behaviour. Instead of using a preconfigured static IP whitelist on the firewall, an authorised user situated anywhere in the world would be able to open any necessary port without assistance from the server administrator. The system could also be configured to allow the authenticated user to manually close the port once the session is over or to have it close automatically using a timeout mechanism. To establish a new session, the remote user would be required to reauthenticate using the correct sequence.
The stateful behaviour of port knocking allows several users from different source IP addresses to be at varying levels of port knock authentication simultaneously, allowing a legitimate user with the correct knock sequence through the firewall while the firewall itself is in the middle of a port attack from multiple IP addresses (assuming the bandwidth of the firewall is not completely consumed). From any other attacking IP address, the ports on the firewall will still appear to be closed.
Using cryptographic hashes inside the port knock sequence defends against packet sniffing between the source and target machines, preventing discovery of the port knock sequence or using the information to create traffic replay attacks to repeat prior port knock sequences.
Port knocking is used as part of a defense in depth strategy. Even if the attacker were to successfully gain port access, other port security mechanisms are still in place, along with the assigned service authentication mechanisms on the opened ports.
Implementation of the technique is straightforward, using at the bare minimum a shell script on the server and a Windows batch file or command line utility on the client. Overhead on both the server and client in terms of traffic, CPU and memory consumption is minimal. Port knock daemons are not complex to code; any type of vulnerability within the code is obvious and auditable.
A port knock system implemented on ports such as the SSH sidesteps the issue of brute force password attacks on logins. In the case of SSH, the SSH daemon is not activated without the correct port knock, and the attack is filtered by the TCP/IP stack rather than using SSH authentication resources. To the attacker, the daemon is inaccessible until the correct port knock is supplied.
Security considerations
Port knocking is a flexible, customisable system add-in. If the administrator chooses to link a knock sequence to an activity such as running a shell script, other changes such as implementing additional firewall rules to open ports for specific IP addresses can easily be incorporated into the script. Simultaneous sessions are easily accommodated.
By using strategies like dynamic length and pool of length can reduce the probability of hacking knock sequences to near zero.
In addition to mitigating brute force password attacks and the inevitable growth in logs associated with the process daemon, port knocking also protects against protocol vulnerability exploits. If an exploit were discovered that could compromise a daemon in its default configuration, using port knocking on the listening port reduces the possibility of compromise until the software or process is updated. Authorized users would continue to be served once they provide the correct knock sequence while random access attempts would be ignored.
Port knocking should only be viewed as part of an overall network defense strategy providing protection against random and targeted attacks, not as complete standalone solution.
Network security professionals have largely ignored port knocking as a solution in the past since early implementations relied solely on providing the correct port combinations to achieve access. Modern port knock systems incorporate features such as secure cryptographic hashes, blacklists, whitelists and dynamic attack responses to further increase system capability. Port knocking is an effective means of maximizing server resources on internet facing networks.
Properly implemented port knocking does not lower the overall security of a system. It is an effective measure that provides an additional layer of security with minimal server resource overhead. At worst, systems such as port knocking introduce new security issues through poor implementation or expose ambivalent administration attitudes through situations such as risk compensation.
Disadvantages
Port knocking is totally dependent on the robustness of the port knocking daemon. The failure of the daemon will deny port access to all users and from a usability and security perspective, this is an undesirable single point of failure. Modern port knocking implementations mitigate this issue by providing a process-monitoring daemon that will restart a failed or stalled port knocking daemon process.
Systems that do not use cryptographic hashes are vulnerable to IP address spoofing attacks. These attacks, a form of Denial of service, use port knocking functionality to lock out known IP addresses (e.g. administrator management stations) by sending packets with the spoofed IP address to random ports. Servers using static addressing are especially vulnerable to these types of denials of service as their addresses are well known.
Port knocking can be problematic on networks exhibiting high latency. Port knocking depends on packets arriving in the correct sequence to access its designed functionality. TCP/IP, on the other hand, is designed to function by assembling out of order packets into a coherent message. In these situations, the only solution is for the client to continue resending the correct sequence of packets on a periodic basis until the sequence is acknowledged by the server.
Port knocking cannot be used as the sole authentication mechanism for a server. From a security perspective, simple port knocking relies on security through obscurity; unintended publication of the knock sequence infers compromise of all devices supporting the sequence. Furthermore, unencrypted port knocking is vulnerable to packet sniffing. A network trace of suitable length can detect the correct knock sequence from a single IP address and thus provide a mechanism for unauthorised access to a server and by extension, the attached network. Once compromised, the log files on the device are a source of other valid knock sequences, revealing another point of failure. Solutions such as treating each knock sequence as a one-time password defeat the aim of simplified administration. In practice, port knocking must be combined with other forms of authentication that are not vulnerable to replay or man-in-the-middle attacks for the whole system to be effective.
References
External links
SilentKnock: Practical, Provably Undetectable Authentication
"An Analysis of Port Knocking and Single Packet Authorization" MSc Thesis by Sebastien Jeanquier
"Implementing a Port Knocking system in C" Honors Thesis by Matt Doyle.
List of resources about PK and SPA (papers, implementations, presentations...)
PortKnocking - A system for stealthy authentication across closed ports. (archived)
Linux Journal: Port Knocking (2003)
A Critique of Port Knocking (2004)
fwknop: An implementation that combines port knocking and passive OS fingerprinting
WebKnock: An online Port Knocking and Single Packet Authorization (SPA) client based on fwknop
webknocking: Using webpages instead of ports.
Port knocking to hide a backdoor Port knocking to hide communication channel for malware, example from the wild
Techniques for Lightweight Concealment and Authentication in IP Networks (2002)
Internet security |
78594 | https://en.wikipedia.org/wiki/Penthesilea | Penthesilea | Penthesilea () was an Amazonian queen in Greek mythology, the daughter of Ares and Otrera and the sister of Hippolyta, Antiope and Melanippe. She assisted Troy in the Trojan War, during which she was killed by Achilles.
In the Epic Cycle
In the five book epic Aethiopis, which was part of the Epic Cycle (or Cycle of Troy) on the Trojan War, the coming to Troy of Penthesilea and Memnon was described in detail. The Aethiopis was published in the 8th century BC and is attributed to Arctinus of Miletus. The main character of the epic is Achilles, who fights Penthesilea and Memnon before he is himself killed. Although Aethiopis has been lost, the Epic Cycle has been adapted and recycled in different periods of the classical age. The tradition of retelling the epic fall of Troy is indebted to Homer's Iliad and Odyssey, which were grounded in oral storytelling and were only written down when the Greek alphabet was adopted in ancient Greece.
In the Aethiopis Penthesilea is a Thracian woman warrior. She was an Amazon and daughter of Ares, who comes to help the Trojans. She arrived with twelve other Amazon warriors. After a day of distinguishing herself on the battlefield, Penthesilea confronts Achilles. Achilles kills her, and Thersites taunts Achilles by accusing him of having fallen in love with Penthesilea. Thersites is killed by Achilles, who travels to the island of Lesbos to be purified before returning to Troy and fighting Memnon.
According to Homer, the Trojan king Priam had fought the Amazons in his youth on the Sangarius River in Phrygia, some 350 miles east of Troy. Later writers of the antiquity located Amazons geographically in Anatolia and started an epic tradition where Greek heroes, such as Heracles and Theseus, fought an Amazon warrior of distinction. The Aethiopis version of the Penthesilea legend has become known as the Homeric tradition.
Other traditions
Different traditions of the Penthesilea legend appear to have existed at the time the Epic Cycle was published. In a lost poem of Stesichorus, believed to have been published in the 7th or 6th century, Penthesilea rather than Achilles had killed Hector.
Temple of Apollo Epicurius at Bassae
At the Temple of Apollo Epicurius, built in the mid- to late-5th century BC, scenes from the Trojan War are preserved in the Bassae Frieze, a high relief marble sculpture in 23 panels. Here the Greek army is charged by the Amazons, who gain the upper hand, and at the height of the battle Achilles slays Penthesilea on a slab known as BM 537. Achilles and Penthesilea are flanked by a Greek soldier and an Amazon. Penthesilea is identified as a queen by a crown. Penthesilea, shown on the ground just before being struck, and Achilles are exchanging a gaze. The final slab of the series on the Amazons depicts a truce between the Greek army and the Amazons at the end of the battle.
Temple of Zeus at Olympia
According to Pausanias, the throne of Zeus at Olympia bore a painting by Panaenus of the dying Penthesilea being supported by Achilles. Pausanias wrote "And, at the extremity of the painting, is Penthesilea breathing her last, and Achilles supporting her". The motive of Achilles supporting a dying or dead Penthesilea has been preserved at the Temple of Aphrodisias and was reinterpreted in sculptures and mosaics in ancient Rome.
As vase motif
A black-figure vase from about 510–500 BC shows Achilles carrying Penthesilea from the battlefield.
The subject of Penthesilea was treated so regularly by the so-called Penthesilea Painter, who was active between 470 and 450 BC, that Adolf Furtwängler dubbed him "The Penthesilea Painter". A considerable corpus for this innovative and prolific painter, whose work bridged the Severe style and Classicism and must have had a workshop of his own, was rapidly assembled in part by J.D. Beazley.
In the Bibliotheke
In the Pseudo-Apollodorus Epitome of the Bibliotheke she is said to have been killed by Achilles, "who fell in love with the Amazon after her death and slew Thersites for jeering at him".
Lycophron on Penthesilea
In the 3rd century BC, Lycophron went against the grain of the Homeric tradition. The poet had been born in Euboea, the site of a shrine to wounded Amazons who had fought in a mythic Battle for Athens. Lycophron tells the story of the young Amazon Clete, Penthesilea's attendant, who had been left behind in Pontus. Clete sets out with a company of Amazons to search for Penthesilea when she does not return from the Trojan War. The ship with Amazons is swept of course and after a shipwreck on the toe of Italy in Bruttium, Clete becomes the queen of the Amazons that settle there.
In Virgil's Aeneid
In Virgil's Aeneid, written between 29 and 19 BC, the Trojan army falls back when Achilles advances. Achilles drags the greatest Trojan warrior, Hector, around the city walls and sells his dead body to king Priam for gold. Penthesilea is cast as a tragic Amazon queen who came too late in vain to help the beleaguered city. When Aeneas sees the panel of Penthesilea in the Juno temple of Carthage, he knows that the defeat of Penthesilea and Memnon presage a chain of events that would culminate in the sacking of the city. Penthesilea's fate also foreshadows that of Camilla, which is described in detail by Virgil later in the epic. According to Virgil, Penthesilea led an army of Amazons and is a bellatrix (Latin for "female warrior") who dared to fight men (audetque viris concurrere virgo).
Virgil based his narrative in Homer's Iliad, while relying on the Epic Cycle for his portrayal of Penthesilea. Virgil also reworked oral legends into an epic on the foundation of Rome. In Aeneid the Romans descended from the hero Aeneas and Trojan refugees who sailed to Italy after the Trojan War. This interweaving of the Penthesilea legend with the founding legend of Rome can be traced to Lycophron.
In Diodorus' Bibliotheca
In his universal history Bibliotheca historica, Diodorus Siculus in the 1st century BC celebrated Penthesilea as the last Amazon to win renown for valour in war. Diodorus wrote that after the Trojan War the Amazons diminished and tales of their former glory began to be considered mere legends.
In Smyrnaeus' Posthomerica
In the 4th century AD, the imperial Greek poet Quintus Smyrnaeus made Penthesilea the subject of the first book in Posthomerica. In this epic, Smyrnaeus tries to finish Homer by telling the colourful story of how the city of Troy fell. This work explains how Penthesilea came to be at Troy: Penthesilea had killed Hippolyta with a spear when they were hunting deer; this accident caused Penthesilea so much grief that she wished only to die, but, as a warrior and an Amazon, she had to do so honorably and in battle. She therefore was easily convinced to join in the Trojan War. Smyrnaeus also describes in gory detail how the army of Amazons surprises the Greek army and the slaughter that commenced. The Amazon Klonie, after slaying her first opponent, is in turn killed. Penthesilea mows through the Greek lines, killing eight warriors, and cuts the arm off the Greek warrior who had killed Klonie. Penthesilea's Amazon comrades Bremusa, Evandre and Thermodosa fight valiantly alongside her but are slain, and so are Derinoe, Alkibie and Derimachea. Penthesilea slays more Greeks with axe and spear. From the towers the Trojan women watch and Penthesilea inspires the young Hippodamia, who urges the Trojan women to join the battle. Antimachus' daughter Tisiphone gives an inspirational speech: "not in strength are we inferior to men; the same our eyes, our limbs the same; one common light we see, one air we breathe; nor different is the food we eat. What then denied to us hath heaven on man bestowed? O let us hasten to the glorious war!"
In Boccaccio's Famous Women
Between 1361 and 1362 the Italian Giovanni Boccaccio wrote the first collection of biographies in Western literature that was devoted to famous women. The De Mulieribus Claris was published in Latin and dedicated to Andrea Acciaioli, the Countess of Altavilla. According to Boccaccio, Penthesilea succeeded the Amazon queens Antiope and Orithyia. She was in strength and skill superior to previous queens. According to Boccaccio, Penthesilea entered the Trojan War against the Greeks to impress Hector. But Penthesilea and her Amazon troops were slain at the end of a hard-fought battle with the Greeks. After recounting Penthesilea's accomplishments in De Mulieribus Claris Boccaccio wrote that "if we remember that practical experience can change natural dispositions" the legends of the Amazons become plausible. He wrote that "through practice, Penthesilea and women like her became much more manly in arms than those born male" who had been weakened through idleness and love of pleasure. The notion that upbringing and training were central to gender differences was discussed by Agostino Strozzi and Mario Equicola in 16th century Italy.
In the Middle Ages
In Medieval Europe the Penthesilea legend was developed and recycled, with Achilles fading into the background. In illuminations that illustrated manuscripts, Penthesilea was cast as medieval warrior queen. A tradition developed where Penthesilea entered the Trojan War because of her reverence for the Trojan hero Hector. Penthesilea appears in the Roman de Troie (1160) by Benoît de Sainte-Maure as a chivalric heroine, and through this became part of the medieval genre roman antique, which recycled Greek and Roman myths in a medieval romance context.
In late medieval Europe the legend was further popularised in Christine de Pizan's City of Ladies (1405) and John Lydgate's Troy Book (1420). Penthesilea and Hector became romantic heroes. Penthesilea came to Troy because she had fallen in love with the virtuous knight Hector from afar. Hector and Penthesilea were portrayed as personifications of the ideals of chivalry. When kneeling before Hector's corpse, Penthesilea promises to avenge his death. Penthesilea fights at the side of the Trojan army, killing many Greek soldiers, but is slain by Achilles' son. In this tradition of the legend, her body is taken to the Thermodon for burial. Along the Terme River various temple burial sites attest to the heroic status Penthesilea had as Amazon queen in the Middle Ages.
In John Gower's Confessio Amanatis she travels to Troy from Pafagoine. She is slain by Pirrus the son of Achilles. Philemenis returned her body for burial. He was rewarded with three fair maidens per year.
Biographical lists of strong women were published, some included Penthesilea. The 1405 Chronicle (known as Haagse handschrift) by the herald Baviere included Penthesilea and the two Amazons Semiramis and Tomyris among the strong women. A Netherlandish list of 101 strong women published between 1465 and 1480 included Penthesilea. This list of 101 women circulated at the court of Mary of Burgundy and was read by members of the Brussels administration. Philippe Bouton in 1480 published a Miroir des dames, which included Penthesilea.
Heinrich von Kleist's Penthesilea
The treatment of Penthesilea that has received most critical attention since the early twentieth century is the drama Penthesilea by Heinrich von Kleist, who cast its "precipitously violent tempo" in the form of twenty-four consecutive scenes without formal breaks into acts. In Kleist's Penthesilea, however, Achilles is slain by Penthesilea. When she realizes that she and her pack of dogs have mangled the object of their desire, she dies herself through "a crushing feeling".
The Swiss composer Othmar Schoeck wrote a 90' one-act opera, Penthesilea (Dresden, 1927) based on Kleist's drama. The French composer Pascal Dusapin's opera based on Kleist's work is scheduled to premiere in 2015 at La Monnaie in Brussels under the baton of Ludovic Morlot.
Edward Bellamy on "Penthesilia"
In Edward Bellamy's book Looking Backward, the main character (Julian West) is transported in time from 1887 (oddly the discovery date of the asteroid Penthesilea) to 2000. There, in the year 2000, the main character reads a book by one of the 20th century's most famous writers by the fictional name of Berrian. The title of this book is "Penthesilia" [sic] and it is a romance that supposedly exposes the true power and fullest extent of love.
Robert Graves on Penthesilea
In Robert Graves' short poem "Penthesileia", Achilles "for love of that fierce white naked corpse / Necrophily on her" commits, then slays Thersites for his mockery of Achilles' behavior. The last verse is open to interpretation, some have interpreted it that Penthelisea's ghost thanks Thersites for standing up for her honour, but it has been suggested that she thanks Achilles for killing Thersites.
Asteroid name
The asteroid 271 Penthesilea, discovered in 1887, was named in her honor.
Notes
References
Justinus, Epitome Historiarum philippicarum Pompei Trogi ii.4.31–32
Epitome of the Philippic History of Pompeius Trogus Book 2
The audio recording of ElvenQuest, published by BBC Audio in August 2009,
Diana Hyppolite, The Exposed Body in Antiquity. Yonkers: Sarah Lawrence College Press, 1984.
Women of the Trojan war
Queens of the Amazons
Children of Ares
Necrophilia |
57423331 | https://en.wikipedia.org/wiki/Vivian%20Green-Armytage | Vivian Green-Armytage | Vivian Bartley Green-Armytage FRCP, FRCS, FRCOG, (14 August 1882 – 11 April 1961) was a British gynaecologist. He was noted for his progressive views, his service to Indian gynaecology and obstetrics, and his distinguished service in the Royal Army Medical Corps during the First World War.
Early life
Vivian Green-Armytage was born at Clifton, England, on 14 August 1882 to Alfred Green-Armytage, a solicitor, and Amy Julia (Bartley) Armytage. He was educated at Clifton College and then at the University of Bristol and Bristol Royal Infirmary followed by post-graduate study in Paris.
In 1901–1902, he was a member of Clifton Rugby Football Club.
Indian Medical Service
Green-Armytage was commissioned lieutenant in the Indian Medical Service (IMS) in 1907 and promoted to captain in 1910. Also in 1910 he won the Montefiore Surgical Medal at the Royal Army Medical College. He was the resident medical officer and surgeon at the Eden Hospital and the Presidency General Hospital in Calcutta from 1911 to 1922.
He co-authored the fifth edition of Birch's Management and Medical Treatment of Children in India with Charles Robert Mortimer Green which was published by Thacker Spink & Co., in Calcutta in 1913. The book was originally published by Henry Goodeve as Hints for the General Management of Children in India in the absence of Professional Advice (1844).
First World War
His work in India was interrupted by the First World War in which he served as an officer in the Royal Army Medical Corps. He was mentioned three times in despatches and also received the Mons Star, the Croix de Chevalier de la Légion d'Honneur, and the Order of the White Eagle of Serbia with Crossed Swords, in 1917.
Professor in India
After his return from war service, Green-Armytage was promoted to major in the IMS in 1919, and finally to lieutenant colonel in 1927 before retiring in 1933.
He was professor of gynaecology and obstetrics at the Eden Hospital from 1922 to 1933. Before leaving India, Green-Armytage received a volume of his addresses that was prepared and published by the medical women of India as a symbol of their appreciation for his service.
In 1927, he married Mary Vera Moir-Byres née Gibson in Rangoon.
Later life
On his return to England, Green-Armytage practised as a consulting gynaecologist and held appointments with the West London, British Postgraduate, Italian, and Tropical Diseases Hospitals. He was an advocate of the vaginal hysterectomy which he had mastered in India. He was vice-president of the Royal College of Obstetricians and Gynaecologists from 1949 to 1952 for whom he endowed a travel fellowship and lecture.
He invented the Green Armytage forceps which are used to control excessive bleeding after a caesarean section.
In 1958, he was appointed Officier de la Légion d'Honneur.
He was a member of the Oriental Club and the East India Club. His hobbies included the classics and the history of medicine.
Death and legacy
Vivian Green-Armytage died in Chelsea, London, on 11 April 1961. The ribbon bar for his medals is in the collection of the Royal College of Obstetricians and Gynaecologists.
Selected publications
Birch's Management and Medical Treatment of Children in India. 5th edition. Thacker, Spink & Co., Calcutta, 1913. (With C.R.M. Green)
Labour-room Clinics, Being Aids to Midwifery Practice. Thacker, Spink & Co., Calcutta, 1913. (Lectures delivered at the Eden Hospital)
Tropical Midwifery: Labour-room Clinics. Thacker, Spink & Co., Calcutta, 1928.
The Management of Impaired Fertility. Oxford University Press, London, 1962. (With Margaret Moore White)
References
External links
1882 births
1961 deaths
Fellows of the Royal College of Surgeons
Fellows of the Royal College of Obstetricians and Gynaecologists
People educated at Clifton College
Alumni of the University of Bristol
Royal Army Medical Corps officers
British Army personnel of World War I
Fellows of the Royal College of Physicians
English obstetricians
English gynaecologists
Physicians of the Bristol Royal Infirmary
Indian Medical Service officers
English surgeons
English medical writers
Officiers of the Légion d'honneur
History of surgery
Presidents of the Osler Club of London
20th-century surgeons |
33109 | https://en.wikipedia.org/wiki/Wearable%20computer | Wearable computer | A wearable computer, also known as a wearable or body-borne computer, is a computing device worn on the body. The definition of 'wearable computer' may be narrow or broad, extending to smartphones or even ordinary wristwatches.
Wearables may be for general use, in which case they are just a particularly small example of mobile computing. Alternatively they may be for specialized purposes such as fitness trackers. They may incorporate special sensors such as accelerometers, heart rate monitors, or on the more advanced side, electrocardiogram (ECG) and blood oxygen saturation (SpO2) monitors. Under the definition of wearable computers, we also include novel user interfaces such as Google Glass, an optical head-mounted display controlled by gestures. It may be that specialized wearables will evolve into general all-in-one devices, as happened with the convergence of PDAs and mobile phones into smartphones.
Wearables are typically worn on the wrist (e.g. fitness trackers), hung from the neck (like a necklace), strapped to the arm or leg (smartphones when exercising), or on the head (as glasses or a helmet), though some have been located elsewhere (e.g. on a finger or in a shoe). Devices carried in a pocket or bag – such as smartphones and before them pocket calculators and PDAs, may or may not be regarded as 'worn'.
Wearable computers have various technical issues common to other mobile computing, such as batteries, heat dissipation, software architectures, wireless and personal area networks, and data management. Many wearable computers are active all the time, e.g. processing or recording data continuously.
Applications
Wearable computers are not only limited to computers such as fitness trackers that are worn on wrists; they also include wearables such as heart pacemakers and other prosthetics. They are used most often in research that focuses on behavioral modeling, health monitoring systems, IT and media development, where the person wearing the computer actually moves or is otherwise engaged with his or her surroundings. Wearable computers have been used for the following:
general-purpose computing (e.g. smartphones and smartwatches)
sensory integration, e.g. to help people see better or understand the world better (whether in task-specific applications like camera-based welding helmets or for everyday use like Google Glass
behavioral modeling
health care monitoring systems
service management
electronic textiles and fashion design, e.g. Microsoft's 2011 prototype "The Printing Dress".
Wearable computing is the subject of active research, especially the form-factor and location on the body, with areas of study including user interface design, augmented reality, and pattern recognition. The use of wearables for specific applications, for compensating disabilities or supporting elderly people steadily increases.
Operating systems
The dominant operating systems for wearable computing are:
Wear OS (previously known as Android Wear) from Google
watchOS from Apple
Tizen OS from Samsung (there was an announcement in May 2021 that Wear OS and Tizen OS will merge and will be called simply Wear.)
History
Due to the varied definitions of wearable and computer, the first wearable computer could be as early as the first abacus on a necklace, a 16th-century abacus ring, a wristwatch and 'finger-watch' owned by Queen Elizabeth I of England, or the covert timing devices hidden in shoes to cheat at roulette by Thorp and Shannon in the 1960s and 1970s.
However, a general-purpose computer is not merely a time-keeping or calculating device, but rather a user-programmable item for arbitrary complex algorithms, interfacing, and data management. By this definition, the wearable computer was invented by Steve Mann, in the late 1970s:
The development of wearable items has taken several steps of miniaturization from discrete electronics over hybrid designs to fully integrated designs, where just one processor chip, a battery and some interface conditioning items make the whole unit.
1500s
Queen Elizabeth I of England received a watch from Robert Dudley in 1571, as a New Year present; it may have been worn on the forearm rather than the wrist. She also possessed a 'finger-watch' set in a ring, with an alarm that prodded her finger.
1600s
The Qing Dynasty saw the introduction of a fully functional abacus on a ring, which could be used while it was being worn.
1960s
In 1961, mathematicians Edward O. Thorp and Claude Shannon built some computerized timing devices to help them win at a game of roulette. One such timer was concealed in a shoe and another in a pack of cigarettes. Various versions of this apparatus were built in the 1960s and 1970s.
Thorp refers to himself as the inventor of the first "wearable computer" In other variations, the system was a concealed cigarette-pack sized analog computer designed to predict the motion of roulette wheels. A data-taker would use microswitches hidden in his shoes to indicate the speed of the roulette wheel, and the computer would indicate an octant of the roulette wheel to bet on by sending musical tones via radio to a miniature speaker hidden in a collaborator's ear canal. The system was successfully tested in Las Vegas in June 1961, but hardware issues with the speaker wires prevented it from being used beyond test runs. This was not a wearable computer because it could not be re-purposed during use; rather it was an example of task-specific hardware. This work was kept secret until it was first mentioned in Thorp's book Beat the Dealer (revised ed.) in 1966 and later published in detail in 1969.
1970s
Pocket calculators became mass-market devices from 1970, starting in Japan. Programmable calculators followed in the late 1970s, being somewhat more general-purpose computers. The HP-01 algebraic calculator watch by Hewlett-Packard was released in 1977.
A camera-to-tactile vest for the blind, launched by C.C. Collins in 1977, converted images into a 1024-point, ten-inch square tactile grid on a vest.
1980s
The 1980s saw the rise of more general-purpose wearable computers. In 1981, Steve Mann designed and built a backpack-mounted 6502-based wearable multimedia computer with text, graphics, and multimedia capability, as well as video capability (cameras and other photographic systems). Mann went on to be an early and active researcher in the wearables field, especially known for his 1994 creation of the Wearable Wireless Webcam, the first example of Lifelogging.
Seiko Epson released the RC-20 Wrist Computer in 1984. It was an early smartwatch, powered by a computer on a chip.
In 1989, Reflection Technology marketed the Private Eye head-mounted display, which scans a vertical array of LEDs across the visual field using a vibrating mirror. This display gave rise to several hobbyist and research wearables, including Gerald "Chip" Maguire's IBM/Columbia University Student Electronic Notebook, Doug Platt's Hip-PC, and Carnegie Mellon University's VuMan 1 in 1991.
The Student Electronic Notebook consisted of the Private Eye, Toshiba diskless AIX notebook computers (prototypes), a stylus based input system and a virtual keyboard. It used direct-sequence spread spectrum radio links to provide all the usual TCP/IP based services, including NFS mounted file systems and X11, which all ran in the Andrew Project environment.
The Hip-PC included an Agenda palmtop used as a chording keyboard attached to the belt and a 1.44 megabyte floppy drive. Later versions incorporated additional equipment from Park Engineering. The system debuted at "The Lap and Palmtop Expo" on 16 April 1991.
VuMan 1 was developed as part of a Summer-term course at Carnegie Mellon's Engineering Design Research Center, and was intended for viewing house blueprints. Input was through a three-button unit worn on the belt, and output was through Reflection Tech's Private Eye. The CPU was an 8 MHz 80188 processor with 0.5 MB ROM.
1990s
In the 1990s PDAs became widely used, and in 1999 were combined with mobile phones in Japan to produce the first mass-market smartphone.
In 1993, the Private Eye was used in Thad Starner's wearable, based on Doug Platt's system and built from a kit from Park Enterprises, a Private Eye display on loan from Devon Sean McCullough, and the Twiddler chording keyboard made by Handykey. Many iterations later this system became the MIT "Tin Lizzy" wearable computer design, and Starner went on to become one of the founders of MIT's wearable computing project. 1993 also saw Columbia University's augmented-reality system known as KARMA (Knowledge-based Augmented Reality for Maintenance Assistance). Users would wear a Private Eye display over one eye, giving an overlay effect when the real world was viewed with both eyes open. KARMA would overlay wireframe schematics and maintenance instructions on top of whatever was being repaired. For example, graphical wireframes on top of a laser printer would explain how to change the paper tray. The system used sensors attached to objects in the physical world to determine their locations, and the entire system ran tethered from a desktop computer.
In 1994, Edgar Matias and Mike Ruicci of the University of Toronto, debuted a "wrist computer." Their system presented an alternative approach to the emerging head-up display plus chord keyboard wearable. The system was built from a modified HP 95LX palmtop computer and a Half-QWERTY one-handed keyboard. With the keyboard and display modules strapped to the operator's forearms, text could be entered by bringing the wrists together and typing. The same technology was used by IBM researchers to create the half-keyboard "belt computer. Also in 1994, Mik Lamming and Mike Flynn at Xerox EuroPARC demonstrated the Forget-Me-Not, a wearable device that would record interactions with people and devices and store this information in a database for later query. It interacted via wireless transmitters in rooms and with equipment in the area to remember who was there, who was being talked to on the telephone, and what objects were in the room, allowing queries like "Who came by my office while I was on the phone to Mark?". As with the Toronto system, Forget-Me-Not was not based on a head-mounted display.
Also in 1994, DARPA started the Smart Modules Program to develop a modular, humionic approach to wearable and carryable computers, with the goal of producing a variety of products including computers, radios, navigation systems and human-computer interfaces that have both military and commercial use. In July 1996, DARPA went on to host the "Wearables in 2005" workshop, bringing together industrial, university, and military visionaries to work on the common theme of delivering computing to the individual. A follow-up conference was hosted by Boeing in August 1996, where plans were finalized to create a new academic conference on wearable computing. In October 1997, Carnegie Mellon University, MIT, and Georgia Tech co-hosted the IEEE International Symposium on Wearables Computers (ISWC) in Cambridge, Massachusetts. The symposium was a full academic conference with published proceedings and papers ranging from sensors and new hardware to new applications for wearable computers, with 382 people registered for the event. In 1998, the Microelectronic and Computer Technology Corporation created the Wearable Electronics consortial program for industrial companies in the U.S. to rapidly develop wearable computers. The program preceded the MCC Heterogeneous Component Integration Study, an investigation of the technology, infrastructure, and business challenges surrounding the continued development and integration of micro-electro-mechanical systems (MEMS) with other system components.
In 1998, Steve Mann invented and built the world's first smartwatch. It was featured on the cover of Linux Journal in 2000, and demonstrated at ISSCC 2000.
2000s
Dr. Bruce H. Thomas and Dr. Wayne Piekarski developed the Tinmith wearable computer system to support augmented reality. This work was first published internationally in 2000 at the ISWC conference. The work was carried out at the Wearable Computer Lab in the University of South Australia.
In 2002, as part of Kevin Warwick's Project Cyborg, Warwick's wife, Irena, wore a necklace which was electronically linked to Warwick's nervous system via an implanted electrode array. The color of the necklace changed between red and blue dependent on the signals on Warwick's nervous system.
Also in 2002, Xybernaut released a wearable computer called the Xybernaut Poma Wearable PC, Poma for short. Poma stood for Personal Media Appliance. The project failed for a few reasons though the top reasons are that the equipment was expensive and clunky. The user would wear a head-mounted optical piece, a CPU that could be clipped onto clothing, and a mini keyboard that was attached to the user's arm.
GoPro released their first product, the GoPro HERO 35mm, which began a successful franchise of wearable cameras. The cameras can be worn atop the head or around the wrist and are shock and waterproof. GoPro cameras are used by many athletes and extreme sports enthusiasts, a trend that became very apparent during the early 2010s.
In the late 2000s, various Chinese companies began producing mobile phones in the form of wristwatches, the descendants of which as of 2013 include the i5 and i6, which are GSM phones with 1.8-inch displays, and the ZGPAX s5 Android wristwatch phone.
2010s
Standardization with IEEE, IETF, and several industry groups (e.g. Bluetooth) lead to more various interfacing under the WPAN (wireless personal area network). It also led the WBAN (Wireless body area network) to offer new classification of designs for interfacing and networking. The 6th-generation iPod Nano, released in September 2010, has a wristband attachment available to convert it into a wearable wristwatch computer.
The development of wearable computing spread to encompass rehabilitation engineering, ambulatory intervention treatment, life guard systems, and defense wearable systems.
Sony produced a wristwatch called Sony SmartWatch that must be paired with an Android phone. Once paired, it becomes an additional remote display and notification tool.
Fitbit released several wearable fitness trackers and the Fitbit Surge, a full smartwatch that is compatible with Android and iOS.
On 11 April 2012, Pebble launched a Kickstarter campaign to raise $100,000 for their initial smartwatch model. The campaign ended on 18 May with $10,266,844, over 100 times the fundraising target. Pebble released several smartwatches, including the Pebble Time and the Pebble Round.
Google Glass launched their optical head-mounted display (OHMD) to a test group of users in 2013, before it became available to the public on 15 May 2014. Google's mission was to produce a mass-market ubiquitous computer that displays information in a smartphone-like hands-free format that can interact with the Internet via natural language voice commands. Google Glass received criticism over privacy and safety concerns. On 15 January 2015, Google announced that it would stop producing the Google Glass prototype but would continue to develop the product. According to Google, Project Glass was ready to "graduate" from Google X, the experimental phase of the project.
Thync, a headset launched in 2014, is a wearable that stimulates the brain with mild electrical pulses, causing the wearer to feel energized or calm based on input into a phone app. The device is attached to the temple and to the back of the neck with an adhesive strip.
Macrotellect launched two portable brainwave (EEG) sensing devices, BrainLink Pro and BrainLink Lite in 2014, which allows families and meditation students to enhance the mental fitness and stress relief with 20+ brain fitness enhancement Apps on Apple and Android App Stores.
In January 2015, Intel announced the sub-miniature Intel Curie for wearable applications, based on its Intel Quark platform. As small as a button, it features a six-axis accelerometer, a DSP sensor hub, a Bluetooth LE unit, and a battery charge controller. It was scheduled to ship in the second half of the year.
On 24 April 2015, Apple released their take on the smartwatch, known as the Apple Watch. The Apple Watch features a touchscreen, many applications, and a heart-rate sensor.
Some advanced VR headsets require the user to wear a desktop-sized computer as a backpack to enable them to move around freely.
Commercialization
The commercialization of general-purpose wearable computers, as led by companies such as Xybernaut, CDI and ViA, Inc. has thus far been met with limited success. Publicly traded Xybernaut tried forging alliances with companies such as IBM and Sony in order to make wearable computing widely available, and managed to get their equipment seen on such shows as The X-Files, but in 2005 their stock was delisted and the company filed for Chapter 11 bankruptcy protection amid financial scandal and federal investigation. Xybernaut emerged from bankruptcy protection in January, 2007. ViA, Inc. filed for bankruptcy in 2001 and subsequently ceased operations.
In 1998, Seiko marketed the Ruputer, a computer in a (fairly large) wristwatch, to mediocre returns. In 2001, IBM developed and publicly displayed two prototypes for a wristwatch computer running Linux. The last message about them dates to 2004, saying the device would cost about $250, but it is still under development. In 2002, Fossil, Inc. announced the Fossil Wrist PDA, which ran the Palm OS. Its release date was set for summer of 2003, but was delayed several times and was finally made available on 5 January 2005. Timex Datalink is another example of a practical wearable computer. Hitachi launched a wearable computer called Poma in 2002. Eurotech offers the ZYPAD, a wrist-wearable touch screen computer with GPS, Wi-Fi and Bluetooth connectivity and which can run a number of custom applications. In 2013, a wearable computing device on the wrist to control body temperature was developed at MIT.
Evidence of weak market acceptance was demonstrated when Panasonic Computer Solutions Company's product failed. Panasonic has specialized in mobile computing with their Toughbook line since 1996 and has extensive market research into the field of portable, wearable computing products. In 2002, Panasonic introduced a wearable brick computer coupled with a handheld or a touchscreen worn on the arm. The "Brick" Computer is the CF-07 Toughbook, dual batteries, screen used same batteries as the base, 800 x 600 resolution, optional GPS and WWAN. Has one M-PCI slot and one PCMCIA slot for expansion. CPU used is a 600 MHz Pentium 3 factory under clocked to 300 MHz so it can stay cool passively as it has no fan. Micro DIM RAM is upgradeable. The screen can be used wirelessly on other computers. The brick would communicate wirelessly to the screen, and concurrently the brick would communicate wirelessly out to the internet or other networks. The wearable brick was quietly pulled from the market in 2005, while the screen evolved to a thin client touchscreen used with a handstrap.
Google has announced that it has been working on a head-mounted display-based wearable "augmented reality" device called Google Glass. An early version of the device was available to the US public from April 2013 until January 2015. Despite ending sales of the device through their Explorer Program, Google has stated that they plan to continue developing the technology.
LG and iriver produce earbud wearables measuring heart rate and other biometrics, as well as various activity metrics.
Greater response to commercialization has been found in creating devices with designated purposes rather than all-purpose. One example is the WSS1000. The WSS1000 is a wearable computer designed to make the work of inventory employees easier and more efficient. The device allows workers to scan the barcode of items and immediately enter the information into the company system. This removed the need for carrying a clipboard, removed error and confusion from hand written notes, and allowed workers the freedom of both hands while working; the system improves accuracy as well as efficiency.
Popular culture
Many technologies for wearable computers derive their ideas from science fiction. There are many examples of ideas from popular movies that have become technologies or are technologies currently being developed.
3D user interface
Devices that display usable, tactile interfaces that can be manipulated in front of the user. Examples include the glove-operated hologram computer featured at the Pre-Crime headquarters in the beginning of Minority Report and the computers used by the gate workers at Zion in The Matrix trilogy.
Intelligent textiles or smartwear
Clothing that can relay and collect information. Examples include Tron and its sequel, and also many sci-fi military films.
Threat glasses
Scan others in vicinity and assess threat-to-self level. Examples include Terminator 2, 'Threep' Technology in Lock-In, and Kill switch.
Computerized contact lenses
Special contact lenses that are used to confirm one's identity. Used in Mission Impossible 4.
Combat suit armor
A wearable exoskeleton that provides protection to its wearer and is typically equipped with powerful weapons and a computer system. Examples include numerous Iron Man suits, the Predator suit, along with Samus Aran's Power Suit and Fusion Suit in the Metroid video game series.
Brain nano-bots to store memories in the cloud
Used in Total Recall.
Infrared headsets
Can help identify suspects and see through walls. Examples include Robocop's special eye system, as well as some more advanced visors that Samus Aran uses in the Metroid Prime trilogy.
Wrist-worn computers
Provide various abilities and information, such as data about the wearer, a vicinity map, a flashlight, a communicator, a poison detector or an enemy-tracking device. Examples included are the Pip-Boy 3000 from the Fallout games and Leela's Wrist Device from the Futurama TV sitcom.
On-chest or smart necklace
This form-factor of wearable computer has been shown in many sci-fi movies, including Prometheus and Iron Man.
Advancement with wearable technology over years
Technology has advanced with continuous change in wearable computers. Wearable technologies are increasingly used in healthcare. For instance, portable sensors are used as medical devices which helps patients with diabetes to help them keep track of exercise related data. A number of people think wearable technology as a new trend; however, companies have been trying to develop or design wearable technologies for decades. The spotlight has more recently been focused on new types of technology which are more focused on improving efficiency in the wearer's life.
The main elements of wearable computers
the display, which allows the user to see the work they do.
the computer, which allows the user to run an application or access the internet
the commands, which allows the user to control the machine.
Challenges with wearable computers
Wearable technology comes with many challenges, like data security, trust issues, and regulatory and ethical issues. After 2010, wearable technologies have been seen more as a technology focused mostly on fitness. They have been used with the potential to improve the operations of health and many other professions. With an increase in wearable devices, privacy and security issues can be very important, especially when it comes to health devices. Also, the FDA considers wearable devices as "general wellness products". In the US, wearable devices are not under any Federal laws, but regulatory law like Protected Health Information (PHI) is the subject to regulation which is handled by the Office for Civil Rights (OCR). The devices with sensors can create security issues as the companies have to be more alert to protect the public data. The issue with cybersecurity of these devices are the regulations are not that strict in the US. Likewise, the National Institute of Standards and Technology (NIST) has a code called NIST Cyber security Framework, but it is not mandatory.
Consequently, the lack of specific regulations for wearable devices, specifically medical devices, increases the risk of threats and other vulnerabilities. For instance, Google Glass raised major privacy risks with wearable computer technology; Congress investigated the privacy risks related to consumers using Google Glass and how they use the data. The product can be used to track not only the users of the product but others around them, particularly without them being aware. Nonetheless, all the data captured with Google Glass was then stored on Google's cloud servers, giving them access to the data. They also raised questions regarding women's security as they allowed stalkers or harassers to take intrusive pictures of women's bodies by wearing the Glass without any fear of getting caught.
Wearable technologies like smart glasses can also raise cultural and social issues. Even though wearable technologies can make life easier and more enjoyable, with the adoption of wearable technology, they allow social conventions to govern human-to-human communication. Correspondingly, wearable devices like Bluetooth headphones can make people dependent on technology more than human interaction with others nearby. Society considers these technologies luxury accessories and there is peer pressure to own similar products in order to not feel left out. These products raise challenges of social and moral discipline. Wearable devices are seen as objects of discipline and control like it mediates the cultural ideologies. For instance, wearing a smart watch can be a way to fit in with standards in male-dominated fields and where people are against feminism. Wearable technologies deal with issues of biopolitics on understanding the fact that wearables dominate humans and how they act.
Despite the fact that the demand for this technology is increasing, one of the biggest challenges is the price. For example, the price of an Apple Watch ranges from $399 to $1,399, which for a normal consumer can be prohibitively expensive.
Future innovations
Augmented reality allows a new generation of display. As opposed to virtual reality, the user does not exist in a virtual world, but information is superimposed on the real world.
These displays can be easily portable, such as the Vufine+. Other are quite massive, like the Hololens 2. Some headsets are autonomous, such as the Oculus Quest 2 and others. In contrast to a computer, they are more like a terminal module.
Single-board computers (SBC) are improving in performance and becoming cheaper. Some boards are cheap such as the Raspberry Pi Zero and Pi 4, while others are more expensive but more similar to a normal PC, like the Hackboard and LattePanda.
One main domain of future research could be the method of control. Today computers are commonly controlled through the keyboard and the mouse, which could change in the future. For example, the words per minute rate on a keyboard could be statistically improved with a BEPO layout. Ergonomics could also change the results with split keyboards and minimalist keyboards (which use one key for more than one letter or symbol). The extreme could be the Plover and steno keyboard that allow the use of very few keys, pressing more than one at the same time for a letter.
Furthermore, the pointer could be improved from a basic mouse to an accelerator pointer.
The system of gesture controls is evolving from image control (Leap Motion camera) to integrated capture (ex-prototype AI data glove from Zack Freedman.) For some people, the main idea could be to build computers integrated with the AR system which will be controlled with ergonomic controllers. It will make a universal machine that can be as portable as a mobile phone and as efficient as a computer, additionally with ergonomic controllers.
Military use
The wearable computer was introduced to the US Army in 1989 as a small computer that was meant to assist soldiers in battle. Since then, the concept has grown to include the Land Warrior program and proposal for future systems. The most extensive military program in the wearables arena is the US Army's Land Warrior system, which will eventually be merged into the Future Force Warrior system. There are also researches for increasing the reliability of terrestrial navigation.
F-INSAS is an Indian military project, designed largely with wearable computing.
See also
Activity tracker
Apple Watch
Artificial neural membrane (Smartskin)
Augmented reality
Active tag
Calculator watch
Computer-mediated reality
eHealth
EyeTap
E-textiles
FrogPad
Futuristic clothing
Glove One
Google Glass
Golden-i
GPS watch
Head-mounted display
Head-up display
Heart rate monitor
Internet of Things
Lifelog
Open-source computing hardware
Identity tag
Mobile phone
Mobile interaction
Optical head-mounted display
OQO
Personal digital assistant
Pocket computer
Skully (helmet)
Smartphone
Smartglasses
Smartwatch
Staff locators
Tablet PC
Virtual retinal display
Wireless ambulatory ECG
References
External links
Peer-reviewed encyclopedia chapter on Wearable Computing by Steve Mann
A brief history of wearable computing
IEEE International Symposium on Wearable Computers (Academic Conference)
Internet of things
Fashion accessories
Smartwatches
Mobile computers
Laptops
Japanese inventions
Personal digital assistants
Human–computer interaction
Ambient intelligence
Ubiquitous computing
Wearable devices |
1054629 | https://en.wikipedia.org/wiki/Setuid | Setuid | The Unix access rights flags setuid and setgid (short for "set user ID" and "set group ID") allow users to run an executable with the file system permissions of the executable's owner or group respectively and to change behaviour in directories. They are often used to allow users on a computer system to run programs with temporarily elevated privileges in order to perform a specific task. While the assumed user id or group id privileges provided are not always elevated, at a minimum they are specific.
The flags setuid and setgid are needed for tasks that require different privileges than what the user is normally granted, such as the ability to alter system files or databases to change their login password. Some of the tasks that require additional privileges may not immediately be obvious, though, such as the ping command, which must send and listen for control packets on a network interface.
Effects
The setuid and setgid flags have different effects, depending on whether they are applied to a file, to a directory or binary executable or non binary executable file. The setuid and setgid flags have an effect only on binary executable files and not on scripts (e.g., Bash, Perl, Python).
When set on an executable file
When the setuid or setgid attributes are set on an executable file, then any users able to execute the file will automatically execute the file with the privileges of the file's owner (commonly root) and/or the file's group, depending upon the flags set. This allows the system designer to permit trusted programs to be run which a user would otherwise not be allowed to execute. These may not always be obvious. For example, the ping command may need access to networking privileges that a normal user cannot access; therefore it may be given the setuid flag to ensure that a user who needs to ping another system can do so, even if their own account does not have the required privilege for sending packets.
For security purposes, the invoking user is usually prohibited by the system from altering the new process in any way, such as by using ptrace, LD_LIBRARY_PATH or sending signals to it, to exploit the raised privilege, although signals from the terminal will still be accepted.
The setuid and setgid bits are normally set with the command chmod by setting the high-order octal digit to 4 for setuid or 2 for setgid. "chmod 6711 file" will set both the setuid and setgid bits (4+2=6), making the file read/write/executable for the owner (7), and executable by the group (first 1) and others (second 1). When a user other than the owner executes the file, the process will run with user and group permissions set upon it by its owner. For example, if the file is owned by user root and group wheel, it will run as root:wheel no matter who executes the file.
Most implementations of the chmod command also support finer-grained, symbolic arguments to set these bits. The preferably finer-grained mode is shown in the demonstration below as the "chmod ug+s"
Security impact
While the setuid feature is very useful in many cases, its improper use can pose a security risk if the setuid attribute is assigned to executable programs that are not carefully designed. Due to potential security issues, many operating systems ignore the setuid attribute when applied to executable shell scripts.
The presence of setuid executables explains why the chroot system call is not available to non-root users on Unix. See limitations of chroot for more details.
When set on a directory
Setting the setgid permission on a directory ("chmod g+s") causes new files and subdirectories created within it to inherit its group ID, rather than the primary group ID of the user who created the file (the owner ID is never affected, only the group ID).
Newly created subdirectories inherit the setgid bit. Thus, this enables a shared workspace for a group without the inconvenience of requiring group members to explicitly change their current group before creating new files or directories.
only affects the group ID of new files and subdirectories created after the setgid bit is set, and is not applied to existing entities.
does not affect group ID of the files that are created elsewhere and moved to the directory in question. The file will continue to carry the group ID that was effected when and where it was created.
Setting the setgid bit on existing subdirectories must be done manually, with a command such as
The setuid permission set on a directory is ignored on most UNIX and Linux systems. However FreeBSD can be configured to interpret setuid in a manner similar to setgid, in which case it forces all files and sub-directories created in a directory to be owned by that directory's owner - a simple form of inheritance. This is generally not needed on most systems derived from BSD, since by default directories are treated as if their setgid bit is always set, regardless of the actual value. As is stated in open(2), "When a new file is created it is given the group of the directory which contains it."
Examples
Checking permissions
Permissions of a file can be checked in octal form and/or alphabetic form with the command line tool stat
[ torvalds ~ ] $ stat -c "%a %A" ~/test/
1770 drwxrwx--T
SUID
4701 on an executable file owned by 'root' and the group 'root'
A user named 'thompson' attempts to execute the file. The executable permission for all users is set (the '1') so 'thompson' can execute the file. The file owner is 'root' and the SUID permission is set (the '4') - so the file is executed as 'root'.
The reason an executable would be run as 'root' is so that it can modify specific files that the user would not normally be allowed to, without giving the user full root access.
A default use of this can be seen with the /usr/bin/passwd binary file. /usr/bin/passwd needs to modify /etc/passwd and /etc/shadow which store account information and password hashes for all users, and these can only be modified by the user 'root'.[ thompson ~ ] $ stat -c "%a %U:%G %n" /usr/bin/passwd
4701 root:root /usr/bin/passwd
[ thompson ~ ] $ passwd
passwd: Changing password for thompson
The owner of the process is not the user running the executable file but the owner of the executable file
SGID
2770 on a directory named 'music' owned by the user 'root' and the group 'engineers'
A user named 'torvalds' who belongs primarily to the group 'torvalds' but secondarily to the group 'engineers' makes a directory named 'electronic' under the directory named 'music'. The group ownership of the new directory named 'electronic' inherits 'engineers.' This is the same when making a new file named 'imagine.txt'
Without SGID the group ownership of the new directory/file would have been 'torvalds' as that is the primary group of user 'torvalds'.
[ torvalds ~ ] $ groups torvalds
torvalds : torvalds engineers
[ torvalds ~ ] $ stat -c "%a %U:%G %n" ./music/
2770 root:engineers ./music/
[ torvalds ~ ] $ mkdir ./music/electronic
[ torvalds ~ ] $ stat -c "%U:%G %n" ./music/electronic/
torvalds:engineers ./music/electronic/
[ torvalds ~ ] $ echo 'NEW FILE' > ./music/imagine.txt
[ torvalds ~ ] $ stat -c "%U:%G %n" ./music/imagine.txt
torvalds:engineers ./music/imagine.txt
[ torvalds ~ ] $ touch ~/test
[ torvalds ~ ] $ stat -c "%U:%G %n" ~/test
torvalds:torvalds ~/test
Sticky bit
1770 on a directory named 'videogames' owned by the user 'torvalds' and the group 'engineers'.
A user named 'torvalds' creates a file named 'tekken' under the directory named 'videogames'. A user named 'wozniak', who is also part of the group 'engineers', attempts to delete the file named 'tekken' but he cannot, since he is not the owner.
Without sticky bit, 'wozniak' could have deleted the file, because the directory named 'videogames' allows read and write by 'engineers'. A default use of this can be seen at the /tmp folder.
[ torvalds /home/shared/ ] $ groups torvalds
torvalds : torvalds engineers
[ torvalds /home/shared/ ] $ stat -c "%a %U:%G %n" ./videogames/
1770 torvalds:engineers ./videogames/
[ torvalds /home/shared/ ] $ echo 'NEW FILE' > videogames/tekken
[ torvalds /home/shared/ ] $ su - wozniak
Password:
[ wozniak ~/ ] $ groups wozniak
wozniak : wozniak engineers
[ wozniak ~/ ] $ cd /home/shared/videogames
[ wozniak /home/shared/videogames/ ] $ rm tekken
rm: cannot remove ‘tekken’: Operation not permitted
Sticky bit with SGID
3171 on a directory named 'blog' owned by the group 'engineers' and the user 'root'
A user named 'torvalds' who belongs primarily to the group 'torvalds' but secondarily to the group 'engineers' creates a file or directory named 'thoughts' inside the directory 'blog'. A user named 'wozniak' who also belongs to the group 'engineers' cannot delete, rename, or move the file or directory named 'thoughts', because he is not the owner and the sticky bit is set. However, if 'thoughts' is a file, then 'wozniak' can edit it.
Sticky bit has the final decision. If sticky bit and SGID had not been set, the user 'wozniak' could rename, move, or delete the file named 'thoughts' because the directory named 'blog' allows read and write by group, and wozniak belongs to the group, and the default 0002 umask allows new files to be edited by group. Sticky bit and SGID could be combined with something such as a read-only umask or an append only attribute.[ torvalds /home/shared/ ] $ groups torvalds
torvalds : torvalds engineers
[ torvalds /home/shared/ ] $ stat -c "%a %U:%G %n" ./blog/
3171 root:engineers ./blog/
[ torvalds /home/shared/ ] $ echo 'NEW FILE' > ./blog/thoughts
[ torvalds /home/shared/ ] $ su - wozniak
Password:
[ wozniak ~/ ] $ cd /home/shared/blog
[ wozniak /home/shared/blog/ ] $ groups wozniak
wozniak : wozniak engineers
[ wozniak /home/shared/blog/ ] $ stat -c "%a %U:%G %n" ./thoughts
664 torvalds:engineers ./thoughts
[ wozniak /home/shared/blog/ ] $ rm thoughts
rm: cannot remove ‘thoughts’: Operation not permitted
[ wozniak /home/shared/blog/ ] $ mv thoughts /home/wozniak/
mv: cannot move ‘thoughts’ to ‘/home/wozniak/thoughts’: Operation not permitted
[ wozniak /home/shared/blog/ ] $ mv thoughts pondering
mv: cannot move ‘thoughts’ to ‘pondering’: Operation not permitted
[ wozniak /home/shared/blog/ ] $ echo 'REWRITE!' > thoughts
[ wozniak /home/shared/blog/ ] $ cat thoughts
REWRITE!
Security
Developers design and implement programs that use this bit on executables carefully in order to avoid security vulnerabilities including buffer overruns and path injection. Successful buffer-overrun attacks on vulnerable applications allow the attacker to execute arbitrary code under the rights of the process exploited. In the event that a vulnerable process uses the setuid bit to run as root, the code will execute with root privileges, in effect giving the attacker root access to the system on which the vulnerable process is running.
Of particular importance in the case of a setuid process is the environment of the process. If the environment is not properly sanitized by a privileged process, its behavior can be changed by the unprivileged process that started it. For example, GNU libc was at one point vulnerable to an exploit using setuid and an environment variable that allowed executing code from untrusted shared libraries.
History
The setuid bit was invented by Dennis Ritchie and included in su. His employer, then Bell Telephone Laboratories, applied for a patent in 1972; the patent was granted in 1979 as patent number . The patent was later placed in the public domain.
See also
References
External links
Chen, Hao; Wagner, David; and Dean, Drew; Setuid Demystified (pdf)
Tsafrir, Dan; Da Silva, Dilma; and Wagner, David; The Murky Issue of Changing Process Identity: Revising Setuid Demystified (pdf)
Pollock, Wayne; Unix File and Directory Permissions and Modes
Computer security procedures
Unix file system technology
Patents placed into the public domain |
26747109 | https://en.wikipedia.org/wiki/MAXQDA | MAXQDA | MAXQDA is a software program designed for computer-assisted qualitative and mixed methods data, text and multimedia analysis in academic, scientific, and business institutions. It is being developed and distributed by VERBI Software based in Berlin, Germany.
MAXQDA is designed for the use in qualitative, quantitative and mixed methods research. The emphasis on going beyond qualitative research can be observed in the extensive attributes function (called variables in the programme itself) and the ability of the programme to deal relatively quickly with larger numbers of interviews.
Products
MAXQDA Standard
The standard version of MAXQDA for macOS and Windows offers tools for the organisation and analysis of qualitative data. This includes text, audio, image, video and bibliographical files as well as survey data, Twitter tweets or focus group transcripts. The data can be analysed in a four-screen window with the help of codes and memos. MAXQDA's visualisation functions and export options facilitate presentations. MAXQDA includes some quantitative data analysis tools (e.g. Mixed Methods tools).
MAXQDA Plus
MAXQDA Plus is an extended version of MAXQDA and includes the MAXDictio module. MAXDictio can be used to create dictionaries, as well as to search and filter text files. Vocabulary and word frequency analyses can be used to support qualitative findings.
MAXQDA Analytics Pro
MAXQDA Analytics Pro is the most advanced version of MAXQDA. Besides the MAXDictio module, it also integrates a comprehensive module for statistical analysis of qualitative data. The "Stats" module offers tools to statistically analyze MAXQDA project data or import and work with external quantitative data sets in Excel or SPSS.
MAXQDA Reader
The MAXQDA Reader makes it possible to read and search MAXQDA projects without owning a license. Projects cannot be edited.
Version history
1989: MAX (DOS)
2001: MAXqda (Windows)
2003: MAXDictio (Add on for quantitative text analysis)
2005: MAXMaps (Add on for visual mapping)
2007: MAXQDA 2007 (Windows)
2010: MAXQDA 10 (Windows)
2012: MAXQDA 11 (Windows)
2012: MAXApp for iOS (iOS App)
2014: MAXApp for Android (Android App)
2014: MAXQDA 11 (Mac OS X)
2015: MAXQDA 12 (Universal for Windows and Mac OS X)
2016: VERBI releases two new products: MAXQDA Base and MAXQDA Analytics Pro
2017: MAXQDA 2018 (Universal for Windows and macOS)
2019: MAXQDA 2020 (Universal for Windows and macOS)
2022: MAXQDA 2022 (Universal for Windows and macOS)
Features of MAXQDA 2022
Import of text documents, tables, audio, video, images, twitter tweets, surveys
Data is stored in project file
Reading, editing and coding data
Paraphrasing
Settings links from one part of a document to another
Annotating data with memos
Visualization options (number of codes in different documents etc.)
Group Comparison
Analyse code combinations
Import and export demographic information (variables) from and to SPSS and Excel
Import of online surveys from SurveyMonkey
Import of web pages with the free browser add-on MAXQDA Web Collector
Analyse of responses to survey questions
Searching and tagging words
Transcription of audio and video files
Internal program media player
Linking data with georeferences (*.kml)
Tools for summarizing content
Code with Emoticons and Symbols
Export to text, excel, html, xml and special reports
Create Frequency Tables and Charts
QTT Workspace
TeamCloud
User management
Statistical analysis of qualitative data
See also
Computer-assisted qualitative data analysis software
Literature
Juliet Corbin and Anselm Strauss: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 3rd edition, 2008, Sage Publications, Los Angeles, London, New Delhi, Singapore
Ann Lewins and Christina Silver: Using Software in Qualitative Research: A Step-by-Step Guide, 2nd edition, 2014, Sage Publications, Los Angeles, London, New Delhi, Singapore
References
External links
QDA software
Science software for MacOS |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.